• Title/Summary/Keyword: Cloud services

Search Result 1,029, Processing Time 0.03 seconds

Intelligent Motion Pattern Recognition Algorithm for Abnormal Behavior Detections in Unmanned Stores (무인 점포 사용자 이상행동을 탐지하기 위한 지능형 모션 패턴 인식 알고리즘)

  • Young-june Choi;Ji-young Na;Jun-ho Ahn
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.73-80
    • /
    • 2023
  • The recent steep increase in the minimum hourly wage has increased the burden of labor costs, and the share of unmanned stores is increasing in the aftermath of COVID-19. As a result, theft crimes targeting unmanned stores are also increasing, and the "Just Walk Out" system is introduced to prevent such thefts, and LiDAR sensors, weight sensors, etc. are used or manually checked through continuous CCTV monitoring. However, the more expensive sensors are used, the higher the initial cost of operating the store and the higher the cost in many ways, and CCTV verification is difficult for managers to monitor around the clock and is limited in use. In this paper, we would like to propose an AI image processing fusion algorithm that can solve these sensors or human-dependent parts and detect customers who perform abnormal behaviors such as theft at low costs that can be used in unmanned stores and provide cloud-based notifications. In addition, this paper verifies the accuracy of each algorithm based on behavior pattern data collected from unmanned stores through motion capture using mediapipe, object detection using YOLO, and fusion algorithm and proves the performance of the convergence algorithm through various scenario designs.

A Study on Intelligent Self-Recovery Technologies for Cyber Assets to Actively Respond to Cyberattacks (사이버 공격에 능동대응하기 위한 사이버 자산의 지능형 자가복구기술 연구)

  • Se-ho Choi;Hang-sup Lim;Jung-young Choi;Oh-jin Kwon;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.137-144
    • /
    • 2023
  • Cyberattack technology is evolving to an unpredictable degree, and it is a situation that can happen 'at any time' rather than 'someday'. Infrastructure that is becoming hyper-connected and global due to cloud computing and the Internet of Things is an environment where cyberattacks can be more damaging than ever, and cyberattacks are still ongoing. Even if damage occurs due to external influences such as cyberattacks or natural disasters, intelligent self-recovery must evolve from a cyber resilience perspective to minimize downtime of cyber assets (OS, WEB, WAS, DB). In this paper, we propose an intelligent self-recovery technology to ensure sustainable cyber resilience when cyber assets fail to function properly due to a cyberattack. The original and updated history of cyber assets is managed in real-time using timeslot design and snapshot backup technology. It is necessary to secure technology that can automatically detect damage situations in conjunction with a commercialized file integrity monitoring program and minimize downtime of cyber assets by analyzing the correlation of backup data to damaged files on an intelligent basis to self-recover to an optimal state. In the future, we plan to research a pilot system that applies the unique functions of self-recovery technology and an operating model that can learn and analyze self-recovery strategies appropriate for cyber assets in damaged states.

Performance Evaluation and Analysis on Single and Multi-Network Virtualization Systems with Virtio and SR-IOV (가상화 시스템에서 Virtio와 SR-IOV 적용에 대한 단일 및 다중 네트워크 성능 평가 및 분석)

  • Jaehak Lee;Jongbeom Lim;Heonchang Yu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.2
    • /
    • pp.48-59
    • /
    • 2024
  • As functions that support virtualization on their own in hardware are developed, user applications having various workloads are operating efficiently in the virtualization system. SR-IOV is a virtualization support function that takes direct access to PCI devices, thus giving a high I/O performance by minimizing the need for hypervisor or operating system interventions. With SR-IOV, network I/O acceleration can be realized in virtualization systems that have relatively long I/O paths compared to bare-metal systems and frequent context switches between the user area and kernel area. To take performance advantages of SR-IOV, network resource management policies that can derive optimal network performance when SR-IOV is applied to an instance such as a virtual machine(VM) or container are being actively studied.This paper evaluates and analyzes the network performance of SR-IOV implementing I/O acceleration is compared with Virtio in terms of 1) network delay, 2) network throughput, 3) network fairness, 4) performance interference, and 5) multi-network. The contributions of this paper are as follows. First, the network I/O process of Virtio and SR-IOV was clearly explained in the virtualization system, and second, the evaluation results of the network performance of Virtio and SR-IOV were analyzed based on various performance metrics. Third, the system overhead and the possibility of optimization for the SR-IOV network in a virtualization system with high VM density were experimentally confirmed. The experimental results and analysis of the paper are expected to be referenced in the network resource management policy for virtualization systems that operate network-intensive services such as smart factories, connected cars, deep learning inference models, and crowdsourcing.

Text Mining-Based Analysis of Hyundai Automobile Consumer Satisfaction and Dissatisfaction Factors in the Chinese Market: A Comparison with Other Brands (텍스트 마이닝을 이용한 현대 자동차 중국시장 소비자의 만족 및 불만족 요인 분석 연구: 다른 브랜드와의 비교)

  • Cui Ran;Inyong Nam
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.539-549
    • /
    • 2024
  • This study employed text mining techniques like frequency analysis, word clouds, and LDA topic modeling to assess consumer satisfaction and dissatisfaction with Hyundai Motor Company in the Chinese market, compared to brands such as Toyota, Volkswagen, Buick, and Geely. Focusing on compact vehicles from these brands between 2021 and 2023, this study analyzed customer reviews. The results indicated Hyundai Avante's positive factors, including a long wheelbase. However, it also highlighted dissatisfaction aspects like Manipulate, engine performance, trunk space, chassis and suspension, safety features, quantity and brand of audio speakers, music membership service, separation band, screen reflection, CarLife, and map services. Addressing these issues could significantly enhance Hyundai's competitiveness in the Chinese market. Previous studies mainly focused on literature research and surveys, which only revealed consumer perceptions limited to the variables set by the researchers. This study, through text mining and comparing various car brands, aims to gain a deeper understanding of market trends and consumer preferences, providing useful information for marketing strategies of Hyundai and other brands in the Chinese market.

Effects of Environmental Conditions on Vegetation Indices from Multispectral Images: A Review

  • Md Asrakul Haque;Md Nasim Reza;Mohammod Ali;Md Rejaul Karim;Shahriar Ahmed;Kyung-Do Lee;Young Ho Khang;Sun-Ok Chung
    • Korean Journal of Remote Sensing
    • /
    • v.40 no.4
    • /
    • pp.319-341
    • /
    • 2024
  • The utilization of multispectral imaging systems (MIS) in remote sensing has become crucial for large-scale agricultural operations, particularly for diagnosing plant health, monitoring crop growth, and estimating plant phenotypic traits through vegetation indices (VIs). However, environmental factors can significantly affect the accuracy of multispectral reflectance data, leading to potential errors in VIs and crop status assessments. This paper reviewed the complex interactions between environmental conditions and multispectral sensors emphasizing the importance of accounting for these factors to enhance the reliability of reflectance data in agricultural applications.An overview of the fundamentals of multispectral sensors and the operational principles behind vegetation index (VI) computation was reviewed. The review highlights the impact of environmental conditions, particularly solar zenith angle (SZA), on reflectance data quality. Higher SZA values increase cloud optical thickness and droplet concentration by 40-70%, affecting reflectance in the red (-0.01 to 0.02) and near-infrared (NIR) bands (-0.03 to 0.06), crucial for VI accuracy. An SZA of 45° is optimal for data collection, while atmospheric conditions, such as water vapor and aerosols, greatly influence reflectance data, affecting forest biomass estimates and agricultural assessments. During the COVID-19 lockdown,reduced atmospheric interference improved the accuracy of satellite image reflectance consistency. The NIR/Red edge ratio and water index emerged as the most stable indices, providing consistent measurements across different lighting conditions. Additionally, a simulated environment demonstrated that MIS surface reflectance can vary 10-20% with changes in aerosol optical thickness, 15-30% with water vapor levels, and up to 25% in NIR reflectance due to high wind speeds. Seasonal factors like temperature and humidity can cause up to a 15% change, highlighting the complexity of environmental impacts on remote sensing data. This review indicated the importance of precisely managing environmental factors to maintain the integrity of VIs calculations. Explaining the relationship between environmental variables and multispectral sensors offers valuable insights for optimizing the accuracy and reliability of remote sensing data in various agricultural applications.

A Study on the UIC(University & Industry Collaboration) Model for Global New Business (글로벌 사업 진출을 위한 산학협력 협업촉진모델: 경남 G대학 GTEP 사업 실험사례연구)

  • Baek, Jong-ok;Park, Sang-hyeok;Seol, Byung-moon
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.10 no.6
    • /
    • pp.69-80
    • /
    • 2015
  • This can be promoted collaboration environment for the system and the system is very important for competitiveness, it is equipped. If so, could work in collaboration with members of the organization to promote collaboration what factors? Organizational collaboration and cooperation of many people working, or worth pursuing common goals by sharing information and processes to improve labor productivity, defined as collaboration. Factors that promote collaboration are shared visions, the organization's principles and rules that reflect the visions, on-line system developments, and communication methods. First, it embodies the vision shared by the more sympathetic members are active and voluntary participation in the activities of the organization can be achieved. Second, the members are aware of all the rules and principles of a united whole is accepted and leads to good performance. In addition, the ability to share sensitive business activities for self-development and also lead to work to make this a regular activity to create a team that can collaborate to help the environment and the atmosphere. Third, a systematic construction of the online collaboration system is made efficient and rapid task. According to Student team and A corporation we knew that Cloud services and social media, low-cost, high-efficiency services could achieve. The introduction of the latest information technology changes, the members of the organization's systems and active participation can take advantage of continuing education must be made. Fourth, the company to inform people both inside and outside of the organization to communicate actively to change the image of the company activities, the creation of corporate performance is very important to figure. Reflects the latest trend to actively use social media to communicate the effort is needed. For development of systematic collaboration promoting model steps to meet the organizational role. First, the Chief Executive Officer to make a firm and clear vision of the organization members to propagate the faith, empathy gives a sense of belonging should be able to have. Second, middle managers, CEO's vision is to systematically propagate the organizers rules and principles to establish a system would create. Third, general operatives internalize the vision of the company stating that the role of outside companies must adhere. The purpose of this study was well done in collaboration organizations promoting factors for strategic alignment model based on the golden circle and collaboration to understand and reflect the latest trends in information technology tools to take advantage of smart work and business know how student teams through case analysis will derive the success factors. This is the foundation for future empirical studies are expected to be present.

  • PDF

Genotype $\times$ Environment Interaction of Rice Yield in Multi-location Trials (벼 재배 품종과 환경의 상호작용)

  • 양창인;양세준;정영평;최해춘;신영범
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.46 no.6
    • /
    • pp.453-458
    • /
    • 2001
  • The Rural Development Administration (RDA) of Korea now operates a system called Rice Variety Selection Tests (RVST), which are now being implemented in eight Agricultural Research and Extension Services located in eight province RVST's objective is to provide accurate yield estimates and to select well-adapted varieties to each province. Systematic evaluation of entries included in RVST is a highly important task to select the best-adapted varieties to specific location and to observe the performance of entries across a wide range of test sites within a region. The rice yield data in RVST for ordinary transplanting in Kangwon province during 1997-2000 were analyzed. The experiments were carried out in three replications of a random complete block design with eleven entries across five locations. Additive Main effects and Multiplicative Interaction (AMMI) model was employed to examine the interaction between genotype and environment (G$\times$E) in the biplot form. It was found that genotype variability was as high as 66%, followed by G$\times$E interaction variability, 21%, and variability by environment, 13%. G$\times$E interaction was partitioned into two significant (P<0.05) principal components. Pattern analysis was used for interpretation on G$\times$E interaction and adaptibility. Major determinants among the meteorological factors on G$\times$E matrix were canopy minimum temperature, minimum relative humidity, sunshine hours, precipitation and mean cloud amount. Odaebyeo, Obongbyeo and Jinbubyeo were relatively stable varieties in all the regions. Furthermore, the most adapted varieties in each region, in terms of productivity, were evaluated.

  • PDF

Critical Success Factor of Noble Payment System: Multiple Case Studies (새로운 결제서비스의 성공요인: 다중사례연구)

  • Park, Arum;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.59-87
    • /
    • 2014
  • In MIS field, the researches on payment services are focused on adoption factors of payment service using behavior theories such as TRA(Theory of Reasoned Action), TAM(Technology Acceptance Model), and TPB (Theory of Planned Behavior). The previous researches presented various adoption factors according to types of payment service, nations, culture and so on even though adoption factors of identical payment service were presented differently by researchers. The payment service industry relatively has strong path dependency to the existing payment methods so that the research results on the identical payment service are different due to payment culture of nation. This paper aims to suggest a successful adoption factor of noble payment service regardless of nation's culture and characteristics of payment and prove it. In previous researches, common adoption factors of payment service are convenience, ease of use, security, convenience, speed etc. But real cases prove the fact that adoption factors that the previous researches present are not always critical to success to penetrate a market. For example, PayByPhone, NFC based parking payment service, successfully has penetrated to early market and grown. In contrast, Google Wallet service failed to be adopted to users despite NFC based payment method which provides convenience, security, ease of use. As shown in upper case, there remains an unexplained aspect. Therefore, the present research question emerged from the question: "What is the more essential and fundamental factor that should takes precedence over factors such as provides convenience, security, ease of use for successful penetration to market". With these cases, this paper analyzes four cases predicted on the following hypothesis and demonstrates it. "To successfully penetrate a market and sustainably grow, new payment service should find non-customer of the existing payment service and provide noble payment method so that they can use payment method". We give plausible explanations for the hypothesis using multiple case studies. Diners club, Danal, PayPal, Square were selected as a typical and successful cases in each category of payment service. The discussion on cases is primarily non-customer analysis that noble payment service targets on to find the most crucial factor in the early market, we does not attempt to consider factors for business growth. We clarified three-tier non-customer of the payment method that new payment service targets on and elaborated how new payment service satisfy them. In case of credit card, this payment service target first tier of non-customer who can't pay for because they don't have any cash temporarily but they have regular income. So credit card provides an opportunity which they can do economic activities by delaying the date of payment. In a result of wireless phone payment's case study, this service targets on second of non-customer who can't use online payment because they concern about security or have to take a complex process and learn how to use online payment method. Therefore, wireless phone payment provides very convenient payment method. Especially, it made group of young pay for a little money without a credit card. Case study result of PayPal, online payment service, shows that it targets on second tier of non-customer who reject to use online payment service because of concern about sensitive information leaks such as passwords and credit card details. Accordingly, PayPal service allows users to pay online without a provision of sensitive information. Final Square case result, Mobile POS -based payment service, also shows that it targets on second tier of non-customer who can't individually transact offline because of cash's shortness. Hence, Square provides dongle which function as POS by putting dongle in earphone terminal. As a result, four cases made non-customer their customer so that they could penetrate early market and had been extended their market share. Consequently, all cases supported the hypothesis and it is highly probable according to 'analytic generation' that case study methodology suggests. We present for judging the quality of research designs the following. Construct validity, internal validity, external validity, reliability are common to all social science methods, these have been summarized in numerous textbooks(Yin, 2014). In case study methodology, these also have served as a framework for assessing a large group of case studies (Gibbert, Ruigrok & Wicki, 2008). Construct validity is to identify correct operational measures for the concepts being studied. To satisfy construct validity, we use multiple sources of evidence such as the academic journals, magazine and articles etc. Internal validity is to seek to establish a causal relationship, whereby certain conditions are believed to lead to other conditions, as distinguished from spurious relationships. To satisfy internal validity, we do explanation building through four cases analysis. External validity is to define the domain to which a study's findings can be generalized. To satisfy this, replication logic in multiple case studies is used. Reliability is to demonstrate that the operations of a study -such as the data collection procedures- can be repeated, with the same results. To satisfy this, we use case study protocol. In Korea, the competition among stakeholders over mobile payment industry is intensifying. Not only main three Telecom Companies but also Smartphone companies and service provider like KakaoTalk announced that they would enter into mobile payment industry. Mobile payment industry is getting competitive. But it doesn't still have momentum effect notwithstanding positive presumptions that will grow very fast. Mobile payment services are categorized into various technology based payment service such as IC mobile card and Application payment service of cloud based, NFC, sound wave, BLE(Bluetooth Low Energy), Biometric recognition technology etc. Especially, mobile payment service is discontinuous innovations that users should change their behavior and noble infrastructure should be installed. These require users to learn how to use it and cause infra-installation cost to shopkeepers. Additionally, payment industry has the strong path dependency. In spite of these obstacles, mobile payment service which should provide dramatically improved value as a products and service of discontinuous innovations is focusing on convenience and security, convenience and so on. We suggest the following to success mobile payment service. First, non-customers of the existing payment service need to be identified. Second, needs of them should be taken. Then, noble payment service provides non-customer who can't pay by the previous payment method to payment method. In conclusion, mobile payment service can create new market and will result in extension of payment market.

Development of a complex failure prediction system using Hierarchical Attention Network (Hierarchical Attention Network를 이용한 복합 장애 발생 예측 시스템 개발)

  • Park, Youngchan;An, Sangjun;Kim, Mintae;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.4
    • /
    • pp.127-148
    • /
    • 2020
  • The data center is a physical environment facility for accommodating computer systems and related components, and is an essential foundation technology for next-generation core industries such as big data, smart factories, wearables, and smart homes. In particular, with the growth of cloud computing, the proportional expansion of the data center infrastructure is inevitable. Monitoring the health of these data center facilities is a way to maintain and manage the system and prevent failure. If a failure occurs in some elements of the facility, it may affect not only the relevant equipment but also other connected equipment, and may cause enormous damage. In particular, IT facilities are irregular due to interdependence and it is difficult to know the cause. In the previous study predicting failure in data center, failure was predicted by looking at a single server as a single state without assuming that the devices were mixed. Therefore, in this study, data center failures were classified into failures occurring inside the server (Outage A) and failures occurring outside the server (Outage B), and focused on analyzing complex failures occurring within the server. Server external failures include power, cooling, user errors, etc. Since such failures can be prevented in the early stages of data center facility construction, various solutions are being developed. On the other hand, the cause of the failure occurring in the server is difficult to determine, and adequate prevention has not yet been achieved. In particular, this is the reason why server failures do not occur singularly, cause other server failures, or receive something that causes failures from other servers. In other words, while the existing studies assumed that it was a single server that did not affect the servers and analyzed the failure, in this study, the failure occurred on the assumption that it had an effect between servers. In order to define the complex failure situation in the data center, failure history data for each equipment existing in the data center was used. There are four major failures considered in this study: Network Node Down, Server Down, Windows Activation Services Down, and Database Management System Service Down. The failures that occur for each device are sorted in chronological order, and when a failure occurs in a specific equipment, if a failure occurs in a specific equipment within 5 minutes from the time of occurrence, it is defined that the failure occurs simultaneously. After configuring the sequence for the devices that have failed at the same time, 5 devices that frequently occur simultaneously within the configured sequence were selected, and the case where the selected devices failed at the same time was confirmed through visualization. Since the server resource information collected for failure analysis is in units of time series and has flow, we used Long Short-term Memory (LSTM), a deep learning algorithm that can predict the next state through the previous state. In addition, unlike a single server, the Hierarchical Attention Network deep learning model structure was used in consideration of the fact that the level of multiple failures for each server is different. This algorithm is a method of increasing the prediction accuracy by giving weight to the server as the impact on the failure increases. The study began with defining the type of failure and selecting the analysis target. In the first experiment, the same collected data was assumed as a single server state and a multiple server state, and compared and analyzed. The second experiment improved the prediction accuracy in the case of a complex server by optimizing each server threshold. In the first experiment, which assumed each of a single server and multiple servers, in the case of a single server, it was predicted that three of the five servers did not have a failure even though the actual failure occurred. However, assuming multiple servers, all five servers were predicted to have failed. As a result of the experiment, the hypothesis that there is an effect between servers is proven. As a result of this study, it was confirmed that the prediction performance was superior when the multiple servers were assumed than when the single server was assumed. In particular, applying the Hierarchical Attention Network algorithm, assuming that the effects of each server will be different, played a role in improving the analysis effect. In addition, by applying a different threshold for each server, the prediction accuracy could be improved. This study showed that failures that are difficult to determine the cause can be predicted through historical data, and a model that can predict failures occurring in servers in data centers is presented. It is expected that the occurrence of disability can be prevented in advance using the results of this study.