• Title/Summary/Keyword: Cyber 3 Layer

Search Result 25, Processing Time 0.02 seconds

Cloud and Fog Computing Amalgamation for Data Agitation and Guard Intensification in Health Care Applications

  • L. Arulmozhiselvan;E. Uma
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.685-703
    • /
    • 2024
  • Cloud computing provides each consumer with a large-scale computing tool. Different Cyber Attacks can potentially target cloud computing systems, as most cloud computing systems offer services to many people who are not known to be trustworthy. Therefore, to protect that Virtual Machine from threats, a cloud computing system must incorporate some security monitoring framework. There is a tradeoff between the security level of the security system and the performance of the system in this scenario. If strong security is needed, then the service of stronger security using more rules or patterns is provided, since it needs much more computing resources. A new way of security system is introduced in this work in cloud environments to the VM on account of resources allocated to customers are ease. The main spike of Fog computing is part of the cloud server's work in the ongoing study tells the step-by-step cloud server to change the tremendous measurement of information because the endeavor apps are relocated to the cloud to keep the framework cost. The cloud server is devouring and changing a huge measure of information step by step to reduce complications. The Medical Data Health-Care (MDHC) records are stored in Cloud datacenters and Fog layer based on the guard intensity and the key is provoked for ingress the file. The monitoring center sustains the Activity Log, Risk Table, and Health Records. Cloud computing and Fog computing were combined in this paper to review data movement and safe information about MDHC.

A Study on the Application of UBC3D-PLM for Soil Liquefaction Analysis (액상화 해석을 위한 UBC3D-PLM의 적용성에 관한 연구)

  • Park, Eon-Sang;Kim, Byung-Il
    • Journal of the Korean Geosynthetics Society
    • /
    • v.21 no.1
    • /
    • pp.1-10
    • /
    • 2022
  • In this study, a model parameter evaluation method using relative density was proposed to utilize applicable UBC3D-PLM for liquefaction behavior. In addition, dynamic effective stress analysis, that is, liquefaction analysis, was performed on the case of the liquefaction occurrence region where acceleration and pore water pressure were measured, and compared with the actual measurement and the existing Finn analysis results. Through this study, it was found that the proposed method can easily evaluate the necessary parameters required by the related model and predict the pore water pressure behavior in the region where liquefaction occurs. In addition, in the case of the study area, both measurements and numerical analysis showed that liquefaction occurred when a certain amount of time elapsed after the earthquake acceleration reached the maximum value. In the case of UBC3D-PLM applied in this study, the excess pore water pressure behavior similar to the actual measurement was predicted, and the occurrence of liquefaction was evaluated in the same way as the actual measurement. In particular, although the excess pore water pressure in the sand layer was greater, the phenomenon in which liquefaction occurred in the silt layer was accurately realized. It is expected that the proposed model parameter evaluation method and finite element analysis applying UBC3D-PLM can be used to select the liquefaction reinforcement region in the future seismic design and reinforcement by evaluating the liquefaction occurrence region similarly to the real one.

Performance Evaluation of the new AODV Routing Protocol with Cross-Layer Design Approach (교차 계층 설계 기법을 사용한 새로운 AODV 라우팅 프로토콜 설계 및 성능평가)

  • Jang, Jaeshin;Wie, Sunghong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.768-777
    • /
    • 2020
  • In this paper, we describe recent research results on AODV routing protocol, which is widely deployed at mobile ad hoc networks, and AODV related routing protocols with multi-path routing schemes. We suggest the critical problems which minimum hop routing schemes have, such as AODV routing protocol, and then, propose a new C-AODV routing protocol with two routing metrics: the primary metric is the hop count, the secondary metric is the sum of link delay times. We implemented C-AODV protocol by modifying AODV at the NS-3, and thus, elaborate on how we change the original AODV source code of NS-3 in order to implement the C-AODV scheme. We show numerical comparison of C-AODV scheme with the original AODV scheme and then, discuss how much the C-AODV enhances routing performance over AODV protocol. In conclusion, we present future research items.

The Study on Implementation of Crime Terms Classification System for Crime Issues Response

  • Jeong, Inkyu;Yoon, Cheolhee;Kang, Jang Mook
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.61-72
    • /
    • 2020
  • The fear of crime, discussed in the early 1960s in the United States, is a psychological response, such as anxiety or concern about crime, the potential victim of a crime. These anxiety factors lead to the burden of the individual in securing the psychological stability and indirect costs of the crime against the society. Fear of crime is not a good thing, and it is a part that needs to be adjusted so that it cannot be exaggerated and distorted by the policy together with the crime coping and resolution. This is because fear of crime has as much harm as damage caused by criminal act. Eric Pawson has argued that the popular impression of violent crime is not formed because of media reports, but by official statistics. Therefore, the police should watch and analyze news related to fear of crime to reduce the social cost of fear of crime and prepare a preemptive response policy before the people have 'fear of crime'. In this paper, we propose a deep - based news classification system that helps police cope with crimes related to crimes reported in the media efficiently and quickly and precisely. The goal is to establish a system that can quickly identify changes in security issues that are rapidly increasing by categorizing news related to crime among news articles. To construct the system, crime data was learned so that news could be classified according to the type of crime. Deep learning was applied by using Google tensor flow. In the future, it is necessary to continue research on the importance of keyword according to early detection of issues that are rapidly increasing by crime type and the power of the press, and it is also necessary to constantly supplement crime related corpus.

A Case Study on the Appropriate Construction Personnel of the Typical Floor of Apattment Frame Construction Using the Queueing Model (대기행렬 모형을 활용한 아파트 골조공사 기준층 인적 자원관리 선정사례에 관한 연구)

  • Lee, JeongWon;Kim, BoHee;Ham, NamHyuk;Kim, JaeJun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.23 no.6
    • /
    • pp.3-14
    • /
    • 2022
  • Quantitative analysis of the number of construction workers and construction period can present a new standard for appropriate personnel. This study presents a Queueing model that predicts the execution time of work procedures, the most important factor among work efficiency indicators. During the working cycle of apartment frame construction the same process tends to be repeated the volume of contruction. Based on these characteristics, this study used a Queueing Model and analyzed reference layer cycle of the delayed frame construction. After adjusting the number of people and the construction period, the performance of the model was analyzed and suggested. This study aims to support the decision making of personnel distribution according to the volume of construction by performing a performance analysis of the Queueing Model.