• Title/Summary/Keyword: 웹서비스시스템

Search Result 2,563, Processing Time 0.026 seconds

The Study on Improvement of Cohesion of Clustering in Incremental Concept Learning (점진적 개념학습의 클러스터 응집도 개선)

  • Baek, Hey-Jung;Park, Young-Tack
    • The KIPS Transactions:PartB
    • /
    • v.10B no.3
    • /
    • pp.297-304
    • /
    • 2003
  • Nowdays, with the explosive growth of the web information, web users Increase requests of systems which collect and analyze web pages that are relevant. The systems which were develop to solve the request were used clustering methods to improve the duality of information. Clustering is defining inter relationship of unordered data and grouping data systematically. The systems using clustering provide the grouped information to the users. So, they understand the information efficiently. We proposed a hybrid clustering method to cluster a large quantity of data efficiently. By that method, We generate initial clusters using COBWEB Algorithm and refine them using Ezioni Algorithm. This paper adds two ideas in prior hybrid clustering method to increment accuracy and efficiency of clusters. Firstly, we propose the clustering method considering weight of attributes of data. Second, we redefine evaluation functions which generate initial clusters to increase efficiency in clustering. Clustering method proposed in this paper processes a large quantity of data and diminish of dependancy on sequence of input of data. So the clusters are useful to make user profiles in high quality. Ultimately, we will show that the proposed clustering method outperforms the pervious clustering method in the aspect of precision and execution speed.

Digital Signature Mechanism by Mobile Agent Security Model of Distributed Web Environment (분산 웹 환경에서 이동 에이전트 보안 모델에 의한 전자서명 메카니즘)

  • Choi, Kil-Hwan;Shin, Min-Hwa;Bae, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.787-792
    • /
    • 2003
  • Telecommunication network are becomming bigger and more complex. Its difficult to manage efficiently the networks, because these networks usually have heterogeneous and inompatoble compinents. Nevertheless, current approaches to network management have focused on centralized managementstrategies based on client-server architecture. These approaches have resulted in much weakness in the real-time management, the service extensibility, and the network scalability. In thispaper, we applied the mobile agent technology to solve the above problems. Jave is a promising technology for developing mobile agent system. But, there are several problems like the service extensibility in using the Java. To solve these problems, a new approach using digital signature is suggested to authenticate mobile agent in network management environments. This approach can solve the conflict between security of the system and extensibility of the mobile code. Moreover, the system suggested in this paper show the decentralized and flexible network management solutions.

Design of Tree Management System using Mote in WSN (WSN에서 Mote를 이용한 수목 관리 시스템 설계)

  • Heo Min;Mo Soo-Jong;Kim Chang-Su;Lee Tae-Oh;Yim Jae-Hong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2005.10a
    • /
    • pp.217-220
    • /
    • 2005
  • Internal cities such as gray level been enclosed to building forest are paying a lot of efforts and expenses to change to green city toot park and street tree get put together. By the example, 'GREEN CITY of PUSAN 21' progress to decorate army facilities like the park, and to plant street trees in several places of city plan in Pusan. And urban environment that big citys of advanced nation are agreeable is making in the large park and road street trees at several places in downtown. Because price of tree for the park is very expensive, tree management system was all-important. In this paper, Motes deliver the sensor information in each tree through radio sensor network by server side. This information can use in state grasping of tree, harmful insects courtesy call etc and this system design was suggested to inform to mode of life administration scholars.

  • PDF

MHP-based SCORM Contents Trans-Coding System for DiTV Service (DiTV 서비스를 위한 MHP 기반의 SCORM 콘텐츠 트랜스코딩 시스템)

  • Im, Seung-Hyun;Lee, Si-Hwa;Hwang, Dae-Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.5
    • /
    • pp.642-651
    • /
    • 2007
  • Recently, digital convergence, whose core demand is OSMU (One Sourse Multi Use),has been the main topic in e-learning domain and industry. However, the existing web learning content and the new resource developed toprovide contents to different learning environment must be processed to adapt the new learning settings, which causes the cost and time problem, So in this paper we design and implement a Java based SCORM content transcoding system which can transcode the SCORM-based learning content into MHP-based DiTV content in order to adapt t-learning environment using DiTV, which is closer to our real life. Using this system which has ability of inter-operation, reuse, highly-use, the problem mentioned above can be solved well. Moreover, it is possible for a learner who is not familiar with computer to study using DiTV instead of PC.

  • PDF

Improvement Mechanism of Security Monitoring and Control Model Using Multiple Search Engines (다중 검색엔진을 활용한 보안관제 모델 개선방안)

  • Lee, Je-Kook;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.284-291
    • /
    • 2021
  • As the current security monitoring system is operated as a passive system only for response after an attacker's attack, it is common to respond to intrusion incidents after an attack occurs. In particular, when new assets are added and actual services are performed, there is a limit to vulnerability testing and pre-defense from the point of view of an actual hacker. In this paper, a new security monitoring model has been proposed that uses multiple hacking-related search engines to add proactive vulnerability response functions of protected assets. In other words, using multiple search engines with general purpose or special purpose, special vulnerabilities of the assets to be protected are checked in advance, and the vulnerabilities of the assets that have appeared as a result of the check are removed in advance. In addition, the function of pre-checking the objective attack vulnerabilities of the protected assets recognized from the point of view of the actual hacker, and the function of discovering and removing a wide range of system-related vulnerabilities located in the IP band in advance were additionally presented.

A Study of 3D Modeling of Compressed Urban LiDAR Data Using VRML (VRML을 이용한 도심지역 LiDAR 압축자료의 3차원 표현)

  • Jang, Young-Woon;Choi, Yun-Woong;Cho, Gi-Sung
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.19 no.2
    • /
    • pp.3-8
    • /
    • 2011
  • Recently, the demand for enterprise for service map providing and portal site services of a 3D virtual city model for public users has been expanding. Also, accuracy of the data, transfer rate and the update for the update for the lapse of time emerge are considered as more impertant factors, by providing 3D information with the web or mobile devices. With the latest technology, we have seen various 3D data through the web. With the VRML progressing actively, because it can provide a virtual display of the world and all aspects of interaction with web. It offers installation of simple plug-in without extra cost on the web. LiDAR system can obtain spatial data easily and accurately, as supprted by numerous researches and applications. However, in general, LiDAR data is obtained in the form of an irregular point cloud. So, in case of using data without converting, high processor is needed for presenting 2D forms from point data composed of 3D data and the data increase. This study expresses urban LiDAR data in 3D, 2D raster data that was applied by compressing algorithm that was used for solving the problems of large storage space and processing. For expressing 3D, algorithm that converts compressed LiDAR data into code Suited to VRML was made. Finally, urban area was expressed in 3D with expressing ground and feature separately.

Development of u-Health Care System for Dementia Patients (치매환자를 위한 u-Health Care 시스템 개발)

  • Shin, Dong-Min;Shin, Dong-Il;Shin, Dong-Kyoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.12
    • /
    • pp.1106-1113
    • /
    • 2013
  • For patients who have senile mental disorder such as dementia, quantity of excercise and amount of sunlight are important clue for dose and the treatment. Therefore, monitoring health information of daily life is necessary for patients' safety and healthy life. Portable & wearable sensor device and server configuration monitoring data are needed to provide these services for patients. Watch-type device(smart watch) which patients wear and server system are developed in this paper. Smart watch developed includes GPS, accelerometer and illumination sensor, and can obtain real time health information by measuring the position of patients, quantity of exercise and amount of sunlight. Server system includes the sensor data analysis algorithm and web server that doctor and protector can monitor through sensor data acquired from smart watch. The proposed data analysis algorithm acquires quantity of exercise information and detects step count in patients' motion acquired from acceleration sensor and to verify this, the three cases with fast pace, slow pace, and walking pace show 96% of the experimental result. If developed u-Healthcare System for dementia patients is applied, more high-quality medical service can be provided to patients.

A Design of Information Security Education training Databank System for Preventing Computer Security incident (침해사고 예방을 위한 정보보안 교육훈련 문제은행 시스템)

  • Mo, Eun-Su;Lee, Jae-Pil;Lee, Jae-Gwang;Lee, Jun-Hyeon;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.277-280
    • /
    • 2015
  • Smishing, Phishing personal privacy caused by Incident accidents such as Phishing information security has become a hot topic. Such incidents have privacy in personal information management occurs due to a lack of user awareness. This paper is based on the existing structure of the XML Tag question bank used a different Key-Value Structure-based JSON. JSON is an advantage that does not depend on the language in the text-based interchange format. The proposed system is divided into information security sector High, Middle and Low grade. and Provides service to the user through the free space and the smart device and the PC to the constraints of time. The use of open source Apache Load Balancing technology for reliable service. It also handles the user's web page without any training sessions Require server verification result of the training(training server). The result is sent to the training server using jQuery Ajax. and The resulting data are stored in the database based on the user ID. Also to be used as a training statistical indicators. In this paper, we design a level training system to enhance the user's information security awareness.

  • PDF

Construction of Citation Network of Authors Using URI (URI 기반 저자 인용 네트워크 구축 및 활용)

  • Koo, Hee-Kwan;Jung, Han-Min;Kang, In-Su;Lee, Seung-Woo;Sung, Won-Kyung
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.2
    • /
    • pp.150-159
    • /
    • 2007
  • For the construction of accurate scientific citation information, author disambiguation should be primarily resolved. This study proposes a method that utilizes URI(Uniform Resource Identifier) to create precise author citation networks. The adoption of URIs for representing authors and papers in this study enables us to maintain the integrity of constantly changing citation information and to guarantee the accessibility to the right literature. In experiments, we extracted 2,872 author-centric citation relation pairs from recent major IT-related proceedings written in Korean. From those, 135 citation network groups were discovered. The findings of this study are expected to be applied to a variety of researcher network services and scientific information portal services.

A Caching Mechanism for Knowledge Maps (지식 맵을 위한 캐슁 기법)

  • 정준원;민경섭;김형주
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.3
    • /
    • pp.282-291
    • /
    • 2004
  • There has been many researches in TopicMap and RDF which are approach to handle data efficiently with metadata. However, No researches has been performed to service and implement except for presentation and description. In this paper, We suggest the caching mechanism to support an efficient access of knowledgemap and practical knowledgemap service with implementation of TopicMap system. First, We propose a method to navigate Knowledgemap efficiently that includes advantage of former methods. Then, To transmit TopicMap efficiently, We suggest caching mechanism for knowledgemap. This method is that user will be able to navigate knowledgemap efficiently in the viewpoint of human, not application. Therefor the mechanism doesn't cash topics by logical or physical locality but clustering by information and characteristic value of TopicMap. Lastly, we suggest replace mechanism by using graph structure of TopicMap for efficiency of transmission.