http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Analysis of Recent ICT Convergence Technology Status in the Agrifood Area through the Case Review
Byungho Chung,Ikhoon Jang,Junghoon Moo 한국농식품정보과학회 2014 Agribusiness and Information Management Vol.6 No.1
The purpose of this study is to explore the status of current ICT convergence technology in the agrifood area through reviewing articles. For this, we classifiedthe ICT convergence technology into four categories including RFID technology, smart sensing technology, USN technology, and other ICT convergence cases and reviewed by extracting the cases related to the convergence technology that is recently conducted depending on each category from the Journal of Computers and Electronics in Agriculture between January 2012 and June 2014. Additionally, by combining the reviews of cases, we conducted the study in the direction of analyzing the recent ICT convergence technology status in the current agrifood area.
Chung, Daniel Byungho,Cho, Jongpyo,Moon, Junghoon Korean Society of Food and Agricultural Informatio 2013 Agribusiness and Information Management Vol.5 No.2
The purpose of this study is to prove that new values for the agricultural food area can be created by combining various big data collected in the agricultural food area and analyzing them in an appropriate analysis method. For this, the analysis techniques generally used were studied, and the use of the big data in the various areas of the current society was explored through practical application instances. In addition, by the current status and analysis instances of the big data use in the agricultural food area, this study was conducted to verify how the new values found were being used.
Analysis of Recent ICT Convergence Technology Status in the Agrifood Area through the Case Review
Chung, Byungho,Jang, Ikhoon,Moon, Junghoon Korean Society of Food and Agricultural Informatio 2014 Agribusiness and Information Management Vol.6 No.1
The purpose of this study is to explore the status of current ICT convergence technology in the agrifood area through reviewing articles. For this, we classified the ICT convergence technology into four categories including RFID technology, smart sensing technology, USN technology, and other ICT convergence cases and reviewed by extracting the cases related to the convergence technology that is recently conducted depending on each category from the Journal of Computers and Electronics in Agriculture between January 2012 and June 2014. Additionally, by combining the reviews of cases, we conducted the study in the direction of analyzing the recent ICT convergence technology status in the current agrifood area.
행위 기반 의료기기 랜섬웨어 공격 탐지 학습 모델의 비교 실험 분석
정병호(Byungho Chung),권혁찬(Hyeokchan Kwon) 한국통신학회 2021 한국통신학회 학술대회논문집 Vol.2021 No.11
본 논문은 정상/이상 클레스간 데이터 불균형이 심하고, 레이블링 오류로 인한 학습 데이터 오염 문제가 상존하는 의료기기 네트워크 환경에서 랜섬웨어의 행위를 분석하고 탐지하는 OC-SVM, Isolation Forest, LSTM-AE 및 IFLSTM 학습 모델을 구성하고 성능을 실험하였다. 비교 실험한 결과, Isolation Forest(IF)로 노이즈(이상치)을 제거하고 시계열 학습한 IF-LSTM 모델이 타 모델에 비해 가장 향상된 성능을 보였으며, 정확도 94% 수준의 성능을 달성하였다.
A New Kind of Image Encryption Algorithm based on Improvement Bit Plane
Doyoung Chung,Gaeil An,Sokjoon Lee,Byungho Chung 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.12
The paper presents a new Image Encryption Algorithm. First of all, we utilize the common plane analysis process and Logistic to generate seven groups of chaotic sequence of different range value, and then, the order of the "exclusive or" of Scrambling Figures in the plane analysis of 8 groups different information content was determined by the generated Chaotic sequences with different range values and the information in Bit Plane Analysis. We use 7 groups of different values of every Logistic and select the corresponding pixels of different groups to process ‘exclusive or’ operation, in the end we will get encrypted image. Decryption is the inverse process of encryption. This Algorithm implementation is simple, and due to the generated different chaotic sequence, this algorithm has large key spaces. Other than that, the experiment verifies that new Image Encryption Algorithm is free from the histogram, plain text attack, etc.