• Title/Summary/Keyword: Cloud applications

Search Result 483, Processing Time 0.033 seconds

Evaluation of Geometric Error Sources for Terrestrial Laser Scanner

  • Lee, Ji Sang;Hong, Seung Hwan;Park, Il Suk;Cho, Hyoung Sig;Sohn, Hong Gyoo
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.24 no.2
    • /
    • pp.79-87
    • /
    • 2016
  • As 3D geospatial information is demanded, terrestrial laser scanners which can obtain 3D model of objects have been applied in various fields such as Building Information Modeling (BIM), structural analysis, and disaster management. To acquire precise data, performance evaluation of a terrestrial laser scanner must be conducted. While existing 3D surveying equipment like a total station has a standard method for performance evaluation, a terrestrial laser scanner evaluation technique for users is not established. This paper categorizes and analyzes error sources which generally occur in terrestrial laser scanning. In addition to the prior researches about categorizing error sources of terrestrial Laser scanning, this paper evaluates the error sources by the actual field tests for the smooth in-situ applications.The error factors in terrestrial laser scanning are categorized into interior error caused by mechanical errors in a terrestrial laser scanner and exterior errors affected by scanning geometry and target property. Each error sources were evaluated by simulation and actual experiments. The 3D coordinates of observed target can be distortedby the biases in distance and rotation measurement in scanning system. In particular, the exterior factors caused significant geometric errors in observed point cloud. The noise points can be generated by steep incidence angle, mixed-pixel and crosstalk. In using terrestrial laser scanner, elaborate scanning plan and proper post processing are required to obtain valid and accurate 3D spatial information.

Initial Authentication Protocol of Hadoop Distribution System based on Elliptic Curve (타원곡선기반 하둡 분산 시스템의 초기 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.253-258
    • /
    • 2014
  • Recently, the development of cloud computing technology is developed as soon as smartphones is increases, and increased that users want to receive big data service. Hadoop framework of the big data service is provided to hadoop file system and hadoop mapreduce supported by data-intensive distributed applications. But, smpartphone service using hadoop system is a very vulnerable state to data authentication. In this paper, we propose a initial authentication protocol of hadoop system assisted by smartphone service. Proposed protocol is combine symmetric key cryptography techniques with ECC algorithm in order to support the secure multiple data processing systems. In particular, the proposed protocol to access the system by the user Hadoop when processing data, the initial authentication key and the symmetric key instead of the elliptic curve by using the public key-based security is improved.

3D Human Shape Deformation using Deep Learning (딥러닝을 이용한 3차원 사람모델형상 변형)

  • Kim, DaeHee;Hwang, Bon-Woo;Lee, SeungWook;Kwak, Sooyeong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.2
    • /
    • pp.19-27
    • /
    • 2020
  • Recently, rapid and accurate 3D models creation is required in various applications using virtual reality and augmented reality technology. In this paper, we propose an on-site learning based shape deformation method which transforms the clothed 3D human model into the shape of an input point cloud. The proposed algorithm consists of two main parts: one is pre-learning and the other is on-site learning. Each learning consists of encoder, template transformation and decoder network. The proposed network is learned by unsupervised method, which uses the Chamfer distance between the input point cloud form and the template vertices as the loss function. By performing on-site learning on the input point clouds during the inference process, the high accuracy of the inference results can be obtained and presented through experiments.

Ontology-based IoT Context Information Modeling and Semantic-based IoT Mashup Services Implementation (온톨로지 기반의 IoT 상황 정보 모델링 및 시맨틱 기반 IoT 매쉬업 서비스 구현)

  • Seok, Hyun-Seung;Lee, Yong-Ju
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.4
    • /
    • pp.671-678
    • /
    • 2019
  • The semantic information provided through the semantic-based IoT system will produce new high value-added products that are completely different from what we have known and experienced. From this point of view, the key issue of current IoT technology and applications is the development of an intelligent IoT platform architecture. The proposed system collects the IoT data of the sensors from the cloud computer, converts them into RDF, and annotates them with semantics. The converted semantic data is shared and utilized through the ontology repository. We use KT's IoTMakers as a cloud computing environment, and the ontology repository uses Jena's Fuseki server to express SPARQL query results on the web using Daum Map API and Highcharts API. This gives people the opportunity to access the semantic IoT mash-up service easily and has various application possibilities.

Application of 4th Industrial Revolution Technology to Records Management (제4차 산업혁명 기술의 기록관리 적용 방안)

  • An, Dae-jin;Yim, Jin-hee
    • The Korean Journal of Archival Studies
    • /
    • no.54
    • /
    • pp.211-248
    • /
    • 2017
  • This study examined ways to improve records management by using the new technology of the Fourth Industrial Revolution. To do this, we selected four technologies that have a huge impact on the production and management of records such as cloud, big data, artificial intelligence, and the Internet of Things. We tested these technologies and summarized their concepts, characteristics, and applications. The characteristics of the changed production records were analyzed by each technology. Because of new technology, the production of records has rapidly increased and the types of records have become diverse. With this, there is also a need for solutions to explain the quality of data and the context of production. To effectively introduce each technology into records management, a roadmap should be designed by classifying which technology should be applied immediately and which should be applied later depending on the maturity of the technology. To cope with changes in the characteristics of production records, a flexible data structure must be produced in a standardized format. Public authorities should also be able to procure Software as a Service (SaaS) products and use digital technology to improve the quality of public services.

Reversible Data Hiding in Permutation-based Encrypted Images with Strong Privacy

  • Shiu, Chih-Wei;Chen, Yu-Chi;Hong, Wien
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1020-1042
    • /
    • 2019
  • Reversible data hiding in encrypted images (RDHEI) provides some real-time cloud applications; i.e. the cloud, acting as a data-hider, automatically embeds timestamp in the encrypted image uploaded by a content owner. Many existing methods of RDHEI only satisfy user privacy in which the data-hider does not know the original image, but leaks owner privacy in which the receiver can obtains the original image by decryption and extraction. In the literature, the method of Zhang et al. is the one providing weak content-owner privacy in which the content-owner and data-hider have to share a data-hiding key. In this paper, we take care of the stronger notion, called strong content-owner privacy, and achieve it by presenting a new reversible data hiding in encrypted images. In the proposed method, image decryption and message extraction are separately controlled by different types of keys, and thus such functionalities are decoupled to solve the privacy problem. At the technique level, the original image is segmented along a Hilbert filling curve. To keep image privacy, segments are transformed into an encrypted image by using random permutation. The encrypted image does not reveal significant information about the original one. Data embedment can be realized by using pixel histogram-style hiding, since this property, can be preserved before or after encryption. The proposed method is a modular method to compile some specific reversible data hiding to those in encrypted image with content owner privacy. Finally, our experimental results show that the image quality is 50.85dB when the averaged payload is 0.12bpp.

Identification of Microservices to Develop Cloud-Native Applications (클라우드네이티브 애플리케이션 구축을 위한 마이크로서비스 식별 방법)

  • Choi, Okjoo;Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.51-58
    • /
    • 2021
  • Microservices are not only developed independently, but can also be run and deployed independently, ensuring more flexible scaling and efficient collaboration in a cloud computing environment. This impact has led to a surge in migrating to microservices-oriented application environments in recent years. In order to introduce microservices, the problem of identifying microservice units in a single application built with a single architecture must first be solved. In this paper, we propose an algorithm-based approach to identify microservices from legacy systems. A graph is generated using the meta-information of the legacy code, and a microservice candidate is extracted by applying a clustering algorithm. Modularization quality is evaluated using metrics for the extracted microservice candidates. In addition, in order to validate the proposed method, candidate services are derived using codes of open software that are widely used for benchmarking, and the level of modularity is evaluated using metrics. It can be identified as a smaller unit of microservice, and as a result, the module quality has improved.

Relative Speed based Task Distribution Algorithm for Smart Device Cluster (스마트 디바이스로 구성된 클러스터를 위한 상대속도 기반 작업 분배 기법)

  • Lee, Jaehun;Kang, Sooyong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.3
    • /
    • pp.60-71
    • /
    • 2017
  • Smart devices such as smart phones, smart TVs, and smart pads have become essential devices in recent years. As the popularity and demand grows, the performance of smart devices is also getting better and users are dealing with a lot of things such as education and business using smart devices instead of desktop. However, smart devices that still have poor performance compared to desktop, even with improved performance, have difficulty running high performance applications due to limited resources. In this paper, we propose a load balancing algorithm applying the characteristics of smart devices to overcome the resource limitations of devices. in order to verify the algorithm, we implemented the algorithm after adding the distributed processing system service in Android platform. After constructing the cluster on the smart device, various experiments were conducted. Through the analysis of the test results, it is confirmed that the proposed algorithm efficiently improves the overall distributed processing performance by effectively aggregating different amounts of computing resources in heterogeneous smart devices.

Development of Brain-machine Interface for MindPong using Internet of Things (마인드 퐁 제어를 위한 사물인터넷을 이용하는 뇌-기계 인터페이스 개발)

  • Hoon-Hee Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.17-22
    • /
    • 2023
  • Brain-Machine Interfaces(BMI) are interfaces that control machines by decoding brainwaves, which are electrical signals generated from neural activities. Although BMIs can be applied in various fields, their widespread usage is hindered by the low portability of the hardware required for brainwave measurement and decoding. To address this issue, previous research proposed a brain-machine interface system based on the Internet of Things (IoT) using cloud computing. In this study, we developed and tested an application that uses brainwaves to control the Pong game, demonstrating the real-time usability of the system. The results showed that users of the proposed BMI achieved scores comparable to optimal control artificial intelligence in real-time Pong game matches. Thus, this research suggests that IoT-based brain-machine interfaces can be utilized in a variety of real-time applications in everyday life.

EDF: An Interactive Tool for Event Log Generation for Enabling Process Mining in Small and Medium-sized Enterprises

  • Frans Prathama;Seokrae Won;Iq Reviessay Pulshashi;Riska Asriana Sutrisnowati
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.101-112
    • /
    • 2024
  • In this paper, we present EDF (Event Data Factory), an interactive tool designed to assist event log generation for process mining. EDF integrates various data connectors to improve its capability to assist users in connecting to diverse data sources. Our tool employs low-code/no-code technology, along with graph-based visualization, to help non-expert users understand process flow and enhance the user experience. By utilizing metadata information, EDF allows users to efficiently generate an event log containing case, activity, and timestamp attributes. Through log quality metrics, our tool enables users to assess the generated event log quality. We implement EDF under a cloud-based architecture and run a performance evaluation. Our case study and results demonstrate the usability and applicability of EDF. Finally, an observational study confirms that EDF is easy to use and beneficial, expanding small and medium-sized enterprises' (SMEs) access to process mining applications.