• Title/Summary/Keyword: cloud model

Search Result 1,255, Processing Time 0.029 seconds

A Study on the Performance of Cloud-based VDI Adoption: Comparing between IS administrators and business users (클라우드 기반 VDI 도입 성과에 관한 연구 - 시스템 관리자와 일반 사용자의 비교를 중심으로 -)

  • Kim, Il-Han;Kwon, Sun-Dong
    • Management & Information Systems Review
    • /
    • v.37 no.2
    • /
    • pp.149-167
    • /
    • 2018
  • The purpose of this study is to analyze the performance of Virtual Desktop Infrastructure(VDI) adoption. VDI performance was measured by IS manager (system quality, security, and managerial operation) and business user (usability, access, and user satisfaction). The survey questionnaires were developed for measuring VDI performance. 84 data samples were collected from the companies that had adopted cloud-based VDI. This research model was verified by Smart-PLS and SPSS. The research findings were as follows: First, the companies using VDI experienced actual performance, but they did not attain their expectation. Second, as results of comparing between IS managers and business users, IS administrators had considerably higher performance than business users, which indicates that there were big differences in performance perception among users. Compared with prior research such as technical trend, system construction, and performance improvement, this study has the following implications. First, by comparing the expected performance with the actual performance of the companies that have implemented and operating VDI, it was suggested how a company that wants to adopt VDI can manage the expectation level of VDI and achieve higher actual performance. Second, because the perception of VDI performance differs between business users and system managers, it is meaningful that a fair evaluation of VDI performance requires a balanced consideration of business users and system managers.

A Design and Analysis of Pressure Predictive Model for Oscillating Water Column Wave Energy Converters Based on Machine Learning (진동수주 파력발전장치를 위한 머신러닝 기반 압력 예측모델 설계 및 분석)

  • Seo, Dong-Woo;Huh, Taesang;Kim, Myungil;Oh, Jae-Won;Cho, Su-Gil
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.11
    • /
    • pp.672-682
    • /
    • 2020
  • The Korea Nowadays, which is research on digital twin technology for efficient operation in various industrial/manufacturing sites, is being actively conducted, and gradual depletion of fossil fuels and environmental pollution issues require new renewable/eco-friendly power generation methods, such as wave power plants. In wave power generation, however, which generates electricity from the energy of waves, it is very important to understand and predict the amount of power generation and operational efficiency factors, such as breakdown, because these are closely related by wave energy with high variability. Therefore, it is necessary to derive a meaningful correlation between highly volatile data, such as wave height data and sensor data in an oscillating water column (OWC) chamber. Secondly, the methodological study, which can predict the desired information, should be conducted by learning the prediction situation with the extracted data based on the derived correlation. This study designed a workflow-based training model using a machine learning framework to predict the pressure of the OWC. In addition, the validity of the pressure prediction analysis was verified through a verification and evaluation dataset using an IoT sensor data to enable smart operation and maintenance with the digital twin of the wave generation system.

Research on text mining based malware analysis technology using string information (문자열 정보를 활용한 텍스트 마이닝 기반 악성코드 분석 기술 연구)

  • Ha, Ji-hee;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.45-55
    • /
    • 2020
  • Due to the development of information and communication technology, the number of new / variant malicious codes is increasing rapidly every year, and various types of malicious codes are spreading due to the development of Internet of things and cloud computing technology. In this paper, we propose a malware analysis method based on string information that can be used regardless of operating system environment and represents library call information related to malicious behavior. Attackers can easily create malware using existing code or by using automated authoring tools, and the generated malware operates in a similar way to existing malware. Since most of the strings that can be extracted from malicious code are composed of information closely related to malicious behavior, it is processed by weighting data features using text mining based method to extract them as effective features for malware analysis. Based on the processed data, a model is constructed using various machine learning algorithms to perform experiments on detection of malicious status and classification of malicious groups. Data has been compared and verified against all files used on Windows and Linux operating systems. The accuracy of malicious detection is about 93.5%, the accuracy of group classification is about 90%. The proposed technique has a wide range of applications because it is relatively simple, fast, and operating system independent as a single model because it is not necessary to build a model for each group when classifying malicious groups. In addition, since the string information is extracted through static analysis, it can be processed faster than the analysis method that directly executes the code.

Particle Based Discrete Element Modeling of Hydraulic Stimulation of Geothermal Reservoirs, Induced Seismicity and Fault Zone Deformation (수리자극에 의한 지열저류층에서의 유도지진과 단층대의 변형에 관한 입자기반 개별요소법 모델링 연구)

  • Yoon, Jeoung Seok;Hakimhashemi, Amir;Zang, Arno;Zimmermann, Gunter
    • Tunnel and Underground Space
    • /
    • v.23 no.6
    • /
    • pp.493-505
    • /
    • 2013
  • This numerical study investigates seismicity and fault slip induced by fluid injection in deep geothermal reservoir with pre-existing fractures and fault. Particle Flow Code 2D is used with additionally implemented hydro-mechanical coupled fluid flow algorithm and acoustic emission moment tensor inversion algorithm. The output of the model includes spatio-temporal evolution of induced seismicity (hypocenter locations and magnitudes) and fault deformation (failure and slip) in relation to fluid pressure distribution. The model is applied to a case of fluid injection with constant rates changing in three steps using different fluid characters, i.e. the viscosity, and different injection locations. In fractured reservoir, spatio-temporal distribution of the induced seismicity differs significantly depending on the viscosity of the fracturing fluid. In a fractured reservoir, injection of low viscosity fluid results in larger volume of induced seismicity cloud as the fluid can migrate easily to the reservoir and cause large number and magnitude of induced seismicity in the post-shut-in period. In a faulted reservoir, fault deformation (co-seismic failure and aseismic slip) can occur by a small perturbation of fracturing fluid (<0.1 MPa) can be induced when the injection location is set close to the fault. The presented numerical model technique can practically be used in geothermal industry to predict the induced seismicity pattern and magnitude distribution resulting from hydraulic stimulation of geothermal reservoirs prior to actual injection operation.

Development of a Digital Textbook on 'Structure and Contraction Mechanism of Skeletal Muscle' with the Learning Model for Biomimicry-Based Convergence (생체모방 기반 융합 학습 모델을 적용한 '골격근의 구조와 수축'에 대한 디지털 교재 개발)

  • Kim, Soo-Youn;Kwon, Yong-Ju
    • Journal of Science Education
    • /
    • v.42 no.2
    • /
    • pp.95-105
    • /
    • 2018
  • The purpose of this study was to develop a digital textbook on 'structure and contraction mechanism of skeletal muscle' with the learning model for biomimicry-based convergence. The unit of 'structure and contraction mechanism of skeletal muscle' is a part of Life Science I in high school. The convergence learning model was designed with three phases of biomimicry-based convergence (Exploration-Design-Implementation) including 3D modeling & printing. The developed digital textbook was composed of 8 sessions which contains the following learning contents : Exploration of skeletal muscle, creative designing of skeletal muscle using sketch application and 3D modeling, convergent implementing of the designed using 3D printing, exploration of muscle contraction, creative designing of muscle contraction using sketch application and 3D modeling, and convergent implementing of the designed using 3D printing. Each session is also involved in the contents of gallery widgets, media widgets, keynote widgets, sketch widgets, the cloud, polling widgets, and review widgets for interactive and mobile learning. After administering the developed digital textbook to 20 high school students, it was shown a positive effectiveness on life science learning for high school students. Moreover, the digital textbook was evaluated as to promote student's abilities on creative designs and implementation related to biomimicry-based convergence. The digital textbook was also shown a favorable response on students' interest and self-directed learning on life science.

AI Fire Detection & Notification System

  • Na, You-min;Hyun, Dong-hwan;Park, Do-hyun;Hwang, Se-hyun;Lee, Soo-hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.63-71
    • /
    • 2020
  • In this paper, we propose a fire detection technology using YOLOv3 and EfficientDet, the most reliable artificial intelligence detection algorithm recently, an alert service that simultaneously transmits four kinds of notifications: text, web, app and e-mail, and an AWS system that links fire detection and notification service. There are two types of our highly accurate fire detection algorithms; the fire detection model based on YOLOv3, which operates locally, used more than 2000 fire data and learned through data augmentation, and the EfficientDet, which operates in the cloud, has conducted transfer learning on the pretrained model. Four types of notification services were established using AWS service and FCM service; in the case of the web, app, and mail, notifications were received immediately after notification transmission, and in the case of the text messaging system through the base station, the delay time was fast enough within one second. We proved the accuracy of our fire detection technology through fire detection experiments using the fire video, and we also measured the time of fire detection and notification service to check detecting time and notification time. Our AI fire detection and notification service system in this paper is expected to be more accurate and faster than past fire detection systems, which will greatly help secure golden time in the event of fire accidents.

National Agenda Service Model Development Research of Policy Information Portal of National Sejong Library (국립세종도서관 정책정보포털 국정과제 서비스 모형개발 연구)

  • Younghee, Noh;Inho, Chang;Hyojung, Sim
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.4
    • /
    • pp.73-92
    • /
    • 2022
  • This study intends to design a model that can effectively service policy data necessary for the implementation of new national agenda in order to provide high-quality policy information services that go beyond those of the existing Policy Information Portal (POINT) of National Sejong Library. To this end, it was determined that providing an integrated search environment, in lieu of data search through individual access, was necessary. Subsequently, four possible models for a national agenda service model were presented. First, designing a computerized system for both interface and electronic information source aspects was proposed for the national agenda service system operation. Second, designing the Linked Open Data system and the time-series service system for national policy information, providing the translation service of overseas original data, and securing the researcher's desired data were presented for the national agenda service information source operation. Third, strengthening public relations for policy users, building and promoting the site brand, operating SNS channels, and reinforcing the activation of auxiliary materials and the accessibility of external services were proposed for public relations of national agenda service. Fourth, expanding the information network with Open API, cloud service, and overseas libraries was proposed for collaborating and cooperating with the agenda service.

Predicting Crime Risky Area Using Machine Learning (머신러닝기반 범죄발생 위험지역 예측)

  • HEO, Sun-Young;KIM, Ju-Young;MOON, Tae-Heon
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.21 no.4
    • /
    • pp.64-80
    • /
    • 2018
  • In Korea, citizens can only know general information about crime. Thus it is difficult to know how much they are exposed to crime. If the police can predict the crime risky area, it will be possible to cope with the crime efficiently even though insufficient police and enforcement resources. However, there is no prediction system in Korea and the related researches are very much poor. From these backgrounds, the final goal of this study is to develop an automated crime prediction system. However, for the first step, we build a big data set which consists of local real crime information and urban physical or non-physical data. Then, we developed a crime prediction model through machine learning method. Finally, we assumed several possible scenarios and calculated the probability of crime and visualized the results in a map so as to increase the people's understanding. Among the factors affecting the crime occurrence revealed in previous and case studies, data was processed in the form of a big data for machine learning: real crime information, weather information (temperature, rainfall, wind speed, humidity, sunshine, insolation, snowfall, cloud cover) and local information (average building coverage, average floor area ratio, average building height, number of buildings, average appraised land value, average area of residential building, average number of ground floor). Among the supervised machine learning algorithms, the decision tree model, the random forest model, and the SVM model, which are known to be powerful and accurate in various fields were utilized to construct crime prevention model. As a result, decision tree model with the lowest RMSE was selected as an optimal prediction model. Based on this model, several scenarios were set for theft and violence cases which are the most frequent in the case city J, and the probability of crime was estimated by $250{\times}250m$ grid. As a result, we could find that the high crime risky area is occurring in three patterns in case city J. The probability of crime was divided into three classes and visualized in map by $250{\times}250m$ grid. Finally, we could develop a crime prediction model using machine learning algorithm and visualized the crime risky areas in a map which can recalculate the model and visualize the result simultaneously as time and urban conditions change.

Changes in Meteorological Variables by SO2 Emissions over East Asia using a Linux-based U.K. Earth System Model (리눅스 기반 U.K. 지구시스템모형을 이용한 동아시아 SO2 배출에 따른 기상장 변화)

  • Youn, Daeok;Song, Hyunggyu;Lee, Johan
    • Journal of the Korean earth science society
    • /
    • v.43 no.1
    • /
    • pp.60-76
    • /
    • 2022
  • This study presents a software full setup and the following test execution times in a Linux cluster for the United Kingdom Earth System Model (UKESM) and then compares the model results from control and experimental simulations of the UKESM relative to various observations. Despite its low resolution, the latest version of the UKESM can simulate tropospheric chemistry-aerosol processes and the stratospheric ozone chemistry using the United Kingdom Chemistry and Aerosol (UKCA) module. The UKESM with UKCA (UKESM-UKCA) can treat atmospheric chemistryaerosol-cloud-radiation interactions throughout the whole atmosphere. In addition to the control UKESM run with the default CMIP5 SO2 emission dataset, an experimental run was conducted to evaluate the aerosol effects on meteorology by changing atmospheric SO2 loading with the newest REAS data over East Asia. The simulation period of the two model runs was 28 years, from January 1, 1982 to December 31, 2009. Spatial distributions of monthly mean aerosol optical depth, 2-m temperature, and precipitation intensity from model simulations and observations over East Asia were compared. The spatial patterns of surface temperature and precipitation from the two model simulations were generally in reasonable agreement with the observations. The simulated ozone concentration and total column ozone also agreed reasonably with the ERA5 reanalyzed one. Comparisons of spatial patterns and linear trends led to the conclusion that the model simulation with the newest SO2 emission dataset over East Asia showed better temporal changes in temperature and precipitation over the western Pacific and inland China. Our results are in line with previous finding that SO2 emissions over East Asia are an important factor for the atmospheric environment and climate change. This study confirms that the UKESM can be installed and operated in a Linux cluster-computing environment. Thus, researchers in various fields would have better access to the UKESM, which can handle the carbon cycle and atmospheric environment on Earth with interactions between the atmosphere, ocean, sea ice, and land.

Stereoscopic Video Compositing with a DSLR and Depth Information by Kinect (키넥트 깊이 정보와 DSLR을 이용한 스테레오스코픽 비디오 합성)

  • Kwon, Soon-Chul;Kang, Won-Young;Jeong, Yeong-Hu;Lee, Seung-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.10
    • /
    • pp.920-927
    • /
    • 2013
  • Chroma key technique which composes images by separating an object from its background in specific color has restrictions on color and space. Especially, unlike general chroma key technique, image composition for stereo 3D display requires natural image composition method in 3D space. The thesis attempted to compose images in 3D space using depth keying method which uses high resolution depth information. High resolution depth map was obtained through camera calibration between the DSLR and Kinect sensor. 3D mesh model was created by the high resolution depth information and mapped with RGB color value. Object was converted into point cloud type in 3D space after separating it from its background according to depth information. The image in which 3D virtual background and object are composed obtained and played stereo 3D images using a virtual camera.