• Title/Summary/Keyword: Lightweight Data

Search Result 389, Processing Time 0.022 seconds

A Study on the Intelligent Document Processing Platform for Document Data Informatization (문서 데이터 정보화를 위한 지능형 문서처리 플랫폼에 관한 연구)

  • Hee-Do Heo;Dong-Koo Kang;Young-Soo Kim;Sam-Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.1
    • /
    • pp.89-95
    • /
    • 2024
  • Nowadays, the competitiveness of a company depends on the ability of all organizational members to share and utilize the organizational knowledge accumulated by the organization. As if to prove this, the world is now focusing on ChetGPT service using generative AI technology based on LLM (Large Language Model). However, it is still difficult to apply the ChetGPT service to work because there are many hallucinogenic problems. To solve this problem, sLLM (Lightweight Large Language Model) technology is being proposed as an alternative. In order to construct sLLM, corporate data is essential. Corporate data is the organization's ERP data and the company's office document knowledge data preserved by the organization. ERP Data can be used by directly connecting to sLLM, but office documents are stored in file format and must be converted to data format to be used by connecting to sLLM. In addition, there are too many technical limitations to utilize office documents stored in file format as organizational knowledge information. This study proposes a method of storing office documents in DB format rather than file format, allowing companies to utilize already accumulated office documents as an organizational knowledge system, and providing office documents in data form to the company's SLLM. We aim to contribute to improving corporate competitiveness by combining AI technology.

A Study on Fire Hazards in Multiple Compartments with Lightweight Partition Walls (경량칸막이 벽체를 통한 다중구획공간에서의 화재위험성에 관한 연구)

  • Park, Sang-Min;Choi, Su-Gil;Jin, Se-Young;Kim, Si-Kuk
    • Fire Science and Engineering
    • /
    • v.34 no.2
    • /
    • pp.14-21
    • /
    • 2020
  • This paper presents the study of a fire risk to the backside of two miniatures of ISO 9705 2/5 using a lightweight partition for indoor space division and reproduction of the ISO 9705 test. An SGP partition, stud partition, glass wool panel, urethane foam panel, sandwich panel, and glass partition were selected as the test specimens, which are frequently used in construction. According to the ISO 9705 test standard, stabilization was achieved using a measuring device that recorded data before the ignition of a burner and continued recording for 120 s thereafter. After ignition was achieved, the power was increased to 300 kW for 600 s and then reduced to 100 kW for 600 s. The specimens were subsequently observed for 180 s, and the fire risk to the backside and the fire pattern of the wall unit were analyzed. Owing to the amount of heat generated by the ignition source, the maximum temperature of the backside was observed to be 67.7 ℃ for the SGP partition, 55.1 ℃ for the stud partition, 52.4 ℃ for the glass wool panel, 727.4 ℃ for the sandwich panel, 561 ℃ for the urethane foam panel, and 630.5 ℃ for the glass partition. In the cases of the sandwich and urethane foam panels, the explosion of flammable gas occurred by virtue of fusion of the interior materials. The reinforced glass was fractured owing to the temperature difference between the heat- and nonheat-responsive parts. Ultimately, the fire risk to the nearby section room was deemed to be high.

Engineering Properties of Synthetic Lightweight Aggregate Concrete Affected by Alkali-Silica Reaction (알카리-실리카 반응(反應)에 의한 인공경량골재(人工輕量骨材)콘크리트의 공학적(工學的) 성질(性質))

  • Sung, Chan Yong
    • Korean Journal of Agricultural Science
    • /
    • v.18 no.1
    • /
    • pp.33-40
    • /
    • 1991
  • This study was performed to obtain the basic data applied to use of synthetic lightweight aggregate concrete affected by alkali silica reaction. The results obtained were summarized as follows; 1. The compressive strength of type A concrete was increased with increase of curing age. At the curing age 28 days, the highest compressive strength was showed at type Band C concrete, respectively. But, it was gradually decreased with increase of curing age at those concrete. 2. The flexural strength of type A concrete was increased with increase of curing age. At the curing age 14 days, the highest flexural strength was showed at type Band C concrete, respectively. But, it was gradually decreased with increase of curing age at those concrete. 3. The correlation between compressive and flexural strength of the sample was shown highly significant only at type A concrete. 4. It was shown that the water absorptions of the type Band C were 7.0-7.8 times higher than the type A concrete. It was significantly higher at the early stage of immersed time at all sample. 5. The correlation between compressive strength and water absorption of the sample was significant only at the type A concrete.

  • PDF

An analysis on invasion threat and a study on countermeasures for Smart Car (스마트카 정보보안 침해위협 분석 및 대응방안 연구)

  • Lee, Myong-Yeal;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.374-380
    • /
    • 2017
  • The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.

A Framework of Intelligent Middleware for DNA Sequence Analysis in Cloud Computing Environment (DNA 서열 분석을 위한 클라우드 컴퓨팅 기반 지능형 미들웨어 설계)

  • Oh, Junseok;Lee, Yoonjae;Lee, Bong Gyou
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.29-43
    • /
    • 2014
  • The development of NGS technologies, such as scientific workflows, has reduced the time required for decoding DNA sequences. Although the automated technologies change the genome sequence analysis environment, limited computing resources still pose problems for the analysis. Most scientific workflow systems are pre-built platforms and are highly complex because a lot of the functions are implemented into one system platform. It is also difficult to apply components of pre-built systems to a new system in the cloud environment. Cloud computing technologies can be applied to the systems to reduce analysis time and enable simultaneous analysis of massive DNA sequence data. Web service techniques are also introduced for improving the interoperability between DNA sequence analysis systems. The workflow-based middleware, which supports Web services, DBMS, and cloud computing, is proposed in this paper for expecting to reduceanalysis time and aiding lightweight virtual instances. It uses DBMS for managing the pipeline status and supporting the creation of lightweight virtual instances in the cloud environment. Also, the RESTful Web services with simple URI and XML contents are applied for improving the interoperability. The performance test of the system needs to be conducted by comparing results other developed DNA analysis services at the stabilization stage.

Implementation of a TCP/IP Offload Engine Using High Performance Lightweight TCP/IP (고성능 경량 TCP/IP를 이용한 소프트웨어 기반 TCP/IP 오프로드 엔진 구현)

  • Jun, Yong-Tae;Chung, Sang-Hwa;Yoon, In-Su
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.4
    • /
    • pp.369-377
    • /
    • 2008
  • Today, Ethernet technology is rapidly developing to have a bandwidth of 10Gbps beyond 1Gbps. In such high-speed networks, the existing method that host CPU processes TCP/IP in the operating system causes numerous overheads. As a result of the overheads, user applications cannot get the enough computing power from the host CPU. To solve this problem, the TCP/IP Offload Engine(TOE) technology was emerged. TOE is a specialized NIC which processes the TCP/IP instead of the host CPU. In this paper, we implemented a high-performance, lightweight TCP/IP(HL-TCP) for the TOE and applied it to an embedded system. The HL-TCP supports existing fundamental TCP/IP functions; flow control, congestion control, retransmission, delayed ACK, processing out-of-order packets. And it was implemented to utilize Ethernet MAC's hardware features such as TCP segmentation offload(TSO), checksum offload(CSO) and interrupt coalescing. Also we eliminated the copy overhead from the host memory to the NIC memory when sending data and we implemented an efficient DMA mechanism for the TCP retransmission. The TOE using the HL-TCP has the CPU utilization of less than 6% and the bandwidth of 453Mbps.

Structural Design Optimization of Lightweight Offshore Helidecks Using a Genetic Algorithm and AISC Standard Sections (유전 알고리듬 및 AISC 표준 단면을 사용한 경량화 헬리데크 구조 최적설계)

  • Sim, Kichan;Kim, Byungmo;Kim, Chanyeong;Ha, Seung-Hyun
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.32 no.6
    • /
    • pp.383-390
    • /
    • 2019
  • A helideck is one of the essential structures in offshore platforms for the transportation of goods and operating personnel between land and offshore sites. As such, it should be carefully designed and installed for the safety of the offshore platform. In this study, a structural design optimization method for a lightweight offshore helideck is developed based on a genetic algorithm and an attainable design set concept. A helideck consists of several types of structural members such as plates, girders, stiffeners, trusses, and support elements, and the dimensions of these members are typically pre-defined by manufacturers. Therefore, design sets are defined by collecting the standard section data for these members from the American Institute of Steel Construction (AISC), and integer section labels are assigned as design variables in the genetic algorithm. The objective is to minimize the total weight of the offshore helideck while satisfying the maximum allowable stress criterion under various loading conditions including self-weight, wind direction, landing position, and landing condition. In addition, the unity check process is also utilized for additional verification of structural safety against buckling failure of the helideck.

HFN-Based Right Management for IoT Health Data Sharing (IoT 헬스 데이터 공유를 위한 HFN 기반 권한 관리)

  • Kim, Mi-sun;Park, Yongsuk;Seo, Jae-Hyun
    • Smart Media Journal
    • /
    • v.10 no.1
    • /
    • pp.88-98
    • /
    • 2021
  • As blockchain technology has emerged as a security issue for IoT, technology which integrates block chain into IoT is being studied. In this paper is a research concerning token-based IoT service access control technology for data sharing, which propose a possessor focused data sharing technic by using the permissioned blockchain. To share IoT health data, a Hyperledger Fabric Network consisting of three organizations was designed to provide a way to share data by applying different access control policies centered on device owners for different services. In the proposed system, the device owner issues access control tokens with different security levels applied to the participants in the organization, and the token issue information is shared through the distributed ledger of the HFN. In IoT, it is possible to lightweight the access control processing of IoT devices by granting tokens to service requesters who request access to data. Furthmore, by sharing token issuance information among network participants using HFN, the integrity of the token is guaranteed and all network participants can trust the token. The device owners can trust that their data is being used within their authorized rights, and control the collection and use of data.

Research on DDoS Detection using AI in NFV (인공지능 기술을 이용한 NFV 환경에서의 DDoS 공격 탐지 연구)

  • Kim, HyunJin;Park, Sangho;Ryou, JaeCheol
    • Journal of Digital Contents Society
    • /
    • v.19 no.4
    • /
    • pp.837-844
    • /
    • 2018
  • Recently, the cloud technology has made dynamical network changes by enabling the construction of a logical network without building a physical network. Despite recent research on the cloud, it is necessary to study security functions for the identification of fake virtual network functions and the encryption of communication between entities. Because the VNFs are open to subscribers and able to implement service directly, which can make them an attack target. In this paper, we propose a virtual public key infrastructure mechanism that detects a fake VNFs and guarantees data security through mutual authentication between VNFs. To evaluate the virtual PKI, we built a management and orchestration environment to test the performance of authentication and key generation for data security. And we test the detection of a distributed denial of service by using several AI algorithms to enhance the security in NFV.

Encryption Algorithm Technique for Device's key Protect in M2M environment (M2M 환경의 디바이스 키 보호를 위한 암호 알고리즘 응용 기법)

  • Choi, Do-Hyeon;Park, Jung-Oh
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.343-351
    • /
    • 2015
  • With the diverse services of the current M2M environment being expanded to the organizations, the corporations, and the daily lives, the possibility of the occurrence of the vulnerabilities of the security of the related technologies have become an issue. In order to solve such a problem of the vulnerability of the security, this thesis proposes the technique for applying the cryptography algorithm for the protection of the device key of the M2M environment. The proposed technique was based on the elliptic curve cryptography Through the key exchange and the signature exchange in the beginning, the security session was created. And the white box cipher was applied to the encryption that creates the white box table using the security session key. Application results cipher algorithm, Elliptic Curve Cryptography provides a lightweight mutual authentication, a session key for protecting the communication session and a conventional white-box cipher algorithm and was guaranteed the session key used to encrypt protected in different ways. The proposed protocol has secure advantages against Data modulation and exposure, MITM(Man-in-the-middle attack), Data forgery and Manipulation attack.