• Title/Summary/Keyword: 전자정보실

Search Result 212, Processing Time 0.027 seconds

A Design and Development of Theme-Based Integrated Program using the Diki-3000 (디키-3000 활용 주제중심 통합 프로그램 설계 및 개발)

  • Park, Jung-Ho;Kim, Chul
    • 한국정보교육학회:학술대회논문집
    • /
    • 2011.01a
    • /
    • pp.147-151
    • /
    • 2011
  • Educational efforts in integrating various subjects which are closely related to one another have had positive results. Additionally, integrating subjects has shown to be more effective than teaching subjects independently. The purpose of this study is to propose, construct, and develop a theme-based integrated program that teaches elementary school student's subjects which are outside the regular curriculum such as electricity, electronics, programming, and energy by using Diki-3000. Thus, having considered the theoretical background of theme-based integrated program, elementary school subjects including home economics, science, social studies, and extracurricular activities have been analyzed and restructured into theme-based program. Students will learn about and familiarize themselves with these subjects by utilizing the Diki-3000 product. This program aims to improve students understanding of the aforementioned subjects by combining Diki-3000's strengths as an educational tool with the contents of theme-based integrated program. Moreover, the learning experiences gained from completing critical problem-solving activities which are beyond normal subject knowledge is expected to help develop learners' positive thinking skills.

  • PDF

Implementation of the PNNI Routing Simulator for Analyze Topology Aggregation (Topology Aggregation 분석을 위한 PNNI 라우팅 시물레이터 구현)

  • Kim, Byeon-Gon;Kim, Gwan-Ung;Jeong, Gwang-Il;Sin, Hyeon-Sun;Jeong, Gyeong-Taek;Jeon, Byeong-Sil
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.6
    • /
    • pp.259-267
    • /
    • 2002
  • In this paper, we focus on comparison and analysis of performance for existing Topology Aggregation algorithm. For these, we designed and implemented PNNI routing simulator which contain various TA schemes, and evaluate performance of TA schemes by this simulator. The PNNI 1.0 specification of the ATM Forum is recommended that hierarchical routing protocol and topology information is aggregated in the network constructed hierarchically Aggregating topology information is known as TA(Topology Aggregation) and TA is very important for scalability and security in network. Therefore, the performance of PNNI network would vary with TA schemes and routing algorithm. PNNI routing simulator can be applied to develope Routing algorithm and TA algorithm and can be develope these algorithms in short period.

An Approach for Development of Academia-Industrial Cooperation and Design Education-Centered Creative Engineering Education (산학협력과 설계 교육 중심의 창의적 공학교육 발전 방안)

  • Lee, Jae-Min
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.6
    • /
    • pp.573-581
    • /
    • 2019
  • In the era of the 4th Industrial Revolution, the necessity of training advanced engineering personnel with convergent creativity to handle technologies such as artificial intelligence, big data, and the internet of things (IoT) is increasing. In this paper, a new approach of engineering education based on academia-industrial cooperation and design-centered teaching technique for the students who need to learn practicable engineering skill with convergent creativity for the fourth industrial age is presented. It analyzes the strengths and weaknesses of the existing engineering education innovation activities, presents the practical necessities based on the experience of the educational system and the requirements of the educational environment, and analyzes the existing activities and the new roles. In particular, we discuss how to combine student-centered teaching methodology for effective design education, which is a key element of innovative engineering education. Most of the presented methods are verified by the authors' needs and effects in the education field.

A Study on Developing the Evaluation Framework for Industrial Information Systems and its Application (기업정보화 수준평가 시스템 개발 및 적용사례)

  • 이학주;임춘성
    • Proceedings of the CALSEC Conference
    • /
    • 2002.01a
    • /
    • pp.65-85
    • /
    • 2002
  • In order to achieve competitive business goals, every enterprise needs to evaluate the current level of IS(information systems) performance and their utilization. The evaluation is to measure technical capacity and operational capability of enterprise information systems and to diagnose their effectiveness of business goals and efficiency of resources. Furthermore, organizations need to apply information technology(IT) proactively instead of reactively. However. it is usually very difficult for an enterprise to accumulate knowledge acquired during construction of the information systems and apply it to maintain and evaluate them. Also. most researches regarding evaluation are limited in some parts of evaluation fields, the most prominent being lack of the entire views and integrated relationships of enterprise activities. This dissertation develops an integrated evaluation system, which is based on the continuous improvement model of information systems performance. that effectively measures the level of enterprise information systems performance. enabling enterprises to achieve their goals of information systems and related business strategies. The contents of this work are composed of the continuous improvement model of information systems performance, an integrated evaluation system for IS performance and case study.

  • PDF

A Motion Vector Re-Estimation Algorithm for Image Downscaling in Discrete Cosine Transform Domain (이산여현변환 공간에서의 영상 축소를 위한 움직임 벡터 재추정)

  • Kim, Woong-Hee;Oh, Seung-Kyun;Park, Hyun-Wook
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.39 no.5
    • /
    • pp.494-503
    • /
    • 2002
  • A motion vector re-estimation algorithm for image downscaling in discrete consine transform domain is presented. Kernel functions are difined using SAD (Aum of Absolute Difference) and edge information of a macroblock. The proposed method uses these kernel functions to re-estimate a new motion vector of the downscaled image. The motion vectors from the incoming bitstream of transcoder are reused to reduce computation burden of the block-matching motion estimation, and we also reuse the given motion vectors. Several experiments in this paper show that the computation efficiency and the PSNR (Peak Signal to Noise Ratio) and better than the previous methods.

Omnidirectional Camera Motion Estimation Using Projected Contours (사영 컨투어를 이용한 전방향 카메라의 움직임 추정 방법)

  • Hwang, Yong-Ho;Lee, Jae-Man;Hong, Hyun-Ki
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.44 no.5
    • /
    • pp.35-44
    • /
    • 2007
  • Since the omnidirectional camera system with a very large field of view could take many information about environment scene from few images, various researches for calibration and 3D reconstruction using omnidirectional image have been presented actively. Most of line segments of man-made objects we projected to the contours by using the omnidirectional camera model. Therefore, the corresponding contours among images sequences would be useful for computing the camera transformations including rotation and translation. This paper presents a novel two step minimization method to estimate the extrinsic parameters of the camera from the corresponding contours. In the first step, coarse camera parameters are estimated by minimizing an angular error function between epipolar planes and back-projected vectors from each corresponding point. Then we can compute the final parameters minimizing a distance error of the projected contours and the actual contours. Simulation results on the synthetic and real images demonstrated that our algorithm can achieve precise contour matching and camera motion estimation.

Analysis and Design of Smart-phone App. for O2O Restaurant Service (O2O 음식점 서비스 개발을 위한 스마트폰 앱의 분석/설계)

  • Cho, Byung-Ho
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.2
    • /
    • pp.125-132
    • /
    • 2017
  • O2O service contribute to sales increment by marketing of offline store using online. In particular, O2O business allowed various services by smart-phone due to rapid increase of mobile device use and various services depend on customer's location. This O2O service play major roll in real purchase making of offline store. In smart-phone apps. development for O2O service, recent an Object-oriented Analysis and Design Method, that is, UML is more useful method than Structured Analysis and Design Method. Therefore in this paper, Software analysis and design method which is smart-pone app. for O2O restaurant service is presented. Also it shows that this analysis/design method is very useful for the Restaurant O2O Commercial System production.

A Study on Prediction Model for Laundry and Toilet Water-use demand (세탁기 및 화장실 용수 수요량에 대한 예측모형 연구)

  • Myoung, Sung-Min
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.4
    • /
    • pp.327-335
    • /
    • 2019
  • This study develops a prediction model for toilet and laundry water end-uses based on surveyed data which measured housing and household characteristics of 140 households over 5 years in Korea. Classical regression model assuming a normal distribution was not appropriate and estimated parameters were biased, because the distribution of measured water-uses was left-skewed. As an alternative to this problem, we considered the distribution of weibull and lognormal for each water-uses, and three regression models were compared using log-likelihood and scale parameter. As a result, weibull regression were chosen to be appropriate for both water-uses and also presented the factors that affect each water-use. This results expect that an insight is provided on water resources utilization and theoretical support role for effective water resource management.

Development of Vehicle and Driver Management System Case Study (차량 운전자 관리 시스템 기술 개발 사례발표)

  • Yoon, Dae-Sub
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02c
    • /
    • pp.150-151
    • /
    • 2008
  • With the proliferation of vehicles and advancement of Information Technology, the technology of Telematics, which provides valuable services to people by collecting and analyzing the information from drivers, vehicles and Telematics environments (e.g. traffic information, road condition, weather information, etc.), has been a hot research area in IT and automotive recently. As the information technology revolution brings more and more assistance for driver information processing becomes increasing important. Therefore, drivers' workload is very essential factor for safety driving in Telematics environment. For managing drivers' workload effectively, ETRI haven been developing vehicle and driver management system which can collect data from drivers and vehicle in realtime and analyze the data to manage drivers' and vehcles' status since 2007. This technology will apply to commercial vehicle telematics such as texi or truck management system in the future for increasing driving safety. In this presentation, I would like to explain what we had developed so far and discuss future direction.

  • PDF

A Study on Integrity Protection of Edge Computing Application Based on Container Technology (컨테이너 기술을 활용한 엣지 컴퓨팅 환경 어플리케이션 무결성 보호에 대한 연구)

  • Lee, Changhoon;Shin, Youngjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1205-1214
    • /
    • 2021
  • Edge Computing is used as a solution to the cost problem and transmission delay problem caused by network bandwidth consumption that occurs when IoT/CPS devices are integrated into the cloud by performing artificial intelligence (AI) in an environment close to the data source. Since edge computing runs on devices that provide high-performance computation and network connectivity located in the real world, it is necessary to consider application integrity so that it is not exploited by cyber terrorism that can cause human and material damage. In this paper, we propose a technique to protect the integrity of edge computing applications implemented in a script language that is vulnerable to tampering, such as Python, which is used for implementing artificial intelligence, as container images and then digitally signed. The proposed method is based on the integrity protection technology (Docker Contents Trust) provided by the open source container technology. The Docker Client was modified and used to utilize the whitelist for container signature information so that only containers allowed on edge computing devices can be operated.