• Title/Summary/Keyword: Open Source Framework

Search Result 141, Processing Time 0.023 seconds

AUTOMATED HAZARD IDENTIFICATION FRAMEWORK FOR THE PROACTIVE CONSIDERATION OF CONSTRUCTION SAFETY

  • JunHyuk Kwon;Byungil Kim;SangHyun Lee;Hyoungkwan Kim
    • International conference on construction engineering and project management
    • /
    • 2013.01a
    • /
    • pp.60-65
    • /
    • 2013
  • Introducing the concept of construction safety in the design/engineering phase can improve the efficiency and effectiveness of safety management on construction sites. In this sense, further improvements for safety can be made in the design/engineering phase through the development of (1) an automated hazard identification process that is little dependent on user knowledge, (2) an automated construction schedule generation to accommodate varying hazard information over time, and (3) a visual representation of the results that is easy to understand. In this paper, we formulate an automated hazard identification framework for construction safety by extracting hazard information from related regulations to eliminate human interventions, and by utilizing a visualization technique in order to enhance users' understanding on hazard information. First, the hazard information is automatically extracted from textual safety and health regulations (i.e., Occupational Safety Health Administration (OSHA) Standards) by using natural language processing (NLP) techniques without users' interpretations. Next, scheduling and sequencing of the construction activities are automatically generated with regard to the 3D building model. Then, the extracted hazard information is integrated into the geometry data of construction elements in the industry foundation class (IFC) building model using a conformity-checking algorithm within the open source 3D computer graphics software. Preliminary results demonstrate that this approach is advantageous in that it can be used in the design/engineering phases of construction without the manual interpretation of safety experts, facilitating the designers' and engineers' proactive consideration for improving safety management.

  • PDF

A Novel Framework for APT Attack Detection Based on Network Traffic

  • Vu Ngoc Son
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.52-60
    • /
    • 2024
  • APT (Advanced Persistent Threat) attack is a dangerous, targeted attack form with clear targets. APT attack campaigns have huge consequences. Therefore, the problem of researching and developing the APT attack detection solution is very urgent and necessary nowadays. On the other hand, no matter how advanced the APT attack, it has clear processes and lifecycles. Taking advantage of this point, security experts recommend that could develop APT attack detection solutions for each of their life cycles and processes. In APT attacks, hackers often use phishing techniques to perform attacks and steal data. If this attack and phishing phase is detected, the entire APT attack campaign will be crash. Therefore, it is necessary to research and deploy technology and solutions that could detect early the APT attack when it is in the stages of attacking and stealing data. This paper proposes an APT attack detection framework based on the Network traffic analysis technique using open-source tools and deep learning models. This research focuses on analyzing Network traffic into different components, then finds ways to extract abnormal behaviors on those components, and finally uses deep learning algorithms to classify Network traffic based on the extracted abnormal behaviors. The abnormal behavior analysis process is presented in detail in section III.A of the paper. The APT attack detection method based on Network traffic is presented in section III.B of this paper. Finally, the experimental process of the proposal is performed in section IV of the paper.

Design and Implementation of Big Data Analytics Framework for Disaster Risk Assessment (빅데이터 기반 재난 재해 위험도 분석 프레임워크 설계 및 구현)

  • Chai, Su-seong;Jang, Sun Yeon;Suh, Dongjun
    • Journal of Digital Contents Society
    • /
    • v.19 no.4
    • /
    • pp.771-777
    • /
    • 2018
  • This study proposes a big data based risk analysis framework to analyze more comprehensive disaster risk and vulnerability. We introduce a distributed and parallel framework that allows large volumes of data to be processed in a short time by using open-source disaster risk assessment tool. A performance analysis of the proposed system presents that it achieves a more faster processing time than that of the existing system and it will be possible to respond promptly to precise prediction and contribute to providing guideline to disaster countermeasures. Proposed system is able to support accurate risk prediction and mitigate severe damage, therefore will be crucial to giving decision makers or experts to prepare for emergency or disaster situation, and minimizing large scale damage to a region.

Design and Implementation of a Big Data Analytics Framework based on Cargo DTG Data for Crackdown on Overloaded Trucks

  • Kim, Bum-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.67-74
    • /
    • 2019
  • In this paper, we design and implement an analytics platform based on bulk cargo DTG data for crackdown on overloaded trucks. DTG(digital tachograph) is a device that stores the driving record in real time; that is, it is a device that records the vehicle driving related data such as GPS, speed, RPM, braking, and moving distance of the vehicle in one second unit. The fast processing of DTG data is essential for finding vehicle driving patterns and analytics. In particular, a big data analytics platform is required for preprocessing and converting large amounts of DTG data. In this paper, we implement a big data analytics framework based on cargo DTG data using Spark, which is an open source-based big data framework for crackdown on overloaded trucks. As the result of implementation, our proposed platform converts real large cargo DTG data sets into GIS data, and these are visualized by a map. It also recommends crackdown points.

Development of SAML Software for JAVA Web Applications in Korea (국내 자바 웹 응용을 위한 SAML 소프트웨어의 개발)

  • Jo, Jinyong;Chae, Yeonghun;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1160-1172
    • /
    • 2019
  • Federated authentication is a user authentication and authorization infrastructure that spans multiple security domains. Many overseas Web applications have been adopting SAML-based federated authentication. However, in Korea, it is difficult to apply the authentication because of the high market share of a specific Web (application) server, which is hard to use open-source SAML software and the high adoption of Java-based standard framework which is not easy to integrate with SAML library. This paper proposes the SAML4J, which is developed in order to have Web applications easily and safely integrated with the Java-based framework. SAML4J has a developer-friendly advantage of using a session storage independent of the framework and processing Web SSO flows through simple API. We evaluate the functionality, performance, and security of the SAML4J to demonstrate the high feasibility of it.

A HIGH PERFORMANCE CLUSTER FOR ASTRONOMICAL COMPUTATIONS (천문 계산용 고성능 클러스터 구축)

  • KIM JONGSOO;KIM BONG GYU;YIM IN SUNG;BAEK CHANG HYUN;NAM HYUN WOONG;RYU DONGSU;KANG YOUNG WOON
    • Publications of The Korean Astronomical Society
    • /
    • v.19 no.1
    • /
    • pp.77-81
    • /
    • 2004
  • A high performance computing cluster for astronomical computations has been built at Korea Astronomy Observatory. The 64 node cluster interconnected with Gigabit Ethernet is composed of 128 Intel Xeon processors, 160 GB memory, 6 TB global storage space, and an LTO (Linear Tape-Open) tape library. The cluster was installed and has been managed with the Open Source Cluster Application Resource (OSCAR) framework. Its performance for parallel computations was measured with a three-dimensional hydrodynamic code and showed quite a good scalability as the number of computational cells increases. The cluster has already been utilized for several computational research projects, some of which resulted in a few publications, even though its full operation time is less than one year. As a major resource of the $K^*Grid$ testbed, the cluster has been used for Grid computations, too.

High performance 3D pin-by-pin neutron diffusion calculation based on 2D/1D decoupling method for accurate pin power estimation

  • Yoon, Jooil;Lee, Hyun Chul;Joo, Han Gyu;Kim, Hyeong Seog
    • Nuclear Engineering and Technology
    • /
    • v.53 no.11
    • /
    • pp.3543-3562
    • /
    • 2021
  • The methods and performance of a 3D pin-by-pin neutronics code based on the 2D/1D decoupling method are presented. The code was newly developed as an effort to achieve enhanced accuracy and high calculation performance that are sufficient for the use in practical nuclear design analyses. From the 3D diffusion-based finite difference method (FDM) formulation, decoupled planar formulations are established by treating pre-determined axial leakage as a source term. The decoupled axial problems are formulated with the radial leakage source term. To accelerate the pin-by-pin calculation, the two-level coarse mesh finite difference (CMFD) formulation, which consists of the multigroup node-wise CMFD and the two-group assembly-wise CMFD is implemented. To enhance the accuracy, both the discontinuity factor method and the super-homogenization (SPH) factor method are examined for pin-wise cross-section homogenization. The parallelization is achieved with the OpenMP package. The accuracy and performance of the pin-by-pin calculations are assessed with the VERA and APR1400 benchmark problems. It is demonstrated that pin-by-pin 2D/1D alternating calculations within the two-level 3D CMFD framework yield accurate solutions in about 30 s for the typical commercial core problems, on a parallel platform employing 32 threads.

Design and Implementation of a Network-Adaptive Mechanism for HTTP Video Streaming

  • Kim, Yo-Han;Shin, Jitae;Park, Jiho
    • ETRI Journal
    • /
    • v.35 no.1
    • /
    • pp.27-34
    • /
    • 2013
  • This paper proposes a network-adaptive mechanism for HTTP-based video streaming over wireless/mobile networks. To provide adaptive video streaming over wireless/mobile networks, the proposed mechanism consists of a throughput estimation scheme in the time-variant wireless network environment and a video rate selection algorithm used to increase the streaming quality. The adaptive video streaming system with proposed modules is implemented using an open source multimedia framework and is validated over emulated wireless/mobile networks. The emulator helps to model and emulate network conditions based on data collected from actual experiments. The experiment results show that the proposed mechanism provides higher video quality than the existing system provides and a rate of video streaming almost void of freezing.

Efficient Process Network Implementation of Ray-Tracing Application on Heterogeneous Multi-Core Systems

  • Jung, Hyeonseok;Yang, Hoeseok
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.4
    • /
    • pp.289-293
    • /
    • 2016
  • As more mobile devices are equipped with multi-core CPUs and are required to execute many compute-intensive multimedia applications, it is important to optimize the systems, considering the underlying parallel hardware architecture. In this paper, we implement and optimize ray-tracing application tailored to a given mobile computing platform with multiple heterogeneous processing elements. In this paper, a lightweight ray-tracing application is specified and implemented in Kahn process network (KPN) model-of-computation, which is known to be suitable for the description of real-time applications. We take an open-source C/C++ implementation of ray-tracing and adapt it to KPN description in the Distributed Application Layer framework. Then, several possible configurations are evaluated in the target mobile computing platform (Exynos 5422), where eight heterogeneous ARM cores are integrated. We derive the optimal degree of parallelism and a suitable distribution of the replicated tasks tailored to the target architecture.

CURRENT STATUS AND IMPORTANT ISSUES ON SEISMIC HAZARD EVALUATION METHODOLOGY IN JAPAN

  • Ebisawa, Katsumi
    • Nuclear Engineering and Technology
    • /
    • v.41 no.10
    • /
    • pp.1223-1234
    • /
    • 2009
  • The outlines of seismic PSA implementation standards and seismic hazard evaluation procedure were shown. An overview of the cause investigation of seismic motion amplification on the Niigata-ken Chuetsu-oki (NCO) earthquake was also shown. Then, the contents for improving the seismic hazard evaluation methodology based on the lessons learned from the NCO earthquake were described. (1) It is very important to recognize the effectiveness of a fault model on the detail seismic hazard evaluation for the near seismic source through the cause investigation of the NCO earthquake. (2) In order to perform and proceed with a seismic hazard evaluation, the Japan Nuclear Energy Safety Organization has proposed the framework of the open deliberation rule regarding the treatment of uncertainty which was made so as to be able to utilize a logic tree. (3) The b-value evaluation on the "Stress concentrating zone," which is a high seismic activity around the NCO hypocenter area, should be modified based on the Gutenberg-Richter equation.