• Title/Summary/Keyword: 통신교육

Search Result 2,649, Processing Time 0.028 seconds

A Precision Positioning Method of Drone Last-mile Delivery Technology in Urban Areas (도심에서의 드론 Last-mile 배송 기술의 정밀 측위 기법)

  • Kim, Kyuseok
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.1
    • /
    • pp.60-67
    • /
    • 2021
  • Countries around the world, including the U.S. are actively researching to commercialize the logistics services using drones. In Korea, telecommunications companies as well as logistics companies are researching and developing the logistics services using drones. However, there's an environmental difference for last-mile delivery between the U.S. and Korea. In Korea, more than 77% of the population lives in apartments and the population density is the 4th highest in the world. Accordingly, in terms of the logistics services using drones, it is necessary to research it with the Korean suitable environment. In this paper, a precision positioning method of drone last-mile delivery in urban areas using short-range wireless communication and barometer is proposed. The experiment results show that the proposed method can detect a window within 2.5 meters. It is expected that the proposed method will help improve the logistics services using drones in urban areas.

Design of Intelligent Intrusion Context-aware Inference System for Active Detection and Response (능동적 탐지 대응을 위한 지능적 침입 상황 인식 추론 시스템 설계)

  • Hwang, Yoon-Cheol;Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.4
    • /
    • pp.126-132
    • /
    • 2022
  • At present, due to the rapid spread of smartphones and activation of IoT, malicious codes are disseminated using SNS, or intelligent intrusions such as intelligent APT and ransomware are in progress. The damage caused by the intelligent intrusion is also becoming more consequential, threatening, and emergent than the previous intrusion. Therefore, in this paper, we propose an intelligent intrusion situation-aware reasoning system to detect transgression behavior made by such intelligent malicious code. The proposed system was used to detect and respond to various intelligent intrusions at an early stage. The anticipated system is composed of an event monitor, event manager, situation manager, response manager, and database, and through close interaction between each component, it identifies the previously recognized intrusive behavior and learns about the new invasive activities. It was detected through the function to improve the performance of the inference device. In addition, it was found that the proposed system detects and responds to intelligent intrusions through the state of detecting ransomware, which is an intelligent intrusion type.

A Case Study on the Application of Flipped Learning in Untact Online Classes: Focusing on Social and Engineering Subjects (비대면 온라인 수업에서의 플립러닝 적용 사례연구: 사회계열 교과목과 공학계열 교과목을 중심으로)

  • Sung, Miyoung;Park, Yonghan;Jung, Se-Youn
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.5
    • /
    • pp.310-323
    • /
    • 2021
  • In this study, we analyzed the application of flipped learning in the untact online classes, focusing on thr social and engineering subjects of universities. Due to the unprecedented situation of COVID-19, the professors and learners were unable to conduct the face-to-faceclasses, and the existing flipped learning classes were analyzed separately from the social and engineering subjects. In particular, the results of this study will provide the basic data on the direction of post-corona-era university classes in that it can increase the effectiveness of flipped learning if it is linked to the flexibility of the university's academic system such as intensive course.

Introduction and Analysis of Open Source Software Development Methodology (오픈소스 SW 개발 방법론 소개 및 분석)

  • Son, Kyung A;Yun, Young-Sun
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.163-172
    • /
    • 2020
  • Recently, concepts of the Fourth Industrial Revolution technologies such as artificial intelligence, big data, and cloud computing have been introduced and the limits of individual or team development policies are being reviewed. Also, a lot of latest technology source codes have been opened to the public, and related studies are being conducted based on them. Meanwhile, the company is applying the strengths of the open source software development methodology to proprietary software development, and publicly announcing support for open source development methodology. In this paper, we introduced several software development methodology such as open source model, inner source model, and the similar DevOps model, which have been actively discussed recently, and compared their characteristics and components. Rather than claiming the excellence of a specific model, we argue that if the software development policy of an individual or affiliated organization is established according to each benefit, they will be able to achieve software quality improvement while satisfying customer requirements.

Modeling on Policy Conflict for Managing Heterogeneous Security Systems in Distributed Network Environment (분산 환경에서 이종의 보안시스템 관리를 위한 정책 충돌 모델링)

  • Lee, Dong-Young;Seo, Hee-Suk;Kim, Tae-Kyung
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.2
    • /
    • pp.1-8
    • /
    • 2009
  • Enterprise security management system proposed to properly manage heterogeneous security products is the security management infrastructure designed to avoid needless duplications of management tasks and inter-operate those security products effectively. In this paper, we defined the security policies using Z-Notation and the detection algorithm of policy conflict for managing heterogeneous firewall systems. It is designed to help security management build invulnerable security policies that can unify various existing management infrastructures of security policies. Its goal is not only to improve security strength and increase the management efficiency and convenience but also to make it possible to include different security management infrastructures while building security policies. With the process of the detection and resolution for policy conflict, it is possible to integrate heterogeneous security policies and guarantee the integrity of them by avoiding conflicts or duplications among security policies. And further, it provides convenience to manage many security products existing in large networks.

A study on modularization of public data that can be used universally in the field of big data education (빅데이터교육 현장에서 범용적으로 활용 가능한 공공데이터 모듈화 연구)

  • Su-Youn Choi;Jong-Youel Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.655-661
    • /
    • 2023
  • Big data, an important element of the 4th industrial revolution, is actively opening public data in public institutions and local governments. In the public data portal, everyone can conveniently search for data and check related data, but only those in ICT-related fields are using public data. Although data held by public institutions is open to citizens, it is difficult for anyone to easily utilize public data to develop applications. In this paper, data provided in open API format from public data portals has XML and JSON formats. In this study, we are a method of modularizing public data in XML format into a part that can be easily developed by linking it to a GUI interface. Based on the necessary public data, we propose a way to easily develop mobile programs and promote the use of public data.

Integrated Data Model of Topographic and Cadastral Information in LIS (토지정보체계에서 지형 및 지적 정보의 공동 활용에 관한 연구)

  • Lee, Suk Kun;Kim, Gab Jin
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.3D
    • /
    • pp.541-547
    • /
    • 2006
  • With the new paradigm of ubiquitous in the developed computing technology, it is urgently necessary to research GIS fields centering around positioning techniques. The intention of this study is to propose implementation methods for integrating topographic and cadastral data. For this purpose an integrated data model is formed to coincide the graphic data of cadastral map with that of topographic map. As a result, the integrated data model could be built by harmonizing cadastral map with topographic map. We suggest data model for connecting with other information systems in the conditions of data uniformity and implementation. This data implementation models suggested in this research can provide a good reference for the future implementation of other systems. This results will be efficiently used as basis for practical use in ubiquitous environments of spatial informations.

A Study of The Present State Analysis and Development Plans About Construction Monitoring and Monitoring Industry (건설 계측 및 계측업의 현황 분석과 발전 방안 연구)

  • Woo, Jong-Tae
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.30 no.2D
    • /
    • pp.163-169
    • /
    • 2010
  • Construction monitoring and monitoring industry have been rapidly developed with advance of IT industry and telecommunication. However institutional, legal supports that need to settle the construction monitoring are practically inadequate. So development plans that are reflected enquete results about the present state of construction monitoring are considered. A way that consider establishment Korea construction monitoring association and society, deal with relevant law appointing monitoring industry, consider enactment and revision of construction monitoring design standard and specifications, appoint practical construction monitoring educational institution, appoint an efficiency test specialty institution of monitoring equipment, consider the term of guarantee of monitoring equipment consider enactment and revision of estimating cost of construction measurement, consider ratio of monitoring equipment loss for developing construction monitoring and monitoring industry are proposed.

A Study on the Consumption Patterns of Poor Households (빈곤계층의 소비패턴에 관한 연구 : 2007년과 2008년의 변화 비교)

  • Joung, Won Oh;Lee, Sun Jeong
    • Korean Journal of Social Welfare Studies
    • /
    • v.42 no.1
    • /
    • pp.305-331
    • /
    • 2011
  • This study analyzes the consumption patterns of the poor households. The first objective of this analysis is to show that the group living in poverty get not one consumption pattern but several types of consumption patterns. The second objective is to understand what factors effect the consumption patterns. This study use the data of Korea Welfare Panel Study in 2008 & 2009. In oder to achieve first goal, We conduct factor analysis and cluster analysis. And to achieve second goal, We conduct multinomial logistic Analysis. Major findings are as follows. First we find six patterns of consuming types of the poor households. They are education oriented consuming type, diet oriented type, social network oriented type, transportation-communication oriented type, health & medical oriented type, and housing expenditure oriented type. Second we find these consumption patterns are effected by not economic factors but socio-populational factors, especially by life cycle of members of household.

Effects of Soil Water on Soil Environment and Yield of Helianthus tuberosus (토양수분이 돼지감자(Helianthus tuberosus L.)의 토양환경과 수량에 미치는 영향)

  • Yang, C.J.;Han, S.J.;Chang, K.J.
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.19 no.1
    • /
    • pp.61-73
    • /
    • 2017
  • This study aimed to determine the effect of organic matter content and water condition in soil on yield and sugar content of two varieties of Helianthus tuberosus. The plants were grown with high and low organic soil either under irrigation or no irrigation. In result, the yield of Helianthus tuberosus was higher about 7kg in soil with high organic matter than in soil with low organic matter, while it was higher about 11kg under the irrigation than under no irrigation. The yield of white variety was higher about 9kg than that of purple variety. Under the irrigation, a 12kg and 9kg of higher yields were observed in the soil with high and low organic matter content, respectively, than under no irrigation.