• Title/Summary/Keyword: 안전한 통신

Search Result 4,773, Processing Time 0.029 seconds

Comparison of Machine Learning Models to Predict the Occurrence of Ground Subsidence According to the Characteristics of Sewer (하수관로 특성에 따른 지반함몰 발생 예측을 위한 기계학습 모델 비교)

  • Lee, Sungyeol;Kim, Jinyoung;Kang, Jaemo;Baek, Wonjin
    • Journal of the Korean GEO-environmental Society
    • /
    • v.23 no.4
    • /
    • pp.5-10
    • /
    • 2022
  • Recently, ground subsidence has been continuously occurring in downtown areas, threatening the safety of citizens. Various underground facilities such as water and sewage pipelines and communication pipelines are buried under the road. It is reported that the cause of ground subsidence is the deterioration of various facilities and the reckless development of the underground. In particular, it is known that the biggest cause of ground subsidence is the aging of sewage pipelines. As an existing study related to this, several representative factors of sewage pipelines were selected and a study to predict the risk of ground subsidence through statistical analysis has been conducted. In this study, a data SET was constructed using the characteristics of OO city's sewage pipe characteristics and ground subsidence data, The data set constructed from the characteristics of the sewage pipe of OO city and the location of the ground subsidence was used. The goal of this study was to present a classification model for the occurrence of ground subsidence according to the characteristics of sewage pipes through machine learning. In addition, the importance of each sewage pipe characteristic affecting the ground subsidence was calculated.

Experience Design Guideline for Smart Car Interface (스마트카의 인터페이스를 위한 경험 디자인 가이드라인)

  • Yoo, Hoon Sik;Ju, Da Young
    • Design Convergence Study
    • /
    • v.15 no.1
    • /
    • pp.135-150
    • /
    • 2016
  • Due to the development of communication technology and expansion of Intelligent Transport System (ITS), the car is changing from a simple mechanical device to second living space which has comprehensive convenience function and is evolved into the platform which is playing as an interface for this role. As the interface area to provide various information to the passenger is being expanded, the research importance about smart car based user experience is rising. This study has a research objective to propose the guidelines regarding the smart car user experience elements. In order to conduct this study, smart car user experience elements were defined as function, interaction, and surface and through the discussions of UX/UI experts, 8 representative techniques, 14 representative techniques, and 8 locations of the glass windows were specified for each element. Following, the smart car users' priorities of the experience elements, which were defined through targeting 100 drivers, were analyzed in the form of questionnaire survey. The analysis showed that the users' priorities in applying the main techniques were in the order of safety, distance, and sensibility. The priorities of the production method were in the order of voice recognition, touch, gesture, physical button, and eye tracking. Furthermore, regarding the glass window locations, users prioritized the front of the driver's seat to the back. According to the demographic analysis on gender, there were no significant differences except for two functions. Therefore this showed that the guidelines of male and female can be commonly applied. Through user requirement analysis about individual elements, this study provides the guides about the requirement in each element to be applied to commercialized product with priority.

A Study on the Maritime Law According to the Occurrence of Marine Accidents of MASS(Maritime Autonomous Surface Ship) (자율운항선박의 해양사고 발생에 따른 해상법적 고찰)

  • Lee, Young-Ju
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.37-56
    • /
    • 2023
  • Recently, with the rapid development of ICT(Information and Communication Technology) and AI(Artificial Intelligence) technology industries, the emergence of MASS(Maritime Autonomous Surface Ship), which were thought only in the distant future, is approaching a reality. Along with the development of these amazing technologies, changes in the private law sector, such as liability, compensation for damages, and maritime insurance, as well as in the public law sector, such as maritime safety, marine environment protection, and maintenance of maritime order, have become necessary in the field of maritime law. In particular, with the advent of a new type of ship called MASS that does not have a crew on board, the kind and type of liability, compensation for damages, and insurance contracts in the event of a marine accident will also change. In this paper, the general theory about concept, classification, effectiveness and future of MASS and the general theory about concept and various obligations and responsibilities under the maritime law for discussion of MASS are reviewed. Next, in addition, regarding the problems that may occur in the event of a marine accident from MASS, the status as a ship, the legal relationship of the chartering contract, obligation to exercise due diligence in making the vessel seaworthiness, subject of responsibility, and liability for damages and immunity are reviewed from the perspective of maritime law. In addition, in the degree four of MASS, the necessities of further research to clarify the attributable subjects and standards of responsibility in the event of a marine accident, as well as the necessities of institutional improvement such as technology development, enactment and amendment of law and funding are presented.

  • PDF

A Blockchain Network Construction Tool and its Electronic Voting Application Case (블록체인 자동화도구 개발과 전자투표 적용사례)

  • AING TECKCHUN;KONG VUNGSOVANREACH;Okki Kim;Kyung-Hee Lee;Wan-Sup Cho
    • The Journal of Bigdata
    • /
    • v.6 no.2
    • /
    • pp.151-159
    • /
    • 2021
  • Construction of a blockchain network needs a cumbersome and time consuming activity. To overcome these limitations, global IT companies such as Microsoft are providing cloud-based blockchain services. In this paper, we propose a blockchain-based construction and management tool that enables blockchain developers, blockchain operators, and enterprises to deploy blockchain more comfortably in their infrastructure. This tool is implemented using Hyperledger Fabric, one of the famous private blockchain platforms, and Ansible, an open-source IT automation engine that supports network-wide deployment. Instead of complex and repetitive text commands, the tool provides a user-friendly web dashboard interface that allows users to seamlessly set up, deploy and interact with a blockchain network. With this proposed solution, blockchain developers, operators, and blockchain researchers can more easily build blockchain infrastructure, saving time and cost. To verify the usefulness and convenience of the proposed tool, a blockchain network that conducts electronic voting was built and tested. The construction of a blockchain network, which consists of writing more than 10 setting files and executing commands over hundreds of lines, can be replaced with simple input and click operations in the graphical user interface, saving user convenience and time. The proposed blockchain tool will be used to build trust data infrastructure in various fields such as food safety supply chain construction in the future.

A Study on the Improvement of Utilization through Recognition of Virtual Training Content Operating Institutions (가상훈련 콘텐츠 운영기관 인식을 통한 활용도 제고방안 연구)

  • Miseok Yang;Chang Heon Oh
    • Journal of Practical Engineering Education
    • /
    • v.14 no.3
    • /
    • pp.479-489
    • /
    • 2022
  • In order to understand how to increase the use of virtual training content at K University's online lifelong education institute, this study examined the use experience, content recognition, field practice replacement, and requirements, focusing on the examples of operating institutions. To this end, 12 institutions that operated virtual training contents distributed by the K University Online Lifelong Education Center in 2020 were selected for in-depth interviews and qualitative analysis was conducted on the interviews of 11 institutions. As a result of the analysis, first, the experience of using the contents of the virtual training operating institution was aimed at changing the educational environment, supplementing theoretical learning, and improving the sense of practice. Second, according to a survey on the recognition of virtual training content, if the importance and utilization of the content are high, it can be replaced by on-site practice in non-face-to-face classes, such as experiences of facilities and equipment, attracting interest and attention. Third, in many cases, the perception of replacement for field practice is not unreasonable to use as a pre-training material for field practice, but it is difficult to replace field practice. Fourth, content quality improvements can be summarized as content quality improvement, content access and manipulation improvement, dedicated device development, training for instructors, and curriculum systematization. Fifth, institutional requirements include improving the quality of virtual training content itself, equipment support, curriculum systemization and characterization, systematic curriculum and detailed content sharing, detailed guidance on using virtual training content, introducing how to use content, and recruiting instructors. This study is meaningful in that it sought ways to improve the utilization of virtual training content based on the perception of virtual training content operating institutions.

A Study on Implementation of Indoor Positioning Simulator through Indoor Positioning API Development (실내측위 API개발을 통한 실내측위 시뮬레이터 구현에 관한 연구)

  • Shin, Chang Soo;Kim, Sung Su
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.43 no.6
    • /
    • pp.873-881
    • /
    • 2023
  • The evolution of civil engineering technology, exemplified by recent milestones like the completion of the Gangnam Global Business Center (GBC), has fostered the construction of expansive civil and architectural structures both above and below the earth's surface. This surge in construction necessitates a commensurate advancement in research and technology pertaining to safety protocols applicable to these vast edifices. Such protocols encompass a spectrum of concerns, ranging from the preemptive mitigation of accidents to the effective management of exigencies such as fires. As the trajectory of construction endeavors continues unabated, encompassing both subterranean and elevated domains, a concomitant imperative emerges to refine the methodologies underpinning precise indoor positioning. To address this need, an innovative web-based simulator has been devised to emulate indoor positioning scenarios for rigorous testing. This research further entails the development of an indoor positioning data Application Programming Interface (API) fortified by Geographic Information System (GIS) spatial operation techniques. This API is anchored in the construction of intricate test data, centered on the spatial layout of building 13 at the Electronics and Telecommunications Research Institute (ETRI). Consequently, the study renders feasible the expeditious provisioning of diverse signal-based and image-based spatial information, pivotal for enhancing the navigational acumen of mobile devices. Path delineation, cellular signal mapping, landmark identification, and ancillary navigational aids are among the manifold datasets promptly furnished by the indoor positioning data API. In summation, this study engenders a crucial leap towards the fortification of safety protocols and navigational precision within the expansive confines of modern architectural wonders.

Investigation of Verification and Evaluation Methods for Tampering Response Techniques Using HW Security Modules (HW 보안 모듈을 활용한 탬퍼링 대응 기술의 검증 및 평가 방안 조사)

  • Dongho Lee;Younghoon Ban;Jae-Deok Lim;Haehyun Cho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.335-345
    • /
    • 2024
  • In the digital era, data security has become an increasingly critical issue, drawing significant attention. Particularly, anti-tampering technology has emerged as a key defense mechanism against indiscriminate hacking and unauthorized access. This paper explores case studies that exemplify the trends in the development and application of TPM (Trusted Platform Module) and software anti-tampering technology in today's digital ecosystem. By analyzing various existing security guides and guidelines, this paper identifies ambiguous areas within them and investigates recent trends in domestic and international research on software anti-tampering. Consequently, while guidelines exist for applying anti-tampering techniques, it was found that there is a lack of methods for evaluating them. Therefore, this paper aims to propose a comprehensive and systematic evaluation framework for assessing both existing and future software anti-tampering techniques. To achieve this, it using various verification methods employed in recent research. The proposed evaluation framework synthesizes these methods, categorizing them into three aspects (functionality, implementation, performance), thereby providing a comprehensive and systematic evaluation approach for assessing software anti-tampering technology in detail.

Integrated Sensing Module for Environmental Information Acquisition on Construction Site (건설현장 환경정보 수집을 위한 통합 센싱모듈 개발)

  • Moon, Seonghyeon;Lee, Gitaek;Hwang, Jaehyun;Chi, Seokho;Won, Daeyoun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.44 no.1
    • /
    • pp.85-93
    • /
    • 2024
  • The monitoring of environmental information (e.g. noise, dust, vibration, temperature, humidity) is crucial to the safe and sustainable operation of a construction site. However, commercial sensors exhibit certain drawbacks when applied on-site. First, the installation cost is prohibitively high. Second, these sensors have been engineered without considering the rugged and harsh conditions of a construction site, resulting in error-prone sensing. Third, construction sites are compelled to allocate additional resources in terms of manpower, expenses, and physical spaces to accommodate individual sensors. This research developed an integrated sensing module to measure the environmental information in construction site. The sensing module slashes the installation cost to 3.3%, is robust enough to harsh and outdoor sites, and consolidates multiple sensors into a single unit. The sensing module also supports GPS, LTE, and real-time sensing. The evaluation showed remarkable results including 97.5% accuracy and 99.9% precision in noise measurement, an 89.7% accuracy in dust measurement, and a 93.5% reliability in data transmission. This research empowers the collection of substantial volumes and high-quality environmental data from construction sites, providing invaluable support to decision-making process. These encompass objective regulatory compliance checking, simulations of environmental data dispersion, and the development of environmental mitigation strategies.

Robust Speech Recognition Algorithm of Voice Activated Powered Wheelchair for Severely Disabled Person (중증 장애우용 음성구동 휠체어를 위한 강인한 음성인식 알고리즘)

  • Suk, Soo-Young;Chung, Hyun-Yeol
    • The Journal of the Acoustical Society of Korea
    • /
    • v.26 no.6
    • /
    • pp.250-258
    • /
    • 2007
  • Current speech recognition technology s achieved high performance with the development of hardware devices, however it is insufficient for some applications where high reliability is required, such as voice control of powered wheelchairs for disabled persons. For the system which aims to operate powered wheelchairs safely by voice in real environment, we need to consider that non-voice commands such as user s coughing, breathing, and spark-like mechanical noise should be rejected and the wheelchair system need to recognize the speech commands affected by disability, which contains specific pronunciation speed and frequency. In this paper, we propose non-voice rejection method to perform voice/non-voice classification using both YIN based fundamental frequency(F0) extraction and reliability in preprocessing. We adopted a multi-template dictionary and acoustic modeling based speaker adaptation to cope with the pronunciation variation of inarticulately uttered speech. From the recognition tests conducted with the data collected in real environment, proposed YIN based fundamental extraction showed recall-precision rate of 95.1% better than that of 62% by cepstrum based method. Recognition test by a new system applied with multi-template dictionary and MAP adaptation also showed much higher accuracy of 99.5% than that of 78.6% by baseline system.

Checksum Signals Identification in CAN Messages (CAN 통신 메시지 내의 Checksum Signal 식별 방법 연구)

  • Gyeongyeon Lee;Hyunghoon Kim;Dong Hoon Lee;Wonsuk Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.747-761
    • /
    • 2024
  • Recently, modern vehicles have been controlled by Electronic Control Units (ECUs), by which the safety and convenience of drivers are highly improved. It is known that a luxury vehicle has more than 100 ECUs to electronically control its function. However, the modern vehicles are getting targeted by cyber attacks because of this computer-based automotive system. To address the cyber attacks, automotive manufacturers have been developing some methods for securing their vehicles, such as automotive Intrusion Detection System (IDS). This development is only allowed to the automotive manufacturers because they have databases for their in-vehicle network (i.e., DBC Format File) which are highly confidential. This confidentiality poses a significant challenge to external researchers who attempt to conduct automotive security researches. To handle this restricted information, in this paper, we propose a method to partially understand the DBC Format File by analyzing in-vehicle network traffics. Our method is designed to analyze Controller Area Network (CAN) traffics so that checksum signals are identified in CAN Frame Data Field. Also, our method creates a Lookup Set by which a checksum signal is correctly estimated for a given message. We validate our method with the publicly accessible dataset as well as one from a real vehicle.