• Title/Summary/Keyword: Auto Service

Search Result 219, Processing Time 0.027 seconds

The Design and Implementation of RISE for Managing a Large Scale Cluster in Distributed Environment (분산 환경의 대규모 클러스터를 관리하기 위한 RISE 시스템의 설계 및 구현)

  • Park Doo-Sik;Yang Woo-Jin;Ban Min-Ho;Jeong Karp-Joo;Lee Jong-Hyun;Lee Sang-Moon;Lee Chang-Sung;Shin Soon-Churl;Lee In-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.7
    • /
    • pp.421-428
    • /
    • 2006
  • In this paper, the way of remote installation and back-up of 3-tier structure is introduced for efficient utilizing the cluster system resources distributed at several places. Recently, cluster system is constructed as the system of over hundreds nodes under complex network system mixed with public networks and private networks. Therefore, the as installation method suitable for the large scale cluster system and the remote recovery of failure nodes are important. However the previous researches which are based on 2-tier architecture may not provide the efficient cluster installation and image back-up method when the network of cluster system is composed of several private networks and public networks. In this paper, RISE (Remote Installation Service and Environment) based on the 3-tier architecture is proposed to solve this problem. In our approach, the managing node's role is divided into the global master node (GRISE) and the local master node (LRISE) to provide the efficient initial system deployment and remote failure recovery of distributed cluster system under the various network systems. Also, LRISE's availability is ensured under the complex network environments by adopting the auto-synchronization mechanism between GRISE and LRISE. In this work, a 64-node cluster system with gigabit network system is utilized for the experiment. From the experimental result, the system image with 1.86GB data can be obtained in 5 minutes and 53 seconds and the image-based installation of 64-node system can be carried out in 17 minutes and 53 seconds.

An Auto-Verification Method of Security Events Based on Empirical Analysis for Advanced Security Monitoring and Response (보안관제 효율성 제고를 위한 실증적 분석 기반 보안이벤트 자동검증 방법)

  • Kim, Kyu-Il;Park, Hark-Soo;Choi, Ji-Yeon;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.507-522
    • /
    • 2014
  • Domestic CERTs are carrying out monitoring and response against cyber attacks using security devices(e.g., IDS, TMS, etc) based on signatures. Particularly, in case of public and research institutes, about 30 security monitoring and response centers are being operated under National Cyber Security Center(NCSC) of National Intelligence Service(NIS). They are mainly using Threat Management System(TMS) for providing security monitoring and response service. Since TMS raises a large amount of security events and most of them are not related to real cyber attacks, security analyst who carries out the security monitoring and response suffers from analyzing all the TMS events and finding out real cyber attacks from them. Also, since the security monitoring and response tasks depend on security analyst's know-how, there is a fatal problem in that they tend to focus on analyzing specific security events, so that it is unable to analyze and respond unknown cyber attacks. Therefore, we propose automated verification method of security events based on their empirical analysis to improve performance of security monitoring and response.

A Longitudinal Causal Rrelationship Study on the Elderly's Assets, Depression and Llife Satisfaction: : The Application of Autoregressive Cross-lagged Model (노인의 자산과 우울 및 삶의 만족 간의 종단적 인과관계: 자기회귀교차지연모형의 적용)

  • Lee, Hyoung-Ha
    • Journal of Digital Convergence
    • /
    • v.18 no.6
    • /
    • pp.513-522
    • /
    • 2020
  • The purpose of this study is to analyze the auto-regression effect between the elderly's assets and depression and life satisfaction, and to approach the influence of assets and depression on the elderly's life from a longitudinal perspective. For this purpose, the data for the 9th year (2014), 11th year (2016), and 13th year (2018) of the Korea Welfare Panel were used. As a result of the analysis, First, the assets, depression and life satisfaction of the elderly have a lasting effect on the passage of time, and the assets, depression and life satisfaction of the previous point in time (B=.694, B=.725, p<.001), depression (B=.258, B=.331 and p<.001) and life satisfaction (B=.264, B=.265, p<.001). Second, cross-recursion coefficients show how the relationship between the assets of the elderly and depression and the satisfaction of life affects each other over time, and the assets of the older person at the previous point in time (B=.010, B=.011, p<.001), the assets of the older persons at previous times are subsequently satisfied with their lives (B=.128, B=.124, p<.001). Based on the results of the above analysis, it is necessary to support the elderly's asset management service and education to prevent depression, such as continuous asset utilization education.

Evaluation of Benzoic Acid Level of Fermented Dairy Products during Fermentation (발효과정에서 생성되는 발효유제품의 안식향산 함량 수준 평가)

  • Lim, Sang-Dong;Park, Mi-Sun;Kim, Kee-Sung;Yoo, Mi-Young
    • Food Science of Animal Resources
    • /
    • v.33 no.5
    • /
    • pp.640-645
    • /
    • 2013
  • The purpose of this study was to utilize the results as a basic data of benzoic acids in animal products that didn't mention in the quality standard of National Veterinary Research and Quarantine Service (NVRQS) to solve the conflict of international trade and administration. Set-Pak method listed in the quality standard of NVRQS, faster than auto distillation methods with same recovery selected as a pre treatment for the determination of benzoic acid. The regression curve of benzoic acid with Sep-Pak method was linear with the $R^2$ value of 0.999 and the limit of detection (LOD) and limit of quantitation (LOQ) was 0.058 mg/kg and 0.176 mg/kg, respectively. The benzoic acid in the fermented milk was detected after the fermentation stage by addition of starter culture with the level of 2.28~10.48 mg/kg and 0~16.5 mg/kg in the commercial fermented milk products without detection by the addition of syrup. In case of cheese products, the benzoic acids level was influenced by the curd formation (Camembert cheese) and the quality of natural cheese (processed cheese), by the way, the benzoic acid level of commercial natural cheese was 0~4.2 mg/kg, processed cheese was 0~20.8 mg/kg, respectively. Based on this result, it may be possible to utilize as a basic data for the systematic control the level of natural benzoic acids in raw material, processing and final products of animal origin.

Intermediate Depth Image Generation using Disparity Increment of Stereo Depth Images (스테레오 깊이영상의 변위증분을 이용한 중간시점 깊이영상 생성)

  • Koo, Ja-Myung;Seo, Young-Ho;Choi, Hyun-Jun;Yoo, Ji-Sang;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.17 no.2
    • /
    • pp.363-373
    • /
    • 2012
  • This paper proposes a method to generate a depth image at an arbitrary intermediate view-point, which is targeting a video service for free-view, auto-stereoscopy, holography, etc. It assumes that the leftmost and the rightmost depth images are given and they both have been camera-calibrated and image-rectified. This method calculates and uses a disparity increment per depth value. In this paper, it is obtained by stereo matching for the given two depth image by considering more general cases. The disparity increment is used to find the location in the intermediate view-point depth image (IVPD) for each depth in the given images. Thus, this paper finds two IVPDs, from left image and from right image. Noises are removed and holes are filled in each IVPDs and the two results are combined to get the final IVPD. The proposed method was implemented and applied to several test sequences. The results revealed that the quality of the generated IVPD corresponds to 33.84dB of PSNR in average and it takes about 1 second to generate a HD IVPD. We evaluate that this image quality is quite good by considering the low correspondency among the left images, intermediate images, and the right images in the test sequences. If the execution speed is improved, the proposed method can be a very useful method to generate an IVPD at an arbitrary view-point, we believe.

Auto Frame Extraction Method for Video Cartooning System (동영상 카투닝 시스템을 위한 자동 프레임 추출 기법)

  • Kim, Dae-Jin;Koo, Ddeo-Ol-Ra
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.28-39
    • /
    • 2011
  • While the broadband multimedia technologies have been developing, the commercial market of digital contents has also been widely spreading. Most of all, digital cartoon market like internet cartoon has been rapidly large so video cartooning continuously has been researched because of lack and variety of cartoon. Until now, video cartooning system has been focused in non-photorealistic rendering and word balloon. But the meaningful frame extraction must take priority for cartooning system when applying in service. In this paper, we propose new automatic frame extraction method for video cartooning system. At frist, we separate video and audio from movie and extract features parameter like MFCC and ZCR from audio data. Audio signal is classified to speech, music and speech+music comparing with already trained audio data using GMM distributor. So we can set speech area. In the video case, we extract frame using general scene change detection method like histogram method and extract meaningful frames in the cartoon using face detection among the already extracted frames. After that, first of all existent face within speech area image transition frame extract automatically. Suitable frame about movie cartooning automatically extract that extraction image transition frame at continuable period of time domain.

Analysis of Living Lab Cases in R&D Initiatives for Solving Societal Problems and Challenges (사회문제 해결형 기술개발사업에서의 리빙랩 적용 사례 분석)

  • Seong, Ji Eun;Han, Kyu Young;Jeong, Seo Hwa
    • Journal of Science and Technology Studies
    • /
    • v.18 no.1
    • /
    • pp.177-217
    • /
    • 2018
  • This study examines the case of living lab applied in the R&D initiatives for solving societal problems and challenges. It discusses how to use the living lab in national R&D projects. The analyzed cases are 'Develop portable fundus camera for eye disease screening test to resolve health inequalities' and 'Auto-sensing integrated system development in rural pedestrian crosswalk'. As a result of the analysis, both cases were designed as a user participatory R&D structure by utilizing living lab. In other words, living lab has operated as a system that evolves technology-products-services into an infrastructure. It can realize final demand specification, product, service improvement and demonstration through continuous interaction of end users. As a result of the case analysis, the following policy tasks can be derived. First, living lab is a new concept and it is in the early stage of implementation in Korea. Therefore, it is necessary to monitor and evaluate living lab experiments and build suitable models for Korean society by sharing cases and achievements. Second, the strategic niche management are necessary for the introduction of living lab. Third, living lab can be used as a tool to transform the existing technology acquisition centered innovation policy to the policy for customer needs and problem solving. Fourth, there is a need for flexibility and adaptability in strategy and system to correct errors that appear in the living lab processes.

Integrated Security Management with MCGA in IPv6 Network (IPv6 네트워크 환경에서 MCGA를 고려한 통합적인 보안관리 방안)

  • Oh, Ha-Young;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.27-38
    • /
    • 2007
  • IPv6 has appeared for solving the address exhaustion of IPv4 and for guaranteeing the problems of security and QoS. It occurs the unexpected new attacks of IPv6 as well as the existing attacks of IPv4 because of the increasing address space to 128bits and the address hierarchies for efficient network management and additions of the new messages between nodes and routers like neighbor discovery and auto address configuration for the various comfortable services. For the successful transition from IPv4 to IPv6, we should get the secure compatibility between IPv4 hosts or routers working based on secure and systematic policy and IPv6. Network manager should design security technologies for efficient management in IPv4/IPv6 co-existence network and IPv6 network and security management framework designation. In this paper, we inspected the characteristics of IPv4 and IPv6, study on security requirement for efficient security management of various attacks, protocol, service in IPv4/IPv6 co-existence and IPv6 network, and finally suggest integrated solution about security vulnerability of IPv6 network in considering of analysis of IPv6 system, host and application, IPv6 characteristics, modified CGA(MCGA).

The Relationship between Work Environment factors, Perception of Insurance Crime and Job Satisfaction among Special Investigation Unit(SIU) (보험범죄특별조사팀(SIU)의 근무환경과 보험범죄에 대한 일반적 인식이 직무만족도에 미치는 영향)

  • Yun, Myeong-Seong;Lee, Wan-Hee;Lee, Seung-Ae
    • Korean Security Journal
    • /
    • no.32
    • /
    • pp.151-176
    • /
    • 2012
  • Government organizations (including police, prosecutor, and Financial Supervisory Service) and programs to uncover or prevent from insurance crime are not well developed. However, insurance crime are increasing among not only private insurances such as life insurance, indemnity insurance, and auto insurance but also public insurances including national health insurance and industrial accident compensation insurance. The damages of crimes are serious in both economical and ethical perspectives. Insurance crime deteriorates a current account of insurance companies and the leakages due to insurance fraud worsen loss ratio. Consequently, insurance crime increases customers' costs of insurance. For this reason, insurance companies stated to establish Special Investigation Unit(SIU) to detect insurance crime and fraud by themselves. However, organizational and operational efficiencies are limited. The purpose of this study is to examine the relationship between work environment factors, perception of insurance crime and job satisfaction among Special Investigation Units. Therefore, this study investigated the perception of work environments of Special Investigation Units. In addition, this study examined how their work environments and general perception of insurance crime influence their job satisfaction. In order test the purpose of this study, reliability test, exploratory factor analysis(EFA), multiple regression were employed. The results of this study suggested that clarity of insurance company, distress/difficulty of resolve, compensation, perception of work pressure are statistically significant on jab satisfaction among Special Investigation Unit in South Korea. This exploratory study expected to contribute to understanding of Special Investigation Unit, and their insurance crime prevention system. The results from this analysis will be examined in light of previous findings and policy implications discussed.

  • PDF

Reviews of Bus Transit Route Network Design Problem (버스 노선망 설계 문제(BTRNDP)의 고찰)

  • Han, Jong-Hak;Lee, Seung-Jae;Lim, Seong-Su;Kim, Jong-Hyung
    • Journal of Korean Society of Transportation
    • /
    • v.23 no.3 s.81
    • /
    • pp.35-47
    • /
    • 2005
  • This paper is to review a literature concerning Bus Transit Route Network Design(BTRNDP), to describe a future study direction for a systematic application for the BTRNDP. Since a bus transit uses a fixed route, schedule, stop, therefore an approach methodology is different from that of auto network design problem. An approach methodology for BTRNDP is classified by 8 categories: manual & guideline, market analysis, system analytic model. heuristic model. hybrid model. experienced-based model. simulation-based model. mathematical optimization model. In most previous BTRNDP, objective function is to minimize user and operator costs, and constraints on the total operator cost, fleet size and service frequency are common to several previous approach. Transit trip assignment mostly use multi-path trip assignment. Since the search for optimal solution from a large search space of BTRNDP made up by all possible solutions, the mixed combinatorial problem are usually NP-hard. Therefore, previous researches for the BTRNDP use a sequential design process, which is composed of several design steps as follows: the generation of a candidate route set, the route analysis and evaluation process, the selection process of a optimal route set Future study will focus on a development of detailed OD trip table based on bus stop, systematic transit route network evaluation model. updated transit trip assignment technique and advanced solution search algorithm for BTRNDP.