• Title/Summary/Keyword: Internet Information Collection

Search Result 456, Processing Time 0.025 seconds

Online Monitoring of Ship Block Construction Equipment Based on the Internet of Things and Public Cloud: Take the Intelligent Tire Frame as an Example

  • Cai, Qiuyan;Jing, Xuwen;Chen, Yu;Liu, Jinfeng;Kang, Chao;Li, Bingqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.3970-3990
    • /
    • 2021
  • In view of the problems of insufficient data collection and processing capability of multi-source heterogeneous equipment, and low visibility of equipment status at the ship block construction site. A data collection method for ship block construction equipment based on wireless sensor network (WSN) technology and a data processing method based on edge computing were proposed. Based on the Browser/Server (B/S) architecture and the OneNET platform, an online monitoring system for ship block construction equipment was designed and developed, which realized the visual online monitoring and management of the ship block construction equipment status. Not only that, the feasibility and reliability of the monitoring system were verified by using the intelligent tire frame system as the application object. The research of this project can lay the foundation for the ship block construction equipment management and the ship block intelligent construction, and ultimately improve the quality and efficiency of ship block construction.

Study on the construction of digital library (디지탈도서관의 구축을 위한 연구)

  • Seo, Whee
    • Journal of Korean Library and Information Science Society
    • /
    • v.25
    • /
    • pp.529-567
    • /
    • 1996
  • This paper surveyed the theoretical backgrounds of digital library. Its definition and function and case studies, and basic skills for system construction of digital library were suggested. The differences between the traditional library and the digital library were compared. And the conditions that should be take into consideration of digital library construction were suggested. Suggestions are summarized as follows : 1. For the construction of digital library, library collection should be digitalized by using CD-ROM and commercial online services. 2. The digitalization of library collection should be planned by subject sharing between the libraries. For the control of this cooperation, the orgnization to propel the digitalization should be established. And it is necessary to enact the standards for the digital library. 3. The connection between MARC formatted bibliographic database and full-text should be studied. 4. All the types of information about texts, pictures, sounds and if films should be also digitalized. 5. To satisfy the needs of many users, we have to establish the various users's interface which is fitted for several kinds of users. 6. When a digital library was constructed, the copyright and resources sharing must be guranteed depending on the cost of database's usage. 7. Because the digitalization of library will be related to the various kinds of libraries, the interface for resources sharing will be constantly concerned. 8. The sharing of information resources between the libraries will be enacted on the Internet. And we must be interested in various internet tools such as telecommunication softwares, media convert programs, etc. 9. By training staffs continously, all libraries must be ready to come the library in the future.

  • PDF

A New Distributed Log Anomaly Detection Method based on Message Middleware and ATT-GRU

  • Wei Fang;Xuelei Jia;Wen Zhang;Victor S. Sheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.486-503
    • /
    • 2023
  • Logs play an important role in mastering the health of the system, experienced operation and maintenance engineer can judge which part of the system has a problem by checking the logs. In recent years, many system architectures have changed from single application to distributed application, which leads to a very huge number of logs in the system and manually check the logs to find system errors impractically. To solve the above problems, we propose a method based on Message Middleware and ATT-GRU (Attention Gate Recurrent Unit) to detect the logs anomaly of distributed systems. The works of this paper mainly include two aspects: (1) We design a high-performance distributed logs collection architecture to complete the logs collection of the distributed system. (2)We improve the existing GRU by introducing the attention mechanism to weight the key parts of the logs sequence, which can improve the training efficiency and recognition accuracy of the model to a certain extent. The results of experiments show that our method has better superiority and reliability.

A Study on Decision Making Model for Personal Information Collection and Use Policy Establishment through Internet Homepage of Financial Companies (금융회사 인터넷 홈페이지를 통한 개인정보 수집 및 이용 동의 정책 수립 모델 연구)

  • Kim, Seong-hoon;Lee, Kyeong-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.637-651
    • /
    • 2017
  • In order for a financial company to collect personal information, it explicitly notifies consumers of the contents stipulated by law and gets consent beforehand. As a result, as financial products became more complicated and diverse, and the contents of 'Consent form for providing personal information' became more complicated and more. In particular, in the case of internet or mobile, the letter became smaller as the screen size limit, making it more difficult to understand. This is because almost all companies that collecting personal information are in a similar situation, In the position of consumers who use services are, contradictions arise that habitually agree without understanding the consent contents. In this research, in order to present a consent policy establishment decision-making model to rationally collect and use personal information through the Internet website of financial companies, consider the domestic and foreign legal system Then, derive a problem To present improvement measures. In addition, the evaluation factors selected through the research are verified by presenting decision making models and formulas using AHP (Analytic Hierarchy Process) method.

Personalized Wire and Wireless News Retrieval System Using Intelligent Agent (지능형 에이전트를 이용한 개인화된 유.무선 뉴스 검색 시스템)

  • Han, Seon-Mi;Woo, Jin-Woon
    • The KIPS Transactions:PartB
    • /
    • v.8B no.6
    • /
    • pp.609-616
    • /
    • 2001
  • Today, as the Internet is popularized, information and news retrieval are generalized. However due to the tremendous amount and variety of information, many users appeal the difficulties of information retrieval. Thus in this paper, we propose a news retrieval system, which filters news articles using an intelligent agent with the learning ability of BPN (back propagation neural network). This system also uses a profile to accomodate the personalized news retrieval. This system consists of two major agents, collection agent and learning agent. The collection agent gathers the articles from several news sites, analyzes them, and stores into a database. The learning agent builds the BPN based on the personalized data. In addition, considering the popularity of the wireless internet due to the rapid development of communication technologies, we made this system provide the service through the wireless internet.

  • PDF

A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing

  • Dai, Yingling;Weng, Jian;Yang, Anjia;Yu, Shui;Deng, Robert H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2827-2848
    • /
    • 2021
  • Mobile Crowdsourcing (MCS) has become an emerging paradigm evolved from crowdsourcing by employing advanced features of mobile devices such as smartphones to perform more complicated, especially spatial tasks. One of the key procedures in MCS is to collect answers from mobile users (workers), which may face several security issues. First, authentication is required to ensure that answers are from authorized workers. In addition, MCS tasks are usually location-dependent, so the collected answers could disclose workers' location privacy, which may discourage workers to participate in the tasks. Finally, the overhead occurred by authentication and privacy protection should be minimized since mobile devices are resource-constrained. Considering all the above concerns, in this paper, we propose a lightweight and privacy-preserving answer collection scheme for MCS. In the proposed scheme, we achieve anonymous authentication based on traceable ring signature, which provides authentication, anonymity, as well as traceability by enabling malicious workers tracing. In order to balance user location privacy and data availability, we propose a new concept named current location privacy, which means the location of the worker cannot be disclosed to anyone until a specified time. Since the leakage of current location will seriously threaten workers' personal safety, causing such as absence or presence disclosure attacks, it is necessary to pay attention to the current location privacy of workers in MCS. We encrypt the collected answers based on timed-release encryption, ensuring the secure transmission and high availability of data, as well as preserving the current location privacy of workers. Finally, we analyze the security and performance of the proposed scheme. The experimental results show that the computation costs of a worker depend on the number of ring signature members, which indicates the flexibility for a worker to choose an appropriate size of the group under considerations of privacy and efficiency.

Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services

  • Sija, Baraka D;Shim, Kyu-Seok;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1572-1593
    • /
    • 2018
  • The diversity and fast growth of Internet traffic volume are highly influenced by mobile and computer applications being developed. Moreover, the developed applications are too dynamic to be identified and monitored by network administrators. Several approaches have been proposed to identify network applications, however, are still not robust enough to identify modern applications. This paper proposes both, TSA (Traffic collection, Signature generation and Applications identification) system and a derived algorithm so called CSP (Contiguous Sequential Patterns) to identify applications for management and security in IP networks. The major focus of this paper is the CSP algorithm which is automated in two modules (Signature generation and Applications identification) of the proposed system. The proposed CSP algorithm generates DNA-like unique signatures capable of identifying applications and their individual services. In this paper, we show that the algorithm is suitable for generating efficient signatures to identify applications and application services in high accuracy.

IoT based Garbage Collection Management System Through Volume Prediction (부피 예측을 통한 IoT기반 쓰레기 수거 관리 시스템)

  • Moon, Mikyeong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.1
    • /
    • pp.45-53
    • /
    • 2017
  • The Internet of Things (IoT) technology allows devices connected to the Internet to exchange information without human intervention, and to provide useful services to people. Currently, garbage trucks are regularly dispatched to collect garbage. In such a case, garbage may be less than half of the garbage collection capacity in some area, and garbage may be exceeded in another area so that garbage trucks can not collect all at once. In this paper, we have studied the method of estimating the amount of garbage to be collected and describe the development contents of the product and management system. The prediction of garbage volume was made possible by using IoT technology to measure the volume of garbage in real time. In addition, the measurement values are visibly displayed through the dashboard, so that the amount of garbage generated can be predicted and managed. This will allow IoT technology to help keep street hygiene.

Design and Implementation of a Dynamic Robot Agent System Considering the Server's Workload (서버 부하를 고려한 동적 로봇에이전트 시스템의 설계 및 구현)

  • Park, Kyoo-Seok;Lee, Chung-Seok;Kim, Sung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11S
    • /
    • pp.3732-3838
    • /
    • 2000
  • As the Internet sites and users have rapidly been increased, the development for search engines has also been accelerated to satisfy users' expectations. As the result, not only the action of collecting documents through many search engines gave hosts workload, but also regular updating all the information is needed since information is newly added. With the circumstances, the necessity of the technology to collect massive information in hosts has been increased for the speed which is a basic requisite of search systems, and for more accurate collection of documents. Also, the role of search engines grows bigger for Internet users' various demands and flexible process through World Wide Web. In this paper, we design and implement a robot agent and a remote control system which doesn't give an excessive workload on a target server and makes the collection of documents done in a short period by considering an average workload rate on the target server and the rate of the workload that a robot experience in collection time, after we compare and analyze the existing Robot Agent Systems and supplement their weak points.

  • PDF

Optimum Speed Simulation for Electronic Toll Collection (Electronic Toll Collection 운영속도 시뮬레이션)

  • Sin, Heung-Gweon;Nam, Doohee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.87-92
    • /
    • 2013
  • This study is to analyze the impacts of different High-Pass lane speed limits. Paramics, microscopic simulation software, was used to perform microscopic simulations. For the simulations, Incheon toll gate traffic count data was used. The Paramics simulation results show that higher High-Pass speed limit (70Km/h) produced better traffic flow condition and less air pollution cost compared to existing High-Pass speed limit (30Km/h).