• Title/Summary/Keyword: Information Use Environments

Search Result 1,185, Processing Time 0.027 seconds

HEVA: Cooperative Localization using a Combined Non-Parametric Belief Propagation and Variational Message Passing Approach

  • Oikonomou-Filandras, Panagiotis-Agis;Wong, Kai-Kit
    • Journal of Communications and Networks
    • /
    • v.18 no.3
    • /
    • pp.397-410
    • /
    • 2016
  • This paper proposes a novel cooperative localization method for distributed wireless networks in 3-dimensional (3D) global positioning system (GPS) denied environments. The proposed method, which is referred to as hybrid ellipsoidal variational algorithm (HEVA), combines the use of non-parametric belief propagation (NBP) and variational Bayes (VB) to benefit from both the use of the rich information in NBP and compact communication size of a parametric form. InHEVA, two novel filters are also employed. The first one mitigates non-line-of-sight (NLoS) time-of-arrival (ToA) messages, permitting it to work well in high noise environments with NLoS bias while the second one decreases the number of calculations. Simulation results illustrate that HEVA significantly outperforms traditional NBP methods in localization while requires only 50% of their complexity. The superiority of VB over other clustering techniques is also shown.

Automated Link Tracing for Classification of Malicious Websites in Malware Distribution Networks

  • Choi, Sang-Yong;Lim, Chang Gyoon;Kim, Yong-Min
    • Journal of Information Processing Systems
    • /
    • v.15 no.1
    • /
    • pp.100-115
    • /
    • 2019
  • Malicious code distribution on the Internet is one of the most critical Internet-based threats and distribution technology has evolved to bypass detection systems. As a new defense against the detection bypass technology of malicious attackers, this study proposes the automated tracing of malicious websites in a malware distribution network (MDN). The proposed technology extracts automated links and classifies websites into malicious and normal websites based on link structure. Even if attackers use a new distribution technology, website classification is possible as long as the connections are established through automated links. The use of a real web-browser and proxy server enables an adequate response to attackers' perception of analysis environments and evasion technology and prevents analysis environments from being infected by malicious code. The validity and accuracy of the proposed method for classification are verified using 20,000 links, 10,000 each from normal and malicious websites.

Baseline Study to Develop a Consumer Information System (소비자정보시스템 구축을 위한 기반 연구)

  • Nam Su-Jung;Kim Kee-Ok
    • Journal of Families and Better Life
    • /
    • v.23 no.1 s.73
    • /
    • pp.125-137
    • /
    • 2005
  • Information technology is an important driving force that has changed consumer information environments. In order to adjust in the new environments, consumers need an innovative information system. The purpose of this study was to develop a Consumer Information System (CIS). CIS is a device that supports consumer's decision-making process and elevates consumer information competence. The CIS was constructed by the following steps: (1) organization of developers, (2) systematization of consumer information, (3) data loading, (4) integration of consumer database: data warehouse, (5) data distribution, (6) composition of data mart, (7) use of data access tools: data-mining, OLAP, statistical analysis, Q+R, (8) data visualization: web server.

Real-Time Eye Tracking Using IR Stereo Camera for Indoor and Outdoor Environments

  • Lim, Sungsoo;Lee, Daeho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.3965-3983
    • /
    • 2017
  • We propose a novel eye tracking method that can estimate 3D world coordinates using an infrared (IR) stereo camera for indoor and outdoor environments. This method first detects dark evidences such as eyes, eyebrows and mouths by fast multi-level thresholding. Among these evidences, eye pair evidences are detected by evidential reasoning and geometrical rules. For robust accuracy, two classifiers based on multiple layer perceptron (MLP) using gradient local binary patterns (GLBPs) verify whether the detected evidences are real eye pairs or not. Finally, the 3D world coordinates of detected eyes are calculated by region-based stereo matching. Compared with other eye detection methods, the proposed method can detect the eyes of people wearing sunglasses due to the use of the IR spectrum. Especially, when people are in dark environments such as driving at nighttime, driving in an indoor carpark, or passing through a tunnel, human eyes can be robustly detected because we use active IR illuminators. In the experimental results, it is shown that the proposed method can detect eye pairs with high performance in real-time under variable illumination conditions. Therefore, the proposed method can contribute to human-computer interactions (HCIs) and intelligent transportation systems (ITSs) applications such as gaze tracking, windshield head-up display and drowsiness detection.

Ethical Issues and Information Communication Technology (ICT) Use in the New Era

  • Otulugbu, Dumebi;Ogunobo, Marvellous-Mary
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.12 no.3
    • /
    • pp.19-29
    • /
    • 2022
  • The new age is characterised by information communication technology, where computers, laptops, mobile gadgets such as palmtops, tablets, mobile phones and the internet have made their way to every sphere of life from our domestic environments such a homes, small retail shops, banks to large industries and the world at large. Over time, so many questions about the ethical use of Information and Communication Technology (ICT) have emerged on who has access to what technology and the use of it and like every other technological invention. This paper will look at the morality involved in making use of ICT to promote ethical use of data or information in a virtual environment. ICT also possesses both positive and negative impacts; the questions that these impacts raise are what this piece attempts to answer, providing global scrutiny to these ethical issues, situations and questions; and providing recommendations in line with global best practices.

A Ubiquitous Workflow Language based on Web Services (웹 서비스 기반의 유비쿼터스 워크플로우 언어)

  • Han, Joo-Hyun;Cho, Yong-Yoon;Choi, Jae-Young
    • The KIPS Transactions:PartA
    • /
    • v.12A no.6 s.96
    • /
    • pp.485-492
    • /
    • 2005
  • Currently workflows in business processes and distributed computing environments have provided service automation by connecting many tasks with rules and/or orderings. The services in ubiquitous computing environments have to automatically provide users with adaptive services according to dynamically changing contort information, which is obtained from both the users and their environment. To adapt these workflows to ubiquitous computing, we must specify the situation information on the transition conditions. In this paper, we propose uWDL, Ubiquitous Workflow Description Language, based on Web Services to use the situation information on the transition constraints of workflow's services. uWDL can select adaptive services according to contexts, profiles, and events information, which are situation information. Furthermore, we verified the execution of a scenario document described with uWDL using the parser and the context handler for uWDL. The scenario developers can use the uWDL scenario editor for a design of scenarios, and they can easily specify the transition condition of the services according the situation information of ubiquitous environments using the uWDL.

Conjoined Audio Fingerprint based on Interhash and Intra hash Algorithms

  • Kim, Dae-Jin;Choi, Hong-Sub
    • International Journal of Contents
    • /
    • v.11 no.4
    • /
    • pp.1-6
    • /
    • 2015
  • In practice, the most important performance parameters for music information retrieval (MIR) service are robustness of fingerprint in real noise environments and recognition accuracy when the obtained query clips are matched with the an entry in the database. To satisfy these conditions, we proposed a conjoined fingerprint algorithm for use in massive MIR service. The conjoined fingerprint scheme uses interhash and intrahash algorithms to produce a robust fingerprint scheme in real noise environments. Because the interhash and intrahash algorithms are masked in the predominant pitch estimation, a compact fingerprint can be produced through their relationship. Experimental performance comparison results showed that our algorithms were superior to existing algorithms, i.e., the sub-mask and Philips algorithms, in real noise environments.

Comparisons of Diversity Techniques for OFDM Systems in Interference-Limited Environments (간섭 제한적인 환경에서의 OFDM 시스템의 다이버시티 기술의 비교)

  • Rim, Min-Joong;Kim, Hong-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.11A
    • /
    • pp.1043-1052
    • /
    • 2008
  • This paper compares the performances with space time coding and cyclic delay diversity techniques for OFDM systems in interference-limited environments. While a communication system usually use a diversity technique to improve its own performance, it is also necessary to consider the interference effects to other users as well if the system is operated in interference-limited environments. When there is no interference from or to other users, space time coding technique results in better performance than cyclic delay diversity. However, cyclic delay diversity can be better than space time coding if interferences to other users are considered.

A Study of Transmission Quality according to User′s Environments of Wireless LAN (무선 LAN의 User 환경에 따른 전송품질에 관한 연구)

  • 전찬욱;고남영
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.3
    • /
    • pp.448-453
    • /
    • 2003
  • Use of wireless LAN limited to special fields in restricted space as enterprises and university networks becomes gradually generalized and its needs are gathering strength. This paper shows transfer modes and structures of 2.400 wireless LAN spreaded at present. And we made experiments on an influence of transmission characteristics and rates of Packet signals in various User's environments and analyzed optimum transmission levels of signals fitted in User's environments.

Web based Collaborative Design System for Concurrent Ship Design (동시공학적 선박설계를 위한 웹 기반의 협업설계 시스템)

  • Lee, Kyung-Ho
    • Proceedings of the Korea Committee for Ocean Resources and Engineering Conference
    • /
    • 2003.05a
    • /
    • pp.10-16
    • /
    • 2003
  • Under the concept of global economy, the enterprises are assigning design and production environments around the world in different areas. In shipbuilding companies, a serious problem of information exchange emerges as companies use traditional hardware and very distinct softwares appropriate to their field of expertise. To overcome the decreased productivity due to the interruption of information, the concept of simultaneous engineering and concurrent design becomes very significant. In this article, the concept oj collaborative design based on internet environments is described. Especially, the core technologies to achieve collaborative design environments among shipbuilding companies, ship owners, ship classification societies, model basin, and consulting companies are adopted.

  • PDF