• Title/Summary/Keyword: 정보 퍼지 네트워크

Search Result 169, Processing Time 0.03 seconds

Anomaly Detection Mechanism based on the Session Patterns and Fuzzy Cognitive Maps (퍼지인식도와 세션패턴 기반의 비정상 탐지 메커니즘)

  • Ryu Dae-Hee;Lee Se-Yul;Kim Hyeock-Jin;Song Young-Deog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.9-16
    • /
    • 2005
  • Recently, since the number of internet users is increasing rapidly and, by using the Public hacking tools, general network users can intrude computer systems easily, the hacking problem is setting more serious. In order to prevent the intrusion. it is needed to detect the sign in advance of intrusion in a Positive Prevention by detecting the various forms of hackers intrusion trials to know the vulnerability of systems. The existing network-based anomaly detection algorithms that cope with port-scanning and the network vulnerability scans have some weakness in intrusion detection. they can not detect slow scans and coordinated scans. therefore, the new concept of algorithm is needed to detect effectively the various. In this Paper, we propose a detection algorithm for session patterns and FCM.

  • PDF

Role of Project Owner in OSS Project: Based on Impression Formation and Social Capital Theory (오픈소스 소프트웨어 운영자 역할이 성과에 미치는 영향: 인상형성과 사회적 자본 이론을 중심으로)

  • Lee, Saerom;Baek, Hyunmi;Jahng, Jungjoo
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.2
    • /
    • pp.23-46
    • /
    • 2016
  • With the increasing socio-economic value of an open collaboration over the Internet, it has become significantly important to successfully manage open source software development program. Most of the previous research have focused on various factors that influence the performance of the project, but studies on how the project owners recognized as "leader" affect the outcome of the project are very limited. This research investigates how individual and governance characteristics of an owner influences the performance of project based on impression formation and social capital theory. For a data set, we collect 611 Repositories and the owner's data from the open source development platform Github, and we form knowledge sharing network of an each repository by using social network analysis. We use hierarchical regression analysis, and our results show that a leader, who exposes a lot of one's personal information or who has actively followed and showed interests to communicate with other developers, affects positive impacts on project performance. A leader who has a high centrality in knowledge sharing network also positively affects on project performance. On the other hand, if a leader was highly willing to accept external knowledge or is recognized as an expert in the community with large numbers of followers, the result show negative impacts on project performance. The research may serve as a useful guideline not only for the future open source software projects but also for the effective management of different types of open collaboration.

A Study of Factors for Evaluating Smartphone Selection and Use using Fuzzy AHP (Fuzzy AHP를 활용한 스마트폰 선택 및 이용 평가요인에 관한 연구)

  • Hwang, Hyun-Seok;Lee, Sang-Hoon;Kim, Su-Yeon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.4
    • /
    • pp.107-117
    • /
    • 2011
  • Smartphones are widely used as a mobile communication devices with more advanced computing ability and connectivity than a contemporary feature phone. As the market expands, many brand-new smartphones are released and chosen by (potential) smartphone users. In spite of smartphone's popularity, little research of the factors affecting the evaluation of smartphones and their influences on smartphone choice have been performed. Therefore, we aim to analyze evaluation factors of smartphone selection and use in this research. We use Fuzzy Analytic Hierarchy Process method, a Multi-Criteria Decision Making (MCDM) model, to find the relative importance among the factors considering the fuzziness of pair-wise comparison using AHP. After reviewing related works and interviewing the focus group, we extract the five independent factors influencing the choice and use of a smartphone. Pair-wise comparison and triangle fuzzy numbers are used to calculate the relative importance of factors. We analyze not only the whole interviewees' responses, but the differences between smartphone users and non-users. Practical implications are delivered in concluding remarks.

A Study on Fuzzy Searching Algorithm and Conditional-GAN for Crime Prediction System (범죄예측시스템에 대한 퍼지 탐색 알고리즘과 GAN 상태에 관한 연구)

  • Afonso, Carmelita;Yun, Han-Kyung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.149-160
    • /
    • 2021
  • In this study, artificial intelligence-based algorithms were proposed, which included a fuzzy search for matching suspects between current and historical crimes in order to obtain related cases in criminal history, as well as conditional generative adversarial networks for crime prediction system (CPS) using Timor-Leste as a case study. By comparing the data from the criminal records, the built algorithms transform witness descriptions in the form of sketches into realistic face images. The proposed algorithms and CPS's findings confirmed that they are useful for rapidly reducing both the time and successful duties of police officers in dealing with crimes. Since it is difficult to maintain social safety nets with inadequate human resources and budgets, the proposed implemented system would significantly assist in improving the criminal investigation process in Timor-Leste.

A Fuzzy-based Inference Model for Web of Trust Using User Behavior Information in Social Network (사회네트워크에서 사용자 행위정보를 활용한 퍼지 기반의 신뢰관계망 추론 모형)

  • Song, Hee-Seok
    • Journal of Information Technology Applications and Management
    • /
    • v.17 no.4
    • /
    • pp.39-56
    • /
    • 2010
  • We are sometimes interacting with people who we know nothing and facing with the difficult task of making decisions involving risk in social network. To reduce risk, the topic of building Web of trust is receiving considerable attention in social network. The easiest approach to build Web of trust will be to ask users to represent level of trust explicitly toward another users. However, there exists sparsity issue in Web of trust which is represented explicitly by users as well as it is difficult to urge users to express their level of trustworthiness. We propose a fuzzy-based inference model for Web of trust using user behavior information in social network. According to the experiment result which is applied in Epinions.com, the proposed model show improved connectivity in resulting Web of trust as well as reduced prediction error of trustworthiness compared to existing computational model.

  • PDF

A New Design of Fuzzy Neural Networks Using Data Information (데이터 정보를 이용한 퍼지 뉴럴 네트워크의 새로운 설계)

  • Park, Keon-Jun;Oh, Sung-Kwun;Kim, Hyun-Ki
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.273-275
    • /
    • 2006
  • In this paper, we introduce a new design of fuzzy neural networks using input-output data information of target system. The proposed fuzzy neural networks is constructed by input-output data information and used the center of data distance by HCM clustering to obtain the characteristics of data. A membership function is defined by HCM clustering and is applied input-output dat included each rule to conclusion polynomial functions. We use triangular membership functions and simplified fuzzy inference, linear fuzzy inference, and modified quadratic fuzzy inference in conclusion. In the networks learning, back propagation algorithm of network is used to update the parameters of the network. The proposed model is evaluated with benchmark data.

  • PDF

Data Streams classification using Local Concept-adapted IOLIN System (지역적 컨셉트 적응형 IOLIN시스템을 사용한 데이터 스트림의 분류)

  • Kim, Jae-Woo;Song, Jae-Won;Lee, Ju-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.37-44
    • /
    • 2008
  • Data stream has the tendency to change in Patterns over time. Also known as concept drift, such problem can reduce the predictive performance of a classification model CVFDT and IOLIN tried to solve the problem of a concept drift through incremental classification model updates. The local changes in patterns. however was revealed to be unable to resolve the problems of local concept drift that occurs by influencing on total classification results. In this paper, we propose adapted IOLIN system that improves system's predictive performance by detecting the local concept drift. The experimental result shows that adaptive IOLIN, the Proposed method, is about 2.8% in accuracy better than IOLIN and about 11.2% in accuracy better than CVFDT.

  • PDF

AFLRS: An AODV-based Fast Local Repair Scheme in Ad Hoc Networks (AFLRS: 애드 혹 네트워크에서 AODV에 기반한 빠른 경로 복구 기법)

  • 서현곤;김기형;서재홍
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.1
    • /
    • pp.81-90
    • /
    • 2004
  • A Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes dynamically self-organizing in arbitrary and temporary network topologies without the use of any existing network infrastructure. The AODV (Ad Hoc On-Demand Distance Vector) Protocol is one of the typical reactive routing protocols, in that mobile nodes initiate routing activities only in the presence of data packets in need of a route. In this paper, we focus upon the local repair mechanism of AODV. When a link is broken, the upstream node of the broken link repairs the route to the destination by initiating a local route discovery process. The process involves the flooding of AODV control messages in every node within a radius of the length from the initiating node to the destination. In this paper, we propose an efficient local repair scheme for AODV called AFLRS (AODV-based Fast Local Repair Scheme). AFLRS utilizes the existing routing information in the intermediate nodes which have been on the active route to the destination before a link break occurs. AFLRS can reduce the flooding range of AODV control messages and the route recovery time because it can repair route through the intermediate nodes. For the performance evaluation of the proposed AFLRS, we have simulated the local repair mechanisms by using NS2 and AODV-UU. The performance results show that AFLRS can achieve faster route recovery than the local repair mechanism of AODV.

Fake News Detection on YouTube Using Related Video Information (관련 동영상 정보를 활용한 YouTube 가짜뉴스 탐지 기법)

  • Junho Kim;Yongjun Shin;Hyunchul Ahn
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.3
    • /
    • pp.19-36
    • /
    • 2023
  • As advances in information and communication technology have made it easier for anyone to produce and disseminate information, a new problem has emerged: fake news, which is false information intentionally shared to mislead people. Initially spread mainly through text, fake news has gradually evolved and is now distributed in multimedia formats. Since its founding in 2005, YouTube has become the world's leading video platform and is used by most people worldwide. However, it has also become a primary source of fake news, causing social problems. Various researchers have been working on detecting fake news on YouTube. There are content-based and background information-based approaches to fake news detection. Still, content-based approaches are dominant when looking at conventional fake news research and YouTube fake news detection research. This study proposes a fake news detection method based on background information rather than content-based fake news detection. In detail, we suggest detecting fake news by utilizing related video information from YouTube. Specifically, the method detects fake news through CNN, a deep learning network, from the vectorized information obtained from related videos and the original video using Doc2vec, an embedding technique. The empirical analysis shows that the proposed method has better prediction performance than the existing content-based approach to detecting fake news on YouTube. The proposed method in this study contributes to making our society safer and more reliable by preventing the spread of fake news on YouTube, which is highly contagious.

Control Method for the Number of Travel Hops for the ACK Packets in Selective Forwarding Detection Scheme (선택적 전달 공격 탐지기법에서의 인증 메시지 전달 홉 수 제어기법)

  • Lee, Sang-Jin;Kim, Jong-Hyun;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.73-80
    • /
    • 2010
  • A wireless sensor network which is deployed in hostile environment can be easily compromised by attackers. The selective forwarding attack can jam the packet or drop a sensitive packet such as the movement of the enemy on data flow path through the compromised node. Xiao, Yu and Gao proposed the checkpoint-based multi-hop acknowledgement scheme(CHEMAS). In CHEMAS, each path node enable to be the checkpoint node according to the pre-defined probability and then can detect the area where the selective forwarding attacks is generated through the checkpoint nodes. In this scheme, the number of hops is very important because this parameter may trade off between energy conservation and detection capacity. In this paper, we used the fuzzy rule system to determine adaptive threshold value which is the number of hops for the ACK packets. In every period, the base station determines threshold value while using fuzzy logic. The energy level, the number of compromised node, and the distance to each node from base station are used to determine threshold value in fuzzy logic.