• Title/Summary/Keyword: 데이터 융합 관리

Search Result 923, Processing Time 0.028 seconds

Practicality Evaluation of the Drone and LiDAR for the Management of River and Flood Retention Facility (하천 및 우수저류지 유지관리를 위한 드론 및 LiDAR의 활용성 평가)

  • Yi, Sank Kuk;Kim, Ju;Kim, Jong Buk;Chung, Moo Soon;Kim, Sung Hun;Kim, Byung Sik
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.19-19
    • /
    • 2021
  • 최근 드론 및 ICT 융·복합기술은 산업 전반에 걸쳐 새로운 대안을 제시하고 있으며, 종전의 산업은 데이터 생성·가공·활용의 효율성, 경제성, 안전성 등의 장점을 들어 빠른 속도로 관련 ICT와 의 접목을 시도해 왔다. 이를 통해 과거의 기술과 방식에서는 찾아보기 힘들었던 다양한 형태의 결과물을 제시하는 등 데이터 기반의 4차산업혁명이 선도하는 변화가 곳곳에서 일어나고 있다. 국토교통부에서는 2018년부터 중앙·지자체·공공기관 소속직원을 대상으로 드론 조종인력 양성사업을 시작으로 2019년 국방·치안·환경·안전·측량 등 10개 분야에 드론 활용 임무특화교육을 진행해왔으며, 2020년도에는 시설물 점검, 불법행위 추적 감시, 수자원 관리 등으로 교육 분야 추가하는 등 활용범위를 확대해나가고 있다. 경기도 안전관리실(안전특별점검단)에서는 이러한 국가정책의 방향에 맞춰 새로운 기술과 융합을 시도하고자 2020년부터 '드론 등을 활용한 시설물 안전점검 고도화 연구'를 시작으로 절토사면 및 옹벽 등 시설물 안전점검과 하천 및 우수저류지의 유지관리에 ICT 융·복합 기술 및 분석용 S/W 등을 적용하고자 하였다. 본 연구에서는 드론 및 LiDAR 등을 활용하여 하천, 배수로, 우수저류지 등에 대해 공공관리주체가 실시할 수 있는 유지관리점검 및 현황분석 방법에 관한 것으로서 「하천법」, 「자연재해대책법」, 「시설물의 안전 및 유지관리 실시 세부지침」, 「우수유출저감시설의 종류·구조·설치 및 유지관리 기준」 등에서 정한 사항에 대해 적용하였다. 이를 통해 하천, 우수저류지 등 수공구조물의 홍수위 변동성 평가, 홍수조절부 용량검토 등 홍수방어 능력에 대한 유지관리 차원의 공공관리주체 역할을 강화하는 제도적 측면을 검토하고, 드론, LiDAR 등의 ICT 융·복합 기술 활용 확대를 통해 예산절감 및 공공안전 강화에 기여할 수 있을 것으로 판단된다.

  • PDF

Study on the Current Status of Data Science Curriculum in Library and Information Science and its Direction (문헌정보학과의 데이터 사이언스 커리큘럼 개발 실태와 방향성 고찰)

  • Kang, Ji Hei
    • Journal of Korean Library and Information Science Society
    • /
    • v.47 no.3
    • /
    • pp.343-363
    • /
    • 2016
  • This study determines 69 iSchools provided which data science curriculum, and presents the direction for Korean LIS schools. It is certain that iSchools extend their subject territory including areas related to health, technology and biotechnology. However, this phenomenon is not actively observed in Korea. iSchools also focus on the area about how to process and manage data. iSchools, in deed, offer courses regarding data science, data management and data security. The 'database' was a higher proportion of 'data warehouse' curriculum, and, 'data statistic and analysis' curriculum are forming similar portion. As a result of analysis of the iSchool's curriculum and comparison with Korean curriculum, this study suggests: the expansion of LIS curriculum related to data science; the enhanced role of the data translational data science; development of curriculum to raise the mathematical analysis capabilities, development of specialized curriculum and experimental classes; and support new knowledge skills to interact with technology.

A Study on Intrusion Alert Redustion Method for IDS Management (침입탐지 시스템 관리를 위한 침입경보 축약기법 적용에 관한 연구)

  • Kim, Seok-Hun;Jeong, Jin-Young;Song, Jung-Gil
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.1-6
    • /
    • 2005
  • Today the malicious approach and information threat against a network system increase and, the demage about this spread to persnal user from company. The product which provides only unit security function like an infiltration detection system and an infiltration interception system reached the limits about the composition infiltration which is being turn out dispersion anger and intelligence anger Necessity of integrated security civil official is raising its head using various security product about infiltration detection, confrontation and reverse tracking of hacker. Because of the quantity to be many analysis of the event which is transmitted from the various security product and infiltration alarm, analysis is difficult. So server is becoming the charge of their side. Consequently the dissertation will research the method to axis infiltration alarm data to solve like this problem.

  • PDF

Traceback Technique using Table-based Route Management under Mobile Ad Hoc Network Environment (Mobile Ad Hoc Network에서 테이블 기반 경로 관리를 이용한 역추적 기법)

  • Yang, Hwan Seok;Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.19-24
    • /
    • 2013
  • MANET has a highly dynamic topology because it consists of only mobile nodes. Various attacks using these characteristics exist. Among them, damage of the attacks based flooding such as DoS or DDos is large and traceback of the attack node is not easy. It is because route information by moving of intermediate nodes which pass the data changes frequently. In this paper, we propose table-based traceback technique to perform efficient traceback although route information by moving of nodes changes frequently. Cluster head manages route management table in order to form cluster status table and network topology snapshot for storing the location information of mobile nodes when cluster member nodes change. Also, bloom filter is used to reduce the amount of storing route information. The performance of the proposed technique is confirmed through experiment.

A Study Medium-based safe File Management Security System on the cloud Environment (클라우드 환경에서 매체기반의 안전한 파일관리 보안 시스템에 대한 연구)

  • Kim, Hee-Chul
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.1
    • /
    • pp.142-150
    • /
    • 2019
  • This study is a file management security system that encrypts and decrypts computer and cloud data by using Bluetooth based cryptographic module. It is a necessary solution in terms of abuse of personal information and protection of social and national information. We developed H/W and S/W for SFMS(: Safe File Management Security) related Bluetooth module in cloud environment and implemented firmware development, encryption key generation and issuance, client program for system mobile and key management system. In the terminal internal encryption and decryption, SFMS was developed to ensure high security that the hacking itself is not possible because key values exist separately for each file.

메타버스의 진화에 따른 ID 관리 기술 현황

  • Jeong, Soo Yong;Seo, Chang Ho;CHO, in-Man;Jin, Seung-Hun;Kim, Soo Hyung
    • Review of KIISC
    • /
    • v.32 no.4
    • /
    • pp.49-59
    • /
    • 2022
  • 메타버스는 가상, 초월을 의미하는 '메타(meta)'와 세계, 우주를 의미하는 '유니버스(universe)'의 합성어로 현실 세계를 초월한 디지털 세계라고 정의할 수 있다. 이러한 메타버스는 현실 세계와 평행한 디지털 세계의 구축을 시작으로 블록체인(Blockchain), 인공지능(AI) 등의 기술과 고성능 웨어러블 디바이스(Wearable Device) 기반의 높은 몰입감을 제공하여 현실과 상호 작용하는 디지털 세계로 진화하고 있다. 이에 따라, 현재의 메타버스는 기존의 디지털 세계를 구축하고 활용하는 다양한 서비스가 포함된 개념으로 확장되고 있으며, 최종적으로는 현실과 디지털 세계의 경계가 없는 초현실적인 세계로 발전할 것이다. 이러한 메타버스 발전의 뒤에는 많은 보안 기술들이 필요하며, 실제 개인의 프라이버시 문제 및 보안 위협에 대한 우려가 증가하고 있다. 특히, 높은 몰입감을 제공하기 위해 이전보다 더욱 다양한 생체정보를 포함한 개인정보가 사용될 것이며, 이러한 데이터는 개인을 특정하는 ID(Identity)로 활용될 수 있다. 이에, 개인정보에 대한 보안 위협은 더욱 다양해질 것이고, 동시에 안전한 개인정보 활용이 가능한 ID 관리 기술개발의 필요성도 높아질 것이다. 따라서, 본 논문에서는 메타버스의 개념과 함께 진화 과정을 제시하고, 메타버스의 진화에 따라 다양해지는 ID 관련 보안 위협 및 대응 기술을 분석을 통해 ID 관리 기술의 현황을 정리한다.

A Data Service of Managing Favorite Broadcasting Programs for helping Viewer's Program Searching Task (시청자의 방송프로그램 탐색 작업을 지원하는 디지털방송의 선호방송프로그램 관리 데이터 서비스)

  • Ko, Kwangil;Lee, Chang-Jo
    • Convergence Security Journal
    • /
    • v.14 no.5
    • /
    • pp.9-15
    • /
    • 2014
  • Although the increase in number of the programs provides rich entertainment to viewers, it also has caused a negative of making it hard for viewers to find out their favorite programs. To address the problem, several researches have been performed mainly focusing on the technologies to analyze a viewer's TV watching-patterns and to recommend a program (or a channel) based on the analysis when a viewer changes channels. The researches, however, have the trouble of frequently failing to choose proper programs because, in the real-world broadcasting circumstance, the programs are re-broadcast over a number of the channels and a set of programs of a genre are usually playing in the overlapped times. To avoid the trouble, the data service, proposed in the paper, allows a viewer to book "explicitly" his/her favorite programs and provides a set of functions of listing up the booked program's broadcasting schedules and reserving viewing or recording the booked programs.

Active ITS Infrastructure Management Strategy for Enhanced ITS Service (기존 ITS 서비스의 성능 강화를 위한 능동형 ITS 인프라 관리 전략)

  • Choi, Dongwon
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.9
    • /
    • pp.45-53
    • /
    • 2014
  • In this study, we analyzed the next generation ITS (C-ITS) technology trends, focusing on the national and international C-ITS projects. Based on the promotion practices of developed countries, we pointed out the lack of linkages with the existing ITS infrastructure. As a way to overcome this problem, we proposed the three-direction to enable the existing ITS infrastructure corresponding to the C-ITS. First one is developing a technique to improve the performance of the existing ITS infrastructure and automate the performance management (Performance-enhanced ITS). Second, developing active sensors or fusion sensor which along with V2X communication technology implement of an active safety driving support system (Safety-enhanced ITS). Third, we need to develop a technology that generate the new advanced traffic data by integrating the collected data from existing ITS infrastructure and nomadic device (Cloud-ITS). By improving the function of the existing ITS infrastructure for adaptation to the new V2X communication environment, we enhanced the efficiency of maintenance performance and would maximize the benefit of the introduction of C-ITS.

Analysis of K-Defense Cloud Computing Service Availability Considering of Cloud Computing Traffic Growth (클라우드 컴퓨팅 트래픽 증가를 고려한 국방 클라우드 컴퓨팅 서비스 가용성 분석)

  • Lee, Sung-Tae;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.93-100
    • /
    • 2013
  • In 2012, According to 'Cisco Global Cloud Index 2011-2016', the Cisco company forecasted that global data center traffic will nearly quadruple and cloud traffic will nearly sextuple by 2016. Such a rapid growing of traffic is caused by traffic inside the data center and cloud computing workloads. In 2010, the Ministry of National Defense decided to build a Mega Center including the cloud computing technology by 2014, as part of the '2012 Information Service Plan', which is now underway. One of the factors to consider is cloud computing traffic to build a Mega Center. Since the K-defense cloud computing system is built, K-defense cloud computing traffic will increase steadily. This paper, analyzed the availability of K-defense cloud computing service with the K-defense cloud computing traffic increasing using K-Defense cloud computing test system and CloudAnalyst simulation tool. Created 3 scenarios and Simulated with these scenarios, the results are derived that the availability of K-defense cloud computing test system is fulfilled, even cloud workloads are increased as muh as forecasted cloud traffic growth from now until 2016.

IIoT processing analysis model for improving efficiency and processing time through characteristic analysis by production product (생산제품별 특성 분석을 통한 효율성 및 처리시간 향상을 위한 IIoT 처리 분석 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.397-404
    • /
    • 2022
  • Recently, in the industrial field, various studies are being conducted on converging IIoT devices that combine low-power processes and network cards into industrial sites to improve production efficiency and reduce costs. In this paper, we propose a processing model that can efficiently manage products produced by attaching IIoT sensor information to infrastructure built in industrial sites. The proposed model creates production data using IIoT data collection, preprocessing, characteristic generation, and labels to detect abnormally processed sensing information in real time by checking sensing information of products produced by IIoT at regular intervals. In particular, the proposed model can easily process IIoT data by performing tracking and monitoring so that product information produced in industrial sites can be processed in real time. In addition, since the proposed model is operated based on the existing production environment, the connection with the existing system is smooth.