• Title/Summary/Keyword: Research Information Systems

Search Result 12,228, Processing Time 0.042 seconds

Ensemble Method for Predicting Particulate Matter and Odor Intensity (미세먼지, 악취 농도 예측을 위한 앙상블 방법)

  • Lee, Jong-Yeong;Choi, Myoung Jin;Joo, Yeongin;Yang, Jaekyung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.42 no.4
    • /
    • pp.203-210
    • /
    • 2019
  • Recently, a number of researchers have produced research and reports in order to forecast more exactly air quality such as particulate matter and odor. However, such research mainly focuses on the atmospheric diffusion models that have been used for the air quality prediction in environmental engineering area. Even though it has various merits, it has some limitation in that it uses very limited spatial attributes such as geographical attributes. Thus, we propose the new approach to forecast an air quality using a deep learning based ensemble model combining temporal and spatial predictor. The temporal predictor employs the RNN LSTM and the spatial predictor is based on the geographically weighted regression model. The ensemble model also uses the RNN LSTM that combines two models with stacking structure. The ensemble model is capable of inferring the air quality of the areas without air quality monitoring station, and even forecasting future air quality. We installed the IoT sensors measuring PM2.5, PM10, H2S, NH3, VOC at the 8 stations in Jeonju in order to gather air quality data. The numerical results showed that our new model has very exact prediction capability with comparison to the real measured data. It implies that the spatial attributes should be considered to more exact air quality prediction.

A Study on Security Capability of IDPS (침입 탐지 및 차단 시스템의 보안능력에 관한 연구)

  • Woo, Sung-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.9-15
    • /
    • 2012
  • With the rise of internet and e-commerce, this is more applicable now than ever. People rely on computer networks to provide them with news, stock prices, e-mail and online shopping. People's credit card details, medical records and other personal information are stored on computer systems. Many companies have a web presence as an essential part of their business. The research community uses computer systems to undertake research and to disseminate findings. The integrity and availability of all these systems have to be protected against a number of threats. Amateur hackers, rival corporations, terrorists and even foreign governments have the motive and capability to carry out sophisticated attacks against computer systems. Therefore, the field of information and communication security has become vitally important to the safety and economic well being of society as a whole. This paper provides an overview of IDS and IPS, their functions, detection and analysis techniques. It also presents comparison of security capability and characteristics of IDPS techniques. This will make basis of IDPS(Intrusion Detection and Protection System) technology integration for a broad-based IDPS solutions

An Adaptive Transmission Power Control Algorithm for Wearable Healthcare Systems Based on Variations in the Body Conditions

  • Lee, Woosik;Kim, Namgi;Lee, Byoung-Dai
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.593-603
    • /
    • 2019
  • In wearable healthcare systems, sensor devices can be deployed in places around the human body such as the stomach, back, arms, and legs. The sensors use tiny batteries, which have limited resources, and old sensor batteries must be replaced with new batteries. It is difficult to deploy sensor devices directly into the human body. Therefore, instead of replacing sensor batteries, increasing the lifetime of sensor devices is more efficient. A transmission power control (TPC) algorithm is a representative technique to increase the lifetime of sensor devices. Sensor devices using a TPC algorithm control their transmission power level (TPL) to reduce battery energy consumption. The TPC algorithm operates on a closed-loop mechanism that consists of two parts, such as sensor and sink devices. Most previous research considered only the sink part of devices in the closed-loop. If we consider both the sensor and sink parts of a closed-loop mechanism, sensor devices reduce energy consumption more than previous systems that only consider the sensor part. In this paper, we propose a new approach to consider both the sensor and sink as part of a closed-loop mechanism for efficient energy management of sensor devices. Our proposed approach judges the current channel condition based on the values of various body sensors. If the current channel is not optimal, sensor devices maintain their current TPL without communication to save the sensor's batteries. Otherwise, they find an optimal TPL. To compare performance with other TPC algorithms, we implemented a TPC algorithm and embedded it into sensor devices. Our experimental results show that our new algorithm is better than other TPC algorithms, such as linear, binary, hybrid, and ATPC.

Characteristic Classification and Correlational Analysis of Source-level Vulnerabilities in Linux Kernel (소스 레벨 리눅스 커널 취약점에 대한 특성 분류 및 상관성 분석)

  • Ko Kwangsun;Jang In-Sook;Kang Yong-hyeog;Lee Jin-Seok;Eom Young Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.3
    • /
    • pp.91-101
    • /
    • 2005
  • Although the studies on the analysis and classification of source-level vulnerabilities in operating systems are not direct and positive solutions to the exploits with which the host systems are attacked, It is important in that those studies can give elementary technologies in the development of security mechanisms. But, whereas Linux systems are widely used in Internet and intra-net environments recently, the information on the basic and fundamental vulnerabilities inherent in Linux systems has not been studied enough. In this paper, we propose characteristic classification and correlational analyses on the source-level vulnerabilities in Linux kernel that are opened to the public and listed in the SecurityFocus site for 6 years from 1999 to 2004. This study may contribute to expect the types of attacks, analyze the characteristics of the attacks abusing vulnerabilities, and verify the modules of the kernel that have critical vulnerabilities.

Design and Implementation of Peer-to-Peer Electronic Commerce Systems based on the File Sharing Method between Users (이용자간 파일공유방식에 기반한 P2P 전자상거래 시스템 설계 및 구현)

  • Kim Chang-Su;Seo Young-Suk
    • The Journal of Information Systems
    • /
    • v.15 no.1
    • /
    • pp.1-20
    • /
    • 2006
  • Peer-to-peer systems (P2P) are rapidly growing in importance on the Internet environment, quickly extending the range of their usage. However, peer-to-peer systems have not been widely applied in electronic commerce because they have not been established as an appropriate business model. Therefore, we firstly review the previous research relevant to peer-to-peer systems, and then analyze the business models for P2P systems presented by previous researchers. Furthermore, this study categorizes major issues in terms of the technical and business model aspects. On the basis of these reviews, we develop P2P electronic commerce systems based on the file sharing method between users, focusing on user interface friendliness. A developed P2P electronic commerce systems are programmed by using the C# based on the Microsoft.net solution. A database is implemented using the MSSQL2000. A main application technology is designed that P2P electronic commerce systems make it possible. for user to extend into BtoB Solution by using WSDL (Web Services Description Language), UDDI (Universal Description, Discovery, and Integration) and the XML that is a document for users. User interface is made as form of Internet messenger for a user's convenience and is possible to develop into a commodity transaction system based on XML. In this study, it is possible for the P2P electronic commerce system to have extended application to fields such as Internet shopping mall and property transaction in a nonprofit organization, a public institution and a large scale nonprofit institution that have a similar structure as compared with a structure of a nonprofit educational institution.

  • PDF

An Adaptive Equalization of Amplitude Chrominance Distortion by using the Variable Step-size Technique

  • Chutchavong, Vanvisa;Janchitrapongvej, Kanok;Benjangkaprasert, Chawalit;Sangaroon, Ornlarp
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.2065-2069
    • /
    • 2004
  • This paper presents an adaptive equalizer using finite impulse response (FIR) filter and least-mean square (LMS) algorithm. Herein, the variable step-size technique (VSLMS) for compensating the amplitude of chrominance signal is utilized. The proposed equalizer can be enhanced and compressed the chrominance signal at color subcarrier. The LMS algorithm employed in simplicity structure but gives slow convergence speed. Thus, the variable step-size is very attractive algorithm due to its computational efficiencies and the speed of convergence is improved. In addition, experimental results are carried out by using the modulated 20T sine squared test signal. It is shown here that the adaptive equalizer can be equalized the amplitude chrominance distortion in color television transmission without relative delay distortion.

  • PDF

Probabilistic Neural Network Based Learning from Fuzzy Voice Commands for Controlling a Robot

  • Jayawardena, Chandimal;Watanabe, Keigo;Izumi, Kiyotaka
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.2011-2016
    • /
    • 2004
  • Study of human-robot communication is one of the most important research areas. Among various communication media, any useful law we find in voice communication in human-human interactions, is significant in human-robot interactions too. Control strategy of most of such systems available at present is on/off control. These robots activate a function if particular word or phrase associated with that function can be recognized in the user utterance. Recently, there have been some researches on controlling robots using information rich fuzzy commands such as "go little slowly". However, in those works, although the voice command interpretation has been considered, learning from such commands has not been treated. In this paper, learning from such information rich voice commands for controlling a robot is studied. New concepts of the coach-player model and the sub-coach are proposed and such concepts are also demonstrated for a PA-10 redundant manipulator.

  • PDF

A Query Expansion Technique using Query Patterns in QA systems (QA 시스템에서 질의 패턴을 이용한 질의 확장 기법)

  • Kim, Hea-Jung;Bu, Ki-Dong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.1
    • /
    • pp.1-8
    • /
    • 2007
  • When confronted with a query, question answering systems endeavor to extract the most exact answers possible by determining the answer type that fits with the key terms used in the query. However, the efficacy of such systems is limited by the fact that the terms used in a query may be in a syntactic form different to that of the same words in a document. In this paper, we present an efficient semantic query expansion methodology based on query patterns in a question category concept list comprised of terms that are semantically close to terms used in a query. The proposed system first constructs a concept list for each question type and then builds the concept list for each question category using a learning algorithm. The results of the present experiments suggest the promise of the proposed method.

  • PDF

Interactivity and User-Centered Design Strategies of Instructional Systems used in Web Environments (학습자 중심 웹 기반 교수-학습체제의 설계전략과 상호작용성)

  • Kim, Mi-Ryang
    • Journal of The Korean Association of Information Education
    • /
    • v.3 no.1
    • /
    • pp.13-21
    • /
    • 1999
  • 'Interactivity' is considered as a key factor of user-centered interactive instructional systems design in Web environments. To provide an optimal level of interactivity for learners is an ideal goal in instructional systems design(ISD) process. Based on the primary concern of interactive systems design which pursues how the power of interactivity can be utilized and put to work, several interactive design strategies in Web-based systems are recommended through this research.

  • PDF

A Study on the Performance Factors of File System in General Purposed Embedded Systems (범용 임베디드 시스템에서 파일 시스템의 성능 인자 연구)

  • Choi, Jin-oh;Kim, Soo-hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.187-189
    • /
    • 2012
  • The embedded systems commonly equip a file system as default to keep data. This file system is mostly constructed with flash memory as the price get lower and the performance get higher. Types of the file system implemented on the flash memory are various according to types of embedded operating systems. By the way, as the embedded systems increasingly depend on the file system, a selection of the file system type of the embedded systems influences the performance of the entire system. This thesis discusses the factors to influence the performance of entire system in construction of file system and selection of the types, and discusses the research results.

  • PDF