• Title/Summary/Keyword: accelerating convergence

Search Result 124, Processing Time 0.034 seconds

A Study on Patent Dispute Countermeasures of Chinese Companies (중국 기업의 특허분쟁 대응 방안에 대한 연구)

  • Park, Eun-Mi;Shim, Yun-Soo;Seo, Joung-Hae
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.1
    • /
    • pp.102-108
    • /
    • 2021
  • In this research, we would like to understand the measures to be taken in the event of a patent dispute by Chinese companies that are growing rapidly and competing with Korean companies in the global market, at a time when the fusion and compounding technology are accelerating. For this reason, the patent dispute countermeasures shown in the previous research were derived through deep interviews with experts, and a questionnaire survey was conducted with patent practitioners of Chinese companies. As a result of the analysis, the importance of cross licensing, patent invalidation proceedings, proceedings through collaboration with other companies, royalty payments, and patent invalidation proceedings in the case of a patent dispute in the Chinese industry is high. Shown. The results of this study provide practical guidelines to help corporate patent practitioners understand the best course of action in the event of a patent dispute, respond in a timely manner, and save time and money. It seems that it can be done.

Comparative Analysis of Cyber Attacks of Korea Government and Policy Countermeasures (한국의 사이버공격 비교 분석과 정책적 대응방안)

  • Kwon, Hyeokchun;Lee, Youngjun;Park, Wonhyung
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.19-26
    • /
    • 2020
  • The purpose of this paper is to ccompare and analyze North Korean cyber attacks and our responses by government, from the Roh Moo-hyun administration to the Moon Jae-in administration. The current conflict of interests on the Korean peninsula, such as the United States, China, and Russia, is leading to a conflict for the leadership of a new world order in cyberspace. Cyber attacks are accelerating and threats are rising. Cyber threats exhibit several characteristics. Above all, it is difficult to identify or track the subject of the threat. Also, with the development of information and communication technology, attack technology has become more intelligent, and it is not easy to prepare a means to respond. Therefore, it is necessary to improve continuous and preemptive response capacity for national cybersecurity, and to establish governance among various actors, such as international cooperation between countries or private experts.

Consortium Blockchain and Machine Learning Design for Efficient Government fund expenditure in Untact Era (Untact 시대의 효율적인 정부자금 지출을 위한 Consortium Blockchain과 Machine Learning 설계)

  • Oh, Rag-seong;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.2
    • /
    • pp.178-186
    • /
    • 2021
  • COVID-19 occurred in China in December 2019 and spread to the world. Untact culture becoming commonplace due to the spread of COVID-19, is accelerating digital transformation across society. The government is increasing government fund to overcome national crisis situations such as COVID-19. In order to efficiently execute these government funds, the government and policy financial institutions need to come up with two measures. One is to establish a transparent government fund execution process, and the other is to secure the objectivity of the review process. In this paper, to solve this problem, we designed the execution process of government funds from the government to end users with Consortium Blockchain, and designed a machine learning algorithm for internal review of policy financial institutions. The research data proposed in this paper will be helpful in setting the future government policy direction for government fund execution.

The Effectiveness of Collaborative Learning in SW Education based on Metaverse Platform (메타버스 기반 협력적 소통 SW 교육 프로그램의 효과)

  • Son, Jungmyoung;Lee, Sihoon;Han, Jeonghye
    • Journal of The Korean Association of Information Education
    • /
    • v.26 no.1
    • /
    • pp.11-22
    • /
    • 2022
  • The educational environment, where the change to blended learning and AI convergence education through non-face-to-face is accelerating, is based on the cultivation of digital literacy. This study attempted to verify the effectiveness of future competencies by creating a collaborative SW education program on the metaverse platform that emerged by supplementing the problems through non-face-to-face. Twenty programs on how to design and create software were organized for small-scale elementary classes in the metaverse. In order to verify the effectiveness 4C competency tool presented as future educational competency was selected, and homogeneity test for the experimental group and t-test were conducted. The results showed the SW education programs based on metaverse was effective in improving collaborative communication skills, confirming the possibility of SW education through blended learning.

A Study on the Application of Security Reinforcement Technology Reflecting Zero Trust Principles (제로 트러스트 원리를 반영한 보안 강화 요소 기술 적용 방안 연구)

  • DA-IN Lee;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.3-11
    • /
    • 2022
  • With increasingly sophisticated cyber threats, accelerating cloud adoption, and the adoption of remote and hybrid work environments due to the COVID-19 pandemic, the traditional security model, in which many businesses implicitly trust everything within their boundaries, is changing without boundaries, allowing data and users The concept of zero trust is getting more and more attention as the fact that it is not suitable for today's increasingly decentralized environment has been highlighted. Zero Trust is a cyber security model on the premise that 'no one trusts'. In principle, there is no safe area or user in the entire system, and internal users are also verified. is a way As telecommuting becomes commonplace due to the COVID-19 pandemic, and existing cyber security measures are facing limitations, Zero Trust technology is drawing more attention. Accordingly, it is expected that the Korean government will also check the status of acceptability of the domestic public and private sectors and tasks that need improvement when introducing Zero Trust with reference to the NIST standard. In this paper, the basic principles, philosophy, and considerations of Zero Trust and Zero Trust are explained, and practical basic measures to strengthen security by combining Zero Trust technology are presented.

The Strategies for Exploring Various Regions and Recognizing Local Minimum of Particle Swarm Optimization (PSO의 다양한 영역 탐색과 지역적 미니멈 인식을 위한 전략)

  • Lee, Young-Ah;Kim, Tack-Hun;Yang, Sung-Bong
    • The KIPS Transactions:PartB
    • /
    • v.16B no.4
    • /
    • pp.319-326
    • /
    • 2009
  • PSO(Particle Swarm Optimization) is an optimization algorithm in which simple particles search an optimal solution using shared information acquired through their own experiences. PSO applications are so numerous and diverse. Lots of researches have been made mainly on the parameter settings, topology, particle's movement in order to achieve fast convergence to proper regions of search space for optimization. In standard PSO, since each particle uses only information of its and best neighbor, swarm does not explore diverse regions and intended to premature to local optima. In this paper, we propose a new particle's movement strategy in order to explore diverse regions of search space. The strategy is that each particle moves according to relative weights of several better neighbors. The strategy of exploring diverse regions is effective and produces less local optimizations and accelerating of the optimization speed and higher success rates than standard PSO. Also, in order to raise success rates, we propose a strategy for checking whether swarm falls into local optimum. The new PSO algorithm with these two strategies shows the improvement in the search speed and success rate in the test of benchmark functions.

Trend Analysis of IoT Technology Using Open Source (오픈소스를 이용한 IoT 기술의 동향 분석)

  • Kwon, Yong-Kwang;Kim, Sun-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.65-72
    • /
    • 2020
  • The Internet of Things(IoT) is to build a hyper-connected society through interconnection, and on this basis, to improve the quality of life and productivity, including solving social problems, and to become the next growth engine for the nation. The open common eco-system pursued by the IoT can start with the under- standing of the word 'open'. The IoT can achieve the expected effect of lowering the barriers to entry of technology development, and in these changes, OSSW and OSHW play a very important role in accelerating IoT eco-system maturity and breaking the boundaries between industries to promote convergence. Recently, it has developed into an intelligent IoT that combines artificial intelligence (AI) with the connectivity of the IoT. Here, I will analyze the direction of development of the IoT through understanding and analysis of open source.

Policy Implications of Global Governance through Public Diplomacy Activities (공공외교활동을 통해 본 글로벌거버넌스의 정책적 함의)

  • Kim, Young Mi
    • Journal of Digital Convergence
    • /
    • v.18 no.5
    • /
    • pp.139-144
    • /
    • 2020
  • While networks of many countries around the world are actively connected with the establishment of ICT-based infrastructure, diplomatic activities are also evolving into various diplomatic forms that are different from traditional diplomacy before. In particular, in the process, public diplomacy activities that focus on subjects other than the government and new diplomatic areas are accelerating. This study identifies the current state of public diplomacy that has emerged as a representative type of new diplomatic style and derives policy implications for the revitalization of global governance. The analysis was attempted based on data generated mainly on the main contents of various diplomatic activities by each entity, and the future direction of public diplomacy was sought. In particular, the subject of diplomacy is becoming more diverse, and most of all, various activities are being carried out based on the world stage due to changes in diplomatic means. Most of all, they understood that all the people are playing the role of private diplomacy, and that the roles and capabilities of local governments are becoming stronger. Global governance needs to be built to revitalize public diplomacy, and support policies need to be continued by expanding the role of public diplomacy and various topics.

Stakeholder's Expectations in the National Space Exploration Enterprise (우리나라 우주개발사업에서 이해당사자(Stakeholder)의 기대조건)

  • Lee, Chang-Jin
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.39 no.11
    • /
    • pp.1077-1085
    • /
    • 2011
  • Various stakeholder's expectations and constraints are to be efficiently resolved into a program consensus prior to the beginning of its substantial design processes. This study focuses on the analysis of the stakeholder's expectations in determining the design requirements at the initial stage of space exploration programs including Naro launcher and currently on-going KSLV-II program. Naro program seems to unilaterally account for the government expectations of accelerating program phase speed without making any efforts to converge various expectations from related sectors. The planning of Naro launcher is also found lack of the concept of operations (ConOps), which is of critical importance by envisaging the operational applications of end products. Similarities are found in KSLV-II program regarding the lack of implementation for stakeholder's expectations. Moreover, the government plan for KSLV-II disclosed without considering all expectations and other comments. The increase in design conflicts and program uncertainties would be unavoidable, if the government plan for KSLV-II would be insisted. It is required to modify the government plan and to establish the ConOps with the convergence of stakeholder's expectations at this early stage of the program.

A Study on Scalable Bluetooth Network for Secure Ubiquitous Environment (안전한 유비쿼터스 환경을 위한 확장성 있는 블루투스 네트워크에 관한 연구)

  • Baek, Jang-Mi;Seo, Dae-Hee
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.159-170
    • /
    • 2008
  • The ubiquitous network revolution is beginning with the onset of digital convergence, whereby computers, horne appliances, and communications and broadcast media are being unified into digital media with the founding of the information super high speed. This technical advancement is creating a new culture and a new space and accelerating society's transition to the new and unique social paradigm of a 'ubiquitous society'. In particular, studies on ubiquitous communications are well underway. Lately, the focus has been on the Bluetooth technology due to its applicability in various environments. Applying Bluetooth connectivity to new environments such as ubiquitous or sensor networks requires finding new ways of using it. Thus, the scalable Bluetooth piconet scheme with independent slave device is proposed. It follows from work by Sea et al. But extended scatternet is not considered is Kiisc05 paper. Therefore, we propose secure bridge connection scheme for scalable Bluetooth scatternet.

  • PDF