• Title/Summary/Keyword: User Pattern Analysis

Search Result 348, Processing Time 0.031 seconds

Invariant Iris Code extraction for generating cryptographic key based on Fuzzy Vault (퍼지볼트 기반의 암호 키 생성을 위한 불변 홍채코드 추출)

  • Lee, Youn-Joo;Park, Kang-Ryoung;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.321-322
    • /
    • 2006
  • In this paper, we propose a method that extracts invariant iris codes from user's iris pattern in order to apply these codes to a new cryptographic construct called fuzzy vault. The fuzzy vault, proposed by Juels and Sudan, has been used to manage cryptographic key safely by merging with biometrics. Generally, iris data has intra-variation of iris pattern according to sensed environmental changes, but cryptography requires correctness. Therefore, to combine iris data and fuzzy vault, we have to extract an invariant iris feature from iris pattern. In this paper, we obtain invariant iris codes by clustering iris features extracted by independent component analysis(ICA) transform. From experimental results, we proved that the iris codes extracted by our method are invariant to sensed environmental changes and can be used in fuzzy vault.

  • PDF

A Study On IoT Data Consistency in IoT Environment (사물인터넷 환경에서 IoT 데이터 정합성 연구)

  • Choi, Changwon
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.127-132
    • /
    • 2022
  • As the IoT technology is more developed, it is more important for the accuracy of IoT data. Since the IoT data supports a different formats and protocols, it is often happened that the IoT system is failed or the incorrect data is generated with the unreliable IoT devices(sensor, actuator). Because the abnormality of IoT device or the user situation is not detected correctly, this problem makes the user to be unsatisfied with the IoT system. This study proposes the decision methodology of IoT data consistency whether the IoT data is generated in normal range or not by using the mathematical functions('gradient descent function' and 'linear regression function'). It may be concluded that the gradient function method is suitable for the IoT data which the 'increasing velocity' is related with the next generated pattern(eg. sensor devices), the linear regression function method is suitable for the IoT data which the 'the difference from linear regression function' is related with the next generated pattern in case the data has a linear pattern(eg. water meter, electric meter).

Discrete-Time Analysis of Throughput and Response Time for LAP Derivative Protocols under Markovian Block-Error Pattern (마르코프 오류모델 하에서의 LAP 계열 프로토콜들의 전송성능과 반응시간에 대한 이산-시간 해석)

  • Cho, Young-Jong;Choi, Dug-Kyoo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2786-2800
    • /
    • 1997
  • In this paper, we investigate how well the channel memory (statistical dependence in the occurrence of transmission errors) can be used in the evaluation of widely used error control schemes. For this we assume a special case named as the simplest Markovian block-error pattern with two states, in which each block is classified into two classes of whether the block transmission is in error or not. We apply the derived pattern to the performance evaluation of the practical link-level procedures, LAPB/D/M with multi-reject options, and investigate both throughput and user-perceived response time behaviors on the discrete-time domain to determine how much the performance of error recovery action is improved under burst error condition. Through numerical examples, we show that the simplest Markovian block-error pattern tends to be superior in throughput and delay characteristics to the random error case. Also, instead of mean alone, we propose a new measure of the response time specified as mean plus two standard deviations 50 as to consider user-perceived worst cases, and show that it results in much greater sensitivity to parameter variations than does mean alone.

  • PDF

Clustering Normal User Behavior for Anomaly Intrusion Detection (비정상행위 탐지를 위한 사용자 정상행위 클러스터링 기법)

  • Oh, Sang-Hyun;Lee, Won-Suk
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.857-866
    • /
    • 2003
  • For detecting an intrusion based on the anomaly of a user's activities, previous works are concentrated on statistical techniques in order to analyze an audit data set. However. since they mainly analyze the average behavior of a user's activities, some anomalies can be detected inaccurately. In this paper, a new clustering algorithm for modeling the normal pattern of a user's activities is proposed. Since clustering can identify an arbitrary number of dense ranges in an analysis domain, it can eliminate the inaccuracy caused by statistical analysis. Also, clustering can be used to model common knowledge occurring frequently in a set of transactions. Consequently, the common activities of a user can be found more accurately. The common knowledge is represented by the occurrence frequency of similar data objects by the unit of a transaction as veil as the common repetitive ratio of similar data objects in each transaction. Furthermore, the proposed method also addresses how to maintain identified common knowledge as a concise profile. As a result, the profile can be used to detect any anomalous behavior In an online transaction.

Analysis of Commercial Continuous Media Server Workloads on Internet (인터넷 환경에서의 상용 연속미디어 서버의 부하 분석)

  • Kim, Ki-Wan;Lee, Seung-Won;Park, Seong-Ho;Chung, Ki-Dong
    • The KIPS Transactions:PartB
    • /
    • v.10B no.1
    • /
    • pp.87-94
    • /
    • 2003
  • A study on the characteristics of server workloads based on user access pattern offers insights for the strategies on continuous media caching and network workloads distribution. This paper analyses characteristics of continuous media filet in each fervor and user access requests to each of them, using log data of three commercial sites, which are providing continuous media files in the form of real time streaming on the Internet. These servers have more continuous files than ones in the previously reported studies and are processing very large number of user access requests. We analyse the characteristics of continuous media files in each server by the size of files. playback time and encoding bandwidth. We also analyse the characteristics of user access requests by the distribution of user requests to continuous media files, user access time, access rate based on the popularity of the files and the number if access requests to serial continuous media files.

3D Virtual Building Technic using Pattern (패턴을 이용한 3D 가상 건축 기술)

  • Han, Jung-Soo;Kim, Gui-Jung
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.8
    • /
    • pp.66-72
    • /
    • 2010
  • This paper is focus on 3D virtual building design technic that construction materials are showed by components and these components are part of patterns, and building design using pattern is possible. To use this technique in process of construction, design, analysis, change, assembly, etc, we will develop flexible building design system that it supports efficient building change and low cost by construction design simulation. Specially also the designer and the user use a pattern and easily will be able to change the building and according to change pattern information of the materials, design of the buildings which are changed creates automatic. Also we will implement knowledge retrieval engine which is necessary to personal skill or visualization.

Foundational Research for DB of Pattern Grading of Galot, Jeju Cultural Merchandise (제주 문화상품 갈옷의 패턴 그레이딩 DB를 위한 기초 연구)

  • Kwon, Sook-Hee;Hong, Seon-Cheol
    • Journal of the Korean Home Economics Association
    • /
    • v.45 no.1
    • /
    • pp.111-125
    • /
    • 2007
  • By examining the existing Galot products in the market, we aimed to discover areas for new development and lay out the foundational system for establishing a database(DB) of their pattern grading. For the analysis, the team focused mainly on Galot in forms of casual korean traditional clothes, since they have the largest market share. The main accomplishments from this research are as follows. First, because adult females are the largest segment to consider in deciding the size system for grading, we selected three sizes that have to be compatible with the KS Clothing Standardized Sizing. Second, for basic pattern grading, we applied the reference size indicated in KS Clothing Standardized Size, and also used half dart sloper and dartless sloper. Third, we categorized designs according to the presence or absence of a dart, the structure of closure, and the shape of the sleeve and neck. We indicated the grading points with numbers and body area in Korean to make it easier for the users to understand when using the computer system and doing manual work. To further increase the user convenience, we provided diagrams for categorized designs, pattern grading layout, and a table for calculated grading points variation.

Design AND IMPLEMENTATION of A News letter system using fuzzy association rules (퍼지 연관규칙을 이용한 뉴스레터 시스템 설계 및 구현)

  • 정연홍;박우수;박규석
    • Journal of Internet Computing and Services
    • /
    • v.3 no.5
    • /
    • pp.41-49
    • /
    • 2002
  • Web mining can be broadly defined as the discovery and analysis of useful information from the World Wide Web. In this paper. we tried to analyze a user access pattern and designed a system which can supply useful information to users through the web mining, The proposed system can search the information of users pattern through the web site and news letters, and pass through classification of category through filtering, The fuzzy association rules are applied to the users who access recently, to each category that generated though these processes, and compares the generated sets to each users-access pages set, and it can send appropriate news letter to each user.

  • PDF

EUCAS : Development of the User Interface for Dynamic Context-aware Service Definition (EUCAS : 동적인 상황인식서비스 정의를 위한 사용자인터페이스 개발)

  • Kang, Ki-Bong;Park, Jeong-Kyu;Lee, Keung-Hae
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.346-350
    • /
    • 2009
  • According to the development of information technology, there are many services in our life. These services make our life safe and convenient. However, the increment of the services also causes the increment of human concern and effort to control these services. The context-aware service is the service that provided their functionality at the right time and to the right place by analysis user's current situation. The most previous studies about context-aware service regard that context-aware services are defined by the developer who has expertise in information technology. The definition of the context-aware services by the developer makes difficult to reflect user's personal preferences and life pattern to the services. In this paper, we propose an user interface EUCAS(by End-User, Context-Aware Service development) that make the user can define and manage their own context-aware service according to their preferences. We expect EUCAS can be effective user interface technology for providing personalized context-aware service.

  • PDF

A Study on User's Value Consciousness toward Products and Patterns of Design Evaluation (제품에 대한 사용자의 가치의식에 따른 디자인 평가의 유형에 관한 연구)

  • Shong, Chang-Ho;Choi, Myoung-Sik
    • Archives of design research
    • /
    • v.19 no.5 s.67
    • /
    • pp.255-268
    • /
    • 2006
  • This study raised a question about 'how user's psychological value consciousness influences design evaluation and evaluated 14 product samples. Three main categories were chosen to be analyzed; product evaluation by step, value consciousness toward products, and creation of shape image and design evaluation. In order to obtain results, four research hypotheses were established a and case study was conducted as part of 'conclusive research' for verification. 120 university students in their 20s majoring in product design were chosen as testees in a bid to increase the accuracy of data. With data collected, the whole flow was analyzed by simple tabulation and further analysis was carried out in three evaluation items. An analysis method was mainly quantitative, focusing on multivariate analysis like factor analysis, cluster analysis, etc. The empirical analysis of this study was verified at P<.05 significance level and SPSSWIN 12.0 program was used for statistic process. As a result, four conclusions were gained regarding 'user's value consciousness toward products and pattern of design evaluation'.

  • PDF