• Title/Summary/Keyword: 융합체계

Search Result 2,030, Processing Time 0.033 seconds

Civil Defense Warning delivery system analysis and implication (민방위경보 전달체계 현황분석과 시사점)

  • Lee, Jae-Young;Chois, Seong-Jong;Park, Hyung-seong;Ahn, Byung-Dug;Lim, Byung-eon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2020.11a
    • /
    • pp.3-4
    • /
    • 2020
  • 현재 국내에는 여러 가지 경보전달 시스템이 운영되고 있으나 국가 단위의 경보시스템은 민방위 경보시스템이 거의 유일하다 하겠다. 이러한 민방위경보 전달체계 현황에 대한 분석을 통해 현재의 문제점을 짚고, 향후 개선에 필요한 시사점을 도출하고자 한다. 민방위경보는 민방공경보와 재난경보를 포괄하고 있지만, 현재는 민방공경보에 치우친 운용절차와 경보전달체계를 갖고 있으며, 이는 근래에 들어 광역단위의 재난경보 상황에 대한 민방위경보시설을 이용한 대국민 경보대응이 점차 늘어나는 추세이긴 하지만 민방공경보에 치우친 경보전달체계로 인한 재난경보 대응 운용에서 제약을 받고 있음이 사실이다. 이에 본 논문은 민방위경보가 민방공경보와 재난경보를 동등한 수준으로 이해하고, 현재의 민방위경보 전달체계의 개선점을 토대로 시사점을 짚어내어 차세대 융합형 통합경보전달체계를 도출함을 목적으로 하였다.

  • PDF

Next Generation Convergence Security Framework for Advanced Persistent Threat (지능형 지속 위협에 대한 차세대 융합 보안 프레임워크)

  • Lee, Moongoo;Bae, Chunsock
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.92-99
    • /
    • 2013
  • As a recent cyber attack has a characteristic that is intellectual, advanced, and complicated attack against precise purpose and specified object, it becomes extremely hard to recognize or respond when accidents happen. Since a scale of damage is very large, a corresponding system about this situation is urgent in national aspect. Existing data center or integration security framework of computer lab is evaluated to be a behind system when it corresponds to cyber attack. Therefore, this study suggests a better sophisticated next generation convergence security framework in order to prevent from attacks based on advanced persistent threat. Suggested next generation convergence security framework is designed to have preemptive responses possibly against APT attack consisting of five hierarchical steps in domain security layer, domain connection layer, action visibility layer, action control layer and convergence correspondence layer. In domain connection layer suggests security instruction and direction in domain of administration, physical and technical security. Domain security layer have consistency of status information among security domain. A visibility layer of Intellectual attack action consists of data gathering, comparison, decision, lifespan cycle. Action visibility layer is a layer to control visibility action. Lastly, convergence correspond layer suggests a corresponding system of before and after APT attack. An introduction of suggested next generation convergence security framework will execute a better improved security control about continuous, intellectual security threat.

Systematic Review on Outcome and Trends of Community Care Pilot Project in Korea (국내 지역사회 통합돌봄 선도사업 성과 및 동향에 관한 체계적 문헌고찰)

  • Kim, Kyoung-Beom;Heo, Min-Hee;Jang, Ha-Eun;Noh, Jin-Won;Kim, Jang-Mook
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.5
    • /
    • pp.159-167
    • /
    • 2022
  • At the present time, no systematic review has been conducted to report the project's outcomes or trends. This study systematically reviewed existing evidence related with community care pilot project. A total of 61 articles, including 18 original literatures and 43 review literatures were finally selected. For original literatures, the most frequent literatures focused on demand surveys (n=4) and model proposals (n=4), the utilization of touchpoint (n=3), space design and architectural model (n=3), manpower training and role establishment (n=2), followed by prioritizing objectives (n=1) and research trend study (n=1). For review literatures, the most frequent literature focused on the elderly (n=12) and relatively few literature on the disabled and mental illness (n=2). Since the pilot project for community care has been implemented for only about one year, the present study indicates that more future research is needed to the disabled, mental illness, and homeless should be conducted as well as elderly.

Performance Enhancement of Virtual War Field Simulator for Future Autonomous Unmanned System (미래 자율무인체계를 위한 가상 전장 환경 시뮬레이터 성능 개선)

  • Lee, Jun Pyo;Kim, Sang Hee;Park, Jin-Yang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.10
    • /
    • pp.109-119
    • /
    • 2013
  • An unmanned ground vehicle(UGV) today plays a significant role in both civilian and military areas. Predominantly these systems are used to replace humans in hazardous situations. To take unmanned ground vehicles systems to the next level and increase their capabilities and the range of missions they are able to perform in the combat field, new technologies are needed in the area of command and control. For this reason, we present war field simulator based on information fusion technology to efficiently control UGV. In this paper, we present the war field simulator which is made of critical components, that is, simulation controller, virtual image viewer, and remote control device to efficiently control UGV in the future combat fields. In our information fusion technology, improved methods of target detection, recognition, and location are proposed. In addition, time reduction method of target detection is also proposed. In the consequence of the operation test, we expect that our war field simulator based on information fusion technology plays an important role in the future military operation significantly.

Analysis of SMEs Internationalization theory through Systematic Literature Review (체계적 문헌고찰을 통한 중소기업 국제화 연구 이론분석)

  • Kim, Sang-Gil;Hyun, Byung-Hwan
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.4
    • /
    • pp.88-99
    • /
    • 2019
  • The objectives of this study is to Systematic literature review of internationalization of SMEs. Due to the economic characteristics of Korea, which depends on economic growth by exports, internationalization has become an essential management activity, not an option for SMEs. As a result, more than 400 studies related to the overseas expansion and internationalization of SMEs have been published in the past 20 years, focusing on major academic journals (such as KCI). Accordingly, the research trends used as advance research in internationalization research were analyzed of SMEs. Research targets were defined as the internationalization of SMEs and searched through 'RISS' (Research Information Sharing Service) as 'internationalization', 'global ', 'export', 'overseas expansion' and 'theory'. The analysis was carried out using a Systematic literature review. It was selected as the 76 studies and According to international research subjects and characteristics, the four areas of internationalization motive, process, outcomes, and support were analyzed. The results of the study confirmed that the most active research is focused on internationalization outcomes. This study could provide a support and the parties concerned in the ecosystem of SMEs in Korea with implications for the SMEs overseas market.

Analysis of Security System Priority for the Systematic Defense Technology Security (체계적인 방위산업기술보호를 위한 보호체계 우선순위 분석 연구)

  • Park, Heungsoon;Kim, Seyong;Kim, Yonghwan
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.3-12
    • /
    • 2019
  • The outflow of defense technology can cause serious damage not only in terms of business losses, but also in terms of national security and national interests. Recently, the government has enacted the Defense Technology Security Act, recognizing the importance of technology in the defense industry, and prepared guidelines for the defense technology security accordingly. According to the law, institutions and companies with defense technologies should establish a defense technology protection system, and the government should implement various technology protection policies to improve their level of technology protection. In this study, the implications were derived by comparing existing technology protection guidelines and priority analysis was performed on the protection system details through AHP for self-diagnosis items in the defense technology security guidelines. As a result, it is expected that it will enable efficient diagnosis of the level of protection and policy support for the systematic establishment of the protection system for the target institutions.

A Study on the Analysis of U.S.A Navy and R.O.K Military C4I System and Future Development (미해군과 한국군 C4I 체계 분석 및 발전 방향에 관한 연구)

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Jo, Yong-Gun;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.59-66
    • /
    • 2011
  • The representative concept of the future war is NCW. The main point of NCW is that it is connected by networ ks and gathers the battlefield status in real time, managing and controlling it. This is most needed in the navy. Operations of the navy are carried out in wide areas, individually or together. During this process, sharing information between each warship should be essential. Furthermore in the case of the American navy, they see the entire world as the operation area so it is a representative example of NCW. The C4I system of the Korean army is separated a ccording to the difference of each army's tactics and weapon system, being developed and managed differently. The refore there is a problem of interoperability lacking in each system. This paper analyzes the developed C4I system of the American navy to analyze the problems of C4I system of the Korean army, and propose the future direction of its development.

Research on direction of future Korean military force establishment -focus on North Korea's nuclear threat and neighboring countries' counter military threat operation- (미래 한국군 군사력 건설방향에 대한 연구 - 북한 핵위협과 주변국 위협대비를 중심으로 -)

  • Kim, Yeon Jun
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.11-21
    • /
    • 2014
  • South Korea should not be in subordinate position in international relationships like the past. As the status of middle power. South Korea achieves peaceful unification through overcoming North Korea's nuclear and conventional threats, and builds military power in Northeast Asia as a 'balancer'. This can firstly be achieved by constructing "attack systems triad". 'attack systems triad' can be established through integrating the C41SR as a common strategy for the purposes of preemptive deterrence and retaliatory deterrence against the dangers of the present and the future. Second, denial deterrence can be achieved by establishing "defense system triad" by combining common military power and defensive weapon system. Finally, development of independent advanced technological strategies can be achieved by building defense industry and combination of research and development through constructing "Infra triad". As for constructing and reinforcing the future of the ROK military, a unilateral principle and policy efforts to achieve the aforementioned force construction models are needed. This can only be achieved through the government's national vision to take on the role of mediator and a basis founded upon the consensus of the public.

A Study on Analysis Model for Weapon Acquisition Alternatives (국방 무기체계 획득방안 연구 방법론 제안)

  • Lee, Ji-Young
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.6
    • /
    • pp.91-96
    • /
    • 2019
  • Recently, it is expected for requirement for more scientific research of weapon systems acquisition alternatives with reliability and objectivity. For these needs, study on methodology of weapon systems acquisition alternatives is but on-going, but it is still in its early stages and is unprofessional. We compared general decision making methods, government development program decision making methods, methodologies of weapon systems acquisition alternatives research such as AHP, ANP, KAAM and proposed AHP as weapon acquisition analysis. This study guarantees objectivity and derives scientific research results reliability by analyzing and comparing comprehensive elements such as cost, effectiveness, deployment schedule, program management risk. Further study on AHP weight and other decision making methods is needed considering category of weapon systems and program characteristics.

Development of Evaluation Scheme for Usability of AR/VR Contents (AR/VR 콘텐츠의 사용성 평가 체계 개발)

  • Han, Sumin;Jeong, Hanil;Lee, Hoijun;Lee, Jaeyoung
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.3
    • /
    • pp.236-249
    • /
    • 2021
  • Due to the spread of AR/VR headset, AR/VR contents market gains huge interests. However, various obstacles such as discomfort that restricts usability and absence of standard to evaluate usability block the growth of AR/VR contents industry. To overcome these problems, this study tries to develop an evaluation scheme for the usability of R/VR contents and a prototype system. The proposed evaluation system divides usability related items into safety and convenience items and performs evaluation by item through automatic and experience evaluation by system and experts/experience teams according to characteristics, and comprehensively evaluates the usability of AR/VR content. In this study, a detailed process fo usability evaluation and the prototype system are developed to verify the evaluation scheme. Developed scheme is expected to help the AR/VR content industry overcome the usability issues, and develop high-quality AR/VR content.