• Title/Summary/Keyword: Big Data Processing

Search Result 1,038, Processing Time 0.029 seconds

E-Discovery Process Model and Alternative Technologies for an Effective Litigation Response of the Company (기업의 효과적인 소송 대응을 위한 전자증거개시 절차 모델과 대체 기술)

  • Lee, Tae-Rim;Shin, Sang-Uk
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.287-297
    • /
    • 2012
  • In order to prepare for the introduction of the E-Discovery system from the United States and to cope with some causable changes of legal systems, we propose a general E-Discovery process and essential tasks of the each phase. The proposed process model is designed by the analysis of well-known projects such as EDRM, The Sedona Conference, which are advanced research for the standardization of E-Discovery task procedures and for the supply of guidelines to hands-on workers. In addition, Machine Learning Algorithms, Open-source libraries for the Information Retrieval and Distributed Processing technologies based on the Hadoop for big data are introduced and its application methods on the E-Discovery work scenario are proposed. All this information will be useful to vendors or people willing to develop the E-Discovery service solution. Also, it is very helpful to company owners willing to rebuild their business process and it enables people who are about to face a major lawsuit to handle a situation effectively.

De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining

  • Su, Xin;Liu, Xuchong;Lin, Jiuchuang;He, Shiming;Fu, Zhangjie;Li, Wenjia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3230-3253
    • /
    • 2017
  • Android malware steals users' private information, and embedded unsafe advertisement (ad) libraries, which execute unsafe code causing damage to users. The majority of such traffic is HTTP and is mixed with other normal traffic, which makes the detection of malware and unsafe ad libraries a challenging problem. To address this problem, this work describes a novel HTTP traffic flow mining approach to detect and categorize Android malware and unsafe ad library. This work designed AndroCollector, which can automatically execute the Android application (app) and collect the network traffic traces. From these traces, this work extracts HTTP traffic features along three important dimensions: quantitative, timing, and semantic and use these features for characterizing malware and unsafe ad libraries. Based on these HTTP traffic features, this work describes a supervised classification scheme for detecting malware and unsafe ad libraries. In addition, to help network operators, this work describes a fine-grained categorization method by generating fingerprints from HTTP request methods for each malware family and unsafe ad libraries. This work evaluated the scheme using HTTP traffic traces collected from 10778 Android apps. The experimental results show that the scheme can detect malware with 97% accuracy and unsafe ad libraries with 95% accuracy when tested on the popular third-party Android markets.

Outdoor Positioning Estimation of Multi-GPS / INS Integrated System by EKF / UPF Filter Conversion (EKF/UPF필터 변환을 통한 Multi-GPS/INS 융합 시스템의 실외 위치추정)

  • Choi, Seung-Hwan;Kim, Gi-Jeung;Kim, Yun-Ki;Lee, Jang-Myung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.12
    • /
    • pp.1284-1289
    • /
    • 2014
  • In this Paper, outdoor position estimation system was implemented using GPS (Global Positioning System) and INS (Inertial Navigation System). GPS position information has lots of errors by interference from obstacles and weather, the surrounding environment. To reduce these errors, multiple GPS system is used. Also, the Discrete Wavelet Transforms was applied to INS data for compensation of its error. In this paper, position estimation of the mobile robot in the straight line is conducted by EKF (Extended Kalman Filter). However, curve running position estimation is less accurate than straight line due to phase change in rotation. The curve is recognized through the rate of change in heading angle and the position estimation precision of the initial curve was improved by UPF (Unscented Particle Filter). In the case of UPF, if the number of particle is so many that big memory gets size is needed and processing speed becomes late. So, it only used the position estimation in the initial curve. Thereafter, the position of mobile robot in curve is estimated through switching from UPF to EKF again. Through the experiments, we verify the superiority of the system and make a conclusion.

Accuracy Analysis of Unified Control Point Coordinate Using GAMIT/GLOBK Software (GAMIT/GLOBK를 활용한 통합기준점 성과 정확도 분석)

  • Jae Myoung, Cho;Hong Sik, Yun;Dong Ha, Lee
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.33 no.2
    • /
    • pp.103-110
    • /
    • 2015
  • This paper planned for the adjustment of unified control points by compared adjusted software for integrated network and the national integrated network. There may be some errors in the survey date and interpretation of data processing due to applying different software each year. To minimize errors, we performed a precision network adjustment by consolidating control points per observation session over years. Prior to perform the integrated network adjustment with the GPS analysis program (GLOBK) for the final integrated network adjustment, the Quasi-Observation Combination Analysis(QOCA), the Global Kalman filter VLBI and the GLOBK were compared and analyzed to perform an integrated network adjustment. The integrated network adjustment result indicates that the RMSE was rather big with ±0.03m along the vertical axis, but ±0.006m along the horizontal, that is not much different from the existing result.

A Study on the Method of Measuring Accessibility to Urban Open Spaces (도시 오픈스페이스의 접근성 측정에 관한 연구)

  • 안동만;최형석;김인호;조형준
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.18 no.4
    • /
    • pp.17-28
    • /
    • 1991
  • The purpose of this study is to investigate and present a method for measuring public accessibility to urban open spaces. A basic assumption is that, for urban open space policies, accessibility is more important than per capita area. In this study, for the purpose of simplicity, a residential area is assumed to have access to open space if it is within a certain distance from an urban open space. Official city planning map is overlayed with a 200m grid and each cell of dwelling area is checked whether it is within a certain distance from a cell categorized as urban open space. A computer program for widely commercialized personal computer is developed for data processing so that local governments without access to more sophisticated systems can carry out similar studies for their own jurisdictions. Five cities, big, small, old and new, are selected to test the proposed method. Dwelling areas of Ansan new Town have highest accessibility to open spaces(93.4% of dwelling cells have open space cell within 500m). Seoul (91.2%), Suwon(78.2%), Pusan(73.8%), and Inchon(61.4%) have less accessibility. If we assume the Ansan City residents are evenly distributed over the dwelling area, 93.4% of the population has open spaces within walking distance of 500m. However, if we consider physical barriers such as arterial roads, railroads, and streams that reduce the accessibility, less than 93.4% of Ansan city residents enjoy good access to open spaces. Though a further detailed analysis is needed to picture the microscopic accessibility, this method can serve as a useful tool for urban open space policy and open space alternatives evaluations.

  • PDF

Prediction Techniques for Difficulty Level of Hanja Using Multiple Linear Regression (다중 회귀 분석을 이용한 한자 난이도 예측 기법 연구)

  • Choi, Jeongwhan;Noh, Jiwoo;Kim, Suntae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.6
    • /
    • pp.219-225
    • /
    • 2019
  • There is a problem with the existing method of selecting the difficulty levels of Hanja characters. Some Hanja characters selected by the existing methods are different from Sino-Korean words used in real life and it is impossible to know how many times the Hanja characters are used. To solve this problem, we measure the difficulty of Hanja characters using the multiple regression analysis with the frequency as the features. Based on the elementary textbooks, FWS and FHU are counted. A questionnaire is written using the two frequencies and stroke together to answer the appropriate timing of learning the Hanja characters and use them as target variables for regression. Use stepwise regression to select the appropriate features and perform multiple linear regression. The R2 score of the model was 0.1105 and the RMSE was 0.1105.

An Iris Detection Algorithm for Disease Prediction based Iridology (홍채학기반이 질병예측을 위한 홍채인식 알고리즘)

  • Cho, Young-bok;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.107-114
    • /
    • 2017
  • Iris diagnosis is an alternative medicine to diagnose the disease of the patient by using different of the iris pattern, color and other characteristics. This paper proposed a disease prediction algorithm that using the iris regions that analyze iris change to using differential image of iris image. this method utilize as patient's health examination according to iris change. Because most of previous studies only find a sign pattern in a iris image, it's not enough to be used for a iris diagnosis system. We're developed an iris diagnosis system based on a iris images processing approach, It's presents the extraction algorithms of 8 major iris signs and correction manually for improving the accuracy of analysis. As a result, PNSR of applied edge detection image is about 132, and pattern matching area recognition presented practical use possibility by automatic diagnostic that presume situation of human body by iris about 91%.

The tendency and the effectiveness of policy in marine accident occurring in the sea around Jeju island (제주도 주변 해역에서 발생하는 해양 사고의 동향과 정책의 효율성)

  • Cho, Ju-Hee;Ahn, Jang-Young;Choi, Chan-Moon;Lee, Chang-Heon
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.50 no.1
    • /
    • pp.12-20
    • /
    • 2014
  • The objective of this paper is to aid in basic directions for the countermeasure against marine accidents by using the statistical data of Jeju Coast Guard from 1983 to 2012. Marine accidents of about 600~1,000 vessels was reported in all the waters around South Korea from 2000 to 2008. From 2009, these accidents increased rapidly and reached 1,600~2,000 vessels. Although marine accidents of longline fishing vessels did not show a big change prior to 1993, the number have increased steadily until 2007. This is considered a tendency that appears when longline vessels, using the Port of Sungsanpo as a base and operating in fishing grounds in the East China Sea, are converted to long-term fishing from short-term fishing for reasons such as cost reduction due to the sudden rise of oil prices and the performance improvement of the fishing vessels. The number of vessels in marine accidents decreased gradually from 1999 to 2002 and for nearly 7 years from 2002 to 2008, the annual average of marine accidents stayed at 97 vessels. This is seemed to be the result of a change in the policy of either the central or local government and largely associated with changes in the way of statistical processing. This tendency is resulted in lower number of the accidents due to careless navigation which can be viewed as a human error than the number of marine accidents due to poor maintenance as a cause of mechanical failure in the same period. The increase rate in the marine accidents of Jeju Island-based fishing vessels is greater than that of other area-based fishing vessels among the fishing vessels operating in coastal and near sea around Jeju Island each year.

Tracking Algorithm For Golf Swing Using the Information of Pixels and Movements (화소 및 이동 정보를 이용한 골프 스윙 궤도 추적 알고리즘)

  • Lee, Hong, Ro;Hwang, Chi-Jung
    • The KIPS Transactions:PartB
    • /
    • v.12B no.5 s.101
    • /
    • pp.561-566
    • /
    • 2005
  • This paper presents a visual tracking algorithm for the golf swing motion analysis by using the information of the pixels of video frames and movement of the golf club to solve the problem fixed center point in model based tracking method. The model based tracking method use the polynomial function for trajectory displaying of upswing and downswing. Therefore it is under the hypothesis of the no movement of the center of gravity so this method is not for the amateurs. we proposed method using the information of pixel and movement, we first detected the motion by using the information of pixel in the frames in golf swing motion. Then we extracted the club head and hand by a properties of club shaft that consist of the parallel line and the moved location of club in up-swing and down-swing. In addition, we can extract the center point of user by tracking center point of the line between center of head and both foots. And we made an experiment with data that movement of center point is big. Finally, we can track the real trajectory of club head, hand and center point by using proposed tracking algorithm.

A Study of User Behavior Recognition-Based PIN Entry Using Machine Learning Technique (머신러닝을 이용한 사용자 행동 인식 기반의 PIN 입력 기법 연구)

  • Jung, Changhun;Dagvatur, Zayabaatar;Jang, RhongHo;Nyang, DaeHun;Lee, KyungHee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.5
    • /
    • pp.127-136
    • /
    • 2018
  • In this paper, we propose a PIN entry method that combines with machine learning technique on smartphone. We use not only a PIN but also touch time intervals and locations as factors to identify whether the user is correct or not. In the user registration phase, a remote server was used to train/create a machine learning model using data that collected from end-user device (i.e. smartphone). In the user authentication phase, the pre-trained model and the saved PIN was used to decide the authentication success or failure. We examined that there is no big inconvenience to use this technique (FRR: 0%) and more secure than the previous PIN entry techniques (FAR : 0%), through usability and security experiments, as a result we could confirm that this technique can be used sufficiently. In addition, we examined that a security incident is unlikely to occur (FAR: 5%) even if the PIN is leaked through the shoulder surfing attack experiments.