• Title/Summary/Keyword: 클라우드 기술

Search Result 1,591, Processing Time 0.031 seconds

A Study on the Image/Video Data Processing Methods for Edge Computing-Based Object Detection Service (에지 컴퓨팅 기반 객체탐지 서비스를 위한 이미지/동영상 데이터 처리 기법에 관한 연구)

  • Jang Shin Won;Yong-Geun Hong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.11
    • /
    • pp.319-328
    • /
    • 2023
  • Unlike cloud computing, edge computing technology analyzes and judges data close to devices and users, providing advantages such as real-time service, sensitive data protection, and reduced network traffic. EdgeX Foundry, a representative open source of edge computing platforms, is an open source-based edge middleware platform that provides services between various devices and IT systems in the real world. EdgeX Foundry provides a service for handling camera devices, along with a service for handling existing sensed data, which only supports simple streaming and camera device management and does not store or process image data obtained from the device inside EdgeX. This paper presents a technique that can store and process image data inside EdgeX by applying some of the services provided by EdgeX Foundry. Based on the proposed technique, a service pipeline for object detection services used core in the field of autonomous driving was created for experiments and performance evaluation, and then compared and analyzed with existing methods.

Audience and Media Predictors for Digital Content Purchases: A Multilevel Approach (디지털 콘텐츠 구매를 위한 고객 및 미디어 요인: 다층수준 접근 방식)

  • Bo-Ram Kwon;HanByeol Stella Choi;Junyeong Lee
    • Information Systems Review
    • /
    • v.22 no.4
    • /
    • pp.115-134
    • /
    • 2020
  • Previous studies on willingness to pay for digital content have mainly focused on audience factors and individual level. To complement the limitation of previous research, this study conducts a multilevel analysis to find the factors influence digital content purchases considering two axes: audience/media factors and individual/household levels. Using a sample of 10,172 individuals within 4,313 households, the analysis results show individual media factors including theater-going, experience with cloud services, and multi-screen service usage have the greatest effects on digital content purchases. At the household level, the media ownership factors that the number of laptops, wireless routers, and tablets have a greater influence than audience factors such as household size or household income. Our findings help scholars to enhance the understanding of individuals' media use considering household environmental factors and shed light on the importance of multi-screen service usage, and content providers to improve their digital content sales using multi-screen environment.

A Study on Vulnerability for Isolation Guarantee in Container-based Virtualization (컨테이너 기반 가상화에서 격리성 보장을 위한 취약성 고찰)

  • Dayun Yum;Dongcheon Shin
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.23-32
    • /
    • 2023
  • Container-based virtualization has attracted many attentions as an alternative to virtual machine technology because it can be used more lightly by sharing the host operating system instead of individual guest operating systems. However, this advantage may owe some vulnerabilities. In particular, excessive resource use of some containers can affect other containers, which is known as the noisy neighbor problem, so that the important property of isolation may not be guaranteed. The noisy neighbor problem can threat the availability of containers, so we need to consider the noisy neighbor problem as a security problem. In this paper, we investigate vulnerabilities on guarantee of isolation incurred by the noisy neighbor problem in container-based virtualization. For this we first analyze the structure of container-based virtualization environments. Then we present vulnerabilities in 3 functional layers and general directions for solutions with limitations.

Analysis for File Access Characteristics of Mobile Artificial Intelligence Workloads (모바일 인공지능 워크로드의 파일 접근 특성 분석)

  • Jeongha Lee;Soojung Lim;Hyokyung Bahn
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.4
    • /
    • pp.77-82
    • /
    • 2024
  • Recent advancements in artificial intelligence (AI) technology have led to an increase in the implementation of AI applications in mobile environments. However, due to the limited resources in mobile devices compared to desktops and servers, there is growing interest in research aimed at efficiently executing AI workloads on mobile platforms. While most studies focus on offloading to edge or cloud solutions to mitigate computing resource constraints, research on the characteristics of file I/O related to storage access in mobile settings remains underexplored. This paper analyzes file I/O traces generated during the execution of deep learning applications in mobile environments and investigates how they differ from traditional mobile workloads. We anticipate that the findings of this study will be utilized to design future smartphone system software more efficiently, considering the file access characteristics of deep learning.

A Study on the Reliability Improvement of Blockchain-based Ship Inspection Service (블록체인 기반 선박검사 서비스의 신뢰성 향상에 관한 연구)

  • Chun-Won Jang;Young-Soo Kang;Seung-Min Lee;Jun-Mo Park
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.25 no.1
    • /
    • pp.15-20
    • /
    • 2024
  • In the field of ship inspection in South Korea, due to outdated workflow processes, there is a possibility of tampering with inspection results. Accordingly, research is being conducted to prevent tampering with inspection results by introducing blockchain technology and cloud-based systems that allow real-time tracking and sharing of data, and to establish a transparent and efficient communication system. In this study, unit and integrated processes for overall data management and inspection execution related to ship inspection were implemented to automatically collect, manage, and track various inspection results occurring during the ship inspection process. Through this, it aimed to increase the efficiency of the ship inspection process overall, inducing growth in the ship inspection industry as a whole. The implemented web portal reached a level where trend analysis and comparative analysis with other ships based on inspection results are possible, and subsequent research aims to demonstrate the excellence of the system.

A Study on Improvement of Inspection Items for Activation of the Information Security Pre-inspection (정보보호 사전점검 활성화를 위한 점검항목 개선 연구)

  • Choi, Ju Young;Kim, JinHyung;Park, Jung-Sub;Park, Choon Sik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.933-940
    • /
    • 2015
  • IT environments such as IoT, SNS, BigData, Cloud computing are changing rapidly. These technologies add new technologies to some of existing technologies and increase the complexity of Information System. Accordingly, they require enhancing the security function for new IT services. Information Security Pre-inspection aims to assure stability and reliability for user and supplier of new IT services by proposing development stage which considers security from design phase. Existing 'Information Security Pre-inspection' (22 domains, 74 control items, 129 detail items) consist of 6 stage (Requirements Definition, Design, Training, Implementation, Test, Sustain). Pilot tests were executed for one of IT development companies to verify its effectiveness. Consequently, for some inspection items, some improvement requirements and reconstitution needs appeared. This paper conducts a study on activation of 'Information Security Pre-inspection' which aims to construct prevention system for new information system. As a result, an improved 'Information Security Pre-inspection' is suggested. This has 16 domains, 54 inspection items, 76 detail items which include some improvement requirements and reconstitution needs.

Research on text mining based malware analysis technology using string information (문자열 정보를 활용한 텍스트 마이닝 기반 악성코드 분석 기술 연구)

  • Ha, Ji-hee;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.45-55
    • /
    • 2020
  • Due to the development of information and communication technology, the number of new / variant malicious codes is increasing rapidly every year, and various types of malicious codes are spreading due to the development of Internet of things and cloud computing technology. In this paper, we propose a malware analysis method based on string information that can be used regardless of operating system environment and represents library call information related to malicious behavior. Attackers can easily create malware using existing code or by using automated authoring tools, and the generated malware operates in a similar way to existing malware. Since most of the strings that can be extracted from malicious code are composed of information closely related to malicious behavior, it is processed by weighting data features using text mining based method to extract them as effective features for malware analysis. Based on the processed data, a model is constructed using various machine learning algorithms to perform experiments on detection of malicious status and classification of malicious groups. Data has been compared and verified against all files used on Windows and Linux operating systems. The accuracy of malicious detection is about 93.5%, the accuracy of group classification is about 90%. The proposed technique has a wide range of applications because it is relatively simple, fast, and operating system independent as a single model because it is not necessary to build a model for each group when classifying malicious groups. In addition, since the string information is extracted through static analysis, it can be processed faster than the analysis method that directly executes the code.

Construction of 3D Spatial Information of Vertical Structure by Combining UAS and Terrestrial LiDAR (UAS와 지상 LiDAR 조합에 의한 수직 구조물의 3차원 공간정보 구축)

  • Kang, Joon-Oh;Lee, Yong-Chang
    • Journal of Cadastre & Land InformatiX
    • /
    • v.49 no.2
    • /
    • pp.57-66
    • /
    • 2019
  • Recently, as a part of the production of spatial information by smart cities, three-dimensional reproduction of structures for reverse engineering has been attracting attention. In particular, terrestrial LiDAR is mainly used for 3D reproduction of structures, and 3D reproduction research by UAS has been actively conducted. However, both technologies produce blind spots due to the shooting angle. This study deals with vertical structures. 3D model implemented through SfM-based image analysis technology using UAS and reproducibility and effectiveness of 3D models by terrestrial LiDAR-based laser scanning are examined. In addition, two 3D models are merged and reviewed to complement the blind spot. For this purpose, UAS based image is acquired for artificial rock wall, VCP and check point are set through GNSS equipment and total station, and 3D model of structure is reproduced by using SfM based image analysis technology. In addition, Through 3D LiDAR scanning, the 3D point cloud of the structure was acquired, and the accuracy of reproduction and completeness of the 3D model based on the checkpoint were compared and reviewed with the UAS-based image analysis results. In particular, accuracy and realistic reproducibility were verified through a combination of point cloud constructed from UAS and terrestrial LiDAR. The results show that UAS - based image analysis is superior in accuracy and 3D model completeness and It is confirmed that accuracy improves with the combination of two methods. As a result of this study, it is expected that UAS and terrestrial LiDAR laser scanning combination can complement and reproduce precise three-dimensional model of vertical structure, so it can be effectively used for spatial information construction, safety diagnosis and maintenance management.

Internet-of-Things Based Approach for Monitoring Pharmaceutical Cold Chain (사물인터넷을 이용한 의약품 콜드체인 관리 시스템)

  • Chandra, Abel Avitesh;Back, Jong Sang;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.9
    • /
    • pp.828-840
    • /
    • 2014
  • There is a new evolution in technological advancement taking place called the Internet of Things (IoT). The IoT enables physical world objects in our surroundings to be connected to the Internet. For this idea to come to life, two architectures are required: the Sensing Entity in the environment which collects data and connects to the cloud and the Cloud Service that hosts the data. In particular, the combination of wireless sensor network for sensing and cloud computing for managing sensor data is becoming a popular intervention for the IoT era. The pharmaceutical cold chain requires controlled environmental conditions for the sensitive products in order for them to maintain their potency and fit for consumption. The monitoring of distribution process is the only assurance that a process has been successfully validated. The distribution process is so critical that anomaly at any point will result in the process being no longer valid. Taking the cold chain monitoring to IoT and using its benefits and power will result in better management and product handling in the cold chain. In this paper, Arduino based wireless sensor network for storage and logistics (land and sea) is presented and integrated with Xively cloud service to offer a real-time and innovative solution for pharmaceutical cold chain monitoring.

Analysis and Forecasting for ICT Convergence Industries (ICT 융합 산업의 현황 및 전망)

  • Jang, Hee S.;Park, Jong T.
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.15-24
    • /
    • 2015
  • The trade balance for the information and communications technology (ICT) industries in 2014 have reached 863 hundred million dollars as the main export products such as smart phone and semi-conductor increase, since the ICT industries have played an important role in economic growth in Korea. Until now, the consistent supporting of government and investment of company have been doing with the growth of ICT industries, as a result, Korea marked as the first in the UN electronic government preparing index, and rank 12 in the network preparing index through the policy of national information and basic plan of inter-industry convergence. However, as the unstable international economic circumstances, ICT industries is faced with the stagnation, and then preemptive development of products and services for ICT convergence industries is needed to continually get definite ICT Korea image. In this paper, the ICT convergence industry is analyzed and forecasted. In specific, the international and domestic market for cloud, 3D convergence, and internet of things is diagnosed. The market for ICT convergence industries is predicted to be 3.6 trillion dollar in the world, and 110 trillion won in domestic. From the analytical results for technology and services development, the preemptive supporting of the technology development and policy for the internet of things and 3D convergence industries is required. In addition to, through the future forecasting by socio-tech matrix method, the policy supporting for the ICT convergence area of healthcare, fintech, artificial intelligence, body platform, and human security is needed.