• Title/Summary/Keyword: DEA

Search Result 2,088, Processing Time 0.022 seconds

Platform design and source coding of AI responsive AR business cards (AI 반응 AR명함의 Platform 설계 및 Source Coding)

  • Choi, Su-Youn;Han, Su-Yeon;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.4
    • /
    • pp.489-493
    • /
    • 2020
  • The technological development of the Fourth Industrial Revolution is accelerating the development of the world and society. Fourth industrial technology is connected to Cyber World to develop national and social infrastructure. The application of the fourth industrial technology can create Cyber-city and Cyber-life systems. In the ICT business industry that connects Cyber with the real world, we need to connect Cyber with real-life work. It is to use AR business cards as one of the ways to connect Cyber business with real business. When an AR business card is recognized as a smartphone, a 3D character appears to introduce the main character of the business card. In addition, AR business cards are reflected in AR for product and service of business operators, enabling promotion of products, services, etc. Using connected wired and wireless 5G communication, real-time e-commerce is also possible. In this paper, AR business card will be produced with Source Coding and AR business card platform will be designed.

Cybersecurity Audit of 5G Communication-based IoT, AI, and Cloud Applied Information Systems (5G 통신기반 IoT, AI, Cloud 적용 정보시스템의 사이버 보안 감리 연구)

  • Im, Hyeong-Do;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.428-434
    • /
    • 2020
  • Recently, due to the development of ICT technology, changes to the convergence service platform of information systems are accelerating. Convergence services expanded to cyber systems with 5G communication, IoT, AI, and cloud are being reflected in the real world. However, the field of cybersecurity audit for responding to cyber attacks and security threats and strengthening security technology is insufficient. In this paper, we analyze the international standard analysis of information security management system, security audit analysis and security of related systems according to the expansion of 5G communication, IoT, AI, Cloud based information system security. In addition, we design and study cybersecurity audit checklists and contents for expanding security according to cyber attack and security threat of information system. This study will be used as the basic data for audit methods and audit contents for coping with cyber attacks and security threats by expanding convergence services of 5G, IoT, AI, and Cloud based systems.

Design Research of Blockchain, Machine Learning for the management of financing fund (융자성 기금관리를 위한 블록체인, 머신러닝 설계 연구)

  • Oh, Rag-seong;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1201-1208
    • /
    • 2019
  • The government has operated financing fund under the National Finance Act for the smooth conduct of national policy. But, It is exposed to problems such as the possibility of abuse of fund and the lack of after-loan management. In this paper, It uses fintech such as the blockchain and machine learning to solve these problems. The fund operation procedure is designed as a consortium blockchain, and it suggests the application of PBFT negotiation algorithm and the smart contract. In case of the fund management, it suggests utilizing multilayer artificial neural network model of machine learning and a module of result interpretation. The introduction of this research approach will improve the transparency and efficiency of the financing fund, ensure the credibility and also contribute to the improvement of the fund management and the establishment of the fund policy.

A Study on Building an Integration Security System Applying Virtual Clustering (Virtual Clustering 기법을 적용한 Integration Security System 구축에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.101-110
    • /
    • 2011
  • Recently, an attack to an application incapacitates the intrusion detection rule, the defense policy for a network and database and induces intrusion incidents. Thus, it is necessary to study integration security to ensure the security of an internal network and database from that attack. This article is about building an integration security system to prevent an attack to an application set with intrusion detection rules. It responds to network-based attack through detection, disperses attack with the internal integration security system through virtual clustering and load balancing, and sets up defense policy for attacking destination packets, analyzes and records attack packets, and updates rules through monitoring and analysis. Moreover, this study establishes defense policy according to attacking types to settle access traffic through virtual machine partition policy and suggests an integration security system applied to prevent attack and tests its defense. The result of this study is expected to provide practical data for integration security defense for hacking attack from outside.

Exploring the contents of personal information protection education in the pre-director education

  • Choi, Dea-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.177-182
    • /
    • 2021
  • This study was carried out for the purpose of selecting and structuring educational content for personal information protection education in supplementary education for childcare workers. Prior research and literature data were collected and analyzed to select educational content, and a preliminary survey was conducted for 125 applicants for education. Based on the surveyed data, the educational content was structured through focus group interview. In the focus group interview analysis, the person in charge of personal information of the institution and those who have completed education participated. Group interviews and individual interviews through e-mail, etc. were conducted, and the final contents were selected after reviewing the appropriateness of the derived opinions by two educational experts. It was found that the direction of the search for personal information protection education contents should be added to the contents of practical work in each stage of information management and practice such as document writing.

A Study on Switching Characteristics of 1,200V Trench Gate Field stop IGBT Process Variables (1,200V 급 Trench Gate Field stop IGBT 공정변수에 따른 스위칭 특성 연구)

  • Jo, Chang Hyeon;Kim, Dea Hee;Ahn, Byoung Sup;Kang, Ey Goo
    • Journal of IKEEE
    • /
    • v.25 no.2
    • /
    • pp.350-355
    • /
    • 2021
  • IGBT is a power semiconductor device that contains both MOSFET and BJT structures, and it has fast switching speed of MOSFET, high breakdown voltage and high current of BJT characteristics. IGBT is a device that targets the requirements of an ideal power semiconductor device with high breakdown voltage, low VCE-SAT, fast switching speed and high reliability. In this paper, we analyzed Gate oxide thickness, Trench Gate Width, and P+Emitter width, which are the top process parameters of 1,200V Trench Gate Field Stop IGBT, and suggested the optimized top process parameters. Using the Synopsys T-CAD Simulator, we designed IGBT devices with electrical characteristics that has breakdown voltage of 1,470 V, VCE-SAT 2.17 V, Eon 0.361 mJ and Eoff 1.152 mJ.

The Fuel Characteristics of Diesel by Water Contamination (수분오염에 따른 경유의 연료적 특성)

  • Lim, Young-Kwan;Won, Ki-Yoe;Kang, Byung-Seok;Park, So-Hwi;Park, Jang-Min;Kang, Dea-Hyuk
    • Tribology and Lubricants
    • /
    • v.36 no.6
    • /
    • pp.385-390
    • /
    • 2020
  • It rains heavily, such as long rain and typhoons, during a typical rainy season in Korea. In this season, several fuel contamination accidents by water and vehicular problems caused by water contaminated fuel occur. Many research groups have studied the effects of water contaminated fuel on vehicles and environment. However the characteristics of water contaminated fuel have not been studied. In this study, we prepared diesel samples with a constant ratio of water (0~30 volume %) using an emulsifier. Then, we analyzed these diesel samples for their representative fuel properties. In the analytical results, diesel with 30% water showed an increase in fuel properties such as density (823→883 kg/㎥), kinematic viscosity (2.601→6.345 ㎟/s), flash point (47→56℃), pour point (-22→2℃), CFPP (cold filter plugging point) (-17→20℃) and copper corrosion number (1a→2a). The low temperature characteristics, such as low pour point and CFPP, blocks the fuel filter in the cold season. In addition, water contaminated diesel decreases lubricity (190→410 ㎛) under high frequency reciprocating rig (HFRR) and derived cetane number (54.81→34.25). The low lubricity of fuel causes vehicle problem such as pump and injector damage owing to severe friction. In addition, the low cetane diesel fuel increases exhaust gases such as NOx and particulate matters (PM) owing to incomplete combustion. This study can be used to identify the problems caused by water contamination to vehicle and fuel facilities.

Hacking attack and vulnerability analysis for unmanned reconnaissance Tankrobot (무인정찰 탱크로봇에 대한 해킹 공격 및 취약점 분석에 관한 연구)

  • Kim, Seung-woo;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.9
    • /
    • pp.1187-1192
    • /
    • 2020
  • The dronebot combat system is a representative model of the future battlefield in the 4th industrial revolution. In dronebot, unmanned reconnaissance tankrobot can minimize human damage and reduce cost with higher combat power than humans. However, since the battlefield environment is very complex such as obstacles and enemy situations, it is also necessary for the pilot to control the tankrobot. Tankrobot are robots with new ICT technology, capable of hacking attacks, and if there is an abnormality in control, it can pose a threat to manipulation and control. A Bluetooth sniffing attack was performed on the communication section of the tankrobot and the controller to introduce a vulnerability to Bluetooth, and a countermeasure using MAC address exposure prevention and communication section encryption was proposed as a security measure. This paper first presented the vulnerability of tankrobot to be operated in future military operations, and will be the basic data that can be used for defense dronebot units.

Cybersecurity of The Defense Information System network connected IoT Sensors (IoT Sensor가 연결된 국방정보통신망의 사이버보안 연구)

  • Han, Hyun-Jin;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.802-808
    • /
    • 2020
  • The IoT(Internet of Things) is based on the development of sensor technology and high-speed communication infrastructure, and the number of IoT connected to the network is increasing more than the number of people, and the increase is also very fast. In the field of defense, IoT is being deployed in various fields such as operations, military, base defense, and informatization, and the need is also increasing. Unlike the existing PC/server information protection system, cyber threats are also increasing as IoT sensors, which are vulnerable to information protection, are increasing in the network, so it is necessary to study the platform to protect the defense information and communication network. we investigated the case of connecting wired and wireless IoT to the defense network, and presented an efficient interlocking design method of the IoT integrated independent network with enhanced security by minimizing the contact point with the defense network.

Consortium Blockchain and Machine Learning Design for Efficient Government fund expenditure in Untact Era (Untact 시대의 효율적인 정부자금 지출을 위한 Consortium Blockchain과 Machine Learning 설계)

  • Oh, Rag-seong;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.2
    • /
    • pp.178-186
    • /
    • 2021
  • COVID-19 occurred in China in December 2019 and spread to the world. Untact culture becoming commonplace due to the spread of COVID-19, is accelerating digital transformation across society. The government is increasing government fund to overcome national crisis situations such as COVID-19. In order to efficiently execute these government funds, the government and policy financial institutions need to come up with two measures. One is to establish a transparent government fund execution process, and the other is to secure the objectivity of the review process. In this paper, to solve this problem, we designed the execution process of government funds from the government to end users with Consortium Blockchain, and designed a machine learning algorithm for internal review of policy financial institutions. The research data proposed in this paper will be helpful in setting the future government policy direction for government fund execution.