• Title/Summary/Keyword: 컴퓨터공학교육

Search Result 699, Processing Time 0.028 seconds

Providing Payment Atomicity Using Verifiable Encryption (확인 가능한 암호기법을 사용한 지불의 원자성 보장 방법)

  • 최형섭;김상진;오희국
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.69-80
    • /
    • 2003
  • Verifiable encryption is an encryption technique with which one can verify what has been encrypted even if one can not decrypt the ciphertext. This technique can be used in fair exchange to convince the counterpart of his or her receiving an item by presenting an encrypted form in advance. In this paper, a method that can guarantee the payment atomicity is proposed by applying verifiable encryption to an electronic cash system based on the representation problem. With the new method, the process of dispute settlement is improved in the fact that the trusted third party do not have to interact with the bank to resolve disputes. This method is also flexible in a sense that clients and shops can request for dispute settlement regardless of any deadline constraint. However, additional proof is necessary to apply verifiable encryption during payment. We discuss the security and the atomicity of our method, and compare ours with others.

An Qualification Level Model for Efficient Management of Cyber Security Workforce (사이버보안 인력의 효율적 관리를 위한 자격등급 모델 설계)

  • Jung-Ho Eom;Hong-Jun Kim;Youn-Sung Choi
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.61-69
    • /
    • 2022
  • When a large-scale cyber attack or terrorism occurs and the country suffers enormous damage or poses a fatal threat to security, social interest in nurturing cybersecurity workforce increases. In addition, the government often suggests policies and guideline to train cybersecurity workforce. However, the system that can systematically manage trained cyber workforce after they are employed in related organizations or companies is still weak. Software workforce has a standardized qualification level model, so appropriate jobs are set and managed for each level. Cyber workforce also need a specialized qualification level model that takes into account their career, academic background, and education&training performance. By assigning a qualification level, the duties that can be performed for each level should be set, and the position and duty of the department should also be assigned in consideration of the level. Therefore, in this paper, we propose a qualification level model for cyber security workforce.

A Construction of Korean Tea-Historical Literature DB and Implementation of Web Service (한국 차-연대기 문헌 DB 구축 및 웹서비스 구현)

  • Min Gyu Lee;Jung Hyun Yang;Se Hoon Jung;Chun Bo Sim
    • Smart Media Journal
    • /
    • v.12 no.9
    • /
    • pp.103-115
    • /
    • 2023
  • A Korean Tea-Historical Literature DB was constructed, collating information related to tea from eight historical texts, including the Annals of the Joseon Dynasty. Data were gathered from existing historical literature DB and web services. After processing, verification, and tag input, 53,679 historical literature data entries related to tea were created. This DB construction centralizes previously dispersed reading services into a single web service. Features such as literature title, time, and tag-based search functionality; assignment of attribute tags to data; search linkage through original source links; and a bookmark function were incorporated to enhance user convenience. The outcomes of this research support studies in the related fields, and it is believed that by accumulating and improving accessibility to tea-related literature, contributions can be made to the preservation and education of Korean traditional tea as a food resource and cultural heritage.

A Study on the Direction of Cyber Forces Development in the Korean military through Changes in Germany's Cyber Warfare Response Policy (독일의 사이버전 대응 정책변화를 통해 본 한국군 사이버전력 발전 방안에 관한 연구)

  • Sangjun Park;Taesan Kim;Jee-won Kim;Chan-gi Jung
    • Convergence Security Journal
    • /
    • v.21 no.4
    • /
    • pp.59-68
    • /
    • 2021
  • The Future Battlefield includes the main areas of modern warfare, including the ground, sea, and air, as well as cyberspace and space. Cyberspace consists of computers, wired and wireless networks, and spans the ground, sea, air, and space domains. Cyber warfare takes place in cyberspace, so it is not easy for people without expertise in cyber to recognize the cyber situation. Therefore, training personnel with professional knowledge and skills in cyber is paramount in preparation for cyber warfare. In particular, the results of cyber warfare will vary greatly depending on the ability of cyber combatants to carry it out, the performance of cyber systems, and the proficiency of cyber warfare procedures. The South Korean military has power to respond to cyber warfare at various levels, centering on the Cyber Operations Command, but there is a limit to defending all the rapidly expanding cyberspace. In this paper, to overcome these limitations, we looked at the changes in Germany's cyber warfare response policy. Based on them, the organization structure, weapon system, and education and training system of future Korean military cyber forces are presented separately.

Minimum-Cost Path Finding Algorithm in Real-Time For Computer Generated Force (실시간성을 고려한 가상군 최소비용 길 찾기 알고리즘)

  • Han, Chang-Hee;Min, Young-Hye;Park, Sang-Hyuk;Kim, Jai-Hoon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.1
    • /
    • pp.17-25
    • /
    • 2011
  • At the computer games, we can experience a variety of environments using a virtual object. It is similar to that be trained in War-game simulator of the defense. Actual soldiers and a computer-generated virtual group(Computer Generated Force: CGF) in 3-D virtual battlefield environment are training. However, path finding algorithm, one of the techniques of simulation models, to the current level only considers the shortest time path. So, this current level at the special situation of the army in the battlefield for selecting the optimal path is limited. The focus of this paper is to select the least-cost path using the deadline with several different mission conditions(METT+TC). For the only shortest time path algorithm and the least-cost path algorithm using dealine,($d_t$, one of METT+TC elements), Its usefulness is verifying the change of the move spent time(t) for all possible paths and the fighting power of the combat troops(Troops ability, a) through a comparison of the total cost of moves(c(t)). According to the results, when considering the deadline, the proposed algorithm saves about 62.5% of the maximum cost.

CoAID+ : COVID-19 News Cascade Dataset for Social Context Based Fake News Detection (CoAID+ : 소셜 컨텍스트 기반 가짜뉴스 탐지를 위한 COVID-19 뉴스 파급 데이터)

  • Han, Soeun;Kang, Yoonsuk;Ko, Yunyong;Ahn, Jeewon;Kim, Yushim;Oh, Seongsoo;Park, Heejin;Kim, Sang-Wook
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.4
    • /
    • pp.149-156
    • /
    • 2022
  • In the current COVID-19 pandemic, fake news and misinformation related to COVID-19 have been causing serious confusion in our society. To accurately detect such fake news, social context-based methods have been widely studied in the literature. They detect fake news based on the social context that indicates how a news article is propagated over social media (e.g., Twitter). Most existing COVID-19 related datasets gathered for fake news detection, however, contain only the news content information, but not its social context information. In this case, the social context-based detection methods cannot be applied, which could be a big obstacle in the fake news detection research. To address this issue, in this work, we collect from Twitter the social context information based on CoAID, which is a COVID-19 news content dataset built for fake news detection, thereby building CoAID+ that includes both the news content information and its social context information. The CoAID+ dataset can be utilized in a variety of methods for social context-based fake news detection, thus would help revitalize the fake news detection research area. Finally, through a comprehensive analysis of the CoAID+ dataset in various perspectives, we present some interesting features capable of differentiating real and fake news.

A Study on Creativity Convergence Competency for Developing Creativity Human Resources (창의융합인재 양성을 위한 일부 대학생의 창의융합역량 수준 분석)

  • Choi, Yong Keum;Oh, Tae-Jin;Lee, Hyun;Lim, Kunok;Hong, Ji-Heon;Jeong, Su Ra
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.1
    • /
    • pp.656-664
    • /
    • 2020
  • This study obtained basic data for developing human resources with creativity convergence competency by surveying and analyzing the level of creativity convergence competency of university students. The study was conducted from October 1, 2019 to November 10, 2019 on university students attending the departments of computer science, pharmaceutical engineering, physical therapy and dental hygiene. The data from 296 students was finally used for this study, and IBM SPSS/Win statics 23.0 programs were used to analyze the data. Students who graduated from Seoul/Gyeonggi High School or those students with high undergraduate satisfaction were found to have high creativity convergence ability, and these results were statistically significant. Further, the group of students who had experience with Campus/Suburban competition, Global Competency training/ International exchange programs or the Capstone Design/Team Based Project showed high creativity convergence competency, and these results were statistically significant. Thus, this study identified the necessity of developing and operating various extra-curricular programs at education institutes in order to enhance students' creativity convergence capability.

Analysis of Customer Evaluations on the Ethical Response to Service Failures of Foodtech Serving Robots (푸드테크 서빙로봇의 서비스 실패에 대한 직업윤리적 대응에 대한 고객 평가 분석)

  • Han, Jeonghye;Choi, Younglim;Jeong, Sanghyun;Kim, Jong-Wook
    • Journal of Service Research and Studies
    • /
    • v.14 no.1
    • /
    • pp.1-12
    • /
    • 2024
  • As the service robot market grows among the food technology industry, the quality of robot service that affects consumer behavioral intentions in the restaurant industry has become important. Serving robots, which are common in restaurants, reduce employee work through order and delivery, but because they do not respond to service failures, they increase customer dissatisfaction as well as increase employee work. In order to improve the quality of service beyond the simple function of receiving and serving orders, functions of recovery effort, fairness, empathy, responsiveness, and certainty of the process after service failure, such as serving employees, are also required. Accordingly, we assumed the type of failure of restaurant serving service as two internal and external factors, and developed a serving robot with a vocational ethics module to respond with a professional ethical attitude when the restaurant serving service fails. At this time, the expression and action of the serving robot were developed by adding a failure mode reflecting failure recovery efforts and empathy to the normal service mode. And by recruiting college students, we tested whether the service robot's response to two types of service failures had a significant effect on evaluating the robot. Participants responded that they were more uncomfortable with service failures caused by other customers' mistakes than robot mistakes, and that the serving robot's professional ethical empathy and response were appropriate. In addition, unlike the robot's favorability, the evaluation of the safety of the robot had a significant difference depending on whether or not a professional ethical empathy module was installed. A professional ethical empathy response module for natural service failure recovery using generative artificial intelligence should be developed and mounted, and the domestic serving robot industry and market are expected to grow more rapidly if the Korean serving robot certification system is introduced.

A Study DH the Identification Of Critical Intelligent Information Technologies and Application Areas in the Defence Side (국방부문 핵심지능정보기술 식별 및 활용방안 연구)

  • 김화수;이승구
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2000.11a
    • /
    • pp.407-416
    • /
    • 2000
  • 국방 부문에 종사하는 관리자들은 국방정보시스템 사업관리에 있어서 최신정보기술에 대한 기본적인 사항은 알고있어야 효율적이고 효과적이며 성공적인 사업관리를 진행할 수 있을 것이다. 국방 부문에 종사하는 관리자들이 저비용 고효율의 국방정보시스템을 건설하고 운영 유지관리 하기 위하여 알아야 할 핵심 및 최신정보기술은 크게 인공지능기술, 멀티미디어 정보화 기술, 가상현실 기술, 시뮬레이션 기술, 텔레프레즌스 기술, 나노테크놀로지 기술, 데이터베이스 기술, 병렬처리 기술, 로봇공학 기술, 소프트웨어 공학에 관련된 기술 등이 있다. 그러나 국방부문에 종사하는 정보통신 전문 인력을 제외한 관리자들이 국방관련 사업관리를 수행하면서 정보기술에 대한 이해 수준이 비교적 낮기 때문에 효율적으로 국방사업을 준비, 계획, 추진하기 어려운 실정이다. 따라서 국방부문에 종사하는 관리자들이 정보기술을 알기 쉽게 이해할 수 있도록 국방부문 핵심지능형정보기술 발전 및 군 활용방안을 이해하기 쉽도록 작성하며 효율적인 사업관리가 이루어질 수 있는 방안을 연구하였다. 본 논문은 국방부문핵심 지능정보기술 식별 및 활용방안을 연구하여 핵심적으로 식별된 사항들을 우리 국방부문의 $C^4$I(지휘, 통제, 통신, 컴퓨터시스템)시스템, 내장형 무기시스템, 각종 교육훈련 정보시스템, 자원관리 정보시스템 등에 어떻게 적용할 것이며 적용시 기대효과는 무엇인가를 제시토록 하여 국방부문에 종사하는 관리자들이 각종 국방사업을 조정, 통제, 확인, 감독, 준비/계획하면서 참고하여 저비용 고효율의 국방관련 각층 사업을 관리할 수 있는 능력을 배양시키도록 연구를 수행하였다. 국방관련 각종 사업을 관리할 수 있는 능력을 배양시키도록 연구를 수행하였다. 국방부문 핵심지능정보기술 발전 및 활용 방안에 포함될 주요 내용을 요약하여 제시하였다.의 경향성을 나타내는 오차 주기(error cyc1e)를 이용함으로써 고객들의 수요의 경향성을 좀 더 세밀한 부분까지 파악할 수 있게 해 준다.ction, secondary electron microscopy, atomic force microscoy, $\alpha$-step, Raman scattering spectroscopu, Fourier transform infrared spectroscopy 및 micro hardness tester를 이용하여 기판 bias 전압이 DLC 박막의 특성에 미치는 영향을 조사하였다. 분석결과 본 연구에서 제작된 DLC 박막은 탄소와 수소만으로 구성되어 있으며, 비정질 상태임을 알 수 있었다. 기판 bias 전압의 증가에 따라 박막의 두께가 감소됨을 알 수 있었고, -150V에서는 박막이 거의 만들어지지 않았으며, -200V에서는 기판 표면이 식각되었다. 이것은 기판 bias 전압과 ECR 플라즈마에 의한 이온충돌 효과 때문으로 판단되며, 150V 이하에서는 증착되는 양보다 re-sputtering 되는 양이 더 많을 것으로 생각된다. 기판 bias 전압을 증가시킬수록 플라즈마에 의한 이온충돌 현상이 두드러져 탄소와 결합하고 있던 수소원자들이 떨어져 나가는 탈수소화 (dehydrogenation) 현상을 확인할 수 있었으며, 이것은 C-H 결합에너지가 C-C 결합이나 C=C 결합보다 약하여 수소 원자가 비교적 해리가 잘되므로 이러한 현상이 일어난다고 판단된다. 결합이 끊어진 탄소 원자들은 다른 탄소원자들과 결합하여 3차원적 cross-link를 형성시켜 나가면서 내부 압축응력을 증가시키는 것으로 알려져 있으며, hardness 시험 결과로 이것을 확인할 수 있었다. 그리고 표면거칠기는 기판 bias 전압을 증가시킬수록 더 smooth 해짐을 확인

  • PDF

Trends in the Use of Artificial Intelligence in Medical Image Analysis (의료영상 분석에서 인공지능 이용 동향)

  • Lee, Gil-Jae;Lee, Tae-Soo
    • Journal of the Korean Society of Radiology
    • /
    • v.16 no.4
    • /
    • pp.453-462
    • /
    • 2022
  • In this paper, the artificial intelligence (AI) technology used in the medical image analysis field was analyzed through a literature review. Literature searches were conducted on PubMed, ResearchGate, Google and Cochrane Review using the key word. Through literature search, 114 abstracts were searched, and 98 abstracts were reviewed, excluding 16 duplicates. In the reviewed literature, AI is applied in classification, localization, disease detection, disease segmentation, and fit degree of registration images. In machine learning (ML), prior feature extraction and inputting the extracted feature values into the neural network have disappeared. Instead, it appears that the neural network is changing to a deep learning (DL) method with multiple hidden layers. The reason is thought to be that feature extraction is processed in the DL process due to the increase in the amount of memory of the computer, the improvement of the calculation speed, and the construction of big data. In order to apply the analysis of medical images using AI to medical care, the role of physicians is important. Physicians must be able to interpret and analyze the predictions of AI algorithms. Additional medical education and professional development for existing physicians is needed to understand AI. Also, it seems that a revised curriculum for learners in medical school is needed.