• Title/Summary/Keyword: dynamic user classification

Search Result 35, Processing Time 0.023 seconds

Context Conflicts of Role-Based Access Control in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경의 역할 기반 접근제어에서 발생하는 상황 충돌)

  • Nam Seung-Jwa;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.37-52
    • /
    • 2005
  • Traditional access control models like role-based access control model are insufficient in security needs in ubiquitous computing environment because they take no thought of access control based on user's context or environment condition. In these days, although researches on context-aware access control using user's context or environment conditions based on role-based access control are emerged, they are on the primary stage. We present context definitions md an access control model to provide more flexible and dynamic context-aware access control based on role-based access control. Specially, we describe the conflict problems occurred in the middle of making an access decision. After classifying the conflict problems, we show some resolutions to solve them. In conclusion, we will lay the foundations of the development of security policy and model assuring right user of right object(or resource) and application service through pre-defined context and context classification in ubiquitous computing environments. Beyond the simplicity of access to objects by authorized users, we assure that user can access to the object, resource, or service anywhere and anytime according to right context.

A Dynamic Configuration of Calibration Points using Multidimensional Sensor Data Analysis (다중 센서 데이터 분석을 이용한 동적보정점 결정 기법)

  • Kim, Byoung-Sub;Kim, Jae-Hoon
    • Korean Management Science Review
    • /
    • v.33 no.1
    • /
    • pp.49-58
    • /
    • 2016
  • Focusing on the drastic increase of smart devices, machine generated data expansion is a general phenomenon in network services and IoT (Internet of Things). Especially, built-in multi sensors in a smart device are used for collection of user status and moving data. Combining the internal sensor data and environmental information, we can determine landmarks that decide a pedestrian's locations. We use an ANOVA method to analyze data acquired from multi sensors and propose a landmark classification algorithm. We expect that the proposed algorithm can achieve higher accuracy of indoor-outdoor positioning system for pedestrians.

AUX Model for restoring and analyzing Associative User Experience informations (연상된 사용자 경험정보 축척 및 분석을 위한 AUX 모델)

  • Ryu, Chun-Yeol;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.586-596
    • /
    • 2011
  • In the IT industry, processing units of IT applications are getting smaller and high efficient. Furthermore, the realization of various smart functions is highly feasible now due to advances in sensing technology. The service infrastructures on high efficient and compact mobile devices are applied to various areas. These also could be possessed by users and is built into the devices. Currently, studies on the UX(User Experience) field to attempt an analysis and prediction of user's information are continuing with reference to the UI(User Interface). However, research on the common framework of classification and storing the user-information, and standardization of form has not been attempted yet. In this study, we proposed the AUX(Associative user Experience) model and process structure to store various empirical data by users. The AUX model expressed a diversity of user's empirical data using extended E-TCPN model. And also, we expressed the data structure using XML with reference to the application of AUX model. This expressed model and separation of process structure guarantee its specialty, productivity and flexibility through the humanistic characteristics of users and the independence of technical process structure. The AUX model maps out the AUX information process architecture and expressed the process with the improved MPP algorithm, to analyze of its performance. The simulation of movements applying to MPP traffic allocation of VOD is used to analyze of its performance. The playback deviation of MPP Graphic Allocation Algorism where the AUX model was applied was improved by 10.41% more than the one where it was not applied. As a result of that, playback performance has improved due to the conversion of AUX with accessing media, content of users and dynamic traffic allocation such as MPI and CPI.

Computerization of Nurse Staffing and Scheduling according to Patient Classification (환자분류에 의한 간호인력 산정 및 배치과정 전산화)

  • Park, Jung-Ho;Park, Hyeoun-Ae;Cho, Hyon;Choi, Yong-Sun
    • Journal of Korean Academy of Nursing
    • /
    • v.26 no.2
    • /
    • pp.399-412
    • /
    • 1996
  • Even though Korean medical law stipulates that number of patients attended by a nurse is 2.5 for hospitalization and 30 for ambulatory care, the number of patients cared by a nurse per day is much greater than the standard prescribed by the medical law. Current nursing productivity of nurses is not desirable unless the quality of care considered. Moreover. nursing manpower staffing based on neither current nurses' productivity nor standard of medical law cannot respond properly to dynamic situation of the medical services. As for the nurse scheduling, the critical problem of it in the hospital is determining the day-to-day shift assignments for each nurse for the specified period in a way that satisfies the given requirements of the hospital. Nurse scheduling, however, involves many factors and requirements, manual scheduling requires much time and effort to produce an adequate schedule. Under these backgrounds, the necessity of more efficient management of nursing manpower occupying 1/3 of total hospital workers has been recognized by many nursing administrators. This study was performed to develop a system computerizing nurse staffing and scheduling based on the patient classification. As a preliminary step for the system development, nursing workload in a secondary hospital was measured from Sep. to Oct. 1994. On the grounds of this result, computerization of nurse staffing and scheduling was proceeded with three options. First one is based on the current medical law. Second one is based on the assigned number of nursing staff. And the last is based on the request by patient classification. Computer languages used in this study were MS Visual Basic 3.0 for the staffing and Access 2.0 for the scheduling, respectively. Prospective users may operate this system easily because icons and mouse are used for easier graphic user interface and reducing the need for typing efforts. This system can help nurse administrators manage nursing manpower efficiently and nurses develop quick and easy schedule generation and allow more time for the patient care.

  • PDF

Machine Learning Based Automated Source, Sink Categorization for Hybrid Approach of Privacy Leak Detection (머신러닝 기반의 자동화된 소스 싱크 분류 및 하이브리드 분석을 통한 개인정보 유출 탐지 방법)

  • Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.657-667
    • /
    • 2020
  • The Android framework allows apps to take full advantage of personal information through granting single permission, and does not determine whether the data being leaked is actual personal information. To solve these problems, we propose a tool with static/dynamic analysis. The tool analyzes the Source and Sink used by the target app, to provide users with information on what personal information it used. To achieve this, we extracted the Source and Sink through Control Flow Graph and make sure that it leaks the user's privacy when there is a Source-to-Sink flow. We also used the sensitive permission information provided by Google to obtain information from the sensitive API corresponding to Source and Sink. Finally, our dynamic analysis tool runs the app and hooks information from each sensitive API. In the hooked data, we got information about whether user's personal information is leaked through this app, and delivered to user. In this process, an automated Source/Sink classification model was applied to collect latest Source/Sink information, and the we categorized latest release version of Android(9.0) with 88.5% accuracy. We evaluated our tool on 2,802 APKs, and found 850 APKs that leak personal information.

SVM-Based Incremental Learning Algorithm for Large-Scale Data Stream in Cloud Computing

  • Wang, Ning;Yang, Yang;Feng, Liyuan;Mi, Zhenqiang;Meng, Kun;Ji, Qing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3378-3393
    • /
    • 2014
  • We have witnessed the rapid development of information technology in recent years. One of the key phenomena is the fast, near-exponential increase of data. Consequently, most of the traditional data classification methods fail to meet the dynamic and real-time demands of today's data processing and analyzing needs--especially for continuous data streams. This paper proposes an improved incremental learning algorithm for a large-scale data stream, which is based on SVM (Support Vector Machine) and is named DS-IILS. The DS-IILS takes the load condition of the entire system and the node performance into consideration to improve efficiency. The threshold of the distance to the optimal separating hyperplane is given in the DS-IILS algorithm. The samples of the history sample set and the incremental sample set that are within the scope of the threshold are all reserved. These reserved samples are treated as the training sample set. To design a more accurate classifier, the effects of the data volumes of the history sample set and the incremental sample set are handled by weighted processing. Finally, the algorithm is implemented in a cloud computing system and is applied to study user behaviors. The results of the experiment are provided and compared with other incremental learning algorithms. The results show that the DS-IILS can improve training efficiency and guarantee relatively high classification accuracy at the same time, which is consistent with the theoretical analysis.

Transmission Delay Estimation-based Forwarding Strategy for Load Distribution in Software-Defined Network (SDN 환경에서 효율적 Flow 전송을 위한 전송 지연 평가 기반 부하 분산 기법 연구)

  • Kim, Do Hyeon;Hong, Choong Seon
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.5
    • /
    • pp.310-315
    • /
    • 2017
  • In a centralized control structure, the software defined network controller manages all openflow enabled switched in a data plane and controls the telecommunication between all hosts. In addition, the network manager can easily deploy the network function to the application layer with a software defined network controller. For this reason, many methods for network management using a software defined network concept have been proposed. The main policies for network management are related to traffic Quality of Service and resource management. In order to provide Quality of Service and load distribution for network users, we propose an efficient routing method using a naive bayesian algorithm and transmission delay estimation module. In this method, the forwarding path is decided by flow class and estimated transmission delay result in the software defined network controller. With this method, the load on the network node can be distributed to improve overall network performance. The network user also gets better dynamic Quality of Service.

Image retrieval based on a combination of deep learning and behavior ontology for reducing semantic gap (시맨틱 갭을 줄이기 위한 딥러닝과 행위 온톨로지의 결합 기반 이미지 검색)

  • Lee, Seung;Jung, Hye-Wuk
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.11
    • /
    • pp.1133-1144
    • /
    • 2019
  • Recently, the amount of image on the Internet has rapidly increased, due to the advancement of smart devices and various approaches to effective image retrieval have been researched under these situation. Existing image retrieval methods simply detect the objects in a image and carry out image retrieval based on the label of each object. Therefore, the semantic gap occurs between the image desired by a user and the image obtained from the retrieval result. To reduce the semantic gap in image retrievals, we connect the module for multiple objects classification based on deep learning with the module for human behavior classification. And we combine the connected modules with a behavior ontology. That is to say, we propose an image retrieval system considering the relationship between objects by using the combination of deep learning and behavior ontology. We analyzed the experiment results using walking and running data to take into account dynamic behaviors in images. The proposed method can be extended to the study of automatic annotation generation of images that can improve the accuracy of image retrieval results.

Performance of Exercise Posture Correction System Based on Deep Learning (딥러닝 기반 운동 자세 교정 시스템의 성능)

  • Hwang, Byungsun;Kim, Jeongho;Lee, Ye-Ram;Kyeong, Chanuk;Seon, Joonho;Sun, Young-Ghyu;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.5
    • /
    • pp.177-183
    • /
    • 2022
  • Recently, interesting of home training is getting bigger due to COVID-19. Accordingly, research on applying HAR(human activity recognition) technology to home training has been conducted. However, existing paper of HAR proposed static activity instead of dynamic activity. In this paper, the deep learning model where dynamic exercise posture can be analyzed and the accuracy of the user's exercise posture can be shown is proposed. Fitness images of AI-hub are analyzed by blaze pose. The experiment is compared with three types of deep learning model: RNN(recurrent neural network), LSTM(long short-term memory), CNN(convolution neural network). In simulation results, it was shown that the f1-score of RNN, LSTM and CNN is 0.49, 0.87 and 0.98, respectively. It was confirmed that CNN is more suitable for human activity recognition than other models from simulation results. More exercise postures can be analyzed using a variety learning data.

Adaptive VM Allocation and Migration Approach using Fuzzy Classification and Dynamic Threshold (퍼지 분류 및 동적 임계 값을 사용한 적응형 VM 할당 및 마이그레이션 방식)

  • Mateo, John Cristopher A.;Lee, Jaewan
    • Journal of Internet Computing and Services
    • /
    • v.18 no.4
    • /
    • pp.51-59
    • /
    • 2017
  • With the growth of Cloud computing, it is important to consider resource management techniques to minimize the overall costs of management. In cloud environments, each host's utilization and virtual machine's request based on user preferences are dynamic in nature. To solve this problem, efficient allocation method of virtual machines to hosts where the classification of virtual machines and hosts is undetermined should be studied. In reducing the number of active hosts to reduce energy consumption, thresholds can be implemented to migrate VMs to other hosts. By using Fuzzy logic in classifying resource requests of virtual machines and resource utilization of hosts, we proposed an adaptive VM allocation and migration approach. The allocation strategy classifies the VMs according to their resource request, then assigns it to the host with the lowest resource utilization. In migrating VMs from overutilized hosts, the resource utilization of each host was used to create an upper threshold. In selecting candidate VMs for migration, virtual machines that contributed to the high resource utilization in the host were chosen to be migrated. We evaluated our work through simulations and results show that our approach was significantly better compared to other VM allocation and Migration strategies.