• Title/Summary/Keyword: 전 혁명

Search Result 284, Processing Time 0.019 seconds

Performance Evaluation of a Machine Learning Model Based on Data Feature Using Network Data Normalization Technique (네트워크 데이터 정형화 기법을 통한 데이터 특성 기반 기계학습 모델 성능평가)

  • Lee, Wooho;Noh, BongNam;Jeong, Kimoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.785-794
    • /
    • 2019
  • Recently Deep Learning technology, one of the fourth industrial revolution technologies, is used to identify the hidden meaning of network data that is difficult to detect in the security arena and to predict attacks. Property and quality analysis of data sources are required before selecting the deep learning algorithm to be used for intrusion detection. This is because it affects the detection method depending on the contamination of the data used for learning. Therefore, the characteristics of the data should be identified and the characteristics selected. In this paper, the characteristics of malware were analyzed using network data set and the effect of each feature on performance was analyzed when the deep learning model was applied. The traffic classification experiment was conducted on the comparison of characteristics according to network characteristics and 96.52% accuracy was classified based on the selected characteristics.

Comparison of Unplugged Activities at Home and Abroad using Semantic Network Analysis (시맨틱 네트워크 분석을 이용한 국내외 언플러그드 활동 관련 연구 비교)

  • Kang, Doo Bong
    • The Journal of Korean Association of Computer Education
    • /
    • v.22 no.4
    • /
    • pp.21-34
    • /
    • 2019
  • SW education is being implemented in all the school due to the application of the 2015 Curriculum. The purpose of SW education is to improve Computational Thinking by using Unplugged Activities, Educational Programming Language, and Physical Computing. Among them, 73 domestic and 85 overseas researches related to 'Unplugged Activities' were compared and analyzed using semantic network analysis techniques. As a result, the research on 'Unplugged Activities' has been started from 1998, and the research has started in Korea since 2006. As the CT is recognized as a core competence for the future society in line with the 4th Industrial Revolution, researches have been rapidly increasing in both the domestic and overseas countries since 2016. In Korean studies, it was analyzed that many main words related to the elemental factors such as 'unplugged activity', 'robot utilization', 'educational programming language' were found. This suggests that future research should move toward research for the promotion of 'CT' which is the purpose of computer science.

Proposal of Research Issues related to the Technology, Service, Policy and Business Model in Commercializing and Promoting 5G Network (5G 실용화 및 활성화에 필요한 관련 기술, 서비스, 정책 및 비즈니스 모델에 관련된 연구 이슈 제안)

  • Song, In-Kuk
    • Journal of Internet Computing and Services
    • /
    • v.20 no.3
    • /
    • pp.129-135
    • /
    • 2019
  • Recently, it is anticipated that 5G network would play the significant role of the neural network for 4th generation industry revolution and create huge value for the new market. However, in spite of proliferating prospect of 5G network industry and leading position in the launch of 5G, network operators have hesitated to give their full support to establishing proper network. Due to the lack of business models promoting 5G industry, network operators feel that they will not realize the return from the exorbitant investment in 5G network establishment. Moreover, the rigorous research efforts to investigate and analyze the various business environments regarding 5G rarely exists. Therefore, the purpose of the research is to holistically propose the research issues related to the technology, service providing method, governmental policy, and business models in commercializing and promoting 5G network.

Understanding Electric Vehicle Consumer in Korea Market Based Upon User and Prospective Survey (국내 전기자동차 수요층 분석: 초기 구매자와 일반 소비자 조사를 토대로)

  • Park, Jiyoung;Kim, Haegon;Kim, Chansung
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.6
    • /
    • pp.191-201
    • /
    • 2019
  • This study aims at understanding the fundamental characteristics of EV consumer based upon user survey and understanding the challenges to promote EV adoption in Korea. Data are obtained from two different surveys. One asked 304 EV buyers in Korea and another asked 905 prospective customer about EV awareness and perception, EV purchase intention, and etc. Analysis is composed of two parts; one is about the general characteristics and purchase intention of general consumers; another is about the intent to repurchase EV owners. We discuss the policy implications to expand EV demand in Korean market based on two purchase and repurchase logit models.

Big Data Processing and Monitoring System based on Vehicle Data (차량 데이터 기반 빅데이터 처리 및 모니터링 시스템)

  • Shin, Dong-Yun;Kim, Ju-Ho;Lee, Seung-Hae;Shin, Dong-Jin;Oh, Jae-Kon;Kim, Jeong-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.105-114
    • /
    • 2019
  • As the Industrial Revolution progressed, Big Data technologies were used to develop a system that instantly identified the consequences of older vehicles using mobile devices. First, data from the vehicle was collected using the OBD2 sensor, and the data collected was stored in the raspberry pie, giving it the same situation that the raspberry pie was driving. In the event that vehicle data is generated, the data is collected in real time, stored in multiple nodes, and visualized and printed based on the processed, refined, processed and processed data. We can use Big Data in this process and quickly process vehicle data to identify it effectively through mobile devices.

Smart Space based on Platform using Big Data for Efficient Decision-making (효율적 의사결정을 위한 빅데이터 활용 스마트 스페이스 플랫폼 연구)

  • Lee, Jin-Kyung
    • Informatization Policy
    • /
    • v.25 no.4
    • /
    • pp.108-120
    • /
    • 2018
  • With the rise of the Fourth Industrial Revolution and I-Korea 4.0, both of which pursue strategies for industrial innovation and for the solution to social problems, the real estate industry needs to change in order to make effective use of available space in smart environments. The implementation of smart spaces is a promising solution for this. The smart space is defined as a good use of space, whether it be a home, office, or retail store, within a smart environment. To enhance the use of smart spaces, efficient decision-making and well-timed and accurate interaction are required. This paper proposes a smart space based on platform which takes advantage of emerging technologies for the efficient storage, processing, analysis, and utilization of big data. The platform is composed of six layers - collection, transfer, storage, service, application, and management - and offers three service frameworks: activity-based, market-based, and policy-based. Based on these smart space services, decision-makers, consumers, clients, and social network participants can make better decisions, respond more quickly, exhibit greater innovation, and develop stronger competitive advantages.

Civil liability and criminal liability of accidents caused by autonomous vehicle hacking (해킹으로 인한 자율주행자동차 사고 관련 책임 법제에 관한 연구 -민사상, 형사상, 행정책임 중심으로-)

  • An, Myeonggu;Park, Yongsuk
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.19-30
    • /
    • 2019
  • As the 4th industrial revolution has recently become a hot topic, the importance of autonomous vehicles has increased and interest has been increasing worldwide, and accidents involving autonomous vehicles have also occurred. With the development of autonomous vehicles, the possibility of a cyber-hacking threat to the car network is increasing. Various countries, including the US, UK and Germany, have developed guidelines to counter cyber-hacking of autonomous vehicles, In the case of Korea, limited temporary operation of autonomous vehicles is being carried out, but the legal system to be applied in case of accidents caused by vehicle network hacking is insufficient. In this paper, based on the existing legal system, we examine the civil liability caused by the cyber hacking of the autonomous driving car, while we propose a law amendment suited to the characteristics of autonomous driving car and a legal system improvement plan that can give sustainable trust to autonomous driving car.

SW Education Program using Pair Programming Collaboration Tools (짝프로그래밍 협업도구를 활용한 SW교육프로그램)

  • Kim, Yong-Ok;Chun, Seok-Ju
    • Journal of The Korean Association of Information Education
    • /
    • v.23 no.4
    • /
    • pp.375-384
    • /
    • 2019
  • In a rapidly changing society with the Fourth Industrial Revolution, future students should have the skills to utilize and organize high-quality knowledge, not the amount of knowledge. With the launch of the revised curriculum in 2015, the curriculum has been reorganized based on competency and the software education has been seeking capabilities such as 'Cultural computing knowledge', 'Computational thinking', and 'Collaborative problem solving skills'. Therefore, practical collaboration tools and education programs that can be used in the field of education are developed based on Pair Programming, which is a specific collaborative learning strategy to develop cooperative problem solving skill. The educational program using this collaboration tool was developed with a focus on developing computational thinking and collaborative problem solving skills through Pair Programming rather than focusing on learning grammar of programming language and programming techniques. In a educational program, students will be able to use collaborative tools for pair programming and foster collaborative problem-solving skills.

Exploring the direction of granular basic-software education considering the major of college students (대학생의 전공계열을 고려한 세분화된 기초SW교육 방향 탐색)

  • Kim, Wanseop
    • Journal of The Korean Association of Information Education
    • /
    • v.23 no.4
    • /
    • pp.329-341
    • /
    • 2019
  • Computer education in universities has been expanded and specialized from ICT-based education in recent years to software education such as computational thinking and programming. Especially, as the 4th Industrial Revolution is emphasized in all fields of society, software education, which is its core, is being applied as an essential liberal arts course in universities. In the case of basic SW education for all students, it is necessary to provide differentiated education that is suitable for students because their special characteristics are different. In this study, we conducted a basic SW course for general liberal arts at A-university in Seoul and analyzed the survey data from 4,927 students for about 3 years, and classified the major series and searched the appropriate education method for each subdivided group. Through the analysis, we were able to find characteristic groups such as business and commerce, art and sports major. Finally, six groups for basic-SW education are presented. Educational directions such as programming language and level of difficulty setting suitable for differentiated education are presented for each group.

Cyber Attacks and Appropriateness of Self-Defense (사이버 공격과 정당방위의 당위성)

  • Shin, Kyeong-Su
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.21-28
    • /
    • 2019
  • The emergence of a hyper-connected-super-intelligence society, called the era of the Fourth Industrial Revolution, brought about a new change in the security environment. With ICT (Information Communication Technology) convergence and high-tech technologies introduced across the board, the person-centered driving force that moved the real space is replaced by the code-oriented cyberspace, and its dependency is constantly increasing. Paradoxically, however, these technological changes serve as another security vulnerability that threatens our society, and have brought about the justification for building a cyber defense system while simultaneously facing the opportunities and challenges brought by technology. In this study, the theory of self-defense was put forward on the basis of the theoretical basis for actively responding to the increasingly intelligent and mass-evolving cyberattacks, and firstly, the need to enact a cybersecurity law, secondly, and thirdly, the need to develop a response cooperation system with the U.S. and other cyber powers.