• Title/Summary/Keyword: 통신기술발전

Search Result 4,662, Processing Time 0.029 seconds

Research on BGP dataset analysis and CyCOP visualization methods (BGP 데이터셋 분석 및 CyCOP 가시화 방안 연구)

  • Jae-yeong Jeong;Kook-jin Kim;Han-sol Park;Ji-soo Jang;Dong-il Shin;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.177-188
    • /
    • 2024
  • As technology evolves, Internet usage continues to grow, resulting in a geometric increase in network traffic and communication volumes. The network path selection process, which is one of the core elements of the Internet, is becoming more complex and advanced as a result, and it is important to effectively manage and analyze it, and there is a need for a representation and visualization method that can be intuitively understood. To this end, this study designs a framework that analyzes network data using BGP, a network path selection method, and applies it to the cyber common operating picture for situational awareness. After that, we analyze the visualization elements required to visualize the information and conduct an experiment to implement a simple visualization. Based on the data collected and preprocessed in the experiment, the visualization screens implemented help commanders or security personnel to effectively understand the network situation and take command and control.

3D GIS Network Modeling of Indoor Building Space Using CAD Plans (CAD 도면을 이용한 건축물 내부 공간의 3차원 GIS 네트워크 모델링)

  • Kang Jung A;Yom Jee-Hong;Lee Dong-Cheon
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.23 no.4
    • /
    • pp.375-384
    • /
    • 2005
  • Three dimensional urban models are being increasingly applied for various purposes such as city planning, telecommunication cell planning, traffic analysis, environmental monitoring and disaster management. In recent years, technologies from CAD and GIS are being merged to find optimal solutions in three dimensional modeling of urban buildings. These solutions include modeling of the interior building space as well as its exterior shape visualization. Research and development effort in this area has been performed by scientists and engineers from Computer Graphics, CAD and GIS. Computer Graphics and CAD focussed on precise and efficient visualization, where as GIS emphasized on topology and spatial analysis. Complementary research effort is required for an effective model to serve both visualization and spatial analysis purposes. This study presents an efficient way of using the CAD plans included in the building register documents to reconstruct the internal space of buildings. Topological information was built in the geospatial database and merged with the geometric information of CAD plans. as well as other attributal data from the building register. The GIS network modeling method introduced in this study is expected to enable an effective 3 dimensional spatial analysis of building interior which is developing with increasing complexity and size.

A study of Vertical Handover between LTE and Wireless LAN Systems using Adaptive Fuzzy Logic Control and Policy based Multiple Criteria Decision Making Method (LTE/WLAN 이종망 환경에서 퍼지제어와 정책적 다기준 의사결정법을 이용한 적응적 VHO 방안 연구)

  • Lee, In-Hwan;Kim, Tae-Sub;Cho, Sung-Ho
    • The KIPS Transactions:PartC
    • /
    • v.17C no.3
    • /
    • pp.271-280
    • /
    • 2010
  • For the next generation mobile communication system, diverse wireless network techniques such as beyond 3G LTE, WiMAX/WiBro, and next generation WLAN etc. are proceeding to the form integrated into the All-IP core network. According to this development, Beyond 3G integrated into heterogeneous wireless access technologies must support the vertical handover and network to be used of several radio networks. However, unified management of each network is demanded since it is individually serviced. Therefore, in order to solve this problem this study is introducing the theory of Common Radio Resource Management (CRRM) based on Generic Link Layer (GLL). This study designs the structure and functions to support the vertical handover and propose the vertical handover algorithm of which policy-based and MCDM are composed between LTE and WLAN systems using GLL. Finally, simulation results are presented to show the improved performance over the data throughput, handover success rate, the system service cost and handover attempt number.

Personal Information Protection in Digital Era -Reviewing Personal information protection Act- (디지털시대의 개인정보보호 - 새로운 개인정보보호법을 중심으로)

  • Yoo, Jong-Lak
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.81-90
    • /
    • 2011
  • Companies using internet as a kind of marketing means are increasing rapidly according to the expansion trend of e-commerce through internet and consumers also use internet as the common means of purchasing necessary articles. E-commerce using internet has advantages without limitation to temporal and spatial accessibility and general consumers and unspecified individuals also use internet to purchase their goods as well as general transactions such as advertisement, contract, payment and claim settlement. 'In the age of information, invasion of personal information resulted from the development of information and communication technology is one of the greatest problems all the countries in the world face. Therefore, Personal information protection Act is one of basic laws to protect personal information and rights and it is also an essential law in the age of information. In that sense, new Personal information protection Act is the advanced act containing various items to minimize the national damages from the leaking of private information and protect right to informational self-determination in the information society. It is expected that this legislation contributes to reduce the leaking of private information, enhance the level of privacy protection and develop privacy related industries. However, active participation of all members of our society and improvement of their recognition should be preceded for the rational and legal use of private information and the settlement of its protection culture. While the purpose of Personal information protection Act can protect privacy from collection, leaking, misuse and abuse of private information and enhance national interests and protect personal dignity and value, it also must perform the roles of balancing privacy protection with liberal information flow.

Recent Home Networking Services Development and Future Directions: Case analysis of Korean Smart Apartment Complexes (홈네트워킹 서비스 현황 및 발전 방향: 국내 사이버 타운 사례분석)

  • Sawng, Yeong-Wha;Han, Hyun-Soo
    • Information Systems Review
    • /
    • v.6 no.2
    • /
    • pp.269-284
    • /
    • 2004
  • Induced from government policy to boost regional economic competitiveness, regional informatization forming e-community has been the subject included in the various regional informatization master plans in Korea. However, few cases are reported for its successful implementation mainly due to the lack of profitable business model to encourage investment. On the other hand, most efforts to build smart apartments, part of the home networking in a broad sense, has been pursued from the different directions. Telecommunication giant such as Korea Telecom tries to find new source of revenue exploiting enhanced broad band technology. Also, construction companies started constructing housing complexes equipped with built-in high speed network infrastructure as a means to differentiation to other competitors. The contents providing community portal has become mandatory in the sense of bearing the cost from customer side who are willing to adopt those services for new smart house. Our research motivation stems from exploring critical value aspects of realizing the profitability of this emerging new business model, that is, industry convergence model. In this paper, mainly from the survey results of the Korean smart apartment complexes, we reported recent home networking services development in Korea, and value propositions from the business model perspective. Merged business model components of telecommunications, construction, and internet contents are analyzed to provide the insights for future directions.

Study on Telemedicine system in Medical Law (의료법상의 원격의료 제도에 관한 고찰)

  • Joung, Soon-Hyoung;Park, Jong-Ryeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.241-249
    • /
    • 2012
  • The rapid development of the current information and communication brings big changes and progress in the health service delivery system. And it is becoming the worldwide trend increasingly. As the name of medical information, by more rapid, detail and more quickly to the patients and diagnosis of the disease it provides not only a high level of health care services but also hospitals and related institutions are making increase the efficiency of the work. Among them, the Telemedicine, that system has many advantage which can expect the shorten the waiting time and the uniform high level of medical, etc. without visiting medical institutions. Especially, the most advantage is it can increase the accessibility of information about extensive medical, without regard to the time and place. But this is the reality, which compared speed the development of modern science and technology with lack of operational regulations and mindset. Current in our Medical Law, it regulates the Telemedicine, but it has Institutional, facility, and environmental constraints. Because, there is no detailed legal relationship. And it takes that in terms of a special form called by a non-face-to-face contact with medical practice rather than the scene. Therefore, in this paper will find a way out to activate the Telemedicine by presupposes the development potential is infinite and find the legal issues and improvements.

Automatic Bee-Counting System with Dual Infrared Sensor based on ICT (ICT 기반 이중 적외선 센서를 이용한 꿀벌 출입 자동 모니터링 시스템)

  • Son, Jae Deok;Lim, Sooho;Kim, Dong-In;Han, Giyoun;Ilyasov, Rustem;Yunusbaev, Ural;Kwon, Hyung Wook
    • Journal of Apiculture
    • /
    • v.34 no.1
    • /
    • pp.47-55
    • /
    • 2019
  • Honey bees are a vital part of the food chain as the most important pollinators for a broad palette of crops and wild plants. The climate change and colony collapse disorder (CCD) phenomenon make it challenging to develop ICT solutions to predict changes in beehive and alert about potential threats. In this paper, we report the test results of the bee-counting system which stands out against the previous analogues due to its comprehensive components including an improved dual infrared sensor to detect honey bees entering and leaving the hive, environmental sensors that measure ambient and interior, a wireless network with the bluetooth low energy (BLE) to transmit the sensing data in real time to the gateway, and a cloud which accumulate and analyze data. To assess the system accuracy, 3 persons manually counted the outgoing and incoming honey bees using the video record of 360-minute length. The difference between automatic and manual measurements for outgoing and incoming scores were 3.98% and 4.43% respectively. These differences are relatively lower than previous analogues, which inspires a vision that the tested system is a good candidate to use in precise apicultural industry, scientific research and education.

Cyber attack group classification based on MITRE ATT&CK model (MITRE ATT&CK 모델을 이용한 사이버 공격 그룹 분류)

  • Choi, Chang-hee;Shin, Chan-ho;Shin, Sung-uk
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.1-13
    • /
    • 2022
  • As the information and communication environment develops, the environment of military facilities is also development remarkably. In proportion to this, cyber threats are also increasing, and in particular, APT attacks, which are difficult to prevent with existing signature-based cyber defense systems, are frequently targeting military and national infrastructure. It is important to identify attack groups for appropriate response, but it is very difficult to identify them due to the nature of cyber attacks conducted in secret using methods such as anti-forensics. In the past, after an attack was detected, a security expert had to perform high-level analysis for a long time based on the large amount of evidence collected to get a clue about the attack group. To solve this problem, in this paper, we proposed an automation technique that can classify an attack group within a short time after detection. In case of APT attacks, compared to general cyber attacks, the number of attacks is small, there is not much known data, and it is designed to bypass signature-based cyber defense techniques. As an attack model, we used MITRE ATT&CK® which modeled many parts of cyber attacks. We design an impact score considering the versatility of the attack techniques and proposed a group similarity score based on this. Experimental results show that the proposed method classified the attack group with a 72.62% probability based on Top-5 accuracy.

A Framework to Develop Safe and Reliable SaaS Certification Systems (안전하고 신뢰할 수 있는 SaaS(Software as a Service) 인증제도 개발을 위한 프레임워크)

  • Seo, Kwang-Kyu
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.523-528
    • /
    • 2012
  • The recent appearance and evolution of cloud service including IaaS(Infrastructure as a Service), PaaS(Platform as a Service) and SaaS(Software as a Service) is potentially one of the major advances in information and communication technology. While a lot of studies are currently taking place in the technology itself, there is an equally urgent need for understanding and researching the business-related issues surrounding cloud service. As more and more individuals and companies use the cloud service, their concerns are beginning to grow about just how safe and reliable an environment it is. This paper focus on SaaS as an one of the important cloud service. For successful implementation of SaaS service, it is necessary to establish the certification systems to ensure safety and reliability of SaaS. This paper provides the safe and reliable framework for systematic SaaS certification systems. In order to develop it, the critical issues related to service quality and certification of SaaS service are identified and the systematic framework for certification systems of SaaS service and service provider domains are developed. An evaluation methodology for the developed certification systems is also proposed.

A Study on the Problems and Policy Implementation for Open-Source Software Industry in Korea: Soft System Methodology Approach (소프트시스템 모델 방법론을 통해 진단한 국내 공개 SW 산업의 문제점과 정책전략 연구)

  • Kang, Songhee;Shim, Dongnyok;Pack, Pill Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.193-208
    • /
    • 2015
  • In knowledge based society, information technology (IT) has been playing a key role in economic growth. In recent years, it is surprisingly notable that the source of value creation moved from hardware to software in IT industry. Especially, among many kinds of software products, the economic potential of open source was realized by many government agencies. Open source means software codes made by voluntary and open participation of worldwide IT developers, and many policies to promote open source activities were implemented for the purpose of fast growth in IT industry. But in many cases, especially in Korea, the policies promoting open source industry and its ecosystem were not considered successful. Therefore, this study provides the practical reasons for the low performance of Korean open source industry and suggests the pragmatic requisites for effective open source policy. For this purpose, this study applies soft system model (SSM) which is frequently used in academy and industry as a methodology for problem-solving and we link the problems with corresponding policy solutions based on SSM. Given concerns which Korean open source faces now, this study suggests needs for the three different kinds of government policies promoting multiple dimensions of industry: research and development (R&D)-side, supply-side, and computing environment-side. The implications suggested by this research will contribute to implement the practical policy solutions to boost open source industry in Korea.