• Title/Summary/Keyword: 통신산업

Search Result 13,946, Processing Time 0.038 seconds

A Study on Backup PNT Service for Korean Maritime Using NDGNSS (NDGNSS 인프라를 활용한 국내 해상 백업 PNT 서비스 연구)

  • Han, Young-Hoon;Lee, Sang-Heon;Park, Sul-Gee;Fang, Tae-Hyun;Park, Sang-Hyun
    • Journal of Navigation and Port Research
    • /
    • v.43 no.1
    • /
    • pp.42-48
    • /
    • 2019
  • The significance of PNT information in the fourth industrial revolution is viewed differently in relation to the past. Autonomous vehicles, autonomous vessels, smart grids, and national infrastructure require sustainable and reliable services in addition to their high precision service. Satellite navigation system, which is the most representative system for providing PNT information, receive signals from satellites outside the earth so signal reception power is low and signal structures for civilian use are open to the public. Therefore, it is vulnerable to intentional and unintentional interference or hacking. Satellite navigation systems, which can easily acquire high performance of PNT information at low cost, require alternatives due to its vulnerability to the hacking. This paper proposed R-Mode (Ranging Mode) technology that utilizes currently operated navigation and communication infrastructure in terms of Signals of OPportunity (SoOP). For this, the Nationwide Differential Global Navigation Satellite System (NDGNSS), which currently gives a service of Medium Frequency (MF) navigation signal broadcasting, was used to validate the feasibility of a backup infrastructure in domestic maritime areas through simulation analysis.

Data Quality Measurement on a De-identified Data Set Based on Statistical Modeling (통계모형의 정확도에 기반한 비식별화 데이터의 품질 측정)

  • Chun, Heuiju;Yi, Hyun Jee;Yeon, Kyupil;Kim, Dongrae
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.5
    • /
    • pp.553-561
    • /
    • 2019
  • In this study, the method of quality measurement for the statistical usefulness of de-identified data was examined in terms of prediction accuracy by statistical modeling. In the era of the 4th industrial revolution, effective use of big data is essential to innovation through information and communication technology, but personal information issues are constrained to actively utilize big data. In order to solve this problem, de-identification guidelines have been established and the possibility of actual re-identification of personal information has become very low due to the utilization of various de-identification methods. On the other hand, strong de-identification can have side effects that degrade the usefulness of the data. We have studied the quality of statistical usefulness of the de-identified data by KLT model which is a representative de-identification method, A case study was conducted to see how statistical accuracy of prediction is degraded by de-identification. We also proposed a new measure of data usefulness of the de-identified data by quantifying how much data is added to the de-identified data to restore the accuracy of the predictive model.

Analysis of Propagation Environment for Selecting R-Mode Reference and Integrity Station (R-Mode 보정국과 감시국 선정을 위한 전파환경 분석에 관한 연구)

  • Jeon, Joong-Sung;Jeong, Hae-Sang;Gug, Seung-Gi
    • Journal of Navigation and Port Research
    • /
    • v.45 no.1
    • /
    • pp.26-32
    • /
    • 2021
  • In ocean field, the spread of the Fourth Industrial Revolution based on information and communication technology requires high precision and stable PNT&D (Position, Navigation, Timing and Data). As the IMO (International Maritime Organization) and IALA (The International Association of Marine Aids to Navigation and Lighthouse Authorities) are requiring backup systems due to mitigate vulnerabilities and the increase of dependency on GNSS (Global Navigation Satellite System), Korea is conducting a research & development of R-Mode. An DGPS (Differentiate Global Positioning System) reference station that uses MF, an existing maritime infrastructure, and AIS (Automatic Identification System) base stations that use 34 integrity station and VHF will be utilized in this study to avoid redundant investment. Because there are radio shadow areas that display low signal levels in the west sea, the establishment of new R-Mode reference and integrity station will be intended to resolve problems regrading the radio shadow area. Because the frequency has a characteristic in that radio wave transmits well along the ground (water surface) in low frequency band, simulation and measurement were conducted therefore this paper to propose candidate sites for R-Mode reference and integrity station resulted through p wave's propagation characteristics analysis. Using this paper, R-Mode reference and integrity station can be established at appropriate locations to resolve radio shadow areas in other regions.

A Study on Systematic Firmware Security Analysis Method for IoT Devices (체계적인 IoT 기기의 펌웨어 보안 분석 방법에 관한 연구)

  • Kim, Yejun;Gim, Jeonghyeon;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.31-49
    • /
    • 2021
  • IoT devices refer to embedded devices that can communicate with networks. Since there are various types of IoT devices and they are widely used around us, in the event of an attack, damages such as personal information leakage can occur depending on the type of device. While the security team analyzes IoT devices, they should target firmware as well as software interfaces since IoT devices are operated by both of them. However, the problem is that it is not easy to extract and analyze firmware and that it is not easy to manage product quality at a certain level even if the same target is analyzed according to the analyst's expertise within the security team. Therefore, in this paper, we intend to establish a vulnerability analysis process for the firmware of IoT devices and present available tools for each step. Besides, we organized the process from firmware acquisition to analysis of IoT devices produced by various commercial manufacturers, and we wanted to prove their validity by applying it directly to drone analysis by various manufacturers.

Automatic Bee-Counting System with Dual Infrared Sensor based on ICT (ICT 기반 이중 적외선 센서를 이용한 꿀벌 출입 자동 모니터링 시스템)

  • Son, Jae Deok;Lim, Sooho;Kim, Dong-In;Han, Giyoun;Ilyasov, Rustem;Yunusbaev, Ural;Kwon, Hyung Wook
    • Journal of Apiculture
    • /
    • v.34 no.1
    • /
    • pp.47-55
    • /
    • 2019
  • Honey bees are a vital part of the food chain as the most important pollinators for a broad palette of crops and wild plants. The climate change and colony collapse disorder (CCD) phenomenon make it challenging to develop ICT solutions to predict changes in beehive and alert about potential threats. In this paper, we report the test results of the bee-counting system which stands out against the previous analogues due to its comprehensive components including an improved dual infrared sensor to detect honey bees entering and leaving the hive, environmental sensors that measure ambient and interior, a wireless network with the bluetooth low energy (BLE) to transmit the sensing data in real time to the gateway, and a cloud which accumulate and analyze data. To assess the system accuracy, 3 persons manually counted the outgoing and incoming honey bees using the video record of 360-minute length. The difference between automatic and manual measurements for outgoing and incoming scores were 3.98% and 4.43% respectively. These differences are relatively lower than previous analogues, which inspires a vision that the tested system is a good candidate to use in precise apicultural industry, scientific research and education.

Evaluation of Electromagnetic Pulse Shielding Effectiveness and Bonding Performance of Inorganic Paint based on Carbon Material (탄소재료 기반 무기계 도료의 전자파 차폐성능 및 부착성능 평가)

  • Jang, Kyong-Pil;Kim, Sang-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.801-807
    • /
    • 2021
  • In various industrial fields and infrastructure based on electronic components, such as communication equipment, transportation, computer networks, and military equipment, the need for electromagnetic pulse shielding has increased. Two methods for applying electromagnetic pulse shielding are effective. The first is construction using shielding materials, such as shielding concrete, shielding doors, and shielding windows. The other is coating shielding paints on non-shielding structures. Electromagnetic pulse shielding paints are made using conductive materials, such as carbon nanotubes, graphite, carbon black, and carbon fiber. In this paint, electromagnetic pulse shielding performance is added to the commonly used water-based paint. In this study, the shielding effectiveness and bonding performance of paints using conductive graphite and carbon black as shielding materials were evaluated to develop electromagnetic pulse shielding inorganic paints. The shielding effectiveness and bonding performance were evaluated by applying six mixtures composed of different kinds and amounts of shielding material. The mixture of conductive graphite and carbon black at a weight ratio of 1:0.2 was the most effective in shielding as 33.6 dB. Furthermore, the mixture produced using conductive graphite only showed the highest bonding performance of 1.06 MPa.

Research on The Implementation of Smart Factories through Bottleneck improvement on extrusion production sites using NFC (NFC를 활용한 압출생산현장의 Bottleneck 개선을 통한 스마트팩토리 구현 연구)

  • Lim, Dong-Jin;Kwon, Kyu-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.104-112
    • /
    • 2021
  • For extrusion processes in the process industry, the need to build smart factories is increasing. However, in most extrusion production sites, the production method is continuous, and because the properties of the data are undeed, it is difficult to process the data. In order to solve this problem, we present a methodology utilizing a near field communication (NFC) sensor rather than water-based data entry. To this end, a wireless network environment was built, and a data management method was designed. A non-contact NFC method was studied for the production performance-data input method, and an analysis method was implemented using the pivot function of the Excel program. As a result, data input using NFC was automated, obtaining a quantitative effect from reducing the operator's data processing time. In addition, using the input data, we present a case where a bottleneck is improved due to quality problems.

The Effect of Rearing Knowledge on Rearing Satisfaction in Companion Animals (반려동물의 양육지식이 양육만족도에 미치는 영향)

  • Kim, Seok-Eun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.333-337
    • /
    • 2021
  • Companion animals are physically, mentally, and socially beneficial to humans, giving us great comfort in living in the Corona19 (COVID-19) era. It is also an era of the Fourth Industrial Revolution, featuring the convergence of information and communication technology. Korea, which is facing a super-aged society, has the highest suicide rate among OECD countries, and companion animals that are effective in emotional stability can be the answer. This study is about companion animals that are effective in stabilizing the emotions of the elderly, one of the major problems in the Republic of Korea, which is about to solve in a super-aged society with more than 20 percent of the elderly aged 65 or older, needs to solve. The impact of knowledge of raising companion animals on the satisfaction level of the elderly was investigated through the management and awareness of infectious diseases. Although the level of care of companion animals had a very significant (p<0.001) effect on the satisfaction of the companion animals, the recognition of infectious diseases has no statistical significance (p>0.05). Raising companion animals with knowledge of rearing increases the satisfaction level and can lead to a happier life. While personal learning is important, it is also believed that supporting education will be necessary as a policy consideration.

A Study of the Effectiveness and Status of the Information Security Disclosure System (정보보호 공시제도의 운영실태와 효과성 분석)

  • Baek, Seung Jun;Lee, Hong Joo
    • Knowledge Management Research
    • /
    • v.22 no.1
    • /
    • pp.309-330
    • /
    • 2021
  • The information security disclosure system (ISDS) has been implemented since 2016 to ensure the protection of stakeholders and the right to know, and to promote voluntary investment in information protection by companies. Regarding the information security disclosure system, there have been studies that urge the implementation of the system, but studies that analyze the contents disclosed after the implementation of the system or suggest improvement directions are few. In this study, the contents of the information security disclosure system that had been announced on the information security industry promotion portal until 2019 were analyzed, the current status was summarized, and the direction of system improvement was suggested. In some cases, companies that disclosed information through the disclosure system increased the number of personnel in charge and obtained certifications related to information security, but did not find any effect on the increase/decrease in investment. The current disclosure system has not been activated because it has difficulty in giving individual companies incentives to disclose. Thus, this study suggests the inclusion of ISDS to information security management system (ISMS), which is currently mandatory for certain companies. In the current disclosure system, it is difficult for the company's stakeholders or customers to check the contents of the disclosure. As a way to do this, a method of including in the contents of the personal information processing policy or the notification of the use of personal information was suggested.

A Study on the Development of a Training Course for Ship Cyber Security Officers (선박 사이버보안 책임자를 위한 교육과정 개발에 관한 연구)

  • Lee, Eunsu;Ahn, Young-Joong;Park, Sung-ho
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.26 no.7
    • /
    • pp.830-837
    • /
    • 2020
  • With the rapid development of information and communication technology, information exchange between ships and shore has become faster and more convenient, However, accessing ship information has also become easier and concerns about cyber security attacks are growing. When a ship suffers a cyber-attack, it may cause considerable damage and incurs enormous costs and time to repair. In response to this threat, the maritime industry now demands that a cyber security officer be assigned to each ship to take charge of cyber security management onboard. In order to reduce the damage cause by an attack and to respond effectively, a specialized training course for the ship's cyber security officer is required. The purpose of this study was to present a training course for the position of the ship's cyber security officer, and to highlight the necessity of amending current legislation, To this end, domestic and foreign trends, ship cyber security incident cases, and cyber security training courses were investigated, and based on the results a standard training course for a ship's cyber security of icer was developed. Additionally, recommendations on the related amendments to legislation ware established. The results of the study can be used as basic data to establish future training courses for cyber security officers.