• Title/Summary/Keyword: Agent Design

Search Result 1,262, Processing Time 0.026 seconds

The Design of a Multimedia Data Management and Monitoring System for using License Agent (라이센스 에이젼트를 이용한 멀티미디어 데이터관리 및 감시 시스템 설계)

  • Cho, Hyun-Seob;Ryu, In-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.1662-1664
    • /
    • 2007
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PKI security method, real time action monitoring for user, data security for itself.

  • PDF

IoT Data Processing Framework Design using Mobile Agent in Private Cloud Environment (Private Cloud 환경 내에서 모바일 에이전트를 이용한 IoT 데이터 처리 프레임워크 설계)

  • Choi, Kang-im;Choi, Young-keun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.329-330
    • /
    • 2016
  • In the Private Cloud Environment, the data are collected by a variety of IoT devices and Cloud service users be provided with a variety of data collected. To take advantage of this convenient data, we propose the IoT data Processing framework using mobile agent.

  • PDF

Hybrid Feature Selection Method Based on a Naïve Bayes Algorithm that Enhances the Learning Speed while Maintaining a Similar Error Rate in Cyber ISR

  • Shin, GyeongIl;Yooun, Hosang;Shin, DongIl;Shin, DongKyoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5685-5700
    • /
    • 2018
  • Cyber intelligence, surveillance, and reconnaissance (ISR) has become more important than traditional military ISR. An agent used in cyber ISR resides in an enemy's networks and continually collects valuable information. Thus, this agent should be able to determine what is, and is not, useful in a short amount of time. Moreover, the agent should maintain a classification rate that is high enough to select useful data from the enemy's network. Traditional feature selection algorithms cannot comply with these requirements. Consequently, in this paper, we propose an effective hybrid feature selection method derived from the filter and wrapper methods. We illustrate the design of the proposed model and the experimental results of the performance comparison between the proposed model and the existing model.

A Comparison of Three Theories of Firm Boundaries (기업경계에 관한 세 이론의 비교)

  • Chung, Hoe-Sang
    • Asia-Pacific Journal of Business
    • /
    • v.12 no.3
    • /
    • pp.87-99
    • /
    • 2021
  • Purpose - In this study, I attempt to clarify three theories of firm boundaries (vertical integration): the principal-agent theory, transaction cost theory, and property rights theory. Although these theories have been widely cited and much discussed, it has been found that understanding the commonalities and distinctions of these seemingly familiar theories is difficult. Design/methodology/approach - I present the three theories about the decisions that firms make concerning their boundaries. Then, I compare elemental versions of the theories of the firm. Findings - Comparing the ingredients of the elemental property rights and principal-agent theories shows that they provide a unified account of the costs and benefits of vertical integration. However, the property rights theory in no sense formalizes the transaction cost theory. Research implications or Originality - Clarifying the three theories of the firm can help to construct empirical models and interpret its results.

IT Convergence u-Learning Contents using Agent Based Modeling (에이전트 기반 모델링을 활용한 IT 융합 u-러닝 콘텐츠)

  • Park, Hong-Joon;Kim, Jin-Young;Jun, Young-Cook
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.4
    • /
    • pp.513-521
    • /
    • 2014
  • The purpose of this research is to develope and implement a convergent educational contents based on theoretical background of integrated education using agent based modeling in the ubiquitous learning environment. The structure of this contents consists of three modules that were designed by trans-disciplinary concept and situated learning theory. These three modules are: convergent problem presenting module, resource of knowledge module and learning of agent based modeling and IT tools module. After the satisfaction survey of the implemented content, out of 5 total value, the average value was 3.86 for effectiveness, 4.13 for convenience and 3.86 for design. The result of the survey shows that the users are generally satisfied. By using this u-learning contents, learners can experience and learn how to solve the convergent problem by utilizing IT tools without any limitation of device, time and space. At the same time, the proposal of structural design of contents can be a good guideline to the researchers to develop the convergent educational contents in the future.

Spatial Configuration Analysis of the Elderly Care Facilities Based on Visibility - Visibility Analysis and Agent-Based Simulation Using Space Syntax - (가시성에 기반한 노인요양시설의 공간계획에 관한 분석 - 공간구문론을 활용한 가시성 분석과 에이전트 시뮬레이션을 중심으로 -)

  • Lee, Jisun;Lee, Hyunsoo
    • Korean Institute of Interior Design Journal
    • /
    • v.27 no.3
    • /
    • pp.14-23
    • /
    • 2018
  • The spatial planning of the elderly care facility plans is analyzed using space syntax in terms of encouraging the social interaction of the residents in this study. First, through the visibility graph analysis, openness and accessibility of space is analysed. Second, the walking behavior of residents through agent analysis model is simulated. Third, the space planning methods for the elderly care facilities are proposed based on the results. The results are as follows. According to the visibility graph analysis, the main corridor has high visual openness and high accessibility. The visual openness and accessibility of the unit living room, where social interaction among residents is possible in each unit, is low. Space planning is needed to increase direct protection and observation of employees to the unit living room. The location of the nurse station that manages the entire floor needs to be located where the openness and accessibility is most high. The nursing station should have a high degree of connectivity to the entire space, so that any accidents can be managed and contact is accessible. Through the agent simulation the flow from the center to each unit space is highest in the corridor space and the inflow to the private rooms and the living room are similar. Therefore, it is necessary to plan the accessibility of the unit living room more for the natural inflow of residents.

Security Policy Negotiation Model Design for Secure Network Management (안전한 망 관리를 위한 보안정책 협상모델 설계)

  • Park, Jin-Ho;Chung, Jin-Wook
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.171-176
    • /
    • 2004
  • This paper presents the design of a certain highly efficient security policy negotiation of SPS(Security Policy System) for secure network management using mobile agent system. The conventional IP security systems for secure network management have some problems. A drawback to these systems is that the required policy between each security area is different. Another problem is not possible to guarantee whether a packet is transmitted through the same path by both directions and is protected by the same policy due to the topology of the network. Unlike conventional systems, the model developed herein can be resolved by using a mobile agent technology. If each domain needs a negotiation of security policy, a mobile agent manages the result of the negotiation in the form of a passport and guarantees the authentication and reliability each other by using the passport.

Design of a Modbile Agent-based Workflow System (이동에이전트 기반 워크플로우 시스템의 설계)

  • Seo, Young-Ho;Yoo, Jeong-Joon;Lee, Dong-Ik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.8
    • /
    • pp.2370-2387
    • /
    • 2000
  • This paper proposes a new design strategy that can overcome limitations of two existing approaches, focusing on performance and scalability issues among various architectural issues which must be considered in designing workflow systems. In the proposed approach, we suggest to introduce 'delegation model' which corresponds to the high-level strategy utilizing the fundamental characteristics of mobile agents, after establishing a mobile agent-based workflow system architecture focused on performance and scalability. We point out three major issues that should be considered in this approach and propose a 3-tier mobile agent-based workflow system architecture that effectively reflects these considerations. Also, we show that the new approach can provide better performance and scalability than existing ones - approaches based on the client-server paradigm and other approaches based on mobile agent paradigm represented by DartFlow system - by evaluating performance of the proposed architecture through the GSPN simulation.

  • PDF

The design of AIN SDF Server about the application of the X.500 for supporting the SCF/SDF in AIN (AIN에서 SCF/SDF 인터페이스에 X.500 적용을 위한 AIN SDF Server 설계)

  • Park, Mun-Seong;O, Ju-Byeong;Jin, Byeong-Un;Kim, Hye-Gyu;Park, Seong-Yeol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.5
    • /
    • pp.655-666
    • /
    • 1995
  • Advanced Intelligent Network(AIN) and X.500 directory service have similarity in between. X.500 capabilities and the requirements for the Service Control Function(SCF) to Service Data Function(SDF) in AIN. As an interface, SCF can be mapping as a Directory User Agent(DUA) and SDF can be mapping as a Directory System Agent(DSA). Based on the concepts, X.500 directory can be applied to AIN. In this paper we suggest to apply the X.500 DSP to the SDF/SDF interface to perform a distribution function. Also we show that the SCF-SDF/SDF-SDF relationship can be possible under applying X.500 DAP/DSP within the set of Capability Set 1 (CS1),CS2 and CS3. Finally, based on the above contents, we introduce the designed schematic of AIN SDF Server System for a distributed processing in AIN and design the X.500 schema of Universal Personal Telecommunication(UPT) service for supporting AIN SDF Server.

  • PDF

A Fault-Recovery Agent for Distance Education on Home Network Environment (홈 네트워크 환경에서 원격 교육을 위한 결함 복구 에이전트)

  • Ko, Eung-Nam
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.4
    • /
    • pp.479-484
    • /
    • 2007
  • This paper explains the design and implementation of the FRA(Fault Recovery Agent). FRA is a system that is suitable for recovering software error for multimedia distance education based on home network environment. In terms of distributed multimedia systems, the most important catagories for quality of service are a timeless, volume, and reliability. In this paper, we discuss a method for increasing reliability through fault tolerance. This paper explains a performance analysis of an error recovery system running on distributed multimedia environment using rule-based DEVS modeling and simulation techniques. In DEVS, a system has a time base, inputs, states, outputs, and functions. The proposed method is more efficient than the other method in comparison with error ration and processing time.

  • PDF