• Title/Summary/Keyword: 산업융합보안

Search Result 468, Processing Time 0.031 seconds

Development of informatics subject education system using cloud-based social platform for maker education (메이커 교육을 위한 클라우드 기반 교육용 소셜 플랫폼을 활용한 정보교과 교육시스템 개발)

  • Yang, Hwan-Geun;Lee, Tae-Wuk
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.409-412
    • /
    • 2019
  • 본 논문에서는 인공지능과 빅데이터 클라우드 등 다양한 4차 산업혁명시대의 기술과 교육을 융합한 에듀테크를 기초로 하여 에듀테크에 대한 교사의 학습 방향을 제시하며 전체적인 클라우드의 개념 및 분류체계, 교육의 활용을 제시하였고 클라우드 기반 교육용 소셜 플랫폼과 R. M. Gagne(1985)의 9가지 이론을 토대로 정보교과 추상화 단원의 학습 지도안을 설계 후 성취도 평가를 제시하였다. 연구 내용 분석 결과 기술의 발전성과 교육현장에서의 개인정보 교육 및 정보보안 교육의 필요성이 강조되며 확고한 플랫폼 구축과 빅데이터 확보 및 분석하여 개인에게 맞춤형 서비스 제공이 필요하다. 또한 사용자 편의성 극대화 서비스 및 UX 간결이 요구된다. 본 논문을 토대로 에듀테크의 일부분인 클라우드 기반 소셜러닝의 다양하고 체계적인 선행연구 활성화에 시발점이 되었으면 한다.

  • PDF

Food Exchange Table Organization Model Based on Decision Tree Using Machine Learning (머신러닝을 이용한 의사결정트리 기반의 식품교환표 구성 모델)

  • Kim, JiYun;Lee, Sangmin;Jeon, Hyeongjun;Kim, Gaeun;Kim, Ji-Hyun;Park, Naeun;Jin, ChangGyun;Kwon, Jin young;Kim Jongwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.680-684
    • /
    • 2020
  • 최근 국내에서는 식품에 대한 관심도가 높아짐에 따라 먹거리에 건강·환경·미래지향적 가치가 부여되고 있으며 식품 산업에서도 신규 식품 개발이 증가하는 추세이다. 식단을 구성할 때 기준이 되는 식품교환표는 개정과정에서 많은 인력과 시간이 소요되기 때문에 식품 섭취 변화를 신속하게 반영하기 어렵다. 본 논문에서는 식품교환표의 활용도를 높이기 위한 식품교환표 갱신 기법을 제안한다. 제안 기법은 의사결정트리 모델을 학습하여 새롭게 추가된 식품의 정보를 바탕으로 식품군을 분류하여 식품교환표를 갱신한다. 이는 영양 관리가 필요한 당뇨병 환자 등에게 실용적이며 기호성·다양성이 높은 식단을 구성하는 데 도움을 준다.

Designing a vulnerability analysis system using natural language processing techniques in a cloud environment (클라우드 환경에서 자연어처리 기법을 활용한 취약점 분석 시스템 설계)

  • Song, Jin-Su;Lee, Pil-Won;Shin, Young-Tea
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.122-124
    • /
    • 2021
  • 최근 4차 산업혁명의 기술이 발전하며 인공지능과 클라우드 컴퓨팅의 융합에 대한 연구가 활발하게 진행되고 있으며 클라우드 컴퓨팅에 컨테이너 기술을 접목한 새로운 컴퓨팅 환경이 주목받고 있다. 그러나 현재 사용되고 있는 컨테이너 기반의 가상화 기술은 컨테이너 실행에 필요한 파일과 설정 값을 포함하고 있는 컨테이너 이미지를 통해 배포하는 방식을 사용하고 다수의 컨테이너가 하나의 커널을 공유하기 때문에 취약한 패키지를 사용하는 컨테이너 이미지가 다수의 사용자와 공유 되어 시스템 보안이 매우 취약하다 이에 본 논문에서는 자연어처리 기법을 활용한 취약점 분석 시스템을 통해 컨테이너를 실행에 필요한 파일과 설정 값을 포함하고 있는 컨테이너 이미지에서 취약점을 분석하는 시스템을 제안한다.

A Survey on Retrieval-Augmented Generation (검색 증강 생성(RAG) 기술에 대한 최신 연구 동향)

  • Eun-Bin Lee;Ho Bae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.745-748
    • /
    • 2024
  • 글로벌 시장에서 Large Language Model(LLM)의 발전이 급속하게 이루어지며 활용도가 높아지고 있지만 특정 유형이나 전문적 지식이 부족할 수 있어 일반화하기 어려우며, 새로운 데이터로 업데이트하기 어렵다는 한계점이 있다. 이를 극복하기 위해 지속적으로 업데이트되는 최신 정보를 포함한 외부 데이터베이스에서 정보를 검색해 응답을 생성하는 Retrieval- Augmented Generation(RAG, 검색 증강 생성) 모델을 도입하여 LLM의 환각 현상을 최소화하고 효율성과 정확성을 향상시키려는 연구가 활발히 이루어지고 있다. 본 논문에서는 LLM의 검색 기능을 강화하기 위한 RAG의 연구 및 평가기법에 대한 최신 연구 동향을 소개하고 실제 산업에서 활용하기 위한 최적화 및 응용 사례를 소개하며 이를 바탕으로 향후 연구 방향성을 제시하고자 한다.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

A Study of protective measures of the source program for the development of the Internet of Things (IoT): Protection of the program as well as plagiarism research (사물인터넷(IoT)발전을 위한 소스프로그램 보호방안 연구: 프로그램의 보호와 유사표절 연구)

  • Lee, Jong-Sik
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.31-45
    • /
    • 2018
  • Recent dramatical development of computer technology related to internet technology intensifies the dispute over software of computer or smart device. Research on software has been flourished with political issuing of fierce competition among nations for software development. Particularly industrial growth in ethernet based big data and IoT (Internet of Things) has promoted to build and develop open source programs based on java, xcode and C. On these circumstances, issue on software piracy has been confronted despite the basic security policy protecting intellectual property rights of software and thus it is of substantial importance to protect the rights of originality of source program license. However, the other issue on source technology protection of developer is the possibility of hindrance to advancement in industry and culture by developing programs. This study discuss the way of enhancing legal stability of IoT application program development and reinforcing precision in inspection of program plagiarism by analyzing the source programs with newly introducing text mining technique, thus suggests an alternative protective way of infringement of personal information due to duplicating program.

Medical Service In Inernet of Things (사물인터넷 환경의 의료서비스)

  • Woo, Sung-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.876-879
    • /
    • 2015
  • Inernet of Things(IoT) is a network to be interconnected with things anytime, anywhere. This means interaction with each other, collecting, sharing, and analysing the data. IoT also offers a new paradigm shift in industry. In particular, the combining with the fields of health care services has been noted. The convergence of IoT technology and health care is expected to be the innovation paradigm in the healthcare industry that includes all of the changes to bring the mobile health and wearable health care devices. This study analyzes IoT, health care status, and the use cases of the IoT in the medical field, finally analyses security on the Internet of Things, the most important issues of security challenges while still in medical services.

  • PDF

Security Analysis of Remote Healthcare System in Cloud-based IoT Environment (클라우드 기반 IoT 환경의 원격 헬스케어 시스템에 대한 보안성 분석)

  • Kwon Jaemin;Hong Sewoong;Choi Younsung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.1
    • /
    • pp.31-42
    • /
    • 2023
  • As computer performance is leveled upward, the use of IoT systems is gradually expanding. Although IoT systems are used in many fields, it is true that it is difficult to build a safe system due to performance limitations. To overcome these limitations, many researchers have proposed numerous protocols to improve security issues. Among them, Azrour et al. except. We proposed a new efficient and secure authentication protocol for remote healthcare systems in a cloud-based IoT environment, and claimed that the new protocol could solve the security vulnerabilities of the existing protocols and was more efficient. However, in this paper, through the security analysis of the remote healthcare system in the cloud-based IoT environment proposed by Azrour et al., the protocol of this system was found to be vulnerable to Masquerade attack, Lack of Perfect Forward Secrecy, Off-line password guessing attack, and Replay attack.

Welfare Policy Visualization Analysis using Big Data -Chungcheong- (빅데이터를 활용한 복지정책 시각화분석 -충청도 중심으로-)

  • Dae-Yu Kim;Won-Shik Na
    • Advanced Industrial SCIence
    • /
    • v.2 no.1
    • /
    • pp.15-20
    • /
    • 2023
  • The purpose of this study is to analyze the changes and importance of welfare policies in Chungcheong Province using big data analysis technology in the era of the Fourth Industrial Revolution, and to propose stable welfare policies for all generations, including the socially underprivileged. Chungcheong-do policy-related big data is coded in Python, and stable government policies are proposed based on the results of visualization analysis. As a result of the study, the keywords of Chungcheong-do government policy were confirmed in the order of region, society, government and support, education, and women, and welfare policy should be strengthened with a focus on improving local health policy and social welfare. For future research direction, it will be necessary to compare overseas cases and make policy proposals on the stable impact of national welfare policies.

A Study on Development of EEG-Based Password System Fit for Lifecaretainment (라이프케어테인먼트에 적합한 뇌파 기반 패스워드 시스템 개발에 관한 연구)

  • Yang, Gi-Chul
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.8
    • /
    • pp.525-530
    • /
    • 2019
  • Electroencephalography(EEG) studies that have been in clinical research since the discovery of brainwave have recently been developed into brain-computer interface studies. Currently, research is underway to manipulate robot arms and drones by analyzing brainwave. However, resolution and reliability of EEG information is still limited. Therefore, it is required to develop various technologies necessary for measuring and interpreting brainwave more accurately. Pioneering new applications with these technologies is also important. In this paper, we propose development of a personal authentication system fit for lifecaretainment based on EEG. The proposed system guarantees the resolution and reliability of EEG information by using the Electrooculogram and Electromyogram(EMG) together with EEG.