• Title/Summary/Keyword: Big6 모델

Search Result 141, Processing Time 0.032 seconds

Designing a Platform Model for Building MyData Ecosystem (마이데이터 생태계 구축을 위한 플랫폼 모델 설계)

  • Kang, Nam-Gyu;Choi, Hee-Seok;Lee, Hye-Jin;Han, Sang-Jun;Lee, Seok-Hyoung
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.123-131
    • /
    • 2021
  • The Fourth Industrial Revolution was triggered by data-driven digital technologies such as AI and big data. There is a rapid movement to expand the scope of data utilization to the privacy area, which was considered only a protected area. Through the revision of the Data 3 Act, laws and systems were established that allow personal information to be freely transferred and utilized under their consent. But, it will be necessary to support the platform that encompasses the entire process from collecting personal information to managing and utilizing it. In this paper, we propose a platform model that can be applied to building mydata ecosystem using personal information. It describes the six essential functional requirements for building MyData platforms and the procedures and methods for implementing them. The six proposed essential features describe consent, sharing/downloading/ receipt of data, data collection and utilization, user authentication, API gateway, and platform services. We also illustrate the case of applying the MyData platform model to real-world, underprivileged mobility support services.

Knowledge Modeling and Database Construction for Human Biomonitoring Data (인체 바이오모니터링 지식 모델링 및 데이터베이스 구축)

  • Lee, Jangwoo;Yang, Sehee;Lee, Hunjoo
    • Journal of Food Hygiene and Safety
    • /
    • v.35 no.6
    • /
    • pp.607-617
    • /
    • 2020
  • Human bio-monitoring (HBM) data is a very important resource for tracking total exposure and concentrations of a parent chemical or its metabolites in human biomarkers. However, until now, it was difficult to execute the integration of different types of HBM data due to incompatibility problems caused by gaps in study design, chemical description and coding system between different sources in Korea. In this study, we presented a standardized code system and HBM knowledge model (KM) based on relational database modeling methodology. For this purpose, we used 11 raw datasets collected from the Ministry of Food and Drug Safety (MFDS) between 2006 and 2018. We then constructed the HBM database (DB) using a total of 205,491 concentration-related data points for 18,870 participants and 86 chemicals. In addition, we developed a summary report-type statistical analysis program to verify the inputted HBM datasets. This study will contribute to promoting the sustainable creation and versatile utilization of big-data for HBM results at the MFDS.

The big data method for flash flood warning (돌발홍수 예보를 위한 빅데이터 분석방법)

  • Park, Dain;Yoon, Sanghoo
    • Journal of Digital Convergence
    • /
    • v.15 no.11
    • /
    • pp.245-250
    • /
    • 2017
  • Flash floods is defined as the flooding of intense rainfall over a relatively small area that flows through river and valley rapidly in short time with no advance warning. So that it can cause damage property and casuality. This study is to establish the flash-flood warning system using 38 accident data, reported from the National Disaster Information Center and Land Surface Model(TOPLATS) between 2009 and 2012. Three variables were used in the Land Surface Model: precipitation, soil moisture, and surface runoff. The three variables of 6 hours preceding flash flood were reduced to 3 factors through factor analysis. Decision tree, random forest, Naive Bayes, Support Vector Machine, and logistic regression model are considered as big data methods. The prediction performance was evaluated by comparison of Accuracy, Kappa, TP Rate, FP Rate and F-Measure. The best method was suggested based on reproducibility evaluation at the each points of flash flood occurrence and predicted count versus actual count using 4 years data.

Research of Performance Interference Control Technique for Heterogeneous Services in Bigdata Platform (빅데이터 플랫폼에서 이종 서비스간 성능 간섭 현상 제어에 관한 연구)

  • Jin, Kisung;Lee, Sangmin;Kim, Youngkyun
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.6
    • /
    • pp.284-289
    • /
    • 2016
  • In the Hadoop-based Big Data analysis model, the data movement between the legacy system and the analysis system is difficult to avoid. To overcome this problem, a unified Big Data file system is introduced so that a unified platform can support the legacy service as well as the analysis service. However, major challenges in avoiding the performance degradation problem due to the interference of two services remain. In order to solve this problem, we first performed a real-life simulation and observed resource utilization, workload characteristics and I/O balanced level. Based on this analysis, two solutions were proposed both for the system level and for the technical level. In the system level, we divide I/O path into the legacy I/O path and the analysis I/O path. In the technical level, we introduce an aggressive prefetch method for analysis service which requires the sequential read. Also, we introduce experimental results that shows the outstanding performance gain comparing the previous system.

A step-by-step service encryption model based on routing pattern in case of IP spoofing attacks on clustering environment (클러스터링 환경에 대한 IP 스푸핑 공격 발생시 라우팅 패턴에 기반한 단계별 서비스 암호화 모델)

  • Baek, Yong-Jin;Jeong, Won-Chang;Hong, Suk-Won;Park, Jae-Hung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.580-586
    • /
    • 2017
  • The establishment of big data service environment requires both cloud-based network technology and clustering technology to improve the efficiency of information access. These cloud-based networks and clustering environments can provide variety of valuable information in real-time, which can be an intensive target of attackers attempting illegal access. In particular, attackers attempting IP spoofing can analyze information of mutual trust hosts constituting clustering, and attempt to attack directly to system existing in the cluster. Therefore, it is necessary to detect and respond to illegal attacks quickly, and it is demanded that the security policy is stronger than the security system that is constructed and operated in the existing single system. In this paper, we investigate routing pattern changes and use them as detection information to enable active correspondence and efficient information service in illegal attacks at this network environment. In addition, through the step-by -step encryption based on the routing information generated during the detection process, it is possible to manage the stable service information without frequent disconnection of the information service for resetting.

Process Model for 6 Sigma(${\sigma}$) in Construction Management(CM) (건설사업관리(CM)에서의 6시그마(${\sigma}$) 적용 조건 분석을 통한 추진 모델 구축)

  • Kim, Chan-Gyo;Lee, Jea-Sauk;Chun, Jae-Youl
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2006.11a
    • /
    • pp.478-482
    • /
    • 2006
  • The domestic enterprises in order to secure the freshness location of market from the international competition which is keen are propelling a price and a quality high position strategy steadily. It is put in competitive situation with the overseas enterprises and even from construction industry it follows in construction market opening and there is not another idea to the research the management strategies, directions and focus competitive elements of the enterprise against, what it sees consequently and to rise to the priority where the competitive power reinforcement of the enterprise is important, it becomes. Competitive power of like this enterprise for a reinforcement the technique which induces a big interest 6 Sigma is technique from the many companies. 6 sigma preceding researches of manufacturing and service industry the fact that it is accomplished with the object which will carry most. The research which relates with construction industry is staying to an introduction of 6 sigma the investigation phase, the actual introduction introduces and "S" construction there is not only a possibility against the application result of having a limit because it is applying. It is like that but like referring to a minute description for the international competitive power security which it follows in the change which market environment is sudden 6 sigma the introduction will judge, indispensability development of the logical propriety against hereupon and it will reach and it verifies the question investigation for to lead, 6 sigma of the construction companies it confirms the application possibility and presents the propulsion model as 6 sigma the fact that overcoming the limit characteristic of that introduction application as objective of sample research means it will do.

  • PDF

Social Issue Risk Type Classification based on Social Bigdata (소셜 빅데이터 기반 사회적 이슈 리스크 유형 분류)

  • Oh, Hyo-Jung;An, Seung-Kwon;Kim, Yong
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.1-9
    • /
    • 2016
  • In accordance with the increased political and social utilization of social media, demands on online trend analysis and monitoring technologies based on social bigdata are also increasing rapidly. In this paper, we define 'risk' as issues which have probability of turn to negative public opinion among big social issues and classify their types in details. To define risk types, we conduct a complete survey on news documents and analyzed characteristics according to issue domains. We also investigate cross-medias analysis to find out how different public media and personalized social media. At the result, we define 58 risk types for 6 domains and developed automatic classification model based on machine learning algorithm. Based on empirical experiments, we prove the possibility of automatic detection for social issue risk in social media.

A Study on Security System of 4G Network System (4세대 네트워크 시스템의 보안시스템에 관한 연구)

  • Kim, Hee-Sook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.15-23
    • /
    • 2016
  • In this paper we presented 4G security models in an open environment. 4G networks have still more security holes and open issues for expert to notice. In here. we show that a number of new security threats to cause unexpected service interruption and disclosure of information will be possible in 4G due mainly to the fact that 4G is an IP-based, heterogeneous network. it tells about the security issues and vulnerabilities present in the above 4G standards.. we try to present several architectures behind 4G infrastructure for example WiMAX and 3GPP LTE architecture. Finally, we point to potential areas for future vulnerabilities and evaluate areas in 4G security which warrant attention. When you make a big dada program, If you use this network architecture then you can improve your learning speed.

Clustering Algorithm using the DFP-Tree based on the MapReduce (맵리듀스 기반 DFP-Tree를 이용한 클러스터링 알고리즘)

  • Seo, Young-Won;Kim, Chang-soo
    • Journal of Internet Computing and Services
    • /
    • v.16 no.6
    • /
    • pp.23-30
    • /
    • 2015
  • As BigData is issued, many applications that operate based on the results of data analysis have been developed, typically applications are products recommend service of e-commerce application service system, search service on the search engine service and friend list recommend system of social network service. In this paper, we suggests a decision frequent pattern tree that is combined the origin frequent pattern tree that is mining similar pattern to appear in the data set of the existing data mining techniques and decision tree based on the theory of computer science. The decision frequent pattern tree algorithm improves about problem of frequent pattern tree that have to make some a lot's pattern so it is to hard to analyze about data. We also proposes to model for a Mapredue framework that is a programming model to help to operate in distributed environment.

A Method of Identifying Ownership of Personal Information exposed in Social Network Service (소셜 네트워크 서비스에 노출된 개인정보의 소유자 식별 방법)

  • Kim, Seok-Hyun;Cho, Jin-Man;Jin, Seung-Hun;Choi, Dae-Seon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1103-1110
    • /
    • 2013
  • This paper proposes a method of identifying ownership of personal information in Social Network Service. In detail, the proposed method automatically decides whether any location information mentioned in twitter indicates the publisher's residence area. Identifying ownership of personal information is necessary part of evaluating risk of opened personal information online. The proposed method uses a set of decision rules that considers 13 features that are lexicographic and syntactic characteristics of the tweet sentences. In an experiment using real twitter data, the proposed method shows better performance (f1-score: 0.876) than the conventional document classification models such as naive bayesian that uses n-gram as a feature set.