• Title/Summary/Keyword: 통신장애

Search Result 898, Processing Time 0.024 seconds

Availability Analysis of Systems with Time-Based Software Rejuvenation (시간 기반 소프트웨어 재활 방식의 가용도 분석)

  • Lee, Yutae;Kim, Hyoungseok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.201-206
    • /
    • 2019
  • Rejuvenating a system periodically during the most idle time of the system reduces unexpected downtime caused by software aging and increases its availability. In general, software rejuvenation can be largely divided into two broad categories: time-based rejuvenation policy and condition-based rejuvenation policy. In time-based rejuvenation policy the software rejuvenation is triggered at scheduled time epochs with fixed time intervals, while in condition-based rejuvenation policy the software rejuvenation is performed when system state is checked to satisfy a specific condition. Conditionbased policy adds extra cost to the system due to system monitoring and aging estimation. This paper presents a stochastic model for analyzing time-based software rejuvenation mechanism, where the rejuvenation is triggered at scheduled time epochs with fixed time intervals, and provides an analytical solution for the steady-state availability, the user-perceived availability, and the corresponding cost.

Detection of Crosswalk for the Walking Guide of the Blind People (시각장애인 보행 안내를 위한 횡단보도 검출 및 방향 판단)

  • Kim, Seon-il;Jeong, Yu-Jin;Lee, Dong-Hee;Jung, Kyeong-Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.45-48
    • /
    • 2019
  • Detection of crosswalk is an important issue for the blind to walk without the help of others. There is a braille block on the sidewalk, which helps the blind to walk. On the other hand, crosswalk is more dangerous due to the moving vehicles. However, there is no appropriate means to induce the blind. In this paper, we propose a method to detect crosswalk in front of a blind and estimate its direction using an image sensor. We adopt multi-ROIs and make their binary versions. In order to determine whether it is a crosswalk, two features are extracted; one is the number of crossing in the binary image and the other is the ratio of white area. We can also estimate the direction of the crosswalk through the slope of the projection data. We evaluated the performance using experimental dataset and the proposed algorithm showed 80% accuracy of detection.

  • PDF

Data Availability Zone for backup system in Cloud computing service (클라우드 컴퓨팅 서비스 백업을 위한 데이터 가용영역 방법론)

  • Park, Young-ho;Park, Yongsuk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.366-369
    • /
    • 2014
  • Recently been viewed as a core technology of the IT industry, cloud computing services. It is expected that the market for cloud services industry showed a growth rate of 18.9% annually, to form a scale of $ 1,330 billion dollars in 2013, and to form a 1,768 billion dollars in 2015. Growth of cloud computing services industry, provides the operational efficiency and reduce costs for many companies, but the risks associated with it is also increasing. There is a problem that phenomenon is to lose control of the data on features of the cloud service, more data is gathered in one place, when a failure occurs, it is removed simultaneously the data of all devices. therefore, in the present paper is investigate the area a quick recovery with up to the problem and secure data storage INT the cloud computing service is available in only the data in the cloud service possible.

  • PDF

Energy saving control system of wireless base station utilizing natural air-conditioning (자연공조를 활용한 무선기지국 Energy절감 제어시스템)

  • Ryu, Gu-Hwan;Kwon, Chang-Hee
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.223-232
    • /
    • 2019
  • With the development of the information communication industry, the size of the communication device has been reduced to a system that generates a large amount of heat. Therefore, since the amount of heat generated by the wireless equipment is large in the wireless base station, the energy consumption is continuously consumed and the failure of the wireless base station may occur. Therefore, in this study, The study was analyzed. As a research method, we performed base station with a lot of calorific value and electric charge. We selected 25 base stations and obtained data for two weeks. To ensure reliability, the room temperature was kept constant at $27^{\circ}C$, and the control system was installed and equiped for two weeks to obtain the date analysis. In order to calculate the test results in the study method, the instrument was used with a computer, a digital thermometer, and dust measurement. For the date analysis, we conducted a research study on 25 wireless basestations before and after the installation of Control Sysetm.

Segmentation of Intima/Adventitia of IVUS Image using Fuzzy Binarization (퍼지 이진화를 이용한 IVUS 영상의 내막/외막 분할)

  • Kim, Kwang Baek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1514-1519
    • /
    • 2019
  • IVUS is an intra-operative imaging modality that facilitates observing and appraising the vessel wall structure of the human coronary arteries. IVUS is regularly used to locate the atherosclerosis lesions in the coronary arteries. Auto-segmentation of the vessel structure is important to detect the disorder of coronary artery. In this paper, we propose a simple strategy to extract Intima/Adventitia area effectively using fuzzy binarization from intravascular images. The proposed method apply fuzzy binarization to find the adventitia but apply average binarization to locate the intima since they have different homogeneity of pixel intensity comparing with the environment. In this paper, we demonstrate an effective auto-segmentation method for detecting the interior/exterior of the vessel walls by differentiating the fuzzy binarization result and average binarization result from IVUS image. Important statistics such as Intima-Media Thickness (IMT) or volume of a target area can be easily computed from result.

Novelty Detection on Web-server Log Dataset (웹서버 로그 데이터의 이상상태 탐지 기법)

  • Lee, Hwaseong;Kim, Ki Su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1311-1319
    • /
    • 2019
  • Currently, the web environment is a commonly used area for sharing information and conducting business. It is becoming an attack point for external hacking targeting on personal information leakage or system failure. Conventional signature-based detection is used in cyber threat but signature-based detection has a limitation that it is difficult to detect the pattern when it is changed like polymorphism. In particular, injection attack is known to the most critical security risks based on web vulnerabilities and various variants are possible at any time. In this paper, we propose a novelty detection technique to detect abnormal state that deviates from the normal state on web-server log dataset(WSLD). The proposed method is a machine learning-based technique to detect a minor anomalous data that tends to be different from a large number of normal data after replacing strings in web-server log dataset with vectors using machine learning-based embedding algorithm.

Network separation construction method using network virtualization (네트워크 가상화를 이용한 망 분리 구축 방법)

  • Hwang, Seong-Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.8
    • /
    • pp.1071-1076
    • /
    • 2020
  • The importance of network separation is due to the use of the Internet with existing business PCs, resulting in an internal information leakage event, and an environment configured to allow servers to access the Internet, which causes service failures with malicious code. In order to overcome this problem, it is necessary to use network virtualization to separate networks and network interconnection systems. Therefore, in this study, the construction area was constructed into the network area for the Internet and the server farm area for the virtualization system, and then classified and constructed into the security system area and the data link system area between networks. In order to prove the excellence of the proposed method, a network separation construction study using network virtualization was conducted based on the basis of VM Density's conservative estimates of program loads and LOBs.

A Study on Application of Autonomous Traffic Information Based on Artificial Intelligence (인공지능 기반의 자율형 교통정보 응용에 대한 연구)

  • Oh, Am-Suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.6
    • /
    • pp.827-833
    • /
    • 2022
  • This study aims to prevent secondary traffic accidents with high severity by overcoming the limitations of existing traffic information collection systems through analysis of traffic information collection detectors and various algorithms used to detect unexpected situations. In other words, this study is meaningful present that analyzing the 'unexpected situation that causes secondary traffic accidents' and 'Existing traffic information collection system' accordingly presenting a solution that can preemptively prevent secondary traffic accidents, intelligent traffic information collection system that enables accurate information collection on all sections of the road. As a result of the experiment, the reliability of data transmission reached 97% based on 95%, the data transmission speed averaged 209ms based on 1000ms, and the network failover time achieved targets of 50sec based on 120sec.

Improvement of Navigation System for Visually Impaired using Smart Watch Vibration and Safety Route First Algorithm (스마트워치의 진동과 안전 경로 우선 알고리즘을 이용한 시각 장애인 길 안내 시스템의 개선)

  • Kitae, Hwang;Seo, Young-Shin;Seul-Ah, Lim;Han-Byeol, Lee;In-Hwan, Jung;Jae-Moon, Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.1
    • /
    • pp.117-122
    • /
    • 2023
  • This paper introduces the improved and expanded contents of the previous research that implemented a system that guides the visually impaired using the vibration of a smart watch. In the previous study, we proposed an algorithm that recommends the most safe route based on calculating negative and positive values for the topography of the route and the features installed on the route. In addition, by designing several vibration patterns, a system that guides the user through vibration was proposed and implemented. In this paper, the user's personal preferences are reflected in the algorithm that recommends the safe route first. In addition, an automatic feedback function was added to the algorithm so that the user's satisfaction evaluation on the recommended route was immediately reflected. A history simulation function was added so that the past route could be reviewed, and the compass of a smart watch was used to help visually impaired people find directions at junctions.

Smart Safety Stick for Transportation Vulnerable using IoT Technology (IoT 기술을 적용한 교통약자용 스마트 안전스틱 설계)

  • Hee-Joo, Park;Myung-Jae, Lim;Won-Mo, Gal
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.1
    • /
    • pp.177-182
    • /
    • 2023
  • The Act on the Promotion of Mobility for the Transportation Vulnerable stipulates that the transportation vulnerable should be able to enjoy convenience when using public transportation. However, this law is not being implemented properly enough to bring up a petition saying, "Please allow the visually impaired to take a bus." Even if you try to use a call taxi for the disabled instead of public transportation, you have to apply and wait two to three hours. Therefore, this paper aims to design and implement systems for the vulnerable and their guardians, such as increasing the opening time of the ticket gate more than usual if the cane rings a notification on the bus and subway station designated using Bluetooth. Accordingly, it is expected to bring about effects such as the availability of public transportation, economic savings, safety guarantees, and prevention of missing children for the vulnerable.