• Title/Summary/Keyword: Security technologies

Search Result 1,846, Processing Time 0.024 seconds

A Study of the Establishment of Small and Medium Sized Architectural Design Firm BIM Environment based on Virtual Desktop Infrastructure (가상 데스크톱 인프라(VDI) 기술을 활용한 중소규모 설계사의 BIM 사용자 별 데스크탑 자원 할당 전략에 관한 연구)

  • Lee, Kyuhyup;Shin, Joonghwan;Kwon, Soonwook;Park, Jaewoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.17 no.5
    • /
    • pp.78-88
    • /
    • 2016
  • Recently BIM technology has been expanded for using in construction project. However its spread has been delayed than the initial expectations, due to the high-cost of BIM infrastructure development, the lack of regulations, the lack of process and so forth. In design phase, especially, collaboration based on BIM system has being a key factor for successful next generation building project. Through the analysis of current research trend about IT technologies, virtualization and BIM service, data exchange such as drawing, 3D model, object data, properties using cloud computing and virtual server system is defined as a most successful solution. In various industrial fields, cloud computing technology is utilized as a promising solution which can reduce time and cost of hardware infrastructure. Among the cloud computing technology, VDI is receiving a great deal of attention from it market as an essential part cloud computing. VDI enables to host multiple individual virtual machines by using hypervisor. It has an advantage to easy main device management. Therefore, this study implements a step-by-step user's DaaS by analyzing the desktop resource data of the workers from Pre-design phase to Schematic design, Design develop and Construction design phase. It also develops BIM environment based on test of BIM modeler and designers in architectural design firm. The goal of the study is to enable the cloud computing BIM server. It provides cost saving, high-performance quality of working environment and cooperation's convenience and high security when doing BIM work in small and medium sized architectural design firm.

A Key Management Technique Based on Topographic Information Considering IoT Information Errors in Cloud Environment (클라우드 환경에서 IoT 정보 오류를 고려한 지형 정보 기반의 키 관리 기법)

  • Jeong, Yoon-Su;Choi, Jeong-hee
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.233-238
    • /
    • 2020
  • In the cloud environment, IoT devices using sensors and wearable devices are being applied in various environments, and technologies that accurately determine the information generated by IoT devices are being actively studied. However, due to limitations in the IoT environment such as power and security, information generated by IoT devices is very weak, so financial damage and human casualties are increasing. To accurately collect and analyze IoT information, this paper proposes a topographic information-based key management technique that considers IoT information errors. The proposed technique allows IoT layout errors and groups topographic information into groups of dogs in order to secure connectivity of IoT devices in the event of arbitrary deployment of IoT devices in the cloud environment. In particular, each grouped terrain information is assigned random selected keys from the entire key pool, and the key of the terrain information contained in the IoT information and the probability-high key values are secured with the connectivity of the IoT device. In particular, the proposed technique can reduce information errors about IoT devices because the key of IoT terrain information is extracted by seed using probabilistic deep learning.

A Comparative Study on the Compliance Program(CP) of Strategic Export Control System between Korea and Japan (전략물자 수출통제 자율준수제도(CP)에 관한 한.일 비교 연구)

  • Shim, Sang-Ryul;Shao, Dan;Joo, E-Wha
    • International Commerce and Information Review
    • /
    • v.13 no.4
    • /
    • pp.297-321
    • /
    • 2011
  • Under the UN Security Council Resolution 1540/1810 in 2004 to restrict the proliferation of WMD (weapons of mass destruction) and their means of delivery, many countries have taken great efforts to, control the export of strategic items, thereby preventing the transfer of ABCM (atomic, biological, chemical weapons, missiles) and technologies and goods related to conventional weapons or dual-use items, Compliance Program (CP) in Korea or Internal Compliance Program(ICP) in Japan refers to a company's internal system or rules to comply with the export control laws and regulations, and is to prevent the unintentional illegal export of strategic items. This paper analyzes the Compliance Program (CP) of strategic export control system between Korea and Japan. Both countries have very similar legal frameworks under the guiding principles of multilateral export control regimes. However, there are some differences in actual procedures, classification service, supporting system, export license, sanctions for illegal exporters, etc. Korea should take more active and customer-oriented measures to promote the Compliance Program (CP) into Korean export companies for better awareness and positive attitude, practical information and education, smoothy government-firm communication, closer cooperation between Korea and Japan, etc.

  • PDF

Technologies trend for Wireless LAN (무선 LAN 통신망의 기술 동향)

  • Gang, Yeong-Jin;Kim, Sung-Nam;Kang, Sin-Ill;Lee, Yeong-Sil;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.255-258
    • /
    • 2011
  • Wi-Fi is a rapidly spreading communications network with Smart phone's publication, the technology has become Ubiquitous-based core network which is connected to personal computers, laptops, and tablet PC. Wi-Fi can send currently a variety of data standard due to developed wireless LAN communications network. One of Wi-Fi standard protocols, which is IEEE 802.11n, use 2.4GHz and 5GHz band. 2.4GHz band is used for 802.11b/g protocol because wavelength is long, diffraction and receiving distance is enough to connect other device. 5GHz band has more available channels to use than 2.4GHz band, so there is no frequency interference of other wireless device such as Bluetooth, RFID. Moreover, there is low interference between channels due to small users in each bandwidth level. In the thesis, we are going to analyze 802.11a/b/g protocol which has used since the beginning of Wi-Fi protocol and 802.11n protocol which is used lately. Furthermore, we look into development and direction for standardization of the next generation wireless LANs which are 802.11ac and 802.11ad. In addition, we will consider for the security, vulnerabilities and its countermeasure in Wireless LAN.

  • PDF

A Technique to Specify and Generate .NET Components in MDA/PSM for Pervasive Service (MDA/PSM상에서 퍼베이시브 서비스를 지원하는 닷넷 컴포넌트의 명세 및 생성 기법)

  • Kum, Deuk-Kyu;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.7
    • /
    • pp.635-645
    • /
    • 2007
  • Component technology has been widely accepted as an effective way for building software systems with reusable components, and Microsoft (MS) .NET is one of the recent representative component technologies. Model Driven Architecture (MDA) is a new development paradigm which generates software by transforming design models automatically and incrementally. Transformation of structural models in MDA has been successfully applied. However, transformation of dynamic models and pervasive services, such as transaction service, security service, synchronization service and object pooling are largely remains as an area for further research. The recent enterprise system has multi tier distributed architecture, and the functionality of early mentioned pervasive services is essential for this architecture. .NET platform can implement Component Object Model+ (COM+) component for supporting pervasive services by specify Attribute code. In this paper, we specify the functionalities of the COM+ component offering pervasive services, and then those functionalities are defined by UML profile. By using the profile, the Platform Specific Model (PSM) for .NET/C# is specified, and .NET components are automatically generated through our tool. The development productivity, extensibility, portability, and maintenance of software can be dramatically improved by using of the proposed methods.

An Investigation of Users' Privacy Protection Behaviors: Factors Affecting Privacy Protection Technology Adoption (개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.77-94
    • /
    • 2015
  • As Internet has become a popular media for sharing information, users create and share tremendous volume of information including large amount of personal information in cyberspace. Sharing private information online can enhance strength of social relationship but it could also bring negative consequences like information privacy invasion. Although many companies and governments address the importance of information privacy online, there are countless cases of crimes and hackings relating personal information online world wide. Since there are some researches investigating the role of governments and organizations on online privacy domain but there is little research regarding users' privacy protection behaviors. This study investigates relationship between Internet users' information privacy protection behavior and environmental factors. Especially, this study focuses on users' behaviors regarding information privacy protection technology adoption. According to our research results, users' online privacy protective behaviors positively affected by governmental regulations expressed as an information privacy protection law. In addition, if user is allowed to use anonymity when he or she uses online services, they have more tendencies to adopt privacy protection technologies. The detailed research findings and contribution are discussed as well.

The Representative Technology Field Analysis of Domestic Defense Companies in Communication-electronics based on Patent Information Data (특허 자료 정보 기반 국내 통신전자 방산업체 대표 기술 분야 분석)

  • Kim, Jang-Eun;Cho, Yu-Seup
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.446-458
    • /
    • 2017
  • In order to make a decision about the acquisition of command control communication weapon systems considering the client's technology level requirements, the improvement of the domestic technology level and security of core technology, the person in charge can perform technology evaluation/analysis based on command control communication weapon system patent data. As a method of collecting such patent data, we can collect the patent data of government-designated (Defense Acquisition Program Act Article 35) companies (11 Major defense companies/9 General defense companies) through the Korea Intellectual Property Rights Information System (KIPRIS) of the Korean Intellectual Property Office (KIPO) In this way, we collected 1,526 patents and 134 International Patent Classification (IPC) types through the KIPRIS of the KIPO. Based on these data, we performed three types of analysis, General information analysis, Principal Components Analysis (PCA) and Network analysis, and extracted 27, 19 and 13 IPC types from them, respectively. Based on the above three analysis results, we confirmed 8 IPC types (F41A, F41G, G06F, G01S, H04B, H04L, H04M and H04W) as the key technologies and representative technology fields of domestic communication-electronics defense companies.

Memory-Free Skin-Detection Algorithm and Implementation of Hardware Design for Small-Sized Display Device (소형 DISPLAY 장치를 위한 비 메모리 피부 검출 알고리즘 및 HARDWARE 구현)

  • Im, Jeong-Uk;Song, Jin-Gun;Ha, Joo-Young;Kang, Bong-Soon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1456-1464
    • /
    • 2007
  • The research of skin-tone detection has been conducting continuously to enlarge the importance in security, surveillance and administration of the information and 'Password Control System' for using face and skin recognition in airports, harbors and general companies. As well as tile rapid diffusion of the application range in image communications and an electron transaction using wide range of communication network, the importance of the accurate detection of skin color has been augmenting recently. In this paper, it will set up the boundaries of skin colors using the information of Cb and Cr in YCbCr color model of human skin color which is from hundreds compiled portrait images for each race, and suggest a efficient yet simple structure about the skin detection which has been followed by whether the comprehension of the boundaries of skin or not with adaptive skin-range set. With the possibility of the 1D Processes which does not use any memory, it is able to be applied to relatively small-sized hardware and system such as mobile apparatuses. To add the selective mode, it is not only available the improvement of tie skin detection, but also showing the correspondent results about previous face recognition technologies using complicated algorithm.

A Review of Change Detection Techniques using Multi-temporal Synthetic Aperture Radar Images (다중시기 위성 레이더 영상을 활용한 변화탐지 기술 리뷰)

  • Baek, Won-Kyung;Jung, Hyung-Sup
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.5_1
    • /
    • pp.737-750
    • /
    • 2019
  • Information of target changes in inaccessible areas is very important in terms of national security. Fast and accurate change detection of targets is very important to respond quickly. Spaceborne synthetic aperture radar can acquire images with high accuracy regardless of weather conditions and solar altitude. With the recent increase in the number of SAR satellites, it is possible to acquire images with less than one day temporal resolution for the same area. This advantage greatly increases the availability of change detection for inaccessible areas. Commonly available information in satellite SAR is amplitude and phase information, and change detection techniques have been developed based on each technology. Those are amplitude Change Detection (ACD), Coherence Change Detection (CCD). Each algorithm differs in the preprocessing process for accurate automatic classification technique according to the difference of information characteristics and the final detection result of each algorithm. Therefore, by analyzing the academic research trends for ACD and CCD, each technologies can be complemented. The goal of this paper is identifying current issues of SAR change detection techniques by collecting research papers. This study would help to find the prerequisites for SAR change detection and use it to conduct periodic detection research on inaccessible areas.

The Details and Outlook of Three Data Acts Amendment in South Korea: With a Focus on the Changes of Domestic Financial and Data Industry (데이터 3법 개정안의 내용과 전망: 국내 금융 및 데이터 산업계의 변화를 중심으로)

  • Kim, Eun-Chan;Kim, Eun-Young;Lee, Hyo-Chan;Yoo, Byung-Joon
    • Informatization Policy
    • /
    • v.28 no.3
    • /
    • pp.49-72
    • /
    • 2021
  • This study analyzes the major content, significances, and future outlook of Three Data Acts amendment enacted in August 2020 in South Korea, with the focus on their impact on the financial and data industries. It seems that the revision of the Credit Information Act will enable the specification of a business which had previously only been regulated as the business of credit inquiry, and also enable the domestic data industry to activate the MyData industry, data trading and platforms, and specify data pseudonymization and trading procedures. For the rational and efficient implementation of the amendments to the Three Data Acts, the Personal Information Protection Committee must be as transparent and lawful in its activities as possible, and fairness must be guaranteed. Even in the utilization of personal information, the development or complementation of the related data processing technologies is essential, and clear data processing methods and areas must be regulated. Furthermore, the amendments must be supported with guarantees and the systematization of a fair competitive system in the data market, stricter regulations on penalties for illegal acts related to data, establishment and strengthening of the related security systems, and reinforcement of the system of cooperation for data transfer.