• Title/Summary/Keyword: Open Access Service

Search Result 221, Processing Time 0.03 seconds

Database PasS web service system using Docker

  • Hur, Tai-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.51-58
    • /
    • 2020
  • Most of the students in computer-related departments work on projects, and it is essential to use a database for project execution. To use such a database, it is necessary to install a Database Management System. However, it takes several minutes (hours) to install a DBMS, and some DBMS require a difficult installation process. Therefore, in order to solve this problem, this study proposed a system that can easily install DBMS using Docker. Docker is an open source project that automates the deployment of Linux applications into software containers. Docker Container is wrapped in a complete file system that includes everything necessary for the execution of software, and includes code, runtime, system tools, system libraries, and anything that is installed on the server. This guarantees that they will always run the same regardless of the environment in which they are running. After creating a database using this proposed system, you can check the database access information on the web and check the server status in minutes. As a result of of implementing this proposed system and applying it to the projects of 10 teams, the installation time was reduced by 94.5% for Maria DBMS and 98.3% for Oracle DBMS than individual installation, confirming improved efficiency.

Implementation and Performance Analysis of Single I/O Space Service for Cluster Computers (클러스터 컴퓨터를 위한 단일 I/O 공간 서비스의 구현 및 성능분석)

  • Kim, Tae-Kyu;Kim, Bang-Hyun;Kim, Jong-Hyun
    • The KIPS Transactions:PartA
    • /
    • v.13A no.6 s.103
    • /
    • pp.517-524
    • /
    • 2006
  • In cluster computers, it is essential to Implement the single I/O space(SIOS) supporting integrated I/O substructure to efficiently process I/O intensive applications. SIOS service provides with global I/O address space to directly access peripherals and hard disks in its own or remote nodes from any node in the cluster computer In this thesis, we propose the implementation method of SIOS in Linux clusters by using only freewares. This method is implemented at device driver level that uses Enhanced Network Block Device(ENBD) and file system level that uses S/W RAID and NFS. The major strengths of this method are easiness of implementation and almost no cost due to using freewares. In addition, since freewares used are open sources, it is possible to apply this method to other platforms with only slight modification. Moreover, experiments show that I/O throughputs are up to 5.5 times higher in write operations and approximately 2.3 times higher in read operations than those of CDD method that uses the device driver developed at kernel level.

Detecting Jamming Attacks in MANET (MANET에서의 전파방해 공격 탐지)

  • Shrestha, Rakesh;Lee, Sang-Duk;Choi, Dong-You;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.482-488
    • /
    • 2009
  • Mobile Ad-hoc Networks provide communication without a centralized infrastructure, which makes them suitable for communication in disaster areas or when quick deployment is needed. On the other hand, they are susceptible to malicious exploitation and have to face different challenges at different layers due to its open Ad-hoc network structure which lacks previous security measures. Denial of service (DoS) attack is one that interferes with the radio transmission channel causing a jamming attack. In this kind of attack, an attacker emits a signal that interrupts the energy of the packets causing many errors in the packet currently being transmitted. In harsh environments where there is constant traffic, a jamming attack causes serious problems; therefore measures to prevent these types of attacks are required. The objective of this paper is to carry out the simulation of the jamming attack on the nodes and determine the DoS attacks in OPNET so as to obtain better results. We have used effective anomaly detection system to detect the malicious behaviour of the jammer node and analyzed the results that deny channel access by jamming in the mobile Ad-hoc networks.

Method of Changing Password for Secure Cloud Storage based on Proxy Re-encryption Scheme (프록시 재암호화 기반의 보안 클라우드 저장장치를 위한 분실된 비밀번호 변경 기법)

  • Park, Young-Hoon;Seo, Seung-Woo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.3
    • /
    • pp.29-36
    • /
    • 2016
  • In cloud storages, as security of stored files and privacy of users become regarded as important concerns, secure cloud storages have been proposed, where stored files are encrypted with file owner's password and even the cloud service provider can not open the file contents. However, if the file owner forgets one's password, one can no longer access the file. To solve this problem, we propose a scheme for changing password for the secure cloud based on proxy re-encryption, which make the file owner enable to change password even when one forgets it. With the proposed scheme, only the file owner can change the password and re-encrypt the files securely because other user and even the service provider can not see the file contents.

ZMET-based Participation Motivation Analysis of Chinese Tourists's Floral Arrangement Courses Visit to Korea (ZMET을 활용한 방한 중국인 관광객의 꽃꽂이교육 관광콘텐츠 참여동기 연구)

  • Cui, Ru-Ru;Kim, Young-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.3
    • /
    • pp.223-235
    • /
    • 2019
  • In order to develop the marketing strategy of Korean floral arrangement courses for chinese tourists, this study aimed at gaining their participation motivation with application of the ZMET (Zaltman metaphor-elicitation technique). According to the results, 18 constructs ('a sense of accomplishment', 'Korean culture visit', 'teacher's high-quality service', 'professionalism', 'to be together', 'communication with others', 'joint pleasure', 'better than China', 'not available in China', 'healing', 'the feeling of happiness and love', 'easy access to art', 'wonderful life shot', 'beautiful interior', 'special design', 'expectation', 'close to nature', and 'nice daily-life decoration') were derived and 4 main constructs ('a sense of accomplishment', 'Korean culture visit', 'teacher's high-quality service', and 'professionalism') of the consensus map were analyzed. Therefore, the Korean floral arrangement courses for chinese tourists should open an adjustable level of difficulty of curriculum, offer an opportunity to experience other Korean culture and increase florist's abilities from various aspects.

Design and Implementation of a Stereoscopic Image Control System based on User Hand Gesture Recognition (사용자 손 제스처 인식 기반 입체 영상 제어 시스템 설계 및 구현)

  • Song, Bok Deuk;Lee, Seung-Hwan;Choi, HongKyw;Kim, Sung-Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.3
    • /
    • pp.396-402
    • /
    • 2022
  • User interactions are being developed in various forms, and in particular, interactions using human gestures are being actively studied. Among them, hand gesture recognition is used as a human interface in the field of realistic media based on the 3D Hand Model. The use of interfaces based on hand gesture recognition helps users access media media more easily and conveniently. User interaction using hand gesture recognition should be able to view images by applying fast and accurate hand gesture recognition technology without restrictions on the computer environment. This paper developed a fast and accurate user hand gesture recognition algorithm using the open source media pipe framework and machine learning's k-NN (K-Nearest Neighbor). In addition, in order to minimize the restriction of the computer environment, a stereoscopic image control system based on user hand gesture recognition was designed and implemented using a web service environment capable of Internet service and a docker container, a virtual environment.

Data Analytic Process of a Nationwide Population-Based Study on Obesity Using the National Health Information Database Presented by the National Health Insurance Service 2006-2015

  • Kim, Yang-Hyun;Han, Kyungdo;Son, Jang-Won;Lee, Seong-Su;Oh, Sang Woo;Kwon, Hyuk-Sang;Shin, Soon-Ae;Kim, Yeon-Yong;Lee, Won-Young;Yoo, Soon Jib;Taskforce Team of the Obesity Fact Sheet of the Korean Society for the Study of Obesity
    • Journal of Obesity & Metabolic Syndrome
    • /
    • v.26 no.1
    • /
    • pp.23-27
    • /
    • 2017
  • Background: In Korea, the prevalence of obesity has steadily increased, and the socioeconomic burden of obesity has increased along with it. In 2015, the National Health Insurance Service (NHIS) signed a memorandum of understanding with the Korean Society for the Study of Obesity (KSSO), providing limited open access to its databases so that the status of obesity and obesity management could be investigated. Methods: Using NHIS databases, we analyzed nationwide population-based studies for obesity using the definition of obesity (body mass index ${\geq}25kg/m^2$) in subjects over the age of 20. Age and sex standardization were used for all data. Results: The KSSO released the 'Obesity Fact Sheet 2016' using the 2006-2015 NHIS Health Checkup database. The prevalence of obesity steadily increased from 28.7% in 2006 to 32.4% in 2015, and the prevalence of abdominal obesity also steadily increased from 18.4% in 2009 to 20.8% in 2015. The prevalence of class II obesity steadily increased from 2006 to 2015, such that the total prevalence was 4.8% in 2015 (5.6% in men and 4.0% in women). The highest prevalence of obesity was found in Jeju Island, while the lowest prevalence was found in Daegu City. The highest prevalence of abdominal obesity was also found in Jeju Island, while the lowest prevalence was found in Gwangju City. Conclusion: Based on the Obesity Fact Sheet 2016, a strategy for reducing the prevalence of obesity is needed, especially in Korean men.

PS-Net : Personalized Secure Wi-Fi Networks (PS-Net : 개인별 보안 Wi-Fi 네트워크)

  • Lee, Nam-Seh;Lee, Ju-Ho;Jeong, Choong-Kyo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.497-505
    • /
    • 2015
  • Existing Wi-Fi networks require users to follow network settings of the AP (Access Point), resulting in inconveniences for users, and the password of the AP is shared by all users connected to the AP, causing security information leaks as time goes by. We propose, in this work, a personalized secure Wi-Fi network, in which each user is assigned her own virtual Wi-Fi network. One virtual Wi-Fi per user makes the user-centric network configuration possible. A user sets a pair of her own SSID and password on her device a priori, and the AP publishes its public key in a suitable way. The AP also maintains an open Wi-Fi channel, to which users can connect anytime. On user's request, the user device sends a connection request message containing a pair of SSID and password encrypted with the AP's public key. Receiving the connection request message, the AP instantiates a new virtual AP secured with the pair of SSID and password, which is dedicated to that single user device. This virtual network is securer because the password is not shared among users. It is more convenient because the network adapts itself to the user device. Experiments show that these advantages are obtained with negligible degradation in the throughput performance.

Impact Assessment of Climate Change by Using Cloud Computing (클라우드 컴퓨팅을 이용한 기후변화 영향평가)

  • Kim, Kwang-S.
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.13 no.2
    • /
    • pp.101-108
    • /
    • 2011
  • Climate change could have a pronounced impact on natural and agricultural ecosystems. To assess the impact of climate change, projected climate data have been used as inputs to models. Because such studies are conducted occasionally, it would be useful to employ Cloud computing, which provides multiple instances of operating systems in a virtual environment to do processing on demand without building or maintaining physical computing resources. Furthermore, it would be advantageous to use open source geospatial applications in order to avoid the limitations of proprietary software when Cloud computing is used. As a pilot study, Amazon Web Service ? Elastic Compute Cloud (EC2) was used to calculate the number of days with rain in a given month. Daily sets of climate projection data, which were about 70 gigabytes in total, were processed using virtual machines with a customized database transaction application. The application was linked against open source libraries for the climate data and database access. In this approach, it took about 32 hours to process 17 billion rows of record in order to calculate the rain day on a global scale over the next 100 years using ten clients and one server instances. Here I demonstrate that Cloud computing could provide the high level of performance for impact assessment studies of climate change that require considerable amount of data.

On Method for LBS Multi-media Services using GML 3.0 (GML 3.0을 이용한 LBS 멀티미디어 서비스에 관한 연구)

  • Jung, Kee-Joong;Lee, Jun-Woo;Kim, Nam-Gyun;Hong, Seong-Hak;Choi, Beyung-Nam
    • 한국공간정보시스템학회:학술대회논문집
    • /
    • 2004.12a
    • /
    • pp.169-181
    • /
    • 2004
  • SK Telecom has already constructed GIMS system as the base common framework of LBS/GIS service system based on OGC(OpenGIS Consortium)'s international standard for the first mobile vector map service in 2002, But as service content appears more complex, renovation has been needed to satisfy multi-purpose, multi-function and maximum efficiency as requirements have been increased. This research is for preparation ion of GML3-based platform to upgrade service from GML2 based GIMS system. And with this, it will be possible for variety of application services to provide location and geographic data easily and freely. In GML 3.0, it has been selected animation, event handling, resource for style mapping, topology specification for 3D and telematics services for mobile LBS multimedia service. And the schema and transfer protocol has been developed and organized to optimize data transfer to MS(Mobile Stat ion) Upgrade to GML 3.0-based GIMS system has provided innovative framework in the view of not only construction but also service which has been implemented and applied to previous research and system. Also GIMS channel interface has been implemented to simplify access to GIMS system, and service component of GIMS internals, WFS and WMS, has gotten enhanded and expanded function.

  • PDF