• Title/Summary/Keyword: Deployment Service

Search Result 353, Processing Time 0.022 seconds

A Research on the Cloud Computing Security Framework (클라우드 컴퓨팅 정보보호 프레임워크에 관한 연구)

  • kim, Jung-Duk;Lee, Seong-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1277-1286
    • /
    • 2013
  • Cloud computing's unique attributes such as elasticity, rapid provisioning and releasing, resource pooling, multi-tenancy, broad-network accessibility, and ubiquity bring many benefits to cloud adopters(company and organization), but also entails specific security risks associated with the type of adopted cloud and deployment mode. To minimize those types of risk, this paper proposed cloud computing security framework refered to strategic alliance model. The cloud computing security framework has main triangles that are cloud threat, security controls, cloud stakeholders and compose of three sides that are purposefulness, accountability, transparent responsibility. Main triangles define purpose of risk minimization, appointment of stakeholders, security activity for them and three sides of framework are principles of security control in the cloud computing, provide direction of deduction for seven service packages.

Design and Implementation of Efficient Storage and Retrieval Technology of Traffic Big Data (교통 빅데이터의 효율적 저장 및 검색 기술의 설계와 구현)

  • Kim, Ki-su;Yi, Jae-Jin;Kim, Hong-Hoi;Jang, Yo-lim;Hahm, Yu-Kun
    • The Journal of Bigdata
    • /
    • v.4 no.2
    • /
    • pp.207-220
    • /
    • 2019
  • Recent developments in information and communication technology has enabled the deployment of sensor based data to provide real-time services. In Korea, The Korea Transportation Safety Authority is collecting driving information of all commercial vehicles through a fitted digital tachograph (DTG). This information gathered using DTG can be utilized in various ways in the field of transportation. Notably in autonomous driving, the real-time analysis of this information can be used to prevent or respond to dangerous driving behavior. However, there is a limit to processing a large amount of data at a level suitable for real-time services using a traditional database system. In particular, due to a such technical problem, the processing of large quantity of traffic big data for real-time commercial vehicle operation information analysis has never been attempted in Korea. In order to solve this problem, this study optimized the new database server system and confirmed that a real-time service is possible. It is expected that the constructed database system will be used to secure base data needed to establish digital twin and autonomous driving environments.

  • PDF

An Analysis of Call Demands of Two Squads In Kyonggi Provincial fire and Disaster Headquarters (경기도 소방재난본부에 소속된 두 구급대의 출동수요 분석)

  • Uhm, Tai-Hwan
    • The Korean Journal of Emergency Medical Services
    • /
    • v.6 no.1
    • /
    • pp.77-86
    • /
    • 2002
  • The purposes of this research which was conducted by surveying lost/added unit hours reports, unit hour demand analysis worksheets from prehospital care reports of two squads in Kyonggi Provincial Fire and Disaster Headquarters for 20 weeks (January 1, 2002 - May 20, 2002) are to get Unit Hour Utilizations. Call Demands such as Unit Hour Demand, Simple Average Demand, High Average Demand, Peak Average Demand, the High Actual Demand. The conclusions from this analysis were summarized as follows: (1) By revealing Unit Hour Produced 3223.9, Call Volume 964, Unit Hour Utilization 0.299 at the Squad A and Unit Hour Produced 3328.4, Call Volume 901, Unit Hour Utilization 0.271 at the Squad B induced Korean Squads to chance identification, definition, direction of Unit Hour Utilization. (2) By revealing Simple Average Demand 7.4 on Monday Tuesday, High Average Demand 9.6 on Tuesday Friday. Peak Average Demand 11.5 on Tuesday, the High Actual Demand 12 on Tuesday Wednesday at the Squad A and Simple Average Demand 6.8 on Sunday, High Average Demand 10.4 on Monday, Peak Average Demand 11.5 on Monday, the High Actual Demand 13 on Monday at the Squad B enabled Korean Squads to utilize System Status Management. (3) The Maximum Calls per Unit Hour were 115 for 23:00~23:59, the Minimum Calls per Unit Hour were 46 for 05:00~05:49 in two squads. The Maximum Calls per Unit Hour were 7.4 on Tuesday Saturday, the Minimum Calls per Unit Hour were 6.1 on Thursday at the Squad A. The Maximum Calls per Unit Hour were 7.3 on Monday Saturday, the Minimum Calls per Unit Hour were 5.6 on Thursday at the Squad B. (4) Analyzing demand for EMTs in the optimum emergency medical service of Korea, we have been able to utilize this Unit Hour Utilization in company with the established estimation methods such as international comparisons or the number of ambulances for scientific reasonable estimation. (5) These Call Demands which were limited to the demand time in this study will make us expect some following studies including demand time, demand time, demand map for Strategic Deployment.

  • PDF

Study on Adopting EDR Report for Traffic Accident Analysis (교통사고분석에서 EDR 기록정보의 채택에 관한 고찰)

  • Park, Jongjin;Park, Jeongman;Lee, Yeonsub
    • Journal of Auto-vehicle Safety Association
    • /
    • v.12 no.3
    • /
    • pp.52-60
    • /
    • 2020
  • Usage of EDR(Event Data Recorder) report for traffic accident analysis is currently increasing due to government regulation of EDR data release. Nevertheless, a lot of investigators simply adopt by comparing the number of ignition cycles(crash) at event to the number of ignition cycles(download) without an exact judgment whether event data occurred by this accident or not. In the EDR report, besides ignition cycles, there are many factors such as event record type, algorithm active(rear/rollover/side/frontal), time between events, event severity status(rollover/rear/right side/reft side/frontal), belt switch circuit status, driver/passenger pretensioner/air-bag deployment, PDOF(Principal Direction of Force) by ΔV to be able to decide whether or not to adopt. also the event data is considered enough to vehicle damaged state, accident situation at the scene of the accident. and there is described in "all data should be examined in conjunction with other available physical evidence from the vehicle and scene" in the CDR(Crash Data Retrieval) report. Therefore many investigators have to decide whether or not to adopt after they consider sufficiently to above factors when they are the traffic accident analysis and investigate the causes of a accident on the adopted event data. In this paper, we report to traffic accident investigators notable points and analysis methods on the basis of thousands of cases and the results of one's own experiment in NFS(National Forensic Service).

A Study on the Design of Ship Drawing Process Management System Based on COM+ Service (COM+ 기반의 선박 설계공정관리 시스템 설계에 관한 연구)

  • 박대유;김응곤;김형진;양계정;윤성국
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.970-973
    • /
    • 2003
  • Recently, the development paradigm of enterprise information system has been moved from 2-tier environment to 3-tier environment. 3-tier environment makes possible to develop more efficient system in terms of the performance, extension, deployment and maintenance. The ship drawing process management system which manages a long-term drawing process and a great number of designers has to support an accuracy and a real-time of information but it is impossible because it is still served in 2-tier environment and some process of them is not developed yet. In this paper, we implemented the analysis and design of system based on CBD(Component Based Development) for the purpose of hanging the environment from two-dimensional Client/server architecture environment to COM+ based 3-tier architecture environment. And by completing a development of total system, the productivity and the efficiency of the ship drawing process management system will be improved. And a wide reuse of components makes possible to improve the productivity and efficiency of system.

  • PDF

Performance Analysis of Hybrid Downlink Call Admission Control Algorithm for Supporting Wireless Multimedia Services (무선 멀티 미디어 서비스를 위한 하이브리드 호 접속 제어 알고리듬의 제안 및 평가)

  • Kim, Jeong-Ho;Cho, Ho-Shin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.9A
    • /
    • pp.1031-1038
    • /
    • 2004
  • The call admission control algorithm of hybrid scheme is proposed to enhance the QoS(quality of service) of attempted multimedia calls. In the initial stage of 3rd generation multimedia services networks, the major limitations include the small sefyice coverage and the limited radio link capacity. Because the initial massive deployment of network elements such as base stations, base station controllers, and mobile switching centers is restricted to populated areas and the other areas should be covered with the fewer network elements, the radio channel resources are hmited and coverage network is supposed to be established. Therefore the QoS of multimedia services is expected to be severely degraded when tentative traffic hot spot occurs frequently. Thus, the blocking probability of attempted calls mcreases when relatively large number of users try to place multimedia calls in a hot spot area of the wireless networks. In this situation, the proposed hybrid scheme can mitigate the degradation of the QoS of multimedia services by using the available radio channels of the neighboring cells.

A Study on the Performance of VPN based on MPLS Networks (MPLS 망을 기반으로 하는 VPN의 성능에 관한 연구)

  • Shin, Tae-Sam;Kim, Young-Beom
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.8 no.1
    • /
    • pp.51-57
    • /
    • 2007
  • In this paper we introduce the concept of MPLS-based VPN and propose a scheme for providing VPN services in MPLS networks. Furthermore, we design the control components and the operational procedures and evaluated the performance of traditional VPN implementation methods and MPLS-based VPN. In this scheme it is possible to solve several problems that IP-based VPN pertains via the allocation of VPN ID and virtual space without tunneling, thereby providing effective VPN services. In other words, the MPLS-based VPN scheme uses MPLS networking technology together with the PSTN which can achieve a perfect segregation of user traffic on per-customer basis in a physical link and can guarantee high reliability and security levels. Specially, in the perspective of customers, it can save networking facilities installation and maintenance costs considerably. On the contrary, it possesses some shortcomings in that its deployment tends to be restricted within an ISP's network boundary and it is vulnerable to external security break-ins when going through public networks such as the Internet due to its lack of data encryption capability.

  • PDF

Hybrid ABS based Inter-Cell Scheduling Algorithms for QoS Improvement of Heterogeneous Networks (이기종 네트워크의 QoS 향상을 위한 Hybrid ABS기반 셀 간 스케줄링 알고리즘)

  • Kim, Myung-Dong;Seong, Hyeon-Kyeong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.17 no.1
    • /
    • pp.1-9
    • /
    • 2016
  • In this paper, for the improvement of quality of service(QoS) performance of heterogeneous networks, multi-cell scheduling is proposed. In order to implement the proposed algorithm, for the recognition of the impact on the throughput performance of users, macro-pico-cells that form distributed architecture were proposed. In operating heterogeneous networks, considering the centralized structure, a macro-RRH(Remote Radio Head) deployment scenario was proposed. For interference mitigation of the proposed system, by applying the optional sub-frame, through CQI(Channel Quality Indicator) measurement for each sub-frame period, constraint conditions were measured according to system situations. For the simplification, the pattern of the same ABS muting was assumed. In the above two multi-cell environments, the algorithm of high-speed load balancing maintenance was proposed.

IoT-enabled Solutions for Tour Photography Services

  • Jeong, Isu;Baek, Seungwoo;An, Eunsol;Kim, Yujin;Choi, Jiwoo;Yun, Jaeseok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.5
    • /
    • pp.127-135
    • /
    • 2020
  • In this paper, we propose an IoT-enabled solution for tour photography services with small-size investment and resources in the travel and tourism industries, being able to impact on economic, social, and cultural values. An IoT-enabled camera is developed based on an open hardware and software platform complying with oneM2M, which can make traditional embedded systems oneM2M-compliant devices due to a middleware solution called TAS (thing adaptation software). IoT cameras deployed around photo zones in a tour site could be remotely controlled via an IoT gateway with a Web-based application on a smartphone. Users would perform a pan and tilt camera control if they want and then take and download a perfect photo picture (even though they are away from the tour site). We expect that the proposed solution will promote the deployment IoT-enabled technologies in tour and travel industries which are important parts of the tertiary sector.

Performance Analysis of SDR Communication System Based on MTD Technology (MTD 기법이 적용된 SDR 통신 시스템의 성능 분석)

  • Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.51-56
    • /
    • 2017
  • With the rapid increase in the number of mobile terminals, demand for wireless technologies has sharply increased these days. While wireless communication provides advantages such as ease of deployment, mobility of terminals, continuity of session, and almost comparable transmission bandwidth to the wired communication, it has vulnerability to malicious radio attacks such as eavesdropping, denial of service, session hijacking, and jamming. Among a variety of methods of preventing wireless attacks, the MTD(Moving Target Defense) is the technique for improving the security capability of the defense system by constantly changing the ability of the system to be attacked. In this paper, in order to develop a resilient software defined radio communication testbed system, we present a novel MTD approach to change dynamically and randomly the radio parameters such as modulation scheme, operating frequency, packet size. The probability of successful attack on the developed MTD-based SDR communication system has been analysed in a mathematical way and verified through simulation.