• Title/Summary/Keyword: Space information network

Search Result 1,269, Processing Time 0.027 seconds

A Semantic Service Discovery Network for Large-Scale Ubiquitous Computing Environments

  • Kang, Sae-Hoon;Kim, Dae-Woong;Lee, Young-Hee;Hyun, Soon-J.;Lee, Dong-Man;Lee, Ben
    • ETRI Journal
    • /
    • v.29 no.5
    • /
    • pp.545-558
    • /
    • 2007
  • This paper presents an efficient semantic service discovery scheme called UbiSearch for a large-scale ubiquitous computing environment. A semantic service discovery network in the semantic vector space is proposed where services that are semantically close to each other are mapped to nearby positions so that the similar services are registered in a cluster of resolvers. Using this mapping technique, the search space for a query is efficiently confined within a minimized cluster region while maintaining high accuracy in comparison to the centralized scheme. The proposed semantic service discovery network provides a number of novel features to evenly distribute service indexes to the resolvers and reduce the number of resolvers to visit. Our simulation study shows that UbiSearch provides good semantic searchability as compared to the centralized indexing system. At the same time, it supports scalable semantic queries with low communication overhead, balanced load distribution among resolvers for service registration and query processing, and personalized semantic matching.

  • PDF

An Analysis on the Evolutionary Characteristics of Ubiquitous City through Evolutionary Map of Ubiquitous City (유시티 진화 지도를 통한 유시티 진화 특성 분석)

  • JO, Sung-Soo;LEE, Sang-Ho;LEEM, Youn-Taik
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.18 no.2
    • /
    • pp.75-91
    • /
    • 2015
  • This study aims to analyse the U-City characteristics through the U-City historical mapping. The U-City characteristics were analysed by building the U-City historical map in terms of STIM model which consists of service, technology, infrastructure and management. The data for analysis is the National Informatization White Paper published by the NIA (National Information Society Agency) from 2002 to 2013. As a result, first, the U-City service were evolved from administration informatization, enterprise informatization, administration/living informatization and administration/space/private informatization through the intelligence facilities and space. Second, the U-City technology were changed through wire network, sensor/network, processing/super-highway network, convergence of network/security. Third, the U-City infrastructure have had evolutionary process such as wire computer network, wire/wireless network, intellectualization facility and intelligent facility space. Forth, the U-City management were carried out with making the unit network/infrastructure management, information connection/operating management and information integration/participation management. Therefore, the history of U-City has been making rapid development in government computerization, computer oriented society, information city and ubiquitous city.

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data

  • Lin, Weiwei;Yang, Chaofan;Zhang, Zeqing;Xue, Xingsi;Haga, Reiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4531-4544
    • /
    • 2021
  • Because the traditional network information security vulnerability risk assessment method does not set the weight, it is easy for security personnel to fail to evaluate the value of information security vulnerability risk according to the calculation value of network centrality, resulting in poor evaluation effect. Therefore, based on the network security data element feature system, this study designed a quantitative assessment method of network information security vulnerability detection risk under single transmission state. In the case of single transmission state, the multi-dimensional analysis of network information security vulnerability is carried out by using the analysis model. On this basis, the weight is set, and the intrinsic attribute value of information security vulnerability is quantified by using the qualitative method. In order to comprehensively evaluate information security vulnerability, the efficacy coefficient method is used to transform information security vulnerability associated risk, and the information security vulnerability risk value is obtained, so as to realize the quantitative evaluation of network information security vulnerability detection under single transmission state. The calculated values of network centrality of the traditional method and the proposed method are tested respectively, and the evaluation of the two methods is evaluated according to the calculated results. The experimental results show that the proposed method can be used to calculate the network centrality value in the complex information security vulnerability space network, and the output evaluation result has a high signal-to-noise ratio, and the evaluation effect is obviously better than the traditional method.

Multiobjective Space Search Optimization and Information Granulation in the Design of Fuzzy Radial Basis Function Neural Networks

  • Huang, Wei;Oh, Sung-Kwun;Zhang, Honghao
    • Journal of Electrical Engineering and Technology
    • /
    • v.7 no.4
    • /
    • pp.636-645
    • /
    • 2012
  • This study introduces an information granular-based fuzzy radial basis function neural networks (FRBFNN) based on multiobjective optimization and weighted least square (WLS). An improved multiobjective space search algorithm (IMSSA) is proposed to optimize the FRBFNN. In the design of FRBFNN, the premise part of the rules is constructed with the aid of Fuzzy C-Means (FCM) clustering while the consequent part of the fuzzy rules is developed by using four types of polynomials, namely constant, linear, quadratic, and modified quadratic. Information granulation realized with C-Means clustering helps determine the initial values of the apex parameters of the membership function of the fuzzy neural network. To enhance the flexibility of neural network, we use the WLS learning to estimate the coefficients of the polynomials. In comparison with ordinary least square commonly used in the design of fuzzy radial basis function neural networks, WLS could come with a different type of the local model in each rule when dealing with the FRBFNN. Since the performance of the FRBFNN model is directly affected by some parameters such as e.g., the fuzzification coefficient used in the FCM, the number of rules and the orders of the polynomials present in the consequent parts of the rules, we carry out both structural as well as parametric optimization of the network. The proposed IMSSA that aims at the simultaneous minimization of complexity and the maximization of accuracy is exploited here to optimize the parameters of the model. Experimental results illustrate that the proposed neural network leads to better performance in comparison with some existing neurofuzzy models encountered in the literature.

A Study on the Feature of Dwelling Space to Ubiquitous Environment (유비쿼터스 환경에서의 주거공간 특성에 관한 연구)

  • Lee, Sang-Won;Han, Young-Ho
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2005.05a
    • /
    • pp.88-92
    • /
    • 2005
  • The Ubiquitous life is not a life style that exists in a science fiction or in a far distance future anymore. The Combination of electronic and physical space, this new type of space was created by the ubiquitous network system, and this system will offer us new life style. Also the pattern of our living will be changed by the information that has obtained from this ubiquitous network system. By offering a new way of communication from the ubiquitous surrounding, our life style such as shopping, medical treatment, banking, and working conditions and a notion such as the preference in a job title would have shifted. This study have arrived at the development of the high technology, in other words Ubiquitous age , I have considered the notion of home-network that have observed by the preceding investigators as well as the theoretical consideration of residential space in ubiquitous surrounding. After I look into the usages and examples of residential space in ubiquitous surrounding of today's society, I hope that this would be helpful for the design that strives for the comfortable living in this ubiquitous age.

  • PDF

BPNN Algorithm with SVD Technique for Korean Document categorization (한글문서분류에 SVD를 이용한 BPNN 알고리즘)

  • Li, Chenghua;Byun, Dong-Ryul;Park, Soon-Choel
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.2
    • /
    • pp.49-57
    • /
    • 2010
  • This paper proposes a Korean document. categorization algorithm using Back Propagation Neural Network(BPNN) with Singular Value Decomposition(SVD). BPNN makes a network through its learning process and classifies documents using the network. The main difficulty in the application of BPNN to document categorization is high dimensionality of the feature space of the input documents. SVD projects the original high dimensional vector into low dimensional vector, makes the important associative relationship between terms and constructs the semantic vector space. The categorization algorithm is tested and compared on HKIB-20000/HKIB-40075 Korean Text Categorization Test Collections. Experimental results show that BPNN algorithm with SVD achieves high effectiveness for Korean document categorization.

Differences in Network-Based Kernel Density Estimation According to Pedestrian Network and Road Centerline Network

  • Lee, Byoungkil
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.36 no.5
    • /
    • pp.335-341
    • /
    • 2018
  • The KDE (Kernel Density Estimation) technique in GIS (Geographic Information System) has been widely used as a method for determining whether a phenomenon occurring in space forms clusters. Most human-generated events such as traffic accidents and retail stores are distributed according to a road network. Even if events on forward and rear roads have short Euclidean distances, network distances may increase and the correlation between them may be low. Therefore, the NKDE (Network-based KDE) technique has been proposed and applied to the urban space where a road network has been developed. KDE is being studied in the field of business GIS, but there is a limit to the microscopic analysis of economic activity along a road. In this study, the NKDE technique is applied to the analysis of urban phenomena such as the density of shops rather than traffic accidents that occur on roads. The results of the NKDE technique are also compared to pedestrian networks and road centerline networks. The results show that applying NKDE to microscopic trade area analysis can yield relatively accurate results. In addition, it was found that pedestrian network data that can consider the movement of actual pedestrians are necessary for accurate trade area analysis using NKDE.

A Study on Living Space with the Internet Information Appliances (인터넷 정보가전을 활용한 주거공간 연구)

  • 전흥수;김주연
    • Korean Institute of Interior Design Journal
    • /
    • no.28
    • /
    • pp.44-50
    • /
    • 2001
  • This study propose the new concept of residence by analyzing the change of residence through the characteristic of popularity and degree of development of technology on home network information appliance for intelligent home. Accordingly, Cyber village represented as home automation and extend to information of society. it encourage need of information and multimedia of home. It expect home information infrastructure for accepting informations, which make smart home to linked home-working home-learning home-treatment. home-shopping and home-banking. The system of intelligent home is the intelligence of human-biology in the side of environmental friendly and multi-function. it distinguish the system of security, controlling system of inside environment, supporting system of house-working, automatic controlling, house working. Future house require to meet demand of young generation, such as small residental space, the multi-functional space, the flexible space, making mood for dual income couple and of single as intelligent home. Accordingly, basic purpose which are pleasantness, the safe and the convenience the mobile multi-function as well as networking with controlling of temperature, security, health-test, home-entertainment, home-office and consider environment together.

  • PDF

A Study on Application Boundary of Wireless LAN's Communication for Space Variation

  • Cha Jin-Man;Kang Min-Soo;Park Yeoun-Sik
    • Journal of information and communication convergence engineering
    • /
    • v.4 no.2
    • /
    • pp.62-66
    • /
    • 2006
  • The objective of this thesis is to measure the limit of the real space where wireless Local Area Network (LAN) is used, and to apply this result as reference to set up a real Wireless LAN environment. The organized circumference was composed of Wireless LAN based on IEEE 802.11b of the American standard, and the examination is carried out on the campus. On the real condition of office environment and open space, the ratio of available distance to a signal at each distance was measured and this result was studied as data to embody wireless LAN on the campus. The measurement under an indoor environment was executed under circumstance having two walls and open space, however, was executed respectively under three circumstances: Where no obstacle, where one wall exists, and where two or more walls exist.

An Efficient User Authentication Scheme with Mobile Device in Wireless Network Environment (무선 네트워크 환경에서 모바일 디바이스 기반 효율적인 사용자 인증 기법)

  • Shin, Soobok;Yeh, Hongjin;Kim, Kangseok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.169-179
    • /
    • 2013
  • Recently, with rapid advances of mobile devices such as smart phone and wireless networking, a number of services using mobile device based wireless network have been explosively increasing. From the viewpoint of security, because wireless network is more vulnerable than wired network, strong security is required in wireless network. On the contrary, the security for mobile devices has to be efficient due to the restrictions of battery powered mobile device such as low computation, low memory space and high communication cost. Therefore, in this paper, we propose an efficient authentication scheme with mobile devices in wireless network environment. The proposed scheme satisfies security requirements for the service using mobile device and it is suitable in wireless network environment.