• Title/Summary/Keyword: 엔트로피 기법

검색결과 259건 처리시간 0.023초

Prioritization decision for hazard ranking of water distribution network by cluster using the Entropy-TOPSIS method (Entropy-TOPSIS 기법을 활용한 군집별 상수도관망 위험도 관리순위 결정)

  • Park, Haekeum;Kim, Kibum;Hyung, Jinseok;Kim, Taehyeon;Koo, Jayong
    • Journal of Korean Society of Water and Wastewater
    • /
    • 제35권6호
    • /
    • pp.517-531
    • /
    • 2021
  • The water supply facilities of Korea have achieved a rapid growth, along with the other social infrastructures consisting a city, due to the phenomenon of urbanization according to economic development. Meanwhile, the level of water supply service demanded by consumer is also steadily getting higher in keeping with economic growth. However, as an adverse effect of rapid growth, the quantity of aged water supply pipes are increasing rapidly, Bursts caused by pipe aging brought about an enormous economic loss of about 6,161 billion won as of 2019. These problems are not only worsening water supply management, also increasing the regional gap in water supply services. The purpose of this study is to classify hazard evaluation indicators and to rank the water distribution network hazard by cluster using the TOPSIS method. In conclusion, in this study, the entropy-based multi-criteria decision-making methods was applied to rank the hazard management of the water distribution network, and the hazard management ranking for each cluster according to the water supply conditions of the county-level municipalities was determined according to the evaluation indicators of water outage, water leakage, and pipe aging. As such, the hazard ranking method proposed in this study can consider various factors that can impede the tap water supply service in the water distribution network from a macroscopic point of view, and it can be reflected in evaluating the degree of hazard management of the water distribution network from a preventive point of view. Also, it can be utilized in the implementation of the maintenance plan and water distribution network management project considering the equity of water supply service and the stability of service supply.

Watershed water circulation assessment using PSR framework (PSR framework를 이용한 유역 물순환 평가)

  • Kim, Seokhyeon;Kim, Sinae;Kim, Kyeung;Hwang, Soonho;Kim, Hakkwan;Kang, Moon-Seong
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 한국수자원학회 2021년도 학술발표회
    • /
    • pp.462-462
    • /
    • 2021
  • 최근 도시화 및 불투수면의 증가와 지하수의 과다한 사용으로 직접유출이 증가하고, 침투량이 감소하며, 하천의 건천화가 발생하고 있다. 이에 환경부에서는 이러한 물순환의 왜곡을 막기위해 물환경보전법상의 물순환율을 정의하고 물순환 관리목표를 설정하였다. 하지만 지역 별 물순환 특성을 반영한 관리계획이 부족하고, 현재 제한된 재원의 효율적 활용을 위해서는 물순환 관리지역에 대한 우선순위 결정도 필요하다. 본 연구에서는 PSR framework를 통해 유역 물순환 평가방법론을 만들고 이를 활용한 지역별 관리계획 및 우선순위를 결정하고자하였다. PSR framework는 지속가능성을 위해 OECD가 개발한 개념 모형이며, Pressure, State, Response 세 가지 요소로 구분해 평가하게된다. PSR framework의 기본 개념은 인간의 활동들이 환경에 압력 (P)를 주고, 이로 인해 자연의 질과 영향 (S)을 미치며, 이에대한 회복을 위해 인식과 행동을 통해 정책과 제도 등을 통해 반응 (R)한다는 것이다. 유역 물순환을 4가지 그룹 (기후, 수문학적, 사회경제학적, 환경적)으로 구분하고 각 그룹 별 평가요소에 대하여 도출하였다. 기후그룹은 강우, 수문학적 그룹은 증발산, 토지이용, 유출특성을, 사회경제학적 그룹은 재정, 사회구조, 기반시설, 정책을, 환경적 그룹은 수질, 수생태계를 선정하였다. 이후 각 요소 별 평가를 위해 다양한 지표를 고려하여 선정하였으며, 각 지표를 PSR framework에 맞춰 재분류하였다. 각 지표를 하나의 점수로 통합하기 위해 지표 별 가중치를 산정하였으며, 이때 연구자의 주관이 반영되지않는 엔트로피 기법을 이용하여 산정하였다. 구한 식을 통해 우리나라 소유역구분을 기준으로 모든 지표를 계산하였으며, 각 지표에 가중치를 적용해 유역 종합점수를 산정하고 유역 별 취약지역 및 취약요소를 평가하였다.

  • PDF

A Share Hardening Method for Multi-Factor Secret Sharing (다중-요소 비밀 공유를 위한 지분 강화 기법)

  • Sung Wook Chung;Min Soo Ryu
    • KIPS Transactions on Computer and Communication Systems
    • /
    • 제13권1호
    • /
    • pp.31-37
    • /
    • 2024
  • Conventional secret sharing techniques often derive shares from randomly generated polynomials or planes, resulting in lengthy and complex shares that are challenging to memorize and/or manage without the aid of a separate computer or specialized device. Modifying existing secret sharing methods to use a predetermined value, such as a memorizable password or bio-metric information, offers a solution. However, this approach raises concerns about security, especially when the predetermined value lacks randomness or has low entropy. In such cases, adversaries may deduce a secret S with just (t - 1) shares by guessing the predetermined value or employing brute force attacks. In this paper, we introduce a share hardening method designed to ensure the security of secret sharing while enabling the use of memorizable passwords or biometric information as predetermined shares.

Design of Authentication Mechinism for Command Message based on Double Hash Chains (이중 해시체인 기반의 명령어 메시지 인증 메커니즘 설계)

  • Park Wang Seok;Park Chang Seop
    • Convergence Security Journal
    • /
    • 제24권1호
    • /
    • pp.51-57
    • /
    • 2024
  • Although industrial control systems (ICSs) recently keep evolving with the introduction of Industrial IoT converging information technology (IT) and operational technology (OT), it also leads to a variety of threats and vulnerabilities, which was not experienced in the past ICS with no connection to the external network. Since various control command messages are sent to field devices of the ICS for the purpose of monitoring and controlling the operational processes, it is required to guarantee the message integrity as well as control center authentication. In case of the conventional message integrity codes and signature schemes based on symmetric keys and public keys, respectively, they are not suitable considering the asymmetry between the control center and field devices. Especially, compromised node attacks can be mounted against the symmetric-key-based schemes. In this paper, we propose message authentication scheme based on double hash chains constructed from cryptographic hash function without introducing other primitives, and then propose extension scheme using Merkle tree for multiple uses of the double hash chains. It is shown that the proposed scheme is much more efficient in computational complexity than other conventional schemes.

A study on the application of redundancy in information design (정보디자인의 잉여성적용 연구)

  • Oh, Byung-Keun;Hong, Suk-Il
    • Archives of design research
    • /
    • 제18권1호
    • /
    • pp.49-58
    • /
    • 2005
  • Focusing on the information sender, message, channel, and receiver, the existing information theory deals with the noise, information contents, and probability of choice, which involve in the process of information transmission. In the current digital environment, besides simply conveying information itself through media, the important issue is how to efficiently convey information. Therefore, we need to analyze the theory in different perspective, and to research the Information redundancy for the methodology of information design. The redundancy causes the receiver to have attraction to the information and to reduce its contents due to its supplement and repetition. So it can play a role of efficient communication method. The concept of redundancy is applied to the communication of art such as literature, architecture, painting, and design to accomplish efficient communication. In order to get persuasive information design for the receiver's perspective we need to make use of this concept. The redundancy can be applied with the technical aspect of multimedia and Interaction, which add supplemental expression, or sort of event for the receiver's experience and memory. In the process of constructing information it can be applied with the structure of gaming redundancy, entropy, the accumulating communication code using entertaining feature, and storytelling methodology. The noise and entropy could be used for the means of making redundancy, not the obstacle to information. The redundancy gives the receiver attraction on the information and makes them have strong will of interpreting it so that the purpose of conveying information will be accomplished efficiently.

  • PDF

Building Domain Ontology through Concept and Relation Classification (개념 및 관계 분류를 통한 분야 온톨로지 구축)

  • Huang, Jin-Xia;Shin, Ji-Ae;Choi, Key-Sun
    • Journal of KIISE:Software and Applications
    • /
    • 제35권9호
    • /
    • pp.562-571
    • /
    • 2008
  • For the purpose of building domain ontology, this paper proposes a methodology for building core ontology first, and then enriching the core ontology with the concepts and relations in the domain thesaurus. First, the top-level concept taxonomy of the core ontology is built using domain dictionary and general domain thesaurus. Then, the concepts of the domain thesaurus are classified into top-level concepts in the core ontology, and relations between broader terms (BT) - narrower terms (NT) and related terms (RT) are classified into semantic relations defined for the core ontology. To classify concepts, a two-step approach is adopted, in which a frequency-based approach is complemented with a similarity-based approach. To classify relations, two techniques are applied: (i) for the case of insufficient training data, a rule-based module is for identifying isa relation out of non-isa ones; a pattern-based approach is for classifying non-taxonomic semantic relations from non-isa. (ii) For the case of sufficient training data, a maximum-entropy model is adopted in the feature-based classification, where k-NN approach is for noisy filtering of training data. A series of experiments show that performances of the proposed systems are quite promising and comparable to judgments by human experts.

An Adaptive Information Hiding Technique of JPEG2000-based Image using Chaotic System (카오스 시스템을 이용한 JPEG2000-기반 영상의 적응적 정보 은닉 기술)

  • 김수민;서영호;김동욱
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • 제41권4호
    • /
    • pp.9-21
    • /
    • 2004
  • In this paper, we proposed the image hiding method which decreases calculation amount by encrypt partial data using discrete wavelet transform and linear scale quantization which were adopted as the main technique for frequency transform in JPEG2000 standard. Also we used the chaotic system which has smaller calculation amount than other encryption algorithms and then dramatically decreased calculation amount. This method operates encryption process between quantization and entropy coding for preserving compression ratio of images and uses the subband selection method and the random changing method using the chaotic system. For ciphering the quantization index we use a novel image encryption algerian of cyclically shifted in the right or left direction and encrypts two quantization assignment method (Top-down/Reflection code), made change of data less. Also, suggested encryption method to JPEG2000 progressive transmission. The experiments have been performed with the proposed methods implemented in software for about 500 images. consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. It has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.

Assessment of water use vulnerability in the unit watersheds using TOPSIS approach with subjective and objective weights (주관적·객관적 가중치를 활용한 TOPSIS 기반 단위유역별 물이용 취약성 평가)

  • Park, Hye Sun;Kim, Jeong Bin;Um, Myoung-Jin;Kim, Yeonjoo
    • Journal of Korea Water Resources Association
    • /
    • 제49권8호
    • /
    • pp.685-692
    • /
    • 2016
  • This study aimed to develop the indicator-based approach to assess water use vulnerability in watersheds and applied to the unit watershed within the Han River watershed. Vulnerability indices were comprised of three sub-components (exposure, sensitivity, adaptive capacity) with respect to water use. The indicators were made up of 16 water use indicators. Then we estimated vulnerability indices using the Technique for Order of Preference by Similarity to Ideal Solution approach (TOPSIS). We collected environmental and socio-economic data from national statistics database, and used them for simulated results by the Soil and Water Assessment Tool (SWAT) model. For estimating the weighted values for each indicator, expert surveys for subjective weight and data-based Shannon's entropy method for objective weight were utilized. With comparing the vulnerability ranks and analyzing rank correlation between two methods, we evaluated the vulnerabilities for the Han River watershed. For water use, vulnerable watersheds showed high water use and the water leakage ratio. The indices from both weighting methods showed similar spatial distribution in general. Such results suggests that the approach to consider different weighting methods would be important for reliably assessing the water use vulnerability in watersheds.

Design of a Real Estate Knowledge Information System Based on Semantic Search (시맨틱 검색 기반의 부동산 지식 정보시스템 설계)

  • Cho, Jae-Hyung;Kang, Moo-Hong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • 제16권2호
    • /
    • pp.111-124
    • /
    • 2011
  • The apartment' share of the housing has steadily increased and property assets have been valued in importance as the one of asset value. Information retrieval system using internet is particularly active in the real estate market. However, user satisfaction on real estate information system is not very high, and there is a lack of research on real estate retrieval to increasing efficiency until now. This study presents a new knowledge information system developed to consider region-related factor and individual-related factor in the real estate market. In addition it enables a real estate knowledge system to search various preferential requirements for buyers such as school district, living convenience, easy maintenance as well as price. We made a survey of the search condition preference of experts on 30 real estate agents and then analyzed the result using AHP methodology. Furthermore, this research is to build apartment ontology using semantic web technologies to standardize various terminologies of apartment information and to show how it can be used to help buyers find apartments of the interest. After designing architecture of a real estate knowledge information system, this system is applied to the Busan real estate market to estimate the solutions of retrieval through Multi-Attribute Decision Making(MADM). Based on the results of the analysis, we endowed the buyer and expert's selected factors with weights in the system. Evaluation results indicate that this new system is to raise not only the value satisfaction of user, but also make it possible to effectively search and analyze the real estate through entropy analysis of MADM. This new system is to raise not only the value satisfaction of buyer's real estate, but also make it possible to effectively search and analyze the related real estate, consequently saving the searching cost of the buyers.

A Encryption Technique of JPEG2000 Image Using 3-Dimensional Chaotic Cat Map (3차원 카오스 캣맵을 이용한 JPEG2000 영상의 암호화 기술)

  • Choi, Hyun-Jun;Kim, Soo-Min;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • 제42권5호
    • /
    • pp.173-180
    • /
    • 2005
  • In this paper, we proposed the image hiding method which decreases calculation amount by encrypt partial data using discrete wavelet transform(DWT) and linear scale quantization which were adopted as the main technique for frequency transform in JPEG2000 standard. Also we used the chaotic system and cat map which has smaller calculation amount than other encryption algorithms and then dramatically decreased calculation amount. This method operates encryption process between quantization and entropy coding for preserving compression ratio of images and uses the subband selection method. Also, suggested encryption method to JPEG2000 progressive transmission. The experiments have been performed with the Proposed methods implemented in software for about 500 images. Consequently, we are sure that the proposed is efficient image encryption methods to acquire the high encryption effect with small amount of encryption. It has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas.