• Title/Summary/Keyword: 데이터보안

Search Result 3,363, Processing Time 0.024 seconds

Trend Forecasting and Analysis of Quantum Computer Technology (양자 컴퓨터 기술 트렌드 예측과 분석)

  • Cha, Eunju;Chang, Byeong-Yun
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.3
    • /
    • pp.35-44
    • /
    • 2022
  • In this study, we analyze and forecast quantum computer technology trends. Previous research has been mainly focused on application fields centered on technology for quantum computer technology trends analysis. Therefore, this paper analyzes important quantum computer technologies and performs future signal detection and prediction, for a more market driven technical analysis and prediction. As analyzing words used in news articles to identify rapidly changing market changes and public interest. This paper extends conference presentation of Cha & Chang (2022). The research is conducted by collecting domestic news articles from 2019 to 2021. First, we organize the main keywords through text mining. Next, we explore future quantum computer technologies through analysis of Term Frequency - Inverse Document Frequency(TF-IDF), Key Issue Map(KIM), and Key Emergence Map (KEM). Finally, the relationship between future technologies and supply and demand is identified through random forests, decision trees, and correlation analysis. As results of the study, the interest in artificial intelligence was the highest in frequency analysis, keyword diffusion and visibility analysis. In terms of cyber-security, the rate of mention in news articles is getting overwhelmingly higher than that of other technologies. Quantum communication, resistant cryptography, and augmented reality also showed a high rate of increase in interest. These results show that the expectation is high for applying trend technology in the market. The results of this study can be applied to identifying areas of interest in the quantum computer market and establishing a response system related to technology investment.

Development of Sailing Algorithm for Ship Group Navigation System (선박 그룹항해시스템의 항법 알고리즘 개발)

  • Wonjin, Choi;Seung-Hwan, Jun
    • Journal of Navigation and Port Research
    • /
    • v.46 no.6
    • /
    • pp.554-561
    • /
    • 2022
  • Technology development related to maritime autonomous surface ships (MASS) is actively progressing around the world. However, since there are still many technically unresolved problems such as communication, cybersecurity, and emergency response capabilities, it is expected that it will take a lot of time for MASS to be commercialized. In this study, we proposed a ship group navigation system in which one leader ship and several follower ship are grouped into one group. In this system, when the leader ship begins to navigate, the follower ship autonomously follows the path of the leader ship. For path following, PD (proportional-derivative) control is applied. In addition, each ship navigates in a straight line shape while maintaining a safe distance to prevent collisions. Speed control was implemented to maintain a safe distance between ships. Simulations were performed to verify the ship group navigation system. The ship used in the simulation is the L-7 model of KVLCC2, which has related data disclosed. And the MMG (Maneuvering Modeling Group) standard method proposed by the Japan Society of Naval Architects and Ocean Engineering (JASNAOE) was used as a model of ship maneuvering motion. As a result of the simulation, the leader ship navigated along a predetermined route, and the follower ship navigated along the leader ship's path. During the simulation, it was found that the three ships maintained a straight line shape and a safe distance between them. The ship group navigation system is expected to be used as a navigation system to solve the problems of MASS.

A Study on the Safety Navigational Width of Bridges Across Waterways Considering Optimal Traffic Distribution (최적 교통분포를 고려한 해상교량의 안전 통항 폭에 관한 연구)

  • Son, Woo-Ju;Mun, Ji-Ha;Gu, Jung-Min;Cho, Ik-Soon
    • Journal of Navigation and Port Research
    • /
    • v.46 no.4
    • /
    • pp.303-312
    • /
    • 2022
  • Bridges across waterways act as interference factors, that reduce the navigable water area from the perspective of navigation safety. To analyze the safety navigational width of ships navigating bridges across waterways, the optimal traffic distribution based on AIS data was investigated, and ships were classified according to size through k-means clustering. As a result of the goodness-of-fit analysis of the clustered data, the lognormal distribution was found to be close to the optimal distribution for Incheon Bridge and Busan Harbor Bridge. Also, the normal distributions for Mokpo Bridge and Machang Bridge were analyzed. Based on the lognormal and normal distribution, the analysis results assumed that the safe passage range of the vessel was 95% of the confidence interval, As a result, regarding the Incheon Bridge, the difference between the normal distribution and the lognormal distribution was the largest, at 64m to 98m. The minimum difference was 10m, which was revealed for Machang Bridge. Accordingly, regarding Incheon Bridge, it was analyzed that it is more appropriate to present a safety width of traffic by assuming a lognormal distribution, rather than suggesting a safety navigation width by assuming a normal distribution. Regarding other bridges, it was analyzed that similar results could be obtained using any of the two distributions, because of the similarity in width between the normal and lognormal distributions. Based on the above results, it is judged that if a safe navigational range is presented, it will contribute to the safe operation of ships as well as the prevention of accidents.

3D Explosion Analyses of Hydrogen Refueling Station Structure Using Portable LiDAR Scanner and AUTODYN (휴대형 라이다 스캐너와 AUTODYN를 이용한 수소 충전소 구조물의 3차원 폭발해석)

  • Baluch, Khaqan;Shin, Chanhwi;Cho, Yongdon;Cho, Sangho
    • Explosives and Blasting
    • /
    • v.40 no.3
    • /
    • pp.19-32
    • /
    • 2022
  • Hydrogen is a fuel having the highest energy compared with other common fuels. This means hydrogen is a clean energy source for the future. However, using hydrogen as a fuel has implication regarding carrier and storage issues, as hydrogen is highly inflammable and unstable gas susceptible to explosion. Explosions resulting from hydrogen-air mixtures have already been encountered and well documented in research experiments. However, there are still large gaps in this research field as the use of numerical tools and field experiments are required to fully understand the safety measures necessary to prevent hydrogen explosions. The purpose of this present study is to develop and simulate 3D numerical modelling of an existing hydrogen gas station in Jeonju by using handheld LiDAR and Ansys AUTODYN, as well as the processing of point cloud scans and use of cloud dataset to develop FEM 3D meshed model for the numerical simulation to predict peak-over pressures. The results show that the Lidar scanning technique combined with the ANSYS AUTODYN can help to determine the safety distance and as well as construct, simulate and predict the peak over-pressures for hydrogen refueling station explosions.

Cyber attack group classification based on MITRE ATT&CK model (MITRE ATT&CK 모델을 이용한 사이버 공격 그룹 분류)

  • Choi, Chang-hee;Shin, Chan-ho;Shin, Sung-uk
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.1-13
    • /
    • 2022
  • As the information and communication environment develops, the environment of military facilities is also development remarkably. In proportion to this, cyber threats are also increasing, and in particular, APT attacks, which are difficult to prevent with existing signature-based cyber defense systems, are frequently targeting military and national infrastructure. It is important to identify attack groups for appropriate response, but it is very difficult to identify them due to the nature of cyber attacks conducted in secret using methods such as anti-forensics. In the past, after an attack was detected, a security expert had to perform high-level analysis for a long time based on the large amount of evidence collected to get a clue about the attack group. To solve this problem, in this paper, we proposed an automation technique that can classify an attack group within a short time after detection. In case of APT attacks, compared to general cyber attacks, the number of attacks is small, there is not much known data, and it is designed to bypass signature-based cyber defense techniques. As an attack model, we used MITRE ATT&CK® which modeled many parts of cyber attacks. We design an impact score considering the versatility of the attack techniques and proposed a group similarity score based on this. Experimental results show that the proposed method classified the attack group with a 72.62% probability based on Top-5 accuracy.

A research on cyber target importance ranking using PageRank algorithm (PageRank 알고리즘을 활용한 사이버표적 중요성 순위 선정 방안 연구)

  • Kim, Kook-jin;Oh, Seung-hwan;Lee, Dong-hwan;Oh, Haeng-rok;Lee, Jung-sik;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.115-127
    • /
    • 2021
  • With the development of science and technology around the world, the realm of cyberspace, following land, sea, air, and space, is also recognized as a battlefield area. Accordingly, it is necessary to design and establish various elements such as definitions, systems, procedures, and plans for not only physical operations in land, sea, air, and space but also cyber operations in cyberspace. In this research, the importance of cyber targets that can be considered when prioritizing the list of cyber targets selected through intermediate target development in the target development and prioritization stage of targeting processing of cyber operations was selected as a factor to be considered. We propose a method to calculate the score for the cyber target and use it as a part of the cyber target prioritization score. Accordingly, in the cyber target prioritization process, the cyber target importance category is set, and the cyber target importance concept and reference item are derived. We propose a TIR (Target Importance Rank) algorithm that synthesizes parameters such as Event Prioritization Framework based on PageRank algorithm for score calculation and synthesis for each derived standard item. And, by constructing the Stuxnet case-based network topology and scenario data, a cyber target importance score is derived with the proposed algorithm, and the cyber target is prioritized to verify the proposed algorithm.

A Study on the Improvement of Collection, Management and Sharing of Maritime Traffic Information (해상교통정보의 수집, 관리 및 공유 개선방안에 관한 연구)

  • Shin, Gil-Ho;Song, Chae-Uk
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.4
    • /
    • pp.515-524
    • /
    • 2022
  • To effectively collect, manage, and share the maritime traffic information, it is necessary to identify the technology trends concerning this particular information and analyze its current status and problems. Therefore, this study observes the domestic and foreign technology trends involving maritime traffic information while analyzing and summarizing the current status and problems in collecting, managing, and sharing it. According to the data analysis, the problems in the collecting stage are difficulties in collecting visual information from long-distance radars, CCTVs, and cameras in areas outside the LTE network coverage. Notably, this explains the challenges in detecting smuggling ships entering the territorial waters through the exclusive economic zone (EEZ) in the early stage. The problems in the management stage include difficult reductions and expansions of maritime traffic information caused by the lack of flexibility in storage spaces mostly constructed by the maritime transportation system. Additionally, it is challenging to deal with system failure with system redundancy and backup as a countermeasure. Furthermore, the problems in the sharing stage show that it is difficult to share information with external operating organizations since the internal network is mainly used to share maritime transportation information. If at all through the government cloud via platforms such as LRIT and SASS, it often fails to effectively provide various S/W applications that help use maritime big data. Therefore, it is suggested that collecting equipment such as unmanned aerial vehicles and satellites should be constructed to expand collecting areas in the collecting stage. In the management and sharing stages, the introduction and construction of private clouds are suggested, considering the operational administration and information disclosure of each maritime transportation system. Through these efforts, an enhancement of the expertise and security of clouds is expected.

A Study on the Blockchain based Frequency Allocation Process for Private 5G (블록체인 기반 5G 특화망 주파수 할당 프로세스 연구)

  • Won-Seok Yoo;Won-Cheol Lee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.1
    • /
    • pp.24-32
    • /
    • 2023
  • The current Private 5G use procedure goes through the step of application examination, use and usage inspection, and can be divided in to application, examination step as a procedure before frequency allocation, and use, usage inspection step as a procedure after frequency allocation. Various types of documents are required to apply for a Private 5G, and due to the document screening process and radio station inspection for using Private 5G frequencies, the procedure for Private 5G applicants to use Private 5G is complicated and takes a considerable amount of time. In this paper, we proposed Frequency Allocation Process for Private 5G using a blockchain platform, which is fast and simplified than the current procedure. Through the use of a blockchain platform and NFT (Non-Fungible Token), reliability and integrity of the data required in the frequency allocation process were secured, and security of frequency usage information was maintained and a reliable Private 5G frequency allocation process was established. Also by applying the RPA system that minimizes human intervention, fairness was secured in the process of allocating Private 5G. Finally, the frequency allocation process of Private 5G based on the Ethereum blockchain was performed though a simulation.

Prototype Fabrication and Performance Evaluation of Metal-oxide Nanoparticle Sensor for Detecting of Hazardous and Noxious Substances Diluted in Sea Water (해수 중 유해위험물질 검출을 위한 금속산화물 나노 입자 센서의 시작품 제작 및 성능 평가)

  • Sangsu An;Changhan Lee;Jaeha Noh;Youngji Cho;Jiho Chang;Sangtae Lee;Yongmyung Kim;Moonjin Lee
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.spc
    • /
    • pp.23-29
    • /
    • 2022
  • To detect harmful chemical substances in seawater, we fabricated a prototype sensor and evaluated its performance. The prototype sensor consisted of a detector, housing, and driving circuit. We built the detector by printing an Indium-Tin-Oxide (ITO) nanoparticle film on a flexible substrate, and it had two detection parts for simultaneous detection of temperature and HNS concentration. The housing connected the detector and the driving circuit and was made of Teflon material to prevent chemical reactions that may affect sensor performance. The driving circuit supplied electric power, and display measured data using a bridge circuit and an Arduino board. We evaluated the sensor performances such as response (ΔR), the limit of detection (LOD), response time, and errors to confirm the specification.

A Study on the AI Home Care Solution for the Mobile Vulnerable (이동약자를 위한 AI 홈케어 솔루션에 관한 연구)

  • ChangBae Noh;Wonshik Na
    • Journal of Industrial Convergence
    • /
    • v.21 no.4
    • /
    • pp.165-170
    • /
    • 2023
  • There are cases where the mobility impaired have difficulty moving from the moment they leave the house. If guardians also do not have time to entrust their families, who are socially disadvantaged, to a shelter, the guardian has no choice but to check directly in order to know the location of the guardian. The AI home care solution was designed to relieve the anxiety and labor of caregivers and to provide convenience for protection facility officials and users. If more facilities distribute and use services free of charge to non-profit foundations and protective facilities, the concern of guardians will be reduced, and the burden of facility officials who have to manage facility users will be reduced. In this paper, we provide emergency notification services to guardians in the event of an emergency as well as location and status alarms for guardians, which are all data related to movement, in consideration of the mobility vulnerable. Furthermore, it is necessary to provide a service function that recommends the optimal route using a navigation function to ease the convenience and burden of facility officials. It is necessary to alleviate anxiety by providing necessary information to the guardian, such as the location of the shuttle used by the mobile weak and the time of getting on and off. In addition, while providing services for free, the goal is to improve the quality of service for facility managers and the quality of service for the mobility weak.