• Title/Summary/Keyword: 판별모델

Search Result 624, Processing Time 0.031 seconds

A Method for Calculating Exposure Risks of Privacy Information based on Website Structures (웹사이트의 구조를 고려한 개인정보 노출 위험도 계산 기법)

  • Lee, Sue Kyoung;Son, Jin Sik;Kim, Kwanho
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.1
    • /
    • pp.1-14
    • /
    • 2016
  • This research proposes a method that aims to evaluate the risk levels of websites based on exposure risks of privacy information. The proposed method considers two aspects as follows. First, we define the risk levels of each privacy information according to its own inherent risk. Second, we calculate the visiting probability of a webpage to measure the expected of the actual exposure of privacy information on that webpage. In this research, we implemented an system to prove that automatically collects websites and calculates their risk levels. For the experiments, we used a real world dataset consisting of a total of websites for 4 categories such as university, bank, central government agency, and education. The experiment results show that the websites in the bank category are relatively well managed, while the others are needed to cope with the exposure of privacy information. Finally, the proposed method in this research is expected to be further utilized in establishing a priority-based approach to alleviate of the privacy information exposure problems.

u-Healthcare Service Authentication Protocol based on RFID Technology (RFID 기술을 이용한 u-헬스케어 서비스 인증 프로토콜)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.153-159
    • /
    • 2012
  • Now a days, U-healthcare comes into the spotlight as a new business model which combines RFID technology with medical service in the well-being era and IT popularization. U-healthcare service needs a method that can deals with hand-writing, overlap data, forgery and falsification of data, difference between information version that happen in medical process because of graft between RFID technology and u-healthcare. This paper proposes RFID based user certification protocol to protect user's privacy who gets medical service through U-healthcare. In the protocol, secret information of patient does the XOR with the secret key that is created in the hospital to reconsider the stability of security system of U-healthcare and user's data forgery and falsification and privacy and then saves it in the secret key field of patient in DB table. Also, it informs the case of illegal access to certification server and make it approved the access of u-healthcare service by differentiating whether u-healthcare is illegal or not.

The use of Local API(Anomaly Process Instances) Detection for Analyzing Container Terminal Event (로컬 API(Anomaly Process Instances) 탐지법을 이용한 컨테이너 터미널 이벤트 분석)

  • Jeon, Daeuk;Bae, Hyerim
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.41-59
    • /
    • 2015
  • Information systems has been developed and used in various business area, therefore there are abundance of history data (log data) stored, and subsequently, it is required to analyze those log data. Previous studies have been focusing on the discovering of relationship between events and no identification of anomaly instances. Previously, anomaly instances are treated as noise and simply ignored. However, this kind of anomaly instances can occur repeatedly. Hence, a new methodology to detect the anomaly instances is needed. In this paper, we propose a methodology of LAPID (Local Anomaly Process Instance Detection) for discriminating an anomalous process instance from the log data. We specified a distance metric from the activity relation matrix of each instance, and use it to detect API (Anomaly Process Instance). For verifying the suggested methodology, we discovered characteristics of exceptional situations from log data. To demonstrate our proposed methodology, we performed our experiment on real data from a domestic port terminal.

Predicting Interesting Web Pages by SVM and Logit-regression (SVM과 로짓회귀분석을 이용한 흥미있는 웹페이지 예측)

  • Jeon, Dohong;Kim, Hyoungrae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.3
    • /
    • pp.47-56
    • /
    • 2015
  • Automated detection of interesting web pages could be used in many different application domains. Determining a user's interesting web pages can be performed implicitly by observing the user's behavior. The task of distinguishing interesting web pages belongs to a classification problem, and we choose white box learning methods (fixed effect logit regression and support vector machine) to test empirically. The result indicated that (1) fixed effect logit regression, fixed effect SVMs with both polynomial and radial basis kernels showed higher performance than the linear kernel model, (2) a personalization is a critical issue for improving the performance of a model, (3) when asking a user explicit grading of web pages, the scale could be as simple as yes/no answer, (4) every second the duration in a web page increases, the ratio of the probability to be interesting increased 1.004 times, but the number of scrollbar clicks (p=0.56) and the number of mouse clicks (p=0.36) did not have statistically significant relations with the interest.

Shared Value Expectation on Lifelong Education (평생교육에 대한 공유기대가치 연구)

  • Kim, Chul-Ho
    • Journal of Digital Convergence
    • /
    • v.13 no.12
    • /
    • pp.325-336
    • /
    • 2015
  • The purpose of this study is to confirm the components of users' shared value expectation(SVE) on lifelong education through convergent approaches. After reviewing primary data and collecting secondary data with quantitative and qualitative research methodologies, the components of users' SVE on lifelong education were categorized into 10 perspectives, 27 measured variables, and 81 questions. After conducting a confirmatory factor analysis, the latent measurement model was confirmed as reasonable. Internal reliability, construct convergent discriminant validity were also confirmed as reasonable. In a viewpoint that builds interdisciplinary theory, this research may help grasp users' SVE on lifelong education with interdisciplinary approaches. In a strategic viewpoint, this study may contribute to both understanding categorized users' value expectation and planning/executing suitable programs that can meet the expectations. In a managerial viewpoint, this result may help measure the effectiveness of SVE on lifelong education quantitatively.

Meta-server Model for Middleware Supporting for Context Awareness (상황인식을 지원하는 미들웨어를 위한 메타서버 모델)

  • Lee, Seo-Jeong;Hwang, Byung-Yeon;Yoon, Yong-Ik
    • Journal of Korea Spatial Information System Society
    • /
    • v.6 no.2 s.12
    • /
    • pp.39-49
    • /
    • 2004
  • An increasing number of distributed applications will be achieved with mobile technology. These applications face temporary loss of network connectivity when they move. They need to discover other hosts in an ad-hoc manner, and they are likely to have scarce resources including CPU speed, memory and battery power. Software engineers building mobile applications need to use a suitable middleware that resolves these problems and offers appropriate support for developing mobile applications. In this paper, we describe the meta-server building for middleware that addresses reflective context awareness and present usability with demonstration. Metadata is consist of user configuration, device configuration, user context, device context and dynamic image metadata. When middleware send a saving or retrieval request to meta-server, it returns messages to middleware after the verification of the request. This meta-server has the application for multimedia stream services with context awareness.

  • PDF

Histogram Based Hand Recognition System for Augmented Reality (증강현실을 위한 히스토그램 기반의 손 인식 시스템)

  • Ko, Min-Su;Yoo, Ji-Sang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.7
    • /
    • pp.1564-1572
    • /
    • 2011
  • In this paper, we propose a new histogram based hand recognition algorithm for augmented reality. Hand recognition system makes it possible a useful interaction between an user and computer. However, there is difficulty in vision-based hand gesture recognition with viewing angle dependency due to the complexity of human hand shape. A new hand recognition system proposed in this paper is based on the features from hand geometry. The proposed recognition system consists of two steps. In the first step, hand region is extracted from the image captured by a camera and then hand gestures are recognized in the second step. At first, we extract hand region by deleting background and using skin color information. Then we recognize hand shape by determining hand feature point using histogram of the obtained hand region. Finally, we design a augmented reality system by controlling a 3D object with the recognized hand gesture. Experimental results show that the proposed algorithm gives more than 91% accuracy for the hand recognition with less computational power.

Unusual Behavior Detection of Korean Cows using Motion Vector and SVDD in Video Surveillance System (움직임 벡터와 SVDD를 이용한 영상 감시 시스템에서 한우의 특이 행동 탐지)

  • Oh, Seunggeun;Park, Daihee;Chang, Honghee;Chung, Yongwha
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.11
    • /
    • pp.795-800
    • /
    • 2013
  • Early detection of oestrus in Korean cows is one of the important issues in maximizing the economic benefit. Although various methods have been proposed, we still need to improve the performance of the oestrus detection system. In this paper, we propose a video surveillance system which can detect unusual behavior of multiple cows including the mounting activity. The unusual behavior detection is to detect the dangerous or abnormal situations of cows in video coming in real time from a surveillance camera promptly and correctly. The prototype system for unusual behavior detection gets an input video from a fixed location camera, and uses the motion vector to represent the motion information of cows in video, and finally selects a SVDD (one of the most well-known types of one-class SVM) as a detector by reinterpreting the unusual behavior into an one class decision problem from the practical points of view. The experimental results with the videos obtained from a farm located in Jinju illustrate the efficiency of the proposed method.

Impact of IT Service Quality on Knowledge Sharing through Relationship Quality (IT서비스품질과 관계품질이 지식공유 활동에 미치는 영향)

  • Park, Jun-Gi;Yoon, Jung-In;Lee, Jung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.355-365
    • /
    • 2010
  • IT service is becoming a critical business operation in the age of information revolution. In providing IT services internally to other functions of the corporation and externally to other organizations, sharing of knowledge between business people and system people is known to become more and more critical for successful IT services. Purpose of this research is to examine the impact of IT service quality on knowledge sharing activities between IT service providers and users. Theoretical research model, through an extant literature review, is proposed here, consisting of IT service quality, relationship quality(satisfaction, trust and commitment), and the level of knowledge sharing activities. Survey results of 183 users indicates that IT service quality significantly influences commitment through satisfaction and trust, which in turn influences the level of knowledge sharing activities. Also, interestingly, satisfaction and trust do not directly influences the level of knowledge sharing,but indirectly, through commitment.

Comparison of GPU-Based Numerous Particles Simulation and Experiment (GPU 기반 대량입자 거동 시뮬레이션과 실험비교)

  • Park, Sang Wook;Jun, Chul Woong;Sohn, Jeong Hyun;Lee, Jae Wook
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.38 no.7
    • /
    • pp.751-756
    • /
    • 2014
  • The dynamic behavior of numerous grains interacting with each other can be easily observed. In this study, this dynamic behavior was analyzed based on the contact between numerous grains. The discrete element method was used for analyzing the dynamic behavior of each particle and the neighboring-cell algorithm was employed for detecting their contact. The Hertzian and tangential sliding friction contact models were used for calculating the contact force acting between the particles. A GPU-based parallel program was developed for conducting the computer simulation and calculating the numerous contacts. The dam break experiment was performed to verify the simulation results. The reliability of the program was verified by comparing the results of the simulation with those of the experiment.