• Title/Summary/Keyword: Computer/Internet Use

Search Result 1,603, Processing Time 0.029 seconds

Design and Implementation of MongoDB-based Unstructured Log Processing System over Cloud Computing Environment (클라우드 환경에서 MongoDB 기반의 비정형 로그 처리 시스템 설계 및 구현)

  • Kim, Myoungjin;Han, Seungho;Cui, Yun;Lee, Hanku
    • Journal of Internet Computing and Services
    • /
    • v.14 no.6
    • /
    • pp.71-84
    • /
    • 2013
  • Log data, which record the multitude of information created when operating computer systems, are utilized in many processes, from carrying out computer system inspection and process optimization to providing customized user optimization. In this paper, we propose a MongoDB-based unstructured log processing system in a cloud environment for processing the massive amount of log data of banks. Most of the log data generated during banking operations come from handling a client's business. Therefore, in order to gather, store, categorize, and analyze the log data generated while processing the client's business, a separate log data processing system needs to be established. However, the realization of flexible storage expansion functions for processing a massive amount of unstructured log data and executing a considerable number of functions to categorize and analyze the stored unstructured log data is difficult in existing computer environments. Thus, in this study, we use cloud computing technology to realize a cloud-based log data processing system for processing unstructured log data that are difficult to process using the existing computing infrastructure's analysis tools and management system. The proposed system uses the IaaS (Infrastructure as a Service) cloud environment to provide a flexible expansion of computing resources and includes the ability to flexibly expand resources such as storage space and memory under conditions such as extended storage or rapid increase in log data. Moreover, to overcome the processing limits of the existing analysis tool when a real-time analysis of the aggregated unstructured log data is required, the proposed system includes a Hadoop-based analysis module for quick and reliable parallel-distributed processing of the massive amount of log data. Furthermore, because the HDFS (Hadoop Distributed File System) stores data by generating copies of the block units of the aggregated log data, the proposed system offers automatic restore functions for the system to continually operate after it recovers from a malfunction. Finally, by establishing a distributed database using the NoSQL-based Mongo DB, the proposed system provides methods of effectively processing unstructured log data. Relational databases such as the MySQL databases have complex schemas that are inappropriate for processing unstructured log data. Further, strict schemas like those of relational databases cannot expand nodes in the case wherein the stored data are distributed to various nodes when the amount of data rapidly increases. NoSQL does not provide the complex computations that relational databases may provide but can easily expand the database through node dispersion when the amount of data increases rapidly; it is a non-relational database with an appropriate structure for processing unstructured data. The data models of the NoSQL are usually classified as Key-Value, column-oriented, and document-oriented types. Of these, the representative document-oriented data model, MongoDB, which has a free schema structure, is used in the proposed system. MongoDB is introduced to the proposed system because it makes it easy to process unstructured log data through a flexible schema structure, facilitates flexible node expansion when the amount of data is rapidly increasing, and provides an Auto-Sharding function that automatically expands storage. The proposed system is composed of a log collector module, a log graph generator module, a MongoDB module, a Hadoop-based analysis module, and a MySQL module. When the log data generated over the entire client business process of each bank are sent to the cloud server, the log collector module collects and classifies data according to the type of log data and distributes it to the MongoDB module and the MySQL module. The log graph generator module generates the results of the log analysis of the MongoDB module, Hadoop-based analysis module, and the MySQL module per analysis time and type of the aggregated log data, and provides them to the user through a web interface. Log data that require a real-time log data analysis are stored in the MySQL module and provided real-time by the log graph generator module. The aggregated log data per unit time are stored in the MongoDB module and plotted in a graph according to the user's various analysis conditions. The aggregated log data in the MongoDB module are parallel-distributed and processed by the Hadoop-based analysis module. A comparative evaluation is carried out against a log data processing system that uses only MySQL for inserting log data and estimating query performance; this evaluation proves the proposed system's superiority. Moreover, an optimal chunk size is confirmed through the log data insert performance evaluation of MongoDB for various chunk sizes.

Design and Performance Evaluation of ACA-TCP to Improve Performance of Congestion Control in Broadband Networks (광대역 네트워크에서의 혼잡 제어 성능 개선을 위한 ACA-TCP 설계 및 성능 분석)

  • Na, Sang-Wan;Park, Tae-Joon;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.10 s.352
    • /
    • pp.8-17
    • /
    • 2006
  • Recently, the high-speed Internet users increase rapidly and broadband networks have been widely deployed. However, the current TCP congestion control algorithm was designed for relatively narrowband network environments, and thus its performance is inefficient for traffic transport in broadband networks. To remedy this problem, the TCP having an enhanced congestion control algorithm is required for broadband networks. In this paper, we propose an improved TCP congestion control that can sufficiently utilize the large available bandwidth in broadband networks. The proposed algorithm predicts the available bandwidth by using ACK information and RTT variation, and prevents large packet losses by adjusting congestion window size appropriately. Also, it can rapidly utilize the large available bandwidth by enhancing the legacy TCP algorithm in congestion avoidance phase. In order to evaluate the performance of the proposed algorithm, we use the ns-2 simulator. The simulation results show that the proposed algorithm improves not only the utilization of the available bandwidth but also RTT fairness and the fairness between contending TCP flows better than the HSTCP in high bandwidth delay product network environment.

A Study of the Factors Affecting User Acceptance of Smart TVs (스마트TV 사용자 수용에 영향을 미치는 요인 연구)

  • Kim, Su-Yeon;Lee, Sang Hoon;Hwang, Hyun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1652-1662
    • /
    • 2013
  • As smart devices like smartphones and smart pads are prevalent recently, dramatic changes so called 'smart evolution' deployed in many socioeconomic areas. These changes lead the TV industry to develop a smart TV differentiated from a conventional TV by enabling internet connectivity and applications execution. In this study the factors affecting the acceptance of a smart TV are extracted by reviewing the previous works and the structural relationships among these factors are analyzed. Adding 'Social Influence' to consider an environmental factor and 'Innovativeness' for personal characteristics, we build an extended Technology Acceptance Model and analyzed the structural relationships among the factors in the model using Structural Equation Model. In the results we can find that the environmental factors affect the perceived characteristics. The moderating effects of gender and level of experience in smart devices have also been investigated. No difference is found between gender groups. In much-experienced group, Innovativeness affects Perceived Usefulness and acceptance of a smart TV. In less-experienced group, however, Innovativeness affects Perceived Ease of Use, Expected Enjoyment and finally acceptance of a smart TV.

A Study on Candidate Lane Detection using Hybrid Detection Technique (하이브리드 검출기법을 이용한 후보 차선검출에 관한 연구)

  • Park, Sang-Joo;Oh, Joong-Duk;Park, Roy C.
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.17 no.1
    • /
    • pp.18-25
    • /
    • 2016
  • As more people have cars, the threat of traffic accidents is posed on men and women of all ages. The main culprit of traffic accidents is driving while intoxicated or drowsy. The method to recognize and prevent the cause of traffic accidents is to use lane detection. In this study, a total of 4,000 frames (day image: 2,900 frames, night image: 1,100 frames) were used to test lane detection. According to the test, in the case of day image, when the threshold of Sobel edge detection technique was detected with second-order differential equation, there was the highest candidate lane detection rate which was 86.1%. In the threshold of Canny edge detection technique, the highest detection rate of 88.0% was found at Low=50, and High=300. In the case of night image, the threshold of Sobel edge detection technique, when horizontal calculation and vertical calculation had second-order differential equation, and when horizontal-vertical calculation had 1.5th-order differential equation, there was the highest detection rate which was 83.1%. In the threshold of Canny edge detection technique, the highest detection rate of 89.9% was found at Low=50, and High=300.

A Study of Prevention Model the Spread of Phishing Attack for Protection the Medical Information (의료정보 보호를 위한 피싱공격 확산방지모델 연구)

  • Choi, Kyong-Ho;Chung, Kyung-Yong;Shin, Dong-Kun
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.273-277
    • /
    • 2013
  • Phishing attacks have been implemented in smarter, more advanced ways with the passage of time. Hackers use intelligent phishing attacks to take over computers and to penetrate internal networks in major organizations. So, in this paper, a model for a prevention of phishing attack spread is conceptual designed in order to protect internal users and sensitive or important information from sophisticated phishing attacks. Internal users simultaneously utilize both external web and organizational mail services. And hackers can take the both side equally as a vector. Thus, packets in each service must be monitored and stored to recognize threatening elements from both sides. The model designed in this paper extends the mail server based security structure used in conventional studies for the protection of Internet mail services accessed by intranet users. This model can build a list of phishing sites as the system checks e-mails compared to that of the method that directly intercepts accesses to phishing sites using a proxy server, so it represents no standby time for request and response processes.

Mutiagent based on Attacker Traceback System using SOM (SOM을 이용한 멀티 에이전트 기반의 침입자 역 추적 시스템)

  • Choi Jinwoo;Woo Chong-Woo;Park Jaewoo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.3
    • /
    • pp.235-245
    • /
    • 2005
  • The rapid development of computer network technology has brought the Internet as the major infrastructure to our society. But the rapid increase in malicious computer intrusions using such technology causes urgent problems of protecting our information society. The recent trends of the intrusions reflect that the intruders do not break into victim host directly and do some malicious behaviors. Rather, they tend to use some automated intrusion tools to penetrate systems. Most of the unknown types of the intrusions are caused by using such tools, with some minor modifications. These tools are mostly similar to the Previous ones, and the results of using such tools remain the same as in common patterns. In this paper, we are describing design and implementation of attacker-traceback system, which traces the intruder based on the multi-agent architecture. The system first applied SOM to classify the unknown types of the intrusion into previous similar intrusion classes. And during the intrusion analysis stage, we formalized the patterns of the tools as a knowledge base. Based on the patterns, the agent system gets activated, and the automatic tracing of the intrusion routes begins through the previous attacked host, by finding some intrusion evidences on the attacked system.

A Reply Graph-based Social Mining Method with Topic Modeling (토픽 모델링을 이용한 댓글 그래프 기반 소셜 마이닝 기법)

  • Lee, Sang Yeon;Lee, Keon Myung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.6
    • /
    • pp.640-645
    • /
    • 2014
  • Many people use social network services as to communicate, to share an information and to build social relationships between others on the Internet. Twitter is such a representative service, where millions of tweets are posted a day and a huge amount of data collection has been being accumulated. Social mining that extracts the meaningful information from the massive data has been intensively studied. Typically, Twitter easily can deliver and retweet the contents using the following-follower relationships. Topic modeling in tweet data is a good tool for issue tracking in social media. To overcome the restrictions of short contents in tweets, we introduce a notion of reply graph which is constructed as a graph structure of which nodes correspond to users and of which edges correspond to existence of reply and retweet messages between the users. The LDA topic model, which is a typical method of topic modeling, is ineffective for short textual data. This paper introduces a topic modeling method that uses reply graph to reduce the number of short documents and to improve the quality of mining results. The proposed model uses the LDA model as the topic modeling framework for tweet issue tracking. Some experimental results of the proposed method are presented for a collection of Twitter data of 7 days.

Restoration of an Edentulous Patient with CAD/CAM Guided Implant Surgery ($NobelGuide^{TM}$) and Immediate Loading: Case Report (무치악 환자에서 CAD/CAM을 이용한 임플란트 식립($NobelGuide^{TM}$) 및 즉시하중 증례)

  • Ko, Kyoung-Ho;Lim, Kwang-Gil;Kim, Dae-Gon;Park, Chan-Jin;Cho, Lee-Ra
    • Journal of Dental Rehabilitation and Applied Science
    • /
    • v.27 no.2
    • /
    • pp.233-245
    • /
    • 2011
  • With the use of computed tomography (CT), computer-aided design/computer-assisted machining (CAD/CAM) technology and internet, the implant dentistry has been evolved. The surgical templates made by CAD/CAM technology and precise installation of implants, permit restorations to be inserted immediately after implants have been placed. The advantages of CAD/CAM guided implant procedures are flapless, minimally invasive surgery and shorter surgery time. With this technique, less postoperative morbidity and delivery of prosthesis for immediate function would be possible. A patient with an edentulous maxilla and mandible received 7 implants in mandible using CAD/CAM surgical templates. Prefabricated provisional fixed prostheses were connected immediately after implant installation. Provisional prostheses were evaluated for aesthetics and function during 6 months. Definitive prostheses were fabricated. At 6 months recall appointment, patient's occlusion was slightly changed. To prevent additional adverse effect, regular check-up and occlusal adjustment would be needed.

Qos Management System of BcN for Convergence Services of Broadcasting and Communication (방송통신 컨버전스 서비스를 위한 BcN의 Qos 관리시스템)

  • Song, Myung-Won;Choi, In-Young;Jung, Soon-Key
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.3
    • /
    • pp.121-131
    • /
    • 2009
  • BcN provides a wide variety of high-quality multimedia services such as broadcasting and communication convergence services. But the quality degeneration is observed in BcN when we use broadcasting and communication convergence service via more than one network of different internet service providers. In this paper, a QoS management system which is able to measure and maintain objectively the quality-related information in overall networks is proposed. The proposed QoS management system is tested on the pilot networks of BcN consortiums by measuring the quality of voice and video experienced by the actual users of the commercial video phone services. The result of the experiment shows that it is possible to figure out service qualify between a user and a service provider by analyzing the information from agents. The per-service traffic information collected by probes is proved to be useful to pinpoint the party responsible for the loss of the service qualify in case of the services including different service providers. As the result of the experiment, it is shown that the proposed QoS management system would play a key role of resolving the quality dispute, which is one of the important issues of QoS-guaranteed BcN.

A Qualitative Study of Running질 Science Garden질 (과학동산 운영에 관한 질적 연구)

  • 채동현;이수영
    • Journal of Korean Elementary Science Education
    • /
    • v.21 no.2
    • /
    • pp.263-288
    • /
    • 2002
  • 'Science Garden' is a science program that develops acquirements of science & technology at an early stage through experiential study and inspire the spirit of scientific inquiry by carrying out laboratory work, science movie, science lecture, scientific work, outdoor activities, computer classes and science experiment which is hard to do through the regular educational course. It is targeted grade 4,5,6 students during summer and winter vacation. 'Science Garden' is conducted by selective participation freely. It is a wholelistic activity that develops children's potential talents or creativities, improves interest and attitude toward science, and also gives opportunity for self-realization by extending capacity for inquiry to show each student's ability. This study is observed and is compared how it is conducted in elementary school using qualitative study. This study is used narrative observation, in-depth interview and document analysis. Objects of narrative observation are two elementary schools, each from Jellabukdo and Gyeonggido, and 7 teachers were interviewed in-depthly. Here are results of the study. 1 A teacher in school G never takes part in student activities, tends to be indifferent to classes, but focuses on observation and experiment in laboratory. And feedback or evaluation about student's activity is never done. On the other hand, a teacher in school S guides students to understand the principals of science on themselves, and wide variety forms of activities such as role playing, discussion, and games are being done. But an effort to evaluate student's activity is not being made properly. 2. Teachers set a high valuation on the need of 'Science Garden'. Observing the way of conducting 'Science Garden', usually teachers who is in charge of science for official work is selected as a teacher in charge, and groan under a heavy burden of conducting it without anyone's help. Participating students are selected by volunteering or teacher's recommendation, but because of low Participation rate, teachers have difficulty in conducting it. Plan for conducting ‘science Garden’ is made 20 days before it, after getting an official document from Office of Education, refering to booklets produced by National Jungang Science Institute, or data from Office of Education, and internet. Teachers evaluate rarely Most school principals have interest in 'Science Garden' but parents are not well aware of it, The budget is made at the same time with the plan, and scale is varied between 200,000∼500,000 won. Because of the improper way of selecting teacher in charge, difficulty in selecting students, heavy works caused by planning, conducting the program, as well as reporting teacher's work, and lack of parents' awareness, 'Science Garden' has been conducted formally and superficially. Next gives you direction to change, for the right way of conducting' Science Garden'. It is important to motivate competent teachers to instruct students actively. For students' active participation, They should publicize thoroughly beforehand, and develope 'Science Garden' program for teachers to be able to make better use of it. Evaluation of student activities and program should be done in the aspect of developing students’ faculties. Beside of school facilities, they need to put diverse local facilities and places to practical use for immediate natural experience. And not only separate schools but also associated form of schools to conduct it is necessary.

  • PDF