• Title/Summary/Keyword: CyberCity

Search Result 96, Processing Time 0.025 seconds

Reference Model for the Service of Smart City Platform through Case Study (사례 연구를 통한 스마트 시티 플랫폼의 서비스를 위한 참조 모델)

  • Kim, Young Soo;Mun, Hyung-Jin
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.241-247
    • /
    • 2021
  • As a way to solve the side effects of urban development, a smart city with information and communication technology converges in the city is being built. For this, a smart city platform should support the development and integration of smart city services. Therefore, the underlying technology and the functional and non-functional requirements that the smart platform must support were analyzed. As a result of this, we classified the Internet of Things, cloud computing, big data and cyber-physical systems into four categories as the underlying technologies supported by the smart city platform, and derived the functional and non-functional requirements that can be implemented and the reference model of the smart city platform. The reference model of the smart city platform is used for decision-making on investment in infrastructure technology and the development scope of services according to functional or non-functional requirements to solve specific city problems for city managers. It provides platform developers with guidelines to identify and determine the functional and non-functional requirements and implementation technologies of software platforms for building smart cities.

Constructing 3D Models and Virtual Reality Contents of CheongGyeCheon (청계천의 3차원모델 및 가상현실컨텐츠 제작)

  • Lee Im-Pyeong;Choi Yun-Soo;Kwon Moon-Seong;Choi Kyoung-Ah
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2006.04a
    • /
    • pp.501-506
    • /
    • 2006
  • With the development of Geospatial Technology (GT), many countries and industries have been expanding their investment in constructing a cyber territory. As the critical components of this cyber territory, three-dimensional models and virtual reality contents based on these models of urban areas in particular have been considered. These models and contents can be intensively used for a city to decide the policies efficiently and to attract the interests of peoples while planning and performing large projects. In this study, we have thus constructed the 3D models and virtual reality contents of the large areas along the CheongGye stream to visualize the environment of these areas before and after the CheongGyeCheon restoration project being completed. Furthermore, we propose efficient methods to construct and visualize these large models, such as tile mapping and multiple LOD application.

  • PDF

Effectiveness of Blended Learning Method on Digital Logic Circuit

  • Lim, Se-Young;Lim, Dong-Kyun;Lee, Ji-Eun
    • International journal of advanced smart convergence
    • /
    • v.4 no.2
    • /
    • pp.34-37
    • /
    • 2015
  • An ideal teaching-learning method, such as the blended learning method, is to motivate interests in education and to allow active class participation of students. Students exposed to this method are hypothesized to be dedicated in learning and their school life. A research was conducted on $11^{th}$ graders in Daejeon city high school specialized in industry; the blended learning method was applied to a course, digital logic circuit and the effects on the students' learning were monitored. The result shows that compared with a common leaning method, the blended learning method is very effective in terms of increasing educational interest, class participation, the level of concentration in class and academic achievement of students. Also, it shows positive feedbacks from the students on the educational videos and the usage of the contents. Conclusively, the blended learning method effectively increases academic achievements through improved educational motivation and active class participation which positively affect the overall satisfaction of participants.

Security Attack Classification for Data Driven Smart City (데이터 중심의 스마트 시티를 위한 보안 공격 분류)

  • Hwang, Hyunjae;Kim, Hyunsung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.272-275
    • /
    • 2019
  • 랜섬웨어는 더욱 지능화되고 표적화된 공격이 예상되고 클라우드와 사물인터넷 기기의 확산으로 공격의 범위 또한 지속적으로 확대될 것으로 보인다. 특히, 이러한 사물인터넷 기기들은 스마트 시티를 위한 기본 구성요소로 인식되므로 다양한 보안을 위한 연구가 진행되어야 한다. 본 논문에서는 데이터 중심의 스마트 시티를 위한 보안 요구사항 분석을 통해 다양한 스마트 시티 관련 공격을 살펴본다. 또한, 이러한 공격을 보안 서비스에 초점을 맞춰 분류한다. 이렇게 제시된 분류는 다양한 데이터 중심의 스마트 시티를 위한 보안 시스템 구축에 도움이 될 수 있을 것으로 기대한다.

Behavioral Analysis Zero-Trust Architecture Relying on Adaptive Multifactor and Threat Determination

  • Chit-Jie Chew;Po-Yao Wang;Jung-San Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2529-2549
    • /
    • 2023
  • For effectively lowering down the risk of cyber threating, the zero-trust architecture (ZTA) has been gradually deployed to the fields of smart city, Internet of Things, and cloud computing. The main concept of ZTA is to maintain a distrustful attitude towards all devices, identities, and communication requests, which only offering the minimum access and validity. Unfortunately, adopting the most secure and complex multifactor authentication has brought enterprise and employee a troublesome and unfriendly burden. Thus, authors aim to incorporate machine learning technology to build an employee behavior analysis ZTA. The new framework is characterized by the ability of adjusting the difficulty of identity verification through the user behavioral patterns and the risk degree of the resource. In particular, three key factors, including one-time password, face feature, and authorization code, have been applied to design the adaptive multifactor continuous authentication system. Simulations have demonstrated that the new work can eliminate the necessity of maintaining a heavy authentication and ensure an employee-friendly experience.

A Study on a Smart City Supply Chain Security Model Based on Zero-Trust (제로 트러스트(Zero-Trust) 기반의 스마트시티 공급망 보안모델 연구)

  • Lee, Hyun-jin;Son, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.123-140
    • /
    • 2022
  • Recently, research on solving problems that have introduced the concept of smart city in countries and companies around the world is in progress due to various urban problems. A smart city converges the city's ICT, connects all the city's components with a network, collects and delivers data, and consists of a supply chain composed of various IoT products and services. The increase in various cyber security threats and supply chain threats in smart cities is inevitable, in addition to establishing a framework such as supply chain security policy, authentication of each data provider and service according to data linkage and appropriate access control are required in a Zero-Trust point of view. To this end, a smart city security model has been developed for smart city security threats in Korea, but security requirements related to supply chain security and zero trust are insufficient. This paper examines overseas smart city security trends, presents international standard security requirements related to ISMS-P and supply chain security, as well as security requirements for applying zero trust related technologies to domestic smart city security models.

A Study Privacy and Security in Ubiquitous City Environment (Focous on Computing Values Analysis of Personal Information) (유비쿼터스 도시 환경에서 프라시버시 보호 방안에 관한 소고 - 경쟁하는 개인정보가치 분석을 중심으로 -)

  • Jung Chang-Duk;Kang Jang-Mook
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.249-254
    • /
    • 2006
  • As the concept of Ubiquitous City has become an important issue, we need to have a voice in the field of privacy. The Ubiquitous Computing revolution, it is achieved a physical space and an intelligent union of cyber space in the space where an off-line space was integrated with on-line. It is combined with a life space naturally, and Ubiquitous creates a new integrated space. The space is the opportunity space that is limitless as soon as it is the unknown world that mankind was not able to experience yet. According to the recent papers and studies, Privacy or Personal Information sector is mentioned as a major problem for Ubiquitous Computing Society. Therefore, this paper checks Ubiquitous City, the present privacy concept and situation of currently proceeding Ubiquitous computing environment. Also, The main purpose of this paper is to analyze the concepts privacy, personal information. Thus this paper treated the analysis of case, technological or social issue, problem and solution, competing values of privacy and so on.

  • PDF

Why is Seogwipo Warm in Winter? The wind from Jeju City to Seogwipo-The Wind from Seogwipo to Jeju City (서귀포는 겨울철에 왜 따뜻할까? 제귀지풍과 귀제지풍)

  • Sung kook Lee;Moon Ho Lee;Jeong Su Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.121-125
    • /
    • 2023
  • In winter, Jeju's Seogwipo and Jungmun areas are 2~3℃ warmer than Jeju City. The reason is that when the north wind over Halla Mountain crosses Baengnokdam of Halla Mountain and passes the 300m long and 260m vertical rock face of Donnaeko at an altitude of 1600m above sea level, the cold air turns into warm air through adiabatic compression, and the warmth rides on Donnaeko and flies to Seogwipo and Jungmun. Conversely, the south wind that rises over the sea in Seogwipo in the summer passes over Hallasan Mountain and passes 99 valleys before turning into a muggy, humid climate, making Jeju hot. In other words, it is because of The wind from Jeju City to Seogwipo-The Wind from Seogwipo to Jeju City.

Exploring Relationships between Life Satisfaction and Patterns of Support Exchange of the Elderly Living Alone and Their Children in Metropolitan City in Japan (일본 대도시 독거노인의 자녀와의 지원교환형태에 따른 생활만족도)

  • Lim, Hyo-Yeon
    • Journal of the Korean Home Economics Association
    • /
    • v.47 no.5
    • /
    • pp.59-66
    • /
    • 2009
  • The present study identified the patterns of support exchange between the elderly living alone and their children in a metropolitan city in Japan and examined the relationships between the patterns of support exchange and their life satisfaction. The sample was collected from 1,020 the elderly living alone in Osaka city selected with random sampling method. The questionnaires were mailed to the respondents, who were asked to send them back. The response rate was 51.7%(n = 526). We used 371 sample of respondents who have children. The results indicated that:(1)the patterns of support exchange were different by the types of social support, (2)the life satisfaction of the elderly who had an appropriate balance of a support exchange pattern was significantly higher than the life satisfaction of those who had low support exchange or only provided supports to their children. The findings imply that an appropriate balance of support exchange between the elderly living alone and their children was crucial in improving life satisfaction of the elderly living alone.

Risk Analysis and Monitoring Model of Urban SCADA Network Infrastructure (도시 기반시설 SCADA 망의 위험분석 및 모니터링 모델 연구)

  • Kim, Wan-Jib;Lee, Kyung-Ho;Kim, Huy-Kang;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.67-81
    • /
    • 2011
  • In recently years, there are cyber-weapon aim to national infrastructure such as 'stuxnet'. Security experts of the world are paying attention to this phenomenon. The networks which controls traffic, subway, waterworks of the city are safe from threats such as computer virus, malware, because the networks were built on closed-networks. However, it's about time to develop countermeasure for the cyber-weapon. In this paper, we review status-quo of the control systems for metropolitan infrastructure and analyze the risk of industrial control system in SCADA(Supervisory Control And Data Acquisition) network. Finally, we propose a security model for control systems of metropolitan infrastructure.