• Title/Summary/Keyword: Cyber Operation

Search Result 261, Processing Time 0.029 seconds

A Study on the Efficiency of Online Classes -Focused on Various Teaching Methods in College- (언택트시대, 비대면 온라인 수업의 효율성 연구 -대학 수학 수업에서의 다양한 수업기법 활용을 중심으로-)

  • Hong, Ye-Yoon;Im, Yeon-Wook
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.63-73
    • /
    • 2021
  • Sudden implementation of online classes in higher education due to Covid19 pandemic implies a lot of worries about academic performance declining. Thus, this paper analyzed a class(CalculusI) taught 100% online which was the same as the offline class before. This class tried to maintain the same quality as the offline one by utilizing various teaching strategies. The result shows the academic achievement level was similar or higher than that of offline class, and so was the students' perception and satisfaction degree. However, this was not just the outcome of online class, but it came from the professor's well-designed teaching plan and smooth operation of the class. It implicates successful teaching methodology is more important factor than such medium difference as online or offline. This study suggests the potential of online classes after the Covid19 pandemic, and expects further studies verify the result in a lot more curricula.

SIEM OWASP-ZAP and ANGRY-IP Vulnerability Analysis Module and Interlocking (SIEM과 OWASP-ZAP및ANGRY-IP취약점분석모듈과 연동구현)

  • Yoon, Jong Moon
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.83-89
    • /
    • 2019
  • In accordance with information security compliance and security regulations, there is a need to develop regular and real-time concepts for cyber-infringement attacks against network system vulnerabilities in branch and periodic forms. Vulnerability Analysis Analysis It is judged that it will be a countermeasure against new hacking attack in case of concept validation by interworking with TOOL. Vulnerability check module is standardized in event attribute management and ease of operation. Opening in terms of global sharing of vulnerability data, owasp zap / Angry ip Etc. were investigated in the SIEM system with interlocking design implementation method. As a result, it was proved that the inspection events were monitored and transmitted to the SIEM console by the vulnerability module of web and network target. In consideration of this, ESM And SIEM system In this paper, we propose a new vulnerability analysis method based on the existing information security consultation and the results of applying this study. Refer to the integrated interrelationship analysis and reference Vulnerability target Goal Hacking It is judged to be a new active concept against invasion attack.

A Improvement Plan for Fire Fighting Activity of Rack- Type Warehouse Based on Case Study and Field Interview (사례분석과 현장인터뷰를 통한 적층형 대형창고 소방활동 개선방안 연구)

  • Kim, Woon Hyung;Seo, Dong Hun;Ham, Eun Gu
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.1
    • /
    • pp.67-75
    • /
    • 2019
  • Purpose: The purpose of this study is to suggest a systematic improvement plan for strengthening fire fighting ability of domestic rack- type warehouse buildings. Method: A fire case of small warehouse with sandwich panel structure and four design review of large warehouse with fire endurance structure were analyzed. Also, interviewed a group of 11 fire fighters who had 20 years field experience. Results: A provision of mobile equipment for initial fire fighting, accessibility of more than three sides, installation of internal entrance windows, proper placement of outdoor fire fighting equipment, image processing of fire site informations, and provide more incentives on the field commander are main factors of improvement plan. Conclusion: Effective standard operation procedures (SOP) and safety standards should be established and applied for each stage of the dispatch and on-site response considering the fire characteristics and risk factors of each warehouse by scale.

Efficient Bit-Parallel Shifted Polynomial Basis Multipliers for All Irreducible Trinomial (삼항 기약다항식을 위한 효율적인 Shifted Polynomial Basis 비트-병렬 곱셈기)

  • Chang, Nam-Su;Kim, Chang-Han;Hong, Seok-Hie;Park, Young-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.49-61
    • /
    • 2009
  • Finite Field multiplication operation is one of the most important operations in the finite field arithmetic. Recently, Fan and Dai introduced a Shifted Polynomial Basis(SPB) and construct a non-pipeline bit-parallel multiplier for $F_{2^n}$. In this paper, we propose a new bit-parallel shifted polynomial basis type I and type II multipliers for $F_{2^n}$ defined by an irreducible trinomial $x^{n}+x^{k}+1$. The proposed type I multiplier has more efficient the space and time complexity than the previous ones. And, proposed type II multiplier have a smaller space complexity than all previously SPB multiplier(include our type I multiplier). However, the time complexity of proposed type II is increased by 1 XOR time-delay in the worst case.

A Study on the Militarization of Artificial Intelligence Technology in North Korea and the Development Direction of Corresponding Weapon System in South Korea (북한 인공지능 기술의 군사화와 우리 군의 대응 무기체계 발전방향 연구)

  • Kim, Min-Hyuk
    • Journal of Information Technology Services
    • /
    • v.20 no.1
    • /
    • pp.29-40
    • /
    • 2021
  • North Korea's science and technology policies are being pursued under strong leadership and control by the central government. In particular, a large part of the research and development of science and technology related to the Fourth Industrial Revolution in North Korea is controlled and absorbed by the defense organizations under the national defense-oriented policy framework, among which North Korea is making national efforts to develop advanced technologies in artificial intelligence and actively utilize them in the military affairs. The future weapon system based on AI will have superior performance and destructive power that is different from modern weapons systems, which is likely to change the paradigm of the future battlefield, so a thorough analysis and prediction of the level of AI militarization technology, the direction of development, and AI-based weapons system in North Korea is needed. In addition, research and development of South Korea's corresponding weapon systems and military science and technology are strongly required as soon as possible. Therefore, in this paper, we will analyze the level of AI technology, the direction of AI militarization, and the AI-based weapons system in North Korea, and discuss the AI military technology and corresponding weapon systems that South Korea military must research and develop to counter the North Korea's. The next study will discuss the analysis of AI militarization technologies not only in North Korea but also in neighboring countries in Northeast Asia such as China and Russia, as well as AI weapon systems by battlefield function, detailed core technologies, and research and development measures.

Study on Equivalent Consumption Minimization Strategy Application in PTI-PTO Mode of Diesel-Electric Hybrid Propulsion System for Ships

  • Lee, Dae-Hong;Kim, Jong-Su;Yoon, Kyoung-Kuk;Hur, Jae-Jung
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.3
    • /
    • pp.451-458
    • /
    • 2022
  • In Korea, five major ports have been designated as sulfur oxide emission control areas to reduce air pollutant emissions, in accordance with Article 10 of the "Special Act on Port Air Quality" and Article 32 of the "Ship Pollution Prevention Regulations". As regulations against vessel-originated air pollutants (such as PM, CO2, NOx, and SOx) have been strengthened, the Ministry of Oceans and Fisheries(MOF) enacted rules that newly built public ships should adopt eco-friendly propulsion systems. However, particularly in diesel-electric hybrid propulsion systems,the demand for precise control schemes continues to grow as the fuel saving rate significantly varies depending on the control strategy applied. The conventional Power Take In-Power Take Off(PTI - PTO) mode control adopts a rule-based strategy, but this strategy is applied only in the low-load range and PTI mode; thus, an additional method is required to determine the optimal fuel consumption point. The proposed control method is designed to optimize fuel consumption by applying the equivalent consumption minimization strategy(ECMS) to the PTI - PTO mode by considering the characteristics of the specific fuel oil consumption(SFOC) of the engine in a diesel-electric hybrid propulsion system. To apply this method, a specific fishing vessel model operating on the Korean coast was selected to simulate the load operation environment of the ship. In this study, a 10.2% reduction was achieved in the MATLAB/SimDrive and SimElectric simulation by comparing the fuel consumption and CO2 emissions of the ship to which the conventional rule-based strategy was applied and that to which the ECMS was applied.

A Study on Flow Analysis according to the Cause of Gas Leakage in the Specialty Gas Supply Device for Semiconductors (반도체용 특수가스 공급장치 내부에서의 가스누출 원인에 따른 유동해석에 관한 연구)

  • Kim, Jung-Duck;Kwon, Ki-sun;Rhim, Jong-Guk;Yang, Won-Baek
    • Journal of the Korean Institute of Gas
    • /
    • v.25 no.2
    • /
    • pp.42-51
    • /
    • 2021
  • Facilities that supply specialty gases used in semiconductor manufacturing mainly handles with hazardous and dangerous substances with flammable, toxic, and corrosive properties, and gas cabinets are mainly used as such supply facilities. The effects of the supply facilities were analyzed for each leak through the rupture disk in the gas cabinet and a leak where the leak hole. In this case, gas leaked to the outside depending on the leak area. It is a factor that creates a risk depending on the concentration of the leaked gas. Depending on the risk of leakage, all measures such as safe operation procedures should be reviewed again.

Study on Development of Korean Unmanned Systems through Analysis of U.S. Unmanned Systems Policy (미국의 무인체계 정책 분석을 통한 한국의 무인체계 발전에 관한 연구)

  • Park, Dongseon;Oh, Kyungwon
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.3
    • /
    • pp.65-70
    • /
    • 2021
  • This study presents a method to efficiently advance the Republic of Korea's Unmanned Systems through the analysis of the development of the U.S. Unmanned System Policy. After the occurrence of the September 11 attacks, the U.S. developed Unmanned Systems as a part of RMA and became the leader in this area. The system went through numerous trials and errors during the development and acquisition. From these experiences, the U.S. had embodied Unmanned Systems acquisition methods by establishing Unmanned Systems Development Guidance and DoD Autonomy Community of Interest in 2012. In addition, as diverse unmanned programs started to proceed, it promoted Core Technology development sharing and simplification of functions of the Unmanned Systems to exclude budget-wasting elements such as duplication of programs. The Republic of Korea must politically build a collaborative system between industry/academia/research institute/military and apply evolutionary development strategies from the first step of the development of the Unmanned Systems the future Game Changer. In operations, concepts of the Manned/Unmanned Systems complex operation should be established and intelligent S/W, Open System, and Cyber Security technologies to materialize them developed.

An Expert Opinion Analysis Study for Improvement of Biotop Area Ratio Index (생태면적률 산정지표 개선방안을 위한 전문가 의견분석 연구)

  • Byeong-Hwa, Song
    • Journal of Environmental Impact Assessment
    • /
    • v.31 no.6
    • /
    • pp.438-448
    • /
    • 2022
  • This study is to improve the quantitative estimation index of biotop area ratio, which is an environmental planning index and environmental ecological planning technique, as a planning means that can induce the improvement of ecological soundness in the spatial planning stage. It is intended to identify the relative importance of space types and calculation indicators currently in operation, and to find alternatives through opinion analysis on improvement of space types and weights. As the method of this study, AHP analysis was performed to evaluate the relative importance of spatial types for in-depth analysis of spatial types and calculation indicators. In order to secure the reliability and objectivity of the study, 50 experts participated. Through this study, it can be linked with the improvement of technologies and construction methods, maintenance efficiency, economic feasibility, and construction technology, which are developed through analysis on the limitations and improvements by type of biotop area ratio. And it is expected to contribute to the improvement of the urban environment and vitalization of the biotop area ratio through the application of the biotop area ratio.

A Study on How to Build a Disaster Recovery System that can Minimize Recovery Time Objective(RTO) and Recovery Point Objective(RPO) to Ensure Business Continuity (비즈니스 연속성 보장을 위한 복구 시간 목표(RTO) 및 복구 지점 목표(RPO)를 최소화할 수 있는 재해복구시스템 구축 방안 연구)

  • Kang, Hyun-Sun
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.91-99
    • /
    • 2021
  • In the current business environment where dependence on IT has increased rapidly, the risk from disasters or cyber-attacks is also increasing. Business continuity, the ability to continue to provide service in the event of a business disruption caused by a disaster, is essential. In other words, you need to have a plan in place to keep your core business functions uninterrupted with rapid recovery within a predetermined Recovery Time Objective (RTO) and Recovery Point Objective (RPO) time frame. In this paper, we propose a disaster recovery system construction method that can minimize RTO and RPO to ensure business continuity. The system configuration adopts Tier 7 disaster recovery model, synchronous storage replication, hot disaster recovery site, and operation management automation solution. This ensures continuity of core business with virtually no data loss and minimal RTO and RPO.