• Title/Summary/Keyword: 서비스 융합 시나리오

Search Result 101, Processing Time 0.024 seconds

Ubiquitous Virtual Reality Framework and Its Application for Fostering Sustainable Content Ecosystem (지속 가능한 콘텐츠 생태계 조성을 위한 유비쿼터스 가상현실 프레임워크 및 응용)

  • Shin, Choon-Sung;Ha, Tae-Jin;Kim, Ki-Young;Lee, Won-Woo;Lee, Young-Ho;Woo, Woon-Tack
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.123-134
    • /
    • 2010
  • In this paper we propose ubiquitous virtual reality framework and its application for fostering a sustainable content ecosystem in the convergence space of virtual reality and real space. The ubiquitous virtual reality framework supports fundamental infrastructure which consists of platforms for end-users and service providers and dual space management. The platform for the service provider allows experts to generate contents related to real objects while the platform for the end-users allows to consume, share and regenerate the contents contextually augmented over real objects. The dual space management stores, visualizes and provides the contents generated and extended by them for connecting different users and service providers. The proposed framework allows users to continuously generate, share and extend the contents and thus contribute to making multimedia service environment. We also implemented and evaluated the framework consisting of a desktop authoring platform, mobile authoring platform and a dual space management server. We then introduced a promising application scenario to show how the content ecosystem is empowered by ubiquitous virtual reality framework and is realized in our life. Consequently, we are expecting that the ubiquitous virtual reality technology will play a vital role in building continuously evolving multimedia service environment for the future computing environment.

Study on Advisory Safety Speed Model Using Real-time Vehicular Data (실시간 차량정보를 이용한 안전권고속도 산정방안에 관한 연구)

  • Jang, JeongAh;Kim, HyunSuk
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.30 no.5D
    • /
    • pp.443-451
    • /
    • 2010
  • This paper proposes the methodology about advisory safety speed based on real-time vehicular data collected from highway. The proposed model is useful information to drivers by appling seamless wireless communication and being collected from ECU(Engine Control Unit) equipment in every vehicle. Furthermore, this model also permits the use of realtime sensing data like as adverse weather and road-surface data. Here, the advisory safety speed is defined "the safety speed for drivers considering the time-dependent traffic condition and road-surface state parameter at uniform section", and the advisory safety speed model is developed by considering the parameters: inter-vehicles safe stopping distance, statistical vehicle speed, and real-time road-surface data. This model is evaluated by using the simulation technique for exploring the relationships between advisory safety speed and the dependent parameters like as traffic parameters(smooth condition and traffic jam), incident parameters(no-accident and accident) and road-surface parameters(dry, wet, snow). A simulation's results based on 12 scenarios show significant relationships and trends between 3 parameters and advisory safety speed. This model suggests that the advisory safety speed has more higher than average travel speed and is changeable by changing real-time incident states and road-surface states. The purpose of the research is to prove the new safety related services which are applicable in SMART Highway as traffic and IT convergence technology.

Prescriptive Analytics System Design Fusing Automatic Classification Method and Intellectual Structure Analysis Method (자동 분류 기법과 지적 구조 분석 기법을 융합한 처방적 분석 시스템 구현 방안 연구)

  • Jeong, Do-Heon
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.4
    • /
    • pp.33-57
    • /
    • 2017
  • This study aims to introduce an emerging prescriptive analytics method and suggest its efficient application to a category-based service system. Prescriptive analytics method provides the whole process of analysis and available alternatives as well as the results of analysis. To simulate the process of optimization, large scale journal articles have been collected and categorized by classification scheme. In the process of applying the concept of prescriptive analytics to a real system, we have fused a dynamic automatic-categorization method for large scale documents and intellectual structure analysis method for scholarly subject fields. The test result shows that some optimized scenarios can be generated efficiently and utilized effectively for reorganizing the classification-based service system.

The study of security management for application of blockchain technology in the Internet of Things environment (Focusing on security cases in autonomous vehicles including driving environment sensing data and occupant data) (사물인터넷 환경에서 블록체인 기술을 이용한 보안 관리에 관한 소고(주행 환경 센싱 데이터 및 탑승자 데이터를 포함한 자율주행차량에서의 보안 사례를 중심으로))

  • Jang Mook KANG
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.161-168
    • /
    • 2022
  • After the corona virus, as non-face-to-face services are activated, domain services that guarantee integrity by embedding sensing information of the Internet of Things (IoT) with block chain technology are expanding. For example, in areas such as safety and security using CCTV, a process is required to safely update firmware in real time and to confirm that there is no malicious intrusion. In the existing safe security processing procedures, in many cases, the person in charge performing official duties carried a USB device and directly updated the firmware. However, when private blockchain technology such as Hyperledger is used, the convenience and work efficiency of the Internet of Things environment can be expected to increase. This article describes scenarios in how to prevent vulnerabilities in the operating environment of various customers such as firmware updates and device changes in a non-face-to-face environment. In particular, we introduced the optimal blockchain technique for the Internet of Things (IoT), which is easily exposed to malicious security risks such as hacking and information leakage. In this article, we tried to present the necessity and implications of security management that guarantees integrity through operation applying block chain technology in the increasingly expanding Internet of Things environment. If this is used, it is expected to gain insight into how to apply the blockchain technique to guidelines for strengthening the security of the IoT environment in the future.

Scenario for sudden change in North Korea! : Comparing North Korea with countries of Jasmine Revolution (북한 급변사태 시나리오 I : 재스민혁명 국가들과 북한의 비교를 중심으로)

  • Lee, Dae Sung
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.63-68
    • /
    • 2017
  • The Jasmine Revolution started from Tunisia in January 2011 has brought many changes into countries in North Africa and Middle East. We need to study the causes of the revolution. First, the kings and dictators in those countries oppressed the opposition parties and the media aiming for long-term seizure of power. The power concentrated on specific people produced illegalities and corruption. Secondly, most of the national income of those countries belonged to kings and dictators producing problems during the distribution of the income. Especially, with the decrease of oil price in 1990s and the increase of the price of daily necessities in 2000s people lost their credits on their governments. Lastly, the number of people in those countries using the Internet has increased by 4,863% from 2000 to 2010. The expansion of social network services such as Facebook and Twitter was one of factors that made the information control by those countries difficult. We should think about the possibility of sudden change in North Korea. It is necessary to compare and analyze the political, economic and social characteristics between those countries and North Korea. It shouldn't be just a simple comparison or analysis. It should provide basic data for objective and quantified index development in relation to sudden change in North Korea.

An Attack Scheme with a T-DMB TPEG Update based Vulnerability (T-DMB 기반의 TPEG 업데이트 취약점을 이용한 공격 기법)

  • Kim, Jung-Hoon;Go, Jun-Young;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.3
    • /
    • pp.1-5
    • /
    • 2014
  • The development of communication method for a variety of intelligent automobiles are delivering comfortable and safe information. However the development of such communication method must also think about security. Even the update of navigation to be used for intelligent automobiles uses the wireless updating methods but the updating methods currently being used has no reliable security measures. The navigation communications used in the intelligent automobiles are being provided with TTI(Traffic and Travel Information) service using a variety of methods by the countries. In the case of Korea, most are based on T-DMB using the TPEG method for transmitting the information. By identifying the characteristics on the navigation wireless update, a security solution is proposed for delivering the reliable update information after creating the attack scenario.

A User's Location Localization Method using Smartphone Sensor on a Subway (지하철에서 스마트폰 센서를 이용한 사용자 위치 추적 방법)

  • Cho, Jung-Gil
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.3
    • /
    • pp.37-43
    • /
    • 2020
  • Smartphone-based localization has been widely studied in many different scenarios. But as far as we know, few work has addressed the problem of localization in underground public transportation systems, where GPS signal and wireless infrastructure are not always available. Knowing the location of a train is necessary to develop a useful service for subway passengers. And so, estimation of motion state and stop station by using sensors on a smartphone is being studied for subway passengers. This paper proposes a localization method that uses a barometer and a magnetic sensor on a smartphone. The method proposed in this paper first estimates whether the train runs or stops according to the change in air pressure and the strength of the magnetic field. The altitude value and the magnetic field value are then used to estimate the exact stop station of the train. We evaluated the proposed method using data from the Seoul's subway line 5. Compared with previous methods, the proposed method achieves higher accuracy.

Design of Intelligent Intrusion Context-aware Inference System for Active Detection and Response (능동적 탐지 대응을 위한 지능적 침입 상황 인식 추론 시스템 설계)

  • Hwang, Yoon-Cheol;Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.4
    • /
    • pp.126-132
    • /
    • 2022
  • At present, due to the rapid spread of smartphones and activation of IoT, malicious codes are disseminated using SNS, or intelligent intrusions such as intelligent APT and ransomware are in progress. The damage caused by the intelligent intrusion is also becoming more consequential, threatening, and emergent than the previous intrusion. Therefore, in this paper, we propose an intelligent intrusion situation-aware reasoning system to detect transgression behavior made by such intelligent malicious code. The proposed system was used to detect and respond to various intelligent intrusions at an early stage. The anticipated system is composed of an event monitor, event manager, situation manager, response manager, and database, and through close interaction between each component, it identifies the previously recognized intrusive behavior and learns about the new invasive activities. It was detected through the function to improve the performance of the inference device. In addition, it was found that the proposed system detects and responds to intelligent intrusions through the state of detecting ransomware, which is an intelligent intrusion type.

A Study on the Model for Preemptive Intrusion Response in the era of the Fourth Industrial Revolution (4차 산업혁명 시대의 선제적 위협 대응 모델 연구)

  • Hyang-Chang Choi
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.27-42
    • /
    • 2022
  • In the era of the Fourth Industrial Revolution, digital transformation to increase the effectiveness of industry is becoming more important to achieving the goal of industrial innovation. The digital new deal and smart defense are required for digital transformation and utilize artificial intelligence, big data analysis technology, and the Internet of Things. These changes can innovate the industrial fields of national defense, society, and health with new intelligent services by continuously expanding cyberspace. As a result, work productivity, efficiency, convenience, and industrial safety will be strengthened. However, the threat of cyber-attack will also continue to increase due to expansion of the new domain of digital transformation. This paper presents the risk scenarios of cyber-attack threats in the Fourth Industrial Revolution. Further, we propose a preemptive intrusion response model to bolster the complex security environment of the future, which is one of the fundamental alternatives to solving problems relating to cyber-attack. The proposed model can be used as prior research on cyber security strategy and technology development for preemptive response to cyber threats in the future society.

A Study on UX-centered Smart Office Phone Design Development Process Using Service Design Process (서비스디자인 프로세스를 활용한 UX중심 오피스 전화기 디자인개발 프로세스 연구)

  • Seo, Hong-Seok
    • Science of Emotion and Sensibility
    • /
    • v.25 no.1
    • /
    • pp.41-54
    • /
    • 2022
  • The purpose of this study was to propose a "user experience (UX)-centered product development process" so that the product design development process using the service design process can be systematized and used in practice. In a situation in which usability research on office phones is lacking compared to general home phones, this study expands to a product-based service design point of view rather than simple product development, intending to research ways to provide user experience value through office phone design in smart office. This study focused on extracting UX-centered user needs using the service design process and developing product design that realizes user experience value. In particular, the service design process was applied to systematically extract user needs and experience value elements in the product development process and to discover ideas that were converged with product-based services. For this purpose, the "Double Diamond Design Process Model," which is widely used in the service design field, was adopted. In addition, a product design development process was established so that usability improvement plans, user experience value elements, and product-service connected ideas could be extracted through a work-flow in which real users and people from various fields participate. Based on the double diamond design process, in the "Discover" information collection stage, design trends were identified mainly in the office phone markets. In the "Define" analysis and extraction stage, user needs were analyzed through user observation, interview, and usability survey, and design requirements and user experience issues were extracted. Persona was set through user type analysis, and user scenarios were presented. In the "Develop" development stage, ideation workshops and concept renderings were conducted to embody the design, and people from various fields within the company participated to set the design direction reflecting design preference and usability improvement plans. In the "Deliver" improvement/prototype development/evaluation stage, a working mock-up of a design prototype was produced and design and usability evaluation were conducted through consultation with external design experts. It is meaningful that it established a "UX-centered product development process" model that converged with the existing product design development process and service design process. Ultimately, service design-based product design development process was presented so that I Corp.'s products could realize user experience value through service convergence.