• Title/Summary/Keyword: support of entity

Search Result 136, Processing Time 0.03 seconds

Development of Profiles for Context-Aware System in Smart Home Environment and Its Usage (스마트 홈 환경 내 상황인지 시스템을 위한 프로파일 개발 및 적용 방법)

  • Jang, Jun-Hwan;Shin, Wonyong;Koo, Bonjae;Hoque, M. Robiul;Yang, Sung Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.901-904
    • /
    • 2014
  • As sensing techniques have advanced, context-aware technologies have been developed under the various domain for each different purpose. The number of services were created and are being used actually, but the services for specific spatial domain are not adequate yet. To solve this, there have been many efforts, and some of them were actually successful. Among them, the methods which used ontology-based inference were relatively reliable and appropriate for context-aware system, but not able to support contexts for individual without complex rules. In this paper, current scope of context inference is extended from user-oriented context modeling to entity-oriented. Furthermore, we used user profile and home profile to provide more specific context information of not only each individual but entity.

  • PDF

Public Opinions on Inter-Korean Economic Cooperation: A Survey Analysis

  • JUNG, SEUNG-HO;CHO, YONG-SHIN
    • KDI Journal of Economic Policy
    • /
    • v.43 no.4
    • /
    • pp.23-44
    • /
    • 2021
  • This research attempts to provide an in-depth analysis of the public perceptions of inter-Korean economic cooperation. KDI survey data with a sample size of 1,000 were subjected to empirical analyses. By means of ordered logit estimations, we derive the following results. First, there is a significant effect of age on economic cooperation perceptions, where younger generations tend to be more negative. Second, the group who has positive view on the economic cooperation tends to prefer large-scale, domestic-entity-funded cooperation projects, whereas the group who has negative view tends to prefer small-scale projects and projects funded by international organizations. According to these results, prioritizing trade with the involvement of international organizations is likely to be an effective measure to alleviate potential political constraints and to achieve sustainable long-run economic cooperation systems when pursuing the economic cooperation.

Blockchain-based Federated Learning for Intrusion Detection in IoT Networks (IoT 네트워크에서 침입 탐지를 위한 블록체인 기반 연합 학습)

  • Md Mamunur Rashid;Philjoo Choi;Suk-Hwan Lee;Ki-Ryong Kwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.262-264
    • /
    • 2023
  • Internet of Things (IoT) networks currently employ an increased number of users and applications, raising their susceptibility to cyberattacks and data breaches, and endangering our security and privacy. Intrusion detection, which includes monitoring and analyzing incoming and outgoing traffic to detect and prohibit the hostile activity, is critical to ensure cybersecurity. Conventional intrusion detection systems (IDS) are centralized, making them susceptible to cyberattacks and other relevant privacy issues because all the data is gathered and processed inside a single entity. This research aims to create a blockchain-based architecture to support federated learning and improve cybersecurity and intrusion detection in IoT networks. In order to assess the effectiveness of the suggested approach, we have utilized well-known cybersecurity datasets along with centralized and federated machine learning models.

Relation Extraction based on Extended Composite Kernel using Flat Lexical Features (평면적 어휘 자질들을 활용한 확장 혼합 커널 기반 관계 추출)

  • Chai, Sung-Pil;Jeong, Chang-Hoo;Chai, Yun-Soo;Myaeng, Sung-Hyon
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.8
    • /
    • pp.642-652
    • /
    • 2009
  • In order to improve the performance of the existing relation extraction approaches, we propose a method for combining two pivotal concepts which play an important role in classifying semantic relationships between entities in text. Having built a composite kernel-based relation extraction system, which incorporates both entity features and syntactic structured information of relation instances, we define nine classes of lexical features and synthetically apply them to the system. Evaluation on the ACE RDC corpus shows that our approach boosts the effectiveness of the existing composite kernels in relation extraction. It also confirms that by integrating the three important features (entity features, syntactic structures and contextual lexical features), we can improve the performance of a relation extraction process.

Simulation Reconfiguration using Entity Plug-in approach for Weapon System Effectiveness Analysis (무기체계 효과도 분석을 위한 개체 플러그인 방식의 모의 재구성 연구)

  • Kim, Taeyoung
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.2
    • /
    • pp.49-59
    • /
    • 2018
  • The simulation-based weapon system effectiveness analysis is to support the decision making in the acquisition process of the defense domain. The effectiveness of the weapon system is a complexly influenced indicator from various factors such as environment, doctrine and so on. And the measurement of effectiveness can be defined differently in compliance with major issues in the weapon system. Because of this, the weapon system effectiveness analysis requires the comparative experiment of various alternatives based on the underlying assumption. This paper presents the efficient approach to reconfigure the simulation using the reflection technique. The proposed method contains the recoupling and resetting the simulation entity using DEVS(Discrete EVent System specification) formalism-based dynamic plug-in method. With the proposed method, this paper designs the effectiveness analysis environment that can efficiently handle the various alternatives of the weapon system.

Network Security Modeling and Simulation Using the SES/MB Framework (SES/MB 프레임워크를 이용한 네트워크 보안 모델링 및 시뮬레이션)

  • 지승도;박종서;이장세;김환국;정기찬;정정례
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.2
    • /
    • pp.13-26
    • /
    • 2001
  • This paper presents the network security modeling methodology and simulation using the hierarchical and modular modeling and simulation framework. Recently, Howard and Amoroso developed the cause-effect model of the cyber attack, defense, and consequences, Cohen has been proposed the simplified network security simulation methodology using the cause-effect model, however, it is not clear that it can support more complex network security model and also the model-based cyber attack simulation. To deal with this problem, we have adopted the hierarchical and modular modeling and simulation environment so called the System Entity Structure/Model Base (SES/MB) framework which integrates the dynamic-based formalism of simulation with the symbolic formalism of AI. Several simulation tests performed on sample network system verify the soundness of our method.

A Study on Public Key Cryptographic Authentication System Providing Key Distribution and Recovery in the Initial Authentication (초기인증에서 키 분배 및 복구를 지원하는 공개키 암호 인증시스템에 관한 연구)

  • Shin Kwang-Cheul;Cho Sung-Je
    • Journal of Internet Computing and Services
    • /
    • v.7 no.3
    • /
    • pp.83-91
    • /
    • 2006
  • In this paper, we improved a cryptography system model based on the secure initial authentication public key with PKINIT of authentication and key recovery protocol. It is applied to all fields of cryptography system using certificate. This study presents two mechanisms to authenticate between member users. The first mechanism is initial authentication and distribution of session key by public key cryptography based on certificate between entity and server, and the second mechanism is a key recovery support protocol considering loss of session key in the secure communication between application servers.

  • PDF

The Study of Chinese Totem Design:Using the Gestalt Psychology (게슈탈트 심리학을 활용한 중국 토템디자인 연구)

  • Cheng, Cheng;Lee, Jinho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.1036-1040
    • /
    • 2009
  • Totem culture is a basic culture in all countries. A totem is any supposed entity that watches over or assists a group of people,such as a family,clan,or tribe.(Merriam-Webster Online Dictionary and Webster's New World College Dictionary, Fourth Edition).Totems support larger groups than an individual person. In kinship and descent,if the apical ancestor of a clan is nonhuman,it is called a totem. Normally this belief is accompanied by a totemic myth. And for the ages past,many totems for family. clan and tribe merged in one or two which comes to be a totem culture. We can know many things from the totem of our Ancestors.

  • PDF

Load Distribution using IMSI Prefix to select Gateway in LTE (Gateway 선택 시, 특정 가입자 번호 대역에 대해 부하 분산 방법)

  • Cho, Ray Sehyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.759-762
    • /
    • 2012
  • This paper is for EPC(Evolved Packet Core) network to share the load balance by IMSI(International Mobile Subscriber Identity) prefix in MME(Mobility Management Entity). For the telecommunication, it needs to choose the anchoring gateway to use the specific gateway to avoid the traffic load to support the efficient telecommunication service. We propose the way to choose the effective gateway to avoid the traffic load in order for good qualify service. We compare the load between the gateways which are the general gateway and the specific gateway used by proposed concept.

Winning Coalition, Expansion of Wealth, and Naval Power (승자연합과 부(富)의 확장, 그리고 해군력)

  • Park, Ju-Hyeon
    • Strategy21
    • /
    • s.41
    • /
    • pp.174-207
    • /
    • 2017
  • Human history shows diverse strategies for survival and prosperity. This study introduces the concept of the expansion of wealth as a key to explain choice and behavior of political entities. American scholar, -Bruce Bueno de Mesquita-, offers theoretical grounds for this concept in that the cores of selectorate theory is settled. The political entity consists of two groups, -the winning coalition that has power to replace leader and non-winning coalition that has not. Leaders implement policies serving for the welfare of winning coalition in return for their loyalty. Both internal problems caused by demographic changes and external ones of climate changes, epidemic disease, or invasion compel leader and winning coalition to adopt policies of expansion that they believe may lead to the acquisition of wealth needed to counter those problems. The process starts by occupying one spot where other entities reside and then connecting it to its own. The line between spots functions as a foothold to form a new line to other spots. By repeating this process, a space is created in which new laws and orders are instated. In the early stage of expansion, war is hardly avoidable. Once finished successfully, the political circumstance tilts to encourage economic activities in order to generate national revenues to strengthen political power of winning coalition. However, as scale of economic activities grows, so does political power of civic classes in production and trade. To gain financial support required to run the political entity, delegation of power or bestowing autonomy to non-winning coalition is inevitable. Thus, expansion is not the ultimate solution, only to prolong the political survival if succeed. Maritime power came to attractive option when overland expansion had become obstructed. It offered much greater advantages in terms of political risks and financial burdens in exploring new regions of precious commodities than overland expansion. Each political entity around world have been, for the first time in human history, connected by maritime means since 15th century. It is worthy of noting that land conditions propelled people out to sea. Political and economic situations created opportunities to exploit geographical position in pursuit of wealth. In the 21st century, we witness the operation of international winning coalition that presides over the rules of expansion. Competing for market is synonymous to the expansion in this era, the cause and aim of it has not been changed though. Energy and dollars are key factors of expansion since the end of the 2nd world war. No matter what the forms and conditions change, naval power is still the most relevant means for expansion as it retains unique characters of maneuver, flexibility, continuity, display and projection of power. The strategy for using naval power should be in line with two different approaches for expansion: Approaches to the international winning coalition by making contribution to world order, and approaches to the non-international winning coalition by enhancing military diplomatic activities. The former will serve our share of winning coalition while the latter will open chances to acquire further prosperity.