• Title/Summary/Keyword: cloud computing system

Search Result 741, Processing Time 0.027 seconds

A Study on the Platform for Big Data Analysis of Manufacturing Process (제조 공정 빅데이터 분석을 위한 플랫폼 연구)

  • Ku, Jin-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.5
    • /
    • pp.177-182
    • /
    • 2017
  • As major ICT technologies such as IoT, cloud computing, and Big Data are being applied to manufacturing, smart factories are beginning to be built. The key of smart factory implementation is the ability to acquire and analyze data of the factory. Therefore, the need for a big data analysis platform is increasing. The purpose of this study is to construct a platform for big data analysis of manufacturing process and propose integrated method for analysis. The proposed platform is a RHadoop-based structure that integrates analysis tool R and Hadoop to distribute a large amount of datasets. It can store and analyze big data collected in the unit process and factory in the automation system directly in HBase, and it has overcome the limitations of RDB - based analysis. Such a platform should be developed in consideration of the unit process suitability for smart factories, and it is expected to be a guide to building IoT platforms for SMEs that intend to introduce smart factories into the manufacturing process.

방송통신사업자의 스마트미디어 전략에 대한 탐색적 연구: HTML5, 클라우드 컴퓨팅 등의 기술적 배경을 근간으로

  • Song, Min-Jeong
    • Broadcasting and Media Magazine
    • /
    • v.18 no.1
    • /
    • pp.89-104
    • /
    • 2013
  • 다양한 스마트기기 간 및 앱(Application) 간 연동을 통한 스마트미디어 생태계 환경에서 애플(Apple), 구글(Google), 마이크로소프트(Microsoft) 등 SW(Software) 기반 OS(Operating System) 플랫폼들은 개별 체제 강화를 더욱 견고히 하고 있다. 생태계 내 타(他) 구성원들은 이들에 의한 제약이 더욱 심해지자, 웹 문서의 표준화(HTML5)나 클라우드 컴퓨팅(Cloud computing) 같은 개방화된 기술들을 환영한다. 실제로 최근 웹 애플리케이션(Web application) 개발과 개발자들의 OS 플랫폼 이탈은 이러한 변화의 단면을 보여주기 시작했다. 본 고는 SW 중심에서 서비스 중심으로 이동 중인 플랫폼 경쟁 환경에서 네트워크를 보유 중인 방송통신사업자들의 새로운 스마트미디어 전략 방향을 제시하는데 그 목적을 둔다. 이를 위해 두 가지 기술적 배경인 HTML5와 클라우드 컴퓨팅 기술들을 살펴본 후, 그 동안 SW 중심 플랫폼 경쟁 환경에서 주도권을 빼앗겼다고 깨달은 방송통신사업자가 취해야 할, 두 가지 새로운 기술적 환경에서의 스마트미디어 전략을 제시하였다. 분석 결과, HTML5가 모바일 분야의 핵심 기술이 될 전망이지만, 단기적으로는 여전히 미성숙 문제가 제기될 것으로 보이며, 기존 경쟁력을 유지하려는 OS 사업자들의 가치사슬 통합 전략이 가시화되고 있는 환경이 목격된다. 또한, 클라우드 서비스 제공도 이미 이들 OS사업자들의 기존 생태계 유지를 위한 핵심 툴로 이미 활용되기 시작했다. 그럼에도 불구하고 HTML5와 클라우드 컴퓨팅은 방송통신사업자들에게 생태계 주도권을 탈환할 수 있는 중요한 기술로 인식되고 있다. 따라서 본 연구에서는 이를 기반으로 세 가지 이용자 경험인 '경계 없는', '동질적인', '끊김 없는' 이용자 경험(User Experience) 제공을 위해 노력하는 선도적인 사례 탐색이 시도되었으며, 이를 통해 방송통신사업자들의 미래 스마트미디어 전략 방향이 도출되었다. '경계 없는' 서비스에서는 구글, 애플 외의 멀티OS 전략과 기존 OS의 앱 서비스 대항마인 아마존(Amazon), 페이스북(Facebook) 등과의 적극적 서비스 제휴, '동질적인' 서비스에서는 클라우드 기반 주요 콘텐츠 플랫폼 제휴와 방송통신 가입자 기반의 All-IP기반으로의 확대, 마지막으로 '끊김 없는' 서비스에서는 SNS, LBS, 가상현실 등과의 매쉬업(Mash-up)과 의료, 금융 등과의 융합서비스 개발을 통한 스마트홈 전략 추진, 인증 및 결제시스템의 개방화 등이 제시되었다.

A Study of Redesigning Electronic Records Management Policies (전자기록관리정책의 재설계에 관한 연구)

  • Lee, Seung-eok;Seol, Moon-won
    • The Korean Journal of Archival Studies
    • /
    • no.52
    • /
    • pp.5-37
    • /
    • 2017
  • In consideration of the drastic transformation of records management environments, this study aims to suggest the directions for redesigning the electronic records management policies at a national level. First, it clarifies the four implicit objectives of electronic records management policies since the 2006 amendment of the Public Records Management Act, such as comprehensiveness for ensuring the appropriate management of any type of digital records, digital-friendly processes for records management, proper management for guaranteeing the evidential value of digital records, and long-term preservation of digital records. Second, it examines the challenging environmental factors in the areas since 2006. Third, it reviews the achievement of the policies as well as failures based on analyzing the policy documents and data from the National Archives of Korea. Fourth and finally, it suggests core areas and directions for redesigning the electronic records management policies, emphasizing the inclusiveness for data-type electronic records.

Smart Livestock Research and Technology Trend Analysis based on Intelligent Information Technology to improve Livestock Productivity and Livestock Environment (축산물 생산성 향상 및 축산 환경 개선을 위한 지능정보기술 기반 스마트 축사 연구 및 기술 동향 분석)

  • Kim, Cheol-Rim;Kim, Seungchoen
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.4
    • /
    • pp.133-139
    • /
    • 2022
  • Recently, livestock farms in Korea are introducing data-based technologies to improve productivity, such as livestock environment and breeding management, safe livestock production, and animal welfare. In addition, the government has been conducting a smart livestock distribution project since 2017 through the modernization of ICT-based livestock facilities in order to improve the productivity of livestock products and improve the livestock environment as a policy. However, the current smart livestock house has limitations in connection, diversity, and integration between monitoring and control. Therefore, in order to intelligently systemize all processes of livestock with intelligent algorithms and remote control in order to link and integrate various monitoring and control, the Internet of Things, big data, artificial intelligence, cloud computing, and mobile It is necessary to develop a smart livestock system. In this study, domestic and foreign research trends related to smart livestock based on intelligent information technology were introduced and the limitations of domestic application of advanced technologies were analyzed. Finally, future intelligent information technology applicable to the livestock field was examined.

An Enhancement of The Enterprise Security for Access Control based on Zero Trust (제로 트러스트 기반 접근제어를 위한 기업 보안 강화 연구)

  • Lee, Seon-A;Kim, Beomseok;Lee, Hyein;Park, Wonhyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.265-270
    • /
    • 2022
  • With the advent of the Fourth Industrial Revolution, the paradigm of finance is also changing. As remote work becomes more active due to cloud computing and coronavirus, the work environment changes and attack techniques are becoming intelligent and advanced, companies should accept new security models to further strengthen their current security systems. Zero trust security increases security by monitoring all networks and allowing strict authentication and minimal access rights for access requesters with the core concept of doubting and not trusting everything. In addition, the use of NAC and EDR for identification subjects and data to strengthen access control of the zero trust-based security system, and strict identity authentication through MFA will be explained. Therefore, this paper introduces a zero-trust security solution that strengthens existing security systems and presents the direction and validity to be introduced in the financial sector.

Performance Evaluation Using Neural Network Learning of Indoor Autonomous Vehicle Based on LiDAR (라이다 기반 실내 자율주행 차량에서 신경망 학습을 사용한 성능평가 )

  • Yonghun Kwon;Inbum Jung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.93-102
    • /
    • 2023
  • Data processing through the cloud causes many problems, such as latency and increased communication costs in the communication process. Therefore, many researchers study edge computing in the IoT, and autonomous driving is a representative application. In indoor self-driving, unlike outdoor, GPS and traffic information cannot be used, so the surrounding environment must be recognized using sensors. An efficient autonomous driving system is required because it is a mobile environment with resource constraints. This paper proposes a machine-learning method using neural networks for autonomous driving in an indoor environment. The neural network model predicts the most appropriate driving command for the current location based on the distance data measured by the LiDAR sensor. We designed six learning models to evaluate according to the number of input data of the proposed neural networks. In addition, we made an autonomous vehicle based on Raspberry Pi for driving and learning and an indoor driving track produced for collecting data and evaluation. Finally, we compared six neural network models in terms of accuracy, response time, and battery consumption, and the effect of the number of input data on performance was confirmed.

IaC-VIMF: IaC-Based Virtual Infrastructure Mutagenesis Framework for Cyber Defense Training (IaC-VIMF: 사이버 공방훈련을 위한 IaC 기반 가상 인프라 변이 생성 프레임워크)

  • Joo-Young Roh;Se-Han Lee;Ki-Woong Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.527-535
    • /
    • 2023
  • To develop experts capable of responding to cyber security incidents, numerous institutions have established cyber training facilities to cultivate security professionals equipped with effective defense strategies. However, these challenges such as limited resources, scenario-based content development, and cost constraints. To address these issues, this paper proposes a virtual infrastructure variation generation framework. It provides customized, diverse IT infrastructure environments for each organization, allowing cyber defense trainers to accumulate a wide range of experiences. By leveraging Infrastructure-as-Code (IaC) containers and employing Word2Vec, a natural language processing model, mutable code elements are extracted and trained, enabling the generation of new code and presenting novel container environments.

Analysis of the Impact of Host Resource Exhaustion Attacks in a Container Environment (컨테이너 환경에서의 호스트 자원 고갈 공격 영향 분석)

  • Jun-hee Lee;Jae-hyun Nam;Jin-woo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.87-97
    • /
    • 2023
  • Containers are an emerging virtualization technology that can build an isolated environment more lightweight and faster than existing virtual machines. For that reason, many organizations have recently adopted them for their services. Yet, the container architecture has also exposed many security problems since all containers share the same OS kernel. In this work, we focus on the fact that an attacker can abuse host resources to make them unavailable to benign containers-also known as host resource exhaustion attacks. Then, we analyze the impact of host resource exhaustion attacks through real attack scenarios exhausting critical host resources, such as CPU, memory, disk space, process ID, and sockets in Docker, the most popular container platform. We propose five attack scenarios performed in several different host environments and container images. The result shows that three of them put other containers in denial of service.

A Study on Vulnerability for Isolation Guarantee in Container-based Virtualization (컨테이너 기반 가상화에서 격리성 보장을 위한 취약성 고찰)

  • Dayun Yum;Dongcheon Shin
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.23-32
    • /
    • 2023
  • Container-based virtualization has attracted many attentions as an alternative to virtual machine technology because it can be used more lightly by sharing the host operating system instead of individual guest operating systems. However, this advantage may owe some vulnerabilities. In particular, excessive resource use of some containers can affect other containers, which is known as the noisy neighbor problem, so that the important property of isolation may not be guaranteed. The noisy neighbor problem can threat the availability of containers, so we need to consider the noisy neighbor problem as a security problem. In this paper, we investigate vulnerabilities on guarantee of isolation incurred by the noisy neighbor problem in container-based virtualization. For this we first analyze the structure of container-based virtualization environments. Then we present vulnerabilities in 3 functional layers and general directions for solutions with limitations.

An Investigation on the Periodical Transition of News related to North Korea using Text Mining (텍스트마이닝을 활용한 북한 관련 뉴스의 기간별 변화과정 고찰)

  • Park, Chul-Soo
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.3
    • /
    • pp.63-88
    • /
    • 2019
  • The goal of this paper is to investigate changes in North Korea's domestic and foreign policies through automated text analysis over North Korea represented in South Korean mass media. Based on that data, we then analyze the status of text mining research, using a text mining technique to find the topics, methods, and trends of text mining research. We also investigate the characteristics and method of analysis of the text mining techniques, confirmed by analysis of the data. In this study, R program was used to apply the text mining technique. R program is free software for statistical computing and graphics. Also, Text mining methods allow to highlight the most frequently used keywords in a paragraph of texts. One can create a word cloud, also referred as text cloud or tag cloud. This study proposes a procedure to find meaningful tendencies based on a combination of word cloud, and co-occurrence networks. This study aims to more objectively explore the images of North Korea represented in South Korean newspapers by quantitatively reviewing the patterns of language use related to North Korea from 2016. 11. 1 to 2019. 5. 23 newspaper big data. In this study, we divided into three periods considering recent inter - Korean relations. Before January 1, 2018, it was set as a Before Phase of Peace Building. From January 1, 2018 to February 24, 2019, we have set up a Peace Building Phase. The New Year's message of Kim Jong-un and the Olympics of Pyeong Chang formed an atmosphere of peace on the Korean peninsula. After the Hanoi Pease summit, the third period was the silence of the relationship between North Korea and the United States. Therefore, it was called Depression Phase of Peace Building. This study analyzes news articles related to North Korea of the Korea Press Foundation database(www.bigkinds.or.kr) through text mining, to investigate characteristics of the Kim Jong-un regime's South Korea policy and unification discourse. The main results of this study show that trends in the North Korean national policy agenda can be discovered based on clustering and visualization algorithms. In particular, it examines the changes in the international circumstances, domestic conflicts, the living conditions of North Korea, the South's Aid project for the North, the conflicts of the two Koreas, North Korean nuclear issue, and the North Korean refugee problem through the co-occurrence word analysis. It also offers an analysis of South Korean mentality toward North Korea in terms of the semantic prosody. In the Before Phase of Peace Building, the results of the analysis showed the order of 'Missiles', 'North Korea Nuclear', 'Diplomacy', 'Unification', and ' South-North Korean'. The results of Peace Building Phase are extracted the order of 'Panmunjom', 'Unification', 'North Korea Nuclear', 'Diplomacy', and 'Military'. The results of Depression Phase of Peace Building derived the order of 'North Korea Nuclear', 'North and South Korea', 'Missile', 'State Department', and 'International'. There are 16 words adopted in all three periods. The order is as follows: 'missile', 'North Korea Nuclear', 'Diplomacy', 'Unification', 'North and South Korea', 'Military', 'Kaesong Industrial Complex', 'Defense', 'Sanctions', 'Denuclearization', 'Peace', 'Exchange and Cooperation', and 'South Korea'. We expect that the results of this study will contribute to analyze the trends of news content of North Korea associated with North Korea's provocations. And future research on North Korean trends will be conducted based on the results of this study. We will continue to study the model development for North Korea risk measurement that can anticipate and respond to North Korea's behavior in advance. We expect that the text mining analysis method and the scientific data analysis technique will be applied to North Korea and unification research field. Through these academic studies, I hope to see a lot of studies that make important contributions to the nation.