http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
김주영,최중용,이병길 한국항해항만학회 2013 한국항해항만학회 학술대회논문집 Vol.2013 No.추계
e-Navigation의 도입에 따라, 선박 교통 정보의 대한 공유의 필요성이 높아지고 있다. 특히 선박 교통 관제 시스템인 VTS(Vessel Traffic Service) 시스템에서도 효율적인 관제와 e-Navigation에 도입에 따라 VTS 시스템간 데이터 공유가 필요한 실정이다. 이에 따라 국제항로표지협회(IALA, International Association of Marine Aids to Navigation and Lighthouse Authorities)에서는 VTS간 데이터 교환을 위한 표준 포맷인 IVEF(Inter VTS Exchange Format)을 제정하였다. IVEF는 XML 형태로 다양한 플랫폼에서 활용가능하다. 본 논문에서는 VTS 시스템 간 데이터 교환을 위한 표준 포맷인 IVEF를 이용하여 VTS 시스템 간 데이터 공유를 위한 웹 서비스에 대해 설계하고, 이를 응용하는 방법에 대해서 설명한다.
김현주,최중용,오아름,지형근,Kim, H.J.,Choi, J.Y.,Oh, A.R.,Jee, H.K. 한국전자통신연구원 2022 전자통신동향분석 Vol.37 No.3
As the COVID-19 pandemic has decreased face-to-face communication in everyday life, our interest in cultural communication via virtual world has grown significantly. In particular, the demand for applications that use three-dimensional (3D) data generation technology such as virtual reality, augmented reality, virtual performances, and realistic content is rapidly increasing in the entertainment and gaming industries. Additionally, improved computing capacity has increased the demand for high-resolution data. This study investigates the trends in 3D scanning and photogrammetry technologies that can support high-quality 3D data generation and introduces the high-resolution 3D data generation technology developed and reported in ETRI.
권혁찬,이석준,최중용,정병호,이상우,나중찬,Kwon, H.C.,Lee, S.J.,Choi, J.Y.,Chung, B.H.,Lee, S.W.,Nah, J.C. 한국전자통신연구원 2018 전자통신동향분석 Vol.33 No.1
As the traffic environment gradually changes to autonomous driving and intelligent transport systems, vehicles are becoming increasingly complicated and intelligent, and their connectivity is greatly expandinged. As a result, attack vectors of such vehicles increasing, and security threats further expanding. Currently, various solutions for vehicle security are being developed and applied, but the damage caused by cyber attacks is still increasing. In recent years, vehicles such as the Tesla Model S and Mitsubishi Outlander have been hacked and remotely controlled by an attacker. Therefore, there is a need for advanced security technologies to cope with increasingly intelligent and sophisticated automotive cyber attacks. In this article, we introduce the latest trends of autonomous vehicles and their security threats, as well as the current status and issues of security technologies to cope with them.