• Title/Summary/Keyword: problem analysis

Search Result 16,367, Processing Time 0.049 seconds

A Study on the Analysis of U.S.A Navy and R.O.K Military C4I System and Future Development (미해군과 한국군 C4I 체계 분석 및 발전 방향에 관한 연구)

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Jo, Yong-Gun;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.59-66
    • /
    • 2011
  • The representative concept of the future war is NCW. The main point of NCW is that it is connected by networ ks and gathers the battlefield status in real time, managing and controlling it. This is most needed in the navy. Operations of the navy are carried out in wide areas, individually or together. During this process, sharing information between each warship should be essential. Furthermore in the case of the American navy, they see the entire world as the operation area so it is a representative example of NCW. The C4I system of the Korean army is separated a ccording to the difference of each army's tactics and weapon system, being developed and managed differently. The refore there is a problem of interoperability lacking in each system. This paper analyzes the developed C4I system of the American navy to analyze the problems of C4I system of the Korean army, and propose the future direction of its development.

A Learning-Flow Model Supporting Distributed Cognition in IT Education (IT교육에서 분산인지를 지원하는 학습몰입모형)

  • Kim, Sung-Ki;Bae, Ji-Hye
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.51-59
    • /
    • 2012
  • This paper presents a new learning model, "BoX(Battle of X)", which is based on a concept from the culture of B-Boys who enjoy the race of "distributed cognition" to win in their contests. The "battle" means a contest and "X" means a course to which our learning model can be applied. The goal of this paper is to present a learning model that allow students to be in a state of learning-flow and provides them with the ability of creative problem solving simultaneously. The key of the "BoX" implementation is to design a principle that controls contests between students to maximize distributed cognitive activities for reducing individual's cognitive load. This paper also presents how-to of "BoX" implementation and its effects. Through the analysis on learning achievement of students during one year course of IT education, we have confirmed that the "BoX" model provides students with higher learning achievement and learning-flow level in comparison with traditional learning model.

Analysis and prospect of North Korea's Cyber threat (북한의 사이버전 위협에 대한 분석과 전망)

  • Lee, Dae Sung;Ahn, Young Kyu;Kim, Minsu
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.11-16
    • /
    • 2016
  • In modern society, the development of Information and Communication Technology has given people a lot of opportunities. But on the other side cyber attack also gives enormous damage to people. Recently Korea has become the target of cyber attack. The threat of it is growing. Especially North Korea has committed hostile actions against South Korea. North Korea has recently attacked the computer networks of South Korea's important national facilities. The types of North Korea's cyber attacks include the followings. First, if we see it with the viewpoint of software, it tries to destroy or control the Internet, infects the networks with viruses, worms, Trojan Horse and Distributed Denial of Service. I suggest the following to solve the problem. First, South Korea should unify the organizations to respond to the attacks of North Korea, as North Korea has a unified organization for the cyber attack. Second, they should think about the establishment of "Cyber Terrorism Prevention Act" to systematically respond to the software attacks.

The Structural Analysis and Implications of Security Vulnerabilities In Mobile Srevice Network (모바일 서비스 네트워크의 구조적 분석과 보안 취약성)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.49-55
    • /
    • 2016
  • Recently mobile service industry has grown very rapidly. In this paper, We investigated the changes in mobile service network as well as security vulnerabilities of network in future 5G mobile service network, too. Recently, there are rapid developement of information and communication and rapid growth of mobile e-business users. Therefore We try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. In addition, there is a need of internetworking between mobile and IoT services. Wireless Application Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, We investigate the structure of mobile service network in order to gain security vulnerabilities and insights in this paper.

The Design of Authentication Model based on Symmetric Key Encryption for Improving Network Availability in Cloud Environment (클라우드 환경에서 네트워크 가용성 개선을 위한 대칭키 암호화 기반 인증 모델 설계)

  • Baek, Yong-Jin;Hong, Suk-Won;Kim, Sang-Bok
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.47-53
    • /
    • 2019
  • Network-based sharing of information has evolved into a cloud service environment today, increasing its number of users rapidly, but has become a major target for network-based illegal attackers.. In addition, IP spoofing among attackers' various attack techniques generally involves resource exhaustion attacks. Therefore, fast detection and response techniques are required. The existing detection method for IP spoofing attack performs the final authentication process according to the analysis and matching of traceback information of the client who attempted the connection request. However, the simple comparison method of traceback information may require excessive OTP due to frequent false positives in an environment requiring service transparency. In this paper, symmetric key cryptography based on traceback information is used as mutual authentication information to improve this problem. That is, after generating a traceback-based encryption key, mutual authentication is possible by performing a normal decryption process. In addition, this process could improve the overhead caused by false positives.

A Study on Smart City Risk Factors and Resistance (스마트시티 위험요인과 저항에 관한 연구)

  • Park, Hyunae;Yoo, Youngcheon;Lee, Hwansoo
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.15-28
    • /
    • 2020
  • Smart City is highly anticipated to solve the problems of existing cities and create new added value, but there is also increasing concern about security risks. The negative view of smart city according to security risk awareness is a problem that needs to be improved in order to activate the fourth industrial revolution technology and develop smart city. This study examined risk factors in smart cities based on perceived risk and user resistance theory, and empirically analyzed the relationship with resistance attitudes. According to the empirical analysis with 288 research samples, security, social, and physical risk factors directly affect smart city resistance, while financial, performance, and privacy risk have no significant effect. In addition, it was verified that the security risk can is an antecedent factor for other risk factors, and it was confirmed that it is required to separately discuss the security and privacy risk in the smart city environment. This study shows that it is necessary to prepare policy supports for social interactions as well as security and physical safety issues in order to activate smart city by discussing the risk factors that negatively affect smart city perception from the public's point of view.

Analysis on Awareness of Construction Labors about Resolution Step of the Delayed Wage Payment (임금체불 해소절차에 대한 건설근로자 인식 분석)

  • Yang, Gi Nam;Kim, Gwang-Hee
    • Journal of the Korea Institute of Building Construction
    • /
    • v.16 no.6
    • /
    • pp.553-560
    • /
    • 2016
  • Wage is a very important issue not only for the workers' current living but also for the future laboring landscape. As of 2014, it is reported that about 290,000 workers suffer from delay in payment of wage. The construction industry is particularly labor-intensive, which implies that delay in payment of wage is a serious problem. Despite this fact, in terms of the delayed payment of wage most studies have been conducted on the improvement of a system to resolve delayed payment in exclusion of labor workers' awareness and thinking. Thus, the purpose of this study is to understand construction labor' awareness and analyze the effectiveness of the resolution step of the delayed payment of wage based on construction labors' awareness. In the research result, more than 30 percent of all construction labors and managers are never aware of the settlement procedure of the delayed payment, and it appears that the resolution step system needs to be greatly improved. In conclusion, it is expected that this study will be utilized as fundamental data for the settlement procedure of the delayed payment, and the influence of delayed payment on construction labors' safety behavior and productivity should be further studied in the future.

Flight Measurement and Analysis for Signal Influence of CVOR and DVOR by It's Surrounding Obstacle Condition (CVOR과 DVOR의 장애물 영향 비행측정 및 비교 분석)

  • Park, Hyeong-Taek;Hwang, Byong-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11A
    • /
    • pp.1206-1212
    • /
    • 2007
  • International Civil Aviation Organization(ICAO) adopted VOR(Very high frequency Omni-Range) as an international standard air navigation system in 1949 and recommended every country to make use of it in formulating air route and guiding take-off and landing of an aircraft. VOR is quite a useful navigation system so that more than 2,000 VORs are currently installed all over the world including 39 in the Republic of Korea; however, VOR signal could be easily affected by its circumstance like a mountainous area because it provides navigation information to an aircraft through AM and FM of VHF carrier. There are two types of VOR which are defined according to a design methode. Therefore this study intends to investigate which type of VOR is suitable for mountainous area. For that purpose, the performance of each CVOR and DVOR is measured and analyzed by using an aircraft equipped with measuring instruments. The analyzed result will be applied and utilized in selecting the VOR type, so it could be a feasible solution of problem related to the VOR relocation due to its insufficient performance in the future.

Distribution of Inter-Contact Time: An Analysis-Based on Social Relationships

  • Wei, Kaimin;Duan, Renyong;Shi, Guangzhou;Xu, Ke
    • Journal of Communications and Networks
    • /
    • v.15 no.5
    • /
    • pp.504-513
    • /
    • 2013
  • Communication in delay tolerant networks (DTNs) relies on message transport by mobile nodes, and a correct understanding of the node mobility characteristics is therefore crucial to the design of an efficient DTN routing protocol. However, previous work has mainly focused on uncovering all behaviors of node movement, which is not conducive to accurately detecting the specific movement characteristics of a different node. In this paper, we seek to address this problem based on a consideration of social relationships. We first consider social ties from both static and dynamic perspectives. For a static perspective, in addition to certain accidental events, social relations are considered for a long time granularity and tend to be stable over time. For a dynamic perspective, social relations are analyzed in a relatively short time granularity and are likely to change over time. Based on these perspectives, we adopted different efficient approaches to dividing node pairs into two classes, i.e., familiar and unfamiliar pairs. A threshold approach is used for static social ties whereas a density-based aggregation method is used for dynamic social relationships. Extensive experimental results show that both familiar and unfamiliar node pairs have the same inter-contact time distribution, which closely follows a power-law decay up to a certain point, beyond which it begins to exponentially decay. The results also demonstrate that the inter-contact time distribution of familiar pairs decays faster than that of unfamiliar pairs, whether from a static or dynamic perspective. In addition, we also analyze the reason for the difference between the inter-contact time distributions of both unfamiliar and familiar pairs.

Damping Inter-area Low Frequency Oscillations in Large Power Systems with $H_{\infty}$ Control of TCSC PARTI : TCSC Siting (TCSC의 $H_{\infty}$ 제어에 의한 대규모 전력계통의 지역간 저주파진동 억제 PartI : 설치지점 선정)

  • Kim, Yong-Gu;Sim, Gwan-Sik;Song, Seong-Geun;Kim, Yeong-Hwan;Nam, Hae-Gon
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.49 no.5
    • /
    • pp.226-232
    • /
    • 2000
  • This paper presents application results of the augmented matrix eigen-sensitivity theories to TCSC siting problem for damping the inter-area low frequency oscillation in the large KEPCO system. First and second-order eigen-sensitivities of the inter-area low frequency oscillation in the large KEPCO system. First and second-order eigen-sensitivities of the inter-area mode are computed fro changes in susceptance of the transmission lines. The lines having high sensitivity are chosen as the initial candidates for installing TCSC. Then for each of the chosen candidates, Bodeplot of the transfer function with line susceptance as the input and the bus voltage at one side of the line as the output is computed. Using the Bode plots, the lines having any zeros near the inter-area mode are screened out since design of TCSC controller is very difficult in such a case. The $H_{\infty}$ TCSC controller installed at any finally chosen candidate is found to be effective in damping the inter-area oscillation, and the proposed TCSC siting algorithm is proved to be valid. Design of $H_{\infty}$ controller is described in Part IIof this paper.

  • PDF