• Title/Summary/Keyword: ICT Use

Search Result 854, Processing Time 0.027 seconds

A Study on Contract Management Platform Based on Blockchain (블록체인 기반의 계약관리 플랫폼 연구)

  • Kim, Sunghwan;Kim, Younggon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.97-103
    • /
    • 2019
  • Electronic contract systems are widely used to integrate and manage the contract management process based on the development of ICT technology. Recently, improvement methods using block chain technology are being studied. However, contract management systems have processing performance, security vulnerabilities, data entry, and service accessibility issues. In this paper, we propose a block - chain based contract management platform with block chain, smart contract, and Rest API. The suggested platform includes the RPBFT algorithm which solves the processing performance and security vulnerability of the existing consensus authentication algorithm, and the algorithm to prevent data entry and enhance transparency of participants. The block-chain-based contract management platform proposed in this paper provides a use environment with improved processing performance, security, reliability, and transparency, and can be used through API without burdening construction. Therefore, The effect can be expected.

NGSOne: Cloud-based NGS data analysis tool (NGSOne: 클라우드 기반의 유전체(NGS) 데이터 분석 툴)

  • Kwon, Chang-hyuk;Kim, Jason;Jang, Jeong-hwa;Ahn, Jae-gyoon
    • Journal of Platform Technology
    • /
    • v.6 no.4
    • /
    • pp.87-95
    • /
    • 2018
  • With the decrease of sequencing price, many national projects that analyzes 0.1 to 1 million people are now in progress. However, large portion of budget of these large projects is dedicated for construction of the cluster system or purchase servers, due to the lack of programs or systems that can handle large amounts of data simultaneously. In this study, we developed NGSOne, a client program that is easy-to-use for even biologists, and performs SNP analysis using hundreds or more of Whole Genome and Whole Exome analysis without construction of their own server or cluster environment. DRAGEN, BWA / GATK, and Isaac / Strelka2, which are representative SNP analysis tools, were selected and DRAGEN showed the best performance in terms of execution time and number of errors. Also, NGSOne can be extended for various analysis tools as well as SNP analysis tools.

Design and Analysis of Technical Management System of Personal Information Security using Web Crawer (웹 크롤러를 이용한 개인정보보호의 기술적 관리 체계 설계와 해석)

  • Park, In-pyo;Jeon, Sang-june;Kim, Jeong-ho
    • Journal of Platform Technology
    • /
    • v.6 no.4
    • /
    • pp.69-77
    • /
    • 2018
  • In the case of personal information files containing personal information, there is insufficient awareness of personal information protection in end-point areas such as personal computers, smart terminals, and personal storage devices. In this study, we use Diffie-Hellman method to securely retrieve personal information files generated by web crawler. We designed SEED and ARIA using hybrid slicing to protect against attack on personal information file. The encryption performance of the personal information file collected by the Web crawling method is compared with the encryption decryption rate according to the key generation and the encryption decryption sharing according to the user key level. The simulation was performed on the personal information file delivered to the external agency transmission process. As a result, we compared the performance of existing methods and found that the detection rate is improved by 4.64 times and the information protection rate is improved by 18.3%.

A Study on Composition and Utilization of Digital Literacy Education elements Using Open Contents (오픈 콘텐츠를 활용한 디지털 리터러시 학습 요소 구성과 활용)

  • Hong, Myunghui;Lee, Soonyoung
    • Journal of The Korean Association of Information Education
    • /
    • v.22 no.6
    • /
    • pp.711-721
    • /
    • 2018
  • The development of artificial intelligence technology and the shift to a software-driven society are raising the need for digital literacy education on how to access, understand, use, create and share new open content in a variety of sustainable open content. At this point in time, this paper defines the digital literacy as the subliteracy concept for data, tools, and device elements. It is defined as a concept that includes cognitive and non-cognitive abilities and is stratified by computer literacy, ICT literacy, and information literacy. Open content is also defined as teaching-learning materials that can be used and shared freely by anyone, such as the Open Education Resource (OER) and the Open Access movement. Based on the two definitions, a three-step strategy for digital literacy education was developed to select open content in the digital environment, followed by a digital literacy education plan, and finally, an education frame to foster digital literacy capabilities.

Utilization and Prospect of Big Data Analysis of Sports Contents (스포츠콘텐츠의 빅데이터 분석 활용과 전망)

  • Kang, Seungae
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.121-126
    • /
    • 2019
  • The big data utilization category in the sports field was mainly focused on the big data analysis to improve the competence of the athlete and the performance. Since then, 'big data technology' which collect and analyze more detailed and diverse data through the application of ICT technology such as IoT and AI has been applied. The use of big data of sports contents in future has value and possibility in the smart environment, but it is necessary to overcome the shortage and limitation of platform to manage and share sports contents. In order to solve such problems, it is important to change the perception of the companies or providers that provide sports contents and cultivate and secure professional personnel capable of providing sports contents. Also, it is necessary to implement policies to systematically manage and utilize big data poured from sports contents.

Research on Countermeasure of SQL Injection Attack (SQL Injection 공격을 효율적으로 방어하는 대응책 연구)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.10
    • /
    • pp.21-26
    • /
    • 2019
  • At present, it is indispensable to utilize data as an information society. Therefore, the database is used to manage large amounts of data. In real life, most of the data in a database is the personal information of a group of members. Because personal information is sensitive data, the role of the database administrator who manages personal information is important. However, there is a growing number of attacks on databases to use this personal information in a malicious way. SQL Injection is one of the most known and old hacking techniques. SQL Injection attacks are known as an easy technique, but countermeasures are easy, but a lot of efforts are made to avoid SQL attacks on web pages that require a lot of logins, but some sites are still vulnerable to SQL attacks. Therefore, this study suggests effective defense measures through analysis of SQL hacking technology cases and contributes to preventing web hacking and providing a secure information communication environment.

Security Improvement Methods for Computer-based Test Systems (컴퓨터 기반 평가 시스템의 보안성 강화 방안)

  • Kim, Sang Hyun;Cho, Sang-Young
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.33-40
    • /
    • 2018
  • ICT technology has been applied to various educational fields, but applying to educational test field is limited. Computer-based test (CBT) can overcome temporal and spatial constraints of conventional paper-based test, but is vulnerable to fraud by test parties. In this paper, we propose real-time monitoring and process management methods to enhance the security of CBT. In the proposed methods, the test screens of students are periodically captured and transferred to the professor screen to enable real-time monitoring, and the possible processes used for cheating can be blocked before testing. In order to monitor the screen of many students in real time, effective compression of the captured original image is important. We applied three-step compression methods: initial image compression, resolution reduction, and re-compression. Through this, the original image of about 6MB was converted into the storage image of about 3.8KB. We use the process extraction and management functions of Windows API to block the processes that may be used for cheating. The CBT system of this paper with the new security enhancement methods shows the superiority through comparison of the security related functions with the existing CBT systems.

  • PDF

Using Learning Management Systems for Self-directed Learning of Elementary School Students (초등학생의 자기주도학습을 위한 LMS 활용방안)

  • Lee, Ju-Sung;Chun, Seok-Ju
    • Journal of The Korean Association of Information Education
    • /
    • v.23 no.2
    • /
    • pp.159-167
    • /
    • 2019
  • Recently, a learning management system incorporating ICT technology into learning has helped students improve self-directed learning skills. Self-directed learning using LMS promotes and stimulates learners' participation in learning, focusing on the advantages of efficient use of learning resources and the spread of communication. In this study, we study the impact of self-directed learning using the learning management system on elementary school students' motivation and academic performance. We expect learners will be able to achieve effective academic achievement by learning problems that fit their level through the algorithms of the proposed learning management system. For this study, a total of 16 classes were conducted for eight weeks using the proposed learning management system for 21 elementary school students. Research has shown significant improvement in the learning orientation and interest areas of the learners who participated in the experiment.

Coin Classification using CNN (CNN 을 이용한 동전 분류)

  • Lee, Jaehyun;Shin, Donggyu;Park, Leejun;Song, Hyunjoo;Gu, Bongen
    • Journal of Platform Technology
    • /
    • v.9 no.3
    • /
    • pp.63-69
    • /
    • 2021
  • Limited materials to make coins for countries and designs suitable for hand-carry make the shape, size, and color of coins similar. This similarity makes that it is difficult for visitors to identify each country's coins. To solve this problem, we propose the coin classification method using CNN effective to image processing. In our coin identification method, we collect the training data by using web crawling and use OpenCV for preprocessing. After preprocessing, we extract features from an image by using three CNN layers and classify coins by using two fully connected network layers. To show that our model designed in this paper is effective for coin classification, we evaluate our model using eight different coin types. From our experimental results, the accuracy for coin classification is about 99.5%.

A collaborative Serious Game for fire disaster evacuation drill in Metaverse (재난 탈출 협동 훈련 기능성 게임의 메타버스 플랫폼 구현)

  • Lee, Sangho;Ha, Gyutae;Kim, Hongseok;Kim, Shiho
    • Journal of Platform Technology
    • /
    • v.9 no.3
    • /
    • pp.70-77
    • /
    • 2021
  • The purpose of Serious games in immersive Metaverse platform to provide users both fun and intriguing learning experiences. We proposes a serious game for self-trainable fire evacuation drill with collaboration among avatars synchronized with multiple trainees and optionally with real-time supervising placed at different remote physical locations. The proposed system architecture is composed of wearable motion sensors and a Head Mounted Display to synchronize each user's intended motions to her/his avatar activities in a cyberspace in Metaverse environment. The proposed system provides immersive as well as inexpensive environments for easy-to-use user interface for cyber experience-based fire evacuation training system. The proposed configuration of the user-avatar interface, the collaborative learning environment, and the evaluation system on the VR serious game are expected to be applied to other serious games. The game was implemented only for the predefined fire scenario for buildings, but the platform can extend its configuration for various disaster situations that may happen to the public.