• Title/Summary/Keyword: Cloud API

Search Result 82, Processing Time 0.028 seconds

Braille wirst device for the Deaf-Blindness (시청각 중복 장애인을 위한 점자 팔목 장치)

  • Park, Jeong-Hyeon;Song, Min-Seok;Baek, Chan-Young;Hong, Woo-Sung;Kim, Yeun-Jung;Moon, Nammee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.643-644
    • /
    • 2022
  • 시청각 중복 장애인은 타인과 의사소통에 어려움이 있기 때문에 이에 대한 연구가 필요하다. 본 논문에서는 시청각 중복 장애인이 타인과 실시간 의사소통이 가능한 팔목 보호대 형태의 Google Cloud Speech API 기반 점자 단말기를 제안한다. 점자 단말기에는 심박, 온도, 인바디 센서를 부착하여 착용자의 건강상태를 분석한다. 또한 타인과 실시간 소통을 위해 점자 출력 닷 셀 6 개와 점자 입력버튼을 2 × 3 형태로 배치하여 STT 를 통해 타인의 음성을 점자형태로 출력하여 읽거나 점자를 입력하여 TTS 를이용해 타인에게 스피커를 통해 의사를 전달할 수 있다. 이를 통해 시청각 중복 장애인들은 타인과 실시간 의사소통과 정보 취득에 자유로워질 수 있다.

A Study on Business Types of IoT-based Smarthome: Based on the Theory of Platform Typology (IoT 기반 스마트홈 비즈니스 유형 연구: 플랫폼유형론을 근간으로)

  • Song, Minzheong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.27-40
    • /
    • 2016
  • This paper aims to analyze the business types of 237 IoT based smart home companies in the world (launched during 1999~2014) which got global investment last few years. For this, the previous literatures trying to analze technology and service types of smart home are searched and the typology of the platform is discussed. Based on it, this research conceptualizes an analysis framework that includes three areas of smart home like home automation, home security, and energy efficiency with the three platform types like product, software, and service. This study concludes that the development of business type for IoT based smart home ecosystem is from the product to software and it can be a platform or not. In current status, there are a few platforms of product and software, but in the device management (16%) and thermostat (11%), companies are persuing more platform like. It is difficult to find the service platform in overall areas, for application based service has a few attractions in the investment market due to the lack of cloud infrastructure and data analytics. The following three are the implication to domestic market: 1) More active offering of API and SDK, 2) more active introduction of wireless Intenet network protocols, and 3) more active interoperability efforts and alliance activities are needed.

National Agenda Service Model Development Research of Policy Information Portal of National Sejong Library (국립세종도서관 정책정보포털 국정과제 서비스 모형개발 연구)

  • Younghee, Noh;Inho, Chang;Hyojung, Sim
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.4
    • /
    • pp.73-92
    • /
    • 2022
  • This study intends to design a model that can effectively service policy data necessary for the implementation of new national agenda in order to provide high-quality policy information services that go beyond those of the existing Policy Information Portal (POINT) of National Sejong Library. To this end, it was determined that providing an integrated search environment, in lieu of data search through individual access, was necessary. Subsequently, four possible models for a national agenda service model were presented. First, designing a computerized system for both interface and electronic information source aspects was proposed for the national agenda service system operation. Second, designing the Linked Open Data system and the time-series service system for national policy information, providing the translation service of overseas original data, and securing the researcher's desired data were presented for the national agenda service information source operation. Third, strengthening public relations for policy users, building and promoting the site brand, operating SNS channels, and reinforcing the activation of auxiliary materials and the accessibility of external services were proposed for public relations of national agenda service. Fourth, expanding the information network with Open API, cloud service, and overseas libraries was proposed for collaborating and cooperating with the agenda service.

Trustworthy AI Framework for Malware Response (악성코드 대응을 위한 신뢰할 수 있는 AI 프레임워크)

  • Shin, Kyounga;Lee, Yunho;Bae, ByeongJu;Lee, Soohang;Hong, Heeju;Choi, Youngjin;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.1019-1034
    • /
    • 2022
  • Malware attacks become more prevalent in the hyper-connected society of the 4th industrial revolution. To respond to such malware, automation of malware detection using artificial intelligence technology is attracting attention as a new alternative. However, using artificial intelligence without collateral for its reliability poses greater risks and side effects. The EU and the United States are seeking ways to secure the reliability of artificial intelligence, and the government announced a reliable strategy for realizing artificial intelligence in 2021. The government's AI reliability has five attributes: Safety, Explainability, Transparency, Robustness and Fairness. We develop four elements of safety, explainable, transparent, and fairness, excluding robustness in the malware detection model. In particular, we demonstrated stable generalization performance, which is model accuracy, through the verification of external agencies, and developed focusing on explainability including transparency. The artificial intelligence model, of which learning is determined by changing data, requires life cycle management. As a result, demand for the MLops framework is increasing, which integrates data, model development, and service operations. EXE-executable malware and documented malware response services become data collector as well as service operation at the same time, and connect with data pipelines which obtain information for labeling and purification through external APIs. We have facilitated other security service associations or infrastructure scaling using cloud SaaS and standard APIs.

A Study on Validation for Mapping of Gas Detectors at a BTX Plant (BTX 공정에서 Gas Detector Mapping 적정성 검토에 관한 연구)

  • Seo, Ji Hye;Han, Man Hyoeng;Kim, Il Kwon;Chon, Young Woo
    • Journal of the Korean Society of Safety
    • /
    • v.32 no.5
    • /
    • pp.168-178
    • /
    • 2017
  • In order to prevent major and chemical accidents, some of the plants which would like to install and operate hazard chemicals handling facilities must submit Off-site Consequence Analysis due to recent arisen leak accidents since 2015. A lot of chemical industrials choose gas detectors as mitigation equipment to early detect gas vapor. The way of placement of gas detectors has two methods; Code-based Design(CBD) and Performance-based Design. The CBD has principles for gas detectors to be installed with consideration for the place that is expected to accumulate gas, and the leak locations according to legal standards and technical guidelines, and has a possibility to be unable to detect by these rules to locate gas detectors by vapor density information. The PBD has two methods; a Geographic Method and Scenario based Method. The Scenario-based Method has been suggested to make up for the Geographic Coverage Method. This Scenario-based Method draw the best optimum placement of gas detectors by considering leak locations, leak speed information, leak directions and etc. However, the domestic placement guidelines just refers to the CBD. Therefore, this study is to compare existing placement location of gas detectors by the domestic CBD with placement locations, coverages and the number of gas detectors in accordance with the Scenario-based Method. Also this study has measures for early detecting interest of Vapor Cloud and suitable placement of gas detectors to prevent chemical accidents. The Phast software was selected to simulate vapor cloud dispersion to predict the consequence. There are two cases; an accident hole size of leak(8 mm) from API which is the highst accident hole size less than 24.5 mm, and a normal leak hole size from KOSHA Guide (1.8 mm). Detect3D was also selected to locate gas detectors efficiently and compare CBD results and PBD results. Currently, domestic methods of gas detectors do not consider any risk, but just depend on domestic code methods which lead to placement of gas detectors not to make personnels recognize tolerable or intolerable risks. The results of the Scenario-based Method, however, analyze the leak estimated range by simulating leak dispersion, and then it is able to tell tolerable risks. Thus it is considered that individuals will be able to place gas detectors reasonably by making objectives and roles flexibly according to situations in a specific plant.

Implementation of a DB-Based Virtual File System for Lightweight IoT Clouds (경량 사물 인터넷 클라우드를 위한 DB 기반 가상 파일 시스템 구현)

  • Lee, Hyung-Bong;Kwon, Ki-Hyeon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.311-322
    • /
    • 2014
  • IoT(Internet of Things) is a concept of connected internet pursuing direct access to devices or sensors in fused environment of personal, industrial and public area. In IoT environment, it is possible to access realtime data, and the data format and topology of devices are diverse. Also, there are bidirectional communications between users and devices to control actuators in IoT. In this point, IoT is different from the conventional internet in which data are produced by human desktops and gathered in server systems by way of one-sided simple internet communications. For the cloud or portal service of IoT, there should be a file management framework supporting systematic naming service and unified data access interface encompassing the variety of IoT things. This paper implements a DB-based virtual file system maintaining attributes of IoT things in a UNIX-styled file system view. Users who logged in the virtual shell are able to explore IoT things by navigating the virtual file system, and able to access IoT things directly via UNIX-styled file I O APIs. The implemented virtual file system is lightweight and flexible because it maintains only directory structure and descriptors for the distributed IoT things. The result of a test for the virtual shell primitives such as mkdir() or chdir() shows the smooth functionality of the virtual file system, Also, the exploring performance of the file system is better than that of Window file system in case of adopting a simple directory cache mechanism.

Device Virtualization Framework for Smart Home Cloud Service (스마트홈 클라우드 서비스를 위한 디바이스 가상화 프레임워크)

  • Kim, Kyungwon;Park, Jongbin;Kum, Seungwoo;Jung, Jongjin;Yang, Chang-Mo;Lim, Taebeom
    • Telecommunications review
    • /
    • v.24 no.5
    • /
    • pp.677-691
    • /
    • 2014
  • Connectivity is becoming more important keywords recently. For example, many devices are going to be connected to the internet. It is usually called as the IoT(internet of things). Many IoT devices can be evolved as a part of giant system of the world wide web. It is a great opportunity for us, because many new services can have emerged through this paradigm. In this paper, we propose a device virtualization framework for smart home service. The proposed framework connects the many home appliances devices and the internet using a dynamic protocol conversion. After our protocol conversion for device virtualization, our framework provides a RESTful API to access the resources of device through the internet. Therefore, the proposed framework can provide a variety of services, so it also can be developed into the ecosystem for smart home service. The current framework version only supports UPnP enabled devices of the home, but it can easily be extended to many other home middleware solutions. To verify the feasibility of the framework, we have implemented several service scenarios.

Autoscaling Mechanism based on Execution-times for VNFM in NFV Platforms (NFV 플랫폼에서 VNFM의 실행 시간에 기반한 자동 자원 조정 메커니즘)

  • Mehmood, Asif;Diaz Rivera, Javier;Khan, Talha Ahmed;Song, Wang-Cheol
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.1-10
    • /
    • 2019
  • The process to determine the required number of resources depends on the factors being considered. Autoscaling is one such mechanism that uses a wide range of factors to decide and is a critical process in NFV. As the networks are being shifted onto the cloud after the invention of SDN, we require better resource managers in the future. To solve this problem, we propose a solution that allows the VNFMs to autoscale the system resources depending on the factors such as overhead of hyperthreading, number of requests, execution-times for the virtual network functions. It is a known fact that the hyperthreaded virtual-cores are not fully capable of performing like the physical cores. Also, as there are different types of core having different frequencies so the process to calculate the number of cores needs to be measured accurately and precisely. The platform independency is achieved by proposing another solution in the form of a monitoring microservice, which communicates through APIs. Hence, by the use of our autoscaling application and a monitoring microservice, we enhance the resource provisioning process to meet the criteria of future networks.

A case study of blockchain-based public performance video platform establishment: Focusing on Gyeonggi Art On, a new media art broadcasting station in Gyeonggi-do (블록체인 기반 공연영상 공공 플랫폼 구축 사례 연구: 경기도 뉴미디어 예술방송국 경기아트온을 중심으로)

  • Lee, Seung Hyun
    • Journal of Service Research and Studies
    • /
    • v.13 no.1
    • /
    • pp.108-126
    • /
    • 2023
  • This study explored the sustainability of a blockchain-based cultural art performance video platform through the construction of Gyeonggi Art On, a new media art broadcasting station in Gyeonggi-do. In addition, the technical limitations of video content transaction using block chain, legal and institutional issues, and the protection of personal information and intellectual property rights were reviewed. As for the research method, participatory observation methods such as in-depth interviews with developers and operators and participation in meetings were conducted. The researcher participated in and observed the entire development process, including designing and developing blockchain nodes, smart contracts, APIs, UI/UX, and testing interworking between blockchain and content distribution services. Research Question 1: The results of the study on 'Which technology model is suitable for a blockchain-based performance video content distribution public platform?' are as follows. 1) The blockchain type suitable for the public platform for distribution of art performance video contents based on the blockchain is the private type that can be intervened only when the blockchain manager directly invites it. 2) In public platforms such as Gyeonggi ArtOn, among the copyright management model, which is an art based on NFT issuance, and the BC token and cloud-based content distribution model, the model that provides content to external demand organizations through API and uses K-token for fee settlement is suitable. 3) For public platform initial services such as Gyeonggi ArtOn, a closed blockchain that provides services only to users who have been granted the right to use content is suitable. Research question 2: What legal and institutional problems should be reviewed when operating a blockchain-based performance video distribution public platform? The results of the study are as follows. 1) Blockchain-based smart contracts have a party eligibility problem due to the nature of blockchain technology in which the identities of transaction parties may not be revealed. 2) When a security incident occurs in the block chain, it is difficult to recover the loss because it is unclear how to compensate or remedy the user's loss. 3) The concept of default cannot be applied to smart contracts, and even if the obligations under the smart contract have already been fulfilled, the possibility of incomplete performance must be reviewed.

Multiple Layer File Format for Safe Collaborative Design (안전한 협업 디자인 작업을 위한 다중 레이어 파일 포맷)

  • Kim, Kichang;Yoo, Sang Bong
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.4
    • /
    • pp.45-65
    • /
    • 2013
  • A design file can get larger in size as the complexity of the target object increases. A large design file may reside in a large parallel computing system, such as cloud computing systems, and many designers may work concurrently on the same design file. In such a case, it is obvious that we need some kind of protection mechanism so that each user can access only the area of the file he or she is entitled to. Two approaches can be taken for this problem: one is the traditional access control mechanisms and the other encryption techniques. We take the latter approach to ensure the safety of the file even in public domain such as clouding systems, and in this paper, we suggest an encryption scheme for a file where the file is encrypted in multi-layer so that each user is allowed to access the file only at the layer for which the user has the proper access right. Each layer of the file is encrypted with different keys and these keys are exposed only to those who have the right access permit. The paper explains the necessary file format to achieve this goal and discusses the file manipulation functions to handle this new file format.