• Title/Summary/Keyword: Cloud services

Search Result 1,013, Processing Time 0.031 seconds

Consideration Points for application of KOMPSAT Data to Open Data Cube (다목적실용위성 자료의 오픈 데이터 큐브 적용을 위한 기본 고려사항)

  • LEE, Ki-Won;KIM, Kwang-Seob;LEE, Sun-Gu;KIM, Yong-Seung
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.1
    • /
    • pp.62-77
    • /
    • 2019
  • Open Data Cube(ODC) has been emerging and developing as the open source platform in the Committee on Earth Observation Satellites(CEOS) for the Global Earth Observation System of Systems(GEOSS) deployed by the Group on Earth Observations (GEO), ODC can be applied to the deployment of scalable and large amounts of free and open satellite images in a cloud computing environment, and ODC-based country or regional application services have been provided for public users on the high performance. This study first summarizes the status of ODC, and then presents concepts and some considering points for linking this platform with Korea Multi-Purpose Satellite (KOMPSAT) images. For the reference, the main contents of ODC with the Google Earth Engine(GEE) were compared. Application procedures of KOMPSAT satellite image to implement ODC service were explained, and an intermediate process related to data ingestion using actual data was demonstrated. As well, it suggested some practical schemes to utilize KOMPSAT satellite images for the ODC application service from the perspective of open data licensing. Policy and technical products for KOMPSAT images to ODC are expected to provide important references for GEOSS in GEO to apply new satellite images of other countries and organizations in the future.

Implementation of the Large-scale Data Signature System Using Hash Tree Replication Approach (해시 트리 기반의 대규모 데이터 서명 시스템 구현)

  • Park, Seung Kyu
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.19-31
    • /
    • 2018
  • As the ICT technologies advance, the unprecedently large amount of digital data is created, transferred, stored, and utilized in every industry. With the data scale extension and the applying technologies advancement, the new services emerging from the use of large scale data make our living more convenient and useful. But the cybercrimes such as data forgery and/or change of data generation time are also increasing. For the data security against the cybercrimes, the technology for data integrity and the time verification are necessary. Today, public key based signature technology is the most commonly used. But a lot of costly system resources and the additional infra to manage the certificates and keys for using it make it impractical to use in the large-scale data environment. In this research, a new and far less system resources consuming signature technology for large scale data, based on the Hash Function and Merkle tree, is introduced. An improved method for processing the distributed hash trees is also suggested to mitigate the disruptions by server failures. The prototype system was implemented, and its performance was evaluated. The results show that the technology can be effectively used in a variety of areas like cloud computing, IoT, big data, fin-tech, etc., which produce a large-scale data.

  • PDF

Development of SDN-based Network Platform for Mobility Support (이동성 지원을 위한 SDN 기반의 네트워크 플랫폼 개발)

  • Lee, Wan-Jik;Lee, Ho-Young;Heo, Seok-Yeol
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.401-407
    • /
    • 2019
  • SDN(Softeware Defined Networking) has emerged to address the rapidly growing demand for cloud computing and to support network virtualization services. Therefor many companies and organizations have taken SDN as a next-generation network technology. However, unlike the wired network where the SDN is originally designed, the SDN in the wireless network has a restriction that it can not provide the mobility of the node. In this paper, we extended existing openflow protocol of SDN and developed SDN-based network platform, which enables the SDN controller to manage the radio resources of its network and support the mobility of the nodes. The mobility support function of this paper has the advantage that a node in the network can move using its two or more wireless interfaces by using the radio resource management function of the SDN controller. In order to test the functions implemented in this paper, we measured parameters related to various transmission performance according to various mobile experiments, and compared parameters related to performance using one wireless interface and two interfaces. The SDN-based network platform proposed in this paper is expected to be able to monitor the resources of wireless networks and support the mobility of nodes in the SDN environment.

Design and Evaluation of an Efficient Flushing Scheme for key-value Store (키-값 저장소를 위한 효율적인 로그 처리 기법 설계 및 평가)

  • Han, Hyuck
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.5
    • /
    • pp.187-193
    • /
    • 2019
  • Key-value storage engines are an essential component of growing demand in many computing environments, including social networks, online e-commerce, and cloud services. Recent key-value storage engines offer many features such as transaction, versioning, and replication. In a key-value storage engine, transaction processing provides atomicity through Write-Ahead-Logging (WAL), and a synchronous commit method for transaction processing flushes log data before the transaction completes. According to our observation, flushing log data to persistent storage is a performance bottleneck for key-value storage engines due to the significant overhead of fsync() calls despite the various optimizations of existing systems. In this article, we propose a group synchronization method to improve the performance of the key-value storage engine. We also design and implement a transaction scheduling method to perform other transactions while the system processes fsync() calls. The proposed method is an efficient way to reduce the number of frequent fsync() calls in the synchronous commit while supporting the same level of transaction provided by the existing system. We implement our scheme on the WiredTiger storage engine and our experimental results show that the proposed system improves the performance of key-value workloads over existing systems.

AI Fire Detection & Notification System

  • Na, You-min;Hyun, Dong-hwan;Park, Do-hyun;Hwang, Se-hyun;Lee, Soo-hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.63-71
    • /
    • 2020
  • In this paper, we propose a fire detection technology using YOLOv3 and EfficientDet, the most reliable artificial intelligence detection algorithm recently, an alert service that simultaneously transmits four kinds of notifications: text, web, app and e-mail, and an AWS system that links fire detection and notification service. There are two types of our highly accurate fire detection algorithms; the fire detection model based on YOLOv3, which operates locally, used more than 2000 fire data and learned through data augmentation, and the EfficientDet, which operates in the cloud, has conducted transfer learning on the pretrained model. Four types of notification services were established using AWS service and FCM service; in the case of the web, app, and mail, notifications were received immediately after notification transmission, and in the case of the text messaging system through the base station, the delay time was fast enough within one second. We proved the accuracy of our fire detection technology through fire detection experiments using the fire video, and we also measured the time of fire detection and notification service to check detecting time and notification time. Our AI fire detection and notification service system in this paper is expected to be more accurate and faster than past fire detection systems, which will greatly help secure golden time in the event of fire accidents.

A hybrid intrusion detection system based on CBA and OCSVM for unknown threat detection (알려지지 않은 위협 탐지를 위한 CBA와 OCSVM 기반 하이브리드 침입 탐지 시스템)

  • Shin, Gun-Yoon;Kim, Dong-Wook;Yun, Jiyoung;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.27-35
    • /
    • 2021
  • With the development of the Internet, various IT technologies such as IoT, Cloud, etc. have been developed, and various systems have been built in countries and companies. Because these systems generate and share vast amounts of data, they needed a variety of systems that could detect threats to protect the critical data contained in the system, which has been actively studied to date. Typical techniques include anomaly detection and misuse detection, and these techniques detect threats that are known or exhibit behavior different from normal. However, as IT technology advances, so do technologies that threaten systems, and these methods of detection. Advanced Persistent Threat (APT) attacks national or companies systems to steal important information and perform attacks such as system down. These threats apply previously unknown malware and attack technologies. Therefore, in this paper, we propose a hybrid intrusion detection system that combines anomaly detection and misuse detection to detect unknown threats. Two detection techniques have been applied to enable the detection of known and unknown threats, and by applying machine learning, more accurate threat detection is possible. In misuse detection, we applied Classification based on Association Rule(CBA) to generate rules for known threats, and in anomaly detection, we used One-Class SVM(OCSVM) to detect unknown threats. Experiments show that unknown threat detection accuracy is about 94%, and we confirm that unknown threats can be detected.

Delayed offloading scheme for IoT tasks considering opportunistic fog computing environment (기회적 포그 컴퓨팅 환경을 고려한 IoT 테스크의 지연된 오프로딩 제공 방안)

  • Kyung, Yeunwoong
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.89-92
    • /
    • 2020
  • According to the various IoT(Internet of Things) services, there have been lots of task offloading researches for IoT devices. Since there are service response delay and core network load issues in conventional cloud computing based offloadings, fog computing based offloading has been focused whose location is close to the IoT devices. However, even in the fog computing architecture, the load can be concentrated on the for computing node when the number of requests increase. To solve this problem, the opportunistic fog computing concept which offloads task to available computing resources such as cars and drones is introduced. In previous fog and opportunistic fog node researches, the offloading is performed immediately whenever the service request occurs. This means that the service requests can be offloaded to the opportunistic fog nodes only while they are available. However, if the service response delay requirement is satisfied, there is no need to offload the request immediately. In addition, the load can be distributed by making the best use of the opportunistic fog nodes. Therefore, this paper proposes a delayed offloading scheme to satisfy the response delay requirements and offload the request to the opportunistic fog nodes as efficiently as possible.

Development of Incident Detection Algorithm using GPS Data (GPS 정보를 활용한 돌발상황 검지 알고리즘 개발)

  • Kong, Yong-Hyuk;Kim, Hey-Jin;Yi, Yong-Ju;Kang, Sin-Jun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.4
    • /
    • pp.771-782
    • /
    • 2021
  • Regular or irregular situations such as traffic accidents, damage to road facilities, maintenance or repair work, and vehicle breakdowns occur frequently on highways. It is required to provide traffic services to drivers by promptly recognizing these regular or irregular situations, various techniques have been developed for rapidly collecting data and detecting abnormal traffic conditions to solve the problem. We propose a method that can be used for verification and demonstration of unexpected situation algorithms by establishing a system and developing algorithms for detecting unexpected situations on highways. For the detection of emergencies on expressways, a system was established by defining the expressway contingency and algorithm development, and a test bed was operated to suggest a method that can be used for verification and demonstration of contingency algorithms. In this study, a system was established by defining the unexpected situation and developing an algorithm to detect the unexpected situation on the highway, and a method that can be used verifying and demonstrating unexpected situations. It is expected to secure golden time for the injured by reducing the effectiveness of secondary accidents. Also predictable accidents can be reduced in case of unexpected situations and the detection time of unpredictable accidents.

Research on Case Analysis of Library E-learning Platforms: Focusing on Learning Contents and Functions (도서관 이러닝 플랫폼 사례분석 연구 - 학습 내용 및 기능을 중심으로 -)

  • SangEun, Cho;KyungMook, Oh
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.34 no.1
    • /
    • pp.209-238
    • /
    • 2023
  • This study aims to propose the main learning contents, functions and activation plans for building an e-learning platform for libraries through a literature review, case analysis and expert survey. Through the literature review, it was found that libraries must play a role in providing high-quality online education for users in the e-learning ecosystem. Based on the previous studies, a learning function analysis tool was developed for the analysis of the library's e-learning platform. Based on this, the learning contents, learning functions and characteristics of library e-learning platforms were analyzed, and expert surveys and interviews were conducted. As a results, the construction of a platform for effectively applying learning processes and technology is essential for the library's sustainable e-learning services. The contents that should be provided for characteristics of library education, reading guidance, information literacy instruction, library usage instruction, and the latest IT technologies. And The main learning functions include the ability to conduct video lectures and real-time classes among learning types, and learning activity support functions, a cloud platform support function and a personalized environment support function. Additionally, suggested re-education for library staff to improve their technical skills and the formation of an e-learning team.

DNN Model for Calculation of UV Index at The Location of User Using Solar Object Information and Sunlight Characteristics (태양객체 정보 및 태양광 특성을 이용하여 사용자 위치의 자외선 지수를 산출하는 DNN 모델)

  • Ga, Deog-hyun;Oh, Seung-Taek;Lim, Jae-Hyun
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.29-35
    • /
    • 2022
  • UV rays have beneficial or harmful effects on the human body depending on the degree of exposure. An accurate UV information is required for proper exposure to UV rays per individual. The UV rays' information is provided by the Korea Meteorological Administration as one component of daily weather information in Korea. However, it does not provide an accurate UVI at the user's location based on the region's Ultraviolet index. Some operate measuring instrument to obtain an accurate UVI, but it would be costly and inconvenient. Studies which assumed the UVI through environmental factors such as solar radiation and amount of cloud have been introduced, but those studies also could not provide service to individual. Therefore, this paper proposes a deep learning model to calculate UVI using solar object information and sunlight characteristics to provide an accurate UVI at individual location. After selecting the factors, which were considered as highly correlated with UVI such as location and size and illuminance of sun and which were obtained through the analysis of sky images and solar characteristics data, a data set for DNN model was constructed. A DNN model that calculates the UVI was finally realized by entering the solar object information and sunlight characteristics extracted through Mask R-CNN. In consideration of the domestic UVI recommendation standards, it was possible to accurately calculate UVI within the range of MAE 0.26 compared to the standard equipment in the performance evaluation for days with UVI above and below 8.