• Title/Summary/Keyword: Information Gathering

Search Result 843, Processing Time 0.023 seconds

A design and implementation of Java based network game environments design and implementation for Internet community (인터넷 커뮤니티를 위한 JAVA 기반의 네트워크 게임 환경 설계 및 구현)

  • Kim, Jong-Soo;Kim, Tea-Suk;Choe, Gil-Rim;Kim, Sam-Ryung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05b
    • /
    • pp.1071-1074
    • /
    • 2003
  • Now internet is very popular. Many company services various contents in Web. One of the best way for internet community is network game service for internet member. There are some company to service high quality network game for gathering members. Those company make success for getting fee from their member. Global on-line game market is small but stability growing. Thus Microsoft invest on line game. On this paper, one of a java network turn game system called by "Hoola" is designed and implemented. This Application consist of Client/Server and Database module and multi-tier Architecture, because of easily translation to PDA or mobile phone.

  • PDF

A Rural Amenity Priority Assessment Model Using Information Measure Technique (정보계측기법을 이용한 농촌 어메니티 중요도 평가 모델)

  • Lee, Je-Myung;Jung, Nam-Su;Lee, Jeong-Jae
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.49 no.4
    • /
    • pp.73-79
    • /
    • 2007
  • In the evaluation of rural amenity, it is hard to estimate the worth of rural amenity as numerical values. To evaluate the worth of an abstract idea, information measure technique(IMT) can be used. In this research, rural amenity priority assessment model(RAPAM) was developed adapting IMT. To apply the developed model for assessment of rural amenity, an encyclopedia was used as information gathering and utilizing system(IGUS). The application result of the developed model which was compared with the result of survey have similar trend. $R^{2}$ is 0.8539, RMSE is 0.382 and the applicability of RAPAM was proved.

Root Cause Analysis of the Information Industry Ecosystem Problems (정보산업 생태계 문제의 근본원인 분석)

  • Kim, Sung Kun;Ahn, Nam Gyu
    • Journal of Information Technology Applications and Management
    • /
    • v.24 no.4
    • /
    • pp.71-92
    • /
    • 2017
  • Finding a root cause is an essential step to solving a complex problem. Some previous studies have used the Delphi method for gathering opinions about root causes from geographically dispersed experts. However, we assert that complicated problems such as an industry ecosystem would make a general type of the Delphi method less practical because of too much psychological burden on study participants. In this study we present a preliminary list-based Delphi study method for identifying a root cause. This method was used to identify a root cause and draw a causal map for the information industry ecosystem problems.

The Study on Hardware Sizing Method Based on the Calculating (계산에 기초한 하드웨어 도입 규모산정 방식 연구)

  • Ra, Jong-Hei;Choi, Kwang-Don;Jung, Hae-Yong
    • Journal of Information Technology Services
    • /
    • v.5 no.1
    • /
    • pp.47-59
    • /
    • 2006
  • According to the policy for "e-Korea construction" of Korean government, Investment of information system during the past decade are dramatically increasing. More than a half of this investment is cost of hardware infrastructure. So, accurate hardware sizing are essential for higher efficiency of investment. Accurate hardware sizing benefits are generally viewed in terms of the avoidance of excess equipment and lost opportunity costs by not being able to support business needs. Unfortunately, however, little research effort to make the hardware sizing methodology are doing. We propose a sizing method for information system in public sector. This method is determinate empirical study that are gathering and analyzing cases, making method and reviewing expert. Finally we are proposed calculating method for hardware components that is CPU, memory, internal and external disk according to the application system type which is OLTP, Web, WAS. Our study certainly will act as a catalyst for higher investment-efficiency of the future information programs in public sector.

Distributed Information Gathering System using Mobile Agents (이동에이전트를 이용한 분산 정보수집 시스템)

  • Kong, Yong-Hae;Choi, In-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.305-308
    • /
    • 2001
  • 객체 컴포넌트 기반 웹 정보 저장/검색 시스템인 IHWA 시스템의 정보 수집 효율을 중대하기 위하여 이동에이전트를 이용한 분산 정보수집 시스템을 구현하였다. 분산 정보수집 시스템은 이동 에이전트를 약간의 제약을 갖는 준 협약 사이트로 파견하여 XML 문서를 파싱하고, 정보를 추출하여 IHWA시스템의 데이터베이스에 저장하도록 한다. 이동 에이전트는 준 협약 사이트에서 XML파서를 활용하여 필요한 정보만을 수집하여 전송하므로 정보의 전송량을 최소화하여 네트워크의 부하를 줄일 수 있으며, 동시에 IHWA 시스템의 처리 부하를 크게 줄일 수 있다. 또한 향후 원격 사이트의 고유한 문서 특성에 적합한 정보 추출이 가능하도록 확장할 수 있다.

  • PDF

DRM-FL: A Decentralized and Randomized Mechanism for Privacy Protection in Cross-Silo Federated Learning Approach (DRM-FL: Cross-Silo Federated Learning 접근법의 프라이버시 보호를 위한 분산형 랜덤화 메커니즘)

  • Firdaus, Muhammad;Latt, Cho Nwe Zin;Aguilar, Mariz;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.264-267
    • /
    • 2022
  • Recently, federated learning (FL) has increased prominence as a viable approach for enhancing user privacy and data security by allowing collaborative multi-party model learning without exchanging sensitive data. Despite this, most present FL systems still depend on a centralized aggregator to generate a global model by gathering all submitted models from users, which could expose user privacy and the risk of various threats from malicious users. To solve these issues, we suggested a safe FL framework that employs differential privacy to counter membership inference attacks during the collaborative FL model training process and empowers blockchain to replace the centralized aggregator server.

Study on the Intelligence-Led Policing(ILP) for the sake of Crime Prevention - Focused on the Discussion to Introduce to Korea- (범죄예방을 위한 정보 주도형 경찰활동(ILP)에 대한 연구 - 국내도입논의를 중심으로 -)

  • Park, Han-Ho;Han, Sang-Am;Lee, Myung-Woo
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.227-253
    • /
    • 2013
  • The threat of crime became a global issue nowadays. Terrorism, organized crime, crime by nation can be mentioned as typical examples. The crimes in modern society can't be identified to happen when, where and how being different from those traditional crimes(murder, robbery, sexual abuse, arson). This was the result of changed security environment that needs to address wide range of crimes as being indicated sporadic characteristics of modern threat of crime such as terrorism threat targeting unidentified masses as well as the emergence of systemic phenomenon of organized crimes and crime committed by nation. In this regard, the case of 9.11 occurred in 2001 can be deemed as an example that made a dramatic turn around to the security environment. After the terrorism, it provided an opportunity to rethink not only USA but also to the institutions all over the world that deals with crime about gathering, management, utilization of crime intelligence. As a result of which there appeared a change in police activities more effectively in gathering & managing crime information and ILP is the very activity that emerged from the USA/UK countries. This aims police activities to minimize the threat of crime being the system reflecting a framework to manage more directly to control crime by gathering and processing information. In view of the global change of security environment as a common phenomenon, the need to direct to ILP has increased in Korea in line with such security environmental change. Accordingly, this study focused on the method of introduction of ILP and presentation of matters for discussion by reviewing ILP activities of the USA/UK countries.

  • PDF

A Data Driven Index for Convergence Sensor Networks (융합 센서 네트워크를 위한 데이터 기반 색인)

  • Park, Jeong-Seok
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.6
    • /
    • pp.43-48
    • /
    • 2016
  • Wireless sensor networks (WSN) can be more reliable and easier to program and use with the help of sensor database management systems (SDMS). SDMS establish a user-friendly SQL-based interface to process declarative user-defined queries over sensor readings from WSN. Typical queries in SDMS are ad-hoc snapshot queries and long-running, continuous queries. In SDMSs queries are flooded to all nodes in the sensor net, and query results are sent back from nodes that have qualified results to a base station. For query flooding to all nodes, and result flooding to the base station, a lot of communication energy consuming is required. This paper suggests an efficient in-network index solution, named Distributed Information Gathering (DIG) to process range queries in a sensor net environment that can save energy by reducing query and result flooding.

Enhanced Peer-to-Peer Streaming Protocol to Provide The Selective VoD Service in Live Streaming Session (스트리밍 세션에서 선택적 VoD 서비스 제공을 위한 향상된 피어-투-피어 스트리밍 프로토콜)

  • Yi, Seonwoo;Cho, Sunghyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.1
    • /
    • pp.40-47
    • /
    • 2015
  • We propose a method to provide a selective VoD service during live streaming sessions. In the proposed method, each peer joined the live streaming session receives video stream packets with P2P manner and stores the packets to provide a VoD service. To mitigate the overhead of each peer node to store the video stream packets, the proposed scheme categorizes peers into three different groups based on their link types. To increase data gathering speed and reduce the network load, we also proposes the P2P transmission scheme within the same AP network for the peers with Wi-Fi link. To evaluate the performance of the proposed method, we implement computer simulator using NS-3. Simulation results show that the proposed method reduces the overhead about 66% and increases the P2P data gathering speed about 50% compared to the conventional schemes.

A Bio-inspired Hybrid Cross-Layer Routing Protocol for Energy Preservation in WSN-Assisted IoT

  • Tandon, Aditya;Kumar, Pramod;Rishiwal, Vinay;Yadav, Mano;Yadav, Preeti
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.4
    • /
    • pp.1317-1341
    • /
    • 2021
  • Nowadays, the Internet of Things (IoT) is adopted to enable effective and smooth communication among different networks. In some specific application, the Wireless Sensor Networks (WSN) are used in IoT to gather peculiar data without the interaction of human. The WSNs are self-organizing in nature, so it mostly prefer multi-hop data forwarding. Thus to achieve better communication, a cross-layer routing strategy is preferred. In the cross-layer routing strategy, the routing processed through three layers such as transport, data link, and physical layer. Even though effective communication achieved via a cross-layer routing strategy, energy is another constraint in WSN assisted IoT. Cluster-based communication is one of the most used strategies for effectively preserving energy in WSN routing. This paper proposes a Bio-inspired cross-layer routing (BiHCLR) protocol to achieve effective and energy preserving routing in WSN assisted IoT. Initially, the deployed sensor nodes are arranged in the form of a grid as per the grid-based routing strategy. Then to enable energy preservation in BiHCLR, the fuzzy logic approach is executed to select the Cluster Head (CH) for every cell of the grid. Then a hybrid bio-inspired algorithm is used to select the routing path. The hybrid algorithm combines moth search and Salp Swarm optimization techniques. The performance of the proposed BiHCLR is evaluated based on the Quality of Service (QoS) analysis in terms of Packet loss, error bit rate, transmission delay, lifetime of network, buffer occupancy and throughput. Then these performances are validated based on comparison with conventional routing strategies like Fuzzy-rule-based Energy Efficient Clustering and Immune-Inspired Routing (FEEC-IIR), Neuro-Fuzzy- Emperor Penguin Optimization (NF-EPO), Fuzzy Reinforcement Learning-based Data Gathering (FRLDG) and Hierarchical Energy Efficient Data gathering (HEED). Ultimately the performance of the proposed BiHCLR outperforms all other conventional techniques.