• Title/Summary/Keyword: IT융합 솔루션

Search Result 141, Processing Time 0.025 seconds

Fire Alarm Solutions Through the Convergence of Image Processing Technology and M2M (영상처리기술과 M2M의 융합을 통한 화재 경보 솔루션)

  • Kang, Bo-Seon;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.1
    • /
    • pp.37-42
    • /
    • 2016
  • Recent advances have been made in technology of sensor devices. Accordingly, the size of devices has been miniaturized, to which diverse functions can be applied. On top of that, the devices use image processing technology to observe circumstances of users' living spaces and detect risk situations saved in database. In case of detecting risk situations, M2M environment is constructed so that the information can be delivered to other communication devices to immediately raise an alarm. This paper aims to introduce solutions that construct M2M environment by using color detection algorithm of OpenCV and Raspberry Pi, raise an alarm to users in case of fire, and provide information on follow-up measures for it.

A Study on Zero Trust Technology Trends (제로 트러스트 기술 동향에 관한 연구)

  • Miyeon Kim;DaeGyeom Kim;Jong-Min Jang;Sang-Jun Park;Souhwan Jung;Jungsoo Park
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.15-26
    • /
    • 2023
  • Due to the global COVID-19 pandemic, which has led to a shift towards remote work, the frequency of external access to important internal resources by companies has increased exponentially, exposing them to various security threats. In order to address these access security issues, ZTA (Zero Trust Architecture) has gained attention. ZTA operates on the principle of not trusting external or internal users, and manages access authentication and authorization strictly according to pre-established policies. This paper analyzes the definition of ZTA and key research trends, and summarizes different ZTA solutions for each company.

PQ-PoRR: Post-Quantum Blockchain Consensus Algorithm with Round-Robin (PQ-PoRR: 라운드로빈 기반 양자 내성 블록체인 합의 알고리즘)

  • Won-Woong Kim;Yea-Jun Kang;Hyun-Ji Kim;Yu-Jin Oh;Hwa-Jeong Seo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.257-259
    • /
    • 2023
  • 양자 컴퓨터의 발전과 쇼어 알고리즘을 통한 ECC(Eliptic Curve Cryptography)에 대한 다항 시간의 솔루션을 제공함으로써 블록체인의 안정성이 위협받고 있다. 본 논문에서는 Round-Robin을 기반으로 하는 알고리즘을 제안함으로써 블록 생성에 대한 공정성을 제공하며 양자 내성 전자 서명인 CRYSTALS-DIlithium을 적용함으로써 근미래에 다가올 양자 위험성에 대비하였다. TPS 측면에서는 DIlithium의 큰 키 크기와 큰 서명 크기에 의해 ECDSA에 비해 낮은 성능을 보여주었지만, Latency 측면에서는 더욱 높은 성능을 보여주며, 이는 실시간성이 중요한 IoT와 같은 분야에서 더욱 높은 효용성을 보여줌을 알 수 있다.

Big Data-based Sensor Data Processing and Analysis for IoT Environment (IoT 환경을 위한 빅데이터 기반 센서 데이터 처리 및 분석)

  • Shin, Dong-Jin;Park, Ji-Hun;Kim, Ju-Ho;Kwak, Kwang-Jin;Park, Jeong-Min;Kim, Jeong-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.117-126
    • /
    • 2019
  • The data generated in the IoT environment is very diverse. Especially, the development of the fourth industrial revolution has made it possible to increase the number of fixed and unstructured data generated in manufacturing facilities such as Smart Factory. With Big Data related solutions, it is possible to collect, store, process, analyze and visualize various large volumes of data quickly and accurately. Therefore, in this paper, we will directly generate data using Raspberry Pi used in IoT environment, and analyze using various Big Data solutions. Collected by using an Sqoop solution collected and stored in the database to the HDFS, and the process is to process the data by using the solutions available Hive parallel processing is associated with Hadoop. Finally, the analysis and visualization of the processed data via the R programming will be used universally to end verification.

A Study on the Method to Improve Manufacturing Process Using Motion Analysis Solution (동작분석 솔루션을 활용한 제조공정개선 방법연구)

  • Kim, Hyun-Jong;Yoo, Jae-Gun;Hong, Jung-Wan
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.6
    • /
    • pp.69-75
    • /
    • 2018
  • Efficiency of Process in manufacturing industry is a critical factor to connect directly to competitiveness of product. In particular, due to FTAs with various worlds around the world, the domestic and overseas manufacturing industries are facing intense competitions, and it requires elaborate task management system for shortening production time. This study aims at seeking how to raise efficiency of manufacturing process, using motion analysis solution. When improving the process of manufacturing after verifying optimization using motion analysis solution, it can save costs for additional process, modification, or supplement. It can also deduce practical effect to improve productivity of companies. It is expected that the study will contribute to improve wastes in the work field and task assignment efficiency, to shorten time replacing equipment, to measure standard time, and to standardize task system.

Metaverse Artifact Analysis through the Roblox Platform Forensics (메타버스 플랫폼 Roblox 포렌식을 통한 아티팩트 분석)

  • Yiseul Choi;Jeongeun Cho;Eunbeen Lee;Hakkyong Kim;Seongmin Kim
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.37-47
    • /
    • 2023
  • The growth of the metaverse has been accelerated by the increased demand for non-face-to-face interactions due to COVID-19 and advancements in technologies such as blockchain and NFTs. However, with the emergence of various metaverse platforms and the corresponding rise in users, criminal cases such as ransomware attacks, copyright infringements, and sexual offenses have occurred within the metaverse. Consequently, the need for artifacts that can be utilized as digital evidence within metaverse systems has increased. However, there is a lack of information about artifacts that can be used as digital evidence. Furthermore, metaverse security evaluation and forensic analysis are also insufficient, and the absence of attack scenarios and related guidelines makes forensics challenging. To address these issues, this paper presents artifacts that can be used for user behavior analysis and timeline analysis through dynamic analysis of Roblox, a representative metaverse gaming solution. Based on analyzing interrelationship between identified artifacts through memory forensics and log file analysis, this paper suggests the potential usability of artifacts in metaverse crime scenarios. Moreover, it proposes improvements by analyzing the current legal and regulatory aspects to address institutional deficiencies.

Wearable Convergence Platform and Convergence Interface Configuration (웨어러블 융합플랫폼과 융합인터페이스 구성)

  • Lee, Tae-Gyu;Nam, Chae-Woo;Ann, Seoung-Ryeul
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.1067-1070
    • /
    • 2015
  • 최근 들어 웨어러블 정보기기 및 기술은 세계적인 IT회사와 스포츠 및 아웃도어회사의 지속적인 투자와 관심으로 급격한 시장파급효과를 나타내며, 사회적 이슈들을 창출하고 있다. 특히, 애플 및 삼성전자의 웨어러블 왓치를 비롯하여, 코오롱과 아디다스, 나이키 등의 전형적인 의류스포츠 회사의 IT융합에 대한 투자와 관심은 새로운 웨어러블 정보화에 대한 사회적 기대감을 한층 더 끌어올리고 있는 실정이다. 그럼에도 불구하고, 아직 웨어러블 컴퓨팅과 정보화의 현실은 배터리, 휴대성, 중복성, 인터페이스 등의 다양한 웨어러블 기술의 한계생과 더불어, 미숙한 시장 환경과 부정확한 고객의 니즈가 웨어러블 정보시스템의 미래를 불투명하게 하고 있다. 본 연구는 이러한 웨어러블 정보시스템과 사용자 요구사항의 불확실성과 기술의 지속적 변화에 대처하기 위해서, 다양한 솔루션을 담을 수 있는 웨어러블 융합플랫폼과 의류와 IT가 연동 가능한 융합인터페이스 구성을 제안하고자 한다. 본 웨어러블 융합플랫폼은 디지털의류와 IT기술의 인터페이싱(Interfacing), 기술이력축적, 편의성향상 및 개발자확대, 표준 사용자요구사항분석, 기기효율성강화, 경제적인 웨어러블정보시스템 구축 등의 효과를 극대화시키고자 한다.

Convergence Network Architecture for Global Manufacturing Execution System (글로벌 제조실행시스템을 위한 융합네트워크 구조)

  • Lee, Tae-Gyu;Shin, Seong-Yoon;Lee, Hyun-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.211-214
    • /
    • 2014
  • Nowadays, manufacturing field are facing new challenges, through digital information and global integration, toward sophisticated production. This paper presents the system configuration and issues of current manufacturing execution system(MES), and describes major issues and solving elements to establish a MES system for cloud services. Also, it proposes business intelligence(BI) systems for building a manufacturing information system to have the optimized production flow and to respond appropriately to consumer market.

  • PDF

A Study of Authentication Scheme based on Personal Key for Safety Intelligent Vehicle (안전한 지능형 자동차를 위한 개인키 기반의 인증 기법에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.549-554
    • /
    • 2014
  • Studies on the intelligent vehicles that are converged with IT and vehicular technologies are currently under active discussion. A variety of communication technologies for safety intelligent vehicle services are support. As such intelligent vehicles use communication technologies, they are exposed to the diverse factors of security threats. To conduct intelligent vehicle security authentication solutions, there are some factors that can be adopted ownership, knowledge and biometrics[6,7]. This paper proposes to analyze the factors to threaten intelligent vehicle, which are usually intruded through communication network system and the security solution using biometric authentication scheme. This study proposed above user's biometrics information-based authentication scheme that can solve the anticipated problems with an intelligent vehicle, which requires a higher level of security than existing authentication solution.

A Study on Classification and Processing of Events to Improve Efficiency of Convergence Security Control System (융합보안관제 시스템의 효율성 향상을 위한 이벤트 분류 및 처리에 관한 연구)

  • Kim, Sung Il;Kim, Jong Sung
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.41-49
    • /
    • 2017
  • According to a research by global IT market research institute IDC, CSIM(Converged Security Information Management) market of Korea was estimated to be 1.7 trillion KRW in 2010, and it has grown approximately 32% every year since. IDC forcasts this size to grow to 12.8 trillion KRW by 2018. Moreover, this case study exemplifies growing importance of CSIM market worldwide. Traditional CSIM solution consists of various security solutions(e.g. firewall, network intrusion detection system, etc.) and devices(e.g. CCTV, Access Control System, etc.). With this traditional solution, the the data collected from these is used to create events, which are then used by the on-site agents to determine and handle the situation. Recent development of IoT industry, however, has come with massive growth of IoT devices, and as these can be used for security command and control, it is expected that the overall amount of event created from these devices will increase as well. While massive amount of events could help determine and handle more situations, this also creates burden of having to process excessive amount of events. Therefore, in this paper, we discuss potential events that can happen in CSIM system and classify them into 3 groups, and present a model that can categorize and process these events effectively to increase overall efficieny of CSIM system.