• Title/Summary/Keyword: Large-scale network

Search Result 922, Processing Time 0.025 seconds

A Proposal for the Practical and Secure Electronic Voting Protocol (실용적이고 안전한 전자투표 프로토콜에 관한 연구)

  • 김순석;이재신;김성권
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.21-32
    • /
    • 2000
  • We have seen a lot of developments on computer application areas with the wide spread use of computers and the rapid growth of communication network. It is necessary to use a cryptographic technique for electronic voting, but, at present, despite of its importance electronic voting protocols so far have many shortcomings. In this paper, with the assumption of a trustable voting centers we propose a large-scale and practical electronic voting protocol satisfying protocol requirements, such as secureness, fairness, privacy of voter and correctness. Voters are able to get a vote without revealing their voted information by using the blinding technique. We can find the injustice between a voter and the tallier by using undeniable challenge and responsible protocol. Also, we proposes a secure protocol that compensates a integrity of electronic voting and protects a privacy of voter from outer attacks as using a anonymity of voter.

Priority-based Multi-DNN scheduling framework for autonomous vehicles (자율주행차용 우선순위 기반 다중 DNN 모델 스케줄링 프레임워크)

  • Cho, Ho-Jin;Hong, Sun-Pyo;Kim, Myung-Sun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.368-376
    • /
    • 2021
  • With the recent development of deep learning technology, autonomous things technology is attracting attention, and DNNs are widely used in embedded systems such as drones and autonomous vehicles. Embedded systems that can perform large-scale operations and process multiple DNNs for high recognition accuracy without relying on the cloud are being released. DNNs with various levels of priority exist within these systems. DNNs related to the safety-critical applications of autonomous vehicles have the highest priority, and they must be handled first. In this paper, we propose a priority-based scheduling framework for DNNs when multiple DNNs are executed simultaneously. Even if a low-priority DNN is being executed first, a high-priority DNN can preempt it, guaranteeing the fast response characteristics of safety-critical applications of autonomous vehicles. As a result of checking through extensive experiments, the performance improved by up to 76.6% in the actual commercial board.

Application of a Topic Model on the Korea Expressway Corporation's VOC Data (한국도로공사 VOC 데이터를 이용한 토픽 모형 적용 방안)

  • Kim, Ji Won;Park, Sang Min;Park, Sungho;Jeong, Harim;Yun, Ilsoo
    • Journal of Information Technology Services
    • /
    • v.19 no.6
    • /
    • pp.1-13
    • /
    • 2020
  • Recently, 80% of big data consists of unstructured text data. In particular, various types of documents are stored in the form of large-scale unstructured documents through social network services (SNS), blogs, news, etc., and the importance of unstructured data is highlighted. As the possibility of using unstructured data increases, various analysis techniques such as text mining have recently appeared. Therefore, in this study, topic modeling technique was applied to the Korea Highway Corporation's voice of customer (VOC) data that includes customer opinions and complaints. Currently, VOC data is divided into the business areas of Korea Expressway Corporation. However, the classified categories are often not accurate, and the ambiguous ones are classified as "other". Therefore, in order to use VOC data for efficient service improvement and the like, a more systematic and efficient classification method of VOC data is required. To this end, this study proposed two approaches, including method using only the latent dirichlet allocation (LDA), the most representative topic modeling technique, and a new method combining the LDA and the word embedding technique, Word2vec. As a result, it was confirmed that the categories of VOC data are relatively well classified when using the new method. Through these results, it is judged that it will be possible to derive the implications of the Korea Expressway Corporation and utilize it for service improvement.

A Study on the Analysis Techniques for Big Data Computing (빅데이터 컴퓨팅을 위한 분석기법에 관한 연구)

  • Oh, Sun-Jin
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.475-480
    • /
    • 2021
  • With the rapid development of mobile, cloud computing technology and social network services, we are in the flood of huge data and realize that these large-scale data contain very precious value and important information. Big data, however, have both latent useful value and critical risks, so, nowadays, a lot of researches and applications for big data has been executed actively in order to extract useful information from big data efficiently and make the most of the potential information effectively. At this moment, the data analysis technique that can extract precious information from big data efficiently is the most important step in big data computing process. In this study, we investigate various data analysis techniques that can extract the most useful information in big data computing process efficiently, compare pros and cons of those techniques, and propose proper data analysis method that can help us to find out the best solution of the big data analysis in the peculiar situation.

Regionalized TSCH Slotframe-Based Aerial Data Collection Using Wake-Up Radio (Wake-Up Radio를 활용한 지역화 TSCH 슬롯프레임 기반 항공 데이터 수집 연구)

  • Kwon, Jung-Hyok;Choi, Hyo Hyun;Kim, Eui-Jik
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.2
    • /
    • pp.1-6
    • /
    • 2022
  • This paper presents a regionalized time slotted channel hopping (TSCH) slotframe-based aerial data collection using wake-up radio. The proposed scheme aims to minimize the delay and energy consumption when an unmanned aerial vehicle (UAV) collects data from sensor devices in the large-scale service area. To this end, the proposed scheme divides the service area into multiple regions, and determines the TSCH slotframe length for each region according to the number of cells required by sensor devices in each region. Then, it allocates the cells dedicated for data transmission to the TSCH slotframe using the ID of each sensor device. For energy-efficient data collection, the sensor devices use a wake-up radio. Specifically, the sensor devices use a wake-up radio to activate a network interface only in the cells allocated for beacon reception and data transmission. The simulation results showed that the proposed scheme exhibited better performance in terms of delay and energy consumption compared to the existing scheme.

Analysis of Cyber Incident Artifact Data Enrichment Mechanism for SIEM (SIEM 기반 사이버 침해사고 대응을 위한 데이터 보완 메커니즘 비교 분석)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.1-9
    • /
    • 2022
  • As various services are linked to IoT(Internet of Things) and portable communication terminals, cyber attacks that exploit security vulnerabilities of the devices are rapidly increasing. In particular, cyber attacks targeting heterogeneous devices in large-scale network environments through advanced persistent threat (APT) attacks are on the rise. Therefore, in order to improve the effectiveness of the response system in the event of a breach, it is necessary to apply a data enrichment mechanism for the collected artifact data to improve threat analysis and detection performance. Therefore, in this study, by analyzing the data supplementation common elements performed in the existing incident management framework for the artifacts collected for the analysis of intrusion accidents, characteristic elements applicable to the actual system were derived, and based on this, an improved accident analysis framework The prototype structure was presented and the suitability of the derived data supplementary extension elements was verified. Through this, it is expected to improve the detection performance when analyzing cyber incidents targeting artifacts collected from heterogeneous devices.

Simulation of Water Redistribution for the Resized Beneficiary Area of a Large Scale Agricultural Reservoir (대규모 농업용저수지 수혜면적 변화에 따른 효율적 용수재분배 모의)

  • Sung, Muhong;Jeung, Minhyuk;Beom, Jina;Park, Taesun;Lee, Jaenam;Jung, Hyoungmo;Kim, Youngjoo;Yoo, Seunghwan;Yoon, Kwangsik
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.63 no.3
    • /
    • pp.1-12
    • /
    • 2021
  • Optimal water management is to efficiently and equally supply an appropriate amount of water by using irrigation facilities. Therefore, it is necessary to evaluate water supply capacity through distribution simulation between the designed distribution rate and re-distributed rate according to the changed farming conditions. In this study, we recalculated the agricultural water supply amount of Geumcheon main canal, which beneficiary area was reduced due to the development of Gwangju-Jeonnam innovation city, and we constructed a canal network using the SWMM model to simulate the change in supply rate of each main canal according to the re-distributed rate. Even though the supply amount of the Geumcheon main canal was reduced from 1.20 m3/s to 0.90 m3/s, it showed a similar supply rate to the current, and the reduced quantity could be supplied to the rest of the main canal. As a result, the arrival time at the ends of all main canal, except for the Geumcheon main canal, decreased from 1 to 3 hours, and the supply rate increased from 4 to 17.0% at the main canal located at the end of the beneficiary area of Naju reservoir.

Integrating Resilient Tier N+1 Networks with Distributed Non-Recursive Cloud Model for Cyber-Physical Applications

  • Okafor, Kennedy Chinedu;Longe, Omowunmi Mary
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2257-2285
    • /
    • 2022
  • Cyber-physical systems (CPS) have been growing exponentially due to improved cloud-datacenter infrastructure-as-a-service (CDIaaS). Incremental expandability (scalability), Quality of Service (QoS) performance, and reliability are currently the automation focus on healthy Tier 4 CDIaaS. However, stable QoS is yet to be fully addressed in Cyber-physical data centers (CP-DCS). Also, balanced agility and flexibility for the application workloads need urgent attention. There is a need for a resilient and fault-tolerance scheme in terms of CPS routing service including Pod cluster reliability analytics that meets QoS requirements. Motivated by these concerns, our contributions are fourfold. First, a Distributed Non-Recursive Cloud Model (DNRCM) is proposed to support cyber-physical workloads for remote lab activities. Second, an efficient QoS stability model with Routh-Hurwitz criteria is established. Third, an evaluation of the CDIaaS DCN topology is validated for handling large-scale, traffic workloads. Network Function Virtualization (NFV) with Floodlight SDN controllers was adopted for the implementation of DNRCM with embedded rule-base in Open vSwitch engines. Fourth, QoS evaluation is carried out experimentally. Considering the non-recursive queuing delays with SDN isolation (logical), a lower queuing delay (19.65%) is observed. Without logical isolation, the average queuing delay is 80.34%. Without logical resource isolation, the fault tolerance yields 33.55%, while with logical isolation, it yields 66.44%. In terms of throughput, DNRCM, recursive BCube, and DCell offered 38.30%, 36.37%, and 25.53% respectively. Similarly, the DNRCM had an improved incremental scalability profile of 40.00%, while BCube and Recursive DCell had 33.33%, and 26.67% respectively. In terms of service availability, the DNRCM offered 52.10% compared with recursive BCube and DCell which yielded 34.72% and 13.18% respectively. The average delays obtained for DNRCM, recursive BCube, and DCell are 32.81%, 33.44%, and 33.75% respectively. Finally, workload utilization for DNRCM, recursive BCube, and DCell yielded 50.28%, 27.93%, and 21.79% respectively.

A Study on Changes of Land Use in the Local Port City - Focused on Yeosu in Jeonnam Province - (지방 항구도시의 토지이용 변화에 관한 연구 - 전라남도 여수시를 중심으로 -)

  • Chung, Kumho
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.25 no.1
    • /
    • pp.9-16
    • /
    • 2023
  • This study is on the formation and the development process of urban space by referring to the literature in Yeosu where is the important location in logistics & transportation and maritime since the Japanese colonial period. There are many factors and results of the development process in Yeosu by the opening port, railroads, loads and industries. The purpose of this study is to understand the characteristics of the formation process of urban space and the characteristics of physical space in Yeosu. The results are as follow; The urban formation and development process in Yeosu where was a small fishing village in the 1910s is largely divided into four processes. Formation: the population increased due to constructions such as of a railroad, a port, and roads and there were many reclamations around the center of the old city center in the Japanese colonial period. Stagnation: There was no urban development due to stagnation, war, and the Yeo-sun Incident. Expand: the industrialization of the Yeocheon Industrial Complex and Gwangyang Steel and other areas around Yeosu led to a surge in Yeosu's population. To cope with this, the city was expanded through three land readjustment projects and the development of large-scale residential complexes. Decline and Remodeling: Yeosu's urban space declined due to the decline of fisheries and the decrease in marine and railway logistics. And the expansion and improvement of the transportation network for hosting the Yeosu World Expo increased the accessibility of the old city center, transforming it into a tourist city using cultural heritage and nature.

Structural Crack Detection Using Deep Learning: An In-depth Review

  • Safran Khan;Abdullah Jan;Suyoung Seo
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.4
    • /
    • pp.371-393
    • /
    • 2023
  • Crack detection in structures plays a vital role in ensuring their safety, durability, and reliability. Traditional crack detection methods sometimes need significant manual inspections, which are laborious, expensive, and prone to error by humans. Deep learning algorithms, which can learn intricate features from large-scale datasets, have emerged as a viable option for automated crack detection recently. This study presents an in-depth review of crack detection methods used till now, like image processing, traditional machine learning, and deep learning methods. Specifically, it will provide a comparative analysis of crack detection methods using deep learning, aiming to provide insights into the advancements, challenges, and future directions in this field. To facilitate comparative analysis, this study surveys publicly available crack detection datasets and benchmarks commonly used in deep learning research. Evaluation metrics employed to check the performance of different models are discussed, with emphasis on accuracy, precision, recall, and F1-score. Moreover, this study provides an in-depth analysis of recent studies and highlights key findings, including state-of-the-art techniques, novel architectures, and innovative approaches to address the shortcomings of the existing methods. Finally, this study provides a summary of the key insights gained from the comparative analysis, highlighting the potential of deep learning in revolutionizing methodologies for crack detection. The findings of this research will serve as a valuable resource for researchers in the field, aiding them in selecting appropriate methods for crack detection and inspiring further advancements in this domain.