• Title/Summary/Keyword: Internet Ecosystem

Search Result 144, Processing Time 0.022 seconds

A Study on the Revitalization of High Performance Computing in Korea

  • Choi, Younkeun;Lee, Hyungjin;Jeong, Hyonam;Cho, Jaehyuk
    • Journal of Internet Computing and Services
    • /
    • v.17 no.3
    • /
    • pp.129-136
    • /
    • 2016
  • Crucial aspects to successfully realizing the re-emergence of a contemporary and sustainable supercomputing community in South Korea will involve the devoted efforts and support from key government and R&D organizations. We suggest various supplementation plans regarding the roles of support for the statutory plan. This includes the committee and the plans which are often missing necessary support systems that help competent ministries to plan properly according to the missions of the research center. This dissertation suggests that adjustment in the HPC trends will depend upon exposing and correcting problems in the law as well as overall improvement of the law. Also, the total development of a super computing market is necessary. The results of these guidelines will create a spread of demand for supercomputing for national IT resource sharing, and will foster the development of supercomputer specialists worldwide. Other major end results include significant increases in research productivity and increased rates of product development.

A Study on Integrated Identification System of Scanned Cartoons and Copyrighted Books (북스캔 만화 및 도서 저작물 통합 식별 시스템에 관한 연구)

  • Kim, Tae-Hyun;Yoon, Hee-Don;Kang, Ho-Gap;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.19-25
    • /
    • 2016
  • This study aims to develop sound ecosystem of scanned cartoons and books through the effective identification technology developed as a part of the project granted from the Korea Copyright Commission (Project title: Identification and Copy Protection Technology of Scanned Text/Comic Books). This study shows a model integrating the scanned book identification system with the existing system that identifies scanned cartoons. The model suggested in this study is expected to give a help in reducing the author's damages due to the indiscriminate illegal reproduction, which tends to expand with high quality scanners and editing softwares.

Artificial Neural Network-based Real Time Water Temperature Prediction in the Soyang River (인공신경망 기반 실시간 소양강 수온 예측)

  • Jeong, Karpjoo;Lee, Jonghyun;Lee, Keun Young;Kim, Bomchul
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2084-2093
    • /
    • 2016
  • It is crucial to predict water temperature for aquatic ecosystem studies and management. In this paper, we first address challenging issues in predicting water temperature in a real time manner and propose a distributed computing model to address such issues. Then, we present an Artificial Neural Network (ANN)-based water temperature prediction model developed for the Soyang River and a cyberinfrastructure system called WT-Agabus to run such prediction models in an automated and real time manner. The ANN model is designed to use only weather forecast data (air temperature and rainfall) that can be obtained by invoking the weather forecasting system at Korea Meteorological Administration (KMA) and therefore can facilitate the automated and real time water temperature prediction. This paper also demonstrates how easily and efficiently the real time prediction can be implemented with the WT-Agabus prototype system.

MMOG User Participation Based Decentralized Consensus Scheme and Proof of Participation Analysis on the Bryllite Blockchain System

  • Yun, Jusik;Goh, Yunyeong;Chung, Jong-Moon;Kim, OkSeok;Shin, SangWoo;Choi, Jin;Kim, Yoora
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4093-4107
    • /
    • 2019
  • Proof of Work (PoW) based blockchains have limitations in throughput, time consumption, and energy efficiency. In these systems, a miner will consume significant time and resources to obtain a reward for contributing to the blockchain. To overcome these limitations, recent research on blockchains are focused on accelerating the speed, scalability, and enhancing the security level. By enhancing specific procedures of blockchain system, the level of data integrity supported by the blockchain can become more robust, and efficient. In this paper, a new blockchain consensus model based on the Bryllite Consensus Protocol (BCP) is proposed to support a hyper-connected massively multiplayer online game (MMOG) ecosystem. The BCP scheme enables users to participate directly in new consensus processes through a Proof of Participation (PoP) algorithm. In this model, the consensus algorithm has a simpler form while maintaining high security level. In addition, because the BCP scheme gives users an equal chance to make a contribution to the blockchain, rewards are distributed in an equal fashion, which motivates user participation. The analysis of the proposed scheme is applied to the Bryllite consortium blockchain system (homed in Hong Kong), which is a new blockchain network developed for international game industries, gamers, and game events.

Analysis of Web Browser Security Configuration Options

  • Jillepalli, Ananth A.;de Leon, Daniel Conte;Steiner, Stuart;Alves-Foss, Jim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6139-6160
    • /
    • 2018
  • For ease of use and access, web browsers are now being used to access and modify sensitive data and systems including critical control systems. Due to their computational capabilities and network connectivity, browsers are vulnerable to several types of attacks, even when fully updated. Browsers are also the main target of phishing attacks. Many browser attacks, including phishing, could be prevented or mitigated by using site-, user-, and device-specific security configurations. However, we discovered that all major browsers expose disparate security configuration procedures, option names, values, and semantics. This results in an extremely hard to secure web browsing ecosystem. We analyzed more than a 1000 browser security configuration options in three major browsers and found that only 13 configuration options had syntactic and semantic similarity, while 4 configuration options had semantic similarity, but not syntactic similarity. We: a) describe the results of our in-depth analysis of browser security configuration options; b) demonstrate the complexity of policy-based configuration of web browsers; c) describe a knowledge-based solution that would enable organizations to implement highly-granular and policy-level secure configurations for their information and operational technology browsing infrastructures at the enterprise scale; and d) argue for necessity of developing a common language and semantics for web browser configurations.

Deep Learning-Based Smart Meter Wattage Prediction Analysis Platform

  • Jang, Seonghoon;Shin, Seung-Jung
    • International journal of advanced smart convergence
    • /
    • v.9 no.4
    • /
    • pp.173-178
    • /
    • 2020
  • As the fourth industrial revolution, in which people, objects, and information are connected as one, various fields such as smart energy, smart cities, artificial intelligence, the Internet of Things, unmanned cars, and robot industries are becoming the mainstream, drawing attention to big data. Among them, Smart Grid is a technology that maximizes energy efficiency by converging information and communication technologies into the power grid to establish a smart grid that can know electricity usage, supply volume, and power line conditions. Smart meters are equient that monitors and communicates power usage. We start with the goal of building a virtual smart grid and constructing a virtual environment in which real-time data is generated to accommodate large volumes of data that are small in capacity but regularly generated. A major role is given in creating a software/hardware architecture deployment environment suitable for the system for test operations. It is necessary to identify the advantages and disadvantages of the software according to the characteristics of the collected data and select sub-projects suitable for the purpose. The collected data was collected/loaded/processed/analyzed by the Hadoop ecosystem-based big data platform, and used to predict power demand through deep learning.

On the Physical Function Evaluation, Prevention Training, and Cognitive Ability Improvement through the Design of a Healthcare Independence Support System based on Emotional Satisfaction of Senior Users

  • Lee, Sang Min;Kim, Joo Uk;Kim, Young Min
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.37-46
    • /
    • 2021
  • Recently, social technologies have been created to solve problems from businesses for the establishment of generational solidarity ecosystem in terms of employment, residential space, network and social capital, age, cognitive and environmental aspects. This is senior-friendly healthcare business system aimed at meeting the senior needs for health life to enjoy active consumption culture life even after retirement, becoming a catalyst for minimizing generational conflicts, preventing the cognitive and physical deterioration of seniority in the areas of life healthcare, fitness and well-aging, and expanding into systems necessary for seniority self-reliance. We would like to draw up the development and requirements of the concept of the service platform for the study of collective characteristics for generation solidarity with senior class and the establishment of a customized senior health life system for generation solidarity. This system is characterized by a platform that can prevent the decline of seniors' cognitive and physical functions and enhance emotional stability. It is significant in providing feedback on the risk perception index, fall index, and prevention training index information to the child through the analysis and extraction of the senior health index for risk perception, fall probability, and fall prevention.

Design and Implementation of a Personal Health Record Platform Based on Patient-consent Blockchain Technology

  • Kim, Heongkyun;Lee, Sangmin;Kwon, Hyunwoo;Kim, Eunmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4400-4419
    • /
    • 2021
  • In the 4th Industrial Revolution, the healthcare industry is undergoing a paradigm shift from post-care and management systems based on diagnosis and treatment to disease prevention and management based on personal precision medicine. To optimize medical services for individual patients, an open ecosystem for the healthcare industry that allows the exchange and utilization of personal health records (PHRs) is required. However, under the current system of hospital-centered data management, it is difficult to implement the linking and sharing of PHRs in practice. To address this problem, in this study, we present the design and implementation of a patient-centered PHR platform using blockchain technology. This platform achieved transparency and reliability in information management by eliminating the risk of leakage and tampering/altering personal information, which could occur when using a PHR. In addition, the patient-consent system was applied to a PHR; thus, the patient acted as the user with ownership. The proposed blockchain-based PHR platform enables the integration of personal medical information with scattered distribution across multiple hospitals, and allows patients to freely use their health records in their daily lives and emergencies. The proposed platform is expected to serve as a stepping stone for patient-centered healthcare data management and utilization.

A Study on AES-based Mutual Authentication Protocol for IoT Devices (사물인터넷 디바이스를 위한 AES 기반 상호인증 프로토콜)

  • Oh, Se-Jin;Lee, Seung-Woo
    • Journal of Industrial Convergence
    • /
    • v.18 no.5
    • /
    • pp.23-29
    • /
    • 2020
  • The Internet of things (IoT) is the extension of Internet connectivity into various devices and everyday objects. Embedded with electronics, Internet connectivity and other forms of hardware. The IoT poses significant risk to the entire digital ecosystem. This is because so many of these devices are designed without a built-in security system to keep them from being hijacked by hackers. This paper proposed a mutual authentication protocol for IoT Devices using symmetric-key algorithm. The proposed protocol use symmetric key cryptographic algorithm to securely encrypt data on radio channel. In addition, the secret key used for encryption is random number of devices that improves security by using variable secret keys. The proposed protocol blocked attacker and enabled legal deives to communicate because only authenticated devices transmit data by a mutual authentication protocol. Finally, our scheme is safe for attacks such as eavesdropping attack, location tracking, replay attack, spoofing attack and denial of service attack and we confirmed the safety by attack scenario.

Changes in the Industrial Structure caused by the IoT and AI (사물인터넷과 AI가 가져올 산업구조의 변화)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.93-99
    • /
    • 2017
  • Recently IoT(Internet of Things) service industry has grown very rapidly. In this paper, we investigated the changes in IoT service industry as well as new direction of human life in future global society. Under these changing market conditions, competition has been also changed into global and ecological competition. But compared to the platform initiatives and ecological strategies of global companies, Korean companies' vision of building ecosystems is still unclear. In addition, there is a need of internetworking between mobile and IoT services. IoT security Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, we investigate the structure of IoT and AI service ecosystem in order to gain strategic implications and insights for the security industry in this paper.