• Title/Summary/Keyword: Computing as a Service

Search Result 1,479, Processing Time 0.024 seconds

Static Worst-Case Execution Time Analysis Tool for Scheduling Primitives about Embedded OS (임베디드 운영체제의 스케줄링 프리미티브를 고려한 정적 최악실행시간 분석도구)

  • Park, Hyeon-Hui;Yang, Seung-Min;Choi, Yong-Hoon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.5
    • /
    • pp.271-281
    • /
    • 2007
  • Real-time support of embedded OS is not optional, but essential in contemporary embedded systems. In order to achieve these system#s real-time property, it is crucial that schedulability analysis for tasks having its property have been accomplished before system execution. Acquiring Worst-Case Execution Time(WCET) of task is a core part of schedulability analysis. Because traditional WCET tools analyze only its estimation of application task(i.e. program), it is not considered that application tasks are affected by scheduling primitives(e.g. scheduler, interrupt service routine, etc.) of OS when it schedules them. In this paper, we design and implement WCET analysis tool which deliberates on scheduling primitives of system using embedded Linux widely used in embedded OSes. This tool can estimate either WCET of normal application programs or corresponding primitives which have an influence on schduling property in embedded Linux kernel. Therefore, precision of estimation about schedulability analysis is improved. We develop this tool as Eclipse#s plug-in to work properly in any platform and support convenient interface or functionality for user.

Implementation of Uncertainty Processor for Tracking Vehicle Trajectory (차량 궤적 추적을 위한 불확실성 처리기 구현)

  • Kim, Jin-Suk;Kim, Dong-Ho;Ryu, Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.11D no.5
    • /
    • pp.1167-1176
    • /
    • 2004
  • Along the advent of Internet technology, the computing environment has been considerably changed in many application domains. Especially, a lot of researches for e-Logistics have been done for the last 3 years. The e-Logistics means the virtual business activity and service architecture among the logistics companies based on the Internet technology. To construct effectively the e-Logistics framework, researches on the development of the Moving Object Technology(MOT) including GPS and GIS with spatiotemporal databases technique so far has been done The Moving Object Technology stands for the efficient management for the spatiotemporal objects such as vehicles, airplanes, and vessels which change continuously their spatial location along with time flows. However, most systems manage just only the location information detected lately by many reasons so that the uncertainty processing for the past and future location of the moving objects is still very hard. In this paper, we propose the moving object uncertainty model and system design for e-Logistics applications. The MOMS architecture in e-Logistics is suggested and the detailed explain of sub-systems including the uncertainty processor of moving objects is described. We also explain the comprehensive examples of MOMS and uncertainty processing in Delivery Parcel Application that is one of major application of e-Logistics domain.

Development of Land Management Information System(LMIS) (토지관리정보체계 시스템구축방안 -시스템개발을 중심으로-)

  • 서창완;문은호;최병남;김대종
    • Spatial Information Research
    • /
    • v.9 no.1
    • /
    • pp.73-89
    • /
    • 2001
  • In the recent rapidly changing technology environment the computerization of administration business using GIS is driven or will be driven to give improved information services for the people by local government or central government with huge budget. Development of GIS for local governments is investigated with huge budge. Development of GIS for local governments is investigated to prevent local government from investing redundant money and to reuse the existing investment at this time. The purpose of this study is finding the development method of Land Management Information System (LMIS) to give service and share data in various computing environment of local governments. To do this, we have to develop LMIS as open system with interoperability and we explain it with a focus to framework of Open LMIS. According to recent trend of technology we developed Open LMIS for convenient maintenance with nationwide LMIS expansion at hand. This system was developed at the $\ulcorner$Land Management Information System Development$\lrcorner$project which was managed by Ministry of Construction and Transportation (MOCT). GIS application was based on OpenGIS CORBA specification for development of standard interface and RUP(Rational Unified Process) for development method and LML(Unified Modeling Language) for system design. Developed systems were land administration system for local government, spatial planning support system for regional government, and land policy support system for MOCT.

  • PDF

Smartphone-User Interactive based Self Developing Place-Time-Activity Coupled Prediction Method for Daily Routine Planning System (일상생활 계획을 위한 스마트폰-사용자 상호작용 기반 지속 발전 가능한 사용자 맞춤 위치-시간-행동 추론 방법)

  • Lee, Beom-Jin;Kim, Jiseob;Ryu, Je-Hwan;Heo, Min-Oh;Kim, Joo-Seuk;Zhang, Byoung-Tak
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.2
    • /
    • pp.154-159
    • /
    • 2015
  • Over the past few years, user needs in the smartphone application market have been shifted from diversity toward intelligence. Here, we propose a novel cognitive agent that plans the daily routines of users using the lifelog data collected by the smart phones of individuals. The proposed method first employs DPGMM (Dirichlet Process Gaussian Mixture Model) to automatically extract the users' POI (Point of Interest) from the lifelog data. After extraction, the POI and other meaningful features such as GPS, the user's activity label extracted from the log data is then used to learn the patterns of the user's daily routine by POMDP (Partially Observable Markov Decision Process). To determine the significant patterns within the user's time dependent patterns, collaboration was made with the SNS application Foursquare to record the locations visited by the user and the activities that the user had performed. The method was evaluated by predicting the daily routine of seven users with 3300 feedback data. Experimental results showed that daily routine scheduling can be established after seven days of lifelogged data and feedback data have been collected, demonstrating the potential of the new method of place-time-activity coupled daily routine planning systems in the intelligence application market.

Spatio-Temporal Semantic Sensor Web based on SSNO (SSNO 기반 시공간 시맨틱 센서 웹)

  • Shin, In-Su;Kim, Su-Jeong;Kim, Jeong-Joon;Han, Ki-Joon
    • Spatial Information Research
    • /
    • v.22 no.5
    • /
    • pp.9-18
    • /
    • 2014
  • According to the recent development of the ubiquitous computing environment, the use of spatio-temporal data from sensors with GPS is increasing, and studies on the Semantic Sensor Web using spatio-temporal data for providing different kinds of services are being actively conducted. Especially, the W3C developed the SSNO(Semantic Sensor Network Ontology) which uses sensor-related standards such as the SWE(Sensor Web Enablement) of OGC and defines classes and properties for expressing sensor data. Since these studies are available for the query processing about non-spatio-temporal sensor data, it is hard to apply them to spatio-temporal sensor data processing which uses spatio-temporal data types and operators. Therefore, in this paper, we developed the SWE based on SSNO which supports the spatio-temporal sensor data types and operators expanding spatial data types and operators in "OpenGIS Simple Feature Specification for SQL" by OGC. The system receives SensorML(Sensor Model Language) and O&M (Observations and Measurements) Schema and converts the data into SSNO. It also performs the efficient query processing which supports spatio-temporal operators and reasoning rules. In addition, we have proved that this system can be utilized for the web service by applying it to a virtual scenario.

Development of Korea Ocean Satellite Center (KOSC): System Design on Reception, Processing and Distribution of Geostationary Ocean Color Imager (GOCI) Data (해양위성센터 구축: 통신해양기상위성 해색센서(GOCI) 자료의 수신, 처리, 배포 시스템 설계)

  • Yang, Chan-Su;Cho, Seong-Ick;Han, Hee-Jeong;Yoon, Sok;Kwak, Ki-Yong;Yhn, Yu-Whan
    • Korean Journal of Remote Sensing
    • /
    • v.23 no.2
    • /
    • pp.137-144
    • /
    • 2007
  • In KORDI (Korea Ocean Research and Development Institute), the KOSC (Korea Ocean Satellite Center) construction project is being prepared for acquisition, processing and distribution of sensor data via L-band from GOCI (Geostationary Ocean Color Imager) instrument which is loaded on COMS (Communication, Ocean and Meteorological Satellite); it will be launched in 2008. Ansan (the headquarter of KORDI) has been selected for the location of KOSC between 5 proposed sites, because it has the best condition to receive radio wave. The data acquisition system is classified into antenna and RF. Antenna is designed to be $\phi$ 9m cassegrain antenna which has 19.35 G/T$(dB/^{\circ}K)$ at 1.67GHz. RF module is divided into LNA (low noise amplifier) and down converter, those are designed to send only horizontal polarization to modem. The existing building is re-designed and arranged for the KOSC operation concept; computing room, board of electricity, data processing room, operation room. Hardware and network facilities have been designed to adapt for efficiency of each functions. The distribution system which is one of the most important systems will be constructed mainly on the internet. and it is also being considered constructing outer data distribution system as a web hosting service for offering received data to user less than an hour.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

Analysis and Evaluation of Frequent Pattern Mining Technique based on Landmark Window (랜드마크 윈도우 기반의 빈발 패턴 마이닝 기법의 분석 및 성능평가)

  • Pyun, Gwangbum;Yun, Unil
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.101-107
    • /
    • 2014
  • With the development of online service, recent forms of databases have been changed from static database structures to dynamic stream database structures. Previous data mining techniques have been used as tools of decision making such as establishment of marketing strategies and DNA analyses. However, the capability to analyze real-time data more quickly is necessary in the recent interesting areas such as sensor network, robotics, and artificial intelligence. Landmark window-based frequent pattern mining, one of the stream mining approaches, performs mining operations with respect to parts of databases or each transaction of them, instead of all the data. In this paper, we analyze and evaluate the techniques of the well-known landmark window-based frequent pattern mining algorithms, called Lossy counting and hMiner. When Lossy counting mines frequent patterns from a set of new transactions, it performs union operations between the previous and current mining results. hMiner, which is a state-of-the-art algorithm based on the landmark window model, conducts mining operations whenever a new transaction occurs. Since hMiner extracts frequent patterns as soon as a new transaction is entered, we can obtain the latest mining results reflecting real-time information. For this reason, such algorithms are also called online mining approaches. We evaluate and compare the performance of the primitive algorithm, Lossy counting and the latest one, hMiner. As the criteria of our performance analysis, we first consider algorithms' total runtime and average processing time per transaction. In addition, to compare the efficiency of storage structures between them, their maximum memory usage is also evaluated. Lastly, we show how stably the two algorithms conduct their mining works with respect to the databases that feature gradually increasing items. With respect to the evaluation results of mining time and transaction processing, hMiner has higher speed than that of Lossy counting. Since hMiner stores candidate frequent patterns in a hash method, it can directly access candidate frequent patterns. Meanwhile, Lossy counting stores them in a lattice manner; thus, it has to search for multiple nodes in order to access the candidate frequent patterns. On the other hand, hMiner shows worse performance than that of Lossy counting in terms of maximum memory usage. hMiner should have all of the information for candidate frequent patterns to store them to hash's buckets, while Lossy counting stores them, reducing their information by using the lattice method. Since the storage of Lossy counting can share items concurrently included in multiple patterns, its memory usage is more efficient than that of hMiner. However, hMiner presents better efficiency than that of Lossy counting with respect to scalability evaluation due to the following reasons. If the number of items is increased, shared items are decreased in contrast; thereby, Lossy counting's memory efficiency is weakened. Furthermore, if the number of transactions becomes higher, its pruning effect becomes worse. From the experimental results, we can determine that the landmark window-based frequent pattern mining algorithms are suitable for real-time systems although they require a significant amount of memory. Hence, we need to improve their data structures more efficiently in order to utilize them additionally in resource-constrained environments such as WSN(Wireless sensor network).

Performance of Collaboration Activities upon SME's Idiosyncrasy (중소기업 특성에 따른 외부 협업 활동이 혁신성과에 미치는 영향)

  • Lee, Hye Sun;Oh, Junseok;Lee, Jaeki;Lee, Bong Gyou
    • Journal of Internet Computing and Services
    • /
    • v.14 no.6
    • /
    • pp.95-105
    • /
    • 2013
  • Recently, SME's Collaboration activities have become one of a vital factor for sustaining competitive edge. This is because of the rapidly changing and competitive market environment, and also to leverage performance by overcoming obstacles of having limited internal resources. Discussing about the effects and relationships of the firm's collaboration activities and its outputs are not new. However, as ICT and various technologies have been diffused into the traditional industries, boundaries and practice capabilities within the industries are becoming ambiguous. Thus contents of the products/services and their development methods are also go and come over the industries. Although many researchers suggested the relations of SME's collaboration activities and innovation performances, most of the previous literatures are focusing on broad perspectives of firm's environmental factors rather than considering various SME's idiosyncrasy factors such as their major product and customer types at once. Therefore, the purpose of this paper is to analyze how SME(Small Medium Enterprise)'s external collaboration activities by their idiosyncrasy act as an input to types of innovation performance. In order to analyze collaboration effects in detail, we defined factors that can represent the SME's business environment - Perceived importance of using external resources, Perceived importance of external partnership, Collaboration and Collaboration levels of Major Product types, Customer types and lastly the Firm Sizes. We have also specifically divided the performance of innovation types as product innovation and process innovation based on existing research. In this study, the empirical analysis is based on Probit Regression Model to observe the correlations with the impact of each SME's business environment and their activities. For the empirical data, 497 samples were collected which, this sample data was extracted from the 'Korean Open Innovation Survey' performed by ETRI(Korean Electronics Telecommunications Research Institute) in 2010. As a result, empirical test results indicated that the impact of collaboration varies depend on the innovation types (Product and Process Innovation). The Impact of the collaboration level for the product innovation tend to be more effective when SMEs are developing for a final product, targeting on for individual customers (B2C). But on the other hand, the analysis result of the Process innovation tend to be higher than the product innovation, when SMEs are developing raw materials for their partners or to other firms targeting on for manufacturing industries(B2B). Also perceived importance of using external resources has effected to both product and process innovation performance. But Perceived importance of external partnership was statistically insignificant. Interesting finding was that the service product has negative effects on for the process innovation performance. And Relationship between size of the firms and their external collaboration activities with their performance of the innovations indicated that the bigger firms(over 100 of employees) tend to have better for both product and process innovations. Finally, implications of the results can be suggested as performance of innovation can be varied depends on firm's unique business idiosyncrasy as well as levels of external collaboration activities. The Implication of this research can be considered for firms in selecting an appropriate strategy as well as for policy makers.

A Study on Establishment of Safety Training Center Based on Virtual Reality and Augmented Reality Technology for Military Safety and Suicide Accident Prevention (가상현실(VR/AR) 기술 기반으로 군 안전 및 자살사고 예방을 위한 안전체험훈련장 구축 방안에 관한 연구)

  • Choi, Sung-oh;Min, Yong-sik;Kim, Sung-Il;Ghoi, Jong-geun
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.139-148
    • /
    • 2020
  • Due to change in circumstances in the 2000s such as severe birthrate decline and shortened military service period, the armed forces of the Republic of Korea is currently turning to technologies and equipments from manpower, developing it to become high-tech, high-speed, and complex, resulting in an environment in which a single mistake could cause a mass mortality crisis.It is also evident that, considering aspects such as safety training curriculums and achievements of advanced countries and private education, hands-on training is a must in preventing suicides and accidents in the military, and establishing safety training centers is crucial for systematic and effective hands-on training.Soldiers who are joining the army as of now have experienced the Internet ever since they were born and easily use both virtual and augmented reality, and the current level of science and technology has developed to the point where most of the public safety experience centers are able to be replaced by virtual and augmented reality (VR/AR). Therefore, considering the aspects such as installation space, construction costs, maintenance costs, user characteristics, and education effects, other than for those trainings where real models and objects are more effective such as first aid training, it is with a strong recommendation that establishing military safety training facilities with VR/AR (Virtual and augmented reality) is a must in the coming future. We have derived the need for hands-on training by considering the development of virtual and augmented reality (VR/AR), analysis of operation status of the public safety experience centers, characteristics of military units, installation and maintenance costs, and proposed plan to establish safety training centers where effective training performance can be achieved at a lower cost than the public safety experience center. In addition, we suggested the scale of the required safety training center and the composition of the experience rooms considering the number of trainees and the environment of each military units. Given this analysis it will contribute to the prevention of military safety and suicide by building a safety training center in the future.