• Title/Summary/Keyword: 클라우드-컴퓨팅

Search Result 1,403, Processing Time 0.023 seconds

A Study on Vulnerability for Isolation Guarantee in Container-based Virtualization (컨테이너 기반 가상화에서 격리성 보장을 위한 취약성 고찰)

  • Dayun Yum;Dongcheon Shin
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.23-32
    • /
    • 2023
  • Container-based virtualization has attracted many attentions as an alternative to virtual machine technology because it can be used more lightly by sharing the host operating system instead of individual guest operating systems. However, this advantage may owe some vulnerabilities. In particular, excessive resource use of some containers can affect other containers, which is known as the noisy neighbor problem, so that the important property of isolation may not be guaranteed. The noisy neighbor problem can threat the availability of containers, so we need to consider the noisy neighbor problem as a security problem. In this paper, we investigate vulnerabilities on guarantee of isolation incurred by the noisy neighbor problem in container-based virtualization. For this we first analyze the structure of container-based virtualization environments. Then we present vulnerabilities in 3 functional layers and general directions for solutions with limitations.

Unveiling the Influence of Corporate Organizational Inertia on Cloud Computing Transition Intentions: An Empirical Inquiry (기업내 조직 관성이 클라우드 컴퓨팅 전환 의도에 미치는 영향에 관한 실증적 연구)

  • Jae Won Kang;Sangyoon Yi
    • Journal of Information Technology Services
    • /
    • v.23 no.3
    • /
    • pp.17-37
    • /
    • 2024
  • This study explores the tendency of corporations and organizations to continue with their current processes despite having incentives for better Information Technology (IT) innovation or transition. In this context, the study argues that organizations may struggle with 'outsourcing inertia,' a well-known concept referring to an organization's deficient adaptability to environmental changes, particularly defined here as the organization's slow adaptation to changes in outsourcing levels. To verify this, the study analyzes how key variables identified from existing IT Outsourcing (ITO) decision-making research and recent studies on cloud computing transitions actually affect a firm's transition intentions. In the process, this study investigates the moderating effect of a firm's outsourcing inertia, utilizing the Technology-Organization-Environment (TOE) framework and the Push-Pull-Mooring (PPM) model based on migration theory to propose a research model. The study aims to contribute to finding strategic approaches necessary for facilitating IT innovation and transition by understanding the impact of outsourcing inertia on the decision-making process related to IT outsourcing. It is important to note that the majority of domestic conglomerates own IT subsidiaries, which significantly influence the process of transitioning to cloud computing. Nevertheless, research on the impact of IT subsidiaries on cloud computing transition is relatively scarce. Based on this background, this study proposes that IT subsidiaries within domestic conglomerates can act as a significant mooring factor of organizational inertia in the decision-making process for adopting cloud computing. Through this, the study seeks to provide strategic insights for overcoming organizational inertia faced by IT subsidiaries during the cloud computing transition process.

Analysis for File Access Characteristics of Mobile Artificial Intelligence Workloads (모바일 인공지능 워크로드의 파일 접근 특성 분석)

  • Jeongha Lee;Soojung Lim;Hyokyung Bahn
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.4
    • /
    • pp.77-82
    • /
    • 2024
  • Recent advancements in artificial intelligence (AI) technology have led to an increase in the implementation of AI applications in mobile environments. However, due to the limited resources in mobile devices compared to desktops and servers, there is growing interest in research aimed at efficiently executing AI workloads on mobile platforms. While most studies focus on offloading to edge or cloud solutions to mitigate computing resource constraints, research on the characteristics of file I/O related to storage access in mobile settings remains underexplored. This paper analyzes file I/O traces generated during the execution of deep learning applications in mobile environments and investigates how they differ from traditional mobile workloads. We anticipate that the findings of this study will be utilized to design future smartphone system software more efficiently, considering the file access characteristics of deep learning.

Robust and Efficient Measurement Using a 3D Laser Line Sensor on UGVs (UGV에서 3D 레이저 라인 센서를 이용한 강건하고 효율적인 이격 측정)

  • Jiwoo Shin;Jun-Yong Park;Seoyeon Kim;Taesik Kim;Jinman Jung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.9
    • /
    • pp.468-473
    • /
    • 2024
  • Excavation work in urban areas can induce ground deformation, which may damage nearby infrastructure. Such ground deformation can result in displacement of paving blocks near the construction site. Accurate measurement of these displacements can serve as an indicator for assessing the potential risks associated with ground deformation. This paper proposes a robust and efficient method for paving block displacement measurement using a 3D laser line sensor mounted on an Unmanned Ground Vehicle (UGV). The proposed method consists of two stages: 2D projection based object detection and measurement through the CPLF algorithm. Experimental results demonstrate that the CPLF algorithm is more efficient compared to the PLF algorithm, achieving an error of 1.36 mm and a processing time of 10.76 ms, confirming that the proposed method ensures robust online measurements with high accuracy in real-world environments with various types of paving blocks and environmental factors using a 3D laser line sensor on a UGV.

Active and Context-Resilient Cyber Defense Operation applying the Concept of Performing Mosaic Warfare (모자이크전 수행 개념을 적용한 능동형 상황 탄력적 사이버 방어작전)

  • Jung-Ho Eom
    • Convergence Security Journal
    • /
    • v.21 no.4
    • /
    • pp.41-48
    • /
    • 2021
  • Recently, the aspect of war is evolving due to the 4th industrial revolution technology. Among them, AI technology is changing the way of war as it is applied to advanced weapon systems and decision-making systems. Mosaic Warfare, presented by the U.S. DARPA, is shifting military warfare from attrition-centric warfare to decision-centric warfare by combining Internet of Things, cloud computing, big data, mobile, and artificial intelligence technologies. In addition, it is a method to perform operations quickly so that the most offensive effect can be achieved by appropriately combining the distributed and deployed forces according to the battlefield context. In other words, military operations are not carried out through a uniform combat process, but various forces are operated through a distributed system depending on the battlefield context. In cyber warfare, as artificial intelligence is applied to cyber attack technology, there is a limit to responding with the same procedural response method as the existing cyber kill chain. Therefore, in this paper, the execution method of mosaic warfare is applied to perform context-resilient cyber operations that can operate a response system according to the attack and cyberspace context.

Requirement Analysis for Agricultural Meteorology Information Service Systems based on the Fourth Industrial Revolution Technologies (4차 산업혁명 기술에 기반한 농업 기상 정보 시스템의 요구도 분석)

  • Kim, Kwang Soo;Yoo, Byoung Hyun;Hyun, Shinwoo;Kang, DaeGyoon
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.21 no.3
    • /
    • pp.175-186
    • /
    • 2019
  • Efforts have been made to introduce the climate smart agriculture (CSA) for adaptation to future climate conditions, which would require collection and management of site specific meteorological data. The objectives of this study were to identify requirements for construction of agricultural meteorology information service system (AMISS) using technologies that lead to the fourth industrial revolution, e.g., internet of things (IoT), artificial intelligence, and cloud computing. The IoT sensors that require low cost and low operating current would be useful to organize wireless sensor network (WSN) for collection and analysis of weather measurement data, which would help assessment of productivity for an agricultural ecosystem. It would be recommended to extend the spatial extent of the WSN to a rural community, which would benefit a greater number of farms. It is preferred to create the big data for agricultural meteorology in order to produce and evaluate the site specific data in rural areas. The digital climate map can be improved using artificial intelligence such as deep neural networks. Furthermore, cloud computing and fog computing would help reduce costs and enhance the user experience of the AMISS. In addition, it would be advantageous to combine environmental data and farm management data, e.g., price data for the produce of interest. It would also be needed to develop a mobile application whose user interface could meet the needs of stakeholders. These fourth industrial revolution technologies would facilitate the development of the AMISS and wide application of the CSA.

A Study on Production of Broadcasting New Media Style Guide (방송사 뉴미디어 스타일 가이드 제작에 관한 연구)

  • Kim, Kyung-Yoon;Jung, Hoe-Kyung
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.379-385
    • /
    • 2014
  • N-Screen era is held due to the cloud computing technology which access to contents anytime, anywhere without any persistent. In the broadcast industry, this broadcast contents is rapidly serviced by variety of media devices such as PC, Smart phone, Tablet, App, IPTV. To Increase the usefulness and usability of the platform, same brand identity have to be maintain by devices and integrated guide which can encompass a variety of media are needed. This study tries to figure out the need of New Media Style Guide to keep brand identity in a variety of new media beyond previously Web style guide which limited in the Web pages. First, Integrated Guide GEL of BBC's and Web style guide of KBS was analyzed. Through the analysis it was found that the limitations and problem of the current web style guide and then suggested the improvement direction. In addition, this study tried to find which design elements should be made for new media style guides through in-depth interview with practitioners who work in broadcast media industry for more than three years. Through the research it was understood the current status of integrated brand identity and found a way to improve forward to new media platforms of KBS.

A Study on the Improvement Scheme of University's Software Education

  • Lee, Won Joo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.243-250
    • /
    • 2020
  • In this paper, we propose an effective software education scheme for universities. The key idea of this software education scheme is to analyze software curriculum of QS world university rankings Top 10, SW-oriented university, and regional main national university. And based on the results, we propose five improvements for the effective SW education method of universities. The first is to enhance the adaptability of the industry by developing courses based on the SW developer's job analysis in the curriculum development process. Second, it is necessary to strengthen the curriculum of the 4th industrial revolution core technologies(cloud computing, big data, virtual/augmented reality, Internet of things, etc.) and integrate them with various fields such as medical, bio, sensor, human, and cognitive science. Third, programming language education should be included in software convergence course after basic syntax education to implement projects in various fields. In addition, the curriculum for developing system programming developers and back-end developers should be strengthened rather than application program developers. Fourth, it offers opportunities to participate in industrial projects by reinforcing courses such as capstone design and comprehensive design, which enables product-based self-directed learning. Fifth, it is necessary to develop university-specific curriculum based on local industry by reinforcing internship or industry-academic program that can acquire skills in local industry field.

Sentiment Analysis Engine for Cambodian Music Industry Re-building (캄보디아 음악 산업 재건을 위한 감정 분석 엔진 연구)

  • Khoeurn, Saksonita;Kim, Yun Seon
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.4
    • /
    • pp.23-34
    • /
    • 2017
  • During Khmer Rouge Regime, Cambodian pop music was completely forgotten since 90% of artists were killed. After recovering from war since 1979, the music started to grow again in 1990. However, Cambodian popular music dynamic and flows are observably directed by the multifaceted socioeconomic, political and creative forces. The major problems are the plagiarism and piracy which have been prevailing for years in the industry. Recently, the consciousness of the need to preserve Khmer original songs from both fans and artist have been increased and become a new trend for Cambodia young population. Still, the music quality is in the limit state. To increase the mind-set, the feedbacks and inspiration are needed. The study suggested a music ranking website using sentiment analysis which data were collected from Production Companies Facebook Pages' posts and comments. The study proposed an algorithm which translates from Khmer to English, doing sentiment analysis and generate the ranking. The result showed 80% accuracy of translation and sentiment analysis on the proposed system. The songs that rank high in the system are the songs which are original and fit the occasion in Cambodia. With the proposed ranking algorithm, it would help to increase the competitive advantage of the musical productions as well as to encourage the producers to compose the new songs which fit the particular activities and event.

Effects of Information Overload to Information Privacy Protective Response in Internet of Things(Iot) (사물인터넷 시대의 개인정보과잉이 정보프라이버시 보호반응에 미치는 영향)

  • So, Won-Geun;Kim, Ha-Kyun
    • Management & Information Systems Review
    • /
    • v.36 no.1
    • /
    • pp.81-94
    • /
    • 2017
  • In the age of information overload such as Internet of Things(IoT), big data, and cloud computing, Data and informations are collected to processed regardless of the individual's will. The purpose of this paper presents a model related to personal information overlord, information privacy risk, information privacy concern (collection, control, awareness) and personal information privacy protective response. The results of this study is summarized as follows. First, personal information overload significantly affects information privacy risk. Second, personal information overload significantly affects information privacy concern(collection, control, awareness) Third, information privacy risk significantly affects collection and awareness among information privacy concern, but control does not significantly affects. This results shows that users are cognitively aware the information risk through collection and awareness of information. Users can not control information by self, control of information does not affects. Last, information privacy concern(collection and awareness significantly affect information privacy protective response, but information privacy concern (control) does not affect. Personal information users are concerned about information infringement due to excessive personal information, ability to protect private information became strong.

  • PDF