2019 International Conference on Platform Technology and Service (PlatCon-19) PROGRAM SCHEDULE. January 28, 2019 (Monday)

Size: px
Start display at page:

Download "2019 International Conference on Platform Technology and Service (PlatCon-19) PROGRAM SCHEDULE. January 28, 2019 (Monday)"

Transcription

1 PROGRAM SCHEDULE January 27, 2019 (Sunday) 11:00-12:00 13:30-15:30 16:00-18:00 Local Arrangement Meeting Chair: Yanghoon Kim Booyoung Jeju Hotel & Resort, Boardroom 3 ICRP Steering Meeting Chair: Sang-Soo Yeo, Booyoung Jeju Hotel & Resort, Boardroom 3 Conference Committees Meeting Chair: Jongsung Kim Booyoung Jeju Hotel & Resort, Boardroom 3 January 28, 2019 (Monday) 09:00-10:00 Registration (Grand Ballroom Foyer B2) 10:00-11:20 11:20-11:40 11:40-13:30 1-A: Convergence & Human Media Platform Chair: Soo-Kyun Kim Emerald A Coffee Break Lunch Diamond (1st Floor) 1-B: Computing Platform Chair: Sergey Butakov Emerald B 13:30-14:20 Opening Remark & Invited Talk-1 Industry 4.0: Challenges from a Data Analysis Perspective by Dr. Ajith Abraham, Director, Machine Intelligence Research Labs, USA Emerald B / Chair: Mucheol Kim 14:20-14:40 14:40-16:00 16:00-16:20 16:20-17:40 2-A: SCA 2019 Chair: Sang Un Ahn Emerald A 3-A: SCA 2019 Chair: Namyeon Lee Emerald A Coffee Break Coffee Break 2-B: SESIS 2019 Chair: Euijong Lee Emerald B 3-B: FSP 2019 Chair: Changhoon Lee Emerald B 19:00-20:30 Reception Party & Service Award Ceremony (Casual Standing Party with delicious finger foods and drinks) Grand Ballroom Foyer (B2) / Chair : Mucheol Kim 1. A paper presentation should be made by one of authors of the paper, during a 20 minute time slot (15 minutes for the presentation itself and 5 minutes for Q/A). 2. All speakers of each session should meet the session chair at its room 10 minutes before the session begins. 1

2 09:00-10:00 10:00-11:20 11:20-11:40 11:40-13:30 13:30-14:20 14:20-14:40 14:40-16:00 16:00-16:20 16:20-17:40 18:30-20:00 4-A: Computing Platform & CRET 2019 Chair: Chun-Feng Liao Emerald A January 29, 2019 (Tuesday) Registration (Grand Ballroom Foyer B2) Coffee Break Lunch Diamond (1st Floor) 4-B: SCA 2019 Chair: Ahyoung Kim Emerald B Invited Talk-2 Standardization Projects in 3D-Based Medical Device Applications - Visualization, Data Management, 3D Simulation, Bio-CAD Format for 3D Printing by Dr. Young Lae Moon, Professor, Department of Orthopaedic, Chosun University Hospital, Gwangju, Korea 5-A: Convergence Platform Chair: Dongwann Kang Emerald A 6-A: Convergence Platform Chair: Ka-Lok Man Emerald A Emerald B / Chair: Young-Ae Jung Coffee Break Coffee Break Conference Banquet (with Best Paper Award Ceremony) Sapphire Hall (B2) / Chair: Young-Ae Jung 5-B: CIA 2019 Chair: Sang Oh Park Emerald B 6-B: SESIS 2019 Chair: Young-Gab Kim Emerald B 09:00-09:30 09:30-10:50 January 30, 2019 (Wednesday) 7-A: Interdisciplinary Session Chair: Yang-Sun Lee, Taeshik Shon Emerald A Registration (Grand Ballroom Foyer B2) 7-B: Interdisciplinary Session Chair: Seungmin Rho Emerald B 1. A paper presentation should be made by one of authors of the paper, during a 20 minute time slot (15 minutes for the presentation itself and 5 minutes for Q/A). 2. All speakers of each session should meet the session chair at its room 10 minutes before the session begins. 2

3 TECHNICAL SCHEDULE FOR PLATCON-19 Sunday, January 27 11:00-12:00 Local Arrangement Meeting Chair: Yanghoon Kim (Far East University, Korea) 13:30-15:30 ICRP Steering Meeting Chair: Sang-Soo Yeo (Mokwon University, Korea) 16:00-18:00 Conference Committees Meeting Chair: Jongsung Kim (Kookmin University, Korea) Monday, January 28 09:00-10:00 Registration open (Grand Ballroom Foyer (B2)) Grand Ballroom Foyer (B2 floor), Booyoung Jeju Hotel & Resort 10:00-11:20 1-A: Convergence & Human Media Platform Room: Emerald A Chair: Soo-Kyun Kim (Paichai University, Korea) Formal Specification Technique in Smart Contract Verification Seungmin Lee (Dankook University, Korea), Soojin Park (Sogang University, Korea) and Young B Park (Dankook University, Korea) [Abstract] The block chain technology is changing rapidly. The block chain guarantees the integrity of the book through a specific consensus of the participants. In the past, the block chain technology had a limited range of applications. However, the use of block chain technology is gradually expanding as smart contracts that can formulate general business logic are mentioned. Already studied the components of smart contracts in other studies and proposed the possibility of extending them on the basis of ontology. And research on securing traceability of smart contract based on ontology has been carried out. However, research on various transactions constituting smart contracts is lacking. In this paper, the constituent elements of smart contract are analyzed and expressed by ontology. And the process of negotiating the components is represented by each transaction. Finally, we construct the component represented by the ontology as XML by including the state information in the transaction. In this way, the smart contract is represented in a formal language that contains state information. It also laid the foundation for a smart contract that can be reused and verified. A Study on the Needs for Enhancement of Personal Information Protection in Cloud Computing Security Certification System Min Ju Kang and Hun-Yeong Kwon (KOREA University, Korea) [Abstract] Recently, the development of cloud computing technology has provided an efficient access to information, but issues about personal information security are emerging and hindering the spread of the cloud industry. In this response, cloud security certification system is implemented to solve various cloud security problems in Korea. However, it is difficult to see that the level of technical protection measures of the cloud security certification system is satisfied with all the technical protection measures required by the personal information protection laws and regulations. As a result, it was proposed that security products that are highly related to the contents of the personal information protection laws and regulations should be in line with the CC(common criteria) certified product group. In this paper, we propose items that the cloud security certification system should supplement from the viewpoint of security requirements that are compliant with the CC certified product line. TAPS: Trust-based Access Control and Protect System Yoon-Sik Yoo, Hyungkyu Lee, Boo-Geum Jung, HeaSook Park and Kiwon Kim (ETRI, Korea), Cheong Hee Park (ChungNam National University, Korea) 3

4 [Abstract] The current network access control solution focuses only on the setup for the connection control of each gateway or VPN equipment and the status monitoring function of each equipment. In addition, each secure connection configuration between the corresponding network access nodes making it easy for the target node to be protected is likely to be exposed to malicious attacks. Therefore, in this paper, we propose a trust-based network access control and protect system (TAPS) that enables the software-driven definition and control of a network tunnel for protection between devices and services. The proposed system was designed to only grant access to specified services to mutually authorized devices by predefining and mapping a list of devices and services. In addition, data traffic between each device and service has been developed to be resistant to a variety of cyber attacks by encrypting it according to its purpose. Multi-Label Bias-Based Predictor Tae-gyu Hwang and Sung-Kwon Kim (Chung-Ang University, Korea) [Abstract] A recommender system predicts the future preference of a set of items for a user by computing the similarity between users or items, and recommends the top items based on the prediction. Collaborative filtering, the most popular approach to build recommender systems, has been successfully employed in many commercial and non-commercial applications but has reached the limit of performance growth. A novel way to predict user preferences is needed to overcome this problem. Bias-based predictor (BBP) is a prediction model for recommender systems that assumes that bias and preference are highly correlated. In predictive models, bias generally means the intercept where our line intercepts the y-axis, offsetting all predictions we make. Users' preference ratings are likely to be influenced by biases in many different aspects. This implies that bias can play more significant roles in preference prediction, rather than simply intercepting the y-axis. This paper proposes a prediction model for recommender systems that takes into account bias in multiple aspects. The proposed model called multi-label bias-based predictor (MLBBP) extends the conventional BBP to allow for a more in-depth analysis of bias. Through experiments with movie data, it was demonstrated that MLBBP performs better than BBP. The trained MLBPP model produces numerical data that can explain why a specific item is recommended to a user. 10:00-11:20 1-B: Computing Platform Room: Emerald B Chair: Sergey Butakov (Concordia University of Edmonton, Canada) ICMPv6SD: A Compact Service Discovery Protocol Supporting Plug-and-Play in Home Networks Zi-Chao Lin and Chun-Feng Liao (National Chengchi University, Taiwan) [Abstract] UPnP (Universal Plug and Play) is popular in home networks because it provides a general service management schemes for heterogeneous hardware and software based on open standards. Meanwhile, the rise of the internet of things (IoT) results in the rapid growth of the number of small or embedded devices which makes the IPv4 address exhaustion even worse. Hence, IPv6 is widely adopted in recent years. It is worthy to note that IPv6 also improves the design of the family of IP-based management protocols, namely, ICMPv6, so that the efficiency of transmission is significantly improved. Following this trend, UPnP also supports IPv6, but this extension concentrates on the address compatibility and neglects to utilize the improved design in IPv6. In light of this, this paper proposes a new service discovery protocol which bases on ICMPv6 in order to make the service discovery of UPnP more compact and efficient. Also, we develop a monitoring tool for developers to troubleshoot the problems of the proposed protocol. We hope this enhancement can make the deployment of IoT in the smart home network more scalable and robust. Communication-Aware Scheduling for Malleable Tasks Kana Shimada (Ritsumeikan University, Japan), Ittetsu Taniguchi (Osaka University, Japan), Hiroyuki Tomiyama (Ritsumeikan University, Japan) [Abstract] Task scheduling is an important process in the design of multicore computing systems. This paper presents methods for scheduling of malleable tasks. The scheduling methods decide not only the execution order of the tasks but also the number of cores assigned to the individual tasks, simultaneously. Different from previous work on malleable task scheduling, this paper takes into account the inter-task communication overhead during scheduling. The communication is necessary if the main thread of a predecessor task and that of a successor task are assigned on different cores. This paper proposes two methods for malleable task scheduling with communication overhead. One is a two-step method which schedules tasks first and then assigns threads in the tasks onto cores. Other is an integrated method which performs task scheduling and thread assignment simultaneously. Both of the two methods are based on integer linear programming (ILP). The proposed methods are evaluated through experiments and encouraging results are obtained. Fine-Grained Plant Identification Using Wide and Deep Learning Model Jun Woo Lee and Yeo-Chan Yoon (ETRI, Korea) [Abstract] In recent years, with the evolution of deep learning technology, the performance of plant image recognition has improved remarkably. In this paper, we propose a model to address the fine-grained plant image classification task by using the wide and deep learning framework which combines a linear model and a deep learning model. Proposed method sums the result of the wide and deep learning model using a logistic function so that discrete features can be considered simultaneously with continuous image content. Our works used metadata such as the date of flowering and locational information for the wide model. Our experiment shows that the proposed method gives better performance than a baseline method. 4

5 System Design for Automatic Laundry Organization Youngeun An (Chosun University, Korea); Gukjeong Kim and Taejin Ha (BonC Innovators Inc., Korea) [Abstract] In this paper, a system for automated laundry cleaning was designed that is more efficient and convenient for organization of laundry organization which occupies the largest portion of household work. This automation system for dry laundry folding is designed to automatically manage dry laundry based on each laundry folding method and to manage laundry through laundry management function. This system is expected to solve the problems of housewives, dual-income couples, single-person households who are mentally and physically stressed about household duties and organization, and through it the economic development of smart appliances market is expected to be possible. 11:20-11:40 Coffee break 11:40-13:30 Lunch Diamond (1st Floor) 13:30-14:20 Opening Remark & Invited Talk 1 Industry 4.0: Challenges from a Data Analysis Perspective Dr. Ajith Abraham, Director, Machine Intelligence Research Labs, USA Room: Emerald B (B2) Chair: Mucheol Kim(Chung-Ang University, Korea) 14:20-14:40 Coffee break 14:40-16:00 2-A: SCA 2019 Room: Emerald A Chair: Sang Un Ahn (Korea Institute of Science and Technology Information, Korea) A Study on the Application of Singularity Container in HTCondor Scheduler Geonmo Ryu and Sangwook Bae (Korea Institute of Science and Technology Information, Korea), Seo-Young Noh (Korea Institute of Science and Technology Information & University of Science and Technology, Korea) [Abstract] We have studied the use of HTCondor's built-in Singularity Container to verify that the work pipeline is useful for computingcentric job processing. Results using HPCG benchmark program did not show significant performance degradation when processing computing-centric tasks with HTCondor-Singularity combination. Therefore, it has proven very useful to use Singularity when processing CPU-intensive tasks. A Study of Host Access Control System for IPv6-only Large-scale Data Center Sangwook Bae, Byungyun Kong (KISTI, Korea), Seo-Young Noh (Korea Institute of Science and Technology Information & University of Science and Technology, Korea) [Abstract] In recent year, the large-scale data centers are adopting Internet Protocol version 6 (IPv6) due to exhaustion of IPv4 addresses spaces. The Internet Engineering Task Force (IETF) developed IPv6 in 1998 to overcome the limitations of IPv4. IPv6 not 5

6 only has a large address space but also has advantages over IPv4, such as Stateless Address Autoconfiguration (SLAAC), extension headers, IPsec, Quality of Service, mobility and etc. Especially, SLAAC allow the hosts to generate and configure its own IPv6 address without any setting. However, SLAAC drawbacks are respect to host access control for the large-scale data center. Due to these drawbacks, an unauthorized host can connect to IPv6 network in the large-scale data center. In order to solve this issue, this paper provides a host access control vulnerabilities and a solution to overcome this problem. Our proposed solution provides a system for collecting host information and blocking unauthorized hosts using ICMPv6. And also, through accurate analysis shows that the proposed system can manage access control of IPv6 host correctly in the large-scale data centers. Multi-experiment Support Through HTCondor Scheduling Policy Integrated Pool Configuration Byungyun Kong and Geonmo Ryu (Korea Institute of Science and Technology Information, Korea); Seo-Young Noh (Korea Institute of Science and Technology Information & University of Science and Technology, Korea) [Abstract] A high-performance computing power required for processing a large amount of data is being used. Cluster technology is used for high-performance computing. Batch programs are used for task scheduling. We want to build an integration pool that supports multiple experiments using a batch program called HTCondor. Through HTCondor's scheduling policy, the group quota is specified, and the preemptive option is added to allocate resources flexibly but to allocate the least resources. Pools using 400 cores and 1656 cores, respectively, consisted of a pool of 2136 cores allocated with idle resources, and utilization of computing resources was also increased through flexible allocation of resources. Enabling Traceability on Grid Job Payload Based on Messaging System for Local Compute Cluster Sang Un Ahn and Jeongheon Kim (Korea Institute of Science and Technology Information, Korea), Seo-Young Noh (Korea Institute of Science and Technology Information & University of Science and Technology, Korea) [Abstract] At KISTI, we are operating a Tier-1 datacenter of WLCG for ALICE experiment. Grid computing activities are monitored centrally by the experiment. Although it provides useful information such as running/done/error jobs, storages usage, incoming/outgoing network traffics and so on, none of information related to owner and payload of each grid job is presented. We conducted a study on how to enable traceability by processing grid job payload logs distributed upon hundreds of worker nodes in our facility. To capture, publish and consume logs with the size of a few terabytes in real time, we considered an efficient messaging systems in the design. We present a design of messaging system based Grid job monitoring and discuss its possibility on future usage. 14:40-16:00 2-B: SESIS 2019 Room: Emerald B Chair: Euijong Lee (Sejong University, Korea) Deception Tree Model for Cyber Operation Chang-Wook Park and Young-Gab Kim (Sejong University, Korea) [Abstract] Modern cyber operations are evolving from direct attacks and defense to complex cyber operations that involve deception. As deceptions is included in cyber-attacks and defenses, deception elements should be identified to respond to cyber operations. If appropriate countermeasures can be taken for identified deception elements, they can gain a strategic advantage in cyberspace. Related cyber deception research includes developing response tools for attackers from a defensive standpoint and developing attack techniques that exploit human cognitive vulnerabilities. Other research has classified deception tools according to their purposes and has studied procedures for effectively carrying out deception. However, existing studies neither consider specific deception objectives nor classify deception in complex cyber operations. Classifying deception in cyber operations requires dividing cyberspace into physical, logical, and persona layers, the targets of cyber operations should be identified from machines to humans, and deception procedures should be identified from TTPs to objectives. In response, this paper proposes a "deception tree model" that can be categorized from a cyber-deceitful TTP perspective. The deception tree model can distinguish targets from humans and machines in terms of attack and defense and systematically establish the effects, tactics, techniques, and procedures of selected targets. Three cases were applied and analyzed to verify the performance of the deception tree model. The first case is the cyber incident that occurred at KHNP in 2014 in which a deceitful attack was conducted on humans, the second case is using Honeynet technology to deceive the attacker, and third case is using Anti-Ransomware technology to deceive malware. Analysis of IoT Platform Security: A Survey JinYong YU and Young-Gab Kim (Sejong University, Korea) [Abstract] As the IoT (Internet of Things) is emerging as the next generation growth engine that leads the IT (information technology) industry, many developed countries and many other organizations are developing IoT related technologies to preoccupy the IoT market. Among the core technologies that make up IoT, since, the platform can have a huge impact on future devices, it is attracting attention as one of the most promising technologies of IoT technology, but at the same time concerns about platform security are also increasing. In response to this, Korea (domestic) and overseas IoT platforms adopt diverse security technologies according to the developed purpose and environment. For most domestic IoT platforms are developed based on platforms on which standardization is underway like onem2m and OCF. For the overseas IoT platforms, they were developed in a proprietary method. Not only this, the security method also adopted their own method. But, even though the security methods of domestic and overseas IoT platforms have a distinct difference like this, researches comparing and analyzing the security elements of domestic and overseas IoT platforms are not enough. Therefore, in 6

7 this paper, we analyze and compare security elements of domestic IoT platforms and overseas IoT platforms so that more secure domestic IoT growth can be achieved. Finally, we propose the development direction of future IoT platform security. Interoperable OAuth 2.0 Framework Se-Ra Oh and Young-Gab Kim (Sejong University, Korea) [Abstract] Internet of things (IoT) is becoming key paradigm in our everyday life. However, interoperability which is essential key to share services and resources in heterogenous IoT domains is difficult to be achieved since some technologies are often designed without considering interoperability. The open authorization (OAuth) 2.0 framework used in IoT as well as conventional web environment also did not consider the interoperability in spite of its wide usage. In other words, systems cannot interoperate together without other alternatives even though they implement same OAuth 2.0 framework standard. We therefore propose interoperable OAuth 2.0 framework (IOAF). IOAF provides an additional authorization layer to support common authorization server capabilities, and supports four extended authorization grant types used to obtain interoperable access token (IAT) which has global scope in multiple domains. This paper shows the main requirements and benefits of IOAF, and describes detailed flow of authorization grant types. Efficient Vulnerability Management Process in the Military Seungjin Baek and Young-Gab Kim (Sejong University, Korea) [Abstract] Reducing vulnerabilities is one of the most effective ways to minimize the risks that can occur to information systems. Given the characteristics of the military environment, particularly in operating a wide variety of information systems and dealing with critical information on national security, clear / concise management procedures are needed that enable more realistic and direct action to identify and address vulnerabilities. This paper suggested 5 phases for the vulnerability management process in military: (i) Framing; (ii) Identification; (iii) Assessment; (iv) Remediation; and (v) Verification. In addition, the Three-Tiered concept was applied to the efficient management of the vulnerabilities, taking into consideration the characteristics of the organization with clear hierarchical relationships. As a result, it will contribute to reduce the cyber risk in the defense area, by presenting the specific procedures for vulnerability management in each hierarchical organization. 16:00-16:20 Coffee break 16:20-17:40 3-A: SCA 2019 Room: Emerald A Chair: Namyeon Lee (Hanshin University, Korea) Design and Implementation of an Efficient File Transmission Protocol Hwajung Kim and Heon Young Yeom (Seoul National University, Korea), Yongseok Son (Chung-Ang University, Korea) [Abstract] In this work, we propose a file transmission protocol for the large-scale data storage system. Our scheme improves resource utilization, such as network bandwidth and storage space, by streaming files. We packetize the metadata and data of multiple files into a single stream with the proposed protocol. We implement our protocol on the system which consists of two different nodes. The experimental results show that our protocol reduces transfer time while increasing network bandwidth utilization. Multi Population Memetic Search for Effective Multi-label Feature Selection Jin-Hyeong Park and Jaesung Lee (Chung-Ang University, Korea) [Abstract] Population-based multi-label feature selection methods can significantly improve the accuracy of multi-label classifier. However, unexpected bias with regard to the number of features may occur when a population-based evolutionary algorithm is employed to search promising feature subsets or solutions. In this study, we present a multi-population based memetic search that is able to circumvent unexpected bias, resulting in the improvement of search capability. The proposed method divides the solution space into a series of sub-spaces according to the number of features and then each sub-population is assigned to each sub-space to be searched. In addition, we introduce a local refinement process to guide populations that are composed of very few members. Experimental results show the effectiveness of our strategy in improving the classification accuracy compared to other memetic-based algorithm or multi population-based algorithm, which insures the ability of our algorithm in searching feature subsets. Computer-Assisted Pronunciation Training for Correcting Vague Pronunciation Ho Han and Jaesung Lee (Chung-Ang University, Korea) [Abstract] Computer-assisted pronunciation training system is a useful application for improving the pronunciation skill of beginner-level users. In this paper, we propose a new computer-assisted training system that aims at improving the pronunciation of phonemes that are pronounced vaguely by users. The proposed method is implemented using a system that recommends a set of words based on the phonemes that were pronounced vaguely. To detect vague pronunciation, the system employed the concept of entropy. Experimental results showed that the proposed method improves the pronunciation skill of user. 7

8 Improving Hybrid Memory Usages Through Bandwidth-aware Data Migration Methodology Jongmin Lee and Kwangho Lee (Won-Kwang University, Korea) [Abstract] Hybrid memory is a promising memory technology that contains different types of memory devices, which have different characteristics regarding access time, retention time, and capacity. However, the increasing performance and employing hybrid memories induce more complexity as well. In this paper, we propose a data migration methodology called BDM (Bandwidth-aware Data Migration) to effectively use hybrid memories targeting at Intel Knight Landing (KNL) processor. BDM monitors status of applications running on a system and migrates pages of selected applications to the High Bandwidth Memory (HBM). BDM selects applications whose bandwidth usage is evenly distributed among threads. Experimental results show that our BDM improves over the baseline execution the execution time by 20% on average. 17:10-18:30 3-B: FSP 2019 Room: Emerald B Chair: Changhoon Lee (Seoul National University of Science and Technology, Korea) Simulation System of a Reservation-Based 3D Intersection Crossing Scheme for UAVs Areeya Rubenecia and Myungwhan Choi (Sogang University, Korea); Hyo Hyun Choi (Inha Technical College, Korea) [Abstract] This paper presents the simulation system of a three dimensional intersection crossing model. In this model, multiple UAVs must access the intersection without colliding with each other. The system uses reservation-based scheduling to manage the entrance of the UAVs in the intersection wherein there will be no collision among the UAVs that are travelling in the intersection at the same time. It also finds the path to be taken by the UAV through which it will reach the exit of the intersection in the shortest time. The simulation system is implemented using object-oriented programming. UML diagrams are used to describe the simulation system's structure. Along with the UML diagram, we discussed the classes, attributes, methods and the relationship of the classes in the simulation. Dynamic Frame Length Adaptation for Anti-Collision Management in Wi-Fi Backscatter System Jung-Hyok Kwon, Sang-Woo Lee and Eui-Jik Kim (Hallym University, Korea) [Abstract] This paper presents a dynamic frame length adaptation (DFLA) for anti-collision management in Wi-Fi backscatter system, which reduces the collisions and access delay of the Wi-Fi backscatter tags. The Q-algorithm defined in EPCglobal Gen2 specification adjusts the frame length (i.e., a total number of slots in a frame) at the beginning of each frame, so that Wi-Fi backscatter tags have different access delays depending on the number of collisions. Thus, it is generally used for anti-collision management in Wi-Fi backscatter system. However, the existing Q-algorithm may cause frequent collisions and long access delays since it uses the initial frame of fixed length and adjusts the frame length without considering the number of Wi-Fi backscatter tags. To address this problem, the DFLA dynamically determines the frame length at the beginning of each frame considering the number of Wi-Fi backscatter tags. Specifically, the DFLA estimates throughput for all the slot-count parameters (Qs) in the range of [0, 15] taking into account the number of backscatter tags. Then, it determines the frame length by deciding the Q that maximizes the throughput of Wi-Fi backscatter system. The simulation results show that the DFLA obtains a better performance than the existing Q-algorithm management. Cyber Attack Scenarios on Smart City and Their Ripple Effects JooChan Lee, JangHoon Kim and Jung Taek Seo (Soonchunhyang University, Korea) [Abstract] In recent years, nations have been establishing policies to construct smart cities and promote their operation at the national level and competing with one another through the support of the required resources. Smart cities are futuristic state-of-the-art cities wherein all components of the urban infrastructure are inter-operated through networks using the core technologies in the Fourth Industrial Revolution and ICT(Information and Communication Technology). Various kinds of on-site state information are collected and monitored by installing sensors that are IoT(Internet of Things) devices in various services, and on-site controlling devices are controlled remotely if needed. Smart cities face increasing cyber security threats compared to existing cities as advanced technologies are utilized, so the importance of cyber security and user privacy has increased. In this study, security threats against the smart city architecture are analyzed, and possible cyber-attack scenarios in the construction of services and operation environment are identified and analyzed. The ripple effects of each attack are also analyzed. The analysis results in this study can be utilized in security technology research and development and applications in the future. A Study on IoT Device Authentication Protocol for High Speed and Lightweight Seul-Ki Choi, Ju-Seong Ko and Jin Kwak (Ajou University, Korea) [Abstract] In Authentication to IoT devices is a very important step in providing secure IoT services. Accordingly, studies on an authentication protocol suitable for low-power and lowperformance IoT devices are being actively conducted. Therefore, in this paper, we have selected the LEA-128-CTR and Chaskey algorithms to increase the high-speed parallelization effect of SIMD-based IoT device authentication protocol and proposed protocol for light weight and high speed 8

9 KSI Based Sensitive Data Integrity Validation Method for Precision Medicine System Deuk-Hun Kim, Jeong-Seok Jo and Jin Kwak (Ajou University, Korea) [Abstract] Interest in precision medicine in the medical field is increasing through the United States 'Precision Medicine Initiative' announced in Accordingly, a method for secure and efficient provide of precision medicine services has been continuously studied. Recently, a survey by consulting company shows the importance of verification the integrity of data in decision making is increasing in the analysis of sensitive data of big data size that a key component of precision medicine. Therefore, in this paper, we study integrity validation method of sensitive data by applying signature technology called KSI in precision medicine system. Optimized Power Consumption Model for Multiplication in Galois Field of AES Ju Hwan Kim, Boyeon Sim and Dong-Guk Han (Kookmin University, Korea) [Abstract] Side-channel analysis (SCA) is an analysis method to extract secret information using power consumption, electromagnetic waves, sound, etc., which occur when an encryption algorithm operates in a device. In [2], Lee et al. conducted SCA into the 8-bit based AES-128 algorithm operating on the ChipWhisperer-Lite board. As a result, it was found that Correlation Power Analysis (CPA) using only the most significant bit (MSB) of an 8-bit intermediate value is better than CPA using an 8-bit Hamming weight of the value. In this paper, we demonstrate that CPA using only a specific bit has the superior performance because of the modulo operation in Galois field of the 8-bit based AES-128 encryption algorithm. We performed CPA on the xtime operation part. As a result, we show that power consumption related with the MSB occurs while performing the modulo operation in Galois field. 19:00-20:30 Reception Party & Service Award Ceremony Room: Grand Ballroom Foyer (B2) (Casual Standing Party with delicious finger foods and drinks) Chair: Mucheol Kim(Chung-Ang University, Korea) Tuesday, January 29 09:00-10:00 Registration open Grand Ballroom Foyer (B2 floor), Booyoung Jeju Hotel & Resort 10:00-11:20 4-A: Computing Platform & CRET 2019 Room: Emerald A Chair: Chun-Feng Liao (National Chengchi University, Taiwan) A Study on Electrocardiogram Based Biometrics Using Embedded Module Jin Su Kim, Gyu Ho Choi and Sung Bum Pan (Chosun University, Korea) [Abstract] Biometrics technology uses bio-signal data, which are unique for each person, as features for identification. Among the biometrics, electrocardiogram (ECG) signals, which are related to the heartbeat, can be used for personal identification as well as disease diagnosis, and also makes it easier to miniaturize measuring devices compared to other bio-signals. In this paper, an ECGbased personal identification system using embedded module is proposed. When an ECG signal is entered, the computer removes noise and segments the signal, after which the signals are transmitted to the embedded module. The embedded module extracts the morphological features of the ECG signal and classifies ECG data. Experiment results showed that the segmented drive and the single drive exhibited equal results, and the equal error rate (EER) was the lowest at an average of 0.74% when the number of verification data was 6. To shorten the operating time of the implemented personal identification system, three embedded module optimization methods were used, it decreased by 66.1%. Thereby confirming potential use of the identification system by using ECG signals based small devices. 9

10 Simple Shadow Detection Using Chromaticity and Minimum Cross Entropy Chang-Gyun Woo, Ki-Hong Park and Yoon-Ho Kim (MokWon University, Korea) [Abstract] Shadows included in images are common phenomena observed in natural images and are a negative factor in digital image analysis. Therefore, shadow detection is a very important problem in various image analysis and it must be performed in the preprocessing process of image analysis. In the paper, we propose shadow candidate detection using the chromaticity and entropy image. The chromaticity image can be calculated based on the RGB color model, and shadows are based on features with dark pixels in the image. The entropy image based on minimum cross entropy can be obtained using the optimal threshold value at the grayscale level. Experimental results show that proposed method using the chromaticity and the entropy image can effectively detect shadow candidates. A Proposal of Iterative Consensus Process for Group Decision Making Yosep Lee and Young B Park (Dankook University, Korea) [Abstract] Consensus is so important that it has always occupied its crucial position in human society. In particular, the meaning and importance of consensus in democratic society is much more special because it is a social system that operates based on the consensus among people. Up to now, human society has reached consensus by using the majority vote, but it is clear that there are several problems in it. Meanwhile, there are lots of researches which have been carried out so far to develop the appropriate methodology and tools for reaching out consensus. However, these researches suggest that measurement to derive the result is difficult for general purpose in that the evaluation is one-time, and that the trust problem arises from delegating the consensus process to the 3- rd party such as information system is not solved. In this paper, we propose an iterative consensus process which can solve the problems above, and general description about this process is included. The proposed process draws consensus in an iterative way, visualize the information generated from iteration, presents it to the participants, and supports the participants' consensus through structured discussion. In addition, the trust problem, which occurs when a consensus process is delegated to the information system can be solved with utilizing the blockchain technology by conveying and ensuring the reliability of the result, and this proposed process can adopt it. The Trends of English Learning Through Mobile Devices in Korea for the Last 19 Years Jyun Bang (Busan Metropolitan City Institute for Gifted Education and Promotion, Korea) [Abstract] The purpose of this study was to analyze the trends of English learning through mobile devices for the last 19 years (from 2000 to 2018) by utilizing key word-network analysis methods. For the analysis of English researchregarding mobiles device use in Korea, 130 papers including published papers in journals and MA thesis and Ph.D. dissertations were found in digital data bases like RISS, KISS, DBPIA, NDSL, KISTI, and national Assembly Library. The key words were extracted from the abstract of the papers and analyzed for keyword frequency and central network analyses through the Netminer 4.0. First, the key words such as "mobile learning,""mobile application""vocabulary learning", "m-learning," and "mobile App" were the highest frequent key words. Second, it was found that "elementary school students" and "university or college learners" were one of the most significant words with regards to learners' levels. Finally, it was known that "vocabulary or word learning" and "speaking practices" were found as important keywords among English four skills. In the end, the pedagogical implications should be offered for the future study of English learning through mobile devices. 10:00-11:20 4-B: SCA 2019 Room: Emerald B Chair: Ahyoung Kim (Electronics and Telecommunications Research Institute, Korea) e-mentoring-based Intelligent Healthcare Monitoring Platform Ahyoung Kim and Soomyung Park (ETRI, Korea) [Abstract] In this paper, we proposed a healthcare monitoring platform based on keyword analysis using software engineering techniques. We have designed a system that presents intelligent biometric information to the clinical system and provides consultation between doctor-patient (mentor-mentees) and clinical learning between doctor-intern (mentor-mentees). 360-Degree Image Matching Using Optimization Method Okkyung Choi (Myongji University, Korea); HyunChul Lee (Aju University, Korea) [Abstract] Recently, with the rapid growth of manufacture and ease of user convenience, technologies utilizing VR images have been increasing. It is very important estimating of projected direction and position of the image to show the image quality similar to the real world, and estimation of the direction and the position is solved by using the relation that transforms the spheres into the expanded Equirectangular. We can use the transform relationship to calculate the exact camera parameters and make the VR image similar to the real world. In this paper, we compare and analyze efficient camera parameter update methods. For comparative analysis, we use Levenberg-Marquardt, a parameter optimization algorithm using corresponding points, and propose an efficient camera parameter update method based on the analysis results. 10

11 A Case Study for Block Chain in Smart Grid Junho Kim and Sangyong Han (Chung-Ang University, Korea), Namyeon Lee (Hanshin University, Korea), Mucheol Kim (Chung- Ang University, Korea) [Abstract] Distributed and decentralized management systems are emerging innovative technologies. They could change the approaches including production, distribution and consumption process. Especially smart grid technology is important to sustainable energy management. this paper studied the important issues for blockchain based energy management. Design Methodology of Web Services Choreography Language Okkyung Choi (Myongji University, Korea) [Abstract] Rise of the internet is a viable way to manage information resources and the need to integrate services further necessitates companies to focus on B2Bi. Especially the Web technologies which enable electronic document exchanges among different information platforms are replacing an educational infrastructure. This study aims to develop a design methodology of web services choreography languages based on web standards. Along with the methodology, we will report practical usage scenarios of the methodology and demonstrate how it can be used for developing a product prototype for domestic firms which are interested in educational models. Proposed methodology is expected to provide basic guidelines to develop web-based integration systems. Augmented Reality Based on the Job Training Through Object Detection and Text Mining Gukwon Koo (Kyunghee University, Korea), Namyeon Lee (Hanshin University, Korea), Ohbyung Kwon (Kyunghee University, Korea) [Abstract] The purpose of this study is to propose a methodology for establishing an augmented reality-based business analysis model for on the job training through object detection and text analysis. The proposed methodology consists of text mining and object detection. In the text mining, articles on hotel management published since last decade is collected to extract causal relationships which are useful for on the job training and to save them in the rule base. When it comes to object detection, we detect various objects in real time through YOLO(You Only Look Once). Then a set of causalities which is matched and displayed to the trainees who are wearing AR devices. To our best knowledge, this method is the first to identify causal knowledge from text and linked to AR technology for on the job training. In addition, the methodology proposed in this study reduces the organization's development and maintenance costs required for operating on the job training program. The method would allow trainee to become immersed in training environment, which results in improving the effectiveness of on the job training. 11:20-11:40 Coffee break 11:40-13:30 Lunch Diamond (1st Floor) 13:30-14:20 Invited Talk 2 Standardization Projects in 3D-Based Medical Device Applications - Visualization, Data Management, 3D Simulation, Bio-CAD Format for 3D Printing Dr. Young Lae Moon, Professor, Department of Orthopaedic, Chosun University Hospital, Gwangju, Korea Room: Emerald B Chair: Young-Ae Jung (Sun Moon University, Korea) 11

12 14:20-14:40 Coffee break 14:40-16:00 5-A: Convergence Platform Room: Emerald A Chair: Dongwann Kang (Seoul National University of Science and Technology, Korea) Using Blockchain to Enhance and Optimize IoT-based Intelligent Traffic System Ka-Lok Man (Xi'an Jiaotong-Liverpool University, P.R. China) [Abstract] Smart city blueprint is constructed by increasing deployment of various Internet of Things devices. In this paper, we focus on data transmission and request for lane property right under the domain of an intelligent traffic system. IoT devices are usually deployed in a heterogeneous environment, with the natural gene of decentralization. Compared with cloud-based centralized architecture, in this paper, we introduce blockchain as a decentralized technology to let vehicles jointly collaborate without having to go through a central computing node authority. Data transmission between vehicles uses a peer-to-peer network in which every node communicates directly with every other node, verified by their relevant end-point nodes; lane's acquisition right is approved by all relevant vehicle nodes, as well as with consensus agreed upon via smart contract. The Design of Graph-Based Privacy Protection Mechanisms for Mobile Systems Zhong Zhang, Sungha Yoon and Minho Shin (Myongji University, Korea) [Abstract] In the range of mobile privacy, there are many attack methods which can reveal the user's private information. The attacker can use the communication between applications to violate permissions and access the private information without the user's authorization. Therefore, many researchers focus on privilege escalation. However, the attacker can increase their knowledge about the user without achieving privilege escalation through various inference techniques. For this reason, we extend the concept of privilege escalation attack to a more general information escalation attack, and propose a privacy protection mechanism based on the graphbased inference model. The Impact of PCA-Scale Improving GRU Performance for Intrusion Detection Thi-Thu-Huong Le, Hyoeun Kang and Ho Won Kim (Pusan National University, Korea) [Abstract] An Intrusion Detection System (IDS) is a device or software application that monitors a network or systems for malicious activity. Conventional IDS does not detect elaborate cyber-attacks such as a low-rate DoS attack as well as unknown attacks. To overcome such deficiencies, in advanced IDS based on Machine Learning has attracted more and more interests in recent years. In this paper, we propose a novel method to improve intrusion detection accuracy of Gated Recurrent Unit (GRU) by embedding the proposed PCA-Scale with two options including PCA-Standardized and PCA-MinMax into the layer of GRU. Both optional methods explicitly enforce the learned object feature maps by affecting the direction of maximum variance with positive covariance. This proposed can be universally applied to GRU model with negligible additional computation cost. We present experimental results on two real-world datasets such as KDD Cup 99 and NSL-KDD demonstrate that GRU model trained with PCA-Scaled method achieves remarkable performance improvements. Source Code Analysis for Static Prediction of Dynamic Memory Usage Sangwho Kim and Jaecheol Ryou (Chungnam National University, Korea) [Abstract] We studied source code analysis techniques to predict statically how real programs work and use memory. If we can recognize problems of memory usage in the source code, we are able to prevent them and improve security in the software development phase. The problem detection techniques which are already existed can detect whether the program includes weak code such as Common Vulnerabilities and Exposures, Common Weakness Enumeration. However, these methods are not useful for finding problems in programs that do not include OpenSource. because they use hash value or pattern of weak code contained in OpenSource. Therefore, we propose a static prediction technique for dynamic memory usage with source code analysis without using techniques such as similarity detection. Also, we present how to calculate the values used for static prediction from the source code. 12

13 14:40-16:00 5-B: CIA 2019 Room: Emerald B Chair: Sang Oh Park (Chung-Ang University, Korea) Combining Multiple Load Forecasting Models Using MLR Jihoon Moon and Seungwon Jung (Korea University, Korea), Seungmin Rho (Sungkyul University, Korea), Eenjun Hwang (Korea University, Korea) [Abstract] In this paper, we propose a two-stage based combination scheme of multiple very short-term load forecasting (VSTLF) models for day-ahead energy scheduling of smart grids. To construct our forecasting model, we collected 15-minute interval electric load data of three years from a science and engineering complex at a university campus and split them into a training set and test set. In the first stage, we build four VSTLF models based on Support Vector Regression (SVR), Gradient Boosting Machine (GBM), Random Forest (RF), and Multilayer Perceptron (MLP) using the training set. In the second stage, we construct a Multiple Linear Regressionbased forecasting model using the test set to compute the final value from the forecasting values of four models. To show the performance of our approach, we carried out several experiments for the actual electric load data. We report some of the results. The Design of AR Emotional Messenger Using Smart Glasses Eun-Bin Kim and Jongin Choi (Sungkyul University, Korea); Sanghyun Seo (SungKyul University, Korea) [Abstract] We propose emotional messenger based on Smart Glass for Augmented Reality to overcome the limitations of existing instant messaging applications. In order to implement AR instant messaging using smart glass, it is necessary to understand the difference between instant messaging used in conventional smartphones. We propose input/output methods suitable for smart glass and generated 3D virtual Augmented Reality environments so that users can express their personalities in 3D AR virtual space. In addition, the ways to express the their emotion were constructed through emotional analysis so that users can effectively communicate their personality and intentions. Gait Correction System Based on Gait Cycle and Gait Angle Seong-wook Jang (Korea University of Technology and Education, Korea), Yon-Sik Yoo (Hallym University Medical Center, Korea), Yoonsang Kim (Korea University of Technology and Education, Korea) [Abstract] Diseases with recently increasing incidences such as lumbago, scoliosis, and degenerative arthritis are affected by abnormal gait patterns. In this paper, we propose a gait correction system based on gait cycle and gait angle to improve abnormal gait patterns. The proposed system analyzes the gait pattern using the force sensing resistor (FSR) and inertial measurement unit (IMU) and provides corrective feedback on that basis. The FSR is used to estimate the gait cycle. The IMU is used to evaluate the gait pattern by measuring the gait angle on the stance phase. A Study on Ethical and Legal Discussion on Artificial Intelligence Joohee Kim (Korea Institute of S&T Evaluation and Planning, Korea), Dae-Hee Lee (University of Korea, Korea) [Abstract] Thesedays autonomous vehicles, legal discussions on artificial intelligence are very urgent and important, given the growing use of artificial intelligence products and services that we use in everyday life. Particularly, in relation to artificial intelligence technology, it is necessary to discuss laws and regulations at a fundamental level about issues such as data, privacy, algorithms, legal liability, and information security. However, it is difficult to judge the cause of accidents or accidents caused by artificial intelligence technology. The issue of legal responsibility for accidents, the extent of economic responsibility, and social and ethical debate, too. Some countries such as United States, EU, started reviewing normative responses to future risk factors, but are cautious about legal approaches (Park & Kim, 2017). This article analyze whether the laws and initiative laws related to artificial intelligence faithfully describe the issues that need to be dealt with socially ethically. To do this, firstly we examine and understand the artificial intelligence technically, the legal issues related to technology, and the legal and ethical debates of government at the level of foreign countries. Next on, we examine current laws and pending legistrations which are in Korea is appropriate to cope with the future. 16:00-16:20 Coffee break 13

MSc(CompSc) List of courses offered in

MSc(CompSc) List of courses offered in Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The

More information

Design of Traffic Flow Simulation System to Minimize Intersection Waiting Time

Design of Traffic Flow Simulation System to Minimize Intersection Waiting Time Design of Traffic Flow Simulation System to Minimize Intersection Waiting Time Jang, Seung-Ju Department of Computer Engineering, Dongeui University Abstract This paper designs a traffic simulation system

More information

Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration

Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration Research Supervisor: Minoru Etoh (Professor, Open and Transdisciplinary Research Initiatives, Osaka University)

More information

A Study of Optimal Spatial Partition Size and Field of View in Massively Multiplayer Online Game Server

A Study of Optimal Spatial Partition Size and Field of View in Massively Multiplayer Online Game Server A Study of Optimal Spatial Partition Size and Field of View in Massively Multiplayer Online Game Server Youngsik Kim * * Department of Game and Multimedia Engineering, Korea Polytechnic University, Republic

More information

Industry 4.0: the new challenge for the Italian textile machinery industry

Industry 4.0: the new challenge for the Italian textile machinery industry Industry 4.0: the new challenge for the Italian textile machinery industry Executive Summary June 2017 by Contacts: Economics & Press Office Ph: +39 02 4693611 email: economics-press@acimit.it ACIMIT has

More information

Digital Transformation. A Game Changer. How Does the Digital Transformation Affect Informatics as a Scientific Discipline?

Digital Transformation. A Game Changer. How Does the Digital Transformation Affect Informatics as a Scientific Discipline? Digital Transformation A Game Changer How Does the Digital Transformation Affect Informatics as a Scientific Discipline? Manfred Broy Technische Universität München Institut for Informatics ... the change

More information

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic

More information

Global Journal on Technology

Global Journal on Technology Global Journal on Technology Vol 5 (2014) 73-77 Selected Paper of 4 th World Conference on Information Technology (WCIT-2013) Issues in Internet of Things for Wellness Human-care System Jae Sung Choi*,

More information

Durham Research Online

Durham Research Online Durham Research Online Deposited in DRO: 29 August 2017 Version of attached le: Accepted Version Peer-review status of attached le: Not peer-reviewed Citation for published item: Chiu, Wei-Yu and Sun,

More information

IMPLEMENTATION OF SOFTWARE-BASED 2X2 MIMO LTE BASE STATION SYSTEM USING GPU

IMPLEMENTATION OF SOFTWARE-BASED 2X2 MIMO LTE BASE STATION SYSTEM USING GPU IMPLEMENTATION OF SOFTWARE-BASED 2X2 MIMO LTE BASE STATION SYSTEM USING GPU Seunghak Lee (HY-SDR Research Center, Hanyang Univ., Seoul, South Korea; invincible@dsplab.hanyang.ac.kr); Chiyoung Ahn (HY-SDR

More information

INDUSTRY 4.0. Modern massive Data Analysis for Industry 4.0 Industry 4.0 at VŠB-TUO

INDUSTRY 4.0. Modern massive Data Analysis for Industry 4.0 Industry 4.0 at VŠB-TUO INDUSTRY 4.0 Modern massive Data Analysis for Industry 4.0 Industry 4.0 at VŠB-TUO Václav Snášel Faculty of Electrical Engineering and Computer Science VŠB-TUO Czech Republic AGENDA 1. Industry 4.0 2.

More information

Application of AI Technology to Industrial Revolution

Application of AI Technology to Industrial Revolution Application of AI Technology to Industrial Revolution By Dr. Suchai Thanawastien 1. What is AI? Artificial Intelligence or AI is a branch of computer science that tries to emulate the capabilities of learning,

More information

PROGRAM CONCEPT NOTE Theme: Identity Ecosystems for Service Delivery

PROGRAM CONCEPT NOTE Theme: Identity Ecosystems for Service Delivery PROGRAM CONCEPT NOTE Theme: Identity Ecosystems for Service Delivery Program Structure for the 2019 ANNUAL MEETING DAY 1 PS0 8:30-9:30 Opening Ceremony Opening Ceremony & Plenaries N0 9:30-10:30 OPENING

More information

A study on facility management application scenario of BIMGIS modeling data

A study on facility management application scenario of BIMGIS modeling data International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 6 Issue 11 November 2017 PP. 40-45 A study on facility management application scenario of

More information

Day One 13 March Day Two 14 March 2019

Day One 13 March Day Two 14 March 2019 GSEF 2019 Advisory Board Ralph Lauxmann, Senior Vice President Systems & Technology, Continental Automotive Hans Adlkofer, Vice President Systems Group, The Automotive Division, Infineon Technologies Hai

More information

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers Kwang-il Hwang, Kyung-tae Kim, and Doo-seop Eom Department of Electronics and Computer Engineering, Korea University 5-1ga,

More information

Research and application on the smart home based on component technologies and Internet of Things

Research and application on the smart home based on component technologies and Internet of Things Available online at www.sciencedirect.com Procedia Engineering 15 (2011) 2087 2092 Advanced in Control Engineering and Information Science Research and application on the smart home based on component

More information

Development of IoT based Pier collision Monitoring System

Development of IoT based Pier collision Monitoring System , pp.148-153 http://dx.doi.org/10.14257/astl.2016.137.28 Development of IoT based Pier collision Monitoring System Soo-Yeol Park 1, Sung-min Kang 1, Keum-Soo Yeo 1, Byung-Yun Won 1 1 Korea Plant Maintenace

More information

SPTF: Smart Photo-Tagging Framework on Smart Phones

SPTF: Smart Photo-Tagging Framework on Smart Phones , pp.123-132 http://dx.doi.org/10.14257/ijmue.2014.9.9.14 SPTF: Smart Photo-Tagging Framework on Smart Phones Hao Xu 1 and Hong-Ning Dai 2* and Walter Hon-Wai Lau 2 1 School of Computer Science and Engineering,

More information

DEVELOPMENT OF A ROBOID COMPONENT FOR PLAYER/STAGE ROBOT SIMULATOR

DEVELOPMENT OF A ROBOID COMPONENT FOR PLAYER/STAGE ROBOT SIMULATOR Proceedings of IC-NIDC2009 DEVELOPMENT OF A ROBOID COMPONENT FOR PLAYER/STAGE ROBOT SIMULATOR Jun Won Lim 1, Sanghoon Lee 2,Il Hong Suh 1, and Kyung Jin Kim 3 1 Dept. Of Electronics and Computer Engineering,

More information

BIM Awareness and Acceptance by Architecture Students in Asia

BIM Awareness and Acceptance by Architecture Students in Asia BIM Awareness and Acceptance by Architecture Students in Asia Euisoon Ahn 1 and Minseok Kim* 2 1 Ph.D. Candidate, Department of Architecture & Architectural Engineering, Seoul National University, Korea

More information

Analysis of Computer IoT technology in Multiple Fields

Analysis of Computer IoT technology in Multiple Fields IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Analysis of Computer IoT technology in Multiple Fields To cite this article: Huang Run 2018 IOP Conf. Ser.: Mater. Sci. Eng. 423

More information

Mobile Crowdsensing enabled IoT frameworks: harnessing the power and wisdom of the crowd

Mobile Crowdsensing enabled IoT frameworks: harnessing the power and wisdom of the crowd Mobile Crowdsensing enabled IoT frameworks: harnessing the power and wisdom of the crowd Malamati Louta Konstantina Banti University of Western Macedonia OUTLINE Internet of Things Mobile Crowd Sensing

More information

A New Forecasting System using the Latent Dirichlet Allocation (LDA) Topic Modeling Technique

A New Forecasting System using the Latent Dirichlet Allocation (LDA) Topic Modeling Technique A New Forecasting System using the Latent Dirichlet Allocation (LDA) Topic Modeling Technique JU SEOP PARK, NA RANG KIM, HYUNG-RIM CHOI, EUNJUNG HAN Department of Management Information Systems Dong-A

More information

A Study on Imaging Cameras Fire Prevention Solutions Using Thermal

A Study on Imaging Cameras Fire Prevention Solutions Using Thermal , pp.62-67 http://dx.doi.org/10.14257/astl.2016.138.15 A Study on Imaging Cameras Fire Prevention Solutions Using Thermal Kim Hee Chul Dept. of Computer Engineering GwangJu University 277 Hyodeok-Ro, Nam-Gu,

More information

Introduction to Systems Engineering

Introduction to Systems Engineering p. 1/2 ENES 489P Hands-On Systems Engineering Projects Introduction to Systems Engineering Mark Austin E-mail: austin@isr.umd.edu Institute for Systems Research, University of Maryland, College Park Career

More information

Сonceptual framework and toolbox for digital transformation of industry of the Eurasian Economic Union

Сonceptual framework and toolbox for digital transformation of industry of the Eurasian Economic Union Сonceptual framework and toolbox for digital transformation of industry of the Eurasian Economic Union Dmitry Krupsky Head of Department of Economy of Innovation Activity, Ministry of Economy of the Republic

More information

An Introduction to a Taxonomy of Information Privacy in Collaborative Environments

An Introduction to a Taxonomy of Information Privacy in Collaborative Environments An Introduction to a Taxonomy of Information Privacy in Collaborative Environments GEOFF SKINNER, SONG HAN, and ELIZABETH CHANG Centre for Extended Enterprises and Business Intelligence Curtin University

More information

AGENTS AND AGREEMENT TECHNOLOGIES: THE NEXT GENERATION OF DISTRIBUTED SYSTEMS

AGENTS AND AGREEMENT TECHNOLOGIES: THE NEXT GENERATION OF DISTRIBUTED SYSTEMS AGENTS AND AGREEMENT TECHNOLOGIES: THE NEXT GENERATION OF DISTRIBUTED SYSTEMS Vicent J. Botti Navarro Grupo de Tecnología Informática- Inteligencia Artificial Departamento de Sistemas Informáticos y Computación

More information

Ofcom Call for Information on Promoting Investment and Innovation in the Internet of Things Response from Ericsson Ltd October 2014

Ofcom Call for Information on Promoting Investment and Innovation in the Internet of Things Response from Ericsson Ltd October 2014 Ofcom Call for Information on Promoting Investment and Innovation in the Internet of Things Response from Ericsson Ltd October 2014 Ericsson welcomes this opportunity to offer input to Ofcom on the Internet

More information

Software-Intensive Systems Producibility

Software-Intensive Systems Producibility Pittsburgh, PA 15213-3890 Software-Intensive Systems Producibility Grady Campbell Sponsored by the U.S. Department of Defense 2006 by Carnegie Mellon University SSTC 2006. - page 1 Producibility

More information

Framework Programme 7

Framework Programme 7 Framework Programme 7 1 Joining the EU programmes as a Belarusian 1. Introduction to the Framework Programme 7 2. Focus on evaluation issues + exercise 3. Strategies for Belarusian organisations + exercise

More information

To the Front Lines of Digital Transformation

To the Front Lines of Digital Transformation To the Front Lines of Digital Transformation Seeing the Heretofore Unseen Future Tips for Digital Transformation The Fujitsu Digital Transformation Center (DTC) is a co-creation workshop space that empowers

More information

Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain

Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain This fiche is part of the wider roadmap for cross-cutting KETs activities Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain Cross-cutting

More information

Eleonora Escalante, MBA - MEng Strategic Corporate Advisory Services Creating Corporate Integral Value (CIV)

Eleonora Escalante, MBA - MEng Strategic Corporate Advisory Services Creating Corporate Integral Value (CIV) Eleonora Escalante, MBA - MEng Strategic Corporate Advisory Services Creating Corporate Integral Value (CIV) Leg 7. Trends in Competitive Advantage. 21 March 2018 Drawing Source: Edx, Delft University.

More information

The Seamless Localization System for Interworking in Indoor and Outdoor Environments

The Seamless Localization System for Interworking in Indoor and Outdoor Environments W 12 The Seamless Localization System for Interworking in Indoor and Outdoor Environments Dong Myung Lee 1 1. Dept. of Computer Engineering, Tongmyong University; 428, Sinseon-ro, Namgu, Busan 48520, Republic

More information

Development of the A-STEAM Type Technological Models with Creative and Characteristic Contents for Infants Based on Smart Devices

Development of the A-STEAM Type Technological Models with Creative and Characteristic Contents for Infants Based on Smart Devices Indian Journal of Science and Technology, Vol 9(44), DOI: 10.17485/ijst/2016/v9i44/105169, November 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Development of the A-STEAM Type Technological

More information

GSEF 2019 Advisory Board

GSEF 2019 Advisory Board GSEF 2019 Advisory Board Ralph Lauxmann, Senior Vice President Systems & Technology, Continental Automotive Hans Adlkofer, Vice President Systems Group, The Automotive Division, Infineon Technologies Hai

More information

Design of Intelligent Blind Control System to Save Lighting Energy and Prevent Glare

Design of Intelligent Blind Control System to Save Lighting Energy and Prevent Glare , pp.541-545 http://dx.doi.org/10.14257/astl.2015.1 Design of Intelligent Blind Control System to Save Lighting Energy and Prevent Glare Mi-Ae Yu 1, Hyeong-Seok Kim 1, Yang-Soo Kim 1, Won-Il Seo 1, Young-Ho

More information

Cognitive Radio: Smart Use of Radio Spectrum

Cognitive Radio: Smart Use of Radio Spectrum Cognitive Radio: Smart Use of Radio Spectrum Miguel López-Benítez Department of Electrical Engineering and Electronics University of Liverpool, United Kingdom M.Lopez-Benitez@liverpool.ac.uk www.lopezbenitez.es,

More information

Years 9 and 10 standard elaborations Australian Curriculum: Digital Technologies

Years 9 and 10 standard elaborations Australian Curriculum: Digital Technologies Purpose The standard elaborations (SEs) provide additional clarity when using the Australian Curriculum achievement standard to make judgments on a five-point scale. They can be used as a tool for: making

More information

A Study on the KSF Evaluations of Design Management for Korean Small and Medium Companies

A Study on the KSF Evaluations of Design Management for Korean Small and Medium Companies Indian Journal of Science and Technology, Vol 9(46), DOI: 10.17485/ijst/2016/v9i46/107858, December 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 A Study on the KSF Evaluations of Design Management

More information

Available online at ScienceDirect. Procedia Computer Science 56 (2015 )

Available online at  ScienceDirect. Procedia Computer Science 56 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 56 (2015 ) 538 543 International Workshop on Communication for Humans, Agents, Robots, Machines and Sensors (HARMS 2015)

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction 1.1Motivation The past five decades have seen surprising progress in computing and communication technologies that were stimulated by the presence of cheaper, faster, more reliable

More information

The User Activity Reasoning Model Based on Context-Awareness in a Virtual Living Space

The User Activity Reasoning Model Based on Context-Awareness in a Virtual Living Space , pp.62-67 http://dx.doi.org/10.14257/astl.2015.86.13 The User Activity Reasoning Model Based on Context-Awareness in a Virtual Living Space Bokyoung Park, HyeonGyu Min, Green Bang and Ilju Ko Department

More information

Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments

Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments Antonio Kung, CTO 25 rue du Général Foy, 75008 Paris www.trialog.com 9 May 2017 1 Introduction Speaker Engineering

More information

Methodology for Agent-Oriented Software

Methodology for Agent-Oriented Software ب.ظ 03:55 1 of 7 2006/10/27 Next: About this document... Methodology for Agent-Oriented Software Design Principal Investigator dr. Frank S. de Boer (frankb@cs.uu.nl) Summary The main research goal of this

More information

Autonomous Robotic (Cyber) Weapons?

Autonomous Robotic (Cyber) Weapons? Autonomous Robotic (Cyber) Weapons? Giovanni Sartor EUI - European University Institute of Florence CIRSFID - Faculty of law, University of Bologna Rome, November 24, 2013 G. Sartor (EUI-CIRSFID) Autonomous

More information

Asia Conference Singapore

Asia Conference Singapore Fujitsu World Tour 2017 Asia Conference Singapore Human Centric Innovation: Digital Co-Creation Yoshikuni Takashige Vice President, Marketing Strategy and Vision Fujitsu Limited Fujitsu Technology and

More information

SoC Design Conference

SoC Design Conference 2 0 0 5 International Conference COEX Conference Center, Seoul, Korea October 20-21, 2005 I S O C C 2 0 0 5 I S O C C 2 International 0 0 5 http://www.isocc.org Conference Hosted by Technical Society IEEK

More information

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use:

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use: Executive Summary Artificial Intelligence (AI) is a suite of technologies capable of learning, reasoning, adapting, and performing tasks in ways inspired by the human mind. With access to data and the

More information

Transform. Jeongchoon Ryoo. Dong-Guk Han. Seoul, Korea Rep.

Transform. Jeongchoon Ryoo. Dong-Guk Han. Seoul, Korea Rep. 978-1-4673-2451-9/12/$31.00 2012 IEEE 201 CPA Performance Comparison based on Wavelet Transform Aesun Park Department of Mathematics Kookmin University Seoul, Korea Rep. aesons@kookmin.ac.kr Dong-Guk Han

More information

A Local-Dimming LED BLU Driving Circuit for a 42-inch LCD TV

A Local-Dimming LED BLU Driving Circuit for a 42-inch LCD TV A Local-Dimming LED BLU Driving Circuit for a 42-inch LCD TV Yu-Cheol Park 1, Hee-Jun Kim 2, Back-Haeng Lee 2, Dong-Hyun Shin 3 1 Yu-Cheol Park Intelligent Vehicle Technology R&D Center, KATECH, Korea

More information

Vessel Target Prediction Method and Dead Reckoning Position Based on SVR Seaway Model

Vessel Target Prediction Method and Dead Reckoning Position Based on SVR Seaway Model Original Article International Journal of Fuzzy Logic and Intelligent Systems Vol. 17, No. 4, December 2017, pp. 279-288 http://dx.doi.org/10.5391/ijfis.2017.17.4.279 ISSN(Print) 1598-2645 ISSN(Online)

More information

IEEE IoT Vertical and Topical Summit - Anchorage September 18th-20th, 2017 Anchorage, Alaska. Call for Participation and Proposals

IEEE IoT Vertical and Topical Summit - Anchorage September 18th-20th, 2017 Anchorage, Alaska. Call for Participation and Proposals IEEE IoT Vertical and Topical Summit - Anchorage September 18th-20th, 2017 Anchorage, Alaska Call for Participation and Proposals With its dispersed population, cultural diversity, vast area, varied geography,

More information

Technology Trends for Government

Technology Trends for Government Technology Trends for Government Leaders @RajneshSingh rds@jugad.in Where we came from Module 4: ICT Trends for Government Leaders First edition: 2007/8 Revised: 2011 But ICT Trends are fast-evolving K

More information

AN0503 Using swarm bee LE for Collision Avoidance Systems (CAS)

AN0503 Using swarm bee LE for Collision Avoidance Systems (CAS) AN0503 Using swarm bee LE for Collision Avoidance Systems (CAS) 1.3 NA-14-0267-0019-1.3 Document Information Document Title: Document Version: 1.3 Current Date: 2016-05-18 Print Date: 2016-05-18 Document

More information

KEY FOCUS. Mobile Solutions for. Securing the Entire Identity Trust Chain. Border Management. Solving the Challenges of Breeder Documents

KEY FOCUS. Mobile Solutions for. Securing the Entire Identity Trust Chain. Border Management. Solving the Challenges of Breeder Documents I n f o r ma t i o nb r o c h u r e ABOUT THE 5TH BMIC The 5th and Identity Conference on Technical Cooperation & Capacity Building (5th BMIC) is organised by the International Organization for Migration

More information

TECHNICAL AND OPERATIONAL NOTE ON CHANGE MANAGEMENT OF GAMBLING TECHNICAL SYSTEMS AND APPROVAL OF THE SUBSTANTIAL CHANGES TO CRITICAL COMPONENTS.

TECHNICAL AND OPERATIONAL NOTE ON CHANGE MANAGEMENT OF GAMBLING TECHNICAL SYSTEMS AND APPROVAL OF THE SUBSTANTIAL CHANGES TO CRITICAL COMPONENTS. TECHNICAL AND OPERATIONAL NOTE ON CHANGE MANAGEMENT OF GAMBLING TECHNICAL SYSTEMS AND APPROVAL OF THE SUBSTANTIAL CHANGES TO CRITICAL COMPONENTS. 1. Document objective This note presents a help guide for

More information

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit)

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit) Exhibit R-2 0602308A Advanced Concepts and Simulation ARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit) FY 2005 FY 2006 FY 2007 FY 2008 FY 2009 FY 2010 FY 2011 Total Program Element (PE) Cost 22710 27416

More information

Effectiveness Analysis of Anti-torpedo Warfare Simulation for Evaluating Mix Strategies of Decoys and Jammers

Effectiveness Analysis of Anti-torpedo Warfare Simulation for Evaluating Mix Strategies of Decoys and Jammers Effectiveness Analysis of Anti-torpedo Warfare Simulation for Evaluating Mix Strategies of Decoys and Jammers Se Jung Kwon 1, Kyung-Min Seo 1, Byeong-soo Kim 1, Tag Gon Kim 1 1 Department of Electrical

More information

Looking ahead : Technology trends driving business innovation.

Looking ahead : Technology trends driving business innovation. NTT DATA Technology Foresight 2018 Looking ahead : Technology trends driving business innovation. Technology will drive the future of business. Digitization has placed society at the beginning of the next

More information

Industry 4.0. Advanced and integrated SAFETY tools for tecnhical plants

Industry 4.0. Advanced and integrated SAFETY tools for tecnhical plants Industry 4.0 Advanced and integrated SAFETY tools for tecnhical plants Industry 4.0 Industry 4.0 is the digital transformation of manufacturing; leverages technologies, such as Big Data and Internet of

More information

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Title: [Kookmin University Response to 15.7r1 CFA: Applications of OWC] Date Submitted: [March, 2015] Source: [Md. Shareef

More information

Digitalisation as day-to-day-business

Digitalisation as day-to-day-business Digitalisation as day-to-day-business What is today feasible for the company in the future Prof. Jivka Ovtcharova INSTITUTE FOR INFORMATION MANAGEMENT IN ENGINEERING Baden-Württemberg Driving force for

More information

BI TRENDS FOR Data De-silofication: The Secret to Success in the Analytics Economy

BI TRENDS FOR Data De-silofication: The Secret to Success in the Analytics Economy 11 BI TRENDS FOR 2018 Data De-silofication: The Secret to Success in the Analytics Economy De-silofication What is it? Many successful companies today have found their own ways of connecting data, people,

More information

5G, IoT, UN-SDG OMA LwM2M, IPSO

5G, IoT, UN-SDG OMA LwM2M, IPSO 5G, IoT, UN-SDG OMA LwM2M, IPSO Padmakumar Subramani (NOKIA), Chair, OMASpecWorks DM&SE WG 12-5-2018 Contents Sustainable Development Goals - UN... 2 No Poverty... 2 Zero Hunger... 2 Good Health and Well-Being...

More information

M2M Communications and IoT for Smart Cities

M2M Communications and IoT for Smart Cities M2M Communications and IoT for Smart Cities Soumya Kanti Datta, Christian Bonnet Mobile Communications Dept. Emails: Soumya-Kanti.Datta@eurecom.fr, Christian.Bonnet@eurecom.fr Roadmap Introduction to Smart

More information

Energy modeling/simulation Using the BIM technology in the Curriculum of Architectural and Construction Engineering and Management

Energy modeling/simulation Using the BIM technology in the Curriculum of Architectural and Construction Engineering and Management Paper ID #7196 Energy modeling/simulation Using the BIM technology in the Curriculum of Architectural and Construction Engineering and Management Dr. Hyunjoo Kim, The University of North Carolina at Charlotte

More information

Internet of Things Application Practice and Information and Communication Technology

Internet of Things Application Practice and Information and Communication Technology 2019 2nd International Conference on Computer Science and Advanced Materials (CSAM 2019) Internet of Things Application Practice and Information and Communication Technology Chen Ning Guangzhou City Polytechnic,

More information

A Survey on Smart City using IoT (Internet of Things)

A Survey on Smart City using IoT (Internet of Things) A Survey on Smart City using IoT (Internet of Things) Akshay Kadam 1, Vineet Ovhal 2, Anita Paradhi 3, Kunal Dhage 4 U.G. Student, Department of Computer Engineering, SKNCOE, Pune, Maharashtra, India 1234

More information

SAP Dynamic Edge Processing IoT Edge Console - Administration Guide Version 2.0 FP01

SAP Dynamic Edge Processing IoT Edge Console - Administration Guide Version 2.0 FP01 SAP Dynamic Edge Processing IoT Edge Console - Administration Guide Version 2.0 FP01 Table of Contents ABOUT THIS DOCUMENT... 3 Glossary... 3 CONSOLE SECTIONS AND WORKFLOWS... 5 Sensor & Rule Management...

More information

Image Extraction using Image Mining Technique

Image Extraction using Image Mining Technique IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 9 (September. 2013), V2 PP 36-42 Image Extraction using Image Mining Technique Prof. Samir Kumar Bandyopadhyay,

More information

Research on the Integration and Verification of Foundational Software and Hardware

Research on the Integration and Verification of Foundational Software and Hardware Research on the Integration and Verification of Foundational Software and Hardware Jing Guo, Lingda Wu, Yashuai Lv, Bo Li, and Ronghuan Yu Abstract Following the high-speed development of information technology,

More information

CSTA K- 12 Computer Science Standards: Mapped to STEM, Common Core, and Partnership for the 21 st Century Standards

CSTA K- 12 Computer Science Standards: Mapped to STEM, Common Core, and Partnership for the 21 st Century Standards CSTA K- 12 Computer Science s: Mapped to STEM, Common Core, and Partnership for the 21 st Century s STEM Cluster Topics Common Core State s CT.L2-01 CT: Computational Use the basic steps in algorithmic

More information

Good afternoon. Under the title of Trust and Co-creation in the Digital Era, I would like to explain our research and development strategy.

Good afternoon. Under the title of Trust and Co-creation in the Digital Era, I would like to explain our research and development strategy. Good afternoon. Under the title of Trust and Co-creation in the Digital Era, I would like to explain our research and development strategy. LABORATORIES LTD. 1 Looking back, it has been 83 years since

More information

Impacts and Risks Caused by AI Networking, and Future Challenges

Impacts and Risks Caused by AI Networking, and Future Challenges Impacts and Risks Caused by AI Networking, and Future Challenges (From Studies on AI Networking in Japan) November 17, 2016 Tatsuya KUROSAKA Project Assistant Professor at Keio University Graduate School

More information

The Fourth Industrial Revolution in Major Countries and Its Implications of Korea: U.S., Germany and Japan Cases

The Fourth Industrial Revolution in Major Countries and Its Implications of Korea: U.S., Germany and Japan Cases Vol. 8 No. 20 ISSN -2233-9140 The Fourth Industrial Revolution in Major Countries and Its Implications of Korea: U.S., Germany and Japan Cases KIM Gyu-Pan Director General of Advanced Economies Department

More information

IBM SPSS Neural Networks

IBM SPSS Neural Networks IBM Software IBM SPSS Neural Networks 20 IBM SPSS Neural Networks New tools for building predictive models Highlights Explore subtle or hidden patterns in your data. Build better-performing models No programming

More information

UNIT 2 TOPICS IN COMPUTER SCIENCE. Emerging Technologies and Society

UNIT 2 TOPICS IN COMPUTER SCIENCE. Emerging Technologies and Society UNIT 2 TOPICS IN COMPUTER SCIENCE Emerging Technologies and Society EMERGING TECHNOLOGIES Technology has become perhaps the greatest agent of change in the modern world. While never without risk, positive

More information

The Seven Megatrends of Cambric

The Seven Megatrends of Cambric The Seven Megatrends of Cambric Bob Gourley, Partner, Cognitio May 18, 2016 Bob.gourley@cognitiocorp.com How we think. About This Presentation Ø What if you could know everything about the future of IT

More information

The Internet: The New Industrial Revolution

The Internet: The New Industrial Revolution The Internet: The New Industrial Revolution China expects to combine its industrial and Internet advantages to pioneer a new industrial revolution, keep up with global trends, and fully realize its competitive

More information

The world s first collaborative machine-intelligence competition to overcome spectrum scarcity

The world s first collaborative machine-intelligence competition to overcome spectrum scarcity The world s first collaborative machine-intelligence competition to overcome spectrum scarcity Paul Tilghman Program Manager, DARPA/MTO 8/11/16 1 This slide intentionally left blank 2 This slide intentionally

More information

InSciTe Adaptive: Intelligent Technology Analysis Service Considering User Intention

InSciTe Adaptive: Intelligent Technology Analysis Service Considering User Intention InSciTe Adaptive: Intelligent Technology Analysis Service Considering User Intention Jinhyung Kim, Myunggwon Hwang, Do-Heon Jeong, Sa-Kwang Song, Hanmin Jung, Won-kyung Sung Korea Institute of Science

More information

Automated Driving Car Using Image Processing

Automated Driving Car Using Image Processing Automated Driving Car Using Image Processing Shrey Shah 1, Debjyoti Das Adhikary 2, Ashish Maheta 3 Abstract: In day to day life many car accidents occur due to lack of concentration as well as lack of

More information

Innovation Report: The Manufacturing World Will Change Dramatically in the Next 5 Years: Here s How. mic-tec.com

Innovation Report: The Manufacturing World Will Change Dramatically in the Next 5 Years: Here s How. mic-tec.com Innovation Report: The Manufacturing World Will Change Dramatically in the Next 5 Years: Here s How mic-tec.com Innovation Study 02 The Manufacturing World - The Next 5 Years Contents Part I Part II Part

More information

Speed Enforcement Systems Based on Vision and Radar Fusion: An Implementation and Evaluation 1

Speed Enforcement Systems Based on Vision and Radar Fusion: An Implementation and Evaluation 1 Speed Enforcement Systems Based on Vision and Radar Fusion: An Implementation and Evaluation 1 Seungki Ryu *, 2 Youngtae Jo, 3 Yeohwan Yoon, 4 Sangman Lee, 5 Gwanho Choi 1 Research Fellow, Korea Institute

More information

To the Front Lines of Digital Transformation

To the Front Lines of Digital Transformation To the Front Lines of Digital Transformation Concept Seeing the Heretofore Unseen Future- Tips for Digital Transformation The Fujitsu Digital Transformation Center (DTC) is a co-creation workshop space

More information

Innovation that delivers operational benefit

Innovation that delivers operational benefit DEFENCE & SECURITY Defence and security system developers Rapid evolution of technology poses both an opportunity and a threat for defence and security systems. Today s solutions need to adapt to an everchanging

More information

SUNG-UK PARK THE 4TH INDUSTRIAL REVOLUTION AND R&D POLICY

SUNG-UK PARK THE 4TH INDUSTRIAL REVOLUTION AND R&D POLICY DOI: 10.20472/IAC.2017.33.056 SUNG-UK PARK KISTI, Korea, Republic of THE 4TH INDUSTRIAL REVOLUTION AND R&D POLICY Abstract: In this 4th Industrial Revolution, we are facing a range of new technologies

More information

MORE POWER TO THE ENERGY AND UTILITIES BUSINESS, FROM AI.

MORE POWER TO THE ENERGY AND UTILITIES BUSINESS, FROM AI. MORE POWER TO THE ENERGY AND UTILITIES BUSINESS, FROM AI www.infosys.com/aimaturity The current utility business model is under pressure from multiple fronts customers, prices, competitors, regulators,

More information

Information Sociology

Information Sociology Information Sociology Educational Objectives: 1. To nurture qualified experts in the information society; 2. To widen a sociological global perspective;. To foster community leaders based on Christianity.

More information

COMEST CONCEPT NOTE ON ETHICAL IMPLICATIONS OF THE INTERNET OF THINGS (IoT)

COMEST CONCEPT NOTE ON ETHICAL IMPLICATIONS OF THE INTERNET OF THINGS (IoT) SHS/COMEST-10EXT/18/3 Paris, 16 July 2018 Original: English COMEST CONCEPT NOTE ON ETHICAL IMPLICATIONS OF THE INTERNET OF THINGS (IoT) Within the framework of its work programme for 2018-2019, COMEST

More information

Stanford Center for AI Safety

Stanford Center for AI Safety Stanford Center for AI Safety Clark Barrett, David L. Dill, Mykel J. Kochenderfer, Dorsa Sadigh 1 Introduction Software-based systems play important roles in many areas of modern life, including manufacturing,

More information

UNIT-III LIFE-CYCLE PHASES

UNIT-III LIFE-CYCLE PHASES INTRODUCTION: UNIT-III LIFE-CYCLE PHASES - If there is a well defined separation between research and development activities and production activities then the software is said to be in successful development

More information

Energy-Efficient Random Access for Machine- to-machine (M2M) Communications

Energy-Efficient Random Access for Machine- to-machine (M2M) Communications Energy-Efficient Random Access for achine- to-achine (2) Communications Hano Wang 1 and Choongchae Woo 2 1 Information and Telecommunication Engineering, Sangmyung University, 2 Electronics, Computer and

More information

Front Digital page Strategy and Leadership

Front Digital page Strategy and Leadership Front Digital page Strategy and Leadership Who am I? Prof. Dr. Bob de Wit What concerns me? - How to best lead a firm - How to design the strategy process - How to best govern a country - How to adapt

More information

How can boards tackle the Essential Eight and other emerging technologies?

How can boards tackle the Essential Eight and other emerging technologies? How can boards tackle the Essential Eight and other emerging technologies? are transforming companies. What should your board know about them? Companies are looking at the next generation of digital technologies

More information

MECHANICAL DESIGN LEARNING ENVIRONMENTS BASED ON VIRTUAL REALITY TECHNOLOGIES

MECHANICAL DESIGN LEARNING ENVIRONMENTS BASED ON VIRTUAL REALITY TECHNOLOGIES INTERNATIONAL CONFERENCE ON ENGINEERING AND PRODUCT DESIGN EDUCATION 4 & 5 SEPTEMBER 2008, UNIVERSITAT POLITECNICA DE CATALUNYA, BARCELONA, SPAIN MECHANICAL DESIGN LEARNING ENVIRONMENTS BASED ON VIRTUAL

More information

457 APR The Fourth Medium to Long-term Plan has started. No.

457 APR The Fourth Medium to Long-term Plan has started. No. 457 APR 2016 No. The Fourth Medium to Long-term Plan has started We are sorry to inform you that this April 2016 issue will be the final one to be distributed in printed materials. It would be appreciated

More information