• Title/Summary/Keyword: ICT 기반 시스템

Search Result 716, Processing Time 0.029 seconds

Multi-Scenario-Based Implementation of User Interface for a Cloud BIM-Based Design Support System (다중 시나리오에 의한 '클라우드 BIM 기반 협업 설계 지원 시스템'의 사용자 인터페이스 개발)

  • Kim, Jinwooung;Jung, Jaehwan;Kim, Sung-Ah
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.2
    • /
    • pp.403-412
    • /
    • 2017
  • With the introduction of BIM and ICT technology, 'Cloud-based collaborative design support system' has been actively researched and new user interface is needed to support it. When developing the user interface, scenario - based design method is selected which based on the actual usage scenarios to anticipate the usage situation and reflect the user's requirements. However, since the existing scenario-based design technique is an inductive method, it is difficult to cover the usage situation of all users when creating the usage scenario. For this reason, there is a need for a new scenario creation method that can systematically create and modify scenarios instead of inductive methods. This study proposes a 'Multi-scenario-based design method' that complemented the existing method and verify its usability by applying it to the user interface development process of 'Cloud-based collaborative design support system'.

Security Improvement Methods for Computer-based Test Systems (컴퓨터 기반 평가 시스템의 보안성 강화 방안)

  • Kim, Sang Hyun;Cho, Sang-Young
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.33-40
    • /
    • 2018
  • ICT technology has been applied to various educational fields, but applying to educational test field is limited. Computer-based test (CBT) can overcome temporal and spatial constraints of conventional paper-based test, but is vulnerable to fraud by test parties. In this paper, we propose real-time monitoring and process management methods to enhance the security of CBT. In the proposed methods, the test screens of students are periodically captured and transferred to the professor screen to enable real-time monitoring, and the possible processes used for cheating can be blocked before testing. In order to monitor the screen of many students in real time, effective compression of the captured original image is important. We applied three-step compression methods: initial image compression, resolution reduction, and re-compression. Through this, the original image of about 6MB was converted into the storage image of about 3.8KB. We use the process extraction and management functions of Windows API to block the processes that may be used for cheating. The CBT system of this paper with the new security enhancement methods shows the superiority through comparison of the security related functions with the existing CBT systems.

  • PDF

A Study on Design Medical Tourism Strategy and Business Service Model (의료관광 전략 수립 및 비즈니스 서비스 모델 설계에 관한 연구)

  • Chang, Sae Kyung;Baek, Jong Sun
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.3
    • /
    • pp.43-55
    • /
    • 2017
  • The market for medical tourism services in the world is steadily increasing and the medical tourism market in the South Korea is also showing high growth. However, they have also problem such as informal various information and services, irregularity price competition etc. In order to solve this problem, We have designed a medical tourism service model based on ICT specific on domestic medical ecosystem. First, analysis trends of domestic and overseas medical ecosystem and identify current problem of medical tourism. In order to solve existed problem we also have designed a medical tourism strategy. Based on the strategy, we have designed business service model based on ICT platform for as fit as Korea medical tourism status. The proposed medical tourism business service model can provide usability to customer and also can solve current medical tourism problem. We expect industrial effect and contribution to the activation.

VR-based Hiking System that supports Real-time Field Condition (등산로 조건을 실시간으로 지원하는 VR 기반의 사이버 등산 시스템)

  • Ko, Dae-sik
    • Journal of Platform Technology
    • /
    • v.6 no.4
    • /
    • pp.78-86
    • /
    • 2018
  • In this paper, a VR-based cyber hiking system was designed to provide virtual reality for famous mountains that can offer the real senses and feelings of hiking in supporting environmental factors of actual mountains such as the temperature, air, sound, echoes, etc., of the mountain the user wants to climb. The VR-based cyber hiking system that reflects real-time site conditions is largely consisted of the data collection module that collects data from the live site, multiple drive modules that enables the user to feel real senses using data from the sites, and sensor module to detect the stimuli provided by the drive modules and the user's physical body transition. Unlike existing VR-based hiking systems, the proposed cyber hiking system not only provides simple virtual reality for the wanted mountain, but can also provide the natural conditions of real mountains and implement the uphill and downhill of hiking routes. In particular, it has the effect of providing fun and game elements to users by excluding unnecessary conditions and risks that may arise in actual hiking and instead supporting augmented realities such as squirrels on actual hiking paths. In addition, in providing users with the changes in their body before and after hiking, it is expected to be effective in providing diverse feedback such as the height, gradient, and speed of mountain hiking.

The Influence of Information and Communication Technologies on the Power Dynamics between Social Welfare Bureaucrats and Recipients (정보통신기술(ICT)이 사회복지일선관료와 복지대상자의 역학관계에 미친 영향)

  • Kim, Suyoung
    • Korean Journal of Social Welfare Studies
    • /
    • v.49 no.1
    • /
    • pp.335-374
    • /
    • 2018
  • It is anticipated that the introduction of ICT to street-level welfare administration will smoothen communication processes between frontline officials and recipients by intensifying welfare information sharing and distribution. However, through a case study of ICT-mediated street-level welfare administration in South Korea, this article claims that ICT can deteriorate frontline official-recipient relationship into more distrustful and disempowered directions. This study demonstrates that ICT tends to replace face-to-face rapport building between officials and recipients with mechanical checking and complaining processes. ICT-based welfare administration can also disempower the autonomous interactions of street-level actors by surveiling every working step of frontline officials and the daily lives of recipients. Through an investigation into street-level bureaucracy in an information society, this study criticizes the dehumanization tendency of ICT-mediated human services and raises a question in the roseate vision on social welfare informatization.

Research Trends and Considerations of Security Technology of Industrial Control System (산업제어시스템의 보안 기술 연구 동향 및 고찰)

  • Lee, Young Hun;Ryu, Jung Hyun;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.05a
    • /
    • pp.149-152
    • /
    • 2018
  • 최근 국가기반시설을 제어하고 관리하는 산업제어시스템에 대한 사이버보안 위협이 증가함에 따라 보안의 중요성이 증가하고 있다. 산업제어시스템에서의 보안 기술은 일반적인 IT 시스템의 보안 기술과는 많은 차이가 있다. 산업제어시스템과 IT 시스템은 인간이 컴퓨터 시스템을 통해 정보를 처리하는 것은 같지만 IT 시스템은 정보 처리의 효율성을 위해 시스템을 사용하는 반면, 산업제어 시스템은 시스템의 효율성을 위해 정보를 처리하는 부분으로 이에 알맞은 새로운 보안 체계 구성이 필요하다. 초기에는 폐쇄망 위주로 구성되었던 산업제어시스템에서 ICT(Information & Communication Technology) 발전으로 외부로부터의 사이버 위협이 가중되었다. 편리성과 효율성이 증대된 만큼 ICT의 취약점 또한 산업제어시스템에서 문제가 발생하고 있지만, 현재 산업제어시스템의 보안 기술에 대해서는 국내에 널리 알려지지 않고 있다. 본 논문에서는 산업제어시스템 및 보안정책에 대해 논의한다. 관련 보안사고의 사례 및 보안 기술을 살펴봄으로써 미래 산업제어시스템의 발전과 보안 공격에 대한 충분한 보안체계를 구축하여 종합적이고, 적합한 보안 대책을 마련하는 것에 도움이 될 것이다.

A Coexistence Model in a Dynamic Platform with ICT-based Multi-Value Chains: focusing on Healthcare Service (ICT 기반 다중 가치사슬의 동적 플랫폼에서의 공존 모형: 의료서비스를 중심으로)

  • Lee, Hyun Jung;Chang, Yong Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.69-93
    • /
    • 2017
  • The development of ICT has leaded the diversification and changes of supplies and demands in markets. It also caused the creations of a variety of values which are differentiated from those in the existing market. Therefore, a new-type market is created, which can include multi-value chains which are from ICT-based created markets as well as the existing markets. We defined the platform as the new-type market. In the platform, the multi-value chains can be coexisted with multi-values. In true market, when a new-type value chain entered into an existing market, it is general that it can be conflicted with the existing value chain in the market. The conflicted problem among multi-value chains in a market is caused by the sharing of limited market resources like suppliers, consumers, services or products among the value chains. In other words, if there are multi-value chains in the platform, then it is possible to have conflictions, overlapping, creations or losses of values among the value chains. To solve the problem, we introduce coexistence factors to reduce the conflictions to reach market equilibrium in the platform. In the other hand, it is possible to lead the creations of differentiated values from the existing market and to augment the total market values in the platform. In the early era of ICT development, ICT was introduced for improvement of efficiency and effectiveness of the value chains in the existing market. However, according to the changed role of ICT from the supporter to the promotor of the market, ICT became to lead the variations of the value chains and creations of various values in the markets. For instance, Uber Taxi created a new value chain with ICT-based new-type service or products with new resources like new suppliers and consumers. When Uber and Traditional Taxi services are playing at the same time in Taxi service platform, it is possible to create values or make conflictions among values between the new and old value chains. In this research, like Uber and traditional taxi services, if there are conflictions among the multi-value chains, then it is necessary to minimize the conflictions in the platform for the coexistence of multi-value chains which can create the value-added values in the platform. So, it is important to predict and discuss the possible conflicted problems between new and old value chains. The confliction should be solved to reach market equilibrium with multi-value chains in the platform. That is, we discuss the possibility of the coexistence of multi-value chains in the platform which are comprised of a variety of suppliers and customers. To do this, especially we are focusing on the healthcare markets. Nowadays healthcare markets are popularized in global market as well as domestic. Therefore, there are a lot of and a variety of healthcare services like Traditional-, Tele-, or Intelligent- healthcare services and so on. It shows that there are multi-suppliers, -consumers and -services as components of each different value chain in the same platform. The platform can be shared by different values that are created or overlapped by confliction and loss of values in the value chains. In this research, as was said, we focused on the healthcare services to show if a platform can be shared by different value chains like traditional-, tele-healthcare and intelligent-healthcare services and products. Additionally, we try to show if it is possible to increase the value of each value chain as well as the total value of the platform. As the result, it is possible to increase of each value of each value chain as well as the total value in the platform. Finally, we propose a coexistence model to overcome such problems and showed the possibility of coexistence between the value chains through experimentation.

A Study of Advance Operation and Maintenance technology for Smart Water Grid(SWG) Facility (스마트워터그리드 시설 운영 및 유지관리 고도화 실증 연구)

  • Han, Kuk Heon;Yum, Kyung Taek;Koo, Kang Min
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.426-426
    • /
    • 2018
  • 제 4차 산업혁명의 시대를 맞아 ICT 융합 차세대 물관리 시스템 관련 기술이 핵심적인 역할을 수행하게 될 것으로 예상되며, 이와 함께 다국적 기업의 시장 진출로 인한 경쟁심화가 예상되고 있다. 한편, 인구증가, 도시성장, 산업발전 및 기후변화에 따른 물부족, 물 수요와 물 공급의 불균형, 수질오염 등은 점점 더 심각해질 것으로 예상되고 있다. 또한, 수자원 산업에서 대상시설의 안전하고 경제적인 운영 및 유지관리를 목적으로 하는 운전, 감시, 진단, 보수, 개선 및 이를 위한 의사결정지원 기술인 운영관리(O&M, Operation and Maintenance) 기술의 중요성이 지속적으로 증가하는 추세이다. 스마트워터그리드(SWG)는 ICT 융복합 첨단 수자원 관리기술로 기후변화에 의한 물 부족과 수자원 인프라 노후화로 인한 효율저하 등 물 문제 해결을 위한 차세대 플랫폼으로 주목받고 있으나, 아직까지 스마트워터그리드 시스템 구축을 위한 장치, 부품, 공정, 설계, 시공 기술 등 주로 요소기술 확보를 목적으로 연구되었으며, 시설의 운영 및 유지관리 연구는 거의 진행되지 않아 효율적인 현장적용이 어려운 실정이다. 본 연구에서는 스마트워터그리드 데모플랜트 시설을 대상으로 운영 유지관리 기술의 고도화 기본방향, 세부 핵심기술, 추진방법 등을 제시하고자 한다. 특히 스마트워터그리드의 핵심기술인 AMI 기반 수운영 시스템을 대상으로 IoT 기반의 고효율 저비용 물 공급 체계 고도화 및 지능형 통합 운영 플랫폼 구축, Hybrid형 다중수원 활용 이동식 물 생산 시스템에 대한 운전제어 자가진단 운영관리 유지보수기술 등 원격 무인 자동화 물 생산시설 기술 고도화 개발방안에 대하여 중점적으로 다루고자 한다.

  • PDF

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

A Study on the Risk Analysis and Fail-safe Verification of Autonomous Vehicles Using V2X Based on Intersection Scenarios (교차로 시나리오 기반 V2X를 활용한 자율주행차량의 위험성 분석 및 고장안전성 검증 연구)

  • Baek, Yunseok;Shin, Seong-Geun;Park, Jong-ki;Lee, Hyuck-Kee;Eom, Sung-wook;Cho, Seong-woo;Shin, Jae-kon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.6
    • /
    • pp.299-312
    • /
    • 2021
  • Autonomous vehicles using V2X can drive safely information on areas outside the sensor coverage of autonomous vehicles conventional autonomous vehicles. As V2X technology has emerged as a key component of autonomous vehicles, research on V2X security is actively underway research on risk analysis due to failure of V2X communication is insufficient. In this paper, the service scenario and function of autonomous driving system V2X were derived by presenting the intersection scenario of the autonomous vehicle, the malfunction was defined by analyzing the hazard of V2X. he ISO26262 Part3 process was used to analyze the risk of malfunction of autonomous vehicle V2X. In addition, a fault injection scenario was presented to verify the fail-safe of the simulation-based intersection scenario.