• Title/Summary/Keyword: The 4th industrial revolution

Search Result 1,257, Processing Time 0.026 seconds

Study on the scalability of public art in new media -As the center of VR drawing- (뉴미디어 공공미술의 확장성 연구 -VR 드로잉을 중심으로-)

  • Yoon, Hee-Sun;Chung, Jean-Hun
    • Journal of Digital Convergence
    • /
    • v.19 no.12
    • /
    • pp.383-388
    • /
    • 2021
  • Various works of art in a convergent form using new media technology Reflecting the attempted trend, this paper examines the footsteps of public art and Looking at the examples of works using new media art as an expression method of public art works, I suggest vr drawing as a new tool for public media art. The drawing performance using the vr drawing tool and the case of the vr realistic performance scarecrow, The vr drawing tool can infer the possibility of practical application as a new expression method of public art. This study uses a vr drawing tool among new media technologies in the future. It is believed that it will be a prior study that will help prospective creators. In addition, compared to the media status in the era of the 4th industrial revolution, art and If you think and analyze the future value of technology, I think it will be a meaningful study.

AHRS Sensor Data Correction for Improved Immersion in VR (VR의 몰입감 향상을 위한 AHRS 센서 데이터 값 보정)

  • Oh, Am-Suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.11
    • /
    • pp.1413-1420
    • /
    • 2018
  • The VR / AR market has grown significantly due to the development of virtual reality and augmented reality in the core technology field of the 4th Industrial Revolution. Since VR is basically focused on space and time, and the human brain is very sensitive to temporal events, it is important to make accurate I / O interface technology, one of the virtual reality technologies, not to affect the brain's cognitive ability. VR depends on the technology of the hardware such as the display and the sensor for biometric signal recognition. In this paper, in order to prevent the sensitive brain from affecting the sensor device in consideration of hardware dependency of VR, it is necessary to make various corrections to lower the motion to photon (MTP) to 20m / s or less experiments on the method and filtering were carried out.

Global Technical Knowledge Flow Analysis in Intelligent Information Technology : Focusing on South Korea (지능정보기술 분야에서의 글로벌 기술 지식 경쟁력 분석 : 한국을 중심으로)

  • Kwak, Gihyun;Yoon, Jungsub
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.24-38
    • /
    • 2021
  • This study aims to measure Korea's global competitiveness in intelligent information technology, which is the core technology of the 4th industrial revolution. For analysis, we collect patents of each field and prior patents cited by them, which are applied at the U.S. Patent Office (USPTO) between 2010 and 2018 from PATSTAT Online. A global knowledge transfer network was established by grouping citing- and cited-relationships at a national level. The in-degree centrality is used to evaluate technology acceptance, which indicates the process of absorbing existing technological knowledge to create new knowledge in each field. Second, to evaluate the impact of existing technological knowledge on the creation of new one, the out-degree centrality is investigated. Third, we apply the PageRank algorithm to qualitatively and quantitatively investigate the importance of the relationships between countries. As a result, it is confirmed through all the indicators that the AI sector is currently the least competitive.

Research on technical protection measures through risk analysis of pseudonym information for life-cycle (가명정보 Life-Cycle에 대한 위험 분석을 통한 관리적/기술적 보호조치 방안에 대한 연구)

  • Cha, Gun-Sang
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.53-63
    • /
    • 2020
  • In accordance with the revision of the Data 3 Act, such as the Personal Information Protection Act, it is possible to process pseudonym information without the consent of the information subject for statistical creation, scientific research, and preservation of public records, and unlike personal information, it is legal for personal information leakage notification and personal information destruction There are exceptions. It is necessary to revise the pseudonym information in that the standard for the pseudonym processing differs by country and the identification guidelines and anonymization are identified in the guidelines for non-identification of personal information in Korea. In this paper, we focus on the use of personal information in accordance with the 4th Industrial Revolution, examine the concept of pseudonym information for safe use of newly introduced pseudonym information, and generate / use / provide / destroy domestic and foreign non-identification measures standards and pseudonym information. At this stage, through the review of the main contents of the law or the enforcement ordinance (draft), I would like to make suggestions on future management / technical protection measures.

NCS based Leveled Micro-Degree Certification Model for Training Practical Cyber Security Experts

  • Kim, Jeong-Sham;Lee, Kyu-Chang;Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.8
    • /
    • pp.123-133
    • /
    • 2022
  • In this paper, we propose a Leveled Micro-Degree Job Competency Certification Model that considers the level of the job based on the job defined in the NCS. There is a mismatch of manpower due to the problem of university education that cannot keep up with the rapidly changing technological environment caused by the 4th Industrial Revolution. The Nano-Degree and Micro-Degree systems designed to solve this problem are used for job competency certification of cyber security personnel. NCS sub-categorized job field is defined as Micro-Degree and detailed job by ability unit is defined as Nano-Degree, the level of the ability unit defined by level is equally applied to the Micro-Degree. And it is a system that certifies the job competency corresponding to the degree-based university academic background. By applying this system to the curriculum of Cyber Security School, Yeungnam University College, we proposed a method to configure the Nano-Degree course based on NCS duties. The method proposed in this paper can be used as a method for verifying job competency of Nano-Degree and Micro-Degree, which are recently introduced by many universities.

A Study on the Dual Control Platform for Drone Field Training (드론 교육현장 이중화 제어 플랫폼 연구)

  • Ryu, Ukjae;Kim, Yanghoon
    • Journal of Platform Technology
    • /
    • v.10 no.2
    • /
    • pp.20-26
    • /
    • 2022
  • Interest and investment in drones that apply the concept of the 4th industrial revolution and ICT convergence advanced technology are continuing. The purpose of drone operation has been widely spread from the initial military use to the use of various industries such as construction, forestry, facilities, and agricultural support. In these industries, the training of pilots who can actually operate drones is increasing centering on the qualification system. However, the detailed standards including the training place, training place, educational environment, and education method for nurturing pilots are ambiguous, so the education through the oral instruction of the training instructor is continuing at the drone training site. In order to solve this problem, this study conducted a study on a dual control platform in which a training instructor could directly intervene in the pilot's flying drone to execute a map in order to improve the quality of synesthesia, which is essential in the field.

A Study on the Recognition and Development of Skin Care Subjects Using VR (VR 활용 피부미용 교과목 인식과 개발에 관한 연구)

  • Lee, Jung-Hee
    • Journal of the Korean Applied Science and Technology
    • /
    • v.38 no.6
    • /
    • pp.1485-1492
    • /
    • 2021
  • In this study, in order to secure an educational environment for the development of skin beauty subjects using VR based on the learners' awareness of VR, a total of 105 learners' perception of VR, VR experience elements, and the development of VR-using skin beauty subjects, questions about general characteristics were conducted using an online questionnaire. As a result of the survey through frequency analysis, factor analysis, and correlation analysis, the higher the awareness of VR, the higher the educational performance and immersion (p<.01). It was found that awareness and interest were high (p<.001). As for the correlation, the higher the VR-using skin care experience factor, the higher the perception of VR-using skin beauty course development. Therefore, it was confirmed that it is necessary to develop and educate skin beauty subjects using VR in line with learners' expectations and the 4th industrial revolution era. Therefore, in follow-up studies, it is considered that it is necessary to develop and operate VR-based skin beauty subjects.

A Study On Performance Evaluation of Cryptographic Module and Security Functional Requirements of Secure UAV (보안 UAV를 위한 암호모듈의 성능평가와 보안성 평가 방법에 대한 연구)

  • Kim, Yongdae;Kim, Deokjin;Yi, Eunkyoung;Lee, Sangwook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.737-750
    • /
    • 2022
  • The demands of Unmanned Aerial Vehicles (UAVs) are growing very rapidly with the era of the 4th industrial revolution. As the technology of the UAV improved with the development of artificial intelligence and semiconductor technology, it began to be used in various civilian fields such as hobbies, bridge inspections, etc from being used for special purposes such as military use. MAVLink (Macro Air Vehicle Link), which started as an open source project, is the most widely used communication protocol between UAV and ground control station. However, MAVLink does not include any security features such as encryption/decryption mechanism, so it is vulnerable to various security threats. Therefore, in this study, the block cipher is implemented in UAV to ensure confidentiality, and the results of the encryption and decryption performance evaluation in the UAV according to various implementation methods are analyzed. In addition, we proposed the security requirements in accordance with Common Criteria, which is an international recognized ISO standard.

A Study on Cathodic Protection Rectifier Control of City Gas Pipes using Deep Learning (딥러닝을 활용한 도시가스배관의 전기방식(Cathodic Protection) 정류기 제어에 관한 연구)

  • Hyung-Min Lee;Gun-Tek Lim;Guy-Sun Cho
    • Journal of the Korean Institute of Gas
    • /
    • v.27 no.2
    • /
    • pp.49-56
    • /
    • 2023
  • As AI (Artificial Intelligence)-related technologies are highly developed due to the 4th industrial revolution, cases of applying AI in various fields are increasing. The main reason is that there are practical limits to direct processing and analysis of exponentially increasing data as information and communication technology develops, and the risk of human error can be reduced by applying new technologies. In this study, after collecting the data received from the 'remote potential measurement terminal (T/B, Test Box)' and the output of the 'remote rectifier' at that time, AI was trained. AI learning data was obtained through data augmentation through regression analysis of the initially collected data, and the learning model applied the value-based Q-Learning model among deep reinforcement learning (DRL) algorithms. did The AI that has completed data learning is put into the actual city gas supply area, and based on the received remote T/B data, it is verified that the AI responds appropriately, and through this, AI can be used as a suitable means for electricity management in the future. want to verify.

Analysis of Determinants Influencing User Satisfaction for Augmented Reality(AR) Camera Application: Focusing on Naver's Service (증강현실 기반 카메라 애플리케이션 서비스 만족도 영향 요인들에 대한 고찰: 네이버 <스노우> 서비스를 중심으로)

  • Lee, Sungjoon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.7
    • /
    • pp.417-428
    • /
    • 2020
  • Augmented reality(AR) service as one of the representative technologies in the era of the 4th industrial revolution has gotten people's increasing attention. At this time, this study aimed to examine the determinants affecting service satisfaction of the AR-based camera application service by focusing on Naver's service. Several factors that might have influences on satisfaction of the AR-based camera application service were conceived based on the previous literature. And it was tested whether they had influences on satisfaction of the AR-based camera application service or not empirically. The responses of a sample of 312 people who had experienced using Naver's service were collected by means of an online survey and they were analyzed employing a hierarchical regression analysis. The results of this research indicated that gender as one of demographic variable, perceived interactivity, aesthetic value, trend following motivation as an extrinsic motivation and playfulness as an intrinsic motivation have significant influences on the service satisfaction of the AR-based camera application service. The results in this study have meanings since they can be used as references for AR service providers to develop more satisfactory AR services.