• Title/Summary/Keyword: Technical Services

Search Result 1,129, Processing Time 0.029 seconds

Near Realtime Packet Classification & Handling Mechanism for Visualized Security Management in Cloud Environments (클라우드 환경에서 보안 가시성 확보를 위한 자동화된 패킷 분류 및 처리기법)

  • Ahn, Myong-ho;Ryoo, Mi-hyeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.331-337
    • /
    • 2014
  • Paradigm shift to cloud computing has increased the importance of security. Even though public cloud computing providers such as Amazon, already provides security related service like firewall and identity management services, it is not suitable to protect data in cloud environments. Because in public cloud computing environments do not allow to use client's own security solution nor equipments. In this environments, user are supposed to do something to enhance security by their hands, so the needs of visualized security management arises. To implement visualized security management, developing near realtime data handling & packet classification mechanisms are crucial. The key technical challenges in packet classification is how to classify packet in the manner of unsupervised way without human interactions. To achieve the goal, this paper presents automated packet classification mechanism based on naive-bayesian and packet Chunking techniques, which can identify signature and does machine learning by itself without human intervention.

  • PDF

The Analysis of Research Trends in Technology to the Fourth Industrial Revolution using SNA (소셜 네트워크 분석을 이용한 4차 산업혁명 기술 분야의 연구 동향 분석)

  • Kim, Hong-Gwang;Ahn, Jong-Wook
    • Journal of Cadastre & Land InformatiX
    • /
    • v.49 no.1
    • /
    • pp.113-121
    • /
    • 2019
  • The fourth industrial revolution technology focused on the fusion of infrastructure and various advanced technologies related city. Therefore, technical cooperation in various fields of research is essential. In order to activating the fourth industrial revolution technologies, it is necessary to research the state of technology in various fields. Consequently, this paper aims to analysis of domestic and foreign research trends on technology to the fourth industrial revolution using SNA and text mining for web site. We collected text, date data of research paper and report in web site for five years, that is, from January 1st in 2014 to December 31st in 2018. Next, we have deduced the major keywords in public data through analyzing the morphemes. Then we have analyzed the core and related keyword lists through an SNA. In Korea, the focus is on R&D and legal/institutional solution in relation to the fourth industrial revolution technology. On the other hand, in the case of foreign, there was focus on practical technologies for urban services in detail aspects.

Improvement of Satellite Ocean Information Service for Offshore Marine Industry (연근해 해양산업을 위한 위성해양 정보 서비스 개선방안)

  • Cho, Bo-Hyun;Lee, Gun-Wook;Kim, Dong-Chun;Yang, Keum-Cheol;Kim, SG;Yo, Seung-jae
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.85-91
    • /
    • 2018
  • In this study, we design a marine environmental information service system with satellite images based on satellite images to reduce the damage caused by changes in the marine environment. The system provides satellite oceanographic information such as water temperature, chlorophyll, float, etc. as hierarchical texts, which is implemented as a unit module Web service so that it can be expanded in OpenAPI environment. And stability of system plug-in portability, service hours, data extraction precision and speed are used as a basis for diagnosing service stability. By securing the function and performance of the service system implemented in this study, it can be expanded to a complex technology that can customize the users by group by adding not only general services of existing systems operated by location but also information about a specific interested areas. Especially, various other items of interest including marine environment information are developed in modules, so we expect to be able to expand and service the system by plugging into the system and to spread it in technical linkage with the related institution information system.

  • PDF

How is the Social Problem-Solving R&D Done? (사회문제 해결형 연구개발은 어떻게 수행되는가?)

  • Song, Wichin;Seong, Ji-Eun
    • Journal of Science and Technology Studies
    • /
    • v.18 no.3
    • /
    • pp.255-289
    • /
    • 2018
  • The social problem-solving R&D is different from the goal and process in comparison with research aimed at scientific excellence and industrial innovation. It pursues social values and active participation of the end-user civil society. In this study, we try to derive its characteristics by analyzing the cases that are evaluated as successful social problem solving R&D project. In order to analyse the social problem-solving R & D case, these four variables are selected; 1) social and technological planning for problem solving 2) participatory technological development 3) law, system and delivery system development for innovation deployment 4) scale-up of new R&D process. Those are important issues identified through case studies: 1) the tools and support services needed to carry out social and technical planning effectively, 2) the role of the Living Lab to coordinate opinions with experts and users, 3) the legislative and institutional improvement activities as important as technological development, 4) researcher's change through interaction with end user.

Case Study: Record Management & Maintenance System Implementation with Architectural Drawings on GIS Platform (GIS 플렛폼을 활용한 건축도면 및 자료 유지관리시스템 적용 사례연구 - 미국 버지니아주 리치몬드시청 건축도면 및 자료 유지관리시스템 사례연구 -)

  • Chong, K. Chul;Sho, Kwang-Ho
    • Journal of the Architectural Institute of Korea Structure & Construction
    • /
    • v.36 no.1
    • /
    • pp.163-172
    • /
    • 2020
  • This study is a case study for in-house developed Record Maintenance and Management (RMMS) which is a digital data storage/retrieval system in a GIS-enabled solution. RMMS is designed for reorganizing submitted architectural drawings associated with scanned drawings files & geodatabase, managing metadata/table and geometric features in ArcSDE/Enterprise geodatabase format. The birth of the RMMS was borne out of a necessity for a modernized approach in digital file basis to provide improved customer services for various architectural drawings and associated with geo-spatial and its attribute information. Through a case study for building permit & review practice implemented on an internet-based Electronic Architectural administration Information System (EAIS) at the local governments in Korea, this study is able to derive differences between GIS-enabled RMMS system implemented in the Richmond City and internet-based EAIS system implemented in the local government in Korea. In an effort to be the most effective, it presents meaningful ways of maximizing efficiency in record maintenance & management system derived from the case studies that looked into in ways of a method in RMMS' operation, implementation on GIS platform, mutual interface among various programs with various digital files and finally technical supports and system development /upgrade.

Portable system module for wireless based on mountain climbing safety using 447 MHz band FSK (447MHz 대역 FSK방식을 이용한 무선 통신 기반 산행 안전을 위한 휴대 시스템)

  • Lim, Jae Don;Kim, Jung Jip;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1428-1433
    • /
    • 2019
  • Interest in mountain accidents among the technical trends of disasters in Korea is increasing continuously. When accidents occur, the most common methods are location tracking and accident reporting using smartphones, and rescue activities are being carried out by using them. In this paper, we proposed an improvement of wireless safety system for mountain climbing safety using 447 FSK. Using the 447 MHz band transmitter / receiver, it accumulates position coordinates and data through position transmission and rescue signal transmission in case of anomalies. If a sender is out of the threshold of the set area range, a danger warning notification can be generated to quickly exit the danger zone. Provide services. In addition, it is considered that the health condition of the sender is continuously checked and the receiver is warned when the specified threshold is exceeded, so that it is possible to respond to the sender's disaster.

The Verification Method for Missing Software Standardization in Weapon System - Focused on Firmware (무기체계 소프트웨어 규격화 누락여부 검증 방안 - 펌웨어 중심으로)

  • Song, Chi-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.310-315
    • /
    • 2021
  • In the case of weapon systems used by the military, defense standards are applied for economical and efficient procurement, management, and maintenance. Defense specifications are documents describing procedures and methods for determining whether technical requirements for products and services are consistent and apply to the production of weapon systems, quality assurance, and configuration management. Software is also subject to defense specifications, and is documented and managed in the same way as other defense specifications. Sometimes it happened to be standardized without some(or all) software. In this case, a competitive contract is impossible and it may affect the quality of weapon systems because the manufacturer arbitrarily changes the software without prior approval. So, software standardization is required, but it is very difficult to verify for firmware installed in hardware. This paper proposed a verification method for g software standardization, and we expect it will contribute to the efficient production and quality assurance of weapon systems.

A Study on the Automated Payment System for Artificial Intelligence-Based Product Recognition in the Age of Contactless Services

  • Kim, Heeyoung;Hong, Hotak;Ryu, Gihwan;Kim, Dongmin
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.100-105
    • /
    • 2021
  • Contactless service is rapidly emerging as a new growth strategy due to consumers who are reluctant to the face-to-face situation in the global pandemic of coronavirus disease 2019 (COVID-19), and various technologies are being developed to support the fast-growing contactless service market. In particular, the restaurant industry is one of the most desperate industrial fields requiring technologies for contactless service, and the representative technical case should be a kiosk, which has the advantage of reducing labor costs for the restaurant owners and provides psychological relaxation and satisfaction to the customer. In this paper, we propose a solution to the restaurant's store operation through the unmanned kiosk using a state-of-the-art artificial intelligence (AI) technology of image recognition. Especially, for the products that do not have barcodes in bakeries, fresh foods (fruits, vegetables, etc.), and autonomous restaurants on highways, which cause increased labor costs and many hassles, our proposed system should be very useful. The proposed system recognizes products without barcodes on the ground of image-based AI algorithm technology and makes automatic payments. To test the proposed system feasibility, we established an AI vision system using a commercial camera and conducted an image recognition test by training object detection AI models using donut images. The proposed system has a self-learning system with mismatched information in operation. The self-learning AI technology allows us to upgrade the recognition performance continuously. We proposed a fully automated payment system with AI vision technology and showed system feasibility by the performance test. The system realizes contactless service for self-checkout in the restaurant business area and improves the cost-saving in managing human resources.

A Study for the Effect of Medical Service Failure and Recovery on Medical Tourist Trust and Behavioral Intention -Focused on Japanese Medical Tourist- (의료서비스 실패와 회복 후 만족이 신뢰와 행동의도에 미치는 영향 - 일본인 의료 관광객을 중심으로 -)

  • Cho, Young-Shin
    • International Area Studies Review
    • /
    • v.13 no.2
    • /
    • pp.687-711
    • /
    • 2009
  • This research was conducted to explore the factors that cause medical tourists' dissatisfaction, and find ways to solve the tourists' problems by researching on the relationship between the service recovery and the failure of medical services. Also, the research has put more emphasis on establishing marketing strategies that enable Japanese medical tourists to actively visit Korea, and finding out the effects that the medical tourists satisfaction and trust have on their behavioral intentions, recommendations, and positive feedbacks. The summary of the research analysis results as follows. First, the service recovery after the service failure has positive influences on the medical tourist's satisfaction. Second, the service recovery has proven its positive influences on the tourists' trusts and behavioral intentions. Third, the satisfaction of the service recovery has built the mutual trust between the tourists' and the medical center, and this has positive influences on the customer's behavioral intentions. Finally, the research was conducted to analyze the moderating effects on the relationship between the service recovery and the recovery satisfaction. It was found that the medical service failure recognition type has proven no moderating effects.

A Digital Nominative Proxy Signature Scheme for Mobile Communication (이동 통신에서 적용 가능한 수신자 지정 대리 서명 방식)

  • 박희운;이임영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.2
    • /
    • pp.27-35
    • /
    • 2001
  • Based on the development of mobile communication, the future mobile communication systems are expected to provide higher quality of multimedia services for users than today\`s systems. Therefore, many technical factors are needed in this systems. Especially the secrecy and the safety would be obtained through the introduction of the security for mobile communication. In this paper, we presents a digital nominative proxy signature scheme that processes a user\`s digital signature and encryption using the proxy-agent who has more computational power than origins in mobile communication. The proposed scheme provides non-repudiation and prevents creating illegal signature by the origin and proxy-agent in a phase of proxy signature processing. Also this scheme satisfies the confidentiality and safety in the mobile communication through a confirming signature by the right receiver.