• Title/Summary/Keyword: 능동 서비스

Search Result 610, Processing Time 0.032 seconds

Development of Structural Analysis Platform through Internet-based Technology Using Component Models (컴포넌트 모델을 이용한 인터넷 기반 구조해석 플랫폼 개발)

  • Shin Soo-Bong;Park Hun-Sung
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.19 no.2 s.72
    • /
    • pp.161-169
    • /
    • 2006
  • The study proposes component models in developing an efficient platform for internet-based structural analysis. Since a structural analysis requires an operation of complicated algorithms, a client-side computation using X-Internet is preferred to a server-side computation to provide a flexible service for multi-users. To compete with the user-friendly interfaces of available commercial analysis programs, a window-based interface using Smart Client was applied. Also, component-based programming was performed with the considerations on reusability and expandability so that active Preparation for future change or modification could be feasible. The components describe the whole system by subdivision and simplification. In the relationship between upper-and lower-level components and also in the relationship between components and objects, a unified interface was used to clearly classify the connection between the libraries. By performing data communication between different types of platforms using XML WebService, a conner-stone of data transfer is proposed for the future integrated CAE. The efficiency of the developed platform has been examined through a sample structural analysis and design on planar truss structures.

Anomaly Intrusion Detection using Fuzzy Membership Function and Neural Networks (퍼지 멤버쉽 함수와 신경망을 이용한 이상 침입 탐지)

  • Cha, Byung-Rae
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.595-604
    • /
    • 2004
  • By the help of expansion of computer network and rapid growth of Internet, the information infrastructure is now able to provide a wide range of services. Especially open architecture - the inherent nature of Internet - has not only got in the way of offering QoS service, managing networks, but also made the users vulnerable to both the threat of backing and the issue of information leak. Thus, people recognized the importance of both taking active, prompt and real-time action against intrusion threat, and at the same time, analyzing the similar patterns of in-trusion already known. There are now many researches underway on Intrusion Detection System(IDS). The paper carries research on the in-trusion detection system which hired supervised learning algorithm and Fuzzy membership function especially with Neuro-Fuzzy model in order to improve its performance. It modifies tansigmoid transfer function of Neural Networks into fuzzy membership function, so that it can reduce the uncertainty of anomaly intrusion detection. Finally, the fuzzy logic suggested here has been applied to a network-based anomaly intrusion detection system, tested against intrusion data offered by DARPA 2000 Intrusion Data Sets, and proven that it overcomes the shortcomings that Anomaly Intrusion Detection usually has.

PC User Segmentation based on user contextual inquiry interview analysis -Focusing on Soho, small and medium-sized businesses- (PC 사용자의 업무 행태분석을 통한 유형화 - 소호, 중소기업 사용자를 중심으로-)

  • Lee, Joung-Young;Moon, Hyun-Jung
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.193-198
    • /
    • 2008
  • Now days with the significant grows of internet and PC hardware/software, most of the business, include small size business and soho, is worked by PC/Network. However these critical changes, all the PC/Network system or service is identical and these make user a inconvenient experience and unpleasant aspect to PC/Network. This research is to segment the user bases on the user context of using PC and all this segmentation was done in contextual design process. From Contextual Interview, all data of user context of environment, use case, needs, voices, break downs were captured and these data were interpreted and filtered to affinity notes and user modeling. After the interpretation, the consolidation was being held by affinity diagram, which could make ready to segment the user. For the result, 3 segmentation was evaluated and which are the 'Holistic Networker', 'Unplugged Controller' and 'Passive Reactor'.

  • PDF

Protection of Location Privacy for Spatio-Temporal Query Processing Using R-Trees (R-트리를 활용한 시공간 질의 처리의 위치 개인정보 보호 기법)

  • Kwon, Dong-Seop
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.3
    • /
    • pp.85-98
    • /
    • 2010
  • The prevailing infrastructure of ubiquitous computing paradigm on the one hand making significant development for integrating technology in the daily life but on the other hand raising concerns for privacy and confidentiality. This research presents a new privacy-preserving spatio-temporal query processing technique, in which location based services (LBS) can be serviced without revealing specific locations of private users. Existing location cloaking techniques are based on a grid-based structures such as a Quad-tree and a multi-layered grid. Grid-based approaches can suffer a deterioration of the quality in query results since they are based on pre-defined size of grids which cannot be adapted for variations of data distributions. Instead of using a grid, we propose a location-cloaking algorithm which uses the R-tree, a widely adopted spatio-temporal index structure. The proposed algorithm uses the MBRs of leaf nodes as the cloaked locations of users, since each leaf node guarantees having not less than a certain number of objects. Experimental results show the superiority of the proposed method.

Proposal and Analysis of the Orthogonal Beam Forming using Reactance Control (리액턴스 제어를 이용한 능동형 빔포밍의 제안 및 분석)

  • Lee, Kyu-Tae;Ki, Jang-Geun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.81-86
    • /
    • 2014
  • A smart phone subscriber needs wide bandwidth services for more fast data communication on the internet. The conventional MIMO system is now developing to resolve these problems with limited device space for antenna and frequency band environment reserved. One of way to make it practically is to add the number of antennas theoretically. But it is difficult to increase the antenna element as a limited space on the system. Therefore an active beam forming scheme is known as a way of constructing a Compact MIMO system for that. In this paper, the fast switching control block was suggested to adjust a reactance of the antenna element and verified experimentally the effects by switching signal on an orthogonal beam forming through a spatial domain.

A Study on Educational Utilization of Wiki and Activation Plans (위키의 교육적 활용 활성화 방안)

  • Kim, Kil-Mo;Kim, Seong-Sik;Lee, In-Sook;Kang, Seong-Guk
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.2
    • /
    • pp.25-34
    • /
    • 2010
  • The Internet has brought us a new paradigm called WEB 2.0 which inherently represents the openness, participation, sharing, and cooperation. The WEB 2.0 has rendered people to actively participate in the creation of information and to dynamically interact with others to build mutual knowledge-bases, introducing a whole new web environment. One of the most representative techniques demonstrating the value of the WEB 2.0 is the WIKI which is essentially based on the 'Collective Intelligence' and the 'Wisdom of Crowds'. So far, the WIKI has drawn lots of attention for its potential as an educational tool. In this research, we explored the educational potential of the WIKI by investigating various programs and web-based tools offering WIKI services, and then, analyzing the usage model and characteristics of its users. Based on the analysis, we developed a WIKI-based instructional model and also proposed concrete lesson plans adopting this model. Besides, we introduced preliminary methodologies on the active use of the WIKI in the Edunet and the Cyber Home Learning System as well.

  • PDF

Design and Implementation of Intelligent Wireless Sensor Network Based Home Network System (무선 센서 네트워크 기반의 지능형 홈 네트워크 시스템 설계 및 구현)

  • Shin, Jae-Wook;Yoon, Ba-Da;Kim, Sung-Gil;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.465-468
    • /
    • 2007
  • An intelligent home network system using low-power and low-cost sensor nodes was designed and implemented. In Intelligent Home Network System, active home appliances control is composed of RSSI (Received Signal Strength Indicator) based user indoor location tracking, dynamic multi-hop routing, and learning integration remote-control. Through the remote-control learning, home appliances can be controlled in wireless network environment. User location information for intelligent service is calculated using RSSI based Triangle measurement method, and then the received location information is passed to Smoothing Algorithm to reduce error rate. In order to service Intelligent Home Network, moreover, the sensor node is designed to be held by user. The gathered user data is transmitted through dynamic multi-hop routing to server, and real-time user location & environment information are displayed on monitoring program.

  • PDF

Attacker Response Framework using Mobile Code (이동 코드를 이용한 공격자 대응 프레임워크)

  • Bang Hyo-Chan;Him Jin-Oh;Na Jung-Chan;Jang Joong-Su;Lee Young-Suk
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.959-970
    • /
    • 2004
  • It has become more difficult to correspond an cyber attack quickly as patterns of attack become various and complex. However, current so curity mechanisms just have passive defense functionalities. In this paper, we propose new network suity architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture makes it possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service), by using active packet technology including a mobile code on active network. Also, it is designed to have more active correspondent than that of existing mechanisms. We im-plemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.

Impact of Shared-Decision Making on Patient Satisfaction in Military Hospitals (군 의료기관에서의 공유의사결정이 환자만족도에 미치는 영향)

  • Min, Hyun-Jun;Suh, Won-S.
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.11
    • /
    • pp.338-349
    • /
    • 2011
  • The purpose of this study is to provide an innovative way enhancing patient satisfaction in military hospitals by analyzing the impact of shared-decision making on patient satisfaction. The survey questionnaire has been distributed for a month in two hospitals with similar goals, serving for officers and men of the armed forces, and 514 copies has been collected for the study. The study found a positive association between shared-decision making and patient satisfaction. The results of the study suggest the military hospitals should allocate their resources on the fundamental issues such as improving quality of services they provide rather than reimburse the services to compensate the service the armed forces received from private institutions.

A Study on the Design of Network Management Architecture based on TMN Concept (TMN 개념을 응용한 통신망 관리구조 설계에 관한 연구)

  • 김영명;조영현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.1
    • /
    • pp.170-182
    • /
    • 1994
  • With the evolution of telecommunications network, the operational enviroments of a morden telecommunication network are becoming more complex and diverse. Therefore. the design of NMA( Network Management Aechitecture) that pursues standardization and openness in order to accommodatae them actively will be required. In such a network environment which composes various and heterogeneous network elements, it is not easy to surpport efficiently TMN MSs(Management Services) because it has lack of interoperability among them. This paper proposes a top-down approach being taken to design a network management architecture with establishing the hierarchical relationships of management services based on ITU-TS(Telecommunication Standardization in Europe) TMN concept, and allocating MSC(Management Service Component) by TMN management layer, and analyzing the information flow between FAs(Functional Areas).

  • PDF