• Title/Summary/Keyword: SW(software)

Search Result 714, Processing Time 0.026 seconds

A Study on Design of Safety Transmission Unit for Next-Generation Train Control System (차세대 열차제어시스템 안전전송장치 설계에 관한 연구)

  • Tae-Woon Jung;Ho-Cheol Choo;Chae-Joo Moon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.4
    • /
    • pp.563-570
    • /
    • 2023
  • The Safety Transmission Unit(STU) is a critical device used in railway systems to ensure safe and efficient operations by providing communication between trains and railway infrastructure. It is responsible for transmitting vital information and commands, allowing for the control and coordination of train movements. The STU plays a crucial role in maintaining the safety of passengers, crew, and the overall railway network. This paper presents the design and testing of a STU for the next-generation wireless-based train control system. An analysis of european and domestic standards was conducted to review requirements and ensure the design of a STU for the train control system meets international standards. Based on this analysis, hardware and software designs were developed to create an internationally recognized level of safety for the communication device. To verify the functionality of the STU, a simulator was developed, and it was confirmed that the designed features were successfully implemented.

Key-Agreement Protocol between IoT and Edge Devices for Edge Computing Environments (에지 컴퓨팅 환경을 위한 IoT와 에지 장치 간 키 동의 프로토콜)

  • Choi, Jeong-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.2
    • /
    • pp.23-29
    • /
    • 2022
  • Recently, due to the increase in the use of Internet of Things (IoT) devices, the amount of data transmitted and processed to cloud computing servers has increased rapidly. As a result, network problems (delay, server overload and security threats) are emerging. In particular, edge computing with lower computational capabilities than cloud computing requires a lightweight authentication algorithm that can easily authenticate numerous IoT devices.In this paper, we proposed a key-agreement protocol of a lightweight algorithm that guarantees anonymity and forward and backward secrecy between IoT and edge devices. and the proposed algorithm is stable in MITM and replay attacks for edge device and IoT. As a result of comparing and analyzing the proposed key-agreement protocol with previous studies, it was shown that a lightweight protocol that can be efficiently used in IoT and edge devices.

Effectiveness Analysis of AI Maker Coding Education (AI 메이커 코딩 교육의 효과성 분석)

  • Lee, Jaeho;Kim, Daehyun;Lee, Seunghun
    • 한국정보교육학회:학술대회논문집
    • /
    • 2021.08a
    • /
    • pp.77-84
    • /
    • 2021
  • The purpose of this study is to propose AI maker coding education as a way to improve computational thinking(CT), which is an essential competence for problem-solving capability in modern society, and to analyze the effectiveness of this education on improving CT in elementary school students. For the research, 5 students from 4th graders and 5 students from 6th graders were recruited, and AI maker coding education was planned in 8 sessions to form classes from basic block coding and maker education to real-life problem solving. To analyze the effectiveness of AI maker coding education, pre- and post-CT examinations were performed. The test results confirmed that AI maker coding education had a significant effect on "abstraction", "algorithm", and "data processing" in the five CT components, and confirmed that there was no correlation in "problem resolution" and "automation". Overall, the average score of all students increased, and the deviation between students decreased, confirming that AI maker coding education was effective in improving CT.

  • PDF

Designing Integrated Diagnosis Platform for Heterogeneous Combat System of Surface Vessels (다기종 수상함 전투체계의 통합 진단 플랫폼 설계)

  • Kim, Myeong-hun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.186-188
    • /
    • 2021
  • The architecture named IDPS is a design concept of web-based integrated platform for heterogeneous naval combat system, which accomplishes efficiency(decreasing complexity) of diagnosis process and reduces time to diagnose system. Each type of surface vessel has its own diagnostic processes and applications, and that means it also requires its own diagnostic engineer(inefficiency in human resource management). In addition, man-based diagnostic causes quality issues such as difference approach of log analysis in accordance with engineer skills. Thus In this paper, we designed integrated diagnostic platform named IDPS with simplified common process regardless of type of surface vessel and we reinforced IDPS with status decision algorithm(SDA) that judges current software status of vessel based on gathered lots of logs. It will enable engineers to diagnose system more efficiently and to use more resources in utilizing SDA-analyzed diagnostic results.

  • PDF

Development of a Digital Platform for Carbon Neutrality in the Ocean (해양 탄소중립 실현을 위한 디지털 플랫폼 개발)

  • Young-Hoon Yang;Jin-Hyoung Park;Deuk-Jae Cho
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.06a
    • /
    • pp.317-318
    • /
    • 2022
  • In accordance with global decarbonization, optimization and productivity improvement using digital twin are being sought, and software development for optimizing ship and marine energy operation is accelerating by selecting digital twin as a future core technology. In order to reduce the operating cost of ships and strengthen the competitiveness of the shipbuilding industry due to the international strengthening of regulations on carbon emissions, it is necessary to predict the carbon emission of ships in advance and provide a carbon reduction operation solution. A plan was carried out for the development of open digital platform technology and the establishment of an environment to support the securing of carbon transparency of the ship and offshore system.

  • PDF

Development and Applyment Selection Standards of Physical Computing Teaching Aids for Elementary SW Education According to the 2015 Revised Curriculum (2015 개정 교육과정의 초등학교 소프트웨어 교육을 위한 피지컬 컴퓨팅 교구 선택 기준 개발 및 적용)

  • Lee, Young-jae;Jeon, Hyung-gi;Kim, Yungsik
    • Journal of The Korean Association of Information Education
    • /
    • v.21 no.4
    • /
    • pp.437-450
    • /
    • 2017
  • This study derived optimized teaching aids that use the physical computing method as the solution for effective software education at the elementary level. We set standard for selecting physical computing teaching aids in elementary-level by gathering the opinions from previous studies and think tanks and then applied the standard to some aids and choose one. We also made lesson plan and tried it to the experimental group. Subsequently, students' logical thinking skills showed a statistically significant improvement in terms of the t-test. Also, in the analysis of the effect size, it was shown to have a positive influence on the improvement of the students' logical thinking skills. Additionally, survey of satisfaction evaluation from the students showed that the teaching aid selection standard was effective in selecting suitable teaching aids for elementary students and that the classroom activities utilizing physical computing teaching aids were at a suitable level for elementary students.

Performance Improvement of Force-directed Partitioning Algorithm for HW/SW Codesign (하드웨어/소프트웨어 통합설계를 위한 FDS 분할 알고리즘의 성능개선)

  • Oh, Ju-Young;Lee, Myoun-Jae;Lee, Jun-Yong;Park, Do-Soon
    • The KIPS Transactions:PartA
    • /
    • v.9A no.4
    • /
    • pp.491-496
    • /
    • 2002
  • Most partitioning algorithms for hardware- software codesign do not consider scheduling. Therefore, partitioning should be performed again if time constraints art not satisfied in scheduling the partitioned results. Existing FDS-applied methods which consider scheduling in partitioning decide the control step of the node to schedule while selecting nodes for partitioning. In selecting nodes for partitioning, several aspects should be considered together such as added cost or time due to the partition of the node, or the degree of interference due to the scheduling of the node. At this time, the induced force, which means the degree of intereference of scheduling other nodes, is computed all over the control step of the corresponding node and other depending nodes. In this paper, a new FDS-applied partitioning algorithm is proposed, where partitioning is performed using the defined scheduling urgency and relative scheduling urgency of the nodes. Since the nodes are partitioned by the computation of relative scheduling urgencies only at the earliest control step and the latest control step among the assignable steps, the time complexity for the computation of induced force could be improve. Experimental result on the benchmarks show the improvement of execution time of the proposed algorithm compared to the existing FDS-applied methods.

A study on machine learning-based defense system proposal through web shell collection and analysis (웹쉘 수집 및 분석을 통한 머신러닝기반 방어시스템 제안 연구)

  • Kim, Ki-hwan;Shin, Yong-tae
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.87-94
    • /
    • 2022
  • Recently, with the development of information and communication infrastructure, the number of Internet access devices is rapidly increasing. Smartphones, laptops, computers, and even IoT devices are receiving information and communication services through Internet access. Since most of the device operating environment consists of web (WEB), it is vulnerable to web cyber attacks using web shells. When the web shell is uploaded to the web server, it is confirmed that the attack frequency is high because the control of the web server can be easily performed. As the damage caused by the web shell occurs a lot, each company is responding to attacks with various security devices such as intrusion prevention systems, firewalls, and web firewalls. In this case, it is difficult to detect, and in order to prevent and cope with web shell attacks due to these characteristics, it is difficult to respond only with the existing system and security software. Therefore, it is an automated defense system through the collection and analysis of web shells based on artificial intelligence machine learning that can cope with new cyber attacks such as detecting unknown web shells in advance by using artificial intelligence machine learning and deep learning techniques in existing security software. We would like to propose about. The machine learning-based web shell defense system model proposed in this paper quickly collects, analyzes, and detects malicious web shells, one of the cyberattacks on the web environment. I think it will be very helpful in designing and building a security system.

Analysis of Competency-Based In-service Training Programs for Informatics Teachers (정보교사의 역량에 기반한 소프트웨어교육 교원 직무 연수과정 분석)

  • Ock, Jihyun;Ahn, Seongjin
    • The Journal of Korean Association of Computer Education
    • /
    • v.21 no.1
    • /
    • pp.43-50
    • /
    • 2018
  • The 2015 Revised National Curriculum emphasizes software education to develop creative and convergent talents in preparation of the Fourth Industrial Revolution. Accordingly, it is necessary to develop competency-based training programs for informatics teachers in a rapidly changing educational environment. In this background, this study selects a framework to analyze the content of in-service training for informatics teachers through review of previous studies. By analyzing the current training programs to strengthen competencies required for informatics teachers in secondary schools, the study aims to develop implications for future in-service training programs. To this end, the study conducted a questionnaire survey of experts who participated in the development of in-service training textbooks and consulted them, then analyzed the elements of competency-based training program content and the relative importance of each competency element using the analytical hierarchy process (AHP). According to the results of the analysis, the content was relatively concentrated on the competency of "Understanding and Reconstructing the National Curriculum" required for general and informatics teachers as well, which accounted for 47% of all, or 7 hours out of the total 15 hours. In contrast, the content structure lacked the competency of highly relative importance by competency element "Establishing and Using Teaching-Learning Strategies for Informatics," which took up the highest portion of 27%. These findings will be used as basic data for understanding and reflecting the areas that fall short of the development of in-service training programs for informatics teachers.

Evaluation of Correlations in Copier's Button and Usability (복사기 조작버튼에 따른 사용성 상관관계 연구)

  • Ha, Kwang Soo
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.595-603
    • /
    • 2013
  • Touchscreen is now installed in the majority of information devices thanks to the developed digital technology. In case of copiers, although touchscreen was installed earlier than any other information device, current user interface indicates that conventional methods have been maintained without any special re-validation. But, since common office devices such as copiers have brief usage time and clear, straightforward purposes, user experience between an user and device is perhaps an important element. Nevertheless, conservativeness of the market and the fact that users and buyers are not always the same are a stumbling block to actively changing UI. Recently, however, as hardware element, buttons, have moved to touchscreen mostly for smartphone, and common and public devices have seen rapid changes in UX, mostly with touchscreen, it has led to high demand for changes in UX of copiers. To remedy the issues with copiers, a literature review was conducted through existing studies and user evaluation based on user survey and prototype was done to examine the copier's UI elements and relevant changes in usage. In particular, a new direction for UX of copiers was suggested by analyzing the impact of differences between software button-oriented UI and hardware button-oriented UI on users and usability. This study findings could be used as basic data for improving the usability of future common devices including copier and UX design.