• Title/Summary/Keyword: change of requirements

Search Result 754, Processing Time 0.031 seconds

Development of Geostationary Ocean Color Imager (GOCI) (정지궤도 해색탑재체(GOCI)의 개발)

  • Cho, Seong-Ick;Ahn, Yu-Hwan;Ryu, Joo-Hyung;Kang, Gm-Sil;Youn, Heong-Sik
    • Korean Journal of Remote Sensing
    • /
    • v.26 no.2
    • /
    • pp.157-165
    • /
    • 2010
  • In June 2010, Geostationary Ocean Color Imager (GOCI), the world's first ocean color observation satellite will be launched. GOCI is planned for use in real-time monitoring of the ocean environment around Korean Peninsula by daily analysis of ocean environment measurements of chlorophyll concentration, dissolved organic matter, and suspended sediments taken eight times per day for seven years. GOCI primary data will support a fishery information service and red tide forecasting, and ocean climate change research. In this paper, the development background of GOCI, user requirements, GOCI architecture, and the GOCI on-orbit operational concept are explained.

A Secure Active Packet Transfer using Cryptographic Techniques (암호 기술을 이용한 안전한 능동 패킷 전송)

  • 김영수;나중찬;손승원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.135-145
    • /
    • 2002
  • Active networks represent a new approach to network architecture. Nodes(routers, switches, etc.) can perform computations on user data, while packets can carry programs to be executed on nodes and potentially change the state of them. While active networks provide a flexible network iufrastructure, they are more complex than traditional networks and raise considerable security problems. Nodes are Public resources and are essential to the proper and contract running of many important systems. Therefore, security requirements placed upon the computational environment where the code of packets will be executed must be very strict. Trends of research for active network security are divided into two categories: securing active nodes and securing active packets. For example, packet authentication or monitoring/control methods are for securing active node, but some cryptographic techniques are for the latter. This paper is for transferring active packets securely between active nodes. We propose a new method that can transfer active packets to neighboring active nodes securely, and execute executable code included in those packets in each active node. We use both public key cryptosystem and symmetric key cryptosystem in our scheme

Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments (안전한 M2M 통신 구축을 위한 상호인증 및 키 교환 프로토콜)

  • Eun, Sun-Ki;Jeon, Seo-Kwan;Ahn, Jae-Young;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.73-83
    • /
    • 2010
  • Recently, as IT technologies developed, communication technologies of a various forms that satisfied convenience of user are being researched. Among various research, unlike traditional forms of communication, M2M communication is getting attention that without any control or involvement of people to establish communication between devices. However, the M2M communication could more easily be exposed to many security problems such as data exposure, data theft, unauthorized change and delete and privacy. Therefore, in this paper, we derive security requirements and propose the M2M communication architecture that provide a secure M2M communication environment. Also, we propose a secure mutual authentication and key establishment protocol between a M2M device or gateway domain and a M2M network domain. The proposed protocol is secure against replay attack, impersonation attack and protect a user privacy and tracing.

Management and Control Scheme for Next Generation Packet-Optical Transport Network (차세대 패킷광 통합망 관리 및 제어기술 연구)

  • Kang, Hyun-Joong;Kim, Hyun-Cheol
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.35-42
    • /
    • 2012
  • Increase of data traffic and the advent of new real-time services require to change from the traditional TDM-based (Time Division Multiplexing) networks to the optical networks that soft and dynamic configuration. Voice and lease line services are main service area of the traditional TDM-based networks. This optical network became main infrastructure that offer many channel that can convey data, video, and voice. To provide high resilience against failures, Packet-optical networks must have an ability to maintain an acceptable level of service during network failures. Fast and resource optimized lightpath restoration strategies are urgent requirements for the near future Packet-optical networks with a Generalized Multi-Protocol Label Switching(GMPLS) control plane. The goal of this paper is to provide packet-optical network with a hierarchical multi-layer recovery in order to fast and coordinated restoration in packet-optical network/GMPLS, focusing on new implementation information. The proposed schemes do not need an extension of optical network signaling (routing) protocols for support.

Evaluation of Conversion Action Data Mechanisms in Cost- Per-Action Advertising (Cost-Per-Action 광고 방법을 이용한 Conversion Action Data 메커니즘의 평가)

  • Li, Tian;Lee, Kyoung-Jun
    • Information Systems Review
    • /
    • v.10 no.2
    • /
    • pp.123-135
    • /
    • 2008
  • The online advertising industry's business model undertakes the change from CPM (cost-per-mille)-based to CPC(cost-per-click)-based. However, due to the problem of 'Click Fraud', CPA (cost-per-action) has been regarded as a new step. For CPA, publishers need to get information after a user clicks an advertisement. Therefore, in CPA, the key is to get Conversion Action Data (CAD). This paper introduces two existing mechanisms for getting CAD, compare their characteristics, and analyze their limitations. Then the two new mechanisms are introduced and their requirements and feasibility are analyzed. Lastly, we compare the existing two and the new two mechanisms, and point out each mechanism's business possibility, value and Application Area. This paper will help publishers choose the most appropriate mechanism on the basis of their situation.

Design of Intrusion Responsible System For Enterprise Security Management (통합보안 관리를 위한 침입대응 시스템 설계)

  • Lee, Chang-Woo;Sohn, Woo-Yong;Song, Jung-Gil
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.51-56
    • /
    • 2005
  • Service operating management to keep stable and effective environment according as user increase and network environment of the Internet become complex gradually and requirements of offered service and user become various is felt constraint gradually. To solve this problem, invasion confrontation system through proposed this log analysis can be consisted as search of log file that is XML's advantage storing log file by XML form is easy and fast, and can have advantage log files of system analyze unification and manages according to structure anger of data. Also, created log file by Internet Protocol Address sort by do log and by Port number sort do log, invasion type sort log file and comparative analysis created in other invasion feeler system because change sort to various form such as do log by do logarithm, feeler time possible.

  • PDF

Research on Possible Method to Converge IT and Architectural Design Techniques for Efficient Design of Elderly Housing (효과적 고령자 주거 설계를 위한 IT와 건축 설계 기술의 융합 가능 방안 연구)

  • Bae, Hong-min;Kim, Byung-Seo
    • Journal of Internet Computing and Services
    • /
    • v.17 no.4
    • /
    • pp.87-93
    • /
    • 2016
  • Since aging population in Korea is rapidly progressing, the need for improving the life quality of the elderly has been increasing. Accordingly, in order to respond in a residential environment improvement and behavior change for the elderly, architecture design and construction methods have become converted into a modular construction method and various IT systems for the elderly have been proposed. Unlike current residential design techniques for the elderly in which architectural design techniques are performed separately with IT system design, the methodology for converging architectural design techniques with IT has not been discussed and proposed. Therefore, this paper extensively studies about requirements for converging architectural design techniques with IT such as elderly behavior, residential IT Service plan factor analysis, and residential modular construction method including IT services.

Implementation of Software Product-Line Variabiliy Applying Aspect-Oriented Programming (AOP를 적용한 프로덕트 라인 가변기능의 구현)

  • Heo Seung-Hyun;Choi Eun-Man
    • The KIPS Transactions:PartD
    • /
    • v.13D no.4 s.107
    • /
    • pp.593-602
    • /
    • 2006
  • Software development methodology has been developed for satisfying goals of improvement in productivity and reduction in time-to-market through the reuse of software assets. The current methods that implement software product-line, one of software development methodologies, interfere massively with the core assets, which require high cost in assembly level reducing the effectiveness. In this paper, we introduce Aspect-Oriented Programming (AOP) as a method for improving assembly process in software product-line. The method that assembles core assets and variabilities is described by grammar elements such as Join point, pointcut and advice without code-change. We analyze requirements of a mini-system as an example adapting AOP and design using UML. Our study implements the variabilities, which are from design stage, using an Aspect-Oriented Programming Language, AspectJ and prove usability and practicality by implementing the proposed idea using an Aspect-Oriented Programming Language, AspectJ.

Ontology-based Semantic Matchmaking for Service-oriented Mission Operation (서비스 지향 임무 수행을 위한 온톨로지 기반 시맨틱 매칭 방법)

  • Song, Seheon;Lee, SangIl;Park, JaeHyun
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.3
    • /
    • pp.238-245
    • /
    • 2016
  • There are technological, operational and environmental constraints at tactical edge, which are disconnected operation, intermittent connectivity, and limited bandwidth (DIL), size, weight and power (SWaP) limitations, ad-hoc and mobile network, and so on. To overcome these limitations and constraints, we use service-oriented architecture (SOA) based technologies. Moreover, the operation environment is highly dynamic: requirements change in response to the emerging situation, and the availability of resources needs to be updated constantly due to the factors such as technical failures. In order to use appropriate resources at the right time according to the mission, it needs to find the best resources. In this context, we identify ontology-based mission service model including mission, task, service, and resource, and develop capability-based matching in tactical edge environment. The goal of this paper is to propose a capability-based semantic matching for dynamic resource allocation. The contributions of this paper are i) military domain ontologies ii) semantic matching using ontology relationship; and (iii) the capability-based matching for the mission service model.

A Proposal to improve environment for multi-family housing residence in amelioration area (주거환경개선지구 다가구주택 환경 개선 방안에 관한 임차인 요구 조사연구)

  • Hwang, Sun-Hae;Kim, Da-Hae;Ahn, Chang-Hun;Lee, Yeun-Sook
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 2008.11a
    • /
    • pp.140-143
    • /
    • 2008
  • As the number of family living alone is expected to soar due to a change in socio-demographics like divorce, more middle-aged women returning to work, homes become smaller and so on. In addition to in 2020 these people will be increase so that 85 percent of the Koreans compose elderly living alone who is over 65. This study aims at developing a sharing-typed elderly people-centered rental model which is accessible in the community integration dimension as an alternative and finding out theirconscious, their need about residence. and we need to check about their major requirements on improvement step by step. so that we suggest the desirable way on the existing multi house. The model provides benefits in the social, economical and pragmatic dimensions as the families living alone get together and living with others, Particularly, as a residence model which reduces a psychological loneliness and at the same time enables the elderly to continue to live a life in the community while they live together with other people, this model could be a strategy which supports the "Aging in Place." This study is in progress via small group workshop which debate gradually about special subject with similar group member. So we can find the residence's preference on living environment in various condition and the member can imagine freely on their future living arrangement by giving the various informations which can be proceed in future. The workshop proceed three times. at the first workshop, we're check their living environment and satisfaction level. and second time we give the knowledge about shared-type rental house then discuss about the model. and last time we're listen to the residence's opinion.

  • PDF