• Title/Summary/Keyword: Software Evolution

Search Result 194, Processing Time 0.052 seconds

5GCHAMPION - Disruptive 5G Technologies for Roll-Out in 2018

  • Strinati, Emilio Calvanese;Mueck, Markus;Clemente, Antonio;Kim, Junhyeong;Noh, Gosan;Chung, Heesang;Kim, Ilgyu;Choi, Taesang;Kim, Yeongjin;Chung, Hyun Kyu;Destino, Giuseppe;Parssinen, Aarno;Chuberre, Nicolas;Vautherin, Benoit;Deleu, Thibault;Gineste, Mathieu;Korvala, Aki
    • ETRI Journal
    • /
    • v.40 no.1
    • /
    • pp.10-25
    • /
    • 2018
  • The 5GCHAMPION Europe-Korea collaborative project provides the first fully-integrated and operational 5G prototype in 2018, in conjunction with the 2018 PyeongChang Winter Olympic Games. The corresponding technological advances comprise both an evolution and optimization of existing technological solutions and disruptive new features, which substantially outpace previous generations of technology. In this article, we focus on a subset of three disruptive technological solutions developed and experimented on by 5GCHAMPION during the 2018 PyeongChang Olympic Games: high speed communications, direct satellite-user equipment communications, and post-sale evolution of wireless equipment through software reconfiguration. Evaluating effectiveness and performing trials for these key 5G features permit us to learn about the actual maturity of 5G technology prototyping and the potential of new 5G services for vertical markets and end user enhanced experience two years before the launch of large-scale 5G services.

Meaurement Algorithms for EDGE Terminal Performance Test (EDGE 단말기 성능 테스트를 위한 측정 알고리즘)

  • Kang, Sung-Jin;Hong, Dae-Ki;Kim, Nam-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.12
    • /
    • pp.2719-2730
    • /
    • 2009
  • In this paper, we implement the measurement functionality for performance measurements of EDGE (Enhanced Data Rates for GSM Evolution) terminal by using software. Generally speaking, the receiving algorithms in normal MODEM cannot be used directly to a measurement system due to the lack of accuracy. Therefore, we propose a new receiver algorithm for precise EDGE signal measurements. In the proposed algorithm, 2-stage (coarse stage, fine stage) parameters estimation (symbol-timing, frequency offset, carrier phase) scheme is used. To improve the estimation accuracy, we increase the number of the received signal samples by interpolation. The proposed EDGE signal measurement algorithm can be used for verifying the hardware measurement system, and also can be used for the commercial systems through software optimization.

Fast Video Data Encryption for Swarm UAVs Using Hybrid Crypto-system (하이브리드 암호시스템을 이용한 군집 영상의 고속 암호화)

  • Cho, Seong-Won;Kim, Jun-Hyeong;Chae, Yeo-Gyeong;Joung, Yu-Min;Park, Tae-Kyou
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.46 no.7
    • /
    • pp.602-609
    • /
    • 2018
  • This paper proposes the hybrid crypto-system for fast video data encryption of UAV(Unmanned Aerial Vehicle) under the LTE(Long-Term Evolution) wireless communication environment. This hybrid crypto-system is consisted of ECC(Elliptic Curve Cryptography) public key algorithm and LEA(Light-weight Encryption Algorithm) symmetric key algorithm. ECC is a faster public key algorithm with the same security strength than RSA(Rivest Shamir Adleman), and Korean standard LEA with the same key size is also a faster symmetric key algorithm than AES(Advances Encryption Standard). We have implemented this hybrid crypto-system using OpenSSL, OpenCV and Socket programs under the Swarm 8-UAV. We have shown the efficient adaptability of this hybrid crypto-system for the real-time swarm UAV through the experiments under the LTE communication environment.

Exploratory Data Analysis on the Connection of the Software Curriculum between the Primary and Secondary Curriculums and the Higher Curriculums (초중등 교육과정과 고등교육과정의 소프트웨어 교과의 연계 문제에 대한 탐색적 데이터 분석)

  • Mi-yeon Kim;Choong-ho Lee
    • Journal of Practical Engineering Education
    • /
    • v.16 no.3_spc
    • /
    • pp.283-290
    • /
    • 2024
  • Software education is an important subject in the era of forth industrial evolution generation, and the number of hours is gradually expanding in Korea's elementary and secondary curriculum, and universities have also opened software-related courses to take liberal arts mandatory regardless of major. The Ministry of Education presented elementary and secondary school programming achievement standards and emphasized the connection between prerequisite subjects as educational goals. Applicants for programming classes at H University also completed information classes in elementary and secondary courses, but many students were new to programming without taking related classes. Therefore, this study analyzed the data using the survey data and achievement scores of programming learners. As a result of the analysis, information classes completed in elementary and secondary courses were not linked to higher education courses at all, and improvements for problem solving were derived. This study is meaningful as a study for effective software education in higher education courses.

Bonding of nano-modified concrete with steel under freezing temperatures using different protection methods

  • Yasien, A.M.;Bassuoni, M.T.
    • Computers and Concrete
    • /
    • v.26 no.3
    • /
    • pp.257-273
    • /
    • 2020
  • Concrete bond strength with steel re-bars depends on multiple factors including concrete-steel interface and mechanical properties of concrete. However, the hydration development of cementitious paste, and in turn the mechanical properties of concrete, are negatively affected by cold weather. This study aimed at exploring the concrete-steel bonding behavior in concrete cast and cured under freezing temperatures. Three concrete mixtures were cast and cured at -10 and -20℃. The mixtures were protected using conventional insulation blankets and a hybrid system consisting of insulation blankets and phase change materials. The mixtures comprised General Use cement, fly ash (20%), nano-silica (6%) and calcium nitrate-nitrite as a cold weather admixture system. The mixtures were tested in terms of internal temperature, compressive, tensile strengths, and modulus of elasticity. In addition, the bond strength between concrete and steel re-bars were evaluated by a pull-out test, while the quality of the interface between concrete and steel was assessed by thermal and microscopy studies. In addition, the internal heat evolution and force-slip relationship were modeled based on energy conservation and stress-strain relationships, respectively using three-dimensional (3D) finite-element software. The results showed the reliability of the proposed models to accurately predict concrete heat evolution as well as bond strength relative to experimental data. The hybrid protection system and nano-modified concrete mixtures produced good quality concrete-steel interface with adequate bond strength, without need for heating operations before casting and during curing under freezing temperatures down to -20℃.

Polymorphic Path Transferring for Secure Flow Delivery

  • Zhang, Rongbo;Li, Xin;Zhan, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2805-2826
    • /
    • 2021
  • In most cases, the routing policy of networks shows a preference for a static one-to-one mapping of communication pairs to routing paths, which offers adversaries a great advantage to conduct thorough reconnaissance and organize an effective attack in a stress-free manner. With the evolution of network intelligence, some flexible and adaptive routing policies have already proposed to intensify the network defender to turn the situation. Routing mutation is an effective strategy that can invalidate the unvarying nature of routing information that attackers have collected from exploiting the static configuration of the network. However, three constraints execute press on routing mutation deployment in practical: insufficient route mutation space, expensive control costs, and incompatibility. To enhance the availability of route mutation, we propose an OpenFlow-based route mutation technique called Polymorphic Path Transferring (PPT), which adopts a physical and virtual path segment mixed construction technique to enlarge the routing path space for elevating the security of communication. Based on the Markov Decision Process, with considering flows distribution in the network, the PPT adopts an evolution routing path scheduling algorithm with a segment path update strategy, which relieves the press on the overhead of control and incompatibility. Our analysis demonstrates that PPT can secure data delivery in the worst network environment while countering sophisticated attacks in an evasion-free manner (e.g., advanced persistent threat). Case study and experiment results show its effectiveness in proactively defending against targeted attacks and its advantage compared with previous route mutation methods.

A Test Case Prioritization Technique via Value-Based Approach (가치기반 접근법을 통한 테스트 케이스 우선순위 기법)

  • Park, Hyun-Cheol;Ryu, He-Yeon;Baik, Jong-Moon
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.5
    • /
    • pp.353-360
    • /
    • 2009
  • Software, once developed, has a long life and evolves through numerous additions and modifications because of the faults, the changes in user requirements, the changes in environments, and so forth. With the evolution of the software, assuring the quality of the software is getting more difficult because of numerous versions of the software. Meanwhile, regression testing has been used to support the software testing activities and assure acquiring appropriate quality through several versions of software. Regression testing, however, is too expensive because it requires lots of test cases executions and the number of test cases increases sharply as the software evolves. For this reason, several techniques are suggested to help conducting regression testing then test case prioritization technique is understood the most effective and efficient technique to support regression testing. In this paper, we propose an approach, Historical Value-Based Approach, which is based on the use of historical information to estimate the current cost and fault severity for cost-cognizant test case prioritization. As a result of the proposed approach, software testers who perform regression testing prioritize their test cases more effectively so that the test effectiveness of them can be improved in terms of APFDc.

Experimental Study on Cooperative Coalition in N-person Iterated Prisoner's Dilemma Game using Evolutionary (진화방식을 이용한 N명 반복적 죄수 딜레마 게임의 협동연합에 관한 실험적 연구)

  • Seo, Yeon-Gyu;Cho, Sung-Bae
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.3
    • /
    • pp.257-265
    • /
    • 2000
  • There is much selective confliction in nature where selfish and rational individuals exists. Iterated Prisoner's Dilemma (IPD) game deals with this problem, and has been used to study on the evolution of cooperation in social, economic and biological systems. So far, there has been much work about the relationship of the number of players and cooperation, strategy learning as a machine learning and the effect of payoff functions to cooperation. In this paper, We attempt to investigate the cooperative coalition size according to payoff functions, and observe the relationship of localization and the evolution of cooperation in NIPD (N-player IPD) game. Experimental results indicate that cooperative coalition size increases as the gradient of the payoff function for cooperation becomes steeper than that of defector's payoff function, or as the minimum coalition size gets smaller, Moreover, the smaller the neighborhood of interaction is, the higher the cooperative coalition emerges through the evolution of population.

  • PDF

Development of Wireless Communication Based Operation State Monitoring System for Open Rack Vaporizer (무선 통신 기반 해수식 기화기 운영 상태 모니터링 시스템 개발)

  • Yoo, Seung-Yeol;Joen, Ming-Sung;Lee, Jae-Chul;Kang, Dong-Hoon;Kim, Dong-Goen;Lee, Soon-Sup
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.59 no.5
    • /
    • pp.280-287
    • /
    • 2022
  • An open rack vaporizer is a facility that vaporizes liquefied natural gas using sea water. When a vaporization efficiency of the open rack vaporizer decreases, liquefied natural gas can leak, which can cause great damage to the facility. Operators have to monitor the operation state of the facility in real-time to prevent the accident. However, operators have visited the site and have checked the state by looking at the value of sensors installed in the open rack vaporizer through indicators. For the safe operation of the open rack vaporizer, a monitoring system is needed to monitor the operation state of the open rack vaporizer in real-time without the need for operators to visit the site. In this paper, we developed a long term evolution based monitoring system to monitor the operation state of the open rack vaporizer. The developed system can monitor the real-time operation state of the open rack vaporizer at a control center far from the facility. For the system development, data transmission infrastructure using long term evolution was built. Afterwards a software was developed to monitor the operation state of the open rack vaporizer in real-time using the transmitted data. Finally, performance evaluation was conducted to confirm that the developed system operated successfully without data transmission delay or data missing.

Design and Verification of the Class-based Architecture Description Language (클래스-기반 아키텍처 기술 언어의 설계 및 검증)

  • Ko, Kwang-Man
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.7
    • /
    • pp.1076-1087
    • /
    • 2010
  • Together with a new advent of embedded processor developed to support specific application area and it evolution, a new research of software development to support the embedded processor and its commercial challenge has been revitalized. Retargetability is typically achieved by providing target machine information, ADL, as input. The ADLs are used to specify processor and memory architectures and generate software toolkit including compiler, simulator, assembler, profiler, and debugger. The EXPRESSION ADL follows a mixed level approach-it can capture both the structure and behavior supporting a natural specification of the programmable architectures consisting of processor cores, coprocessors, and memories. And it was originally designed to capture processor/memory architectures and generate software toolkit to enable compiler-in-the-loop exploration of SoC architecture. In this paper, we designed the class-based ADL based on the EXPRESSION ADL to promote the write-ability, extensibility and verified the validation of grammar. For this works, we defined 6 core classes and generated the EXPRESSION's compiler and simulator through the MIPS R4000 description.