• Title/Summary/Keyword: business Layer

Search Result 277, Processing Time 0.035 seconds

Research of organized data extraction method for digital investigation in relational database system (데이터베이스 시스템에서 디지털 포렌식 조사를 위한 체계적인 데이터 추출 기법 연구)

  • Lee, Dong-Chan;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.565-573
    • /
    • 2012
  • To investigate the business corruption, the obtainments of the business data such as personnel, manufacture, accounting and distribution etc., is absolutely necessary. Futhermore, the investigator should have the systematic extraction solution from the business data of the enterprise database, because most company manage each business data through the distributed database system, In the general business environment, the database exists in the system with upper layer application and big size file server. Besides, original resource data which input by user are distributed and stored in one or more table following the normalized rule. The earlier researches of the database structure analysis mainly handled the table relation for database's optimization and visualization. But, in the point of the digital forensic, the data, itself analysis is more important than the table relation. This paper suggests the extraction technique from the table relation which already defined in the database. Moreover, by the systematic analysis process based on the domain knowledge, analyzes the original business data structure stored in the database and proposes the solution to extract table which is related incident.

Smart Cold-Chain Monitoring Automation System Architecture based on Internet of Things (사물 인터넷 기반 스마트 콜드 체인 모니터링 자동화 시스템 구조)

  • Kim, Seok-Hoon;Han, Jung-Soo
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.351-356
    • /
    • 2014
  • Generally, although securing the condition and location of container freights or normal freights, which load a fresh goods, has been a very important issue in the cold-chain system implementations, it has not gotten out of the traditional methods in the related business world yet. To solve this problem, we propose the designing method and architecture which can be used to implement a smart cold-chain monitoring automation systems. The proposed system architecture is based on the oneM2M standards, and it has 3 layers and entities, which can be implemented to S/W and H/W, network services layer and entity, common services layer and entity, application layer and entity. Based on this architecture, we will not only expect an innovative retrenchment of distribution cost, but also automatically secure the freight condition and location.

CLO (Cross Layer Optimization) Technique for Multi-view Video Streaming Service over WiBro Network (WiBro망에서의 다시점 비디오 스트리밍 서비스를 위한 계층 간 최적화 방식)

  • Son, Jung-Hyun;Cho, Ye-Jin;Suh, Doug-Young;Park, Gwang-Hoon;Kim, Kyu-Heon
    • Journal of Broadcast Engineering
    • /
    • v.13 no.5
    • /
    • pp.719-731
    • /
    • 2008
  • This paper defines QoE (Quality of Experience) for multi-view video streaming service over WiBro and proposes the CLO (Cross-Layer Optimization) algorithm can maximize this. Proposal CLO algorithm contains from physical layer to video layer. Under the time-varying wireless channel condition, the CLO technique takes view-wise and the temporal priority of the multi-view video into consideration in order to decide the transmission of frames and its FEC level. At the handover situation, it is shown through computer simulation that the optimal quality of the multi-view video can be achieved using the minimum amount of resources if the proposed CLO technique is applied.

Multiple Layer File Format for Safe Collaborative Design (안전한 협업 디자인 작업을 위한 다중 레이어 파일 포맷)

  • Kim, Kichang;Yoo, Sang Bong
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.4
    • /
    • pp.45-65
    • /
    • 2013
  • A design file can get larger in size as the complexity of the target object increases. A large design file may reside in a large parallel computing system, such as cloud computing systems, and many designers may work concurrently on the same design file. In such a case, it is obvious that we need some kind of protection mechanism so that each user can access only the area of the file he or she is entitled to. Two approaches can be taken for this problem: one is the traditional access control mechanisms and the other encryption techniques. We take the latter approach to ensure the safety of the file even in public domain such as clouding systems, and in this paper, we suggest an encryption scheme for a file where the file is encrypted in multi-layer so that each user is allowed to access the file only at the layer for which the user has the proper access right. Each layer of the file is encrypted with different keys and these keys are exposed only to those who have the right access permit. The paper explains the necessary file format to achieve this goal and discusses the file manipulation functions to handle this new file format.

Formation of Thin $CoSi_2$by Layer Inversion of Co/Nb bi-layer (Co/Nb 이중층 구조의 막역전을 이용한 박막 $CoSi_2$의 형성)

  • Lee, Jong-Mu;Gwon, Yeong-Jae;Lee, Byeong-Uk;Kim, Yeong-Uk;Lee, Su-Cheon
    • Korean Journal of Materials Research
    • /
    • v.6 no.8
    • /
    • pp.779-785
    • /
    • 1996
  • Thin $700^{\circ}C$films were formed through layer inversion of Co/Nb bilayer during rapid thermal annealing(RTA). The Nb interlayer seems to effectively prevent over-consumption of Si and to control the silicidation reaction by forming Co-Nb intermetallic compounds and removing the native oxide formed on Si substrate which interferes the uniform Co-Si interaction. The final layer structure of the Co/Nb bilayer after $700^{\circ}C$ RTA was found to be ${Nb}_{2}{O}_{3}$/${Co}_{2}$Si.CoSi/${NbCo}_{x}$/Nb(O, C)/${CoSi}_{2}$/ Si. The layer inversion and the formation of a stable CoSi, phase occurred above $700^{\circ}C$, and the Nb silicides were not found at any annealing temperature. These may be due to the formation of very stable Co-Nb intermetallic compounds and Nb oxides which limit the moving of Co and Si.

  • PDF

Feasibility of Deep Learning Algorithms for Binary Classification Problems (이진 분류문제에서의 딥러닝 알고리즘의 활용 가능성 평가)

  • Kim, Kitae;Lee, Bomi;Kim, Jong Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.95-108
    • /
    • 2017
  • Recently, AlphaGo which is Bakuk (Go) artificial intelligence program by Google DeepMind, had a huge victory against Lee Sedol. Many people thought that machines would not be able to win a man in Go games because the number of paths to make a one move is more than the number of atoms in the universe unlike chess, but the result was the opposite to what people predicted. After the match, artificial intelligence technology was focused as a core technology of the fourth industrial revolution and attracted attentions from various application domains. Especially, deep learning technique have been attracted as a core artificial intelligence technology used in the AlphaGo algorithm. The deep learning technique is already being applied to many problems. Especially, it shows good performance in image recognition field. In addition, it shows good performance in high dimensional data area such as voice, image and natural language, which was difficult to get good performance using existing machine learning techniques. However, in contrast, it is difficult to find deep leaning researches on traditional business data and structured data analysis. In this study, we tried to find out whether the deep learning techniques have been studied so far can be used not only for the recognition of high dimensional data but also for the binary classification problem of traditional business data analysis such as customer churn analysis, marketing response prediction, and default prediction. And we compare the performance of the deep learning techniques with that of traditional artificial neural network models. The experimental data in the paper is the telemarketing response data of a bank in Portugal. It has input variables such as age, occupation, loan status, and the number of previous telemarketing and has a binary target variable that records whether the customer intends to open an account or not. In this study, to evaluate the possibility of utilization of deep learning algorithms and techniques in binary classification problem, we compared the performance of various models using CNN, LSTM algorithm and dropout, which are widely used algorithms and techniques in deep learning, with that of MLP models which is a traditional artificial neural network model. However, since all the network design alternatives can not be tested due to the nature of the artificial neural network, the experiment was conducted based on restricted settings on the number of hidden layers, the number of neurons in the hidden layer, the number of output data (filters), and the application conditions of the dropout technique. The F1 Score was used to evaluate the performance of models to show how well the models work to classify the interesting class instead of the overall accuracy. The detail methods for applying each deep learning technique in the experiment is as follows. The CNN algorithm is a method that reads adjacent values from a specific value and recognizes the features, but it does not matter how close the distance of each business data field is because each field is usually independent. In this experiment, we set the filter size of the CNN algorithm as the number of fields to learn the whole characteristics of the data at once, and added a hidden layer to make decision based on the additional features. For the model having two LSTM layers, the input direction of the second layer is put in reversed position with first layer in order to reduce the influence from the position of each field. In the case of the dropout technique, we set the neurons to disappear with a probability of 0.5 for each hidden layer. The experimental results show that the predicted model with the highest F1 score was the CNN model using the dropout technique, and the next best model was the MLP model with two hidden layers using the dropout technique. In this study, we were able to get some findings as the experiment had proceeded. First, models using dropout techniques have a slightly more conservative prediction than those without dropout techniques, and it generally shows better performance in classification. Second, CNN models show better classification performance than MLP models. This is interesting because it has shown good performance in binary classification problems which it rarely have been applied to, as well as in the fields where it's effectiveness has been proven. Third, the LSTM algorithm seems to be unsuitable for binary classification problems because the training time is too long compared to the performance improvement. From these results, we can confirm that some of the deep learning algorithms can be applied to solve business binary classification problems.

Topic Based Hierarchical Network Analysis for Entrepreneur Using Text Mining (텍스트 마이닝을 이용한 주제기반의 기업인 네트워크 계층 분석)

  • Lee, Donghun;Kim, Yonghwa;Kim, Kwanho
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.33-49
    • /
    • 2018
  • The importance of convergence activities among business is increasing due to the necessity of designing and developing new products to satisfy various customers' needs. In particular, decision makers such as CEOs are required to participate in networks between entrepreneurs for being connected with valuable convergence partners. Moreover, it is important for entrepreneurs not only to make a large number of network connections, but also to understand the networking relationship with entrepreneurs with similar topic information. However, there is a difficult limit in collecting the topic information that can show the lack of current status of business and the technology and characteristics of entrepreneur in industry sector. In this paper, we solve these problems through the topic extraction method and analyze the business network in three aspects. Specifically, there are C, S, T-Layer models, and each model analyzes amount of entrepreneurs relationship, network centrality, and topic similarity. As a result of experiments using real data, entrepreneur need to activate network by connecting high centrality entrepreneur when the corporate relationship is low. In addition, we confirmed through experiments that there is a need to activate the topic-based network when topic similarity is low between entrepreneurs.

Joining Properties of CoSb3/Al/Ti/CuMo by Spark Plasma Sintering Process (방전플라즈마 소결 공정을 이용한 CoSb3/Al/Ti/CuMo 접합 특성)

  • Kim, Min Suk;Ahn, Jong Pil;Kim, Kyoung Hun;Kim, Kyung Ja;Park, Joo Seok;Seo, Won Seon;Kim, Hyung Sun
    • Journal of the Korean Ceramic Society
    • /
    • v.51 no.6
    • /
    • pp.549-553
    • /
    • 2014
  • $CoSb_3$-based skutterudite compounds are candidate materials for thermoelectric power generation in the mid-temperature range (600 - 900 K) because their thermoelectric properties can be enhanced by doping and filling. The joining property of thermoelectric module electrodes containing thermoelectric materials is of great importance because it can dominate the efficiency of the thermoelectric module. This study examined the properties of $CoSb_3$/Al/Ti/CuMo joined by the spark plasma sintering technique. Titanium thin foil was used to prevent the diffusion of copper into $CoSb_3$ and Aluminum thin foil was used to improve the adhesion between $CoSb_3$ and Ti. The insertion of an Aluminum interlayer between the Ti and $CoSb_3$ was effective for joining $CoSb_3$ to Ti by forming an intermediate layer at the Al-$CoSb_3$ boundary without any micro cracks. Specifically, the adhesion strength of the Ti/Al/$CoSb_3$ joining interface showed a remarkable improvement compared with our previous results, without deterioration of electrical property in the interface.

Solution-Derived Hafnium Lanthanum Oxide Films Prepared Using Ion-Beam Irradiation and Their Applications as Alignment Layers for Twisted-Nematic Liquid Crystal Displays

  • Oh, Byeong-Yun
    • Transactions on Electrical and Electronic Materials
    • /
    • v.17 no.6
    • /
    • pp.355-358
    • /
    • 2016
  • We present the alignment characteristics of LC (liquid crystal) molecules on solution-derived HLO (hafnium lanthanum oxide) films fabricated using IB (ion-beam) irradiation. We then demonstrated that LC molecules can be homogeneously and uniformly aligned on the HLO film irradiated at an IB incident energy of 1.2 keV. Physicochemical analysis methods such as atomic force microscopy and X-ray photoelectron spectroscopy were used to verify the LC alignment mechanism on the IB-irradiated HLO film. In addition, the electro-optical performance of a TN (twisted-nematic) cell fabricated using the IB-irradiated HLO film exhibited characteristics superior to those of the conventional TN cell fabricated using a rubbed polyimide layer.

Design of Service Matching with Vertical and Horizontal Classification for SOA (SOA에서 서비스 분류 기준에 따른 매칭기법 설계)

  • Choi, Mi-Sook;Lee, Seo-Jeong
    • Journal of Digital Contents Society
    • /
    • v.8 no.2
    • /
    • pp.107-112
    • /
    • 2007
  • With the evolution to distributed computing technology, the concept of conventional client/server function has been advanced to Service-Oriented Architecture, which can share the information between heterogeneous systems as services. To success Service-Oriented Architecture, the conjunction between business layer and application layer is one of the important techniques. In this paper, we classify services into two views, vertical and horizontal, and introduce matching technique with service classification for SOA.

  • PDF