• Title/Summary/Keyword: Communication Tool

Search Result 1,888, Processing Time 0.024 seconds

Facilitating Web Service Taxonomy Generation : An Artificial Neural Network based Framework, A Prototype Systems, and Evaluation (인공신경망 기반 웹서비스 분류체계 생성 프레임워크의 실증적 평가)

  • Hwang, You-Sub
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.2
    • /
    • pp.33-54
    • /
    • 2010
  • The World Wide Web is transitioning from being a mere collection of documents that contain useful information toward providing a collection of services that perform useful tasks. The emerging Web service technology has been envisioned as the next technological wave and is expected to play an important role in this recent transformation of the Web. By providing interoperable interface standards for application-to-application communication, Web services can be combined with component based software development to promote application interaction both within and across enterprises. To make Web services for service-oriented computing operational, it is important that Web service repositories not only be well-structured but also provide efficient tools for developers to find reusable Web service components that meet their needs. As the potential of Web services for service-oriented computing is being widely recognized, the demand for effective Web service discovery mechanisms is concomitantly growing. A number of public Web service repositories have been proposed, but the Web service taxonomy generation has not been satisfactorily addressed. Unfortunately, most existing Web service taxonomies are either too rudimentary to be useful or too hard to be maintained. In this paper, we propose a Web service taxonomy generation framework that combines an artificial neural network based clustering techniques with descriptive label generating and leverages the semantics of the XML-based service specification in WSDL documents. We believe that this is one of the first attempts at applying data mining techniques in the Web service discovery domain. We have developed a prototype system based on the proposed framework using an unsupervised artificial neural network and empirically evaluated the proposed approach and tool using real Web service descriptions drawn from operational Web service repositories. We report on some preliminary results demonstrating the efficacy of the proposed approach.

A Comparison Analysis among Structural Equation Modeling (AMOS, LISREL and PLS) Using the Same Data (동일 데이터를 이용한 구조방정식 툴 간의 비교분석)

  • Nam, Soo-tai;Kim, Do-goan;Jin, Chan-yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.7
    • /
    • pp.978-984
    • /
    • 2018
  • Structural equation modeling is pointing to statistical procedures that simultaneously perform path analysis and confirmatory factor analysis. Today, this statistical procedure is an essential tool for researchers in the social sciences. There are as AMOS, LISREL and PLS representative tools that can perform structural equation modeling analysis. AMOS provides a convenient graphical user interface for beginners to use. PLS has the advantage of not having a constraint on normal distribution as well as a graphical user interface. Therefore, we compared and analyzed the three most commonly used tools (applications) in social sciences. Based on structural equation modeling, confirmatory factor analysis was performed using the IBM AMOS Ver. 23, the LISREL 8.70 and the SmartPLS 2.0. The comparative results show that LISREL has the highest explanatory power of dependent variables than other analytical tools. The path coefficients and T-values presented by the analysis results showed similar results for all three analysis tools. This study suggests practical and theoretical implications based on the results.

Performance improvement on mobile devices using MVC+Prefetch Controller Pattern (MVC+Prefetch Controller 패턴을 사용한 모바일 기기의 성능향상 기법)

  • Im, Byung-Jai;Lee, Eun-Seok
    • The KIPS Transactions:PartD
    • /
    • v.18D no.3
    • /
    • pp.179-184
    • /
    • 2011
  • Current mobile devices have surpassed its boundaries as a more communication tool to a smart device which provides additional features. These features have supported the smart life of its users, but have reached its limit from low-performance processors and short-battery time. These issues can be resolved b implementing higher performing hardware, but they come with a burden of high cost. This paper introduces a new way of managing computing resources in a mobile device by enhancing the quality of human-computer interaction. The real-speed felt by users are mainly influenced by the time it takes form a user's input to the device to display the completed result on the screen. Since the size of the screen for mobile devices are small, if the processor only fetch data to be used for displaying on screen, the time can be significantly reduced. MVC+Prefetch Controller pattern accomplished this goal by using the minimum amount of data from DB to fetch display and still manages to support high-speed data transfer to achieve seamless display. This idea has been realized by practice using Samsung mobile phone S8500, which demonstrated the superior performance on user's perspective.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

Digital Forensic Indicators of Compromise Format(DFIOC) and Its Application (디지털 포렌식 기반의 침해 지표 포맷 개발 및 활용 방안)

  • Lee, Min Wook;Yoon, Jong Seong;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.95-102
    • /
    • 2016
  • Computer security incident such as confidential information leak and data destruction are constantly growing and it becomes threat to information in digital devices. To respond against the incident, digital forensic techniques are also developing to help digital incident investigation. With the development of digital forensic technology, a variety of forensic artifact has been developed to trace the behavior of users. Also, a diversity of forensic tool has been developed to extract information from forensic artifact. However, there is a issue that information from forensic tools has its own forms. To solve this problem, it needs to process data when it is output from forensic tools. Then it needs to compare and analyze processed data to identify how data is related each other and interpret the implications. To reach this, it calls for effective method to store and output data in the course of data processing. This paper aims to propose DFIOC (Digital Forensic Indicators Of Compromise) that is capable of transcribing a variety of forensic artifact information effectively during incident analysis and response. DFIOC, which is XML based format, provides "Evidence" to represent various forensic artifacts in the incident investigation. Furthermore, It provides "Forensic Analysis" to report forensic analysis result and also gives "Indicator" to investigate the trace of incidence quickly. By logging data into one sheet in DFIOC format for forensic analysis process, it is capable of avoiding unnecessary data processing. Lastly, since collected information is recorded in a normalized format, data input and output becomes much easier as well as it will be convenient to use for identification of collected information and analysis of data relationship.

Development of Safe Korean Programming Language Using Static Analysis (정적 분석을 이용한 안전한 한글 프로그래밍 언어의 개발)

  • Kang, Dohun;Kim, Yeoneo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.79-86
    • /
    • 2016
  • About 75% of software security incidents are caused by software vulnerability. In addition, the after-market repairing cost of the software is higher by more than 30 times than that in the design stage. In this background, the secure coding has been proposed as one of the ways to solve this kind of maintenance problems. Various institutions have addressed the weakness patterns of the standard software. A new Korean programming language Saesark has been proposed to resolve the security weakness on the language level. However, the previous study on Saesark can not resolve the security weakness caused by the API. This paper proposes a way to resolve the security weakness due to the API. It adopts a static analyzer inspecting dangerous methods. It classifies the dangerous methods of the API into two groups: the methods of using tainted data and those accepting in-flowing tainted data. It analyses the security weakness in four steps: searching for the dangerous methods, configuring a call graph, navigating a path between the method for in-flowing tainted data and that uses tainted data on the call graph, and reporting the security weakness detected. To measure the effectiveness of this method, two experiments have been performed on the new version of Saesark adopting the static analysis. The first experiment is the comparison of it with the previous version of Saesark according to the Java Secure Coding Guide. The second experiment is the comparison of the improved Saesark with FindBugs, a Java program vulnerability analysis tool. According to the result, the improved Saesark is 15% more safe than the previous version of Saesark and the F-measure of it 68%, which shows the improvement of 9% point compared to 59%, that of FindBugs.

New Paradigm in exhibition organization at the National Museum of Contemporary Art ('연구 업무 전담제'를 통해 살펴보는 국립현대미술관 전시 기획의 새로운 패러다임)

  • Choi, Eun-Ju
    • The Journal of Art Theory & Practice
    • /
    • no.3
    • /
    • pp.67-84
    • /
    • 2005
  • Since the evaluation of its intellectual activities and abilities is done by curator's capabilities, planning exhibition is very important as the final result achieved by their own knowledge, information, and research. ARPA(Advanced Research Project on Arts) is suggested as the system which enables curators responding simultaneously to the society in the times, based on its special characteristics. If this system settles well, which means that the curators at NMCA(National Museum of Contemporary Art, Korea) play their roles as the professionals in each of their fields, the goal of consolidating the status of museum as the representative national museum, and building up competent department of curators, will be achieved at the same time. To clarify above, the curators set up the various assignments of research about the types of arts such as painting, Korean painting, sculpture, installation, new-media, design, craft, photogarphy, architecture, etc. And they establish the art objects classified by the regions, such as the Northern American, Southern American, European, Asian, and other Third World countries. They elaborate art objects more on the history, the work, the artist, and the issue of contemporary art. Furthermore, when the curators devote deeper study to those research subjects, they can have the opportunities to design an exhibition upon the research. Today, the museum of art is 'The Place for Communication and Encounter', it is regarded important to share the aesthetical, creative values with current artists, and to understand mutually with the spectators. It is needed to improve the curator's work, in order to meet the demands of the times and even to advance. Because the form of 'exhibition' is the tool that reveals the identity NMCA aiming at, the motivation, the development, and the realization should be leaded by the curators, who are the mainstream of the museum. ARPA is a system for identifying the exhibition like mentioned above. The main purpose of this system is to produce synergy effect, having the researching, collecting work in liaison with planning exhibition. ARPA will be able to improve the quality of exhibition through the way of developing the exhibition, passing through the stable process in the long run. So far, I have referred to a new paradigm of the exhibition design at NMCA via ARPA. Yet, there still remain missions in reality, such as analyzing the previous exhibition and reshuffling personnel and system, which should be done. When these matters settled, these plans would be suggested practically. At this point, it is the most significant that NMCA is attempting to let others aware of the importance of exhibition planning based on research. when the ARPA and exhibition planning is conjoined together successfully, the competent exhibition will be achieved, which can offer a meaningful exhibition to the art world, strengthen infra structure thru exchanging with public museum in the region, and eventually, establish a network with museum in foreign countries.

  • PDF

A Narrative Review of Home Modification Using Virtual Reality (가상현실 기반 가정환경 수정에 관한 내러티브 문헌 고찰)

  • Hwang, Na-Kyoung;Shim, Sun-Hwa
    • Journal of Digital Convergence
    • /
    • v.19 no.12
    • /
    • pp.495-504
    • /
    • 2021
  • This review aims to identify the virtual reality (VR)-based home modification programs and provide basic data for the future development and application of domestic VR-based home modification programs. We collected the studies of academic publication or conference, symposium addressed VR-based home modification from January 2011 to June 2021 using hand searching and databases such as Medline, Embase, and Scopus. A total of 7 studies were selected through selection criteria, and the studies were quantitative and qualitative studies on the development of VR prototype for home modification and the acceptability and usability of the programs. VR-based home modification have been developed and applied for various purposes for stakeholders involved in home modification. It can be used as the tools for fostering experts in home modification, evaluating the home environment remotely, and facilitating communication and collaboration with the stakeholders in the modification process. In the future, studies on development and feasibility of VR-based home modification program reflecting the characteristics of domestic housing should be conducted, and it is expected to be utilized as a tool to support the home modification process.

Mesenchymal Stem Cell-derived Exosomes: Applications in Cell-free Therapy (중간엽줄기세포유래 엑소좀: 비세포치료제로서의 활용)

  • Heo, June Seok;Kim, Jinkwan
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.50 no.4
    • /
    • pp.391-398
    • /
    • 2018
  • Mesenchymal stem cells (MSCs) are an attractive resource for refractory patients because of their anti-inflammatory/immunomodulatory capability and multi-lineage differentiation potential. The transplantation of MSCs has led to positive results in preclinical and clinical application to various diseases, including autoimmune disease, cardiovascular disease, cancer, liver cirrhosis, and ischemic stroke. On the other hand, studies have shown that paracrine factors, not direct cell replacement for damaged cells or tissue, are the main contributors in MSC-based therapy. More recently, evidence has indicated that MSC-derived exosomes play crucial roles in regulating the paracrine factors that can mediate tissue regeneration via transferring nucleic acids, proteins, and lipids to the local microenvironment and cell-to-cell communication. The use of these exosomes is likely to be beneficial for the therapeutic application of MSCs because their use can avoid harmful effects, such as tumor formation involved in cell transplantation. Therefore, therapeutic applications using MSC-derived exosomes might be safe and efficient strategies for regenerative medicine and tissue engineering. This review summarizes the recent advances and provides a comprehensive understanding of the role of MSC-derived exosomes as a therapeutic agent.

A Study on the Haptic Control Technology for Unmanned Military Vehicle Driving Control (무인차량 원격주행제어를 위한 힘반향 햅틱제어 기술에 관한 연구)

  • Kang, Tae-Wan;Park, Ki-Hong;Kim, Joon-Won;Kang, Seok-Won;Kim, Jae-Gwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.910-917
    • /
    • 2018
  • This paper describes the developments to improve the feeling and safety of the remote control system of unmanned vehicles. Generally, in the case of the remote control systems, a joystick-type device or a simple steering-wheel are used. There are many cases, in which there are operations without considering the feedback to users and driving feel. Recently, as the application area of the unmanned vehicles has been extended, the problems caused by not considering the feedback are emphasized. Therefore, the need for a force feedback-haptic control arises to solve these problems. In this study, the force feedback-haptic control algorithm considering the vehicle parameters is proposed. The vehicle parameters include first the state variables of dynamics, such as the body side-slip angle (${\beta}$) and yawrate (${\gamma}$), and second, the parameters representing the driving situations. Force feedback-haptic control technology consists of the algorithms for general and specific situations, and considers the situation transition process. To verify the algorithms, a simulator was constructed using the vehicle dynamics simulation tool with CAN communication environment. Using the simulator, the feasibility of the algorithms was verified in various scenarios.