• Title/Summary/Keyword: 표적융합

Search Result 141, Processing Time 0.02 seconds

Between local welfare center and urban regeneration support center Collaborative Governance Example and Improvement strategies (지역복지관과 도시재생지원센터 간 협력적 거버넌스 사례 및 개선전략)

  • Lee, Woon Hee;Go, Eun Ah
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.3
    • /
    • pp.63-74
    • /
    • 2018
  • This study suggested cooperative governance cases and improvement strategies between local welfare centers and urban regeneration support centers, centered on urban revitalization areas around Seoul Station, by applying FGI. Based on the analysis of the contents of FGI participating in the cooperative governance process, it was proved that the common role and identity between the local welfare center and the urban regeneration support center were regional based activities. And the advantage of constructing collaborative governance was analyzed by four ways. In addition, this study presented improvement strategies from a microscopic and macro perspective. The results of this study suggest that the change in the curriculum of social workers' education and the expansion of the scope of the practitioner in the Urban Regeneration Business Act propose.

Developing the requirements of "National Important Facilities" according to the certification criteria of (ISO) (국제표준화기구(ISO)의 인증기준에 준하는 「국가중요시설」의 요구사항 개발)

  • Yim, Heon-Wook
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.65-71
    • /
    • 2017
  • "National important facilities" refers to facilities that have a great influence on national security and people's live s if enemy occupation, destruction, or functional paralysis is imposed by the Ministry of Defense Directive. In view of the case of nuclear plant hacking and the attack on the government building "National important facilities" could be the target of anti-social crimes. In the meantime, the "National important facilities" check is limited to the facilit y survey. so The purpose of this study is to develop generalized requirements. Therefore, comparing the requiremen ts of ISO 9001:2015 and ISO 27001:2013. There are only 8 differences(operating) out of 1-10. And the rest are used in common. In addition, we confirmed that the results of comparing the cases of domestic and foreign CPTED are within the "Six Principles". In Chapter 8, the principle of application of CPTED was inserted and the certification re quirements of the "National important facilities" management system were derived.

The Design of Authentication Model based on Symmetric Key Encryption for Improving Network Availability in Cloud Environment (클라우드 환경에서 네트워크 가용성 개선을 위한 대칭키 암호화 기반 인증 모델 설계)

  • Baek, Yong-Jin;Hong, Suk-Won;Kim, Sang-Bok
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.47-53
    • /
    • 2019
  • Network-based sharing of information has evolved into a cloud service environment today, increasing its number of users rapidly, but has become a major target for network-based illegal attackers.. In addition, IP spoofing among attackers' various attack techniques generally involves resource exhaustion attacks. Therefore, fast detection and response techniques are required. The existing detection method for IP spoofing attack performs the final authentication process according to the analysis and matching of traceback information of the client who attempted the connection request. However, the simple comparison method of traceback information may require excessive OTP due to frequent false positives in an environment requiring service transparency. In this paper, symmetric key cryptography based on traceback information is used as mutual authentication information to improve this problem. That is, after generating a traceback-based encryption key, mutual authentication is possible by performing a normal decryption process. In addition, this process could improve the overhead caused by false positives.

Effects of Balance and Kinematic Factors on Archery Score during Archery Shooting (양궁 슈팅 시 균형성과 운동학적 요인이 양궁 점수에 미치는 영향)

  • An, Hyung-Seung
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.5
    • /
    • pp.239-246
    • /
    • 2018
  • In this study, we analyzed the balance of the both legs and the kinematic analysis of the upper limb segments and joints during archery shooting and compared the differences according to the scores. 9 K-university elite archery athletes participated. Each archer was asked to shoot 3-shots and 5-ends on a 122 cm target at a distance of 70 m. Seven infrared cameras (Qualisys, sweden) and two force plates (Kistler, Switerland) were used to calculate the upper limb segments and joint movements and the center of pressure (COP). When the archers shot 8 points, range of motion of elbow joint angle on drawing-arm and mediolateral COP range of motion on the left foot were larger than when 9-10 points were shot (p<.05). In order to maintain a high score in the archery game, constant balance is required, and the balance of the left foot supporting the bow during the shooting is an important factor. In addition, minimizing elbow joint movement of the drawing-arm supporting the bow will help stabilized shooting.

Captive Flight Test POD System Design for Effective Development in Weapon System (무기체계의 효과적인 개발을 위한 항공탑재시험용 POD 시스템 설계)

  • Park, JungSoo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.6
    • /
    • pp.25-31
    • /
    • 2018
  • Captive Flight Test (CFT) is one of the most important tests to acquire data when developing complex weapon systems. In this paper, we introduce the design and test result of our POD system for CFT. POD system uses POD set which consists of left and right POD. The exterior and mass properties of POD set are equal to those of fuel tank for aircraft so that we can omit Airworthiness Certification. Also, we adequately placed inner-equipments in order to acquire data including target image, navigation result and reference data to verify and analyse software algorithm. The POD system for CFT we developed is complex system as both mechanical and electronic factors are applied. As we repeatedly performed CFT, useful and various data for weapon development were acquired.

A Study on the User Experience of Food Waste at Home (가정에서의 음식물류 폐기물 처리에 대한 사용자 경험 연구)

  • Jeon, Eun-Ha;Yang, Sung-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.7
    • /
    • pp.79-87
    • /
    • 2020
  • The environmental problems caused by food waste have been a steady social issue, and the severity of the problem emerged as the 2013 London Convention banned the marine emissions of waste water. The government implemented measures related to food waste, but prior studies showed that it lacked continuity and lacked strategies for each area of occurrence, and emphasized that citizens' participation is important to implement effective reduction policies. Therefore, this study proposed a food waste disposal machine through user experience analysis as a way to induce civic participation. To this end, the design development direction was outlined in this study after the pre-research and user survey stages through FGI and user journey maps. Based on this, the proposed treatment machine facilitates the frequent discharge of waste and simplifies the process of food waste in the home. In addition, the moment of direct contact between the user and waste is only the point at which the waste is released to the handler, thereby minimizing the negative experience the user has experienced.

An Encrypted Service Data Model for Using Illegal Applications of the Government Civil Affairs Service under Big Data Environments (빅데이터 환경에서 정부민원서비스센터 어플리케이션 불법 이용에 대한 서비스 자료 암호화 모델)

  • Kim, Myeong Hee;Baek, Hyun Chul;Hong, Suk Won;Park, Jae Heung
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.31-38
    • /
    • 2015
  • Recently the government civil affairs administration system has been advanced to a cloud computing environment from a simple network environment. The electronic civil affairs processing environment in recent years means cloud computing environment based bid data services. Therefore, there exist lots of problems in processing big data for the government civil affairs service compared to the conventional information acquisition environment. That is, it processes new information through collecting required information from different information systems much further than the information service in conventional network environments. According to such an environment, applications of providing administration information for processing the big data have been becoming a major target of illegal attackers. The objectives of this study are to prevent illegal uses of the electronic civil affairs service based on IPs nationally located in civil affairs centers and to protect leaks of the important data retained in these centers. For achieving it, the safety, usability, and security of services are to be ensured by using different authentication processes and encryption methods based on these processes.

Improvement the Security Service of Cash Delivery Using Real-time Binary CDMA Monitoring (실시간 Binary CDMA 모니터링을 통한 현금호송 보안업무 개선방안)

  • Kim, Min-Su;Lee, Dong-Hwi;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.53-60
    • /
    • 2012
  • Financial institutions keep putting efforts to filling cash into ATMs and branches in order to provide customers with better service. This kind of job usually required an automobile unit to be done, and financial institutions employee perform this task directly or sourcing out to professional security service companies. However, the job has been of ten a target of criminals because it deals with cash. In fact, since 2003, there were several cash truck robberies occurred. This circumstances made the public be aware of the necessity of creative research and the strict management of financial institutions and security companies. However, the existing studies on security service of cash delivery suggest only how to improve the job legally and in operation, and the technological aspect of the improving way has not been studied. Therefore, this study aimed at suggesting an improvement the security service of cash delivery using real-time binary CDMA monitoring for providing better safety service to customers.

Road Condition Measurement using Radar Cross Section of Radar (레이더의 유효 반사전력을 이용한 도로 상태 측정)

  • Park, Jae-Hyoung;Lee, Jae-Kyun;Lee, Chae-Wook;Lee, Nam-Yong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.2
    • /
    • pp.150-156
    • /
    • 2011
  • Smart Highway is a next generation highway that significantly improves a traffic safety, reduces incidence of traffic accidents, and supports intelligent and convenient driving environments so that drivers can drive at high speeds in safety. In order to implement smart highway, it is required to gather a large amount of data including conditions of a road and the status of vehicles, and other useful data. To provide situation information of highway, it has been gathered traffic information using optical sensors(CCTV, etc.). However, this technique has problems such as the problem of information gathering, lack of accuracy depending on weather conditions and limitation of maintenance. It needs radar system which has not effect on environmental change and algorithm processing technique in order to provide information for a safety driving to driver and car. In this paper, it is used radar with 9.4GHz to test performance of a road surface and developed radar system for detecting test. And we compared and analyzed a performance of data acquired from each radar through computer simulation.

Security Threats to Enterprise Generative AI Systems and Countermeasures (기업 내 생성형 AI 시스템의 보안 위협과 대응 방안)

  • Jong-woan Choi
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.9-17
    • /
    • 2024
  • This paper examines the security threats to enterprise Generative Artificial Intelligence systems and proposes countermeasures. As AI systems handle vast amounts of data to gain a competitive edge, security threats targeting AI systems are rapidly increasing. Since AI security threats have distinct characteristics compared to traditional human-oriented cybersecurity threats, establishing an AI-specific response system is urgent. This study analyzes the importance of AI system security, identifies key threat factors, and suggests technical and managerial countermeasures. Firstly, it proposes strengthening the security of IT infrastructure where AI systems operate and enhancing AI model robustness by utilizing defensive techniques such as adversarial learning and model quantization. Additionally, it presents an AI security system design that detects anomalies in AI query-response processes to identify insider threats. Furthermore, it emphasizes the establishment of change control and audit frameworks to prevent AI model leakage by adopting the cyber kill chain concept. As AI technology evolves rapidly, by focusing on AI model and data security, insider threat detection, and professional workforce development, companies can improve their digital competitiveness through secure and reliable AI utilization.