• Title/Summary/Keyword: Cloud Computing

Search Result 1,771, Processing Time 0.029 seconds

Development of SDN-based Network Platform for Mobility Support (이동성 지원을 위한 SDN 기반의 네트워크 플랫폼 개발)

  • Lee, Wan-Jik;Lee, Ho-Young;Heo, Seok-Yeol
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.401-407
    • /
    • 2019
  • SDN(Softeware Defined Networking) has emerged to address the rapidly growing demand for cloud computing and to support network virtualization services. Therefor many companies and organizations have taken SDN as a next-generation network technology. However, unlike the wired network where the SDN is originally designed, the SDN in the wireless network has a restriction that it can not provide the mobility of the node. In this paper, we extended existing openflow protocol of SDN and developed SDN-based network platform, which enables the SDN controller to manage the radio resources of its network and support the mobility of the nodes. The mobility support function of this paper has the advantage that a node in the network can move using its two or more wireless interfaces by using the radio resource management function of the SDN controller. In order to test the functions implemented in this paper, we measured parameters related to various transmission performance according to various mobile experiments, and compared parameters related to performance using one wireless interface and two interfaces. The SDN-based network platform proposed in this paper is expected to be able to monitor the resources of wireless networks and support the mobility of nodes in the SDN environment.

Design and Evaluation of an Efficient Flushing Scheme for key-value Store (키-값 저장소를 위한 효율적인 로그 처리 기법 설계 및 평가)

  • Han, Hyuck
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.5
    • /
    • pp.187-193
    • /
    • 2019
  • Key-value storage engines are an essential component of growing demand in many computing environments, including social networks, online e-commerce, and cloud services. Recent key-value storage engines offer many features such as transaction, versioning, and replication. In a key-value storage engine, transaction processing provides atomicity through Write-Ahead-Logging (WAL), and a synchronous commit method for transaction processing flushes log data before the transaction completes. According to our observation, flushing log data to persistent storage is a performance bottleneck for key-value storage engines due to the significant overhead of fsync() calls despite the various optimizations of existing systems. In this article, we propose a group synchronization method to improve the performance of the key-value storage engine. We also design and implement a transaction scheduling method to perform other transactions while the system processes fsync() calls. The proposed method is an efficient way to reduce the number of frequent fsync() calls in the synchronous commit while supporting the same level of transaction provided by the existing system. We implement our scheme on the WiredTiger storage engine and our experimental results show that the proposed system improves the performance of key-value workloads over existing systems.

Implementation of Dynamic Situation Authentication System for Accessing Medical Information (의료정보 접근을 위한 동적상황인증시스템의 구현)

  • Ham, Gyu-Sung;Seo, Own-jeong;Jung, Hoill;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.31-40
    • /
    • 2018
  • With the development of IT technology recently, medical information systems are being constructed in an integrated u-health environment through cloud services, IoT technologies, and mobile applications. These kinds of medical information systems should provide the medical staff with authorities to access patients' medical information for emergency status treatments or therapeutic purposes. Therefore, in the medical information systems, the reliable and prompt authentication processes are necessary to access the biometric information and the medical information of the patients in charge of the medical staff. However, medical information systems are accessing with simple and static user authentication mechanism using only medical ID / PWD in the present system environment. For this reason, in this paper, we suggest a dynamic situation authentication mechanism that provides transparency of medical information access including various authentication factors considering patient's emergency status condition and dynamic situation authentication system supporting it. Our dynamic Situation Authentication is a combination of user authentication and mobile device authentication, which includes various authentication factor attributes such as emergency status, role of medical staff, their working hours, and their working positions and so forth. We designed and implemented a dynamic situation authentication system including emergency status decision, dynamic situation authentication, and authentication support DB construction. Finally, in order to verify the serviceability of the suggested dynamic situation authentication system, the medical staffs download the mobile application from the medical information server to the medical staff's own mobile device together with the dynamic situation authentication process and the permission to access medical information to the patient and showed access to medical information.

Analysis of Minimum Logistics Cost in SMEs using Korean-type CIPs Payment System (한국형 CIPs 결제 시스템을 이용한 중소기업의 최소 물류비용 분석)

  • Kim, Ilgoun;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.7-18
    • /
    • 2021
  • Recently, various connected industrial parks (CIPs) architectures using new technologies such as cloud computing, CPS, big data, fifth-generation mobile communication 5G, IIoT, VR-AR, and ventilation transportation AI algorithms have been proposed in Korea. Korea's small and medium-sized enterprises do not have the upper hand in technological competitiveness than overseas advanced countries such as the United States, Europe and Japan. For this reason, Korea's small and medium-sized enterprises have to invest a lot of money in technology research and development. As a latecomer, Korean SMEs need to improve their profitability in order to find sustainable growth potential. Financially, it is most efficient for small and medium-sized Korean companies to cut costs to increase their profitability. This paper made profitability improvement by reducing costs for small and medium-sized enterprises located in CIPs in Korea a major task. VJP (Vehicle Action Program) was noted as a way to reduce costs for small and medium-sized enterprises located in CIPs in Korea. The method of achieving minimum logistics costs for small businesses through the Korean CIPs payment system was analyzed. The details of the new Korean CIPs payment system were largely divided into four types: "Business", "Data", "Technique", and "Finance". Cost Benefit Analysis (CBA) was used as a performance analysis method for CIPs payment systems.

A hybrid intrusion detection system based on CBA and OCSVM for unknown threat detection (알려지지 않은 위협 탐지를 위한 CBA와 OCSVM 기반 하이브리드 침입 탐지 시스템)

  • Shin, Gun-Yoon;Kim, Dong-Wook;Yun, Jiyoung;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.27-35
    • /
    • 2021
  • With the development of the Internet, various IT technologies such as IoT, Cloud, etc. have been developed, and various systems have been built in countries and companies. Because these systems generate and share vast amounts of data, they needed a variety of systems that could detect threats to protect the critical data contained in the system, which has been actively studied to date. Typical techniques include anomaly detection and misuse detection, and these techniques detect threats that are known or exhibit behavior different from normal. However, as IT technology advances, so do technologies that threaten systems, and these methods of detection. Advanced Persistent Threat (APT) attacks national or companies systems to steal important information and perform attacks such as system down. These threats apply previously unknown malware and attack technologies. Therefore, in this paper, we propose a hybrid intrusion detection system that combines anomaly detection and misuse detection to detect unknown threats. Two detection techniques have been applied to enable the detection of known and unknown threats, and by applying machine learning, more accurate threat detection is possible. In misuse detection, we applied Classification based on Association Rule(CBA) to generate rules for known threats, and in anomaly detection, we used One-Class SVM(OCSVM) to detect unknown threats. Experiments show that unknown threat detection accuracy is about 94%, and we confirm that unknown threats can be detected.

Anomaly Detection Methodology Based on Multimodal Deep Learning (멀티모달 딥 러닝 기반 이상 상황 탐지 방법론)

  • Lee, DongHoon;Kim, Namgyu
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.2
    • /
    • pp.101-125
    • /
    • 2022
  • Recently, with the development of computing technology and the improvement of the cloud environment, deep learning technology has developed, and attempts to apply deep learning to various fields are increasing. A typical example is anomaly detection, which is a technique for identifying values or patterns that deviate from normal data. Among the representative types of anomaly detection, it is very difficult to detect a contextual anomaly that requires understanding of the overall situation. In general, detection of anomalies in image data is performed using a pre-trained model trained on large data. However, since this pre-trained model was created by focusing on object classification of images, there is a limit to be applied to anomaly detection that needs to understand complex situations created by various objects. Therefore, in this study, we newly propose a two-step pre-trained model for detecting abnormal situation. Our methodology performs additional learning from image captioning to understand not only mere objects but also the complicated situation created by them. Specifically, the proposed methodology transfers knowledge of the pre-trained model that has learned object classification with ImageNet data to the image captioning model, and uses the caption that describes the situation represented by the image. Afterwards, the weight obtained by learning the situational characteristics through images and captions is extracted and fine-tuning is performed to generate an anomaly detection model. To evaluate the performance of the proposed methodology, an anomaly detection experiment was performed on 400 situational images and the experimental results showed that the proposed methodology was superior in terms of anomaly detection accuracy and F1-score compared to the existing traditional pre-trained model.

Real-Time GPU Task Monitoring and Node List Management Techniques for Container Deployment in a Cluster-Based Container Environment (클러스터 기반 컨테이너 환경에서 실시간 GPU 작업 모니터링 및 컨테이너 배치를 위한 노드 리스트 관리기법)

  • Jihun, Kang;Joon-Min, Gil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.11
    • /
    • pp.381-394
    • /
    • 2022
  • Recently, due to the personalization and customization of data, Internet-based services have increased requirements for real-time processing, such as real-time AI inference and data analysis, which must be handled immediately according to the user's situation or requirement. Real-time tasks have a set deadline from the start of each task to the return of the results, and the guarantee of the deadline is directly linked to the quality of the services. However, traditional container systems are limited in operating real-time tasks because they do not provide the ability to allocate and manage deadlines for tasks executed in containers. In addition, tasks such as AI inference and data analysis basically utilize graphical processing units (GPU), which typically have performance impacts on each other because performance isolation is not provided between containers. And the resource usage of the node alone cannot determine the deadline guarantee rate of each container or whether to deploy a new real-time container. In this paper, we propose a monitoring technique for tracking and managing the execution status of deadlines and real-time GPU tasks in containers to support real-time processing of GPU tasks running on containers, and a node list management technique for container placement on appropriate nodes to ensure deadlines. Furthermore, we demonstrate from experiments that the proposed technique has a very small impact on the system.

DNN Model for Calculation of UV Index at The Location of User Using Solar Object Information and Sunlight Characteristics (태양객체 정보 및 태양광 특성을 이용하여 사용자 위치의 자외선 지수를 산출하는 DNN 모델)

  • Ga, Deog-hyun;Oh, Seung-Taek;Lim, Jae-Hyun
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.29-35
    • /
    • 2022
  • UV rays have beneficial or harmful effects on the human body depending on the degree of exposure. An accurate UV information is required for proper exposure to UV rays per individual. The UV rays' information is provided by the Korea Meteorological Administration as one component of daily weather information in Korea. However, it does not provide an accurate UVI at the user's location based on the region's Ultraviolet index. Some operate measuring instrument to obtain an accurate UVI, but it would be costly and inconvenient. Studies which assumed the UVI through environmental factors such as solar radiation and amount of cloud have been introduced, but those studies also could not provide service to individual. Therefore, this paper proposes a deep learning model to calculate UVI using solar object information and sunlight characteristics to provide an accurate UVI at individual location. After selecting the factors, which were considered as highly correlated with UVI such as location and size and illuminance of sun and which were obtained through the analysis of sky images and solar characteristics data, a data set for DNN model was constructed. A DNN model that calculates the UVI was finally realized by entering the solar object information and sunlight characteristics extracted through Mask R-CNN. In consideration of the domestic UVI recommendation standards, it was possible to accurately calculate UVI within the range of MAE 0.26 compared to the standard equipment in the performance evaluation for days with UVI above and below 8.

LSTM-based Fire and Odor Prediction Model for Edge System (엣지 시스템을 위한 LSTM 기반 화재 및 악취 예측 모델)

  • Youn, Joosang;Lee, TaeJin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.2
    • /
    • pp.67-72
    • /
    • 2022
  • Recently, various intelligent application services using artificial intelligence are being actively developed. In particular, research on artificial intelligence-based real-time prediction services is being actively conducted in the manufacturing industry, and the demand for artificial intelligence services that can detect and predict fire and odors is very high. However, most of the existing detection and prediction systems do not predict the occurrence of fires and odors, but rather provide detection services after occurrence. This is because AI-based prediction service technology is not applied in existing systems. In addition, fire prediction, odor detection and odor level prediction services are services with ultra-low delay characteristics. Therefore, in order to provide ultra-low-latency prediction service, edge computing technology is combined with artificial intelligence models, so that faster inference results can be applied to the field faster than the cloud is being developed. Therefore, in this paper, we propose an LSTM algorithm-based learning model that can be used for fire prediction and odor detection/prediction, which are most required in the manufacturing industry. In addition, the proposed learning model is designed to be implemented in edge devices, and it is proposed to receive real-time sensor data from the IoT terminal and apply this data to the inference model to predict fire and odor conditions in real time. The proposed model evaluated the prediction accuracy of the learning model through three performance indicators, and the evaluation result showed an average performance of over 90%.

Introduction to the Technology of Digital Groundwater (Digital Groundwater의 기술 소개)

  • Hyeon-Sik Kim
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.10-10
    • /
    • 2023
  • 본질적으로 복잡하고 다양한 특성을 가지는 우리나라(도시, 농어촌, 도서산간, 섬 등)의 물 공급 시스템은 생활수준의 향상, 기후변화 및 가뭄위기, 소비환경 중심의 요구와 한정된 수자원을 잘 활용하기 위한 운영 및 관리가 매우 복잡하다. 이로 인한 수자원 고갈과 가뭄위기 등에 관련한 대책 및 방안으로 대체수자원인 지하수 활용방안들이 제시되고 있다. 따라서, 물 관리 시스템과 관련한 디지털 기술은 오늘날 플랫폼과 디지털 트윈의 도입을 통해 네트워크와 가상현실 세계의 연결이 통합되어진 4차 산업혁명 사업이 현실화되고 있다. 물 관리 시스템에 사용된 새로운 디지털 기술 "BDA(Big Data Analytics), CPS(Cyber Physical System), IoT(Internet of Things), CC(Cloud Computing), AI(Artificial Intelligence)" 등의 성장이 증가함에 따라 가뭄대응 위기와 도시 지하수 물 순환 시스템 운영이 증가하는 소비자 중심의 수요를 충족시키기 위해서는 지속가능한 지하수 공급을 효과적으로 관리되어야 한다. 4차 산업혁명과 관련한 기술성장이 증가함으로 인한 물 부문은 시스템의 지속가능성을 향상시키기 위해 전체 디지털화 단계로 이동하고 있다. 이러한 디지털 전환의 핵심은 데이터에 관한 것이며, 이를 활용하여 가치 창출을 위해서 "Digital Groundwater Technology/Twin(DGT)"를 극대화하는 방식으로 제고해야 한다. 현재 당면하고 있는 기후위기에 따른 가뭄, 홍수, 녹조, 탁수, 대체수자원 등의 수자원 재해에 대한 다양한 대응 방안과 수자원 확보 기술이 논의되고 있다. 이에 따른 "물 순환 시스템"의 이해와 함께 문제해결 방안도출을 위하여 이번 "기획 세션"에서는 지하수 수량 및 수질, 정수, 모니터링, 모델링, 운영/관리 등의 수자원 데이터의 플랫폼 동시성 구축으로부터 역동적인 "DGT"을 통한 디지털 트윈화하여, 지표수-토양-지하수 분야의 특화된 연직 프로파일링 관측기술을 다각도로 모색하고자 한다. "Digital Groundwater(DG)"는 지하수의 물 순환, 수량 및 수질 관리, 지표수-지하수 순환 및 모니터링, 지하수 예측 모델링 통합연계를 위해 지하수 플랫폼 동시성, ChatGPT, CPS 및 DT 등의 복합 디지털화 단계로 나가고 있다. 복잡한 지하환경의 이해와 관리 및 보존을 위한 지하수 네트워크에서 수량과 수질 데이터를 수집하기 위한 스마트 지하수 관측기술 개발은 큰 도전이다. 스마트 지하수 관측기술은 BD분석, AI 및 클라우드 컴퓨팅 등의 디지털 기술에 필요한 획득된 데이터 분석에 사용되는 알고리즘의 복잡성과 데이터 품질에 따라 영향을 미칠 수 있기 때문이다. "DG"는 지하수의 정보화 및 네트워크 운영관리 자동화, 지능화 등을 위한 디지털 도구를 활용함으로써 지표수-토양층-지하수 네트워크 통합관리에 대한 비전을 만들 수 있다. 또한, DGT는 지하수 관측센서의 1차원 데이터 융합을 이용한 지하수 플랫폼 동시성과 디지털 트윈을 연계할 수 있다.

  • PDF