• Title/Summary/Keyword: 스마트 국방

Search Result 72, Processing Time 0.026 seconds

Building Plan Research of Meeting System based on Multi-Touch Interface (멀티터치 인터페이스 회의시스템 구축 방안 연구)

  • Jang, Suk-Joo;Bak, Seon-Hui;Choi, Tae-Jun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.255-261
    • /
    • 2014
  • The development of the IT industry brought major changes in modern society. That change applies in all areas, that life is more and more convenient. work is more efficient, handling quickly and that make convenient life. Interface is a big factor in the center of these changes. that is more and more development and there is currently using NUI technology. NUI technology is not necessary that discrete input device. and that use natural behavior like touch, gesture. among them, the smart phone device is a representative of appllying the NUI technology. smart phone as well as NUI technology applies kiosk, big table and that use Various fields, such as culture, defense, and advertising industries. In this research, development multi-touch table based multi-touch meeting system. and proposal efficient system possible improvements about Existing meeting system.

The Reliability Evaluation Method of Embedded Controled Systems Considering the International Standard (국제 표준을 고려한 임베디드 제어 시스템(ECS)의 신뢰성 평가방법)

  • Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.15 no.2
    • /
    • pp.199-206
    • /
    • 2017
  • Embedded control system is widely spreaded and used in various fields including military defence, aviation, medical, etc. due to extended use of smart phones, connected car, IoT. Increasing examples are introduced where embedded control system that perform their unique role such as smart phone and network system organically configure to create new system. According to this trend, organic interface and reliability of each embedded control system are becoming important evaluation factors. The purpose of this paper is to develop quality evaluation criteria method for automobile embedded system, among the fields that use embedded control systems. In order to satisfy high quality level requirements of automobile embedded control system, we surveyed latest trend of automobile embedded control system, analyzed structure and application technology of embedded control system, to establish quality evaluation criteria and method for automobile embedded control system by referring international standard for software (ISO/IEC 9126), and international standard for electric & electronic products (ISO 26262).

Research for improving vulnerability of unmanned aerial vehicles (무인항공기 보안 취약점 개선을 위한 연구)

  • Lee, Kyung-Hwan;Ryu, Gab-Sang
    • Smart Media Journal
    • /
    • v.7 no.3
    • /
    • pp.64-71
    • /
    • 2018
  • Utilization of unmanned aerial vehicles (UAVs) are rapidly expanding to various fields ranging from defense, industry, entertainment and personal hobbies. Due to the increased activities of unmanned airplanes, many security problems have emerged, including flight path errors to undesired destinations, secondary threats due to exposed securities caused by the capture of unmanned airplanes in hostile countries. In this paper, we find security vulnerabilities in UAVs such as GPS spoofing, hacking captured video information, malfunction due to signal attenuation through jamming, and exposure of personal information due to image shooting. In order to solve this problem, the stability of the unstructured data is secured by setting the encryption of the video shooting information section using the virtual private network (VPN) to prevent the GPS spoofing attack. In addition, data integrity was ensured by applying personal information encryption and masking techniques to minimize the secondary damage caused by exposure of the UAV and to secure safety. It is expected that it will contribute to the safe use and stimulation of industry in the application field of UAV currently growing.

A Study on the Fingerprint Recognition Algorithm Using Enhancement Method of Fingerprint Ridge Structure (지문 융선 구조의 향상기법을 사용한 지문인식 알고리즘에 관한 연구)

  • 정용훈;노정석;이상범
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.647-660
    • /
    • 2003
  • The present of state is situation that is realized by necessity of maintenance of public security about great many information is real condition been increasing continually in knowledge info-age been situating in wide field of national defense, public peace, banking, politics, education etc. Also, loss or forgetfulness, and peculation by ID for individual information and number increase of password in Internet called that is sea of information is resulting various social problem. By alternative about these problem, including Biometrics, several authentication systems through sign(Signature), Smart Card, Watermarking technology are developed. Therefore, This paper shows that extract factor that efficiency can get into peculiar feature in physical features for good fingerprint recognition algorithm implementation with old study finding that take advantage of special quality of these fingerprint.

  • PDF

Trend of Science Policing-based Preemptive Correspondence Police Service Technology (과학치안 기반 선제 대응 치안서비스 기술 동향)

  • Park, Y.S.;Kim, S.H.;Park, W.J.;Baek, M.S.;Lee, Y.T.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.5
    • /
    • pp.74-81
    • /
    • 2021
  • Based on data provided by the science and technology knowledge infrastructure (ScienceON, 2017-2021), this paper reviews the research trends of domestic police services and related technologies, and describes the research and development direction of policing technology. For this purpose, the research was searched using the keywords science policing, smart policing, predictive policing, and policing. Policing technology is used for crime investigation (prevention), such as crime analysis and crime prediction. The collection of related data use urban infrastructure, the processing of data collected using technologies, such as artificial intelligence, and the utilization of data in police services (system) were summarized. In future, on-site support technology and crime investigation (prevention) technology for a preemptive correspondence to social threats and effective police activities must be developed. In addition, the quality of police services should be improved, a system to use police-related data should be developed, and the capabilities of police experts need to be strengthened.

A Random M-ary Method-Based Countermeasure against Power Analysis Attacks on ECC (타원곡선 암호시스템에서 랜덤 m-ary 방법을 사용한 전력분석 공격의 대응방법)

  • 안만기;하재철;이훈재;문상재
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.35-43
    • /
    • 2003
  • The randomization of scalar multiplication in ECC is one of the fundamental concepts in defense methods against side-channel attacks. This paper proposes a countermeasure against simple and differential power analysis attacks through randomizing the transformed m-ary method based on a random m-ary receding algorithm. The proposed method requires an additional computational load compared to the standard m-ary method, yet the power consumption is independent of the secret key. Accordingly, since computational tracks using random window width can resist against SPA and DPA, the proposed countermeasure can improve the security for smart cards.

Status and prospects of Knowledge Information Security Industry (지식정보보안 산업의 현황과 전망)

  • Choi, Jeong-Il;Chang, Ye-Jin;Lee, Ok-Dong
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.269-294
    • /
    • 2014
  • Korea is concerned with information security industry due to recent leak-out private information of 3 card companies. Executives are aware of damage from breach of security such as personal data spill, is more dangerous than any other financial risks. The information security industry, which was limited in physical security and network security formerly, is evolving into convergence security of public and facility security industry. The field of interest has also been changed into security of smart phone and intelligence image recently, from firewall or Anti-virus. The convergence security is originally about access control of facility, but recently its demand has been increased mostly by public institutions and major companies. The scope of the industry also varies from finance, education, distribution, national defense, medical care to automobile industry. The market of convergence security has been expanded and new various products and services of security of intelligent vehicle, 'U' healthcare, finance, smart grid and key industries are also developed. It is required to create and enhance of new curriculum and cultivate human resources for the development of knowledge information security industry. Raising standard of education and security consciousness of the nation is also necessary to strengthen the global competitiveness.

  • PDF

Collaborative Visualization of Warfare Simulation using a Commercial Game Engine (상업용 게임 엔진을 활용한 전투 시뮬레이션 결과의 협업 가시화)

  • Kim, Hyungki;Kim, Junghoon;Kang, Yuna;Shin, Suchul;Kim, Imkyu;Han, Soonhung
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.4
    • /
    • pp.57-66
    • /
    • 2013
  • The needs for reusable 3D visualization tool has been being raised in various industries. Especially in the defense modeling and simulation (M&S) domain, there are abundant researches about reusable and interoperable visualization system, since it has a critical role to the efficient decision making by offering diverse validation and analyzing processes. To facilitate the effectiveness, states-of-the-arts M&S systems are applying VR (Virtual Reality) or AR (Augmented Reality) technologies. To reduce the work burden authors design a collaborative visualization environment based on a commercial game engine Unity3D. We define the requirements of the warfare simulation by analyzing pros and cons of existing tools and engines such as SIMDIS or Vega, and apply functionalities of the commercial game engine to satisfy the requirements. A prototype has been implemented as the collaborative visualization environment of iCAVE at KAIST, which is a facility for immersive virtual environment. The facility is intraoperative with smart devices.

A Design Plan for Constructing The Real-time Territorial Monitoring Testbed Considering Interoperability of USN (USN 연동성을 고려한 실시간 국토모니터링 테스트베드 구축 방안)

  • Lee, Jong-Uk;Seo, Suk-Bin;Kim, Young-Joo;Park, Sang-Jun;Kim, Kwang-Eun;Kim, Dae-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06d
    • /
    • pp.455-460
    • /
    • 2008
  • 건설교통부는 국가미래에 대비해 실질적으로 기여할 수 있는 전략적이고 중장기적인 실효성 있는 R&D 혁신 로드맵인 VC-10 사업을 진행하고 있다. 이 과제의 핵심 기술 중에 하나인 유비쿼터스 센서네트워크는 초소형 센서들로 구성된 망으로써 환경 및 재난 재해, u-City 건설, 스마트 하이웨이, 방범 및 국방, 시설 관리, 유통, 등과 같은 다양한 분야에 사용할 수 있는 유비쿼터스 사회의 핵심 요소이다. 이것은 실시간 네트워크를 통해 전송 또는 관리되고 언제, 어디서나, 어떠한 대상과 의사소통이 가능한 지능형 컴퓨팅 환경을 구현하는 것이다. 그러나 이러한 기술을 바탕으로 하는 기존의 시스템들은 특정분야를 위한 독자적인 프로토콜이나 저전력 통신을 제공하는 ZigBee 기반으로 설계되었기 때문에 소규모 범위에서만 서비스 제공이 가능하며 시스템간의 연동이 어렵다. 따라서 본 논문에서는 유비쿼터스 센서네트워크간의 연동성을 고려한 대규모 실시간 모니터링 시스템을 설계하여 다양한 분야로 서비스할 수 있는 테스트베드 구축에 대한 방안을 제시하고자 한다. 여기서 모니터링 대상은 국토의 지반, 환경, 그리고 도심지역 등이다. 이렇게 제시된 방안은 국내실정에 적합한 모니터링 시나리오를 작성하여 테스트베드를 구축 시에 요구된 사항들에 대한 정당성을 입증한다.

  • PDF

An Efficient IoT Healthcare Service Management Model of Location Tracking Sensor (위치 추적 센서 기반의 IOT 헬스케어 서비스 관리 모델)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.14 no.3
    • /
    • pp.261-267
    • /
    • 2016
  • As IoT technology has gained the attention all around the world, the development for various services of healthcare, smart city, agriculture, and defense based on IoT is in progress. However, it is likely that healthcare services based on IoT have a problem of being leaked of patients' biological information by a third party and that risks patients' lives. In this paper, an IoT health care service managing model based on location sensor is proposed, which secures the biological information of a patient and simplifies the procedure to process the treatment and administration steps by using the data resources sensed. Even when an emergency occurs, this proposed model can respond quickly using the location information of the patient, which enables the staff in the hospital to locate the patient in real time. In addition, there is an advantage to minimize the time and the process of care, because the location of the equipment for necessary treatment is possible to be instantaneously located with attached sensors.