• Title/Summary/Keyword: multi-hierarchy

Search Result 288, Processing Time 0.025 seconds

Extended GTRBAC Model for Access Control Enforcement in Ubiquitous Environments (유비쿼티스 환경의 접근제어를 위한 확장된 GTRBAC 모델)

  • Hwang Yu-Dong;Park Dong-Gue
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.45-54
    • /
    • 2005
  • The existing access control models have the demerits that do not provide the limit function of using resources by time constraint, the restricted inheritance function as a superior role in role hierarchy, the delicate delegation policy and the limit function of using resources by the location information about a user for the access control in ubiquitous environment. This paper proposes an Extended-GTRBAC model is suited to the access control in ubiquitous environment by applying to sub-role concept of GTRBAC model that the application of resources can be restricted by the period and time and PBDM and considering the location information about a user on temporal constraint. The proposal model can restrict the inheritance of permission in role hierarchy by using sub-role, provide the delicate delegation policy such as user-to-user delegation, role to role delegation, multi-level delegation. multi-step delegation, and apply diverse and delicate access control policy which is suited the characteristic of ubiquitous environment by considering the location information about a user on temporal constraint.

  • PDF

Highway flood hazard mapping in Thailand using the Multi Criteria Analysis based the Analytic Hierarchy Process

  • Budhakooncharoen, Saisunee;Mahadhamrongchai, Wichien;Sukolratana, Jiraroth
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.236-236
    • /
    • 2015
  • Flood is one of the major natural disasters affecting millions of people. Thailand also, frequently faces with this type of disaster. Especially, 2011 mega flood in Central Thailand, inundated highway severely attributed to the failure of national economic and risk to life. Lesson learned from such an extreme event caused flood monitoring and warning becomes one of the sound mitigations. The highway flood hazard mapping accomplished in this research is one of the strategies. This is due to highway flood is the potential risk to life and limb, and potential damage to property. Monitoring and warning therefore help reducing live and property losses. In this study, degree of highway flood hazard was assessed by weighting factors for each cause of the highway flood using Multi Criteria Analysis (MCA) based Analytic Hierarchy Process (AHP). These weighting factors are the essential information to classify the degree of highway flood hazard to enable pinpoint on flood monitoring and flood warning in hazard areas. The highway flood causes were then investigated. It was found that three major factors influence to the highway flood are namely the highway characteristics, the hydrological characteristics and the land topography characteristics. The weight of importance for each cause of the highway flood in the whole country was assessed by weighting 3 major factors influence to the highway flood. According to the result of MCA analysis, the highway, the hydrological and the land topography characteristics were respectively weighted as 35, 35 and 30 percent influence to the cause of highway flood. These weighting factors were further utilized to classify the degree of highway flood hazard. The Weight Linear Combination (WLC) method was used to compute the total score of all highways according to each factor. This score was later used to categorize highway flood as high, moderate and low degree of hazard levels. Highway flood hazard map accomplished in this research study is applicable to serve as the handy tool for highway flood warning. However, to complete the whole warning process, flood water level monitoring system for example the camera gauge should be installed in the hazard highway. This is expected to serve as a simple flood monitor as part of the warning system during such extreme or critical event.

  • PDF

Text Augmentation Using Hierarchy-based Word Replacement

  • Kim, Museong;Kim, Namgyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.1
    • /
    • pp.57-67
    • /
    • 2021
  • Recently, multi-modal deep learning techniques that combine heterogeneous data for deep learning analysis have been utilized a lot. In particular, studies on the synthesis of Text to Image that automatically generate images from text are being actively conducted. Deep learning for image synthesis requires a vast amount of data consisting of pairs of images and text describing the image. Therefore, various data augmentation techniques have been devised to generate a large amount of data from small data. A number of text augmentation techniques based on synonym replacement have been proposed so far. However, these techniques have a common limitation in that there is a possibility of generating a incorrect text from the content of an image when replacing the synonym for a noun word. In this study, we propose a text augmentation method to replace words using word hierarchy information for noun words. Additionally, we performed experiments using MSCOCO data in order to evaluate the performance of the proposed methodology.

Energy Efficient Routing Protocols based on LEACH in WSN Environment (WSN 환경에서 LEACH 기반 에너지 효율적인 라우팅 프로토콜)

  • Dae-Kyun Cho;Tae-Wook Kwon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.4
    • /
    • pp.609-616
    • /
    • 2023
  • In a wireless network environment, since sensors are not always connected to power, the life of a battery, which is an energy source supplied to sensors, is limited. Therefore, various studies have been conducted to extend the network life, and a layer-based routing protocol, LEACH(: Low-energy Adaptive Clustering Hierarchy), has emerged for efficient energy use. However, the LEACH protocol, which transmits fused data directly to the sink node, has a limitation in that it consumes as much energy as the square of the transmission distance when transmitting data. To improve these limitations, this paper proposes an algorithm that can minimize the transmission distance with multi-hop transmission where cluster heads are chained between cluster heads through relative distance calculation from sink nodes in every round.

A Study on the Relationship between Class Similarity and the Performance of Hierarchical Classification Method in a Text Document Classification Problem (텍스트 문서 분류에서 범주간 유사도와 계층적 분류 방법의 성과 관계 연구)

  • Jang, Soojung;Min, Daiki
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.3
    • /
    • pp.77-93
    • /
    • 2020
  • The literature has reported that hierarchical classification methods generally outperform the flat classification methods for a multi-class document classification problem. Unlike the literature that has constructed a class hierarchy, this paper evaluates the performance of hierarchical and flat classification methods under a situation where the class hierarchy is predefined. We conducted numerical evaluations for two data sets; research papers on climate change adaptation technologies in water sector and 20NewsGroup open data set. The evaluation results show that the hierarchical classification method outperforms the flat classification methods under a certain condition, which differs from the literature. The performance of hierarchical classification method over flat classification method depends on class similarities at levels in the class structure. More importantly, the hierarchical classification method works better when the upper level similarity is less that the lower level similarity.

Weights of Attributes in Creating Transit Malls (대중교통전용지구의 조성목적에 따른 계획요소별 중요도 평가)

  • Park, Jong-Il;Chang, Justin S.
    • Journal of Korean Society of Transportation
    • /
    • v.32 no.2
    • /
    • pp.130-138
    • /
    • 2014
  • This paper assessed the weights of attributes in creating transit malls. The aim of the creation was classified as travel demand management and urban revitalization. The attributes were grouped into four aspects, or 4As: attraction, amenity, accessibility, and activity. These dimensions represented land-use, urban design, transport, and socio-cultural characteristics, respectively. The analytical hierarchy process was applied to explore the weights. Accessibility(52.7%), attraction(25.6%), amenity(13.7%), and activity(8.0%) were the order of magnitude in weights for the purpose of travel demand management, while attraction(36.1%), accessibility(30.6%), amenity(17.7%), and activity(15.6%) were that of urban revitalization. The multi criteria analysis also showed different size of weights in the sub planning attributes. These results indicate that the aimin implementingtransit malls should be differentiated and highlight that the combined land-use and transport plan is essential for the successful development. Car accessibility and socio-cultural characteristics are also understood as the important factors.

Visualization method of User Hierarchy of among SNS users (소셜 네트워크 서비스 사용자의 계층 시각화 방법)

  • Park, Sun;Jeong, Jong-Geun;Yeu, Moo-Song;Lee, Seong-Ro
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1717-1724
    • /
    • 2012
  • Information of social relationship of users on online is useful information for other services such as recommend information of commercial activity. So, there is a lot of studies analysis with connection to visualization of social network. Most of the previous works of visualization focus on representing user's relationship on social network by a complex multi dimension graph. However, this method is difficult to identify the important of relationship to focus on personal user intuitively. In order to resolve above problem, this paper proposes a new visualization method using the user's correlation and user relationship of network node. The proposed method visualizes the hierarchy relationship of users using the internal relation of network reflecting user's message and external relation of network nodes.

An Efficient Watermarking for Tamper Localization Proofing (국부적인 변형 검출을 위한 효율적인 워터마킹)

  • Woo, Chan-Il;Jeon, Se-Gil
    • 전자공학회논문지 IE
    • /
    • v.43 no.2
    • /
    • pp.87-92
    • /
    • 2006
  • Many watermarking methods for protecting the intellectual property right and authentication multimedia data have been proposed in recent years. In image authentication watermarking, watermark is inserted into an image to detect any malicious alteration. So, watermark for authentication and integrity should be erased easily when the image is changed by scaling or cropping etc. We propose in this paper a fragile watermarking algorithm for image integrity verification and tamper localization proofing using special hierarchical structure. In the proposed method, the image to be watermarked is divided into blocks in a multi-level hierarchy and calculating block digital signatures in thus hierarchy. At each level of the hierarchy, a digital signature for each block is calculated using the seven most significant bit(MSBs)-plane values of all pixels within the block. And the resulting signature is incorporated into the LSBs of selected pixels within the block. We provide experimental results to demonstrate the effectiveness of the proposed method.

An Integrated Model Using the Analytic Hierarchy Process and Linear Programming for the Supplier Selection (공급업체 선정을 위한 계층분석과정과 선형계획모형의 통합모형)

  • Kim, Shin-Joong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.239-246
    • /
    • 2008
  • The supplier selection has a direct effect on the organization's efficiency, effectiveness and competitiveness, so the right supplier selection is the most important decision of a company. In order to select the best suppliers, both qualitative and quantitative factors should be considered. To decide which suppliers are the best and how much should be purchased from each selected supplier, many models which considered a single objective and multiple objectives have been proposed. But they have problems in considering qualitative factors which are very important in supplier selection. So in this article an integration model of an analytical hierarchy process and linear programming is proposed to consider both qualitative and quantitative factors in choosing the best suppliers and placing the optimum order quantities among them. This integrated model can be applied effectively and easily any organization and management circumstances.

  • PDF

An Integrated AHP-VIKOR Methodology for Facility Layout Design

  • Shokri, Hamidreza;Ashjari, Behzad;Saberi, Morteza;Yoon, Jin Hee
    • Industrial Engineering and Management Systems
    • /
    • v.12 no.4
    • /
    • pp.389-405
    • /
    • 2013
  • A facility layout design (FLD) problem can be generally introduced as assignment of facilities (departments) to a site such that a set of criteria are satisfied or some objectives are minimized (maximized). Hence, it can be considered as a multi-criteria problem due to the presence of qualitative criteria such as maintenance or flexibility and quantitative criteria such as the total cost of handling material. The VIKOR method was developed to solve multiple criteria decision making problems with conflicting and non-commensurable (different units) criteria, assuming that compromising is acceptable for conflict resolution, the decision maker wants a solution that is the closest to the ideal, and the alternatives are evaluated according to all established criteria. This paper proposes a hierarchical analytic hierarchy process (AHP) and VIKOR approach to solve the FLD problem. A computer-aided layout-planning tool is adopted to generate the facility layout problems, as well as their quantitative data. The qualitative performance measures are weighted by AHP. VIKOR is then used to solve the FLD problem. Finally, the proposed integrated procedure is applied to three real-time examples.