• Title/Summary/Keyword: computing model

Search Result 3,371, Processing Time 0.027 seconds

Labor market forecasts for Information and communication construction business (정보통신공사업 인력수급차 분석 및 전망)

  • Kwak, Jeong Ho;Kwun, Tae Hee;Oh, Dong-Suk;Kim, Jung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.99-107
    • /
    • 2015
  • In this era of smart convergent environment wherein all industries are converged on ICT infrastructure and industries and cultures come together, the information and communication construction business is becoming more important. For the information and communication construction business to continue growing, it is very important to ensure that technical manpower is stably supplied. To date, however, there has been no theoretically methodical analysis of manpower supply and demand in the information and communications construction business. The need for the analysis of manpower supply and demand has become even more important after the government announced the road map for the development of construction business in December 2014 to seek measures to strengthen the human resources capacity based on the mid- to long-term manpower supply and demand analysis. As such, this study developed the manpower supply and demand forecast model for the information and communications construction business and presented the result of manpower supply and demand analysis. The analysis suggested that an overdemand situation would arise since the number of graduates of technical colleges decreased beginning 2007 because of fewer students entering technical colleges and due to the restructuring and reform of departments. In conclusion, it cited the need for the reeducation of existing manpower, continuous upgrading of professional development in the information and communications construction business, and provision of various policy incentives.

An Automatic Mobile Cell Counting System for the Analysis of Biological Image (생물학적 영상 분석을 위한 자동 모바일 셀 계수 시스템)

  • Seo, Jaejoon;Chun, Junchul;Lee, Jin-Sung
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.39-46
    • /
    • 2015
  • This paper presents an automatic method to detect and count the cells from microorganism images based on mobile environments. Cell counting is an important process in the field of biological and pathological image analysis. In the past, cell counting is done manually, which is known as tedious and time consuming process. Moreover, the manual cell counting can lead inconsistent and imprecise results. Therefore, it is necessary to make an automatic method to detect and count cells from biological images to obtain accurate and consistent results. The proposed multi-step cell counting method automatically segments the cells from the image of cultivated microorganism and labels the cells by utilizing topological analysis of the segmented cells. To improve the accuracy of the cell counting, we adopt watershed algorithm in separating agglomerated cells from each other and morphological operation in enhancing the individual cell object from the image. The system is developed by considering the availability in mobile environments. Therefore, the cell images can be obtained by a mobile phone and the processed statistical data of microorganism can be delivered by mobile devices in ubiquitous smart space. From the experiments, by comparing the results between manual and the proposed automatic cell counting we can prove the efficiency of the developed system.

Rethinking OTT regulation based on the global OTT market trends and regulation cases (OTT 서비스의 유형과 주요국의 규제 정책에 대한 고찰)

  • Kim, Suwon;Kim, Daewon
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.143-156
    • /
    • 2019
  • Discussion on OTT regulation has become fiercer, as OTT services' impacts on the global and domestic media market have been exponentially growing. In South Korea, it is argued that, on the basis of the similarity between television program and OTT's video content, OTT needs to be regulated in order to protect fair competition and to control sociocultural effects. In many of the discussions, developed countries' cases have been used for supporting OTT regulation. In this paper, we first analyzed the global OTT market trends based on our own categorization of OTT services. then we assessed the validity of the application of the foreign cases in the current OTT regulation debates in Korea. We proposed six OTT types (aggregation, mediation, mediation-aggregation, multi-screen, outlet, and outlet-linear) simultaneously considering service operator' origin, business model, content format, and content delivery. These services have been consistently evolving, and the OTT market has been increasingly competitive especially around content differentiation. Regulators must be wary of hastily introducing competition regulation to the dynamically innovating OTT market. The foreign cases, including the US, EU, the UK, and Japan, hardly seem to be appropriate bases for strengthening OTT regulation. Rather, they were focused more on promoting competition in the domestic media market and enriching the content ecosystem. Therefore, we need to consider revision of the outdated media regulation frameworks instead of fitting OTT under them, and to recognize the priority of securing practical jurisdiction on global service providers before capturing local players into the conventional regulation systems.

An Efficient BotNet Detection Scheme Exploiting Word2Vec and Accelerated Hierarchical Density-based Clustering (Word2Vec과 가속화 계층적 밀집도 기반 클러스터링을 활용한 효율적 봇넷 탐지 기법)

  • Lee, Taeil;Kim, Kwanhyun;Lee, Jihyun;Lee, Suchul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.11-20
    • /
    • 2019
  • Numerous enterprises, organizations and individual users are exposed to large DDoS (Distributed Denial of Service) attacks. DDoS attacks are performed through a BotNet, which is composed of a number of computers infected with a malware, e.g., zombie PCs and a special computer that controls the zombie PCs within a hierarchical chain of a command system. In order to detect a malware, a malware detection software or a vaccine program must identify the malware signature through an in-depth analysis, and these signatures need to be updated in priori. This is time consuming and costly. In this paper, we propose a botnet detection scheme that does not require a periodic signature update using an artificial neural network model. The proposed scheme exploits Word2Vec and accelerated hierarchical density-based clustering. Botnet detection performance of the proposed method was evaluated using the CTU-13 dataset. The experimental result shows that the detection rate is 99.9%, which outperforms the conventional method.

A Method for Body Keypoint Localization based on Object Detection using the RGB-D information (RGB-D 정보를 이용한 객체 탐지 기반의 신체 키포인트 검출 방법)

  • Park, Seohee;Chun, Junchul
    • Journal of Internet Computing and Services
    • /
    • v.18 no.6
    • /
    • pp.85-92
    • /
    • 2017
  • Recently, in the field of video surveillance, a Deep Learning based learning method has been applied to a method of detecting a moving person in a video and analyzing the behavior of a detected person. The human activity recognition, which is one of the fields this intelligent image analysis technology, detects the object and goes through the process of detecting the body keypoint to recognize the behavior of the detected object. In this paper, we propose a method for Body Keypoint Localization based on Object Detection using RGB-D information. First, the moving object is segmented and detected from the background using color information and depth information generated by the two cameras. The input image generated by rescaling the detected object region using RGB-D information is applied to Convolutional Pose Machines for one person's pose estimation. CPM are used to generate Belief Maps for 14 body parts per person and to detect body keypoints based on Belief Maps. This method provides an accurate region for objects to detect keypoints an can be extended from single Body Keypoint Localization to multiple Body Keypoint Localization through the integration of individual Body Keypoint Localization. In the future, it is possible to generate a model for human pose estimation using the detected keypoints and contribute to the field of human activity recognition.

Implementation of Policy based In-depth Searching for Identical Entities and Cleansing System in LOD Cloud (LOD 클라우드에서의 연결정책 기반 동일개체 심층검색 및 정제 시스템 구현)

  • Kim, Kwangmin;Sohn, Yonglak
    • Journal of Internet Computing and Services
    • /
    • v.19 no.3
    • /
    • pp.67-77
    • /
    • 2018
  • This paper suggests that LOD establishes its own link policy and publishes it to LOD cloud to provide identity among entities in different LODs. For specifying the link policy, we proposed vocabulary set founded on RDF model as well. We implemented Policy based In-depth Searching and Cleansing(PISC for short) system that proceeds in-depth searching across LODs by referencing the link policies. PISC has been published on Github. LODs have participated voluntarily to LOD cloud so that degree of the entity identity needs to be evaluated. PISC, therefore, evaluates the identities and cleanses the searched entities to confine them to that exceed user's criterion of entity identity level. As for searching results, PISC provides entity's detailed contents which have been collected from diverse LODs and ontology customized to the content. Simulation of PISC has been performed on DBpedia's 5 LODs. We found that similarity of 0.9 of source and target RDF triples' objects provided appropriate expansion ratio and inclusion ratio of searching result. For sufficient identity of searched entities, 3 or more target LODs are required to be specified in link policy.

The Effect on the Characteristics of Urban Storm Runoff due to the Space Allocation of Design Rainfall and the Partition of the Subbasin (도시유역에서의 강우 공간분포 및 소유역분할이 유출특성에 미치는 영향)

  • Lee, Jong-Tae;Lee, Sang-Tae
    • Journal of Korea Water Resources Association
    • /
    • v.30 no.2
    • /
    • pp.177-191
    • /
    • 1997
  • The influences of the space allocation of design rainfall and partition of the subbasin on the characteristics of urban storm runoff was investigated for the 6 drainage basins by applying SWMM model. It show the deviation of -54.68∼18.77% in the peak discharge when we applied the composed JUFF quantiles to the two zones which are divided by upper and lower region of the basin. Then it is compared with the value for the case of using uniform rainfall distribution all over the drainage. Therefore, it would be helpful to decrease the flood risk when we adopt the space distribution of the design rainfall. The effects of the partitioning the drainage on the computing result shows various responses because of the surface characteristics of the each basin such as slope, imperviousness ratio, buy we can get closer result to the measured value as we make the subbasin detailed. If we use the concept of the skewness and area ratio when we determine the width of subbasin, we can improve the computed result even with fewer number of subbasins. We expect reasonable results which close into the measured results in the range of relative error, 25%, when we divide the basin into more than 3 subbasins and the total urban drainage area is less than 10$\textrm{km}^2$.

  • PDF

The development of parallel computation method for the fire-driven-flow in the subway station (도시철도역사에서 화재유동에 대한 병렬계산방법연구)

  • Jang, Yong-Jun;Lee, Chang-Hyun;Kim, Hag-Beom;Park, Won-Hee
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.1809-1815
    • /
    • 2008
  • This experiment simulated the fire driven flow of an underground station through parallel processing method. Fire analysis program FDS(Fire Dynamics Simulation), using LES(Large Eddy Simulation), has been used and a 6-node parallel cluster, each node with 3.0Ghz_2set installed, has been used for parallel computation. Simulation model was based on the Kwangju-geumnan subway station. Underground station, and the total time for simulation was set at 600s. First, the whole underground passage was divided to 1-Mesh and 8-Mesh in order to compare the parallel computation of a single CPU and Multi-CPU. With matrix numbers($15{\times}10^6$) more than what a single CPU can handle, fire driven flow from the center of the platform and the subway itself was analyzed. As a result, there seemed to be almost no difference between the single CPU's result and the Multi-CPU's ones. $3{\times}10^6$ grid point one employed to test the computing time with 2CPU and 7CPU computation were computable two times and fire times faster than 1CPU respectively. In this study it was confirmed that CPU could be overcome by using parallel computation.

  • PDF

Design and Implementation of Initial OpenSHMEM Based on PCI Express (PCI Express 기반 OpenSHMEM 초기 설계 및 구현)

  • Joo, Young-Woong;Choi, Min
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.105-112
    • /
    • 2017
  • PCI Express is a bus technology that connects the processor and the peripheral I/O devices that widely used as an industry standard because it has the characteristics of high-speed, low power. In addition, PCI Express is system interconnect technology such as Ethernet and Infiniband used in high-performance computing and computer cluster. PGAS(partitioned global address space) programming model is often used to implement the one-sided RDMA(remote direct memory access) from multi-host systems, such as computer clusters. In this paper, we design and implement a OpenSHMEM API based on PCI Express maintaining the existing features of OpenSHMEM to implement RDMA based on PCI Express. We perform experiment with implemented OpenSHMEM API through a matrix multiplication example from system which PCs connected with NTB(non-transparent bridge) technology of PCI Express. The PCI Express interconnection network is currently very expensive and is not yet widely available to the general public. Nevertheless, we actually implemented and evaluated a PCI Express based interconnection network on the RDK evaluation board. In addition, we have implemented the OpenSHMEM software stack, which is of great interest recently.

Performance Optimization Strategies for Fully Utilizing Apache Spark (아파치 스파크 활용 극대화를 위한 성능 최적화 기법)

  • Myung, Rohyoung;Yu, Heonchang;Choi, Sukyong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.1
    • /
    • pp.9-18
    • /
    • 2018
  • Enhancing performance of big data analytics in distributed environment has been issued because most of the big data related applications such as machine learning techniques and streaming services generally utilize distributed computing frameworks. Thus, optimizing performance of those applications at Spark has been actively researched. Since optimizing performance of the applications at distributed environment is challenging because it not only needs optimizing the applications themselves but also requires tuning of the distributed system configuration parameters. Although prior researches made a huge effort to improve execution performance, most of them only focused on one of three performance optimization aspect: application design, system tuning, hardware utilization. Thus, they couldn't handle an orchestration of those aspects. In this paper, we deeply analyze and model the application processing procedure of the Spark. Through the analyzed results, we propose performance optimization schemes for each step of the procedure: inner stage and outer stage. We also propose appropriate partitioning mechanism by analyzing relationship between partitioning parallelism and performance of the applications. We applied those three performance optimization schemes to WordCount, Pagerank, and Kmeans which are basic big data analytics and found nearly 50% performance improvement when all of those schemes are applied.