• Title/Summary/Keyword: next generation information system

Search Result 900, Processing Time 0.032 seconds

A Narrow Band MILES Detection System With Reduced Blind Angle of Detection Using Refractors (굴절체를 이용하여 감지 사각 문제를 개선한 협대역 마일즈 감지 시스템)

  • Ki, Hyeon-Cheol
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.49 no.7
    • /
    • pp.10-16
    • /
    • 2012
  • In this paper, we tried to realize a next generation MILES detection system which is robust to optical noise using a narrow band interference optical filter. Applying a narrow band interference optical filter which has the wavelength range of 895~915nm to the LASER wavelength of 900nm, we could obtain detection characteristics robust to strong optical noise which can be occurred in street battles. However, the MILES detection system has the blind range of detection in the incident angle range of $30^{\circ}{\sim}90^{\circ}$. To solve this problem we proposed a method of incident angle scatter using refractors. Applying a concave meniscus lens refractor which has diopter of 5.4 to the MILES detection system, we could eliminate the blind angle of detection.

Object-Oriented Software Interaction Test Techniques using Design/CPN (Design/CPN을 이용한 객체지향 소프트웨어 상호작용 테스트 기법)

  • Li, Ren-Ge;Koo, Yeon-Seol
    • The KIPS Transactions:PartD
    • /
    • v.11D no.3
    • /
    • pp.649-658
    • /
    • 2004
  • An object-oriented system is organized by a set of interacting objects and the system behavior is represented by the cooperating interaction bet ween objects. The characteristics of object-oriented software. such as inheritance and polymorphism, increase the difficulty of the object-oriented software testing. At running time of a program, one call from a member function can bind to other member functions because of the dynamic characteristics such as concurrence, dynamic binding and interaction. Therefore, there need the research about considering the characteristics of object-oriented software and concurrently testing the interaction between objects. In this paper, we propose the techniques as follows. First, we construct a flattened state chart diagram by considering the inheritance and polymorphism. Next, we model the system with CPN(Colored Petri Net) that usually is applying the system modeling and simulation. Last, we propose a test case generation techniques for testing the interaction between objects in object-oriented software by applying a Design/CPN tool.

A Development of Curriculum for Information Security Professional Manpower Training (정보보안 전문인력 양성을 위한 교육과정 개발)

  • Lee, Moongoo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.1
    • /
    • pp.46-52
    • /
    • 2017
  • Social attention to information security field is inspired, and manpower demand forecast of this area is getting high. This study surveyed information security knowledge of practitioners who work in a field of information security such as computer and network system. We analyzed a connection between survey data, information protection job system that was suggested by NICE, IT skills that NCS and KISA classified and security field classification system. Base on data that analyzed, this study suggests a curriculum that trains professional manpower who perform duties in the field of information security. Suggested curriculum can be applied to 2 year college, 3 year college and 4 year college. Suggested curriculum provides courses that students who want to work in a field of information security must learn during the college. Suggested courses are closely connected to a related field and detailed guideline is indicated to each course to educate. Suggested curriculum is required, and it combines a theoretical education that become basis and a practical education so that it is not weighted to learn theory and is not only focusing on learning simple commands. This curriculum is established to educate students countermeasures of hacking and security defend that based on scenario that connected to executive ability. This curriculum helps to achieve certificates related to a field more than paper qualification. Also, we expect this curriculum helps to train convergent information security manpower for next generation.

Design and Implementation of an Ontology-based Access System of Nutrition and Food Guide Tower in Middle School Home Economics (온톨로지 기반 중학교 기술. 가정교과 영양소의 질의응답 시스템 설계 및 구현)

  • Cho, Young-Sun;Baek, Hyeon-Gi;Kim, Jeong-Kyoum;Yu, Jeong-Su
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.3
    • /
    • pp.317-327
    • /
    • 2007
  • The purpose of this study is to consider ontology theory and get to forge design and implementation of ontology-based access system which is support to the nutrition and food guide tower of Home Economics textbooks in middle school in order to offer the way of effective learning performance. It offers a model by establishing a nutrition and food guide tower access system based on Protege-2000 framework. This system is on the basis of XML, and it makes possible to work with semantic web, a next generation internet technology, and provides a meaning structure that can be shared in the field of nutrition in order to build up the fundament of knowledge an information system for the mutual operations. A learner can systemize the knowledge through a self-information access and an instructor can also check out the degree of learner's learning-accomplishment and interests, directly putting the access system into the teaching and learning process. In addition, it is supposed that the learner can maintain a balance and healthy life by internalizing his or her knowledge throughout ontology not only in a teaching and learning process but also in a daily life.

  • PDF

A Design of an AMI System Based on an Extended Home Network for the Smart Grid (스마트 그리드를 위한 확장 홈 네트워크 기반의 AMI 시스템 설계)

  • Hwang, Yu-Jin;Lee, Kwang-Hui
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.7
    • /
    • pp.56-64
    • /
    • 2012
  • A smart grid is the next generation power grid which combines the existing power grid with information technology, so an energy efficient power grid can be provided. In this paper, in order to build an efficient smart grid an AMI system, which gears with the existing home network and provides an user friendly management function, is proposed. The proposed AMI system, which is based on an extended home network, consists of various functional units; smart meters, communication modules, home gateway, security modules, meter data management modules (MDMM), electric power application modules and so on. The proposed home network system, which can reduce electric power consumption and transmit data more effectively, is designed by using IEEE 802.15.4. The extended home gateway can exchange energy consumption information with the outside management system via web services. The proposed AMI system is designed to enable two-way communication between the home gateway and MDMM via the Internet. The AES(Advanced Encryption Standard) algorithm, which is a symmetric block cipher algorithm, is used to ensure secure information exchange. Even though the results in this study could be limited to our experimental environment, the result of the simulation test shows that the proposed system reduces electric power consumption by 4~42% on average compared to the case of using no control.

Developing and Assessing a Learning Progression for the Ecosystem (생태계에 대한 학습발달과정의 개발과 평가)

  • Yeo, Chaeyeong;Lee, Hyonyong
    • Journal of The Korean Association For Science Education
    • /
    • v.36 no.1
    • /
    • pp.29-43
    • /
    • 2016
  • There have been much efforts to reconstruct the science curriculum focusing on Disciplinary Core Ideas(DCI) in many countries such as America and Europe, the most practical effort has been to design a curriculum with learning progressions(LPs). LPs describe stepwise how students can systematically move toward the understanding of more sophisticated ideas or scientific activities and explain in succession the process of understanding the ideas while the students learn. In this study, a LP for ecosystems has been developed, and the developed LP is then evaluated accordingly. The Ecosystem is one of the DCI of the life science in Next Generation Science Standards(NGSS). The development process of the LP was set at step 4(Development, Assessment, Analysis, and Amendment), and developed through an iterative process of sequences. As a result of analyzing the developed LP, an assessment based on the LP provides reliable information to identifying student ability. This study proposes the development process of the LP and its methodological aspects to use Core Achievement Standards, Ordered Multiple-Choice items and the Rasch model. In addition, using the empirically proven LP suggests a way of strengthening curriculum linked to educational content, teaching methods and assessment. Utilizing the proposed development process in this study will be to present the standard into the direction of becoming part of the curriculum. Currently, the state of domestic research for the LP is still lacking. This study determined the development process of the LP and the need to conduct future research on the LPs.

Detection of genome-wide structural variations in the Shanghai Holstein cattle population using next-generation sequencing

  • Liu, Dengying;Chen, Zhenliang;Zhang, Zhe;Sun, Hao;Ma, Peipei;Zhu, Kai;Liu, Guanglei;Wang, Qishan;Pan, Yuchun
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.32 no.3
    • /
    • pp.320-333
    • /
    • 2019
  • Objective: The Shanghai Holstein cattle breed is susceptible to severe mastitis and other diseases due to the hot weather and long-term humidity in Shanghai, which is the main distribution centre for providing Holstein semen to various farms throughout China. Our objective was to determine the genetic mechanisms influencing economically important traits, especially diseases that have huge impact on the yield and quality of milk as well as reproduction. Methods: In our study, we detected the structural variations of 1,092 Shanghai Holstein cows by using next-generation sequencing. We used the DELLY software to identify deletions and insertions, cn.MOPS to identify copy-number variants (CNVs). Furthermore, we annotated these structural variations using different bioinformatics tools, such as gene ontology, cattle quantitative trait locus (QTL) database and ingenuity pathway analysis (IPA). Results: The average number of high-quality reads was 3,046,279. After filtering, a total of 16,831 deletions, 12,735 insertions and 490 CNVs were identified. The annotation results showed that these mapped genes were significantly enriched for specific biological functions, such as disease and reproduction. In addition, the enrichment results based on the cattle QTL database showed that the number of variants related to milk and reproduction was higher than the number of variants related to other traits. IPA core analysis found that the structural variations were related to reproduction, lipid metabolism, and inflammation. According to the functional analysis, structural variations were important factors affecting the variation of different traits in Shanghai Holstein cattle. Our results provide meaningful information about structural variations, which may be useful in future assessments of the associations between variations and important phenotypes in Shanghai Holstein cattle. Conclusion: Structural variations identified in this study were extremely different from those of previous studies. Many structural variations were found to be associated with mastitis and reproductive system diseases; these results are in accordance with the characteristics of the environment that Shanghai Holstein cattle experience.

Managing the Reverse Extrapolation Model of Radar Threats Based Upon an Incremental Machine Learning Technique (점진적 기계학습 기반의 레이더 위협체 역추정 모델 생성 및 갱신)

  • Kim, Chulpyo;Noh, Sanguk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.4
    • /
    • pp.29-39
    • /
    • 2017
  • Various electronic warfare situations drive the need to develop an integrated electronic warfare simulator that can perform electronic warfare modeling and simulation on radar threats. In this paper, we analyze the components of a simulation system to reversely model the radar threats that emit electromagnetic signals based on the parameters of the electronic information, and propose a method to gradually maintain the reverse extrapolation model of RF threats. In the experiment, we will evaluate the effectiveness of the incremental model update and also assess the integration method of reverse extrapolation models. The individual model of RF threats are constructed by using decision tree, naive Bayesian classifier, artificial neural network, and clustering algorithms through Euclidean distance and cosine similarity measurement, respectively. Experimental results show that the accuracy of reverse extrapolation models improves, while the size of the threat sample increases. In addition, we use voting, weighted voting, and the Dempster-Shafer algorithm to integrate the results of the five different models of RF threats. As a result, the final decision of reverse extrapolation through the Dempster-Shafer algorithm shows the best performance in its accuracy.

Age classification of emergency callers based on behavioral speech utterance characteristics (발화행태 특징을 활용한 응급상황 신고자 연령분류)

  • Son, Guiyoung;Kwon, Soonil;Baik, Sungwook
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.6
    • /
    • pp.96-105
    • /
    • 2017
  • In this paper, we investigated the age classification from the speaker by analyzing the voice calls of the emergency center. We classified the adult and elderly from the call center calls using behavioral speech utterances and SVM(Support Vector Machine) which is a machine learning classifier. We selected two behavioral speech utterances through analysis of the call data from the emergency center: Silent Pause and Turn-taking latency. First, the criteria for age classification selected through analysis based on the behavioral speech utterances of the emergency call center and then it was significant(p <0.05) through statistical analysis. We analyzed 200 datasets (adult: 100, elderly: 100) by the 5 fold cross-validation using the SVM(Support Vector Machine) classifier. As a result, we achieved 70% accuracy using two behavioral speech utterances. It is higher accuracy than one behavioral speech utterance. These results can be suggested age classification as a new method which is used behavioral speech utterances and will be classified by combining acoustic information(MFCC) with new behavioral speech utterances of the real voice data in the further work. Furthermore, it will contribute to the development of the emergency situation judgment system related to the age classification.

User Integrated Authentication System using EID in Blockchain Environment (블록체인 환경에서 EID를 이용한 사용자 통합 인증 시스템)

  • Kim, Jai-Yong;Jung, Yong-Hoon;Jun, Moon-Seog;Lee, Sang-Beon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.3
    • /
    • pp.24-31
    • /
    • 2020
  • Centralized systems in computing environments have various problems, such as privacy infringement due to hacking, and the possibility of privacy violations in case of system failure. Blockchain, one of the core technologies for the next generation of converged information, is expected to be an alternative to the existing centralized system, which has had various problems. This paper proposes a blockchain-based user authentication system that can identify users using EID in an online environment. Existing identification (ID)/password (PW) authentication methods require users to store personal information in multiple sites, and receive and use their respective IDs. However, the proposed system can be used without users signing up at various sites after the issuing of an EID. The proposed system issues an EID with a minimum of information, such as an e-mail address and a telephone number. By comparing the stability and efficiency of a centralized system, the proposed integrated authentication system proved to be excellent. In order to compare stability against existing systems, we chose attack methods and encroachments on the computing environment. To verify efficiency, the total throughput between the user's app, the issuance and certification-authority's servers, and the service provider's servers was compared and analyzed based on processing time per transaction.