• Title/Summary/Keyword: Intelligent information technology

Search Result 2,344, Processing Time 0.03 seconds

지능형차량 개발과 안전운전지원 시스템

  • 권영도
    • The Magazine of the IEIE
    • /
    • v.28 no.5
    • /
    • pp.55-62
    • /
    • 2001
  • In this paper, we introduc current research and development trend of intelligent vehicls and its application to driving suport system. We introduce some core technology required for developing thee systems and explain how it works. Moreover, some items related with ehicle information system and the intelligent vehicles will be introduced. Since the vehicle is very complex system, there are many problems in developing these systems, especially in developing intelligent vehicle. The main purpose of this is to dscuss these problems and find good solution.

  • PDF

Towards Intelligent Web Interaction

  • Takama, Yasufumi
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.134-137
    • /
    • 2003
  • Both browsing and retrieval with search engines are major operations that establish the interaction between users and the Web. Although both operations are usually combined to locate information from the Web, recent growth of the Web has overtaken the potential of this conventional interaction. This paper proposes the concept of Retrieve, Browse, and Analyze (RBA)-based interactions, as the improvement of the conventional Retrieve and Browse (RB)-based interaction. The prototype interface based on RBA-based interaction is also presented.

  • PDF

On Efficient Processing of Continuous Reverse Skyline Queries in Wireless Sensor Networks

  • Yin, Bo;Zhou, Siwang;Zhang, Shiwen;Gu, Ke;Yu, Fei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.1931-1953
    • /
    • 2017
  • The reverse skyline query plays an important role in information searching applications. This paper deals with continuous reverse skyline queries in sensor networks, which retrieves reverse skylines as well as the set of nodes that reported them for continuous sampling epochs. Designing an energy-efficient approach to answer continuous reverse skyline queries is non-trivial because the reverse skyline query is not decomposable and a huge number of unqualified nodes need to report their sensor readings. In this paper, we develop a new algorithm that avoids transmission of updates from nodes that cannot influence the reverse skyline. We propose a data mapping scheme to estimate sensor readings and determine their dominance relationships without having to know the true values. We also theoretically analyze the properties for reverse skyline computation, and propose efficient pruning techniques while guaranteeing the correctness of the answer. An extensive experimental evaluation demonstrates the efficiency of our approach.

Intelligent Hybrid Modular Architecture for Multi Agent System

  • Lee, Dong-Hun;Baek, Seung-Min;Kuc, Tae-Yong;Chung, Chae-Wook
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.896-902
    • /
    • 2004
  • The purpose of the study of multi-robot system is to realize multi-robot system easy for the control of robot system in case robot is adapted in the complicated environment of task structure. The purpose of the study of multi-robot system is to realize multi-robot system easy for the control of robot system in case robot is adapted in the complicated environment of task structure. To make real time control possible by making effective use of recognized information in this dynamic environment, suitable distribution of tasks should be made in consideration of function and role of each performing robots. In this paper, IHMA (Intelligent Hybrid Modular Architecture) of Intelligent combined control architecture which utilizes the merits of deliberative and reactive controllers will be suggested and its efficiency will be evaluated through the adaptation of control architecture to representative multi-robot system.

  • PDF

Intelligent Android Malware Detection Using Radial Basis Function Networks and Permission Features

  • Abdulrahman, Ammar;Hashem, Khalid;Adnan, Gaze;Ali, Waleed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.286-293
    • /
    • 2021
  • Recently, the quick development rate of apps in the Android platform has led to an accelerated increment in creating malware applications by cyber attackers. Numerous Android malware detection tools have utilized conventional signature-based approaches to detect malware apps. However, these conventional strategies can't identify the latest apps on whether applications are malware or not. Many new malware apps are periodically discovered but not all malware Apps can be accurately detected. Hence, there is a need to propose intelligent approaches that are able to detect the newly developed Android malware applications. In this study, Radial Basis Function (RBF) networks are trained using known Android applications and then used to detect the latest and new Android malware applications. Initially, the optimal permission features of Android apps are selected using Information Gain Ratio (IGR). Appropriately, the features selected by IGR are utilized to train the RBF networks in order to detect effectively the new Android malware apps. The empirical results showed that RBF achieved the best detection accuracy (97.20%) among other common machine learning techniques. Furthermore, RBF accomplished the best detection results in most of the other measures.

An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks

  • Zhang, Xiaojun;Mu, Liming;Zhao, Jie;Xu, Chunxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3280-3298
    • /
    • 2019
  • Vehicular ad-hoc networks (VANETs) have become increasingly significant in intelligent transportation systems, they play a great role in improving traffic safety and efficiency. In the deployment of intelligent VANETs, intelligent vehicles can efficiently exchange important or urgent traffic information and make driving decisions. Meanwhile, secure data communication and vehicle's identity privacy have been highlighted. To cope with these security issues, in this paper, we construct an efficient anonymous authentication scheme with secure communication in intelligent VANETs. Combing the ElGamal encryption technique with a modified Schnorr signature technique, the proposed scheme provides secure anonymous authentication process for encrypted message in the vehicle-to-infrastructure communication model, and achieves identity privacy, forward security, and reply attack resistance simultaneously. Moreover, except the trusted authority (TA), any outside entity cannot trace the real identity of an intelligent vehicle. The proposed scheme is designed on an identity-based system, which can remove the costs of establishing public key infrastructure (PKI) and certificates management. Compared with existing authentication schemes, the proposed scheme is much more practical in intelligent VANETs.

Intelligent Navigation Safety Information System based on Information-Fusion Technology (정보융합 기술 기반의 지능형 항행안전정보 시스템)

  • Kim, Do-Yeon;Jo, Dae-Woon;Yi, Mi-Ra;Park, Gaei-Kark
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.2
    • /
    • pp.226-233
    • /
    • 2010
  • The study of information fusion technology, which merges various types of data to recognize a situation more exactly, has begun in the area of national defense. Recently, the concept of information fusion is getting applied to other fields, and we are interested in maritime safety. In navigation, officers receive data about inside and outside of ship from several devices in bridge, and use it to recognize and predict the safety situation. However, too much and fast updated data might even fatigue mates, and there is the problem of inconsistency among data from several types of devices. This paper introduce how can use information fusion technology for the situation awareness and prediction of navigation safety, and show the realization possibility of Intelligent Navigation Safety Information System through an information fusion example in a specific situation scenario.

A System of Personalized and Intelligent Tourism Content Service Based on Semantic Web (시맨틱 웹 기반의 개인화 지능형 문화관광 서비스 시스템)

  • Joo, Jaehun
    • The Journal of Information Systems
    • /
    • v.18 no.3
    • /
    • pp.211-229
    • /
    • 2009
  • Recently, trends of information technology development include offerings of service for personalization, intelligence, and convergence. The research suggested a new tour system that tourists can make their tour packages by applying Semantic Web technology. The system includes ontologies and inference rules for offering intelligent and personalized service. Our system called MYT (Make Your Tour-package) was successfully demonstrated by employing realistic scenarios. Current version of the MYT system needs manager's intervention to link and integrate automatically ontology subsystem and Web service. In further study, the MYT will be extended to the system including a component integrating automatically subsystems and a component capturing and processing context data from RFID/USN.

  • PDF

The Design for DSRC Communication Technology of On Board Equipment in the Intelligent Transport System (지능형 교통체제에서 차량 단말장치의 DSRC 통신기술 설계)

  • Lee, Dae Sik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.4
    • /
    • pp.135-142
    • /
    • 2012
  • DSRC system is a communication system that consists of road side equipment and on board equipment to provide services of communication technology for intelligent transportation systems. In this paper, we carry out a short-range dedicated high-speed wireless communications via DSRC system based on board equipment that is installed in the vehicle and road side equipment through wireless channels of communication. on board equipment is system that have a memory which initialization information is stored, it loads physical layer and MAC layer, LLC layer, L7 layer in turn. In the upper, it should analyze the various commands that are sent from roadside base stations, and carry out the operation which is in accordance with the command. and also it designs the structure of protocol stack which is TRM Layer loaded that is to initialize on L7 layer and MAC layer and efficiently designs operation between on board equipment and the road side equipment.