• Title/Summary/Keyword: open-source software

Search Result 624, Processing Time 0.037 seconds

A Study on the Technology Acceptance Factors of the Public Cloud Computing Services (공공 클라우드 컴퓨팅 서비스의 기술수용 결정요인 연구)

  • Kim, Dae Ho;Kim, Tae Hyung
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.2
    • /
    • pp.93-106
    • /
    • 2013
  • Cloud computing services have became an hot issues in business fields while the IT-related global company such as Amazon, MS, and Google took part in. The cloud computing makes it possible to share in the form of outsourcing of hardware and software through the Internet, to build a distributed computing environment via multiple terminals, and to reduce the cost using open source. Such a cloud computing services have not shown any significant growth in Korea yet compared to other countries. Therefore, in this study focusing on public cloud computing services, it is intended to analyze the determinants of public cloud computing services using the technology model. Thus, for users using public cloud services, we conducted a questionnaire survey from the beginning of January 2013 to the end of February 2013. And we derived a research model based on the Technology Acceptance Model(TAM). As a result of this study, it shows that personal aspects significantly impacts on the perceived usability, service aspects, systems aspects, and the intent of the technology acceptances. System aspects significantly effect on the intent of technology acceptances. Perceived usability significantly effects on the service aspects and the systems aspects. The main factors effecting on the intent of the technology acceptances are system aspects and perceived usability in order. And it shows that the personal aspects decreases the intent of the technology acceptances.

  • PDF

Design and Implementation of an Efficient Web Services Data Processing Using Hadoop-Based Big Data Processing Technique (하둡 기반 빅 데이터 기법을 이용한 웹 서비스 데이터 처리 설계 및 구현)

  • Kim, Hyun-Joo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.1
    • /
    • pp.726-734
    • /
    • 2015
  • Relational databases used by structuralizing data are the most widely used in data management at present. However, in relational databases, service becomes slower as the amount of data increases because of constraints in the reading and writing operations to save or query data. Furthermore, when a new task is added, the database grows and, consequently, requires additional infrastructure, such as parallel configuration of hardware, CPU, memory, and network, to support smooth operation. In this paper, in order to improve the web information services that are slowing down due to increase of data in the relational databases, we implemented a model to extract a large amount of data quickly and safely for users by processing Hadoop Distributed File System (HDFS) files after sending data to HDFSs and unifying and reconstructing the data. We implemented our model in a Web-based civil affairs system that stores image files, which is irregular data processing. Our proposed system's data processing was found to be 0.4 sec faster than that of a relational database system. Thus, we found that it is possible to support Web information services with a Hadoop-based big data processing technique in order to process a large amount of data, as in conventional relational databases. Furthermore, since Hadoop is open source, our model has the advantage of reducing software costs. The proposed system is expected to be used as a model for Web services that provide fast information processing for organizations that require efficient processing of big data because of the increase in the size of conventional relational databases.

Nonlinear Irregular Waves-current Interaction on Flow Fields with Wave Breaking around Permeable Submerged Breakwater (투과성잠제 주변에서 쇄파를 동반한 불규칙파-흐름장의 상호작용)

  • Lee, Kwang-Ho;Bae, Ju-Hyun;An, Sung-Wook;Kim, Do-Sam
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.30 no.2
    • /
    • pp.39-50
    • /
    • 2018
  • In this study, the nonlinear interaction of irregular waves with wave breaking and currents around permeable submerged breakwater was investigated with the aid of olaFlow model which is open source CFD software published under the GPL license. The irregular wave performance of olaFlow applied in this study was verified by comparing and evaluating the target frequency spectrum and the generated frequency spectrum for applicability to irregular waves. Based on the applicability of this numerical model to irregular wave fields, in the coexistence fields of irregular waves and currents, the characteristics of wave height, frequency spectrum, breaking waves, averaged velocity and turbulent kinetic energy around porous submerged breakwater with the respect to the beach type and current direction versus wave propagation were carefully investigated. The numerical results revealed that the shape of wave breaking on the crown of the submerged breakwater and the formation of the mean flow velocity around the structure depend greatly on the current directions and the type of the beach. In addition, it was found that the wave height fluctuation due to the current direction with respect to the wave propagation is closely related to the turbulent kinetic energy.

Artificial Intelligence to forecast new nurse turnover rates in hospital (인공지능을 이용한 신규간호사 이직률 예측)

  • Choi, Ju-Hee;Park, Hye-Kyung;Park, Ji-Eun;Lee, Chang-Min;Choi, Byung-Gwan
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.431-440
    • /
    • 2018
  • In this study, authors predicted probability of resignation of newly employed nurses using TensorFlow, an open source software library for numerical computation and machine learning developed by Google, and suggested strategic human resources management plan. Data of 1,018 nurses who resigned between 2010 and 2017 in single university hospital were collected. After the order of data were randomly shuffled, 80% of total data were used for machine leaning and the remaining data were used for testing purpose. We utilized multiple neural network with one input layer, one output layer and 3 hidden layers. The machine-learning algorithm correctly predicted for 88.7% of resignation of nursing staff with in one year of employment and 79.8% of that within 3 years of employment. Most of resigned nurses were in their late 20s and 30s. Leading causes of resignation were marriage, childbirth, childcare and personal affairs. However, the most common cause of resignation of nursing staff with in one year of employment were maladaptation to the work and problems in interpersonal relationship.

Mathematics, Art and 3D-Printing in STEAM Education (수학과 예술을 3D 프린팅으로 연결하는 융합인재교육)

  • Lee, Sang-Gu;Lee, Jae-Yoon;Park, Kyung-Eun;Lee, Jae Hwa;Ahn, Seung-Chul
    • Communications of Mathematical Education
    • /
    • v.29 no.1
    • /
    • pp.35-49
    • /
    • 2015
  • 3D-Printing is one of the most innovative technologies that will be widely used in the 21st century. 3D-Printing also serves as an indispensable tool in STEAM education. In this article, we introduce what we have done in our mathematical modeling class in Uni. and recent R&E project under the support of Korean Foundation for the Advancement of Science and Creativity. We planned a model of STEAM education originating from our wish to make tangible models that use mathematical formulas to express the natural beauty of an object. We used a free, open-source software, Sage, to simulate these models online. Then, we created a program that generates a .STL file from these 3D images. This model can help students understand the natural beauty inherent in mathematics and use formulas and technology tools to simulate models in 3D. Finally, we were able to help students to create their own. STL files through a website we developed by adding Sage code into a Sage notebook. Then students can make and hold a 3D object of their very own. This process shows the possibility that mathematics, art and 3D-Printing can be effectively used to achieve the goals of STEAM education.

Automatic Detection of Usability Issues on Mobile Applications (모바일 앱에서의 사용자 행동 모델 기반 GUI 사용성 저해요소 검출 기법)

  • Ma, Kyeong Wook;Park, Sooyong;Park, Soojin
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.7
    • /
    • pp.319-326
    • /
    • 2016
  • Given the attributes of mobile apps that shorten the time to make purchase decisions while enabling easy purchase cancellations, usability can be regarded to be a highly prioritized quality attribute among the diverse quality attributes that must be provided by mobile apps. With that backdrop, mobile app developers have been making great effort to minimize usability hampering elements that degrade the merchantability of apps in many ways. Most elements that hamper the convenience in use of mobile apps stem from those potential errors that occur when GUIs are designed. In our previous study, we have proposed a technique to analyze the usability of mobile apps using user behavior logs. We proposes a technique to detect usability hampering elements lying dormant in mobile apps' GUI models by expressing user behavior logs with finite state models, combining user behavior models extracted from multiple users, and comparing the combined user behavior model with the expected behavior model on which the designer's intention is reflected. In addition, to reduce the burden of the repeated test operations that have been conducted by existing developers to detect usability errors, the present paper also proposes a mobile usability error detection automation tool that enables automatic application of the proposed technique. The utility of the proposed technique and tool is being discussed through comparison between the GUI issue reports presented by actual open source app developers and the symptoms detected by the proposed technique.

Direct Pass-Through based GPU Virtualization for Biologic Applications (바이오 응용을 위한 직접 통로 기반의 GPU 가상화)

  • Choi, Dong Hoon;Jo, Heeseung;Lee, Myungho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.2
    • /
    • pp.113-118
    • /
    • 2013
  • The current GPU virtualization techniques incur large overheads when executing application programs mainly due to the fine-grain time-sharing scheduling of the GPU among multiple Virtual Machines (VMs). Besides, the current techniques lack of portability, because they include the APIs for the GPU computations in the VM monitor. In this paper, we propose a low overhead and high performance GPU virtualization approach on a heterogeneous HPC system based on the open-source Xen. Our proposed techniques are tailored to the bio applications. In our virtualization framework, we allow a VM to solely occupy a GPU once the VM is assigned a GPU instead of relying on the time-sharing the GPU. This improves the performance of the applications and the utilization of the GPUs. Our techniques also allow a direct pass-through to the GPU by using the IOMMU virtualization features embedded in the hardware for the high portability. Experimental studies using microbiology genome analysis applications show that our proposed techniques based on the direct pass-through significantly reduce the overheads compared with the previous Domain0 based approaches. Furthermore, our approach closely matches the performance for the applications to the bare machine or rather improves the performance.

Implementation and Validation of EtherCAT Support in Integrated Development Environment for Synchronized Motion Control Application (동기 모션 제어 응용을 위한 통합개발환경의 EtherCAT 지원 기능 구현 및 검증)

  • Lee, Jongbo;Kim, Chaerin;Kim, Ikhwan;Kim, Youngdong;Kim, Taehyoun
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.38 no.2
    • /
    • pp.211-218
    • /
    • 2014
  • Recently, software-based programmable logic controller (PLC) systems, which are implemented in standard PLC languages on general hardware, are gaining popularity because they overcome the limitations of classical hardware PLC systems. Another noticeable trend is that the use of integrated development environment (IDE) is becoming important. IDEs can help developers to easily manage the growing complexity of modern control systems. Furthermore, industrial Ethernet, e.g. EtherCAT, is becoming widely accepted as a replacement for conventional fieldbuses in the distributed control domain because it offers favorable features such as short transmission delay, high bandwidth, and low cost. In this paper, we implemented the extension of open source IDE, called Beremiz, for developing EtherCAT-based real-time, synchronized motion control applications. We validated the EtherCAT system management features and the real-time responsiveness of the control function by using commercial EtherCAT drives and evaluation boards.

Convergence CCTV camera embedded with Deep Learning SW technology (딥러닝 SW 기술을 이용한 임베디드형 융합 CCTV 카메라)

  • Son, Kyong-Sik;Kim, Jong-Won;Lim, Jae-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.1
    • /
    • pp.103-113
    • /
    • 2019
  • License plate recognition camera is dedicated device designed for acquiring images of the target vehicle for recognizing letters and numbers in a license plate. Mostly, it is used as a part of the system combined with server and image analysis module rather than as a single use. However, building a system for vehicle license plate recognition is costly because it is required to construct a facility with a server providing the management and analysis of the captured images and an image analysis module providing the extraction of numbers and characters and recognition of the vehicle's plate. In this study, we would like to develop an embedded type convergent camera (Edge Base) which can expand the function of the camera to not only the license plate recognition but also the security CCTV function together and to perform two functions within the camera. This embedded type convergence camera equipped with a high resolution 4K IP camera for clear image acquisition and fast data transmission extracted license plate area by applying YOLO, a deep learning software for multi object recognition based on open source neural network algorithm and detected number and characters of the plate and verified the detection accuracy and recognition accuracy and confirmed that this camera can perform CCTV security function and vehicle number plate recognition function successfully.

A Study on the Vulnerability Management of Internet Connection Devices based on Internet-Wide Scan (인터넷 와이드 스캔 기술 기반 인터넷 연결 디바이스의 취약점 관리 구조 연구)

  • Kim, Taeeun;Jung, Yong Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.504-509
    • /
    • 2019
  • Recently, both wireless communications technology and the performance of small devices have developed exponentially, while the number of services using various types of Internet of Things (IoT) devices has also massively increased in line with the ongoing technological and environmental changes. Furthermore, ever more devices that were previously used in the offline environment-including small-size sensors and CCTV-are being connected to the Internet due to the huge increase in IoT services. However, many IoT devices are not equipped with security functions, and use vulnerable open source software as it is. In addition, conventional network equipment, such as switches and gateways, operates with vulnerabilities, because users tend not to update the equipment on a regular basis. Recently, the simple vulnerability of IoT devices has been exploited through the distributed denial of service (DDoS) from attackers creating a large number of botnets. This paper proposes a system that is capable of identifying Internet-connected devices quickly, analyzing and managing the vulnerability of such devices using Internet-wide scan technology. In addition, the vulnerability analysis rate of the proposed technology was verified through collected banner information. In the future, the company plans to automate and upgrade the proposed system so that it can be used as a technology to prevent cyber attacks.