• 제목/요약/키워드: Information Use Environments

검색결과 1,188건 처리시간 0.032초

HEVA: Cooperative Localization using a Combined Non-Parametric Belief Propagation and Variational Message Passing Approach

  • Oikonomou-Filandras, Panagiotis-Agis;Wong, Kai-Kit
    • Journal of Communications and Networks
    • /
    • 제18권3호
    • /
    • pp.397-410
    • /
    • 2016
  • This paper proposes a novel cooperative localization method for distributed wireless networks in 3-dimensional (3D) global positioning system (GPS) denied environments. The proposed method, which is referred to as hybrid ellipsoidal variational algorithm (HEVA), combines the use of non-parametric belief propagation (NBP) and variational Bayes (VB) to benefit from both the use of the rich information in NBP and compact communication size of a parametric form. InHEVA, two novel filters are also employed. The first one mitigates non-line-of-sight (NLoS) time-of-arrival (ToA) messages, permitting it to work well in high noise environments with NLoS bias while the second one decreases the number of calculations. Simulation results illustrate that HEVA significantly outperforms traditional NBP methods in localization while requires only 50% of their complexity. The superiority of VB over other clustering techniques is also shown.

Automated Link Tracing for Classification of Malicious Websites in Malware Distribution Networks

  • Choi, Sang-Yong;Lim, Chang Gyoon;Kim, Yong-Min
    • Journal of Information Processing Systems
    • /
    • 제15권1호
    • /
    • pp.100-115
    • /
    • 2019
  • Malicious code distribution on the Internet is one of the most critical Internet-based threats and distribution technology has evolved to bypass detection systems. As a new defense against the detection bypass technology of malicious attackers, this study proposes the automated tracing of malicious websites in a malware distribution network (MDN). The proposed technology extracts automated links and classifies websites into malicious and normal websites based on link structure. Even if attackers use a new distribution technology, website classification is possible as long as the connections are established through automated links. The use of a real web-browser and proxy server enables an adequate response to attackers' perception of analysis environments and evasion technology and prevents analysis environments from being infected by malicious code. The validity and accuracy of the proposed method for classification are verified using 20,000 links, 10,000 each from normal and malicious websites.

Real-Time Eye Tracking Using IR Stereo Camera for Indoor and Outdoor Environments

  • Lim, Sungsoo;Lee, Daeho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권8호
    • /
    • pp.3965-3983
    • /
    • 2017
  • We propose a novel eye tracking method that can estimate 3D world coordinates using an infrared (IR) stereo camera for indoor and outdoor environments. This method first detects dark evidences such as eyes, eyebrows and mouths by fast multi-level thresholding. Among these evidences, eye pair evidences are detected by evidential reasoning and geometrical rules. For robust accuracy, two classifiers based on multiple layer perceptron (MLP) using gradient local binary patterns (GLBPs) verify whether the detected evidences are real eye pairs or not. Finally, the 3D world coordinates of detected eyes are calculated by region-based stereo matching. Compared with other eye detection methods, the proposed method can detect the eyes of people wearing sunglasses due to the use of the IR spectrum. Especially, when people are in dark environments such as driving at nighttime, driving in an indoor carpark, or passing through a tunnel, human eyes can be robustly detected because we use active IR illuminators. In the experimental results, it is shown that the proposed method can detect eye pairs with high performance in real-time under variable illumination conditions. Therefore, the proposed method can contribute to human-computer interactions (HCIs) and intelligent transportation systems (ITSs) applications such as gaze tracking, windshield head-up display and drowsiness detection.

소비자정보시스템 구축을 위한 기반 연구 (Baseline Study to Develop a Consumer Information System)

  • 남수정;김기옥
    • 가정과삶의질연구
    • /
    • 제23권1호
    • /
    • pp.125-137
    • /
    • 2005
  • Information technology is an important driving force that has changed consumer information environments. In order to adjust in the new environments, consumers need an innovative information system. The purpose of this study was to develop a Consumer Information System (CIS). CIS is a device that supports consumer's decision-making process and elevates consumer information competence. The CIS was constructed by the following steps: (1) organization of developers, (2) systematization of consumer information, (3) data loading, (4) integration of consumer database: data warehouse, (5) data distribution, (6) composition of data mart, (7) use of data access tools: data-mining, OLAP, statistical analysis, Q+R, (8) data visualization: web server.

Ethical Issues and Information Communication Technology (ICT) Use in the New Era

  • Otulugbu, Dumebi;Ogunobo, Marvellous-Mary
    • International Journal of Knowledge Content Development & Technology
    • /
    • 제12권3호
    • /
    • pp.19-29
    • /
    • 2022
  • The new age is characterised by information communication technology, where computers, laptops, mobile gadgets such as palmtops, tablets, mobile phones and the internet have made their way to every sphere of life from our domestic environments such a homes, small retail shops, banks to large industries and the world at large. Over time, so many questions about the ethical use of Information and Communication Technology (ICT) have emerged on who has access to what technology and the use of it and like every other technological invention. This paper will look at the morality involved in making use of ICT to promote ethical use of data or information in a virtual environment. ICT also possesses both positive and negative impacts; the questions that these impacts raise are what this piece attempts to answer, providing global scrutiny to these ethical issues, situations and questions; and providing recommendations in line with global best practices.

웹 서비스 기반의 유비쿼터스 워크플로우 언어 (A Ubiquitous Workflow Language based on Web Services)

  • 한주현;조용윤;최재영
    • 정보처리학회논문지A
    • /
    • 제12A권6호
    • /
    • pp.485-492
    • /
    • 2005
  • 현재 비즈니스 및 분산 컴퓨팅 환경에서 사용되는 워크플로우는 서비스 통합 및 자동화, 동적 흐름 관리, 동시 수행, 실시간 서비스 등의 기능을 제공한다. 유비쿼터스 컴퓨팅 환경에서 서비스들은 사용자와 현재 사용자가 속해 있는 환경으로부터 다양한 정보를 제공받아 상황에 맞는 서비스를 동적으로 제공해야 한다. 이와 같은 서비스를 효과적으로 제공하기 위해서는 서비스의 자동화에 사용되고 있는 워크플로우를 유비쿼터스 컴퓨팅에 적용하고, 상황인지 서비스를 제공하기 위해 상황 정보를 워크플로우의 전이조건으로 명시해야 한다. 본 논문에서는 유비궈터스 환경에서 발생하는 상황 정보를 워크플로우의 서비스 전이조건으로 사용하기 위한 웹 서비스 기반의 워크플로우 언어인 uWDL (Ubiquitous Workflow Description Language)을 제안한다. uWDL은 상황 정보인 컨텍스트, 프로파일 및 이벤트 정보에 따라 사용자 상황에 맞는 서비스를 선택할 수 있다. 또한 uWDL 전용 파서와 컨텍스트 처리기를 통해 uWDL로 기술된 시나리오 문서가 제대로 실행되는지를 검증하였다. 유비쿼터스 환경을 위한 시나리오 설계를 위해 개발자는 uWDL 시나리오 편집기를 이용하여 유쿼비터스 환경의 상황 정보를 고려해 그에 맞는 서비스들의 관계를 워크플로우 형태로 기술함으로써 작업을 통합하고 자동화할 수 있다

Conjoined Audio Fingerprint based on Interhash and Intra hash Algorithms

  • Kim, Dae-Jin;Choi, Hong-Sub
    • International Journal of Contents
    • /
    • 제11권4호
    • /
    • pp.1-6
    • /
    • 2015
  • In practice, the most important performance parameters for music information retrieval (MIR) service are robustness of fingerprint in real noise environments and recognition accuracy when the obtained query clips are matched with the an entry in the database. To satisfy these conditions, we proposed a conjoined fingerprint algorithm for use in massive MIR service. The conjoined fingerprint scheme uses interhash and intrahash algorithms to produce a robust fingerprint scheme in real noise environments. Because the interhash and intrahash algorithms are masked in the predominant pitch estimation, a compact fingerprint can be produced through their relationship. Experimental performance comparison results showed that our algorithms were superior to existing algorithms, i.e., the sub-mask and Philips algorithms, in real noise environments.

간섭 제한적인 환경에서의 OFDM 시스템의 다이버시티 기술의 비교 (Comparisons of Diversity Techniques for OFDM Systems in Interference-Limited Environments)

  • 임민중;김홍석
    • 한국통신학회논문지
    • /
    • 제33권11A호
    • /
    • pp.1043-1052
    • /
    • 2008
  • 본 논문에서는 간섭 제한적인 환경의 OFDM 시스템에서 시공간 부호화 기술과 순환지연 다이버시티 기술의 성능을 비교한다. 통신 시스템은 다이버시티 기술을 보통 자신의 성능을 향상시키기 위하여 사용하지만 시스템이 간섭 제한적인 환경에서 동작된다면 다른 사용자에게 미치는 영향도 함께 고려해야 한다. 다른 사용자와의 간섭을 고려하지 않을 때 시공간 부호화 기술은 순환지연 다이버시티 기술보다 우수한 성능을 보이지만 다른 사용자에게 미치는 영향을 함께 고려할 때는 순환지연 다이버시티를 사용하는 것이 더 우수한 성능을 보일 수 있다.

무선 LAN의 User 환경에 따른 전송품질에 관한 연구 (A Study of Transmission Quality according to User′s Environments of Wireless LAN)

  • 전찬욱;고남영
    • 한국정보통신학회논문지
    • /
    • 제7권3호
    • /
    • pp.448-453
    • /
    • 2003
  • 본 논문에서는 LAN환경의 기업이나 학내망 등 제한된 공간에서 특수한 분야에 국한된 무선 LAN의 사용이 점차 보편화되고 그 필요성이 대두됨에 따라, 현재 보급화 되고 있는 2.4GHz 대역 무선 LAN의 전송 방식 및 구조에 대해서 살펴보고, 무선 LAN의 다양한 User 환경에 따른 Packet 신호의 전송특성 및 속도에 관한 영향을 실험을 통하여 비교ㆍ분석하였다.

동시공학적 선박설계를 위한 웹 기반의 협업설계 시스템 (Web based Collaborative Design System for Concurrent Ship Design)

  • 이경호
    • 한국해양공학회:학술대회논문집
    • /
    • 한국해양공학회 2003년도 춘계학술대회 논문집
    • /
    • pp.10-16
    • /
    • 2003
  • Under the concept of global economy, the enterprises are assigning design and production environments around the world in different areas. In shipbuilding companies, a serious problem of information exchange emerges as companies use traditional hardware and very distinct softwares appropriate to their field of expertise. To overcome the decreased productivity due to the interruption of information, the concept of simultaneous engineering and concurrent design becomes very significant. In this article, the concept oj collaborative design based on internet environments is described. Especially, the core technologies to achieve collaborative design environments among shipbuilding companies, ship owners, ship classification societies, model basin, and consulting companies are adopted.

  • PDF