• Title/Summary/Keyword: 기능 아키텍처

Search Result 423, Processing Time 0.024 seconds

Web Assembly System Architecture Model (웹 어셈블리 시스템 아키텍처 모델)

  • Park, Jin-Tae;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.4
    • /
    • pp.328-332
    • /
    • 2019
  • Advances in web technology have enabled technical convergence in various system environments to be carried out through the web interface. The Web can be categorized from the Web 1.0 to the 4.0, depending on its role, it has the characteristics of connects information, connects people, connects knowledge, and connects intelligence. In addition, various technological needs occurred through the mobile app during the 4th Industrial Revolution, and functions such as 3D, virtual reality, augmented reality, video/audio processing were enabled on the web, which was a simple means of providing information. Technical standards have been studied to support these period needs. In this paper, I would like to mention one of the Web assembly. We will explore ways to link and fuse Web assembly with existing web systems (or platforms) and analyze their technical implications through a variety of examples. In addition, we will conduct a study on the architecture that can fuse the existing javascript with the web assembly, and discuss the future direction of the study.

A Study on the Standardization of On-Board Training System Software for Naval Ship Engineering Control System

  • Kwak, Seung-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.97-104
    • /
    • 2021
  • Since 1993, Successfully localized naval combat System has made steady development on various domestic and foreign ships. On the other hand, Engineering Control System(ECS) is dependent on foreign companies. Therefore, there is a lot of interest and research in the localization of ECS in the navy defense industry. As one of various studies, a preliminary study of domestic ECS software that can be commonly applied to naval ships is in progress. This paper propose Ecs Obts Scalable Platform(EOSPA) as the standard architecture of ECS On-Board Training System(OBTS) software by applying object-oriented programming and standardization. And this introduces EOSPA's structure, function, and features of each component. Furthermore, high reusability and maintainability are expected in the development of ECS OBTS software applying EOSPA in various naval ships.

Overlay2 file system's Source Protection Methodology (Overlay2 파일 시스템의 소스 보호 방법에 관한 연구)

  • Han, Sung-Hwa
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1397-1402
    • /
    • 2021
  • The overlay2 file system is one of the union file systems that mounts multiple directories into one. The source directory used for this overlay2 file system mount has a characteristic that it operates independently of the write-able layer after mounting, so it is often used for container platforms for application delivery. However, the overlay2 file system has a security vulnerability that the write-able layer is also modified when file in the source directory is modified. In this study, I proposed the overlay2 file system protection technology to remove the security vulnerabilities of the overlay2 file system. As a result of empirically implementing the proposed overlay2 file system protection technology and verifying the function, the protection technology proposed in this study was verified to be effective. However, since the method proposed in this study is a passive protection method, a follow-up study is needed to automatically protect it at the operating system level.

Implementation of Cloud-Based Artificial Intelligence Education Platform (클라우드 기반 인공지능 교육 플랫폼 구현)

  • Wi, Woo-Jin;Moon, Hyung-Jin;Ryu, Gab-Sang
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.6
    • /
    • pp.85-92
    • /
    • 2022
  • Demand for big data analysis and AI developers is increasing, but there is a lack of an education base to supply them. In this paper, by developing a cloud-based artificial intelligence education platform, the goal was to establish an environment in which practical practical training can be efficiently learned at low cost at educational institutions and IT companies. The development of the education platform was carried out by planning scenarios for each user, architecture design, screen design, implementation of development functions, and hardware construction. This training platform consists of a containerized workload, service management platform, lecture and development platform for instructors and students, and secured cloud stability through real-time alarm system and age test, CI/CD development environment, and reliability through docker image distribution. The development of this education platform is expected to expand opportunities to enter new businesses in the education field and contribute to fostering working-level human resources in the AI and big data fields.

Analysis of Dedicated Mission Software Architecture for Unmanned Vehicles for Public Mission (공공임무를 위한 무인이동체 탑재용 임무소프트웨어 구조 분석)

  • Park, Jong-Hong;Choi, Sungchan;Ahn, Il-Yeup
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.435-440
    • /
    • 2020
  • The application of the unmanned vehicles in various fields has been attracting attention, and the development of a service utilizing unmanned vehicles has been proceeding. As the service market using the unmanned vehicles rapidly increases, the demand for the development of software for performing the mission with unmanned vehicles is increasing. In particular, as the demand for unmanned vehicle utilization services for public missions such as fire detection, mail delivery, and facility management increases, the importance of developing mission software for unmanned vehicle is increasing. To develop common mission software, architecture design should be made so that unmanned vehicle service provider can easily develop software using reusable libraries or functions through analysis commonly required by various public institutions. In this paper, we discuss the research trends of mission software for public mission unmanned vehicles. In addition, the architecture design of developing formal mission software is proposed. Finally, we propose a data transfer architecture between mission software and data platform.

Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments (안전한 M2M 통신 구축을 위한 상호인증 및 키 교환 프로토콜)

  • Eun, Sun-Ki;Jeon, Seo-Kwan;Ahn, Jae-Young;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.73-83
    • /
    • 2010
  • Recently, as IT technologies developed, communication technologies of a various forms that satisfied convenience of user are being researched. Among various research, unlike traditional forms of communication, M2M communication is getting attention that without any control or involvement of people to establish communication between devices. However, the M2M communication could more easily be exposed to many security problems such as data exposure, data theft, unauthorized change and delete and privacy. Therefore, in this paper, we derive security requirements and propose the M2M communication architecture that provide a secure M2M communication environment. Also, we propose a secure mutual authentication and key establishment protocol between a M2M device or gateway domain and a M2M network domain. The proposed protocol is secure against replay attack, impersonation attack and protect a user privacy and tracing.

A Study on the API Gateway for human resources management modules extensions in ERP

  • Lee, Ji-Woon;Seo, Hee-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.79-88
    • /
    • 2021
  • In this paper, we propose a API Gateway technique for the expansion of human resource management module, one of the ERP functions. The institution has introduced ERP (Enterprise Resource Planning) based on its efforts to transform all human and physical resources into business competitiveness and its response to the digital knowledge informatization environment, and listed it as multiple success factors. Human resource management is one of the factors that have been dealt with. However, ERP's Human Resources Management Module remains in the role of functional personnel management. How to utilize human resources begins with navigating and recognizing human resources. The proposed API Gateway technique leverages blockchain networks to design and implement APIs for human resource sharing and navigation, including the possibility of extending ERP's human resource management module. Secondly, it was designed and implemented using a smart contract that behaves like an API for preventing information forgery. The proposed method will not only be used as a tool that can actively utilize human resources, but will also be a complete resource for utilizing big data technology.

Machine Learning-Based Detection of Cache Side Channel Attack Using Performance Counter Monitor of CPU (Performance Counter Monitor를 이용한 머신 러닝 기반 캐시 부채널 공격 탐지)

  • Hwang, Jongbae;Bae, Daehyeon;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1237-1246
    • /
    • 2020
  • Recently, several cache side channel attacks have been proposed to extract secret information by exploiting design flaws of the microarchitecture. The Flush+Reload attack, one of the cache side channel attack, can be applied to malicious application attacks due to its properties of high resolution and low noise. In this paper, we proposed a detection system, which detects the cache-based attacks using the PCM(Performance Counter Monitor) for monitoring CPU cache activity. Especially, we observed the variation of each counter value of PCM in case of two kinds of attacks, Spectre attack and secret recovering attack during AES encryption. As a result, we found that four hardware counters were sensitive to cache side channel attacks. Our detector based on machine learning including SVM(Support Vector Machine), RF(Random Forest) and MLP(Multi Level Perceptron) can detect the cache side channel attacks with high detection accuracy.

Legal Institutional Improvement for Activating National Supercomputing Ecosystem (국가슈퍼컴퓨팅 생태계 활성화를 위한 법제도 개선방안)

  • Huh, Taesang;Jung, Yonghwan;Koh, Myoungju
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.641-651
    • /
    • 2021
  • Supercomputers have played an important role in various fields such as science, industry, national security and solutions for social issues, and their demand is increasing significantly as their use is strengthened in areas using big data and AI. Recently, competition for global exascale system development is accelerating based on various architectures, and the era of exascale computing is expected to come in the near future. However, the foundation of the domestic supercomputing ecosystem was lost due to the decline of the server industry in the past, and although the related law was enacted to supplement and foster it, it has not been able to perform its function smoothly. Therefore, this article examines the problems in the current legal system through the analysis of the relevant legal system and the status of the supercomputing ecosystem, and suggests improvements so that the relevant legal system, which can accommodate the reinforcement of the role of the government·national center·professional center, support for industries, promotion of commercialization of research results, and flexibility of government promotion policies, can prepare the basis for the promotion of the supercomputing R&D project.

Dynamic Resource Adjustment Operator Based on Autoscaling for Improving Distributed Training Job Performance on Kubernetes (쿠버네티스에서 분산 학습 작업 성능 향상을 위한 오토스케일링 기반 동적 자원 조정 오퍼레이터)

  • Jeong, Jinwon;Yu, Heonchang
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.7
    • /
    • pp.205-216
    • /
    • 2022
  • One of the many tools used for distributed deep learning training is Kubeflow, which runs on Kubernetes, a container orchestration tool. TensorFlow jobs can be managed using the existing operator provided by Kubeflow. However, when considering the distributed deep learning training jobs based on the parameter server architecture, the scheduling policy used by the existing operator does not consider the task affinity of the distributed training job and does not provide the ability to dynamically allocate or release resources. This can lead to long job completion time and low resource utilization rate. Therefore, in this paper we proposes a new operator that efficiently schedules distributed deep learning training jobs to minimize the job completion time and increase resource utilization rate. We implemented the new operator by modifying the existing operator and conducted experiments to evaluate its performance. The experiment results showed that our scheduling policy improved the average job completion time reduction rate of up to 84% and average CPU utilization increase rate of up to 92%.