• Title/Summary/Keyword: 가상화 솔루션

Search Result 67, Processing Time 0.025 seconds

Digitization of Supply Chain Management : Key Elements and Strategic Impacts (공급망관리의 디지털화 : 구성요소와 전략적 파급효과)

  • Park, Seong Taek;Kim, Tae Ung;Kim, Mi Ryang
    • Journal of Digital Convergence
    • /
    • v.18 no.6
    • /
    • pp.109-120
    • /
    • 2020
  • The supply chain without digitization is just a series of discrete, siloed steps taken through marketing, product development, manufacturing, and logistics, and finally into the hands of the customer. Digitization brings down those walls, and the chain becomes a completely integrated network fully transparent to all the parties involved. The ulitimate goals of digitizatized supply chain management are velocity and visibility. This network will depend on a number of key technologies including integrated planning and execution systems, supply chain analytics, autonomous logistics, smart warehousing and factory, etc, enabling companies to react to disruptions in the supply chain, and even anticipate them, by fully modeling the network, creating "what-if" scenarios, and adjusting the supply chain in real time as conditions change. This paper presents a number of studies on digitalization of supply chains and provides a discussion on issues raised in the process of technology adoption. Implications of the study findings are also provided.

Economic Value Estimation of Intelligent Crime-Zero Testbed (지능형 방범 실증지구 경제적 가치평가)

  • Choi, Woo-Chul;Na, Joon-Yeop
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.11
    • /
    • pp.436-445
    • /
    • 2019
  • This study quantitatively evaluates the economic value of an intelligent crime-zero testbed by using the contingent valuation method (CVM), which is the most effective for non-market valuations in fields like crime prevention. To minimize hypothetical convenience and increase respondents' awareness regarding the actual situation, an analysis was conducted for Indukwon District, Anyang City, Gyeonggi-do, by using the intelligent crime prevention technologies and solutions being developed by the KICT Research Center. This analysis was aimed at providing a systematic basis for determining the feasibility of crime prevention-related public projects. As a result, the WTP of Anyang citizens in the intelligent crime prevention demonstration district was estimated to be 7,160 won. The analysis shows that the area of Gwanyang 2, where the test bed belongs, has a high economic value of KRW 660 million per year, and KRW 51.4 billion per year when expanded to Anyang City. This study is significant in that it provides the first domestic evaluation of the crime-zero testbed. In addition, it has academic and practical value for a future-oriented service model by using intelligent crime prevention technologies and solutions that can be applied in real life and to the crime-zero testbed.

Implementation of Random Controlling of Convergence Point in VR Image Content Production (VR 영상콘텐츠 제작을 위한 컨버전스 포인트 임의조절 구현)

  • Jin, Hyung Woo;Baek, Gwang Ho;Kim, Mijin
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.111-119
    • /
    • 2015
  • As a variety of HMD(Head Mounted Display) has come out, the production of 3D images onto which VR(Virtual Reality) technologies are grafted has been contributed to activating the production of image contents depending on a tangible or immersing type. VR-based image contents have enlarged their applicability across the entertainment industry from animation and game to realistic images. At the same time, the solution development for producing VR image contents has also gained elasticity. However, among those production solutions which have been used until now, fixed stereo camera based photographing has a limit that the binocular disparity of a user is fixed. This does not only restrict a way of expression a producer intends to direct, but also may cause the effect of 3D or space not to be sensed enough as view condition is not considered enough in a user's side. This study is aimed at resolving with skills applying in the latter part of 3D image production the problem that convergence points may be adjusted with restriction, which tends to happen at the time of the production of VR image contents. The later stage of the 3D imaging work analyzes and applies to game engines the significance of adjusting convergence points through the visualization of binocular disparity so that it is available to implement a function that the points could be controlled at random by a user.

A Development of Soluna based on IoT for Growthing of Crop (IoT 기반 농작물 성장을 위한 Soluna 개발)

  • Noh, Joon;Sung, Joon-Young;Kim, Joon-Ho;Jeong, Yeong-Min;Choi, Gi-Jeoung;Choi, Hye-Sung;Lee, Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.1187-1190
    • /
    • 2014
  • 현재 지구온난화로 인해 기후가 급변하고 있다. 이러한 자연적 현상 때문에, 만약 기존의 농업환경에서 농부의 체험적이거나 농사에 적합하지 않은 기상정보에 의존하여 농사를 경영한다면 농산물에 대한 일정수준의 생산량을 얻기 힘들 것이며 변동적인 수익을 얻게 될 것이다. 이를 방지하기 위해 본 연구에서는 시뮬레이션이 가능한 솔루션을 제공하여 병해충 피해를 줄이고자 한다. 또한, 농작물을 3D 와 VSTO(Visual Studio Tools for Office)로 시각화하고, 해당 기상정보 데이터를 사용자가 임의로 사용할 수 있게 제공하고자 한다. 특히, 본 논문에서는 기상청에서 획득한 실험적 데이터로 고추 작물을 활용하여 시스템을 구현하고자 한다. 이를 통해, 농민들이 가상 속에서 작물을 심어 볼 수 있는 환경을 이루고자 한다.

A Study on Optimizing Disk Utilization of Software-Defined Storage (소프트웨어 정의 스토리지의 디스크 이용을 최적화하는 방법에 관한 연구)

  • Lee Jung Il;Choi YoonA;Park Ju Eun;Jang, Minyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.4
    • /
    • pp.135-142
    • /
    • 2023
  • Recently, many companies are using public cloud services or building their own data center because digital transformation is expanding. The software-defined storage is a key solution for storing data on the cloud platform and its use is expanding worldwide. Software-defined storage has the advantage of being able to virtualize and use all storage resources as a single storage device and supporting flexible scale-out. On the other hand, since the size of an object is variable, an imbalance occurs in the use of the disk and may cause a failure. In this study, a method of redistributing objects by optimizing disk weights based on storage state information was proposed to solve the imbalance problem of disk use, and the experimental results were presented. As a result of the experiment, it was confirmed that the maximum utilization rate of the disk decreased by 10% from 89% to 79%. Failures can be prevented, and more data can be stored by optimizing the use of disk.

Musculoskeletal Rehabilitation Exercise Platform for Elderly based on MR (혼합현실 기반의 노인을 위한 근골격계 재활 운동 플랫폼)

  • Sung-Jun Park
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.5
    • /
    • pp.63-70
    • /
    • 2023
  • In this paper, we propose a Mixed Reality based rehabilitation exercise solution with the goal of mitigating one of the most common chronic conditions among the elderly, musculoskeletal disorders. In modern society, as the number of elderly increases, more people engage in office work and engage in more sedentary activities. Due to repetitive work in the office, muscle strength decreases and this causes many difficulties in daily life. In this study, we developed a mixed reality based exercise platform to solve these chronic musculoskeletal diseases. VR is not appropriate for elderly because of dizziness. In addition, we developed a wearable sensor based on IMU and attached it to important parts of the upper body to motion tracking. We developed a algorithm synchronize to raw data from wearable sensor with in a vr avatar. Ederly can check in real time whether rehabilitation exercises are being performed accurately through the avatar.

IoT Edge Architecture Model to Prevent Blockchain-Based Security Threats (블록체인 기반의 보안 위협을 예방할 수 있는 IoT 엣지 아키텍처 모델)

  • Yoon-Su Jeong
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.77-84
    • /
    • 2024
  • Over the past few years, IoT edges have begun to emerge based on new low-latency communication protocols such as 5G. However, IoT edges, despite their enormous advantages, pose new complementary threats, requiring new security solutions to address them. In this paper, we propose a cloud environment-based IoT edge architecture model that complements IoT systems. The proposed model acts on machine learning to prevent security threats in advance with network traffic data extracted from IoT edge devices. In addition, the proposed model ensures load and security in the access network (edge) by allocating some of the security data at the local node. The proposed model further reduces the load on the access network (edge) and secures the vulnerable part by allocating some functions of data processing and management to the local node among IoT edge environments. The proposed model virtualizes various IoT functions as a name service, and deploys hardware functions and sufficient computational resources to local nodes as needed.

Study of Snort Intrusion Detection Rules for Recognition of Intelligent Threats and Response of Active Detection (지능형 위협인지 및 능동적 탐지대응을 위한 Snort 침입탐지규칙 연구)

  • Han, Dong-hee;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1043-1057
    • /
    • 2015
  • In order to recognize intelligent threats quickly and detect and respond to them actively, major public bodies and private institutions operate and administer an Intrusion Detection Systems (IDS), which plays a very important role in finding and detecting attacks. However, most IDS alerts have a problem that they generate false positives. In addition, in order to detect unknown malicious codes and recognize and respond to their threats in advance, APT response solutions or actions based systems are introduced and operated. These execute malicious codes directly using virtual technology and detect abnormal activities in virtual environments or unknown attacks with other methods. However, these, too, have weaknesses such as the avoidance of the virtual environments, the problem of performance about total inspection of traffic and errors in policy. Accordingly, for the effective detection of intrusion, it is very important to enhance security monitoring, consequentially. This study discusses a plan for the reduction of false positives as a plan for the enhancement of security monitoring. As a result of an experiment based on the empirical data of G, rules were drawn in three types and 11 kinds. As a result of a test following these rules, it was verified that the overall detection rate decreased by 30% to 50%, and the performance was improved by over 30%.

Analysis and Suggestions of Digital Heritage Policy

  • Lee, Jongwook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.71-78
    • /
    • 2019
  • In this paper, we divided domestic and foreign digital cultural activation policies into four types. We also described projects of each policy and analyzed the limitations of the policy. Finally, we suggested solutions to overcome these limitations. Changes in daily life caused by the recent development of 5G network technology, augmented reality, and virtual reality technology have brought many changes in the way of preservation and utilization of cultural heritage. In particular, digital technology is used for digitization of cultural heritage, storing, and managing digital data, digitally restoring cultural heritage, and enabling time, space, multi-sensory experiences. For this purpose, new policies was required to utilize this. This study divides domestic and international digital heritage policies into digital infrastructure construction, sharing and communication platform construction, public relations, and demonstration contents production support policies. This study is meaningful in classifying the fields of digital heritage policy and introducing digital heritage policy trends. It is also meaningful to suggest ways to improve digital heritage policies through analysis of domestic and foreign cases.

VR, AR Simulation and 3D Printing for Shoulder and Elbow Practice (VR, AR 시뮬레이션 및 3D Printing을 활용한 어깨와 팔꿈치 수술실습)

  • Lim, Wonbong;Moon, Young Lae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.12
    • /
    • pp.175-179
    • /
    • 2016
  • Recent advances in technology of medical image have made surgical simulation that is helpful to diagnosis, operation plan, or education. Improving and enhancing the medical imaging have led to the availability of high definition images and three-dimensional (3D) visualization, it allows a better understanding in the surgical and educational field. The Real human field of view is stereoscopic. Therefore, with just 2D images, stereoscopic reconstruction process through the surgeon's head, is necessary. To reduce these process, 3D images have been used. 3D images enhanced 3D visualization, it provides significantly shorter time for surgeon for judgment in complex situations. Based on 3D image data set, virtual medical simulations, such as virtual endoscopy, surgical planning, and real-time interaction, have become possible. This article describes principles and recent applications of newer imaging techniques and special attention is directed towards medical 3D reconstruction techniques. Recent advances in technology of CT, MR and other imaging modalities has resulted in exciting new solutions and possibilities of shoulder imaging. Especially, three-dimensional (3D) images derived from medical devices provides advanced information. This presentation describes the principles and potential applications of 3D imaging techniques, simulation and printing in shoulder and elbow practice.