• Title/Summary/Keyword: 디지털 위험

Search Result 648, Processing Time 0.024 seconds

The Countermeasure for Threat of Cyber Terror in Sociological Perspective (사회적 이슈 관점에서 바라 본 사이버 테러 유형에 대한 위험 대응방안)

  • Choi, Heesik;Kim, Hyunkyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.59-67
    • /
    • 2017
  • In recent years, cyber terror that break into major institution's information system and destroy and paralyzed important information occurs frequently. Some countries do dangerous acts such as train hackers and order hackers to hack important industrial confidential documents which are core of national competitiveness to reduce the competitiveness of the country and cause social confusion. In this thesis, it will study problems of cyber terror to help people to use Internet in web environment that safe from cyber terror and to avoid the risk from cyber terror such as malware and DDos. This thesis is organized as following. In second chapter, it will look thorough the research that are related to cyber terror. In third chapter, it will study attack types of cyber terror. In fourth chapter, to defend from cyber violence, it will suggest safe solution. In fifth chapter, it will end with conclusion. Finally, to prevent urgent incidents like North Korean Cyber-attack, every Internet user must indicate their recognition on Internet security and it is significant to make a quick response treatment to create the safe online environment.

Development of Data Acquisition System to Obtain Vessel and Weather Information in Around Mokpo Harbor Bridge (목포대교 주변의 선박 항행 정보 및 기상 정보 획득 시스템 개발)

  • Yim, Jeong-Bin
    • Journal of Navigation and Port Research
    • /
    • v.35 no.1
    • /
    • pp.1-7
    • /
    • 2011
  • This paper describes the development of Data Acquisition System (DAS) to obtain the vessel and weather information needing to evaluate collision risks levels between Mokpo harbor bridge and passing vessels. DAS consists of Signal Receiving and Processing Unit to obtain the data sets of passing vessels and weather status, Networking Unit to transmit and distribute the acquisition data sets and Data Management Unit. Through the field tests on the deck of shuttle car ferry between Mokpo Port Passenger Terminal and An-Jua island, Sinan-Gun, we found that the DAS can provide useful data sets for adequate the collision risk evaluation. In addition, the noise-like data sets appeared in the weather data can be suppressed fully using 5-th order Butterworth digital filter.

Performance verification and test for substation automation system (변전자동화 시스템 성능검증 및 실증시험)

  • Jang, B.T.;Choi, C.Y.;Kim, B.H.;Park, J.H.
    • Proceedings of the KIEE Conference
    • /
    • 2006.07a
    • /
    • pp.258-259
    • /
    • 2006
  • 국내외적으로 전력산업분야의 가장 큰 화두중 하나는 변전소 단위의 디지털화이며 특히 국외에서는 국제표준 변전자동화 시스템 연구와 제품개발 등에 인력을 집중 투자하고 있다. 국제적으로 지금까지 축적된 변전소 관련 제반 기술력 및 경험 둥을 바탕으로 전 세계적으로 단일화시키고 표준화된 변전소 자동화 규격인 IEC 61850 (Communication networks and systems in substations) 규격이 제정되었으며 따라서 향후 전력 관련 기업은 시스템 엔지니어링 기술, 전력기기 공급능력, 유지/보수/운영기술 등을 종합적으로 보유하고 자산 및 위험관리를 종합적으로 제공할 수 있어야만 세계시장에서 생존할 수 있다. 또한 전력기기를 수출하는 국내업체는 향후 IEC(International Electrotechnical Commission) 등 국제표준에 따른 전력설비를 개발하지 않으면 수출경쟁력을 잃게 될 것이다. 이러한 세계화 추세에 발맞추어 한국전력공사와 관련 업체들은 공동으로 2005년 10월부터 6년의 기간으로 "디지털 기술기반의 변전소 자동화 시스템 개발" 사업을 진행 중에 있으며 특히 한국전력공사는 변전자동화 시스템의 성능검증 및 실증시험 절차를 구축하기 위한 과제를 수행 중이다.

  • PDF

HPV-type Prediction System using SVM and Partial Sequential Pattern (분할 순차 패턴과 SVM을 이용한 HPV 타입 예측 시스템)

  • Kim, Jinsu
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.365-370
    • /
    • 2014
  • The existing system consumes a considerable amount time and cost for extracting the patterns from whole sequences or misaligned sequences. In this paper, We propose the classification system, which creates the partition sequence sections using multiple sequence alignment method and extracts the sequential patterns from these section. These extracted patterns are accumulated motif candidate sets and then used the training sets of SVM classifier. This proposed system predicts a HPV-type(high/low) using the learned knowledges from known/unknown protein sequences and shows more improved precision, recall than previous system in 30% minimum support.

Implementation of Linkage System of Traffic Applied USN (USN을 활용한 교통제어기의 연동시스템 구현)

  • Jin, Hyun-Soo
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.247-252
    • /
    • 2014
  • Traffic network is composed of passing vehicls, delayed vehicles, traffic situation which is traffic incomes of traffic interfacing system. Traffic green time light is concluded by inside input factor, that is green light cycle, yellow light cycle, led light cycle, which light cycle is sensor inputs. That light cycle is converted to traffic phase composed of passing peoples and delayed vehicles, whose intervals is concluding of traffic network factors composed of consumptiom power factors, delayed time situation, occupying sensor nodes. This is very important sector,because of much poor traffic situation.

Smart Disaster Safety Management System for Social Security (사회안전을 위한 스마트 재난안전관리 시스템)

  • Kang, Heau-jo
    • Journal of Digital Contents Society
    • /
    • v.18 no.1
    • /
    • pp.225-229
    • /
    • 2017
  • In this paper, various units of industrial disaster safety threats as well as local and national facilities unit real-time detection and prevention refer to the corresponding system goes into disaster management preparedness, prevention, response recovery of phase I systematic ICT skills that can be managed more efficiently. In addition, the immediate disaster prevention and preparedness for early forecasting preemptive damage scale and high-tech information exchange technology to overcome the limitations of a human disaster in the field against the analysis and strategy of preemptive disaster safety management with smart risk management and prevention in response and recovery and the scene quickly and efficient mutual cooperation and effective collaboration and cooperation of the Community Center social security presented a smart disaster safety management system.

Analysis of Evaluation Requirement for CC and CEM (CC와 CEM의 평가요구사항 분석)

  • Kang Yeon-Hee;Bang Young-Hwan;Choi Sung-Ja;Lee Gang-Soo
    • Journal of Digital Contents Society
    • /
    • v.5 no.2
    • /
    • pp.95-100
    • /
    • 2004
  • For improve level of information security, the necessity of evaluation and certification of Information Security System(ISS) in increasing. Evalustion and Certification Institute have evaluated ISS for risk prevention of information dysfunction in an advanced countries. But, the problem of the time and cost occurred when it is caused by with application of unlike evaluation criteria each other. The result of effort to solution, Common Criteria(CC) and Common Evaluation Methodology(CEM) is using for evaluation of ISS and mutual recognition. Evaluation participant is needed flexible and active interpretation of CC and CEM for an efficient evaluation preparation and performance.

  • PDF

Case studies : Security issues of IT products in terms of supply chain (사례 위주로 본 공급자망을 중심으로 한 IT제품 보안 위험)

  • Choi, Woongchul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.4
    • /
    • pp.89-96
    • /
    • 2016
  • Before an IT product is used, there is a sequence of the process such as the components supply-demand of the product, their assembly and production, their logistics and delivery, and then finally, the product can be used by a user. During this sequence of the process, there can be many security exposures and risks. In this paper, we show, by examining security cases of various IT products, that there are many security exposures in the process of IT products from their production to their delivery to end users and in their use, and also show how critical the security exposures are. Even though there are various security theories, technologies and security controls, there is still weak link from the production of an IT product to its use, and this weak link can lead to security vulnerabilities and risks. This paper tries to call attention to the importance of the execution of the security control and the control components. We examine the practical cases to find out how the security control is paralyzed, and to show how it is compromised by asymmetric security resources. Lastly, from the cases, we examine and review the possible domestic security issues and their countermeasures.

Speech Recognition System in Car Noise Environment (자동차 잡음환경에서의 음성인식시스템)

  • Kim, Soo-Hoon;Ahn, Jong-Young
    • Journal of Digital Contents Society
    • /
    • v.10 no.1
    • /
    • pp.121-127
    • /
    • 2009
  • The automotive ECU(Electronic Control Unit) becomes more complicated and is demanding many functions. For example, many automobile companies are developing driver convenience systems such as power window switch, LCM(Light Control Module), mirror control system, seat memory. In addition, many researches and developments for DIS(Driver Information System) are in progress. It is dangerous to operate such systems in driving. In this paper, we implement the speech recognition system which controls the car convenience system using speech, and apply the preprocessing filter to improve the speech recognition rate in car noise environment. As a result, we get the good speech recognition rate in car noise environment.

  • PDF

Technique for the ECG Bio-sounds Visualization Analysis Based on the MIT-BIH Database (MIT-BIH 데이터베이스 기반 ECG 생체신호 시각화 분석을 위한 기술)

  • Kim, Jong-Wook;Lee, Myoung-Jin;Ko, Kwang-Man;So, Kyoung-Young
    • Journal of Digital Contents Society
    • /
    • v.17 no.2
    • /
    • pp.97-103
    • /
    • 2016
  • This work introduces techniques experienced for the electrocardiogram(ECG) visual analysis, able to characterize the major parameters and events with clinical relevance for heart failure management and cardiovascular risk assessment. In particular, it includes approaches for ECG data visual processing such as the variable charts, graphs base on the complex MIT-BIH ECG database. Through the experienced this works of ECG database visualization, so many researcher more easily access the complex ECG database and can intuitionally understand the meanings via a variable ECG visualized data.