• Title/Summary/Keyword: 정보통신 연구소기업

Search Result 82, Processing Time 0.025 seconds

A Study on the Diagonosis and Prediction System of Vehicle Faults Using Condition Based Maintenance Technique (상태기반 유지보수 기법을 적용한 차량고장 진단 및 예측 시스템 연구)

  • Song, Gil jong;Lim, Jae Jung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.4
    • /
    • pp.80-95
    • /
    • 2019
  • Recently, with the development of sensor and communication technology, researchers at home and abroad have actively conducted research on methodologies for determining maintenance through diagnosis and prediction techniques by collecting information on the status of equipment or systems. Based on the status of vehicle parts at this point in time, this study presented a system framework for making maintenance decisions by predicting the change in vehicle part status to a future date based on the current state of vehicle parts. In addition, condition diagnosis and predictive data adjustment was configured through tracking the status of vehicle parts before and after maintenance activities. We hope that the application of the results of this study will contribute a little to the safety of citizens using public buses and to the activation of the condition-based maintenance system of vehicles.

The Mobile Security Diagnostic System against Smart-phone Threat (스마트폰 악성코드 대응을 위한 모바일 보안 진단 시스템)

  • Cheon, Woo-Bong;Lee, Jung-Hee;Park, Won-Hyung;Chung, Tai-Myoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.537-544
    • /
    • 2012
  • With wireless network infrastructure, the number of smart-phone users is remarkably increasing in the world and the amounts of damage due to the smart-phone malwares are also raised. Many security solutions for wireless network have come into the market but these solutions are for companies or large enterprises, therefore, the public users of smart-phone don't feel easy to select as their solutions and it is difficult to detect unknown malwares. In this paper, we propose the mobile security diagnostic system for public smart-phone users, which provides functions like smart-phone system check, comparison with blacklist of applications and collecting malwares.

IEEE1394 기술동향 및 표준화 전망

  • 전호인
    • Information and Communications Magazine
    • /
    • v.17 no.11
    • /
    • pp.45-62
    • /
    • 2000
  • IEEE1394 기술은 오디오 비디오 기기의 디지털화가 이루어지고 멀티미디어 환경이 부상함에 따라 이들간의 공통된 새로운 인터페이스 방식의 필요에 의해 발생한 직렬 버스 방식을 이용한 디지털 인터페이스 방식으로, USB가 제공하지 못하는 고속의 실시간 데이터 전송을 가능하게 해 주는 차세대 핵심 기술이다. 기가비트급의 높은 데이터 전송율을 자랑하는 IEEE1394 기술은 따라서 멀티미디어 PC와 오디오/비디오 등 높은 대역폭을 요구하는 가전기기를 하나로 묶어줄 수 있는 유일한 기술이며, 그 위에 TCP/IP 프로토콜을 얹어서 인터넷과도 직접 연결되므로, 옥내 통신망 구축을 위하여 제안되고 있는 HomeRF나 Bluetooth, 그리고 IEEE802.11 계열이 기술들과 비교하면 그 효용성과 기능성, 그리고 필요성과 속도 면에서 다른 위치를 점유하고 있다. 따라서 IEEE1394 기술은 Home Network의 Backbone 역학을 담당할 수 있으므로, IEEE1394 기술이 갖고 있는 미래의 시장 규모는 가히 폭발적이라 할 수 있다. 우리 나라에서도 삼성과 대우, 그리고 LG 전자 등을 중심으로 IEEE1394 칩셋과 그 응용 제품들이 선보이고 있으며, 대학과 연구소 그리고 중소 기업 등에서도 괄목할 만한 결과를 얻고 있다. 본 고에서느 앞으로의 시장 성장성 및 국가 경쟁력을 위해 새 천년의 화두가 되고 있는 표준화와 기술 개발의 핵심에 있는 홈 네트워크 기술의 개요를 간단히 알아 보고, 이 홈 네트워크 기술의 궁극적인 솔루션으로 알려진 IEEE1394 기술의 개발 동향과 시장 현황을 살펴본 후 1394TA를 중심으로 이루어지고 있는 IEEE1394 관련 기술의 표준화 전망을 조명하였다. 그리고 IEEE1394 기술에 관련된 기술을 개발하고 이 기술을 바탕으로 특허를 획득한 후 국제 표준으로 승인되는 절차를 추구하며 최근에 출범한 한국의 순수 민간 단체인 1394 Forum의 활동을 소개하고자 한다.

  • PDF

Development of Intelligent Traditional Culture Retrieval System based on 3D Digital Timeline (3D 디지털 연표 기반의 지능형 전통문화 검색 시스템 개발)

  • Shin, Yutak;Jo, Jaechoon
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.10
    • /
    • pp.154-162
    • /
    • 2019
  • Despite the development of information and communication technology, which has a great impact on society and culture, there is no platform that provides a systematic classification and state-of-the-art information retrieval system on the traditional culture. Therefore, this paper developed a traditional culture retrieval system capable of convergence services with systematic classification and retrieval based on automatically generate and visualize the 3D timeline. This system provides the function of collecting traditional culture contents, classifying and storing collected traditional culture contents, and automatically generating 3D digital timeline based on stored traditional culture contents. In addition, a system satisfaction questionnaire was developed to evaluate the usability of the system, and 19 students participated in verifying the system. As a result of the experiment, the satisfaction of the system showed that all items were 'satisfied' on average.

Exploring the Direction of Digital Platform Government by Text Mining Technique: Lessons from the Fourth Industrial Revolution Agenda (텍스트마이닝을 통한 디지털플랫폼정부의 방향 모색: 4차산업혁명시대 담론으로부터의 교훈)

  • Park, Soo-Kyung;Cho, Ji-Yeon;Lee, Bong-Gyou
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.5
    • /
    • pp.139-146
    • /
    • 2022
  • Recently, solving industrial and social problems and creating new values based on big data and AI is being discussed as the main policy goal. The new government also set the digital platform government as a national task in order to achieve new value creation based on big data and AI. However, studies that summarize and diagnose discussions over the past five years are insufficient. Therefore, this study diagnoses the discussions over the past 5 years using the 4th industrial revolution as a keyword. After collecting news editorials from 2017 to 2022 by applying the text mining technique, 9 major topics were discovered. In conclusion, this study provided implications for the government's task to prepare for the future society.

On the study of Usenet service authentication (유즈넷 서비스 인증에 관한 연구)

  • 이달원;조인준;황일선
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.481-484
    • /
    • 2002
  • News service provide professional knowledge which can't be gained from any other internet service and the only way to keep pace with professional group. To get this advantage, many country provide news service and three major korean news server connected with foreign news server provide many articles to korea. A lot of institutes - company, research centers and universities - forward articles to home and abroad. In spite of this important effect, The user of news service and technical supports grow smaller. And now It is necessary for a nation to support and operate by non-profitable business. Especially, partially adapted security weaken entire system safety and can't satisfy service provider of various necessary condition. In this paper, we will mention troubles in authentication and suggest safety authentication method which must be supported by established news service.

  • PDF

Accuracy Evaluation of Open-air Compost Volume Calculation Using Unmanned Aerial Vehicle (무인항공기를 이용한 야적퇴비 적재량 산정 정확도 평가)

  • Kim, Heung-Min;Bak, Su-Ho;Yoon, Hong-Joo;Jang, Seon-Woong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.3
    • /
    • pp.541-550
    • /
    • 2021
  • While open-air compost has value as a source of nutrients for crops in agricultural land, it acts as a pollution that adversely affects the environment during rainfall, and management is required. In this study, it was intended to analyze the accuracy of calculating open-air compost volume using fixed-wing UAV (unmanned aerial vehicle) capable of acquiring a wide range of images and automatic path flights and to identify the possibility of utilization. In order to evaluate the accuracy of calculating the three open-air compost volume, ground LiDAR surveys and precision surveys using a rotary UAV were performed. and compared with the open-air compost volume acquired through a fixed-wing UAV. As a result of comparing the calculation of open-air compost volume based on the ground LiDAR, the error rate of the rotary-wing was estimated to be ±5%, and the error rate of fixed-wing was -15 ~ -4%. one of three open-air compost volume calculated by fixed-wing was underestimated as about -15 %, but the deviation of the open-air compost volume was 2.9 m3, which was not significant. In addition, as a result of periodic monitoring of open-air compost using fixed-wing UAV, changes in the volume of open-air compost with time could be confirmed. These results suggested that efficient open-air compost monitoring and non-point pollutants in agricultural for a wide range using fixed-wing UAV is possible.

A Model for Supporting Information Security Investment Decision-Making Considering the Efficacy of Countermeasures (정보보호 대책의 효과성을 고려한 정보보호 투자 의사결정 지원 모형)

  • Byeongjo Park;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.27-45
    • /
    • 2023
  • The importance of information security has grown alongside the development of information and communication technology. However, companies struggle to select suitable countermeasures within their limited budgets. Sönmez and Kılıç (2021) proposed a model using AHP and mixed integer programming to determine the optimal investment combination for mitigating information security breaches. However, their model had limitations: 1) a lack of objective measurement for countermeasure efficacy against security threats, 2) unrealistic scenarios where risk reduction surpassed pre-investment levels, and 3) cost duplication when using a single countermeasure for multiple threats. This paper enhances the model by objectively quantifying countermeasure efficacy using the beta probability distribution. It also resolves unrealistic scenarios and the issue of duplicating investments for a single countermeasure. An empirical analysis was conducted on domestic SMEs to determine investment budgets and risk levels. The improved model outperformed Sönmez and Kılıç's (2021) optimization model. By employing the proposed effectiveness measurement approach, difficulty to evaluate countermeasures can be quantified. Utilizing the improved optimization model allows for deriving an optimal investment portfolio for each countermeasure within a fixed budget, considering information security costs, quantities, and effectiveness. This aids in securing the information security budget and effectively addressing information security threats.

A Scheduling Algorithm for Performance Enhancement of Science Data Center Network based on OpenFlow (오픈플로우 기반의 과학실험데이터센터 네트워크의 성능 향상을 위한 스케줄링 알고리즘)

  • Kong, Jong Uk;Min, Seok Hong;Lee, Jae Yong;Kim, Byung Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1655-1665
    • /
    • 2017
  • Recently data centers are being constructed actively by many cloud service providers, enterprises, research institutes, etc. Generally, they are built on tree topology using ECMP data forwarding scheme for load balancing. In this paper, we examine data center network topologies like tree topology and fat-tree topology, and load balancing technologies like MLAG and ECMP. Then, we propose a scheduling algorithm to efficiently transmit particular files stored on the hosts in the data center to the destination node outside the data center, where fat-tree topology and OpenFlow protocol between infrastructure layer and control layer are used. We run performance analysis by numerical method, and compare the analysis results with those of ECMP. Through the performance comparison, we show the outperformance of the proposed algorithm in terms of throughput and file transfer completion time.

Learning-Backoff based Wireless Channel Access for Tactical Airborne Networks (차세대 공중전술네트워크를 위한 Learning-Backoff 기반 무선 채널 접속 방법)

  • Byun, JungHun;Park, Sangjun;Yoon, Joonhyeok;Kim, Yongchul;Lee, Wonwoo;Jo, Ohyun;Joo, Taehwan
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.1
    • /
    • pp.12-19
    • /
    • 2021
  • For strengthening the national defense, the function of tactical network is essential. tactics and strategies in wartime situations are based on numerous information. Therefore, various reconnaissance devices and resources are used to collect a huge amount of information, and they transmit the information through tactical networks. In tactical networks that which use contention based channel access scheme, high-speed nodes such as recon aircraft may have performance degradation problems due to unnecessary channel occupation. In this paper, we propose a learning-backoff method, which empirically learns the size of the contention window to determine channel access time. The proposed method shows that the network throughput can be increased up to 25% as the number of high-speed mobility nodes are increases.