• Title/Summary/Keyword: Infrastructure as Code

Search Result 98, Processing Time 0.03 seconds

Design and Implementation of μ-Webpage based on QR Code (QR 코드 기반 마이크로 웹페이지 설계 및 구현)

  • Ha, Sunju;Eun, Seongbae;So, SeonSub;Yun, Young-Sun;Jung, Jinman
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.3
    • /
    • pp.239-246
    • /
    • 2015
  • QR(Quick Response) Code has been developed to provide greater storage capacity and more functionality compared to 1D bar codes. With the emergence of increasingly mobile devices equipped with cameras such as smart-phones and tablets, QR codes have become very popular and more important in mobile businesses. Typically, most QR codes are used as a URL link for redirecting users to webpages. However, the URL based QR codes are required to be connected over the internet and to be run a server. This can incur unnecessary traffics in the Internet. Furthermore, it is not suitable for the country lagging behind others in its network infrastructure. In this paper, we propose a server-less ${\mu}$-webpage to provide mobile web services and be optimized for the capabilities and limitations of QR Code. We have implemented the ${\mu}$-webpage in Android, and the results showed that the proposed mechanism can provide web-services without requiring extra servers or incurring mobile traffic data compared to the URL-based QR Codes.

Building Control Box Attached Monitor based Color Grid Recognition Methods for User Access Authentication

  • Yoon, Sung Hoon;Lee, Kil Soo;Cha, Jae Sang;Khudaybergenov, Timur;Kim, Min Soo;Woo, Deok Gun;Kim, Jeong Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.1-7
    • /
    • 2020
  • The secure access the lighting, Heating, ventilation, and air conditioning (HVAC), fire safety, and security control boxes of building facilities is the primary objective of future smart buildings. This paper proposes an authorized user access to the electrical, lighting, fire safety, and security control boxes in the smart building, by using color grid coded optical camera communication (OCC) with face recognition Technologies. The existing CCTV subsystem can be used as the face recognition security subsystem for the proposed approach. At the same time a smart device attached camera can used as an OCC receiver of color grid code for user access authentication data sent by the control boxes to proceed authorization. This proposed approach allows increasing an authorization control reliability and highly secured authentication on accessing building facility infrastructure. The result of color grid code sequence received by the unauthorized person and his face identification allows getting good results in security and gaining effectiveness of accessing building facility infrastructure. The proposed concept uses the encoded user access authentication information through control box monitor and the smart device application which detect and decode the color grid coded informations combinations and then send user through the smart building network to building management system for authentication verification in combination with the facial features that gives a high protection level. The proposed concept is implemented on testbed model and experiment results verified for the secured user authentication in real-time.

Collection and Utilization of Unstructured Environmental Disaster by Using Disaster Information Standardization (재난정보 표준화를 통한 환경 재난정보 수집 및 활용)

  • Lee, Dong Seop;Kim, Byung Sik
    • Ecology and Resilient Infrastructure
    • /
    • v.6 no.4
    • /
    • pp.236-242
    • /
    • 2019
  • In this study, we developed the system that can collect and store environmental disaster data into the database and use it for environmental disaster management by converting structured and unstructured documents such as images into electronic documents. In the 4th Industrial Revolution, various intelligent technologies have been developed in many fields. Environmental disaster information is one of important elements of disaster cycle. Environment disaster information management refers to the act of managing and processing electronic data about disaster cycle. However, these information are mainly managed in the structured and unstructured form of reports. It is necessary to manage unstructured data for disaster information. In this paper, the intelligent generation approach is used to convert handout into electronic documents. Following that, the converted disaster data is organized into the disaster code system as disaster information. Those data are stored into the disaster database system. These converted structured data is managed in a standardized disaster information form connected with the disaster code system. The disaster code system is covered that the structured information is stored and retrieve on entire disaster cycle. The expected effect of this research will be able to apply it to smart environmental disaster management and decision making by combining artificial intelligence technologies and historical big data.

A Study on the Item Code Standardization of Ship Supply (선용품 품목 코드 표준화에 관한 연구)

  • Shin, Jae-Young;Park, Hyoung-Jun;Ko, Chang-Seong;Kim, Nam-Kyoung
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.05a
    • /
    • pp.142-143
    • /
    • 2019
  • Busan Port ranked 6th in the world with 21.67 million TEUs of container handling in 2018, but the ship supply industry has fallen short of that. Despite its technological prowess, Korea's ship supply industry lacks competitive edge in many aspects such as government support, integrated platform, and infrastructure compared to overseas ship supply industries. The use of code, which is not standardized, can be cited as a leading factor that undermines the competitiveness of Korea's ship supply industries. In the ship supply industry, the use of non-standardized codes can make it difficult to manage or analyze meaningful statistics, and, by extension, can lead to the loss of new business opportunities. Therefore, in this study, we intend to use local ship supply transaction data to study how to standardize item code to solve the problem.

  • PDF

Analysis of Factors Affecting Intention of Continuous Use for Mobile Wallet Based on the Information System Success Model (정보시스템 성공모형을 기반으로 한 모바일월렛 지속사용의도에 미치는 영향 요인 분석)

  • Jeon, Sun-Ho;Kang, Ju-Young;Lim, Jay-Ick
    • Journal of Information Technology Services
    • /
    • v.13 no.4
    • /
    • pp.325-340
    • /
    • 2014
  • Mobile payment system using NFC attracted attention as the mobile payment market grows due to the fast diffusion of smart phones. However, non NFC mobile payment recently appeared because of the slow growth of infrastructure for NFC. With advent of Non NFC mobile payment applications, mobile payment industry is in developing trend. Non NFC mobile payment revitalizes the market by overcoming the limit of NFC with the smart applications using bar code and QR code payment, and providing various discounts, membership benefits and payment information. Therefore, this paper analyzed the intention of continuous use with the quality of mobile payment application based on the information system success model. Three categories of factors which are system quality, service quality, and information quality were used. We verified the significance of the factors affecting the intension of continuous use. mainly, quality of information was considered as an important factor of continuous Intention to Use. Also, unlike previous NFC, it was found that in Non-NFC, compatibility might not be as important factor. Moreover, we suggest a marketing strategy of companies for mobile payment industry which focus on information quality. and future research directions for non NFC payment market.

A Study on Survivability of Node using Response Mechanism in Active Network Environment (액티브 네트워크 환경에서 대응 메커니즘을 이용한 노드 생존성에 관한 연구)

  • Yang, Jin-Seok;Lee, Ho-Jae;Chang, Beom-Hwan;Kim, Hyoun-Ku;Han, Young-Ju;Chung, Tai-Myoung
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.799-808
    • /
    • 2003
  • Existing security solutions such as Firewell and IDS (Intrusion Detection System) have a trouble in getting accurate detection rate about new attack and can not block interior attack. That is, existing securuty solutions have various shortcomings. Shortcomings of these security solutions can be supplemented with mechanism which guarantees an availability of systems. The mechanism which guarantees the survivability of node is various, we approachintrusion telerance using real time response mechanism. The monitoring code monitors related resources of system for survivability of vulnerable systm continuously. When realted resources exceed threshold, monitoring and response code is deployed to run. These mechanism guarantees the availability of system. We propose control mathod about resource monitoring. The monitoring code operates with this method. The response code may be resident in active node for availability or execute a job when a request is occurred. We suggest the node survivability mechanism that integrates the intrusion tolerance mechanism that complements the problems of existing security solutions. The mechanism takes asvantage of the automated service distribution supported by Active Network infrastructure instead of passive solutions. The mechanism takes advantage of the automated service distribution supported by Active Network infrastructure instead of passive system reconfiguration and patch.

Recent pharming malware code exploiting financial information (금융정보를 탈취하는 최근 파밍 악성코드 연구)

  • Noh, Jung-ho;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.360-361
    • /
    • 2017
  • The infrastructure of the country and society is connected to cyberspace. Malicious codes that steal financial information from websites such as plastic surgeons, dentists, and hospitals that are confirmed as IP in Daegu South Korea area are spreading In particular, financial information is an important privacy target. Takeover of financial information leads to personal financial loss. In this paper, we analyze the recent pharming malicious code that takes financial information. Attack files with social engineering methods are spread as executables in the banner, disguised as downloaders. When the user selects the banner, the attack file infects the PC with malicious code to the user. The infected PC takes users to the farming site and seizes financial information and personal security card information. The fraudulent financial information causes a financial loss to the user. The research in this paper will contribute to secure financial security.

  • PDF

An Analytical Appraisal of Building Information Modelling (BIM) Guidelines to Identify Variations in the Procedures

  • Das, Dakshata;Moon, Sungkon
    • Journal of KIBIM
    • /
    • v.6 no.3
    • /
    • pp.1-14
    • /
    • 2016
  • The usage of Building Information Modelling (BIM) in building projects has enabled improvement in project planning, implementation and collaboration process amongst various stakeholders within architecture, engineering and construction (AEC) industry. However, variations exist in the current practices of BIM implementation and coordination process in the industry. These variations result in inconsistent degree of BIM use across the construction industry. This inconsistency gives rise to several managerial and technological challenges such as data interoperability issues and purposeful integration and exchange of information within the BIM components. In order to tackle the issue, it is essential to analyse the different BIM approaches employed by the industry practitioners. BIM guidelines serve as a critical link between the BIM model, and its subsequent execution. They therefore provide the best reflection of BIM application and processes. This research paper aims to address the variations existing in BIM practices across the construction industry. It includes an extensive study of 21 existing, publicly available BIM-based guidelines in order to establish an understanding of the present state of practice and deduce issues and concerns related to them. All guidelines analysed in this paper are first categorised based on authorship and the release date for efficient comparison. The points of similarity and difference between them are thereby realized and outlined. In addition, the transition of project implementation process from traditional methods to BIM technology is also explained. The existence of inconsistencies in the BIM guidelines reviewed in this paper reflects the need of a BIM 'Code Compliance Check'. The Code Compliance Check will serve as a regulatory project guideline that will further improve the potential of BIM by incorporating a consistent BIM modelling methodology for the entire construction industry.

Structural health monitoring through meta-heuristics - comparative performance study

  • Pholdee, Nantiwat;Bureerat, Sujin
    • Advances in Computational Design
    • /
    • v.1 no.4
    • /
    • pp.315-327
    • /
    • 2016
  • Damage detection and localisation in structures is essential since it can be a means for preventive maintenance of those structures under service conditions. The use of structural modal data for detecting the damage is one of the most efficient methods. This paper presents comparative performance of various state-of-the-art meta-heuristics for use in structural damage detection based on changes in modal data. The metaheuristics include differential evolution (DE), artificial bee colony algorithm (ABC), real-code ant colony optimisation (ACOR), charged system search (ChSS), league championship algorithm (LCA), simulated annealing (SA), particle swarm optimisation (PSO), evolution strategies (ES), teaching-learning-based optimisation (TLBO), adaptive differential evolution (JADE), evolution strategy with covariance matrix adaptation (CMAES), success-history based adaptive differential evolution (SHADE) and SHADE with linear population size reduction (L-SHADE). Three truss structures are used to pose several test problems for structural damage detection. The meta-heuristics are then used to solve the test problems treated as optimisation problems. Comparative performance is carried out where the statistically best algorithms are identified.

A study on the Electronic Delivery Process and the Configuration Functional Modules of Railway Infrastructure BIM Digital Model (철도 인프라 BIM 디지털 모델의 전자납품 프로세스 및 기능 모듈 구성방안 연구)

  • Choi, Gwang-Yeol;Kim, Jin-Young;Choi, Hyung-Lae;Kim, Lee-Hyeon
    • Journal of KIBIM
    • /
    • v.11 no.3
    • /
    • pp.55-66
    • /
    • 2021
  • Recently, Building Information Modeling(BIM) has become a hot topic in the construction industry such as quantity calculation, interference check, process management, and construction cost management. It is also trying to convert the existing 2D design to 3D design and introduce the BIM in various fields, thus, many new deliverable are being presented but there are many issues due to the lack of standard guides on the preparation and delivery criteria for such new deliverable and how to utilize performance data. Therefore, In order to develop the electronic delivery process, we analyzed the process related to the delivery of BIM digital models presented in domestic and international BIM guidelines and the delivery of products from the Korea National Railway. The analysis focused on the list of achievements, delivery process, quality review standards, and the utilization code system of the Korea National Railway through BIM guidelines and the National Railroad Service's business procedures. Based on these analysis results, it presents a plan to construct an functional module of electronic delivery.