• Title/Summary/Keyword: 정보기술능력

Search Result 2,014, Processing Time 0.031 seconds

Shared Key and Public Key based Mobile Agent Authentication Scheme supporting Multiple Domain in Home Network Environments (홈 네트워크 환경에서 다중 도메인을 지원하는 공유키 및 공개키 기반의 이동 에이전트 인증 기법)

  • 김재곤;김구수;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.109-119
    • /
    • 2004
  • The home network environment can be defined as a network environment, connecting digital home devices such as computer systems, digital appliances, and mobile devices. In this kind of home network environments, there will be numerous local/remote interactions to monitor and control the home network devices and the home gateway. Such an environment may result in communication bottleneck. By applying the mobile agents that can migrate among the computing devices autonomously and work on behalf of the user, remote interactions and network traffics can be reduced enormously. The mobile agent authentication is necessary to apply mobile agent concept to the home network environments, as a prerequisite technology for authorization or access control to the home network devices and resources. The existing mobile agent systems have mainly used the public key based authentication scheme, which is not suitable to the home network environments, composed of digital devices of limited computation capability. In this paper, we propose a shared key based mobile agent authentication scheme for single home domain and expand the scheme to multiple domain environments with the public key based authentication scheme. Application of the shared key encryption scheme to the single domain mobile agent authentication enables to authenticate the mobile agent with less overhead than the public key based authentication scheme.

A Study on the Design of KVMF 2.0 Protocol for Ensuring Backward/Forward Compatibility between Different KVMF Message Standard Versions

  • Jeong-Min, Lee;Won-Gi, Lim;Won-Jun, Cho;Yong-Cheol, Kim;Jeung-Sub, Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.3
    • /
    • pp.45-58
    • /
    • 2023
  • KVMF(Korean Variable Message Format) 1.0 protocol is the Army's standard tactical datalink protocol that defines standard messages and communication methods to enable data communication between various weapon systems through bitwise variable message processing. The protocol has been applied to a variety of Army weapon systems over the past decade and has contributed to upgrade the Army's operational capabilities by enabling the implementation of Network Centric Warfare (NCW), the core of modern warfare. Since the KVMF 1.0 protocol was applied, new weapon systems with new technologies have been introduced over time, and new weapon systems have new messages based on the characteristics of the weapon system. As a result, compatibility problems arose due to different message versions with existing weapon systems, and it was expected that these problems would continue to emerge in the future, considering the need for continuous message revisions. Therefore, it became necessary to solve this problem, so this paper proposed a KVMF 2.0 protocol design that guarantees compatibility between forward and backward versions. In this paper, we implemented the design as SW, and confirmed that the design worked successfully by test between forward and backward versions on test environment. Therefore, when the KVMF 2.0 protocol design is applied to a weapon system, we can expect that the weapon system can be compatible with the forward and backward versions working with the existing weapon systems as well as with the future weapon systems.

Detection of single-nucleotide polymorphism in RPB2 of Wolfiporia hoelen strains and assessment of its applicability for strain breeding (복령 균주의 RPB2 유전자 내 단일염기다형성 및 육종 활용성 분석)

  • Su Yeon, Kim;Mi-Jeong, Park;Seong Hwan, Kim;Kang-Hyeon, Ka
    • Journal of Mushroom
    • /
    • v.20 no.4
    • /
    • pp.199-207
    • /
    • 2022
  • The demand for novel strains has been rising in the domestic market to increase the production of sclerotia from Wolfiporia hoelen. To improve strain breeding efficiency, we investigated whether single-nucleotide polymorphisms (SNPs) in the RNA polymerase II subunit (RPB2) gene, which may be linked to the mating type locus, are useful for distinguishing monokaryons from dikaryons in Korean W. hoelen strains. We designed a specific primer set to efficiently amplify a region of RPB2 using PCR with the genomic DNA of 12 cultivated strains and 31 wild strains of W. hoelen collected from Korea. Nucleotide sequences of the PCR-amplified RPB2 genes were determined and analyzed for the presence of SNPs among the 43 W. hoelen strains. Previously reported SNP loci were detected in the RPB2 gene of all W. hoelen strains tested. However, these previously reported SNP loci could not be applied to differentiate monokaryons from dikaryons in approximately one-third of Korean wild strains with homozygous genotypes. Three additional SNPs in the RPB2 gene, which may improve the ability to distinguish monokaryons from dikaryons, were identified by searching through the multiple sequence alignments of the 43 W. hoelen strains. The applicability of these three novel SNPs, together with the previously known SNPs, in the RPB2 gene to W. hoelen strain breeding was verified by examining the hybrid strains and their parental strains.

A Study on the Improvement for Bidet Product-Service Design for Seniors by PSS-based 4D Double Diamond Design Process Model (PSS 기반 4D 더블 다이아몬드 모델을 활용한 시니어를 위한 비데 제품-서비스디자인 개선방안 연구)

  • Seo, Hong-Seok
    • Science of Emotion and Sensibility
    • /
    • v.25 no.1
    • /
    • pp.29-40
    • /
    • 2022
  • This study uses the bidet 4D double diamond design process model to propose an improvement for "senior-oriented bidet product service design" that reflects the characteristics and needs of seniors. This study was based on the product service system concept. To this end, qualitative research on seniors was conducted to derive user value factors, and, based on this, product service ideas were discovered, and a prototype reflecting the usefulness review of a working-level expert group was proposed. First, a "smart application service for user-customized function setting guide" was proposed. A bidet incorporating Internet of Things technology and a smart phone are linked to provide an app service that automatically interprets user characteristic information and information on bidet products to guide customized functions. Second, a control panel and remote control user interface to "user-oriented product service interface" was proposed. In consideration of the usability and cognitive ability of seniors, a simple and intuitive physical user interface such as a configuration centered on main functions, button arrangement according to task sequence, and a touch screen remote control was presented. Third, we proposed a "bidet care service linked with products and health/hygiene care" that provides a wide range of services such as user health and hygiene, cleanliness, entertainment, etc., in addition to regular bidet product service. This study proposed a product-based service design methodology that can improve user experience and relationship quality by discovering and improving the pain points and needs of users (seniors) in the process of using bidet products (before, during, and after use).

A Review of the Korean Nursing Research Literature with MBTI Personality and Nursing Students (국내 간호학생 성격관련 연구 문헌고찰 : MBTI를 중심으로)

  • Hong, Eun-Young
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.1
    • /
    • pp.425-436
    • /
    • 2022
  • The purpose of this study was to explore the trends of research on MBTI (Myers-Briggs Type Indicator) and nursing students, and to suggest directions for nursing education geared to the needs of the future. The literature was searched using the National Assembly Library, Korean Studies Information Service System, DBPIA, Korean Medical database and National Discovery for Science Library to identify studies including MBTI personalty among nursing students. This study selected a total of 22 precedent studies regarding the investigation of MBTI personalty and nursing students. All studies were quantitative study and 63.6% of them were nonexperimental cross-sectional study. The most frequently selected category of variables was cognitive-perceptual related variables includes self-efficacy, self-eseem, academic self efficacy and etc. The most frequent MBTI personality type of nursing students was ISTJ (12.3%) and ESTJ (11.5%) was the second. Based on the findings of this study, longitudinal reasearch is recommanded on MBTI personality type and nursing specialty choice. Implications for teaching and learning strategies, and for using the results of MBTI in nursing students' career guidence are discussed.

Investigation of Korean Forest Carbon Offset Program : Current Status and Cognition of Program Participants (산림탄소상쇄제도의 사업참여자 인식 및 현황 분석)

  • Sa, Yejin;Woo, Heesung;Kim, Joonsoon
    • Journal of Korean Society of Forest Science
    • /
    • v.111 no.1
    • /
    • pp.165-176
    • /
    • 2022
  • To raise awareness of carbon reduction in climate change, the Korea Forest Service has developed and adopted a forest carbon offset program, which aims to reduce carbon levels based on forest management. However, to maintain the forest carbon offset program, challenges such as the lack of a forest monitoring system to manage and maintain the program, must be faced. In this context, we investigated the limitations of conducting forest carbon offset programs using a number of interview techniques, including in-depth interview and questionnaire survey methods. The questionnaire surveys were developed based on the results of a literature review along with a preinterview and in-depth survey of the people in charge of the forest carbon offset program. The Irving Seidman technique was adopted for the in-depth interviews. Additionally, descriptive and frequency analyses were conducted to identify the characteristics of perception. Lastly, logistic regression was used to identify the limiting factors that affect the willingness to perform forest carbon offset monitoring activity. Results showed that the project managers or people in charge of the forest carbon offset program lacked expertise in forest carbon offset programs, which negatively affected their willingness to perform monitoring activity. Additionally, the study revealed a number of limiting factors that hindered the monitoring of forest carbon offset projects. Improving understanding using the approaches presented in this study may contribute to increasing the benefits associated with the forest carbon offset program in South Korea.

Career map and course map recommendation system for employment (취업준비를 위한 career map and course map 추천 시스템)

  • Kwon, Wonhyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.276-279
    • /
    • 2022
  • The 4th industrial revolution refers to the transition to a knowledge society in which the production speed of knowledge is fast and the proportion of the knowledge industry is greatly increased. The reorganization of the industrial structure and the change of occupations and jobs due to new technologies are bringing about changes in education, and the development of digital technology has made education that is borderless, individual and dynamic, becoming the new standard of education. With these changes, interest in nano-degrees on new technologies or micro-degrees focused on core courses rather than regular course degrees is increasing. As a representative example, Udacity in the United States has opened and operated online nanodegree courses related to jobs, and collaborates with major companies to develop and educate core training courses necessary for companies, thereby efficiently supporting companies in securing talent. With the revitalization of online vocational and job training, an environment has been prepared in which individuals can set goals for vocational competency development and continue their portfolio-based sustainable learning. However, for effective vocational education, automated and personalized educational content design should be preceded. To this end, in this paper, we propose a personalized career and course map recommendation system in the era of online learning

  • PDF

Model-Based Intelligent Framework Interface for UAV Autonomous Mission (무인기 자율임무를 위한 모델 기반 지능형 프레임워크 인터페이스)

  • Son Gun Joon;Lee Jaeho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.3
    • /
    • pp.111-121
    • /
    • 2024
  • Recently, thanks to the development of artificial intelligence technologies such as image recognition, research on unmanned aerial vehicles is being actively conducted. In particular, related research is increasing in the field of military drones, which costs a lot to foster professional pilot personnel, and one of them is the study of an intelligent framework for autonomous mission performance of reconnaissance drones. In this study, we tried to design an intelligent framework for unmanned aerial vehicles using the methodology of designing an intelligent framework for service robots. For the autonomous mission performance of unmanned aerial vehicles, the intelligent framework and unmanned aerial vehicle module must be smoothly linked. However, it was difficult to provide interworking for drones using periodic message protocols with model-based interfaces of intelligent frameworks for existing service robots. First, the message model lacked expressive power for periodic message protocols, followed by the problem that interoperability of asynchronous data exchange methods of periodic message protocols and intelligent frameworks was not provided. To solve this problem, this paper proposes a message model extension method for message periodic description to secure the model's expressive power for the periodic message model, and proposes periodic and asynchronous data exchange methods using the extended model to provide interoperability of different data exchange methods.

Study on the Current Status of Smart Garden (스마트가든의 인식경향에 관한 연구)

  • Woo, Kyung-Sook;Suh, Joo-Hwan
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.49 no.2
    • /
    • pp.51-60
    • /
    • 2021
  • Modern society is becoming more informed and intelligent with the development of digital technology, in which humans, objects, and networks relate with each other. In accordance with the changing times, a garden system has emerged that makes it easy to supply the ideal temperature, humidity, sunlight, and moisture conditions to grow plants. Therefore, this study attempted to grasp the concept, perception, and trends of smart gardens, a recent concept. To achieve the purpose of this study, previous studies and text mining were used, and the results are as follows. First, the core characteristics of smart gardens are new gardens in which IoT technology and gardening techniques are fused in indoor and outdoor spaces due to technological developments and changes in people's lifestyles. As technology advances and the importance of the environment increases, smart gardens are becoming a reality due to the need for living spaces where humans and nature can co-exist. With the advent of smart gardens, it will be possible to contribute to gardens' vitalization to deal with changes in garden-related industries and people's lifestyles. Second, in current research related to smart gardens and users' experiences, the technical aspects of smart gardens are the most interesting. People value smart garden functions and technical aspects that enable a safe, comfortable, and convenient life, and subjective uses are emerging depending on individual tastes and the comfort with digital devices. Third, looking at the usage behavior of smart gardens, they are mainly used in indoor spaces, with edible plants are being grown. Due to the growing importance of the environment and concerns about climate change and a possible food crisis, the tendency is to prefer the cultivation of plants related to food, but the expansion of garden functions can satisfying users' needs with various technologies that allow for the growing of flowers. In addition, as users feel the shapes of smart gardens are new and sophisticated, it can be seen that design is an essential factor that helps to satisfy users. Currently, smart gardens are developing in terms of technology. However, the main components of the smart garden are the combination of humans, nature, and technology rather than focusing on growing plants conveniently by simply connecting potted plants and smart devices. It strengthens connectivity with various city services and smart homes. Smart gardens interact with the landscape of the architect's ideas rather than reproducing nature through science and technology. Therefore, it is necessary to have a design that considers the functions of the garden and the needs of users. In addition, by providing citizens indoor and urban parks and public facilities, it is possible to share the functions of communication and gardening among generations targeting those who do not enjoy 'smart' services due to age and bridge the digital device and information gap. Smart gardens have potential as a new landscaping space.

A Study on the Change of Cyber Attacks in North Korea (북한의 사이버 공격 변화 양상에 대한 연구)

  • Chanyoung Park;Hyeonsik Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.175-181
    • /
    • 2024
  • The U.N. Security Council's North Korea Sanctions Committee estimated that the amount of North Korea's cyberattacks on virtual asset-related companies from 2017 to 2023 was about 4 trillion won. North Korea's cyberattacks have secured funds through cryptocurrency hacking as it has been restricted from securing foreign currency due to economic sanctions by the international community, and it also shows the form of technology theft against defense companies, and illegal assets are being used to maintain the Kim Jong-un regime and develop nuclear and missile development. When North Korea conducted its sixth nuclear test on September 3, 2017, and declared the completion of its national nuclear armament following the launch of an intercontinental ballistic missile on November 29 of the same year, the U.N. imposed sanctions on North Korea, which are considered the strongest economic sanctions in history. In these difficult economic situations, North Korea tried to overcome the crisis through cyberattacks, but as a result of analyzing the changes through the North's cyber attack cases, the strategic goal from the first period from 2009 to 2016 was to verify and show off North Korea's cyber capabilities through the neutralization of the national network and the takeover of information, and was seen as an intention to create social chaos in South Korea. When foreign currency earnings were limited due to sanctions against North Korea in 2016, the second stage seized virtual currency and secured funds to maintain the Kim Jong-un regime and advance nuclear and missile development. The third stage is a technology hacking of domestic and foreign defense companies, focusing on taking over key technologies to achieve the five strategic weapons tasks proposed by Chairman Kim Jong-un at the 8th Party Congress in 2021. At the national level, security measures for private companies as well as state agencies should be established against North Korea's cyberattacks, and measures for legal systems, technical problems, and budgets related to science are urgently needed. It is also necessary to establish a system and manpower to respond to the ever-developing cyberattacks by focusing on cultivating and securing professional manpower such as white hackers.