• Title/Summary/Keyword: Real name using

Search Result 96, Processing Time 0.028 seconds

QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF);Service Security Model for Privacy

  • Choi, Byeong-Cheol;Kim, Kwang-Sik;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1586-1589
    • /
    • 2005
  • GUMF (Global User Management Framework) that is proposed in this research can be applied to next generation network such as BcN (Broadband convergence Network), it is QoS guaranteed security framework for user that can solve present Internet's security vulnerability. GUMF offers anonymity for user of service and use the user's real-name or ID for management of service and it is technology that can realize secure QoS. GUMF needs management framework, UMS (User Management System), VNC (Virtual Network Controller) etc. UMS consists of root UMS in country dimension and Local UMS in each site dimension. VNC is network security equipment including VPN, QoS and security functions etc., and it achieves the QoSS (Quality of Security Service) and CLS(Communication Level Switching) functions. GUMF can offer safety in bandwidth consumption attacks such as worm propagation and DoS/DDoS, IP spoofing attack, and current most attack such as abusing of private information because it can offer the different QoS guaranteed network according to user's grades. User's grades are divided by 4 levels from Level 0 to Level 3, and user's security service level is decided according to level of the private information. Level 3 users that offer bio-information can receive secure network service that privacy is guaranteed. Therefore, GUMF that is proposed in this research can offer profit model to ISP and NSP, and can be utilized by strategy for secure u-Korea realization.

  • PDF

Disambiguation of Author Names Using Co-citation (동시인용정보를 이용한 동명이인 저자의 중의성 해소)

  • Kang, In-Su
    • Journal of Information Management
    • /
    • v.42 no.3
    • /
    • pp.167-186
    • /
    • 2011
  • Co-citation means that two or more studies are cited together by a later study. This paper deals with the relationship between co-citation and author disambiguation. Author disambiguation is to cluster same-name author instances into real-world individuals. Co-citation may influence author disambiguation in terms that two or more related research works performed by the same person may be co-cited by some later studies. This article describes automated steps to gather co-citation information from Google scholar, and proposes a new clustering algorithm to effectively integrate co-citation information with other author disambiguation features. Experiments showed that co-citation helps to improve the performance of author disambiguation.

A Review of Rear Axle Steering System Technology for Commercial Vehicles

  • Khan, Haroon Ahmad;Yun, So-Nam;Jeong, Eun-A;Park, Jeong-Woo;Yoo, Chung-Mok;Han, Sung-Min
    • Journal of Drive and Control
    • /
    • v.17 no.4
    • /
    • pp.152-159
    • /
    • 2020
  • This study reviews the rear or tag axle steering system's concepts and technology applied to commercial vehicles. Most commercial vehicles are large in size with more than two axles. Maneuvering them around tight corners, narrow roads, and spaces is a difficult job if only the front axle is steerable. Furthermore, wear and tear in tires will increase as turn angle and number of axles are increased. This problem can be solved using rear axle steering technology that is being used in commercial vehicles nowadays. Rear axle steering system technology uses a cylinder mounted on one of rear axles called a steering cylinder. Cylinder control is the primary objective of the real axle steering system. There are two types of such steering mechanisms. One uses master and slave cylinder concept while the other concept is relatively new. It goes by the name of smart axle, self-steered axle, or smart steering axle driven independently from the front wheel steering. All these different types of steering mechanisms are discussed in this study with detailed description, advantages, disadvantages, and safety considerations.

INTEGRATED LIFE-CYCLE COST ANALYSIS CONSIDERING ENVIRONMENTAL COSTS: A HIGHWAY PROJECT CASE

  • Woo-Sik Jang;Heedae Park;Sungmin Kim;Seung Heon Han;Jong Seo Jeon
    • International conference on construction engineering and project management
    • /
    • 2011.02a
    • /
    • pp.273-279
    • /
    • 2011
  • Concerns over the environment have spawned a number of research studies in the construction industry, as the construction of built environments and large infrastructures involves diverse environmental impacts and loads of hazardous emissions. Many researchers have attempted to quantify these environmental loads, including greenhouse gases, carbon dioxide, nitrogen dioxide, and sulfur dioxide, to name a few. However, little research has been conducted regarding integrating the life-cycle assessment (LCA) of environmental loads with the current life-cycle cost analysis (LCCA) approach. This study aims to estimate the environmental loads as a monetary value using the European Climate Exchange (ECX) rate and, then, to integrate those impacts with the pure construction cost. Toward this end, this study suggests an integrated approach that takes into account the environmental effect on the evaluation of the life-cycle cost (LCC). The bill of quantity (BOQ) data of a real highway project are collected and analyzed for this purpose. As a result, considering the environmental loads in the pavement process, the total LCC increased 16% from the traditional LCC cost. This study suggests an integrated approach that will account the environmental effect on the LCC. Additionally, this study is expected to contribute to better decision-making, from the perspective of more sustainable development, for government as well as for contractors.

  • PDF

Real-time position tracking of traffic ships by ARPA radar and AIS in Busan Harbor, Korea (부산항에서 ARPA 레이더와 AIS에 의한 통한선박의 실시간 위치추적)

  • Lee, Dae-Jae
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.44 no.3
    • /
    • pp.229-238
    • /
    • 2008
  • This paper describes on the consolidation of AIS and ARPA radar positions by comparing the AIS and ARPA radar information for the tracked ship targets using a PC-based ECDIS in Busan harbor, Korea. The information of AIS and ARPA radar target was acquired independently, and the tracking parameters such as ship's position, COG, SOG, gyro heading, rate of turn, CPA, TCPA, ship s name and MMSI etc. were displayed automatically on the chart of a PC-based ECDIS with radar overlay and ARPA tracking. The ARPA tracking information obtained from the observed radar images of the target ship was compared with the AIS information received from the same vessel to investigate the difference in the position and movement behavior between AIS and ARPA tracked target ships. For the ARPA radar and AIS targets to be consolidated, the differences in range, speed, course, bearing and distance between their targets were estimated to obtain a clear standards for the consolidation of ARPA radar and AIS targets. The average differences between their ranges, their speeds and their courses were 2.06% of the average range, -0.11 knots with the averaged SOG of 11.62 knots, and $0.02^{\circ}$ with the averaged COG of $37.2^{\circ}$, respectively. The average differences between their bearings and between their positions were $-1.29^{\circ}$ and 68.8m, respectively. From these results, we concluded that if the ROT, COG, SOG, and HDG informations are correct, the AIS system can be improved the prediction of a target ship's path and the OOW(Officer of Watch) s ability to anticipate a traffic situation more accurately.

Smart Warehouse Management System Utilizing IoT-based Autonomous Mobile Robot for SME Manufacturing Factory (중소제조기업을 위한 IoT기반의 자율이동모듈을 활용한 스마트 창고관리 시스템 개발)

  • Kim, Jeong-A;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.237-244
    • /
    • 2018
  • The Smart Factory level of manufacturing factories of SMEs now lacks a system for grasping the accurate inventory amount associated with inventory movements in managing warehouses at the basic level. Also, it is difficult to manage accurate materials for loss of data due to worker manual work and production method due to experience. In order to solve this problem, in this paper, automatic acquisition of inventory to minimize manual work to grasp workers' Inventory and improve automation is done. In the smart warehouse management system using the IoT-based autonomous mobile module, the autonomous mobile module acquires the data of the inventory storage while moving through the line. In order to grasp the material of the Inventory storage, The Camera module recognizes the name of the inventory storage. And Then, If output matches, the data measured by the sensor is transferred to the server. This data can be processed, saved in a database, and real-time inventory quantity and location can be grasped in a web-based monitoring environment for administrators. The Real-time Automatic Inventory (RAIC) systems is reduce manual tasks and expect the effects of automated inventory management systems.

Implementation of EPICS based control system for KSTAR Current Lead System (KSTAR 전류전송제어시스템의 원격운전을 위한 EPICS 기반 제어계 구축)

  • Kim, Myung-Kyu;Baek, S.H.;Kim, K.H.;Park, M.K.
    • Journal of the Korean Vacuum Society
    • /
    • v.17 no.1
    • /
    • pp.58-66
    • /
    • 2008
  • The KSTAR Current Lead System(CLS) with network based real-time distributed control system is implemented using an EPICS as a middle-ware software. The current lead system transfers current from magnet power supplies to superconducting magnet system and simultaneously supply the coolant to maintain superconducting state. To control the CLS at main control room an EPICS IOC server is installed in local control area. Using this server, it is able to be controlled and monitored the system in main control room through operator interface(OPI) which uses "caget" to read status and "caput" to write command with a unique name called PV. The EPICS IOC is developed using "ether-ip" driver to communicate with PLC. Also we achieved satisfactory results in operation and stability aspects from a long period commissioning test.

A Study on Strengthening Personal Information Sovereignty through Analysis of Domestic Service Cases and Research Projects of Self-Sovereign Identity Technology (자기주권신원기술의 국내 서비스 사례 및 연구 과제 분석을 통한 개인정보 주권 강화 방안연구)

  • Lee, Jeong-Hyeon;Kim, Ji-Won;Kim, Chul-Soo;Yang, Jin-hong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.575-589
    • /
    • 2020
  • Along with the exponential growth of data businesses, the importance of data containing personal information of use have also increaseing. Particularly, in Korea, as the Data 3 Act was implemented, companies can use personal information more actively through regulatory improvement and stipulation in case of using data containing personal information. In this situation as per the service use, self-sovereign identity technology has emerged that can minimize the provision of personal information in relation to real name authentication and provision of personal information. Recently, services and studies using blockchain have been actively conducted in case of using the self-sovereign identity function for clarity and verification of records according to the use of personal information. In this thesis, by analyzing the characteristics of domestic self-sovereign identity service and the current status and contents of research related to blockchain-based self-sovereign identity technology and we suggest a research direction based on self-sovereign identity technology to reinforce the sovereignty of personal information in the era of the 3rd Data Act do.

Development of Information Extraction System from Multi Source Unstructured Documents for Knowledge Base Expansion (지식베이스 확장을 위한 멀티소스 비정형 문서에서의 정보 추출 시스템의 개발)

  • Choi, Hyunseung;Kim, Mintae;Kim, Wooju;Shin, Dongwook;Lee, Yong Hun
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.4
    • /
    • pp.111-136
    • /
    • 2018
  • In this paper, we propose a methodology to extract answer information about queries from various types of unstructured documents collected from multi-sources existing on web in order to expand knowledge base. The proposed methodology is divided into the following steps. 1) Collect relevant documents from Wikipedia, Naver encyclopedia, and Naver news sources for "subject-predicate" separated queries and classify the proper documents. 2) Determine whether the sentence is suitable for extracting information and derive the confidence. 3) Based on the predicate feature, extract the information in the proper sentence and derive the overall confidence of the information extraction result. In order to evaluate the performance of the information extraction system, we selected 400 queries from the artificial intelligence speaker of SK-Telecom. Compared with the baseline model, it is confirmed that it shows higher performance index than the existing model. The contribution of this study is that we develop a sequence tagging model based on bi-directional LSTM-CRF using the predicate feature of the query, with this we developed a robust model that can maintain high recall performance even in various types of unstructured documents collected from multiple sources. The problem of information extraction for knowledge base extension should take into account heterogeneous characteristics of source-specific document types. The proposed methodology proved to extract information effectively from various types of unstructured documents compared to the baseline model. There is a limitation in previous research that the performance is poor when extracting information about the document type that is different from the training data. In addition, this study can prevent unnecessary information extraction attempts from the documents that do not include the answer information through the process for predicting the suitability of information extraction of documents and sentences before the information extraction step. It is meaningful that we provided a method that precision performance can be maintained even in actual web environment. The information extraction problem for the knowledge base expansion has the characteristic that it can not guarantee whether the document includes the correct answer because it is aimed at the unstructured document existing in the real web. When the question answering is performed on a real web, previous machine reading comprehension studies has a limitation that it shows a low level of precision because it frequently attempts to extract an answer even in a document in which there is no correct answer. The policy that predicts the suitability of document and sentence information extraction is meaningful in that it contributes to maintaining the performance of information extraction even in real web environment. The limitations of this study and future research directions are as follows. First, it is a problem related to data preprocessing. In this study, the unit of knowledge extraction is classified through the morphological analysis based on the open source Konlpy python package, and the information extraction result can be improperly performed because morphological analysis is not performed properly. To enhance the performance of information extraction results, it is necessary to develop an advanced morpheme analyzer. Second, it is a problem of entity ambiguity. The information extraction system of this study can not distinguish the same name that has different intention. If several people with the same name appear in the news, the system may not extract information about the intended query. In future research, it is necessary to take measures to identify the person with the same name. Third, it is a problem of evaluation query data. In this study, we selected 400 of user queries collected from SK Telecom 's interactive artificial intelligent speaker to evaluate the performance of the information extraction system. n this study, we developed evaluation data set using 800 documents (400 questions * 7 articles per question (1 Wikipedia, 3 Naver encyclopedia, 3 Naver news) by judging whether a correct answer is included or not. To ensure the external validity of the study, it is desirable to use more queries to determine the performance of the system. This is a costly activity that must be done manually. Future research needs to evaluate the system for more queries. It is also necessary to develop a Korean benchmark data set of information extraction system for queries from multi-source web documents to build an environment that can evaluate the results more objectively.

A Study on Schemes to Case Analysis and Cope with Online Game Crimes (온라인 게임범죄의 사례분석과 대응방안)

  • Yoo Yong-Bong
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.9
    • /
    • pp.85-97
    • /
    • 2006
  • Schemes to case analysis and cope with on-line game crimes net supervision system, a real name confirmation process, and a self-examination system to check by themselves if they are addicted to on-line games with a view to prevent the addiction. In addition, this study found that general precuations should comprise measures to change the awareness of the users of the internet and to establish their ethical senses because most on-line garners are not aware that their actions are a crime and believe their crimes are not disclosed to the outsiders.

  • PDF