• Title/Summary/Keyword: 스마트 산업기술

Search Result 1,460, Processing Time 0.029 seconds

농어촌 정보화의 포스트 코로나 대응 변화에 대한 사례 연구: 해외 농어촌 정보화 정책의 코로나19 시기 변화 방향을 중심으로

  • Lee, Jongtae
    • Agribusiness and Information Management
    • /
    • v.13 no.1
    • /
    • pp.26-40
    • /
    • 2021
  • During the pandemic status of COVID-19 since 2019 December, demands and attention on various convergence services with non-contact technologies and social adoption are increasing. Along with these increased demands and attention, the digital divide issues should be concerned to understand the informatization degrees of rural area residences, the elderly, the disabled, and the low-income. Furthermore, rural area residences may be the elderly, the disabled, and the low-income also. It may mean that the rural area should be considered as in noticeable status of the digital divide. This study focuses on the policy alternatives to reduce the digital divide in rural areas with a literature review methodology and on the factors on informatization issues in rural areas. For the aims, this study analyzes the EU cases of informatization in rural areas to find out the advantages and disadvantages of the suggested policies. As the analysis result, it is clear that the EU countries try to enhance the economic and growth powers rather to reduce the digital divide gaps. Also, it can be considered that the EU countries focus on supporting the rural area to adopt the non-contact information services newly rather on maintaining the IT education services and the infrastructures in off-line environments.

Implementation of A Security Token System using Fingerprint Verification (지문 인증을 이용한 보안 토큰 시스템 구현)

  • 문대성;길연희;안도성;반성범;정용화;정교일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.63-70
    • /
    • 2003
  • In the modern electronic world, the authentication of a person is an important task in many areas of online-transactions. Using biometrics to authenticate a person's identity has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. To gain maximum security in the verification system using biometrics, the computation of the verification as well as the store of the biometric pattern has to be taken place in the security token(smart card, USB token). However, there is an open issue of integrating biometrics into the security token because of its limited resources(memory space, processing power). In this paper, we describe our implementation of the USB security token system having 206MHz StrongARM CPU, 16MBytes flash memory, and 1MBytes RAM. Also, we evaluate the performance of a light-weighted In-gerprint verification algorithm that can be executed in the restricted environments. Based on experimental results, we confirmed that the RAM requirement of the proposed algorithm was about 6.8 KBytes and the Equal Error Rate(EER) was 1.7%.

A Study on Information Security Policy in the era of Smart Society (스마트시대 정보보호정책에 관한 연구)

  • Kim, Dong-Wook;Sung, Wook-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.883-899
    • /
    • 2012
  • This study will propose the policy priorities of cyber information security by AHP(Analytic Hierarchy Process) survey. The policy categories for AHP survey consist in the foundation of information security and activity of information security(1st hierarchy). In the second hierarchy, the foundation of information security was classified into laws-system, human resources, h/w-s/w technology and sociocultural awareness. And the activity of information security was divided into infrastructure protection, privacy protection, related industry promotion, and national security. Information policy alternatives were composed of 16 categories in the third hierarchy. According to the AHP result, in the perspective of policy importance, the modification of related laws was the first agenda in the policy priority, better treatment of professionals was the second, and the re-establishment of policy system was the third. In the perspective of policy urgency, the re-establishment of policy system was the first item, the modification of related laws was the second, and better treatment of professionals is the third.

Approaches to Digital Health Passport for Healthy Travel in the the Era of COVID-19 (COVID-19시대에 건강한 여행을 위한 Digital Health Passport에 대한 접근법)

  • Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.81-92
    • /
    • 2021
  • The purpose of this study is to present an approach to the "Digital Health Passport" (DHP), which will be the most important in the change of the travel industry among the sudden environmental changes brought about by COVID-19. To this end, this study reviewed a variety of empirical literature on DHP, and proposed a framework for DHP based on literature review. The framework is composed of travel intention, health information provision intention, and new technology acceptance/adoption of tourists. First, in terms of travel intention, providing information to DHP should not undermine the travel intention of the travelers. It should be possible to facilitate the travelers' enjoyment by using the information provided by the traveler. In addition, there is a need to assure that the data provided by travelers is managed in a reliable way. Second, it is necessary to understand why the travelers want to provide additional personal information (information disclosure), rather than seeing healthcare information only in terms of mandatory information provision. Finally, from the perspective of new technology, it is necessary to understand the intention of travelers to use/adopt DHP. The key implication of this work is that it proposed a DHP framework for realizing the travel bubble to predict and respond to foreign travelers' behaviors.

Development of a parking control system that improves the accuracy and reliability of vehicle entry and exit based on LIDAR sensing detection

  • Park, Jeong-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.8
    • /
    • pp.9-21
    • /
    • 2022
  • In this paper, we developed a 100% detection system for entering and leaving vehicles by improving the detection rate of existing detection cameras based on the LiDAR sensor, which is one of the core technologies of the 4th industrial revolution. Since the currently operating parking lot depends only on the recognition rate of the license plate number of about 98%, there are various problems such as inconsistency in the entry/exit count, inability to make a reservation in advance due to inaccurate information provision, and inconsistency in real-time parking information. Parking status information should be managed with 100% accuracy, and for this, we built a parking lot entrance/exit detection system using LIDAR. When a parking system is developed by applying the LIDAR sensor, which is mainly used to detect vehicles and objects in autonomous vehicles, it is possible to improve the accuracy of vehicle entry/exit information and the reliability of the entry/exit count with the detected sensing information. The resolution of LIDAR was guaranteed to be 100%, and it was possible to implement so that the sum of entering (+) and exiting (-) vehicles in the parking lot was 0. As a result of testing with 3,000 actual parking lot entrances and exits, the accuracy of entering and exiting parking vehicles was 100%.

Evaluation Model for Lateral Flow on Soft Ground Using Commitee and Probabilistic Neural Network Theory (군집신경망과 확률신경망 이론을 이용한 연약지반의 측방유동 평가 모델)

  • Kim, Young-Sang;Joo, No-Ah;Lee, Jeong-Jae
    • Journal of the Korean Geotechnical Society
    • /
    • v.23 no.7
    • /
    • pp.65-76
    • /
    • 2007
  • Recently, there have been many construction projects on soft ground with growth of industry and various construction problems concerning soft soil behavior also have been reported. Especially, foundation piles of abutments and (or) buildings which were constructed on the soft ground have been suffering from a lot of stability problems of inordinary displacement due to lateral flow of soft ground. Although many researches for this phenomena have been carried out, it is still difficult to assess the mechanism of lateral flow on soft ground quantitatively. And reliable design method for judgement of lateral flow occurrence is not established yet. In this study, PNN (probabilistic neural network) and CNN (committee neural network) theories were applied for judgment of lateral flow occurrence based on eat data compiled from Korea and Japan. Predictions of PNN and CNN models for new data which were not used during model development are compared with those predicted by conventional empirical methods. It was found that the developed PNN and CNN models can predict more precise and reliable judgment of lateral flow occurrence than conventional empirical methods.

A Study on the Formative Characteristics of Character Design : Focusing on Body Proportion (캐릭터 디자인의 조형적 특성에 관한 연구 -신체비례를 중심으로-)

  • Jung, Hye Kyungg
    • Journal of the Korean Society of Floral Art and Design
    • /
    • no.41
    • /
    • pp.45-59
    • /
    • 2019
  • The characters that could be connected to diverse cultural contents have formed diverse platforms with the development of digital technology, and the size of the relevant industry and market is rapidly growing. Recently, the utilization of character emoticons for smartphone messenger has been rapidly increased, so that the characters are settled down as a tool for non-verbal communication, on top of drawing attention as an independent area. With the expansion of character market, the importance of design that could give interest and familiarity to consumers is more emphasized. The body proportion of characters includes the implicative and symbolic meanings that could express diverse personalities. Thus, this study examined the body proportion of the characters with the high consumers' preference, and then analyzed the characteristics of formative elements of character design in accordance with the body proportion. In the results of the analysis, the exaggerated form of SD characters in two or three-head figure, and the realistic Real characters in seven or eight-head figure were preferred. For the SD characters, the colors with a high chroma showing the cute and cheerful image were used. For the Real characters, the cubic effect was expressed through the colors with active images and the light and shade of color. Even though the SD characters have limited motions due to the omitted body parts, the facial movements of animation characters are exaggerated while the Real characters describe the realistic and dynamic motions.

Status and plan of 'Operation rule improvement and ecological restoration plan of Nakdong estuary' ('낙동강하굿둑 운영개선 및 생태복원 방안 연구 용역' 추진현황 및 계획)

  • Noh, Hee Kyung;Ryu, Hyung Kwan;Ryu, Jong Hyun;Kim, Hwa Young;Chun, Ja Hoon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.21-22
    • /
    • 2020
  • 낙동강 하굿둑(이하 하굿둑)은 1987년 부산 사하구와 강서구 사이에 건설되어 하류 지역의 바닷물 유입을 막아 부산, 울산, 경남 등에 안정적으로 생활·농업·공업 등의 분야에 용수를 공급하는 역할을 해왔다. 현재, 하굿둑의 수문은 낙동강 상류로부터 하류로 흘러내려오는 민물(담수)을 방류하기 위해서만 하굿둑 수문을 개방하고 있다. 하구는 하천의 담수와 바다의 염수가 서로 만나는 구역으로 바닷물과 염수의 밀도차에 의한 혼합으로 자연상태의 하구에서는 담수와 염수가 섞이는 기수역이 형성되며, 이러한 특성으로 하구 인근의 지역에서는 일반적인 하천 및 해양, 연안과는 분명히 구별되는 생태계가 조성된다. 하굿둑 건설이후 바닷물(해수)과 민물(담수)이 만나는 낙동강 어귀에 기수생태계가 사라지면서 바닷물이 유입될 수 있도록 하여 생태계를 복원해야 한다는 필요성이 제기되어 왔으며, 하굿둑이 지역에 기여해온 사실은 분명하나 하굿둑으로 인해 생태계 단절이 발생하고 기수생태계가 파괴되었기 때문에 이를 해결하기 위해서는 하굿둑을 개방하여 과거 기수생태계를 복원해야 한다는 목소리가 높아지고 있다. 이에 따라 정부에서는 하굿둑의 기수생태계 복원을 위해서 관계기관 합동으로 의사결정을 하고 효율적인 개방 방안을 모색하는 실무협의회를 구성하여 운영 중이고, 실무협의회 논의를 통해 5개 주요 관계기관(환경부, 국토부, 해양수산부, 부산광역시, K-water) 공동으로 "낙동강하굿둑 운영개선 및 생태복원 방안 연구용역"을 추진 중이다. 2018년 1단계 용역이 완료되었으며, 2019년부터 2단계 연구용역을 추진 중이고 하굿둑 개방의 수준별로 각종 영향을 검토한 후 대책을 마련하여 기수생태계 복원 방안을 수립하는데 그 목적이 있다. 2단계 연구용역에서는 과학적이고 합리적인 기수생태계 복원방안 마련을 위해서 실제로 해수를 유입시키는 3차례의 실증실험 및 수리모형실험 등을 추진한다. 기존 연구들에서도 수문개방에 따른 해수유입 영향에 대해 모델링을 통해서 분석했지만 이는 검증이 이루어지지 않은 결과로 이번 용역에서는 실제 해수를 유입시키고 염분의 침투 및 각종 수생태 영향을 모니터링 한 후 그 결과를 반영하여 모델링을 고도화하고 있다. 최종적으로 고도화된 모델링 결과를 기반으로 기수생태계 조성 방안별로 염분, 수질, 수생태, 침퇴적 등 각종 분야에 대한 정확한 영향을 분석하고 이에 대한 대책을 포함하여 최종적으로 바람직한 기수생태계 복원 방안을 제시할 계획이다. 기수생태계 복원 방안이 계획에만 그치지 않고 실행으로 연결시키기 위해서 필요성에 대한 이해를 바탕으로 공감대를 형성해 나아가고 있으며 지역주민, 전문가, 관계기관 등 민(民)·관(官)·학(學) 다양한 의견을 수렴하여 하구지역내 수량-수질-수생태를 종합적으로 고려하여 복원 방안을 마련 후 사회적인 합의를 추진하여 확정할 예정이며, 하구의 안정적인 관리를 위해 AI 등 4차 산업혁명기술을 적극 적용하는 스마트한 하구물관리(Smart Estuary Watershed Management)"를 활용한 "하구통합물관리" (Estuary Integrated Watershed Management) 등 과학적인 관리를 추진할 계획이다.

  • PDF

Efficient Stack Smashing Attack Detection Method Using DSLR (DSLR을 이용한 효율적인 스택스매싱 공격탐지 방법)

  • Do Yeong Hwang;Dong-Young Yoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.9
    • /
    • pp.283-290
    • /
    • 2023
  • With the recent steady development of IoT technology, it is widely used in medical systems and smart TV watches. 66% of software development is developed through language C, which is vulnerable to memory attacks, and acts as a threat to IoT devices using language C. A stack-smashing overflow attack inserts a value larger than the user-defined buffer size, overwriting the area where the return address is stored, preventing the program from operating normally. IoT devices with low memory capacity are vulnerable to stack smashing overflow attacks. In addition, if the existing vaccine program is applied as it is, the IoT device will not operate normally. In order to defend against stack smashing overflow attacks on IoT devices, we used canaries among several detection methods to set conditions with random values, checksum, and DSLR (random storage locations), respectively. Two canaries were placed within the buffer, one in front of the return address, which is the end of the buffer, and the other was stored in a random location in-buffer. This makes it difficult for an attacker to guess the location of a canary stored in a fixed location by storing the canary in a random location because it is easy for an attacker to predict its location. After executing the detection program, after a stack smashing overflow attack occurs, if each condition is satisfied, the program is terminated. The set conditions were combined to create a number of eight cases and tested. Through this, it was found that it is more efficient to use a detection method using DSLR than a detection method using multiple conditions for IoT devices.

Analysis of Dynamic Response Characteristics for KTX and EMU High-Speed Trains on PSC-Box Railway Bridges (PSC-box 철도교량의 KTX 및 EMU 고속열차에 대한 동적 응답 특성 분석)

  • Manseok Han;Min-Kyu Song;Soobong Shin;Jong-Han Lee
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.28 no.2
    • /
    • pp.61-68
    • /
    • 2024
  • The majority of high-speed railway bridges along the domestic Gyeongbu and Honam lines feature a PSC-box type structure with a span length ranging from 35 to 40m, which typically exhibits a first bending natural frequency of approximately 4 to 5Hz. When KTX high-speed trains transverse these bridges at speeds ranging from 290 to 310km/h, the vibration induced by the trains approaches the first bending natural frequency of the bridge. Furthermore, with the upcoming operation of a EMU-320 high-speed train and the anticipated increase in the speeds of these high-speed trains, there is a need to analyze the dynamic response of high-speed railway bridges. For this, based on measured responses from actual railway bridges, a numerical model was constructed using a numerical model updating technique. The dynamic response of the updated numerical model exhibited a strong agreement with the measured response from the actual railway bridges. Subsequently, this updated model was utilized to analyze the dynamic response characteristics of the bridges when KTX and EMU-320 trains operate at increased speeds. The maximum vertical displacement and acceleration at the mid-span of the bridges were also compared to those specified in the railway design standard with the increasing speed of KTX and EMU-320.