• Title/Summary/Keyword: Cloud Game

Search Result 68, Processing Time 0.021 seconds

The Impact of Interaction between Cloud and Longwave Radiation In Asia Monsoon Circulation (구름-장파복사 상호작용이 아시아 몬순 순환에 미치는 영향)

  • Yu, Geun-Hyeok;Son, Byeong-Ju
    • 한국지구과학회:학술대회논문집
    • /
    • 2003.09a
    • /
    • pp.112-125
    • /
    • 2003
  • 구름의 몬순의 활동에 있어서 직접적으로나 간접적으로 영향을 준다. 본 연구에서는 이러한 구름이 몬순의 활동에 어떠한 영향을 주는지를 알아보기 위해 ISCCP 구름자료와 GAME 재분석 자료를 입력자료로한 장파 복사 모델을 수행하였다. 모델 수행의 결과로 얻어진 대기 상부에서의 플럭스는 CERES 관측치와 비교하였으며, 구름에 의한 가열율은 몬순활동을 해석하기 위해 사용하였다. 구름이 몬순에 끼치는 영향을 파악하기 위해 맑은 대기의 가열율과 구름을 포함한 평균 대기의 가열율의 차이를 구하였으며, 이를 수평과 연직분포의 관점에서 해석하였다. 가열율의 지리적 분포는 수평적으로는 인도양에서 장파 복사 가열율의 최대가 나타났으며, 가열의 최저 (냉각)은 티벳고원에 나타났다. 이러한 공간적 분포는 구름이 남북방향으로 차등가열을 유발시키고 있음을 보여주고 있어 구름의 분포가 열적인 몬순순환을 강화시켜주고 있음을 시사하고 있다. 이러한 차등가열의 강화는 동서방향으로도 나타나 구름이 동서방향 순환에도 영향을 줄 수 있음을 보여준다. 구름에 의한 복사 가열의 연직구조는 운정에 의한 냉각과 운저에 의한 가열이 일어날 수 있음을 보여주고 있으며, 이로 인해 대기의 불안정성이 높아져 연직 운동을 향상시킬 수 있는 역할을 하고 있음이 밝혀졌다. 즉 몬순순환에 의해 생성된 구름은 구름 생성의 원인이 되었던 순환을 더욱 강화시키고 있음을 보이고 있다.

  • PDF

The Design and Implementation of an Emergency Video Call Integrated Management System based on VoIP (VoIP기반 승강기 비상 화상통화 통합 관리 시스템 설계 및 구현)

  • Kim, Woon-Yong;Kim, SoonGohn
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.12
    • /
    • pp.93-99
    • /
    • 2017
  • The elevator system combines various convergence technologies with the development of ICT technology. Emergency call devices which are safety related devices is applied as an obligation of the elevator and those scope also varies. In this paper, we propose an integrated model that overcomes the limitations of existing voice emergency call devices and efficiently manages and manages video call based service structures in VoIP based on wired and wireless environments. This method effectively manages and operates various lift data and video records in the elevator between the manager, the server and the user. And also It is possible to secure the quality of video call in VoIP and cloud service environment and increase the reliability of safety management and enhance various service environment by creating an integrated structure utilizing various data and additional services in the elevator.

The 3D Modeling Data Production Method Using Drones Photographic Scanning Technology (드론 촬영 기반 사진 스캐닝 기술을 활용한 3D 모델링데이터 생성방법에 관한 연구)

  • Lee, Junsang;Lee, Imgeun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.6
    • /
    • pp.874-880
    • /
    • 2018
  • 3D modeling is extensively used in the field of architecture, machinery and contents production such as movies. Modeling is a time-consuming task. In order to compensate for these drawbacks, attempts have recently been made to reduce the production period by applying 3D scanning technology. 3D scanning for small objects can be done directly with laser or optics, but large buildings and sculptures require expensive equipment, which makes it difficult to acquire data directly. In this study, 3D modeling data for a large object is acquired using photometry with using drones to acquire the image data. The maintenance method for uniform spacing between the sculpture and the drone, the measurement method for the flight line were presented. In addition, we presented a production environment that can utilize the obtained 3D point cloud data for animation and a rendered animation result to find ways to make it in various environments.

A Study on Security Technology using Mobile Virtualization TYPE-I (모바일 가상화 TYPE-I을 이용한 보안 기술 연구)

  • Kang, Yong-Ho;Jang, Chang-Bok;Kim, Joo-Man
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.1-9
    • /
    • 2015
  • Recently, with smart device proliferation and providing the various services using this, they have interested in mobile and Smart TV security. Smartphone users are enjoying various service, such as cloud, game, banking. But today's mobile security solutions and Study of Smart TV Security simply stays at the level of malicious code detection, mobile device management, security system itself. Accordingly, there is a need for technology for preventing hacking and leakage of sensitive information, such as certificates, legal documents, individual credit card number. To solve this problem, a variety of security technologies(mobile virtualization, ARM TrustZone, GlobalPlatform, MDM) in mobile devices have been studied. In this paper, we propose an efficient method to implement security technology based on TYPE-I virtualization using ARM TrustZone technology.

Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM (모바일 가상화 기술과 ARM의 Trustzone을 사용한 효율적인 보안 방법)

  • Choi, Hwi-Min;Jang, Chang-Bok;Kim, Joo-Man
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.299-308
    • /
    • 2014
  • Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.

An Analysis of Cyber Attacks and Response Cases Related to COVID-19 (코로나19 관련 사이버 공격 및 대응현황 분석)

  • Lee, Yongpil;Lee, Dong-Geun
    • Journal of Information Technology Services
    • /
    • v.20 no.5
    • /
    • pp.119-136
    • /
    • 2021
  • Since the global spread of COVID-19, social distancing and untact service implementation have spread rapidly. With the transition to a non-face-to-face environment such as telework and remote classes, cyber security threats have increased, and a lot of cyber compromises have also occurred. In this study, cyber-attacks and response cases related to COVID-19 are summarized in four aspects: cyber fraud, cyber-attacks on companies related to COVID-19 and healthcare sector, cyber-attacks on untact services such as telework, and preparation of untact services security for post-covid 19. After the outbreak of the COVID-19 pandemic, related events such as vaccination information and payment of national disaster aid continued to be used as bait for smishing and phishing. In the aspect of cyber-attacks on companies related to COVID-19 and healthcare sector, we can see that the damage was rapidly increasing as state-supported hackers attack those companies to obtain research results related to the COVID-19, and hackers chose medical institutions as targets with an efficient ransomware attack approach by changing 'spray and pray' strategy to 'big-game hunting'. Companies using untact services such as telework are experiencing cyber breaches due to insufficient security settings, non-installation of security patches, and vulnerabilities in systems constituting untact services such as VPN. In response to these cyber incidents, as a case of cyber fraud countermeasures, security notices to preventing cyber fraud damage to the public was announced, and security guidelines and ransomware countermeasures were provided to organizations related to COVID-19 and medical institutions. In addition, for companies that use and provide untact services, security vulnerability finding and system development environment security inspection service were provided by Government funding programs. We also looked at the differences in the role of the government and the target of security notices between domestic and overseas response cases. Lastly, considering the development of untact services by industry in preparation for post-COVID-19, supply chain security, cloud security, development security, and IoT security were suggested as common security reinforcement measures.

IoT Edge Architecture Model to Prevent Blockchain-Based Security Threats (블록체인 기반의 보안 위협을 예방할 수 있는 IoT 엣지 아키텍처 모델)

  • Yoon-Su Jeong
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.77-84
    • /
    • 2024
  • Over the past few years, IoT edges have begun to emerge based on new low-latency communication protocols such as 5G. However, IoT edges, despite their enormous advantages, pose new complementary threats, requiring new security solutions to address them. In this paper, we propose a cloud environment-based IoT edge architecture model that complements IoT systems. The proposed model acts on machine learning to prevent security threats in advance with network traffic data extracted from IoT edge devices. In addition, the proposed model ensures load and security in the access network (edge) by allocating some of the security data at the local node. The proposed model further reduces the load on the access network (edge) and secures the vulnerable part by allocating some functions of data processing and management to the local node among IoT edge environments. The proposed model virtualizes various IoT functions as a name service, and deploys hardware functions and sufficient computational resources to local nodes as needed.

Study on the Analysis of National Paralympics by Utilizing Social Big Data Text Mining (소셜 빅데이터 텍스트 마이닝을 활용한 전국장애인체육대회 분석 연구)

  • Kim, Dae kyung;Lee, Hyun Su
    • 한국체육학회지인문사회과학편
    • /
    • v.55 no.6
    • /
    • pp.801-810
    • /
    • 2016
  • The purpose of the study was to conduct a text mining examining keywords related to the National Paralympics and provide the fundamental information that would be used to change perception of people without disabilities toward disabilities and to promote the social participation of people with and without disabilities in the National Paralympics. Social big data regarding the National Paralympics were retrieved from news articles and blog postings identified by search engines, Naver, Daum, and Google. The data were then analysed using R-3.3.1 Version Program. The analysing techniques were cloud analysis, correlation analysis and social network analysis. The results were as follows. First, news were mainly related to game results, sports events, team participation and host avenue of the 33rd ~ 36th National Paralympics. Second, search results about the 33rd ~ 36th National Paralympics between Naver, Daum, and Google were similar to one another. Thirds, the keywrods, National Paralympics, sports for the disabled, and sports, demonstrated a high close centrality. Further, degree centrality and betweenness centrality were associated in the keywords such as sports for all, participation, research, development, sports-disabled, research-disabled, sports for all-participation, disabled-participation, sports for all-disabled, and host-paralympics.