• Title/Summary/Keyword: internet addresses

Search Result 232, Processing Time 0.024 seconds

Enhancing Recommender Systems by Fusing Diverse Information Sources through Data Transformation and Feature Selection

  • Thi-Linh Ho;Anh-Cuong Le;Dinh-Hong Vu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1413-1432
    • /
    • 2023
  • Recommender systems aim to recommend items to users by taking into account their probable interests. This study focuses on creating a model that utilizes multiple sources of information about users and items by employing a multimodality approach. The study addresses the task of how to gather information from different sources (modalities) and transform them into a uniform format, resulting in a multi-modal feature description for users and items. This work also aims to transform and represent the features extracted from different modalities so that the information is in a compatible format for integration and contains important, useful information for the prediction model. To achieve this goal, we propose a novel multi-modal recommendation model, which involves extracting latent features of users and items from a utility matrix using matrix factorization techniques. Various transformation techniques are utilized to extract features from other sources of information such as user reviews, item descriptions, and item categories. We also proposed the use of Principal Component Analysis (PCA) and Feature Selection techniques to reduce the data dimension and extract important features as well as remove noisy features to increase the accuracy of the model. We conducted several different experimental models based on different subsets of modalities on the MovieLens and Amazon sub-category datasets. According to the experimental results, the proposed model significantly enhances the accuracy of recommendations when compared to SVD, which is acknowledged as one of the most effective models for recommender systems. Specifically, the proposed model reduces the RMSE by a range of 4.8% to 21.43% and increases the Precision by a range of 2.07% to 26.49% for the Amazon datasets. Similarly, for the MovieLens dataset, the proposed model reduces the RMSE by 45.61% and increases the Precision by 14.06%. Additionally, the experimental results on both datasets demonstrate that combining information from multiple modalities in the proposed model leads to superior outcomes compared to relying on a single type of information.

A Design of SSD Dedicated RAID System for Efficient Resource Management (효율적인 자원관리를 위한 SSD 전용 RAID 시스템 설계)

  • Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.109-114
    • /
    • 2024
  • Enterprise storage systems that require high data reliability are applying RAID (Redundant Array of Independent Disks) systems to recover from data loss and failure. In particular, RAID 5 ensures space efficiency and reliability by distributing parity across multiple storage devices. However, when storage devices have different capacities, RAID is built based on the smallest capacity storage device, resulting in wasted storage space. Therefore, research is needed to solve this resource management problem. In this paper, we propose a method for RAID grouping of each independent NAND flash memory block in a RAID consisting of SSD (Solid State Disk) with external SSDs as well as internal SSDs. This method is divided into a policy for delivering block information inside SSDs to the RAID system and a policy for RAID grouping of physical addresses delivered from the RAID system. This method allows us to maintain a RAID that does not waste resources when SSDs of different capacities are grouped into RAID5. Finally, we demonstrate the effectiveness of the proposed method through experiments.

Near-Optimal Low-Complexity Hybrid Precoding for THz Massive MIMO Systems

  • Yuke Sun;Aihua Zhang;Hao Yang;Di Tian;Haowen Xia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.1042-1058
    • /
    • 2024
  • Terahertz (THz) communication is becoming a key technology for future 6G wireless networks because of its ultra-wide band. However, the implementation of THz communication systems confronts formidable challenges, notably beam splitting effects and high computational complexity associated with them. Our primary objective is to design a hybrid precoder that minimizes the Euclidean distance from the fully digital precoder. The analog precoding part adopts the delay-phase alternating minimization (DP-AltMin) algorithm, which divides the analog precoder into phase shifters and time delayers. This effectively addresses the beam splitting effects within THz communication by incorporating time delays. The traditional digital precoding solution, however, needs matrix inversion in THz massive multiple-input multiple-output (MIMO) communication systems, resulting in significant computational complexity and complicating the design of the analog precoder. To address this issue, we exploit the characteristics of THz massive MIMO communication systems and construct the digital precoder as a product of scale factors and semi-unitary matrices. We utilize Schatten norm and Hölder's inequality to create semi-unitary matrices after initializing the scale factors depending on the power allocation. Finally, the analog precoder and digital precoder are alternately optimized to obtain the ultimate hybrid precoding scheme. Extensive numerical simulations have demonstrated that our proposed algorithm outperforms existing methods in mitigating the beam splitting issue, improving system performance, and exhibiting lower complexity. Furthermore, our approach exhibits a more favorable alignment with practical application requirements, underlying its practicality and efficiency.

Analysis of University Cafeteria Safety Based on Pathfinder Simulation

  • Zechen Zhang;Jaewook Lee;Hasung Kong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.209-217
    • /
    • 2024
  • Recent years have seen a notable increase in fire incidents in university cafeterias, yet the social attention to these occurrences remains limited. Despite quick responses to these incidents preventing loss of life, the need for large-scale evacuation in such high foot traffic areas can cause significant disruptions, economic losses, and panic among students. The potential for stampedes and unpredictable damage during inadequate evacuations underscores the importance of fire safety and evacuation research in these settings. Previous studies have explored evacuation models in various university environments, emphasizing the influence of environmental conditions, personal characteristics, and behavioral patterns on evacuation efficiency. However, research specifically focusing on university cafeterias is scarce. This paper addresses this gap by employing Pathfinder software to analyze fire spread and evacuation safety in a university cafeteria. Pathfinder, an advanced emergency evacuation assessment system, offers realistic 3D simulations, crucial for intuitive and scientific evacuation analysis. The studied cafeteria, encompassing three floors and various functional areas, often exceeds a capacity of 1500 people, primarily students, during peak times. The study includes constructing a model of the cafeteria in Pathfinder and analyzing evacuation scenarios under different fire outbreak conditions on each floor. The paper sets standard safe evacuation criteria (ASET > RSET) and formulates three distinct evacuation scenarios, considering different fire outbreak locations and initial evacuation times on each floor. The simulation results reveal the impact of the fire's location and the evacuation preparation time on the overall evacuation process, highlighting that fires on higher floors or longer evacuation preparation times tend to reduce overall evacuation time.In conclusion, the study emphasizes a multifaceted approach to improve evacuation safety and efficiency in educational settings. Recommendations include expanding staircase widths, optimizing evacuation routes, conducting regular drills, strengthening command during evacuations, and upgrading emergency facilities. The use of information and communication technology for managing emergencies is also suggested. These measures collectively form a comprehensive framework for ensuring safety in educational institutions during fire emergencies.

An Edge Enabled Region-oriented DAG-based Distributed Ledger System for Secure V2X Communication

  • S. Thangam;S. Sibi Chakkaravarthy
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.8
    • /
    • pp.2253-2280
    • /
    • 2024
  • In the upcoming era of transportation, a groundbreaking technology, known as vehicle-to-everything (V2X) communication, is poised to redefine our driving experience and revolutionize traffic management. Real-time and secure communication plays a pivotal role in V2X networks, with the decision-making process being a key factor in establishing communication and determining malicious nodes. The proposed framework utilizes a directed acyclic graph (DAG) to facilitate real-time processing and expedite decision-making. This innovative approach ensures seamless connectivity among vehicles, the surrounding infrastructure, and various entities. To enhance communication efficiency, the entire roadside unit (RSU) region can be subdivided into various sub-regions, allowing RSUs to monitor and govern each sub-region. This strategic approach significantly reduces transaction approval time, thereby improving real-time communication. The framework incorporates a consensus mechanism to ensure robust security, even in the presence of malicious nodes. Recognizing the dynamic nature of V2X networks, the addition and removal of nodes are aligned. Communication latency is minimized through the deployment of computational resources near the data source and leveraging edge computing. This feature provides invaluable recommendations during critical situations that demand swift decision-making. The proposed architecture is further validated using the "veins" simulation tool. Simulation results demonstrate a remarkable success rate exceeding 95%, coupled with a significantly reduced consensus time compared to prevailing methodologies. This comprehensive approach not only addresses the evolving requirements of secure V2X communication but also substantiates practical success through simulation, laying the foundation for a transformative era in transportation.

Implementation of Potential Field-Based Routing for Wireless Mesh Networks and its Performance Evaluation in Real-World Testbed (무선 메쉬 네트워크를 위한 포텐셜 필드 기반 라우팅의 구현과 실환경 테스트베드에서의 성능 평가)

  • Jihoon Sung;Yeunwoong Kyung
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.3
    • /
    • pp.1-6
    • /
    • 2024
  • In response to the increasing demand for unrestricted access to diverse services regardless of location, cost-effective and easily deployable Wireless Mesh Network (WMN) solutions have once again captured attention. This paper primarily addresses the implementation challenges of Autonomous Load-balancing Field-based Anycast routing+ (ALFA+) for three-dimensional (3D) WMNs. Subsequently, we evaluate the performance of ALFA+ in an 802.11-based 3D WMN testbed established within a university campus using commercial devices, thus validating the practical viability of ALFA+. While most prior research has relied on performance evaluation through virtual environment simulations, this study distinguishes itself by performance evaluations in a real-world testbed using commercial devices and providing detailed implementation-related information necessary for such evaluations. This approach holds considerable significance in assessing the actual applicability of ALFA+.

A Study on the Impact of the Intranet on Communication (인트라넷이 의사소통에 미치는 영향에 관한 연구)

  • Roh Kyung-Ho
    • Management & Information Systems Review
    • /
    • v.12
    • /
    • pp.53-75
    • /
    • 2003
  • The Internet is flourishing and the World Wide Web is growing at an exponential rate. A fundamental concept of Intranet, the so-called second wave, was introduced only a few years ago. Intranets have been embraced by corporate users of information services and made substantial inroads in strategic vision documents and procurement practices. Business organizations have come to the conclusion that they require an extensive data repository in order to acquire a competitive advantage in a dynamically change market. This rich assortment of data must further be delivered and deliverable enterprise-wide in a secure and cost-efficient manner. Information technology(IT) has created the Intranet as a vitally important mechanism for the storage, dissemination, and even the analysis data. The present study is an attempt to develop a more through understanding of the potential and actual impact of the Intranet on organizational functions and activities. Expecially, it also consists of an effort to assess the impact of the Intranet on communication. The research also addresses the issue of how the Intranet affects communication and shapes or modifies business activities. The results of literature review and study revealed that middle managers believe that the extent of the Intranet use is significantly related to improvements in overall organizational functions and activities. While communication, decision-making, productivity, work collaboration, and business activities are all enhanced by Intranet use, communication appears to be most dramatically improved by Intranet use.

  • PDF

IPv6 Networking with Subnet ID Deprecated

  • Kim, Young Hee;Kim, Dae Young;Park, Jong Won
    • Journal of Computing Science and Engineering
    • /
    • v.11 no.2
    • /
    • pp.49-57
    • /
    • 2017
  • This paper proposes a new IPv6 networking paradigm as a counter answer to the rationale for locator/identifier separation. Instead of involving separate number spaces each for node identifiers and locators, the context of the IP address as a node identifier alone is utilized and no additional locators are incorporated. That is, there are only node addresses and no locators, and location information is indirectly derived from neighbor relations between nodes. In order to accomplish this, no subnet IDs are utilized; the ID value is set to zero for all subnets. The paper details how to construct this paradigm through novel choice of operational policies in various IPv6 protocols and some trivial modifications. Especially, inherent provision of intra-domain node- as well as subnet-mobility by use of standard link-state intra-domain routing protocols is discussed. A number of important advantages of this paradigm over the canonical IPv6 networking and various known solutions of locator/identifier separation are discussed. Tailoring for multi-area domains and IPv4 is left for further study.

A Novel Development of Distributed Intelligent Control Module Based on the LonWorks Fieldbus for Air Handling Units in the Healing, Ventilating and Air Conditioning (LonWork fieldbus 기반을 가진 HVAC 공기조화기용 고성능 지능형제어모듈 개발)

  • 홍원표
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.18 no.1
    • /
    • pp.115-121
    • /
    • 2004
  • In this paper, a new distributed intelligent control module based on LonWoks fieldbus for air handling unit(AHU) of heating, ventilating and air-conditioning(HVAC) is proposed to replace with a conventional direct digital control(DDC) system with 32 bit microprocessor. The proposed control architecture has a excellent features such as highly compact and flexible function design, a low priced smart front-end and reliable performance with various functions. This also addresses issues in control network configuration, logical design of field devices by S/W tool, Internet networking and electronic element installation. Experimental results for showing the system performance are also included in this paper.

ARP Modification for Prevention of IP Spoofing

  • Kang, Jung-Ha;Lee, Yang Sun;Kim, Jae Young;Kim, Eun-Gi
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.3
    • /
    • pp.154-160
    • /
    • 2014
  • The address resolution protocol (ARP) provides dynamic mapping between two different forms of addresses: the 32-bit Internet protocol (IP) address of the network layer and the 48-bit medium access control (MAC) address of the data link layer. A host computer finds the MAC address of the default gateway or the other hosts on the same subnet by using ARP and can then send IP packets. However, ARP can be used for network attacks, which are one of the most prevalent types of network attacks today. In this study, a new ARP algorithm that can prevent IP spoofing attacks is proposed. The proposed ARP algorithm is a broadcast ARP reply and an ARP notification. The broadcast ARP reply was used for checking whether the ARP information was forged. The broadcast ARP notification was used for preventing a normal host's ARP table from being poisoned. The proposed algorithm is backward compatible with the current ARP protocol and dynamically prevents any ARP spoofing attacks. In this study, the proposed ARP algorithm was implemented on the Linux operating system; here, we present the test results with respect to the prevention of ARP spoofing attacks.