• Title/Summary/Keyword: Information Server

Search Result 5,849, Processing Time 0.034 seconds

Recognition Method of Korean Abnormal Language for Spam Mail Filtering (스팸메일 필터링을 위한 한글 변칙어 인식 방법)

  • Ahn, Hee-Kook;Han, Uk-Pyo;Shin, Seung-Ho;Yang, Dong-Il;Roh, Hee-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.2
    • /
    • pp.287-297
    • /
    • 2011
  • As electronic mails are being widely used for facility and speedness of information communication, as the amount of spam mails which have malice and advertisement increase and cause lots of social and economic problem. A number of approaches have been proposed to alleviate the impact of spam. These approaches can be categorized into pre-acceptance and post-acceptance methods. Post-acceptance methods include bayesian filters, collaborative filtering and e-mail prioritization which are based on words or sentances. But, spammers are changing those characteristics and sending to avoid filtering system. In the case of Korean, the abnormal usages can be much more than other languages because syllable is composed of chosung, jungsung, and jongsung. Existing formal expressions and learning algorithms have the limits to meet with those changes promptly and efficiently. So, we present an methods for recognizing Korean abnormal language(Koral) to improve accuracy and efficiency of filtering system. The method is based on syllabic than word and Smith-waterman algorithm. Through the experiment on filter keyword and e-mail extracted from mail server, we confirmed that Koral is recognized exactly according to similarity level. The required time and space costs are within the permitted limit.

A Reliable Web Service Support Mechanism based on Asynchronous Architecture in BcN (광대역통합망에서의 비동기 구조를 이용한 신뢰성 있는 웹 서비스 제공방안)

  • Kim Hyoung-min;Jung Yeu-hun;Kim Hwa-sung
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.773-780
    • /
    • 2005
  • Recently, the telecommunication network is in a transition toward the BcN (Broadband convergence Networks) that integrates the Internet, the telecommunication and the broadcasting. The BcN makes it possible to provide of 4he third-party application by using the Open API The Parlay X API is an example of the Open API and the Parlay X API is grafted in the Web Service and is abstracted from the Parlay API. So, the Parlay X API does not only have advantages of a Web Service, but also disadvantages of the Web Service. The main disadvantage of the Web Service is that it does not support the any QoS mechanism. In this paper, we propose the architecture that solves the reliability among the QoS issues for the Web Service. The proposed mechanism adopts the Asynchronous architecture for the reliable Web Service and improves the performance of the retransmission between the client and the server using the expected response time. We perform the performance evaluation through the simulation in older to compare with the existing mechanism. Consequently, we can confirm that the performance of the proposed mechanism performs better than the existing mechanism.

Web Document Transcoding Technique for Small Display Devices (소형 화면 단말기를 위한 웹 문서 변환 기법)

  • Shin, Hee-Sook;Mah, Pyeong-Soo;Cho, Soo-Sun;Lee, Dong-Woo
    • The KIPS Transactions:PartD
    • /
    • v.9D no.6
    • /
    • pp.1145-1156
    • /
    • 2002
  • We propose a web document transcoding technique that translates existing web pages designed for desktop computers into an appropriate form for hand-held devices connected to the wireless internet. By defining a content block based on a visual separation and using it as a minimum unit for analyzing and converting processes, we can get web pages converted more exactly. We also apply the reallocation of the content block and the generation of new index in order to provide convenient interface without left-right scrolling in small screen devices. These methods, compared with existing ways such as text level summary or partial extraction method, can provide efficient navigation and a full recognition of web documents. To gain those transcoding benefits, we propose the Layout-Forming Tag Analysis Algorithm that analyzes structural tags, which motivate visual separation and the Component Grouping Algorithm that extracts the content block. We also classify and rearrange the content block and generate the new index to produce an appropriate form of web pages for small display devices. We have designed and implemented our transcoding system in a proxy server and evaluated the methods and the algorithms through an analysis of transcoded results. Our transcoding system showed a good result on most of popular web pages that have complicated structures.

Design and Implementation of Wireless Device Management Agent based on OMA DM (OMA DM을 기반으로 한 무선이동통신 단말기 관리 에이전트 설계 및 구현)

  • Pak, Ju-Geon;Park, Kee-Hyun;Jang, Dae-Jin;Jang, Myung-Sook
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.4
    • /
    • pp.363-368
    • /
    • 2008
  • Mobile devices become more complex and harder to manage due to the advance of technologies. In this paper, we designed and implemented the DM Agent based on OMA(Open Mobile Alliance) DM(Device Management) which is a standard for mobile device management. The proposed DM Agent basically can manage parameter configuration through the commands ADD, DELETE, REPLACE and GET currently. Each module of the agent was designed and implemented separately for additional functions such as error reporting and software management. So the additional functions can be added by modifying Adaptor part which processes the management commands instead of modifying other modules which analyze or generate management commands. The DM Agent proposed in this paper is implemented based on WIPI(Wireless Internet Platform for Interoperability), therefore portability of the agent can be improved. In addition, this research can give a development example for dissenminating OMA DM as well as verify functional compatibility of WIPI platform. SK WIPI SDK and a Funambol DM test server are used to test operations of the implemented DM Agent.

Design and Implementation of DNS Name Autoconfiguration for Internet of Things Devices (사물인터넷 디바이스를 위한 DNS 네임 자동설정의 설계 및 구현)

  • Lee, Sejun;Jeong, Jaehoon
    • Journal of KIISE
    • /
    • v.42 no.11
    • /
    • pp.1441-1451
    • /
    • 2015
  • As one of the most spotlighted research areas, these days, the Internet of Things (IoT) aims to provide users with various services through many devices. Since there exist so many devices in IoT environments, it is inefficient to manually configure the domain name system (DNS) names of such devices. Thus, for IPv6-based IoT environments, this paper proposes a scheme called the DNS Name Autoconfiguration (DNSNA) that autoconfigures an IoT device's DNS name and manages it. In the procedure for generating and registering an IoT device's DNS name, the standard protocols of the Internet Engineering Task Force (IETF) are used. Since the proposed scheme resolves an IoT device's DNS name into an IPv6 address in unicast through a DNS server, it generates less traffic than multicast-based mDNS (Multicast DNS) which is a legacy DNS application for the DNS name service in the smart home. Thus, the proposed scheme is more appropriate in multi-hop IoT networks than mDNS. This paper explains the design of the proposed scheme and its service scenarios, such as smart home and smart road. It also explains the implementation and testing of the proposed scheme in the smart grid.

Recommendation of Best Empirical Route Based on Classification of Large Trajectory Data (대용량 경로데이터 분류에 기반한 경험적 최선 경로 추천)

  • Lee, Kye Hyung;Jo, Yung Hoon;Lee, Tea Ho;Park, Heemin
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.2
    • /
    • pp.101-108
    • /
    • 2015
  • This paper presents the implementation of a system that recommends empirical best routes based on classification of large trajectory data. As many location-based services are used, we expect the amount of location and trajectory data to become big data. Then, we believe we can extract the best empirical routes from the large trajectory repositories. Large trajectory data is clustered into similar route groups using Hadoop MapReduce framework. Clustered route groups are stored and managed by a DBMS, and thus it supports rapid response to the end-users' request. We aim to find the best routes based on collected real data, not the ideal shortest path on maps. We have implemented 1) an Android application that collects trajectories from users, 2) Apache Hadoop MapReduce program that can cluster large trajectory data, 3) a service application to query start-destination from a web server and to display the recommended routes on mobile phones. We validated our approach using real data we collected for five days and have compared the results with commercial navigation systems. Experimental results show that the empirical best route is better than routes recommended by commercial navigation systems.

A Scheduling Algorithm using The Priority of Broker for Improving The Performance of Semantic Web-based Visual Media Retrieval Framework (분산시각 미디어 검색 프레임워크의 성능향상을 위한 브로커 서버 우선순위를 이용한 라운드 로빈 스케줄링 기법)

  • Shim, Jun-Yong;Won, Jae-Hoon;Kim, Se-Chang;Kim, Jung-Sun
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.1
    • /
    • pp.22-32
    • /
    • 2008
  • To overcome the weakness of the image retrieval system using the existing Ontology and the distributed image based on the database having a simple structure, HERMES was suggested to ensure the self-control of various image suppliers and support the image retrieval based on semantic, the mentioned framework could not solve the problems which are not considered the deterioration in the capacity and scalability when many users connect to broker server simultaneously. In this paper the tables are written which in the case numerous users connect at the same time to the supply analogous level of services without the deterioration in the capacity installs Broker servers and then measures the performance time of each inner Broker Component through Monitoring System and saved and decides the ranking in saved data. As many Query performances are dispersed into several Servers User inputted from the users Interface with reference to Broker Ranking Table, Load Balancing system improving reliability in capacity is proposed. Through the experiment, the scheduling technique has proved that this schedule is faster than existing techniques.

Identification of Immunodominant B-cell Epitope Regions of Reticulocyte Binding Proteins in Plasmodium vivax by Protein Microarray Based Immunoscreening

  • Han, Jin-Hee;Li, Jian;Wang, Bo;Lee, Seong-Kyun;Nyunt, Myat Htut;Na, Sunghun;Park, Jeong-Hyun;Han, Eun-Taek
    • Parasites, Hosts and Diseases
    • /
    • v.53 no.4
    • /
    • pp.403-411
    • /
    • 2015
  • Plasmodium falciparum can invade all stages of red blood cells, while Plasmodium vivax can invade only reticulocytes. Although many P. vivax proteins have been discovered, their functions are largely unknown. Among them, P. vivax reticulocyte binding proteins (PvRBP1 and PvRBP2) recognize and bind to reticulocytes. Both proteins possess a C-terminal hydrophobic transmembrane domain, which drives adhesion to reticulocytes. PvRBP1 and PvRBP2 are large (>326 kDa), which hinders identification of the functional domains. In this study, the complete genome information of the P. vivax RBP family was thoroughly analyzed using a prediction server with bioinformatics data to predict B-cell epitope domains. Eleven pvrbp family genes that included 2 pseudogenes and 9 full or partial length genes were selected and used to express recombinant proteins in a wheat germ cell-free system. The expressed proteins were used to evaluate the humoral immune response with vivax malaria patients and healthy individual serum samples by protein microarray. The recombinant fragments of 9 PvRBP proteins were successfully expressed; the soluble proteins ranged in molecular weight from 16 to 34 kDa. Evaluation of the humoral immune response to each recombinant PvRBP protein indicated a high antigenicity, with 38-88% sensitivity and 100% specificity. Of them, N-terminal parts of PvRBP2c (PVX_090325-1) and PvRBP2 like partial A (PVX_090330-1) elicited high antigenicity. In addition, the PvRBP2-like homologue B (PVX_116930) fragment was newly identified as high antigenicity and may be exploited as a potential antigenic candidate among the PvRBP family. The functional activity of the PvRBP family on merozoite invasion remains unknown.

Development of Image-map Generation and Visualization System Based on UAV for Real-time Disaster Monitoring (실시간 재난 모니터링을 위한 무인항공기 기반 지도생성 및 가시화 시스템 구축)

  • Cheon, Jangwoo;Choi, Kyoungah;Lee, Impyeong
    • Korean Journal of Remote Sensing
    • /
    • v.34 no.2_2
    • /
    • pp.407-418
    • /
    • 2018
  • The frequency and risk of disasters are increasing due to environmental and social factors. In order to respond effectively to disasters that occur unexpectedly, it is very important to quickly obtain up-to-date information about target area. It is possible to intuitively judge the situation about the area through the image-map generated at high speed, so that it can cope with disaster quickly and effectively. In this study, we propose an image-map generation and visualization system from UAV images for real-time disaster monitoring. The proposed system consists of aerial segment and ground segment. In the aerial segment, the UAV system acquires the sensory data from digital camera and GPS/IMU sensor. Communication module transmits it to the ground server in real time. In the ground segment, the transmitted sensor data are processed to generate image-maps and the image-maps are visualized on the geo-portal. We conducted experiment to check the accuracy of the image-map using the system. Check points were obtained through ground survey in the data acquisition area. When calculating the difference between adjacent image maps, the relative accuracy was 1.58 m. We confirmed the absolute accuracy of the image map for the position measured from the individual image map. It is confirmed that the map is matched to the existing map with an absolute accuracy of 0.75 m. We confirmed the processing time of each step until the visualization of the image-map. When the image-map was generated with GSD 10 cm, it took 1.67 seconds to visualize. It is expected that the proposed system can be applied to real - time monitoring for disaster response.

LxBSM: Loadable Kernel Module for the Creation of C2 Level Audit Data based on Linux (LxBSM: C2 수준의 감사 자료 생성을 위한 리눅스 기반 동적 커널 모듈)

  • 전상훈;최재영;김세환;심원태
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.2
    • /
    • pp.146-155
    • /
    • 2004
  • Currently most of commercial operating systems contain a high-level audit feature to increase their own security level. Linux does not fall behind the other commercial operating systems in performance and stability, but Linux does not have a good audit feature. Linux is required to support a higher security feature than C2 level of the TCSEC in order to be used as a server operating system, which requires the kernel-level audit feature that provides the system call auditing feature and audit event. In this paper, we present LxBSM, which is a kernel module to provide the kernel-level audit features. The audit record format of LxBSM is compatible with that of Sunshield BSM. The LxBSM is implemented as a loadable kernel module, so it has the enhanced usability. It provides the rich audit records including the user-level audit events such as login/logout. It supports both the pipe and file interface for increasing the connectivity between LxBSM and intrusion detection systems (IDS). The performance of LxBSM is compared and evaluated with that of Linux kernel without the audit features. The response time was increased when the system calls were called to create the audit data, such as fork, execve, open, and close. However any other performance degradation was not observed.