• Title/Summary/Keyword: 통합 프레임워크

Search Result 682, Processing Time 0.031 seconds

Efficient Representation of Pore Flow, Absorption, Emission and Diffusion using GPU-Accelerated Cloth-Liquid Interaction

  • Jong-Hyun Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.23-29
    • /
    • 2024
  • In this paper, we propose a fast GPU-based method for representing pore flow, absorption, emission, and diffusion effects represented by cloth-liquid interactions using smoothed particle hydrodynamics (SPH), a particle-based fluid solver: 1) a unified framework for GPU-based representation of various physical effects represented by cloth-liquid interactions; 2) a method for efficiently calculating the saturation of a node based on SPH and transferring it to the surrounding porous particles; 3) a method for improving the stability based on Darcy's law to reliably calculate the direction of fluid absorption and release; 4) a method for controlling the amount of fluid absorbed by the porous particles according to the direction of flow; and finally, 5) a method for releasing the SPH particles without exceeding their maximum mass. The main advantage of the proposed method is that all computations are computed and run on the GPU, allowing us to quickly model porous materials, porous flows, absorption, reflection, diffusion, etc. represented by the interaction of cloth and fluid.

Reinforcement Learning-Based Resource exhaustion attack detection and response in Kubernetes (쿠버네티스 환경에서의 강화학습 기반 자원 고갈 탐지 및 대응 기술에 관한 연구)

  • Ri-Yeong Kim;Seongmin Kim
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.81-89
    • /
    • 2023
  • Kubernetes is a representative open-source software for container orchestration, playing a crucial role in monitoring and managing resources allocated to containers. As container environments become prevalent, security threats targeting containers continue to rise, with resource exhaustion attacks being a prominent example. These attacks involve distributing malicious crypto-mining software in containerized form to hijack computing resources, thereby affecting the operation of the host and other containers that share resources. Previous research has focused on detecting resource depletion attacks, so technology to respond when attacks occur is lacking. This paper proposes a reinforcement learning-based dynamic resource management framework for detecting and responding to resource exhaustion attacks and malicious containers running in Kubernetes environments. To achieve this, we define the environment's state, actions, and rewards from the perspective of responding to resource exhaustion attacks using reinforcement learning. It is expected that the proposed methodology will contribute to establishing a robust defense against resource exhaustion attacks in container environments

Cascade Fusion-Based Multi-Scale Enhancement of Thermal Image (캐스케이드 융합 기반 다중 스케일 열화상 향상 기법)

  • Kyung-Jae Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.301-307
    • /
    • 2024
  • This study introduces a novel cascade fusion architecture aimed at enhancing thermal images across various scale conditions. The processing of thermal images at multiple scales has been challenging due to the limitations of existing methods that are designed for specific scales. To overcome these limitations, this paper proposes a unified framework that utilizes cascade feature fusion to effectively learn multi-scale representations. Confidence maps from different image scales are fused in a cascaded manner, enabling scale-invariant learning. The architecture comprises end-to-end trained convolutional neural networks to enhance image quality by reinforcing mutual scale dependencies. Experimental results indicate that the proposed technique outperforms existing methods in multi-scale thermal image enhancement. Performance evaluation results are provided, demonstrating consistent improvements in image quality metrics. The cascade fusion design facilitates robust generalization across scales and efficient learning of cross-scale representations.

Development of Framework for Compliance with Vehicle Cybersecurity Regulations: Cybersecurity Requirement Finder (차량 사이버보안 법규 준수를 위한 프레임워크 개발: Cybersecurity Requirement Finder)

  • Jun hee Oh;Yun keun Song;Kyung rok Park;Hyuk Kwon;Samuel Woo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.6
    • /
    • pp.299-312
    • /
    • 2023
  • Recently, the electronic control unit (ECU) has been integrating several functions into one beyond simple convenience functions. Accordingly, ECUs have more functions and external interfaces than before, and various cybersecurity problems are arising. The United Nations Economic Commission for Europe (UNECE) World Forum for Harmonization of Vehicle Regulations (WP.29) issued UN Regulation No.155 to establish international standards for vehicle cybersecurity management systems in light of the growing threats to vehicle cybersecurity. According to international standards, vehicle manufacturers are required to establish a Cybersecurity Management System (CSMS) and receive a Vehicle Type Approval (VTA). However, opinions were raised that the implementation period should be adjusted because domestic preparations for this are insufficient. Therefore, in this paper, we propose a web-based solution that maps a checklist to check the status of CSMS in the requirement and various vehicle security companies and solutions to mitigate the identified gap.

Trends in Cryptocurrency Custody Services and Evaluation Guidelines for DeFi Protocols' Custody Poten (가상자산 커스터디 서비스의 최신 동향 및 DeFi 프로토콜 커스터디 가능성 평가 가이드라인 제시)

  • Hyunggeun Lee;Moonho Joo;Jihun Lim;Beomjoong Kim;Kiseok Jeon;Junsik Sim;Junghee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.811-831
    • /
    • 2024
  • This paper has two main objectives. The primary objective is to conduct a comprehensive review of existing survey papers on the advantages, disadvantages, taxonomy, and technical vulnerabilities of cryptocurrency custody services. Additionally, we examined recent regulatory developments, the application of existing frameworks, conditions for performing custody services, and service providers' obligations. The secondary objective is to identify DeFi protocols in the regulatory 'grey area' and analyze their technical aspects and governance mechanisms. By synthesizing these findings, we propose guidelines for assessing DeFi decentralization and their potential for integration within the regulatory framework, providing insights for industry experts, regulators, and policymakers to balance industry needs with societal benefits.

Joint Bandwidth Allocation and Path Selection Scheme for Uplink Transmission in IEEE 802.16j Networks with Cooperative Relays (협력 중계를 이용한 IEEE 802.16j 네트워크를 위한 상향 링크에서의 통합 대역 할당 및 경로 선택 기법)

  • Hwang, Ho-Young;Lee, Hyuk-Joon;Jeong, In-Gun;Jung, In-Sung;Roh, Bong-Soo;Park, Gui-Soon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.1
    • /
    • pp.64-77
    • /
    • 2013
  • In this paper, we propose a joint bandwidth allocation and path selection scheme for IEEE 802.16j networks in uplink with cooperative relaying, and we evaluate the performance of the proposed scheme by using OPNET based simulation in hilly terrain with heavy tree density. The proposed scheme maximizes the system throughput in uplink with cooperative relaying in IEEE 802.16j networks. Then, we transform the proposed scheme into multi-dimensional multiple choice knapsack problem (MMKP) based scheme. We also propose uplink throughput maximization scheme and MMKP based scheme without cooperative relaying. We show that the system throughput of the proposed MMKP based scheme is higher than that of link quality based scheme, and cooperative relaying provides higher system throughput than the conventional case without cooperative relaying in uplink.

A Study on the Integration Check Framework Development of SaaS Adoption for the Cost Estimation (SaaS 도입 시 예산추정을 위한 통합점검프레임워크 개발에 관한 연구)

  • Yoon, Seong-Jeong;Kim, In-Hwan;Kim, Min-Yong
    • Journal of Information Technology Services
    • /
    • v.12 no.3
    • /
    • pp.345-377
    • /
    • 2013
  • Government agencies have many difficulties for the information system development and operation. One of the difficulties is a budget estimation. Each government agency suggests individually different estimation for the personnel expenses and IT infrastructure adoption costs in the same field of informatization promotions. The other one is the operation costs are increased exponentially in every year[42, 51]. Those difficulties make government agencies can not help adopting SaaS. In fact, most of IT consulting company and government agencies already recognized a variety of SaaS advantages. The most typical SaaS's advantages are cost reduction, Software rapid development and deployment. However, once government agencies decide to adopt SaaS, they can not avoid many problems and difficulties. There is no information in a detailed item in a budget. In those kinds of situation, there is no choice whether government agencies accept SaaS provider's suggesting adoption costs or not. Thus, we provide a sheet of SaaS adoption cost estimation to government agencies. To know the cost factors, this study uses TCO(Total Cost of Ownership)'s criteria. To give a management point, this study uses Gartner's Application development Life Cycle. In this study, the integration check framework which is SaaS adoption cost estimation makes government agencies possible to establish a adequate budget.

Plossom : Web-based Project Management System Using Spring Boot (Plossom : Spring Boot를 활용한 웹 기반 프로젝트 관리 시스템)

  • Lee, Han Seong;Jo, Bo Hyun;Kim, Hui Jung;Shin, Ji Yeong;Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.3
    • /
    • pp.17-24
    • /
    • 2016
  • In this paper, we developed web based Plossom system, an efficient and convenient project management system. The development of Plossom consists of a web page using HTML and Bootstrap framework, and the logic is built using the algorithm suitable for web page by using JQuery. Additionally, Plossom is implemented to support interoperability with external system by using Spring's Thymeleaf and MySQL efficiently. The Plossom system developed in this study is expected to be very useful in the development process of IOT and ICT related projects.

Design and Implementation of Distributed Object Framework Supporting Audio/Video Streaming (오디오/비디오 스트리밍을 지원하는 분산 객체 프레임 워크 설계 및 구현)

  • Ban, Deok-Hun;Kim, Dong-Seong;Park, Yeon-Sang;Lee, Heon-Ju
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.4
    • /
    • pp.440-448
    • /
    • 1999
  • 본 논문은 객체지향형 분산처리 환경 하에서 오디오나 비디오 등과 같은 실시간(real-time) 스트림(stream) 데이타를 처리하는 데 필요한 소프트웨어 기반구조를 설계하고 구현한 내용을 기술한다. 본 논문에서 제시한 DAViS(Distributed Object Framework supporting Audio/Video Streaming)는, 오디오/비디오 데이타의 처리와 관련된 여러 소프트웨어 구성요소들을 분산객체로 추상화하고, 그 객체들간의 제어정보 교환경로와 오디오/비디오 데이타 전송경로를 서로 분리하여 처리한다. 분산응용프로그램 작성자는 DAViS에서 제공하는 서비스들을 이용하여, 기존의 분산프로그래밍 환경이 제공하는 것과 동일한 수준에서 오디오/비디오 데이타에 대한 처리를 표현할 수 있다. DAViS는, 새로운 형식의 오디오/비디오 데이타를 처리하는 부분을 손쉽게 통합하고, 하부 네트워크의 전송기술이나 컴퓨터시스템 관련 기술의 진보를 신속하고 자연스럽게 수용할 수 있도록 하는 유연한 구조를 가지고 있다. Abstract This paper describes the design and implementation of software framework which supports the processing of real-time stream data like audio and video in distributed object-oriented computing environment. DAViS(Distributed Object Framework supporting Audio/Video Streaming), proposed in this paper, abstracts software components concerning the processing of audio/video data as distributed objects and separates the transmission path of data between them from that of control information. Based on DAViS, distributed applications can be written in the same abstract level as is provided by the existing distributed environment in handling audio/video data. DAViS has a flexible internal structure enough to easily incorporate new types of audio/video data and to rapidly accommodate the progress of underlying network and computer system technology with very little modifications.

A Study on UICC(Universal IC Card)-based Authentication Mechanism using OTP (OTP를 활용한 UICC(Universal IC Card) 기반의 인증 메커니즘에 관한 연구)

  • Kang, Soo-Young;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.21-31
    • /
    • 2008
  • Ubiquitous environment is constructed by development of an IT technology, offer environment of many service changed to mobile environment. Also, existed service offered at fixed position like home or company, but according to development of mobile device. user require service as moving. Wibro can offer as user moving using mobile device. As requirement should be included authentication, in case of authentication between UICC and AAA authentication server is offered in Wibro, service is available. However, when UICC requires initial authentication to AAA authentication server, identification information of UICC expose as plaintext, so privacy infringement of mobile device occurs. Therefore, identification information of terminal generate randomly using OTP(One-Time Password) that generated in mobile terminal, and we proposed mechanism of privacy protection. Also, we proposed mechanism that offer secure service to user as offer authentication from OTP framework, and offer OTP combination authentication detailedly.