• Title/Summary/Keyword: Computing Platform

Search Result 864, Processing Time 0.031 seconds

Development of Contents on the Marine Meteorology Service by Meteorology and Climate Big Data (기상기후 빅데이터를 활용한 해양기상서비스 콘텐츠 개발)

  • Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.2
    • /
    • pp.125-138
    • /
    • 2016
  • Currently, there is increasing demand for weather information, however, providing meteorology and climate information is limited. In order to improve them, supporting the meteorology and climate big data platform use and training the meteorology and climate big data specialist who meet the needs of government, public agencies and corporate, are required. Meteorology and climate big data requires high-value usable service in variety fields, and it should be provided personalized service of industry-specific type for the service extension and new content development. To provide personalized service, it is essential to build the collaboration ecosystem at the national level. Building the collaboration ecosystem environment, convergence of marine policy and climate policy, convergence of oceanography and meteorology and convergence of R&D basic research and applied research are required. Since then, demand analysis, production sharing information, unification are able to build the collaboration ecosystem.

Validation of fetus aneuploidy in 221 Korean clinical samples using noninvasive chromosome examination: Clinical laboratory improvement amendments-certified noninvasive prenatal test

  • Kim, Min-Jeong;Kwon, Chang Hyuk;Kim, Dong-In;Im, Hee Su;Park, Sungil;Kim, Ji Ho;Bae, Jin-Sik;Lee, Myunghee;Lee, Min Seob
    • Journal of Genetic Medicine
    • /
    • v.12 no.2
    • /
    • pp.79-84
    • /
    • 2015
  • Purpose: We developed and validated a fetal trisomy detection method for use as a noninvasive prenatal test (NIPT) including a Clinical Laboratory Improvement Amendments (CLIA)-certified bioinformatics pipeline on a cloud-based computing system using both Illumina and Life Technology sequencing platforms for 221 Korean clinical samples. We determined the necessary proportions of the fetal fraction in the cell-free DNA (cfDNA) sample for NIPT of trisomies 13, 18, and 21 through a limit of quantification (LOQ) test. Materials and Methods: Next-generation sequencing libraries from 221 clinical samples and three positive controls were generated using Illumina and Life Technology chemistries. Sequencing results were uploaded to a cloud and mapped on the human reference genome (GRCh37/hg19) using bioinformatics tools. Based on Z-scores calculated by normalization of the mapped read counts, final aneuploidy reports were automatically generated for fetal aneuploidy determination. Results: We identified in total 29 aneuploid samples, and additional analytical methods performed to confirm the results showed that one of these was a false-positive. The LOQ test showed that the proportion of fetal fraction in the cfDNA sample would affect the interpretation of the aneuploidy results. Conclusion: Noninvasive chromosome examination (NICE), a CLIA-certified NIPT with a cloud-based bioinformatics platform, showed unambiguous success in fetus aneuploidy detection.

A Customized Tourism System Using Log Data on Hadoop (로그 데이터를 이용한 하둡기반 맞춤형 관광시스템)

  • Ya, Ding;Kim, Kang-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.2
    • /
    • pp.397-404
    • /
    • 2018
  • As the usage of internet is increasing, a lot of user behavior are written in a log file and the researches and industries using the log files are getting activated recently. This paper uses the Hadoop based on open source distributed computing platform and proposes a customized tourism system by analyzing user behaviors in the log files. The proposed system uses Google Analytics to get user's log files from the website that users visit, and stores search terms extracted by MapReduce to HDFS. Also it gathers features about the sight-seeing places or cities which travelers want to tour from travel guide websites by Octopus application. It suggests the customized cities by matching the search terms and city features. NBP(next bit permutation) algorithm to rearrange the search terms and city features is used to increase the probability of matching. Some customized cities are suggested by analyzing log files for 39 users to show the performance of the proposed system.

An Intelligent Decision Support System for Retinal Disease Diagnosis based on SVM using a Smartphone (스마트폰을 이용한 SVM 기반 망막 질병 진단을 위한 지능적인 의사 결정 지원 시스템)

  • Lee, Byung-Kwan;Jeong, Eun-Hee;Tifani, Yusrina
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.5
    • /
    • pp.373-383
    • /
    • 2015
  • This paper proposes a decision support system to recognizing retinal diseases. This paper uses a smartphone platform and cloud computing as the base of the system. A microscopic lens is attached int' the smartphone camera to capture the user retinal image for recognizing the user's retinal condition. An application is assembled in computer and then installed in to the smartphone. The application role is to connect between the system in smartphone and system in cloud, the application will send the retinal image to the cloud system to be classified. The paper uses OCFE (optimized classifier based on feature elimination) algorithm as the classifier. The retinal image is trained using combination of two ophthalmology databases DIARETDB1 v2.1 and STARE. Therefore, this system average accuracy is 88%, while the average error rate is 12%.

A Group based Privacy-preserving Data Perturbation Technique in Distributed OSN (분산 OSN 환경에서 프라이버시 보호를 위한 그룹 기반의 데이터 퍼튜베이션 기법)

  • Lee, Joohyoung;Park, Seog
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.12
    • /
    • pp.675-680
    • /
    • 2016
  • The development of various mobile devices and mobile platform technology has led to a steady increase in the number of online social network (OSN) users. OSN users are free to communicate and share information through activities such as social networking, but this causes a new, user privacy issue. Various distributed OSN architectures are introduced to address the user privacy concern, however, users do not obtain technically perfect control over their data. In this study, the control rights of OSN user are maintained by using personal data storage (PDS). We propose a technique to improve data privacy protection that involves making a group with the user's friend by generating and providing fake text data based on user's real text data. Fake text data is generated based on the user's word sensitivity value, so that the user's friends can receive the user's differential data. As a result, we propose a system architecture that solves possible problems in the tradeoff between service utility and user privacy in OSN.

Web contents deformation detection method by BHO (BHO 이용한 웹 컨텐츠 변조 탐지 방법)

  • Mo, Jeong-Hoon;Chung, Man-Hyun;Cho, Jae-Ik;Moon, Jong-Sub
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.655-663
    • /
    • 2011
  • Recently, with improvement of internet service technology, web service has been affecting the environment for computing user. Not only current events, economics, game, entertainment, but also personal financial system is processed by web pages through internet. When data transmission is implemented on the internet, webpage acquire text form code and transform them to DOM information, and then shows processed display to user by web browser. However, those information are not only easily accessed by diversified route, but also easily deformed by intentional purpose. Furthermore, it is also possible to acquire logon information of users and certification information by detouring security mechanism. Therefore, this dissertation propose the method to verify integrity of web contents by using BHO which is one of the Add-On program based on MS Internet Explorer platform which is one of major web browser program designed by MicroSoft to detect any action of webpage deformation.

Energy-Efficient Real-Time Task Scheduling for Battery-Powered Wireless Sensor Nodes (배터리 작동식의 무선 센서 노드를 위한 에너지 효율적인 실시간 태스크 스케줄링)

  • Kim, Dong-Joo;Kim, Tae-Hoon;Tak, Sung-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.10
    • /
    • pp.1423-1435
    • /
    • 2010
  • Building wireless sensor networks requires a constituting sensor node to consider the following limited hardware resources: a small battery lifetime limiting available power supply for the sensor node, a low-power microprocessor with a low-performance computing capability, and scarce memory resources. Despite such limited hardware resources of the sensor node, the sensor node platform needs to activate real-time sensing, guarantee the real-time processing of sensing data, and exchange data between individual sensor nodes concurrently. Therefore, in this paper, we propose an energy-efficient real-time task scheduling technique for battery-powered wireless sensor nodes. The proposed energy-efficient task scheduling technique controls the microprocessor's operating frequency and reduces the power consumption of a task by exploiting the slack time of the task when the actual execution time of the task can be less than its worst case execution time. The outcomes from experiments showed that the proposed scheduling technique yielded efficient performance in terms of guaranteeing the completion of real-time tasks within their deadlines and aiming to provide low power consumption.

A Design of Secure Mobile Agent Systems Employing ID based Digital Multi-Signature Scheme (ID기반 디지털 다중 서명 기술을 적용한 안전한 이동 에이전트 시스템의 설계)

  • Yoo, Seong-Jin;Kim, Seong-Yeol;Lee, Ok-Bin;Chung, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.17-26
    • /
    • 2003
  • Mobile agent system comes into the spotlight since it contributes largely to mobile computing on distributed network environment. However, this system has a number of significant security Problems. In this Paper, we analyze suity attacks to mobile agent system Presented by NIST[3]. In order to protect this system from them, we suggest a security protocol for mobile agent system by employing R based key distribution and digital multi-signature scheme. To solve these problems described in NIST, securities for mobile agent and agent platform shouid be accomplished. Comparing with other protocols, our protocol performs both of these securities, while other protocols mentioned only one of them. Proposed Protocol satisfies simplicity of key management, providing security service such as confidentiality, integrity, authentication and preventing reputation, liveness guarantee, protection of excution-result data and preventing replay attack. Furthermore, it is designed to detect message modification immediately by verifying each step of agent execution at a corresponding server.

A Practical Method to Transform Component-based Design to Service-Oriented Design (컴포넌트 기반 개발 (CBD) 설계의 서비스 지향 아키텍처 (SOA) 설계로의 실용적인 변환 기법)

  • Cheun, Du-Wan;Jo, Sung-Hyun;Kim, Soo-Dong
    • The KIPS Transactions:PartD
    • /
    • v.18D no.6
    • /
    • pp.461-480
    • /
    • 2011
  • Component-Based Development (CBD) focuses on developing reusable components and assembling them into target applications. Service-Oriented Computing (SOC) is a relatively new paradigm where reusable services are developed, published, and composed into target service applications. Due to the popularity of CBD, many organizations already have CBD models for their applications. Hence, it is feasible and appealing to develop SOC applications economically by transforming existing CBD models, rather than developing SOC applications from the scratch. Our research is to develop a methodology for transforming existing CBD design into Service-Oriented Architecture (SOA) design. In this paper, we first compare the two paradigms and their key elements for the design; CBD design and SOA design. Then, we define mapping relationships of the transformation. For each transformation mapping, we present step-wise instructions. The benefit of applying this transformation is to increase reusability of existing design assets, to maintain the consistency between existing CBD and SOC models, and reduced cost for deploying service-oriented applications.

A Performance Analysis Framework Considering the Hierarchy of Embedded Linux Systems Software Architecture (임베디드 리눅스 시스템의 소프트웨어 계층구조를 고려한 성능 분석 프레임워크)

  • Kwak, Sang-Heon;Lee, Nam-Seung;Lee, Ho-Rim;Lim, Sung-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.6
    • /
    • pp.637-647
    • /
    • 2010
  • Recent embedded systems are being more complicated due to their hierarchical software architecture including operating systems. The performance of such complicated software architecture could not be well analyzed through separate analysis of each software layer; the combined effect and the interactions among the whole software layers should be considered. In this paper, we show the design and implementation of a performance analysis framework that enables hierarchical analysis of performance of Linux-based embedded systems considering interactions among the software layers. By using the proposed framework, we can obtain useful run-time information about a hierarchical software structure which usually consists of user-defined function layer, library function layer, system call layer, and kernel events layer. Experimental results reveal that the proposed framework could accurately identify the performance bottlenecks with the corresponding software layers during executions of target applications through the accompanying sub-steps of the analysis: the actual execution paths, the execution time of each observed event in each software layer, and the control flows across the software layers.