• Title/Summary/Keyword: Research Information Systems

Search Result 12,220, Processing Time 0.055 seconds

Block Smart Rack Technology Development for Increased Efficiency (효율성 증가를 위한 블록 단위 스마트 랙 기술 개발)

  • Tae, Hyo-Sik;Park, Koo-Rack
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.4
    • /
    • pp.11-16
    • /
    • 2015
  • Data center, not only the development of globally of cloud-based IT solutions, As the big data, education, use of development electronic equipment of communication means is increased, Demand of domestic and international data center has increased steadily. Due to the increase of data center demand, heat generation of server rack due to the development of IT equipment is also increasing continuously. Calculating heat value of the data center, because more than 99% of the power usage of IT server is converted into heat, the calorific value as the size and capacity of the server is larger will increase. In this paper, to center the cooling system of air-cooled, and research and development of air conditioning systems for energy reduction of data center, through performance analysis and simulation, it has been analyzed that there is energy savings.

A Systematic Literature Review on Secure Software Development using Feature Driven Development (FDD) Agile Model (기능주도개발 Agile 방법을 사용할 때의 안전한 소프트웨어 개발에 관한 문헌연구)

  • Arbain, Adila Firdaus;Ghani, Imran;Jeong, Seung Ryul
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.13-27
    • /
    • 2014
  • Agile methodologies have gained recognition as efficient development processes through their quick delivery of software, even under time constraints. However, like other agile methods such as Scrum, Extreme Programming (XP) and The Dynamic Systems Development Method (DSDM), Feature Driven Development (FDD) has been criticized due to the unavailability of security elements in its twelve practices. In order to examine this matter more closely, we conducted a systematic literature review (SLR) and studied literature for the years 2001-2012. Our findings highlight that, in its current form, the FDD model partially supports the development of secure software. However, there is little research on this topic, as detailed information about the usage of secure software is rarely published. Thus, we have been able to conclude that the existing five phases of FDD have not been enough to develop secure software until recently. For this reason, security-based phase and practices in FDD need to be proposed.

Efficient Provisioning for Multicast Virtual Network under Single Regional Failure in Cloud-based Datacenters

  • Liao, Dan;Sun, Gang;Anand, Vishal;Yu, Hongfang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2325-2349
    • /
    • 2014
  • Network virtualization technology plays a key role in cloud computing, which serves as an effective approach for provisioning a flexible and highly adaptable shared substrate network to satisfy the demands of various applications or services. Recently, the problem of mapping a virtual network (VN) onto a substrate network has been addressed by various algorithms. However, these algorithms are typically efficient for unicast service-oriented virtual networks, and generally not applicable to multicast service-oriented virtual networks (MVNs). Furthermore, the survivable MVN mapping (SMVNM) problem that considers the survivability of MVN has not been studied and is also the focus of this work. In this research, we discuss SMVNM problem under regional failures in the substrate network and propose an efficient algorithm for solving this problem. We first propose a framework and formulate the SMVNM problem with the objective of minimizing mapping cost by using mixed integer linear programming. Then we design an efficient heuristic to solve this problem and introduce several optimizations to achieve the better mapping solutions. We validate and evaluate our framework and algorithms by conducting extensive simulations on different realistic networks under various scenarios, and by comparing with existing approaches. Our simulation experiments and results show that our approach outperforms existing solutions.

Dynamic Resource Reservation for Ultra-low Latency IoT Air-Interface Slice

  • Sun, Guolin;Wang, Guohui;Addo, Prince Clement;Liu, Guisong;Jiang, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3309-3328
    • /
    • 2017
  • The application of Internet of Things (IoT) in the next generation cellular networks imposes a new characteristic on the data traffic, where a massive number of small packets need to be transmitted. In addition, some emerging IoT-based emergency services require a real-time data delivery within a few milliseconds, referring to as ultra-low latency transmission. However, current techniques cannot provide such a low latency in combination with a mice-flow traffic. In this paper, we propose a dynamic resource reservation schema based on an air-interface slicing scheme in the context of a massive number of sensors with emergency flows. The proposed schema can achieve an air-interface latency of a few milliseconds by means of allowing emergency flows to be transported through a dedicated radio connection with guaranteed network resources. In order to schedule the delay-sensitive flows immediately, dynamic resource updating, silence-probability based collision avoidance, and window-based re-transmission are introduced to combine with the frame-slotted Aloha protocol. To evaluate performance of the proposed schema, a probabilistic model is provided to derive the analytical results, which are compared with the numerical results from Monte-Carlo simulations.

Development of Spatial Reference System Component with Open GIS Simple Features Specification (개방형 GIS의 단순개체 사양을 이용한 공간 기준 좌표계 컴포넌트의 개발)

  • Lee, Dae-Hee;Biun, Su-Yun;Lim, Sam-Sung
    • Journal of Korea Spatial Information System Society
    • /
    • v.2 no.1 s.3
    • /
    • pp.57-62
    • /
    • 2000
  • Open GIS Consortium(OGC) provides with Simple Features Specification for OLE/COM which is a system object technology of interoperability and reusable capability. In this research, the Spatial Reference System(SRS) component is developed based on the OGC specification using ATL. The component presents 44 map projections and transformations between different geographic coordinate systems utilizing the seven parameter(Bursa Wolf) and Molodenski's methods, a user can set up all objects and its attributes comprising SRS and can create SRS and save its setting using predefined text, WellKnownText. The Spatial Reference System component can be easily implemented into the variety of GIS software so that it reduces the developing time for a system and defines new reference system without difficulty.

  • PDF

Realtime Multimedia e-Learning system research by using expanded SCORM (SCORM 표준 확장을 이용한 실시간 멀티미디어 e-Learning 시스템 연구)

  • Kim, Jung-Hyun;Hwang, Doo-Hong;Lee, Joo-Hwan;Kim, Won-Il
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.1
    • /
    • pp.51-59
    • /
    • 2011
  • In this paper, we propose the standardized idea for learning environment of e-Learning 2.0 (originated from Web 2.0 paradigm) to overcome limitations of current passive e-Learning environment. Because current LMS/ LCMS which manages e-learning systems has the limitation of providing various interactive elements when people use video contents to study, it lacks real-timeness and interactivity between teacher-learner and learner-learner in the operation of video contents and has difficulty in measuring accurate progress rate of learners in the process of teaching-learning. Therefore, we designed multimedia contents(both-way learning requisite) to overcome limitations of current e-Learning system and to maximize the effect of learning of learners so that it makes possible to interact between learners and teachers in realtime. For this, this thesis designs the standardized idea based on expanded SCORM standard which is now used for manufacturing LMS/LCMS, and according to ideas we have proposed, it implements e-learning multimedia environment.

Design and Implementation of an Acoustic Modem for Small Underwater Devices Operating at Shallow Water (얕은 수심에서 동작하는 소형 수중 디바이스를 위한 음향 모뎀 설계 및 구현)

  • Jeon, Jun-Ho;Park, Sung-Joon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.11
    • /
    • pp.110-117
    • /
    • 2012
  • As the demand for underwater systems providing pollution monitoring, marine ecosystem observation, surveillance monitoring is increased, acoustic modem for short-range underwater communication is spotlighted as one of significant research topics. Typically, in shallow water, it is so hard to analyze acoustic wave which undergoes spreading, absorption, reflection and scattering through transmission that there are limited advanced results. Furthermore, in order for the modem to be loaded in a fixed node or a moving vehicle in shallow water, its size should be small enough. In this paper, we address underwater acoustic channel model and design and implement an efficient micro acoustic modem which is adequate for short-range underwater communication. The developed modem is verified in a lake by varying working range and data rate up to 500 meters and 2 kbps, respectively.

Fingerprint Image Quality Assessment for On-line Fingerprint Recognition (온라인 지문 인식 시스템을 위한 지문 품질 측정)

  • Lee, Sang-Hoon
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.47 no.2
    • /
    • pp.77-85
    • /
    • 2010
  • Fingerprint image quality checking is one of the most important issues in on-line fingerprint recognition because the recognition performance is largely affected by the quality of fingerprint images. In the past, many related fingerprint quality checking methods have typically considered the local quality of fingerprint. However, It is necessary to estimate the global quality of fingerprint to judge whether the fingerprint can be used or not in on-line recognition systems. Therefore, in this paper, we propose both local and global-based methods to calculate the fingerprint quality. Local fingerprint quality checking algorithm considers both the condition of the input fingerprints and orientation estimation errors. The 2D gradients of the fingerprint images were first separated into two sets of 1D gradients. Then,the shapes of the PDFs(Probability Density Functions) of these gradients were measured in order to determine fingerprint quality. And global fingerprint quality checking method uses neural network to estimate the global fingerprint quality based on local quality values. We also analyze the matching performance using FVC2002 database. Experimental results showed that proposed quality check method has better matching performance than NFIQ(NIST Fingerprint Image Quality) method.

Implementation of Precise Drone Positioning System using Differential Global Positioning System (차등 위성항법 보정을 이용한 정밀 드론 위치추적 시스템 구현)

  • Chung, Jae-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.1
    • /
    • pp.14-19
    • /
    • 2020
  • This paper proposes a precise drone-positioning technique using a differential global positioning system (DGPS). The proposed system consists of a reference station for error correction data production, and a mobile station (a drone), which is the target for real-time positioning. The precise coordinates of the reference station were acquired by post-processing of received satellite data together with the reference station location data provided by government infrastructure. For the system's implementation, low-cost commercial GPS receivers were used. Furthermore, a Zigbee transmitter/receiver pair was used to wirelessly send control signals and error correction data, making the whole system affordable for personal use. To validate the system, a drone-tracking experiment was conducted. The results show that the average real-time position error is less than 0.8 m.

DNP3 Protocol Security and Attack Detection Method (DNP3 프로토콜 보안 현황 및 공격 탐지 방안)

  • Kwon, Sung-Moon;Yoo, Hyung-Uk;Lee, Sang-Ha;Shon, Tae-Shik
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.4
    • /
    • pp.353-358
    • /
    • 2014
  • In the past, security on control system was guaranteed by isolation of control system networks from external networks. However as devices of the control systems became more various and interaction between the devices became necessary, effective management system for such network emerged and this triggered connection between control system networks and external system networks. This made management of control system easier but also made control system exposed to various cyber attack threats, Therefore researches on appending security measures on each protocols are in progress. This paper focused on DNP(distributed network protocol)3 protocol which is used for communication between control center and substations. It describes characteristics of DNP3 protocol and research on adding security elements to the protocol. It also analyzed known vulnerabilities of DNP3 protocol and proposed data mining methodology for detecting such vulnerabilities.