• Title/Summary/Keyword: Deployment Service

Search Result 349, Processing Time 0.028 seconds

A Parallel Streaming Server for the Realtime 3D Internet Broadcasting (병렬 스트리밍 서버 기반 실시간 3D 인터넷 방송 서비스)

  • Kang, Mi-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.7
    • /
    • pp.879-884
    • /
    • 2020
  • In the conventional video file system, videos are stored in a high performance server which has mass storage hard disks or disk arrays. For 3D internet broadcasting, real time operations are required to transmit video files to many clients. This paper describes the design of the 3D internet broadcasting system which can provide realtime streaming service to many users in the 5G environment. In reality, unicast is used to transmit multimedia contents over the internet rather than IP multicast since IP multicast has its own drawbacks in deployment, security, maintenance and so on. In addition, multimedia broadcasting service system like VoD has difficulties in applying to 3D internet broadcasting system since it requires a large amount of system and network resources. In this work, we develop a 3D internet broadcasting system which can construct effective data delivery by minimizing performance-degrading factors.

The Effect of Experienced Consumers' Concerns on Willingness to Purchase Battery Electric Vehicles (순수전기차 경험 고객의 우려 요인에 따른 전기차 구매 의사 영향)

  • Jeong, Jikhan
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.143-162
    • /
    • 2021
  • Research on consumers' perception and willingness to purchase Battery Electric Vehicles (BEVs) is necessary to simulate BEVs' deployment in South Korea because South Korea's BEVs market is still in the early stage. This paper derives a theoretical framework for consumer segmentation based on consumers' willingness to purchase before and after BEV usage experience. In particular, this study empirically evaluates consumers' willingness to purchase and concerns using the survey data from BEVs users in either Seoul or the Jeju region. The empirical results from logit models show that experienced consumers' concerns about the heater and air conditioning (HAC) in BEVs decreased the consumers' willingness to buy, while greater daily driving distances increased the consumers' willingness to buy. In addition, the empirical findings from ordered probit models show that experienced consumers' concerns about the short driving distance, the availability of maintenance service (i.e., A/S service) during unexpected events, and the difficulties of driving BEVs up-hill increased the degree of concern about HAC. This paper will provide insights related to consumer segmentation, R&D, marketing strategies, and policy design for policymakers and firms.

Intelligent & Predictive Security Deployment in IOT Environments

  • Abdul ghani, ansari;Irfana, Memon;Fayyaz, Ahmed;Majid Hussain, Memon;Kelash, Kanwar;fareed, Jokhio
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.185-196
    • /
    • 2022
  • The Internet of Things (IoT) has become more and more widespread in recent years, thus attackers are placing greater emphasis on IoT environments. The IoT connects a large number of smart devices via wired and wireless networks that incorporate sensors or actuators in order to produce and share meaningful information. Attackers employed IoT devices as bots to assault the target server; however, because of their resource limitations, these devices are easily infected with IoT malware. The Distributed Denial of Service (DDoS) is one of the many security problems that might arise in an IoT context. DDOS attempt involves flooding a target server with irrelevant requests in an effort to disrupt it fully or partially. This worst practice blocks the legitimate user requests from being processed. We explored an intelligent intrusion detection system (IIDS) using a particular sort of machine learning, such as Artificial Neural Networks, (ANN) in order to handle and mitigate this type of cyber-attacks. In this research paper Feed-Forward Neural Network (FNN) is tested for detecting the DDOS attacks using a modified version of the KDD Cup 99 dataset. The aim of this paper is to determine the performance of the most effective and efficient Back-propagation algorithms among several algorithms and check the potential capability of ANN- based network model as a classifier to counteract the cyber-attacks in IoT environments. We have found that except Gradient Descent with Momentum Algorithm, the success rate obtained by the other three optimized and effective Back- Propagation algorithms is above 99.00%. The experimental findings showed that the accuracy rate of the proposed method using ANN is satisfactory.

Design and Implementation of a Lightweight On-Device AI-Based Real-time Fault Diagnosis System using Continual Learning (연속학습을 활용한 경량 온-디바이스 AI 기반 실시간 기계 결함 진단 시스템 설계 및 구현)

  • Youngjun Kim;Taewan Kim;Suhyun Kim;Seongjae Lee;Taehyoun Kim
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.19 no.3
    • /
    • pp.151-158
    • /
    • 2024
  • Although on-device artificial intelligence (AI) has gained attention to diagnosing machine faults in real time, most previous studies did not consider the model retraining and redeployment processes that must be performed in real-world industrial environments. Our study addresses this challenge by proposing an on-device AI-based real-time machine fault diagnosis system that utilizes continual learning. Our proposed system includes a lightweight convolutional neural network (CNN) model, a continual learning algorithm, and a real-time monitoring service. First, we developed a lightweight 1D CNN model to reduce the cost of model deployment and enable real-time inference on the target edge device with limited computing resources. We then compared the performance of five continual learning algorithms with three public bearing fault datasets and selected the most effective algorithm for our system. Finally, we implemented a real-time monitoring service using an open-source data visualization framework. In the performance comparison results between continual learning algorithms, we found that the replay-based algorithms outperformed the regularization-based algorithms, and the experience replay (ER) algorithm had the best diagnostic accuracy. We further tuned the number and length of data samples used for a memory buffer of the ER algorithm to maximize its performance. We confirmed that the performance of the ER algorithm becomes higher when a longer data length is used. Consequently, the proposed system showed an accuracy of 98.7%, while only 16.5% of the previous data was stored in memory buffer. Our lightweight CNN model was also able to diagnose a fault type of one data sample within 3.76 ms on the Raspberry Pi 4B device.

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

A study of Modeling and Simulation for Analyzing DDoS Attack Damage Scale and Defence Mechanism Expense (DDoS 공격 피해 규모 및 대응기법 비용분석을 위한 모델링 및 시뮬레이션 기술연구)

  • Kim, Ji-Yeon;Lee, Ju-Li;Park, Eun-Ji;Jang, Eun-Young;Kim, Hyung-Jong
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.39-47
    • /
    • 2009
  • Recently, the threat of DDoS attacks is increasing and many companies are planned to deploy the DDoS defense solutions in their networks. The DDoS attack usually transmits heavy traffic data to networks or servers and they cannot handle the normal service requests because of running out of resources. Since it is very hard to prevent the DDoS attack beforehand, the strategic plan is very important. In this work, we have conducted modeling and simulation of the DDoS attack by changing the number of servers and estimated the duration that services are available. In this work, the modeling and simulation is conducted using OPNET Modeler. The simulation result can be used as a parameter of trade-off analysis of DDoS defense cost and the service's value. In addition, we have presented a way of estimating the cost effectiveness in deployment of the DDoS defense system.

Policy Measures for Improving Health Care Services in Rural Areas (농촌보건의료서비스 향상을 위한 제도 개선방안)

  • Moon, O.R.;Lee, L.S.;Park, J.Y.;Ko, D.H.;Lee, K.H.
    • Journal of agricultural medicine and community health
    • /
    • v.16 no.2
    • /
    • pp.97-119
    • /
    • 1991
  • Korea has made a rapid economic development since the last three decades. This has helped Korea narrow the gap in health service differences in resource availability and in quality of care. However urban and rural differentials are still remarkable. This study has maintained that health status of rural residents is inferior to that of urban dwellers. Therefore, this study was carried out to develop policy measures for improving health services in rural areas. In order to achieve the objective of this study the authors collaborated closely and made field visits, interviews and conducted an extensive literature review regarding rural health services. The following policy options are recommended as a summary ; First, the quality of rural health personnel is a single most important factor influencing the level of rural health services. An innovative program for public health doctors to the internship and/or residency training program such as specialty board program of family medicine. Second, dissatisfaction regarding employment of public health doctors is problematic. More rational employment and deployment programs are needed to meet their personal desire. One way to do this is to make it wide open and competitive. Third this study shows how to increase physician productivity in the rural public health sector. Incentive system needs to be elaborated for the career development of rural health workers. University linked job opportunity as clinical professor is an example. Fourth, without straightening the function of health centers and subcenters, the future of rural health services is doomed to failure. Straightening primary health care is one way to enrich the program of public health facilities and reactivating the operation of health center/hospital is another. A close linkage of public facilities with private hospitals is a minimum requirement for the operation of health delivery system within a health district. Fifth, some measures are urgently required to enhance hospital services in medically underserved areas. Financial subsidy, tax exemption, long-term public loans and higher priority of health manpower deployment are some of them. Sixth, new health programs should be in tiated to meet changing needs of peoples in rural areas. Home health care program, hospice program, nursing home, residential program for the elderly are recommended.

  • PDF

Pohang City Fire Vulnerable Area Prediction and Fire Damage Rating Measurement by Administrative District (포항시 화재 취약지역 예측 및 이에 따른 행정구역별 화재 피해 등급 측정)

  • Lim, Jung-Hoon;Kim, Heon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.4
    • /
    • pp.166-176
    • /
    • 2021
  • Due to urbanization and industrialization, the importance of large-scale fire prevention, management and measures is increasing day by day. However, the fire site arrival rate in Golden Time, which is a factor that can minimize large-scale fire damage, of Pohang, a large city with a population of over 500,000, is relatively low. So additional fire fighting power deployment and infrastructure investment are required. However, as budget and manpower are limited, it is necessary to selectively deploy fire fighting power and invest in infrastructure. Therefore, this study attempted to present a fire damage rating that can compare the level of fire damage, which is an index that can help selectively provide fire fighting services in Pohang and make related decisions. For the index, the OD cost matrix was used to predict fire vulnerable areas with a high probability of increasing the fire scale in the event of a fire. Also fire damage was measured by predicting the level of fire damage in the event of a fire according to population, building density, and access of fire trucks. It is expected that the fire damage rating will be able to help in various decisions related to fire fighting service deployment and services not only in Pohang city, but also in other regions.

A Performance Evaluation of the e-Gov Standard Framework on PaaS Cloud Computing Environment: A Geo-based Image Processing Case (PaaS 클라우드 컴퓨팅 환경에서 전자정부 표준프레임워크 성능평가: 공간영상 정보처리 사례)

  • KIM, Kwang-Seob;LEE, Ki-Won
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.21 no.4
    • /
    • pp.1-13
    • /
    • 2018
  • Both Platform as a Service (PaaS) as one of the cloud computing service models and the e-government (e-Gov) standard framework from the Ministry of the Interior and Safety (MOIS) provide developers with practical computing environments to build their applications in every web-based services. Web application developers in the geo-spatial information field can utilize and deploy many middleware software or common functions provided by either the cloud-based service or the e-Gov standard framework. However, there are few studies for their applicability and performance in the field of actual geo-spatial information application yet. Therefore, the motivation of this study was to investigate the relevance of these technologies or platform. The applicability of these computing environments and the performance evaluation were performed after a test application deployment of the spatial image processing case service using Web Processing Service (WPS) 2.0 on the e-Gov standard framework. This system was a test service supported by a cloud environment of Cloud Foundry, one of open source PaaS cloud platforms. Using these components, the performance of the test system in two cases of 300 and 500 threads was assessed through a comparison test with two kinds of service: a service case for only the PaaS and that on the e-Gov on the PaaS. The performance measurements were based on the recording of response time with respect to users' requests during 3,600 seconds. According to the experimental results, all the test cases of the e-Gov on PaaS considered showed a greater performance. It is expected that the e-Gov standard framework on the PaaS cloud would be important factors to build the web-based spatial information service, especially in public sectors.

Efficient Transmission of Scalable Video Streams Using Dual-Channel Structure (듀얼 채널 구조를 이용한 Scalable 비디오(SVC)의 전송 성능 향상)

  • Yoo, Homin;Lee, Jaemyoun;Park, Juyoung;Han, Sanghwa;Kang, Kyungtae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.9
    • /
    • pp.381-392
    • /
    • 2013
  • During the last decade, the multitude of advances attained in terminal computers, along with the introduction of mobile hand-held devices, and the deployment of high speed networks have led to a recent surge of interest in Quality of Service (QoS) for video applications. The main difficulty is that mobile devices experience disparate channel conditions, which results in different rates and patterns of packet loss. One way of making more efficient use of network resources in video services over wireless channels with heterogeneous characteristics to heterogeneous types of mobile device is to use a scalable video coding (SVC). An SVC divides a video stream into a base layer and a single or multiple enhancement layers. We have to ensure that the base layer of the video stream is successfully received and decoded by the subscribers, because it provides the basis for the subsequent decoding of the enhancement layer(s). At the same time, a system should be designed so that the enhancement layer(s) can be successfully decoded by as many users as possible, so that the average QoS is as high as possible. To accommodate these characteristics, we propose an efficient transmission scheme which incorporates SVC-aware dual-channel repetition to improve the perceived quality of services. We repeat the base-layer data over two channels, with different characteristics, to exploit transmission diversity. On the other hand, those channels are utilized to increase the data rate of enhancement layer data. This arrangement reduces service disruption under poor channel conditions by protecting the data that is more important to video decoding. Simulations show that our scheme safeguards the important packets and improves perceived video quality at a mobile device.