• 제목/요약/키워드: Cloud Analysis

검색결과 1,428건 처리시간 0.028초

비정형 텍스트 테이터 분석을 위한 워드클라우드 기법에 관한 연구 (A Study on Word Cloud Techniques for Analysis of Unstructured Text Data)

  • 이원조
    • 문화기술의 융합
    • /
    • 제6권4호
    • /
    • pp.715-720
    • /
    • 2020
  • 빅데이터 분석에서 텍스트 데이터는 대부분 비정형이고 대용량으로 분석 기법이 정립되지 않아 분석에 어려움이 많았다. 따라서 텍스트 데이터 분석 기법의 하나인 빅데이터 워드클라우드 기법의 실무 적용시 문제점과 유용성 검증을 통한 상용화 가능성을 위해 본 연구를 수행하였다. 본 논문에서는 R 프로그램 워드클라우드 기법을 이용하여 "대통령 UN연설문"을 시각화 분석을 하고 이 기법의 한계와 문제점을 도출한다. 그리고 이를 해결하기 위한 개선된 모델을 제안하여 워드클라우드 기법의 실무 적용에 대한 효율적인 방안을 제시한다.

Measurement of Insoluble Mineral Particles in a Saturated Atmosphere

  • Ma, Chang-Jin;Choi, Sung-Boo
    • Journal of Korean Society for Atmospheric Environment
    • /
    • 제24권E1호
    • /
    • pp.44-53
    • /
    • 2008
  • This study was undertaken to measure the properties of individual mineral particles in an artificially saturated atmosphere at a vertical extinct mine with 430 m height. By synchrotron radiation X-ray fluorescence (SR-XRF) microprobe analysis, it was possible to determine the elemental composition of residual insoluble particles on individual cloud droplet replicas formed on the Collodion film. The XRF visualized elemental maps enabled us not only to presume the chemical mixing state of particles retained in cloud droplet, but also to estimate their source. Details about the individual mineral particles captured by artificial cloud droplets should be helpful to understand about the removal characteristics of dust particles such as interaction with clouds. Nearly all individual particles captured in cloud droplets are strongly enriched in Fe. Mass of Fe is ranged between 41 fg and 360 fg with average 112 fg. There is a good agreement between single particle analysis by SR-XRF and bulk particle analysis by PIXE.

건설현장 MMS 라이다 기반 점군 데이터의 정확도 분석 (Accuracy Analysis of Point Cloud Data Produced Via Mobile Mapping System LiDAR in Construction Site)

  • 박재우;염동준
    • 한국산업융합학회 논문집
    • /
    • 제25권3호
    • /
    • pp.397-406
    • /
    • 2022
  • Recently, research and development to revitalize smart construction are being actively carried out. Accordingly, 3D mapping technology that digitizes construction site is drawing attention. To create a 3D digital map for construction site a point cloud generation method based on LiDAR(Light detection and ranging) using MMS(Mobile mapping system) is mainly used. The purpose of this study is to analyze the accuracy of MMS LiDAR-based point cloud data. As a result, accuracy of MMS point cloud data was analyzed as dx = 0.048m, dy = 0.018m, dz = 0.045m on average. In future studies, accuracy comparison of point cloud data produced via UAV(Unmanned aerial vegicle) photogrammetry and MMS LiDAR should be studied.

소셜 네트워크 서비스 어플리케이션의 클라우드 모델링 및 분석을 통한 국방 클라우드 컴퓨탱 시스템 설계 (K-Defense Cloud Computing System Design through Cloud Modeling and Analysis of Social Network Service Application)

  • 이성태;유황빈
    • 융합보안논문지
    • /
    • 제13권1호
    • /
    • pp.37-43
    • /
    • 2013
  • 국방부는 지난 2010년, '2012 정보화사업계획'의 일환으로 2014년까지 클라우드 컴퓨팅 기술이 포함된 국방통합정보관리소(메가센터)를 구축하기로 결정하였고, 현재 추진 중에 있다 클라우드 컴퓨팅 환경은 데이터 센터에 많은 IT 자원이 집약된 형태로 효율적인 인프라구조를 위한 기술과 정책을 적용하여 시스템을 설계해야 한다. 즉, 사용자의 요구를 만족 시키기 위해 클라우드 서비스를 효율적으로 제공하여야 하며, 시스템 구축 시 불필요하게 낭비되는 자원이 없게 설계되어야 한다. 그러나 최적 시스템을 구축하기 위해서는 시스템 설계 최초단계에 서비스 성능과 자원 사용의 가용성을 예측할 수 있어야 한다. 본 논문에서는 국방 클라우드 컴퓨팅 시스템의 서비스 가용성 예측을 위해 CloudAnalyst 시뮬레이터를 이용하여 현재 전 세계에서 가장 많은 사용자를 보유한 소설 네트워크 서비스 중 하나인 Facebook을 클라우드 모델링 및 분석하였다. 시뮬레이션 결과를 통해 최적의 국방 클라우드 컴퓨팅 설계 모델을 제안한다.

Analysis of Cybercrime Investigation Problems in the Cloud Environment

  • Khachatryan, Grigor
    • International Journal of Computer Science & Network Security
    • /
    • 제22권7호
    • /
    • pp.315-319
    • /
    • 2022
  • Cloud computing has emerged to be the most effective headway for investigating crime especially cybercrime in this modern world. Even as we move towards an information technology-controlled world, it is important to note that when innovations are made, some negative implications also come with it, and an example of this is these criminal activities that involve technology, network devices, and networking that have emerged as a result of web improvements. These criminal activities are the ones that have been termed cybercrime. It is because of these increased criminal activities that organizations have come up with different strategies that they use to counter these crimes, and one of them is carrying out investigations using the cloud environment. A cloud environment has been defined as the use of web-based applications that are used for software installation and data stored in computers. This paper examines problems that are a result of cybercrime investigation in the cloud environment. Through analysis of the two components in play; cybercrime and cloud environment, we will be able to understand what are the problems that are encountered when carrying out investigations in cloud forensics. Through the use of secondary research, this paper found out that most problems are associated with technical and legal channels that are involved in carrying out these investigations. Investigator's mistakes when extracting pieces of evidence form the most crucial problems that take a lead when it comes to cybercrime investigation in the cloud environment. This paper not only flags out the challenges that are associated with cybercrime investigation in cloud environments but also offer recommendations and suggested solutions that can be used to counter the problems in question here. Through a proposed model to perform forensics investigations, this paper discusses new methodologies solutions, and developments for performing cybercrime investigations in the cloud environment.

정밀조도정보를 이용한 전천카메라 기반의 주·야간 구름영상촬영용 원형장치 개발 (Development of A Prototype Device to Capture Day/Night Cloud Images based on Whole-Sky Camera Using the Illumination Data)

  • 이재원;박인춘;조정호;기균도;김영철
    • 대기
    • /
    • 제28권3호
    • /
    • pp.317-324
    • /
    • 2018
  • In this study, we review the ground-based whole-sky camera (WSC), which is developed to continuously capture day and night cloud images using the illumination data from a precision Lightmeter with a high temporal resolution. The WSC is combined with a precision Lightmeter developed in IYA (International Year of Astronomy) for analysis of an artificial light pollution at night and a DSLR camera equipped with a fish-eye lens widely applied in observational astronomy. The WSC is designed to adjust the shutter speed and ISO of the equipped camera according to illumination data in order to stably capture cloud images. And Raspberry Pi is applied to control automatically the related process of taking cloud and sky images every minute under various conditions depending on illumination data from Lightmeter for 24 hours. In addition, it is utilized to post-process and store the cloud images and to upload the data to web page in real time. Finally, we check the technical possibility of the method to observe the cloud distribution (cover, type, height) quantitatively and objectively by the optical system, through analysis of the captured cloud images from the developed device.

퍼스널 클라우드 컴퓨팅의 기술과 시장 분석 (The Technology of Personal Cloud Computing and Market Research)

  • 심현보
    • 한국정보통신학회논문지
    • /
    • 제18권2호
    • /
    • pp.239-251
    • /
    • 2014
  • 퍼스널 클라우드(Personal Cloud)는 스마트폰, MID, PC, IPTV 등 개인의 디지털기기 종류가 증가하고 블로그, 이메일, UCC, 소셜 네트워크서비스 등 개인의 온라인 서비스가 급증하는 개인정보화시대에서 모든 단말과 온라인 공간에 흩어져 있는 개인 콘텐츠를 클라우드 컴퓨팅으로 어디서나 단말에 상관없이 독립적으로 접근할 수 있게 함은 물론 콘텐츠의 분석 및 가공을 통해 고부가가치 개인화 서비스를 제공할 수 있는 서비스이다. 세계 IT 기업들이 주목하고 있는 차세대 IT 패러다임인 클라우드 컴퓨팅에 대한 이해를 높이고 제공되는 서비스와 기술, 보안과 표준화 및 관련 기업들의 사업 전략 분석을 통해 퍼스널 클라우드 시장의 미래를 전망해 본다.

클라우드 컴퓨팅으로의 사용전환 결정요인에 관한 연구: 구글 Docs 사례를 중심으로 (A Study on Factors Affecting Intention to Switch for Using Cloud Computing: A Case of Goolgle Docs)

  • 박상철;권순재
    • 한국IT서비스학회지
    • /
    • 제10권3호
    • /
    • pp.149-166
    • /
    • 2011
  • While the importance of adopting cloud computing service has been emerged, comparatively little research has been conducted on examining factors of an individual user's intention to switch toward cloud computing service. Hereafter, this study presents and empirically tests users' intention to switch to cloud computing. Our model posits that the characteristics of cloud computing such as collaboration support, accessability, trust to cloud service affect perceived value, which in turn, influences intention to switch. An experimental study using student subjects provided empirical validation for our proposed model. Survey data from 106 respondents was used to test the model using partial least square analysis. According to our results, the characteristics of cloud computing were found to have significant impact on users' intention to switch that partially mediated by perceived value. Based on our research findings, we hope that this research will stimulate researchers' interest in the emerging area of cloud computing adoption.

Secure Data Sharing in The Cloud Through Enhanced RSA

  • Islam abdalla mohamed;Loay F. Hussein;Anis Ben Aissa;Tarak kallel
    • International Journal of Computer Science & Network Security
    • /
    • 제23권2호
    • /
    • pp.89-95
    • /
    • 2023
  • Cloud computing today provides huge computational resources, storage capacity, and many kinds of data services. Data sharing in the cloud is the practice of exchanging files between various users via cloud technology. The main difficulty with file sharing in the public cloud is maintaining privacy and integrity through data encryption. To address this issue, this paper proposes an Enhanced RSA encryption schema (ERSA) for data sharing in the public cloud that protects privacy and strengthens data integrity. The data owners store their files in the cloud after encrypting the data using the ERSA which combines the RSA algorithm, XOR operation, and SHA-512. This approach can preserve the confidentiality and integrity of a file in any cloud system while data owners are authorized with their unique identities for data access. Furthermore, analysis and experimental results are presented to verify the efficiency and security of the proposed schema.