• Title/Summary/Keyword: shared platform

Search Result 187, Processing Time 0.03 seconds

Technology and Policy for Blockchain-based Spectrum Sharing (블록체인 기반의 전파 공유 기술과 전파 정책)

  • Shin, Na Yeon;Nam, Ji-Hyun;Choi, Ye Jin;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.13-21
    • /
    • 2019
  • The restricted network or the unbalanced distribution of spectrum is causing the problems of lack of spectrum resources and deterioration of the service quality. In addition, the existing centralized radio sharing method has not been a fundamental solution for radio sharing and is inefficient in terms of cost, convenience, and security. In this paper, we propose a blockchain-based spectrum sharing as a low-cost, trustworthy, high-efficiency platform that can distribute and share spectrum resources, and propose policies to realize this. In the spectrum sharing platform, spectrum information about Wi-Fi AP and LTE mobile hotspot is registered in the blockchain, and spectrum sharers and users can conclude peer-to-peer spectrum sharing contract quickly and efficiently through smart contract. The pay for the shared spectrum resources and reward for spectrum quality management open platform ecosystem to activate the circulation-sharing and it can provide a convenient and efficient public wireless infrastructure.

Designing Services with Models from Interaction Design and Cognitive Systems Engineering

  • Lee, Dong-Seok;Pan, Young-Hwan
    • Journal of the Ergonomics Society of Korea
    • /
    • v.31 no.1
    • /
    • pp.125-130
    • /
    • 2012
  • Objective: This paper discusses how service design is related to two well-known disciplines, interaction design and cognitive systems engineering, which are applied to the design of software, websites and mobile phones, and the design of control room of nuclear power plants and cockpit control, respectively. Background: Service design has been spotlighted recently due to its promisingness to service industry. Successful cases of service design are widely shared among designers. Service design, however, is treated as practice rather than a discipline. Method: It was discussed that it is important to consider the interaction between customers and services as in interaction design, and some domains are complex enough and have functional limitation as in cognitive systems engineering. Results: Models and design tools of the disciplines are introduced and applied to service design practices. Conclusion: It was concluded that service design has the characteristics of both interaction design and cognitive systems engineering.

Big Data Analysis and Prediction of Traffic in Los Angeles

  • Dauletbak, Dalyapraz;Woo, Jongwook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.841-854
    • /
    • 2020
  • The paper explains the method to process, analyze and predict traffic patterns in Los Angeles county using Big Data and Machine Learning. The dataset is used from a popular navigating platform in the USA, which tracks information on the road using connected users' devices and also collects reports shared by the users through the app. The dataset mainly consists of information about traffic jams and traffic incidents reported by users, such as road closure, hazards, accidents. The major contribution of this paper is to give a clear view of how the large-scale road traffic data can be stored and processed using the Big Data system - Hadoop and its ecosystem (Hive). In addition, analysis is explained with the help of visuals using Business Intelligence and prediction with classification machine learning model on the sampled traffic data is presented using Azure ML. The process of modeling, as well as results, are interpreted using metrics: accuracy, precision and recall.

Implementation of the Multi-Channel Network Controller using Buffer Sharing Mechanism (버퍼공유기법을 사용한 멀티채널 네트워크 컨트롤러 구현)

  • Lee, Tae-Su;Park, Jae-Hyun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.4
    • /
    • pp.784-789
    • /
    • 2007
  • This paper presents an implementation of a new type of architecture to improve an overflow problem on the network buffer. Each receiver channel of network system stores the message in its own buffer. If some receiver channel receives many messages, buffer overflow problem may occur for the channel. This paper proposes a network controller that implements a receiver channel with shared-memory to save all of the received messages from the every incomming channels. The proposed architecture is applied to ARINC-429, a real-time control network for commercial avionics system. For verifying performance of the architecture, ARINC-429 controller is designed using a SOPC platform, designed by Verilog and targeted to Xilinx Virtex-4 with a built-in PPC405 core.

A shared economic management platform of parking lot (공유 경제 주차장 관리 플랫폼)

  • Bang, Keon-Hwan;Sin, Chang-Hwan;Lee, Choong-Ki;You, Je-Bong;Kim, Ja-Hee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.59-62
    • /
    • 2017
  • 최근 서울에 자동차 보유 대수가 급증함에 따라 주거나 상가 밀집 지역에서 주차 문제는 갈수록 심화되고 있어 이에 따른 주차공간 확보 및 기존 주차 공간의 활용할 수 있는 시스템이 요구되고 있다. 따라서 본 논문에서는 공유경제 개념을 도입하여 개인이나 단체가 소유하고 있는 주차 공간을 사용하지 않는 시간대에 주차 가능 공간을 다른 사람들과 공유할 수 있는 시스템을 제안한다. 본 플랫폼은 웹, 안드로이드, 라즈베리파이, 데이터베이스로 구성되어 있으며 실제 주차장에 설치된 초음파 센서와 CCTV 이미지를 분석하는 OpenCV를 이용하여 현재 주차장의 사용 중인 공간과 비사용 중인 주차 가능 면수를 분석하고 분석한 정보를 사용자들에게 제공한다.

  • PDF

Structured Representation of Design Information for Gear Drives in XML (XML을 이용한 기어장치 설계정보의 구조적 표현)

  • 정태형;안준영
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2000.10a
    • /
    • pp.392-397
    • /
    • 2000
  • A methodology is proposed to share the design information of a gear drive using XML (eXtensible Markup Language). XML is the standard language of the next generation and can be used as a neutral and unique format shared by various Web applications. Since XML is a platform-independent meta-markup language, it is possible to reduce the additional programming efforts for Web applications by using the standardization of technical terminologies. In this study, the structure of design information about gears, shafts, keys and bearings in a gear drive has been made and the terminologies used in the gear drive design process have been authored. The XML DTD(Data Type Definition) for the gear drive design has been declared and the usage of the XML application has been shown.

  • PDF

Lessons Learned from an Implementation of Plant Monitoring System for Simulation (발전소 감시계통의 Virtual Simulation시 권고사항)

  • Seo In-Yong;Hwang Do-Hyun;Lee Yong-Hwan;Han Hwan-Ho
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.11a
    • /
    • pp.102-107
    • /
    • 2005
  • PMS(Plant Monitoring System) for simulation is the program for training that users such as instructor, operator, and supervisor can operate the plant virtually. Presented in this paper, are some lessons learned from implementation of PMS for simulation. First, this PMS fer simulation is based on LINUX instead of UNIX. These two OS(Operating System) have different platform and compiler version on it, so debugging needs to be done about variable defining part. Second, In LINUX system, the size of shared memory and message queue is already designated as a default value that user has to set up and use the RTAP DB. Third, to decrease the dummy data size, it has to be changed into binary formation. Lastly, PMS software for simulation provides several environments according to the command, so considered should be status monitoring, alarm, system organization, point and group monitoring, history storage and searching function.

  • PDF

On-line Shared Platform Evaluation Framework for Advanced Persistent Threats

  • Sohn, Dongsik;Lee, Taejin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2610-2628
    • /
    • 2019
  • Advanced persistent threats (APTs) are constant attacks of specific targets by hackers using intelligent methods. All current internal infrastructures are constantly subject to APT attacks created by external and unknown malware. Therefore, information security officers require a framework that can assess whether information security systems are capable of detecting and blocking APT attacks. Furthermore, an on-line evaluation of information security systems is required to cope with various malicious code attacks. A regular evaluation of the information security system is thus essential. In this paper, we propose a dynamic updated evaluation framework to improve the detection rate of internal information systems for malware that is unknown to most (over 60 %) existing static information security system evaluation methodologies using non-updated unknown malware.

The Effect and Impact of Multi-Platform Native Advertising Content

  • Yang, HuiYeon;Lim, Chan;Kim, Chang Jo
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.77-83
    • /
    • 2019
  • Recently, as social media users have grown, the resulting form of advertising has emerged, and one of the types is native advertising. This advertising method appears to be 52% higher than the banner, according to a study by the IPG Media Lab (2013). Therefore, there is a positive effect on native advertising, but it is necessary to maximize the effect. In this paper, the acceptor's attitude to the native advertisement and the shared intention are verified as to how the effect of the native advertisement can be understood and the maximized effect can be obtained. When the brand phrase was in the form of direct exposure, the subjects were positive about the advertisement and the brand attitude was favorable. Share intentions were also high. These results included suggestions to produce native advertisements in consideration of the attitudes and sharing of the recipients.

A Study on the Contents Security Management Model for Multi-platform Users

  • Joo, Hansol;Shin, Seung-Jung
    • International journal of advanced smart convergence
    • /
    • v.10 no.2
    • /
    • pp.10-14
    • /
    • 2021
  • Today people adopt various contents from their mobile devices which lead to numerous platforms. As technology of 5G, IOT, and smart phone develops, the number of people who create, edit, collect, and share their own videos, photos, and articles continues to increase. As more contents are shared online, the numbers of data being stolen continue to increase too. To prevent these cases, an authentication method is needed to encrypt the content and prove it as its own content. In the report, we propose a few methods to secure various misused content with secondary security. A unique private key is designed when people create new contents through sending photos or videos to platforms. The primary security is to encrypt the "Private Key" with a public key algorithm, making its data-specific "Timeset" that doesn't allow third-party users to enter. For the secondary security, we propose to use Message Authentication Codes(MACs) to certify that we have produced the content.