• Title/Summary/Keyword: Software service

Search Result 2,465, Processing Time 0.029 seconds

The Intelligent Blockchain for the Protection of Smart Automobile Hacking

  • Kim, Seong-Kyu;Jang, Eun-Sill
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

Distribution of Advertisement on Instagram in Relation to Satisfaction and Loyalty of Low-Cost Airline Passengers in Indonesia

  • Fatimah Febriyanti, BASTARI;M., ARAS;Cici Fakhrunnisa, SOFYAN;Taniya Indriana, RUSTAM
    • Journal of Distribution Science
    • /
    • v.21 no.3
    • /
    • pp.13-23
    • /
    • 2023
  • Purpose: Low-Cost Carrier airlines attempt to provide the best service for their customers. However, the pandemic has forced airline companies to keep developing new strategies. Moreover, in this digital era, airlines must intensely market their service through social media to reach as many customers as possible. This research aims to study the impact of advertisements on Instagram and the customer experience concerning customer loyalty and satisfaction in the aviation industry. Research design, data, and methodology: This study uses a quantitative explanatory with the combination of the positivism paradigm. The data collection technique is by distributing questionnaires to related airline Instagram followers. Meanwhile, the sample calculation uses using the Slovin formula in which 414 respondents are gained. The collected data is analyzed with Structural Equation Model and using Smart-PLS software. Results: The study results indicate that advertising on Instagram and customer experience significantly positively affect customer satisfaction and loyalty. In addition, the variable customer satisfaction has a significant positive on customer loyalty. Conclusions: The study results indicate that the ease of obtaining information via Instagram can affect satisfaction and will increase when customers have made a flight so that they will become loyal customers.

A Study on the Authentication of Digital Content in Cloud Computing Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.99-106
    • /
    • 2022
  • In this paper, we proposes digital content management technology in a cloud computing environment. proposes digital content management technology in a cloud computing environment. Computing services using networks are basic infrastructure services that cannot be missed in the era of the 4th Industrial Revolution. Financial services, digital content services, and industrial and home network services using smartphones are changing from services in the local area to a cloud service environment where the entire service is possible. Therefore, this study proposed a system to safely support digital content services suitable for cloud computing environments. The proposed system provides convenience and safety for users to access the system, protects the copyright of digital content authors, and provides a secure digital content distribution and management system. The purpose of this study is to stabilize and revitalize the digital content market by providing a digital content distribution structure suitable for the cloud computing environment.

Implementation of Sensors Information Alarm Service using an FCM based on Raspberry Pi (FCM을 이용한 라즈베리파이 기반의 센서정보 알림 구현)

  • Oh, Sejin
    • Journal of Industrial Convergence
    • /
    • v.20 no.8
    • /
    • pp.61-67
    • /
    • 2022
  • The Internet of Things(IoT) is one of the key technologies in the Fourth Industrial Revolution. The IoT is a system that acquires information from various sensors and provides meaningful information to users. The method of obtaining information from sensor is using WIFI, Bluetooth and Server. is not accessible to external users because of different type of networks or local area communication. For this reason, there is a problem that external user cannot receive notification in regard to sensor information. In this paper, we want to establish a cloud message environment using Google's FCM(Firebase Cloud Messaging) and find out through experiments how users can receive notifications even if they are outside.

A Study on the Development of Health Care Service Platform for Chronic Patients Based on AI Chatbot Using Personal Life Log (개인 라이프로그를 활용한 AI 챗봇 기반 만성질환자 건강관리서비스 플랫폼 개발에 대한 연구)

  • So-Jeong Byun;Mun-Sung Kim;Hyong-Shik Kim;Seung-Hwan Byun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.309-311
    • /
    • 2023
  • 본 논문에서는 만성질환자 건강관리서비스 플랫폼 개발을 위항여 건강측정기 모바일 연계기술 개발 및 적용하고 IoT 기반 생체정보 획득 및 라이프로그 건강관리 플랫폼 API 연계 기술을 통하여 지역 만성질환자를 위한 언택트 헬스 모니터링 플랫폼 개발을 수행하였다. 해당 시스템을 통하여 지역 보건소 협력 및 가족 중심 만성질환자 입체적 건강관리 모니터링 시스템 개발에 적용하고 IoT 장비 인터페이스기술, 개인 건강관리기술, 플랫폼 운영 및 구현기술, 데이터 관리기술 개발을 통하여 효율적으로 개인 라이프로그를 활용할 수 있도록 하였으며, 효율적인 관리를 위하여 AI 챗봇 서비스 시스템을 통한 효율성을 극대화를 추진하였다. 본 논문에서는 개인 라이프로그를 활용한 AI 챗봇 기반 만성질환자 건강관리서비스 플랫폼을 구현하여 만성질환자에 대한 서비스를 제공하고 만족도를 실증하여 서비스의 우수함을 입증하였다.

  • PDF

A Case Study of Rapid AI Service Deployment - Iris Classification System

  • Yonghee LEE
    • Korean Journal of Artificial Intelligence
    • /
    • v.11 no.4
    • /
    • pp.29-34
    • /
    • 2023
  • The flow from developing a machine learning model to deploying it in a production environment suffers challenges. Efficient and reliable deployment is critical for realizing the true value of machine learning models. Bridging this gap between development and publication has become a pivotal concern in the machine learning community. FastAPI, a modern and fast web framework for building APIs with Python, has gained substantial popularity for its speed, ease of use, and asynchronous capabilities. This paper focused on leveraging FastAPI for deploying machine learning models, addressing the potentials associated with integration, scalability, and performance in a production setting. In this work, we explored the seamless integration of machine learning models into FastAPI applications, enabling real-time predictions and showing a possibility of scaling up for a more diverse range of use cases. We discussed the intricacies of integrating popular machine learning frameworks with FastAPI, ensuring smooth interactions between data processing, model inference, and API responses. This study focused on elucidating the integration of machine learning models into production environments using FastAPI, exploring its capabilities, features, and best practices. We delved into the potential of FastAPI in providing a robust and efficient solution for deploying machine learning systems, handling real-time predictions, managing input/output data, and ensuring optimal performance and reliability.

Digital Transformation Strategy Design for National Public Service

  • Sangwon LEE;Joohyung KIM
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.4
    • /
    • pp.435-441
    • /
    • 2023
  • From the mid-to-late 2010s, technology was frequently mentioned in the definition of digital transformation. In the early stages, the private sector started actively using it, and the public sector started to take it seriously. Divided into "providing value and cultural change, the main goals of digital transformation were accomplished, and the ideas of creating new values in social and industrial systems and applying digital technology appeared to be related. Digital transformation, defined as the idea of combining digital solutions to boost competitiveness and add value, necessitates social innovation and cultural shifts at the national level. In order to encourage the digital transformation of the industry, the Industrial Digital Transformation Promotion Act was passed in December 2021. This set the groundwork for a comprehensive and organized approach to facilitating the use of industrial information. We will examine the nature and extent of digital transformation in this study, as well as discover the organizations and regulations that support it. We also want to examine the essential standards and technologies needed to put the digital transformation plan into practice. Lastly, We'll make some conclusions about how this will affect public services' digital transformation.

A Performance Comparison between XEN and KVM Hypervisors While Using Cryptographic Algorithms

  • Mohammed Al-Shalabi;Waleed K. Abdulraheem;Jafar Ababneh;Nader Abdel Karim
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.61-70
    • /
    • 2024
  • Cloud Computing is internet-based computing, where the users are provided with whatever service they need from the resources, software, and information. Recently, the security of cloud computing is considered as one of the major issues for both cloud service providers CSP and end-users. Privacy and highly confidential data make many users refuse to store their data within cloud computing, since data on cloud computing is not dully secured. The cryptographic algorithm is a technique which is used to maintain the security and privacy of the data on the cloud. In this research, we applied eight different cryptographic algorithms on Xen and KVM as hypervisors on cloud computing, to be able to measure and compare the performance of the two hypervisors. Response time and CPU utilization while encryption and decryption have been our aspects to measure the performance. In terms of response time and CPU utilization, results show that KVM is more efficient than Xen on average at 11.5% and 11% respectively. While TripleDES cryptographic algorithm shows a more efficient time response at Xen hypervisor than KVM.

An Ontology-based Data Variability Processing Method (온톨로지 기반 데이터 가변성 처리 기법)

  • Lim, Yoon-Sun;Kim, Myung
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.4
    • /
    • pp.239-251
    • /
    • 2010
  • In modern distributed enterprise applications that have multilayered architecture, business entities are a kind of crosscutting concerns running through service components that implements business logic in each layer. When business entities are modified, service components related to them should also be modified so that they can deal with those business entities with new types, even though their functionality remains the same. Our previous paper proposed what we call the DTT (Data Type-Tolerant) component model to efficiently process the variability of business entities, which are data externalized from service components. While the DTT component model, by removing direct coupling between service components and business entities, exempts the need to rewrite service components when business entities are modified, it incurs the burden of implementing data type converters that mediate between them. To solve this problem, this paper proposes a method to use ontology as the metadata of both SCDTs (Self-Contained Data Types) in service components and business entities, and a method to generate data type converter code using the ontology. This ontology-based DTT component model greatly enhances the reusability of service components and the efficiency in processing data variability by allowing the computer to automatically generate data type converters without error.

User Behavior Classification for Contents Configuration of Life-logging Application (라이프로깅 애플리케이션 콘텐츠 구성을 위한 사용자 행태 분류)

  • Kwon, Jieun;Kwak, Sojung;Lim, Yoon Ah;Whang, Min Cheol
    • Science of Emotion and Sensibility
    • /
    • v.19 no.4
    • /
    • pp.13-20
    • /
    • 2016
  • Recently, life-logging service which has expanded to measure and record the daily life of the users and to share with others are increasing. In particular, as life-logging services based on the application has become popular with the development of wearable-devices and smart-phones, the contents of this service are produced by user behavior and are provided in infographic menu form. The purpose of this paper is to extract user behavior and classify for making contents items of life-logging service. For this paper, the first of all, we discuss the definition and characteristics of life-logging and research the contents based on user behavior related to life-logging by the publications including thesis, articles, and books. Secondly, we extract and classify the user behavior to build the contents for life-logging service. We gather users' action words from publication materials, researches, and contents of existing life-logging service. And then collected words are analyzed by FGI (Focus Group Interview) and survey. As the result, 39 words which suit for contents of life-logging service are extracted by verify suitability. Finally, the extracted 39 words are classified for 19 categories -'Eat', 'Keep house', 'Diet', 'Travel', 'Work out', 'Transit', 'Shoot', 'Meet', 'Feel', 'Talk', 'Care for', 'Drive', 'Listen', 'Go online', 'Sleep', 'Go', 'Work', 'Learn', 'Watch' - which are suggested by the surveys, statistical analysis, and FGI. We will discuss the role and limitations of this results to build contents configuration based on life-logging application in this study.