• Title/Summary/Keyword: Fourth Industry Revolution

Search Result 359, Processing Time 0.033 seconds

A study on Metaverse Consumer perception survey before and after Covid-19 using CONCOR analysis on BIG Data

  • Min, Byun Kwang;Hwan, Ryu Gi
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.36-40
    • /
    • 2022
  • Many parts of life have been changed due to the unprecedented coronavirus outbreak, and Noncontact has now become a general culture of society around the world. Also, many years later, after the Fourth Industrial Revolution, it is now deeply embedded in the human lifestyle. The purpose of this paper's research is to investigate the metaverse perception before and after Corona. It was confirmed that the number of metaverse, the central keyword, was 70971 before Corona, but 261767 after Corona, which was more than three times the frequency. In addition, it was confirmed that the number of COVID-19, the reference point of this study, increased significantly to 1,9236 during the pre-COVID-19 period. Through this, it can be inferred that the metaverse accelerated and developed significantly after the corona. Metaverse about Keywords such as cryptocurrency, cryptocurrency, coin, and exchange appeared before Corona, and the word frequency ranking for blockchain, which is an underlying technology, was high, but after Corona, the word frequency ranking fell significantly as mentioned above. As such, it was confirmed that keywords for metaverse were changing before and after Corona, and as such, Consumers' perceptions were also changing.

A Study on the Data Basic Law and the Personal Information Security Issue (데이터 기본법과 개인정보보호 이슈에 관한 고찰)

  • Kim, Jong-Won;Park, Jin-Hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.9-11
    • /
    • 2022
  • In order to sustain and revitalize the fourth industrial revolution and data economy, the world's first 'data basic law' has been enacted and implemented in Korea.,However, the law prioritizes the activation of data industry and the activation of data production, distribution and use that deals with the protection of data assets, so it can be applied and interpreted more than the Personal Information Protection Act or the Copyright Act.,In this paper, the main contents of the data basic law are examined and the personal information issue is considered.

  • PDF

Analyzing Defects Types and Causes of Activities in Information and Communication Works Based on Investigation (정보통신공사 하자관리 실태조사를 통한 세부 공종별 하자 유형 및 원인 분석)

  • Eom, Yong-Been;Sohn, Sung-Geun;Kang, Sang-Hun;Park, Hyun Jung
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2021.05a
    • /
    • pp.269-270
    • /
    • 2021
  • As the era of the Fourth Industrial Revolution arrives and the culture of contact-less was established due to the long-term COVID-19, the construction industry is striving to develop smart home services to expand the scope of information and communications technology (ICT) to provide convenience to residents. However, various defects are occurring in information and communications technology facilities in apartments, and related research is lacking. In this study, case studies and research methods of related prior studies are analyzed as a basis for identifying the types and causes of defects that occur in information and communications technology facilities. To analyze various studies, we divided them into studies on smart home Internet of Things (IoT), information and communications technology construction of apartments, and investigated their features and limitations. Plus, future research will be conducted on apartments within 10 years of completion among apartments completed by domestic construction companies to supplement the limitations of prior research. In addition, we will prepare basic data on defects of ICT construction by analyzing the major causes of defect types through the analysis of defect types and frequency by detailed work type of information and communications technology construction.

  • PDF

Predictive maintenance technology for smart factory (스마트 팩토리를 위한 예지보전 기술)

  • Kwon, Dae-hoon;Oh, Chang-heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.172-174
    • /
    • 2021
  • In the existing industry, maintenance was carried out in the form of preventive maintenance such as occurrence of unnecessary idle time due to limited monitoring and maintenance. However, with the advent of the Fourth Industrial Revolution, real-time monitoring is possible in many industries including mining, manufacturing, oil and gas, and commercial agriculture, and it is desired to minimize idle time due to maintenance. In particular, there is a growing interest in predictive maintenance that can reduce costs and maximize operational efficiency by predicting and maintaining a failure before equipment and equipment fail. In this study, we look at the predictive maintenance technology that can verify the abnormal condition of the equipment of the smart factory in advance and monitor the abnormal condition in real time.

  • PDF

A Study on Total Production Time Prediction Using Machine Learning Techniques (머신러닝 기법을 이용한 총생산시간 예측 연구)

  • Eun-Jae Nam;Kwang-Soo Kim
    • Journal of the Korea Safety Management & Science
    • /
    • v.25 no.2
    • /
    • pp.159-165
    • /
    • 2023
  • The entire industry is increasing the use of big data analysis using artificial intelligence technology due to the Fourth Industrial Revolution. The value of big data is increasing, and the same is true of the production technology. However, small and medium -sized manufacturers with small size are difficult to use for work due to lack of data management ability, and it is difficult to enter smart factories. Therefore, to help small and medium -sized manufacturing companies use big data, we will predict the gross production time through machine learning. In previous studies, machine learning was conducted as a time and quantity factor for production, and the excellence of the ExtraTree Algorithm was confirmed by predicting gross product time. In this study, the worker's proficiency factors were added to the time and quantity factors necessary for production, and the prediction rate of LightGBM Algorithm knowing was the highest. The results of the study will help to enhance the company's competitiveness and enhance the competitiveness of the company by identifying the possibility of data utilization of the MES system and supporting systematic production schedule management.

Tensile Test Results for Metal 3D Printed Specimens of Stainless Steel 316L Manufactured by PBF and DED (스테인리스강 316L 재질의 PBF 및 DED 방식 금속 3D프린팅 시편 인장 시험 결과)

  • Kyungnam Jang;Seunghan Yang
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.19 no.1
    • /
    • pp.11-19
    • /
    • 2023
  • Additive manufacturing technology, called as 3D printing, is one of fourth industrial revolution technologies that can drive innovation in the manufacturing process, and thus should be applied to nuclear industry for various purposes according to the manufacturing trend change in the future. In this paper, we performed tensile tests of 3D printed stainless steel 316L as-built specimens manufactured by two types of technology; DED (Directed Energy Deposition) and PBF (Powder Bed Fusion). Their mechanical properties (tensile strength, yield strength, elongation and reduction of area) were compared. As a result of comparison, the mechanical properties of the PBF specimens were slightly better than those of DED specimens. In the same additive type of specimens, the tensile and yield strength of specimens in the X and Y direction were higher than those in the Z direction, but the elongation and ROA were lower.

Web Attack Classification via WAF Log Analysis: AutoML, CNN, RNN, ALBERT (웹 방화벽 로그 분석을 통한 공격 분류: AutoML, CNN, RNN, ALBERT)

  • Youngbok Jo;Jaewoo Park;Mee Lan Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.587-596
    • /
    • 2024
  • Cyber Attack and Cyber Threat are getting confused and evolved. Therefore, using AI(Artificial Intelligence), which is the most important technology in Fourth Industry Revolution, to build a Cyber Threat Detection System is getting important. Especially, Government's SOC(Security Operation Center) is highly interested in using AI to build SOAR(Security Orchestration, Automation and Response) Solution to predict and build CTI(Cyber Threat Intelligence). In this thesis, We introduce the Cyber Threat Detection System by analyzing Network Traffic and Web Application Firewall(WAF) Log data. Additionally, we apply the well-known TF-IDF(Term Frequency-Inverse Document Frequency) method and AutoML technology to classify Web traffic attack type.

The Impact of Block Chain Characteristics on the Intention to Use Hotel Reservation System in China (중국에서의 호텔예약 시스템의 블록체인 특성이 사용의도에 미치는 영향)

  • JIN, Peng-Ru;LEE, Jong-Ho
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.8
    • /
    • pp.33-44
    • /
    • 2019
  • Purpose - As the scope of existing digital transformation expanded to various degrees, the Fourth Industrial Revolution came into being. In 2016, Klaus Schwab, Chairman of the World Economic Forum (WEF), said that the new technologies that lead the fourth industrial revolution are AI, Block chain, IoT, Big Data, Augmented Reality, and Virtual Reality. This technology is expected to be a full-fledged fusion of digital, biological and physical boundaries. Everything in the world is connected to the online network, and the trend of 'block chain' technology is getting attention because it is a core technology for realizing a super connective society. If the block chain is commercialized at the World Knowledge Forum (WKF), it will be a platform that can be applied to the entire industry. The block chain is rapidly evolving around the financial sector, and the impact of block chains on logistics, medical services, and public services has increased beyond the financial sector. Research design, data, and methodology - Figure analysis of data and social science analytical software of IBM SPSS AMOS 23.0 and IBM Statistics 23.0 were used for all the data researched. Data were collected from hotel employees in China from 25th March to 10th May. Results - The purpose of this study is to investigate the effect of the block chain characteristics of the existing hotel reservation system on the intention to use and to examine the influence of the block chain characteristics of the hotel reservation system on the intention to use, We rearranged the variables having the same or similar meaning and analyzed the effect of these factors on the intention to use the block chain characteristic of the hotel reservation system. 339 questionnaires were used for analysis. Conclusions - There are only sample hotel workers in this study, and their ages are in their 20s and 30s. In future studies, samples should be constructed in various layers and studied. In this study, the block chain characteristics are set as five variables as security, reliability, economical efficiency, availability, and diversity. Among them, Security and reliability made positive effects on the perceived usefulness. Also, security and economics did on the perceived ease. Availability and diversity did on both perceived usefulness and perceived ease. Perceived ease did on perceived usefulness. And perceived ease and perceived usefulness did on user intent. But security and economics did not on the perceived usefulness

"An Analysis Study of Factors for Strengthening Cybersecurity at the Busan Port Container Terminal (부산항 컨테이너 터미널 사이버 보안 강화를 위한 요인 분석연구)

  • Do-Yeon Ha;Yul-Seong Kim
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.11a
    • /
    • pp.64-65
    • /
    • 2023
  • The purpose of this study was to assess the current status of cyber security at the Busan Port container terminal and derive strengthening factors through exploratory research. In recent years, the maritime industry has actively adopted Fourth Industrial Revolution technologies, resulting in changes in the form of ports, such as automated and smart terminals. While these changes have brought positive improvements in port efficiency, they have also increased the potential for cyber security incidents and threats, including information leakage through cargo handling equipment and ransomware attacks leading to terminal operations disruption. Especially in the case of ports, cyber security threats can have not only local effects within the port but also physical damage and implications for national security. However, despite the growing cyber security threats within ports, research related to domestic port cyber security remains limited. Therefore, this study aimed to identify factors for enhancing cyber security in ports and derive future enhancement strategies. The study conducted an analysis focusing on the Busan Port container terminal, which is one of the leading ports in South Korea actively adopting Fourth Industrial Revolution technologies, and conducted a survey of stakeholders in the Busan Port container terminal. Subsequently, exploratory factor analysis was used to derive strengthening factors. This study holds significance in providing directions for enhancing cyber security in domestic container ports in the future.

  • PDF

Exploratory Study on Enhancing Cyber Security for Busan Port Container Terminals (부산항 컨테이너 터미널 사이버 보안 강화를 위한 탐색적 연구)

  • Do-Yeon Ha;Yul-Seong Kim
    • Journal of Navigation and Port Research
    • /
    • v.47 no.6
    • /
    • pp.437-447
    • /
    • 2023
  • By actively adopting technologies from the Fourth Industrial Revolution, the port industry is trending toward new types of ports, such as automated and smart ports. However, behind the development of these ports, there is an increasing risk of cyber security incidents and threats within ports and container terminals, including information leakage through cargo handling equipment and ransomware attacks leading to disruptions in terminal operations. Despite the necessity of research to enhance cyber security within ports, there is a lack of such studies in the domestic context. This study focuses on Busan Port, a representative port in South Korea that actively incorporates technology from the Fourth Industrial Revolution, in order to discover variables for improving cyber security in container terminals. The research results categorized factors for enhancing cyber security in Busan Port's container terminals into network construction and policy support, standardization of education and personnel training, and legal and regulatory factors. Subsequently, multiple regression analysis was conducted based on these factors, leading to the identification of detailed factors for securing and enhancing safety, reliability, performance, and satisfaction in Busan Port's container terminals. The significance of this study lies in providing direction for enhancing cyber security in Busan Port's container terminals and addressing the increasing incidents of cyber security attacks within ports and container terminals.