• Title/Summary/Keyword: Cyber system

Search Result 1,743, Processing Time 0.025 seconds

Management Education by Utilizing the Cyber Education Learning System (웹기반 원격교육시스템을 활용한 경영학 교육)

  • Hong Yong-Gee
    • Management & Information Systems Review
    • /
    • v.5
    • /
    • pp.249-285
    • /
    • 2000
  • This paper discusses management education by utilizing the cyber education learning system in a web-based. New learning system tools offer great promise for a new contents of management learning. The cyber education learning system a shift from face-to-face lecturing to interactive learning. The situation changes profoundly when information technology becomes develope and education paradigm is shift. By exploiting the digital media. educations, and students, managers can shift to a new, more effect cyber education learning system. The following shift from classic educations to cyber educations learning system: from instruction to construction, from teacher-centered to learner-centered, from school to lifelong, from one-size-fits-all to customized, from teacher as transmitter to teacher as facilitator. Cyber education learning system has an important role to play in management education. Web-based technology is regarded as a general solution to cyber education learning. This study discussed many factors of implementation in cyber education systems and provide utilizing the learning system at main, detail functions. Lastly, management implications of these cyber education utilize are discussed in more detail.

  • PDF

The Research of Effect of Cyber Education at Always Learning System in Affinity of Cyber Education for Officials: Focusing on Busan Metropolitan City (상시학습체제에서 사이버교육 요인이 공무원의 사이버교육 선호도에 미치는 영향 -부산광역시를 중심으로-)

  • Park, Myung-Kyu;Sim, Sun-Hee;Kim, Ha-Kyun
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.23 no.1
    • /
    • pp.116-125
    • /
    • 2011
  • In this study, a survey research was conducted on government employees in Busan Metropolitan City to identify the influence of cyber education factors (learning factor, learner factor, and learning system factor) on the preference for government employee cyber education offered by the government always learning system. Analyzed results, recognition of learning factor, learner factor, and always learning system were shown to have significant influence on the preference for cyber education, but no indication of influence by always learning support. This study intends to assist stimulating voluntary participation in cyber education and active commitment in learning activities through improving learning effect and fortifying convenient informatization education, with regard to activation of cyber education and improved preference for cyber education.

A Study on the Defense Cyber Warfare Exercise (국방사이버전 연습체계 개선 방안 연구)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.43-53
    • /
    • 2009
  • In the information society, information security is a critical issue for defense cyber network system. This paper provides a result of a study on the defense cyber exercise system for cyber warfare. So far, defense cyber exercise system has been uneffective and is not systematic even if several exercises has been implemented. In order to overcome these problems, a systematic and integrated cyber exercise process is suggested. Under the suggested system, we expect that cyber exercise for cyber warfare will be implemented with more effective manner.

  • PDF

An Overview of False Data Injection Attack Against Cyber Physical Power System (사이버 물리 전력 시스템에 대한 허위 데이터 주입 공격에 관한 고찰)

  • Bae, Junhyung
    • Journal of IKEEE
    • /
    • v.26 no.3
    • /
    • pp.389-395
    • /
    • 2022
  • With the evolution of technology, cyber physical systems (CPSs) are being upgraded, and new types of cyber attacks are being discovered accordingly. There are many forms of cyber attack, and all cyber attacks are made to manipulate the target systems. A representative system among cyber physical systems is a cyber physical power system (CPPS), that is, a smart grid. Smart grid is a new type of power system that provides reliable, safe, and efficient energy transmission and distribution. In this paper, specific types of cyber attacks well known as false data injection attacks targeting state estimation and energy distribution of smart grid, and protection strategies for defense of these attacks and dynamic monitoring for detection are described.

Estimation of the Cyber Lecture System based on XML (XML 3-tier 기반의 가상교육 시스템 평가)

  • Ahn, Yung-Doo;Yim, Hwang-Bin
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.2
    • /
    • pp.124-133
    • /
    • 2002
  • In this thesis. we present the cyber lecture system based on XML 3-tier that uses the communication network as the internet. The system was designed to analysis the existing cyber lecture system and its details and to examine web system architecture and XML 3-tier model. With the designed system, we developed the cyber lecture system. We tested the existing system for performance and problem, then we improved the method of the cyber lecture system used by XML 3-tier Model. The cyber lecture system is offered the handiness of the cyber lecture system using web interface.

Flexible operation and maintenance optimization of aging cyber-physical energy systems by deep reinforcement learning

  • Zhaojun Hao;Francesco Di Maio;Enrico Zio
    • Nuclear Engineering and Technology
    • /
    • v.56 no.4
    • /
    • pp.1472-1479
    • /
    • 2024
  • Cyber-Physical Energy Systems (CPESs) integrate cyber and hardware components to ensure a reliable and safe physical power production and supply. Renewable Energy Sources (RESs) add uncertainty to energy demand that can be dealt with flexible operation (e.g., load-following) of CPES; at the same time, scenarios that could result in severe consequences due to both component stochastic failures and aging of the cyber system of CPES (commonly overlooked) must be accounted for Operation & Maintenance (O&M) planning. In this paper, we make use of Deep Reinforcement Learning (DRL) to search for the optimal O&M strategy that, not only considers the actual system hardware components health conditions and their Remaining Useful Life (RUL), but also the possible accident scenarios caused by the failures and the aging of the hardware and the cyber components, respectively. The novelty of the work lies in embedding the cyber aging model into the CPES model of production planning and failure process; this model is used to help the RL agent, trained with Proximal Policy Optimization (PPO) and Imitation Learning (IL), finding the proper rejuvenation timing for the cyber system accounting for the uncertainty of the cyber system aging process. An application is provided, with regards to the Advanced Lead-cooled Fast Reactor European Demonstrator (ALFRED).

A Study for Cyber Situation Awareness System Development with Threat Hunting (위협 헌팅을 적용한 사이버 상황인식 시스템 개발에 관한 연구)

  • Lee, Jaeyeon;Choi, Jeongin;Park, Sanghyun;Kim, Byeongjin;Hyun, Dae-Won;Kim, Gwanyoung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.6
    • /
    • pp.807-816
    • /
    • 2018
  • Threat hunting is defined as a process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions. The main concept of threat hunting is to find out weak points and remedy them before actual cyber threat has occurred. And HMM(Hunting Maturity Matrix) is suggested to evolve hunting processes with five levels, therefore, CSOC(Cyber Security Operations Center) can refer HMM how to make them safer from complicated and organized cyber attacks. We are developing a system for cyber situation awareness system with pro-active threat hunting process called unMazeTM. With this unMaze, it can be upgraded CSOC's HMM level from initial level to basic level. CSOC with unMaze do threat hunting process not only detecting existing cyber equipment post-actively, but also proactively detecting cyber threat by fusing and analyzing cyber asset data and threat intelligence.

- Construction Method of a Cyber Tourism System using Geographic Information System - (GIS를 이용한 가상 관광시스템 구축방안)

  • 김용범;서장훈
    • Journal of the Korea Safety Management & Science
    • /
    • v.5 no.2
    • /
    • pp.187-197
    • /
    • 2003
  • In 21st century, According to development of Information Technology, It is clear that the importance of tourism information is extended increasingly. For this reason, It should be needed to realize a general system which make it possible to enjoy cyber tourism based on knowledge information system to recover a local potential growth power, catch a jumping chance again, and hold a new competitive power. But to discuss a tourism information system, the matters of hard ware, software and information mediating system should be reviewed generally, this research is likely to provide a cyber tourism information system through internet as a way of cyber tours through multimedia technology and stereoscopic image technique using GIS (Geographic Information System) centering on the networking system of tourism information. Constructing $\ulcorner$cyber touristy city$\lrcorner$ on internet, foster a new industry, to go balanced with a present tourism industry and experience a virtual reality, various theme tours create high profit to shrunken tourism industry.

Study on Design of Embedded Control Network System using Cyber Physical System Concept (가상물리시스템 개념을 이용한 임베디드 제어 네트워크 시스템 설계에 관한 연구)

  • Park, Jee-Hun;Lee, Suk;Lee, Kyung-Chang
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.7 no.5
    • /
    • pp.227-239
    • /
    • 2012
  • Recent advances in electronics have enabled various conventional products to incorporate with numerous powerful microcontroller. Generally, an embedded system is a computer system designed for specific control functions within a larger system, often with real-time computing constraints. The growing performance and reliability of hardware components and the possibilities brought by various design method enabled implementing complex functions that improve the comport of the system's occupant as well as their safety. A cyber physical system (CPS) is a system featuring a tight combination of, and coordination between, the system's computational and physical elements. The concept of cyber physical system, including physical elements, cyber elements, and shared networks, has been introduced due to two general reasons: design flexibility and reliability. This paper presents a cyber physical system where system components are connected to a shared network, and control functions are divided into small tasks that are distributed over a number of embedded controllers with limited computing capacity. In order to demonstrate the effectiveness of cyber physical system, an unmanned forklift with autonomous obstacle avoidance ability is implemented and its performance is experimentally evaluated.

Design of Target Cyber Counseling System using Counseling Assistance Agent

  • Pi, Su-Young
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.4 no.3
    • /
    • pp.311-315
    • /
    • 2004
  • Because of the characteristics of the cyber world, such as usefulness, anonymousness, patency, economic performance, rapidness, etc., cyber counseling has great possibility. Because he or she may not meet a consultant directly, a client can expose his/her inside problems or secret personal problems, keeping anonymousness. However, existing cyber counseling has the limit in durability of counseling because target counseling appropriate to a client is impossible and a counseling activity is done by one time counseling. In this paper, we attempt to develop a target cyber counseling system in which target cyber counseling is possible. The system will use a counseling assistance agent who can play the role of a counseling supporter as well as a counselor in the cyber space. If target counseling becomes possible, it can heighten efficiency of cyber counseling because a client is satisfied with the result of counseling and thus counseling activities can be continued.