• Title/Summary/Keyword: 융복합 솔루션

Search Result 65, Processing Time 0.025 seconds

Analysis of Technical Factors for Multidisplinary Cloud Service Model and Development of Service Model based on Use Case (유즈 케이스 기반의 융.복합 클라우드 서비스 모델을 위한 요소 기술 분석 및 서비스 모델 개발)

  • Seo, Kwang-Kyu
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.545-550
    • /
    • 2012
  • The size of global IT convergence market is expected to increase more and more and cloud computing in industrial convergence environment provides the useful solutions to support convergence environment between other industries. It is necessary and important to predict and develop integrated service structures and types of combining cloud computing and other application technologies. Therefore this paper presents technical factors to provide cloud service. In additions, the requirement and technical factors for various convergence service models are introduced and analyzed using use case which is efficient modelling methodology to construct many system. Using the research results, we performed the case study to develop a convergence cloud service. Eventually, this study is expected to use the basic researches to develop the various the multidisplinary cloud service models based on use case to create the new values.

Market Trends of SDN/NFV Supply and Demand (SDN/NFV 공급 및 수요시장 동향)

  • Hong, M.D.;Young, A.J.
    • Electronics and Telecommunications Trends
    • /
    • v.31 no.2
    • /
    • pp.28-40
    • /
    • 2016
  • Software Defined Network(SDN)/Network Function Virtualization(NFV) 기술은 기존 하드웨어 기반의 경직된 네트워크의 구조를 소프트웨어, 가상화 기반의 유연한 네트워크 구조로 전환함으로써 미래의 다양한 융 복합 산업과 4차 산업혁명에 대응할 수 있는 네트워크 아키텍처 기술로 주목받고 있다. 현재 SDN/NFV기술이 네트워크 산업에서 주요 이슈가 되고, 이를 활용하여 성과가 소개되면서 네트워크장비 벤더들은 다양한 SDN/NFV 제품 및 솔루션을 출시하고 있다. 시장정체에 고심하던 통신사들도 SDN/NFV를 활용한 네트워크 인프라 전환을 모색하고 있다. 이에 본고는 주요 SDN/NFV 장비 벤더들의 동향과 SDN/NFV 도입사례를 살펴보고자 한다.

  • PDF

소셜 M2M 서비스 개발

  • Kim, Yong-Jin;Kim, Gyeong-Su
    • Information and Communications Magazine
    • /
    • v.32 no.2
    • /
    • pp.111-113
    • /
    • 2015
  • 소셜 M2M 서비스는 지능형 M2M 플랫폼을 내장한 M2M 단말들이 자율적으로 소셜 그룹을 형성하고 상호간의 협업을 통해 창출된 지능형 M2M 융 복합 서비스를 말한다. 소셜 M2M 서비스 개발을 위해서는 그 핵심기술로 M2M 공통 서비스 기능을 지원하는 공통 프레임워크와 지능화 기술, 협업 기술, 융합 기술을 포함하는 지능형 M2M 플랫폼이 필요하며, 사물인터넷 생태계의 S(Service)-P(Platform)-N(Network)-D(Device) 각 계층별로 관련 솔루션을 효과적으로 구축하는 것이 필요하다.

Smart Solar Control System: Based on the Low-Power Control of Arduino Board (지능형 태양광 전력 관리 시스템 (아두이노 저전력 제어를 중심으로))

  • Kwon, Oh-Sung
    • Journal of The Korean Association of Information Education
    • /
    • v.23 no.5
    • /
    • pp.461-467
    • /
    • 2019
  • As the convergence solutions become more common, the use of Arduino and Raspberry Pi boards has been increasing. These control boards has to be executed under power blackout. In this environment, we take advantage of solar power system to overcome the power out. In this paper, we poposed a effficient power control strategy. Our experimental device is a DSLR shooting device executed based a predesigned interval time. The control module of our experimental device is the compound system of Raspberry Pi and Arduino boards. Arduino board send the force signals to wake up Raspberry Pi. We developed a new control strategy algorithm for the efficient use of solar power energy. In this paper, we mesured the efficiency of solar enery consuming of our system. We programmed a control system to send DSLR shooting signals. In experimentals, we ensured a stable consuming of electricity during 10 days. In the end, it was found that the consumption power of the Raspberry was reduced by about 81% when the Aduino was combined to save power.

A Study on the Status of Research Performance Analysis Services in University Libraries: Focusing on the Research Performance Management System (대학도서관의 연구성과분석 서비스 현황에 관한 연구 - 연구성과분석 시스템을 중심으로 -)

  • Juseop Kim;Nawon Kim;Hyun-A Lim;Suntae Kim
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.57 no.2
    • /
    • pp.199-220
    • /
    • 2023
  • Research competitiveness is the future of the university and the future of the country. This study is to present considerations when university libraries introduce and perform research performance analysis services and to propose guidelines for selection of analysis solutions. In order to achieve the purpose of this study, 6 university library staff were interviewed and 4 research performance analysis solutions were compared. The contents of the interview include the background of service promotion, service content, subscription solution, service provision scope and provision method. The research performance analysis solutions selected for analysis are InCite, SciVal, RIMS and Scholytics. As a result of analyzing the four solutions, it was found that most of the software has the necessary functions to perform research performance analysis service tasks, and generally subscribed to the solution according to the purpose of analysis. The results of this study can be used as reference materials for performing research performance analysis services in university libraries.

A Study of Authentication Scheme based on Personal Key for Safety Intelligent Vehicle (안전한 지능형 자동차를 위한 개인키 기반의 인증 기법에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.549-554
    • /
    • 2014
  • Studies on the intelligent vehicles that are converged with IT and vehicular technologies are currently under active discussion. A variety of communication technologies for safety intelligent vehicle services are support. As such intelligent vehicles use communication technologies, they are exposed to the diverse factors of security threats. To conduct intelligent vehicle security authentication solutions, there are some factors that can be adopted ownership, knowledge and biometrics[6,7]. This paper proposes to analyze the factors to threaten intelligent vehicle, which are usually intruded through communication network system and the security solution using biometric authentication scheme. This study proposed above user's biometrics information-based authentication scheme that can solve the anticipated problems with an intelligent vehicle, which requires a higher level of security than existing authentication solution.

Design of ePub-based Digital Textbooks Integrated Solution for Smart Learning (스마트러닝을 위한 ePub 기반 디지털교과서 통합 솔루션 설계)

  • Heo, Sung-Uk;Kang, Sung-In;Kim, Gwan-Hyung;Choi, Sung-Wook;Oh, Am-Suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.873-875
    • /
    • 2013
  • 정보기술 발전에 따라 정보 활용 및 처리 역량이 상승하면서 교육 환경의 지능화, 네트워크화로 기술간, 서비스 간 융 복합을 통한 다양한 학습 내용 및 방법이 출현하였으며, 최근 e-러닝 산업에서 스마트기기 보급 확산과 상황 적응적이고 자기 주도적 학습에 대한 소비자의 니즈가 증가하면서 새로운 형태의 교육시스템인 스마트러닝이 부각되고 있다. 이러한 교육 패러다임의 변화에 따라 기존의 교육 콘텐츠를 스마트기기에 적용하기 위해서는 콘텐츠 및 솔루션 구조의 개선이 요구되며, 또한 서비스 제공의 측면에서 다양한 교육 콘텐츠 연동과 교육 서비스 융합을 위한 표준 플랫폼 적용이 필요하다. 이에 본 논문에서는 JVM 환경의 PC 인터페이스를 통해 ePub 표준의 교육용 멀티미디어 콘텐츠 제작기능과 기존 서책형 파일 포맷의 자료 정보를 응용하기 위한 정보변환 모듈, 스마트 기기용 ePub 전자책 뷰어를 포함하는 통합 솔루션 소프트웨어인 ePub Solution을 설계하였다.

  • PDF

Development of Smart Phone Application With Spectrometer for u-Health Service (u-Health 서비스를 위한 스마트폰용 스펙트럼 측정 시스템 개발)

  • Kim, Dong-Su;Lee, Seo-Joon;Lee, Tae-Ro
    • Journal of Digital Convergence
    • /
    • v.11 no.7
    • /
    • pp.261-269
    • /
    • 2013
  • Ubiquitous healthcare is a recent technology and a new methodology of medical diagnosis and medical care. However, in order for u-Healthcare service to become a general technology, there are some technological barriers(mobility, minimization, battery consumption etc) to overcome. In this paper, we developed a spectrum analysis system for smart phones. The results showed that compared to other solutions, our's were not only small in size but also almost the same in performance(reproducibility comparison experiments, Spectrum, Calibration Curve and Prediction). Therefore, the proposed solution is expected to be widely used in u-Health area.

The Impact of CSV on Brand Image and Consumers' Behavioral Intentions: Focussing on CSV Intentionality and Company -Consumer Identification (기업의 CSV활동이 브랜드 이미지와 소비자행동의도에 미치는 영향 : CSV의도성과 기업 -소비자 동일시를 중심으로)

  • Hwang, Yoon-Hwan;Seo, Young-Wook
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.105-114
    • /
    • 2019
  • This study examined the causal relationship between CSV and brand image and consumers' behavioral intentions by structural equation model using psychological variables such as CSV intentionality and company-consumer identification. 198 questionnaires were used to test 8 hypotheses using Smart PLS 2.0. Results are as follows: First, two hypotheses were rejected that CSV had a negative effect on CSV intentionality and CSV intentionality had a negative effect on brand image. Second, CSV has a positive effect on company-consumer identification and company-consumer identification has a positive effect on brand image, purchase intention, and willingness to pay. This study suggests the necessity of enhancing customer participation and communication for the company to establish CSV strategies.

Real-time hacking, detection and tracking ICT Convergence Security Solutions Test and Evaluation (실시간 해킹, 탐지 및 추적관리 ICT 융합 보안 솔루션 시험평가)

  • Kim, Seung-Bum;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.235-246
    • /
    • 2015
  • Understanding the various unspecified hacking and repeated cyber DDoS attacks, finally was able to find a solution in the methods of attacks. Freely researching approach that combines the attacker and defender, offensive and defensive techniques can be called a challenge to discover the potential in whimsy. In this paper we test and evaluate "KWON-GA", global white hackers team has made by many years of experiences in infiltration and diagnosis under guise of offence is the best defence. And it is knowledge information ICT Convergence security solution which is developed for the purpose of defence, it provide customization policy that can be fit to customer's system environment with needed techniques and it is processed with unique proprietary technology so that it's not possible to scan. And even if it has leaked internally it's impossible to analyze so hackers can't analyze vulnerability, also it can't be abused as hacking tools.