• Title/Summary/Keyword: next generation information system

Search Result 900, Processing Time 0.036 seconds

The method for the development of digital-ship (디지털 선박의 구현방안)

  • 박종원;임용곤;전동욱;배진호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.745-748
    • /
    • 2001
  • Digital-ship is the next-generation ship with an one-man bridge system which consists of INS(Intelligent Navigation System), AIS(Automatic Identification System), and IMIT(Integrated Maritime Information Technology). INS implements the functions is related of the ship's navigation, and supports in the digital GIS environments optimal route planning, stranding and a collision avoidance among the ship, an economic navigation, and an integrated control of ship's engine. AIS prevents the ship's collision by means of transmitting periodically the own ship's information to the other ship or the shore control center. IMIT systems supports the integrated fiat-form in ships, the communication between a ship and a control center of the land using the INMARSAT, OrbComm, Ocean Observation Satellite, and etc. The satellite communication in ships can monitor the ship at an earth control renter. This paper deals with the method for system implementation of digital-ship and the detailed sub-system.

  • PDF

Information Security Management System on Cloud Computing Service (클라우드 컴퓨팅 서비스에 관한 정보보호관리체계)

  • Shin, Kyoung-A;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.155-167
    • /
    • 2012
  • Cloud computing service is a next generation IT service which has pay-per-use billing model and supports elastically provisioning IT infra according to user demand. However it has many potential threats originating from outsourcing/supporting service structure that customers 'outsource' their own data and provider 'supports' infra, platform, application services, the complexity of applied technology, resource sharing and compliance with a law, etc. In activation of Cloud service, we need objective assessment standard to ensure safety and reliability which is one of the biggest obstacles to adopt cloud service. So far information security management system has been used as a security standard for a security management and IT operation within an organization. As for Cloud computing service it needs new security management and assessment different from those of the existing in-house IT environment. In this paper, to make a Information Security Management System considering cloud characteristics key components from threat management system are drawn and all control domain of existing information security management system as a control components are included. Especially we designed service security management to support service usage in an on-line self service environment and service contract and business status.

Proposed measure for Smart Grid's Personal Information Security Issue (스마트 그리드 개인정보 보안이슈 방안 제시)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.4
    • /
    • pp.41-49
    • /
    • 2016
  • Smart Grid is a next generation of new power growth electrical grid which provide high quality of electrical service by using Information Technologies to increase intelligence and performance. By using Smart Grid system, it can support energy management such as increase quality of electrical power, decrease energy and decrease emissions. However, Smart Grid uses information of energy consumption and when Smart Grid collects information, it will create private information. In this thesis, it will address issues of security private information which caused by Smart Grid for administrative measure and efficiency of Smart Grid in domestic. Also, cryptographic module algorithm, latest security solutions and strong wireless security policy for network environment such as wireless communication Iinternet are require for Smart Grid perform successfully and protect national power network equipment from cyber-attack and can stop leakage of user's personal information. Finally, it is urgent to prepare protection measures of National industrial facilities and power grid which can prepare for a cyber terrorism and penetration attacks and build emergency countermeasure management team for Smart Grid are require for safe Smart Grid environment.

Gateway design and performance evaluation based on health information standards in multi-platform environment (멀티플랫폼 환경에서 의료정보표준 기반 게이트웨이 설계 및 성능 평가)

  • Shim, Woo-Ho;Na, Hyun-Suk;Park, Seok-Cheon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.33-40
    • /
    • 2012
  • Recently, to enhance the quality and efficiency of health care services, smart health care services utilizing a smart phone and tablet pc are mainly being introduced into the large hospital and the interest for personal health record service which manages personal medical information utilizing PC and smart phone and technology development is actively underway. In order to build a next generation hospital information systems, the interoperability of data between the different hospital information systems and UX consistency between the various user devices must be assured. Therefore, in this paper, medical information standard and the study for improving the performance is conducted to design the gateway system which converting and integrating the medical information under multi-platform environment. In this paper, CCR standard is adapted to the mapping method between the data which is the key feature of the gateway system and design the system utilizing multi-table-based mapping method. To evaluate the performance of the system, experiment was done and the result has been improved approximately 20 percent for response rate.

Designing and Realizing the Ground Station Receiver Low Noise Amplifier of the Next-Generation Aeronautical Surveillance System (차세대 항공 감시시스템(ADS-BES) 지상국 수신기 저잡음 증폭기 설계 및 구현)

  • Cho, Ju-Yong;Yoon, Jun-Chul;Park, Chan-Sub;Park, Hyo-Dal;Kang, Suk-Youb
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2273-2280
    • /
    • 2013
  • This article introduces the next-generation air surveillance system and investigates how to design of front-end low noise amplifier of the ground station receiver. In consideration of the international standard documentation and the performance of existing products, the study conducts the link budget on the entire system so that it can be competitive in terms of receive sensitivity or reliability. To obtain a proper low noise amplifier, standards of design are decided so that such factors as gain, gain flatness, and reflective loss can be optimal. In its design, the bias circuit appropriate for the characteristics of low power, low noise, or high gain was built, and according to the results of the simulation conducted after the optimal design, its gain was 16.24dB, noise factor was 0.36dB, input-output reflective loss was -18dB and -28dB each, and frequency stability was 1.11. According to the results measured after the design, its gain was 17dB, noise factor was 0.51dB, gain flatness was 0.23dB, and input-output reflective loss was -18.28dB and -24.50dB each, so the results gained were suitable for building the overall system.

An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages

  • Yang, Haomiao;Kim, Hyunsung;Li, Hongwei;Yoon, Eunjun;Wang, Xiaofen;Ding, Xuefeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.10
    • /
    • pp.2544-2560
    • /
    • 2013
  • As a cornerstone of the next generation air traffic management (ATM), automatic dependent surveillance-broadcast (ADS-B) system can provide continual broadcast of aircraft position, identity, velocity and other messages over unencrypted data links to generate a common situational awareness picture for ATM. However, since ADS-B messages are unauthenticated, it is easy to insert fake aircrafts into the system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, we propose an efficient broadcast authentication scheme with batch verification for ADS-B messages which employs an identity-based signature (IBS). Security analysis indicates that our scheme can achieve integrity and authenticity of ADS-B messages, batch verification, and resilience to key leakage. Performance evaluation demonstrates that our scheme is computationally efficient for the typical avionics devices with limited resources, and it has low communication overhead well suitable for low-bandwidth ADS-B data link.

Design and Implementation of BADA-IV/XML Query Processor Supporting Efficient Structure Querying (효율적 구조 질의를 지원하는 바다-IV/XML 질의처리기의 설계 및 구현)

  • 이명철;김상균;손덕주;김명준;이규철
    • The Journal of Information Technology and Database
    • /
    • v.7 no.2
    • /
    • pp.17-32
    • /
    • 2000
  • As XML emerging as the Internet electronic document language standard of the next generation, the number of XML documents which contain vast amount of Information is increasing substantially through the transformation of existing documents to XML documents or the appearance of new XML documents. Consequently, XML document retrieval system becomes extremely essential for searching through a large quantity of XML documents that are storied in and managed by DBMS. In this paper we describe the design and implementation of BADA-IV/XML query processor that supports content-based, structure-based and attribute-based retrieval. We design XML query language based upon XQL (XML Query Language) of W3C and tightly-coupled with OQL (a query language for object-oriented database). XML document is stored and maintained in BADA-IV, which is an object-oriented database management system developed by ETRI (Electronics and Telecommunications Research Institute) The storage data model is based on DOM (Document Object Model), therefore the retrieval of XML documents is executed basically using DOM tree traversal. We improve the search performance using Node ID which represents node's hierarchy information in an XML document. Assuming that DOW tree is a complete k-ary tree, we show that Node ID technique is superior to DOM tree traversal from the viewpoint of node fetch counts.

  • PDF

Development of Next Generation Sonar by Acoustic Lens (음향렌즈를 이용한 차세대 소나개발)

  • Choi, Jo-Cheon;Kim, Sang-Hoon;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.12
    • /
    • pp.1318-1322
    • /
    • 2014
  • We develop new sonar system by way of acoustic focusing which is totally different from conventional one in principle. It focuses input wave on the opposite edge of the lens without aberration perfectly. Then, the motion of acoustic source is read by naked eyes. It can be used as an acoustic window deep underwater by converting sound into light. We introduce the sonar in actual size that can be used underwater and report current situation of the development.

A Study on the OAI based Open Digital Library (OAI 기반 Open Digital Library 연구)

  • Lee, Sang-Gi
    • Journal of Information Management
    • /
    • v.35 no.3
    • /
    • pp.139-159
    • /
    • 2004
  • Digital library technology is facing issues such as interoperability, content extension, and the need for a more efficient management environment. A system that is based on standardization and interoperability is required to resolve these issues. Open Digital Library is the system for the next generation that resolves the above problems. We have conducted some research on issues such as OAI and OAI-PMH, which are the basic knowledge behind the Open Digital Library technology and also investigated the Open Digital Library framework, cases of study and implementation of this technology. Finally, we have made some suggestions on the extendability of Open Digital Library technology using the standardized technologies.

LDPC-LDPC Product Code Using Modified Log-likelihood Ratio for Holographic Storage System (홀로그래픽 저장장치를 위한 수정된 로그-유사도비를 이용한 LDPC-LDPC 곱부호)

  • Jeong, Seongkwon;Lee, Jaejin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.6
    • /
    • pp.17-21
    • /
    • 2017
  • Since holographic data storage has the advantage of high recording density and data transfer rate, it is a candidate for the next generation storage systems. However, Holographic data storage system is affected by interpage interference and two dimensional intersymbol interference. Also, burst error occurs by physical impact. In this paper, we propose an LDPC product code using modified log-likelihood ratio and extrinsic information to correct burst error and improve performance of holographic data storage. The performance of proposed LDPC product code is 0.5dB better than that of the conventional LDPC code.