• Title/Summary/Keyword: Internet Information Collection

Search Result 456, Processing Time 0.025 seconds

PDFindexer: Distributed PDF Indexing system using MapReduce

  • Murtazaev, JAziz;Kihm, Jang-Su;Oh, Sangyoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.4 no.1
    • /
    • pp.13-17
    • /
    • 2012
  • Indexing allows converting raw document collection into easily searchable representation. Web searching by Google or Yahoo provides subsecond response time which is made possible by efficient indexing of web-pages over the entire Web. Indexing process gets challenging when the scale gets bigger. Parallel techniques, such as MapReduce framework can assist in efficient large-scale indexing process. In this paper we propose PDFindexer, system for indexing scientific papers in PDF using MapReduce programming model. Unlike Web search engines, our target domain is scientific papers, which has pre-defined structure, such as title, abstract, sections, references. Our proposed system enables parsing scientific papers in PDF recreating their structure and performing efficient distributed indexing with MapReduce framework in a cluster of nodes. We provide the overview of the system, their components and interactions among them. We discuss some issues related with the design of the system and usage of MapReduce in parsing and indexing of large document collection.

Global Internet Computing Environment based on Java (자바를 기반으로 한 글로벌 인터넷 컴퓨팅 환경)

  • Kim, Hui-Cheol;Sin, Pil-Seop;Park, Yeong-Jin;Lee, Yong-Du
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.9
    • /
    • pp.2320-2331
    • /
    • 1999
  • Over the Internet, in order to utilize a collection of idle computers as a parallel computing platform, we propose a new scheme called GICE(Global Internet Computing Environment). GICE is motivated to obtain high programmability, efficient support for heterogeneous computing resources, system scalability, and finally high performance. The programming model of GICE is based on a single address space. GICE is featured with a Java based programming environment, a dynamic resource management scheme, and efficient parallel task scheduling and execution mechanisms. Based on a prototype implementation of GICE, we address the concept, feasibility, complexity and performance of Internet computing.

  • PDF

A Study on the Development of Computer-Aided Fashion Design (컴퓨터를 활용한 패션디자인 전개방법 연구)

  • 이순자;박옥련;김주현
    • The Research Journal of the Costume Culture
    • /
    • v.8 no.5
    • /
    • pp.717-725
    • /
    • 2000
  • The purpose of this study was, as an experimental one, to suggest concrete ways to use computer in fashion design from information collection to design completion, and to present a real example based on the suggested ways. The first step to attain the purpose was gathering various sorts of worldwide fashion design information on the Internet, and then the collected data were inserted in a graphic file. Next, two methods of fashion design that use computer graphics were recommended : one was to produce fashion design just by altering some of the inputted Internet fashion materials, and the other was to do it after selected basic materials were put in database. Those methods could enable one to do fashion design just with rearrangement and smallest change of the prepared basic materials, without drawing directly, and at the same time, they could minimize time and efforts required for computer fashion design.

  • PDF

An study on quality evaluation of information services (정보서비스의 품질평가에 관한 고찰)

  • 김지훈
    • Journal of Korean Library and Information Science Society
    • /
    • v.25
    • /
    • pp.441-474
    • /
    • 1996
  • Up to recently, information service have emphasized mainly on efficiencies of information collection, storage, process. But, now, many people take interest in criteria and evaluation on quality of information itself and its services because of growth of electronic materials and development of telecommunication. Especially, since the greater part of infomation is made gradually digital format, quality of information service regards as of great importance. This study attempts to investigate the quality problem in information services and its a n.0, pplication. Also, to su n.0, pport high quality, it is needed criteria of information services to evaluate and measure. To understand quality of information services, This articles deal with concept of quality on information related sector, quality management, the reason of importance of information quality, quality work of information services. There is little method to measure and evaluate quality of internet services. So it is necessary to study on internet quality, user's selection on its quality, and development on high quality site.

  • PDF

A System for National Intelligence Activity Based on All Kinds of OSINT(Open Source INTelligence) on the Internet (인터넷의 다원적 공개출처정보(OSINT)에 기반을 둔 국가정보활동 체계)

  • 조병철
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.41-55
    • /
    • 2003
  • Today the traditional national intelligence activities which are mainly based on classified informations are confronted with several problems. These are excessive collection cost, morality of intelligence activity, objectivity of intelligence, intelligence dead zone and timeliness of intelligence etc. On the other hand, circumstances of national intelligence activity are rapidly changed. Those are rapid growth of internet, transformation of classified information into open one and rapid growth of intelligence capabilities of private sector. To cope these problems and circumstances, we reevaluated OSINT(Open Source INTelligence) which is collected from all kinds of open source informations on the internet. First, we classified OSINT into four categories corresponding to the traditional classified collection methods i.e., IMINT, SIGINT, HUMINT and MASINT. And we evaluate the value of OSINT in comparison with classified collection methods. Finally a system for national intelligence activity based on all kinds of open source intelligence on the internet is proposed, described and compared with the system of traditional national intelligence activity.

  • PDF

Stability-based On-demand Multi-path Distance Vector Protocol for Edge Internet of Things

  • Dongzhi Cao;Peng Liang;Tongjuan Wu;Shiqiang Zhang;Zhenhu Ning
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2658-2681
    • /
    • 2023
  • In edge computing scenarios, IoT end devices play a crucial role in relaying and forwarding data to significantly improve IoT network performance. However, traditional routing mechanisms are not applicable to this scenario due to differences in network size and environment. Therefore, it becomes crucial to establish an effective and reliable data transmission path to ensure secure communication between devices. In this paper, we propose a trusted path selection strategy that comprehensively considers multiple attributes, such as link stability and edge cooperation, and selects a stable and secure data transmission path based on the link life cycle, energy level, trust level, and authentication status. In addition, we propose the Stability-based On-demand Multipath Distance Vector (STAOMDV) protocol based on the Ad hoc AOMDV protocol. The STAOMDV protocol implements the collection and updating of link stability attributes during the route discovery and maintenance process. By integrating the STAOMDV protocol with the proposed path selection strategy, a dependable and efficient routing mechanism is established for IoT networks in edge computing scenarios. Simulation results validate that the proposed STAOMDV model achieves a balance in network energy consumption and extends the overall network lifespan.

ILVA: Integrated audit-log analysis tool and its application. (시스템 보안 강화를 위한 로그 분석 도구 ILVA와 실제 적용 사례)

  • 차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.3
    • /
    • pp.13-26
    • /
    • 1999
  • Widespread use of Internet despite numerous positive aspects resulted in increased number of system intrusions and the need for enhanced security mechanisms is urgent. Systematic collection and analysis of log data are essential in intrusion investigation. Unfortunately existing logs are stored in diverse and incompatible format thus making an automated intrusion investigation practically impossible. We examined the types of log data essential in intrusion investigation and implemented a tool to enable systematic collection and efficient analysis of voluminous log data. Our tool based on RBDMS and SQL provides graphical and user-friendly interface. We describe our experience of using the tool in actual intrusion investigation and explain how our tool can be further enhanced.

Implementation of marine static data collection and DB storage algorithms (해양 정적 데이터 수집 및 DB 저장 알고리즘 구현)

  • Seung-Hwan Choi;Gi-Jo Park;Ki-Sook Chung;Woo-Sug Jung;Kyung-Seok Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.2
    • /
    • pp.95-101
    • /
    • 2023
  • Globally, the importance of utilization and management of marine spatial information is being maximized, and analyzing such data is emerging as a major driving force for R&D. In Korea, it is expected that collecting marine data from the past to the present and extracting its value will play an important role in the development of science in Korea in the future. In particular, marine static data constitutes a huge big database, and it is necessary to store and store the collected data without loss as high data collection costs and high-level observation techniques are required. In addition, the Disaster Safety Intelligence Convergence Center's "Marine Digital Twin Establishment and Utilization-Based Technology Research" task requires collection and analysis of marine data, so this paper conducts a current status survey of static marine data. And we present a series of algorithms that collect and store them in a database.

Proposal of AI-based Digital Forensic Evidence Collecting System

  • Jang, Eun-Jin;Shin, Seung-Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.124-129
    • /
    • 2021
  • As the 4th industrial era is in full swing, the public's interest in related technologies such as artificial intelligence, big data, and block chain is increasing. As artificial intelligence technology is used in various industrial fields, the need for research methods incorporating artificial intelligence technology in related fields is also increasing. Evidence collection among digital forensic investigation techniques is a very important procedure in the investigation process that needs to prove a specific person's suspicions. However, there may be cases in which evidence is damaged due to intentional damage to evidence or other physical reasons, and there is a limit to the collection of evidence in this situation. Therefore, this paper we intends to propose an artificial intelligence-based evidence collection system that analyzes numerous image files reported by citizens in real time to visually check the location, user information, and shooting time of the image files. When this system is applied, it is expected that the evidence expected data collected in real time can be actually used as evidence, and it is also expected that the risk area analysis will be possible through big data analysis.

Digital Library Technologies and Information Infrastructure

  • Hyun, Soon-J.
    • Proceedings of the Korea Database Society Conference
    • /
    • 1998.09a
    • /
    • pp.101-114
    • /
    • 1998
  • Digital Library Definitions; A library that has been extended and enhanced by the application of digital technology. Contents and services accessible and deliverable via electronic networks to and from the worldwide libraries and commercial information resources. A large, organized collection of multimedia information for providing users of a community with coherent access to certain information services. A realistic means to build an Information Infrastructure for advanced Internet services of the future. more …(omitted)

  • PDF