• Title/Summary/Keyword: 설계 진화

Search Result 640, Processing Time 0.033 seconds

Design of High School Software AI Education Model in IoT Environment (사물인터넷 환경에서의 고등학교 SW·AI 교육 모델 설계)

  • Keun-Ho Lee;JungSoo Han
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.49-55
    • /
    • 2023
  • The evolution of new digital technologies is progressing rapidly. In particular, many changes in software and artificial intelligence are progressing rapidly in the field of education. The Ministry of Education is planning an educational program by linking software and artificial intelligence regular curriculum. Before applying it to regular subjects, various software and artificial intelligence related experience camps are being promoted. This study aims to construct an educational model for software and artificial intelligence education programs for high school students based on new digital technology. By expanding and distributing software and artificial intelligence education, we aim to enhance the basic capabilities of software and artificial intelligence for high school students. I would like to define the concept of software and artificial intelligence in high school and propose a model that links software and artificial intelligence learning factors to the regular curriculum.

Role Based Smart Health Service Access Control in F2C environment (F2C 환경에서 역할 기반 스마트 헬스 서비스 접근 제어)

  • Mi Sun Kim;Kyung Woo Park;Jae Hyun Seo
    • Smart Media Journal
    • /
    • v.12 no.7
    • /
    • pp.27-42
    • /
    • 2023
  • The development of cloud services and IoT technology has radically changed the cloud environment, and has evolved into a new concept called fog computing and F2C (fog-to-cloud). However, as heterogeneous cloud/fog layers are integrated, problems of access control and security management for end users and edge devices may occur. In this paper, an F2C-based IoT smart health monitoring system architecture was designed to operate a medical information service that can quickly respond to medical emergencies. In addition, a role-based service access control technology was proposed to enhance the security of user's personal health information and sensor information during service interoperability. Through simulation, it was shown that role-based access control is achieved by sharing role registration and user role token issuance information through blockchain. End users can receive services from the device with the fastest response time, and by performing service access control according to roles, direct access to data can be minimized and security for personal information can be enhanced.

An Empirical Study on Fear and Dizziness Using UAM Simulator (UAM 시뮬레이터를 활용한 공포심과 어지러움에 대한 실증 연구)

  • Se-Jun Kim
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.3
    • /
    • pp.262-268
    • /
    • 2023
  • Based on the government's willingness to commercialize UAM with the goal of 2025, it is making remarkable achievements in various fields, including the development of UAM. In addition, based on the concept of UAM, it is evolving into an Advanced Air Mobility(AAM) concept that includes commercial operation between long-distance or short-range cities, cargo delivery, public services, aviation tourism, and personal/leisure aircraft. however, research on physical problems such as low-altitude operation characteristics, speed within three dimensions, and dizziness caused by external environment has yet to be found. Therefore, in this study, actual images are taken while flying at the expected altitude and speed of UAM using a helicopter, and by experiencing it to the general public using a UAM simulator equipped with VR and Motion, physical reactions such as fear and dizziness of passengers that may occur during actual UAM operation of UAM are analyzed.

Implementation of IoT Application using Geofencing Technology for Mountain Management (산악 관리를 위한 지오펜싱 기술을 이용한 IoT 응용 구현)

  • Hyeok-jun Kweon;Eun-Gyu An;Hoon Kim
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.3
    • /
    • pp.300-305
    • /
    • 2023
  • In this paper, we confirmed that an efficient sensor network can be established at a low cost by applying Geofencing technology to a LoRa-based sensor network and verified its effectiveness in disaster management such as forest fires. We detected changes through GPS, gyro sensors, and combustion detection sensors, and defined the validity size of the Geofencing cell accurately. We proposed a LoRa Payload Frame Structure that has a flexible size according to the size of the sensor information.

An Efficient Post-Quantum Signature Scheme Based on Multivariate-Quadratic Equations with Shorter Secret Keys (양자컴퓨터에 안전한 짧은 비밀키를 갖는 효율적인 다변수 이차식 기반 전자서명 알고리즘 설계)

  • Kyung-Ah Shim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.211-222
    • /
    • 2023
  • Multivariate quadratic equations (MQ)-based public-key cryptographic algorithms are one of promising post-quantumreplacements for currently used public-key cryptography. After selecting to NIST Post-Quantum Cryptography StandardizationRound 3 as one of digital signature finalists, Rainbow was cryptanalyzed by advanced algebraic attacks due to its multiple layered structure. The researches on MQ-based schemes are focusing on UOV with a single layer. In this paper, we propose a new MQ-signature scheme based on UOV using the combinations of the special structure of linear equations, spare polynomials and random polynomials to reduce the secret key size. Our scheme uses the block inversion method using half-sized blockmatrices to improve signing performance. We then provide security analysis, suggest secure parameters at three security levels and investigate their key sizes and signature sizes. Our scheme has the shortest signature length among post-quantumsignature schemes based on other hard problems and its secret key size is reduced by up to 97% compared to UOV.

Implementation and Performance Analysis of Partition-based Secure Real-Time Operating System (파티션 기반 보안 실시간 운영체제의 구현 및 성능 분석)

  • Kyungdeok Seo;Woojin Lee;Byeongmin Chae;Hoonkyu Kim;Sanghoon Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.99-111
    • /
    • 2022
  • With current battlefield environment relying heavily on Network Centric Warfare(NCW), existing weaponary systems are evolving into a new concept that converges IT technology. Majority of the weaponary systems are implemented with numerous embedded softwares which makes such softwares a key factor influencing the performance of such systems. Furthermore, due to the advancements in both IoT technoogies and embedded softwares cyber threats are targeting various embedded systems as their scope of application expands in the real world. Weaponary systems have been developed in various forms from single systems to interlocking networks. hence, system level cyber security is more favorable compared to application level cyber security. In this paper, a secure real-time operating system has been designed, implemented and measured to protect embedded softwares used in weaponary systems from unknown cyber threats at the operating system level.

A Study on Threat Detection Model using Cyber Strongholds (사이버 거점을 활용한 위협탐지모델 연구)

  • Inhwan Kim;Jiwon Kang;Hoonsang An;Byungkook Jeon
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.19-27
    • /
    • 2022
  • With the innovative development of ICT technology, hacking techniques of hackers are also evolving into sophisticated and intelligent hacking techniques. Threat detection research to counter these cyber threats was mainly conducted in a passive way through hacking damage investigation and analysis, but recently, the importance of cyber threat information collection and analysis is increasing. A bot-type automation program is a rather active method of extracting malicious code by visiting a website to collect threat information or detect threats. However, this method also has a limitation in that it cannot prevent hacking damage because it is a method to identify hacking damage because malicious code has already been distributed or after being hacked. Therefore, to overcome these limitations, we propose a model that detects actual threats by acquiring and analyzing threat information while identifying and managing cyber bases. This model is an active and proactive method of collecting threat information or detecting threats outside the boundary such as a firewall. We designed a model for detecting threats using cyber strongholds and validated them in the defense environment.

A Library Service Model Toward Ubiquitous City (U-City 구현을 위한 도서관서비스 모델)

  • Chung, Jun-Min
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.20 no.3
    • /
    • pp.163-169
    • /
    • 2009
  • The concept of library is newly interpreted and designed under the environment of U-City. The basic notion of the library should not changed its kernel nevertheless, the new technologies like ubiquitous computing services are applied to the library, which functions in terms of information services, continuous learning programs and communities of practice(CoP). The library is fit for any technologies or environments as organism. Actually the library has been shown in terms of new information technologies with the changes of the times. It leads to comprehend the library as its appearance not as it is. The libraries including even cities have evolved toward ubiquitous(computing) environment. On the other words, the libraries have sought ubiquitous at the past, now they are still chasing it.

Research on the Implementation of 5G SA Test Network Test Bed Function Based on Service-Based Architecture (SBA 기반 5G SA 시험망 시스템 기능 구현에 관한 연구)

  • Park, Jea-Seok;Yoon, Mahn-Suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.529-531
    • /
    • 2022
  • The 5th generation mobile communication (5G) is being commercialized by major domestic and foreign mobile telecommunication businesses and is spreading to general customers mainly on smart devices such as smartphones, wearables, and IoT. If 4G networks and 5G access equipment were utilized by introducing NSA(None-Stand Alone) technology when 5G was first introduced, recently, 5G convergence services are being realized by gradually expanding evolution to 5G standalone networks through SA (Stand Alone) technology. The purpose of this study is to study a design plan for implementing necessary service-oriented functions from the perspective of communication network users on the configuration of 5G SA equipment based on SBA(Service-based Architecture) mentioned in the 3GPP technical specification document. Through this research, it is expected that companies that need to enter the 5G market can easily access the 5G SA network to develop and supplement specialized 5G convergence services to improve product performance and quality.

  • PDF

Design of pRBFNNs Pattern Classifier-based Face Recognition System Using 2-Directional 2-Dimensional PCA Algorithm ((2D)2PCA 알고리즘을 이용한 pRBFNNs 패턴분류기 기반 얼굴인식 시스템 설계)

  • Oh, Sung-Kwun;Jin, Yong-Tak
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.1
    • /
    • pp.195-201
    • /
    • 2014
  • In this study, face recognition system was designed based on polynomial Radial Basis Function Neural Networks(pRBFNNs) pattern classifier using 2-directional 2-dimensional principal component analysis algorithm. Existing one dimensional PCA leads to the reduction of dimension of image expressed by the multiplication of rows and columns. However $(2D)^2PCA$(2-Directional 2-Dimensional Principal Components Analysis) is conducted to reduce dimension to each row and column of image. and then the proposed intelligent pattern classifier evaluates performance using reduced images. The proposed pRBFNNs consist of three functional modules such as the condition part, the conclusion part, and the inference part. In the condition part of fuzzy rules, input space is partitioned with the aid of fuzzy c-means clustering. In the conclusion part of rules. the connection weight of RBFNNs is represented as the linear type of polynomial. The essential design parameters (including the number of inputs and fuzzification coefficient) of the networks are optimized by means of Differential Evolution. Using Yale and AT&T dataset widely used in face recognition, the recognition rate is obtained and evaluated. Additionally IC&CI Lab dataset is experimented with for performance evaluation.