• 제목/요약/키워드: Urgent Data

검색결과 690건 처리시간 0.028초

A Study on the RTC romote system of Water Environment for Wireless Network

  • Sung, Kyung
    • Journal of information and communication convergence engineering
    • /
    • 제7권4호
    • /
    • pp.465-468
    • /
    • 2009
  • There is to solution the environmental data which the importance is seriously taken into consideration in the the 21st century that is set up whether or not be a welfare society advanced country according to quality of life elevations through environments in question to a preferential assignment for an environmental control will decrease of measures, and be proceeded so as to be urgent. However, shall get measurement of a correct environmental pollution duty and reduction measures stopped on bases of the data which there is reliability, and decrease excessive pollution than what, and may overcome efficiency of waste of cost environmental pollution management. Environmental pollution data collected are regarded as important, and, specially, a collection of environmental data forecast a pollution circle, or to analyze future development is important very at an environmental policy decision or decision making step to be national besides pollution reductions.

A Study on the Prediction of Community Smart Pension Intention Based on Decision Tree Algorithm

  • Liu, Lijuan;Min, Byung-Won
    • International Journal of Contents
    • /
    • 제17권4호
    • /
    • pp.79-90
    • /
    • 2021
  • With the deepening of population aging, pension has become an urgent problem in most countries. Community smart pension can effectively resolve the problem of traditional pension, as well as meet the personalized and multi-level needs of the elderly. To predict the pension intention of the elderly in the community more accurately, this paper uses the decision tree classification method to classify the pension data. After missing value processing, normalization, discretization and data specification, the discretized sample data set is obtained. Then, by comparing the information gain and information gain rate of sample data features, the feature ranking is determined, and the C4.5 decision tree model is established. The model performs well in accuracy, precision, recall, AUC and other indicators under the condition of 10-fold cross-validation, and the precision was 89.5%, which can provide the certain basis for government decision-making.

A Rapid Locating Protocol of Corrupted Data for Cloud Data Storage

  • Xu, Guangwei;Yang, Yanbin;Yan, Cairong;Gan, Yanglan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권10호
    • /
    • pp.4703-4723
    • /
    • 2016
  • The verification of data integrity is an urgent topic in remote data storage environments with the wide deployment of cloud data storage services. Many traditional verification algorithms focus on the block-oriented verification to resolve the dispute of dynamic data integrity between the data owners and the storage service providers. However, these algorithms scarcely pay attention to the data verification charge and the users' verification experience. The users more concern about the availability of accessed files rather than data blocks. Moreover, the data verification charge limits the number of checked data in each verification. Therefore, we propose a mixed verification protocol to verify the data integrity, which rapidly locates the corrupted files by the file-oriented verification, and then identifies the corrupted blocks in these files by the block-oriented verification. Theoretical analysis and simulation results demonstrate that the protocol reduces the cost of the metadata computation and transmission relative to the traditional block-oriented verification at the expense of little cost of additional file-oriented metadata computation and storage at the data owner. Both the opportunity of data extracted and the scope of suspicious data are optimized to improve the verification efficiency under the same verification cost.

하둡과 순차패턴 마이닝 기술을 통한 교통카드 빅데이터 분석 (Analysis of Traffic Card Big Data by Hadoop and Sequential Mining Technique)

  • 김우생;김용훈;박희성;박진규
    • Journal of Information Technology Applications and Management
    • /
    • 제24권4호
    • /
    • pp.187-196
    • /
    • 2017
  • It is urgent to prepare countermeasures for traffic congestion problems of Korea's metropolitan area where central functions such as economic, social, cultural, and education are excessively concentrated. Most users of public transportation in metropolitan areas including Seoul use the traffic cards. If various information is extracted from traffic big data produced by the traffic cards, they can provide basic data for transport policies, land usages, or facility plans. Therefore, in this study, we extract valuable information such as the subway passengers' frequent travel patterns from the big traffic data provided by the Seoul Metropolitan Government Big Data Campus. For this, we use a Hadoop (High-Availability Distributed Object-Oriented Platform) to preprocess the big data and store it into a Mongo database in order to analyze it by a sequential pattern data mining technique. Since we analysis the actual big data, that is, the traffic cards' data provided by the Seoul Metropolitan Government Big Data Campus, the analyzed results can be used as an important referenced data when the Seoul government makes a plan about the metropolitan traffic policies.

델파이 XE2 DataSnap 서버의 보안성 개선을 위한 시큐어 코딩에 관한 연구 (A Study on the Secure Coding for Security Improvement of Delphi XE2 DataSnap Server)

  • 정명규;박만곤
    • 한국멀티미디어학회논문지
    • /
    • 제17권6호
    • /
    • pp.706-715
    • /
    • 2014
  • It is used to lead to serious structural vulnerability of the system security of security-critical system when we have quickly developed software system according to urgent release schedule without appropriate security planning, management, and assurance processes. The Data Set and Provider of DataSnap, which is a middleware of Delphi XE2 of the Embarcadero Technologies Co., certainly help to develop an easy and fast-paced procedure, but it is difficult to apply security program and vulnerable to control software system security when the connection structure Database-DataSnap server-SQL Connection-SQL Data set-Provider is applied. This is due to that all kinds of information of Provider are exposed on the moment when DataSnap Server Port is sure to malicious attackers. This exposure becomes a window capable of running SQL Command. Thus, it should not be used Data Set and Provider in the DataSnap Server in consideration of all aspects of security management. In this paper, we study on the verification of the security vulnerabilities for Client and Server DataSnap in Dlephi XE2, and we propose a secure coding method to improve security vulnerability in the DataSnap server system.

An XML-Based Modeling Language for the Open Trading of Decision Models

  • Kim, Hyoung-Do
    • 경영과학
    • /
    • 제17권3호
    • /
    • pp.147-160
    • /
    • 2000
  • These days, a modeling tool or environment has to know about the others on the market and build bridges to them with which their customers insist on sharing models and data. When it is based on a closed architecture, a tangle of import/export point translators is required. Using an exchange standard, we can design an open architecture for the interchange of models and data. XML(Extensible Markup Language) provides a framework for describing the syntax for creating and exchanging data structures. The explosive growth of XML-based business proposals and standards reflects the urgent requirements and its strength. This paper proposes an XML-based language for sharing decision models within the MSOR/DSS community. The language is able to allow applications and on-line analytic processing tools to models obtained from multiple sources without having to deal with individual differences between those sources. It is expected to be a medium for B2B integration by supporting flexible interchange of decision models.

  • PDF

공동주택 하자실적자료 분석을 통한 철근콘크리트 공사의 하자담보책임기간 비교연구 (Comparative Review on Term of Warranty Liability of Reinforced Concrete Work through Occurred Defect Data Analysis in Apartment Building)

  • 서덕석;박준모
    • 한국건축시공학회:학술대회논문집
    • /
    • 한국건축시공학회 2017년도 춘계 학술논문 발표대회
    • /
    • pp.266-267
    • /
    • 2017
  • As apartment buildings defect lawsuits become socioeconomic problems, an objective basis system for the term of warranty liability of reinforced concrete constructions is urgent. This study was carried out as a basic study for developing a basis system for the term of warranty liability. To do this, defect data actual collected in apartment complexes were collected and analyzed. As the result of checking the cumulative rate of defect occurrence in reinforced concrete construction by year, the point of time of reaching the 90% level was the 5th years, which was similar with the provision of the Apartment Building Management Act. However, the current Supreme Court precedent has decided that the term of warranty liability for the main structural parts in reinforced concrete construction shall be 10 years and the dispute is expected to continue in the future in the defect lawsuit.

  • PDF

Performance of Distributed Database System built on Multicore Systems

  • Kim, Kangseok
    • 인터넷정보학회논문지
    • /
    • 제18권6호
    • /
    • pp.47-53
    • /
    • 2017
  • Recently, huge datasets have been generating rapidly in a variety of fields. Then, there is an urgent need for technologies that will allow efficient and effective processing of huge datasets. Therefore the problems of partitioning a huge dataset effectively and alleviating the processing overhead of the partitioned data efficiently have been a critical factor for scalability and performance in distributed database system. In our work we utilized multicore servers to provide scalable service to our distributed system. The partitioning of database over multicore servers have emerged from a need for new architectural design of distributed database system from scalability and performance concerns in today's data deluge. The system allows uniform access through a web service interface to concurrently distributed databases over multicore servers, using SQMD (Single Query Multiple Database) mechanism based on publish/subscribe paradigm. We will present performance results with the distributed database system built on multicore server, which is time intensive with traditional architectures. We will also discuss future works.

Storing Digital Information in Long-Read DNA

  • Ahn, TaeJin;Ban, Hamin;Park, Hyunsoo
    • Genomics & Informatics
    • /
    • 제16권4호
    • /
    • pp.30.1-30.6
    • /
    • 2018
  • There is urgent need for effective and cost-efficient data storage, as the worldwide requirement for data storage is rapidly growing. DNA has introduced a new tool for storing digital information. Recent studies have successfully stored digital information, such as text and gif animation. Previous studies tackled technical hurdles due to errors from DNA synthesis and sequencing. Studies also have focused on a strategy that makes use of 100-150-bp read sizes in both synthesis and sequencing. In this paper, we a suggest novel data encoding/decoding scheme that makes use of long-read DNA (~1,000 bp). This enables accurate recovery of stored digital information with a smaller number of reads than the previous approach. Also, this approach reduces sequencing time.

경적음의 도플러 효과를 이용한 교통사고분석 (Traffic Accident Analysis using Doppler Effect of the Horn)

  • 최영수;김종혁;윤용문;박종찬;박하선
    • 자동차안전학회지
    • /
    • 제12권4호
    • /
    • pp.70-77
    • /
    • 2020
  • In this study, we estimate the vehicle speed by analyzing the acoustic data recorded in a single microphone of a surveillance camera. The frequency analysis of the acoustic data corrects the Doppler effect, which is a characteristic of the moving sound source, and reflects the geometric relationship according to the location of the sound source and the microphone on the two-dimensional plane. The acoustic data is selected from the horn sound that is mainly observed in an urgent situation among various sound sources that may occur in a traffic accident, and the characteristics of the monotone source are considered. We verified the reliability of the proposed method by time domain acoustic analysis and actual vehicle evaluation. This method is effective and can be used for traffic accident analysis in the blind spot of the camera using a single microphone built into the existing surveillance camera.