• Title/Summary/Keyword: 네트워크 계산

Search Result 1,267, Processing Time 0.031 seconds

Detection of Anomaly VMS Messages Using Bi-Directional GPT Networks (양방향 GPT 네트워크를 이용한 VMS 메시지 이상 탐지)

  • Choi, Hyo Rim;Park, Seungyoung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.4
    • /
    • pp.125-144
    • /
    • 2022
  • When a variable message signs (VMS) system displays false information related to traffic safety caused by malicious attacks, it could pose a serious risk to drivers. If the normal message patterns displayed on the VMS system are learned, it would be possible to detect and respond to the anomalous messages quickly. This paper proposes a method for detecting anomalous messages by learning the normal patterns of messages using a bi-directional generative pre-trained transformer (GPT) network. In particular, the proposed method was trained using the normal messages and their system parameters to minimize the corresponding negative log-likelihood (NLL) values. After adequate training, the proposed method could detect an anomalous message when its NLL value was larger than a pre-specified threshold value. The experiment results showed that the proposed method could detect malicious messages and cases when the system error occurs.

Image Steganography for Hiding Hangul Messages in Hybrid Technique using Variable ShiftRows (가변 ShiftRows를 이용한 하이브리드 기법에서 한글 메시지 은닉을 위한 이미지 스테가노그래피)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.4
    • /
    • pp.217-222
    • /
    • 2022
  • Information plays an important role in modern society. Most of the information is processed and moved in the digital space. In cyberspace, confidential communication based on resistance and security is fundamental. It is essential to protect the information sent and received over the network. However, information may be leaked and forged by unauthorized users. The effectiveness of the existing protection system decreases as an innovative technique is applied to identify the communication contents by a third party. Steganography is a technique for inserting secret information into a specific area of a medium. Stegganography and steganalysis techniques are at odds with each other. A new and sophisticatedly implemented system is needed to cope with the advanced steganalysis. To enhance step-by-step diffusion and irregularity, I propose a hybrid implementation technique of image steganography for Hangul messages based on layered encryption and variable ShiftRows. PSNR was calculated to measure the proposed steganography efficiency and performance. Compared to the basic LSB technique, it was shown that the diffusion and randomness can be increased even though the PSNR decreased by 1.45%.

Analysis of carbon reduction effect of efficient water distribution through intelligent water management (지능형 물관리를 통한 효율적인 물분배의 탄소저감 효과 분석)

  • Ha Yong Kim
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.436-436
    • /
    • 2023
  • 산업혁명을 거치면서 높은 화석연료를 사용하는 제조업 중심의 산업구조와 많은 자원을 필요로 하는 도시의 집중 현상으로 지구 온난화에 따른 이상기후 발생이 증가하고 있다. 이러한 기후변화는 홍수, 태풍, 폭염 및 폭설 등의 자연재해 발생 빈도 및 규모를 증가시켜 피해가 커지고 있다. 특히 인구 및 시설들이 집중해 있어 도시의 집중 현상은 이러한 재해에 더욱 취약한 구조가 됨에 따라 피해의 규모를 가중 시키고 있는 실정이다. 전 세계적으로 기후변화 문제의 심각성을 인식하고 이를 해결하기 위해 선신국에 의무를 부여하는 교토의정서(1997년) 채택에 이어, 선진국과 개도국이 모두 참여하는 파리협정(2015년)을 채택하였고 2016년 협정이 발효되었다. 파리협정의 목표는 산업화 이전 대비 지구 평균온도 상승을 2℃보다 아래로 유지하고, 나아가 1.5℃로 억제하기 노력하는 것을 강제하는 것으로 2050년까지 탄소 순배출량을 '0'으로 만든다는 탄소중립사회로의 전환이 본격적으로 시작되었다. 본 연구에서는 기후변화로 인한 물부족 및 수실오염과 같은 도시의 수자원 문제 해결을 위해 IoT 기반 센서 및 네트워크 기반 수자원 플랫폼을 개발하였다. 도시 수자원 시설 데이터를 기반으로 대체 수자원 확보 및 수요 중심의 물 관리를 통해 효율적인 물 배분이 될 수 있도록 하였으며 이러한 스마트 물 관리에 따른 대체 수자원 확보 및 효율적 물 배분이 탄소 저감에 미치는 효과에 대해 분석하였다. 연구대상 지역은 세종 6-4구역으로 LID 특화지구로 조성되었으며 1,000 세대의 주민이 생활하는 공동주택이다. 물 순환(LID) 시설에서 확보된 물을 물 공급 시설과 연계하여 공동주택에서 활용함으로써 감소된 상수 사용량을 온실가스 배출량으로 환산하여 탄소 저감량을 계산하였다. 실제 주민들(1,000세대)이 사용하고 있는 상수량 데이터와 전력거래소 온실가스 배출계수를 활용하였으며 물순환(LID) 시설로 확보하여 대체할 수 있는 상수량은 10%로 가정하였다. 연구대상 지역(1,000세대)의 연간 상수공급량은 331,603m3이며, 연간 전력사용량은69,637kWh이다. 온실가스 배출량은 31.963tCO2eq이며, 온실가스 저감량은 3.2tCO2eq로 산정되었다. 추후 LID 시설에 대한 상수 대체량과 온실가스 저감효과 정량화가 필요하다.

  • PDF

Patient Management to Improve the Efficiency of Infectious U-MAS System Design (전염성 환자관리의 효율성을 개선하기 위한 U-MAS 시스템 설계)

  • Shin, Yoon-Hwan;Shin, Ye-Ho;Ryu, Keun-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.9
    • /
    • pp.75-84
    • /
    • 2009
  • In this paper, the EPC Network as the most important technologies in the field of applied technology research and special attention to the use of RFID to better manage the disease in infected U-MAS (U-Medical Administrative Services) system was designed. U-MAS system, the Center for Disease Control in the illness, depending on the type of isolate and treat infected patients, recovery, discharge, isolation wards and intensive italian to manage and increase efficiency, manual and use a simple computer program improve the qualify of the current level, using RFID tags to improve the management of the patient everything that a little more and be out of the isolation ward, if competent disease management districts, such as the location to respond more quickly to facilitate the purpose is to contribute to. First, EPC Network and related technology for mobile RFID systems and related technology research. U-MAS system design offers. If you take advantage of the proposed U-MAS system for monitoring infectious disease patients and patients in the isolation ward, when the unauthorized departure location to shorten the time it takes to improve the effectiveness of disease management and present the elected effects was.

A Comparative Study of the Impacts among Patent Assignees in Pharmaceutical Research based on Bibliometric Analyses (계량서지학적 분석을 통한 약물연구분야 특허출원인 간 영향력 비교)

  • Kim, Heeyoung;Park, Ji-Hong
    • Journal of the Korean Society for information Management
    • /
    • v.39 no.1
    • /
    • pp.1-15
    • /
    • 2022
  • This study analyzes the relationship of citations appearing in the patent data to understand knowledge transfers and impacts between patent documents in the field of pharmaceutical research. Patent data were collected from a website, Google Patents. The top 25 assignees were selected by searching for patent documents related to pharmaceutical research. We identify the citation relationships between assignees, then calculate and compare the values of h-index and derived indicators by using the number of citations and rank for each document of each assignee. As a result, in the case of pharmaceutical research, the assignee, such as 'Pfizer, MIT, and Abbott' shows a high impact. Among the five bibliometric indicators, the g-index and hS-index show similar results, and the indicators are the most related to the rankings of Total Citation Frequency, Cites per Patents, and Maximum Citation Frequency. In addition, it is highly related to the five indicators in the order of Total Citation Frequency, Cites per Patents, and Maximum Citation Frequency. In some cases, it is difficult to make an accurate comparison with Cites per Patents alone, which is previously known to indicate the technological influence of patent assignees.

Ensemble Design of Machine Learning Technigues: Experimental Verification by Prediction of Drifter Trajectory (앙상블을 이용한 기계학습 기법의 설계: 뜰개 이동경로 예측을 통한 실험적 검증)

  • Lee, Chan-Jae;Kim, Yong-Hyuk
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.3
    • /
    • pp.57-67
    • /
    • 2018
  • The ensemble is a unified approach used for getting better performance by using multiple algorithms in machine learning. In this paper, we introduce boosting and bagging, which have been widely used in ensemble techniques, and design a method using support vector regression, radial basis function network, Gaussian process, and multilayer perceptron. In addition, our experiment was performed by adding a recurrent neural network and MOHID numerical model. The drifter data used for our experimental verification consist of 683 observations in seven regions. The performance of our ensemble technique is verified by comparison with four algorithms each. As verification, mean absolute error was adapted. The presented methods are based on ensemble models using bagging, boosting, and machine learning. The error rate was calculated by assigning the equal weight value and different weight value to each unit model in ensemble. The ensemble model using machine learning showed 61.7% improvement compared to the average of four machine learning technique.

Lightweight Key Escrow Scheme for Internet of Battlefield Things Environment (사물인터넷 환경을 위한 경량화 키 위탁 기법)

  • Tuan, Vu Quoc;Lee, Minwoo;Lim, Jaesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.12
    • /
    • pp.1863-1871
    • /
    • 2022
  • In the era of Fourth Industrial Revolution, secure networking technology is playing an essential role in the defense weapon systems. Encryption technology is used for information security. The safety of cryptographic technology, according to Kerchoff's principles, is based on secure key management of cryptographic technology, not on cryptographic algorithms. However, traditional centralized key management is one of the problematic issues in battlefield environments since the frequent movement of the forces and the time-varying quality of tactical networks. Alternatively, the system resources of each node used in the IoBT(Internet of Battlefield Things) environment are limited in size, capacity, and performance, so a lightweight key management system with less computation and complexity is needed than a conventional key management algorithm. This paper proposes a novel key escrow scheme in a lightweight manner for the IoBT environment. The safety and performance of the proposed technique are verified through numerical analysis and simulations.

A Data Sampling Technique for Secure Dataset Using Weight VAE Oversampling(W-VAE) (가중치 VAE 오버샘플링(W-VAE)을 이용한 보안데이터셋 샘플링 기법 연구)

  • Kang, Hanbada;Lee, Jaewoo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.12
    • /
    • pp.1872-1879
    • /
    • 2022
  • Recently, with the development of artificial intelligence technology, research to use artificial intelligence to detect hacking attacks is being actively conducted. However, the fact that security data is a representative imbalanced data is recognized as a major obstacle in composing the learning data, which is the key to the development of artificial intelligence models. Therefore, in this paper, we propose a W-VAE oversampling technique that applies VAE, a deep learning generation model, to data extraction for oversampling, and sets the number of oversampling for each class through weight calculation using K-NN for sampling. In this paper, a total of five oversampling techniques such as ROS, SMOTE, and ADASYN were applied through NSL-KDD, an open network security dataset. The oversampling method proposed in this paper proved to be the most effective sampling method compared to the existing oversampling method through the F1-Score evaluation index.

Development of Operation System for Satellite Laser Ranging on Geochang Station (거창 인공위성 레이저 추적을 위한 운영 시스템 개발)

  • Ki-Pyoung Sung;Hyung-Chul Lim;Man-Soo Choi;Sung-Yeol Yu
    • Journal of Space Technology and Applications
    • /
    • v.4 no.2
    • /
    • pp.169-183
    • /
    • 2024
  • Korea Astronomy and Space Science Institute (KASI) developed the Geochang satellite laser ranging (SLR) system for the scientific research on the space geodesy as well as for the national space missions including precise orbit determination and space surveillance. The operation system was developed based on the server-client communication structure, which controls the SLR subsystems, provides manual and automatic observation modes based on the observation algorithm, generates the range data between satellites and SLR stations, and carry out the post-processing to remove noises. In this study, we analyzed the requirements of operation system, and presented the development environments, the software structure and the observation algorithm, for the server-client communications. We also obtained laser ranging data for the ground target and the space geodetic satellite, and then analyzed the ranging precision between the Geochang SLR station and the International Laser Ranging Service (ILRS) network stations, in order to verify the operation system.

Social Network-based Hybrid Collaborative Filtering using Genetic Algorithms (유전자 알고리즘을 활용한 소셜네트워크 기반 하이브리드 협업필터링)

  • Noh, Heeryong;Choi, Seulbi;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.2
    • /
    • pp.19-38
    • /
    • 2017
  • Collaborative filtering (CF) algorithm has been popularly used for implementing recommender systems. Until now, there have been many prior studies to improve the accuracy of CF. Among them, some recent studies adopt 'hybrid recommendation approach', which enhances the performance of conventional CF by using additional information. In this research, we propose a new hybrid recommender system which fuses CF and the results from the social network analysis on trust and distrust relationship networks among users to enhance prediction accuracy. The proposed algorithm of our study is based on memory-based CF. But, when calculating the similarity between users in CF, our proposed algorithm considers not only the correlation of the users' numeric rating patterns, but also the users' in-degree centrality values derived from trust and distrust relationship networks. In specific, it is designed to amplify the similarity between a target user and his or her neighbor when the neighbor has higher in-degree centrality in the trust relationship network. Also, it attenuates the similarity between a target user and his or her neighbor when the neighbor has higher in-degree centrality in the distrust relationship network. Our proposed algorithm considers four (4) types of user relationships - direct trust, indirect trust, direct distrust, and indirect distrust - in total. And, it uses four adjusting coefficients, which adjusts the level of amplification / attenuation for in-degree centrality values derived from direct / indirect trust and distrust relationship networks. To determine optimal adjusting coefficients, genetic algorithms (GA) has been adopted. Under this background, we named our proposed algorithm as SNACF-GA (Social Network Analysis - based CF using GA). To validate the performance of the SNACF-GA, we used a real-world data set which is called 'Extended Epinions dataset' provided by 'trustlet.org'. It is the data set contains user responses (rating scores and reviews) after purchasing specific items (e.g. car, movie, music, book) as well as trust / distrust relationship information indicating whom to trust or distrust between users. The experimental system was basically developed using Microsoft Visual Basic for Applications (VBA), but we also used UCINET 6 for calculating the in-degree centrality of trust / distrust relationship networks. In addition, we used Palisade Software's Evolver, which is a commercial software implements genetic algorithm. To examine the effectiveness of our proposed system more precisely, we adopted two comparison models. The first comparison model is conventional CF. It only uses users' explicit numeric ratings when calculating the similarities between users. That is, it does not consider trust / distrust relationship between users at all. The second comparison model is SNACF (Social Network Analysis - based CF). SNACF differs from the proposed algorithm SNACF-GA in that it considers only direct trust / distrust relationships. It also does not use GA optimization. The performances of the proposed algorithm and comparison models were evaluated by using average MAE (mean absolute error). Experimental result showed that the optimal adjusting coefficients for direct trust, indirect trust, direct distrust, indirect distrust were 0, 1.4287, 1.5, 0.4615 each. This implies that distrust relationships between users are more important than trust ones in recommender systems. From the perspective of recommendation accuracy, SNACF-GA (Avg. MAE = 0.111943), the proposed algorithm which reflects both direct and indirect trust / distrust relationships information, was found to greatly outperform a conventional CF (Avg. MAE = 0.112638). Also, the algorithm showed better recommendation accuracy than the SNACF (Avg. MAE = 0.112209). To confirm whether these differences are statistically significant or not, we applied paired samples t-test. The results from the paired samples t-test presented that the difference between SNACF-GA and conventional CF was statistical significant at the 1% significance level, and the difference between SNACF-GA and SNACF was statistical significant at the 5%. Our study found that the trust/distrust relationship can be important information for improving performance of recommendation algorithms. Especially, distrust relationship information was found to have a greater impact on the performance improvement of CF. This implies that we need to have more attention on distrust (negative) relationships rather than trust (positive) ones when tracking and managing social relationships between users.