검색결과

검색조건
좁혀보기
검색필터
결과 내 재검색

간행물

    분야

      발행연도

      -

        검색결과 17

        1.
        2023.08 KCI 등재 구독 인증기관 무료, 개인회원 유료
        Recent, there has been a need for a terminal device with artificial intelligence to detect emergency situations in various means of transportation to prevent overdischarge of the battery even when parking the vehicle for a long time so that the driver can properly prepare. The transmission system, which guides the situation and location information of the vehicle, uses AHD video technology and RTOS technology to reduce the load of wireless networks by increasing the video playback rate through UDP implementation by WiFi, and stabilizes through wireless networks and low-power sensors using LoRa services.
        4,000원
        3.
        2020.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        With the advent of the 4.0 era of logistics due to the Fourth Industrial Revolution, infrastructures have been built to receive the same services online and offline. Logistics services affected by logistics 4.0 and IT technology are rapidly changing. Logistics services are developing using technologies such as big data, artificial intelligence, blockchain, Internet of things, and augmented reality. The convergence of logistics services and various IT new technologies is accelerating, and the development of data management solution technology has led to the emergence of electronic cargo waybill to replace paper cargo waybill. The electronic waybill was developed to supplement paper waybill that lack economical and safety. However, the electronic waybill that appeared to complement the paper waybill are also in need of complementation in terms of efficiency and reliability. New research is needed to ensure that electronic cargo waybill gain the trust of users and are actively utilized. To solve this problem, electronic cargo waybill that combine blockchain technology are being developed. This study aims to improve the reliability, operational efficiency and safety of blockchain electronic cargo waybill. The purpose of this study is to analyze the blockchain-based electronic cargo waybill system and to derive evaluation indicators for system supplementation.
        4,300원
        4.
        2018.08 KCI 등재 구독 인증기관 무료, 개인회원 유료
        Currently, the commercialization of the 5th Generation (5G) service is becoming more prevalent in domestic communication network technology. This has reduced communication delay time and enabled large-capacity data transmission and video streaming services in real-time. In order to keep pace with these developments, K-water has introduced a smart process control system in water purification plants to monitor the status of the water purification process. However, since wireless networks are based on the public Long Term Evolution (LTE) network, communication delay time remains high, and high-resolution video services are limited. This is because communication networks still have a closed structure due to expense and security issues. Therefore, with 5G in its current form, it is very difficult to accommodate future services without improving the infrastructure of its communication networks. In recognition of these problems, this study implemented the authentication and management function of wireless networks on a wired network management system in the K-water Bansong water purification plant. The results confirmed that wired Local Area Network (LAN) services give a higher security performance than an expensive commercial wireless LAN system. This was achieved by using an Internet Protocol (IP) address management system of wired networks and the packet filtering function of the Layer2 (L2) switch. This study also confirmed that it is possible to create a wireless LAN service that is 3.7 times faster than the existing LTE communication network.
        4,000원
        8.
        2010.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        To give a solution to solve personal information problems issued in this study, the domestic and overseas cases about information security management system including an authentication technique are analyzed. To preserve the outflow of personal information, which is such a major issue all over the world, a new security audit check list is also proposed. We hope this study to help information system developers construct and operate confidential information systems through the three steps: Analysis of risk factors that expose personal information, Proposal to solve the problem, Verification of audit checking items.
        4,000원
        9.
        2010.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The purpose of this study is, by recognizing that recently, as crimes using information and various adverse-effect phenomena such as hacking and virus occur frequently with rapid development of information network such as Internet in every field of industry, the range of security is widening to the field of industrial areas for preventing the leaking of industrial technology and protecting that technology as well as information security only limited to IT area, and by establishing common concept about industrial security through education on the industrial security at the point of increasing importance of industrial security, to prepare the base of comprehensive risk management system for protecting company's assets (physical factor, technical factor and managerial factor) safely from the random threats or attacks inside and outside the company through assessment of important assets of the company, evaluation of threats and weak points, and risk assessment by building industrial security management system in order to protect company's information assets and resources which are connected to the existence of the company safely from the threats or attacks from inside or outside the company and to spread stable business activities.
        4,200원
        10.
        2009.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        본 연구는 사이버게임 로그인에 관한 인증 보안의 형태를 분석하고 사전차단시스템 및 도용방지효과, 그리고 범죄방지의 측면에서 인증 보안 알고리즘을 적용해 본 연구이며 이 결과는 사이버게임 로그인과 사이버 공간상에서 이루어지는 모든 형태의 ID와 Password 입력 보안 체계를 재정립 하는데 도움이 되고자 그 초점을 맞추었다. 인터넷에 연결된 시스템은 항상 보안의 위협에 노출되어 있으므로 현재 사용되고 있는 보안의 개념을 개선하여 각각의 방화벽계층을 두껍게 함으로써 철저한 개인 정보 보안을 유지해 보고자 함에 그 목적을 두었다.
        4,000원
        11.
        2007.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        집단감시 디지털 시스템(Group Digital Surveillance System for Fishery Safety and Security, GDSS-F2S)은 대단위 양식장에 침입하는 도적을 방어하기 위하여 물체 식별정보와 물체 추적정보를 제공하는 시스템이다. 그러나 GDSS-F2S에서 제공하는 이러한 두 가지 정보는 도적행위를 입증할 수 있는 법적 증거 자료로 미흡하다. 그래서 양식장의 지형을 고려한 도적행위의 유효한 대응책을 검토한 후, 하나의 해결방안으로 물체의 영상정보를 고려하였다. 앙식장을 침입하는 물체의 실시간 영상을 획득하기 위하여 0.0001 룩스(Lux)의 초저조도 CCD 카메라와 부가장치를 이용한 영상 획득 시스템을 구축하였다. 영상 획득 시스템을 부가한 GDSS-F2S의 현장실험 결과, 차량의 번호판과 외관, 사람의 행동과 특징 등을 주간은 물론 야간에도 선명하게 획득할 수 있었다. 따라서 영상획득 시스템을 부가하여 개선한 GDSS-F2S는 도적행위에 대한 충분한 법적 증거 제공이 가능하였다.
        4,000원
        13.
        2003.06 KCI 등재 구독 인증기관 무료, 개인회원 유료
        2001년 9.11 테러사건 이후 선박과 승무원의 안전과 보안문제가 해양산업에서 새로운 화제로 대두되고 있다. 고 위험 테러시대에 선주와 항만당국 뿐만 아니라, 선박 종사자들도 그들의 업무와 행동에 있어서 테러위협에 대한 경각심과 대응책이 요구되고 있다. 본 논문에서는 먼저 해양보안관리의 개념과 원칙에 입각하여 상선의 보안 취약성과 주요 요소를 분석하여 상선보안관리원칙을 도출하였다. 그리고 ISPS 규정에 입각하여 선내의 보안조직과 보안업무를 설정하고 승무원의 보안문화 정착을 위한 PTC 프로그램과 선박보안 시스템을 구성하였다.
        4,000원
        14.
        2002.05 구독 인증기관 무료, 개인회원 유료
        The purpose of this study is to carry out comparative analysis of the differences between the trend of biometrics-related system(security) standardization in the world and that of Korea, and to suggest ideal directions and building plans for domestic biometrics industry. Its purpose also includes constructing promptly a standardization of domestic biometrics industry based on the suggested standards.
        4,000원
        15.
        2002.03 KCI 등재 구독 인증기관 무료, 개인회원 유료
        As Internet spreads rapidly, the industrial structure is changing to a new paradigm. The previous EDI system was asked to change and WEB EDI, E-Mail EDI, FTP EDI etc. which are based on the internet appeared. These days the XML/EDI which has XML document appeared. The XML/EDI consider advantages and disadvantages of VAN/EDI and EDI which based on the internet. Also, EDI system has to assure a safe exchange between sender and receiver. But, the internet has security problems because it uses a open TCP/IP protocol. Although there are many methods for security, it is being studied with XML concept. On this paper, we will suppose the XML/EDI system model with XML Signature, and build a procedure of electronic signature and delivery of document between sender and receiver.
        4,300원
        16.
        2012.02 KCI 등재 서비스 종료(열람 제한)
        해양 분야에서 "e-Navigation"의 개념이 2005년 처음 소개된 이후, 최근 2~3년 전부터 국제해사기구(IMO)와 항로표지협회(IALA)에서 이행전략과 기술 표준화가 급속히 추진되고 있다. 특히 해상교통관제시스템(VTS : Vessel Traffic Service)은 항행지원정보교류가 가능한 육상국으로서 선박 통항의 안전과 효율성을 증진시키고 환경을 보호하는 e-Navigation의 핵심적 시스템으로 인식되고 있다. 최근 IALA VTS Committee에서는 출항에서 도착항까지 항행지원을 위하여 VTS 시스템간 정보 교류(IVEF:Inter-VTS Data Exchange Format)에 대한 요청으로 표준화가 진행되고 있다. 그러나 이러한 해상의 실시간 선박 교통흐름 정보는 국가적으로도 보안에 민감한 정보로서, 테러 등 역기능에 대한 우려가 있어, 안전한 정보교환은 필수적인 요소이다. 따라서 본 논문에서는 상호연동을 위한 보안 프로토콜을 설계하고 안전한 데이터 전송을 위한 보안 구조를 제시하고자 한다.
        17.
        2007.03 KCI 등재 서비스 종료(열람 제한)
        We propose and develop Home Security robot system based on Sensor Network (HSSN) configured by sensor nodes including radio frequency (RF), ultrasonic, temperature, light and sound sensors. Our system can acknowledge security alarm events that are acquired by sensor nodes and relayed in the hop-by-hop transmission way. There are sensor network, Home Security Mobile Robot (HSMR) and Home Server(HS) in this system. In the experimental results of this system, we presented that our system has more enhanced performance of response to emergency context and more speedy and accurate path planning to target position for arriving an alarm zone with obstacle avoidance and acquiring the context-aware information.