• Title/Summary/Keyword: ICT 기반 시스템

Search Result 713, Processing Time 0.023 seconds

Comparison of propagation models based on DTV field strength measurement in urban environment (대도심 DTV 전계강도 측정에 기반한 전파예측 모델 비교)

  • Kang, Young-Heung;Kwon, Yong-Ki;Kim, Hyeong-Seob
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.5
    • /
    • pp.484-490
    • /
    • 2013
  • With the rapid development of wireless communication at VHF and UHF bands, there is an increasing need for the reliable propagation prediction tools. Therefore, the different propagation models that have been developed in many countries as well as korea has been trying to secure a model suitable for their geographical area but then it is giving us a different result when we compared it to measured values. In this paper, based on the measurements of DTV broadcasting services in domestic urban area, analysis and comparison of ITU-R P.1546 and BCAST models provide errors between measured and predicted values, and some points for improving SMI system has been proposed. As a result, P.1546 model provides the valid predicted data similar to measured data, but BCAST model has some problems of large deviation and higher prediction to measured data. In future, these problems and diffractions due to high buildings need to be studied further.

Design of Mobile-based Security Agent for Contents Networking in Mixed Reality (융합현실에서 콘텐츠 네트워킹을 위한 모바일 기반 보안 중계 설계)

  • Kim, Donghyun;Lim, Jaehyun;Kim, Seoksoo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.22-29
    • /
    • 2019
  • Due to the development of ICT technology, convergence reality contents are utilized as technology for providing services in various industrial fields by visualizing various information such as sensor information and shared information in a service platform showing only simple three-dimensional contents. Research is underway to reduce the weight of applications by transmitting the resources of the object to be enhanced to the network as the information and the contents to be provided increase. In order to provide resources through the network, servers for processing various information such as pattern information, content information, and sensor information must be constructed in a cloud environment. However, in order to authenticate data transmitted and received in real-time in a cloud environment, there is a problem in that the processing is delayed and a delay phenomenon occurs in the rendering process and QoS is lowered. In this paper, we propose a system to distribute cloud server which provides augmented contents of convergent reality service that provides various contents such as sensor information and three - dimensional model, and shorten the processing time of reliable data through distributed relay between servers Respectively.

A study on the actual precision shooting training based on virtual reality (가상현실 기반 실전적 정밀사격훈련 구현 연구)

  • Lee, Byounghwak;Kim, Jonghwan;Shin, Kyuyoung;Kim, Dongwook;Lee, Wonwoo;Kim, Namhyuk
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.62-71
    • /
    • 2018
  • The rapid growth of virtual reality technology in the era of the 4th Industrial Revolution has accelerated scientification of combat training systems in addition to ICT(information and communications technology) in military field. Recently, research and development of simulators based on virtual reality have been actively conducted in order to solve sensitive issues such as increase of civil complaints due to the noise of a shooting range, prevention of shooting accident, and reduction of training cost. In this paper, we propose two key solutions: spatial synchronization method and modified point mass trajectory model with small angle approximation to overcome technical limitations of a current training simulator. A trainee who wears a haptic vest in a mixed reality environment built in MARS(medium-range assault rifle shooting simulator) is able to conduct not only precision shooting but also two-way engagement with virtual opponents. It is possible for trainee to receive more reliable evaluations in the MARS than an existing rifle simulator based on laser.

  • PDF

기술혁신이 디지털 헬스케어 수용성에 미치는 영향 연구: 확장된 통합기술수용모델 기반 스마트워치 혁신기술 매개효과 중심

  • Jin, Ik-Seong;Lee, So-Yeong
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2022.11a
    • /
    • pp.95-104
    • /
    • 2022
  • 근래 지구온난화에 따른 자연재해의 증가와 장기 코로나19의 전염으로 사회적 비대면 필요성이 증대되면서 온라인을 통한 건강관리 및 의료 진단·처방 등 디지털 헬스케어의 필요성이 증대되고 있다. 디지털 헬스케어로 기존 병원 진료의 온라인 원격 진료/처방이 지속 증가하고 있을 뿐만 아니라 관련 빅데이터를 모아 개인 건강과 질병 상태 정보를 취합하여 건강 관리 및 치료를 하는 디지털 치료제 개발이 급속 진행되고 있으며 관련 벤처 창업도 활발히 진행되고 있다. 이러한 디지털 헬스케어, 디지털 치료제 산업의 활성화는 각 개인의 신체 상태를 상시 측정하고 이 정보를 관련 시스템과 연동 할 수 있는 웨어러블 디바이스, 특히 스마트워치의 보급 증대에 힘입은 바가 크다. 본 연구에서는 스마트워치의 기술혁신이 디지털 헬스케어의 수용성에 어떻게 영향을 미치는지 확장된 통합기술수용모델을 적용하여 분석하고, 혁신 사례로 스마트워치를 활용한 디지털 수면 치료제 벤처 개발 현황을 제시하였다. 본 연구를 통해 확인한 결과는 다음과 같다. 첫째 디지털 헬스케어 스마트워치의 개인혁신성, 효용가치, 사용편의 등 ICT 변인들에 대한 기술발전의 매개 영향은 유의한 것으로 나타났다. 둘째 ICT 변인들과 기술발전 매개변수는 디지털 헬스케에 스마트워치 수용의도에 대부분 정(+)의 영향을 미치는 것으로 확인되었다. 단 기술발전은 개인혁신성에는 크게 매개하지 않는 것으로 나타났다. 이러한 혁신기술의 디지털 헬스케어 스마트워치 수용의도 영향 평가 결과는 스마트워치 각종 서비스 상품기획과 마케팅에 유효하게 참조 할 수 있을 것으로 보이며 추후 세분화 연구를 통하여 더욱 소비자 특화된 제품과 서비스를 창출하는데 기여 할 수 있을 것으로 사료 된다.

  • PDF

A Study on Pipeline Design Methods for Providing Secure Container Image Registry (안전한 컨테이너 이미지 레지스트리 제공을 위한 파이프라인 설계 방안에 관한 연구)

  • Seong-Jae Ko;Sun-Jib Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.21-26
    • /
    • 2023
  • The development and distribution approach of applications is transitioning from a monolithic architecture to microservices and containerization, a lightweight virtualization technology, is becoming a core IT technology. However, unlike traditional virtual machines based on hypervisors, container technology does not provide concrete security boundaries as it shares the same kernel. According to various preceding studies, there are many security vulnerabilities in most container images that are currently shared. Accordingly, attackers may attempt exploitation by using security vulnerabilities, which may seriously affect the system environment. Therefore, in this study, we propose an efficient automated deployment pipeline design to prevent the distribution of container images with security vulnerabilities, aiming to provide a secure container environment. Through this approach, we can ensure a safe container environment.

A Study on Efficient BACnet/SC to ensure Data Reliability in Wireless Environments (무선 환경에서 데이터의 신뢰성을 보장하는 효율적인 BACnet/SC 개선 방안 연구)

  • Seo-yeon Kim;Sung-sik Im;Dong-woo Kim;Su-jin Han;Ki-chan Lee;Soo-hyun Oh
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.11-20
    • /
    • 2024
  • Recently, smart buildings that can efficiently manage energy using ICT technology and operate and control through the building automation system by collecting data from a large number of IoT sensors in real time are attracting attention. However, as data management is carried out through an open environment, the safety of smart buildings is threatened by the security vulnerability of the existing building automation protocol. Therefore, in this paper, we analyze the major data link technology of BACnet, which is used universally, and propose OWE-based efficient BACnet/SC that can ensure the reliability of data in a wireless environment. The proposed protocol enables safe communication even in an open network by applying OWE and provides the same level of security as BACnet/SC in a TLS environment. As a result, it reduces the connection process twice and reduces the average time required by 40%, enabling more efficient communication than before.

A Study on the Development of Adversarial Simulator for Network Vulnerability Analysis Based on Reinforcement Learning (강화학습 기반 네트워크 취약점 분석을 위한 적대적 시뮬레이터 개발 연구)

  • Jeongyoon Kim; Jongyoul Park;Sang Ho Oh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.21-29
    • /
    • 2024
  • With the development of ICT and network, security management of IT infrastructure that has grown in size is becoming very difficult. Many companies and public institutions are having difficulty managing system and network security. In addition, as the complexity of hardware and software grows, it is becoming almost impossible for a person to manage all security. Therefore, AI is essential for network security management. However, since it is very dangerous to operate an attack model in a real network environment, cybersecurity emulation research was conducted through reinforcement learning by implementing a real-life network environment. To this end, this study applied reinforcement learning to the network environment, and as the learning progressed, the agent accurately identified the vulnerability of the network. When a network vulnerability is detected through AI, automated customized response becomes possible.

A Study on the Accessibility Requirements Analysis Model for the Preventive Safety and Disaster Service Information System - Focusing on the Communication Ability (정보시스템을 통한 생활안전 위험의 예방·대응을 위한 안전약자 요구사항 분석모델 연구 : 의사소통기능을 중심으로)

  • Lee, Yong-Jick;Ji, Seok-yeon;Kim, Sang-hwa
    • The Journal of Korean society of community based occupational therapy
    • /
    • v.10 no.3
    • /
    • pp.1-13
    • /
    • 2020
  • Objective : The purpose of this study is to present an analysis model in developing an inclusive response for safety hazards and disaster preventive information system for vulnerable people to the disaster including persons with disabilities, and those with specific needs. Methods : In this study, the persona analysis method is used to analyze fictitious characters that correspond to various characteristics such as age, disability, environment, occupation, etc. in terms of the scenario of some particular disaster subjects. Based on the user's communication problems derived from the persona analysis, focused group interview and ICF based analysis were implemented to identify needs and arbitration methods. Results : The needs from persona analysis and ICF-based communication items analysis identifies the factors that make each fictitious character difficult in terms of communication in obtaining the benefits consistent with the purpose of the service. The study derives service requirements that can provide arbitration or facilitation methods to increase communication ability of the users. Conclusion : Through the persona analysis method, difficulties that could occur when receiving disaster information using communication devices were identified and analyzed in conjunction with communication problems described in the ICF. In building information services for the prevention of safety hazards and disasters, this study presented a model that uses the persona analysis method and the ICF classification system to derive user requirements for accessible information system.

A Study on Optimized Disaster Broadcasting Service for Vulnerable Populations based on ATSC 3.0 Standards (ATSC 3.0 기반 재난약자 맞춤형 재난방송서비스에 대한 연구)

  • Kim, Nayeon;Hyun, Eunhee;Bae, Byungjun
    • Journal of Broadcast Engineering
    • /
    • v.24 no.6
    • /
    • pp.928-938
    • /
    • 2019
  • Republic of Korea has established 'Transmission and Reception for Terrestrial UHDTV Broadcasting Service' standard based on ATSC 3.0, the next-generation broadcasting standard in North America and is now providing commercial services. Republic of Korea has been studying terrestrial UHDTV based disaster broadcasting service using the ATSC 3.0 AEA system's technology since 2018. ATSC 3.0 has established a standard for expanding disaster broadcasting services, which were used to be simple push-type text message broadcasting, by introducing bidirectional and rich-media transporting mechanisms. However, the disaster information is still focused on the general public, and disaster broadcasting service including detailed information for the vulnerable are still insufficient. In this paper, we proposed the optimized disaster broadcasting service for vulnerable populations based on ATSC 3.0 after defined the disaster vulnerable populations as the target of the service. And we defined the extension element of disaster broadcasting message for service provision. The proposed service can be an effective means to increase the possibility of disaster information reception and evacuation to vulnerable populations. In addition, it is expected to be used as a basic research for development of diverse and effective advanced services for vulnerable populations through linkage with existing disaster alerting and countermeasures studies.

Analysis of Health Care Service Trends for The Older Adults Based on ICT (국내외 ICT기반 노인 건강관리 서비스 동향분석)

  • Lee, Sung-Hyun;Hong, Sung Jung;Kim, Kyung Mi
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.5
    • /
    • pp.373-383
    • /
    • 2021
  • Our society is aging rapidly. In this super-aged society, the increase in healthcare costs are considered a national problem that undermines the sustainability of social security. Various services for healthcare for the elderly have been promoted to address this. However, most of them have focused on healthcare after the outbreak of chronic diseases and lack preventive healthcare. Most of the preventive healthcare projects are only pilots. In this paper, the current status of health care services for senior citizens at home and abroad was analyzed and based on this, the limitations and improvements were analyzed to propose the establishment of IoT-based Total Silver Care Center. IoT-based Total Silver Care Center may be conveniently monitored the health status of the elderly through various sensors, medical devices, and smart bands. And based on this, it can improve the quality of nursing services through time-saving and work efficiency of nursing providers. In addition, health care interventions may be provided in a timely manner if there is a change in the health status of users. And real-time imaging systems can help overcome mental difficulties.