• Title/Summary/Keyword: 분석네트워크 프로세스

Search Result 248, Processing Time 0.027 seconds

Design and Performance Analysis of ML Techniques for Finger Motion Recognition (손가락 움직임 인식을 위한 웨어러블 디바이스 설계 및 ML 기법별 성능 분석)

  • Jung, Woosoon;Lee, Hyung Gyu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.2
    • /
    • pp.129-136
    • /
    • 2020
  • Recognizing finger movements have been used as a intuitive way of human-computer interaction. In this study, we implement an wearable device for finger motion recognition and evaluate the accuracy of several ML (Machine learning) techniques. Not only HMM (Hidden markov model) and DTW (Dynamic time warping) techniques that have been traditionally used as time series data analysis, but also NN (Neural network) technique are applied to compare and analyze the accuracy of each technique. In order to minimize the computational requirement, we also apply the pre-processing to each ML techniques. Our extensive evaluations demonstrate that the NN-based gesture recognition system achieves 99.1% recognition accuracy while the HMM and DTW achieve 96.6% and 95.9% recognition accuracy, respectively.

A Study on the Detection of Malware That Extracts Account IDs and Passwords on Game Sites and Possible Countermeasures Through Analysis (게임 사이트의 계정과 비밀번호 유출 악성코드 분석을 통한 탐지 및 대응방안 연구)

  • Lee, Seung-Won;Roh, Young-Sup;Kim, Woo-Suk;Lee, Mi-Hwa;Han, Kook-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.283-293
    • /
    • 2012
  • A new type of malware that extracts personal and account data over an extended period of time and that apparently is resistant to detection by vaccines has been identified. Generally, a malware is installed on a computer through network-to-network connections by utilizing Web vulnerabilities that contain injection, XSS, broken authentication and session management, or insecure direct-object references, among others. After the malware executes registration of an arbitrary service and an arbitrary process on a computer, it then periodically communicates the collected confidential information to a hacker. This paper is a systematic approach to analyzing a new type of malware called "winweng," a kind of worm that frequently made appearances during the first half of 2011. The research describes how the malware came to be in circulation, how it infects computers, how its operations expose its existence and suggests improvements in responses and countermeasures. Keywords: Malware, Worm, Winweng, SNORT.

IIoT processing analysis model for improving efficiency and processing time through characteristic analysis by production product (생산제품별 특성 분석을 통한 효율성 및 처리시간 향상을 위한 IIoT 처리 분석 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.397-404
    • /
    • 2022
  • Recently, in the industrial field, various studies are being conducted on converging IIoT devices that combine low-power processes and network cards into industrial sites to improve production efficiency and reduce costs. In this paper, we propose a processing model that can efficiently manage products produced by attaching IIoT sensor information to infrastructure built in industrial sites. The proposed model creates production data using IIoT data collection, preprocessing, characteristic generation, and labels to detect abnormally processed sensing information in real time by checking sensing information of products produced by IIoT at regular intervals. In particular, the proposed model can easily process IIoT data by performing tracking and monitoring so that product information produced in industrial sites can be processed in real time. In addition, since the proposed model is operated based on the existing production environment, the connection with the existing system is smooth.

Social Network : A Novel Approach to New Customer Recommendations (사회연결망 : 신규고객 추천문제의 새로운 접근법)

  • Park, Jong-Hak;Cho, Yoon-Ho;Kim, Jae-Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.1
    • /
    • pp.123-140
    • /
    • 2009
  • Collaborative filtering recommends products using customers' preferences, so it cannot recommend products to the new customer who has no preference information. This paper proposes a novel approach to new customer recommendations using the social network analysis which is used to search relationships among social entities such as genetics network, traffic network, organization network, etc. The proposed recommendation method identifies customers most likely to be neighbors to the new customer using the centrality theory in social network analysis and recommends products those customers have liked in the past. The procedure of our method is divided into four phases : purchase similarity analysis, social network construction, centrality-based neighborhood formation, and recommendation generation. To evaluate the effectiveness of our approach, we have conducted several experiments using a data set from a department store in Korea. Our method was compared with the best-seller-based method that uses the best-seller list to generate recommendations for the new customer. The experimental results show that our approach significantly outperforms the best-seller-based method as measured by F1-measure.

  • PDF

Data Modeling for Cell-Signaling Pathway Database (세포 신호전달 경로 데이타베이스를 위한 데이타 모델링)

  • 박지숙;백은옥;이공주;이상혁;이승록;양갑석
    • Journal of KIISE:Databases
    • /
    • v.30 no.6
    • /
    • pp.573-584
    • /
    • 2003
  • Recent massive data generation by genomics and proteomics requires bioinformatic tools to extract the biological meaning from the massive results. Here we introduce ROSPath, a database system to deal with information on reactive oxygen species (ROS)-mediated cell signaling pathways. It provides a structured repository for handling pathway related data and tools for querying, displaying, and analyzing pathways. ROSPath data model provides the extensibility for representing incomplete knowledge and the accessibility for linking the existing biochemical databases via the Internet. For flexibility and efficient retrieval, hierarchically structured data model is defined by using the object-oriented model. There are two major data types in ROSPath data model: ‘bio entity’ and ‘interaction’. Bio entity represents a single biochemical entity: a protein or protein state involved in ROS cell-signaling pathways. Interaction, characterized by a list of inputs and outputs, describes various types of relationship among bio entities. Typical interactions are protein state transitions, chemical reactions, and protein-protein interactions. A complex network can be constructed from ROSPath data model and thus provides a foundation for describing and analyzing various biochemical processes.

A Study on the Analysis of Performance for a Real-time Distributed Control System with Reliability (신뢰성 있는 실시간 분산제어 시스템의 성능분석에 관한 연구)

  • Kim, Nae-Jin;Park, In-Kap
    • Journal of IKEEE
    • /
    • v.2 no.2 s.3
    • /
    • pp.270-277
    • /
    • 1998
  • As the network technologies advance, the control systems progress from a centralized architecture to a distributed one. However, these control systems were designed mostly based on the general-purpose operating systems(OS) and have many problems for assurance of a real-time property required for plant processing fields. Therefore, the control systems far a plant process upon real-time OS hare been increased gradually. In this paper, the real-time OS emphasizes on the realization of real-time processing capability, reliability of real-time response, and multi-processing functionality which are prerequisites for a distributed control system. And on the basis of this OS, the number of executable loop and logic, the functions of main plant processing, was analyzed and its validity was also evaluated. The system in this paper was designed not to effect on processing data while online, and the time spent on switching was measured.

  • PDF

An Administration Model for Causation of the Schedule Delays in Construction Projects (건설공사 공기연장사유 관리모델)

  • Kim, Jong-Han;Kim, Kyung-Rai
    • Korean Journal of Construction Engineering and Management
    • /
    • v.8 no.3
    • /
    • pp.125-133
    • /
    • 2007
  • If project time extension were required in the construction projects, either liquidated damages or extension costs should be applied according to causation of the schedule delays. However, in actual cases it is not applied so far according to the contract conditions. The reason why this situation happened Is that function of the present planning and scheduling is not working feasibly. The CPM schedule could not provide a proper solution for apportioning responsibility for the schedule delays. This situation could be considered as breach of contract and will cause potential disputes for schedule delay. Therefore, in this research process based contract administration model for construction delay claim is proposed to prevent schedule delay and solve the claims. The model is based on pro-active management for causation of delay to provide apportionment of responsibility and written evidences.

Entrepreneurial Ecosystems: Key Concepts and Economic Geographical Implications (Entrepreneurial Ecosystems(기업가적 생태계) 개념과 시사점)

  • Koo, Yangmi
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.25 no.1
    • /
    • pp.1-22
    • /
    • 2022
  • The purpose of this study is to analyze key concepts of Entrepreneurial Ecosystems and to suggest implications for economic geographical studies. The definition and concept of entrepreneurship as well as changes of its research trends were examined. By combining entrepreneurship and geography, Entrepreneurial Ecosystems, which have recently emerged as important concepts and theories, were examined with the focus on the key concepts such as 'actors and factors', 'productive' and 'territory'. It is important that the individual, organizational and institutional components such as entrepreneurs, start-ups, existing companies, institutions and cultural elements are interconnected to build communities through 'entrepreneurial recycling'. Entrepreneurial Ecosystems support to create innovative high-growth start-ups based on entrepreneurial culture in the local region. Despite conceptual limitations, theoretical and empirical analyses should be conducted from economic geographical perspectives in order to reveal the geographical and spatial processes of productive entrepreneurship and to suggest policy implications for region-based start-up ecosystems.

Establishment of Preservative Green Spaces and Potential Focus Areas by the Green Infrastructure Assessment of the City of Daejeon (녹지기반성 분석에 의한 보전녹지와 중점관리지역 설정에 관한 연구 - 대전광역시를 대상으로 -)

  • Lee, Shi-Young;Shim, Joon-Young;Jang, Min;Heo, Jun
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.36 no.4
    • /
    • pp.65-73
    • /
    • 2008
  • Due to the amendment of the Act for Urban Parks in 2005, local governments have to establish long-range plans for securing and managing urban parks and green areas. This study aims to propose a method of setting priorities for green areas of land to be preserved before the development stage through the introduction of the concept of Green Infrastructure Assessment, and provide basic data to establish the network of urban parks and green areas by applying the GIA method to the city of Daejeon. The concept of GIA and the process of analysis have been drawn as a result of literature research and case studies. The results of this study show that an introduction of the GIA concept to set park and open space planning promotes the connection of the city planning process as well as presents very a reasonable source to facilitate sustainable development. Also, other results present a priority ranking for protection of parks and green areas as well as a means to manage potential focus areas. This study, does have research limitations such as a limited study area, scale, and conflicts between domestic and foreign computing data. Further studies need to set the planning process and examine the index survey to apply this method to various situations and areas.

A Study on Designing Method of VoIP QoS Management Framework Model under NGN Infrastructure Environment (NGN 기반환경 에서의 VoIP QoS 관리체계 모델 설계)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.12 no.1
    • /
    • pp.85-94
    • /
    • 2011
  • QoS(Quality of Service) is defined as "The collective effect of service performance which determines the degree of satisfaction of a user of the service" by ITU-T Rec. E.800. While the use of VoIP(Voice Over Internet Protocol) has been widely implemented, persistent problems with QoS are a very important sue which needs to be solved. This research is finding the assignment of VoIP QoS to deduct how to manage the control system and presenting the QoS control process and framework under NGN(Next Generation Network) environment. The trial framework is the modeling of the QoS measurement metrics, instrument, equipment, method of measurement, the series of cycle & the methodology about analysis of the result of measurement. This research underlines that the vulnerability of the VoIP protocol in relation to its QoS can be guaranteed when the product quality and management are controlled and measured systematically. Especially it's very important time to maintain the research about VoIP QoS measurement and control because the big conversion of new network technology paradigm is now spreading. In addition, when the proposed method is applied, it can reduce an overall delay and can contribute to improved service quality, in relation to signal, voice processing, filtering more effectively.