• 제목/요약/키워드: 정보관리 아키텍처

Search Result 419, Processing Time 0.028 seconds

The study of blood glucose level prediction using photoplethysmography and machine learning (PPG와 기계학습을 활용한 혈당수치 예측 연구)

  • Cheol-Gu, Park;Sang-Ki, Choi
    • Journal of Digital Policy
    • /
    • v.1 no.2
    • /
    • pp.61-69
    • /
    • 2022
  • The paper is a study to develop and verify a blood glucose level prediction model based on biosignals obtained from photoplethysmography (PPG) sensors, ICT technology and data. Blood glucose prediction used the MLP architecture of machine learning. The input layer of the machine learning model consists of 10 input nodes and 5 hidden layers: heart rate, heart rate variability, age, gender, VLF, LF, HF, SDNN, RMSSD, and PNN50. The results of the predictive model are MSE=0.0724, MAE=1.1022 and RMSE=1.0285, and the coefficient of determination (R2) is 0.9985. A blood glucose prediction model using bio-signal data collected from digital devices and machine learning was established and verified. If research to standardize and increase accuracy of machine learning datasets for various digital devices continues, it could be an alternative method for individual blood glucose management.

A Method to Manage Requirements Analyzing the Commonality and Variability in Product Line (프로덕트 라인에서 공통성과 가변성 분석을 통한 요구사항 관리방법)

  • Park, Dong-Su;Kim, Dong-Kyu;Chong, Ki-Won
    • The KIPS Transactions:PartD
    • /
    • v.13D no.7 s.110
    • /
    • pp.909-922
    • /
    • 2006
  • The core assets include all properties which consist of an application in Product Line Engineering. The requirement, one of the core assets, is a basis of other core assets and commonality and variability of other core assets are classified by the requirement. accordingly, commonality and variability of the domain requirement should be managed objectively and it is necessary to make a process to reuse the domain requirements. However the requirement is analyzed by domain experts or developers without proper process. In this paper, we proposed the 4 activities: (1)the domain scoping, (2)the extraction and generalization of the domain requirement, (3)the domain requirement analyzing and modeling, (4)the change management, and sub activities. For all reasons given previously, it is possible to reduce the development time and cost by reusing the architectures and components related to the domain requirement. In addition, it is possible to increase the quality of the artifacts produced based on the requirements by managing them systematically.

An Efficient Hierarchical Authentication Scheme through Brokers in Mobile IPv6 Networks (브로커를 통한 모바일 IPv6 네트워크의 효율적인 계층적 인증기법)

  • Jung, Ha-Gwon;Jeong, Jong-Pil
    • Journal of Internet Computing and Services
    • /
    • v.12 no.4
    • /
    • pp.15-26
    • /
    • 2011
  • As quick and secure mobility service is becoming a critical issue in the ubiquitous environment. Internet Engineering Task Force (IETF) has done a lot of meaningful work in order to cope with the critical issues, which is a key technology of guaranteeing the legally and safely using of network resources, they has proposed Hierarchical Mobile IPv6 (HMIPv6) to complement for such problems as handover latency and signaling overhead in existing MIPv6. Most of the current research about HMIPv6 focuses on how to optimize the interactive processes between the HMIPv6 and AAA (Authentication, Authorization, Accounting) protocol. This paper describes a cost-effective hierarchical authentication scheme, which makes its focus on minimizing the authentication latency in AAA processing. In this scheme, a hierarchical AAA architecture is proposed, in which the AAA servers are deployed on the Mobility Anchor Point (MAP), the Root AAA server manages several Leaf AAA servers and the Brokers on behalf of the AAA server in home domain. The simulation results shows that the proposed scheme reduces the handoff and authentication latency evidently compared to the previous traditional authentication combination modeling.

A Software Development Process of Core Instrumentation System Based on the Rational Unified Process (RUP 기반 CIS 소프트웨어 개발 프로세스)

  • Lee Kil Sup;Lee Tae Gong
    • Journal of Internet Computing and Services
    • /
    • v.5 no.4
    • /
    • pp.95-113
    • /
    • 2004
  • RUP(Rational Unified Process) is a development process which is based on object-oriented, use case centric, architecture centric, and iterative approach. Public projects performed previously adopt waterfall lifecycle model for development of large scale software. However, recently various projects adopt an iterative approach to minimize risks of a project and to enhance quality of software. But few research result on practices of RUP as the subprocess of system development process is available. This paper presents a system development process which uses RUP as the subprocess for a subset of the system. Thus we introduce a tailored RUP for K-CIS(Korean Core Instrumentation System). Moreover, we assess the application result of K-CIS with typical waterfall lifecycle model and RUP. We believe that the results of our work are useful for tailoring a system development process with RUP, reducing risks of development, and enhancing the quality of a final product.

  • PDF

CR-SeMMS: Cost-Reduced Secure Mobility Management Scheme Based on SIP in NEMO Environments (CR-SeMMS : NEMO환경에서 SIP에 기반한 비용절감의 안전한 이동성관리 기법)

  • Cho, Chul-Hee;Jong, Jong-Pil
    • Journal of Internet Computing and Services
    • /
    • v.13 no.3
    • /
    • pp.31-47
    • /
    • 2012
  • The mobile Virtual Private Network (MVPN) of Internet Engineering Task Force (IETF) is not designed to support NEwork MObility (NEMO) and is not suitable for real-time applications. Therefore, an architecture and protocol which supports VPN in NEMO are needed. In this paper, we proposed the cost-reduced secure mobility management scheme (CR-SeMMS) which is designed for real-time applications in conjunction with VPN and also which is based on the session initiation protocol (SIP). Our scheme is to support MVPN in NEMO, so that the session is well maintained while the entire network is moved. Further, in order to reduce the authentication delay time which considers as a delaying factor in hands-off operations, the signaling time which occurs to maintain the session is shortened through proposing the hands-off scheme adopting an authentication method based on HMAC based One Time Password (HOTP). Finally, our simulation results show the improvement of the average hands-off performance time between our proposed scheme and the existing schemes.

A Study on Open Based Network Security System Architecture (개방형 네트워크 보안 시스템 아키텍처에 관한 연구)

  • Kim, Chang-Su;Kim, Tak-Chen;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.782-785
    • /
    • 2007
  • If existing system need to expand security part, the security was established after paying much cost, processing of complicated installation and being patient with inconvenience at user's view because of closed structure. In this thesis, those defects could be overcome by using open security tools and constructing security server, which is firewall of 'bastion' form including proxy server, certification server and so on. Also each security object host comes to decide acceptance or denial where each packet comes from, then determines security level each hosts. Precisely it is possible choosing the packets from bastion host or following at the other policies. Although an intruder enter into inside directly, it is constructed safely because encryption algorithm is applied at communication with security object host. This thesis suggests more flexible, independent and open security system, which improves existing security through systematic linkage between system security and network security.

  • PDF

A study of Analysis Method of Human Factors for Operation Improvement (운용성 향상을 위한 인적 요소 분석 방법에 관한 연구)

  • Chung, SungHak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.7
    • /
    • pp.57-67
    • /
    • 2013
  • This study suggests for effective operation of systematic analysis method for human factors which is based on the requirement architecture framework a requirement process to manage requirements for improvement is discussed, such as in requirements generation, database construction, management of experimental design, and management of the design traceability. For the objectives, we analyzed the method construct of the starting point views of user requirement which is adopted the requirement architecture concept to cover the whole activities required to do and the human factors guidelines and standards are suggested for verification and validation of the develop requirements. It is getting more attention as the operation of the enabling systems goes up these days. Throughout the propose of this study, human factors requirement database design presented in operational environment system for enabling system which is based on case study using a computer aided se tool. This study will be contributed to how the operational requirement database for the enabling system and operational human factors can be constructed in an integrated system design fashion.

Processing of Sensor Data Stream for OSGi Frameworks (OSGi를 위한 실시간 센서 데이터스트림 처리 방법)

  • Cha, Ji-Yun;Byun, Yung-Cheol;Lee, Dong-Cheal
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.5
    • /
    • pp.1014-1021
    • /
    • 2009
  • In an environment of home network where a number of technologies including heterogeneous hardware platforms, networking and protocols, middleware systems, and etc, exist, OSGi provides a platform for deployment and sharing of services managed in hardware and guarantees compatibility among applications. However, only simple control and processing of event data are considered in a home network using OSGi, and the consideration about real time processing of data stream generated by sensors is not enough. Therefore, researches allowing users to effectively develop OSGi applications by using various kinds of sensors generating data streams in the home network environment using OSGi are needed. In this paper, we propose an effective method of processing various types of real time data streams supplied to OSGi applications, including filtering, grouping, and counting, etc.

Digital License Prototype for Copyright Management of Software Source Code (소프트웨어 소스 코드의 저작권 관리를 위한 디지털 라이센스 프로토타입)

  • Cha, Byung-Rae;Jeong, Jong-Geun;Oh, Soo-Lyul
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.95-108
    • /
    • 2006
  • The digital contents expand into software source code and maintenance of technology and IPR about source code have a very important meaning to international competition, The recognition about software security is very low specially among these Intellectual Property Rights. On occurring disputation property, we have to prove the fact, there is a problem to discriminate the original source code, Also, it is hard to accurate decision that is correct to complexity and the lack of read and understand ability even if software is reproduced. In this paper, we don't enforce distinction about software reproduction by one individual code unit. And we developed digital license prototype of XML that can distinguish reproduction based on structural conformability of whole source codes. Software has Context Free Grammar in structure and presents BNF notation type, it is apt to present hierarchical structure. Then, we can express architecture of software source code by hierarchical structure to discriminate structural conformability. In this paper, we make a study of the digital licence prototype for discriminate the original source code. Reserved words of software source code by parsing express to XML file that have hierarchical structure. Then, we can express architecture of software source code by tree structure form instead of complex source code.

  • PDF

Development of u-Farm Information Architecture and Information Management Technology based on RFID/USN for the Agricultural Sector (RFID/USN 기반 농업분야 u-IT 적용을 위한 u-Farm 정보 아키텍처 및 정보 관리기술 개발)

  • Ryu, Seungwan;Park, Sei-Kwon;Oh, Dongok;Kang, Young-Jun;Park, You-Jin;Shin, Dong-Cheon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.1
    • /
    • pp.170-181
    • /
    • 2015
  • Generally, because individual agricultural product possesses its own distinctive characteristics and shows different characteristics at each stage of the agricultural supply chain, it is necessary to develop a proper enterprise architecture for managing information system. In this paper, we propose an enterprise architecture based on RFID/USN technology that can be used as a reference enterprise architecture for u-IT application in the agriculture sectors, which is called the u-Farm enterprise architecture with taking heterogeneous characteristics of agricultural products into account for. In addition, we also developed the RFID/USN middleware platform as a core infrastructure technology. Fo evaluation of the performance of the proposed u-Farm architecture and the RFID/USN middleware platform, the field-trial evaluation at the apple Agricultural Processing Center (APC) has been executed and the results shows that the proposed architecture and platform perform well in terms of information integration over the whole SCM process from the farming stage to delivering statge to the customers. It is expected that the proposed u-Farm enterprise architecture can be utilized as a standard information architecture, and the RFID/USN middleware platform can be a infrastructure platform for future u-IT based information technology applications and services in the agricultural environment.