• Title/Summary/Keyword: 통신기술발전

Search Result 4,662, Processing Time 0.029 seconds

A Study on the Interoperability of ROK Air Force Virtual and Constructive Simulation (공군 전투기 시뮬레이터와 워게임 모델의 V-C 연동에 대한 연구)

  • Kim, Yong Hwan;Song, Yong Seung;Kim, Chang Ouk
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.169-177
    • /
    • 2019
  • LVC(Live-Virtual-Constructive) training system is drawing attention due to changes in battlefield situation and the development of advanced information and communication technologies. The ROKAF(Republic of Korea Air Force) plans to construct LVC training system capable of scientific training. This paper analyzes the results of V-C interoperability test with three fighter simulators as virtual systems and a theater-level wargame model as a constructive system. The F-15K, KF-16, and FA-50 fighter simulators, which have different interoperable methods, were converted into a standard for simulation interoperability. Using the integrated field environment simulator, the fighter simulators established a mutually interoperable environment. In addition, the Changgong model, which is the representative training model of the Air Force, was converted to the standard for simulation interoperability, and the integrated model was implemented with optimized interoperability performance. Throughput experiments, It was confirmed that the fighter simulators and the war game model of the ROKAF could be interoperable with each other. The results of this study are expected to be a good reference for the future study of the ROKAF LVC training system.

Intrusion Situation Classification Model for Intelligent Intrusion Awareness (지능적인 침입 인지를 위한 침입 상황 분류 모델)

  • Hwang, Yoon-Cheol;Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.134-139
    • /
    • 2019
  • As the development of modern society progresses rapidly, the technologies of society as a whole are progressing and becoming more advanced. Especially in the field of security, more sophisticated and intelligent attacks are being created. Meanwhile, damaging situations are becoming several times larger than before Therefore, it is necessary to re-classify and enhance the existing classification system. It is required to minimize the intrusion damage by actively responding to intelligent intrusions by applying this classification scheme to currently operating intrusion detection systems. In this paper, we analyze the intrusion type caused by intelligent attack We propose a new classification scheme for intrusion situations to guarantee the service safety, reliability, and availability of the target system, We use this classification model to lay the foundations for the design and implementation of a smart intrusion cognitive system capable of early detection of intrusion, the damages caused by intrusion, and more collections active response.

Integrative Analysis on Digital Piracy: Focused on Attitude, Personal Norm, and Habit (디지털 콘텐츠 불법복제 행동에 대한 통합적 분석: 태도, 개인규범, 습관을 중심으로)

  • Choi, Byounggu
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.85-109
    • /
    • 2018
  • The rapid development of information and communication technology has made it for people to pirate digital contents easily and quickly. Although many studies have investigated the underlying factors that lead to an individual engaging in digital piracy, few studies have provided holistic and integrative view on this issue. Therefore, this study attempts to build integrative research model based on theory of planned behavior (TPB), norm activation model (NAM), and habit. For this purpose, this study develops nine hypotheses that explain the relationship between attitude, personal norm, habit, and behavioral intention, and tests them with survey data collected from 337 participants. The results of this study show that attitude, perceived behavioral control, personal norm, and habit have impact on behavioral intention of digital piracy while subjective norm does not affect behavioral intention. This study contributes to expand existing studies by identifying the relationship between attitude, personal norm, habit and behavioral intention.

Smart Space based on Platform using Big Data for Efficient Decision-making (효율적 의사결정을 위한 빅데이터 활용 스마트 스페이스 플랫폼 연구)

  • Lee, Jin-Kyung
    • Informatization Policy
    • /
    • v.25 no.4
    • /
    • pp.108-120
    • /
    • 2018
  • With the rise of the Fourth Industrial Revolution and I-Korea 4.0, both of which pursue strategies for industrial innovation and for the solution to social problems, the real estate industry needs to change in order to make effective use of available space in smart environments. The implementation of smart spaces is a promising solution for this. The smart space is defined as a good use of space, whether it be a home, office, or retail store, within a smart environment. To enhance the use of smart spaces, efficient decision-making and well-timed and accurate interaction are required. This paper proposes a smart space based on platform which takes advantage of emerging technologies for the efficient storage, processing, analysis, and utilization of big data. The platform is composed of six layers - collection, transfer, storage, service, application, and management - and offers three service frameworks: activity-based, market-based, and policy-based. Based on these smart space services, decision-makers, consumers, clients, and social network participants can make better decisions, respond more quickly, exhibit greater innovation, and develop stronger competitive advantages.

Analysis of U.S. Supply Chain Security Management System (미국 공급망 보안 관리 체계 분석)

  • Son, Hyo-hyun;Kim, Kwang-jun;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1089-1097
    • /
    • 2019
  • An era of smart manufacturing is coming through the rapid development of information and communication technology. As a result, many companies have begun to utilize a variety of hardware and software for the efficient business of the manufacturing process. At this time, the hardware and software used are supplied through manufacturing and distribution processes. These supply processes are exposed to a variety of security threats. As the recent cases of supply chain attacks have increased, foreign countries are establishing supply chain management systems and managing supply chain risks. In Korea, on the other hand, there was research on supply chain risk management in some fields. In this paper, we emphasizes the necessity of supply chain risk management through supply chain attack cases. In addition, we analyze trends of foreign supply chain management system and explains the necessity of domestic supply chain security strategy.

An AAA Mechanism using ID-based Ticket offer Anonymity (익명성을 지원하는 ID기반 티켓을 이용한 AAA 메커니즘)

  • Moon, Jong-Sik;Paek, Chang-Hyun;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.87-98
    • /
    • 2007
  • AAA protocol is an information protection technology which systematically provides authentication, authorization and accounting function not only in the existing wire network but also in the rapidly developing wireless network, various services and protocol. Nowadays, standardization of the various application services is in progress with the purpose of AAA standardization fer the mobile user in the wireless network. And various researches are being conducted fur using AAA in the roaming service and mobile IPv6 network between heterogeneous networks. In this paper uses OTP and ID-based ticket for user authentication in the mobile device under the ubiquitous environment, and service is seamlessly provided even though the mobile device moves from the home network to the foreign network. In addition, with the ticket renewed from the foreign network, the overhead of the home authentication server can be reduced, and provides anonymity of service through the anonymity ID.

Benchmarking Korean Block Ciphers on 32-Bit RISC-V Processor (32-bit RISC-V 프로세서에서 국산 블록 암호 성능 밴치마킹)

  • Kwak, YuJin;Kim, YoungBeom;Seo, Seog Chung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.331-340
    • /
    • 2021
  • As the communication industry develops, the development of SoC (System on Chip) is increasing. Accordingly, the paradigm of technology design of industries and companies is changing. In the existing process, companies purchased micro-architecture, but now they purchase ISA (Instruction Set Architecture), and companies design the architecture themselves. RISC-V is an open instruction set based on a reduced instruction set computer. RISC-V is equipped with ISA, which can be expanded through modularization, and an expanded version of ISA is currently being developed through the support of global companies. In this paper, we present benchmarking frameworks ARIA, LEA, and PIPO of Korean block ciphers in RISC-V. We propose implementation methods and discuss performance by utilizing the basic instruction set and features of RISC-V.

Development of Insole for AI-Based Diagnosis of Diabetic Foot Ulcers in IoT Environment (IoT 환경에서 AI 기반의 당뇨발 진단을 위한 깔창 개발)

  • Choi, Won Hoo;Chung, Tai Myoung;Park, Ji Ung;Lee, Seo Hu
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.3
    • /
    • pp.83-90
    • /
    • 2022
  • Diabetes is a common disease today, and there are also many cases of developing into serious complications called Diabetic Foot Ulcers(DFU). Diagnosis and prevention of DFU in advance is an important task, and this paper proposes the method. Based on existing studies introduced in the paper, it can be seen that foot pressure and temperature information are deeply correlated with DFU. Introduce the process and architecture of SmarTinsole, an IoT device that measures these indicators. Also, the paper describes the preprocessing process for AI-based diagnosis of DFU. Through the comparison of the measured pressure graph and the actual human step distribution, it presents the results that multiple information collected in real-time from SmarTinsole are more efficient and reliable than the previous study.

Smart Healthcare in the Era of the Covid-19 Pandemic: Strategies and Tasks for Mental Health Social Work (코로나시대 스마트헬스케어의 적용가능성과 과제: 정신건강 사회복지 분야를 중심으로)

  • Lee, Jieha;Lee, Hyunjin;Hong, Seunghye;Park, Young
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.679-688
    • /
    • 2022
  • This paper focuses on the usability of smart healthcare based on the development of Information and Communication Technology(ICT), briefly introduces concepts and the current status related to smart healthcare, and discusses strategies and future tasks in the field of mental health welfare in the COVID-19 era. This paper first introduces the smart healthcare programs of the National Mental Health Center and the Seoul Mental Health Welfare Center. Second, we introduce various smart healthcare programs used in Germany, China, the U.S., and Australia, review the actual examples, and examine both public and private responsiveness. Finally, we examine the possibility of using smart healthcare in the mental health social work system in South Korea and examine future tasks and implications. This paper would contribute to the growth of world-class mental health social work services.

Weighted Filter Algorithm based on Distribution Pattern of Pixel Value for AWGN Removal (AWGN 제거를 위한 화소값 분포패턴에 기반한 가중치 필터 알고리즘)

  • Cheon, Bong-Won;Kim, Nam-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.1
    • /
    • pp.44-49
    • /
    • 2022
  • Abstract Recently, with the development of IoT technology and communication media, various video equipment is being used in industrial fields. Image data acquired from cameras and sensors are easily affected by noise during transmission and reception, and noise removal is essential as it greatly affects system reliability. In this paper, we propose a weight filter algorithm based on the pixel value distribution pattern to preserve details in the process of restoring images damaged in AWGN. The proposed algorithm calculates weights according to the pixel value distribution pattern of the image and restores the image by applying a filtering mask. In order to analyze the noise removal performance of the proposed algorithm, it was simulated using enlarged image and PSNR compared to the existing method. The proposed algorithm preserves important characteristics of the image and shows the performance of efficiently removing noise compared to the existing method.