• Title/Summary/Keyword: New technologies

Search Result 4,873, Processing Time 0.039 seconds

A Study on Next-Generation Data Protection Based on Non File System for Spreading Smart Factory (스마트팩토리 확산을 위한 비파일시스템(None File System) 기반의 차세대 데이터보호에 관한 연구)

  • Kim, Seungyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.1
    • /
    • pp.176-183
    • /
    • 2021
  • Purpose: The introduction of smart factories that reflect the 4th industrial revolution technologies such as AI, IoT, and VR, has been actively promoted in Korea. However, in order to solve various problems arising from existing file-based operating systems, this research will focus on identifying and verifying non-file system-based data protection technology. Method: The research will measure security storage that cannot be identified or controlled by the operating system. How to activate secure storage based on the input of digital key values. Establish a control unit that provides input and output information based on BIOS activation. Observe non-file-type structure so that mapping behavior using second meta-data can be performed according to the activation of the secure storage. Result: First, the creation of non-file system-based secure storage's data input/output were found to match the hash function value of the sample data with the hash function value of the normal storage and data. Second, the data protection performance experiments in secure storage were compared to the hash function value of the original file with the hash function value of the secure storage after ransomware activity to verify data protection performance against malicious ransomware. Conclusion: Smart factory technology is a nationally promoted technology that is being introduced to the public and this research implemented and experimented on a new concept of data protection technology to protect crucial data within the information system. In order to protect sensitive data, implementation of non-file-type secure storage technology that is non-dependent on file system is highly recommended. This research has proven the security and safety of such technology and verified its purpose.

A Study on Punitive Damages System in Technology Protection Related Laws: Focusing on Patent Act, TSPA, ITPA, FTSA, MBCA (기술보호 관련 법률에서의 징벌적 손해배상제도에 대한 고찰: 특허법, 영업비밀보호법, 산업기술보호법, 하도급법, 상생협력법을 중심으로)

  • Cho, Yongsun
    • Korean small business review
    • /
    • v.42 no.1
    • /
    • pp.19-41
    • /
    • 2020
  • In Korea, punitive damages were introduced in the 2011 Fair Transactions in Subcontracting Act(FTSA), and in 2019 the Patent Act, Trade Secret Protection Act(TSPA), Industrial Technology Protection Act(ITPA), and Mutually Beneficial Cooperation Act(MBCA). In punitive damages, the judgment of 'intentional' is especially important, and it is necessary to refer to US precedents since there is no accumulated case. Major Company can avoid intentional counseling through the advice of lawyers, but SMEs may have to punish punitive damages due to a lack of awareness of the system. In the case of TSPA, ITPA, FTSA, and MBCA, except for Patent Act, the provisions related to proof of damage have not been well maintained yet. Therefore, the data submission order system of these laws needs to be revised to the level of patent Act need to be. TSPA needs to be amended in the future to estimate the amount of the royalties in estimating the amount of damages so that it can receive the 'reasonably' estimated amount rather than the usual amount. On the other hand, ITPA, FTSA, and MBCA do not have any provisions for the estimation of damages. Besides, it is difficult to evaluate the technology value in the case of leakage or deodorization of new technologies. Therefore, valuation needs to be carried out by a credible institution along with the development of a model for calculating damages.

Application of Layer-by-Layer Assembly in Triboelectric Energy Harvesting (마찰대전 기반의 에너지 하베스팅에서 다층박막적층법의 응용)

  • Habtamu Gebeyehu, Menge;Yong Tae, Park
    • Composites Research
    • /
    • v.35 no.6
    • /
    • pp.371-377
    • /
    • 2022
  • Triboelectric nanogenerator (TENG) devices have generated a lot of interest in recent decades. TENG technology, which is one of the technologies for harvesting mechanical energy among the energy wasted in the environment, is obtained by the dual effect of electrostatic induction and triboelectric charging. Recently, a multilayer thin film stacking method (or layer-by-layer (LbL) self-assembly technique) is being considered as a method to improve the performance of TENG and apply it to new fields. This LbL assembly technology can not only improve the performance of TENG and successfully overcome the thickness problem in applications, but also present an inexpensive, environmentally friendly process and be used for large-scale and mass production. In this review, recent studies in the accomplishment of LbL-based materials for TENG devices are reviewed, and the potential for energy harvesting devices reviewed so far is checked. The advantages of the TENG device fabricated by applying the LbL technology are discussed, and finally, the direction and perspective of this fabrication technology for the implementation of various ultra-thin TENGs are briefly presented.

A Study on the Development items of Korean Marine GIS Software Based on S-100 Universal Hydrographic Standard (S-100 표준 기반 해양 GIS 소프트웨어 국산화 개발 방향에 관한 연구)

  • LEE, Sang-Min;CHOI, Tae-Seok;KIM, Jae-Myung;CHOI, Yun-Soo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.25 no.3
    • /
    • pp.17-28
    • /
    • 2022
  • This study is to develop the direction of the development of the next-generation mapping of marine information required to develop a base of the utilization localization of maritime production tools. The GIS data-processing products and technologies currently used in the Korea's marine sector depend on external applications which is renewal costs, technical updates, and unreflected characteristics. Meanwhile, the S-100 standard, the next generation hydrographic data model that complements S-57's problems in marine GIS data processing, was adopted as a new marine data standard. This study aims to present the current status and problems of marine GIS technology in Korea and to suggest the development direction of GIS software based on the next generation hydrogrphic data model S-100 standard of IHO(International Hydrographic Organization). S-100-based marine GIS localization technology development and industrial ecosystem development research is expected to scientific decision-making on policy issues that occur with other countries such as marine territory management and development and use of marine resources.

Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling (STRIDE 위협 모델링 기반 가상 사설망 취약점 분석 및 보안 요구사항 도출)

  • Kim, Da-hyeon;Min, Ji-young;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.27-37
    • /
    • 2022
  • Virtual private network (VPN) services are used in various environments related to national security, such as defense companies and defense-related institutions where digital communication environment technologies are diversified and access to network use is increasing. However, the number of cyber attacks that target vulnerable points of the VPN has annually increased through technological advancement. Thus, this study identified security requirements by performing STRIDE threat modeling to prevent potential and new vulnerable points that can occur in the VPN. STRIDE threat modeling classifies threats into six categories to systematically identify threats. To apply the proposed security requirements, this study analyzed functions of the VPN and formed a data flow diagram in the VPN service process. Then, it collected threats that can take place in the VPN and analyzed the STRIDE threat model based on data of the collected threats. The data flow diagram in the VPN service process, which was established by this study, included 96 STRIDE threats. This study formed a threat scenario to analyze attack routes of the classified threats and derived 30 security requirements for each element of the VPN based on the formed scenario. This study has significance in that it presented a security guideline for enhancing security stability of the VPN used in facilities that require high-level security, such as the Ministry of National Defense (MND).

A Contemplation on Language Fusion Phenomenon of Chinese Neologism Derived from Korean (한국어 차용 중국어 신조어의 언어융합 현상 고찰)

  • JUNG, EUN
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.261-268
    • /
    • 2022
  • No language can be separated from other languages and exist independently. When a language comes in contact with a foreign culture, they continuously affect each other and bring changes. Hallyu boom(Korean wave), which was derived from the emergence of K-drama and K-pop due to rapid developments in global scientific technologies and digitization after the 90's, affected the Chinese language. As a result, neologisms that are derived from the Korean language are being commonly used for making exchanges and becoming social buzzwords. Neologisms derived from Korean reflect the effects and results of language contact between the two languages. We examined the background and cause of Chinese neologisms derived from Korean based on the sociocultural factors and psychological necessity, and explained neologisms by using four categories of transliteration, liberal translation, borrowing Korean-Chinese characters and others. Despite having the issue of being anti-normative during the process of coining new words, neologism enriches Chinese expressions and is a mirror for social culture that reflects the opinions and understandings of young Chinese people who pursue novelty, change, innovation and creativity in linguistic aspects. We hope that it will serve as an opportunity for the young people in Korea and China to change their perceptions and become more friendly by understanding each other's language, culture and by communicating. We also expect to provide assistance in regard to teaching and learning the applications of Korean-Chinese language fusion at Chinese education fields.

Modern Paradigm of Organization of the Management Mechanism by Innovative Development in Higher Education Institutions

  • Kubitsky, Serhii;Domina, Viktoriia;Mykhalchenko, Nataliia;Terenko, Olena;Mironets, Liudmyla;Kanishevska, Lyubov;Marszałek, Lidia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.141-148
    • /
    • 2022
  • The development of the education system and the labor market today requires new conditions for unification and functioning, the introduction of an innovative culture in the field of Education. The construction of modern management of innovative development of a higher education institution requires consideration of the existing theoretical, methodological and practical planes on which its formation is based. The purpose of the article is to substantiate the modern paradigm of organizing the mechanism of managing the innovative development of higher education institutions. Innovation in education is represented not only by the final product of applying novelty in educational and managerial processes in order to qualitatively improve the subject and objects of management and obtain economic, social, scientific, technical, environmental and other effects, but also by the procedure for their constant updating. The classification of innovations in education is presented. Despite the positive developments in the development of Education, numerous problems remain in this area, which is discussed in the article. The concept of innovative development of higher education institutions is described, which defines the prerequisites, goals, principles, tasks and mechanisms of university development for a long-term period and should be based on the following principles: scientific, flexible, efficient and comprehensive. The role of the motivational component of the mechanism of innovative development of higher education institutions is clarified, which allows at the strategic level to create an innovative culture and motivation of innovative activity of each individual, to make a choice of rational directions for solving problems, at the tactical level - to form motives for innovative activity in the most effective directions, at the operational level - to monitor the formation of a system of motives and incentives, to adjust the directions of motivation. The necessity of the functional component of the mechanism, which consists in determining a set of steps and management decisions aimed at achieving certain goals of innovative development of higher education institutions, is proved. The monitoring component of the mechanism is aimed at developing a special system for collecting, processing, storing and distributing information about the stages of development of higher education institutions, prediction based on the objective data on the dynamics and main trends of its development, and elaboration of recommendations.

PV Inverter Operation according to DC Capacitor Aging (직류 커패시터 노후화에 따른 PV 인버터 동작)

  • Yongho Yoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.2
    • /
    • pp.149-155
    • /
    • 2023
  • Photovoltaic power generation is the most familiar power generation facility among new and renewable energies, and its supply began to expand about 10 years ago, and at this point, interest in solutions and technologies for system maintenance management is increasing. In particular, it is necessary to take measures to maximize the overall efficiency of the solar power generation system, whether or not there is an abnormality in the solar power generation system, and when to replace parts. The PV inverter, one element of the photovoltaic power generation system, is a power conversion system that relies on power switching devices, and DC-Link capacitors are used according to the configuration of DC/DC converters and DC-AC inverters. These DC capacitors also affect system safety (Safety) through renewable energy facilities due to the decrease in power generation of PV inverters, power loss, and increase in harmonics (THD, total distortion of AC output current) due to aging and deterioration due to long-term use. factors can be analyzed. Therefore, in this paper, the PV inverter operating characteristics according to the DC capacitor capacity state currently operating in the photovoltaic power generation system were considered, and research contents were proposed to secure the safety and reliability of renewable energy facilities.

A Study on the Smart Elderly Support System in response to the New Virus Disease (신종 바이러스에 대응하는 스마트 고령자지원 시스템의 연구)

  • Myeon-Gyun Cho
    • Journal of Industrial Convergence
    • /
    • v.21 no.1
    • /
    • pp.175-185
    • /
    • 2023
  • Recently, novel viral infections such as COVID-19 have spread and pose a serious public health problem. In particular, these diseases have a fatal effect on the elderly, threatening life and causing serious social and economic losses. Accordingly, applications such as telemedicine, healthcare, and disease prevention using the Internet of Things (IoT) and artificial intelligence (AI) have been introduced in many industries to improve disease detection, monitoring, and quarantine performance. However, since existing technologies are not applied quickly and comprehensively to the sudden emergence of infectious diseases, they have not been able to prevent large-scale infection and the nationwide spread of infectious diseases in society. Therefore, in this paper, we try to predict the spread of infection by collecting various infection information with regional limitations through a virus disease information collector and performing AI analysis and severity matching through an AI broker. Finally, through the Korea Centers for Disease Control and Prevention, danger alerts are issued to the elderly, messages are sent to block the spread, and information on evacuation from infected areas is quickly provided. A realistic elderly support system compares the location information of the elderly with the information of the infected area and provides an intuitive danger area (infected area) avoidance function with an augmented reality-based smartphone application. When the elderly visit an infected area is confirmed, quarantine management services are provided automatically. In the future, the proposed system can be used as a method of preventing a crushing accident due to sudden crowd concentration in advance by identifying the location-based user density.

Machine Learning-based Detection of HTTP DoS Attacks for Cloud Web Applications (머신러닝 기반 클라우드 웹 애플리케이션 HTTP DoS 공격 탐지)

  • Jae Han Cho;Jae Min Park;Tae Hyeop Kim;Seung Wook Lee;Jiyeon Kim
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.66-75
    • /
    • 2023
  • Recently, the number of cloud web applications is increasing owing to the accelerated migration of enterprises and public sector information systems to the cloud. Traditional network attacks on cloud web applications are characterized by Denial of Service (DoS) attacks, which consume network resources with a large number of packets. However, HTTP DoS attacks, which consume application resources, are also increasing recently; as such, developing security technologies to prevent them is necessary. In particular, since low-bandwidth HTTP DoS attacks do not consume network resources, they are difficult to identify using traditional security solutions that monitor network metrics. In this paper, we propose a new detection model for detecting HTTP DoS attacks on cloud web applications by collecting the application metrics of web servers and learning them using machine learning. We collected 18 types of application metrics from an Apache web server and used five machine learning and two deep learning models to train the collected data. Further, we confirmed the superiority of the application metrics-based machine learning model by collecting and training 6 additional network metrics and comparing their performance with the proposed models. Among HTTP DoS attacks, we injected the RUDY and HULK attacks, which are low- and high-bandwidth attacks, respectively. As a result of detecting these two attacks using the proposed model, we found out that the F1 scores of the application metrics-based machine learning model were about 0.3 and 0.1 higher than that of the network metrics-based model, respectively.