• Title/Summary/Keyword: Technology-oriented

Search Result 2,622, Processing Time 0.032 seconds

Study on Educational Culture of Education-Oriented Engineering University (이공계 교육중심 대학의 대학생 교육문화 진단을 통한 개선방안 연구)

  • Seol, Soonuk;Park, Jiwon;Park, Minju
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.275-285
    • /
    • 2022
  • Educational culture generally refers to learners' perceptions, attitudes, and behaviors related to education. Given that educational culture of the university is considered a major factor influencing students' college life, such as learning development, achievement, and dropout, identifying their perceptions of the educational culture is critical to establish the university's education goals and directions. Therefore, this study aimed to identify the educational culture recognized by K university's students and analyze differences in perception with professors to derive implications for future improvement.

Design and Implementation of ELAS in AI education (Experiential K-12 AI education Learning Assessment System)

  • Moon, Seok-Jae;Lee, Kibbm
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.62-68
    • /
    • 2022
  • Evaluation as learning is important for the learner competency test, and the applicable method is studied. Assessment is the role of diagnosing the current learner's status and facilitating learning through appropriate feedback. The system is insufficient to enable process-oriented evaluation in small educational institute. Focusing on becoming familiar with the AI through experience can end up simply learning how to use the tools or just playing with them rather than achieving ultimate goals of AI education. In a previous study, the experience way of AI education with PLAY model was proposed, but the assessment stage is insufficient. In this paper, we propose ELAS (Experiential K-12 AI education Learning Assessment System) for small educational institute. In order to apply the Assessment factor in in this system, the AI-factor is selected by researching the goals of the current SW education and AI education. The proposed system consists of 4 modules as Assessment-factor agent, Self-assessment agent, Question-bank agent and Assessment -analysis agent. Self-assessment learning is a powerful mechanism for improving learning for students. ELAS is extended with the experiential way of AI education model of previous study, and the teacher designs the assessment through the ELAS system. ELAS enables teachers of small institutes to automate analysis and manage data accumulation following their learning purpose. With this, it is possible to adjust the learning difficulty in curriculum design to make better for your purpose.

Impact on Requirement Elicitation Process when Transforming Software from Product Model to a Service Model

  • Sameen Fatima;Amna Anwer;Adil Tareen
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.199-203
    • /
    • 2023
  • Influential trend that widely reflected the software engineering industry is service oriented architecture. Vendors are migrating towards cloud environment to benefit their organization. Companies usually offer products and services with a goal to solve problems at customer end. Because customers are more interested in solution of their problem rather than focusing on products or services. In software industry the approach in which customers' problems are solved by providing services is known as software as a service. However, software development life cycle encounters enormous changes when migrating software from product model to service model. Enough research has been done on the overall development process but a limited work has been done on the factors that influence requirements elicitation process. This paper focuses on those changes that influence requirement elicitation process and proposes a systematic methodology for transformation of software from product to service model in a successful manner. The paper then elaborates the benefits that inherently come along with elicitation process in cloud environment. The paper also describes the problems during transformation. The paper concludes that requirement engineering process turn out to be more profitable after transformation of traditional software from product to service model.

IIoTBC: A Lightweight Block Cipher for Industrial IoT Security

  • Juanli, Kuang;Ying, Guo;Lang, Li
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.97-119
    • /
    • 2023
  • The number of industrial Internet of Things (IoT) users is increasing rapidly. Lightweight block ciphers have started to be used to protect the privacy of users. Hardware-oriented security design should fully consider the use of fewer hardware devices when the function is fully realized. Thus, this paper designs a lightweight block cipher IIoTBC for industrial IoT security. IIoTBC system structure is variable and flexibly adapts to nodes with different security requirements. This paper proposes a 4×4 S-box that achieves a good balance between area overhead and cryptographic properties. In addition, this paper proposes a preprocessing method for 4×4 S-box logic gate expressions, which makes it easier to obtain better area, running time, and power data in ASIC implementation. Applying it to 14 classic lightweight block cipher S-boxes, the results show that is feasible. A series of performance tests and security evaluations were performed on the IIoTBC. As shown by experiments and data comparisons, IIoTBC is compact and secure in industrial IoT sensor nodes. Finally, IIoTBC has been implemented on a temperature state acquisition platform to simulate encrypted transmission of temperature in an industrial environment.

Cyber Threat Military Response Strategy Using Information Security Risk Management (정보보안 위험관리를 활용한 사이버 위협 군사 대응 전략)

  • Jincheol Yoo
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.173-179
    • /
    • 2023
  • The 4th Industrial Revolution technology has emerged as a solution to build a hyper-connected, super-intelligent network-oriented operational environment, overcoming the obstacles of reducing troops and defense budgets facing the current military. However, the overall risk management, including the increase in complexity of the latest inform ation technology and the verification of the impact with the existing information system, is insufficient, leading to serious threats to system integrity and availability, or negatively affecting interoperability between systems. It can be inhibited. In this paper, we suggest cyber threat response strategies for our military to prepare for cyber threats by examining information security risk management in the United States in order to protect military information assets from cyber threats that may arise due to the advancement of information technology.

Development of Highly Thermal Conductive Liquid Crystalline Epoxy Resins for High Thermal Dissipation Composites (고방열 복합소재 개발을 위한 고열전도성 액정성 에폭시 수지의 개발)

  • Kim, Youngsu;Jung, Jin;Yeo, Hyeonuk;You, Nam-Ho;Jang, Se Gyu;Ahn, Seakhoon;Lee, Seung Hee;Goh, Munju
    • Composites Research
    • /
    • v.30 no.1
    • /
    • pp.1-6
    • /
    • 2017
  • Epoxy resin (EP) is one of the most famous thermoset materials. In general, because EP has three-dimensional random network, it possesses thermal properties like a typical heat insulator. Recently, there has been increasing interest in controlling the network structure for making new functionality from EP. Indeed, the new modified EP represented as liquid crystalline epoxy (LCE) is spotlighted as an enabling technology for producing novel functionalities, which cannot be obtained from the conventional EPs, by replacing the random network structure to oriented one. In this paper, we review current progress in the field of LCEs and their application for the highly thermal conductive composite materials.

An Analysis of the Competitiveness of Renewable Energy Technologies (국내외 신재생에너지 기술 경쟁력 분석 - 태양광·연료전지를 중심으로 -)

  • Koo, Ki-Kwan;Lee, Deok-Ki;Hong, Jong-Chul;Park, Soo-Uk
    • New & Renewable Energy
    • /
    • v.8 no.3
    • /
    • pp.30-37
    • /
    • 2012
  • In this study, we studied solar cell and fuel cell. To estimate the technology competitiveness, we used patent analysis using patent information and delphi method. For patent analysis, PII indicating the impact of patent was used. Also to analysis PII, citations data of registered and published patent were used from 2001 through 2010 in the United States, Japan, South Korea and the European Patent Office. And the delphi method results of the 'International trend analysis on the Green Energy Technology and the establishment of international cooperation models(2009)' were cited to estimate the technology level. According to the analysis results, Korea's patent registration growth rate was fairly high, but the patent impact and technology levels were significantly lower than in the United States, Japan and Germany. Especially in the solar cell, United States's PII is 1.8, but Korea's PII is 0.2. And the technology level of United States is 7 to 8, but Korea's is 5 to 6. Therefore, to improve technology competitiveness, Korea need to enhance the core technology R&D, and set up the consumer-oriented R&D strategy for commercialization from R&D planning phase. In this study, we analysed competitiveness of renewable energy which is not actively discussed. But there are limitations of the study because we used the result of past research and patent data in the past 10 years. Therefore to accurate research the period of patent data should be extended. Finally diverse indicators for measuring the technology competitiveness should be researched and developed.

A Study on the Militarization of Artificial Intelligence Technology in North Korea and the Development Direction of Corresponding Weapon System in South Korea (북한 인공지능 기술의 군사화와 우리 군의 대응 무기체계 발전방향 연구)

  • Kim, Min-Hyuk
    • Journal of Information Technology Services
    • /
    • v.20 no.1
    • /
    • pp.29-40
    • /
    • 2021
  • North Korea's science and technology policies are being pursued under strong leadership and control by the central government. In particular, a large part of the research and development of science and technology related to the Fourth Industrial Revolution in North Korea is controlled and absorbed by the defense organizations under the national defense-oriented policy framework, among which North Korea is making national efforts to develop advanced technologies in artificial intelligence and actively utilize them in the military affairs. The future weapon system based on AI will have superior performance and destructive power that is different from modern weapons systems, which is likely to change the paradigm of the future battlefield, so a thorough analysis and prediction of the level of AI militarization technology, the direction of development, and AI-based weapons system in North Korea is needed. In addition, research and development of South Korea's corresponding weapon systems and military science and technology are strongly required as soon as possible. Therefore, in this paper, we will analyze the level of AI technology, the direction of AI militarization, and the AI-based weapons system in North Korea, and discuss the AI military technology and corresponding weapon systems that South Korea military must research and develop to counter the North Korea's. The next study will discuss the analysis of AI militarization technologies not only in North Korea but also in neighboring countries in Northeast Asia such as China and Russia, as well as AI weapon systems by battlefield function, detailed core technologies, and research and development measures.

Controlled Bandwidth Borrowing with Extended RSVP-TE to Maximize Bandwidth Utilization

  • Kim Chul;Kim Young-Tak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1B
    • /
    • pp.64-72
    • /
    • 2004
  • Multiprotocol Label Switching (MPLS) has been developed as a key technology to enhance the reliability, manageability and overall quality of service of core If networks with connection-oriented tunnel LSP and traffic engineering such as constraint-based routing, explicit routing, and restoration. In this paper, we propose a control bandwidth borrowing scheme that maximizes the utilization of tunnel LSPs or physical links by an extension to the RSVP-TE label distribution protocol. MPLS-based core switching network and VPN services rely on the establishment of connection-oriented tunneled LSPs that are configured or predefined by network management systems. The mechanism of network management system varies from (i) a relatively static LSP establishment accounting, to (ii) a dynamic QoS routing mechanisms. With the use of hierarchical LSPs, the extra bandwidth that is unused by the trunk (outer) LSPs should be fully allocated to their constituent end-to-end user traffic (inner) LSPs in order to maximize their utilization. In order to find out the unused extra bandwidth in tunnel LSP or physical link and redistribute these resources to constituent LSPs, we expend the functionality of RSVP-TE and the found unused extra bandwidth is redistributed with a weight-based recursive redistribution scheme. By the extended RSVP-TE and proposed recursive redistributed scheme, we could achieve the instantaneous maximized utilization of tunnel LSP or physical link suffering from the potential under-utilization problem and guarantee the end-to-end QoS requirements. With the proposed scheme, network manager can manage more effectively the extra available bandwidth of hierarchical LSPs and maximize the instantaneous utilization of the tunneled LSP resources.

Analysis of cross-borehole pulse radar signatures measured at various tunnel angles (다양한 투과 각도에서 측정된 투과형 펄스 시추공 레이더 신호 분석)

  • Kim, Sang-Wook;Kim, Se-Yun
    • Geophysics and Geophysical Exploration
    • /
    • v.13 no.1
    • /
    • pp.96-101
    • /
    • 2010
  • A pulse radar system has been developed recently to detect dormant underground tunnels that are deeply located at depths of hundreds of metres. To check the ability of the radar system to detect an obliquely oriented tunnel, five different borehole pairs in the tunnel test site were chosen so that the horizontal lines-of-sight cut the tunnel axis obliquely, in $15^{\circ}$ steps. The pulse radar signatures were measured over a depth range of 20 m around the centre of the air-filled tunnel. Three canonical parameters, consisting of the arrival time, attenuation, and dispersion time were extracted from the first and second peaks of the measured radar signatures. Using those parameters, the radar system can detect obliquely oriented tunnels at various angles up to 45 from the transmitter-receiver line of sight.