• Title/Summary/Keyword: Major information and communication infrastructure

Search Result 65, Processing Time 0.026 seconds

Cryptography in the Cloud: Advances and Challenges

  • Boyd, Colin
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.1
    • /
    • pp.17-23
    • /
    • 2013
  • Cloud computing is a currently developing revolution in information technology that is disturbing the way that individuals and corporate entities operate while enabling new distributed services that have not existed before. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Security is often said to be a major concern of users considering migration to cloud computing. This article examines some of these security concerns and surveys recent research efforts in cryptography to provide new technical mechanisms suitable for the new scenarios of cloud computing. We consider techniques such as homomorphic encryption, searchable encryption, proofs of storage, and proofs of location. These techniques allow cloud computing users to benefit from cloud server processing capabilities while keeping their data encrypted; and to check independently the integrity and location of their data. Overall we are interested in how users may be able to maintain and verify their own security without having to rely on the trust of the cloud provider.

Mobile RFID Technology Standardization Activities and Strategy (모바일 RFID 기술 표준화 활동 및 전략)

  • Oh, Se-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1698-1707
    • /
    • 2011
  • Mobile RFID technology as a typical Convergence technology combines RFID communication, mobile communication and network infrastructure, and information processing technology. As it enables users to communicate with the surroundings, Mobile RFID technology is now recognized to serve as the basis technology for the Ubiquitous Information Society where users can get the needed information anytime and anywhere. Through lots of efforts for the early technology development and standardization activities on Mobile RFID technology, Korea has been leading technology standardization as well as technology initiatives. Thus, this research paper describes the domestic and the international standardization activities on Mobile RFID technology as well as the latest standardization status. Further this paper summarizes the major standardization issues, and then proposes the standardization strategy of Mobile RFID technology by analyzing the relevant and influential factors.

A Study on a Roadmap for Establishing Spatial Information in the North Korean Region through Analysis of National Infrastructure Priorities - On the Premise that the North Korean Region is Accessible - (국가인프라 우선순위 분석을 통한 북한지역 공간정보구축 로드맵 연구 - 북한지역 접근가능을 전제로 -)

  • Kim, changjae;Lee, Byoungkil;Pyeon, Mu Wook
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.3
    • /
    • pp.149-156
    • /
    • 2021
  • This study collected and analyzed case studies related with the use of spatial information in North Korea to prioritize construction and required supporting processes in order to propose a short-term and long-term road map for the establishment of spatial information in North Korea. Recent research cases related to the prioritization of spatial information development were analyzed, and priority for the construction of infrastructure was derived based on the interconnectedness and relationship of national infrastructure. Due to the inaccessibility and remoteness of North Korea, all of the five studies determined priorities according to questionnaires and consulting of refugees and knowledgeable figures by expert groups. In summary, priority was given to unarmed and transborder areas, major cities, special zones, and development zones, while in terms of facilities, priority was given to power communication, railroads, water and sewage architectural buildings, roads, and dams. In the case of prioritizing the establishment of national infrastructure for the unified Korean Peninsula, the development of major areas, ports, and the related city-level spots to develop a line that promotes the sharing of routes such as transportation networks, water, and energy, thus leading to a scenario involving the development of cotton at an urban and national level.

Miniaturization of Embedded Bandpass Filter in LTCC Multilayer Substrate for WiMAX Applications

  • Cho, Youngseek;Choi, Seyeong
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.1
    • /
    • pp.45-49
    • /
    • 2013
  • A compact radio frequency (RF) bandpass filter (BPF) in low temperature co-fired ceramic (LTCC) is suggested for WiMAX applications. The center frequency ($f_0$) of the BPF is 5.5 GHz and its pass band or 3-dB bandwidth is 700 MHz to cover all the three major bands, low and middle unlicensed national information infrastructure (U-NII; 5.15-5.35 GHz), World Radiocommunication Conference (5.47-5.725 GHz), and upper U-NII/industrial, scientific, and medical (ISM) (5.725-5.85 GHz), for the WiMAX frequency band. A lumped circuit element design-the 5th order capacitively coupled Chebyshev BPF topology-is adopted. In order to design a compact RF BPF, a very thin ($43.18{\mu}m$) ceramic layer is used in LTCC substrate. An interdigital BPF is also designed in silicon substrate to compare the size and performance of the lumped circuit element BPF. Due to the high relative dielectric constant (${\varepsilon}_r$ = 11.9) of the silicon substrate, the quarter-wavelength resonator of the interdigital BPF can be reduced. In comparison to the 5th order interdigital BPF at $f_0$ = 5.5 GHz, the lumped element design is 24% smaller in volume and has 17 and 7 dB better attenuation characteristics at $f_0{\pm}0.75$ GHz.

도서관. 정보학교육의 공통핵심영역에 관한 연구

  • 송영선
    • Journal of Korean Library and Information Science Society
    • /
    • v.8
    • /
    • pp.97-126
    • /
    • 1981
  • The professional duties of librarians and other information workers involve a generalized body of both theoretical and practical knowledge (the so-called, 'common core') which is a n.0, pplicable worldwide without regard to national boundaries, levels of economic and technical development or cultural context. The current study is an attempt to validate and su n.0, pport this common core concept through a detailed examination of its important role in the sound development of library and information science both as a learned subject and as a profession. Following an initial overview of generally agreed upon core areas in the education and training of librarians and information specialists, with particular attention to the manifold social changes rapidly being effected by computers and communication technology, the focus shifts to the proliferation of academic homes for information science education and its implications for core areas in information science. Of note here is the relationship between information science as a broadly accepted social science discipline and the evolving core curriculum in library schools. To this regard the fact that the popularization of computers and communication technology is increasingly blurring the once-sharp differences between traditional librarians and information specialists naturally favors common core concept. Major figures in library and information science education such as Shera, Saracevic and Foskette su n.0, pport this concept and have already identified its theoretical infrastructure. Finally, UNESCO and IFLA are also stressing the common core cure curriculum for library and information science both as guidelines for the Third World and as a means to achieve universally accepted academic standards. In conclusion, the search for a comprehensive common core curriculum in library and information science education is still in the elementary stages. The task of identifying the components of this common core is among the most crucial responsibilities facing today's educators and professionals for the successful elaboration of a common core would enable us to attain three highly desirable professional goals: 1) To determine the basic concepts and principles of library and information science. 2) To serve as the base for further professional education and specialized research. 3) To offer enhanced o n.0, pportunities for integrated library and information science education programs by providing a genuine two-way communication channel between the library and information science professions.

  • PDF

Trend Analysis of Intelligent Cyber Attacks on Power Systems (전력시스템 대상 지능형 사이버공격 동향 분석)

  • Soon-Min Hong;Jung-ho Eom;Jae-Kyung Lee
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.21-28
    • /
    • 2023
  • The development of information and communication technology in the 21st century has increased operational efficiency by providing hyper-connectivity and hyper-intelligence in the control systems of major infrastructure, but is also increasing security vulnerabilities, exposing it to hacking threats. Among them, the electric power system that supplies electric power essential for daily life has become a major target of cyber-attacks as a national critical infrastructure system. Recently, in order to protect these power systems, various security systems have been developed and the stability of the power systems has been maintained through practical cyber battle training. However, as cyber-attacks are combined with advanced ICT technologies such as artificial intelligence and big data, it is not easy to defend cyber-attacks that are becoming more intelligent with existing security systems. In order to defend against such intelligent cyber-attacks, it is necessary to know the types and aspects of intelligent cyber-attacks in advance. In this study, we analyzed the evolution of cyber attacks combined with advanced ICT technology.

Study of Problem Based Learning for Information Security Consultant and its Analysis (정보보호 컨설턴트 양성을 위한 PBL 교육방안 적용 및 효과성 분석)

  • Oh, Changhyun;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.12
    • /
    • pp.2325-2332
    • /
    • 2017
  • Consulting projects such as diagnosis of vulnerabilities of major information and telecommunication infrastructure are increasing, mandatory public information infrastructure assessment (PIA) for public institutions and ISMS (Information Security Management System) The demand for information protection consulting is continuously increasing as the field obeys the law, but the lack of information security consultant is not improving. One reason is that information security consultants are not being developed to meet the increasing demand for information protection consulting. In this paper, we present the case of information protection consulting as a scenario for studying and educating the duty of information security consultant by studying overseas case and domestic case based on standardization and standardization. We propose a problem-based learning (PBL) training method. In addition, we analyze the effectiveness of the PBL - based learning method.

Investigation of Secure Wireless Multihop Ad hoc Network (안전한 무선 Multihop Ad hoc 네트워크를 위한 연구)

  • Lee, Sang-Duck;Park, Jong-An;Han, Seung-Jo;Pyun, Jae-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.1
    • /
    • pp.118-126
    • /
    • 2007
  • An ad hoc network is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies allowing people and devices to internetwork without any preexisting communication infrastructure. Although ad hoc network is attractive solution, there are still some major flaws that prevent commercial growth. Security is one of these main barriers; ad hoc networks are known to be particularly vulnerable to security attack. It is difficult to establish a centralized key distribution center and a trusted certification authority to provide cryptographic keys and digital certificates to nodes. To prevent attacks in ad hoc routing protocols, many algorithms have been used. In this paper, we have depicted a secure framework for multipath routing in wireless multihop network, which is comprehensive solution for secure data forwarding in wireless multihop networks. With the simulation results, the proposed scheme is compared with existing source routing scheme.

  • PDF

Comparative Policy Analysis on ICT Small and Medium-sized Venture Using Cognitive Map Analysis (인지지도를 활용한 ICT 중소벤처 지원정책 비교분석)

  • Park, Eunyub;Lee, Jung Mann
    • Journal of Information Technology Applications and Management
    • /
    • v.29 no.3
    • /
    • pp.75-93
    • /
    • 2022
  • The purpose of this study is to compare and analyze each government's ICT SME support policies to cope with changes in the ICT ecosystem paradigm. In particular, the core policies and policy trends of the Moon's government are presented through keyword network analysis and cognitive map analysis. As a result, core technologies such as ICT(Information Communication Technology), AI(Artificial Intelligence), Big Data, and 5G, which have high values of betweenness centrality and closeness centrality, are major keywords with high propagation power. The cognitive map analysis shows that the opportunity factors for the 4th industrial revolution are being activated through the ICT infrastructure circulation process, the domestic market circulation process, and the global market circulation process. This study is meaningful in terms of cognitive map analysis and utilization based on scientific analysis.

Comparative Analysis of a Competitive Technology for a Major Electrical Power System

  • Koo, Young-Duk;Kim, Eun-Sun;Park, Young-Seo
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.4
    • /
    • pp.243-246
    • /
    • 2004
  • Currently, advanced countries invest lots of efforts to develop improvement of electric power production and supply, confronting environmental problems and new energy development. They set up long term plan focusing on electric power transmission infrastructure construction technology, establishment of the customer care service network using electric technologies, improvement of economic productivity by innovative electric technology, prevention of global warming gas and clean and efficient energy use etc. Comparing to those countries, the level of technologies that we have are in behind and moreover, technological resources are limited. Therefore, Korea is required to reconsider efficient distribution of R&D investment by concentrating on limited R&D resources to important technologies which could be stepping stone to gain competitive advantage. It can be done through comparative analysis of electric technologies among advanced countries and analysis of electric technology development policy.