• Title/Summary/Keyword: 설계순위

Search Result 619, Processing Time 0.034 seconds

Development of a Korean-version Integrated Message Set to Provide Information on Traffic Safety Facilities for Autonomous Vehicles (자율주행 자동차 대응 교통안전시설의 정보 제공을 위한 한국형 통합 메시지 셋 설계 방안 연구)

  • Eunjeong Ko;Hyeokjun Jang;Eum Han;Kitae Jang
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.284-298
    • /
    • 2022
  • It is necessary to acquire information on traffic safety facilities installed on the roadways specifically for the operation of autonomous vehicles. The purpose of this study is to prepare a Korean version of an integrated message-set design as a way to provide to autonomous vehicles standardized information on traffic safety facilities. In this study, necessary facilities are classified according to four criteria (no legal basis; not providing information to autonomous vehicles; providing duplicate information; not standardized, and too difficult to generalize) based on information that must be provided to operate autonomous vehicles. The priority of information delivery (gross negligence followed by behavior change) was classified according to the importance of the information to be provided during autonomous driving, and the form was defined for the classification code in the information delivered. Finally, the information location and delivery method of traffic facilities for compliance with SAE J2735 were identified. This study is meaningful in that it provides a plan for roadway operations by suggesting a method for providing information to autonomously driven vehicles.

Designing an evaluation model for cyber security management system implementation for companies participating in the automobile supply chain (based on ISO/SAE 21434 standard and TISAX assessment requirements) (자동차 공급망 참여기업 대상 사이버보안 관리체계 구현 평가모델설계 (ISO/SAE 21434 표준 및 TISAX 평가 요구사항을 기반으로))

  • Baek Eun Ho
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.49-59
    • /
    • 2022
  • Cyber security in the automobile sector is a key factor in the life cycle of automobiles, and cyber security evaluation standards are being strengthened worldwide. In addition, not only manufacturers who design and produce automobiles, but also due to the nature of automobiles consisting of complex components and various parts, the safety of cybersecurity can be secured only when the implementation level of the cybersecurity management system of companies participating in the entire supply chain is evaluated and managed. In this study, I analyzed the requirements of ISO/SAE 21434 and TISAX, which are representative standards for evaluating automotive cybersecurity. Through a survey conducted on domestic/overseas company security officers and related experts, suitability and feasibility were reviewed according to priorities and industries, so 6 areas and 45 evaluation criteria were derived and presented as final evaluation items. This study is meaningful as a study in that it presented a model that allows companies participating in the automotive supply chain to evaluate the current cybersecurity management level of the company by first applying ISO/SAE 21434 and TISAX overall control processes before uniformly introducing them.

Design and Implementation of Multi-HILS based Robot Testbed to Support Software Validation of Biomimetic Robots (생체모방로봇 소프트웨어 검증 지원 다중 HILS 기반 로봇 테스트베드 설계 및 구현)

  • Hanjin Kim;Kwanhyeok Kim;Beomsu Ha;Joo Young Kim;Sung Jun Shim;Jee Hoon Koo;Won-Tae Kim
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.6
    • /
    • pp.243-250
    • /
    • 2024
  • Biomimetic robots, which emulate characteristics of biological entities such as birds or insects, have the potential to offer a tactical advantage in surveillance and reconnaissance in future battlefields. To effectively utilize these robots, it is essential to develop technologies that emulate the wing flapping of birds or the movements of cockroaches. However, this effort is complicated by the challenges associated with securing the necessary hardware and the complexities involved in software development and validation processes. In this paper, we presents the design and implementation of a multi-HILS based biomimic robot software validation testbed using modeling and simulation (M&S). By employing this testbed, developers can overcome the absence of hardware, simulate future battlefield scenarios, and conduct software development and testing. However, the multi-HILS based testbed may experience inter-device communication delays as the number of test robots increases, significantly affecting the reliability of simulation results. To address this issue, we propose the data distribution service priority (DDSP), a priority-based middleware. DDSP demonstrates an average delay reduction of 1.95 ms compared to the existing DDS, ensuring the required data transmission quality for the testbed.

A Study on the Factors that Determine the Initial Success of Start-Up (스타트업의 초기 성공을 결정하는 요인에 관한 연구)

  • Lee, Hyun Ho;Yun, Hwangbo;Gong, Chang-Hoon
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.12 no.1
    • /
    • pp.1-13
    • /
    • 2017
  • The purpose of this study is to find out which factors determine the success of start-up in the initial market and what are the most important determinants. For the empirical analysis, the questionnaire related to the analysis of success factors for start-up success was designed according to the quantitative analysis (AHP technique). First, we selected 8 representative success factors for successful start-up in the initial market. In order to determine the degree of priority among these factors, we surveyed 12 entrepreneurs who are interested in entrepreneurship, universities, research institutes, and public officials. As a result of the empirical analysis, 51% of the funds in the tier 1 were ranked as the top priority to determine success factors. Followed by research and development (32.5%), management (8.7%) and marketing (7.8%). In particular, when each of the four items is calculated as 100 according to the result of the tier 1, and the tier 2 is converted, the foreign investment is analyzed as 43.7%. It was followed by 15.14% of R & D facilities, 14.07% of ideas, 8.7% of managerial ability, 7.29% of domestic investment, 5.85% of buyer feedback, 3.3% of development strategy and 1.95% of marketing strategy. Among the eight success factors, overseas investment items showed the closest preference to half, and it was the most important variable that determines the success or failure of market entry. The implication of this study is that many start-ups in Korea expect to receive investment and support from overseas accelerators. This means that overseas investment itself has been recognized as a start-up that makes services and products that can be used in the global market. A high preference for attracting foreign investment is due to the fact that the amount of investment is larger than that of Korea and that it can flexibly cope with the pressure on the performance compared to domestic investors. In this study, it was meaningful that we could confirm this fact through questionnaires of start-up experts. In future research, we need to find a viable alternative through studying how to provide start-up to foreign direct investment at the national level.

  • PDF

Ontology-based User Customized Search Service Considering User Intention (온톨로지 기반의 사용자 의도를 고려한 맞춤형 검색 서비스)

  • Kim, Sukyoung;Kim, Gunwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.4
    • /
    • pp.129-143
    • /
    • 2012
  • Recently, the rapid progress of a number of standardized web technologies and the proliferation of web users in the world bring an explosive increase of producing and consuming information documents on the web. In addition, most companies have produced, shared, and managed a huge number of information documents that are needed to perform their businesses. They also have discretionally raked, stored and managed a number of web documents published on the web for their business. Along with this increase of information documents that should be managed in the companies, the need of a solution to locate information documents more accurately among a huge number of information sources have increased. In order to satisfy the need of accurate search, the market size of search engine solution market is becoming increasingly expended. The most important functionality among much functionality provided by search engine is to locate accurate information documents from a huge information sources. The major metric to evaluate the accuracy of search engine is relevance that consists of two measures, precision and recall. Precision is thought of as a measure of exactness, that is, what percentage of information considered as true answer are actually such, whereas recall is a measure of completeness, that is, what percentage of true answer are retrieved as such. These two measures can be used differently according to the applied domain. If we need to exhaustively search information such as patent documents and research papers, it is better to increase the recall. On the other hand, when the amount of information is small scale, it is better to increase precision. Most of existing web search engines typically uses a keyword search method that returns web documents including keywords which correspond to search words entered by a user. This method has a virtue of locating all web documents quickly, even though many search words are inputted. However, this method has a fundamental imitation of not considering search intention of a user, thereby retrieving irrelevant results as well as relevant ones. Thus, it takes additional time and effort to set relevant ones out from all results returned by a search engine. That is, keyword search method can increase recall, while it is difficult to locate web documents which a user actually want to find because it does not provide a means of understanding the intention of a user and reflecting it to a progress of searching information. Thus, this research suggests a new method of combining ontology-based search solution with core search functionalities provided by existing search engine solutions. The method enables a search engine to provide optimal search results by inferenceing the search intention of a user. To that end, we build an ontology which contains concepts and relationships among them in a specific domain. The ontology is used to inference synonyms of a set of search keywords inputted by a user, thereby making the search intention of the user reflected into the progress of searching information more actively compared to existing search engines. Based on the proposed method we implement a prototype search system and test the system in the patent domain where we experiment on searching relevant documents associated with a patent. The experiment shows that our system increases the both recall and precision in accuracy and augments the search productivity by using improved user interface that enables a user to interact with our search system effectively. In the future research, we will study a means of validating the better performance of our prototype system by comparing other search engine solution and will extend the applied domain into other domains for searching information such as portal.

Studies on Yield Increase of Soybean as a Protein Source -Varietal response of yield components, protein and oil yield to different sowing dates and calcium levels in soybean- (단백자원으로서의 대두증산에 관한 연구 - 품종 파종기 및 석회시용량의 차이가 대두의 수량형질과 단백질 및 유분생육량에 미치는 영향 -)

  • S. K. Hyun;Eun-Woong Lee;Chung-Yong Lee;Yong-Woong Kwon
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.8 no.1
    • /
    • pp.1-4
    • /
    • 1970
  • To study the varital response of grain, protein and oil yield to different sowing dates and calcium levels in soybean, the most important crop as a protein source in Korea, this experiment was conducted in 1969. Three leading soybean varieties (Choongbukbaek, Ryooku#3 and Changdanbaekmok) were sown at May 22,, June 11 and July 1 under 3 different calcium levels, 0.50 and 100kg per 10a respectively. The results are summarized as follows: 1. Ryonku #3 showed the highest grain yield because of the highest number of pods per hill. In order of protein content, and oil content of grain, Choongbukbaek>Ryooku#3>Changdanbaekmok and Changdanbaekmok>Choogbukbaek>Ryooku#3 were found. Ryooku#3 also showed the highest protein and oil production per unit area owing to the highest grain yield. However. varietal differences of the grain yield the protein and the oil production per unit area varied along the different sowing dates. Interactions between varieties and sowing date on the grain yield should be considered in practice. 2. No difference in the grain yield was found between the first sowing date (May22) and the second (June11) on average. The grain yield in the plot of the third sowing date (July l)was strikingly decreased mainly by the smaller number of pods per hill. The protein and the oil content were not varied significantly by the different sowing dates. The protein and oil production per unit area were lowest in the plot of the third sowing date owing to the decreased grain yield. 3. More calcium application increased the number of branches per hill, the number of pods per hill, and the grain yield. The highest grain yield was found in the plot received 100 kg of calcium hydroxide per 10are. Protein content increased in higher calcium level, but oil content was highest in the plot of noncalcium. More protein production per unit area was gotten by more calcium application because of higher grain yield and protein content. all production increased in higher calcium level by the increased grain yield. 4. High plus (+) correlation was found between stem length and stem weight per hill stem length and grain weight, stem length and grain yield, stem weight per hill and number of pods per hill and grain weight, number of branches per hill and grain weight, number of pods per hill and grain yield, and grain weight and protein content of grain. Minus(-) correlation was recognized between number of pods per hill and grain weight.

  • PDF

Importance-Satisfaction Analysis of Meditation Forest in Schools - Focusing on Middle Schools in Gwang-Ju City - (명상숲의 중요도-만족도 평가 - 광주광역시 중학교를 대상으로 -)

  • Kang, Taesun;Jeong, Moonsun
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.47 no.4
    • /
    • pp.68-80
    • /
    • 2019
  • This study is to provide basic data for the user-oriented design for a middle school meditation forest in the future by analyzing the physical environment characteristics of existing middle school meditation forests, the users' utilization behavior, and the degree of the importance satisfaction. For this purpose, 24 evaluation indices based on site characteristics, naturalness, functionality, and the effectiveness of meditation forest sites were selected for analysis of importance satisfaction. We surveyed and analyzed the students and teachers of two middle schools 'A' and 'B' in Gwangju Metropolitan City. The results of this study are as follows. First, the perception and utilization rates of the meditation forests by students was significantly lower than teachers at both schools. 'A' school has a better use and recognition rate than the 'B' school. Second, the purposes of using meditation forests were rest (49.6%), weekday lunchtime (63.6%), with friends (65.0%) or colleagues (60%), and short (less than 10 minutes) rests (68.6%). They preferred flowers (30.0%) and shading plants (28.9%), mainly using shelters (57.9%) and walking trails (37.1%). Third, as a result of the importance of satisfaction analysis, the average score of the 24 items importance (3.81), higher than the satisfaction (3.62). The 24 items positioned in 4 quadrants are as follows: Nine items are in the I quadrant for 'persistent maintenance'. Three items are in the II quadrant for 'priority correction'. Seven items are in the quadrant III for 'low priority in the management and operation'. Five items are in the quadrant IV for 'avoid over effort'. For the comparison of two middle schools' satisfaction, 'A' school satisfaction was higher than 'B' school for 16 items, which showed a statistically significant difference. It is believed that the users in 'A' school are more satisfied than 'B' school because it has more forests and trails, better accessibility, and a variety of plant types and planting areas in the A school meditation forest. The results of the overall satisfaction analysis showed a significant difference between 'A' school (68.0%) and 'B' school (47.2%) as 'A' school has better shelters and trails. The rankings of the most satisfying space are walking trails (1st place) and shelters (2nd place). The reason for the highest satisfaction was for rest (stress relief and emotional support) in both 'A' and 'B' schools.

Developing and Assessing a Learning Progression for the Ecosystem (생태계에 대한 학습발달과정의 개발과 평가)

  • Yeo, Chaeyeong;Lee, Hyonyong
    • Journal of The Korean Association For Science Education
    • /
    • v.36 no.1
    • /
    • pp.29-43
    • /
    • 2016
  • There have been much efforts to reconstruct the science curriculum focusing on Disciplinary Core Ideas(DCI) in many countries such as America and Europe, the most practical effort has been to design a curriculum with learning progressions(LPs). LPs describe stepwise how students can systematically move toward the understanding of more sophisticated ideas or scientific activities and explain in succession the process of understanding the ideas while the students learn. In this study, a LP for ecosystems has been developed, and the developed LP is then evaluated accordingly. The Ecosystem is one of the DCI of the life science in Next Generation Science Standards(NGSS). The development process of the LP was set at step 4(Development, Assessment, Analysis, and Amendment), and developed through an iterative process of sequences. As a result of analyzing the developed LP, an assessment based on the LP provides reliable information to identifying student ability. This study proposes the development process of the LP and its methodological aspects to use Core Achievement Standards, Ordered Multiple-Choice items and the Rasch model. In addition, using the empirically proven LP suggests a way of strengthening curriculum linked to educational content, teaching methods and assessment. Utilizing the proposed development process in this study will be to present the standard into the direction of becoming part of the curriculum. Currently, the state of domestic research for the LP is still lacking. This study determined the development process of the LP and the need to conduct future research on the LPs.

Vulnerability Analysis for Industrial Control System Cyber Security (산업제어시스템의 사이버보안을 위한 취약점 분석)

  • Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.1
    • /
    • pp.137-142
    • /
    • 2014
  • Industrial control system (ICS) is a computer based system which are typically used in nation-wide critical infra-structure facilities such as electrical, gas, water, wastewater, oil and transportation. In addition, ICS is essentially used in industrial application domain to effectively monitor and control the remotely scattered systems. The highly developed information technology (IT) and related network techniques are continually adapted into domains of industrial control system. However, industrial control system is confronted significant side-effects, which ICS is exposed to prevalent cyber threats typically found in IT environments. Therefore, cyber security vulnerabilities and possibilities of cyber incidents are dramatically increased in industrial control system. The vulnerabilities that may be found in typical ICS are grouped into Policy and Procedure, Platform, and Network categories to assist in determining optimal mitigation strategies. The order of these vulnerabilities does not necessarily reflect any priority in terms of likelihood of occurrence or severity of impact. Firstly, corporate security policy can reduce vulnerabilities by mandating conduct such as password usage and maintenance or requirements for connecting modems to ICS. Secondly, platfom vulnerabilities can be mitigated through various security controls, such as OS and application patching, physical access control, and security software. Thirdly, network vulnerabilities can be eliminated or mitigated through various security controls, such as defense-in-depth network design, encrypting network communication, restricting network traffic flows, and providing physical access control for network components.

MAC Schemes for Best Effort Service in Wireless MAN: Design and Performance Analysis (무선 MAN에서 Best Effort 서비스를 위한 MAC 방식의 설계 및 성능 분석)

  • Park, Jin-Kyung;Shin, Woo-Cheol;Ha, Jun;Choi, Cheon-Won
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.128-140
    • /
    • 2006
  • In the IEEE 802.16 Wireless MAN standard specifies the air interface of fixed point-to-multipoint broadband wireless access systems providing multiple services. Among the service classes supported between the base station and subscriber stations in the wireless MAN, the best effort service class is ranked on the lowest position in priority and is assisted by a MAC scheme based on reservation ALOHA. The wireless MAN standard, however, does not reveal every detail of the MAC scheme but only describes the skeleton of the MAC scheme. Focusing on the amount of resource that a subscriber demands by a request and the amount of resource that the base grants to a request we thus present a number of resource demand rules and resource grant rules. Also, we construct a candidate MAC scheme by implanting a pair of resource demand and grant rules into the skeleton of the MAC scheme. Meanwhile a difficult situation for the best effort service is expected wherein only scarce resource is available after most of the resource is already preempted by other services. Perceiving such a situation, we evaluate the throughput and delay performance of each candidate MAC scheme. Especially we develop an analytical method to approximately calculate the throughput in the saturated environment. From the numerical results, we observe that the candidate MAC scheme which adopts the non-gated exhaustive demand rule paired with the full grant rule attains superior performance at the expense of the fairness.