• Title/Summary/Keyword: 소프트웨어 진화

Search Result 200, Processing Time 0.027 seconds

Planning of Various Storytelling Virtual Reality Game Contents for Brain Enhancement (두뇌증진을 위한 다양한 스토리텔링 가상현실 게임 콘텐츠 기획)

  • Jin, Hwa-su;Song, Eun-jee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.323-325
    • /
    • 2021
  • With the recent revitalization of virtual reality and game industries, digital therapeutics for medical purposes are emerging. Digital therapeutics refer to sports-based therapeutics such as virtual reality contents and games that are effective in preventing, managing, and treating diseases, not drugs. Through this study, we plan and develop contents for healing and brain enhancement using virtual reality technology as a therapeutic digital therapy. Through this, it can help to improve the brain of children who are dependent on electronic devices in the digital age and rarely use their brains.

  • PDF

A study on the Future Development Direction of the Virtual world Metaverse Industry (가상세계 메타버스 산업의 미래 발전방향에 대한 고찰)

  • Jin, Hwa-su;Song, Eun-jee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.432-433
    • /
    • 2021
  • The technology to build the virtual world metaverse is based on virtual augmented reality and electronic communication technology. Metaverse is establishing itself as a new industry in non-face-to-face society as a platform where users can engage in various activities such as play, work, consumption, and communication through avatars. In this paper, while interest in metaverse is increasing and it is expected to develop into a promising industry that will create a new market, this paper will examine the fields of application of metaverse and consider the development direction of the future metaverse industry.

  • PDF

A Logical Cell-Based Approach for Robot Component Repositories (논리적 셀 기반의 로봇 소프트웨어 컴포넌트 저장소)

  • Koo, Hyung-Min;Ko, In-Young
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.8
    • /
    • pp.731-742
    • /
    • 2007
  • Self-growing software is a software system that has the capability of evolving its functionalities and configurations by itself based on dynamically monitored situations. Self-growing software is especially necessary for intelligent service robots, which must have the capability to monitor their surrounding environments and provide appropriate behaviors for human users. However, it is hard to anticipate all situations that robots face with, and it is hard to make robots have all functionalities for various environments. In addition, robots have limited internal capacity. To support self-growing software for intelligent service robots, we are developing a cell-based distributed repository system that allows robots and developers transparently to share robot functionalities. To accomplish the creation of evolutionary repositories, we invented the concept of a cell, which is a logical group of distributed repositories based upon the functionalities of components. In addition, a cell can be used as a unit for the evolutionary growth of the components within the repositories. In this paper, we describe the requirements and architecture of the cell-based repository system for self-growing software. We also present a prototype implementation and experiment of the repository system. Through the cell-based repositories, we achieve improved performance of self-growing actions for robots and efficient sharing of components among robots and developers.

A study on the Diminishing Manufacturing Source and Material Shortages Management and Cost Analysis based on Pilot Application of the Guided Weapons (부품단종관리 방안 및 유도무기 시범적용을 통한 비용분석)

  • Park, Kwang-Hyo;Shim, Bo-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.3
    • /
    • pp.390-398
    • /
    • 2020
  • To solve the problem of frequent component failure in guided weapons, a process of component failure in developed countries was investigated and analyzed. The suitability of component control, including risk assessment, analysis of operational impact, and the establishment of response measures, was also demonstrated. In addition, the economic effects of component control were presented by estimating the costs incurred if component control is performed in advance, after-sales, and non-management. DMSMS problems refer to losses or impending losses of an item, raw material, or software manufacturer or supplier. A problem with the discontinuation of parts occurs when the manufacturer or supplier ceases to produce and support the necessary parts, materials, or software, or when the supply of raw materials is no longer possible. Hence, it is important to recognize that failure to all parts of the system can occur.

An Exploratory Study on Determinants Affecting R Programming Acceptance (R 프로그래밍 수용 결정 요인에 대한 탐색 연구)

  • Rubianogroot, Jennifer;Namn, Su Hyeon
    • Management & Information Systems Review
    • /
    • v.37 no.1
    • /
    • pp.139-154
    • /
    • 2018
  • R programming is free and open source system associated with a rich and ever-growing set of libraries of functions developed and submitted by independent end-users. It is recognized as a popular tool for handling big data sets and analyzing them. Reflecting these characteristics, R has been gaining popularity from data analysts. However, the antecedents of R technology acceptance has not been studied yet. In this study we identify and investigates cognitive factors contributing to build user acceptance toward R in education environment. We extend the existing technology acceptance model by incorporating social norms and software capability. It was found that the factors of subjective norm, perceived usefulness, ease of use affect positively on the intention of acceptance R programming. In addition, perceived usefulness is related to subjective norms, perceived ease of use, and software capability. The main difference of this research from the previous ones is that the target system is not a stand-alone. In addition, the system is not static in the sense that the system is not a final version. Instead, R system is evolving and open source system. We applied the Technology Acceptance Model (TAM) to the target system which is a platform where diverse applications such as statistical, big data analyses, and visual rendering can be performed. The model presented in this work can be useful for both colleges that plan to invest in new statistical software and for companies that need to pursue future installations of new technologies. In addition, we identified a modified version of the TAM model which is extended by the constructs such as subjective norm and software capability to the original TAM model. However one of the weak aspects that might inhibit the reliability and validity of the model is that small number of sample size.

2013, 달라지는 클라우드 컴퓨팅

  • Yang, Hui-Dong;Hwang, Se-Un
    • Information and Communications Magazine
    • /
    • v.30 no.4
    • /
    • pp.23-28
    • /
    • 2013
  • 개념적으로 존재하던 클라우드 컴퓨팅의 사용이 본격적으로 심화되면서 기업들의 클라우드 컴퓨팅에 대한 개념과 생각에도 많은 변화가 생기게 되었다. 클라우드 컴퓨팅 구축이 더욱 가속화되는 가운데, 그로 인한 비용절감이나 투자수익 창출 효과에 대한 검증이 활발해질 것으로 예측됐다. 시대를 뒤바꾸는 혁신적인 기술도 잇달아 등장할 것이란 기대도 높다. 2013년은 클라우드 컴퓨팅의 발전에 또 한번의 변곡점이 될 것으로 전망된다. 본 고에서는 2013년 클라우드 컴퓨팅에 관한 예측 몇 가지를 살펴보고자 한다. 첫째, 중소기업에서의 클라우드 컴퓨팅 사용 및 정착이 가속화될 것으로 보인다. 대기업의 경우에는 기존에 구축되어 있는 IT 시스템에 대한 거버넌스 체계를 완성해 나가고 있는 상황 속에서 중앙집중형과 사용자 편의성이 강화된 클라우드 컴퓨팅을 도입하기 위해서는 아직 추구 해야 할 과제가 많다. 하지만 중소기업은 예산을 문제로 대기업과 같은 수준의 IT 인프라를 갖추지 못하고 있기 때문에 클라우드 컴퓨팅 도입으로 비용대비 고효율의 IT 인프라를 갖출 수 있다. 둘째, CSP, CSB와 통합허브가 성장할 것이다. 플랫폼 전쟁이 시장 점유율 '횡령' 싸움임을 CSP들이 깨닫게 됨에 따라 이러한 가격 경쟁들은 더 잦아질 것으로 전망된다. 그리고 2013년 클라우드 벤더들은 클라우드 가격 책정이 비용-수익 관리(costyield management)의 연장선에 있음도 알게 될 것이다. 핵심은 효율적 설계와 저비용 운영, 그리고 무엇보다 높은 사용률에 있다. 또한 기업들이 점점 많은 애플리케이션을 소프트웨어 형태로 구매하고 있기 때문에 애플리케이션 자체를 통합하는 문제, 애플리케이션에 대한 보안과 감사 프로세스개발 등의 문제가 제기되고 있다. 시스템 통합 서비스와 통합 허브는 이런 문제를 해결하기 위해 노력하게 될 것이다 셋째, 2013년은 하이브리드 클라우드 컴퓨팅이 급부상할 것으로 전망된다. 앞으로는 클라우드 컴퓨팅 시장에서 공급업체끼리 경쟁하는 것은 의미가 없으며 기업들은 절대 한 가지 클라우드 기술이나 공급자에 안주하지 않을 것이다. 이것은 곧 2013년에는 하이브리드 및 이종 클라우드 컴퓨팅이 각광 받을 것을 의미한다. 이러한 하이브리드 클라우드 컴퓨팅을 도입하기 위해서는 클라우드 컴퓨팅의 단점과 문제 해결을 위해 하나의 목적을 가지고 다양한 산업체들이 모여 경쟁업체이면서도 협력관계를 이루는 것이 중요하다. 넷째, 멀티 디바이스를 이용한 클라우드 사용이 폭발적으로 증가될 것으로 보인다. 1인당 여러 대의 단말 보유, 이동성 향상 요구, 4G 확산 등 모바일 시장을 중심으로 한 환경 변화로 인해 이전보다 한층 진화된 클라우드 기반의 서비스가 다양하게 등장할 것으로 예상된다. 또한 4G 시대가 본격적으로 개막되면서 데이터 및 앱을 저장하는 것뿐만 아니라 앱을 실행하는 프로세싱까지도 모두 인터넷 상의 서버에서 이루어지는 방식인 클라우드 스트리밍(Cloud Streaming)이라는 신기술이 상용화될 것으로 기대된다. 다섯째, 2013년에는 'XaaS(Everything as a Service)' 개념이 보다 확장될 것이다. 클라우드 컴퓨팅의 사용이 확산됨에 따라 하드웨어의 도입, 소프트웨어 및 데이터베이스 개발과 구축, IT 서비스 등 IT 인프라 스트럭처의 토대에 많은 변화가 생겼다. 인프라스트럭처는 더 이상 고정불변의 자산으로서가 아니라 유연성과 확장성을 강조하는 서비스로서의 특징으로 점점 부각되고 있다. 따라서 모든 IT 인프라스트럭처가 Ondemand화 서비스로 제공되는 비즈니스 모델들이 부상하고 있으며 플랫폼, 하드웨어 데이터베이스 등 모든 IT 요소를 서비스 형태로 제공하는 XaaS가 2013년 새로운 개념으로 떠오를 것으로 기대된다. 여섯번째로 스토리지를 둘러싼 가격 경쟁이 더욱 심화될 것으로 보인다. 업체들의 가격 인하는 앞으로도 계속될 것이며 사용자들에게도 큰 혜택으로 돌아갈 것이지만 사람들은 가격만으로 서비스를 선택하지 않을 것이기 때문에 가격보다는 차별화된 기능 및 서비스 전략이 필요할 것이다.

A Study on Verification of Security Threat and Method of Response for Multimedia Broadcasting and Communication Convergence Services (멀티미디어 방송통신 융합서비스에 대한 보안위협 검증 및 대응방안 연구)

  • Jung, Chan-Suk;Shin, Yong-Tae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.6
    • /
    • pp.3032-3042
    • /
    • 2013
  • Multimedia Broadcast communication convergence services are broadcast communication convergence services new form that combines a platform technology for driving the application services of various media-related Internet and TV devices. It is possible to mounted the embedded OS of TV existing technology and to support a variety of smart application services to a TV technology evolved form equipped with various platforms on the OS. The services that are fused in this way, multi-media broadcasting communication convergence new services Open IPTV, Smart TV, mobile IPTV, and N-screen, are services actively focusing on three companies domestic services. However, in order to use the software to connect to the Internet for the provision of services, is inherent software vulnerabilities or the Internet. These vulnerabilities can lead to serious security incidents. Therefore, in this paper, or be able to derive the potential security threats that occur in multimedia broadcasting service environment based on security threats and vulnerabilities of existing threats lead to such security incidents in fact, the security it was carried out through a mock hacking validation for threats. It was also suggested necessary technical security measures that can be protect against security threats revealed by using the verification result through the penetration testing. Has been presented countermeasures in fusion communication service environment of multimedia broadcasting by using these results.

Hypernetwork Classifiers for Microarray-Based miRNA Module Analysis (마이크로어레이 기반 miRNA 모듈 분석을 위한 하이퍼망 분류 기법)

  • Kim, Sun;Kim, Soo-Jin;Zhang, Byoung-Tak
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.6
    • /
    • pp.347-356
    • /
    • 2008
  • High-throughput microarray is one of the most popular tools in molecular biology, and various computational methods have been developed for the microarray data analysis. While the computational methods easily extract significant features, it suffers from inferring modules of multiple co-regulated genes. Hypernetworhs are motivated by biological networks, which handle all elements based on their combinatorial processes. Hence, the hypernetworks can naturally analyze the biological effects of gene combinations. In this paper, we introduce a hypernetwork classifier for microRNA (miRNA) profile analysis based on microarray data. The hypernetwork classifier uses miRNA pairs as elements, and an evolutionary learning is performed to model the microarray profiles. miTNA modules are easily extracted from the hypernetworks, and users can directly evaluate if the miRNA modules are significant. For experimental results, the hypernetwork classifier showed 91.46% accuracy for miRNA expression profiles on multiple human canters, which outperformed other machine learning methods. The hypernetwork-based analysis showed that our approach could find biologically significant miRNA modules.

A Study on the efficiency comparison about methods of the deployment of AIN (고도 지능망 구조의 망 연결 방식 비교를 통한 효율성에 관한 연구)

  • 장경훈;조현준;이성근;이영호;이재섭;김덕진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.11
    • /
    • pp.2179-2188
    • /
    • 1994
  • In this paper, we studied the deployment of AIN(Advanced Intelligent Network) that was recommended by ITU-T there are five methods of deployment. Here we divided these methods into two types. One is the direct connection with SCP(Service Control Point) and IP(Intelligent Peripheral) via No.7 and the other is the indirect connection with SCP and IP Through SSP(Service Switching Point). First, we suggested the structure of AIN SSP and defined S/W functional blocks. Second, we proposed H/W functional extension for interaction with IP. On the basis of the suggested structure, we mathematically evaluated and simulated two types of the deployment of AIN. In the result, we knew that, in comparison with the indirect method, the direct method was effective.

  • PDF

A Study on The Dangers and Their Countermeasures of Autonomous Vehicle (자율주행자동차 위험 및 대응방안에 대한 고찰)

  • Jung, Im Y.
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.6
    • /
    • pp.90-98
    • /
    • 2020
  • Modern vehicles are evolving from manual to automatic driving. As the ratio of electrical equipment and software increases inside the vehicle, vehicles that support autonomous driving are becoming another open computer system that can communicate with the outside. The safety of the vehicle means the safety of both the passenger and the non-passenger. It is not clear whether the safety problem of ultimate autonomous vehicles can be solved by the current solution of computer systems related to fault tolerance and security. Autonomous vehicles should not be dangerous to people after they are released to the market, so it is necessary to proactively diagnose all the risks that can be predicted with current technology. This paper examines the current developments of autonomous vehicles and analyzes their dangers that threaten driving safety, as well as their countermeasures.