• Title/Summary/Keyword: performance of ICT technology

Search Result 398, Processing Time 0.028 seconds

A Study on Policy Making for e-Navigation from the Viewpoint of a Maritime Digital Communication Network (e-Navigation을 위한 해상디지털통신 구축에 관한 정책 연구)

  • Lim, Hyuntaek;Cho, Yong-Gab
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.6
    • /
    • pp.679-685
    • /
    • 2018
  • In order to reduce marine accidents using advanced information and communication technology, various research and development projects are conducted globally on e-Navigation related technologies and services. Existing studies do not provide policy measures for LTE-M. In order for these technologies and services to be installed on vessels and to contribute to the prevention of accidents at sea, the law should be expand operational organizations and systems. In particular, communication equipment and related technical standards should be prepared, and its digital communication technology (LTE-M, VDES, Digital-MF / HF, etc.) In this study, we conducted short, medium, and long term performance assessment of the identification system and the policy for effective implementation of Korean e-Navigation. We presented a visible plan of the relevant policy. For example, e-Navigation core services, e-Navigation communication networks and operating systems, e-Navigation international standard leading technologies and e-navigation services activated in the field. To do this, we conducted research based on the progress data of the Korean e-Navigation project, which was led by the Ministry of Maritime Affairs and Fisheries, and conducted research discussions with practitioners and experts in related fields. As a result of this study, it is expected that the proposed policies will contribute to the reduction of marine accidents, the promotion of the maritime industry and the development of additional government policies for national security.

Approaches to Applying Social Network Analysis to the Army's Information Sharing System: A Case Study (육군 정보공유체계에 사회관계망 분석을 적용하기 위한방안: 사례 연구)

  • GunWoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.597-603
    • /
    • 2023
  • The paradigm of military operations has evolved from platform-centric warfare to network-centric warfare and further to information-centric warfare, driven by advancements in information technology. In recent years, with the development of cutting-edge technologies such as big data, artificial intelligence, and the Internet of Things (IoT), military operations are transitioning towards knowledge-centric warfare (KCW), based on artificial intelligence. Consequently, the military places significant emphasis on integrating advanced information and communication technologies (ICT) to establish reliable C4I (Command, Control, Communication, Computer, Intelligence) systems. This research emphasizes the need to apply data mining techniques to analyze and evaluate various aspects of C4I systems, including enhancing combat capabilities, optimizing utilization in network-based environments, efficiently distributing information flow, facilitating smooth communication, and effectively implementing knowledge sharing. Data mining serves as a fundamental technology in modern big data analysis, and this study utilizes it to analyze real-world cases and propose practical strategies to maximize the efficiency of military command and control systems. The research outcomes are expected to provide valuable insights into the performance of C4I systems and reinforce knowledge-centric warfare in contemporary military operations.

Implementation of the Large-scale Data Signature System Using Hash Tree Replication Approach (해시 트리 기반의 대규모 데이터 서명 시스템 구현)

  • Park, Seung Kyu
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.19-31
    • /
    • 2018
  • As the ICT technologies advance, the unprecedently large amount of digital data is created, transferred, stored, and utilized in every industry. With the data scale extension and the applying technologies advancement, the new services emerging from the use of large scale data make our living more convenient and useful. But the cybercrimes such as data forgery and/or change of data generation time are also increasing. For the data security against the cybercrimes, the technology for data integrity and the time verification are necessary. Today, public key based signature technology is the most commonly used. But a lot of costly system resources and the additional infra to manage the certificates and keys for using it make it impractical to use in the large-scale data environment. In this research, a new and far less system resources consuming signature technology for large scale data, based on the Hash Function and Merkle tree, is introduced. An improved method for processing the distributed hash trees is also suggested to mitigate the disruptions by server failures. The prototype system was implemented, and its performance was evaluated. The results show that the technology can be effectively used in a variety of areas like cloud computing, IoT, big data, fin-tech, etc., which produce a large-scale data.

  • PDF

Analysis of Wireless Network Technology for High Reliability Aircraft Networks (고 신뢰성 항공기 무선 네트워크 동향 및 기술 분석)

  • Ahn, Seung-Pyo;Kim, Da-Hye;Lee, Jae-Min;Kim, Dong-Seong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.12
    • /
    • pp.1933-1941
    • /
    • 2016
  • This paper compares the performance of wireless communication technologies to replace the wired networks by wireless networks on avionics intra-communication. Due to the drawbacks of wired network, such as complexity, weight, maintenance cost and scalability, it leads to the high data rate and network traffic demands of avionics systems. Therefore, in WAIC(Wireless Avionics Intra-Communications) system suggested by ITU(International Telecommunication Union), based on environment of avionics system and requirements of a wired network, wireless network structures are defined to solve the problems of wired networks. In this paper, we consider features, advantages and disadvantages of wireless communication technologies which can be used for wireless avionics network, and we propose suitable wireless communication technology candidates for wireless avionics networks in WAIC environments.

Malware Detection Technology Based on API Call Time Section Characteristics (API 호출 구간 특성 기반 악성코드 탐지 기술)

  • Kim, Dong-Yeob;Choi, Sang-Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.629-635
    • /
    • 2022
  • Cyber threats are also increasing with recent social changes and the development of ICT technology. Malicious codes used in cyber threats are becoming more advanced and intelligent, such as analysis environment avoidance technology, concealment, and fileless distribution, to make analysis difficult. Machine learning technology is being used to effectively analyze these malicious codes, but a lot of effort is needed to increase the accuracy of classification. In this paper, we propose a malicious code detection technology based on API call interval characteristics to improve the classification performance of machine learning. The proposed technology uses API call characteristics for each section and entropy of binary to separate characteristic factors into sections based on the extraction malicious code and API call order of normal binary. It was verified that malicious code can be well analyzed using the support vector machine (SVM) algorithm for the extracted characteristic factors.

Design and Implementation of Ultra-Long-Range LoRa Communication Module (초장거리 LoRa 통신 모듈 설계 및 구현)

  • Kim, Dong-Hyun;Huh, Jun-Hwan;Lee, Chang-Hong;Kim, Kwang-Deok;Kim, Jong-Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.230-238
    • /
    • 2022
  • Internet of Things(IoT) is a communication technology that collects information of object remotely and controls the function of object by adding a communication function to object that does not have a communication function. For the IoT, various communication technologies such as Wi-Fi, 3GPP, and Bluetooth are available, and Long Range(LoRa) is communication technologies specialized in the IoT concept. LoRa is a communication technology that support long-distance, low-power, and low-speed communication, and is suitable for collecting information generated form object in remote equipment and controlling equipment. Because of these characteristics, it is used in many application field, and various performance improvement studies are in progress. This paper intends to propose an ultra-long-range LoRa communication module that can be used in a wider range of applications. We design and implement hardware, firmware, and application software for testing to develop ultra-long-range LoRa communication modules. The implemented module will be tested in a real environment to verify its performance and to check its utilization.

An Implementation of the path-finding algorithm for TurtleBot 2 based on low-cost embedded hardware

  • Ingabire, Onesphore;Kim, Minyoung;Lee, Jaeung;Jang, Jong-wook
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.313-320
    • /
    • 2019
  • Nowadays, as the availability of tiny, low-cost microcomputer increases at a high level, mobile robots are experiencing remarkable enhancements in hardware design, software performance, and connectivity advancements. In order to control Turtlebot 2, several algorithms have been developed using the Robot Operating System(ROS). However, ROS requires to be run on a high-cost computer which increases the hardware cost and the power consumption to the robot. Therefore, design an algorithm based on low-cost hardware is the most innovative way to reduce the unnecessary costs of the hardware, to increase the performance, and to decrease the power consumed by the computer on the robot. In this paper, we present a path-finding algorithm for TurtleBot 2 based on low-cost hardware. We implemented the algorithm using Raspberry pi, Windows 10 IoT core, and RPLIDAR A2. Firstly, we used Raspberry pi as the alternative to the computer employed to handle ROS and to control the robot. Raspberry pi has the advantages of reducing the hardware cost and the energy consumed by the computer on the robot. Secondly, using RPLIDAR A2 and Windows 10 IoT core which is running on Raspberry pi, we implemented the path-finding algorithm which allows TurtleBot 2 to navigate from the starting point to the destination using the map of the area. In addition, we used C# and Universal Windows Platform to implement the proposed algorithm.

Reproduction based Multi-Contents Distribution Platform

  • Lee, Byung-Duck;Lee, Keun-Ho;Han, Seong-Soo;Jeong, Chang-Sung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.695-712
    • /
    • 2021
  • As the use of smart devices is being increased rapidly by the development of internet and IT technology, the contents production and utilization rate are showing higher increase, too. In addition, the type of contents also shows very diverse forms such as education, game, video, UCC, etc. In the meantime, the contents are reproduced in diverse forms by reprocessing the original contents, and they are being serviced through the contents service platform. Therefore, the platform to make the contents reprocessing easy and fast is needed. As the diverse contents distribution channels such as YouTube, SNS, App Service, etc, easier contents distribution platform is needed, and the development of the relevant area is expected. In addition, as the selective consumption of the contents having easy accessibility through diverse smart devices is distinguished, the demand for the platform and service that can identify the contents consumption propensity by individual is being increased. Therefore, in this study, to vitalize the online contents distribution, the contents reproduction and publishing platform, was designed and materialized, which can reproduce and distribute the contents based on the real-time contents editing technology in URL unit and the consumer propensity analysis technology using the data management-based broadcasting contents distribution metadata technology and the edited image contents streaming technology. In addition, in the results of comparing with other platforms through the experiment, the performance superiority of the suggested platform was verified. If the suggested platform is applied to the areas of education, broadcasting, press, etc, the multi-media contents can be reproduced and distributed easily, through which the vitalization of contents-related industry is expected.

Disconnected "Gold Medal outside the Arena": A History of the Development of the Information System for Seoul Olympic Games (계승되지 못한 올림픽 "장외금메달" : 서울올림픽 전산시스템 개발사)

  • SHIN, Hyang-Suk
    • Journal of Science and Technology Studies
    • /
    • v.19 no.2
    • /
    • pp.207-249
    • /
    • 2019
  • This study aims to show the dynamics behind official historical descriptions, tracking the development of information system for Seoul Olympic Games. Shortly after the decision was made to host the Seoul Olympics, the South Korean government planned to import a computer system used in the previous Olympics. In response, scientists at Electronic Data Processing Center of KAIST put much effort into persuading the authorities to take the initiative in their own development, and they had to prove their capabilities by developing a computer system that worked safely in the National Sports Festival. With the development of the Olympic information system taking shape, various disputes arose among the host ministries, participating organizations and researchers. As a result, the end product resulted in a modularity of four different systems developed by different agencies, rather than a single system. For this reason, no organization claimed ownership or directly inherited the technical performance of the Olympic computer system, although it was praised as a "gold medal outside the arena." Nevertheless, the technology, hardware and manpower accumulated during the development process have since spread to various areas, laying the groundwork for the development of South Korea's information and communication technology.

Successful Technology Investment Strategy in Manufacturing Industry: Fuzzy-set Qualitative Comparative Analysis (fsQCA) Approach (제조업에서의 성공적인 기술투자 전략에 대한 연구: 퍼지셋 질적비교분석)

  • Yunmo Koo;Juyeon Ham;Jae-Nam Lee
    • Information Systems Review
    • /
    • v.19 no.4
    • /
    • pp.1-25
    • /
    • 2017
  • Despite high uncertainty on financial return, firms have continuously increased their investment on technologies because they recognize the potential value of technology investment in terms of enhancing operational efficiency and sustaining competitive advantage. Notably, an individual technology investment pattern or strategy within an industry may ultimately lead to significant differences in business performance. Hence, we first categorized technology investment into traditional research and development investment and information technology investment. Afterward, we examined the effects of each pattern with combination of the two types of technology investment on business performance according to firm size and position in the supply chain through fuzzy-set qualitative comparative analysis. Data collected from 562 manufacturing firms in Korea were used in the analysis. Results showed that large-sized firms were slightly affected with microscopic patterns in their technology investments, whereas small firms were highly affected with their technology investment patterns and their positions in the supply chain. The findings implied that a small enterprise requires an appropriate technology investment strategy to achieve successful business outcomes.