• Title/Summary/Keyword: Filtering Software

Search Result 334, Processing Time 0.025 seconds

An Quality Management Effort Estimation Model Based on Defect Filtering Concept (결점 필터링 개념 기반 품질관리 노력 추정 모델)

  • Lee, Sang-Un
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.6
    • /
    • pp.101-109
    • /
    • 2012
  • To develop high quality software, quality control plan is required about fault correction that is latent within software. We should describe fault correction profile properly for this. The tank and pipe model performs complex processes to calculate fault that is remove and escapes. Also, we have to know in which phase the faults were inserted, removed and escaped and know the fault detection rate at any phases. To simplify such complex process, this paper presented model to fault filtering concept. Presented model has advantage that can describe fault more shortly because need not to consider whether was involved in fault that escaped fault is inserted at any step at free step. Also, presented effort estimating model that do fetters in function of fault removal quality and productivity measure and is required in fault detection.

A Study on the Digital Filter Design using Software for Analysis of Observation Data in Radio Astronomy (전파천문 관측데이터 분석을 위해 소프트웨어를 이용한 디지털필터 설계에 관한 연구)

  • Yeom, Jae-Hwan;Oh, Se-Jin;Roh, Duk-Gyoo;Oh, Chung-Sik;Jung, Dong-Kyu;Shin, Jae-Sik;Kim, Hyo-Ryoung;Hwang, Ju-Yeon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.16 no.4
    • /
    • pp.175-181
    • /
    • 2015
  • In this paper, we propose a design method for a digital filter using software in order to analyze the radio astronomy observation data. Recently the analysis method for radio astronomy observing system is transferring from hardware to software by developing of state-of-the-art of computer system. The existing hardware system is not able to easily change the specification because it is implemented to meet special requirements and it takes a high cost and time. In case of software, however, it has an advantage to implement with small cost if open software is used, and flexibly changes to satisfy the desired specification. But, in order to analyze the massive data like radio astronomy with software, the good performance system is needed for computer. Therefore, this paper proposes a digital filter design method using software with the same performance as that of digital filter implemented with hardware in observation system which is operated by the KVN(Korean VLBI Network). To design a digital filter, the proposed method is performed with standard C language and the simulation is conducted with GNU(GNU's Not Unix) Octave and investigated to show its effectiveness. In addition, for the high speed operation of the designed digital filter, the SSE(Streaming SIMD Extensions) library is adopted for available parallel operation. By the proposed digital filter, the digital filtering is performed for the wide band observation data in the KVN observation mode, the filtering result of narrow band observation has no ripple inside of stop band, and confirmed the effectiveness of the proposed method.

Filtering and Intrusion Detection Approach for Secured Reconfigurable Mobile Systems

  • Idriss, Rim;Loukil, Adlen;Khalgui, Mohamed;Li, Zhiwu;Al-Ahmari, Abdulrahman
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.5
    • /
    • pp.2051-2066
    • /
    • 2017
  • This paper deals with reconfigurable secured mobile systems where the reconfigurability has the potential of providing a required adaptability to change the system requirements. The reconfiguration scenario is presented as a run-time automatic operation which allows security mechanisms and the addition-removal-update of software tasks. In particular, there is a definite requirement for filtering and intrusion detection mechanisms that will use fewer resources and also that will improve the security on the secured mobile devices. Filtering methods are used to control incoming traffic and messages, whereas, detection methods are used to detect malware events. Nevertheless, when different reconfiguration scenarios are applied at run-time, new security threats will be emerged against those systems which need to support multiple security objectives: Confidentiality, integrity and availability. We propose in this paper a new approach that efficiently detects threats after reconfigurable scenarios and which is based on filtering and intrusion detection methods. The paper's contribution is applied to Android where the evaluation results demonstrate the effectiveness of the proposed middleware in order to detect the malicious events on reconfigurable secured mobile systems and the feasibility of running and executing such a system with the proposed solutions.

Tree Removal Filtering using Aerial Photographs DTM to Analyze Producing Section of Forest Soil Sediment Disaster (산지토사재해 발생구간 분석을 위한 항공사진 DTM에서의 수목필터링)

  • Woo, Choong-Shik;Youn, Ho-Joong;Jeong, Yong-Ho
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.10 no.3
    • /
    • pp.22-30
    • /
    • 2007
  • It is difficult to generate DTM using aerial photographs because trees usually cover disaster occurred areas. So, this study proposed how to filter by moving window using digital aerial photographs and generate accurate DTM. The results were compared with those of adaptive filtering by commercial digital photogrammetry software (Socet set) to find out the effect of tree removal by window size in forest soil sediment disaster. And then they were compared with DTM generated from LiDAR data. As a result, it was showed that the accuracy of moving filtering DTM was lower than that of LiDAR DTM while it was higher by 6m than that of Adaptive filtering.

  • PDF

Development of Hybrid Filtering Recommendation System using Context-Information in Mobile Environments (모바일 환경에서 상황정보를 이용한 하이브리드 필터링 추천시스템 설계)

  • Ko, Jung-Min;Nam, Doo-Hee
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.3
    • /
    • pp.95-100
    • /
    • 2011
  • Due to rapid growth and development of telecommunication information technology, interest has been amplified regarding ubiquitous network computing and user-oriented service. Also, the rapid development of related technologies has been a big spotlight. Smart phone, with features such as a PC with advanced features is a mobile phone. According to environment and infrastructure development, a variety of mobile-based application software to provide various kinds of information and services has been released. However, most of them are provider-driven information systems and aim to provide large amounts of information simply to an unspecified number of users. Therefore, customized or personalized provision of information and service explained earlier for individual users has been hardly come true. According to background and need, this study wants to design and implement recommendations system for personalization and customization in mobile environments. To acquire more accurate recommendation results, recommendation system shall be composed using the Hybrid Filtering. Effective information recommendation according to user's situation by using user's context-information of purpose and location that are available in mobile devices before running the filtering of the information to improve the quality of recommendations.

Spam-Filtering by Identifying Automatically Generated Email Accounts (자동 생성 메일계정 인식을 통한 스팸 필터링)

  • Lee Sangho
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.5
    • /
    • pp.378-384
    • /
    • 2005
  • In this paper, we describe a novel method of spam-filtering to improve the performance of conventional spam-filtering systems. Conventional systems filter emails by investigating words distribution in email headers or bodies. Nowadays, spammers begin making email accounts in web-based email service sites and sending emails as if they are not spams. Investigating the email accounts of those spams, we notice that there is a large difference between the automatically generated accounts and ordinaries. Based on that difference, incoming emails are classified into spam/non-spam classes. To classify emails from only account strings, we used decision trees, which have been generally used for conventional pattern classification problems. We collected about 2.15 million account strings from email service sites, and our account checker resulted in the accuracy of $96.3\%$. The previous filter system with the checker yielded the improved filtering performance.

Use of Software Agent Technology in Management Information System: A Literature Review and Classification

  • Hamirahanim Abdul Rahman;Jinsoo Park;Jihae Suh
    • Asia pacific journal of information systems
    • /
    • v.29 no.1
    • /
    • pp.65-82
    • /
    • 2019
  • Technological innovations over the years have accentuated the workings in corporate- connected organizations and different application platforms. Hence, a unified management information system (MIS) that can utilize the Web and propel programming developments is required. Software agents, the latest developments in computer software technology, can be utilized to rapidly and effortlessly build integrated information systems. Consequently, 59 research papers on the use of software agents in MIS were identified from top 40 MIS journals published between 2007 and 2017. Then, we reviewed and classified all the research papers according to two categories: application fields and application categories. The application fields consisted of eight sub-groups: manufacturing, telecommunication systems, traffic and transportation management, information filtering and gathering, electronic commerce, business process management, entertainment, and medical care; whereas the application categories consisted of three sub-groups: multi-agent systems, personal assistants, and multi-agent simulation. The research papers were further divided into journal and year of publication, and journal and application field. The objective of our research was to understand the trend of the use software agent technology in MIS by examining the published research paper beside to add knowledge and content to the information system academic discipline.

A Rented room Recommendation System using Collaborative Filtering and Personal Propensity (협업 필터링과 개인 성향을 이용한 개인화 자취방 추천 시스템)

  • Jang, Tae-Hoon;Khamphaphone, Khamphaphone;Park, Doo-Soon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.532-534
    • /
    • 2017
  • 최근 1인 가구의 급격한 증가로 인해 자취방을 찾는 인구가 늘어나고 있다. 그에 따라 수많은 자취방이 등장했으며 매우 다양한 가격과 조건으로 자취방들이 형성되고 있다. 이에 따라 사용자에게 만족되는 조건과 가격을 만족하는 자취방을 추천하기란 어려운 일이다. 따라서 본 논문에서는 개인화 요인과 협업 필터링 방법을 이용하여 사용자에게 보다 적합한 자취방을 추천하는 시스템을 제안한다.

A Personalized Pet Sitter Recommendation System based on Collaborative Filtering (협업필터링을 이용한 개인화 애완동물 돌보미 추천 시스템)

  • Kim, Han-Yi;Hwang, Dong-Hyun;Park, Doo-Soon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.517-520
    • /
    • 2017
  • 현대사회의 발전에 따라 1인가구가 증가하면서 애완동물을 키우는 애완 인이 증가하게 되었다. 애완동물을 가족의 구성원으로 여기는 사람들이 많아지면서 반려동물에게 사용하는 지출 규모가 폭발적으로 증가하였다. 자연스럽게 애완동물 사업 규모가 커지면서 서비스 산업이 확장되고 있다. 이에 따라 반려인들은 자신의 반려동물을 잘 돌봐줄 수 있는 애완동물 돌보미 서비스를 제공받기를 원한다. 본 논문에서는 협업 필터링방법에 사용자의 개인화 요소를 이용하여 애완동물 돌보미 중 사용자에게 적합한 애완동물 돌보미를 추천하는 시스템을 제안한다.

Accommodations Recommendation System Based on the Personal Propensity and Collaborative Filtering (개인성향과 협업필터링을 이용한 숙박업소 추천 시스템)

  • Kim, Min-ki;Xayvilakone, Xayvilakone;Park, Doo-soon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.525-528
    • /
    • 2017
  • 최근 현대인들은 불륜 등 부정적이고 은밀한 공간으로 생각하던 중소형 호텔에 대한 부정적인 인식이 낮아지며 누구나 즐길 수 있고 친구들끼리 추억을 만들 수 있는 공간인 파티 룸에 대한 긍정적인 개념이 더 많이 생겼다. 이에 따라 최근 숙박 어플리케이션들이 중소형 호텔 시장을 진두지휘 하면서 관련 시장이 나날이 성장하고 있다. 본 논문은 기존에 있던 가격, 거리, 평점 중심의 시스템과 달리 개인화 요소인 나이, 직업, 성별, 소득분위, 소비성향을 반영하여 사용자의 주변에 있는 숙박업소 중 사용자들에게 가장 적합한 숙박업소를 추천해주는 시스템을 제안한다.