• Title/Summary/Keyword: Next generation Information Technology(IT)

Search Result 447, Processing Time 0.032 seconds

RFID Information Protection using Biometric Information (생체정보를 이용한 RFID 정보보호)

  • Ahn, Hyo-Chang;Rhee, Sang-Burm
    • Journal of the Korea Computer Industry Society
    • /
    • v.7 no.5
    • /
    • pp.545-554
    • /
    • 2006
  • RFID could be applied in the various fields such as distribution beside, circulation, traffic and environment on information communication outside. So this can speak as point of ubiquitous computing's next generation technology. However, it is discussed problem of RFID security recently, so we must prepare thoroughly about RFID security for secure information. In this paper, we proposed a method which could protect private information and ensure RFID's identification effectively storing face feature information on RFID tag. Our method which is improved linear discriminant analysis has reduced dimension of feature information which has large size of data. Therefore, we can sore face feature information in small memory field of RFID tag. Our propose d algorithm has shown 92% recognition rate in experimental results and can be applied to entrance control management system, digital identification card and others.

  • PDF

The Future Strategy of Semiconductor Companies with the Growth of Cloud Computing (클라우드 컴퓨팅 성장에 따른 반도체 기업들의 미래 전략)

  • Chung, Eui Young;Lee, Ki Baek;Zo, Hang Jung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.71-85
    • /
    • 2014
  • This study proposes the future strategy of semiconductor companies corresponding to the growth of cloud computing. Cloud computing is the delivery of IT resources such as hardware and software as a service rather than a product, and it is expected to significantly change the IT market. By employing the scenario planning method, this study develops a total of eight scenario cases, and presents the three possible scenarios including the best market, the worst market, and the neutral market scenario. This study suggests the future strategy of semiconductor companies based on the best market scenario (increasing firms' IT expenditure, increasing the complexity and performance of devices, the frequent replacement of devices). The suggested future strategy of semiconductor includes that the semiconductor companies need to strengthen their price competitiveness, secure the next generation technologies, and develop the better capability for market prediction with the growth of cloud computing. This study will help semiconductor companies set up the strategy direction of technology development, and understand the connections between cloud computing and the memory semiconductor industry. This study has practical implications for semiconductor industry to prepare for the future of cloud computing.

A Design of Mobile App Test System Using Web Socket (웹소켓을 이용한 모바일 앱 테스트 시스템 설계)

  • Choi, Kyung Su;Lee, Kilhung
    • Journal of Information Technology Services
    • /
    • v.17 no.3
    • /
    • pp.63-75
    • /
    • 2018
  • In this paper, we propose a testing method of the quality of device application effectively reflecting the necessity of increasing mobile device application quality test, and designed and developed it as a web system. We have studied traditional software testing methods for designing and developing a system. We have developed a next-generation alternative technology that can analyze and compensate for the weaknesses of the web and weaknesses of the Android in order to realize the access system and the responsive web system. As an example applied to the system, we analyzed the requirements of the system implementation and expressed the functions of the system through the use case diagram. The test scenarios were conducted by connecting 5,000 devices to each system using the existing HTTP polling method and the proposed web socket method. After setting the comparative group, the result of the proposed web management system was observed and compared through repeated tests. The research shows that the proposed web socket system has better performance than HTTP polling. The more the number of simultaneous processing of the devices, the lower the server stability but the better the time efficiency. In conclusion, the more the number of devices to be tested is, the more the number of devices can be effectively tested using the proposed web management system.

Information Security Management System on Cloud Computing Service (클라우드 컴퓨팅 서비스에 관한 정보보호관리체계)

  • Shin, Kyoung-A;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.155-167
    • /
    • 2012
  • Cloud computing service is a next generation IT service which has pay-per-use billing model and supports elastically provisioning IT infra according to user demand. However it has many potential threats originating from outsourcing/supporting service structure that customers 'outsource' their own data and provider 'supports' infra, platform, application services, the complexity of applied technology, resource sharing and compliance with a law, etc. In activation of Cloud service, we need objective assessment standard to ensure safety and reliability which is one of the biggest obstacles to adopt cloud service. So far information security management system has been used as a security standard for a security management and IT operation within an organization. As for Cloud computing service it needs new security management and assessment different from those of the existing in-house IT environment. In this paper, to make a Information Security Management System considering cloud characteristics key components from threat management system are drawn and all control domain of existing information security management system as a control components are included. Especially we designed service security management to support service usage in an on-line self service environment and service contract and business status.

A Study for Master plan of Infrastructure Establishment of Next Generation Free Flight Concept (우리나라의 차세대 자유비행 인프라구축 전략에 관한 연구)

  • Han, Jae-Hyun;Kim, Chang-Hwan;Kang, Ja-Young
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.16 no.4
    • /
    • pp.54-62
    • /
    • 2008
  • International organizations related to air transport such as ICAO, IATA, ACI are forecasting that the number of passenger will grow about 4.4% annually up to 2015. Therefore, the innovation of given system technology and operation procedure is required in global scale to cope with the increase of air traffic demand. CNS/ATM infrastructure based on satellite is considered to play key role in order to solve the problems due to the dramatic increase of air traffic demand over the world. Free flight concept in the air transport operation has been proved with CNS/ATM infrastructure especially in USA and Europe. Therefore, it is necessary to develop key technologies to overcome technology gap and to secure international competitiveness in Korea. ADS-B is an important issue, and new element technologies should be considered as essential items which were shown in Capstone project. Nowadays, the free flight concept is combined to Air Transport Road Map such as NextGen project in USA, SESAR in Europe. In this process, free flight is included in the concepts such as ATM(Air Traffic Management), aviation security and safety, environmental protection and economy development, wide area weather variable reduction service, information integration and application between the related authorities (civil/military) etc. The purpose of research is to establish mid-term and long-term infrastructure plan and strategy for free flight realization in Korea. The analysis of action target and equipment construction status, phase construction plan of infrastructure has been performed by considering mid-term and long-term free flight plans of USA and Europe.

  • PDF

Quality Enhancement of 3D Volumetric Contents Based on 6DoF for 5G Telepresence Service

  • Byung-Seo Park;Woosuk Kim;Jin-Kyum Kim;Dong-Wook Kim;Young-Ho Seo
    • Journal of Web Engineering
    • /
    • v.21 no.3
    • /
    • pp.729-750
    • /
    • 2022
  • In general, the importance of 6DoF (degree of freedom) 3D (dimension) volumetric contents technology is emerging in 5G (generation) telepresence service, Web-based (WebGL) graphics, computer vision, robotics, and next-generation augmented reality. Since it is possible to acquire RGB images and depth images in real-time through depth sensors that use various depth acquisition methods such as time of flight (ToF) and lidar, many changes have been made in object detection, tracking, and recognition research. In this paper, we propose a method to improve the quality of 3D models for 5G telepresence by processing images acquired through depth and RGB cameras on a multi-view camera system. In this paper, the quality is improved in two major ways. The first concerns the shape of the 3D model. A method of removing noise outside the object by applying a mask obtained from a color image and a combined filtering operation to obtain the difference in depth information between pixels inside the object were proposed. Second, we propose an illumination compensation method for images acquired through a multi-view camera system for photo-realistic 3D model generation. It is assumed that the three-dimensional volumetric shooting is done indoors, and the location and intensity of illumination according to time are constant. Since the multi-view camera uses a total of 8 pairs and converges toward the center of space, the intensity and angle of light incident on each camera are different even if the illumination is constant. Therefore, all cameras take a color correction chart and use a color optimization function to obtain a color conversion matrix that defines the relationship between the eight acquired images. Using this, the image input from all cameras is corrected based on the color correction chart. It was confirmed that the quality of the 3D model could be improved by effectively removing noise due to the proposed method when acquiring images of a 3D volumetric object using eight cameras. It has been experimentally proven that the color difference between images is reduced.

Design and implementation of SCADA system to support scalability and openness (확장성과 개방성을 지원하는 SCADA 시스템 설계 및 구현)

  • Kim, Hyung-Ill;Lee, Sung-Young;Jeon, Tae-Woong;Park, Young-Tack
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.5 no.6
    • /
    • pp.753-763
    • /
    • 1999
  • The existing SCADA(Supervisory Control and Data Acquisition) system software is usually developed to suitable for the specific hardware platforms. However, as per rapid improvement of computer performance and development of network technology, it is required to support scalability and inter-operability in existing different SCADA systems. In order to meet such requirements, in this paper, we propose a new type of SCADA testbed using Java for electric distribution applications. The system consists of three modules; development support tools, client and server modules. The basic architecture of the proposed SCADA system is similar to existing one, however, we improve the function of MTU and MMI interface to facilitate LAN and WAN environment. Also, the proposed system can deals with alarm and history data by using heterogeneous DBMS. Since the system is built in Java environment, the development cost is cheap and it can support sacalability and portability. Our experience can be utilized to develop next generation of small and medium size of SCADA system.

  • PDF

Children's Education Application Design Using AR Technology (AR기술을 활용한 어린이 교육 어플리케이션 디자인)

  • Chung, HaeKyung;Ko, JangHyok
    • Journal of the Semiconductor & Display Technology
    • /
    • v.20 no.4
    • /
    • pp.23-28
    • /
    • 2021
  • Augmented reality is a technique for combining virtual images into real life by showing information of virtual 3D objects on top of a real-world environment (Azuma et al., 2001). This study is an augmented reality-based educational content delivery device that receives user input that selects either a preset object or a photographed object for augmented reality-based training; It includes a three-dimensional design generation unit that generates a stereoscopic model of the augmented reality environment from an object, a three-dimensional view of the scene, a disassembly process of the developing road from a three-dimensional model, and a content control unit provided by the user terminal by generating educational content including a three-dimensional model, a scene chart, a scene, a decomposition process, and a coupling process to build a coupling process from the scene to the three-dimensional model in an augmented reality environment. The next study provides a variety of educational content so that children can use AR technology as well as shapes to improve learning effectiveness. We also believe that studies are needed to quantitatively measure the efficacy of which educational content is more effective when utilizing AR technology.

Research on Expansion and Improvement Approaches of Information Security Budget for Cybersecurity Enhancement (정보보호 기반 강화를 위한 정보보호 예산 확대 및 개선 방안 연구)

  • Bae, Sunha;KIM, So Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1279-1294
    • /
    • 2016
  • Information security to use information technology(IT) in safety and reliability environment is becoming of great importance. In advanced countries including United States and United Kingdom are consistently expanding budget for information security. Korea also has been a growing interest in information security and Korea government announced plan to develop information security into next-generation growth engine. However, information security budget has increased slightly in recent years, so many national institutions and state governments have budget shortfall to perform information security work. Moreover budget items do not include generic contents about information security and there are confined to some security SW, HW and services. It is necessary to expand information security budget for enhancement national capabilities of information security. In this paper, we analyze the IT and information security budget situation for Korea and United States and propose effective budget expansion and improvement approaches for Korea.

A Memory-efficient Hand Segmentation Architecture for Hand Gesture Recognition in Low-power Mobile Devices

  • Choi, Sungpill;Park, Seongwook;Yoo, Hoi-Jun
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.17 no.3
    • /
    • pp.473-482
    • /
    • 2017
  • Hand gesture recognition is regarded as new Human Computer Interaction (HCI) technologies for the next generation of mobile devices. Previous hand gesture implementation requires a large memory and computation power for hand segmentation, which fails to give real-time interaction with mobile devices to users. Therefore, in this paper, we presents a low latency and memory-efficient hand segmentation architecture for natural hand gesture recognition. To obtain both high memory-efficiency and low latency, we propose a streaming hand contour tracing unit and a fast contour filling unit. As a result, it achieves 7.14 ms latency with only 34.8 KB on-chip memory, which are 1.65 times less latency and 1.68 times less on-chip memory, respectively, compare to the best-in-class.