• Title/Summary/Keyword: Data Process SW

Search Result 82, Processing Time 0.024 seconds

HDF: Hybrid Debugging Framework for Distributed Network Environments

  • Kim, Young-Joo;Song, Sejun;Kim, Daeyoung
    • ETRI Journal
    • /
    • v.39 no.2
    • /
    • pp.222-233
    • /
    • 2017
  • Debugging in distributed environments, such as wireless sensor networks (WSNs), which consist of sensor nodes with limited resources, is an iterative and occasionally laborious process for programmers. In sensor networks, it is not easy to find unintended bugs that arise during development and deployment, and that are due to a lack of visibility into the nodes and a dearth of effective debugging tools. Most sensor network debugging tools are not provided with effective facilities such as real-time tracing, remote debugging, or a GUI environment. In this paper, we present a hybrid debugging framework (HDF) that works on WSNs. This framework supports query-based monitoring and real-time tracing on sensor nodes. The monitoring supports commands to manage/control the deployed nodes, and provides new debug commands. To do so, we devised a debugging device called a Docking Debug-Box (D2-Box), and two program agents. In addition, we provide a scalable node monitor to enable all deployed nodes for viewing. To transmit and collect their data or information reliably, all nodes are connected using a scalable node monitor applied through the Internet. Therefore, the suggested framework in theory does not increase the network traffic for debugging on WSNs, and the traffic complexity is nearly O(1).

Design and Implementation of ELAS in AI education (Experiential K-12 AI education Learning Assessment System)

  • Moon, Seok-Jae;Lee, Kibbm
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.62-68
    • /
    • 2022
  • Evaluation as learning is important for the learner competency test, and the applicable method is studied. Assessment is the role of diagnosing the current learner's status and facilitating learning through appropriate feedback. The system is insufficient to enable process-oriented evaluation in small educational institute. Focusing on becoming familiar with the AI through experience can end up simply learning how to use the tools or just playing with them rather than achieving ultimate goals of AI education. In a previous study, the experience way of AI education with PLAY model was proposed, but the assessment stage is insufficient. In this paper, we propose ELAS (Experiential K-12 AI education Learning Assessment System) for small educational institute. In order to apply the Assessment factor in in this system, the AI-factor is selected by researching the goals of the current SW education and AI education. The proposed system consists of 4 modules as Assessment-factor agent, Self-assessment agent, Question-bank agent and Assessment -analysis agent. Self-assessment learning is a powerful mechanism for improving learning for students. ELAS is extended with the experiential way of AI education model of previous study, and the teacher designs the assessment through the ELAS system. ELAS enables teachers of small institutes to automate analysis and manage data accumulation following their learning purpose. With this, it is possible to adjust the learning difficulty in curriculum design to make better for your purpose.

A Study on Security Requirements of Shipboard Combat System based on Threat Modelling (위협 모델링 기반 함정 전투체계 보안 요구사항에 관한 연구)

  • Seong-cheol Yun;Tae-shik Shon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.3
    • /
    • pp.281-301
    • /
    • 2023
  • The shipboard combat system is a key system for naval combat that supports a command and control process cycle consisting of Detect - Control - Engage in real time to ensure ship viability and conduct combat missions. Modern combat systems were developed on the basis of Open Architecture(OA) to maximize acceptance of latest technology and interoperability between systems, and actively introduced the COTS(Commercial-of-the-shelf). However, as a result of that, vulnerabilities inherent in COTS SW and HW also occurred in the combat system. The importance of combat system cybersecurity is being emphasized but cybersecurity research reflecting the characteristics of the combat system is still lacking in Korea. Therefore, in this paper, we systematically identify combat system threats by applying Data Flow Diagram, Microsoft STRIDE threat modelling methodology. The threats were analyzed using the Attack Tree & Misuse case. Finally we derived the applicable security requirements which can be used at stages of planning and designing combat system and verified security requirements through NIST 800-53 security control items.

Comparison of Normalization Methods for Defining Copy Number Variation Using Whole-genome SNP Genotyping Data

  • Kim, Ji-Hong;Yim, Seon-Hee;Jeong, Yong-Bok;Jung, Seong-Hyun;Xu, Hai-Dong;Shin, Seung-Hun;Chung, Yeun-Jun
    • Genomics & Informatics
    • /
    • v.6 no.4
    • /
    • pp.231-234
    • /
    • 2008
  • Precise and reliable identification of CNV is still important to fully understand the effect of CNV on genetic diversity and background of complex diseases. SNP marker has been used frequently to detect CNVs, but the analysis of SNP chip data for identifying CNV has not been well established. We compared various normalization methods for CNV analysis and suggest optimal normalization procedure for reliable CNV call. Four normal Koreans and NA10851 HapMap male samples were genotyped using Affymetrix Genome-Wide Human SNP array 5.0. We evaluated the effect of median and quantile normalization to find the optimal normalization for CNV detection based on SNP array data. We also explored the effect of Robust Multichip Average (RMA) background correction for each normalization process. In total, the following 4 combinations of normalization were tried: 1) Median normalization without RMA background correction, 2) Quantile normalization without RMA background correction, 3) Median normalization with RMA background correction, and 4) Quantile normalization with RMA background correction. CNV was called using SW-ARRAY algorithm. We applied 4 different combinations of normalization and compared the effect using intensity ratio profile, box plot, and MA plot. When we applied median and quantile normalizations without RMA background correction, both methods showed similar normalization effect and the final CNV calls were also similar in terms of number and size. In both median and quantile normalizations, RMA backgroundcorrection resulted in widening the range of intensity ratio distribution, which may suggest that RMA background correction may help to detect more CNVs compared to no correction.

Analysis of Impact on ERP Customization Module Using CSR Data

  • Yoo, Byung-Keun;Kim, Seung-Hee
    • Journal of Information Processing Systems
    • /
    • v.17 no.3
    • /
    • pp.473-488
    • /
    • 2021
  • The enterprise resource planning (ERP) system is a standardized and advanced business process that many companies are implementing now-a-days through customization. However, it affects the efficiency of operations as these customizations are based on uniqueness. In this study, we analyzed the impact of customized modules and processing time on customer service request (CSR), by utilizing the stacked CSR data during the construction and operation of ERP, focusing on small and medium-sized enterprises (SMEs). As a result, a positive correlation was found between unit companies and the length of ERP implementation; ERP modules and the length of ERP implementation; ERP modules and unit companies; and the type of ERP implementation and ERP module. In terms of CSR, a comparison of CSR processing time of CBO (customized business object) module and STD (standard) module revealed that while the five modules did not display statistically significant differences, one module demonstrated a statistically very significant difference. In sum, the analysis indicates that the CBO-type CSR and its processing cost are higher than those of STD-type CSR. These results indicate that companies planning to implement an ERP system should consider the ERP module and their customization ratio and level. It not only gives the theoretical validity that should be considered as an indicator for decision making when ERP is constructed, but also its implications on the impact of processing time suggesting that the maintenance costs and project scheduling of ERP software must also be considered. This study is the first to present the degree of impact on the operation and maintenance of customized modules based on actual data and can provide a theoretical basis for applying SW change ratio in the cost estimation of ERP system maintenance.

A Design of Statistical Analysis Service Model to Analyze AR-based Educational Contents (AR기반 교육용 콘텐츠분석을 위한 통계분석서비스 모형 설계)

  • Yun, BongShik;Yoo, Sowol
    • Smart Media Journal
    • /
    • v.9 no.4
    • /
    • pp.66-72
    • /
    • 2020
  • As the online education market expands, educational contents with various presentation methods are being developed and released. In addition, it is imperative to develop content that reflects the usability and user environment of users who use this educational content. However, for qualitative growth of contents that will support quantitative expansion of markets, existing model analysis methods are urgently needed at a time when development direction of newly developed contents is secured. In this process of content development, a typical model for setting development goals is needed, as the rules of the prototype affect the entire development process and the final development outcome. It can also provide a positive benefit that screens the issue of performance dualization between processes due to the absence of communication between a single entity or between a number of entities. In the case of AR-based educational content which is effective to secure data necessary for development by securing samples of similar categories because there are not enough ready-made samples released. Therefore, a big data statistical analysis service is needed that can easily collect data and make decisions using big data. In this paper, we would like to design analysis services that enable the selection and detection of intuitive multidimensional factors and attributes, and propose big data-based statistical analysis services that can assist cooperative activities within an organization or among many companies.

Block based Smart Carving System for Forgery Analysis and Fragmented File Identification

  • Lee, Hanseong;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.93-102
    • /
    • 2020
  • In order for data obtained through all stages of digital crime investigation to be recognized as evidence capability, it must satisfy legal / technical requirements. In this paper, we propose a mechanism and implement software to provide digital forensic evidence by automatically recovering files by scanning / inspecting the unallocated area inside the storage disk block without relying on information provided by the file system. The proposed technique checks / analyzes the RAW disk data of the system under analysis in 512-byte block units based on information on the storage format / file structure of various files stored on the disk without referring to the file system-related information provided by the operating system. The file carving process was implemented, and a smart carving mechanism was proposed to intelligently restore deleted or damaged files in the storage device. As a result, we have provided a block based smart carving method to intelligently identify fragmented and damaged files in storage efficiently for forgery analysis on digital forensic investigation.

Development of Real-time Mission Monitoring for the Korea Augmentation Satellite System

  • Daehee, Won;Koontack, Kim;Eunsung, Lee;Jungja, Kim;Youngjae, Song
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.1
    • /
    • pp.23-35
    • /
    • 2023
  • Korea Augmentation Satellite System (KASS) is a satellite-based augmentation system (SBAS) that provides approach procedure with vertical guidance-I (APV-I) level corrections and integrity information to Korea territory. KASS is used to monitor navigation performance in real-time, and this paper introduces the design, implementation, and verification process of mission monitoring (MIMO) in KASS. MIMO was developed in compliance with the Minimum Operational Performance Standards of the Radio Technical Commission for Aeronautics for Global Positioning System (GPS)/SBAS airborne equipment. In this study, the MIMO system was verified by comparing and analyzing the outputs of reference tools. Additionally, the definition and derivation method of accuracy, integrity, continuity, and availability subject to MIMO were examined. The internal and external interfaces and functions were then designed and implemented. The GPS data pre-processing was minimized during the implementation to evaluate the navigation performance experienced by general users. Subsequently, tests and verification methods were used to compare the obtained results based on reference tools. The test was performed using the KASS dataset, which included GPS and SBAS observations. The decoding performance of the developed MIMO was identical to that of the reference tools. Additionally, the navigation performance was verified by confirming the similarity in trends. As MIMO is a component of KASS used for real-time monitoring of the navigation performance of SBAS, the KASS operator can identify whether an abnormality exists in the navigation performance in real-time. Moreover, the preliminary identification of the abnormal point during the post-processing of data can improve operational efficiency.

The Improvement Plan for Personal Information Protection for Artificial Intelligence(AI) Service in South Korea (우리나라의 인공지능(AI)서비스를 위한 개인정보보호 개선방안)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.3
    • /
    • pp.20-33
    • /
    • 2021
  • This study is to suggest improvements of personal information protection in South Korea, according to requiring the safety of process and protection of personal information. Accordingly, based on data collection and analysis through literature research, this study derived the issues and suitable standards of personal information for major artificial intelligence services. In addition, this cases studies were reviewed, focusing on the legal compliance and porcessing compliance for personal information proection in major countries. And it suggested the improvement plan applied in South Korea. As the results, in legal compliance, it is required reorganization of related laws, responsibility and compliance to develop and provide AI, and operation of risk management for personal information protection laws in AI services. In terms of processing compliance, first, in pre-processing and refining, it is necessary to standardize data set reference models, control data set quality, and voluntarily label AI applications. Second, in development and utilization of algorithm, it is need to establish and apply a clear regulation of the algorithm. As such, South Korea should apply suitable improvement tasks for personal information protection of safe AI service.

The Analysis of Robot Education Unit in the Practical Arts Textbooks According to 2015 Revised Curriculum (2015 개정 실과교과서의 로봇교육 체제 분석)

  • Park, SunJu
    • Journal of The Korean Association of Information Education
    • /
    • v.24 no.1
    • /
    • pp.99-106
    • /
    • 2020
  • In this paper, we analyzed the units related to robot education in the Practical Arts textbooks according to the 2015 revised curriculum. As a result, all textbooks had a common system of introduction, development, and organization, and all of them showed a similar flow. Learning objectives were presented in all textbooks, but no affective goals were presented except cognitive and functional goals. The contents of robot learning suggest the meaning and type of robots, the structure and sensors of robots, and the activities of making robots, but the contents of robot ethics, the production and activities of various robot works, and the use of robots in the problem solving process are not presented. The assembly robot and the infrared sensor are used in common, and it consists of presenting robot production and control training materials in experience activities and arranging units through evaluation, and the A, C, and F textbooks also provide the unit auxiliary data. In the future, it will be necessary to include the contents of robot ethics education centered on the design/manufacturer and user-oriented robot ethics such as the recognition of the limits of robots, the principles of using robots correctly, safety education, personal information and privacy protection.