• Title/Summary/Keyword: FCM Service

Search Result 23, Processing Time 0.032 seconds

A Context-Aware Information Service using FCM Clustering Algorithm and Fuzzy Decision Tree (FCM 클러스터링 알고리즘과 퍼지 결정트리를 이용한 상황인식 정보 서비스)

  • Yang, Seokhwan;Chung, Mokdong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.7
    • /
    • pp.810-819
    • /
    • 2013
  • FCM (Fuzzy C-Means) clustering algorithm, a typical split-based clustering algorithm, has been successfully applied to the various fields. Nonetheless, the FCM clustering algorithm has some problems, such as high sensitivity to noise and local data, the different clustering result from the intuitive grasp, and the setting of initial round and the number of clusters. To address these problems, in this paper, we determine fuzzy numbers which project the FCM clustering result on the axis with the specific attribute. And we propose a model that the fuzzy numbers apply to FDT (Fuzzy Decision Tree). This model improves the two problems of FCM clustering algorithm such as elevated sensitivity to data, and the difference of the clustering result from the intuitional decision. And also, this paper compares the effect of the proposed model and the result of FCM clustering algorithm through the experiment using real traffic and rainfall data. The experimental results indicate that the proposed model provides more reliable results by the sensitivity relief for data. And we can see that it has improved on the concordance of FCM clustering result with the intuitive expectation.

A Study on Implementation of the Push System Based on FCM Service Inducing Communication of Candidates and Influence on Voters: Using Smart Devices Application (FCM 서비스를 이용한 후보자 소통 유도 푸시 시스템의 구현과 유권자에게 미치는 영향에 관한 연구 : 스마트 디바이스 어플리케이션을 활용하여)

  • Lee, Seungwon;Lee, Ook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.9
    • /
    • pp.454-463
    • /
    • 2017
  • Advancement of science and technology have led to development of the media, which has evolved election campaign strategies. Nowadays, media development has made communication more important, and it is a growing trend where smart-device applications are widely used to facilitate communication with electors. Based on Google's Fire base Cloud Messaging (FCM) push service, which keeps up with the fast-changing election trends and supports election campaigns systematically, this research aims to help accomplish the goals of an election campaign by developing an information system and performing empirical analysis of the variables that the information system affects. The system consists of an elector's application and a management system. The management system includes browsing and management of received-and sent-message history, and direct management of the application. By managing the push system in more progressive ways, this system will help to improve the effectiveness of election campaigns and accomplish election goals.

Implementation of Sensors Information Alarm Service using an FCM based on Raspberry Pi (FCM을 이용한 라즈베리파이 기반의 센서정보 알림 구현)

  • Oh, Sejin
    • Journal of Industrial Convergence
    • /
    • v.20 no.8
    • /
    • pp.61-67
    • /
    • 2022
  • The Internet of Things(IoT) is one of the key technologies in the Fourth Industrial Revolution. The IoT is a system that acquires information from various sensors and provides meaningful information to users. The method of obtaining information from sensor is using WIFI, Bluetooth and Server. is not accessible to external users because of different type of networks or local area communication. For this reason, there is a problem that external user cannot receive notification in regard to sensor information. In this paper, we want to establish a cloud message environment using Google's FCM(Firebase Cloud Messaging) and find out through experiments how users can receive notifications even if they are outside.

Development of FCM service in connection with travel Items for free individual travelers (자유개별여행자를 위한 여행상품과 연계된 FCM서비스 개발)

  • Park, JiHoon;Jeong, Hogyoun;Ru, HongRyeon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.01a
    • /
    • pp.69-72
    • /
    • 2018
  • 최근 증가하고 있는 자유개별여행자들의 경우 항공권, 숙박 등의 여행상품을 개별로 구매하고 여행지에서 지역 여행정보를 통해 여행상품을 구매한다. 일반적인 여행 앱에서는 여행자에게 일괄적으로 관광 상품 메시지를 전송한다. 하지만 해당 여행지에 대한 정보 메시지를 여행 시간대별로 받는다면 여행자는 그 정보를 토대로 좀 더 다양한 여행을 즐길 수 있으며, 해당 지역의 여행 상품을 판매하는 판매자의 경우 효과적인 홍보 마케팅이 이루어질 것으로 사료된다. 따라서 본 연구에서는 해당 여행지를 여행하고 있는 여행자에게 스케줄링된 여행정보를 주기적으로 전송할 수 있는 FCM기반의 푸시서비스 개발을 목적으로 하였다.

  • PDF

An Enhanced Mechanism of Security Weakness in CDMA Service (CDMA 서비스의 보안취약성과 개선방안)

  • Ryu, Dae-Hyun;Jang, Seung-Ju
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.729-742
    • /
    • 2003
  • Mobile Communication has a possibility of eavesdropping by nature of wireless channel. It is known that eavesdropping of CDMA system is impossible because the voice data spreads with the PN. First of all, we show that it is possible to eavesdrop the CDMA channel by analysis of the forward channel in case that we know the ESN and the MIN. We can monitor the forward traffic channel with easy since ESN and MIN are exposed during the call processing in CDMA service in Korea. In this paper, we will show security weakness and propose an enhanced mechanism for CDMA service. We consider the problem of security in the CDMA service. CDMA system has wireless channels to transmit voice or data. By this reason, CDMA communication has a possibility of being eavesdropped by someone. It is known that eavesdropping in CDMA system is impossible because the voice data spreads with the PN. However, we can eavesdrop the CDMA data in FCM protocol in case that we know the ESN and the MIN. In CDMA system, ESN and MIN are exposed to the wireless channel. In this paper, we analyze the flow of the voice and signal in the CDMA system and monitor the forward traffic channel by the FCM protocol. The FCM protocol is proposed to monitor the forward channel in CDMA system. We can show the possibility of monitoring in one-way channel of CDMA system by the FCM protocol. The test instrument based on the FCM protocol is proposed to monitor the CDMA forward channel. We will show the system architecture of the test instrument to monitor the forward channel in CDMA.

Context-Aware Security Service using FCM Clustering and Multivariate Fuzzy Decision Tree (FCM 클러스터링과 다변량 퍼지결정트리를 이용한 상황인식 보안 서비스)

  • Yang, Seokhwan;Chung, Mokdong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1527-1530
    • /
    • 2009
  • 유비쿼터스 환경의 확산에 따른 다양한 보안문제의 발생은 센서의 정보를 이용한 상황인식 보안 서비스의 필요성을 증대시키고 있다. 본 논문에서는 FCM (Fuzzy C-Means) 클러스터링과 다변량 퍼지 결정트리 (Multivariate Fuzzy Decision Tree)를 이용하여 센서의 정보를 분류함으로써 사용자의 상황을 인식하고, 사용자가 처한 상황에 따라 다양한 수준의 보안기술을 유연하게 적용할 수 있는 상황인식 보안 서비스를 제안한다. 제안 모델은 기존에 많이 연구되어 오던 고정된 규칙을 기반으로 하는 RBAC(Role-Based Access Control)계열의 모델보다 더욱 유연하고 적합한 결과를 보여주고 있다.

An Adaptive Probe Detection Model using Fuzzy Cognitive Maps

  • Lee, Se-Yul;Kim, Yong-Soo
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.660-663
    • /
    • 2003
  • The advanced computer network technology enables connectivity of computers through an open network environment. There has been growing numbers of security threat to the networks. Therefore, it requires intrusion detection and prevention technologies. In this paper, we propose a network based intrusion detection model using Fuzzy Cognitive Maps(FCM) that can detect intrusion by the Denial of Service(DoS) attack detection method adopting the packet analyses. A DoS attack appears in the form of the Probe and Syn Flooding attack which is a typical example. The Sp flooding Preventer using Fuzzy cognitive maps(SPuF) model captures and analyzes the packet information to detect Syn flooding attack. Using the result of analysis of decision module, which utilized FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. The result of simulating the "KDD ′99 Competition Data Set" in the SPuF model shows that the Probe detection rates were over 97 percentages.

  • PDF

Improved Access Control using Context-Aware Security Service (상황인식 보안 서비스를 이용한 개선된 접근제어)

  • Yang, Seok-Hwan;Chung, Mok-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.1
    • /
    • pp.133-142
    • /
    • 2010
  • As the ubiquitous technology has penetrated into almost every aspect of modern life, the research of the security technology to solve the weakness of security in the ubiquitous environment is received much attention. Because, however, today's security systems are usually based on the fixed rules, many security systems can not handle diverse situations in the ubiquitous environment appropriately. Although many existing researches on context aware security service are based on ACL (Access Control List) or RBAC (Role Based Access Control), they have an overhead in the management of security policy and can not manipulate unexpected situations. Therefore, in this paper, we propose a context-aware security service providing multiple authentications and authorization from a security level which is decided dynamically in a context-aware environment using FCM (Fuzzy C-Means) clustering algorithm and Fuzzy Decision Tree. We show proposed model can solve typical conflict problems of RBAC system due to the fixed rules and improve overhead problem in the security policy management. We expect to apply the proposed model to the various applications using contextual information of the user such as healthcare system, rescue systems, and so on.

Effect of Time of Initiating Dietary Fat Supplementation on Performance and Reproduction of Early Lactation Dairy Cows

  • Son, J.;Larson, L.L.;Grant, R.J.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.13 no.2
    • /
    • pp.182-187
    • /
    • 2000
  • Forty-two Holstein cows (21 multiparous) were assigned by calving date and parity to three dietary sequences to evaluate the effect of time of initiating fat supplementation to diets on lactation and reproductive performance. The dietary sequences were: 1) control, no supplemental fat from 1 to 98 days in milk (DIM) ; 2) control diet from 1 to 28 DIM then 3% supplemental fat (calcium salts of long-chain fatty acids) from 29 to 98 DIM; or 3) 3% supplemental fat from 1 to 98 DIM. Feeding supplemental fat did not enhance mean milk and 4% fat corrected milk (FCM) yields, but efficiency of FCM production was higher for cows fed supplemental fat. Milk fat percentage was unchanged whereas milk protein percentage was depressed with fat supplementation. Feeding supplemental fat reduced DMI and energy balance but there were no differences among treatments on time to resumption of ovarian cyclicity or conception rate to first service. Concentrations of progesterone during the first two ovulatory cycles tended to be greater in the fat-supplemented groups. Feeding supplemental fat starting at either parturition or 29 DIM increased efficiency of FCM production, but did not greatly enhance reproductive performance.

A Probe Prevention Model for Detection of Denial of Service Attack on TCP Protocol (TCP 프로토콜을 사용하는 서비스거부공격 탐지를 위한 침입시도 방지 모델)

  • Lee, Se-Yul;Kim, Yong-Soo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.4
    • /
    • pp.491-498
    • /
    • 2003
  • The advanced computer network technology enables connectivity of computers through an open network environment. There has been growing numbers of security threat to the networks. Therefore, it requires intrusion detection and prevention technologies. In this paper, we propose a network based intrusion detection model using FCM(Fuzzy Cognitive Maps) that can detect intrusion by the DoS attack detection method adopting the packet analyses. A DoS attack appears in the form of the Probe and Syn Flooding attack which is a typical example. The SPuF(Syn flooding Preventer using Fussy cognitive maps) model captures and analyzes the packet informations to detect Syn flooding attack. Using the result of analysis of decision module, which utilized FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance comparison, the "KDD′99 Competition Data Set" made by MIT Lincoln Labs was used. The result of simulating the "KDD′99 Competition Data Set" in the SPuF model shows that the probe detection rates were over 97 percentages.