• Title/Summary/Keyword: Cloud storage system

Search Result 188, Processing Time 0.025 seconds

Object Detection-Based Cloud System: Efficient Disease Monitoring with Database (객체 검출 기반 클라우드 시스템 : 데이터베이스를 통한 효율적인 병해 모니터링)

  • Jongwook Si;Junyoung Kim;Sungyoung Kim
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.4
    • /
    • pp.210-219
    • /
    • 2023
  • The decline in the rural populace and an aging workforce have led to fatalities due to worsening environments and hazards within vinyl greenhouses. Therefore, it is necessary to automate crop cultivation and disease detection system in greenhouses to prevent labor loss. In this paper, an object detection-based model is used to detect diseased crop in greenhouses. In addition, the system proposed configures the environment of the artificial intelligence model in the cloud to ensure stability. The system captures images taken inside the vinyl greenhouse and stores them in a database, and then downloads the images to the cloud to perform inference based on Yolo-v4 for detection, generating JSON files for the results. Analyze this file and send it to the database for storage. From the experimental results, it was confirmed that disease detection through object detection showed high performance in real environments like vinyl greenhouses. It was also verified that efficient monitoring is possible through the database

The Method for Data Acquisition on a Live NAS System (활성 상태의 NAS 시스템 상에서 내부 데이터 수집 기법 연구)

  • Seo, Hyeong-Min;Kim, Dohyun;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.585-594
    • /
    • 2015
  • As the storage market has been expanded due to growing data size, the research on various kinds of storages such as cloud, USB, and external HDD(Hard Disk Drive) has been conducted in digital forensic aspects. NAS(Network-Attached Storage) can store the data over one TB(Tera Byte) and it is well used for private storage as well as for enterprise, but there is almost no research on NAS. This paper selects three NAS products that has the highest market share in domestic and foreign market, and suggests the process and method for data acquisition in live NAS System.

A Real-time Video Playback Scheme in a Distributed Storage System Supporting File Sharing (파일 공유를 지원하는 분산 저장 시스템에서 실시간 비디오 재생 기법)

  • Eunsam Kim
    • Smart Media Journal
    • /
    • v.12 no.11
    • /
    • pp.145-153
    • /
    • 2023
  • In a P2P-based distributed storage system where peers frequently join and leave, it is essential to guarantee not only data availability but also playback quality comparable to that provided by local storage devices when playing back video files with real-time constraints. In addition, cloud storage services based on distributed storage systems provide each user with the functionality to share their files with other users, so when multiple users request playback of the same video file at the same time, all playback should be supported seamlessly in real time. Therefore, in this paper, we propose a scheme that process multiple simultaneous playback requests for each video file in real time as well as data availability in a P2P-based distributed storage system that supports file sharing. This scheme can support real-time simultaneous playback and efficiently use storage space by adjusting the amount of redundant data encoded through erasure coding according to the number of concurrent playback requests for each video file.

An Efficient Design and Implementation of an MdbULPS in a Cloud-Computing Environment

  • Kim, Myoungjin;Cui, Yun;Lee, Hanku
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.3182-3202
    • /
    • 2015
  • Flexibly expanding the storage capacity required to process a large amount of rapidly increasing unstructured log data is difficult in a conventional computing environment. In addition, implementing a log processing system providing features that categorize and analyze unstructured log data is extremely difficult. To overcome such limitations, we propose and design a MongoDB-based unstructured log processing system (MdbULPS) for collecting, categorizing, and analyzing log data generated from banks. The proposed system includes a Hadoop-based analysis module for reliable parallel-distributed processing of massive log data. Furthermore, because the Hadoop distributed file system (HDFS) stores data by generating replicas of collected log data in block units, the proposed system offers automatic system recovery against system failures and data loss. Finally, by establishing a distributed database using the NoSQL-based MongoDB, the proposed system provides methods of effectively processing unstructured log data. To evaluate the proposed system, we conducted three different performance tests on a local test bed including twelve nodes: comparing our system with a MySQL-based approach, comparing it with an Hbase-based approach, and changing the chunk size option. From the experiments, we found that our system showed better performance in processing unstructured log data.

Implementations of Record_Level Synchronized Safe Personal Cloud (레코드 단위의 동기화를 지원하는 개별 클라우드 구현 기법)

  • Hong, Dong-Kweon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.3
    • /
    • pp.239-244
    • /
    • 2014
  • As the usefulness of mobile device is kept growing the privacy of the cloud computing is receiving more attentions. Even though many researches and solutions for privacy matters are suggested we are still worrying about the security problems. In addition most of cloud computing systems uses file-level synchronization which make it difficult to modify a part of a file. If we use data-centric app that stores data on embedded DBMS such as SQLite, a simple synchronization may incur some loss of information. In this paper we propose a solution to build a personal cloud that supports record-level synchronization. And we show a prototype system which uses RESTful web services and the same schema on mobie devices and the cloud storage. Synchronization is achieved by using a kind of optimistic concurrency control.

Data Availability Zone for backup system in Cloud computing service (클라우드 컴퓨팅 서비스 백업을 위한 데이터 가용영역 방법론)

  • Park, Young-ho;Park, Yongsuk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.366-369
    • /
    • 2014
  • Recently been viewed as a core technology of the IT industry, cloud computing services. It is expected that the market for cloud services industry showed a growth rate of 18.9% annually, to form a scale of $ 1,330 billion dollars in 2013, and to form a 1,768 billion dollars in 2015. Growth of cloud computing services industry, provides the operational efficiency and reduce costs for many companies, but the risks associated with it is also increasing. There is a problem that phenomenon is to lose control of the data on features of the cloud service, more data is gathered in one place, when a failure occurs, it is removed simultaneously the data of all devices. therefore, in the present paper is investigate the area a quick recovery with up to the problem and secure data storage INT the cloud computing service is available in only the data in the cloud service possible.

  • PDF

User behavior analysis in No Disk System Configuration (No Disk System 환경에서의 사용자 행위 분석)

  • Kim, Deunghwa;Namgung, Jaeung;Park, Jungheum;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.491-500
    • /
    • 2013
  • With the advent of big data and increased costs of SSD(HDD), domestic and foreign Internet cafes and organizations have adopted NDS(No Disk System) solution recently. NDS is a storage virtualization solution based on a kind of cloud computing. It manages Operating System and applications in the central server, which were originally managed by individual computers. This research will illustrate the way to analyze user's behaviors under NDS circumstance.

A Study on Design of Real-time Big Data Collection and Analysis System based on OPC-UA for Smart Manufacturing of Machine Working

  • Kim, Jaepyo;Kim, Youngjoo;Kim, Seungcheon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.121-128
    • /
    • 2021
  • In order to design a real time big data collection and analysis system of manufacturing data in a smart factory, it is important to establish an appropriate wired/wireless communication system and protocol. This paper introduces the latest communication protocol, OPC-UA (Open Platform Communication Unified Architecture) based client/server function, applied user interface technology to configure a network for real-time data collection through IoT Integration. Then, Database is designed in MES (Manufacturing Execution System) based on the analysis table that reflects the user's requirements among the data extracted from the new cutting process automation process, bush inner diameter indentation measurement system and tool monitoring/inspection system. In summary, big data analysis system introduced in this paper performs SPC (statistical Process Control) analysis and visualization analysis with interface of OPC-UA-based wired/wireless communication. Through AI learning modeling with XGBoost (eXtream Gradient Boosting) and LR (Linear Regression) algorithm, quality and visualization analysis is carried out the storage and connection to the cloud.

A Novel Auditing System for Dynamic Data Integrity in Cloud Computing (클라우드 컴퓨팅에서 동적 데이터 무결성을 위한 개선된 감사 시스템)

  • Kim, Tae-yeon;Cho, Gi-hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1818-1824
    • /
    • 2015
  • Cloud computing draws attention as an application to provide dynamically scalable infrastructure for application, data and file storage. An untrusted remote server can cause a variety of problems in the field of data protection. It may process intentionally or involuntarily user's data operations(modify, insert, delete) without user's permission. It may provide false information in order to hide his mistakes in the auditing process. Therefore, it is necessary to audit the integrity of data stored in the cloud server. In this paper, we propose a new data auditing system that can verify whether servers had a malicious behavior or not. Performance and security analysis have proven that our scheme is suitable for cloud computing environments in terms of performance and security aspects.

A Study on Risk Assessment of Leaking Methanol Storage Tank on Methanol Fueled Ship Using ALOHA & Bow-tie Method (ALOHA & Bow-tie 기법을 이용한 메탄올 추진 선박에서의 메탄올 저장탱크 누출 시 위험도 평가)

  • Jeonghak Lee;Jaehoon Jee
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.30 no.5
    • /
    • pp.479-489
    • /
    • 2024
  • In this study, the risks of the leakage of a methanol-fueled ship's storage tank at Ulsan Port are evaluated using ALOHA and Bow-tie methodologies. ALOHA is utilized to estimate the damage range by calculating both the worst and alternative scenarios. The results of the toxic area of the vapor cloud range (ERPG-2 standard) indicate that the alternative (629 m) and worst (817 m) scenarios include the pier facilities of the onshore tank terminal and residential areas. The flammable area of the vapor cloud range (LEL 10% standard) is observed only on the ship with the alternative (126 m) and worst (218 m) scenarios. The thermal radiation level of concern (5.0 kW/m2 standard) affects only the ship in both the alternative (56 m) and worst (56 m) scenarios. Additionally, preventive and mitigation measures are evaluated by a panel of experts using the Bow-tie method. The measures are classified into "hardware" and "human" categories, with "gas-freeing system," "ventilation system," and "fire-fighting system" receiving the highest ratings for safety effectiveness and risk severity. Based on the evaluation above, a risk-assessment diagram is developed.