• Title/Summary/Keyword: Cloud Networks

Search Result 259, Processing Time 0.03 seconds

Development of a System for Field-data Collection Transmission and Monitoring based on Low Power Wide Area Network (저전력 광역통신망 기반 현장데이터 수집 전송 및 모니터링 시스템 개발)

  • Yeong-Tae, Ju;Jong-Sil, Kim;Eung-Kon, Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.6
    • /
    • pp.1105-1112
    • /
    • 2022
  • Field data monitoring systems such as renewable energy generation and smart farm integrated control are developing from PC and server to mobile first, and various wireless communication and application services have emerged with the development of IoT technology. Low-power wide-area networks are services optimized for low-power, low-capacity, and low-speed data transmission, and data collected in the field is transmitted to designated storage servers or cloud-based data platforms, enabling data monitoring. In this paper, we implement an IoT repeater that collects field data with a single device and transmits it to a wireless carrier cloud data flat using a low-power wide-area network, and a monitoring app using it. Using this, the system configuration is simpler, the cost of deployment and operation is lower, and effective data accumulation is possible.

Rainfall Intensity Estimation Using Geostationary Satellite Data Based on Machine Learning: A Case Study in the Korean Peninsula in Summer (정지 궤도 기상 위성을 이용한 기계 학습 기반 강우 강도 추정: 한반도 여름철을 대상으로)

  • Shin, Yeji;Han, Daehyeon;Im, Jungho
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.5_3
    • /
    • pp.1405-1423
    • /
    • 2021
  • Precipitation is one of the main factors that affect water and energy cycles, and its estimation plays a very important role in securing water resources and timely responding to water disasters. Satellite-based quantitative precipitation estimation (QPE) has the advantage of covering large areas at high spatiotemporal resolution. In this study, machine learning-based rainfall intensity models were developed using Himawari-8 Advanced Himawari Imager (AHI) water vapor channel (6.7 ㎛), infrared channel (10.8 ㎛), and weather radar Column Max (CMAX) composite data based on random forest (RF). The target variables were weather radar reflectivity (dBZ) and rainfall intensity (mm/hr) converted by the Z-R relationship. The results showed that the model which learned CMAX reflectivity produced the Critical Success Index (CSI) of 0.34 and the Mean-Absolute-Error (MAE) of 4.82 mm/hr. When compared to the GeoKompsat-2 and Precipitation Estimation from Remotely Sensed Information Using Artificial Neural Networks (PERSIANN)-Cloud Classification System (CCS) rainfall intensity products, the accuracies improved by 21.73% and 10.81% for CSI, and 31.33% and 23.49% for MAE, respectively. The spatial distribution of the estimated rainfall intensity was much more similar to the radar data than the existing products.

A step-by-step service encryption model based on routing pattern in case of IP spoofing attacks on clustering environment (클러스터링 환경에 대한 IP 스푸핑 공격 발생시 라우팅 패턴에 기반한 단계별 서비스 암호화 모델)

  • Baek, Yong-Jin;Jeong, Won-Chang;Hong, Suk-Won;Park, Jae-Hung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.580-586
    • /
    • 2017
  • The establishment of big data service environment requires both cloud-based network technology and clustering technology to improve the efficiency of information access. These cloud-based networks and clustering environments can provide variety of valuable information in real-time, which can be an intensive target of attackers attempting illegal access. In particular, attackers attempting IP spoofing can analyze information of mutual trust hosts constituting clustering, and attempt to attack directly to system existing in the cluster. Therefore, it is necessary to detect and respond to illegal attacks quickly, and it is demanded that the security policy is stronger than the security system that is constructed and operated in the existing single system. In this paper, we investigate routing pattern changes and use them as detection information to enable active correspondence and efficient information service in illegal attacks at this network environment. In addition, through the step-by -step encryption based on the routing information generated during the detection process, it is possible to manage the stable service information without frequent disconnection of the information service for resetting.

Analysis of statistical models for ozone concentrations at the Paju city in Korea (경기도 파주시 오존농도의 통계모형 연구)

  • Lee, Hoon-Ja
    • Journal of the Korean Data and Information Science Society
    • /
    • v.20 no.6
    • /
    • pp.1085-1092
    • /
    • 2009
  • The ozone data is one of the important environmental data for measurement of the atmospheric condition of the country. In this article, the Autoregressive Error (ARE) model and Neural Networks (NN) model have been considered for analyzing the ozone data at the northern part of the Gyeonggi-Do, Paju monitoring site in Korea. In the both ARE model and NN model, seven meteorological variables and four pollution variables are used as the explanatory variables for the ozone data set. The seven meteorological variables are daily maximum temperature, wind speed, relative humidity, rainfall, dew point temperature, steam pressure, and amount of cloud. The four air pollution explanatory variables are Sulfur dioxide ($SO_2$), Nitrogen dioxide ($NO_2$), Cobalt (CO), and Promethium 10 (PM10). The result showed that the NN model is generally better suited for describing the ozone concentration than the ARE model. However, the ARE model will be expected also good when we add the explanatory variables in the model.

  • PDF

Designing Mutual Cooperation Security Model for IP Spoofing Attacks about Medical Cluster Basis Big Data Environment (의료클러스터 기반의 빅 데이터 환경에 대한 IP Spoofing 공격 발생시 상호협력 보안 모델 설계)

  • An, Chang Ho;Baek, Hyun Chul;Seo, Yeong Geon;Jeong, Won Chang;Park, Jae Heung
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.21-29
    • /
    • 2016
  • Our society is currently exposed to environment of various information that is exchanged real time through networks. Especially regarding medical policy, the government rushes to practice remote medical treatment to improve the quality of medical services for citizens. The remote medical practice requires establishment of medical information based on big data for customized treatment regardless of where patients are. This study suggests establishment of regional medical cluster along with defense and protection cooperation models that in case service availability is harmed, and attacks occur, the attacks can be detected, and proper measures can be taken. For this, the study suggested forming networks with nationwide local government hospitals as regional virtual medical cluster bases by the same medical information system. The study also designed a mutual cooperation security model that can real time cope with IP Spoofing attack that can occur in the medical cluster and DDoS attacks accordingly, so that the limit that sole system and sole security policy have can be overcome.

A Low Power Lifelog Management Scheme Based on User Movement Behaviors in Wireless Networks (무선 네트워크 환경에서 사용자 이동행위 기반 저전력 라이프로그 관리기법)

  • Yi, Myung-Kyu;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.157-165
    • /
    • 2015
  • With the ever-improving performance of smartphone cameras and the universal dissemination of cloud services, users can now record and store the events in their daily lives more easily and conveniently. The advent of lifelogging technology has been changing the uses as well as the paradigm of internet services, and emphasizing the importance of services being personalization. As the amount of lifelog data becomes vast, it requires an efficient way to manage and store such vast information. In this paper, we propose an low power lifelog management scheme based on user movement behaviors in wireless networks. In order to reduce the power consumption of a smartphone, in our proposal, frequency of data collection and transfer can be dynamically adjusted based on a user's movement pattern. The analytical results show that our approach achieves better performance than that of the existing lifelog management scheme.

6G in the sky: On-demand intelligence at the edge of 3D networks (Invited paper)

  • Strinati, Emilio Calvanese;Barbarossa, Sergio;Choi, Taesang;Pietrabissa, Antonio;Giuseppi, Alessandro;De Santis, Emanuele;Vidal, Josep;Becvar, Zdenek;Haustein, Thomas;Cassiau, Nicolas;Costanzo, Francesca;Kim, Junhyeong;Kim, Ilgyu
    • ETRI Journal
    • /
    • v.42 no.5
    • /
    • pp.643-657
    • /
    • 2020
  • Sixth generation will exploit satellite, aerial, and terrestrial platforms jointly to improve radio access capability and unlock the support of on-demand edge cloud services in three-dimensional (3D) space, by incorporating mobile edge computing (MEC) functionalities on aerial platforms and low-orbit satellites. This will extend the MEC support to devices and network elements in the sky and forge a space-borne MEC, enabling intelligent, personalized, and distributed on-demand services. End users will experience the impression of being surrounded by a distributed computer, fulfilling their requests with apparently zero latency. In this paper, we consider an architecture that provides communication, computation, and caching (C3) services on demand, anytime, and everywhere in 3D space, integrating conventional ground (terrestrial) base stations and flying (non-terrestrial) nodes. Given the complexity of the overall network, the C3 resources and management of aerial devices need to be jointly orchestrated via artificial intelligence-based algorithms, exploiting virtualized network functions dynamically deployed in a distributed manner across terrestrial and non-terrestrial nodes.

Proxy-Based Scalable Server Access Management Framework Using Reverse Webshell Protocol (웹쉘 기술을 통한 프록시 기반의 확장 가능한 서버 관리 프레임워크)

  • Daeun Kim;Sangwook Bae;Seongmin Kim;Eunyoung Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.661-670
    • /
    • 2023
  • With the emergence of serverless computing paradigm and the innovations of cloud technology, the structure of backend server infrastructure has evolved from on-premises to container-based serverless computing. However, an access control on the server still heavily relies on the traditional SSH protocol, which poses limitations in terms of security and scalability. This hampers user convenience and productivity in managing server infrastructure. A web shell is an interface that allows easy access to servers and execution of commands from any device with a web browser. While hackers often use it to exploit vulnerabilities in servers, we pay attention to the high portability of web shell technology for server management. This study proposes a novel proxy-based server management framework utilizing web shell technology. Our evaluation demonstrates that the proposed framework addresses the drawbacks of SSH without additional overhead, and efficiently operates large-scale infrastructures in diverse computing environments.

Autoscaling Mechanism based on Execution-times for VNFM in NFV Platforms (NFV 플랫폼에서 VNFM의 실행 시간에 기반한 자동 자원 조정 메커니즘)

  • Mehmood, Asif;Diaz Rivera, Javier;Khan, Talha Ahmed;Song, Wang-Cheol
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.1-10
    • /
    • 2019
  • The process to determine the required number of resources depends on the factors being considered. Autoscaling is one such mechanism that uses a wide range of factors to decide and is a critical process in NFV. As the networks are being shifted onto the cloud after the invention of SDN, we require better resource managers in the future. To solve this problem, we propose a solution that allows the VNFMs to autoscale the system resources depending on the factors such as overhead of hyperthreading, number of requests, execution-times for the virtual network functions. It is a known fact that the hyperthreaded virtual-cores are not fully capable of performing like the physical cores. Also, as there are different types of core having different frequencies so the process to calculate the number of cores needs to be measured accurately and precisely. The platform independency is achieved by proposing another solution in the form of a monitoring microservice, which communicates through APIs. Hence, by the use of our autoscaling application and a monitoring microservice, we enhance the resource provisioning process to meet the criteria of future networks.

Performance Evaluation Using Neural Network Learning of Indoor Autonomous Vehicle Based on LiDAR (라이다 기반 실내 자율주행 차량에서 신경망 학습을 사용한 성능평가 )

  • Yonghun Kwon;Inbum Jung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.93-102
    • /
    • 2023
  • Data processing through the cloud causes many problems, such as latency and increased communication costs in the communication process. Therefore, many researchers study edge computing in the IoT, and autonomous driving is a representative application. In indoor self-driving, unlike outdoor, GPS and traffic information cannot be used, so the surrounding environment must be recognized using sensors. An efficient autonomous driving system is required because it is a mobile environment with resource constraints. This paper proposes a machine-learning method using neural networks for autonomous driving in an indoor environment. The neural network model predicts the most appropriate driving command for the current location based on the distance data measured by the LiDAR sensor. We designed six learning models to evaluate according to the number of input data of the proposed neural networks. In addition, we made an autonomous vehicle based on Raspberry Pi for driving and learning and an indoor driving track produced for collecting data and evaluation. Finally, we compared six neural network models in terms of accuracy, response time, and battery consumption, and the effect of the number of input data on performance was confirmed.