• Title/Summary/Keyword: communication delay

Search Result 2,179, Processing Time 0.024 seconds

Distributed Edge Computing for DNA-Based Intelligent Services and Applications: A Review (딥러닝을 사용하는 IoT빅데이터 인프라에 필요한 DNA 기술을 위한 분산 엣지 컴퓨팅기술 리뷰)

  • Alemayehu, Temesgen Seyoum;Cho, We-Duke
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.12
    • /
    • pp.291-306
    • /
    • 2020
  • Nowadays, Data-Network-AI (DNA)-based intelligent services and applications have become a reality to provide a new dimension of services that improve the quality of life and productivity of businesses. Artificial intelligence (AI) can enhance the value of IoT data (data collected by IoT devices). The internet of things (IoT) promotes the learning and intelligence capability of AI. To extract insights from massive volume IoT data in real-time using deep learning, processing capability needs to happen in the IoT end devices where data is generated. However, deep learning requires a significant number of computational resources that may not be available at the IoT end devices. Such problems have been addressed by transporting bulks of data from the IoT end devices to the cloud datacenters for processing. But transferring IoT big data to the cloud incurs prohibitively high transmission delay and privacy issues which are a major concern. Edge computing, where distributed computing nodes are placed close to the IoT end devices, is a viable solution to meet the high computation and low-latency requirements and to preserve the privacy of users. This paper provides a comprehensive review of the current state of leveraging deep learning within edge computing to unleash the potential of IoT big data generated from IoT end devices. We believe that the revision will have a contribution to the development of DNA-based intelligent services and applications. It describes the different distributed training and inference architectures of deep learning models across multiple nodes of the edge computing platform. It also provides the different privacy-preserving approaches of deep learning on the edge computing environment and the various application domains where deep learning on the network edge can be useful. Finally, it discusses open issues and challenges leveraging deep learning within edge computing.

Design and Implementation of Interface System for Swarm USVs Simulation Based on Hybrid Mission Planning (하이브리드형 임무계획을 고려한 군집 무인수상정 시뮬레이션 시스템의 연동 인터페이스 설계 및 구현)

  • Park, Hee-Mun;Joo, Hak-Jong;Seo, Kyung-Min;Choi, Young Kyu
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.3
    • /
    • pp.1-10
    • /
    • 2022
  • Defense fields widely operate unmanned systems to lower vulnerability and enhance combat effectiveness. In the navy, swarm unmanned surface vehicles(USVs) form a cluster within communication range, share situational awareness information among the USVs, and cooperate with them to conduct military missions. This paper proposes an interface system, i.e., Interface Adapter System(IAS), to achieve inter-USV and intra-USV interoperability. We focus on the mission planning subsystem(MPS) for interoperability, which is the core subsystem of the USV to decide courses of action such as automatic path generation and weapon assignments. The central role of the proposed system is to exchange interface data between MPSs and other subsystems in real-time. To this end, we analyzed the operational requirements of the MPS and identified interface messages. Then we developed the IAS using the distributed real-time middleware. As experiments, we conducted several integration tests at swarm USVs simulation environment and measured delay time and loss ratio of interface messages. We expect that the proposed IAS successfully provides bridge roles between the mission planning system and other subsystems.

Analysis of Anti-Reversing Functionalities of VMProtect and Bypass Method Using Pin (VMProtect의 역공학 방해 기능 분석 및 Pin을 이용한 우회 방안)

  • Park, Seongwoo;Park, Yongsu
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.11
    • /
    • pp.297-304
    • /
    • 2021
  • Commercial obfuscation tools (protectors) aim to create difficulties in analyzing the operation process of software by applying obfuscation techniques and Anti-reversing techniques that delay and interrupt the analysis of programs in software reverse engineering process. In particular, in case of virtualization detection and anti-debugging functions, the analysis tool exits the normal execution flow and terminates the program. In this paper, we analyze Anti-reversing techniques of executables with Debugger Detection and Viralization Tools Detection options through VMProtect 3.5.0, one of the commercial obfuscation tools (protector), and address bypass methods using Pin. In addition, we predicted the location of the applied obfuscation technique by finding out a specific program termination routine through API analysis since there is a problem that the program is terminated by the Anti-VM technology and the Anti-DBI technology and drew up the algorithm flowchart for bypassing the Anti-reversing techniques. Considering compatibility problems and changes in techniques from differences in versions of the software used in experiment, it was confirmed that the bypass was successful by writing the pin automation bypass code in the latest version of the software (VMProtect, Windows, Pin) and conducting the experiment. By improving the proposed analysis method, it is possible to analyze the Anti-reversing method of the obfuscation tool for which the method is not presented so far and find a bypass method.

LSTM-based Fire and Odor Prediction Model for Edge System (엣지 시스템을 위한 LSTM 기반 화재 및 악취 예측 모델)

  • Youn, Joosang;Lee, TaeJin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.2
    • /
    • pp.67-72
    • /
    • 2022
  • Recently, various intelligent application services using artificial intelligence are being actively developed. In particular, research on artificial intelligence-based real-time prediction services is being actively conducted in the manufacturing industry, and the demand for artificial intelligence services that can detect and predict fire and odors is very high. However, most of the existing detection and prediction systems do not predict the occurrence of fires and odors, but rather provide detection services after occurrence. This is because AI-based prediction service technology is not applied in existing systems. In addition, fire prediction, odor detection and odor level prediction services are services with ultra-low delay characteristics. Therefore, in order to provide ultra-low-latency prediction service, edge computing technology is combined with artificial intelligence models, so that faster inference results can be applied to the field faster than the cloud is being developed. Therefore, in this paper, we propose an LSTM algorithm-based learning model that can be used for fire prediction and odor detection/prediction, which are most required in the manufacturing industry. In addition, the proposed learning model is designed to be implemented in edge devices, and it is proposed to receive real-time sensor data from the IoT terminal and apply this data to the inference model to predict fire and odor conditions in real time. The proposed model evaluated the prediction accuracy of the learning model through three performance indicators, and the evaluation result showed an average performance of over 90%.

A Study on Derivation of Public Conflict Management Countermeasure in the Port Sector (항만분야 공공갈등 관리방안 도출에 관한 연구)

  • Ga-Hyun Kim;Se-Won Kim;Hye-Ryeong Lee
    • Journal of Navigation and Port Research
    • /
    • v.47 no.4
    • /
    • pp.246-255
    • /
    • 2023
  • Public conflicts in the port sector can cause additional social costs and delay the supply of port infrastructure, which can negatively affect local industries and national competitiveness. Although the importance of conflict management in the port sector is gradually increasing, there is still no systematic conflict management countermeasure. Therefore, in this study, the limitations of the current conflict management system in the port sector were considered, and a Delphi survey was conducted targeting experts and stakeholders in the port sector and conflict management. In addition, criteria for diagnosing conflicts in the port sector, causes of conflicts, proactive management measures, and ex post solutions were derived. The results of the Delphi survey analysis showed that the biggest causes of conflict were the absence of stakeholder opinion collection, consultation, and communication tools. Preliminary conflict management measures including a public deliberation process to collect local opinions and discuss development directions before deciding on specific issues, and ex post conflict resolution measures including investigation of causes of conflicts and objective personnel management in the process of preparing alternatives (e.g., securing reliability) were determined as the most important factors. In addition, based on the results obtained in this study, conflict management techniques for each phase of the port development project were presented. These findings are expected to be used as a useful reference material to reflect the port sector, which has not been included in the "Public Institution Conflict Management Manual (2016)" of the Office for Government Policy Coordination.

A Study on the Implement of AI-based Integrated Smart Fire Safety (ISFS) System in Public Facility

  • Myung Sik Lee;Pill Sun Seo
    • International Journal of High-Rise Buildings
    • /
    • v.12 no.3
    • /
    • pp.225-234
    • /
    • 2023
  • Even at this point in the era of digital transformation, we are still facing many problems in the safety sector that cannot prevent the occurrence or spread of human casualties. When you are in an unexpected emergency, it is often difficult to respond only with human physical ability. Human casualties continue to occur at construction sites, manufacturing plants, and multi-use facilities used by many people in everyday life. If you encounter a situation where normal judgment is impossible in the event of an emergency at a life site where there are still many safety blind spots, it is difficult to cope with the existing manual guidance method. New variable guidance technology, which combines artificial intelligence and digital twin, can make it possible to prevent casualties by processing large amounts of data needed to derive appropriate countermeasures in real time beyond identifying what safety accidents occurred in unexpected crisis situations. When a simple control method that divides and monitors several CCTVs is digitally converted and combined with artificial intelligence and 3D digital twin control technology, intelligence augmentation (IA) effect can be achieved that strengthens the safety decision-making ability required in real time. With the enforcement of the Serious Disaster Enterprise Punishment Act, the importance of distributing a smart location guidance system that urgently solves the decision-making delay that occurs in safety accidents at various industrial sites and strengthens the real-time decision-making ability of field workers and managers is highlighted. The smart location guidance system that combines artificial intelligence and digital twin consists of AIoT HW equipment, wireless communication NW equipment, and intelligent SW platform. The intelligent SW platform consists of Builder that supports digital twin modeling, Watch that meets real-time control based on synchronization between real objects and digital twin models, and Simulator that supports the development and verification of various safety management scenarios using intelligent agents. The smart location guidance system provides on-site monitoring using IoT equipment, CCTV-linked intelligent image analysis, intelligent operating procedures that support workflow modeling to immediately reflect the needs of the site, situational location guidance, and digital twin virtual fencing access control technology. This paper examines the limitations of traditional fixed passive guidance methods, analyzes global technology development trends to overcome them, identifies the digital transformation properties required to switch to intelligent variable smart location guidance methods, explains the characteristics and components of AI-based public facility smart fire safety integrated system (ISFS).

Design and Implementation of Multi-HILS based Robot Testbed to Support Software Validation of Biomimetic Robots (생체모방로봇 소프트웨어 검증 지원 다중 HILS 기반 로봇 테스트베드 설계 및 구현)

  • Hanjin Kim;Kwanhyeok Kim;Beomsu Ha;Joo Young Kim;Sung Jun Shim;Jee Hoon Koo;Won-Tae Kim
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.6
    • /
    • pp.243-250
    • /
    • 2024
  • Biomimetic robots, which emulate characteristics of biological entities such as birds or insects, have the potential to offer a tactical advantage in surveillance and reconnaissance in future battlefields. To effectively utilize these robots, it is essential to develop technologies that emulate the wing flapping of birds or the movements of cockroaches. However, this effort is complicated by the challenges associated with securing the necessary hardware and the complexities involved in software development and validation processes. In this paper, we presents the design and implementation of a multi-HILS based biomimic robot software validation testbed using modeling and simulation (M&S). By employing this testbed, developers can overcome the absence of hardware, simulate future battlefield scenarios, and conduct software development and testing. However, the multi-HILS based testbed may experience inter-device communication delays as the number of test robots increases, significantly affecting the reliability of simulation results. To address this issue, we propose the data distribution service priority (DDSP), a priority-based middleware. DDSP demonstrates an average delay reduction of 1.95 ms compared to the existing DDS, ensuring the required data transmission quality for the testbed.

Study on economic effects of outsourcing of food materials on the hotel kitchen - Focus on cooking Western food in the first class hotel - (식재료 아웃소싱이 경제적 주방에 미치는 영향에 관한 연구 - 특1급호텔 양식조리를 중심으로 -)

  • 성태종
    • Journal of Applied Tourism Food and Beverage Management and Research
    • /
    • v.13 no.2
    • /
    • pp.45-69
    • /
    • 2002
  • This study is designed to examine feasibility and limitation of outsourcing in cooking Western food in a hotel, to interpret importance of outsourcing(eg. outside order, outside procurement, outside supply) in a broad sense in order to reinforce the core capacity in the cooking department, and to know whether the cooking human power is efficiently used and how much the chefs recognize outsourcing of food materials. As many companies conduct restructuring to cut down its size, the reduction of human power led the Western food cooking in the hotel to lower core capacities, lower quality, and lower efficiency. In addition, the sagging morale of chefs undermined creativity. To change from the traditional kitchen to an economic kitchen needs to look into importance of outsourcing, cognitive attitude of chefs, relation with outside suppliers. Here suggests performance of positive changes in the structure The study examined feasibility and limitation of outsourcing in the hotel kitchen as well as chefs' cognitive attitude toward outsourcing of food materials to reinforce core capabilities of the hotel kitchen. 1. Companies of outsourcing are selected according to variability of price conditions, flexibility of contract conditions, popularity of the outsourcing company, and reputation of the outsourcing company. 2. The importance of outsourcing in the Western food cooking is divided into 4 factors such as standard of selecting outsourcing companies, policies of cooking manu, quality of cooking, and quantity of cooking. 3. The most feasible section in outsourcing of food materials is a process of kneading flour for bread, which shows that many Western-food chefs expect to put higher possibility of outsourcing on the kneading. In other words, when it comes to confectionery and bakery, there are many outside expert processing companies supplying high quality products. In the order of outsourcing feasibility, sauce is followed by processed vegetable, garnish of main dish, and soup. The least feasible section in outsourcing of food materials is appetize. Appetize includes a concept of a improvised dish and needs speed. Due to its color, freshness, and sensibility of taste, the appetize plays a key role in the Western food cooking. 4. When outsourcing is taken in place, the highest risk is to lower the inner cooking skills. Therefore chefs in charge of the Western food sequently recognize both internal problems including storage of cooking skills, unstability of layoffs, and loss of cooperation between departments, and external problems including inferior goods, difficulty of differentiating manu, delay of delivery, and expiration date. It shows that most of the Western food chefs consider risks of the internal problems at first. 5. A effective outsourcing needs appropriate selection of outsourcing companies, maintenance of credibility, active communication, check and management of hygiene. However regardless of their position or career, chefs in charge of the Western food have the same cognitive attitude toward selecting successful outsourcing companies after the outsourcing system is enforced. The core of cooking, or a final stage in the full process of so-called artistic cooking, should be treated with insourcing. Reduction of several cooking processes resulted in shortened cooking time, increased efficiency, faster cooking, cutting the waiting-lines, and finally more room for customers. The outsourcing system can reduce or eliminate the following processes in cooking: buying various food materials, checking, storing, preparing, and processing. Especially in the Western food cooking department of a hotel, the outsourcing system should be enforced to make an economic kitchen and to efficiently manage it. Wow it's time to change from the traditional kitchen to an economic kitchen in the hotel cooking department. For that, the cooking department should become a small but strong organization by outsourcing except its core work.

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.