• Title/Summary/Keyword: SMB Information System

Search Result 337, Processing Time 0.018 seconds

Research Trends Review of Undergraduates' on Entrepreneurship Education Program to Develop the Entrepreneurship Program for Nursing College Students (간호대학생 창업교육프로그램 개발을 위한 대학생 대상 창업교육프로그램 연구 동향 고찰)

  • Noh, Wonjung;Kang, Jiwon;Lee, Youngjin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.2
    • /
    • pp.148-154
    • /
    • 2019
  • The study was performed to prepare basic data for the development of entrepreneur education programs for nursing students through literature review and text network of relevant studies on entrepreneurship education for college students. The research was found in the database of the Korea Education and Research Information Service, the Korean Academic Information Service System, DBpia and the National Assembly Library with keywords such as 'entrepreneur', 'student', 'education', 'program' and 'training. The final selected paper was 35 studies in Korea from 2000 to September 2016. The largest number of studies have been conducted since 2011 with 85.71%, and the largest proportion of survey(88.57 %). The major independent variables were entrepreneur self-efficacy and entrepreneurship and the dependent variables were entrepreneur intention and entreprenuer self-efficacy. Based on this result, entrepreneur education programs will be developed suitable for the target, and it can promote the entrepreneur education for nursing students.

Research on Web Cache Infection Methods and Countermeasures (웹 캐시 감염 방법 및 대응책 연구)

  • Hong, Sunghyuck;Han, Kun-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.2
    • /
    • pp.17-22
    • /
    • 2019
  • Cache is a technique that improves the client's response time, thereby reducing the bandwidth and showing an effective side. However, there are vulnerabilities in the cache technique as well as in some techniques. Web caching is convenient, but it can be exploited by hacking and cause problems. Web cache problems are mainly caused by cache misses and excessive cache line fetch. If the cache miss is high and excessive, the cache will become a vulnerability, causing errors such as transforming the secure data and causing problems for both the client and the system of the user. If the user is aware of the cache infection and the countermeasure against the error, the user will no longer feel the cache error or the problem of the infection occurrence. Therefore, this study proposed countermeasures against four kinds of cache infections and errors, and suggested countermeasures against web cache infections.

Response System for DRDoS Amplification Attacks (DRDoS 증폭 공격 대응 시스템)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.22-30
    • /
    • 2020
  • With the development of information and communication technology, DDoS and DRDoS continue to become security issues, and gradually develop into advanced techniques. Recently, IT companies have been threatened with DRDoS technology, which uses protocols from normal servers to exploit as reflective servers. Reflective traffic is traffic from normal servers, making it difficult to distinguish from security equipment and amplified to a maximum of Tbps in real-life cases. In this paper, after comparing and analyzing the DNS amplification and Memcached amplification used in DRDoS attacks, a countermeasure that can reduce the effectiveness of the attack is proposed. Protocols used as reflective traffic include TCP and UDP, and NTP, DNS, and Memcached. Comparing and analyzing DNS protocols and Memcached protocols with higher response sizes of reflective traffic among the protocols used as reflective traffic, Memcached protocols amplify ±21% more than DNS protocols. The countermeasure can reduce the effectiveness of an attack by using the Memcached Protocol's memory initialization command. In future studies, various security-prone servers can be shared over security networks to predict the fundamental blocking effect.

Configuration Method of AWS Security Architecture for Cloud Service (클라우드 서비스 보안을 위한 AWS 보안 아키텍처 구성방안)

  • Park, Se-Joon;Lee, Yong-Joon;Park, Yeon-Chool
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.7
    • /
    • pp.7-13
    • /
    • 2021
  • Recently, due to the many features and advantages of cloud computing, cloud service is being introduced to countless industries around the world at an unbelievably rapid pace. With the rapid increase in the introduction of multi-cloud based services, security vulnerabilities are increasing, and the risk of data leakage from cloud computing services are also expected to increase. Therefore, this study will propose an AWS Well-Architected based security architecture configuration method such as AWS standard security architecture, AWS shared security architecture model that can be applied for personal information security including cost effective of cloud services for better security in AWS cloud service. The AWS security architecture proposed in this study are expected to help many businesses and institutions that are hoping to establish a safe and reliable AWS cloud system.

Development of Multi-dimensional Flatbed Printer using Head Encoder and Trigger Control (Head Encoder와 Trigger 제어를 이용한 다입체 평판 프린터 개발)

  • Kim, Bong-Hyun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.10
    • /
    • pp.47-52
    • /
    • 2020
  • The general flatbed printer system is composed of a PC and a dedicated S/W, which is inconvenient to use. In the end, there is a need for a technology that can easily and conveniently use various types of printing through simplification, smartization, etc. of a flatbed printer system configuration. That is, there is an increasing demand for multi-dimensional printer capable of printing on various types of materials with one printer and capable of printing various types of products. Therefore, in this paper, we developed a flatbed printer system capable of multi-dimensional printing using Head Encoder/Trigger control. To this end, we developed a flatbed printer that connects the internal module of the flatbed printer with an input type detection sensor and controls all operating states by the head encoder and head trigger signals of the printer through separate main controllers. Through this, the development and diffusion of IoT technology will expand the printer control of the smart environment to the developed form throughout the industry. It is expected to contribute to the development of the 3D printing industry in the future.

The Study on Perception of Adoption of Certification System for Smart Factory (스마트공장 표준 인증제도 도입에 관한 인식 조사)

  • Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.3
    • /
    • pp.153-158
    • /
    • 2017
  • The certification for Smart Factory supoort successful management of organization while providing strategic plans to the issue of manufacturing process. In Korea, these standards are prepared as the national standards since 2015, and also, there are actions being taken to adpot the certification for Smart Factory. However, to adopt such certification, it is required that the certification operation system needs to be organized, as well as that the society in general should understand about Smart Factory. Accordingly, it is even more required an review on the adoption of the system. This study has the purpose in surveying a variety of atakeholders' perception for the adoption of Smart Factory certification given the circumstance that the cetitification is implemented through literature review and in-depth interviews. This study will be provide significant implication to build a successful plan for the adoption of Smart Factory certification by reviewing perception of professional and problem, strategy of this certification.

The Effect of Lower Extremity Muscle Strengthening Exercise using Biofeedback System on Lower Extremity Function and Gait in Community-based Elderly (바이오피드백 시스템을 활용한 하지근력 강화운동이 지역사회기반 노인의 하지기능과 보행에 미치는 효과)

  • Park, Tae-Sung;Lee, In-Sook;Jang, Myung-Hun;Shin, Myung-Jun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.1
    • /
    • pp.195-202
    • /
    • 2020
  • This study is to investigate the effect of lower extremity strength exercise using biofeedback system on community-based elderly. Ten community-based elderly were exercised using the biofeedback system (with functional electrical stimulation) three times a week for six weeks. Data analysis was performed using Wilcoxon signed rank test. Physical function improved significantly, but there was no significant difference in muscle strength and muscle mass. Although elderly people were able to confirm that community-based ICT home biofeedback training could be possible and could lead to improvements in the lower extremity function, further research is needed to demonstrate a clearer effect by expanding the target population, distinguishing the sexes, and providing a personalized training method.

The Design of IoT Device System for Disaster Prevention using Sound Source Detection and Location Estimation Algorithm (음원탐지 및 위치 추정 알고리즘을 이용한 방재용 IoT 디바이스 시스템 설계)

  • Ghil, Min-Sik;Kwak, Dong-Kurl
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.53-59
    • /
    • 2020
  • This paper relates to an IoT device system that detects sound source and estimates the sound source location. More specifically, it is a system using a sound source direction detection device that can accurately detect the direction of a sound source by analyzing the difference of arrival time of a sound source signal collected from microphone sensors, and track the generation direction of a sound source using an IoT sensor. As a result of a performance test by generating a sound source, it was confirmed that it operates very accurately within 140dB of the acoustic detection area, within 1 second of response time, and within 1° of directional angle resolution. In the future, based on this design plan, we plan to commercialize it by improving the reliability by reflecting the artificial intelligence algorithm through big data analysis.

Measures of Real Estate Taxation in the Classify Income (현행 법률상 분류소득인 부동산양도소득세의 정책방안)

  • Yoon, Deok-Byeong
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.2
    • /
    • pp.137-142
    • /
    • 2017
  • The purpose of this study tried theoretical review on the current Transfer Income Tax system, and review on current Korean Transfer Income Tax system, to derive the inherent problems in Korean Transfer Income Tax system. This study presents the improving measures thereto.The transfer income earned by any individual person is taxed as the Transfer Income Tax pursuant to the Income Tax Act, and the transfer income earned by any legal person is taxed as the transfer income on transfer gain on land etc, pursuant to the Corporate Tax Act. In case of the Transfer Income Taxes earned by individual persons, land and buildings comprise most of the taxable items of the Transfer Income Tax. This study limits the scope of study to the Transfer Income Tax on land and building as the major taxable item, rather than all the Transfer Income Tax taxed to individual taxpayers. The outcomes of this are expected to rationly improvement the real estate taxation in accordance with the principle of tax law.

Experimental Implementation of Digital Twin Simulation for Physical System Optimization (물리시스템 최적화를 위한 디지털 트윈 시뮬레이션의 실험적 구현)

  • Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.4
    • /
    • pp.19-25
    • /
    • 2021
  • This study proposes a digital twin implementation method through simulation so that the manufacturing process can be optimized in a manual manufacturing site. The scope of the proposal is a knowledge management mechanism that collects manual motion with a sensor and optimizes the manufacturing process with repetitive experimental data for motion recognition. In order to achieve the research purpose, a simulation of the distribution site was conducted, and a plan to create an optimized digital twin was prepared by repeatedly experiencing the work simulation based on the basic knowledge expressed by the worker's experience. As a result of the experiment, it was found that it is possible to continuously improve the manufacturing process by transmitting the result of configuring the optimized resources to the physical system by generating the characteristics of the work space configuration and working step within a faster time with the simulation that creates the digital twin.