• Title/Summary/Keyword: Meaning Network

Search Result 350, Processing Time 0.024 seconds

A Study on the Multilevel Electronic Commerce Security using Scalable Multicast (확장 멀티캐스트를 이용한 다중레벨 전자상거래 보안에 관한 연구)

  • 서장원
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.1
    • /
    • pp.66-74
    • /
    • 2002
  • Through the increment of requirement for EC(Electronic Commerce) oriented communication services, security multicast communications is becoming more important. However, multicast to EC environment is much different from unicast concept most network security protocols. On the network security, using mandatory access control of multilevel architecture which assigns a specific meaning to each subject, so we accomplish access control. In this way, access control security based on the information security level is proposed. A security protocol based on the architecture proposed in this paper would be utilized in security multicast communications, group key management service and leveled security service through multilevel EC security policy, Also we discuss and propose the security level scaleability and key management method on the network.

  • PDF

Implementation of Message Service for TCN Protocol (전동차용 네트웍 프로토콜의 메세지 서비스의 구현)

  • Park, Hong-Sung;Jin, Chang-Ki;Park, Geun-Pyo;Kim, Hyung-Yuk;Yoon, Gun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.133-133
    • /
    • 2000
  • This paper implements Message Service of TCN or IEC 61375-1. TCN is divided into two services, Variable and Message Service. Variable Service uses the broadcasting method with Source Address, but Message Service uses peer-to-peer method with Destination Address and has OSI 7 Layer. In TCN, interface between Transport and Network Layer has not been defined and Meaning of Packet Pool has not been defined exactly. Therefore, this paper proposes the Implementation method for both the interface between Transport and Network Layer and the packet pool for Message Service of TCN.

  • PDF

Developing Trend of an Ubiquitous Interface Technologies (유비쿼터스 인터페이스 기술의 개발 동향)

  • Lee, Hyeon-Jae;O, Chang-Heon
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2005.11a
    • /
    • pp.299-311
    • /
    • 2005
  • This article introduces developing trends of an "Ubiquitous Interface" as an access method for use of various network resources, such as public wireless networks and un-licensed wireless networks in ubiquitous sensor network environments, without troublesome settings or operations by users. "Ubiquitous Interface" is include a relatively wide sense meaning not only physical interface of specified device or between processors, but anything method for access USN. These "Ubiquitous Interface" able to provide seamless services that adapt autonomously to the user's movements and changes in the state of wireless resources. Recently, strongly recommended candidates are RFID, NFC, Multi-mode mobile terminal, Wearable computer and OSGi for integrated digital home networking system as a future ubiquitous interface. These candidates are have to have flexibility and multiple physical communication channel for seamless service hand over and serve easy connection at huge USN to user. And, must have flexible software structure and multi-functional middleware. Consequently, for more enhance performance of an ubiquitous interface and developing, need more structured and integrated future plan.

  • PDF

Automatic import system of NE MIB for network management at NMS based on SNMP (SNMP 기반 NMS에서 네트웍 관리를 위한 NE MIB의 자동 Import System 설계)

  • 강광석;김영진;박상대;정성현;조종신
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.109-112
    • /
    • 2002
  • SNMP is generally used protocol for network management. SNMP need MIB for exchanging management information But, method for sharing MIB is not automatic. General MIB sharing architecture is done by network management operator by manually. In this paper we describe exchanging MIB automatically using meta-MIB. We will formalize SMI as MIB structure. This meta MIB represent information about MIB of NE Agent. Meta MIB has Information of object in the MIB, Structure and index information fur columnar object, meaning of subtype at INTEGER syntax. Also, trap related information is represented too. In this paper, MIB information is represented as instance of meta MIB. This architecture will provide a method for automatic MIB exchanging

  • PDF

Seeking Safety Network Organized in the Area of Disaster Management (재난관리 영역에서 안전네트워크 체계화 모색)

  • Lee, Jung-Il
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.2
    • /
    • pp.43-49
    • /
    • 2011
  • New governance in the area of disaster management(New Governance) of the Safety Building in the form of public-private network as required in this era, SWOT can provide a strategic way to build public-private partnership recognized the necessity for a more efficient way. Between government agencies, private organizations and government and private organizations for the network between the systematic approach based on mutual trust, and participation by the activation of the meaning of seeing places studied. Partnership for Disaster Management as a result of the settlement than if the existing disaster management system for disaster response system more effective and efficient functioning in reducing human and material damage is expected to contribute are getting out.

Visualized Preference Transition Network Based on Recency and Frequency

  • Masruri, Farid;Tsuji, Hiroshi;Saga, Ryosuke
    • Industrial Engineering and Management Systems
    • /
    • v.10 no.4
    • /
    • pp.238-246
    • /
    • 2011
  • Given a directed graph, we can determine how the user's preference moves from one product item to another. In this graph called "preference transition network", each node represents the product item while its edge pointing to the other nodes represents the transition of user's preference. However, with the large number of items make the network become more complex, unclear and difficult to be interpreted. In order to address this problem, this paper proposes a visualization technique in preference transition analysis based on recency and frequency. By adapting these two elements, the semantic meaning of each item and its transition can be clearly identified by its different types of node size, color and edge style. The experiment in a sales data has shown the results of the proposed approach.

Optimal Condition Gain Estimation of PID Controller using Neural Networks (신경망을 이용한 PID 제어기의 제어 사양 최적의 이득값 추정)

  • Son, Jun-Hyeok;Seo, Bo-Hyeok
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.717-719
    • /
    • 2003
  • Recently Neural Network techniques have widely used in adaptive and learning control schemes for production systems. However, generally it costs a lot of time for learning in the case applied in control system. Furthermore, the physical meaning of neural networks constructed as a result is not obvious. And in practice since it is difficult to the PID gains suitably lots of researches have been reported with respect to turning schemes of PID gains. A Neural Network-based PID control scheme is proposed, which extracts skills of human experts as PID gains. This controller is designed by using three-layered neural networks. The effectiveness of the proposed Neural Network-based PID control scheme is investigated through an application for a production control system. This control method can enable a plant to operate smoothy and obviously as the plant condition varies with any unexpected accident.

  • PDF

Convergence Progress about Applied Gain of PID Controller using Neural Networks (신경망을 이용한 PID 제어기 이득값 적용에 대한 수렴 속도 향상)

  • Son, Jun-Hyug;Seo, Bo-Hyeok
    • Proceedings of the KIEE Conference
    • /
    • 2004.05a
    • /
    • pp.89-91
    • /
    • 2004
  • Recently Neural Network techniques have widely used in adaptive and learning control schemes for production systems. However, generally it costs a lot of time for learning in the case applied in control system. Furthermore, the physical meaning of neural networks constructed as a result is not obvious. And in practice since it is difficult to the PID gains suitably lots of researches have been reported with respect to turning schemes of PID gains. A Neural Network-based PID control scheme is proposed, which extracts skills of human experts as PID gains. This controller is designed by using three-layered neural networks. The effectiveness of the proposed Neural Network-based PID control scheme is investigated through an application for a production control system. This control method can enable a plant to operate smoothy and obviously as the plant condition varies with any unexpected accident. This paper goal is convergence speed progress about applied gain of PID controller using the neural networks.

  • PDF

Fake News Detection Using Deep Learning

  • Lee, Dong-Ho;Kim, Yu-Ri;Kim, Hyeong-Jun;Park, Seung-Myun;Yang, Yu-Jun
    • Journal of Information Processing Systems
    • /
    • v.15 no.5
    • /
    • pp.1119-1130
    • /
    • 2019
  • With the wide spread of Social Network Services (SNS), fake news-which is a way of disguising false information as legitimate media-has become a big social issue. This paper proposes a deep learning architecture for detecting fake news that is written in Korean. Previous works proposed appropriate fake news detection models for English, but Korean has two issues that cannot apply existing models: Korean can be expressed in shorter sentences than English even with the same meaning; therefore, it is difficult to operate a deep neural network because of the feature scarcity for deep learning. Difficulty in semantic analysis due to morpheme ambiguity. We worked to resolve these issues by implementing a system using various convolutional neural network-based deep learning architectures and "Fasttext" which is a word-embedding model learned by syllable unit. After training and testing its implementation, we could achieve meaningful accuracy for classification of the body and context discrepancies, but the accuracy was low for classification of the headline and body discrepancies.

A Study on the Operational Performance by the Investment Level of Companies Information Security in the Digital Transformation(DX) Era (디지털 전환(DX) 시대에 기업의 정보보안 투자 수준에 따른 운영성과에 관한 연구)

  • Jung Byoungho;Joo Hyungkun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.1
    • /
    • pp.119-131
    • /
    • 2024
  • The purpose of this study is to examine the operational performances by the investment level of information security in companies. The theoretical background summarized the meaning of information security, management information security, and network security. The research process was carried out in four stages. As a result of the analysis, the level of information security was classified into four groups, and the difference in operational performance was confirmed. According to the categorical regression analysis of the three dependent variables, independent variables such as network threats, non-network threats, executive information security awareness, industry, organizational size, and information security education all affected information security regulations, in-house information security checks, and information security budget investments. The theoretical implications of this study have contributed to updating the latest information security theory. Practical implications are that rational investments should be made on the level of information security of companies.