• Title/Summary/Keyword: 가상현실 보안

Search Result 68, Processing Time 0.024 seconds

The Present Status and Outlook of Nano Technology (나노기술의 국내외 현황과 전망)

  • 김용태
    • Proceedings of the International Microelectronics And Packaging Society Conference
    • /
    • 2001.11a
    • /
    • pp.37-39
    • /
    • 2001
  • 21세기의 벽두부터 국내외적으로 활발히 논의되고 있는 나노기술에 대한 정의를 생각해보는 것으로부터 우리가 나아갈 방향을 살펴보고자 한다. 나노기술이란, 원자 하나 하나 혹은 분자단위의 조작을 통해 1~100nm정도의 범위 안에서 근본적으로 새로운 물질이나 구조체를 만들어 내는 기술을 말한다. 즉 앞으로 우리는 경험해 보지 못한 새로운 현상에 대한 이해를 할 수 있어야 하고, 새로운 물질 자체를 다룰 수 있는 방법이 우리가 해야 할 구체적인 일이 될 것이란 말이 된다. 뿐만 아니라 나노기술은 종래의 정보.통신.전자 분야에서 주로 추구하던 마이크로화와 달리 재료, 기계, 전자, 의학, 약학, 에너지, 환경, 화학, 생물학, 농학, 정보, 보안기술 등 과학기술 분야 전반을 위시하여 사회분야가지 새로운 인식과 철학적인 이해가 필요하게 되었다. 21세기를 맞은 인류가 나아갈 방향을 나노세계에 대한 도전으로 보아야 하며, 과학기술의 새로운 틀을 제공할 것 임에 틀림 없다. 그러나, 이와 같은 나노기술의 출발점을 살펴보면 VLSI기술로 통칭할 수 있는 마이크로전자소자 기술이란 점이다. 국내의 VLSI기술은 메모리기술이라고 해도 과언이 아닐 것이다. 문제는 종래의 메모리기술은 대규모 투자와 집중적인 인력양성을 통해서 세계 최고 수준에 도달 할 수 있었다. 그러나 여기까지 오는 동안 사식 우리는 선진국의 뒷꽁무니를 혼신의 힘을 다해 뒤쫓아 온 결과라고 보아도 틀리지 않는다. 즉, 앞선자를 보고 뒤쫓는 사람은 갈방향과 목표가 분명하므로 최선을 다하면 따라 잡을 수 있다. 그런데 나노기술은 앞선 사람이 없다는 점이 큰 차이이다 따라서 뒷껑무니를 쫓아가는 습성을 가지고는 개척해 나갈 수 없다는 점을 깨닫지 않으면 안된다. 그런 점에서 이 시간 나노기술의 국내외 현황을 살펴보고 우리가 어떻게 할 것인가를 생각해 보는데 의미가 있을 것이다.하여 분석한 결과 기존의 제한된 RICH-DP는 실시간 서비스에 대한 처리율이 낮아지며 서비스 시간이 보장되지 못했다. 따라서 실시간 서비스에 대한 새로운 제안된 기법을 제안하고 성능 평가한 결과 기존의 RICH-DP보다 성능이 향상됨을 확인 할 수 있었다.(actual world)에서 가상 관성 세계(possible inertia would)로 변화시켜서, 완수동사의 종결점(ending point)을 현실세계에서 가상의 미래 세계로 움직이는 역할을 한다. 결과적으로, IMP는 완수동사의 닫힌 완료 관점을 현실세계에서는 열린 미완료 관점으로 변환시키되, 가상 관성 세계에서는 그대로 닫힌 관점으로 유지 시키는 효과를 가진다. 한국어와 영어의 관점 변환 구문의 차이는 각 언어의 지속부사구의 어휘 목록의 전제(presupposition)의 차이로 설명된다. 본 논문은 영어의 지속부사구는 논항의 하위간격This paper will describe the application based on this approach developed by the authors in the FLEX EXPRIT IV n$^{\circ}$EP29158 in the Work-package "Knowledge Extraction & Data mining"where the information captured from digital newspapers is extracted and reused in tourist information context.terpolation performance of CNN was relatively better than NN.콩과 자연 콩이 성분 분석에서 차이를 나타내지 않았다는 점, 네 번째. 쥐를 통한 다양섭취 실험에서 아무런 이상 반응이 없었다는 점등의 결과를 기준으로 알레르기에 대한 개별 검사 없이 안전한

  • PDF

A Study on Issues and Tasks of Humanity and Social Science in a Fourth Industrial Revolution Era (제4차 산업혁명시대 인문사회학적 쟁점과 과제에 관한 연구)

  • Kim, Jin-Young;Heo, Wan-Gyu
    • Journal of Digital Convergence
    • /
    • v.16 no.11
    • /
    • pp.137-147
    • /
    • 2018
  • To prepare for and implement policies for the Fourth Industrial Revolution, which is characterized by convergence, super-connectivity, and AI, this study summarized the effects and characteristics of individual technologies on our society and discussed the issues with humanity and social science perspectives. As a result, in terms of AI technology, the issues of job losses, project-type works, basic income and robot taxes, accountability of AI, and algorithm inequality were dealt with. Security, cyber hacking and privacy infringement issues were highlighted in big-data technology. In the part of block-chain and bioengineering, the society of decentralization, the concentration, digital divide, and ethical issues were discussed. On-demand economic aspects highlighted the problems of civil ethics and human commercialization. Lastly, the development of VR is discussed including side effects such as cyber-syndrom, avoidance of reality, and so on.

A Study on the Preparation of National Cyber Warfare (국가 사이버전 대비방안 연구)

  • J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.141-151
    • /
    • 2006
  • The destructive power of cyber threat arrived to until the phase which it threatens to direct and seriously in national security undergoes an important national institutuin hacking event of 2004 and Internet paralysis accidents of 2003. 1. 25. So Cyber terror and Cyber warfare is not the hypothetical enemy situation. It is more actual security situation and identify as magnification of warfare concept of incapacitation national important ability include military command system of the adversary, communication, energy, finance and transportation system. consequently, with the progress of cyber threat, it is necessary that looking at a number of general plan to make up for the weak points in cyber warfare operation system. Thus, the focus of this study is to examine new ways of developing a comprehensive cyber security management system.

  • PDF

An Architecture of the Military Aircraft Safety Check System Using 4th Industrial Revolution Technology (4차 산업혁명기술을 활용한 군 항공기 안전점검 체계 설계)

  • Eom, Jung-Ho
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.145-153
    • /
    • 2020
  • The aviation safety policy master plan is promoting the development of aviation safety management technology applying the 4th industrial revolution technology with the goal of establishing a flawless aviation safety management system and establishing a future aviation safety infrastructure. The master plan includes the establishment of various aviation safety management systems such as aircraft fault management using AI & Big data and flight training system using VR/AR. Currently, the Air Force is promoting a flight safety management system using new technology under the goal of building smart air force. Therefore, this study intends to apply the 4th Industrial Revolution technology to the aircraft condition check system that finally checks the safety of the aircraft before flight. The Air Force conducts airframe flaw checks and pre-flight aircraft check. In this study, we architect the airframe flaw check system using AI and drones, and the pre-flight aircraft condition check system using the IoT and big data for more precise and detailed check of aircraft condition and flawlessness check.

The Enhancement Strategy on National Cyber Capability Using Hybrid Methodology of AHP and TOPSIS (AHP와 TOPSIS 융합 방법론을 이용한 국가 사이버 역량 강화 방안)

  • Bae, Sunha;Park, SangDon;Kim, So Jeong
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.43-55
    • /
    • 2015
  • The effective cyber capability assessment methodology does not exist, it's difficult to check the current state of the our country's cyber capabilities and to establish cyber capability enhancement plan based on the result of assessment. The cyber capability assessment is necessary in order to determine the current level of the country, establish policy directions and provide the basis for effective budgeting. But assessment of national cyber capability is multi-criteria decision makink problem. In this paper develops an assessment model based on the AHP and TOPSIS. AHP is used to determine weight of the criteria and TOPSIS method is used to obtain final ranking. We also introduce the result of four major nations cyber capability assessment using the proposed methodology. The experiment used the virtual experimental data. And the result show that the proposed methodology can expand the number of criteria and alternatives for assessment and provide more sophisticated mathematical base for objective assessment comparing methodology using AHP only.

The Future of BlockChain Technology Leading Innovation in the Industrial Ecosystem (산업 생태계의 혁신을 선도할 블록체인 기술의 미래전망)

  • Kim, Jung-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.324-332
    • /
    • 2018
  • Blockchain technology has the potential to revolutionize trust models and business processes in a variety of industries. However, it is considered to be the initial stage of the system that pursues autonomy rather than efficiency, and it is necessary to monitor and inspect the distributed ledger technology from the price and introduction time as compared with the existing relational DB transaction technology. However, domestic and foreign private sectors have already been activated by applying block-chain technology in the national domain, and the block chain is devoid of doubt that it is an exaggerated technology, characterized by the invariance of the record, transparency, and autonomous execution of business rules. It has begun to be utilized in history, identity, certification and auditing in the financial industry as well as various industries. In this paper, we analyze the problems such as security weakness, insufficient regulatory environment, technical consensus and lack of common standard. In addition, the business sense and possibility of the block chain technology is expected to be the innovation of the industrial ecosystem by entering into the reality system from the concept through monitoring the actual introduction performance in the field of copyright, logistics, health care and environment.

Research on Cyber-terrorism preparation scheme (사이버테러 대응방안에 관한 연구)

  • Kim, Yeon Jun;Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.33-42
    • /
    • 2016
  • While evolving information-oriented society provides a lot of benefits to the human life, new types of threats have been increasing. Particularly, cyber terrorism, happen on the network that is composed of a computer system and information communication network, and the mean and scale of damage has reached a serious level. In other words, it is hard to locate cyber terror since it occurs in the virtual space, not in the real world, so identifying "Who is attacking?" (Non-visibility, non-formulas), or "Where the attack takes place?" (trans-nation) are hard. Hackers, individuals or even a small group of people, who carried out the cyber terror are posing new threats that could intimidate national security and the pace and magnitude of threats keep evolving. Scale and capability of North Korea's cyber terrorism are assessed as world-class level. Recently, North Korea is focusing on strengthen their cyber terrorism force. So improving a response system for cyber terror is a key necessity as North Korea's has emerged as a direct threat to South Korean security. Therefore, Korea has to redeem both legal and institutional systems immediately to perform as a unified control tower for preemptive response to cyber terrors arise from North Korea and neighboring countries.

Analyses of Hardware Architecture for High-speed VPN System (VPN 시스템 고속화를 위한 하드웨어 구조 분석)

  • 김정태;허창우;한종욱
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.7
    • /
    • pp.1471-1477
    • /
    • 2003
  • In order to realize the Gbps VPN system, however, newer and more advanced technologies are required to enable wire-rate processing across a wide range of functions and layers. While it is generally accepted that a software soluTion on general-purpose processors cannot scale to process these functionsa wire rate, the KEY POINT is that a software solution on general-purpose processors is the most practical way by which these security allocationscan be developed. Many of these security functions require application layer processing on the content of the packets, and the very nature of application layer software development is characterized by relatively large code size with a high need for portability an flexibility. We have analysed the consideration and specification for realizing Gbps VPN system. from this work. we can obtain a technology of originality.

The Design and Implementation of an Elevator 3D Model Simulator Framework based on Unreal Engine (언리얼엔진 기반 승강기 3D모델 시뮬레이터 프레임워크 설계 및 구현)

  • Woon-Yong Kim
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.67-74
    • /
    • 2023
  • An elevator is a mechanical and electronic device composed of about 20,000 various parts, and is systematically operated with a close relationship with each other. By intuitively understanding this complex elevator structure and efficiently recognizing the operating model, it will be possible to increase the understanding of the elevator system and the efficiency of maintenance. The existing elevator management system is a process of collecting and understanding information based on data generated from elevators, and has a structure that lacks efficiency in expressing and managing real-world information during elevator maintenance. Therefore, this paper proposes a simulator framework that can operate efficiently based on the actual elevator model. By constructing the recognition of specific objects through a 3D-based service model and visualizing the operation process, it will be possible to enhance the understanding of the structure and operation required for elevator operation. To this end, the core components of the elevator system are identified, the relationship between them and the operating method are visualized, and a simulator is implemented. Based on this, it will be possible to provide a realistic information management and operating environment in virtual space and real platform.

A Study on Exercise Intervention for Improving Physical Activity for the Disabled: From the Perspective of Convergence Device (장애인 신체활동 증가를 위한 운동중재에 관한 연구: 융합형 디바이스 활용 관점에서)

  • Kang, Sunyoung
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.85-90
    • /
    • 2019
  • The purpose of this study is to analyze the trend of exercise intervention applying various devices to increase the physical activity of the disabled, and to suggest the exercise intervention using converged devices that meet the needs of the times due to the increase of elderly people with disabilities. Exercise intervention using converged devices applicable to the disabled is divided into two types: first, exercise intervention using virtual reality-based gamification, and second, exercise intervention based on wearable devices of wearable or body-attached such as bands and watches. For exercise intervention using converged devices that can be enjoyed by the elderly with disability, minimize of environmental limitations, and easy to personalize, there is a need for configuration requirements such as easy operation and simple rules of operation, easy device installation and wearing, a trainer who can complement immature device utilization. In order to maintain and improve the daily living performance of the elderly with disabilities who experience a significant decrease in their cognitive and physical functions, it is necessary to use a physical activity game that can be experienced and can be interested in everyday life or a variety of devices to increase the amount of physical activity.