• Title/Summary/Keyword: 정보기술 아키텍처

Search Result 652, Processing Time 0.027 seconds

Processing Time Optimization of an Electronic Stability Control system design Using Multi-Cores for AURIX TC 275 (AURIX TC 275에서 멀티코어를 이용한 Electronic Stability Control의 수행시간 최적화)

  • Jang, Hong-Soon;Cho, Young-Hwan;Jeong, Gu-Min
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.5
    • /
    • pp.385-393
    • /
    • 2021
  • This study proposes a multi-core-based controller design for an ESC(Electronic Stability Control) system in an automotive multi-core processor. Considering the architectures of an automotive multi-core processor and an ESC system, the overall execution time has been optimized for multi-core platforms. The function module assignment, synchronization between cores, and memory assignment for core-dependent variables in automotive multi-core systems are evaluated. The ESC controller comprising five function modules is used herein. Based on the proposed design, the single-core controller is extended to multi-core controllers. Using multi-core optimization methods, such as function module assignment, semaphore, interrupt awakening, and variable assignment over cores, the ESC system is redesigned to a multi-core controller. Experimental results reveal that the execution time for the multi-core processor is reduced by 59.7% compared with that for the single-core processor.

A Tensor Space Model based Deep Neural Network for Automated Text Classification (자동문서분류를 위한 텐서공간모델 기반 심층 신경망)

  • Lim, Pu-reum;Kim, Han-joon
    • Database Research
    • /
    • v.34 no.3
    • /
    • pp.3-13
    • /
    • 2018
  • Text classification is one of the text mining technologies that classifies a given textual document into its appropriate categories and is used in various fields such as spam email detection, news classification, question answering, emotional analysis, and chat bot. In general, the text classification system utilizes machine learning algorithms, and among a number of algorithms, naïve Bayes and support vector machine, which are suitable for text data, are known to have reasonable performance. Recently, with the development of deep learning technology, several researches on applying deep neural networks such as recurrent neural networks (RNN) and convolutional neural networks (CNN) have been introduced to improve the performance of text classification system. However, the current text classification techniques have not yet reached the perfect level of text classification. This paper focuses on the fact that the text data is expressed as a vector only with the word dimensions, which impairs the semantic information inherent in the text, and proposes a neural network architecture based upon the semantic tensor space model.

Overlay2 file system's Source Protection Methodology (Overlay2 파일 시스템의 소스 보호 방법에 관한 연구)

  • Han, Sung-Hwa
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1397-1402
    • /
    • 2021
  • The overlay2 file system is one of the union file systems that mounts multiple directories into one. The source directory used for this overlay2 file system mount has a characteristic that it operates independently of the write-able layer after mounting, so it is often used for container platforms for application delivery. However, the overlay2 file system has a security vulnerability that the write-able layer is also modified when file in the source directory is modified. In this study, I proposed the overlay2 file system protection technology to remove the security vulnerabilities of the overlay2 file system. As a result of empirically implementing the proposed overlay2 file system protection technology and verifying the function, the protection technology proposed in this study was verified to be effective. However, since the method proposed in this study is a passive protection method, a follow-up study is needed to automatically protect it at the operating system level.

Low Power Security Architecture for the Internet of Things (사물인터넷을 위한 저전력 보안 아키텍쳐)

  • Yun, Sun-woo;Park, Na-eun;Lee, Il-gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.199-201
    • /
    • 2021
  • The Internet of Things (IoT) is a technology that can organically connect people and things without time and space constraints by using communication network technology and sensors, and transmit and receive data in real time. The IoT used in all industrial fields has limitations in terms of storage allocation, such as device size, memory capacity, and data transmission performance, so it is important to manage power consumption to effectively utilize the limited battery capacity. In the prior research, there is a problem in that security is deteriorated instead of improving power efficiency by lightening the security algorithm of the encryption module. In this study, we proposes a low-power security architecture that can utilize high-performance security algorithms in the IoT environment. This can provide high security and power efficiency by using relatively complex security modules in low-power environments by executing security modules only when threat detection is required based on inspection results.

  • PDF

Design and Implementation of Bigdata Platform for Vessel Traffic Service (해상교통 관제 빅데이터 체계의 설계 및 구현)

  • Hye-Jin Kim;Jaeyong Oh
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.7
    • /
    • pp.887-892
    • /
    • 2023
  • Vessel traffic service(VTS) centers are equipped with RADAR, AIS(Automatic Identification System), weather sensors, and VHF(Very High Frequency). VTS operators use this equipment to observe the movement of ships operating in the VTS area and provide information. The VTS data generated by these various devices is highly valuable for analyzing maritime traffic situation. However, owing to a lack of compatibility between system manufacturers or policy issues, they are often not systematically managed. Therefore, we developed the VTS Bigdata Platform that could efficiently collect, store, and manage control data collected by the VTS, and this paper describes its design and implementation. A microservice architecture was applied to secure operational stability that was one of the important issues in the development of the platform. In addition, the performance of the platform could be improved by dualizing the storage for real-time navigation information. The implemented system was tested using real maritime data to check its performance, identify additional improvements, and consider its feasibility in a real VTS environment.

A Case Study on Implementing Microservice Architecture in Steel Manufacturing MES (철강 제조 MES의 마이크로서비스 아키텍처 적용 구축사례 연구)

  • Hoon Jeong;Jaekyoung Ahn
    • Journal of Information Technology Services
    • /
    • v.23 no.1
    • /
    • pp.37-53
    • /
    • 2024
  • Recently, the application of microservice architecture has been increasing as information systems have shifted to cloud environments. The purpose of this paper was to analyze the case of applying microservice architecture to MES in the manufacturing field, summarize the results of how it was applied in practice, and find out the effects of the application. Based on the improvement project by applying microservice architecture to the existing steel manufacturing MES, 11 principles of microservice application were derived through literature research, and the implementation process and results were summarized according to these principles. In addition, through a comparison of systems in the service industry and the manufacturing industry, we investigated why the application of microservices was more active in the service industry and whether the application in the manufacturing industry can be expected to have the same effect. We also evaluated the results and changes in the overall system after implementation. In particular, we analyzed the SR (Service Request) processing status of users' requests for system changes and operators' requests to see how much the lead time was reduced. The results showed that 8 out of 11 microservice application principles were properly implemented according to the principles, but the remaining 3 were not applicable due to practical difficulties and organizational circumstances. Despite not following all of the principles, the project was able to be implemented without any problems, and the most noticeable change as a result of the microservices architecture was that the lead time was reduced by 9 days compared to the previous system. This proves that it is possible to quickly adapt to customer requirements, and it also proves that the system is more flexible and scalable than the existing monolithic system.

Development of Abnormal Situation Managenet System in Process-centric Way for Enhancing Patient Safety (환자 안전 제고를 위한 프로세스 중심적인 이상상황 관리 시스템 개발)

  • Moon, Junho;Kim, Dongsoo
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.1
    • /
    • pp.89-97
    • /
    • 2014
  • As ubiquitous computing technologies have advanced rapidly, context awareness technology has been used in the medical part in order to improve patient safety. Nevertheless, as there is no method for managing context awareness information effectively and managing healthcare processes for handling abnormal situations systematically, it is highly required to enhance patient safety in hospital. We propose an innovative system to solve these problems. The proposed system has three main functionalities. Firstly, it enables all situations to be recognized in medical organizations. Secondly, it extracts the meaningful data from data flood by defining data patterns of recognized situations and designing a rule-based system. Lastly, it can manage patients' abnormal situations in process-centric way by integrating the business process management system. It is expected that the proposed system contributes to the improvement of patient safety in u-hospital.

Automatic Test Report Recording Program Design and Implementation for Integration Test (통합시험을 위한 자동 시험일지 작성프로그램 설계 및 구현)

  • Jeong, Younghwan;Song, Kyoungrok;Lee, Wonsik;Wi, Sounghyouk
    • KIISE Transactions on Computing Practices
    • /
    • v.24 no.1
    • /
    • pp.33-39
    • /
    • 2018
  • For the integration test in the current field of defense simulation, each actual equipment and simulator's logging information is automated. Although the event of the integrated test system is written in the test log, it is not automated, and relies on the operator's handwriting or file creation, resulting in ineffective aspects such as low-quality record content and repetition of the same content. In this study, we propose the automatic test report recording program that solves these problems. Automatic test report recording program uses framework-based technology to receive information from the test control computer and user to record a log of the test log. Automatic test report recording program allows the user to record the repeated test content in a stable manner. Additionally, even if the number of test operators is limited, the efficiency is improved so that we can fucus on the integration test.

A Study on the e-Government Interoperability Framework Based on IT life cycle and EA (정보화 생명주기 및 전사적아키텍처(EA) 기반의 전자정부 상호운용성 프레임워크 연구)

  • Kang, Dong-Seok;Shin, Shin-Ae;Jung, Seung-Ho;Choi, Young-Jin
    • The KIPS Transactions:PartD
    • /
    • v.16D no.2
    • /
    • pp.257-264
    • /
    • 2009
  • The purposes of e-Government are to connect government agencies without boundary, and to deliver better quality e-services to citizens. The frontier countries try to reach the e-Government goals using Government Interoperability Framework(GIF). Even though Korea also has interoperability regulations, that is obscure. So we have some limitations to take the e-Government interoperability advantages. This study analyzes the cases of advanced countries (EU, U.S., U.K., and Australia), and reviews Korea's regulations. After that, we suggest EA based Korean e-Government Interoperability Framework(K-GIF), that is to manage the interoperability from business to information technology over the whole IT life cycle.

Application of Deegree of Open Source Middleware to Geo-Portal Implementation (지오 포털 구축을 위한 공개 소스 미들웨어 Deegree의 적용)

  • Park, Yong-Jae;Lee, Ki-Won
    • Korean Journal of Remote Sensing
    • /
    • v.25 no.4
    • /
    • pp.367-374
    • /
    • 2009
  • Recently, new GIS applications such as gee portal and spatial data infrastructure are emerging. These are related to web computing techniques or methodologies based on web 2.0 paradigm, open API of portal, open source GIS, and international GIS standards which are independently on developing. The product of these applications can be realized in the linkage of those components. In this study, a case implementation concerning linkage with Google maps API and open source middleware named Deegree is carried out, and the results are discussed for open source uses in geo portal. Open source middleware supports various levels and types of OGC standards, so that it enables web publishing in the several web standard formats and data exchanges and interoperable uses between external database servers. Also the (unction extensions and the multi tier-based architecture within geo portal for specific purpose are possible.