• Title/Summary/Keyword: Information capability

Search Result 3,387, Processing Time 0.035 seconds

Opening New Horizons with the L4 Mission: Vision and Plan

  • Kyung-Suk Cho;Junga Hwang;Jeong-Yeol Han;Seong-Hwan Choi;Sung-Hong Park;Eun-Kyung Lim;Rok-Soon Kim;Jungjoon Seough;Jong-Dae Sohn;Donguk Song;Jae-Young Kwak;Yukinaga Miyashita;Ji-Hye Baek;Jaejin Lee;Jinsung Lee;Kwangsun Ryu;Jongho Seon;Ho Jin;Sung-Jun Ye;Yong-Jae, Moon;Dae-Young Lee;Peter H. Yoon;Thiem Hoang;Veerle Sterken;Bhuwan Joshi;Chang-Han Lee;Jongjin Jang;Jae-Hwee Doh;Hwayeong Kim;Hyeon-Jeong Park;Natchimuthuk Gopalswamy;Talaat Elsayed;John Lee
    • Journal of The Korean Astronomical Society
    • /
    • v.56 no.2
    • /
    • pp.263-275
    • /
    • 2023
  • The Sun-Earth Lagrange point L4 is considered as one of the unique places where the solar activity and heliospheric environment can be observed in a continuous and comprehensive manner. The L4 mission affords a clear and wide-angle view of the Sun-Earth line for the study of the Sun-Earth and Sun-Moon connections from he perspective of remote-sensing observations. In-situ measurements of the solar radiation, solar wind, and heliospheric magnetic field are critical components necessary for monitoring and forecasting the radiation environment as it relates to the issue of safe human exploration of the Moon and Mars. A dust detector on the ram side of the spacecraft allows for an unprecedented detection of local dust and its interactions with the heliosphere. The purpose of the present paper is to emphasize the importance of L4 observations as well as to outline a strategy for the planned L4 mission with remote and in-situ payloads onboard a Korean spacecraft. It is expected that the Korean L4 mission can significantly contribute to improving the space weather forecasting capability by enhancing the understanding of heliosphere through comprehensive and coordinated observations of the heliosphere at multi-points with other existing or planned L1 and L5 missions.

The Effect of Metaverse Presence on Intention to Continuous Use Through User Motivation: Moderating Effect of Normative Interpersonal Influence (메타버스 실재감이 사용자의 이용 동기를 통해 지속적 이용의도에 미치는 영향: 규범적 대인 민감성의 조절 효과)

  • Hwang, Inho;Kim, Jin soo;Lee, IL Han
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.17 no.3
    • /
    • pp.119-133
    • /
    • 2022
  • The COVID-19 pandemic is rapidly changing the behavior of members of society. Typically, the strong contagious power of the virus minimizes interaction between people in the real world, and they keep interaction activities to a minimum through online activities. Recently, as people demand online activities that enhance a sense of reality, the metaverse, which strengthens the 3D technology-centered sense of presence capability, is being chosen by people. The purpose of this study is to suggest a strategic direction for the establishment of the metaverse business model of startups by presenting factors for users' use and gratification of the metaverse. In detail, this study proposes the motivation for using the metaverse by reflecting the uses and gratification theory, and suggests a method to strengthen the motivation for the metaverse by reflecting the presences provided by the metaverse plotform and individual characteristics (normtive interpersonal influence). We surveyed people over 20 years of age who experienced metaverse and obtained 314 samples. In addition, we conducted the main effect analysis using the structural equation model and the moderating effect analysis using Process 3.1. As a result of hypothesis testing, we confirmed that metaverse presence (telepresence, social presence) has a positive effect on intention to continuous use by increasing metaverse's use and satisfaction factors (information, enjoyment, social interactivity). In addition, we found that individuals' normative interpersonal influence moderated the positive relationship between uses and gratification factors(enjoyment and social interactivity) intention to continuous use. Our study suggests strategies for establishing a user-centered business model for companies related to the metaverse.

A Study on the Development Strategy of Smart Learning for Public Education (스마트러닝의 공교육 정착을 위한 성공전략 연구)

  • Kim, Taisiya;Cho, Ji Yeon;Lee, Bong Gyou
    • Journal of Internet Computing and Services
    • /
    • v.16 no.6
    • /
    • pp.123-131
    • /
    • 2015
  • Recently the development of ICT has a big impact on education field, and diffusion of smart devices has brought new education paradigm. Since people has an opportunity to use various contents anytime and communicate in an interactive way, the method of learning has changing. In 2011, Korean government has established the smart education promotion plan to be a first mover in the paradigm shift from e-learning to smart learning. Especially, government aimed to improve the quality of learning materials and method in public schools, and also to decrease the high expenditure on private education. However, the achievement of smart education policy has not emerged yet, and the refinement of smart learning policy and strategy is essential at this moment. Therefore, the purpose of this study is to propose the successful strategies for smart learning in public education. First, this study explores the status of public education and smart learning environment in Korea. Then, it derives the key success factors through SWOT(Strength, Weakness, Opportunity, Threat) analysis, and suggests strategic priorities through AHP(Analytic Hierarchy Priority) method. The interview and survey were conducted with total 20 teachers, who works in public schools. As a results, focusing on weakness-threat(WT) strategy is the most prior goal for public education, to activate the smart learning. As sub-factors, promoting the education programs for teachers($W_2$), which is still a weakness, appeared as the most important factor to be improved. The second sub-factor with high priority was an efficient optimizing the capability of new learning method($S_4$), which is a strength of systematic public education environment. The third sub-factor with high priority was the extension of limited government support($T_4$), which could be a threat to other public schools with no financial support. In other words, the results implicate that government institution factors should be considered with high priority to make invisible achievement in smart learning. This study is significant as an initial approach with strategic perspective for public education. While the limitation of this study is that survey and interview were conducted with only teachers. Accordingly, the future study needs to be analyzed in effectiveness and feasibility, by considering perspectives from field experts and policy makers.

Educational Needs Analysis on NCS-based Intellectual Property Education (국가직무능력표준(NCS) 기반 지식재산교육을 위한 교육요구 분석)

  • Park, Ki-Moon
    • 대한공업교육학회지
    • /
    • v.43 no.1
    • /
    • pp.134-157
    • /
    • 2018
  • This study surveyed and analyzed satisfaction and issues about an intellectual property education system, and educational needs for intellectual property NCS (intellectual property management, intellectual property information survey analysis, intellectual property assessment trade), in order to introduce and operate NCS-based education system that trains practical manpower in the field. The results of this study are as follows. First, satisfaction for intellectual property education system showed education contents (M=3.86), followed by lecture (M=3.79), teaching method and environment (M=3.66) and education assessment (M=3.50). The issues to be improved are low application in the current occupation due to no reflection of demands of industrial fields, as well as insufficient education contents system, lectures who fall short of education capability and interactions with students tend to stress theoretical knowledge more than practical ability, teaching method lacks application of educational medium, insufficient interest and motivation, assessment methods that fall short of theoretical knowledge and practical ability achievement, and that is theory-centered. Second, educational needs for intellectual property NCS showed intellectual property assessment trade (4.33), followed by intellectual property management (3.68), and intellectual property information survey analysis (2.99), which should be reviewed to reform or newly develop NCS-based education course. Conclusively, intellectual property education showed satisfaction above the average, but a job-centered education is demanded to elevate application in the industrial field, which puts emphasis more on practical ability than theory. For this, it is necessary to introduce intellectual property NCS reflecting demands of industrial field, and to reform or newly develop into NCS-based education course. In addition, intellectual property education needs to be operated by changed education paradigm, such as user-centered teaching method, not provided-centered, and performance and course-centered assessment method, not theoretical knowledge-centered.

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

Performance of Uncompressed Audio Distribution System over Ethernet with a L1/L2 Hybrid Switching Scheme (L1/L2 혼합형 중계 방법을 적용한 이더넷 기반 비압축 오디오 분배 시스템의 성능 분석)

  • Nam, Wie-Jung;Yoon, Chong-Ho;Park, Pu-Sik;Jo, Nam-Hong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.12
    • /
    • pp.108-116
    • /
    • 2009
  • In this paper, we propose a Ethernet based audio distribution system with a new L1/L2 hybrid switching scheme, and evaluate its performance. The proposed scheme not only offers guaranteed low latency and jitter characteristics that are essentially required for the distribution of high-quality uncompressed audio traffic, and but also provide an efficient transmission of data traffic on the Ethernet environment. The audio distribution system with a proposed scheme consists of a master node and a number of relay nodes, and all nodes are mutually connected as a daisy-chain topology through up and downlinks. The master node generates an audio frame for each cycle of 125us, and the audio frame has 24 time slotted audio channels for carrying stereo 24 channels of 16-bit PCM sampled audio. On receiving the audio frame from its upstream node via the downlink, each intermediate node inserts its audio traffic to the reserved time slot for itself, then relays again to next node through its physical layer(L1) transmission - repeating. After reaching the end node, the audio frame is loopbacked through the uplink. On repeating through the uplink, each node makes a copy of audio slot that node has to receive, then play the audio. When the audio transmission is completed, each node works as a normal L2 switch, thus data frames are switched during the remaining period. For supporting this L1/L2 hybrid switching capability, we insert a glue logic for parsing and multiplexing audio and data frames at MII(Media Independent Interlace) between the physical and data link layers. The proposed scheme can provide a good delay performance and transmission efficiency than legacy Ethernet based audio distribution systems. For verifying the feasibility of the proposed L1/L2 hybrid switching scheme, we use OMNeT++ as a simulation tool with various parameters. From the simulation results, one can find that the proposed scheme can provides outstanding characteristics in terms of both jitter characteristic for audio traffic and transmission efficiency of data traffics.

Data Mining Approaches for DDoS Attack Detection (분산 서비스거부 공격 탐지를 위한 데이터 마이닝 기법)

  • Kim, Mi-Hui;Na, Hyun-Jung;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.279-290
    • /
    • 2005
  • Recently, as the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not effectively defend against these attacks, or the defense capability of some mechanisms is only limited to specific DDoS attacks. In this paper, we propose a detection architecture against DDoS attack using data mining technology that can classify the latest types of DDoS attack, and can detect the modification of existing attacks as well as the novel attacks. This architecture consists of a Misuse Detection Module modeling to classify the existing attacks, and an Anomaly Detection Module modeling to detect the novel attacks. And it utilizes the off-line generated models in order to detect the DDoS attack using the real-time traffic. We gathered the NetFlow data generated at an access router of our network in order to model the real network traffic and test it. The NetFlow provides the useful flow-based statistical information without tremendous preprocessing. Also, we mounted the well-known DDoS attack tools to gather the attack traffic. And then, our experimental results show that our approach can provide the outstanding performance against existing attacks, and provide the possibility of detection against the novel attack.

The Characteristics and Performances of Manufacturing SMEs that Utilize Public Information Support Infrastructure (공공 정보지원 인프라 활용한 제조 중소기업의 특징과 성과에 관한 연구)

  • Kim, Keun-Hwan;Kwon, Taehoon;Jun, Seung-pyo
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.4
    • /
    • pp.1-33
    • /
    • 2019
  • The small and medium sized enterprises (hereinafter SMEs) are already at a competitive disadvantaged when compared to large companies with more abundant resources. Manufacturing SMEs not only need a lot of information needed for new product development for sustainable growth and survival, but also seek networking to overcome the limitations of resources, but they are faced with limitations due to their size limitations. In a new era in which connectivity increases the complexity and uncertainty of the business environment, SMEs are increasingly urged to find information and solve networking problems. In order to solve these problems, the government funded research institutes plays an important role and duty to solve the information asymmetry problem of SMEs. The purpose of this study is to identify the differentiating characteristics of SMEs that utilize the public information support infrastructure provided by SMEs to enhance the innovation capacity of SMEs, and how they contribute to corporate performance. We argue that we need an infrastructure for providing information support to SMEs as part of this effort to strengthen of the role of government funded institutions; in this study, we specifically identify the target of such a policy and furthermore empirically demonstrate the effects of such policy-based efforts. Our goal is to help establish the strategies for building the information supporting infrastructure. To achieve this purpose, we first classified the characteristics of SMEs that have been found to utilize the information supporting infrastructure provided by government funded institutions. This allows us to verify whether selection bias appears in the analyzed group, which helps us clarify the interpretative limits of our study results. Next, we performed mediator and moderator effect analysis for multiple variables to analyze the process through which the use of information supporting infrastructure led to an improvement in external networking capabilities and resulted in enhancing product competitiveness. This analysis helps identify the key factors we should focus on when offering indirect support to SMEs through the information supporting infrastructure, which in turn helps us more efficiently manage research related to SME supporting policies implemented by government funded institutions. The results of this study showed the following. First, SMEs that used the information supporting infrastructure were found to have a significant difference in size in comparison to domestic R&D SMEs, but on the other hand, there was no significant difference in the cluster analysis that considered various variables. Based on these findings, we confirmed that SMEs that use the information supporting infrastructure are superior in size, and had a relatively higher distribution of companies that transact to a greater degree with large companies, when compared to the SMEs composing the general group of SMEs. Also, we found that companies that already receive support from the information infrastructure have a high concentration of companies that need collaboration with government funded institution. Secondly, among the SMEs that use the information supporting infrastructure, we found that increasing external networking capabilities contributed to enhancing product competitiveness, and while this was no the effect of direct assistance, we also found that indirect contributions were made by increasing the open marketing capabilities: in other words, this was the result of an indirect-only mediator effect. Also, the number of times the company received additional support in this process through mentoring related to information utilization was found to have a mediated moderator effect on improving external networking capabilities and in turn strengthening product competitiveness. The results of this study provide several insights that will help establish policies. KISTI's information support infrastructure may lead to the conclusion that marketing is already well underway, but it intentionally supports groups that enable to achieve good performance. As a result, the government should provide clear priorities whether to support the companies in the underdevelopment or to aid better performance. Through our research, we have identified how public information infrastructure contributes to product competitiveness. Here, we can draw some policy implications. First, the public information support infrastructure should have the capability to enhance the ability to interact with or to find the expert that provides required information. Second, if the utilization of public information support (online) infrastructure is effective, it is not necessary to continuously provide informational mentoring, which is a parallel offline support. Rather, offline support such as mentoring should be used as an appropriate device for abnormal symptom monitoring. Third, it is required that SMEs should improve their ability to utilize, because the effect of enhancing networking capacity through public information support infrastructure and enhancing product competitiveness through such infrastructure appears in most types of companies rather than in specific SMEs.

An Ontology Model for Public Service Export Platform (공공 서비스 수출 플랫폼을 위한 온톨로지 모형)

  • Lee, Gang-Won;Park, Sei-Kwon;Ryu, Seung-Wan;Shin, Dong-Cheon
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.149-161
    • /
    • 2014
  • The export of domestic public services to overseas markets contains many potential obstacles, stemming from different export procedures, the target services, and socio-economic environments. In order to alleviate these problems, the business incubation platform as an open business ecosystem can be a powerful instrument to support the decisions taken by participants and stakeholders. In this paper, we propose an ontology model and its implementation processes for the business incubation platform with an open and pervasive architecture to support public service exports. For the conceptual model of platform ontology, export case studies are used for requirements analysis. The conceptual model shows the basic structure, with vocabulary and its meaning, the relationship between ontologies, and key attributes. For the implementation and test of the ontology model, the logical structure is edited using Prot$\acute{e}$g$\acute{e}$ editor. The core engine of the business incubation platform is the simulator module, where the various contexts of export businesses should be captured, defined, and shared with other modules through ontologies. It is well-known that an ontology, with which concepts and their relationships are represented using a shared vocabulary, is an efficient and effective tool for organizing meta-information to develop structural frameworks in a particular domain. The proposed model consists of five ontologies derived from a requirements survey of major stakeholders and their operational scenarios: service, requirements, environment, enterprise, and county. The service ontology contains several components that can find and categorize public services through a case analysis of the public service export. Key attributes of the service ontology are composed of categories including objective, requirements, activity, and service. The objective category, which has sub-attributes including operational body (organization) and user, acts as a reference to search and classify public services. The requirements category relates to the functional needs at a particular phase of system (service) design or operation. Sub-attributes of requirements are user, application, platform, architecture, and social overhead. The activity category represents business processes during the operation and maintenance phase. The activity category also has sub-attributes including facility, software, and project unit. The service category, with sub-attributes such as target, time, and place, acts as a reference to sort and classify the public services. The requirements ontology is derived from the basic and common components of public services and target countries. The key attributes of the requirements ontology are business, technology, and constraints. Business requirements represent the needs of processes and activities for public service export; technology represents the technological requirements for the operation of public services; and constraints represent the business law, regulations, or cultural characteristics of the target country. The environment ontology is derived from case studies of target countries for public service operation. Key attributes of the environment ontology are user, requirements, and activity. A user includes stakeholders in public services, from citizens to operators and managers; the requirements attribute represents the managerial and physical needs during operation; the activity attribute represents business processes in detail. The enterprise ontology is introduced from a previous study, and its attributes are activity, organization, strategy, marketing, and time. The country ontology is derived from the demographic and geopolitical analysis of the target country, and its key attributes are economy, social infrastructure, law, regulation, customs, population, location, and development strategies. The priority list for target services for a certain country and/or the priority list for target countries for a certain public services are generated by a matching algorithm. These lists are used as input seeds to simulate the consortium partners, and government's policies and programs. In the simulation, the environmental differences between Korea and the target country can be customized through a gap analysis and work-flow optimization process. When the process gap between Korea and the target country is too large for a single corporation to cover, a consortium is considered an alternative choice, and various alternatives are derived from the capability index of enterprises. For financial packages, a mix of various foreign aid funds can be simulated during this stage. It is expected that the proposed ontology model and the business incubation platform can be used by various participants in the public service export market. It could be especially beneficial to small and medium businesses that have relatively fewer resources and experience with public service export. We also expect that the open and pervasive service architecture in a digital business ecosystem will help stakeholders find new opportunities through information sharing and collaboration on business processes.

Comparison of Two Methods for Estimating the Appearance Probability of Seawater Temperature Difference for the Development of Ocean Thermal Energy (해양온도차에너지 개발을 위한 해수온도차 출현확률 산정 방법 비교)

  • Yoon, Dong-Young;Choi, Hyun-Woo;Lee, Kwang-Soo;Park, Jin-Soon;Kim, Kye-Hyun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.13 no.2
    • /
    • pp.94-106
    • /
    • 2010
  • Understanding of the amount of energy resources and site selection are required prior to develop Ocean Thermal Energy (OTE). It is necessary to calculate the appearance probability of difference of seawater temperature(${\Delta}T$) between sea surface layer and underwater layers. This research mainly aimed to calculate the appearance probability of ${\Delta}T$ using frequency analysis(FA) and harmonic analysis(HA), and compare the advantages and weaknesses of those methods which has used in the South Sea of Korea. Spatial scale for comparison of two methods was divided into local and global scales related to the estimation of energy resources amount and site selection. In global scale, the Probability Differences(PD) of calculated ${\Delta}T$ from using both methods were created as spatial distribution maps, and compared areas of PD. In local scale, both methods were compared with not only the results of PD at the region of highest probability but also bimonthly probabilities in the regions of highest and lowest PD. Basically, the strong relationship(pearson r=0.96, ${\alpha}$=0.05) between probabilities of two methods showed the usefulness of both methods. In global scale, the area of PD more than 10% was less than 5% of the whole area, which means both methods can be applied to estimate the amount of OTE resources. However, in practice, HA method was considered as a more pragmatic method due to its capability of calculating under various ${\Delta}T$ conditions. In local scale, there was no significant difference between the high probability areas by both methods, showing difference under 5%. However, while FA could detect the whole range of probability, HA had a disadvantage of inability of detecting probability less than 10%. Therefore it was analyzed that the HA is more suitable to estimate the amount of energy resources, and FA is more suitable to select the site for OTE development.