• Title/Summary/Keyword: 개인정보 처리

Search Result 2,411, Processing Time 0.027 seconds

Intelligent System Design for Knowledge Representation and Interpretation of Human Cognition (인간 인지 지식의 표현과 해석을 위한 지능형 시스템 설계 방법)

  • Joo, Young-Do
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.3
    • /
    • pp.11-21
    • /
    • 2011
  • The development of computer-based modeling system has allowed the operationalization of cognitive science issues. Human cognition has become one of most interesting research subjects in artificial intelligence to emulate human mentality and behavior. This paper introduces a methodology well-suited for designing the intelligent system of human cognition. The research investigates how to elicit and represent cognitive knowledge obtained from individual city-dwellers through the application of fuzzy relational theory to personal construct theory. Crucial to this research is to implement formally and process interpretatively the psychological cognition of urbanites who interact with their environment in order to offer useful advice on urban problem. What is needed is a techniques to analyze cognitive structures which are embodiments of this perceptive knowledge for human being.

A Study on Land Warrior System Design Based on IEEE 802.15.4 (IEEE 802.15.4 기반의 미래병사체계 시스템 설계에 관한 연구)

  • Heo, Jun;Lee, Sang-Jin;Choi, Yong-Hoon;Choi, Hyo-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.71-80
    • /
    • 2012
  • In this paper, applications that require low-speed data rate on personal area network to operate the Land Warrior system is proposed. These applications can refer to WSN(wireless sensor network) technology. However, this technology is not suitable to support various data transmission rate. A suitable CSMA/CA algorithm for Land Warrior System in order to solve these existing system problems is proposed. The proposed algorithm is designed to be variable CSMA/CA algorithm parameter, depending on data rate. For the evaluation of Land Warrior system model and CSMA/CA algorithm, we used Castalia. As a result of the simulation, it is found that the proposed system model can not only relieve loads of data processing, but also probability of collision was decreased.

Efficient QRS Detection and PVC(Premature Ventricular Contraction) Classification based on Profiling Method (효율적인 QRS 검출과 프로파일링 기법을 통한 심실조기수축(PVC) 분류)

  • Cho, Ik-Sung;Kwon, Hyeog-Soong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.705-711
    • /
    • 2013
  • QRS detection of ECG is the most popular and easy way to detect cardiac-disease. But it is difficult to analyze the ECG signal because of various noise types. Also in the healthcare system that must continuously monitor people's situation, it is necessary to process ECG signal in realtime. In other words, the design of algorithm that exactly detects QRS wave using minimal computation and classifies PVC by analyzing the persons's physical condition and/or environment is needed. Thus, efficient QRS detection and PVC classification based on profiling method is presented in this paper. For this purpose, we detected QRS through the preprocessing method using morphological filter, adaptive threshold, and window. Also, we applied profiling method to classify each patient's normal cardiac behavior through hash function. The performance of R wave detection, normal beat and PVC classification is evaluated by using MIT-BIH arrhythmia database. The achieved scores indicate the average of 99.77% in R wave detection and the rate of 0.65% in normal beat classification error and 93.29% in PVC classification.

Case Study on Local Differential Privacy in Practice : Privacy Preserving Survey (로컬 차분 프라이버시 실제 적용 사례연구 : 프라이버시 보존형 설문조사)

  • Jeong, Sooyong;Hong, Dowon;Seo, Changho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.141-156
    • /
    • 2020
  • Differential privacy, which used to collect and analysis data and preserve data privacy, has been applied widely in data privacy preserving data application. Local differential privacy algorithm which is the local model of differential privacy is used to user who add noise to his data himself with randomized response by self and release his own data. So, user can be preserved his data privacy and data analyst can make a statistical useful data by collected many data. Local differential privacy method has been used by global companies which are Google, Apple and Microsoft to collect and analyze data from users. In this paper, we compare and analyze the local differential privacy methods which used in practically. And then, we study applicability that applying the local differential privacy method in survey or opinion poll scenario in practically.

A Design of a TV Advertisement Effectiveness Analysis System Using SNS Big-data (SNS Big-data를 활용한 TV 광고 효과 분석 시스템 설계)

  • Lee, Areum;Bang, Jiseon;Kim, Yoonhee
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.9
    • /
    • pp.579-586
    • /
    • 2015
  • As smart-phone usage increases, the number of Social Networking Service (SNS) users has also exponentially increased. SNS allows people to efficiently exchange their personal opinion, and for this reason, it is possible to collect the reaction of each individual to a given event in real-time. Nevertheless, new methods need to be developed to collect and analyze people's opinion in real-time in order to effectively evaluate the impact of a TV advertisement. Hence, we designed and constructed a system that analyzes the effect of an advertisement in real-time by using data related to the advertisement collected from SNS, specifically, Twitter. In detail, Hadoop is used in the system to enable big-data analysis in parallel, and various analyses can be conducted by conducting separate numerical analyses of the degrees of mentioning, preference and reliability. The analysis can be accurate if the reliability is assessed using opinion mining technology. The proposed system is therefore proven to effectively handle and analyze data responses to divers TV advertisement.

CANVAS: A Cloud-based Research Data Analytics Environment and System

  • Kim, Seongchan;Song, Sa-kwang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.10
    • /
    • pp.117-124
    • /
    • 2021
  • In this paper, we propose CANVAS (Creative ANalytics enVironment And System), an analytics system of the National Research Data Platform (DataON). CANVAS is a personalized analytics cloud service for researchers who need computing resources and tools for research data analysis. CANVAS is designed in consideration of scalability based on micro-services architecture and was built on top of open-source software such as eGovernment Standard framework (Spring framework), Kubernetes, and JupyterLab. The built system provides personalized analytics environments to multiple users, enabling high-speed and large-capacity analysis by utilizing high-performance cloud infrastructure (CPU/GPU). More specifically, modeling and processing data is possible in JupyterLab or GUI workflow environment. Since CANVAS shares data with DataON, the research data registered by users or downloaded data can be directly processed in the CANVAS. As a result, CANVAS enhances the convenience of data analysis for users in DataON and contributes to the sharing and utilization of research data.

TRED : Twitter based Realtime Event-location Detector (트위터 기반의 실시간 이벤트 지역 탐지 시스템)

  • Yim, Junyeob;Hwang, Byung-Yeon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.8
    • /
    • pp.301-308
    • /
    • 2015
  • SNS is a web-based online platform service supporting the formation of relations between users. SNS users have usually used a desktop or laptop for this purpose so far. However, the number of SNS users is greatly increasing and their access to the web is improving with the spread of smart phones. They share their daily lives with other users through SNSs. We can detect events if we analyze the contents that are left by SNS users, where the individual acts as a sensor. Such analyses have already been attempted by many researchers. In particular, Twitter is used in related spheres in various ways, because it has structural characteristics suitable for detecting events. However, there is a limitation concerning the detection of events and their locations. Thus, we developed a system that can detect the location immediately based on the district mentioned in Twitter. We tested whether the system can function in real time and evaluated its ability to detect events that occurred in reality. We also tried to improve its detection efficiency by removing noise.

Design and implementation of an Embedded Network Processor (내장형 네트워크 프로세서의 설계 및 구현)

  • Joung Jinoo;Kim Seong-cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.6
    • /
    • pp.1211-1217
    • /
    • 2005
  • Current generation embedded systems are built around only a small number of SOCs, which are again based on general-purpose embedded micro-processors, such as ARM and MIPS. These RISC-based processors are not, however, designed for specific functions such as networking and multimedia processing, whose importances have increased dramatically in recent years. Network devices for small business and home networks, are especially dependent upon such SOCs based on general processors. Except for PHY and MAC layer functions, which are built with hardware, all the network functions are processed by the embedded micro-processor. Enabling technologies such as VDSL and FTTH promise Internet access with a much higher speed, while at the same time explore the limitations of general purpose microprocessors. In this paper we design a network processor, embed it into an SOC for Home gateway, evaluate the performance rigorously, and gauge a possibility for commercialization.

A Pointer Forwarding Scheme for Fault-tolerant Location Management in Mobile Networks (이동망에서 결함 허용 위치 관리를 위한 포인터 포워밍 방법)

  • Lee, Kyung-Sook;Ha, Sook-Jeong;Chun, Sung-Kwang;Bae, Ihn-Han
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.387-394
    • /
    • 2004
  • One of the main challenges in personal communication services(PCS ) Is to locate many mobile terminals that nay move from place to place frequently. This kind of system operation is called location management. This task entails sophisticated signaling traffic and database queries. Several strategies have been proposed to improve the efficiency of location management. These strategies use location register databases to store the current locations of mobile terminals, and are vulnerable to failure of the location register databases. In this paper, we propose a fault-tolerant pointer forwarding scheme with distributed home location register in order to tolerate the failure of location registers. The performance of the proposed scheme is evaluated analytically by simulation, and Is compared with Biaz's bypass forwarding strategy and two-path forwarding strategy.

A Real-Time Scheduling Mechanism in Multiprocessor System for Supporting Multimedia (멀티미디어 지원을 위한 다중 프로세서 시스템에서 실시간 스케줄링 기법)

  • 임순영;이재완;전칠환
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.1 no.2
    • /
    • pp.159-168
    • /
    • 1997
  • This paper presents a mechanism which supplies tasks with fast turn-around time on real-time multimedia environments. Tasks are classified into periodic and aperiodic tasks according to their executing period, and the types of them are classified into three groups : critical tasks, essential tasks and common tasks by the degree of its urgency. In the case of periodic tasks, we defer the execution of it within the extent to keep the deadline as long as possible and serve the aperiodic tasks, and provide aperiodic tasks with fast turn-around time. Changing the priority of each task is allowed within the same type and it is scheduled by using the dynamic priority. The emergency tasks are executed within deadline in any circumstances, and the least laxity one is served first when many real-time tasks are waiting for execution. The result of simulation shows that the proposed mechanism is better than the EDZL, known as suboptimal in multiprocessor systems, in the point of rum-around time.

  • PDF