• Title/Summary/Keyword: SW Development

Search Result 639, Processing Time 0.025 seconds

Risk Factors Identification and Priority Analysis of Bigdata Project (빅데이터 프로젝트의 위험요인 식별과 우선순위 분석)

  • Kim, Seung-Hee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.25-40
    • /
    • 2019
  • Many companies are executing big data analysis and utilization projects to legitimize the development of new business areas or conversion of management or technical strategies. In Korea and abroad, however, such projects are failing because they are not completed within specified deadlines, which is not unrelated to the current situation in which the knowledge base for big data project risk management from an engineering perspective is grossly lacking. As such, the current study analyzes the risk factors of big data implementation and utilization projects, in addition to finding risk factors that are highly important. To achieve this end, the study extracts project risk factors via literature review, after which they are grouped using affinity methodology and sifted through expert surveys. The deduced risk factors are structuralize using factor analysis to develop a table that categorizes various types of big data project risk factors. The current study is significant that in it provides a basis for developing basic control indicators related to risk identification, risk assessment, and risk analysis. The findings from the study contribute greatly to the success of big data projects, by providing theoretical basis regarding efficient big data project risk management.

The Improvement Plan for Personal Information Protection for Artificial Intelligence(AI) Service in South Korea (우리나라의 인공지능(AI)서비스를 위한 개인정보보호 개선방안)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.3
    • /
    • pp.20-33
    • /
    • 2021
  • This study is to suggest improvements of personal information protection in South Korea, according to requiring the safety of process and protection of personal information. Accordingly, based on data collection and analysis through literature research, this study derived the issues and suitable standards of personal information for major artificial intelligence services. In addition, this cases studies were reviewed, focusing on the legal compliance and porcessing compliance for personal information proection in major countries. And it suggested the improvement plan applied in South Korea. As the results, in legal compliance, it is required reorganization of related laws, responsibility and compliance to develop and provide AI, and operation of risk management for personal information protection laws in AI services. In terms of processing compliance, first, in pre-processing and refining, it is necessary to standardize data set reference models, control data set quality, and voluntarily label AI applications. Second, in development and utilization of algorithm, it is need to establish and apply a clear regulation of the algorithm. As such, South Korea should apply suitable improvement tasks for personal information protection of safe AI service.

A Study of Cyber Operation COP based on Multi-layered Visualization (멀티레이어드 시각화를 적용한 사이버작전 상황도 개발에 관한 연구)

  • Kwon, Koohyung;Kauh, Jang-hyuk;Kim, Sonyong;Kim, Jonghwa;Lee, Jaeyeon;Oh, Haengrok
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.143-151
    • /
    • 2020
  • The cyber battlefield called the fifth battlefield, is not based on geological information unlike the existing traditional battlefiels in the land, sea, air and space, and has a characteristics that all information has tightly coupled correlation to be anlayized. Because the cyber battlefield has created by the network connection of computers located on the physical battlefield, it is not completely seperated from the geolocational information but it has dependency on network topology and software's vulnerabilities. Therefore, the analysis for cyber battlefield should be provided in a form that can recognize information from multiple domains at a glance, rather than a single geographical or logical aspect. In this paper, we describe a study on the development of the cyber operation COP(Common Operational Picture), which is essential for command and control in the cyber warfare. In particular, we propose an architecure for cyber operation COP to intuitively display information based on visualization techniques applying the multi-layering concept from multiple domains that need to be correlated such as cyber assets, threats, and missions. With this proposed cyber operation COP with multi-layered visualization that helps to describe correlated information among cyber factors, we expect the commanders actually perfcrm cyber command and control in the very complex and unclear cyber battlefield.

A study on machine learning-based defense system proposal through web shell collection and analysis (웹쉘 수집 및 분석을 통한 머신러닝기반 방어시스템 제안 연구)

  • Kim, Ki-hwan;Shin, Yong-tae
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.87-94
    • /
    • 2022
  • Recently, with the development of information and communication infrastructure, the number of Internet access devices is rapidly increasing. Smartphones, laptops, computers, and even IoT devices are receiving information and communication services through Internet access. Since most of the device operating environment consists of web (WEB), it is vulnerable to web cyber attacks using web shells. When the web shell is uploaded to the web server, it is confirmed that the attack frequency is high because the control of the web server can be easily performed. As the damage caused by the web shell occurs a lot, each company is responding to attacks with various security devices such as intrusion prevention systems, firewalls, and web firewalls. In this case, it is difficult to detect, and in order to prevent and cope with web shell attacks due to these characteristics, it is difficult to respond only with the existing system and security software. Therefore, it is an automated defense system through the collection and analysis of web shells based on artificial intelligence machine learning that can cope with new cyber attacks such as detecting unknown web shells in advance by using artificial intelligence machine learning and deep learning techniques in existing security software. We would like to propose about. The machine learning-based web shell defense system model proposed in this paper quickly collects, analyzes, and detects malicious web shells, one of the cyberattacks on the web environment. I think it will be very helpful in designing and building a security system.

A Study on the Design of KVMF 2.0 Protocol for Ensuring Backward/Forward Compatibility between Different KVMF Message Standard Versions

  • Jeong-Min, Lee;Won-Gi, Lim;Won-Jun, Cho;Yong-Cheol, Kim;Jeung-Sub, Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.3
    • /
    • pp.45-58
    • /
    • 2023
  • KVMF(Korean Variable Message Format) 1.0 protocol is the Army's standard tactical datalink protocol that defines standard messages and communication methods to enable data communication between various weapon systems through bitwise variable message processing. The protocol has been applied to a variety of Army weapon systems over the past decade and has contributed to upgrade the Army's operational capabilities by enabling the implementation of Network Centric Warfare (NCW), the core of modern warfare. Since the KVMF 1.0 protocol was applied, new weapon systems with new technologies have been introduced over time, and new weapon systems have new messages based on the characteristics of the weapon system. As a result, compatibility problems arose due to different message versions with existing weapon systems, and it was expected that these problems would continue to emerge in the future, considering the need for continuous message revisions. Therefore, it became necessary to solve this problem, so this paper proposed a KVMF 2.0 protocol design that guarantees compatibility between forward and backward versions. In this paper, we implemented the design as SW, and confirmed that the design worked successfully by test between forward and backward versions on test environment. Therefore, when the KVMF 2.0 protocol design is applied to a weapon system, we can expect that the weapon system can be compatible with the forward and backward versions working with the existing weapon systems as well as with the future weapon systems.

Kinematic Interpretation for the Development of the Yeonghae Basin, Located at the Northeastern Part of the Yangsan Fault, Korea

  • Altaher, Zooelnon Abdelwahed;Park, Kiwoong;Kim, Young-Seog
    • The Journal of Engineering Geology
    • /
    • v.32 no.4
    • /
    • pp.467-482
    • /
    • 2022
  • The Yeonghae basin is located at the northeastern part of the Yangsan fault (YSF; a potentially active fault). The study of the architecture of the Yeonghae basin is important to understand the activity of the Yangsan fault system (YSFS) as well as the basin formation mechanism and the activity of the YSFS. For this study, Digital Elevation Model (DEM) was used to highlight the marginal faults, and structural fieldwork was performed to understand the geometry of the intra-basinal structures and the nature of the bounding faults. DEM analysis reveals that the eastern margin is bounded by the northern extension of the YSF whereas the western margin is bounded by two curvilinear sub-parallel faults; Baekseokri fault (BSF) and Gakri fault (GF). The field data indicate that the YSF is striking in the N-S direction, steeply dipping to the east, and experienced both sinistral and dextral strike-slip movements. Both the BSF and GF are characterized dominantly by an oblique right-lateral strike-slip movement. The stress indicators show that the maximum horizontal compressional stress was in NNE to NE and NNW-SSE, which is consistent with right-lateral and left-lateral movements of the YSFS, respectively. The plotted structural data show that the NE-SW is the predominant direction of the structural elements. This indicates that the basin and marginal faults are mainly controlled by the right-lateral strike-slip movements of the YSFS. Based on the structural architecture of the Yeonghae basin, the study area represents a contractional zone rather than an extensional zone in the present time. We proposed two models to explain the opening and developing mechanism of the Yeonghae basin. The first model is that the basin developed as an extensional pull-apart basin during the left-lateral movement of the YSF, which has been reactivated by tectonic inversion. In the second model, the basin was developed as an extensional zone at a dilational quadrant of an old tip zone of the northern segment of the YSF during the right-lateral movement stage. Later on, the basin has undergone a shortening stage due to the closing of the East Sea. The second model is supported by the major trend of the collected structural data, indicating predominant right-lateral movement. This study enables us to classify the Yeonghae basin as an inverted strike-slip basin. Moreover, two opposite strike-slip movement senses along the eastern marginal fault indicate multiple deformation stages along the Yangsan fault system developed along the eastern margin of the Korean peninsula.

Development of Digital and AI Teaching-learning Strategies Based on Computational Thinking for Enhancing Digital Literacy and AI Literacy of Elementary School Student (초등학생의 디지털·AI 리터러시 함양을 위한 컴퓨팅 사고력 기반 교수·학습 전략 개발)

  • Ji-Yeon Hong;Yungsik Kim
    • Journal of The Korean Association of Information Education
    • /
    • v.26 no.5
    • /
    • pp.341-352
    • /
    • 2022
  • The wave of a knowledge and information society led by AI, Big Data, and so on is having an all-round impact on our way of life. Therefore the Ministry of Education is in a hurry to strengthen Digital Literacy, including AI and SW Education, by improving the curriculum that can cultivate basic knowledge and capabilities to respond to changes in the future society. It can be seen that establishing a foundation for cultivating Digital Literacy through all subjects and improving basic and in-depth learning in new technology fields such as AI linked to the information curriculum is an essential part for future society. However, research on each content for cultivating Digital and AI literacy is relatively active, while research on teaching and learning strategies is insufficient. Therefore in this study, a CT-based Digital and AI teaching and learning strategy that can foster that was developed and Delphi expert verification was conducted, and the final teaching and learning strategy was completed after evaluating instructor usability and analyzing learner effectiveness.

An analysis of students' online class preference depending on the gender and levels of school using Apriori Algorithm (Apriori 알고리즘을 활용한 학습자의 성별과 학교급에 따른 온라인 수업 유형 선호도 분석)

  • Kim, Jinhee;Hwang, Doohee;Lee, Sang-Soog
    • Journal of Digital Convergence
    • /
    • v.20 no.1
    • /
    • pp.33-39
    • /
    • 2022
  • This study aims to investigate the online class preference depending on students' gender and school level. To achieve this aim, the study conducted a survey on 4,803 elementary, middle, and high school students in 17 regions nationwide. The valid data of 4,524 were then analyzed using the Apriori algorithm to discern the associated patterns of the online class preference corresponding to their gender and school level. As a result, a total of 16 rules, including 7 from elementary school students, 4 from middle school students, and 5 from high school students were derived. To be specific, elementary school male students preferred software-based classes whereas elementary female students preferred maker-based classes. In the case of middle school, both male and female students preferred virtual experience-based classes. On the other hand, high school students had a higher preference for subject-specific lecture-based classes. The study findings can serve as empirical evidence for explaining the needs of online classes perceived by K-12 students. In addition, this study can be used as basic research to present and suggest areas of improvement for diversifying online classes. Future studies can further conduct in-depth analysis on the development of various online class activities and models, the design of online class platforms, and the female students' career motivation in the field of science and technology.

Tephrostratigraphy and Paleoenvironments of Marine Core in the Kita-Yamato Trough, East Sea/Japan Sea (동해 키타-야마토 해곡에서 채취된 시추코아의 테프라층서와 고환경)

  • Chun Jong-Hwa;Cheong Daekyo;Han Sang-Joon;Huh Sik;Yoo Hai-Soo
    • Economic and Environmental Geology
    • /
    • v.39 no.1 s.176
    • /
    • pp.83-93
    • /
    • 2006
  • The Kita-Yamato Trough is characterized by a SW-NE trending narrow graben between the Yamato Bank and the Kita-Yamato Bank in the central East Sea/Japan Sea (ES/JS). Core 20EEZ-1 was obtained in the flat summit of a small ridge from the southwest Kita-Yamato Trough. The sedimentation was mainly controlled by the supply of hemipelgic sediments and substantial tephras from explosive volcanic eruptions of the Quaternary volcanoes. The aim of this study is to reconstruct the tephrostratigraphy from the marine sediments collected from the Kita-Yamato Trough and to provide the atmosphere and ocean conditions during the explosive volcanic eruptions. According to the detailed tephrostratigraphy and lithofacies records, the core sediments were deposited during the last marine isotope stage (MIS) 7. The core consists of four lithofacies, idetified as, oxidized mud (OM), crudely laminated mud (CLM) and bioturbated mud (BM), interbedded with coarse-grained tephra (TP). The major element geochemistry and stratigraphic positions of seven tephra layers suggest that they originated from the Aira caldera in Kyushu area among the Japanese islands (AT tephra; 29.24 ka), unknown submarine volcano in the south Korea Plateau (SKP-I; MIS 3, SKP-II; MIS 4, SKP-IV; boundary between MIS 6 and MIS 5e, SKP-V; MIS 6, respectively), and the Baegdusan volcano in the Korean Peninsula (B-KY1; ca. 130 ka, B-KY2; ca. 196 ka). The absence of tephras originated trom Ulleung Island in core 20EEZ-l suggest that the tephras had not been transported into the Kita-Yamato Trough by atmosphere conditions during the eruptions. On the other hand, the B-KYI and the B-KY2 tephras derived from the Baegdusan volcano were founded in the Kita-Yamato Trough by a presence of prevailing westerly winds during the eruptions. Furthermore, the SKP tephras were characterized by the transport across the air-water interface, causing quickly thrust of raising eruption plumes from subaqueous explosive eruptions. Surface currents may play an important role in controlling the distribution patterns of the SKP tephras to distal areas. The tephrostratigraphic study in the Kita-Yamato Trough provides the important chronostratigraphic marker horizons and the detailed atmosphere and ocean conditions during the explosive eruptions.

An Empirical Study on Classification, Business Type, Organizational Culture on Performance of Korean IT SMEs·Venture (중소·벤처기업의 업종, 영업형태, 조직문화가 기업성과에 미치는 영향에 관한 연구: 삼원분산분석(3-way ANOVA)을 중심으로)

  • Roh, Doo-Hwan;Hwang, Kyung-Ho
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.14 no.2
    • /
    • pp.221-233
    • /
    • 2019
  • In Korea, small and medium sized domestic enterprises(SMEs) play an pivotal role in the national economy, accounting for 99.9% of all enterprises, 87.9% of total employment, and 48.3% of production. and SMEs was driving a real force of the development of national economy in many respects such as innovation, job creation, industrial diversity, balanced regional development. Despite their crucial role in the national development, most of SMEs suffer from a lack of R&D capabilities and equipments as well as funding capacity. Public R&D institutes can provide SMEs with valuable supplementary technological knowledge and help them build technological capacity. so, In order to effectively support SMEs, government and public R&D institutes must be a priority to know about the factors influencing the performance related to technology transfer and technological collaborations. In particular, SMEs are not only taking up a large portion of the national economy, but also their influence in politics and economy so strong that raising the competitiveness of small and medium-sized companies is a national policy goal that must be achieved in order to achieve sustained economic growth. For this reason, it is necessary to look specifically at the relationship between concepts such as the environment, strategy, and organizational culture surrounding the enterprise to enhance the competitiveness of SMEs. The paper analyzes 665 companies to find out which organizational culture affects their performance by classification and type of business of SMEs. This study demonstrated that when SMEs seek consistency in their external environment, strategies, and organizational structure to maintain their continued competitiveness. According to three-way analysis of variance (3-way ANOVA) indicates that classification of industries in SMEs has statistically significant main effects, but the type of business and organizational culture do not have significant effects. However, the company's organizational performance (operating profit) of SMES were found to differ significantly in comparison between groups according to classification standards of industries, and therefore adopted some parts. In addition, an analysis of the effect of interaction between the three independent variables of small and medium-sized enterprises has shown that there are statistically significant interaction effects among classification, types of business, and organizational cultures. The results shows that there is an organizational culture suitable for each industry classification and type of business of an entity, and is expected to be used as a basis for establishing promotion policies related to the incubation and commerciality of small and medium-sized venture companies in the future.