• Title/Summary/Keyword: 연구리소스

Search Result 335, Processing Time 0.031 seconds

Efficient Offloading Technology in Fog/Edge Computing Environments (Fog/Edge 컴퓨팅 환경에서 효율적 오프로딩 기술)

  • Kim, Gyu-Beom;Baek, Seung-Hyun;Jang, Min-Seok;Lee, Yon-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.511-513
    • /
    • 2021
  • Recently, various studies have been conducted on Fog/Edge Computing (FEC) to meet the demand for large numbers of devices and new IoT by efficiently coordinating and managing computing resources deployed on network edges. This paper presents key issues and its solutions for determining offloading targets and improving the efficiency of offloading methods to induce minimizing execution latency in FEC environments. TThe proposals in this paper can be effectively applied to building the FEC framework required by relevant stakeholders in the future.

  • PDF

A Study of IT Asset Management (IT 자산관리에 관한 연구)

  • Choi, Dong-Jin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.01a
    • /
    • pp.141-143
    • /
    • 2022
  • IT 자산관리(ITAM, IT Asset Management)는 조직이 소유한 IT 자산과 관련된 모든 이력 변경 정보, 비용, 계약 및 구매/리스 데이터를 관리하는 것이다. 자산 취득 및 처분에 관한 기술, 재무 및 계약 정보를 취득하고 통합한다. 그리고 유지하는 과정. 비즈니스의 효율성과 효율성을 높이기 위해 IT 인프라의 서비스 및 리소스에 대한 자산 관리의 4가지 요소(4C, 특성: 자산 수명 주기 정보, 구성: H/W와 S/W 정보, 계약: 서비스 및 보증, 종합관리: 보증 정보, 비용 및 재무 정보)는 회사 인프라 자원의 TCO 및 ROI를 개선하고 생산성의 범위를 확장하는 것을 목표로 한다. IT 자산 관리의 필요성은 사업에 필요한 IT 자산 정보 제공, 비용 관리, 구매 결정에 필요한 정보 제공, 소프트웨어 라이선스 및 하드웨어 자원의 재활용 촉진, 장치 노후화로 인한 추가 비용 방지를 위한 것이다. 비용 예측 및 관리, 내부 통제 및 외부 감사 대응, 사업부별 IT 비용 및 활용도 분석을 유지 및 지원한다. 사업부의 IT 자원 사용으로 인한 문제는 업무 효율성을 저하시키고 IT 부서의 업무를 증가시키며 결과적으로 기업의 비용을 증가시키며 이것이, IT 자산 관리의 현실이다. 본 논문에서는 적용 사례를 통해 더 나은 관리 방안을 마련하기 위한 방법을 제안한다.

  • PDF

Data Preprocessing Method for Lightweight Automotive Intrusion Detection System (차량용 경량화 침입 탐지 시스템을 위한 데이터 전처리 기법)

  • Sangmin Park;Hyungchul Im;Seongsoo Lee
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.531-536
    • /
    • 2023
  • This paper proposes a sliding window method with frame feature insertion for immediate attack detection on in-vehicle networks. This method guarantees real-time attack detection by labeling based on the attack status of the current frame. Experiments show that the proposed method improves detection performance by giving more weight to the current frame in CNN computation. The proposed model was designed based on a lightweight LeNet-5 architecture and it achieves 100% detection for DoS attacks. Additionally, by comparing the complexity with conventional models, the proposed model has been proven to be more suitable for resource-constrained devices like ECUs.

Design of Light-weight Service Reasoner & Context Information Base Framework for Context-aware Computing (상황인지 컴퓨팅을 위한 경량의 서비스 추론과 상황정보 관리를 위한 프레임워크의 설계)

  • Han, Ji-Yeon;Lee, Ki-Hyuk;Han, Hyung-Jin;Choi, Won-Chul;Han, Kyung-Hoon;Kim, Tae-Hyun;Sohn, Ki-Rack
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.651-654
    • /
    • 2008
  • 상황인지(Context-awareness)란 사용자의 상황을 인지하여 이를 통해 사용자에게 적합한 최적의 정보를 제공하는 것으로 현재 많은 연구가 진행되고 있다. 이미 상황인지를 위한 프레임워크들이 존재하지만, 작은 메모리가 요구되는 제한적인 하드웨어 상황에서 적용하기에 적합하게 설계된 프레임워크는 흔하지 않다. 이에 대한 문제점을 인식하여 하드웨어 리소스가 부족한 상황에서 빠르게 동작할 수 있는 프레임워크를 구상하여, 기존과는 다른 제한적인 환경 안에서 상황인지를 통해 사용자에게 맞는 최적의 서비스를 판단, 제공하는 모바일 오브젝트를 설계하였다.

Strategies for Increasing Library Inclusion by Analyzing Local-based Demands of Vulnerable Population (지역기반 지식정보 취약계층의 수요 분석을 통한 도서관 포용성 강화 전략)

  • Kang, Ji Hei;Bae, Kyung-Jae
    • Journal of Korean Library and Information Science Society
    • /
    • v.51 no.2
    • /
    • pp.295-318
    • /
    • 2020
  • This study was conducted to grasp the changing user needs, especially the changing information needs of the vulnerable groups of knowledge and information. The study analyzed the information needs of the migrants in Area A by introducing a community-based participatory research methodology. The authors cooperated with the local community throughout the entire course of the study and proposed an inclusive library strategy for the underprivileged in the A region. Migrants were in demand for easy writing materials, reading activities programs, leisure culture programs, and literacy programs. In particular, it was analyzed that services should be provided through cooperation with related organizations. As a result of the study, it was suggested to provide experiences of deeply participating in the current library and to provide various information sources (resource guides) and to promote through children.

A Study on the Optimization of UX Design Process and Methodology for small and medium sized manufacturing companies (국내 중소 제조기업 실무 적용을 위한 UX 디자인 프로세스 및 방법론 최적화 연구)

  • Jang, Hye Jin;Yoo, Seung Hun
    • Design Convergence Study
    • /
    • v.15 no.6
    • /
    • pp.255-270
    • /
    • 2016
  • The purpose of this research is to establish the UX methodology knowledge optimized for small sized companies on the basis of theoretical and practical UX development process models. The 7 UX design process models were analyzed by the outcomes and attributes on each design stage from academic field. Then the interview and observation on 18 domestic companies were conducted to clarify the actual methods in use and the gab from the academic theories. The two different design model were unified as an product lifecycle coupled UX process (PLUS). The 100 theory-industry knowedge combined UX design methodologies were selected and aligned along with 6 design stages of PLUS process. Each method was decomposed as a template format that contains standardized attributes applicable for small companies under consideration of their resources, process and produced items. The result of this research is expected to be applied onto real industry and reduce the risk of small manufacturing companies to escalate the quality of UX in their productions.

Design and Implementation of a Java-Based WAP Transaction Layer with Priority Policy (자바기반 WAP 상의 우선순위 트랜잭션 계층의 설계 및 구현)

  • 이준규;임경수;안순신
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.244-251
    • /
    • 2003
  • As the Internet and wireless mobile communication is being widespread, the WAP (Wireless Application Protocol) that merges these two technologies has emerged. Also, the research of the WAP gateway that enables efficient processing of multiple user demands concurrently and prompt response to requests from various wireless devices has been performed in many working groups. The WAP stack is the most fundamental technology among these researches. In this paper, we implement the WAP container utilizing the JAVA's multithreading and applying to the connection pooling technique to manage the available resource in the container efficiently. Also, we design and implement the WTP(Wireless Transaction Protocol) layer and the UDP(User Datagram Protocol) layer based on the priority Policy. Our design and implementation showed the shorter waiting time than that of the existing FCFS(First-Come, First-Served) system in the transaction layer and its efficiency was proved through simulation.

Implementation of an Android Smart phone Forensic Tool Based on Logical Analysis (논리적 분석 기반의 안드로이드 스마트폰 포렌식 도구 구현)

  • Kim, Ik-Su;An, Young-Geon;Yi, Jeong-Hyun;Yang, Seung-Jei;Kim, Myung-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.137-148
    • /
    • 2011
  • In the past, the domestic research on mobile forensics has been limited to cell phones. Increasing use of smart phones, studies on smart phone forensic will be conducted actively in the future. In particular, the study on Android forensic is very important because Android smart phone market share is increasing rapidly. In this paper, we describe an implementation of an Android smart phone forensic tool based on logical analysis. Compared with Oxygen Forensic Suite 2010, this tool saves time it takes to perform Android smart phone forensic because this tool provides search feature and resource links for extracted media information. So far, no smart phone forensic tool is introduced in Korea. Accordingly, this tool would contribute to the advancement of the technology on smart phone forensic.

A Design of Operational Test & Evaluation System for Weapon Systems thru Process-based Modeling (프로세스 기반의 모델링을 통한 무기체계 운용시험평가 시스템 설계)

  • Lee, Beom;Seo, Yoonho
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.4
    • /
    • pp.211-218
    • /
    • 2014
  • The Test and Evaluation (T&E) system became more important due to its advancement and complexity of the weapon system. Time and cost saving T&E related studies are in progress mainly with advanced countries. By utilizing the Modeling and Simulation (M&S) technology recently, we may save time and money. Also, overcome security and safety limitations. There are many M&S based research activities in South Korea but it is way behind of the system that some countries already have developed. i.e.; United States. This area of study requires new way of developing strategies in the T&E system of Korea. This study is to design the Operational T&E system for weapon systems based on modeling of processes. And we modeled the processes of operational performance evaluation through utilizing resources and performance modules of weapon systems and combined it with the simulation engine for 3D visualization. Through this, we propose the Operational T&E system for weapon systems based on modeling of processes that represent operational performances visually.

Correlation Analysis of Dataset Size and Accuracy of the CNN-based Malware Detection Algorithm (CNN Mobile Net 기반 악성코드 탐지 모델에서의 학습 데이터 크기와 검출 정확도의 상관관계 분석)

  • Choi, Dong Jun;Lee, Jae Woo
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.53-60
    • /
    • 2020
  • At the present stage of the fourth industrial revolution, machine learning and artificial intelligence technologies are rapidly developing, and there is a movement to apply machine learning technology in the security field. Malicious code, including new and transformed, generates an average of 390,000 a day worldwide. Statistics show that security companies ignore or miss 31 percent of alarms. As many malicious codes are generated, it is becoming difficult for humans to detect all malicious codes. As a result, research on the detection of malware and network intrusion events through machine learning is being actively conducted in academia and industry. In international conferences and journals, research on security data analysis using deep learning, a field of machine learning, is presented. have. However, these papers focus on detection accuracy and modify several parameters to improve detection accuracy but do not consider the ratio of dataset. Therefore, this paper aims to reduce the cost and resources of many machine learning research by finding the ratio of dataset that can derive the highest detection accuracy in CNN Mobile net-based malware detection model.