• Title/Summary/Keyword: 산업융합보안

Search Result 483, Processing Time 0.03 seconds

Development of Integrated Computational Fluid Dynamics(CFD) Environment using Opensource Code (오픈소스 코드를 이용한 통합 전산유체역학 환경 구축)

  • Kang, Seunghoon;Son, Sungman;Oh, Se-Hong;Park, Wonman;Choi, Choengryul
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.33-42
    • /
    • 2018
  • CFD analysis is an analytical technique that applies a computer to the design and development of products across the entire industry for heat or fluid flow. This technology is used to shorten the development period and reduce costs through computerized simulation. However, the software used for CFD analysis is now required to use expensive foreign software. The Opensource CFD analysis software used in the proposed system has reliability of commercial CFD analysis software and has various user groups. However, for users who have expert knowledge, Opensource CFD software which supports only text interface environment, We have developed an environment that enables the construction of a CFD analysis environment for beginners as well as professionals. In addition, the proposed system supports the pre-processing (design and meshing) environment for CFD analysis and the environment for post-processing (result analysis & visualization), enabling the integrated CFD analysis process in one platform.

  • PDF

The Quantification of Considerations related with Decision-making in Ground Operation : Focusing on Evaluating Avenues of Approach in IPB (지상작전과 연관된 의사결정 고려요소의 정량화 방안 : 전장정보분석의 접근로 평가요소를 중심으로)

  • Han, Seung Jo;Lee, Seungmin
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.129-136
    • /
    • 2019
  • The main tasks of commander and staffs in ground operations are a continuation performing the process of making decisions in various situations. Since the current decision-making process is largely dependent on qualitative methods, it is difficult to integrate with the decision-making tools associated with the 4th Industrial Revolution. The purpose of this study is to suggest the process of deriving the relative importance of the evaluation factors using the AHP with focusing on assessing the avenues of approach in IPB related to the ground operation plan. The most important aspect of IPB is the evaluation of the avenues of approach. Evaluation factors include target accessibility, observation and seasons, concealment and cover-up, ease of maneuverability, and ease of transition to adjacent access roads. The existing methods are the comparison method with evaluation factors and the analysis with the advantages and disadvantages. However, it has been criticized that they regard evaluation factors as equal importance. The results show that target accessibility has the highest score related with priority when considering the criteria.

A Study on the Effective Military Use of Drones (드론의 효과적인 군사분야 활용에 관한 연구)

  • Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.61-70
    • /
    • 2020
  • The unmanned aerial vehicle that emerged with the 4th Industrial Revolution attracts attention not only from Korea but also from around the world, and its utilization and market size are gradually expanding. For the first time, it was used for military purposes, but it is currently used for transportation, investigation, surveillance, and agriculture. China, along with the US and Europe, is emerging as a leader in the commercial unmanned aerial vehicle market, and Korea, which has the world's seventh-largest technology in related fields, is striving to promote various technology development policies and system improvement related to unmanned aerial vehicles. Military drones will revolutionize the means of war by using a means of war called an unmanned system based on theories such as network-oriented warfare and effect-oriented warfare. Mobile equipment, including drones, is greatly affected by environmental factors such as terrain and weather, as well as technological developments and interests in the field. Now, drones are being used actively in many fields, and especially in the military field, the use of advanced drones is expected to create a new defense environment and provide a new paradigm for war.

A Proposal for Drone Entity Identification and Secure Information Provision Technology Using Quantum Entropy Chip-Based Cryptographic Module in WLAN Environment (무선랜 환경에서 양자 엔트로피 칩 기반 암호모듈을 적용한 드론 피아식별과 안전한 정보 제공 기술 제안)

  • Jung, Seowoo;Yun, Seunghwan;Yi, Okyeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.891-898
    • /
    • 2022
  • Along with global interest, drones are expanding the base of utilization such as transportation of goods, forest protection, and safety management, and cluster flights are being applied in various fields such as military operations and environmental monitoring. Currently, specialized networks such as e-UM 5G for services in specific industries are being established in Korea. In this regard, drone systems are also moving to establish specialized networks to provide services that are fused with AI and autonomous flight. As drones converge with various services, various security threats in various environments are also subordinated, and in response, requirements and guidelines for drone security are being prepared in Korea. In this paper, we propose a technology method for peer identification and safe information provision between cluster flight drones by utilizing a cryptographic module equipped with wireless LAN and quantum entropy-based random number generator in a cluster flight system and a mobile communication network such as e-UM 5G.

Analysis of anti-forensic trends and research on countermeasuresucation (안티 포렌식 동향 분석 및 대응 방안 연구)

  • Han Hyundong;Cho Young Jun;Cho Jae Yeon;Kim Se On;Han Wan Seop;Choi Yong Jun;Lee Jeong Hun;Kim Min Su
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.97-107
    • /
    • 2023
  • With the popularization of digital devices in the era of the 4th industrial revolution and the increase in cyber crimes targeting them, the importance of securing digital data evidence is emerging. However, the difficulty in securing digital data evidence is due to the use of anti-forensic techniques that increase analysis time or make it impossible, such as manipulation, deletion, and obfuscation of digital data. Such anti-forensic is defined as a series of actions to damage and block evidence in terms of digital forensics, and is classified into data destruction, data encryption, data concealment, and data tampering as anti-forensic techniques. Therefore, in this study, anti-forensic techniques are categorized into data concealment and deletion (obfuscation and encryption), investigate and analyze recent research trends, and suggest future anti-forensic research directions.

Design and development of non-contact locks including face recognition function based on machine learning (머신러닝 기반 안면인식 기능을 포함한 비접촉 잠금장치 설계 및 개발)

  • Yeo Hoon Yoon;Ki Chang Kim;Whi Jin Jo;Hongjun Kim
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.29-38
    • /
    • 2022
  • The importance of prevention of epidemics is increasing due to the serious spread of infectious diseases. For prevention of epidemics, we need to focus on the non-contact industry. Therefore, in this paper, a face recognition door lock that controls access through non-contact is designed and developed. First very simple features are combined to find objects and face recognition is performed using Haar-based cascade algorithm. Then the texture of the image is binarized to find features using LBPH. An non-contact door lock system which composed of Raspberry PI 3B+ board, an ultrasonic sensor, a camera module, a motor, etc. are suggested. To verify actual performance and ascertain the impact of light sources, various experiment were conducted. As experimental results, the maximum value of the recognition rate was about 85.7%.

A Study on the Characteristics of the New Generation of Soldiers and the Ways to Cultivate the Leadership of Marine Corps Officers (신세대 장병의 특성과 해병대 간부들의 리더십 배양 방안에 관한 연구)

  • Kim Ho Chun
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.149-158
    • /
    • 2022
  • R.o.K Marine Corps was established on April 15, 1949 at Deoksan Air Base in Jinhae. When they fought in the Korean War and the Vietnam War, they were sure to win, so they were loved and trusted by the people. Strong combat power is only possible when an advanced barracks culture is established. Today's new generation of soldiers have strong characteristics ; self-centered and individualistic. R.o.K Marine Corps officers must understand the characteristics of the new generation of soldiers and strive to develop creative leadership in order to make them utilize their characteristics. In addition, as cutting-edge science and technology develops along with the 4th industrial revolution, R.o.K Marine Corps officers should work hard to acquire professional tactical knowledge and self-development. Therefore, Marine Corps officers should do their best to understand the characteristics of the new generation of soldiers and demonstrate leadership to become a strong force trusted by the people.

A Study on Smart Fitness Models for Active Senior (액티브시니어를 위한 스마트 피트니스 모델에 관한 연구)

  • Seungae Kang
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.135-140
    • /
    • 2022
  • This study aims to analyze exercise cases and issues using smart devices and technologies, and to present the development direction of a smart exercise environment suitable for the wellness life of active seniors with high activity and economic power unlike the existing silver generation. In the fitness industry, the subscription economy that regularly receives or uses necessary exercise tools, services, and digital content is expanding, and business models based on hardware sales and content subscription continue to emerge. In order to have value competitiveness as a platform that provides active seniors with integrated exercise services for health care, not only fitness centers, but also home training exercise equipment, fitness-related applications, and smart wearable device markets should be organically connected to form an expanded total platform. In order to have value competitiveness as a platform that provides active seniors with integrated exercise services for health care, not only fitness centers, but also home training exercise equipment, fitness-related applications, and smart wearable device markets should be organically connected to form an expanded total platform. The linkage of the digital healthcare function, which provides real-time changes to exercise programs based on continuous monitoring and feed back through wearable devices before, after, and during exercise by receiving and selecting exercise programs suitable for individual health status, is the differentiating factor in the smart fitness model.

Analysis of Operational Efficiency of Military Department of University Using Data Envelopment Analysis Method (자료포락분석법을 활용한 일반대학 군사학과의 운영 효율성 분석)

  • Young-Min Bae;Sweng-Kyu Lee
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.95-102
    • /
    • 2023
  • The purpose of this paper was to confirm the operational level of the military department of universities, which plays a key role in the officer training process, through empirical research and confirm meaningful results for improvement. There are 11 university military departments operated through the Army, agreements, and semi-agreement, and the Data Envelopment Analysis (DEA) was applied from the perspective of resource input and performance for each university's military department operation to analyze relative efficiency and confirm specific directions for improvement. As a result of operational efficiency analysis, 6 DMUs (Decsision Making Unit) were found to be efficient in the BCC model out of 11 DMUs, and the evaluation results could be confirmed through classification of efficient and inefficient groups through data capture analysis. This paper may be of practical value in that it checks the efficiency of the comparative university military departments and confirms specific information for development through the DEA-Additive model that reflects several evaluation factors at once. Through this, the operators of each university's military department are admitted.

A study on community care using AI technology (AI 기술을 활용한 커뮤니티케어에 관한 연구)

  • Seungae Kang
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.151-156
    • /
    • 2023
  • Currently, ICT is widely used in caring for the elderly living alone and preventing the disappearance of the elderly with dementia. Therefore, in this study, based on the government policy direction for the 4th industrial revolution, the use of AI technology-based care services, which are gradually increasing in community care, was sought to explore the current status and prospects for utilization and activation.AI speakers and caring robots, services that can be used for community care, help solve various problems experienced by the elderly, and are also used to relieve lack of conversation or loneliness by adding emotional functions. In order to activate community care using AI technology in the future: First, there is a need for continuous education to familiarize the elderly with AI devices and 'user experience (UX) design' for the elderly. Second, it is necessary to use human-centered technology that has a complementary relationship and enables emotional mutual relationships rather than using function-oriented technology. Third, it is necessary to solve ethical problems such as guaranteeing the user's right to self-determination and protecting privacy.