• Title/Summary/Keyword: online identification

Search Result 233, Processing Time 0.022 seconds

Online Identification for Normal and Abnormal Status of Water Quality on Ocean USN (해양 USN 환경에서 수질환경의 온라인 정상·비정상 상태 구분)

  • Jeoung, Sin-Chul;Ceong, Hee-Taek
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.4
    • /
    • pp.905-915
    • /
    • 2012
  • This paper suggests the online method to identify normal and abnormal state of water quality on the ocean USN. To define normal of the ocean water quality, we utilize the negative selection algorithm of artificial immunity system which has self and nonself identification characteristics. To distinguish abnormal status, normal state set of the ocean water quality needs to be defined. For this purpose, we generate normal state set base on mutations of each data and mutation of the data as logical product. This mutated normal (or self) sets used to identify abnormal status of the water quality. We represent the experimental result about mutated self set with the Gaussian function. Through setting the method on the ocean sensor logger, we can monitor whether the ocean water quality is normal or abnormal state by online.

The Online Protective Coordination Schemes of the Distribution Systems with Distributed Generation (분산전원이 연계된 배전계통의 온라인 보호협조 방안)

  • Choi, Joon-Ho;Ro, Kyoung-Soo;Kim, Jae-Chul
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.21 no.3
    • /
    • pp.132-141
    • /
    • 2007
  • Recently, there has been growing interest in distributed resources with high-energy efficiency due to the increasing energy consumption and environmental pollution problems. But an insertion of new distributed generation to existing power distribution systems can cause several problems such as voltage variations, harmonics, protective coordination, increasing fault current etc. In this paper, a new method of the fault location identification at the distribution system with distributed resources, which can be determined by the magnitude and direction of the fault current, is proposed. In addition, a new online protective coordination scheme of recloser-sectionalizer is proposed based on the proposed fault location identification method for distribution system with distributed resources.

A Secure Yoking-Proof Protocol Providing Offline Verification (오프라인 검증을 지원하는 안전한 요킹증명 프로토콜)

  • Ham, Hyoungmin
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.113-120
    • /
    • 2021
  • RFID (Radio Frequency Identification) yoking authentication provides methods scanning a pair of RFID tags with a reader device and verifying them to ensure the physical proximity of objects. In the first yoking proof protocols, a verifier connected to a reader device online is essential to verify the yoking proof, and this condition limits the environment in which yoking proof can be applied. To solve this limitation, several studies have been conducted on offline yoking proof protocol that does not require the online connection between a reader and a verifier. However, the offline yoking proof protocols do not guarantee the basic requirements of yoking proof, and require relatively more operations on the tag compared to the previous yoking proof protocols. This paper proposes an efficient offline yoking proof protocol that supports offline verification without the need for an online verifier. The proposed protocol provides a secure yoking proof with fewer number of operations than the existing ones, and it also can be extended to the group proof for more than a pair of tags without additional devices. The analysis in this paper shows that the proposed protocol provides offline verification securely and effectively.

A Method for Identifying Nicknames of a User based on User Behavior Patterns in an Online Community (온라인 커뮤니티 사용자의 행동 패턴을 고려한 동일 사용자의 닉네임 식별 기법)

  • Park, Sang-Hyun;Park, Seog
    • Journal of KIISE
    • /
    • v.45 no.2
    • /
    • pp.165-174
    • /
    • 2018
  • An online community is a virtual group whose members share their interests and hobbies anonymously with nicknames unlike Social Network Services. However, there are malicious user problems such as users who write offensive contents and there may exist data fragmentation problems in which the data of the same user exists in different nicknames. In addition, nicknames are frequently changed in the online community, so it is difficult to identify them. Therefore, in this paper, to remedy these problems we propose a behavior pattern feature vectors for users considering online community characteristics, propose a new implicit behavior pattern called relationship pattern, and identify the nickname of the same user based on Random Forest classifier. Also, Experimental results with the collected real world online community data demonstrate that the proposed behavior pattern and classifier can identify the same users at a meaningful level.

The Effects of Sports Star Influencer Advertising Value and Consumer Team Identification on Brand Equity (스포츠 스타 인플루언서 광고가치와 소비자 팀동일시가 브랜드자산에 미치는 영향)

  • Lee, Jin Kyun;Um, Namhyun
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.180-196
    • /
    • 2021
  • The goal of this research is to examine the effects of sports star influencer advertising value on brand equity in social networking sites. In particular, this study identifies the moderating role of consumer team identification. A total of 350 university students participated via online survey. To test proposed hypotheses, confirmatory factor analysis, structural equation modeling, and multi-group analysis were employed. It was found that informativeness, entertainment, and credibility showed significant positive effects on brand equity. Also, significant moderation effects of team identification were found in that consumers with high team identification compared to those with low team identification perceived higher value of entertainment. On the other hand, consumers with low team identification perceived more irritation than those with high team identification. This study contributes to the understanding of sports star influencer advertising in social networking sites. Theoretical and practical implications as well as suggestions for future research in this area are provided.

A Study on The Actual Application of the Least Order Load Observer and Effective Online Inertia Identification Algorithm for High Performance Linear Motor Positioning System (고성능 선형전동기 위치제어 시스템에 대한 최소차원 부하관측기의 실제적 구현 및 이를 이용한 실시간 관성추정기의 구현)

  • Kim, Joohn-Sheok
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.4
    • /
    • pp.730-738
    • /
    • 2007
  • As well known when the linear machine is operated between two points repeatedly under positioning control, there are various positioning error at the moment of zero speed owing to the non-linear disturbance like as unpredictable friction force. To remove this positioning error, a simple least order disturbance observer is introduced and is actually implemented in this study. Due to this simple algorithm the over-all machine system can be modified to simple arbitrary given one-mass load without any disturbance. So, the total construction process for positioning control system is much easier than old one. Moreover, to generate a proper effective position profile with the limited actual machine force, a very powerful on-line mass identification algorithm using the load force estimator is presented. In the proposed mass identification algorithm, the exact load mass can be calculated during only one moving stage under a normally generated position profile. All presented algorithm is verified with experimental result with commercial linear servo machine system.

A Novel Sensorless Low Speed Vector Control for Synchronous Reluctance Motors Using a Block Pulse Function-Based Parameter Identification

  • Ahmad Ghaderi;Tsuyoshi Hanamoto;Teruo Tsuji
    • Journal of Power Electronics
    • /
    • v.6 no.3
    • /
    • pp.235-244
    • /
    • 2006
  • Recently, speed sensorless vector control for synchronous reluctance motors (SYRMs) has deserved attention because of its advantages. Although rotor angle calculation using flux estimation is a straightforward approach, the DC offset can cause an increasing pure integrator error in this estimator. In addition, this method is affected by parameter fluctuation. In this paper, to control the motor at the low speed region, a modified programmable cascaded low pass filter (MPCPLF) with sensorless online parameter identification based on a block pulse function is proposed. The use of the MPCLPF is suggested because in programmable, cascade low pass filters (PCLPF), which previously have been applied to induction motors, the drift increases vastly wl)en motor speed decreases. Parameter identification is also used because it does not depend on estimation accuracy and can solve parameter fluctuation effects. Thus, sensorless speed control in the low speed region is possible. The experimental system includes a PC-based control with real time Linux and an ALTERA Complex Programmable Logic Device (CPLD), to acquire data from sensors and to send commands to the system. The experimental results show the proposed method performs well, speed and angle estimation are correct. Also, parameter identification and sensorless vector control are achieved at low speed, as well as, as at high speed.

Research on the development of automated tools to de-identify personal information of data for AI learning - Based on video data - (인공지능 학습용 데이터의 개인정보 비식별화 자동화 도구 개발 연구 - 영상데이터기반 -)

  • Hyunju Lee;Seungyeob Lee;Byunghoon Jeon
    • Journal of Platform Technology
    • /
    • v.11 no.3
    • /
    • pp.56-67
    • /
    • 2023
  • Recently, de-identification of personal information, which has been a long-cherished desire of the data-based industry, was revised and specified in August 2020. It became the foundation for activating data called crude oil[2] in the fourth industrial era in the industrial field. However, some people are concerned about the infringement of the basic rights of the data subject[3]. Accordingly, a development study was conducted on the Batch De-Identification Tool, a personal information de-identification automation tool. In this study, first, we developed an image labeling tool to label human faces (eyes, nose, mouth) and car license plates of various resolutions to build data for training. Second, an object recognition model was trained to run the object recognition module to perform de-identification of personal information. The automated personal information de-identification tool developed as a result of this research shows the possibility of proactively eliminating privacy violations through online services. These results suggest possibilities for data-based industries to maximize the value of data while balancing privacy and utilization.

  • PDF

Evaluation Criteria for Suitable Authentication Method for IoT Service Provider in Industry 4.0 Environment (4차 산업혁명 시대의 IoT 서비스 참여 주체에 대한 적합한 인증수단 선택을 위한 평가기준)

  • Jeong, Kwang Seob;Bae, Sukjoo;Kim, Hyoungtae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.3
    • /
    • pp.116-122
    • /
    • 2017
  • Advances in information technology, communication and network technology are radically facilitating digital convergences as the integration of human, equipment, and space in the current industry 4.0 era. In industry 4.0 environment, the vast amount of information with networked computing technology can be simultaneously accessible even in limited physical space. Two main benefit points out of these information are the convenience and efficiency in their online transactions either buying things online or selling online. Even though there exist so many benefits that information technology can create for the people doing business over the internet there is a critical problem to be answered. In spite of many such advantages, however, online transactions have many dysfunctions such as personal information leakage, account hacking, and cybercrime. Without preparing the appropriate protection methods or schema people reluctantly use the transaction or would find some other partners with enhanced information security environment. In this paper we suggested a novel selection criteria that can be used to evaluate the reliable means of authentication against the expected risks under on-going IoT based environment. Our selection criteria consists of 4 steps. The first step is services and risk identification step. The second step is evaluation of risk occurrence step. The third step includes the evaluation of the extent of damage. And the final step is the assessment of the level of risk. With the help of the above 4 step-approach people can systematically identify potential risks hiding in the online transactions and effectively avoid by taking appropriate counter actions.

Design of Online Certificate Revocation Information Transfer using Verifier Lists (검증자목록을 이용한 실시간 인증서 폐지 정보 전송의 설계)

  • 이용준;정재동;오해석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.45-54
    • /
    • 2003
  • A public key certificate may be revoked before its validity period due to causes like the owner identification information change or the private key damage. Since a certificate has long valid time relatively, it is possible to become revoked during lifetime of certificate. The main technical issue in the public key infrastructure is how to handle the status of the certificate. We propose a simple mechanism for online certificate status validation that is suited to the financial network The characteristic of the proposed method is to broadcast certificate revocation information by using verifier list. The experimental results provide the same realtime as OCSP(Online Certificate Status Protocol). The proposed mechanism reduces the network load for certificate status validation in highly concentrated unbearable network.