• Title/Summary/Keyword: Cyber Power

Search Result 250, Processing Time 0.026 seconds

Modified Microwave Radio-thermometer for Measuring Temperature of Living Body (생체의 온도 측정을 위한 수정된 마이크로파 라디오-써모미터)

  • Kim Tae-Woo;Cho Tae-Kyung;Park Byoung-Soo
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.42 no.2 s.302
    • /
    • pp.27-32
    • /
    • 2005
  • This paper presents a modified microwave radio-thermometer (MRTM) with material characteristic estimator and multiple temperature conversion tables to measure subcutaneous temperature of a living body This estimator provides a temperature retrieval unit with the data of material characteristics such as permittivity, conductivity, thickness and geometry of the living body. The temperature retrieval unit with multiple temperature conversion tables can select one of the tables and computes temperature value corresponding to measured radiation power. In the experiments, it was shown that the MRTM could reduce measurement errors of about $0.82^{\circ}C\;to\;7.68^{\circ}C$ for the cases of distilled water and mixed liquid at the temperature of $37^{\circ}C$.

The Analysis of the APT Prelude by Big Data Analytics (빅데이터 분석을 통한 APT공격 전조 현상 분석)

  • Choi, Chan-young;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.317-320
    • /
    • 2016
  • The NH-NongHyup network and servers were paralyzed in 2011, in the 2013 3.20 cyber attack happened and Classified documents of Korea Hydro & Nuclear Power Co. Ltd were leaked on December in 2015. All of them were conducted by a foreign country. These attacks were planned for a long time compared to the script kids attacks and the techniques used were very complex and sophisticated. However, no successful solution has been implemented to defend an APT attack thus far. Therefore, we will use big data analytics to analyze whether or not APT attack has occurred in order to defend against the manipulative attackers. This research is based on the data collected through ISAC monitoring among 3 hierarchical Korean defense system. First, we will introduce related research about big data analytics and machine learning. Then, we design two big data analytics models to detect an APT attack and evaluate the models' accuracy and other results. Lastly, we will present an effective response method to address a detected APT attack.

  • PDF

Value Relevance of Accounting Information in KOSDAQ (코스닥시장에서 회계정보의 매매관련성에 관한 연구)

  • Yoon, Sung-Yong;Park, Jong-Hyuk;Lee, Ho-Seoub
    • Management & Information Systems Review
    • /
    • v.25
    • /
    • pp.203-222
    • /
    • 2008
  • This thesis examines whether accounting information-earnings and book values-has the value relevance in the KOSDAQ. The study is motivated by previous studies which have examined the value relevance of accounting information. Prior researches have focused on KSE(Korea Stock Exchange). But, prior researches have not examined the value relevance of accounting information in KOSDAQ. So, this study examined the value relevance of accounting information which is disclosed by firms on KOSDAQ and whether accounting information between firms on KOSDAQ and KSE has the discriminative value relevance, underlying the expectation that KOSDAQ firms will have higher future profitability than KSE firms. In other words, book-value multiples of KOSDAQ firms is higher than book-value multiples of KSE firms and earnings multiples of KOSDAQ firms is lower than earnings multiples of KSE firms. The value relevance of accounting information is examined by a valuation framework presented by Ohlson(1995), which expresses the stock-price as a function of both earnings and book values of equity. The results indicate that accounting information of KOSDAQ has significant explanatory power for stock price over the 2005-2007 period. KOSDAQ firm are divided by Venture firms and Small to Mid size firms. KOSDAQ Venture firms have the discriminative value relevance, compared with KSE firms. But, KOSDAQ Small to Mid size firms have not the discriminative value relevance, compared with KSE firms.

  • PDF

Prevention of Women's Crime Using Autonomous car & Drones of Smart Police Efficient Multicasting Environment (스마트치안에서의 자율주행차 및 드론을 활용한 여성 범죄 예방 연구)

  • Kim, Seung-woo;Jung, Yu-jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1294-1299
    • /
    • 2018
  • 'SMART Police' means collecting, analyzing and utilizing the police database such as crime statistics, reflecting 'strategic management', 'analysis and research', 'science technology' do. In recent years, the number of sex offenses has more than doubled based on the 'crime analysis' of the Supreme Prosecutors' In this trend, we started to build a sex crime prevention program for women 's relief special 3.0 which is suitable for regional characteristics. However, it was not enough for the women to have low publicity and utilization results, and to show the practical effect. In the future, we propose a crime prevention system which can safely take home safeguarding with autonomous driving car or drone by applying ICT to the future police system. Although it is difficult to operate autonomous vehicles and drones in the surrounding environment such as narrow alleys and power lines for application to this system, it is thought that the artificial intelligence technology can be sufficiently overcome to operate.

A study for Cybersecurity Risk Management by Blockade and Defense Level Analysis (봉쇄와 보안장비 수준 기반 정보보호 위험관리 수준 측정 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1261-1266
    • /
    • 2021
  • Existing information security risk assessment methods focus on evaluating the vulnerability of information assets. However, when the form of information assets changes and new types of information assets emerge, there is a limitation in that the evaluation standards for them are also added or deleted. Existing methods have insufficient research on the path through which cyber threats are introduced. In particular, there is very little research on blocking the inflow path for web-based information systems with public IPs. Therefore, this paper introduces the main research contents of the BDLA (Blockade and Defense Level Analysis)-based information security risk assessment model. In addition, by applying the BDLA-based information security risk assessment model, the information security risk level was studied by measuring the blockade level and security equipment level of 17 public institutions.

Reducing the Falling Accident due to the Removal of Safety Fence from Gondola (곤돌라 안전난간 제거 등으로 인한 추락재해 감소방안)

  • Byun, Hyung Shik;Rhim, Jong kuk;Yang, Won Beak
    • Journal of the Korea Safety Management & Science
    • /
    • v.21 no.2
    • /
    • pp.9-14
    • /
    • 2019
  • Gondola is widely used as a construction facility to perform external finishing work without using scaffolding at a construction site. However, since 2000, there have been 17 deaths from now so these risks associated with work can not be ignored. Therefore, it is expected that it will contribute greatly to prevent related disasters if introducing necessary measures to prevent repeated related disasters and installing additional safety devices. In order to eliminate the risk factor according to the operation of the gondola, it is necessary for the operator to use it to use it while the examination of each product is completed, and to use the over load Dangerous arbitrary measures such as arbitrary operation of the prevention device, removal of the safety fence for convenience of work, installation of the wire rope installed in the air, falling out of the wire rope and falling to the ground Do not perform such sealing measures so that any operation of the overload prevention device can not be done so as not to take such arbitrary measures, or wire the power supply wire to the safety fence so as not to delete the safety fence. Then, when the safety fence is removed, so that it does not become a gondola operation, or when replacing the wire rope in the air, to prevent the wire rope from coming off, Additional measures such as installing falling down prevention device may be necessary.

The Influence of Entrepreneurship Education Experiences on the Intention of Entrepreneurship (대학생의 개인적 특성인 창업교육 경험이 창업의도에 미치는 영향)

  • Choi, Tae-Wol;Yun, Suk-Ju;Pea, Sang-Muk
    • Industry Promotion Research
    • /
    • v.4 no.2
    • /
    • pp.61-67
    • /
    • 2019
  • A total of 84 questionnaires were analyzed for students with experience in entrepreneurship education in Cheonan-Asan, Chungnam province. The purpose of this study was to examine the effect of the experience of founding education, the personal characteristics of university students, on intention to start a business. As a result, first, there was a correlation between the intention of incubation of college students and the intention of incubation. Significantly at the level. Second, education satisfaction, which is a subordinate factor of entrepreneurship education, did not have a significant effect on achievement desire and self-efficacy, which are subdomains of entrepreneurship intention. Third, creativity was found to have a significant effect on both the desire for achievement and self-efficacy of intention, and creativity showed explanatory power of .603 and 35.1% for R2. The value of .493 and R2 of creativity and self-efficacy are 25.5%.

New Simple Power Analysis on scalar multiplication based on sABS recoding (sABS 형태의 스칼라 곱셈 연산에 대한 새로운 단순전력 공격)

  • Kim, Hee-Seok;Kim, Sung-Kyoung;Kim, Tae-Hyun;Park, Young-Ho;Lim, Jong-In;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.115-123
    • /
    • 2007
  • In cryptographic devices like a smart-card whose computing ability and memory are limited, cryptographic algorithms should be performed efficiently. Scalar multiplication is very important operation in Elliptic Curve Cryptosystems, and so must be constructed in safety against side channel attack(SCA). But several countermeasures proposed against SCA are exposed weaknesses by new un-dreamed analysis. 'Double-and-add always scalar multiplication' algorithm adding dummy operation being known to secure against SPA is exposed weakness by Doubling Attack. But Doubling Attack cannot apply to sABS receding proposed by Hedabou, that is another countermeasure against SPA. Our paper proposes new strengthened Doubling Attacks that can break sABS receding SPA-countermeasure and a detailed method of our attacks through experimental result.

A Study on the Militarization of Artificial Intelligence Technology in North Korea and the Development Direction of Corresponding Weapon System in South Korea (북한 인공지능 기술의 군사화와 우리 군의 대응 무기체계 발전방향 연구)

  • Kim, Min-Hyuk
    • Journal of Information Technology Services
    • /
    • v.20 no.1
    • /
    • pp.29-40
    • /
    • 2021
  • North Korea's science and technology policies are being pursued under strong leadership and control by the central government. In particular, a large part of the research and development of science and technology related to the Fourth Industrial Revolution in North Korea is controlled and absorbed by the defense organizations under the national defense-oriented policy framework, among which North Korea is making national efforts to develop advanced technologies in artificial intelligence and actively utilize them in the military affairs. The future weapon system based on AI will have superior performance and destructive power that is different from modern weapons systems, which is likely to change the paradigm of the future battlefield, so a thorough analysis and prediction of the level of AI militarization technology, the direction of development, and AI-based weapons system in North Korea is needed. In addition, research and development of South Korea's corresponding weapon systems and military science and technology are strongly required as soon as possible. Therefore, in this paper, we will analyze the level of AI technology, the direction of AI militarization, and the AI-based weapons system in North Korea, and discuss the AI military technology and corresponding weapon systems that South Korea military must research and develop to counter the North Korea's. The next study will discuss the analysis of AI militarization technologies not only in North Korea but also in neighboring countries in Northeast Asia such as China and Russia, as well as AI weapon systems by battlefield function, detailed core technologies, and research and development measures.

Design of Planetary Gear Reducer Driving part to Possible Disadhesion from Electric Wheelchair (전동 휠체어에 탈·부착이 가능한 유성기어 감속기 구동부 설계)

  • Youm, Kwang-Wook
    • Journal of the Korean Institute of Gas
    • /
    • v.26 no.2
    • /
    • pp.9-13
    • /
    • 2022
  • Electric wheelchairs, the output from the motor is mainly applied to a speed reducer using a power transmission device such as a belt or a chain. However, although a speed reducer using a belt or chain is a simple device, it occupies a lot of space and has a space limitation, so it is not suitable for an electric wheelchair driving part. However, since the speed reducer of the planetary gear type is decelerated on the same axis, the volume can be reduced, so the space constraint is less than that of the belt or chain type reducer. Therefore, in this study, a driving part that can obtain great propulsion with a speed reducer using a planetary gear type was developed through a study on the driving part of a wheelchair that can be switched between manual and electric. Accordingly, the tooth shape of the planetary gear applied to the reducer was designed using the Kisssoft program. In addition, the drive part was designed to be applicable to the existing wheelchair wheels, and the mechanism was optimized for the manual/electric switching principle and operation principle of the drive part. Based on the research contents, the final design and manufacture of the wheelchair reducer drive unit in the form of a planetary gear having one sun gear, two planetary gears and one ring gear was carried out.