• Title/Summary/Keyword: IT융합 솔루션

Search Result 141, Processing Time 0.024 seconds

A Proposal on Fintech Platform Model Based on Digitalized Securities to Activating the Independent Financial Advisory System (독립투자자문업 활성화를 위한 디지털 수익증권 기반 핀테크 플랫폼 모델 제안)

  • Moon, Myung-Deok;Kim, Sun-Woong;Choi, Heung Sik
    • Knowledge Management Research
    • /
    • v.23 no.1
    • /
    • pp.149-164
    • /
    • 2022
  • This paper analyzes the independent financial advisory business that is not yet active in Korea and proposes a plan to activate the independent financial advisory business using fintech technology. A bill was enacted in 2017 for the domestic independent financial advisory business, but it has not been activated much until now for various reasons. Although existing studies have proposed solutions in various ways, there is no clear solution yet. This paper proposes a new method of revitalizing the independent financial advisory business through fintech technology using the trust system that has recently attracted attention. Digital securities fintech technology using blockchain distributed ledger technology presents new possibilities in the real estate and music copyright markets, and related fintech venture companies continue to emerge in Korea. By combining these digital securities fintech technologies and the business process of ETF, a method was derived so that independent financial advisors can have their own financial products. The proposed model is more decentralized than the existing financial product sales structure, and presents the possibility of a protocol economy through a structure close to a private blockchain while complying with the existing financial order. This paper is meaningful in that it presented new solutions to completely different markets from information convergence perspectives on two completely different markets, and we hope that more business solutions will emerge through knowledge management activities that converge various perspectives in the future.

Implementation of small and medium IMS Core Main System (중·소형 IMS 코어 메인 시스템 구현)

  • Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.99-104
    • /
    • 2015
  • Service platform which can offer various multimedia communication as the video, audio, voice and data is IMS(IP Multi-Media Subsystem). It is effective in the company is introducing only such convergence IMS services to be required to provide various multimedia services at the lowest cost and existing communication environment while keeping the maximum Therefore, in this study, we had developed IMS 코어 main system that not more than 1,000 employees of companies can effectively establish IMS solutions. This system is located at the middle between IMS terminal and CSCF(Call Session Control Function) in line with IMS services and provides CSCF in response to the IMS terminal and IMS terminal in response to the CSCF. As well, corded telephone and SIP phone which were used as terminal is linked with gateway.

A Realization of Vessel Wireless Control System Employing FPGA (FPGA기반 선박 무선제어 시스템 구현)

  • Young Yun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.11a
    • /
    • pp.332-333
    • /
    • 2022
  • Recently, SpaceX, private enterprise dealing in space development company, has reported a plan for launching of 42,000 low earth orbit satellites until 2031 through Starlink Business, and launched 900 satellites until now. Concretely, it plans tp operate Ku/Ka band satellite, and launch 7,518 of V band satellites for broadband communication. Therefore, we can utilize wireless communication in an ocean, and various solutions through the low earth orbit satellites. This paper deals in a realization of wireless control system employing FPGA (Field Programmable Gate Array) for vessel applications.

  • PDF

Study on Miniaturized RF Components for Application to Ship Radio Communication (선박 무선통신 응용을 위한 초소형 RF 소자에 관한 연구)

  • Young Yun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.11a
    • /
    • pp.390-391
    • /
    • 2022
  • Recently, SpaceX, private enterprise dealing in space development company, has reported a plan for launching of low earth orbit satellites via Starlink Business, and launched 900 satellites until now. Concretely, it plans tp operate Ku/Ka band satellite, and launch 7,518 of V band satellites for broadband communication. Therefore, wireless communication service for ship will be provided, and various solutions will be offered through the low earth orbit satellites. In this work, we investigated RF characteristics of coplanar waveguide employing periodic 3D coupling structures, and examined its potential for a development of marine radio communication FISoC (fully-integrated system on chip) semiconductor device.

  • PDF

Study on validating proper System Requirements by using Cost Estimations Methodology (비용추정방법을 활용한 시스템요구사항 적정성 확인방안 연구)

  • Choi, Sung Kyu;Choi, Eun Ha
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.97-105
    • /
    • 2013
  • It is very important the government project should be supported by enough budget for proceeding. The insufficient budget by poor budget estimating uesd to bring about discontinuing for the project. This is originally caused by inaccuracy for cost estimating about system and evaluating for system requirements on the projet initial phase. The system requirements is technical requirements that converted the user needs and is needs for communicating between stakeholder and developer and manufacturer. Also the system requirements is the primary factor to make the project cost. The cost estimating is not easy due to complication of cost factors and an aberration between cost estimating and actual cost. Specially, on the project initial phase, shortage of detail information for project make more difficult to do cost estimating. This study proposes the architecture for validating proper system requirements by using cost estimations methodology on the project initial phase and shows the computer tool for simulating the proposed architecture.

Measures for Adware and Spyware (애드웨어 및 스파이웨어 대응기법)

  • Kim, Bae-Hyun;Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.41-47
    • /
    • 2006
  • Spyware is any technology that aids in gathering information about a person or organization with-out their knowledge. Software designed to serve advertising, known as adware, can usually be thought of as spyware as well because it almost invariably includes components for tracking and reporting user information. A piece of spyware and adware affect computers which can rapidly become infected with large numbers of spyware and adware components. Users frequently notice from un-wanted behavior and degradation of system performance, such as significant unwanted CPU activity, disk usage, and network traffic which thereby slows down legitimate uses of these resources. The presence of situation will continue because of rapid expansion of Internet usages. Therefore, security solutions, such as anti-adware and anti-spyware, for recovering these malfunction due to the malicious programs must be developed. However, studies on the malicious programs are still not sufficient. Accordingly, this paper has studied the malicious program techniques, based on the results of analysis of present adware and spyware techniques by employing collected samples, and presents efficient measures for blocking and remedying the malicious programs.

  • PDF

A Study on Smart EDR System Security Development (Smart EDR 시스템구축을 위한 보안전략과 발전방안)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.41-47
    • /
    • 2020
  • In the corporate information system environment, detecting and controlling suspicious behaviors occurring at the end point of the actual business application is the most important area to secure the organization's business environment. In order to accurately detect and block threats from inside and outside, it is necessary to be able to monitor all areas of all terminals in the organization and collect relevant information. In other words, in order to maintain a secure business environment of a corporate organization from the constant challenge of malicious code, everything that occurs in a business terminal such as a PC beyond detection and defense-based client security based on known patterns, signatures, policies, and rules that have been universalized in the past. The introduction of an EDR solution to enable identification and monitoring is now an essential element of security. In this study, we will look at the essential functions required for EDR solutions, and also study the design and development plans of smart EDR systems based on active and proactive detection of security threats.

MITRE ATT&CK and Anomaly detection based abnormal attack detection technology research (MITRE ATT&CK 및 Anomaly Detection 기반 이상 공격징후 탐지기술 연구)

  • Hwang, Chan-Woong;Bae, Sung-Ho;Lee, Tae-Jin
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.13-23
    • /
    • 2021
  • The attacker's techniques and tools are becoming intelligent and sophisticated. Existing Anti-Virus cannot prevent security accident. So the security threats on the endpoint should also be considered. Recently, EDR security solutions to protect endpoints have emerged, but they focus on visibility. There is still a lack of detection and responsiveness. In this paper, we use real-world EDR event logs to aggregate knowledge-based MITRE ATT&CK and autoencoder-based anomaly detection techniques to detect anomalies in order to screen effective analysis and analysis targets from a security manager perspective. After that, detected anomaly attack signs show the security manager an alarm along with log information and can be connected to legacy systems. The experiment detected EDR event logs for 5 days, and verified them with hybrid analysis search. Therefore, it is expected to produce results on when, which IPs and processes is suspected based on the EDR event log and create a secure endpoint environment through measures on the suspicious IP/Process.

Implementation of total management system for exhibitions and Convention using beacon (Beacon기술을 이용한 MICE시스템 설계 및 구현)

  • Kim, Young-Ick;Kim, Mijung;Kim, Hyu-Chan
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.2
    • /
    • pp.35-44
    • /
    • 2016
  • MICE industry is emerging as a new growth engine recently. Most of the domestic MICE events are carried out at low cost on a small scale. The event organizers want to cut down on costs of prints such as brochures and other promotional printed materials, as well as the personnel costs for the simple guide job needed on site, which are generated repeatedly and wastefully. The existing mobile web has a defect that the participants can't easily earn the information in the fixed menu, but have to search by themselves wasting lots of time. Therefore, it is necessary to develop the solution enables providing information efficiently at low cost for short-term use during the events. In this study, we implemented specific total management system for exhibitions and convention using beacon. The information system for exhibitions and events using beacon can raise the management efficiency, and the digital brochure function based on CMS heightens the information retrieval ability and also reduces costs. Organizers can manage their event efficiently in a small exhibition and convention event by running an online website and operate a site management system by them selves.

A Case Study on Global Educational Innovation using U-Learning Box and Ubiquitous-based Test (유러닝 박스와 유비쿼터스 기반의 시험 시스템을 이용한 글로벌 교육 혁신 사례 연구)

  • Hwang, Mintae;Bajracharya, Larsson
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.3
    • /
    • pp.279-288
    • /
    • 2018
  • In this paper, we present the results of educational innovation case study using U-Learning Box and Ubiquitous-based Test(UBT) system for 6 sample primary schools in Nepal. As Nepal is considered to be a developing country with electricity problem to the school, the U-Learning Box, consisting of a small and easy-to-use tablet PC for teacher and a small smart beam with its own battery was evaluated as the optimum solution to support continuous basic English and hygiene education for these schools. And UBT technology using tablet PC was used to evaluate and analyze basic English learning ability of the students, which helped us realized that it is necessary to improve the educational environment and develop suitable educational contents. We hope that the global educational innovation using U-Learning Box and UBT technology will become a successful model for global equality of educational opportunity project for developing countries including Nepal.