• Title/Summary/Keyword: Network transformation

Search Result 500, Processing Time 0.021 seconds

The Influence of Social Factors of Acceptance of Cloud Services on Consumer Usage Intentions (클라우드 서비스의 수용 관련 사회적 요인이 소비자의 이용의도에 미치는 영향)

  • Chen, Yu-Fei;Nie, Xin-Yu;Quan, Dong-mei
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.173-178
    • /
    • 2022
  • With the development of information technology, the popularization of 5G and cloud computing has accelerated the circulation and digital transformation of information. In the network information society where information is rapidly increasing, it is very important to have the ability to manage and collect the required information. In particular, the information storage and management functions of cloud services are widely used among young people. This research takes the social factors of accepting cloud services as the breakthrough point, and takes young consumers aged 20-30 as the survey object, and designs a research model according to the development of cloud computing technology. The findings verify the influence of social factors on cloud service acceptance and 20-30-year-old consumers' intention to use cloud services. The partial and complete mediating effects of perceived ease of use were verified from the influence relationship between social factors and exploitation intention. Finally, this study provides inspiration for the development direction of cloud computing technology through empirical analysis.

A Methodology on System Implementation for Road Monitoring and Management Based on Automated Driving Hazard Levels (위험도 기반 도로 모니터링 및 관리 시스템 구축 방안)

  • Kyuok Kim;Sang Soo Lee;SunA Cho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.299-310
    • /
    • 2022
  • The ability of an automated driving system is based on vehicle sensors, judgment and control algorithms, etc. The safety of automated driving system is highly related to the operational status of the road network and compliant road infrastructure. The safe operation of automated driving necessitates continuous monitoring to determine if the road and traffic conditions are suitable and safe. This paper presents a node and link system to build a road monitoring system by considering the ODD(Operational Design Domain) characteristics. Considering scalability, the design is based on the existing ITS standard node-link system, and a method for expressing the monitoring target as a node and a link is presented. We further present a technique to classify and manage hazard risk into five levels, and a method to utilize node and link information when searching for and controlling the optimal route. Furthermore, we introduce an example of system implementation based on the proposed node and link system for Sejong City.

Study on Automation of Comprehensive IT Asset Management (포괄적 IT 자산관리의 자동화에 관한 연구)

  • Wonseop Hwang;Daihwan Min;Junghwan Kim;Hanjin Lee
    • Journal of Information Technology Services
    • /
    • v.23 no.1
    • /
    • pp.1-10
    • /
    • 2024
  • The IT environment is changing due to the acceleration of digital transformation in enterprises and organizations. This expansion of the digital space makes centralized cybersecurity controls more difficult. For this reason, cyberattacks are increasing in frequency and severity and are becoming more sophisticated, such as ransomware and digital supply chain attacks. Even in large organizations with numerous security personnel and systems, security incidents continue to occur due to unmanaged and unknown threats and vulnerabilities to IT assets. It's time to move beyond the current focus on detecting and responding to security threats to managing the full range of cyber risks. This requires the implementation of asset Inventory for comprehensive management by collecting and integrating all IT assets of the enterprise and organization in a wide range. IT Asset Management(ITAM) systems exist to identify and manage various assets from a financial and administrative perspective. However, the asset information managed in this way is not complete, and there are problems with duplication of data. Also, it is insufficient to update of data-set, including Network Infrastructure, Active Directory, Virtualization Management, and Cloud Platforms. In this study, we, the researcher group propose a new framework for automated 'Comprehensive IT Asset Management(CITAM)' required for security operations by designing a process to automatically collect asset data-set. Such as the Hostname, IP, MAC address, Serial, OS, installed software information, last seen time, those are already distributed and stored in operating IT security systems. CITAM framwork could classify them into unique device units through analysis processes in term of aggregation, normalization, deduplication, validation, and integration.

Calculation of Local Coordinate of Common Points for Coordinate Transformation by Trilateral Adjustment (좌표변환 공통점의 지역측지계 조정좌표 산출 - 삼변망조정계산의 활용 -)

  • Yang, Chul Soo;Kang, Sang-gu;Song, Wonho;Lee, Won Hui
    • Journal of Cadastre & Land InformatiX
    • /
    • v.54 no.1
    • /
    • pp.103-115
    • /
    • 2024
  • Trilateral adjustment can complement the problem of transforming cadastral maps into World Geodetic Coordinate system. First, it is possible to determine adjusted coordinate of common points that match each other over a wide area. Second, calculations that focus on specific points can be performed. Third, a solution that maintains the shape of the regional network can be obtained through constraints. Thus, the point coordinates can be determined appropriately for the survey system. In addition, heterogeneous survey results that span regions with different coordinate origins can be calculated on a single origin coordinate. This improves the efficiency of the workflow in tranforming cadastral maps into World Geodetic Coordinate System.

Optimizing Wavelet in Noise Canceler by Deep Learning Based on DWT (DWT 기반 딥러닝 잡음소거기에서 웨이블릿 최적화)

  • Won-Seog Jeong;Haeng-Woo Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.113-118
    • /
    • 2024
  • In this paper, we propose an optimal wavelet in a system for canceling background noise of acoustic signals. This system performed Discrete Wavelet Transform(DWT) instead of the existing Short Time Fourier Transform(STFT) and then improved noise cancellation performance through a deep learning process. DWT functions as a multi-resolution band-pass filter and obtains transformation parameters by time-shifting the parent wavelet at each level and using several wavelets whose sizes are scaled. Here, the noise cancellation performance of several wavelets was tested to select the most suitable mother wavelet for analyzing the speech. In this study, to verify the performance of the noise cancellation system for various wavelets, a simulation program using Tensorflow and Keras libraries was created and simulation experiments were performed for the four most commonly used wavelets. As a result of the experiment, the case of using Haar or Daubechies wavelets showed the best noise cancellation performance, and the mean square error(MSE) was significantly improved compared to the case of using other wavelets.

Research on Performance of Graph Algorithm using Deep Learning Technology (딥러닝 기술을 적용한 그래프 알고리즘 성능 연구)

  • Giseop Noh
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.471-476
    • /
    • 2024
  • With the spread of various smart devices and computing devices, big data generation is occurring widely. Machine learning is an algorithm that performs reasoning by learning data patterns. Among the various machine learning algorithms, the algorithm that attracts attention is deep learning based on neural networks. Deep learning is achieving rapid performance improvement with the release of various applications. Recently, among deep learning algorithms, attempts to analyze data using graph structures are increasing. In this study, we present a graph generation method for transferring to a deep learning network. This paper proposes a method of generalizing node properties and edge weights in the graph generation process and converting them into a structure for deep learning input by presenting a matricization We present a method of applying a linear transformation matrix that can preserve attribute and weight information in the graph generation process. Finally, we present a deep learning input structure of a general graph and present an approach for performance analysis.

Immunological mechanism of Aging : T & B cell changes (면역학적 노화 기전에 관한 연구: T 및 B 세포의 변화)

  • Kim, Jay Sik;Lee, Won Kil;Suh, Jang Soo;Song, Kyung Eun;Lee, Joong Won;Lee, Nan Young;Weksler, Marc E.
    • IMMUNE NETWORK
    • /
    • v.1 no.3
    • /
    • pp.236-243
    • /
    • 2001
  • Background: An immunological approach for aging mechanism appears to be important. Lymphocyte subsets analysis in peripheral blood is widely performed to assess the immune status and to diagnose and monitor various diseases. Some lymphocyte subsets are known to change with age, but only few data about age-related reference ragnes for these subsets in healthy individuals have been reported. So we attempted to report reference ranges for these subsets in each age group and review changes of the results with age for the secondary studies about immune cell function as lymphocyte blast transformation and immunoglobulin gene rearrangement (VDJ) including recombination activating genes (RAG-1 and RAG-2). Methods: Lymphocyte subset analysis was performed on 302 subjects, 189 males and 113 females with age group of all decades of life. Two color direct immunofluorescene flow cytometry (FCM) was done using $Simultest^{TM}$ IMK-Lymphocyte kit (Becton Dickinson, USA), $FACScan^{TM}$ (Becton Dickinson, USA) and $FACSCalibur^{TM}$ (Becton Dickinson, USA). Lymphocyte subsets analysed were T ($CD3^+$) and B cells ($CD19^+$), helper/inducer T ($CD4^+$) and suppressor/cytotoxic T cells ($CD8^+$), helper/suppressor ($CD4^+/CD8^+$) ratio and natural killer (NK) cells ($CD3^-CD16^+/CD56^+$). The absolute numbers of each subset were calculated from total lymphocyte counts. Data collected was analysed using SAS 6.12. A P-value of < 0.05 was considered significant. Results: We reported the counts and percentages of lymphocyte and these subsets in each age group. There were no statistically significant differences between male and female subjects. The percentage of $CD4^+$ T cells, and the count of NK cells did not show the significant difference among the various age groups. The age-related changes observed in our study were as following: 1) a decrease in the percentages of T cells, B cells and $CD8^+$ T cells ; 2) a decrease in the counts of B cells and $CD8^+$ T cells ; 3) an increase in the percentage and count of NK cells ; and 4) an increase in the $CD4^+/CD8^+$ ratio. Conclusion: The characteristics of aging process appeared to be showing a marked decrease of lympocyte subsets T and B cells as well as T8 ($CD8^+$). The age-related increase of the percentage of cells bearing NK marker can be interpreted as a compensatory consequence to cope with the decrease of T cells related to the thymic involution. These changes with age appeared to be for the secondary study about immune cell function as lymphocyte blast transformation and immunoglobulin gene rearrangement.

  • PDF

Analysis of Georeferencing Accuracy in 3D Building Modeling Using CAD Plans (CAD 도면을 활용한 3차원 건축물 모델링의 Georeferencing 정확도 분석)

  • Kim, Ji-Seon;Yom, Jae-Hong;Lee, Dong-Cheon
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.25 no.2
    • /
    • pp.117-131
    • /
    • 2007
  • Representation of building internal space is an active research area as the need for more geometrically accurate and visually realistic increases. 3 dimensional representation is common ground of research for disciplines such as computer graphics, architectural design and engineering and Geographic Information System (GIS). In many cases CAD plans are the starting point of reconstruction of 3D building models. The main objectives of building reconstruction in GIS applications are visualization and spatial analysis. Hence, CAD plans need to be preprocessed and edited to adapt to the data models of GIS SW and then georeferenced to enable spatial analysis. This study automated the preprocessing of CAD data using AutoCAD VBA (Visual Basic Application), and the processed data was topologically restructured for further analysis in GIS environment. Accuracy of georeferencing CAD data was also examined by comparing the results of coordinate transformation by using digital maps and GPS measurements as the sources of ground control points. The reconstructed buildings were then applied to visualization and network modeling.

A Study on the Gap Analysis between Expectation and Perceptions of Users for IPTV Services based on N-Screen Technology (N-Screen 기술 기반 IPTV서비스에 대한 이용자의 기대와 인지 간의 GAP분석에 관한 연구)

  • Kim, Jun Soo;Kang, Sang Ug;Lim, Gyoo Gun
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.2
    • /
    • pp.205-222
    • /
    • 2013
  • One of the recent important issues in IT fields is the convergence. It had been simply focused on functional convergence of technologyies. However the convergence in terms of businesses or services also has been made in recent years. The convergence between broadcasting and telecommunication industries can be possible because the e-transformation of broadcasting industry based on digital technology such as multimedia and multi-channel, can be combined with the high speed telecommunication network. It is giving a birth of various convergence services such as IPTV. IPTV is a kind of new service that is combined with the convergence of network, contents, and device. Nevertheless the controversy about the scope and the value of this new convergence service has constantly been raised; for example, what is the difference between IPTV and Internet TV? or what are the benefits that customers can have? This study measured the expectation level and the cognitive level of users before and after using the service and analyzed the gap between the importance and the satisfaction of the service. From this study, we proposed the priority of each function by analysing Importance-Performance Analysis(IPA) method to suggest required functions of IPTV service based on N-Screen technology. This study will identify the gap of awareness level between service providers and end users for the functions of broadcasting and telecommunications convergence service and suggest a solution enhancing user satisfaction.

Empirical Research on Search model of Web Service Repository (웹서비스 저장소의 검색기법에 관한 실증적 연구)

  • Hwang, You-Sub
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.4
    • /
    • pp.173-193
    • /
    • 2010
  • The World Wide Web is transitioning from being a mere collection of documents that contain useful information toward providing a collection of services that perform useful tasks. The emerging Web service technology has been envisioned as the next technological wave and is expected to play an important role in this recent transformation of the Web. By providing interoperable interface standards for application-to-application communication, Web services can be combined with component-based software development to promote application interaction and integration within and across enterprises. To make Web services for service-oriented computing operational, it is important that Web services repositories not only be well-structured but also provide efficient tools for an environment supporting reusable software components for both service providers and consumers. As the potential of Web services for service-oriented computing is becoming widely recognized, the demand for an integrated framework that facilitates service discovery and publishing is concomitantly growing. In our research, we propose a framework that facilitates Web service discovery and publishing by combining clustering techniques and leveraging the semantics of the XML-based service specification in WSDL files. We believe that this is one of the first attempts at applying unsupervised artificial neural network-based machine-learning techniques in the Web service domain. We have developed a Web service discovery tool based on the proposed approach using an unsupervised artificial neural network and empirically evaluated the proposed approach and tool using real Web service descriptions drawn from operational Web services repositories. We believe that both service providers and consumers in a service-oriented computing environment can benefit from our Web service discovery approach.