• Title/Summary/Keyword: 정보기술 아키텍처

Search Result 651, Processing Time 0.028 seconds

CNN Architecture for Accurately and Efficiently Learning a 3D Triangular Mesh (3차원 삼각형 메쉬를 정확하고 효율적으로 학습하기 위한 CNN 아키텍처)

  • Hong Eun Na;Jong-Hyun Kim
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.01a
    • /
    • pp.369-372
    • /
    • 2023
  • 본 논문에서는 삼각형 구조로 구성된 3차원 메쉬(Mesh)에서 합성곱 신경망(Convolution Neural Network, CNN)을 응용하여 정확도가 높은 새로운 학습 표현 기법을 제시한다. 우리는 메쉬를 구성하고 있는 폴리곤의 edge와 face의 로컬 특징을 기반으로 학습을 진행한다. 일반적으로 딥러닝은 인공신경망을 수많은 계층 형태로 연결한 기법을 말하며, 주요 처리 대상은 1, 2차원 데이터 형태인 오디오 파일과 이미지였다. 인공지능에 대한 연구가 지속되면서 3차원 딥러닝이 도입되었지만, 기존의 학습과는 달리 3차원 딥러닝은 데이터의 확보가 쉽지 않다. 혼합현실과 메타버스 시장의 확대로 인해 3차원 모델링 시장이 증가하고, 기술의 발전으로 데이터를 획득할 수 있는 방법이 생겼지만, 3차원 데이터를 직접적으로 학습에 이용하는 방식으로 적용하는 것은 쉽지 않다. 그렇게 때문에 본 논문에서는 산업 현장에서 이용되는 데이터인 메쉬 구조를 폴리곤의 최소 단위인 삼각형 형태로 구성하여 학습 데이터를 구성해 기존의 방법보다 정확도가 높은 학습 기법을 제안한다.

  • PDF

Development of Thin Client for Server-based Computing (서버 기반 컴퓨팅을 위한 씬 클라이언트 개발)

  • Kim, Jung-Hung;Kim, Seung-Kwang;Cho, Jeong-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.516-519
    • /
    • 2008
  • 본 논문에서 우리는 SBC(Server Based Computing)를 위한 씬 클라이언트 개발에 관한 우리의 최근 연구에 대하여 소개한다. SBC 란 현대 사회에서 빠르게 변화되는 소프트웨어(SW)/하드웨어(HW) 기술에 대하여 유지 보수 및 업그레이드 비용에 대한 절감과 인력자원 절감 효과, 보안 환경의 강화, 접근 권한에 따르는 차별성, 안정성 확보 그리고 장비의 간소화를 통한 작업 공간 효율성에 이르기까지, 다양한 장점을 가지고 있는 신개념의 컴퓨터 아키텍처이다. 이를 기반으로 하는 씬 클라이언트는 HDD 및 어떠한 어플리케이션도 설치 할 필요가 없다. 따라서 씬 클라이언트는 고사양일 필요가 없으며 보안, 업그레이드 그리고 데이터 백업에 대한 부담도 줄어든다.

Research on Success Factors of Enterprise Architecture(ITA/EA) through Policy Standardization (엔터프라이즈 아키텍쳐(ITA/EA)도입에 따른 정책 표준화를 통한 성공적 요인에 관한 연구)

  • Lee, Jun-Yerl;Jung, Byeong-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.273-281
    • /
    • 2008
  • In a knowledge-information based society, effective management across IT industries, value of information and interoperation are more important than eyer before. Therefore, ITA/EA which helps to plan and manage IT systematically and effectively, was enacted and announced in 2005 and has been considered as an innovative IT management approach. Unfortunately, however, new standardization of ITA/EA has not fully discussed yet. How to successfully apply EA/ITA to IT is considered as the most urgent challenge and this study aims to find out the most effective method. To this end, it was emphasized that training systems for specialized experts must be operated systematically through 'standardization of terms and tasks' and 'standardization of manpower training' and certification of specialty must be newly established. In addition. it was strongly demanded that dual structure caused by mixed concepts between ITA and EA must be eliminated. At the same time. a new model for domestic standardization was suggested so that not only ITA/EA can be recognized as IT engineering but also professional engineers can accept ITA/EA as a scientific field. In summary, this study is intended to propose how to improve information management efficiency through ITA/EA.

  • PDF

A Study on the Cost Estimation Model Development of the Defense M&S System Software (국방 M&S체계 소프트웨어 비용 추청모델 개발에 관한 연구)

  • Kim, Jang-Hyun;Jung, Choong-Young
    • Journal of the military operations research society of Korea
    • /
    • v.36 no.3
    • /
    • pp.69-81
    • /
    • 2010
  • Since the mid-nineties, Republic of Korean Army has officially adapted information technology. Starting with the Chang-Jo 21('99) training M&S Model, around seventy types of the M&S system software, including Ground Operations & Resources Requirement Analysis Model ('10), developed by Republic of Korea Army or foreign counterparts have been utilized. However, as the existing cost estimations of the Defense M&S system software fail to reflect the acquisition and development environment, the estimated costs have been frequently overestimated or underestimated. This paper provides a suitable cost estimation model for the Defense M&S system software by presenting the software cost drivers which reflect the unique software development environment of the Defense.

An Implementation of Efficient Quicksort Utilizing SIMD-Based VBP Technique (SIMD 기반의 VBP 기법을 적용한 효율적인 퀵정렬의 구현)

  • Hong, Gilseok;Kim, Hongyeon;Kang, Seonghyeon;Min, Jun-Ki
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.8
    • /
    • pp.498-503
    • /
    • 2017
  • SIMD (Single Instruction Multiple Data) is a representative parallelization architecture that processes multiple data loaded in a SIMD register with a single instruction. Quicksort is a sorting algorithm that picks an element as a pivot from the array and reorders the array such that all elements having the values less than the pivot value are located in the left side on the pivot as well as all elements having the value greater than the pivot value are located in the right side on the pivot and then the algorithm performs the same task on both sublist recursively. In this paper, we propose an efficient Quicksort algorithm applying the SIMD instructions which minimally invokes conditional branches to avoid the performance degradation incurred by branch misprediction in a pipeline architecture. In addition, we improve the performance of the Quicksort algorithm by fetching data into a SIMD register as a byte unit to apply VBP (Vertical Bit Parallel) and the early pruning technique.

Architecture Design for Real-time Mobile Embedded Software Test Tools (실시간 이동형 내장 소프트웨어 시험 도구의 구조 설계)

  • Kim, Sang-Il;Lee, Nam-Yong;Rhew, Sung-Yul
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.4
    • /
    • pp.388-401
    • /
    • 2006
  • A tool for analyzing and testing software in real-time is required for the efficient development of highly reliable real-time mobile embedded software This too] requires various technologies, such as source code based white-box test and real-time system monitoring and control. The tool also should be designed to improve reusability and portability by considering the interaction with other kinds of real-time system. This paper identifies and analyzes the functional requirements for the test tool on real-time mobile embedded software and suggests an adequate tool architecture based on the collected requirements. It also suggests the specific implementation technology and architecture design pattern to support the tool's expandability and portability.

Model of the RFID-based Product Traceability Service in u-SCM (u-SCM에서 RFID 기반 제품 추적 서비스 모델)

  • Shin, Myeong-Sook;Song, Gi-Beum;Ahn, Seong-Soo;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.954-957
    • /
    • 2007
  • The u-SCM to persue unification of the whole Supply Chain through ubiquitous computing and technical interface is raised its head for enterprise to secure endless competitive advantage and grow up constantly. This can be especially a matter of primary concern for business process elevation on various industry. The other side, The Traceability Service propelled both nationally and internationally is propelled specific industry to offer visibility and traceability of each manufacture on supply chain related to induce RFID, but standard Traceability Service Architecture isn't decided yet. This paper propose Model of Product Traceability Service which is based on EPCglobal Network to be the whole world standard architecture for the sake of efficient and perfect manufacture management on entire supply chain based on RFID.

  • PDF

A Study of the Standard Interface Architecture of Naval Combat Management System

  • Baek, Chi-Sun;Ahn, Jin-Hyang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.1
    • /
    • pp.147-154
    • /
    • 2021
  • Naval Combat Management System(a.k.a. CMS) is the core combat power of ROK Navy. CMS which has been localized since 1993 has been developed in various categories. However, in the characteristic of defense industry, CMS software has been rarely developed technically and structurally while the environment of computing system has been developed dramatically. A need for a new paradigm of CMS software development was raised. This paper suggests Naval Shield Component Platform(NSCP) as a standard interface architecture of CMS based on SOLID of OOP which is an advanced programming paradigm and introduce its functionality and feature. We expect NSCP's higher reusability, concurrency and maintainability in CMS software development. As a future work, we are going to apply NSCP to the next CMS software development project and evaluate quantitative, qualitative method.

Deep Learning-Based Dynamic Scheduling with Multi-Agents Supporting Scalability in Edge Computing Environments (멀티 에이전트 에지 컴퓨팅 환경에서 확장성을 지원하는 딥러닝 기반 동적 스케줄링)

  • JongBeom Lim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.9
    • /
    • pp.399-406
    • /
    • 2023
  • Cloud computing has been evolved to support edge computing architecture that combines fog management layer with edge servers. The main reason why it is received much attention is low communication latency for real-time IoT applications. At the same time, various cloud task scheduling techniques based on artificial intelligence have been proposed. Artificial intelligence-based cloud task scheduling techniques show better performance in comparison to existing methods, but it has relatively high scheduling time. In this paper, we propose a deep learning-based dynamic scheduling with multi-agents supporting scalability in edge computing environments. The proposed method shows low scheduling time than previous artificial intelligence-based scheduling techniques. To show the effectiveness of the proposed method, we compare the performance between previous and proposed methods in a scalable experimental environment. The results show that our method supports real-time IoT applications with low scheduling time, and shows better performance in terms of the number of completed cloud tasks in a scalable experimental environment.

A Study on the Security Requirements Analysis to Build a Zero Trust-Based Remote Work Environment (제로트러스트 기반의 원격 근무 환경을 구축하기 위한 보안요구사항 분석 연구)

  • Hae-na Kim;Ye-jun Kim;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.83-102
    • /
    • 2024
  • Recently, as the use of the cloud increases year by year and remote work within the enterprise has become one of the new types of work, the security of the cloud-based remote work environment has become important. The introduction of zero trust is required due to the limitations of the existing perimeter security model that assumes that everything in the internal network is safe. Accordingly, NIST and DoD published standards related to zero trust architecture, but the security requirements of that standard describe only logical architecture at the abstract level. Therefore, this paper intends to present more detailed security requirements compared to NIST and DoD standards by performing threat modeling for OpenStack clouds. After that, this research team performed a security analysis of commercial cloud services to verify the requirements. As a result of the security analysis, we identified security requirements that each cloud service was not satisfied with. We proposed potential threats and countermeasures for cloud services with zero trust, which aims to help build a secure zero trust-based remote working environment.