• Title/Summary/Keyword: 오픈 인증

Search Result 46, Processing Time 0.023 seconds

A Study on Analysis of Current Status and Improvement Suggestions for Massive Open Online Courses (온라인 공개 강좌 MOOC의 현황 분석 및 개선안 연구)

  • Bae, Ye-Sun;Jun, Woo-Chun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.3005-3012
    • /
    • 2014
  • Massive Open Online Courses(MOOC), originally started from United States, have recently received a great deal of attention all over the world. MOOC means free online courses that anyone can attend anytime. In Korea, KERIS(Korea Education and Research Information Service) and some universities provide various MOOC services. The purpose of this paper is to present current status and improvement suggestions of MOOC. We first introduce the formal definition and history of MOOC, then discuss current status of MOOC services in Korea and other countries. We finally present improvement suggestions that include induction of active participation for universities, value creation for campus, development of revenue model, providing motivation to students for finishing courses, development of LMS(Learning Management System), securing well-trained lecturers, translation of lecture materials, ensuring quality of authentification system of MOOC services.

Development of Protection Profile for Malware App Analysis Tool (악성 앱 분석 도구 보호프로파일 개발)

  • Jung, Jae-eun;Jung, Soo-bin;Gho, Sang-seok;Baik, Nam-kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.374-376
    • /
    • 2022
  • The Malware App Analysis Tool is a system that analyzes Android-based apps by the AI-based algorithm defined in the tool and detects whether malware code is included. Currently, as the spred of smartphones is activated, crimes using malware apps have increased, and accordingly, security for malware apps is required. Android operating systems used in smartphones have a share of more than 70% and are open-source-based, so not only will there be many vulnerabilities and malware, but also more damage to malware apps, increasing demand for tools to detect and analyze malware apps. However, this paper is proposed because there are many difficulties in designing and developing a malware app analysis tool because the security functional requirements for the malware app analysis tool are not clearly specified. Through the developed protection profile, technology can be improved based on the design and development of malware app analysis tools, safety can be secured by minimizing damage to malware apps, and furthermore, trust in malware app analysis tools can be guaranted through common criteria.

  • PDF

Design and Implementation of Multi-functional Java Card for AMR (원격검침을 위한 다기능 자바카드 설계 및 구현)

  • Kang, Hwan-Soo;Cho, Jin-Hyung;Kwon, Kwi-Seok;Lee, Jong-Man;Kang, Hwan-Il
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.64-72
    • /
    • 2009
  • AMR(Automatic Meter Reading), which means that it reads the meter of electricity, gas, or water, etc at a remote place automatically through wired or wireless communication, has been studied in terms of Power Line Communication method and Local Area Wireless Communication method, etc. In this paper, we designed and implemented JCA(Java Card for AMR) capable of AMR, which is based on java Card technology indispensable to the ubiquitous world. In this paper, JCA follows standard transactional procedures offered by power supply company and manages power usage log and billing data, and is designed in order to satisfy EMV multi-functional specifications. Because JCA is a multi-functional smart card capable of post-issuance applets as an open platform, it is installed into other applications of affiliated concerns as well as credit card and traffic card applications. Not only the proposed JCA is a low cost system, compared to other AMR systems, but is capable of paying rates in advance or later by applying authentication and security function of java Card. In addition the proposed JCA system can create value added services such as affiliated services with corporate alliance.

Developing an Endangered Species Habitat Management System based on Location Information (위치정보 기반 멸종위기종 서식지 관리시스템 개발)

  • Kim, Sun-Jib;Kim, Sang-hyup
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.3
    • /
    • pp.67-73
    • /
    • 2020
  • The research status of endangered amphibians in Korea was mainly studied the life-cycle and distribution status of species from the 1980s to the early 2000s. Although a relatively diverse range of studies have been conducted on mackerels, studies on habitat prediction, analysis, change and management are insufficient. WEB, which provides biota information using location information in Korea, is a site operated by the National Bio Resource Center under the Ministry of Environment, but there is no information on endangered species and general species information has also been found to be very scantily. For this research, we secured a database of location information of Narrow-mouth frog, an endangered species, by combining literature and field research, and established a system by applying new technologies and open-based platform technologies that can be easily accessed by non-technical personnel of IT among IT technologies. The system was divided into administrator functions and user functions to prevent indiscriminate sharing of information through authentication procedures through user membership of users. The established system was authorized to show the distance between the current location and the location of the Narrow-mouth frog. Considering the ecological characteristics of the Narrow-mouth frog, which is an endangered species, a radius of 500m was marked to determine the habitat range. The system is expected to be applied to the legal system to change existing protected areas, etc. and to select new ones. It is estimated that practical reduction measures can be derived by utilizing the development plan for reviewing the natural environment. In addition, the deployed system has the advantage of being able to apply to a wide variety of endangered species by modifying the information entered.

Appropriate Technology, Responding to the COVID-19 Pandemic - Redefined Roles in a Public Health Crisis (Part II) (COVID-19 대유행에 대응하는 적정기술 : 보건 위기에서 재정의된 역할 - 파트 2)

  • Pyun, Nayoon;Lee, Sungwoo;Suh, Jungwoo;Kim, Jaeeun;Jang, Dongyoon;Shin, Kwanwoo
    • Journal of Appropriate Technology
    • /
    • v.6 no.2
    • /
    • pp.256-270
    • /
    • 2020
  • The collapse of the medical and healthcare system in the pandemic is resulting in the voluntary participation of civil society and a new way of responding. Some of new countermeasure can be immediately utilized at the forefront of the health crisis. Appropriate technology is no longer an intermediate technology, demonstrating its role as a technology capable of overcoming the crisis of not only developing countries but also any countries where the health system has collapsed. In this Part 2, examples of health fields such medical devices as negative pressure chambers and ventilators, diagnostic chips, and diagnostic techniques, are being discussed as a quick response to the collapse of health systems under COVID-19, within the framework of appropriate technologies. Finally, the important role of scientists and engineers is discussed for the prevention of severe impacts on the vulnerable people in terms of socioeconomic status.

A Comparative Study on the Effective Deep Learning for Fingerprint Recognition with Scar and Wrinkle (상처와 주름이 있는 지문 판별에 효율적인 심층 학습 비교연구)

  • Kim, JunSeob;Rim, BeanBonyka;Sung, Nak-Jun;Hong, Min
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.17-23
    • /
    • 2020
  • Biometric information indicating measurement items related to human characteristics has attracted great attention as security technology with high reliability since there is no fear of theft or loss. Among these biometric information, fingerprints are mainly used in fields such as identity verification and identification. If there is a problem such as a wound, wrinkle, or moisture that is difficult to authenticate to the fingerprint image when identifying the identity, the fingerprint expert can identify the problem with the fingerprint directly through the preprocessing step, and apply the image processing algorithm appropriate to the problem. Solve the problem. In this case, by implementing artificial intelligence software that distinguishes fingerprint images with cuts and wrinkles on the fingerprint, it is easy to check whether there are cuts or wrinkles, and by selecting an appropriate algorithm, the fingerprint image can be easily improved. In this study, we developed a total of 17,080 fingerprint databases by acquiring all finger prints of 1,010 students from the Royal University of Cambodia, 600 Sokoto open data sets, and 98 Korean students. In order to determine if there are any injuries or wrinkles in the built database, criteria were established, and the data were validated by experts. The training and test datasets consisted of Cambodian data and Sokoto data, and the ratio was set to 8: 2. The data of 98 Korean students were set up as a validation data set. Using the constructed data set, five CNN-based architectures such as Classic CNN, AlexNet, VGG-16, Resnet50, and Yolo v3 were implemented. A study was conducted to find the model that performed best on the readings. Among the five architectures, ResNet50 showed the best performance with 81.51%.