• Title/Summary/Keyword: Security Communication

Search Result 4,347, Processing Time 0.027 seconds

A Study on the Difference between Balanced and Dominant Learning Styles and Learning Strategies by Learning Factors of College Students

  • Kim, Ji Sim;Kim, Kyong Ah;Park, Mi Soon;Ahn, You Jung;Oh, Suk;Jin, Myung Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.8
    • /
    • pp.65-73
    • /
    • 2021
  • This study investigated differences in learning styles and learning strategies according to learning factors: major fields, achievements, and grades and differences in learning strategies according to learning styles for college students. Unlike previous studies that analyzed differences focused on the dominant learning style, the learning style was subdivided into a balanced and dominant learning style. In the analysis of the 179 participants in M colleges, it was found that the difference between the learning style and the learning strategy according to the learning factors was not significant. But, there was a significant difference in the use of cognitive strategies according to the learning style in the dimension of information input, and in the use of all strategies according to the information processing style. It was analyzed that active learners had a high level of using cognitive strategies, visual learners had a high level of using external strategies, and balanced learners had a high level of using internal strategies. Based on the results, the training strategies to understand the learning style and to improve the level of use of the learning strategy in the learning competency improvement program was proposed.

A Study on the Design and Implementation of Multi-Disaster Drone System Using Deep Learning-Based Object Recognition and Optimal Path Planning (딥러닝 기반 객체 인식과 최적 경로 탐색을 통한 멀티 재난 드론 시스템 설계 및 구현에 대한 연구)

  • Kim, Jin-Hyeok;Lee, Tae-Hui;Han, Yamin;Byun, Heejung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.4
    • /
    • pp.117-122
    • /
    • 2021
  • In recent years, human damage and loss of money due to various disasters such as typhoons, earthquakes, forest fires, landslides, and wars are steadily occurring, and a lot of manpower and funds are required to prevent and recover them. In this paper, we designed and developed a disaster drone system based on artificial intelligence in order to monitor these various disaster situations in advance and to quickly recognize and respond to disaster occurrence. In this study, multiple disaster drones are used in areas where it is difficult for humans to monitor, and each drone performs an efficient search with an optimal path by applying a deep learning-based optimal path algorithm. In addition, in order to solve the problem of insufficient battery capacity, which is a fundamental problem of drones, the optimal route of each drone is determined using Ant Colony Optimization (ACO) technology. In order to implement the proposed system, it was applied to a forest fire situation among various disaster situations, and a forest fire map was created based on the transmitted data, and a forest fire map was visually shown to the fire fighters dispatched by a drone equipped with a beam projector. In the proposed system, multiple drones can detect a disaster situation in a short time by simultaneously performing optimal path search and object recognition. Based on this research, it can be used to build disaster drone infrastructure, search for victims (sea, mountain, jungle), self-extinguishing fire using drones, and security drones.

A Study on the Risk Analysis and Fail-safe Verification of Autonomous Vehicles Using V2X Based on Intersection Scenarios (교차로 시나리오 기반 V2X를 활용한 자율주행차량의 위험성 분석 및 고장안전성 검증 연구)

  • Baek, Yunseok;Shin, Seong-Geun;Park, Jong-ki;Lee, Hyuck-Kee;Eom, Sung-wook;Cho, Seong-woo;Shin, Jae-kon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.6
    • /
    • pp.299-312
    • /
    • 2021
  • Autonomous vehicles using V2X can drive safely information on areas outside the sensor coverage of autonomous vehicles conventional autonomous vehicles. As V2X technology has emerged as a key component of autonomous vehicles, research on V2X security is actively underway research on risk analysis due to failure of V2X communication is insufficient. In this paper, the service scenario and function of autonomous driving system V2X were derived by presenting the intersection scenario of the autonomous vehicle, the malfunction was defined by analyzing the hazard of V2X. he ISO26262 Part3 process was used to analyze the risk of malfunction of autonomous vehicle V2X. In addition, a fault injection scenario was presented to verify the fail-safe of the simulation-based intersection scenario.

A study on the policy implementation strategy through public participation (정부의제의 국민참여를 통한 정책화 추진 전략에 관한 연구)

  • Lee, Hyangsoo;Lee, Seong-Hoon;Jung, Yonghun
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.45-54
    • /
    • 2022
  • This study examines the actual operation and performance of the public participation platform by analyzing various public participation processes from 2018 to 2021, when 'Gwanghwamun 1st Street', a representative public participation platform operated by the Ministry of Public Administration and Security, was launched. Through this, the influencing factors that were able to successfully induce the process of policyization through public participation were derived as follows. First, online participation channels were diversified to encourage public participation. Second, it is also important that the public opinion contest and compensation for public review were implemented to encourage and expand public participation. Third, the participation of experts was encouraged to refine and refine the people's ideas. Through these research results, it is judged that the Korean government will be able to contribute to inducing the policyization process through continuous public participation. In deriving success factors for policyization through public participation in the future, how influencing factors such as the public participation process, communication through online channels, and collaboration with experts affect the public participation process using quantitative analysis techniques A study to prove it will have to be conducted subsequently.

On the New Prospect of Gangwon Border Area as a Peace Zone and its Sustainable Development (강원도 접경지역이 평화지역으로 가기위한 새로운 지평과 지속가능발전)

  • Kim, Jong-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.6
    • /
    • pp.638-651
    • /
    • 2022
  • Last year, a new perception of the right to peace on the Korean Peninsula was adopted: DMZ Yanggu Peace Declaration 2021. The Declaration reflects that there is a raising of necessity for a new perception and approach from the perspective of DMZ-related laws, sustainable ecological environment and security. Gangwon is making considerable efforts to make the border area in DMZ as an area of peace by continuously enhancing publicity on the establishment of the 'Peace Special Self-Governing Province'. This study suggests the necessity of a paradigm shift towards the significance of the interkorean border region that it should function as a passage between the South and the North rather than a dam. For, to be renewed as a sustainably developing region through newly constructed flow of communication, the wall of hostility must preliminarily fall dawn. Then a question arises about how Gangwon is, out of other border region, most eligible for the reconsideration of its significance as a border area. The answer relies on the newly established agenda and understandings towards the right to peace in the perspective of founding the policy for the Unification of the Korean Peninsula. Furthermore, the conservation of DMZ ecological environment through enlistment of UNESCO Biosphere Reserve should go hand in hand with the ultimate value of global agenda of the conservation and protection of the environment. The study insists that the peace zone is a prerequisite for the adaption of the era of future-oriented glocalization featured by the Fourth Industrial Revolution. Up to this date, the border area was an area of pain and agony. It is time for Gangwon to be reborn as an area of peace and coexistence. The aim of this study is to point a direction for Gangwon to become a sustainably developing region by illuminating the value of the Gangwon border area as a new area of peace.

Five-stage Anger Model Approach to Narrative and Protagonist's Revolt Action Mechanism in the Movie, "The Man Standing Next" ('분노의 5단계 모델'관점의 영화 <남산의 부장들> 서사와 주인공의 거사 결행 기제)

  • Kim, Jeong-Seob
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.3
    • /
    • pp.285-294
    • /
    • 2020
  • "The Man Standing Next" was a 'anger-character movie' that shows a fierce psychological game between the characters. Inspired by this point, it was analyzed the narrative structure of this film based on scene unit applying the 'Five-stage Anger Model' formulated by Lakoff and Kövecses and others. The results showed that the causality and feasibility of the protagonist's anger behavior were highly reflected above the model. In particular, among the five steps, the film-maker spent the longest time on 'anger control' justifying the hero's motivation for punishment or retaliation, while giving the shortest time to 'loss of control' to maximize the urgentness of the punitive actions. The detonator causing his anger at each stage was disposed two to six times each stage with neglect, contempt, arrogance, ostentation, mockery, unauthorized intervention, etc. Sneering of "Chief Security Officer" and insulting of "The President" make the protagonist feel the scorn of a terrible friend-murderer each functioned as a "rage trigger." In conclusion, the film follows the above sophisticated model in its narrative structure. Though it was a political drama that sets up a lot of anger scheme caused from public reasons, it reflects ordinary people's routine anger, which corresponds to 24 percent of the list of Nobaco's Provocation Inventory (PI). The producers elaborately reflected the anger procedure theory and balanced the public and private drivers of rage. It was considered to be derived from the intention to enhance communication with the audience increasing their understanding and aspiration for political movie that are usually heavy and unfamiliar.

Blocking Intelligent Dos Attack with SDN (SDN과 허니팟 기반 동적 파라미터 조절을 통한 지능적 서비스 거부 공격 차단)

  • Yun, Junhyeok;Mun, Sungsik;Kim, Mihui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.1
    • /
    • pp.23-34
    • /
    • 2022
  • With the development of network technology, the application area has also been diversified, and protocols for various purposes have been developed and the amount of traffic has exploded. Therefore, it is difficult for the network administrator to meet the stability and security standards of the network with the existing traditional switching and routing methods. Software Defined Networking (SDN) is a new networking paradigm proposed to solve this problem. SDN enables efficient network management by programming network operations. This has the advantage that network administrators can flexibly respond to various types of attacks. In this paper, we design a threat level management module, an attack detection module, a packet statistics module, and a flow rule generator that collects attack information through the controller and switch, which are components of SDN, and detects attacks based on these attributes of SDN. It proposes a method to block denial of service attacks (DoS) of advanced attackers by programming and applying honeypot. In the proposed system, the attack packet can be quickly delivered to the honeypot according to the modifiable flow rule, and the honeypot that received the attack packets analyzed the intelligent attack pattern based on this. According to the analysis results, the attack detection module and the threat level management module are adjusted to respond to intelligent attacks. The performance and feasibility of the proposed system was shown by actually implementing the proposed system, performing intelligent attacks with various attack patterns and attack levels, and checking the attack detection rate compared to the existing system.

A study on the creation of mission performance data using search drone images (수색용 드론 이미지를 활용한 임무수행 데이터 생성에 관한 연구)

  • Lee, Sang-Beom;Lim, Jin-Taek
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.22 no.4
    • /
    • pp.179-184
    • /
    • 2021
  • Along with the development of the fourth industry, the public sector has increasingly paid more attention to search using drones and real-time monitoring, for various goals. The drones are used and researched to complete a variety of searching and monitoring missions, including search for missing persons, security, coastal patrol and monitoring, speed enforcement, highway and urban traffic monitoring, fire and wildfire monitoring, monitoring of illegal fishing in reservoirs and protest rally monitoring. Police stations, fire departments and military authorities, however, concentrate on the hardware part, so there are little research on efficient communication systems for the real-time monitoring of data collected from high-performance resolution and infrared thermal imagining cameras, and analysis programs suitable for special missions. In order to increase the efficiency of drones with the searching mission, this paper, therefore, attempts to propose an image analysis technique to increase the precision of search by producing image data suitable for searching missions, based on images obtained from drones and provide the foundation for improving relevant policies and establishing proper platforms, based on actual field cases and experiments.

Trend Forecasting and Analysis of Quantum Computer Technology (양자 컴퓨터 기술 트렌드 예측과 분석)

  • Cha, Eunju;Chang, Byeong-Yun
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.3
    • /
    • pp.35-44
    • /
    • 2022
  • In this study, we analyze and forecast quantum computer technology trends. Previous research has been mainly focused on application fields centered on technology for quantum computer technology trends analysis. Therefore, this paper analyzes important quantum computer technologies and performs future signal detection and prediction, for a more market driven technical analysis and prediction. As analyzing words used in news articles to identify rapidly changing market changes and public interest. This paper extends conference presentation of Cha & Chang (2022). The research is conducted by collecting domestic news articles from 2019 to 2021. First, we organize the main keywords through text mining. Next, we explore future quantum computer technologies through analysis of Term Frequency - Inverse Document Frequency(TF-IDF), Key Issue Map(KIM), and Key Emergence Map (KEM). Finally, the relationship between future technologies and supply and demand is identified through random forests, decision trees, and correlation analysis. As results of the study, the interest in artificial intelligence was the highest in frequency analysis, keyword diffusion and visibility analysis. In terms of cyber-security, the rate of mention in news articles is getting overwhelmingly higher than that of other technologies. Quantum communication, resistant cryptography, and augmented reality also showed a high rate of increase in interest. These results show that the expectation is high for applying trend technology in the market. The results of this study can be applied to identifying areas of interest in the quantum computer market and establishing a response system related to technology investment.

A Sanitizer for Detecting Vulnerable Code Patterns in uC/OS-II Operating System-based Firmware for Programmable Logic Controllers (PLC용 uC/OS-II 운영체제 기반 펌웨어에서 발생 가능한 취약점 패턴 탐지 새니타이저)

  • Han, Seungjae;Lee, Keonyong;You, Guenha;Cho, Seong-je
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.65-79
    • /
    • 2020
  • As Programmable Logic Controllers (PLCs), popular components in industrial control systems (ICS), are incorporated with the technologies such as micro-controllers, real-time operating systems, and communication capabilities. As the latest PLCs have been connected to the Internet, they are becoming a main target of cyber threats. This paper proposes two sanitizers that improve the security of uC/OS-II based firmware for a PLC. That is, we devise BU sanitizer for detecting out-of-bounds accesses to buffers and UaF sanitizer for fixing use-after-free bugs in the firmware. They can sanitize the binary firmware image generated in a desktop PC before downloading it to the PLC. The BU sanitizer can also detect the violation of control flow integrity using both call graph and symbols of functions in the firmware image. We have implemented the proposed two sanitizers as a prototype system on a PLC running uC/OS-II and demonstrated the effectiveness of them by performing experiments as well as comparing them with the existing sanitizers. These findings can be used to detect and mitigate unintended vulnerabilities during the firmware development phase.