• Title/Summary/Keyword: ICT성능성

Search Result 131, Processing Time 0.028 seconds

A Study on Operation Problems for the Emergency Medical Process Using Real-Time Data (실시간데이터를 활용한 응급의료 프로세스 운영에 관한 연구)

  • Kim, Daebeom
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.3
    • /
    • pp.125-139
    • /
    • 2017
  • Recently, interest in improving the quality of EMS(emergency medical services) has been increasing. Much effort is being made to innovate the EMS process. The rapid progress of ICT technology has accelerated the automation or intelligence of EMS processes. This study suggests an emergency room management method based on real-time data considering resource utilization optimization, minimization of human error and enhancement of predictability of medical care. Emergency room operation indices - Emergency care index, Short stay index, Human error inducing index, Waiting patience index - are developed. And emergency room operation rules based on these indices are presented. Simulation was performed on a virtual emergency room to verify the effectiveness of the proposed operating rule. Simulation results showed excellent performance in terms of length of stay.

Design and Implementation of Sensor Information Management System based on Celery-MongoDB (Celery-MongoDB 를 활용한 센서정보 관리시스템 설계 및 구현)

  • Kang, Yun-Hee
    • Journal of Platform Technology
    • /
    • v.9 no.2
    • /
    • pp.3-9
    • /
    • 2021
  • The management of sensor information requires the functions for registering, modifying and deleting rapidly sensor information about various many sensors. In this research, Celery and MongoDB are used for developing a sensory data management system. Celery supplies a queue structure based on asynchronous communication in Python. Celery is a distributed simple job-queue but reliable distributed system suitable for processing large message. MongoDB is a NoSQL database that is capable of managing various informal information. In this experiment, we have checked that variety of sensor information can be processed with this system in a IoT environment. To improve the performance for handling a message with sensory data, this system will be deployed in the edge of a cloud infrastructure.

Development of the central control system using IP PBX convergence with broadcasting function (방송기능이 있는 IP PBX 융합 중앙 관제 시스템 개발)

  • Kim, Sam-Taek
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.7
    • /
    • pp.1-6
    • /
    • 2021
  • Currently, virus infection such as Corona 19 has become commonplace, and interest in unmanned systems is increasing in the field for non-face-to-face ICT services. In this paper, the function and performance of remotely successfully controlling a store through video and audio using an IP PBX with a broadcasting function was verified through a test. And the fully unmanned system is not gaining credibility due to various technical problems, however the central control system is a very efficient and reliable system because the controller can directly control the customer while monitoring the access and the inside of the store through the video and audio. In the future, we plan to study a completely unmanned remote control system using A.I technology.

The Implementation Directions and an Analysis of Assistive Devices and Alternative Formats to Improve Accessibility for Disabled People (장애인 접근성 향상을 위한 보조기기 및 대체자료 분석과 구현 방향)

  • Rim, Myunghwan;Gil, Younhee;Jeon, Gwangil
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.7
    • /
    • pp.664-673
    • /
    • 2015
  • The assistive devices for disabled people are being highlighted even in industrial aspects through the policy and support for disabled people, enactment of regulation for the improvement of accessibility of disabled, technological innovation and product development. Recently, internet access with the sense of touch and hearing and utilizing electronic publishing contents and e-mailing are being convenient through the product of ICT development such as screen reader for visually impaired people, braille display, screen enlarger, text converter and others. Even so, in rapidly changing digital media smart era, the accessibility of visually impaired people is still poor and assistive devices and alternative formats are in need of improvement. Therefore, in aspect of the research and development innovation, this study proposes the implementation directions for improvement of accessibility by analyzing the current situation and structure of alternative formats and assistive devices for visually impaired people. As a result, in the future, various types of digital information are expected to be converted into a customized and realistic forms and distributed through a dedicated disability products or smart devices.

Efficient Hangul Word Processor (HWP) Malware Detection Using Semi-Supervised Learning with Augmented Data Utility Valuation (효율적인 HWP 악성코드 탐지를 위한 데이터 유용성 검증 및 확보 기반 준지도학습 기법)

  • JinHyuk Son;Gihyuk Ko;Ho-Mook Cho;Young-Kuk Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.71-82
    • /
    • 2024
  • With the advancement of information and communication technology (ICT), the use of electronic document types such as PDF, MS Office, and HWP files has increased. Such trend has led the cyber attackers increasingly try to spread malicious documents through e-mails and messengers. To counter such attacks, AI-based methodologies have been actively employed in order to detect malicious document files. The main challenge in detecting malicious HWP(Hangul Word Processor) files is the lack of quality dataset due to its usage is limited in Korea, compared to PDF and MS-Office files that are highly being utilized worldwide. To address this limitation, data augmentation have been proposed to diversify training data by transforming existing dataset, but as the usefulness of the augmented data is not evaluated, augmented data could end up harming model's performance. In this paper, we propose an effective semi-supervised learning technique in detecting malicious HWP document files, which improves overall AI model performance via quantifying the utility of augmented data and filtering out useless training data.

Correlation Analysis of Load-carrying Capacity by Safety Inspection Indicators in Bridges (교량 안전점검 지표별 내하성능 상관관계 분석)

  • Jung, Kyu San;Seo, Dong Woo;Kim, Jae Hwan;Cho, Han Min;Park, Ki Tae;Shin, Yeon-Woo
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.3
    • /
    • pp.89-99
    • /
    • 2022
  • Bridges are a key infrastructure that underpins economic and social activities. In Korea, bridges began to be built with economic development in the 1970s and were built intensively in the 1980s and 1990s. In recent years, as the number of bridges with a service life of more than 30 years is increasing, continuous maintenance is required to ensure the safety of the bridges. In particular, in order to cope with the aging of bridges, research on technology development such as maintenance using ICT technology, preventive maintenance, life cycle cost reduction, and long life bridge is being actively promoted. This paper presents the results of correlation analysis based on the safety evaluation data of bridges as part of the research on the development of a model for estimating load-carrying capacity of bridges. As a analysis result, indicators highly correlated with the load-carrying capacity of the bridge was derived.

SDN 개발 사례 : 고성능 SDN 제어기 MuL

  • Heo, Chan;Park, Seong-Yong
    • Information and Communications Magazine
    • /
    • v.30 no.3
    • /
    • pp.29-35
    • /
    • 2013
  • 네트워크 장비의 제어평면과 전송평면을 분리하고 전체 네트워크의 제어평면을 하나의 중앙 제어기에 통합하는 네트워크 아키텍처인 소프트웨어 정의 네트워킹 (Software Defined Networking)는 네트워크 산업과 학계에서 많은 관심을 받고 있다. 개별적으로 동작하는 기존 네트워크 장비와 달리 모든 제어평면의 기능이 하나의 중앙 제어기에 집중되기 때문에 제어기의 성능, 안정성, 유연성은 해당 제어기가 통제하는 네트워크 전체에 지대한 영향을 미치게 된다. 또 SDN의 제어계층과 전달계층 사이에 표준통신 인터페이스로 확고한 자리를 잡은 OpenFlow는 세계 유수의 글로벌ICT들이 참여하여 SDN열풍의 중심에 위치해있다. 본고 에서는 SDN의 개념에 대해 살펴보고, OpenFlow의 소개와 동작을 설명할 것이다. 또한 국내에서 최초로 개발된 새로운 OpenFlow 제어기인 MuL 제어기 플랫폼을 소개하고 다른 제어기들과의 비교분석을 통해 어떤 차별점을 갖는지 알아보고자 한다.

A Study on Machine Learning model for detection of DoS Attack (IP카메라의 DoS 공격 탐지 머신러닝 모델에 대한 연구)

  • Jung, Woong-Kyo;Kim, Dong-Young;Kwak, Byung Il
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.709-711
    • /
    • 2022
  • ICT 기술의 빠른 발전과 함께 Internet of Things (IoT) 환경에서의 Internet Protocol (IP) 카메라의 사용률이 증가하면서, IP 카메라에 대한 개인정보 이슈와 제품의 보안성 검토 관련 소비자의 개인정보 유출 우려가 증가하고 있다. 본 논문에서는, IP 카메라에 대한 4개 종류의 Denial of Service (DoS) 공격을 통해 IP 카메라 이상 반응을 확인했다. 또한, 이 과정에서 수집한 공격 패킷 데이터를 기반으로, DoS 공격을 탐지하는 간단한 피쳐 구성과 머신러닝 모델을 제안하였다. 최종적으로, DoS 공격을 통해 실제 IP 카메라에 대한 가용성 테스트를 수행하였으며 머신러닝 알고리즘 4개 Decision Tree, Random Forest, Multilayer Perceptron, SVM에서의 DoS 공격 탐지 성능을 비교하였다.

Chameleon Hash-Based Mutual Authentication Protocol for Secure Communications in OneM2M Environments (OneM2M 환경에서 안전한 통신을 위한 카멜레온 해쉬 기반의 상호인증 프로토콜)

  • Kim, Sung-soo;Jun, Moon-seog;Choi, Do-hyeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1958-1968
    • /
    • 2015
  • Things intelligence communication (M2M or IoT) service activation and global company of OneM2M-related business on aggressive investing and has led to the acceleration of change in the ICT market. But a variety of hacking security technology because of the possibility of secure communication (data exposure, theft, modification, deletion, etc.) has been issued as an important requirement. In this paper, we propose a mutual authentication protocol for secure communications chameleon hash based on the M2M environment. The results of performance analysis efficiency is encryption and decryption an average of 0.7%, calculated rate showed good results as compared to the target algorithm, equivalent to a 3%(Average 0.003 seconds) difference, mutual authentication and encryption region by using the key update advantage of ECC(Elliptic Curve Cryptography)based Chameleon hash function is signed of the operational efficiency, using a collision message verifiable properties demonstrated strong security of the communication section.

Deep Learning-Based Dynamic Scheduling with Multi-Agents Supporting Scalability in Edge Computing Environments (멀티 에이전트 에지 컴퓨팅 환경에서 확장성을 지원하는 딥러닝 기반 동적 스케줄링)

  • JongBeom Lim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.9
    • /
    • pp.399-406
    • /
    • 2023
  • Cloud computing has been evolved to support edge computing architecture that combines fog management layer with edge servers. The main reason why it is received much attention is low communication latency for real-time IoT applications. At the same time, various cloud task scheduling techniques based on artificial intelligence have been proposed. Artificial intelligence-based cloud task scheduling techniques show better performance in comparison to existing methods, but it has relatively high scheduling time. In this paper, we propose a deep learning-based dynamic scheduling with multi-agents supporting scalability in edge computing environments. The proposed method shows low scheduling time than previous artificial intelligence-based scheduling techniques. To show the effectiveness of the proposed method, we compare the performance between previous and proposed methods in a scalable experimental environment. The results show that our method supports real-time IoT applications with low scheduling time, and shows better performance in terms of the number of completed cloud tasks in a scalable experimental environment.