• 제목/요약/키워드: Proxy data

검색결과 393건 처리시간 0.025초

The Impact of Name Ambiguity on Properties of Coauthorship Networks

  • Kim, Jinseok;Kim, Heejun;Diesner, Jana
    • Journal of Information Science Theory and Practice
    • /
    • 제2권2호
    • /
    • pp.6-15
    • /
    • 2014
  • Initial based disambiguation of author names is a common data pre-processing step in bibliometrics. It is widely accepted that this procedure can introduce errors into network data and any subsequent analytical results. What is not sufficiently understood is the precise impact of this step on the data and findings. We present an empirical answer to this question by comparing the impact of two commonly used initial based disambiguation methods against a reasonable proxy for ground truth data. We use DBLP, a database covering major journals and conferences in computer science and information science, as a source. We find that initial based disambiguation induces strong distortions in network metrics on the graph and node level: Authors become embedded in ties for which there is no empirical support, thus increasing their sphere of influence and diversity of involvement. Consequently, networks generated with initial-based disambiguation are more coherent and interconnected than the actual underlying networks, and individual authors appear to be more productive and more strongly embedded than they actually are.

Zero-Knowledge Realization of Software-Defined Gateway in Fog Computing

  • Lin, Te-Yuan;Fuh, Chiou-Shann
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.5654-5668
    • /
    • 2018
  • Driven by security and real-time demands of Internet of Things (IoT), the timing of fog computing and edge computing have gradually come into place. Gateways bear more nearby computing, storage, analysis and as an intelligent broker of the whole computing lifecycle in between local devices and the remote cloud. In fog computing, the edge broker requires X-aware capabilities that combines software programmability, stream processing, hardware optimization and various connectivity to deal with such as security, data abstraction, network latency, service classification and workload allocation strategy. The prosperous of Field Programmable Gate Array (FPGA) pushes the possibility of gateway capabilities further landed. In this paper, we propose a software-defined gateway (SDG) scheme for fog computing paradigm termed as Fog Computing Zero-Knowledge Gateway that strengthens data protection and resilience merits designed for industrial internet of things or highly privacy concerned hybrid cloud scenarios. It is a proxy for fog nodes and able to integrate with existing commodity gateways. The contribution is that it converts Privacy-Enhancing Technologies rules into provable statements without knowing original sensitive data and guarantees privacy rules applied to the sensitive data before being propagated while preventing potential leakage threats. Some logical functions can be offloaded to any programmable micro-controller embedded to achieve higher computing efficiency.

The Synchronization of ASEAN +3 Business Cycles: Prerequisites for Common Currency Union

  • RIYANTO, Feri Dwi;ERLANDO, Angga;HARYANTO, Tri
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제8권3호
    • /
    • pp.781-791
    • /
    • 2021
  • This study aims to analyze the relationship between the business cycles of the ASEAN +3 countries. In addition, the effects of the spillover value on the coincident indicators are determined. This study employs secondary data and uses multivariate time series of five ASEAN countries, namely, Indonesia, Malaysia, Singapore, Thailand, and the Philippines. The proxy was the real gross domestic product (GDP) collected annually from the CEIC, the IMF, and the World Bank for the period from 1964 to 2016. The data was plotted against two time periods, 1964-1998 as the pre-crisis period, and 1999-2016 as the post-crisis period. The index data was changed to the base year 2010. The data was subsequently separated from the trends and the cyclic components. The cyclic components were obtained by using Hondrick-Prescott filter, and them were further analyzed. The analytical method used was Contemporaneous and Cross-Correlation tools. The results showed that, before and after the crisis, the value of the business cycle correlation between ASEAN +3 countries was stronger and moved together at the same level of lag value. The implication of this research was an initial finding of the ASEAN +3 countries' prerequisites for the formation of a common currency.

차세대 검침 기반구조를 위한 스마트 미터 집중기 제어 프로토콜의 구현과 성능분석 (Implementation and Performance Evaluation of the Smart Meter Concentrator Control Protocol for Advanced Metering Infrastructure)

  • 장순건;최인지;박병석;김영현;윤종호
    • 대한전자공학회논문지TC
    • /
    • 제48권3호
    • /
    • pp.41-49
    • /
    • 2011
  • 본 논문에서는 스마트 전력량계 집중장치와 검침서버간에 사용할 수 있는 개방형 프로토콜을 제안하고 성능을 분석하였다. 기존의 집중장치는 DLMS/COSEM 표준프로토콜 기반에서 스마트 전력량계에 대한 연결설정 및 데이터 수집절차를 수행한다. 하지만 수집된 자료를 전달할 때 필요한 집중장치와 검침서버간에는 표준화된 프로토콜이 없어 제품마다 다양한 방식으로 구현되고 있다. 본 논문에서는 집중장치와 검침서버간의 프로토콜로 기존의 DLMS/COSEM 표준프로토콜을 확장한 개방형 프로토콜인 Smart Meter Concentrator Control Protocol(SMCCP)를 제안하였다. 이것은 집중장치로 하여금 검침서버를 대신하여 검침자료를 수집할 수 있는 프록시모드 뿐만 아니라 검침서버와 전력량계간의 직접 통신이 가능한 릴레이모드도 설정하고 자료를 수집할 수 있는 기능을 제공하도록 설계된 것이다. 본 논문에서는 이의 동작을 실증할 수 있는 에뮬레이터 및 프로토콜 분석도구를 구현하였다. 또한 각 모드에 대한 동작과 성능을 평가하기 위하여 OMNET++기반의 시뮬레이터를 구현하여 모드별 평균세션유지시간 및 통신링크 점유율을 측정하고 비교하였다.

클라우드 스토리지에서의 중요데이터 보호 (Securing Sensitive Data in Cloud Storage)

  • 이셜리;이훈재
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2011년도 춘계학술발표대회
    • /
    • pp.871-874
    • /
    • 2011
  • The fast emerging of network technology and the high demand of computing resources have prompted many organizations to outsource their storage and computing needs. Cloud based storage services such as Microsoft's Azure and Amazon's S3 allow customers to store and retrieve any amount of data, at anytime from anywhere via internet. The scalable and dynamic of the cloud storage services help their customer to reduce IT administration and maintenance costs. No doubt, cloud based storage services brought a lot of benefits to its customer by significantly reducing cost through optimization increased operating and economic efficiencies. However without appropriate security and privacy solution in place, it could become major issues to the organization. As data get produced, transferred and stored at off premise and multi tenant cloud based storage, it becomes vulnerable to unauthorized disclosure and unauthorized modification. An attacker able to change or modify data while data inflight or when data is stored on disk, so it is very important to secure data during its entire life-cycle. The traditional cryptography primitives for the purpose of data security protection cannot be directly adopted due to user's lose control of data under off premises cloud server. Secondly cloud based storage is not just a third party data warehouse, the data stored in cloud are frequently update by the users and lastly cloud computing is running in a simultaneous, cooperated and distributed manner. In our proposed mechanism we protect the integrity, authentication and confidentiality of cloud based data with the encrypt- then-upload concept. We modified and applied proxy re-encryption protocol in our proposed scheme. The whole process does not reveal the clear data to any third party including the cloud provider at any stage, this helps to make sure only the authorized user who own corresponding token able to access the data as well as preventing data from being shared without any permission from data owner. Besides, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data, our scheme also protect the data integrity by using hash function.

How to forecast solar flares, solar proton events, and geomagnetic storms

  • Moon, Yong Jae
    • 천문학회보
    • /
    • 제38권2호
    • /
    • pp.33-33
    • /
    • 2013
  • We are developing empirical space weather (solar flare, solar proton event, and geomagnetic storm) forecast models based on solar data. In this talk we will review our main results and recent progress. First, we have examined solar flare (R) occurrence probability depending on sunspot McIntosh classification, its area, and its area change. We find that sunspot area and its increase (a proxy of flux emergence) greatly enhance solar flare occurrence rates for several sunspot classes. Second, a solar proton event (S) forecast model depending on flare parameters (flare strength, duration, and longitude) as well as CME parameters (speed and angular width) has been developed. We find that solar proton event probability strongly depends on these parameters and CME speed is well correlated with solar proton flux for disk events. Third, we have developed an empirical storm (G) forecast model to predict probability and strength of a storm using halo CME - Dst storm data. For this we use storm probability maps depending on CME parameters such as speed, location, and earthward direction. We are also looking for geoeffective CME parameters such as cone model parameters and magnetic field orientation. We find that all superstorms (less than -200 nT) occurred in the western hemisphere with southward field orientations. We have a plan to set up a storm forecast method with a three-stage approach, which will make a prediction within four hours after the solar coronagraph data become available. We expect that this study will enable us to forecast the onset and strength of a geomagnetic storm a few days in advance using only CME parameters and the WSA-ENLIL model. Finally, we discuss several ongoing works for space weather applications.

  • PDF

The Effect of Corporate Integrity on Stock Price Crash Risk

  • YIN, Hong;ZHANG, Ruonan
    • Asian Journal of Business Environment
    • /
    • 제10권1호
    • /
    • pp.19-28
    • /
    • 2020
  • Purpose: This research aims to investigate the impact of corporate integrity on stock price crash risk. Research design, data, and methodology: Taking 1419 firms listed in Shenzhen Stock Exchange in China as a sample, this paper empirically analyzed the relationship between corporate integrity and stock price crash risk. The main integrity data was hand-collected from Shenzhen Stock Exchange Website. Other financial data was collected from CSMAR Database. Results: Findings show that corporate integrity can significantly decrease stock price crash risk. After changing the selection of samples, model estimation methods and the proxy variable of stock price crash risk, the conclusion is still valid. Further research shows that the relationship between corporate integrity and stock price crash risk is only found in firms with weak internal control and firms in poor legal system areas. Conclusions: Results of the study suggest that corporate integrity has a significant influence on behaviors of managers. Business ethics reduces the likelihood of managers to overstate financial performance and hide bad news, which leads to the low likelihood of future stock price crashes. Meanwhile, corporate integrity can supplement internal control and legal system in decreasing stock price crash risks.

Data Archive Project of 44-year Full Disk CaII K Images at Kyoto University

  • Kitai, Reizaburo;Uenoi, Satoru;Asai, Ayumi;Isobe, Hiroaki;Hayashi, Hiroo
    • 천문학회보
    • /
    • 제36권2호
    • /
    • pp.90.2-90.2
    • /
    • 2011
  • At Kyoto University, a continuous solar full-disk observation in CaII K line had been done during 44 years of 1926 - 1969. The observation was done with a Askania spectroheliograph on daily base. The images were taken on photographic plates. We started a project to archive these image data into a digital database which will be open to the public for scientific researches. One of the scientific usage of the database is to study the long term variation of the solar chromospheres. Since the area of CaII K plage area is a measure of solar chromospheric heating, we can do comparative study of the sunspot cycle and the chromospheric heating cycle of the sun. Another interesting field of scientific utilization of the database is the long term variation of the heating of terrestrial upper atmosphere. As was shown by Yokoyama, Masuda and Sato (2005), the area of the CaII K plage is a good proxy measure of solar EUV irradiation onto the upper atmosphere of the earth. Thus the completion of our database will serve to supply a basic and long-span data for upper atmospheric heating issues by the cooperative study with the Inter-university Upper atmosphere Global Observation NETwork (IUGONET) developed in Japan.

  • PDF

Relative contribution of geomagnetic and CO2 effects to global temperature anomaly

  • Kim, Jinhyun;Moon, Yong-Jae
    • 천문학회보
    • /
    • 제41권1호
    • /
    • pp.79.3-80
    • /
    • 2016
  • We have investigated the correlation analysis between global temperature anomaly and two main factors: geomagnetic activity (aa index) of Earth external factor and CO2 of Earth internal factor. For this, we used NOAA Global Surface Temperature anomaly (Ta) data from 1868 to 2015. The aa index indicates the geomagnetic activity measured at two anti-podal subauroral stations (Canberra Australia and Hartland England) and the CO2 data come from historical ice core records and NOAA/ESRL data. From the comparison between (Ta) and aa index, we found several interesting things, First, the linear correlation coefficient between two parameters increases until 1985 and then decreases rapidly. Second, the scattered plot between two parameters shows a boundary of the correlation tendency (positive and negative correlation) near 1985. A partial correlation of (Ta) and two main factors (aa index, CO2) also shows that the geomagnetic effect (aa index) is dominant until about 1985 and the CO2 effect becomes much more important after then. These results indicate that the CO2 effect become very an important factor since at least 1985. For a further analysis, we simply assume that Ta = Ta(aa)+Ta(CO2) and made a linear regression between (Ta) and aa index from 1868 to 2015. A linear model is then made from the linear regression between energy consumption (a proxy of CO2 effect) and Ta-Ta(aa) since 1985. Our results will be discussed in view of the prediction of global warming.

  • PDF

Indirect structural health monitoring of a simplified laboratory-scale bridge model

  • Cerda, Fernando;Chen, Siheng;Bielak, Jacobo;Garrett, James H.;Rizzo, Piervincenzo;Kovacevic, Jelena
    • Smart Structures and Systems
    • /
    • 제13권5호
    • /
    • pp.849-868
    • /
    • 2014
  • An indirect approach is explored for structural health bridge monitoring allowing for wide, yet cost-effective, bridge stock coverage. The detection capability of the approach is tested in a laboratory setting for three different reversible proxy types of damage scenarios: changes in the support conditions (rotational restraint), additional damping, and an added mass at the midspan. A set of frequency features is used in conjunction with a support vector machine classifier on data measured from a passing vehicle at the wheel and suspension levels, and directly from the bridge structure for comparison. For each type of damage, four levels of severity were explored. The results show that for each damage type, the classification accuracy based on data measured from the passing vehicle is, on average, as good as or better than the classification accuracy based on data measured from the bridge. Classification accuracy showed a steady trend for low (1-1.75 m/s) and high vehicle speeds (2-2.75 m/s), with a decrease of about 7% for the latter. These results show promise towards a highly mobile structural health bridge monitoring system for wide and cost-effective bridge stock coverage.