• Title/Summary/Keyword: 프레임 신뢰도

Search Result 486, Processing Time 0.026 seconds

A Study on the Improvement of Security Threat Analysis and Response Technology by IoT Layer (IoT 계층별 보안위협 분석 및 대응기술 개선 방안 연구)

  • Won, Jong-Hyuk;Hong, Jung-Wan;You, Yen-Yoo
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.149-157
    • /
    • 2018
  • In this paper, we propose an attack detection technology using SDN Controller to study security threats in IoT environment. The research methodology has been developed by applying IoT security threat management technology to the IoT layer and analyzing the research trend of applied security technology. The study results show that the effectiveness of the detection method using the sampling method is studied by adding OpenFlow based SDN Controller to the network switch equipment of the existing IoT network. This method can detect the monitoring and attack of the whole network by interworking with IDS and IPS without affecting the performance of existing IoT devices. By applying such improved security threat countermeasure technology, we expect to be able to relieve anxiety of IoT security threat and increase service reliability.

Parallelization of Genome Sequence Data Pre-Processing on Big Data and HPC Framework (빅데이터 및 고성능컴퓨팅 프레임워크를 활용한 유전체 데이터 전처리 과정의 병렬화)

  • Byun, Eun-Kyu;Kwak, Jae-Hyuck;Mun, Jihyeob
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.10
    • /
    • pp.231-238
    • /
    • 2019
  • Analyzing next-generation genome sequencing data in a conventional way using single server may take several tens of hours depending on the data size. However, in order to cope with emergency situations where the results need to be known within a few hours, it is required to improve the performance of a single genome analysis. In this paper, we propose a parallelized method for pre-processing genome sequence data which can reduce the analysis time by utilizing the big data technology and the highperformance computing cluster which is connected to the high-speed network and shares the parallel file system. For the reliability of analytical data, we have chosen a strategy to parallelize the existing analytical tools and algorithms to the new environment. Parallelized processing, data distribution, and parallel merging techniques have been developed and performance improvements have been confirmed through experiments.

Intrinsic and Extrinsic Factors Affecting Use of Sharing Economy Services and the Moderating Effect of Benefits (공유경제 서비스 사용에 영향을 미치는 사용자의 내외적 요인과 이익의 조절효과)

  • Kim, Sanghyun;Park, Hyunsun;Lim, Jeongtaek
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.12
    • /
    • pp.482-491
    • /
    • 2020
  • This study proposed a research model based on self-determination theory and unified theory of acceptance and use of technology to explain the factors influencing intention to use sharing economy services. A total of 392 responses were collected, and structural equation analysis was performed with AMOS 22.0. The results are summarized as follows. First, self-technological aptness and trust had a positive effect on intention to use sharing economy services. Second, access bigger market and environmental friendliness had a positive effect on intention to use sharing economy services. Third, intention to use sharing economy services had a positive effect on actual usage of sharing economy services. Finally, benefits was found to strengthen the relationship between intention to use sharing economy services and actual usage of sharing economy services. The findings of this study would provide a theoretical framework for sharing economy services and important information for understanding individuals using the sharing economy services.

Design and Implementation of an Automatic Update System for Website Maintenance (웹사이트 유지보수를 위한 자동 업데이트 시스템의 설계 및 구현)

  • Hang, DaeHyeon;Yoo, JaeSoo
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.5
    • /
    • pp.129-138
    • /
    • 2021
  • Today we are getting a lot of information and various activities on our website through the internet. These websites are maintained by individuals or by website specialists. The basic method is to change the files that make up the running website. Changing the entire file in this process takes a long time and changes the files that do not need to be changed, so the efficiency is greatly reduced. When only the files that need to be changed are changed, it takes a lot of effort as a person must manually search each path to check the files and change the files one by one. To solve this problem, automatic distribution systems were developed. Additional resources and learning are required, resulting in additional cost, time and labor. Therefore, in this paper, we propose an automatic update system to minimize resource consumption by using the resources and technologies of the existing website. The proposed system does not require learning new skills. This aims to improve reliability and reduce time compared to human work.

Development of BSKT For Cultivating Tacit Knowledge Transfer (암묵지전이 활성화를 위한 BSKT(Brokering Systems for tacit Knowledge Transfer)개발)

  • Hong, Jong-Yi
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.1
    • /
    • pp.39-48
    • /
    • 2016
  • The tacit knowledge transfer cultivate the value and mount of tacit knowledge. The tacit knowledge transfer plays the most important role for improving the competitiveness of the organization. Despite the tacit knowledge transfer is very important, the research related with tacit knowledge transfer has not been actively carried out. The barriers to tacit knowledge transfer interfere with the tacit knowledge transfer. The barriers to tacit knowledge transfer are lack of understanding knowledge experts, heavy over-work, insufficient compensation, trust shortage and knowledge stickiness. In order to overcome the barrier of the tacit knowledge transfer, it is necessary to promote knowledge broker. The knowledge broker is the foundation for the tacit knowledge transfer and the critical success factor for efficient tacit knowledge transfer. However, most research related on the knowledge broker had focused on the degree, centrality and density of the knowledge network. The framework is needed to performance indicator for diagnosing the tacit knowledge transfer. Therefore, we suggest the knowledge broker framework based on the social network analysis.

A Study on the Decision Factors for AI-based SaMD Adoption Using Delphi Surveys and AHP Analysis (델파이 조사와 AHP 분석을 활용한 인공지능 기반 SaMD 도입 의사결정 요인에 관한 연구)

  • Byung-Oh Woo;Jay In Oh
    • The Journal of Bigdata
    • /
    • v.8 no.1
    • /
    • pp.111-129
    • /
    • 2023
  • With the diffusion of digital innovation, the adoption of innovative medical technologies based on artificial intelligence is increasing in the medical field. This is driving the launch and adoption of AI-based SaMD(Software as a Medical Device), but there is a lack of research on the factors that influence the adoption of SaMD by medical institutions. The purpose of this study is to identify key factors that influence medical institutions' decisions to adopt AI-based SaMDs, and to analyze the weights and priorities of these factors. For this purpose, we conducted Delphi surveys based on the results of literature studies on technology acceptance models in healthcare industry, medical AI and SaMD, and developed a research model by combining HOTE(Human, Organization, Technology and Environment) framework and HABIO(Holistic Approach {Business, Information, Organizational}) framework. Based on the research model with 5 main criteria and 22 sub-criteria, we conducted an AHP(Analytical Hierarchy Process) analysis among the experts from domestic medical institutions and SaMD providers to empirically analyze SaMD adoption factors. The results of this study showed that the priority of the main criteria for determining the adoption of AI-based SaMD was in the order of technical factors, economic factors, human factors, organizational factors, and environmental factors. The priority of sub-criteria was in the order of reliability, cost reduction, medical staff's acceptance, safety, top management's support, security, and licensing & regulatory levels. Specifically, technical factors such as reliability, safety, and security were found to be the most important factors for SaMD adoption. In addition, the comparisons and analyses of the weights and priorities of each group showed that the weights and priorities of SaMD adoption factors varied by type of institution, type of medical institution, and type of job in the medical institution.

Development of Industrial Embedded System Platform (산업용 임베디드 시스템 플랫폼 개발)

  • Kim, Dae-Nam;Kim, Kyo-Sun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.5
    • /
    • pp.50-60
    • /
    • 2010
  • For the last half a century, the personal computer and software industries have been prosperous due to the incessant evolution of computer systems. In the 21st century, the embedded system market has greatly increased as the market shifted to the mobile gadget field. While a lot of multimedia gadgets such as mobile phone, navigation system, PMP, etc. are pouring into the market, most industrial control systems still rely on 8-bit micro-controllers and simple application software techniques. Unfortunately, the technological barrier which requires additional investment and higher quality manpower to overcome, and the business risks which come from the uncertainty of the market growth and the competitiveness of the resulting products have prevented the companies in the industry from taking advantage of such fancy technologies. However, high performance, low-power and low-cost hardware and software platforms will enable their high-technology products to be developed and recognized by potential clients in the future. This paper presents such a platform for industrial embedded systems. The platform was designed based on Telechips TCC8300 multimedia processor which embedded a variety of parallel hardware for the implementation of multimedia functions. And open-source Embedded Linux, TinyX and GTK+ are used for implementation of GUI to minimize technology costs. In order to estimate the expected performance and power consumption, the performance improvement and the power consumption due to each of enabled hardware sub-systems including YUV2RGB frame converter are measured. An analytic model was devised to check the feasibility of a new application and trade off its performance and power consumption. The validity of the model has been confirmed by implementing a real target system. The cost can be further mitigated by using the hardware parts which are being used for mass production products mostly in the cell-phone market.

Development of a Passive Infrared Detector Algorithm for the Stop-line Detector of a Signalized Intersection (신호교차로의 정지선 검지기를 위한 수동형 적외선 검지기 알고리즘 개발(점유시간을 중심으로))

  • Jeong Sok-Min;Lee Seung-Hwan;Kim Nam-Sun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.2 no.1 s.2
    • /
    • pp.25-40
    • /
    • 2003
  • The purpose of this thesis is development of detection algorithm for stop-line detector. Detail detection area is set in basing detection area($1.8{\times}4.0m$) and traffic information(volume, occupancy, nonoccupancy) is collected by passive infrared detector at designing detection area. The basis detection area($1.8{\times}4.0m$) is named existing PIR and detection area applied on development algorithm is named proposal PIR. The proposal PIR is collected data such volume, occupancy, nonoccupancy, speed and lane change, but this thesis is limited to evaluate for volume, occupancy and nonoccupancy The procedure and each step of being developed algorithm is described in the next (1) The detection area of proposal PIR is made up of 2 of $1.8{\times}0.6m$ size(the detection area is named 1 and 3) and 1 of $1.8{\times}1.78m$ size(the detection area is named 2) (2) The image detection area is set on monitor to analyze outdoor photographing data then video frame analysis has been done by analyzer. (3) The occupancy, nonoccupancy and speed data of vehicle have been collected with the detection area 1 and 3 and lane change has been collected with combination of detection area 1, 2 and 3 The MAD and MAPE have been utilized to being compared with volume, occupancy and nonoccupancy for the field application and evaluation of a algorithm As the result, the proposal PIR data have been identified superior to the existing PIR data and the effect has been improved its information(volume, occupancy and nonoccupancy)

  • PDF

Computer Assisted EPID Analysis of Breast Intrafractional and Interfractional Positioning Error (유방암 방사선치료에 있어 치료도중 및 분할치료 간 위치오차에 대한 전자포탈영상의 컴퓨터를 이용한 자동 분석)

  • Sohn Jason W.;Mansur David B.;Monroe James I.;Drzymala Robert E.;Jin Ho-Sang;Suh Tae-Suk;Dempsey James F.;Klein Eric E.
    • Progress in Medical Physics
    • /
    • v.17 no.1
    • /
    • pp.24-31
    • /
    • 2006
  • Automated analysis software was developed to measure the magnitude of the intrafractional and interfractional errors during breast radiation treatments. Error analysis results are important for determining suitable planning target volumes (PTV) prior to Implementing breast-conserving 3-D conformal radiation treatment (CRT). The electrical portal imaging device (EPID) used for this study was a Portal Vision LC250 liquid-filled ionization detector (fast frame-averaging mode, 1.4 frames per second, 256X256 pixels). Twelve patients were imaged for a minimum of 7 treatment days. During each treatment day, an average of 8 to 9 images per field were acquired (dose rate of 400 MU/minute). We developed automated image analysis software to quantitatively analyze 2,931 images (encompassing 720 measurements). Standard deviations ($\sigma$) of intrafractional (breathing motion) and intefractional (setup uncertainty) errors were calculated. The PTV margin to include the clinical target volume (CTV) with 95% confidence level was calculated as $2\;(1.96\;{\sigma})$. To compensate for intra-fractional error (mainly due to breathing motion) the required PTV margin ranged from 2 mm to 4 mm. However, PTV margins compensating for intefractional error ranged from 7 mm to 31 mm. The total average error observed for 12 patients was 17 mm. The intefractional setup error ranged from 2 to 15 times larger than intrafractional errors associated with breathing motion. Prior to 3-D conformal radiation treatment or IMRT breast treatment, the magnitude of setup errors must be measured and properly incorporated into the PTV. To reduce large PTVs for breast IMRT or 3-D CRT, an image-guided system would be extremely valuable, if not required. EPID systems should incorporate automated analysis software as described in this report to process and take advantage of the large numbers of EPID images available for error analysis which will help Individual clinics arrive at an appropriate PTV for their practice. Such systems can also provide valuable patient monitoring information with minimal effort.

  • PDF

CIA-Level Driven Secure SDLC Framework for Integrating Security into SDLC Process (CIA-Level 기반 보안내재화 개발 프레임워크)

  • Kang, Sooyoung;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.909-928
    • /
    • 2020
  • From the early 1970s, the US government began to recognize that penetration testing could not assure the security quality of products. Results of penetration testing such as identified vulnerabilities and faults can be varied depending on the capabilities of the team. In other words none of penetration team can assure that "vulnerabilities are not found" is not equal to "product does not have any vulnerabilities". So the U.S. government realized that in order to improve the security quality of products, the development process itself should be managed systematically and strictly. Therefore, the US government began to publish various standards related to the development methodology and evaluation procurement system embedding "security-by-design" concept from the 1980s. Security-by-design means reducing product's complexity by considering security from the initial phase of development lifecycle such as the product requirements analysis and design phase to achieve trustworthiness of product ultimately. Since then, the security-by-design concept has been spread to the private sector since 2002 in the name of Secure SDLC by Microsoft and IBM, and is currently being used in various fields such as automotive and advanced weapon systems. However, the problem is that it is not easy to implement in the actual field because the standard or guidelines related to Secure SDLC contain only abstract and declarative contents. Therefore, in this paper, we present the new framework in order to specify the level of Secure SDLC desired by enterprises. Our proposed CIA (functional Correctness, safety Integrity, security Assurance)-level-based security-by-design framework combines the evidence-based security approach with the existing Secure SDLC. Using our methodology, first we can quantitatively show gap of Secure SDLC process level between competitor and the company. Second, it is very useful when you want to build Secure SDLC in the actual field because you can easily derive detailed activities and documents to build the desired level of Secure SDLC.