• Title/Summary/Keyword: 디지털 위험

Search Result 648, Processing Time 0.033 seconds

Design Plan for Digital Textbooks Applying Augmented Reality Image Recognition Technology -A Study on the Digital Textbooks for Middle School Science 1- (증강현실(AR) 영상인식 기술을 적용한 디지털 교과서 디자인 기획 -중학교 과학1 디지털 교과서 중심으로-)

  • Yoo, Young-Mi;Jo, Seong-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.353-363
    • /
    • 2018
  • According to the Digi Capital forecast, the global augmented reality market is expected to grow rapidly by 2020 to reach 150 billion dollars. In particular, high value added effects are expected in education. As ICT advances, digital textbooks are also leading innovative education by adding interactive functions. Advanced countries, including the U.S., are already using digital textbooks that use augmented reality technology in their classes. In line with this technological outlook, the ministry proposed a design plan that applies augmented reality technology to middle school science 1 digital textbooks. A study on middle school science 1 digital textbooks showed that each unit provided short videos. In addition, an investigation into the augmented reality class case showed that it was difficult to establish experimental equipment, lack of equipment (devices), and 3D design contents that did not continue despite the excellence of learning effects. Based on this demand, we designed an augmented reality scenario and system configuration to be applied to the instrument-specific experiments of middle school science 1 digital textbooks to explore and explore the contents of augmented reality by students. This research will replace the dangerous experiments and time consuming experiments for teachers and students by applying augmented reality to science subjects that are essential for the development of digital textbooks.

Digital Evidence Acquisition Scheme using the Trusted Third Party in Smart Grid Infrastructure (스마트그리드 환경에서 공증기관을 이용한 디지털 증거 수집 기법)

  • Cho, Youngjun;Choi, Jaeduck;Kim, Sinkyu;Seo, Jungtaek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.319-328
    • /
    • 2013
  • Considerable number of major countries have put great efforts to leverage the efficiency of power consumption using Smart Grid in order to resolve the critical issues with drastical growing demands regarding electricity, the crisis of environmental pollution and so on. There has been increasing number of researches to construct Smart Grid in Korea as well. The threats of cyber terror attacks which might cause national crisises in terms of economy and society have been climbing up because of the fact that Smart Grid employs bi-directional communications embedding the cyber threats from existing/legacy communication networks. Consequently, it is required to build concrete response processes including investigation and analysis on cyber breaches into Smart Grid. However, the digital evidence acquisition techniques do not suffice to be deployed in Smart Grid systems despite of the fact that the techniques, against cyber breaches into well-known networks, have been studied in plenty of time. This work proposes a novel digital evidence acquisition scheme appropriate to Smart Grid systems through intensive investigation of the evidence acquisition requirements in Smart Grid and the historical evidence acquisition methods.

A Development Of Low Power PLC Modem for Monitoring of Power Consumption and Breaking of Abnormal Power (전력감시 및 이상전력 차단 기능을 갖는 저전력 전력선통신 모뎀 개발)

  • Yoon, Jae-Shik;Wee, Jung-Chul;Song, Yong-Jae;Park, Chung-Ha;Kim, Jae-Heon
    • Proceedings of the KIEE Conference
    • /
    • 2009.07a
    • /
    • pp.1964_1965
    • /
    • 2009
  • 최근 경제성장과 함께 생활수준의 향상으로 인하여 홈 게이트웨이는 디지털 홈 가전기기에 초고속 통신망 접속 기능을 제공하며 각종 기기들을 하나로 네트워크화 하는 중요한 기능을 담당하게 된다. 전력선 통신은 전력선을 매체로 하기 때문에 신규선로의 포설 없이 가전기기 및 정보화 서비스 모뎀들의 네트워크화에 용이할 뿐만 아니라 커버리지 확장에도 뛰어나서 디지털 가전, 원격검침, 전력설비 감시제어, 국가 재난 감시 시스템 등의 기본 통신 방식으로 가장 유력한 기술로써 디지털 가전을 포함한 유비쿼터스 전기설비 네트워크 구성에서 필수적 기술로 채택되고 있기 때문에 지능형 홈 네트워크, 전력IT 부가 서비스, 설비감시 네트워크, 유비쿼터스 네트워크 관련 기술에 대한 파급 효과가 매우 크며, 디지털 가전의 기본 통신 방식으로 가장 유력한 기술로써 디지털 가전 구성에서 필수적 기술로 채택되고 있다. 본 연구에서는 전력선통신모뎀을 이용하여 가전기기의 전력 소비를 감지할 수 있는 센서를 내장한 전력선 통신기반의 전력 감시 모듈을 개발하여 실시간 원격 모니터링을 통해 소비전력 패턴을 작성한다. 그리고 전력감시 모듈에 연결된 가전기기의 소비전력 패턴 분석을 통해 전력소비 이상 유무를 감지할 수 있는 알고리즘을 개발, 탑재하여 이상 유무를 판단하고 전력소비가 급증할 시 자동으로 전력을 차단하여 화재나 누전의 위험을 방지한다. 이에 본 연구는 전력감시 및 이상전력 차단기능을 갖는 저전력 전력선통신 모뎀 개발에 관한 것이다.

  • PDF

Development of a Communication Protocol for a Digital Traffic Signal Controller (디지털 교통신호제어기 통신체계 개발)

  • Kim, Min-Sung;Ko, Kwang-Yong;Lee, Choul-Ki;Jeong, Jun-Ha;Heo, Nak-Won
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.3
    • /
    • pp.1-10
    • /
    • 2013
  • Most of the current traffic signal controller use load switches to transmit high voltage power to the signal lamps. The direct transmission of high voltage power may cause a lot of problems like leakages of electric power, obstructions of pedestrian, environmental disfigurements. To overcome these problems, the development of digital type signal controller has been trying in the various methods. Digital communication between a master controller and signal lamps is the most important part to improve control performance in the digital type controller. A communication system for the digital signal controller was developed in this study. The system bases on CAN specification, includes ID structure for most peripheral devices like loops, signal lamps, push buttons, police switches. The operability of this system verified with a software based CAN simulation tool.

The Undeniable Digital Multi-Signature Scheme based on Biometric Information (생체정보 기반의 부인봉쇄 디지털 다중서명 기법)

  • Yun, Sung-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.3
    • /
    • pp.549-555
    • /
    • 2007
  • A digital signature scheme provides integrity of the document, authentication and non-repudiation of a signer. Usually the key for digital signature is stored in hard disk or removal disk storage. The drawback of this approach is that the signer can let the agent to sign instead of the signer by providing the key information. It can be abused in applications such as electronic election. In this paper, we propose the undeniable biometric digital multi-signature scheme suitable for applications where the signer should not make an agent sign instead of himself/herself. The undeniable multi-signature scheme requires many signers and only the designated user can confirm the authenticity of multi-signature. The proposed scheme satisfies undeniable property and it is secure against active attacks such as modification and denial of the multi-signature by signers. As the key is generated through the signer's fingerprint image, it's also secure against signing by an agent.

  • PDF

A Threshold Ring Group Signature for Ubiquitous Electronic Commerce (유비쿼터스 전자거래를 위한 쓰레시홀드 링 그룹 서명)

  • Sung, Soon-Hwa
    • The KIPS Transactions:PartD
    • /
    • v.14D no.4 s.114
    • /
    • pp.373-380
    • /
    • 2007
  • Ubiquitous electronic commerce can offer anytime, anywhere access to network and exchange convenient informations between individual and group, or between group and group. To use secure ubiquitous electronic commerce, it is essential for users to have digital signature with the properties of integrity and authentication. The digital signature for ubiquitous networks is required neither a trusted group manager, nor a setup procedure, nor a revocation procedure etc. because ubiquitous networks can construct or deconstruct groups anytime, anwhere as occasion demands. Therefore, this paper proposes a threshold ring signature as digital signature for secure ubiquitous electronic commerce using the ring signature without forgery (integrity) and the (n,t) ring signature solving the problem cannot prove the fact which a message is signed by other signer. Thus the proposed threshold ring signature is ubiquitous group signature for the next generation.

An Assurance Mechanism of Intrusion Data for Making Digital Evidence in Digital Computing Environment (디지털 컴퓨팅 환경의 디지털 증거화를 위한 침해 데이터보증 메커니즘)

  • Jang, Eun-Gyeom
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.129-141
    • /
    • 2010
  • In digital computing environment, for the mal functions in appliances and system errors, the unaccepted intrusion should be occurred. The evidence collecting technology uses the system which was damaged by intruders and that system is used as evidence materials in the court of justice. However the collected evidences are easily modified and damaged in the gathering evidence process, the evidence analysis process and in the court. That’s why we have to prove the evidence’s integrity to be valuably used in the court. In this paper, we propose a mechanism for securing the reliability and the integrity of digital evidence that can properly support the Computer Forensics. The proposed mechanism shares and manages the digital evidence through mutual authenticating the damaged system, evidence collecting system, evidence managing system and the court(TTP: Trusted Third Party) and provides a secure access control model to establish the secure evidence management policy which assures that the collected evidence has the corresponded legal effect.

Digital Twin Model Design And Implementation Using UBS Process Data (UBS공정 데이터를 활용한 디지털트윈 모델 설계 및 구현)

  • Park, Seon-Hui;Bae, Jong-Hwan;Ko, Ho-Jeong
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.3
    • /
    • pp.63-68
    • /
    • 2022
  • Due to COVID-19, many paradigm shifts in existing manufacturing facilities and the expansion of non-face-to-face services are accelerating worldwide. A representative technology is digital twin technology. Such digital twin technology, which existed only conceptually in the past, has recently become feasible with the construction of a 5G-based network. Accordingly, this paper designed and implemented a part of the USB process to enable digital twins based on OPC UA communication, which is a standard interlocking structure, between real object objects and virtual reality-based USB process in accordance with this paradigm change. By reflecting the physical characteristics of real objects together, it is possible to simulate real-time synchronization of these with real objects. In the future, this can be applied to various industrial fields, and it is expected that it will be possible to reduce costs for decision-making and prevent dangerous accidents.

An upgrade of Landslide Hazard Map with Analysis of Debris Flow using High-Quality Geospatial Information (고품질 공간정보를 이용한 토석류 분석을 통한 산사태위험지도의 갱신방안 - 춘천지역을 중심으로 -)

  • Yang, In Tae;Yu, Young Geol;Park, Kheun;Park, Jae Kook
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.23 no.4
    • /
    • pp.17-24
    • /
    • 2015
  • This study utilized high quality three-dimensional geospatial information produced by high-resolution Digital Aerial Photograph and Airborne LiDAR data in order to analyse landslides and debris flows induced by the heavy rainfall in Chuncheon area. Also, this study analysed correlation between the established landslide hazard map and the landslide factor effect and reviewed the analysis result of debris flows on the area where landslides with debris flows occurred frequently. Finally;the study proposed ways to renew the established landslide hazard map effectively and utilize the high quality three-dimensional Geospatial information on the landslide risk area.

"Dangerous Media vs. Reliable Childcare Helper" : Discursive Analysis of Infants' Smart Media Use ('위험한 미디어 vs 든든한 육아 도우미' : 영유아 스마트 미디어 이용 담론에 대한 탐구)

  • Choi, Yisook;Kim, Banya
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.8
    • /
    • pp.515-525
    • /
    • 2021
  • The study examines how the discourse on infants' smart media use has been constructed under media-saturated situations. Infants' use of smart media has been regarded as a dangerous activity, rate of overdependence has been increasing. Newspapers during the recent three years (2018-20) were analyzed. The most prominent speakers in the news field were smart media content producers and platform operators. There were negative views and concerns about infants' smart media use by academics, civic groups, and parents. However, the industry went beyond these risk discourses and gave positive meaning: Smart media was redefined as safe media for infants and reliable childcare helpers for parents. Parents were portrayed as those responsible for their children's media use and in need of help for childcare, rather than being blamed for their children's overdependence on smart media. Digital parenting seems to be emerging as an acceptable and practicable way of childcare rather than harmful and incomplete parenting.