• Title/Summary/Keyword: Hyper-connection

Search Result 40, Processing Time 0.021 seconds

Future Army Super-Connected New Concept Weapon System (미래 육군의 초연결 신개념 무기체계)

  • Lee, Kyoung-Rok;Jung, Min-Sub;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.663-667
    • /
    • 2020
  • By 2050, the technologies of the fourth industrial revolution currently being discussed will become highly mature and face a turning point in human civilization. Among them, the most innovative technologies will be artificial intelligence, robots, virtual reality and hyper-connected networks. These technologies will transform not only human life but also the appearance of the battlefield. Therefore, in 2050, the Army should concentrate all its capabilities on developing new concept weapons systems based on superintelligence and hyperconnectivity that converge and integrate these technologies.

RECURRENT NEURAL NETWORKS -What Do They Learn and How\ulcorner-

  • Uchikawa, Yoshiki;Takase, Haruhiko;Watanabe, Tatsumi;Gouhara, Kazutoshi
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1005-1008
    • /
    • 1993
  • Supervised learnmg 01 recurrent neural networks (RNNs) is discussed. First, we review the present state of art, featuring their major properties in contrast of those of the multilayer neural networks. Then, we concisely describe one of the most practical learning algorithms, i.e. backpropagation through time. Revising the basic formulation of the learning algorithms, we derive a general formula to solve for the exact solution(s) of the whole connection weights w of RNNs. On this basis we introduce a novel interpretation of the supervised learning. Namely, we define a multidimensional Euclidean space, by assigning the cost function E(w) and every component of w to each coordinate axis. Since E=E(w) turns up as a hyper surface in this space, we refer to the surface as learning surface. We see that topological features of the learning surface are valleys and hills. Finally, after explicating that the numerical procedures of learning are equivalent to descending slopes of the learning surface along the steepest gradient, we show that a minimal value of E(w) is the intersection of curved valleys.

  • PDF

A Receiver-Aided Seamless And Smooth Inter-RAT Handover At Layer-2

  • Liu, Bin;Song, Rongfang;Hu, Haifeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4015-4033
    • /
    • 2015
  • The future mobile networks consist of hyper-dense heterogeneous and small cell networks of same or different radio access technologies (RAT). Integrating mobile networks of different RATs to provide seamless and smooth mobility service will be the target of future mobile converged network. Generally, handover from high-speed networks to low-speed networks faces many challenges from application perspective, such as abrupt bandwidth variation, packet loss, round trip time variation, connection disruption, and transmission blackout. Existing inter-RAT handover solutions cannot solve all the problems at the same time. Based on the high-layer convergence sublayer design, a new receiver-aided soft inter-RAT handover is proposed. This soft handover scheme takes advantage of multihoming ability of multi-mode mobile station (MS) to smooth handover procedure. In addition, handover procedure is seamless and applicable to frequent handover scenarios. The simulation results conducted in UMTS-WiMAX converged network scenario show that: in case of TCP traffics for handover from WiMAX to UMTS, not only handover latency and packet loss are eliminated completely, but also abrupt bandwidth/wireless RTT variation is smoothed. These delightful features make this soft handover scheme be a reasonable candidate of mobility management for future mobile converged networks.

A Case Study on the Cost-Effectiveness Analysis for the Feasibility Study of Public Project Related to Personal Information Protection (개인정보보호 관련 공공사업의 타당성 조사를 위한 비용효과분석 사례 연구)

  • Jo, Illhyung;Kim, Jin;Yoo, Jinho
    • Knowledge Management Research
    • /
    • v.20 no.3
    • /
    • pp.91-106
    • /
    • 2019
  • In the era of the 4th Industrial Revolution, the importance of information protection is increasing day by day with the advent of the 'hyper-connection society', and related government financial investment is also increasing. The source of the government's fiscal investment projects is taxpayers' money. Therefore, the government needs to evaluate the effectiveness and feasibility of the project by comparing the public benefits created by the financial investment projects with the costs required for it. At present, preliminary feasibility study system which evaluates the feasibility of government financial investment projects in Korea has been implemented since 1994, but most of them have been actively carried out only in some fields such as large SOC projects. In this study, we discuss the feasibility evaluation of public projects for the purpose of information security. we introduce the case study of the personal information protection program of Korean public institutions and propose a cost-effectiveness analysis method that can be applied to the feasibility study of the information protection field. Finally, we presented the feasibility study and criteria applicable in the field of information security.

Evolution of Business Model: From Plug To Platform - Dawon DNS Business Case- (비즈니스 모델의 진화: 플러그에서 플랫폼으로 -다원 DNS IoT 기술의 사례-)

  • Park, MinHyuk;Yeo, Unnam;Lee, Jungwoo
    • Journal of Information Technology Services
    • /
    • v.20 no.5
    • /
    • pp.105-118
    • /
    • 2021
  • As we enter the era of the 4th industrial revolution, information and communication technologies, including artificial intelligence and big data, are converging throughout society. Especially, as the importance of the social foundation of hyper-connection grows, the social influence of IoT, a network of connecting objects, people, and various entities, is also gradually expanding. In addition, as a pandemic, COVID-19, continues, interests in untact-oriented technology and service development are growing more than ever, and each company is trying to establish a core competency strategy to gain an edge in competition in the changing society. This study is a case study centered on Dawon DNS, a company that provides an IoT-based AI smart plug platform. Dawon DNS is broadening its services while developing products by applying advanced technologies, and this study is aiming to investigate the core competencies of the business evolution process. The obtained result of this study will provide implications for companies to become more competitive by suggesting the attitudes and strategies that startups should have during the transforming business environment.

Globular Clusters in the NGC 4839 Group Merging with Coma: What Do They Tell about the Group History?

  • O, Seong-A;Lee, Myung Gyoon
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.46 no.1
    • /
    • pp.54.3-54.3
    • /
    • 2021
  • The Coma cluster serves as an ideal laboratory to study the cluster assembly history. It is known as a typical example of relaxed galaxy clusters. However, recent X-ray, radio and optical observations revealed a number of substructures in Coma. The NGC 4839 group is an interesting substucture in the sense that it is overlappled with the X-ray bright component in the south-west region. Recent hydrodynamical simulations in the literature suggest that the NGC 4839 group came from the north-east direction of Coma, passed the apocenter about 1 Gyr ago, and started a second infall to the Coma core recently. Interestingly a number of E+A galaxies are located along the filament connecting the NGC 4839 group and the Coma core. We are surveying a wide area covering the NGC 4839 group to search for globular clusters and use them to investigate any connection between the globular clusters and the merger scenario of the NGC 4839 group. We utilized Subaru Hyper Suprime-Cam archival images of two circular fields with diameter ~1.8 deg, covering the Coma core and the NGC 4839 group. We discuss the results with regard to the formation history of the NGC 4839 group.

  • PDF

Arguments and Some Issues to be Considered for Building the New Administration Capital City in Korea (신 행정수도 건설의 논거와 과제)

  • 안성호
    • Journal of the Korean Geographical Society
    • /
    • v.38 no.2
    • /
    • pp.298-311
    • /
    • 2003
  • Building the new administration capital city, one of presidential candidate Moo-Hyun Rho's election pledges, is now listed as a priority national policy agenda of the Participation Government. However, so many people's negative attitudes ranging from cynical skepticism to firm objections against the national policy agenda may threaten its smooth policy actualization. At this juncture, this paper attempts to present persuasive arguments and discuss some critical issues to be considered for building the new administration capital city successfully. The paper begins with taking a look at the current state of hyper-concentration of Seoul agglomeration area and its harmful effects, paints a vision of 'an evenly developed country as a whole' via illustrating the vision from the Swiss case, and reviews the performance of the precedent governments' reform measures for rectifying the hyper-concentration of Seoul agglomeration area. And then, the paper argues for building the new administration capital city as a potent solution to the problem of excessive concentration of activities in Seoul agglomeration area, as well as a driving force to spur the government to realize the Participation Government' enthusiastic vision: 'a decentralized and evenly developed country as a whole' and 'the hub country in the Northeast Asia'. In addition, the paper discusses the location of the new administration capital city in connection with the forthcoming national unification. Lastly, the paper deals with the important issues such as the procedure of people's approval, the population size and legal status of the new administration capital city, the relationship between building the new administration capital city and decentralization reform, etc.

A Study on the Establishment of Entropy Source Model Using Quantum Characteristic-Based Chips (양자 특성 기반 칩을 활용한 엔트로피 소스 모델 수립 방법에 관한 연구)

  • Kim, Dae-Hyung;Kim, Jubin;Ji, Dong-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.140-142
    • /
    • 2021
  • Mobile communication technology after 5th generation requires high speed, hyper-connection, and low latency communication. In order to meet technical requirements for secure hyper-connectivity, low-spec IoT devices that are considered the end of IoT services must also be able to provide the same level of security as high-spec servers. For the purpose of performing these security functions, it is required for cryptographic keys to have the necessary degree of stability in cryptographic algorithms. Cryptographic keys are usually generated from cryptographic random number generators. At this time, good noise sources are needed to generate random numbers, and hardware random number generators such as TRNG are used because it is difficult for the low-spec device environment to obtain sufficient noise sources. In this paper we used the chip which is based on quantum characteristics where the decay of radioactive isotopes is unpredictable, and we presented a variety of methods (TRNG) obtaining an entropy source in the form of binary-bit series. In addition, we conducted the NIST SP 800-90B test for the entropy of output values generated by each TRNG to compare the amount of entropy with each method.

  • PDF

Additive Manufacturing for Sensor Integrated Components (센서 융합형 지능형 부품 제조를 위한 적층 제조 기술 연구)

  • Jung, Im Doo;Lee, Min Sik;Woo, Young Jin;Kim, Kyung Tae;Yu, Ji-Hun
    • Journal of Powder Materials
    • /
    • v.27 no.2
    • /
    • pp.111-118
    • /
    • 2020
  • The convergence of artificial intelligence with smart factories or smart mechanical systems has been actively studied to maximize the efficiency and safety. Despite the high improvement of artificial neural networks, their application in the manufacturing industry has been difficult due to limitations in obtaining meaningful data from factories or mechanical systems. Accordingly, there have been active studies on manufacturing components with sensor integration allowing them to generate important data from themselves. Additive manufacturing enables the fabrication of a net shaped product with various materials including plastic, metal, or ceramic parts. With the principle of layer-by-layer adhesion of material, there has been active research to utilize this multi-step manufacturing process, such as changing the material at a certain step of adhesion or adding sensor components in the middle of the additive manufacturing process. Particularly for smart parts manufacturing, researchers have attempted to embed sensors or integrated circuit boards within a three-dimensional component during the additive manufacturing process. While most of the sensor embedding additive manufacturing was based on polymer material, there have also been studies on sensor integration within metal or ceramic materials. This study reviews the additive manufacturing technology for sensor integration into plastic, ceramic, and metal materials.

Research about Security Attack Methods to Arduino Boards Using Temporary Files Data Manipulation (임시파일 데이터 조작을 통한 아두이노 보드 공격 기법에 관한 연구)

  • Lee, Woo Ho;Jung, Hyun Mi;Jeong, Kimoon
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.21-27
    • /
    • 2017
  • Internet of Things(IoT), which is developing for the hyper connection society, is based on OSHW (Open Source Hardware) such as Arduino and various small products are emerging. Because of the limitation of low performance and low memory, the IoT is causing serious information security problem that it is difficult to apply strong security technology. In this paper, we analyze the vulnerability that can occur as a result of compiling and loading the application program of Arduino on the host computer. And we propose a new attack method that allows an attacker to arbitrarily change the value input from the sensor of the arduino board. Such as a proposed attack method may cause the arduino board to misinterpret environmental information and render it inoperable. By understanding these attack techniques, it is possible to consider how to build a secure development environment and cope with these attacks.