• Title/Summary/Keyword: 정보기술 성과실현

Search Result 124, Processing Time 0.029 seconds

The Analysis of Patterns and Strategies of Standards Competition in Telecommunications Industry (정보통신산업의 표준화 경쟁의 유형과 전략에 관한 연구)

  • Park, Wung;Park, Jong-Bong;Kim, Young-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.591-596
    • /
    • 2001
  • Many consumption goods, most notably in network markets including the telecommunications industry, exhibit network externalities. For that reason, standardization is the tore Issue in network markets with powerful positive feedback. firms in the telecommunications industry compete intensively against one another to build on early lead due to w inertia and network externalities. Therefore, a firm's strategies err very important in standards competition. In this paper, we'll examine the patterns of standards competition and cooperation, anti a variety of firms' strategies in the telecommunications industry. And then, we'll examine the trend of the change from standard competition to standard cooperation. After that, we'll suggest the national policies for the preemption.

  • PDF

Smart Quality Inspection Scheme for Construction Project Using 3D Scanning Technology (3D스캐닝을 이용한 건설공사 스마트 품질점검 방안에 관한 연구)

  • Lee, Don-Soo;Kim, Gwang-Hee
    • Journal of the Korea Institute of Building Construction
    • /
    • v.20 no.2
    • /
    • pp.191-198
    • /
    • 2020
  • The several smart construction technologies are being introduced to the construction industry, and among these technologies, a few companies are attempting quality control using 3D scanning and BIM. Therefore, in this study, 3D scanning and BIM were applied to cases of on-site quality inspection to confirm the applicability and utility. As a result, it was confirmed that the quality inspection using 3D scanning and BIM was shorter in time than the previously performed quality inspection and can be realized with less manpower. Therefore, it is considered that 3D scanning and BIM-enabled technologies can be applied to various items of quality inspection.

Framework for Developing RFID Applications Based on Product Line Architecture (프로덕트라인 아키텍처 기반 RFID 애플리케이션 개발을 위한 프레임워크)

  • Moon, Mi-Kyeong;Kim, Han-Jun;Yeom, Keun-Hyuk
    • The KIPS Transactions:PartD
    • /
    • v.14D no.7
    • /
    • pp.773-782
    • /
    • 2007
  • Software produce line engineering is a method that prepares for future reuse and supports seamless reuse in the application development process. Analyzing the commonality and variability between products in a product line is one of the essential concerns that must be considered when building a product line. In this paper, we suggest to combine a product line engineering approach with RFID applications technology. More concretely, common activities are identified among the RFID-enable applications and the variability in the common activities is analyzed in detail. Then, we suggest reusable product line architecture as a product line asset. In addition, as a tool for supporting this research, a framework which provides both reusable product line architecture for REID applications and the components that implement concrete realization of the architecture is developed. Sharing a common architecture and reusing assets to deploy recurrent services may be considered an advantage in terms of economic significance and overall quality.

A Study on the Application Method of Digital Signature to International e-Trade over the Internet (인터넷 전자무역에서의 전자서명 적용방안 연구)

  • Park, Sang-Hwan;Lee, Seok-Lae;Park, Chu-Hwan
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.3
    • /
    • pp.227-241
    • /
    • 2004
  • With the expansion of internet usage and the advanced technology for information and communication, the international e-Trade environment gradually migrates from the VAN/EDI to the global Internet-based e-Traed on an ebXML framework. In an effort to provide a Internet-based e-Trade environment with a security and trust, this paper analyzes security components and proposed the SSL and ebXML security technologies in order to assure of the trust and security over Internet-based e-Trade. In addition, this paper presents 3-phase methodology to realize the secure and trustworthy Internet-based e-Trade. In summary, as the first phase, the e-Trade business processes are re-engineered and the digital signature council for mutual recognition is orgainzed. And as the second phase, the Internet-based e-Trade system and the concerned digital signature technology are implemented. Finally as third phase, the PKI mutual recognition agreement is signed by parties concerned and then the Internet-based e-trade business is started. Furthermore, this paper presents the promising Internet-based e-Trade models where the digital signature can be applied.

  • PDF

A VLSI Architecture for the Real-Time 2-D Digital Signal Processing (실시간 2차원 디지털 신호처리를 위한 VLSI 구조)

  • 권희훈
    • Information and Communications Magazine
    • /
    • v.9 no.9
    • /
    • pp.72-85
    • /
    • 1992
  • The throughput requirement for many digital signal processing is such that multiple processing units are essential for real-time implementation. Advances in VLSI technology make it feasible to design and implement computer systems consisting of a large number of function units. The research on a very high throughput VLSI architecture for digital signal processing applications requires the development of an algorithm, decomposition scheme which can minimize data communication requirements as well as minimize computational complexity. The objectives of the research are to investigate computationally efficient algorithms for solution of the class of problems which can be modeled as DLSI systems or adaptive system, and develop VLSI architectures and associated multiprocessor systems which can be used to implement these algorithms in real-time. A new VLSI architecture for real-time 2-D digital signal processing applications is proposed in this research. This VLSI architecture extends the concept of having a single processing units in a chip. Because this VLSI architecture has the advantage that the complexity and the number of computations per input does not increase as the size of the input data in increased, it can process very large 2-D date in near real-time.

  • PDF

A Study on the Application Model of SAML for Integrated Authentication in Web Services (웹서비스 통합 인증에 대한 SAML적용 모델 연구)

  • Yi, Hyoung-Seok;Jeong, Jong-Il;Park, Byung-Chul;Shin, Dong-Il;Shin, Dong-Kyoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.1961-1964
    • /
    • 2003
  • 웹서비스에 대한 높은 관심과 함께 그 실현이 점차 가시화되고 XML로 이루어진 지원 기술들의 전폭적인 지지로 잠재력은 더욱 확대되고 있다. 웹서비스는 기존 웹 기반의 디스플레이에 그쳤던 단순정보 교환을 애플리케이션 차원에서 데이터를 통신할 수 있어 개발 가능성이 무한한 프레임워크로 각광받고 있다. 전자상거래 분야도 예외는 아니어서 웹서비스의 기본 개념을 이용하여 프레임워크를 구성하려는 노력이 진행되고 있다. 이에 따라 인증분야에서도 한계점이 드러나게 되었고 각 시스템마다 존재하는 많은 인증 정보관리 문제가 부각되고 있다. OASIS에서는 웹서비스의 등장과 함께 SAML이라는 표준 인증 방식을 제시하였다. SAML은 XML기반의 표준화된 인증방식을 취하여 안전성과 확장성 뿐만 아니라 인증 간 상호운용성을 제공하는 강력한 기능을 가지고 있다. 본 논문에서는 SAML을 이용한 SSO(Single Sign On)와 접근권한에 대한 적용개념을 소개하고 SAML인증서버를 이용한 Web Services인증 모델을 제시하고자 한다.

  • PDF

Blockchain Technology for Healthcare Big Data Sharing (헬스케어 빅데이터 유통을 위한 블록체인기술 활성화 방안)

  • Yu, Hyeong Won;Lee, Eunsol;Kho, Wookyun;Han, Ho-seong;Han, Hyun Wook
    • The Journal of Bigdata
    • /
    • v.3 no.1
    • /
    • pp.73-82
    • /
    • 2018
  • At the core of future medicine is the realization of Precision Medicine centered on individuals. For this, we need to have an open ecosystem that can view, manage and distribute healthcare data anytime, anywhere. However, since healthcare data deals with sensitive personal information, a significant level of reliability and security are required at the same time. In order to solve this problem, the healthcare industry is paying attention to the blockchain technology. Unlike the existing information communication infrastructure, which stores and manages transaction information in a central server, the block chain technology is a distributed operating network in which a data is distributed and managed by all users participating in the network. In this study, we not only discuss the technical and legal aspects necessary for demonstration of healthcare data distribution using blockchain technology but also introduce KOREN SDI Network-based Healthcare Big Data Distribution Demonstration Study. In addition, we discuss policy strategies for activating blockchain technology in healthcare.

A Study on the Fingerprint-based User Authentication Protocol Considering both the Mobility and Security in the Telematics Environment (텔레메틱스 환경에서 이동성과 보안성을 고려한 지문정보를 이용한 사용자 인증 프로토콜에 관한 연구)

  • Kim, Tae-Sub;Oh, Ryong;Lee, Sang-Joon;Lee, Sung-Ju;Kim, Hak-Jae;Chung, Yong-Wha;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11A
    • /
    • pp.1128-1137
    • /
    • 2007
  • Recently, according to being advanced internet, mobile communication technique, Telematics environment which users in vehicle can use internet service in LAN(Local Area Network) via mobile device has being realized. In this paper, we propose the remote user authentication protocol to solve these issues. Additionally, we use biometrics(fingerprint) for our user authentication protocol cause it can provide to avoid critical weakness that can be lost, stolen, or forgotten and to make authentication easily. In our user authentication protocol, to protect the biometric we use session key which is generated from master key distributed in our key distribution protocol. In particular, we propose secure protocol between APs considering weakness of security in mobile environment. Based on implementation of our proposed protocol, we conform that our proposed protocols are secure from various attack methods and provide real-time authentication.

영상정보용 공용데이터링크 표준화 발전방향

  • Jeong, Jong-Mun;Park, Gyu-Cheol;Won, Tae-Yeon;O, Ui-Hwan;Go, Dong-Cheol;Hong, Seok-Jun;Yun, Chang-Bae;Kim, Ho;Park, Ui-Yeong
    • Information and Communications Magazine
    • /
    • v.28 no.4
    • /
    • pp.41-50
    • /
    • 2011
  • 미래 전에서는 정보의 중요성이 더욱 부각되고 있으며 정보의 수집 및 전파, 정확한 지휘결심 및 전파, 기동타격체계의 통제 등으로 이어지는 지휘통제의 전 과정을 유기적으로 연결하여, 그 성능을 극대화시키는 것이 네트워크 중심전(NCW: Net-Centric Warfare)의 개념이다. NCW 실현을 위해 개발중인 여러 체계 중 주목 받고 있는 것이 무인기(UAV: Unmanned Aerial Vehicle) 이다. 무인기는 감시정찰, 고정밀 타격, 그리고 전투피해평가 기능 등을 수행하며, 전술적인 상황인식이 가능하게 한다. 무인기가 이러한 임무를 수행하기 위해서는 비행체의 상태정보, 비행체의 조종통제정보, 그리고 임무 탑재체가 획득한 정보의 간단없고 정확한 전달이 요구된다. 이러한 정보를 전송하기 위한 비행체와 지상체간의 제반 통신을 데이터 링크(Data Link)라 하며, NCW 구현에 있어서 가장 핵심이 되는 요소이다. 세계 각국은 영상정보 수집자산으로서 무인기와 데이터링크의 개발에 박차를 가하고 있는 실정이며, 우리 군도 전력화가 계획된 각 제대별 무인기의 통합운용을 위한 영상정보 공용데이터 링크 (MPI-CDL: Multi-Platform Image and Intelligence Commom Data Link)를 개발중에 있으며 지속적인 영상정보 수집자산의 소요증가에 따른 주파수 획득문제와 사업별 독자적인 데이터 링크의 개발을 지양하고 기존체계와의 상호운용 및 단절없는 통신을 보장을 위해 개발과 동시에 국가적 차원에서의 기술구조 표준화가 추진되어야 한다. 이러한 시점에서 본고에서는 먼저 선진국의 (CDL : Commom Data Link) 표준화 동향을 알아보고, 상호운용성과 연동을 위한 한국형 MPI-CDL 기술 표준화방향을 제시하고자 한다.

Logical Simulation Platform of Discretionary Events in Spatio-Temporal Context (시공간 속에서 일어나는 자유 재량적 사건의 논리적 시뮬레이션 플랫폼)

  • Kim, Il-Kon;Park, Jong-H
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.6
    • /
    • pp.377-385
    • /
    • 2002
  • An authentic simulation platform for events situated in spatio-temporal space is presented. The authenticity, i.e., logical fidelity to the reality, of this cyberspace is realized by maximizing the diversity and unpredictability of events occurring therein. The knowledge components and associated schemes required for the simulation of events situated in spatio-temporal space encompass the environmental factors, the objects, the events, and their interrelations. We deviled event activation, triggering mechanism, and cognitive function related to event to realize an authentic simulation of discretionary events. The agents in this simulation environments are autonomous in that they have their own existence and capability of event planning. We focused on identifying basic constructs relevant to authentic simulation of discretionary events whose initiation depends on human intention. Several key ideas are implemented in a typical spatio-temporal situation to demonstrate the viability of our simulation mechanism.