• Title/Summary/Keyword: information processing scope

Search Result 171, Processing Time 0.032 seconds

A Study on De-Identification Methods to Create a Basis for Safety Report Text Mining Analysis (항공안전 보고 데이터 텍스트 분석 기반 조성을 위한 비식별 처리 기술 적용 연구)

  • Hwang, Do-bin;Kim, Young-gon;Sim, Yeong-min
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.4
    • /
    • pp.160-165
    • /
    • 2021
  • In order to identify and analyze potential aviation safety hazards, analysis of aviation safety report data must be preceded. Therefore, in consideration of the provisions of the Aviation Safety Act and the recommendations of ICAO Doc 9859 SMM Edition 4th, personal information in the reporting data and sensitive information of the reporter, etc. It identifies the scope of de-identification targets and suggests a method for applying de-identification processing technology to personal and sensitive information including unstructured text data.

The Effect of the Sentence Location on Arabic Sentiment Analysis

  • Alotaibi, Saud S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.317-319
    • /
    • 2022
  • Rich morphology language such as Arabic needs more investigation and method to improve the sentiment analysis task. Using all document parts in the process of the sentiment analysis may add some unnecessary information to the classifier. Therefore, this paper shows the ongoing work to use sentence location as a feature with Arabic sentiment analysis. Our proposed method employs a supervised sentiment classification method by enriching the feature space model with some information from the document. The experiments and evaluations that were conducted in this work show that our proposed feature in the sentiment analysis for Arabic improves the performance of the classifier compared to the baseline model.

A Gene Clustering Method with Hierarchical Visualization of Alignment Pairs (계층적 정렬쌍 가시화를 이용한 유전자 클러스터 탐색 알고리즘)

  • Jin, Hee-Jeong;Park, Su-Hyun;Cho, Hwan-Gue
    • The KIPS Transactions:PartA
    • /
    • v.16A no.3
    • /
    • pp.143-152
    • /
    • 2009
  • One of the main issues in comparative genomics is to study chromosomal gene order in one or more related species. For this purpose, the whole genome alignment is usually applied to find the horizontal gene transfer, gene duplication, and gene loss between two related genomes. Also it is well known that the novel visualization tool with whole genome alignment is greatly useful for us to understand genome organization and evolution process. There are a lot of algorithms and visualization tools already proposed to find the "gene clusters" on genome alignments. But due to the huge size of whole genome, the previous visualization tools are not convenient to discover the relationship between two genomes. In this paper, we propose AlignScope, a novel visualization system for whole genome alignment, especially useful to find gene clusters between two aligned genomes. This AlignScope not only provides the simplified structure of genome alignment at any simplified level, but also helps us to find gene clusters. In experiment, we show the performance of AlignScope with several microbial genomes such as B. subtilis, B.halodurans, E. coli K12, and M. tuberculosis H37Rv, which have more than 5000 alignment pairs (matched DNA subsequence).

An efficient Multicast Delivery Mechanism Based on Locality in Mobile IPv6 Networks (이동 IPv6 환경에서 지역성에 기반한 효율적인 멀티캐스트 전송 메커니즘)

  • Sung Sulyun;Kim Kiyoung;Shin Yongtae
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.409-418
    • /
    • 2005
  • This paper presents an efficient multicast method based on a locality in mobile IPv6 networks. We exploit the repetitive movement pattern of mobile node to reduce the total number of experience of graft and join procedure. We defined the locality scope by a movement pattern. While the network is included in the locality scope, the network should maintain a multicast tree even when the mobile node moves to the other network. In this way, the mobile host can receive a multicast service without a delay when it moves to the network in the locality scope later. We compare our scheme with existing schemes under the total signaling cost and the service delay time by using a discrete analytical model for cost analysis. Analytical results demonstrated that the total signaling cost and service delay time was significantly reduced through our proposed scheme.

Implementation and Operation of Network Interface Module based on Mini- MAP Environment (Mini-MAP 환경에서 네트워크 접속장치의 구현과 시험 운영)

  • Lee, Min-Nam;Kim, Jeong-Ho;Lee, Sang-Beom
    • The Transactions of the Korea Information Processing Society
    • /
    • v.1 no.2
    • /
    • pp.263-271
    • /
    • 1994
  • Automation of production in modern manufacturing is based on the integration of the various stage of production process by means of processing system. Information processing and network interface are of fundamental importance in programmable device in industrial automation, as they essential in order to active integration in production lines. In this paper, TBC(token bus controller) in the Mini-MAP board performs the function of the MAC sublayer, The LLC sublayer is implemented according to the specification of Class 3 that includes Type 1 and 3. And the MMS services are designed within the scope of implementation MAP 3.0 All the softwares are implemented under the real time executive for real time application of the Mini-MAP and they are loaded into PROMs at the network board. We tested the LLC functions to make use of a protocol analyzer for the token bus protocol. Also the MMS conformance test was carried out by exchanging primitives between a model system(including NIU) and a MMS product that had already passed the conformance the conformance test based on measurement method of network analysis.

  • PDF

A Study on Replacing NAT using IPv6 Functionality (IPv6를 이용한 NAT 대체 방법에 관한 연구)

  • Yang, Jin-Seok;Kim, Hyoun-Ku;Lim, Hyoung-Jin;Lee, Seung-Yun;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11b
    • /
    • pp.651-654
    • /
    • 2003
  • IPv6는 최신 장치에 대한 추가기능요구와 사용한 수 있는 인터넷 주소의 고갈이 임박해옴에 따라 만들어졌다. 기존의 IPv4 환경에서는 주소 부족에 대한 단기 해결책으로 NAT 등 여러 가지 메커니즘이 제시되었다. IPv6의 등장으로 IPv4의 주소 부족이라는 문제를 해결하였으나 NAT는 계속해서 사용되고 있으며 이로 인해 보안 서비스측면, 인터넷 및 통신 아키텍처 투명성 등의 문제들이 제기되고 있다. NAT 관련 문제를 해결하기 위한 기존의 접근 방법은 NAT와 상호운용성을 전제로 하고 있으나, 본 논문은 NAT를 대체할 수 있는 IPv6의 기능을 기술한다. NAT가 없어지면 각종 보안 서비스에 있어서 문제가 되고 있는 많은 복잡한 문제들도 해결된다. IPv6는 NAT를 대체를 위해 주소 공간, 자동설정메커니즘, 멀티캐스팅 범주(scope), 흡별 처리의 기능들이 존재한다. 각 기능들은 NAT의 장점을 대체할 수 있다.

  • PDF

Design and Implementation of School Affairs Management System using PHP on the Internet (인터넷 상에서 PHP를 이용한 학사관리 시스템의 설계 및 구현)

  • Moon, Jin-Yong;Koo, Yong-Wan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3148-3154
    • /
    • 2000
  • In this paper. the design and implementationof the on-line registration system for the school affairs is described. The environments for the system configurations include a PC server under Linux Iperating System. Apache Web-server, and MySQL as database engine. In addition, PHP, which becomes a popular Internet server-based script language lately, is used to implement a real-time database. In order to avoid overload problems during short-term registration period, which deconstraces the typical surge of traffics, the proposed system is designed to minimize the unnecessary interfacing tasks. On administrator side task, the sytem is designed to have environments by separating the dechcated server that restricts the scope of specific database thasks. In doing so, it become possibal to build an optical system by distributing, balancing the transaction load, maintainimg the security and efficient administrative tasks.

  • PDF

A Secure Identity Management System for Secure Mobile Cloud Computing (안전한 모바일 클라우드 컴퓨팅을 위한 ID 관리 시스템)

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.516-519
    • /
    • 2014
  • Cloud computing is an up-and-coming paradigm shift transforming computing models from a technology to a utility. However, security concerns related to privacy, confidentiality and trust are among the issues that threaten the wide deployment of cloud computing. With the advancement of ubiquitous mobile-based clients, the ubiquity of the model suggests a higher integration in our day to day life and this leads to a rise in security issues. To strengthen the access control of cloud resources, most organizations are acquiring Identity Management Systems (IDM). This paper presents one of the most popular IDM systems, specifically OAuth, working in the scope of Mobile Cloud Computing which has many weaknesses in its protocol flow. OAuth is a Delegated Authorization protocol, and not an Authentication protocol and this is where the problem lies. This could lead to very poor security decisions around authentication when the basic OAuth flow is adhered to. OAuth provides an access token to a client, so that it can access a protected resource, based on the permission of the resource owner. Many researchers have opted to implement OpenlD alongside OAuth so as to solve this problem. But OpenlD similarly has several security flows. This paper presents scenarios of how insecure implementations of OAuth can be abused maliciously. We incorporate an authentication protocol to verify the identities before authorization is carried out.

Autoconfiguration of Initial State of a Scalable Platform Over Cloud Environment (클라우드 환경을 통한 확장 가능한 플랫폼 초기 상태의 자동 구성)

  • Morales, Mauricio Alejandro Gomez;Gordillo, Berny Alfonso Carrera;Garcia, Guillermo Crocker;Hung, Pham Phuoc;Islam, Md. Motaharul;Huh, Eui-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.857-860
    • /
    • 2013
  • Companies that have high need of some computational resources for an specific space of time, nowadays, the pay as they use manner for resources required, that, is a good solution provided these days by some Cloud computing providers. Also solutions that represent a distributed computation for processes with high demand of calculation have appeared lately, the only problem is that when they are created, they need also be configured to share the same working space, this is the scope that comprehends this work, where the aim is to propose a framework that can be used as a solution of automation of the configurations that sometimes can take undetermined time and sometimes the user that configures it has to have a lot of knowledge and also configurations can turn in tricky ones generating a delay in the time where real productivity should be exploited.

Fuzzy Linguistic Recommender Systems for the Selective Diffusion of Information in Digital Libraries

  • Porcel, Carlos;Ching-Lopez, Alberto;Bernabe-Moreno, Juan;Tejeda-Lorente, Alvaro;Herrera-Viedma, Enrique
    • Journal of Information Processing Systems
    • /
    • v.13 no.4
    • /
    • pp.653-667
    • /
    • 2017
  • The significant advances in information and communication technologies are changing the process of how information is accessed. The internet is a very important source of information and it influences the development of other media. Furthermore, the growth of digital content is a big problem for academic digital libraries, so that similar tools can be applied in this scope to provide users with access to the information. Given the importance of this, we have reviewed and analyzed several proposals that improve the processes of disseminating information in these university digital libraries and that promote access to information of interest. These proposals manage to adapt a user's access to information according to his or her needs and preferences. As seen in the literature one of the techniques with the best results, is the application of recommender systems. These are tools whose objective is to evaluate and filter the vast amount of digital information that is accessible online in order to help users in their processes of accessing information. In particular, we are focused on the analysis of the fuzzy linguistic recommender systems (i.e., recommender systems that use fuzzy linguistic modeling tools to manage the user's preferences and the uncertainty of the system in a qualitative way). Thus, in this work, we analyzed some proposals based on fuzzy linguistic recommender systems to help researchers, students, and teachers access resources of interest and thus, improve and complement the services provided by academic digital libraries.