• Title/Summary/Keyword: 사이버정보

Search Result 2,478, Processing Time 0.029 seconds

Production of fusion-type realistic contents using 3D motion control technology (3D모션 컨트롤 기술을 이용한 융합형 실감 콘텐츠 제작)

  • Jeong, Sun-Ri;Chang, Seok-Joo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.4
    • /
    • pp.146-151
    • /
    • 2019
  • In this paper, we developed a multi-view video content based on real-world technology and a pilot using the production technology, and provided realistic contents production technology that can select a desired direction at a user 's view point by providing users with various viewpoint images. We also created multi-view video contents that can indirectly experience local cultural tourism resources and produced cyber tour contents based on multi-view video (realistic technology). This technology development can be used to create 3D interactive real-world contents that are used in all public education fields such as libraries, kindergartens, elementary schools, middle schools, elderly universities, housewives classrooms, lifelong education centers, The domestic VR market is still in it's infancy, and it's expected to develop in combination with the 3D market related to games and shopping malls. As the domestic educational trend and the demand for social public education system are growing, it is expected to increase gradually.

Study on the Localization Concordance of Video and Audio (시선에 따른 영상 음향 정위 일치에 관한 연구)

  • Lee, Kyou-Won;Choi, Hae-Geun;Park, So-Youn;Park, Goo-Man;Kim, Seong-Kweon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.6
    • /
    • pp.1293-1300
    • /
    • 2018
  • The $360^{\circ}$ video has a lot of image information and usefulness; however, the position of the audio source judged by hearing is different from the position on the screen. Therefore, human feels tired, the immersion decrease and user cant watch the video for Moreer time. In this paper, the concordance rate of the video and the audio localization is defined. The rate is expressed in a percentage. It means how much the system makes the sound localization real according to the position of the source on the screen. With this rate, the audio localization performance of immersive audio producing and playing system can be evaluated. It will be helpful for developers to make the higher performance system and expected to contribute to make makinguality system with reality.

A Study on the Probabilistic Vulnerability Assessment of COTS O/S based I&C System (상용 OS기반 제어시스템 확률론적 취약점 평가 방안 연구)

  • Euom, Ieck-Chae
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.8
    • /
    • pp.35-44
    • /
    • 2019
  • The purpose of this study is to find out quantitative vulnerability assessment about COTS(Commercial Off The Shelf) O/S based I&C System. This paper analyzed vulnerability's lifecycle and it's impact. this paper is to develop a quantitative assessment of overall cyber security risks and vulnerabilities I&C System by studying the vulnerability analysis and prediction method. The probabilistic vulnerability assessment method proposed in this study suggests a modeling method that enables setting priority of patches, threshold setting of vulnerable size, and attack path in a commercial OS-based measurement control system that is difficult to patch an immediate vulnerability.

Possibility of Epigenetic Phenomenon of the three Major Famine and 4.3 Incident in Jeju (제주 3대 대(大)기근과 4.3사건의 후성유전(後成遺傳)(Epigenetic)현상 개연성)

  • Lee, Moon Ho;Kim, Jeong Su
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.2
    • /
    • pp.45-52
    • /
    • 2019
  • The human genome project decoded 99% of human genes for $ 3 billion by 1990-2003. However, as many studies on genes have progressed, it has become clear that there are many cases where diseases occur without structural alteration of genes. The latest study, Epigenetics, has come up with the answer to this problem. The famine that hit Jeju until 1670-1795, the ban on the exclusion of Jeju Island to the outside 200 years of suffering, and in 1948, one third of the citizens were killed by the 4.3 incident generate Epigenetic. It has been shown in the world history science that starving-stress can be manifested as obesity and disease in progeny due to hereditary phenomena. 5G-based healthcare IoT technology can be used for the treatment of obesity by enabling Epigenetic analysis of this phenomenon.

Strategies and Experts in Other Countries for Patient Safety and Quality Improvement (환자안전과 질 향상을 위한 다른 나라의 개선 전략과 전담인력)

  • Kwak, Mi-Jeong;Park, Seong-Hi;Kim, Chul-Gyu;Park, TaeZoon;Lee, Sang-Il;Lee, Sun-Gyo;Choi, Yun-Kyoung;Hwang, Jeong-Hae
    • Quality Improvement in Health Care
    • /
    • v.26 no.2
    • /
    • pp.104-112
    • /
    • 2020
  • This study was done to investigate the independent organizations established for patient safety, related policies, and the duties of experts in other countries. Australia established an organization called the Commission in 2006, the United Kingdom established the National Patients Safety Agency in 2001, and the United States assigned its work to the Agency for Healthcare Research and Quality in 2005. This was done by law in all three countries. The experts for patient safety were mainly called the "patent safety and quality coordinator", and although there was no qualification system for carrying out patient safety work, all three countries had licenses in the health care field or required more than 4-5 years of practical experience. The main duties were planning on patient safety and quality of healthcare service, data collection and analysis, and education, etc. and for this, competencies such as communication, leadership, and teamwork were required.

A study on the threat hunting model for threat detection of circumvent connection remote attack (우회 원격공격의 위협탐지를 위한 위협 헌팅 모델 연구)

  • Kim, Inhwan;Ryu, Hochan;Jo, Kyeongmin;Jeon, Byungkook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.15-23
    • /
    • 2021
  • In most hacking attacks, hackers intrudes inside for a long period of time and attempts to communicate with the outside using a circumvent connection to achieve purpose. research in response to advanced and intelligent cyber threats has been mainly conducted with signature-based detection and blocking methods, but recently it has been extended to threat hunting methods. attacks from organized hacking groups are advanced persistent attacks over a long period of time, and bypass remote attacks account for the majority. however, even in the intrusion detection system using intelligent recognition technology, it only shows detection performance of the existing intrusion status. therefore, countermeasures against targeted bypass rwjqthrwkemote attacks still have limitations with existing detection methods and threat hunting methods. in this paper, to overcome theses limitations, we propose a model that can detect the targeted circumvent connection remote attack threat of an organized hacking group. this model designed a threat hunting process model that applied the method of verifying the origin IP of the remote circumvent connection, and verified the effectiveness by implementing the proposed method in actual defense information system environment.

A Study on the Improvement of Personal Identity Proofing Service Using an Alternative Method for Resident Registration Number Based on Electronic Signature (전자서명 기반의 주민등록번호 대체수단을 사용한 본인확인서비스 개선 방안에 대한 연구)

  • Kim, Jong Bae
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.453-462
    • /
    • 2021
  • As the status of public certificates expired due to the recent revision of the Electronic Signature Act, electronic signature-based public certificates were also lost in the means of replacing resident registration numbers(RRN). As a result, public certification institutions have recently been designated by the Korea Communications Commission as identity verification service providers through a review of the designation of personal identity proofing agency based on alternative means of RRN. However, unlike existing RRN replacements such as i-PIN, mobile phones, and credit cards, the personal identity proofing process for applicants for certificates is different from existing alternatives. The proposed method shows that it is possible to protect users' personal information and provide universal, reasonable, and safe identification services by applying improvements to electronic signature-based personal identity proofing services.

A Study on Injection Attacks and Defenses on Microsoft Windows (MS Windows에서 인젝션 공격 및 방어 기법 연구)

  • Seong, HoJun;Cho, ChangYeon;Lee, HoWoong;Cho, Seong-Je
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.9-23
    • /
    • 2020
  • Microsoft's Windows system is widely used as an operating system for the desktops and enterprise servers of companies or organizations, and is a major target of cyber attacks. Microsoft provides various protection technologies and strives for defending the attacks through periodic security patches, however the threats such as DLL injection and process injection still exist. In this paper, we analyze 12 types of injection techniques in Microsoft Windows, and perform injection attack experiments on four application programs. Through the results of the experiments, we identify the risk of injection techniques, and verify the effectiveness of the mitigation technology for defending injection attacks provided by Microsoft. As a result of the experiments, we have found that the current applications are vulnerable to several injection techniques. Finally, we have presented the mitigation techniques for these injection attacks and analyzed their effectiveness.

Stacked Sparse Autoencoder-DeepCNN Model Trained on CICIDS2017 Dataset for Network Intrusion Detection (네트워크 침입 탐지를 위해 CICIDS2017 데이터셋으로 학습한 Stacked Sparse Autoencoder-DeepCNN 모델)

  • Lee, Jong-Hwa;Kim, Jong-Wouk;Choi, Mi-Jung
    • KNOM Review
    • /
    • v.24 no.2
    • /
    • pp.24-34
    • /
    • 2021
  • Service providers using edge computing provide a high level of service. As a result, devices store important information in inner storage and have become a target of the latest cyberattacks, which are more difficult to detect. Although experts use a security system such as intrusion detection systems, the existing intrusion systems have low detection accuracy. Therefore, in this paper, we proposed a machine learning model for more accurate intrusion detections of devices in edge computing. The proposed model is a hybrid model that combines a stacked sparse autoencoder (SSAE) and a convolutional neural network (CNN) to extract important feature vectors from the input data using sparsity constraints. To find the optimal model, we compared and analyzed the performance as adjusting the sparsity coefficient of SSAE. As a result, the model showed the highest accuracy as a 96.9% using the sparsity constraints. Therefore, the model showed the highest performance when model trains only important features.

A Study on The Need for AI Literacy According to The Development of Artificial Intelligence Chatbot (인공지능 챗봇 발전에 따른 AI 리터러시 필요성 연구)

  • Cheol-Seung Lee;Hye-Jin Baek
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.3
    • /
    • pp.421-426
    • /
    • 2023
  • Among artificial intelligence convergence technologies, Chatbot is an artificial intelligence-based interactive system and refers to a system that can provide interaction with humans. Chatbots are being re-examined as chatbots develop into NLP, NLU, and NLG. However, artificial intelligence chatbots can provide biased information based on learned data and cause serious damage such as privacy infringement and cybersecurity concerns, and it is essential to understand artificial intelligence technology and foster AI literacy. With the continued evolution and universalization of artificial intelligence, AI Literacy will also expand its scope and include new areas. This study is meaningful in raising awareness of artificial intelligence technology and proposing the use of human respect technology that is not buried in technology by cultivating human AI literacy capabilities.