• Title/Summary/Keyword: information and communication technology (ICT)

Search Result 963, Processing Time 0.03 seconds

Implementation of Video Signal Delivery Protocols for the Camera Device via the Internet (인터넷을 통한 카메라 디바이스의 영상신호 전달 프로토콜 구현)

  • Lee, Ji-Hoon;Chung, Hae;Baek, Bong-Ki;Jo, Young-Rae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.5
    • /
    • pp.691-700
    • /
    • 2021
  • The IP cameras have rapidly replaced the analog CCTVs as the cameras have the advantages of not only being able to remotely monitor, but also supplying power through the UTP cable, In this paper, we introduce the protocol architecture of the ONVIF standard which is widely applied to the IP camera and other Internet protocols to support it, and implement the ONVIF Device on a commercial board. Although these functions can be controlled by the Client (PC), several functions such as privacy masks, temperature display of the thermal camera, and ROI (Region of Interest) are implemented through a web viewer on the device. Through the experiment, the functions of ONVIF Profile S and web viewer are verified through SOAP messages exchanged between Device (IP camera) and Client program and streamed images.

A Method and Application of Vulnerability Analysis for Combat Systems Considering Threats and Defense Ability : Focused on PKM Model (위협의 특성과 장갑의 방호 성능을 고려한 전투 시스템의 취약성 분석 방법 및 활용 : 고속정 모델을 대상으로)

  • Hwang, Hun-Gyu;Kim, Bae-Sung;Kang, Ji-Won;Lee, Jang-Se
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1623-1631
    • /
    • 2016
  • There are many researches which analyze vulnerability for combat systems, have been progressing, and apply the analyzed result to reflect on design phase. Recently, there have been requirements for integrating the previous module based researches which conducted independently. In this paper, we propose an integrated vulnerability analysis method for the combat system considering characteristics of threats and protection performance of armors through an analysis of the advanced research. In addition, by applying the proposed method improves the existing hit probability analysis program and we are verified based on scenarios for improving survivability of PKM (Petrol Killer Medium) for vulnerability analysis confirmed the results. The proposed method improves reliability of vulnerability analysis by considering threats and defense ability. Also it able to satisfied with the integration requirements. Furthermore, we became buildup for the development of applied system and the method and integrated vulnerability analysis method for combat systems.

A Study on the Introductioin of Data Trusts System to Expand the Rights of Privacy Self-Determination (개인정보 자기결정권 확대를 위한 데이터 신탁제도 도입 방안 연구)

  • Jang, Keunjae;Lee, Seungyong
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.29-43
    • /
    • 2022
  • With the advent of the Internet and the development of mobile digital devices such as smartphones and tablet PCs, the communication service paradigm began to shift from existing voice services to data services. Recently, as social network services (SNS) are activated and 4th industrial revolution technologies centered on ICT (Information and Communication Technologies) such as Big Data, Blockchain, Cloud, and 5G/6G are rapidly developed, the amount of shared data type and the amount of data are increasing rapidly. As the transition to a digital society begins actively, the importance of using data information, as well as the economic and social values of personal information are becoming increasingly important. As a result, they are actively discussing policies to revitalize the data information industry around the world and ways to efficiently obtain, analyze, and utilize increasingly diverse and vast data, as well as to protect/guarantee the rights of information subjects (providers) in various fields such as society, culture, economy, and politics.. In this paper, in order to improve the self-determination right of personal information on data produced by information subjects, and further expand the use of safe data and the data economy, a differentiated data trusts system was considered and suggested. In addition, the components and data trusts procedures necessary to efficiently operate the data trusts system in Korea were considered, and the non-profit data trusts system and the for-profit data trusts system were considered as a way to flexibly operate the data trusts system. Furthermore, the legal items necessary for the implementation of the data trusts system were investigated and considered. In this paper, in order to propose a domestic data trusts system, cases related to existing data trusts systems such as the United States, Japan, and Korea were reviewed and analyzed. In addition, in order to prepare legislation necessary for the data trusts system, data-related laws in major countries and domestic legal and policy trends were reviewed to study the rights that conflict or overlap with existing laws, and differences were investigated and considered. The Data trusts system proposed in this paper is a reasonable system that is expected to recognize the asset value of data in the capitalist market economy system, to provide legitimate compensation for data produced by data subjects, and further to contribute greatly to the use of safe data and creation of a new service market.

A Study on the Digital Era's Influential Factors on Policy Organizations (디지털시대의 정책조직에 미치는 영향요인에 관한 연구)

  • Lee, Sang-Bum
    • Journal of Digital Convergence
    • /
    • v.6 no.2
    • /
    • pp.33-40
    • /
    • 2008
  • Alvin Toffler는 인류 발전 과정을 세 가지 변화의 물결, 즉 유목 채집 사회에서 농경 사회로의 변화, 산업혁명에 의한 농경 사회에서 산업 사회로의 변화, 그리고 1950년대부터의 후기 산업화 사회로의 변혁으로, 산업 사회에서 정보 사회로의 변혁이 일어나기 시작했으며 탈대량화, 다양화, 지식기반 생산과 변화의 가속이 시작된 시기였다. Herman Maynard와 Susan Mehrtens는 ICT (Information Communication Technology: 휴대폰 등), 인터넷의 발달로 제4의 물결이 시작되고 있다고 주장한다. 이전의 사회 변혁들은 물질 생산이 따르는 가시적인 변혁들이었으나, 디지털 혁명은 시민사회의 참여 확대를 통한 민주주의의 진화된 형태를 가능하게 하고 있다. 지금 우리가 경험하고 있는 제4의 물결의 시작은, 시민사회의 정책 참여와 견제가 효과적이고 효율적으로 이루어지기 시작하는 초고도 정보화 사회의 시작을 의미하며, 정책 결정 자들은 정책 결정 과정에서 그들이 보유하던 절대 영향력의 일부분을 시민사회에 이양됨을 막을 수 없을 것이다. 이러한 대변혁의 시대에 관료주의, Digital Divide, 그리고 시민 참여와의 상관관계를 이해하는 것은 매우 중요하다. 본 논문에서는 시민 참여에 대한 관료주의의 방침과 태도, 제4의 물결의 정책 민주화와 Digital Divide로의 영향 분석을 통하여 정책 결정 자들과 그들의 환경으로의 파급 효과를 논증한다. 본 연구는 이러한 분석과 논증을 통하여, 정책조직들과 시민사회와의 신세기의 바람직한 동반자적 입지 구축에 기여 할 것이다.

  • PDF

Introduction of International Standard Test Scenario of the SCADA System with CIM using IEC 61970 (IEC 61970 CIM 기반 SCADA 시스템 표준시험 시나리오)

  • Jang, B.T.;Lee, Y.J.;Lee, N.H.;Han, J.Y.;Kim, S.K.;Choi, J.K.;An, Y.H.
    • Proceedings of the KIEE Conference
    • /
    • 2015.07a
    • /
    • pp.573-574
    • /
    • 2015
  • 스마트그리드 전력계통시스템 기술의 중요한 특징중의 하나는 국제표준을 기본으로 탑재하고 있다. 발전소부터 수용가까지 각 영역별로 운영중인 시스템들이 국제표준을 준수한다는 것은 어떤 특정임무만을 담당하는 독립된 시스템이 아닌 타 시스템에 정보를 주고 받는 분산시스템의 구조로 전력시스템 전체 아키텍쳐가 변화하고 있는 것이다. 이러한 환경은 ICT(Information & Communication Technology)와 매우 친화적이며 스마트그리드의 발전을 촉진시킨다. 전력회사마다 운영중인 송변전자동화시스템인 SCADA(Supervisory Control And Data Acquisition)에 대하여 IEC 61970 표준을 지원하는 기능을 갖춘 제품들이 세계시장에 급속히 공급되고 있어 표준을 기반으로 하는 이기종 제품간에 정보교환의 호환성을 검증하는 상호운용성 시험의 중요성이 커지고 있는 실정이다. 본 논문에서는 IEC 61970이 적용된 SCADA 시스템을 대상으로 표준기반의 상호운용성 시험에 대해 기술하고자 한다.

  • PDF

Intelligent Emergency Alarm System based on Multimedia IoT for Smart City

  • Kim, Shin;Yoon, Kyoungro
    • Journal of the Semiconductor & Display Technology
    • /
    • v.18 no.3
    • /
    • pp.122-126
    • /
    • 2019
  • These-days technology related to IoT (Internet of Thing) is widely used and there are many types of smart system based IoT like smart health, smart building and so on. In smart health system, it is possible to check someone's health by analyzing data from wearable IoT device like smart watch. Smart building system aims to collect data from sensor such as humidity, temperature, human counter like that and control the building for energy efficiency, security, safety and so forth. Furthermore, smart city system can comprise several smart systems like smart building, smart health, smart mobility, smart energy and etc. In this paper, we propose multimedia IoT based intelligent emergency alarm system for smart city. In existing IoT based smart system, it communicates lightweight data like text data. In the past, due to network's limitations lightweight IoT protocol was proposed for communicating data between things but now network technology develops, problem which is to communicate heavy data is solving. The proposed system obtains video from IP cameras/CCTVs, analyses the video by exploiting AI algorithm for detecting emergencies and prevents them which cause damage or death. If emergency is detected, the proposed system sends warning message that emergency may occur to people or agencies. We built prototype of the intelligent emergency alarm system based on MQTT and assured that the system detected dangerous situation and sent alarm messages. From the test results, it is expected that the system can prevent damages of people, nature and save human life from emergency.

Implementation of a Helmet Azimuth Tracking System in the Vehicle (이동체 내의 헬멧 방위각 추적 시스템 구현)

  • Lee, Ji-Hoon;Chung, Hae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.4
    • /
    • pp.529-535
    • /
    • 2020
  • It is important to secure the driver's external field view in armored vehicles surrounded by iron armor for preparation for the enemy's firepower. For this purpose, a 360 degree rotatable surveillance camera is mounted on the vehicle. In this case, the key idea is to recognize the head of the driver wearing a helmet so that the external camera rotated in exactly the same direction. In this paper, we introduce a method that uses a MEMS-based AHRS sensor and a illuminance sensor to compensate for the disadvantages of the existing optical method and implements it with low cost. The key idea is to set the direction of the camera by using the difference between the Euler angles detected by two sensors mounted on the camera and the helmet, and to adjust the direction with illuminance sensor from time to time to remove the drift error of sensors. The implemented prototype will show the camera's direction matches exactly in driver's one.

Mutual Authenticate Protocol among Sensor for Network Centric Warfare (네트워크 중심전을 위한 센서간의 상호인증기법)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwnag-Bin
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.25-30
    • /
    • 2012
  • As the network composed of numerous sensor nodes, sensor network conducts the function of sensing the surrounding information by sensor and of the sensed information. Our military has also developed ICT(Information and Communication Technology) along with the methods for effective war by sharing smooth information of battlefield resources through network with each object. In this paper, a sensor network is clustered in advance and a cluster header (CH) is elected for clusters. Before deployment, a certificate is provided between the BS and the sensor nodes, and after clustering, authentication is done between the BS and the sensor nodes. Moreover, inter-CH authentication technique is used to allow active response to destruction or replacement of sensor nodes. Also, because authentication is done twice, higher level of security can be provided.

Developing A Policy Framework for Smartwork : Task, Technology, People, Organization and Management (스마트워크 정책 프레임워크에 관한 연구)

  • Lee, Hyejung;Lee, Jungwoo
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.145-164
    • /
    • 2012
  • With the development of Information Communication Technology (ICT), diverse work policies, such as, telework, telecommuting, flexible work had been conceptualized and implemented to encourage efficient business practices and worker satisfaction. These work policies are the forerunners of newly emerging concept of "Smart Work." However, as smart work is a new concept, no single agreeable definition can be found. In this study, the relevant literatures published in past 15 years are reviewed systematically in order to derive a conceptual framework for "Smart Work," from related research, such as telecommuting, flexible time, telework, etc. Related variables are grouped into five clusters: Task, Technology, People, Organization Structure and Managerial Levers, forming a policy and research framework. Further research are suggested after the discussion of implications.

Big Data Model for Analyzing Plant Growth Environment Informations and Biometric Informations (농작물 생육환경정보와 생체정보 분석을 위한 빅데이터 모델)

  • Lee, JongYeol;Moon, ChangBae;Kim, ByeongMan
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.6
    • /
    • pp.15-23
    • /
    • 2020
  • While research activities in the agricultural field for climate change are being actively carried out, smart agriculture using information and communication technology has become a new trend in line with the Fourth Industrial Revolution. Accordingly, research is being conducted to identify and respond to signs of abnormal growth in advance by monitoring the stress of crops in various outdoor environments and soil conditions. There are also attempts to analyze data collected in real time through various sensors using artificial intelligence techniques or big data technologies. In this paper, we propose a big data model that is effective in analyzing the growth environment informations and biometric information of crops by using the existing relational database for big data analysis. The performance of the model was measured by the response time to a query according to the amount of data. As a result, it was confirmed that there is a maximum time reduction effect of 23.8%.