• Title/Summary/Keyword: Intelligent cloud

Search Result 201, Processing Time 0.024 seconds

Research Trend Analysis Using Bibliographic Information and Citations of Cloud Computing Articles: Application of Social Network Analysis (클라우드 컴퓨팅 관련 논문의 서지정보 및 인용정보를 활용한 연구 동향 분석: 사회 네트워크 분석의 활용)

  • Kim, Dongsung;Kim, Jongwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.195-211
    • /
    • 2014
  • Cloud computing services provide IT resources as services on demand. This is considered a key concept, which will lead a shift from an ownership-based paradigm to a new pay-for-use paradigm, which can reduce the fixed cost for IT resources, and improve flexibility and scalability. As IT services, cloud services have evolved from early similar computing concepts such as network computing, utility computing, server-based computing, and grid computing. So research into cloud computing is highly related to and combined with various relevant computing research areas. To seek promising research issues and topics in cloud computing, it is necessary to understand the research trends in cloud computing more comprehensively. In this study, we collect bibliographic information and citation information for cloud computing related research papers published in major international journals from 1994 to 2012, and analyzes macroscopic trends and network changes to citation relationships among papers and the co-occurrence relationships of key words by utilizing social network analysis measures. Through the analysis, we can identify the relationships and connections among research topics in cloud computing related areas, and highlight new potential research topics. In addition, we visualize dynamic changes of research topics relating to cloud computing using a proposed cloud computing "research trend map." A research trend map visualizes positions of research topics in two-dimensional space. Frequencies of key words (X-axis) and the rates of increase in the degree centrality of key words (Y-axis) are used as the two dimensions of the research trend map. Based on the values of the two dimensions, the two dimensional space of a research map is divided into four areas: maturation, growth, promising, and decline. An area with high keyword frequency, but low rates of increase of degree centrality is defined as a mature technology area; the area where both keyword frequency and the increase rate of degree centrality are high is defined as a growth technology area; the area where the keyword frequency is low, but the rate of increase in the degree centrality is high is defined as a promising technology area; and the area where both keyword frequency and the rate of degree centrality are low is defined as a declining technology area. Based on this method, cloud computing research trend maps make it possible to easily grasp the main research trends in cloud computing, and to explain the evolution of research topics. According to the results of an analysis of citation relationships, research papers on security, distributed processing, and optical networking for cloud computing are on the top based on the page-rank measure. From the analysis of key words in research papers, cloud computing and grid computing showed high centrality in 2009, and key words dealing with main elemental technologies such as data outsourcing, error detection methods, and infrastructure construction showed high centrality in 2010~2011. In 2012, security, virtualization, and resource management showed high centrality. Moreover, it was found that the interest in the technical issues of cloud computing increases gradually. From annual cloud computing research trend maps, it was verified that security is located in the promising area, virtualization has moved from the promising area to the growth area, and grid computing and distributed system has moved to the declining area. The study results indicate that distributed systems and grid computing received a lot of attention as similar computing paradigms in the early stage of cloud computing research. The early stage of cloud computing was a period focused on understanding and investigating cloud computing as an emergent technology, linking to relevant established computing concepts. After the early stage, security and virtualization technologies became main issues in cloud computing, which is reflected in the movement of security and virtualization technologies from the promising area to the growth area in the cloud computing research trend maps. Moreover, this study revealed that current research in cloud computing has rapidly transferred from a focus on technical issues to for a focus on application issues, such as SLAs (Service Level Agreements).

Ubiquitous intelligent lesson management system (유비쿼터스 지능형 교육관리 시스템)

  • Hong, Sung-Moon;Oh, Suk-Kyung;Lim, Hyung-Min;Cho, Jae-Min;Kim, Dong-Suk;Park, Sang-Gug
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.739-742
    • /
    • 2011
  • This paper describes system design and realization to the ubiquitous intelligent lesson management. This system includes students management by utilizing RFID and web-cam, personal security certification by fingerprint recognition, keyboard locking of PC by hooking technology, personal data management by cloud system, internet block access by a packet monitoring. We have design and realize this system, In the future, we will applicate our system to the classes using computer.

  • PDF

A Design of IoT based Automatic Control System for Intelligent Smart Home Network (지능형 스마트 홈네트워크를 위한 IoT기반 자동조절시스템 설계)

  • Shim, JeongYon
    • Journal of Internet of Things and Convergence
    • /
    • v.1 no.1
    • /
    • pp.21-25
    • /
    • 2015
  • The Internet of Thing (IoT) will be a very important core technology to implement Intelligent Smart Home Network and it will take charge of an important role connected to Smart Phone, Cloud Computing in the Ubiquitous environment. In this paper, Internal Autonomous Regulation by human autonomic nervous system was studied and its core mechanism was applied to the design of IoT based Autonomous Regulation System for Intelligent Smart Home Network. We proposed an autonomous regulating mechanism in which the factors of Temperature, Humidity and Illumination are automatically adjusted as they communicate with the connected things.

Design and Implementation of Location and Activity Monitoring System Based on LoRa

  • Lin, Shengwei;Ying, Ziqiang;Zheng, Kan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1812-1824
    • /
    • 2019
  • The location and human activity are usually used as one of the important parameters to monitor the health status in healthcare devices. However, nearly all existing location and monitoring systems have the limitation of short-range communication and high power consumption. In this paper, we propose a new mechanism to collect and transmit monitoring information based on LoRa technology. The monitoring device with sensors can collect the real-time activity and location information and transmit them to the cloud server through LoRa gateway. The user can check all his history and current information through the specific designed mobile applications. Experiment was carried out to verify the communication, power consumption and monitoring performance of the entire system. Experimental results demonstrate that this system can collect monitoring and activity information accurately and provide the long rang coverage with low power consumption.

CCTV Video Privacy Protection Scheme Based on Edge Blockchain (엣지 블록체인 기반의 CCTV 영상 프라이버시 보호 기법)

  • Lee, Donghyeok;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.10
    • /
    • pp.101-113
    • /
    • 2019
  • Recently, the intelligent video surveillance technology has become able to provide various services such as predictive surveillance that have not been provided previously. Securing the security of the intelligent video surveillance is essential, and malicious manipulation of the original CCTV video data can lead to serious social problems. Therefore, in this paper, we proposed an intelligent video surveillance environment based on blockchain. The proposed scheme guarantees the integrity of the CCTV image data and protects the ROI privacy through the edge blockchain, so there is no privacy exposure of the object. In addition, it is effective because it is possible to increase the transmission efficiency and reduce storage by enabling video deduplication.

Neural Network and Cloud Computing for Predicting ECG Waves from PPG Readings

  • Kosasih, David Ishak;Lee, Byung-Gook;Lim, Hyotaek
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.11-20
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

Online Monitoring of Ship Block Construction Equipment Based on the Internet of Things and Public Cloud: Take the Intelligent Tire Frame as an Example

  • Cai, Qiuyan;Jing, Xuwen;Chen, Yu;Liu, Jinfeng;Kang, Chao;Li, Bingqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.3970-3990
    • /
    • 2021
  • In view of the problems of insufficient data collection and processing capability of multi-source heterogeneous equipment, and low visibility of equipment status at the ship block construction site. A data collection method for ship block construction equipment based on wireless sensor network (WSN) technology and a data processing method based on edge computing were proposed. Based on the Browser/Server (B/S) architecture and the OneNET platform, an online monitoring system for ship block construction equipment was designed and developed, which realized the visual online monitoring and management of the ship block construction equipment status. Not only that, the feasibility and reliability of the monitoring system were verified by using the intelligent tire frame system as the application object. The research of this project can lay the foundation for the ship block construction equipment management and the ship block intelligent construction, and ultimately improve the quality and efficiency of ship block construction.

A study on data collection environment and analysis using virtual server hosting of Azure cloud platform (Azure 클라우드 플랫폼의 가상서버 호스팅을 이용한 데이터 수집환경 및 분석에 관한 연구)

  • Lee, Jaekyu;Cho, Inpyo;Lee, Sangyub
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.329-330
    • /
    • 2020
  • 본 논문에서는 Azure 클라우드 플랫폼의 가상서버 호스팅을 이용해 데이터 수집 환경을 구축하고, Azure에서 제공하는 자동화된 기계학습(Automated Machine Learning, AutoML)을 기반으로 데이터 분석 방법에 관한 연구를 수행했다. 가상 서버 호스팅 환경에 LAMP(Linux, Apache, MySQL, PHP)를 설치하여 데이터 수집환경을 구축했으며, 수집된 데이터를 Azure AutoML에 적용하여 자동화된 기계학습을 수행했다. Azure AutoML은 소모적이고 반복적인 기계학습 모델 개발을 자동화하는 프로세스로써 기계학습 솔루션 구현하는데 시간과 자원(Resource)를 절약할 수 있다. 특히, AutoML은 수집된 데이터를 분류와 회귀 및 예측하는데 있어서 학습점수(Training Score)를 기반으로 보유한 데이터에 가장 적합한 기계학습 모델의 순위를 제공한다. 이는 데이터 분석에 필요한 기계학습 모델을 개발하는데 있어서 개발 초기 단계부터 코드를 설계하지 않아도 되며, 전체 기계학습 시스템을 개발 및 구현하기 전에 모델의 구성과 시스템을 설계해볼 수 있기 때문에 매우 효율적으로 활용될 수 있다. 본 논문에서는 NPU(Neural Processing Unit) 학습에 필요한 데이터 수집 환경에 관한 연구를 수행했으며, Azure AutoML을 기반으로 데이터 분류와 회귀 등 가장 효율적인 알고리즘 선정에 관한 연구를 수행했다.

  • PDF

System Visibility of Universal Middleware Pervasive Memorial Engine (시스템 가시성평가를 위한 유니버설미들웨어기반 Pervasive Memorial Engine 연구)

  • Lee, Hae-Jun;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2115-2120
    • /
    • 2017
  • Presently, It is required to change convergence the role of hardware system and software technology that promoted trust of In-Vehicle for integrated complex system visibility evaluation. There is possibility for the period system can invoke unpredictable confusing blank state. The blank state systems have ecosystem characteristics that are supplied, maintained and operated through the complex interactions of technology and culture. Using universal middleware can support the life-cycle model and increase the visibility of complex systems and prepare for confusing situations. In this study, based on universal middleware, data and service dynamic standardized modules were evaluated to support stable system visibility platform. The system visibility module consists of Intelligent Pervasive Cloud module, Memorial Service module and Life Cycler connection module. In addition, the analysis results are supported by various network application service standards through platform independent system and architecture.

Experimental Field Test of GNSS Jamming Signal Monitoring Based on Cloud Data Processing Technique at National Infra-Facilities (클라우드 데이터 처리 방식을 통한 국가 주요시설에서의 GNSS 재밍 모니터링 실측 실험)

  • Jin, Gwon gyu;Won, Jong hoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.4
    • /
    • pp.116-125
    • /
    • 2020
  • Incalculable damage will be incurred if the national infrastructure that provides services using GNSS signals is affected by jamming signals. To prevent this, a nationwide GNSS jamming monitoring network is necessary to detect the occurrence of a jamming signal, determine the type, and properly localize the jammer position. In this paper, 2-D images for live GNSS signals were generated to verify the environment of the jamming signals through the presence and type of GNSS jamming signals at K-City, which are the test beds for self-driving vehicles, and Incheon International Airport. The analysis was also conducted to detect the occurrence of the jamming signals, determine the type, and measure the jamming signal strength. As a result, a CWI type of jamming signal was detected in L2 band at K-City and in L5 band at Incheon International Airport.