• Title/Summary/Keyword: file attribute

Search Result 59, Processing Time 0.028 seconds

Modeling of Video Data for Sffective Content-based Retrival (효율적인 의미 검색을 위한 동영상 데이터 모델링)

  • Jeong, Mi-Yeong;Lee, Won-Seok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.4
    • /
    • pp.908-922
    • /
    • 1997
  • In this paper,we present an dffcient way to describe the commplex meaning embedded in video data for the cintent-based retrival in a video database.Intead of viewing the data stored in a file as continuous bit stream,we associate the desired interval in the stream with a set of atteibute and value pairs which describe its meaning.Since the meaning of video data can be cimplex and can change dyamically. It is necessary to com-bine the fixed schema of attributes used in the traditional database systrm with a description method through a set of attribute and value pairs that can be defined dynamically.As the cintent of viedo data can be expressed differently according to the view point of a user,it is important ot maintain the meaning of the attribute and value pairs cinsistently for different users.This paper proposes the dffctive way to manage the set of attri-bute and value pairs.In addition,it also describes a way to define a new video presentation by separating a video stream phsycally or by sharing the portion of a bit stream,and the new method can minimize the required storage space.

  • PDF

Real-time Classification of Internet Application Traffic using a Hierarchical Multi-class SVM

  • Yu, Jae-Hak;Lee, Han-Sung;Im, Young-Hee;Kim, Myung-Sup;Park, Dai-Hee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.859-876
    • /
    • 2010
  • In this paper, we propose a hierarchical application traffic classification system as an alternative means to overcome the limitations of the port number and payload based methodologies, which are traditionally considered traffic classification methods. The proposed system is a new classification model that hierarchically combines a binary classifier SVM and Support Vector Data Descriptions (SVDDs). The proposed system selects an optimal attribute subset from the bi-directional traffic flows generated by our traffic analysis system (KU-MON) that enables real-time collection and analysis of campus traffic. The system is composed of three layers: The first layer is a binary classifier SVM that performs rapid classification between P2P and non-P2P traffic. The second layer classifies P2P traffic into file-sharing, messenger and TV, based on three SVDDs. The third layer performs specialized classification of all individual application traffic types. Since the proposed system enables both coarse- and fine-grained classification, it can guarantee efficient resource management, such as a stable network environment, seamless bandwidth guarantee and appropriate QoS. Moreover, even when a new application emerges, it can be easily adapted for incremental updating and scaling. Only additional training for the new part of the application traffic is needed instead of retraining the entire system. The performance of the proposed system is validated via experiments which confirm that its recall and precision measures are satisfactory.

A Study on Implementation of 4D and 5D Support Algorithm Using BIM Attribute Information - Focused on Process Simulation and Quantity Calculation - (BIM 속성정보를 활용한 4D, 5D 설계 지원 알고리즘 구현 및 검증에 관한 연구 - 공정시뮬레이션과 물량산출을 중심으로 -)

  • Jeong, Jae-Won;Seo, Ji-Hyo;Park, Hye-Jin;Choo, Seung-Yeon
    • Journal of the Regional Association of Architectural Institute of Korea
    • /
    • v.21 no.4
    • /
    • pp.15-26
    • /
    • 2019
  • In recent years, researchers are increasingly trying to use BIM-based 3D models for BIM nD design such as 4D (3D + Time) and 5D (4D + Cost). However, there are still many problems in efficiently using process management based on the BIM information created at each design stage. Therefore, this study proposes a method to automate 4D and 5D design support in each design stage by using BIM-based Dynamo algorithm. To do this, I implemented an algorithm that can automatically input the process information needed for 4D and 5D by using Revit's Add-in program, Dynamo. In order to support the 4D design, the algorithm was created to enable automatic process simulation by synchronizing process simulation information (Excel file) through the Navisworks program, BIM software. The algorithm was created to automatically enable process simulation. And to support the 5D design, the algorithm was developed to enable automatic extraction of the information needed for mass production from the BIM model by utilizing the dynamo algorithm. Therefore, in order to verify the 4D and 5D design support algorithms, we verified the applicability through consultation with related workers and experts. As a result, it has been demonstrated that it is possible to manage information about process information and to quickly extract information from design and design changes. In addition, BIM data can be used to manage and input the necessary process information in 4D and 5D, which is advantageous for shortening construction time and cost. This study will make it easy to improve design quality and manage design information, and will be the foundation for future building automation research.

A Study on Data Requirements and Quality Verification for Legal Deposit and Acquisition Tasks of Domestic Electronic Publications (국내 유통 전자출판물의 납본 및 수집을 위한 데이터 요구사항 및 품질 검증 연구)

  • Gyuhwan Kim;Soojung Kim;Daekeun Jeong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.35 no.1
    • /
    • pp.127-148
    • /
    • 2024
  • This study aimed to propose considerations for attributes and their standardization strategies during the data collection process for electronic publications by domestic distributors for the National Library of Korea. The research identified a total of 21 essential and optional attributes based on a survey and a Focused Group Interview (FGI) with the staff responsible for legal deposit and acquisition tasks at the National Library of Korea. Additional attributes were found necessary during the data quality verification process, leading to the specification of essential and optional attributes for various types of materials, including eBooks, audiobooks, webtoons, and web novels. The standardization of attribute values, essential for enhancing the identifiability and management efficiency of electronic publications, included adherence to ISO 8601 rules for dates and times, clear designation of limited-range attribute values such as file format and adult content, and detailed description of information related to titles. Furthermore, the study highlighted the need for establishing standardized metadata requirements and continuous data quality management and monitoring systems.

A research on the emotion classification and precision improvement of EEG(Electroencephalogram) data using machine learning algorithm (기계학습 알고리즘에 기반한 뇌파 데이터의 감정분류 및 정확도 향상에 관한 연구)

  • Lee, Hyunju;Shin, Dongil;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.27-36
    • /
    • 2019
  • In this study, experiments on the improvement of the emotion classification, analysis and accuracy of EEG data were proceeded, which applied DEAP (a Database for Emotion Analysis using Physiological signals) dataset. In the experiment, total 32 of EEG channel data measured from 32 of subjects were applied. In pre-processing step, 256Hz sampling tasks of the EEG data were conducted, each wave range of the frequency (Hz); Theta, Slow-alpha, Alpha, Beta and Gamma were then extracted by using Finite Impulse Response Filter. After the extracted data were classified through Time-frequency transform, the data were purified through Independent Component Analysis to delete artifacts. The purified data were converted into CSV file format in order to conduct experiments of Machine learning algorithm and Arousal-Valence plane was used in the criteria of the emotion classification. The emotions were categorized into three-sections; 'Positive', 'Negative' and 'Neutral' meaning the tranquil (neutral) emotional condition. Data of 'Neutral' condition were classified by using Cz(Central zero) channel configured as Reference channel. To enhance the accuracy ratio, the experiment was performed by applying the attributes selected by ASC(Attribute Selected Classifier). In "Arousal" sector, the accuracy of this study's experiments was higher at "32.48%" than Koelstra's results. And the result of ASC showed higher accuracy at "8.13%" compare to the Liu's results in "Valence". In the experiment of Random Forest Classifier adapting ASC to improve accuracy, the higher accuracy rate at "2.68%" was confirmed than Total mean as the criterion compare to the existing researches.

Program Development and Field Application for the use of the Integration Map of Underground Spatial Information (지하공간통합지도 활용을 위한 프로그램 개발 및 현장 적용)

  • Kim, Sung Gil;Song, Seok Jin;Cho, Hae Yong;Heo, Hyun Min
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.6
    • /
    • pp.483-490
    • /
    • 2021
  • Due to the recent increase in various problems from underground development in urbanized areas, accurate underground facility information management is highly needed. Therefore, in this study, in order to utilize the Integration Map of Underground Goespatial Information in real time on-site, the function of comparing the mutual location of the GPR (Ground Penetration Radar) sensing data and the Integration Map of Underground Goespatial Information, and function of analyze underground facilities, and function of converting surveying data into a shape file through position correction & attribute editing in a 3D space, and the function of submitting the shape file to the Integration Map of Underground Goespatial Information mobile center was defined and developed as a program. In addition, for the on-site application test of the development program, scenarios used at the underground facility real-time survey site and GPR exploration site were derived, and four sites in Seoul were tested to confirm that the use scenario worked properly. Through this, the on-site utilization of the program developed in this study could be confirmed, and it would contribute to the confirmation of the quality of Shape-file and the "update automation" of "Integration Map of Underground Goespatial Information". In addition, it is expected that the development program will be further applied to the Underground Facility Map's Accuracy Improvement Diffusion Project' promoted by the MOLIT (Ministry of Land, Infrastructure, and Transport).

Solutions for Adjusting SELinux To Android-Powered Devices (안드로이드 응용 단말기를 위한 SELinux 환경설정 방법)

  • Vu, Anh-Duy;Han, Jea-Il;Kim, Young-Man
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.12b
    • /
    • pp.565-568
    • /
    • 2011
  • Google Android framework consists of an operating system and software platform for mobile devices. Using a general-purpose Linux operating system in mobile device has some advantages but also security risks. Security-Enhanced Linux (SELinux) is a kernel-based protection approach which can help to reduce potential damage from successful attacks. However, there are some challenges to integrate SELinux in Android. In this research, we do a study on how to do the integration and find out four challenges. The first one is that the Android file system (yaff2) does not support security namespace for extended attribute (xattr) which is required by SELinux. The second one is that it's difficult to apply SELinux policy to Dalvik process on which an Android application runs on. The third one is that Android lacks methods, tools and libraries to interact with SELinux. The last one is how to update the SELinux policy automatically when installing or removing an application. In this paper, we propose solutions for the above limitations that make the SELinux more adaptive and suitable for Android framework.

  • PDF

PC-based CMS Development (개인용 컴퓨터를 이용한 Choropleth Map System 개발)

  • 구자용;황철수;김재한;유근배
    • Spatial Information Research
    • /
    • v.2 no.2
    • /
    • pp.107-116
    • /
    • 1994
  • Choropleth map is a type of thematic maps in which areal units are shaded with a color or pattern that symbolizes some characteristic of the mapped unit. CMS was first developed to produce choropleth maps on ordinary microcomputer environments in 1988. Since then there have been significant technological developments and enhancements in user environments, which have affected the field of choropleth mapping systems posi¬tively. A new version of CMS was developed in accordance with these changes. CMS II requires an IBM PC, or compatible, with the minimum 640KB memory and VGA graphic board. It supports HP laser jet printers to output a high resolution map. The program can use Hangul letters for main menu, map title, and legend. And dBase file format (DEW) was implemented to exchange attribute files effectively.

  • PDF

Automatic Generation of MAEC and STIX Standards for Android Malware Threat Intelligence

  • Park, Jungsoo;Nguyen Vu, Long;Bencivengo, George;Jung, Souhwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3420-3436
    • /
    • 2020
  • Due to the increasing number of malicious software (also known as malware), methods for sharing threat information are being studied by various organizations. The Malware Attribute Enumeration and Characterization (MAEC) format of malware is created by analysts, converted to Structured Threat Information Expression (STIX), and distributed by using Trusted Automated eXchange of Indicator Information (TAXII) protocol. Currently, when sharing malware analysis results, analysts have to manually input them into MAEC. Not many analysis results are shared publicly. In this paper, we propose an automated MAEC conversion technique for sharing analysis results of malicious Android applications. Upon continuous research and study of various static and dynamic analysis techniques of Android Applications, we developed a conversion tool by classifying parts that can be converted automatically through MAEC standard analysis, and parts that can be entered manually by analysts. Also using MAEC-to-STIX conversion, we have discovered that the MAEC file can be converted into STIX. Although other researches have been conducted on automatic conversion techniques of MAEC, they were limited to Windows and Linux only. In further verification of the conversion rate, we confirmed that analysts could improve the efficiency of analysis and establish a faster sharing system to cope with various Android malware using our proposed technique.

Security Elevation of XML Document Using DTD Digital Signature (DTD 전자서명을 이용한 XML문서의 보안성 향상)

  • 김형균;오무송
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.592-596
    • /
    • 2002
  • Can speak that DTD is meta data that define meaning of expressed data on XML document. Therefore, In case DTD information is damaged this information to base security of XML document dangerous. Not that attach digital signature on XML document at send-receive process of XML document in this research, proposed method to attach digital signature to DTD. As reading DTD file to end first, do parsing, and store abstracted element or attribute entitys in hash table. Read hash table and achieve message digest if parsing is ended. Compose and create digital signature with individual key after achievement. When sign digital, problem that create entirely other digest cost because do not examine about order that change at message digest process is happened. This solved by method to create DTD's digital signature using DOM that can embody tree structure for standard structure and document.

  • PDF