• Title/Summary/Keyword: Mobile Cloud Services

Search Result 189, Processing Time 0.026 seconds

Changes in the Industrial Structure caused by the IoT and AI (사물인터넷과 AI가 가져올 산업구조의 변화)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.93-99
    • /
    • 2017
  • Recently IoT(Internet of Things) service industry has grown very rapidly. In this paper, we investigated the changes in IoT service industry as well as new direction of human life in future global society. Under these changing market conditions, competition has been also changed into global and ecological competition. But compared to the platform initiatives and ecological strategies of global companies, Korean companies' vision of building ecosystems is still unclear. In addition, there is a need of internetworking between mobile and IoT services. IoT security Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, we investigate the structure of IoT and AI service ecosystem in order to gain strategic implications and insights for the security industry in this paper.

A Study on the Analysis Techniques for Big Data Computing (빅데이터 컴퓨팅을 위한 분석기법에 관한 연구)

  • Oh, Sun-Jin
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.475-480
    • /
    • 2021
  • With the rapid development of mobile, cloud computing technology and social network services, we are in the flood of huge data and realize that these large-scale data contain very precious value and important information. Big data, however, have both latent useful value and critical risks, so, nowadays, a lot of researches and applications for big data has been executed actively in order to extract useful information from big data efficiently and make the most of the potential information effectively. At this moment, the data analysis technique that can extract precious information from big data efficiently is the most important step in big data computing process. In this study, we investigate various data analysis techniques that can extract the most useful information in big data computing process efficiently, compare pros and cons of those techniques, and propose proper data analysis method that can help us to find out the best solution of the big data analysis in the peculiar situation.

A study of Reference Model of Smart Library based on Linked Open Data (링크드오픈데이터 기반 스마트 라이브러리의 참조모델에 관한 연구)

  • Moon, Hee-kyung;Han, Sung-kook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.9
    • /
    • pp.1666-1672
    • /
    • 2016
  • In recent years, smart technology has been applied to various information system fields. Especially, traditional library service area is changing to Smart-Library from Digital-Library. In this environment are need to library service software platform for supporting variety content, library services, users and smart-devices. Due to this, existing library service has a limitation that inhibits semantic interoperability between different heterogeneous library systems. In this paper, we propose Linked-Open-Data based smart library as an archetype of future-library system that provide a variety content and system interaction and integration of services. It is an innovative system of the cutting-edge information intensive. Therefore, we designed system environments according to various integration requirements for smart library based on Linked-Open-Data. And, we describe the functional requirements of smart-library systems by considering the users' demands and the eco-systems of information technology. In addition, we show the reference framework, which can accommodate the functional requirements and provide smart knowledge service to user through a variety of smart-devices.

An Integrated E-model Implementation for Speech Quality Measurement in VoIP and VoLTE (VoIP와 VoLTE 음성 품질 측정을 위한 통합 E-model 구현)

  • Kim, Bog-Soon;Baek, Kwang-Hyun;Cho, Gi-Hwan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.7
    • /
    • pp.10-18
    • /
    • 2013
  • With advancing of mobile communication services and commercializing of VoLTE (Voice of LTE), it is getting to pay attention on QoS of VoLTE. This paper proposes an integrated E-model in which some factors influenced to service quality of VoIP and VoLTE based voice communication system are considered in calculating the voice quality of Wideband Codec. The model aims to calculate R value which reflects the situations of access network, network characteristics, terminals' usage and mobility. We mainly deal with the integrated E-model's structure, related algorithms and optimal parameters for VoLTE. Some experiments show that the voice quality difference between VoIP and VoiceChecker, and VoLTE and POLQA, is below 10%. With the proposed model, we can calculate the voice quality by making use of the factors directly affected to service quality and the environment of VoLTE terminal and network. As a result, we can estimate the service quality in advance, without measuring it in real wireless environment.

Creation of Actual CCTV Surveillance Map Using Point Cloud Acquired by Mobile Mapping System (MMS 점군 데이터를 이용한 CCTV의 실질적 감시영역 추출)

  • Choi, Wonjun;Park, Soyeon;Choi, Yoonjo;Hong, Seunghwan;Kim, Namhoon;Sohn, Hong-Gyoo
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.5_3
    • /
    • pp.1361-1371
    • /
    • 2021
  • Among smart city services, the crime and disaster prevention sector accounted for the highest 24% in 2018. The most important platform for providing real-time situation information is CCTV (Closed-Circuit Television). Therefore, it is essential to create the actual CCTV surveillance coverage to maximize the usability of CCTV. However, the amount of CCTV installed in Korea exceeds one million units, including those operated by the local government, and manual identification of CCTV coverage is a time-consuming and inefficient process. This study proposed a method to efficiently construct CCTV's actual surveillance coverage and reduce the time required for the decision-maker to manage the situation. For this purpose, first, the exterior orientation parameters and focal lengths of the pre-installed CCTV cameras, which are difficult to access, were calculated using the point cloud data of the MMS (Mobile Mapping System), and the FOV (Field of View) was calculated accordingly. Second, using the FOV result calculated in the first step, CCTV's actual surveillance coverage area was constructed with 1 m, 2 m, 3 m, 5 m, and 10 m grid interval considering the occluded regions caused by the buildings. As a result of applying our approach to 5 CCTV images located in Uljin-gun, Gyeongsnagbuk-do the average re-projection error was about 9.31 pixels. The coordinate difference between calculated CCTV and location obtained from MMS was about 1.688 m on average. When the grid length was 3 m, the surveillance coverage calculated through our research matched the actual surveillance obtained from visual inspection with a minimum of 70.21% to a maximum of 93.82%.

A Study on the Introductioin of Data Trusts System to Expand the Rights of Privacy Self-Determination (개인정보 자기결정권 확대를 위한 데이터 신탁제도 도입 방안 연구)

  • Jang, Keunjae;Lee, Seungyong
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.29-43
    • /
    • 2022
  • With the advent of the Internet and the development of mobile digital devices such as smartphones and tablet PCs, the communication service paradigm began to shift from existing voice services to data services. Recently, as social network services (SNS) are activated and 4th industrial revolution technologies centered on ICT (Information and Communication Technologies) such as Big Data, Blockchain, Cloud, and 5G/6G are rapidly developed, the amount of shared data type and the amount of data are increasing rapidly. As the transition to a digital society begins actively, the importance of using data information, as well as the economic and social values of personal information are becoming increasingly important. As a result, they are actively discussing policies to revitalize the data information industry around the world and ways to efficiently obtain, analyze, and utilize increasingly diverse and vast data, as well as to protect/guarantee the rights of information subjects (providers) in various fields such as society, culture, economy, and politics.. In this paper, in order to improve the self-determination right of personal information on data produced by information subjects, and further expand the use of safe data and the data economy, a differentiated data trusts system was considered and suggested. In addition, the components and data trusts procedures necessary to efficiently operate the data trusts system in Korea were considered, and the non-profit data trusts system and the for-profit data trusts system were considered as a way to flexibly operate the data trusts system. Furthermore, the legal items necessary for the implementation of the data trusts system were investigated and considered. In this paper, in order to propose a domestic data trusts system, cases related to existing data trusts systems such as the United States, Japan, and Korea were reviewed and analyzed. In addition, in order to prepare legislation necessary for the data trusts system, data-related laws in major countries and domestic legal and policy trends were reviewed to study the rights that conflict or overlap with existing laws, and differences were investigated and considered. The Data trusts system proposed in this paper is a reasonable system that is expected to recognize the asset value of data in the capitalist market economy system, to provide legitimate compensation for data produced by data subjects, and further to contribute greatly to the use of safe data and creation of a new service market.

FBcastS: An Information System Leveraging the K-Maryblyt Forecasting Model (K-Maryblyt 모델 구동을 위한 FBcastS 정보시스템 개발)

  • Mun-Il Ahn;Hyeon-Ji Yang;Eun Woo Park;Yong Hwan Lee;Hyo-Won Choi;Sung-Chul Yun
    • Research in Plant Disease
    • /
    • v.30 no.3
    • /
    • pp.256-267
    • /
    • 2024
  • We have developed FBcastS (Fire Blight Forecasting System), a cloud-based information system that leverages the K-Maryblyt forecasting model. The FBcastS provides an optimal timing for spraying antibiotics to prevent flower infection caused by Erwinia amylovora and forecasts the onset of disease symptoms to assist in scheduling field scouting activities. FBcastS comprises four discrete subsystems tailored to specific functionalities: meteorological data acquisition and processing, execution of the K-Maryblyt model, distribution of web-based information, and dissemination of spray timing notifications. The meteorological data acquisition subsystem gathers both observed and forecasted weather data from 1,583 sites across South Korea, including 761 apple or pear orchards where automated weather stations are installed for fire blight forecast. This subsystem also performs post-processing tasks such as quality control and data conversion. The model execution subsystem operates the K-Maryblyt model and stores its results in a database. The web-based service subsystem offers an array of internet-based services, including weather monitoring, mobile services for forecasting fire blight infection and symptoms, and nationwide fire blight monitoring. The final subsystem issues timely notifications of fire blight spray timing alert to growers based on forecasts from the K-Maryblyt model, blossom status, pesticide types, and field conditions, following guidelines set by the Rural Development Administration. FBcastS epitomizes a smart agriculture internet of things (IoT) by utilizing densely collected data with a spatial resolution of approximately 4.25 km to improve the accuracy of fire blight forecasts. The system's internet-based services ensure high accessibility and utility, making it a vital tool in data-driven smart agricultural practices.

Research on Software Classification System based on an Integrated Software Industry (융합소프트웨어산업에 따른 소프트웨어 분류체계에 관한 연구)

  • Yang, Hyo-Sik;Jeon, In-Oh
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.91-99
    • /
    • 2013
  • While there is the active integration of various industries, a convergence of the software and knowledge service industries including software used in finance and counseling products is creating the necessity to include software industry utilization sectors aside from covering only software products and service production activities. Furthermore, to cope with the radical environment changes in the software industry when it comes to categorizing mobile and cloud computing areas into a software and classification system, we are at a point where there is a need to establish a directional nature on what should be included. In order to establish an integrated classification of newly introduced technologies, products and services, this paper aims to discover areas not included in the classification standard because of the ecological characteristics of the software. It also wants to differentiate the classification system and identify its incomplete areas such as the lack of connections within the system to ultimately establish such for newly surfacing software fields.

A K-Nearest Neighbour Query Processing Algorithm for Encrypted Spatial Data in Road Network (도로 네트워크 환경에서 암호화된 공간데이터를 위한 K-최근접점 질의 처리 알고리즘)

  • Jang, Mi-Young;Chang, Jae-Woo
    • Spatial Information Research
    • /
    • v.20 no.3
    • /
    • pp.67-81
    • /
    • 2012
  • Due to the recent advancement of cloud computing, the research on database outsourcing has been actively done. Moreover, the number of users who utilize Location-based Services(LBS) has been increasing with the development in w ireless communication technology and mobile devices. Therefore, LBS providers attempt to outsource their spatial database to service provider, in order to reduce costs for data storage and management. However, because unauthorized access to sensitive data is possible in spatial database outsourcing, it is necessary to study on the preservation of a user's privacy. Thus, we, in this paper, propose a spatial data encryption scheme to produce outsourced database from an original database. We also propose a k-Nearest Neighbor(k-NN) query processing algorithm that efficiently performs k-NN by using the outsourced database. Finally, we show from performance analysis that our algorithm outperforms the existing one.

Extending the Home Network using UPnP+ (UPnP+를 이용한 홈 네트워크 확장)

  • Kim, Hyun-Sik;Park, Yong-Suk;Koo, Sung Wan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.540-542
    • /
    • 2014
  • The Universal Plug and Play (UPnP) specification permits networked devices to discover each other and to provide diverse services in the home network environment. Recently, new paradigms such as mobile connected computing, cloud-based service delivery, smart device content sharing, and Internet of Things (IoT) have emerged, but the home network based UPnP shows functional limitations in supporting such paradigms. To support them, the UPnP Forum has recently extended the capabilities of the existing UPnP, calling it UPnP+. In this paper, the UPnP Device Architecture V2.0 (UDA 2.0), which forms the basis of UPnP+, is presented. We present how UDA 2.0 enables the expansion of the home network to wide-area networks and non-IP device domains.

  • PDF