• Title/Summary/Keyword: 사용자참여

Search Result 1,365, Processing Time 0.032 seconds

A Web-based Sensor Network Query and Data Management (웹 기반의 센서네트워크 질의 및 데이타 관리)

  • Hwang, Kwang-Il;Eom, Doo-Seop
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.11
    • /
    • pp.820-829
    • /
    • 2006
  • Wireless sensor networks consisting of hundreds to thousands of nodes are expected to be increasingly deployed in coming years, as they enable reliable monitoring and analysis of physical worlds. These networks have unique features that are very different from traditional networks, e.g., the numerous numbers of nodes, limitation in power, processing, and memory. Due to these unique features of wireless sensor networks, sensor data management including querying becomes a challenging problem. Furthermore, due to wide popularization of the Internet and its facility in use, it is generally accepted that an unattended network can be efficiently managed and monitored over the Internet. In particular, in order to more efficiently query and manage data in a sensor network. in this paper, the architecture of a sensor gateway including web-based query server is presented and its implementation detail is illustrated. The presented web-based gateway is largely divided into two important parts: Internet part and sensor network part. The sensor network part plays an important role of handling a variety of sensor networks, including flat or hierarchical network architecture, by using internally layered architecture for efficiently querying and managing data in a sensor network. In addition, the Internet part provides a modular gateway function for favorable exchange between the sensor network and Internet.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

A Study of 3D Modeling of Compressed Urban LiDAR Data Using VRML (VRML을 이용한 도심지역 LiDAR 압축자료의 3차원 표현)

  • Jang, Young-Woon;Choi, Yun-Woong;Cho, Gi-Sung
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.19 no.2
    • /
    • pp.3-8
    • /
    • 2011
  • Recently, the demand for enterprise for service map providing and portal site services of a 3D virtual city model for public users has been expanding. Also, accuracy of the data, transfer rate and the update for the update for the lapse of time emerge are considered as more impertant factors, by providing 3D information with the web or mobile devices. With the latest technology, we have seen various 3D data through the web. With the VRML progressing actively, because it can provide a virtual display of the world and all aspects of interaction with web. It offers installation of simple plug-in without extra cost on the web. LiDAR system can obtain spatial data easily and accurately, as supprted by numerous researches and applications. However, in general, LiDAR data is obtained in the form of an irregular point cloud. So, in case of using data without converting, high processor is needed for presenting 2D forms from point data composed of 3D data and the data increase. This study expresses urban LiDAR data in 3D, 2D raster data that was applied by compressing algorithm that was used for solving the problems of large storage space and processing. For expressing 3D, algorithm that converts compressed LiDAR data into code Suited to VRML was made. Finally, urban area was expressed in 3D with expressing ground and feature separately.

Implementation of Policy based In-depth Searching for Identical Entities and Cleansing System in LOD Cloud (LOD 클라우드에서의 연결정책 기반 동일개체 심층검색 및 정제 시스템 구현)

  • Kim, Kwangmin;Sohn, Yonglak
    • Journal of Internet Computing and Services
    • /
    • v.19 no.3
    • /
    • pp.67-77
    • /
    • 2018
  • This paper suggests that LOD establishes its own link policy and publishes it to LOD cloud to provide identity among entities in different LODs. For specifying the link policy, we proposed vocabulary set founded on RDF model as well. We implemented Policy based In-depth Searching and Cleansing(PISC for short) system that proceeds in-depth searching across LODs by referencing the link policies. PISC has been published on Github. LODs have participated voluntarily to LOD cloud so that degree of the entity identity needs to be evaluated. PISC, therefore, evaluates the identities and cleanses the searched entities to confine them to that exceed user's criterion of entity identity level. As for searching results, PISC provides entity's detailed contents which have been collected from diverse LODs and ontology customized to the content. Simulation of PISC has been performed on DBpedia's 5 LODs. We found that similarity of 0.9 of source and target RDF triples' objects provided appropriate expansion ratio and inclusion ratio of searching result. For sufficient identity of searched entities, 3 or more target LODs are required to be specified in link policy.

Data Mining Tool for Stock Investors' Decision Support (주식 투자자의 의사결정 지원을 위한 데이터마이닝 도구)

  • Kim, Sung-Dong
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.2
    • /
    • pp.472-482
    • /
    • 2012
  • There are many investors in the stock market, and more and more people get interested in the stock investment. In order to avoid risks and make profit in the stock investment, we have to determine several aspects using various information. That is, we have to select profitable stocks and determine appropriate buying/selling prices and holding period. This paper proposes a data mining tool for the investors' decision support. The data mining tool makes stock investors apply machine learning techniques and generate stock price prediction model. Also it helps determine buying/selling prices and holding period. It supports individual investor's own decision making using past data. Using the proposed tool, users can manage stock data, generate their own stock price prediction models, and establish trading policy via investment simulation. Users can select technical indicators which they think affect future stock price. Then they can generate stock price prediction models using the indicators and test the models. They also perform investment simulation using proper models to find appropriate trading policy consisting of buying/selling prices and holding period. Using the proposed data mining tool, stock investors can expect more profit with the help of stock price prediction model and trading policy validated on past data, instead of with an emotional decision.

Effect of Smart Life on Politics, Society, Culture, and Economy (스마트라이프가 정치.사회.문화.경제에 미치는 영향)

  • Kim, Man-Ki
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.91-102
    • /
    • 2011
  • Smart work is deeply embedded in our contemporary lives. This is called Smart Life. The expansion of communication, caused by smart life is utilized for the political purposes of politicians, political candidates, and political policies. Chiefly, smart life includes improvement in awareness, personal relations, and policy advocacy. Socially, smart life leads the proliferation of issues and civil movement. In particular, smart life has a significant effect on culture. In the case of K-POP, it is disseminated going beyond space time. It enhances economic value added by joining and sharing at the same time. Smart life has numerous advantages such as improving the quality of life, but it might cause inconvenience depending on users because there are differences in acceptance according to generations. Due to the heavy weight on the device, there are some side-effects such as lacking in human thinking, disclosure in private life, lacking in basic securities, increase in information addicts who are anxious when they do not get on the Internet or SNS, and interference with work. However, this inconvenience can change into convenience when users are accustomed to it. Like this, smart life influences politics, economy, society, and culture a lot. Working environment of smart life is a new paradigm, which can generate high performance through working in an exciting and bright atmosphere with easy economy and putting value on results.

A Development of Telephone for the Hearing Impaired to Improve Listening Ability of Telephone Speech (난청인의 통화 청취도 향상을 위한 전화기 개발)

  • 이상민;송철규;이영묵;김원기
    • Journal of Biomedical Engineering Research
    • /
    • v.18 no.4
    • /
    • pp.457-466
    • /
    • 1997
  • We developed a new hearing aid telephone which helps the hearing impaired person to improve the listening ability of telephone speech. Recently, the hearing impaired person and the elderly who has hearing loss have been continuously increased and their desire for participating society as a producer has been increased also. So they strong1y want the hearing aid devices which make compensation fortheir handicap. The hearing aid telephone is one of the basic aid devices that helps the hearing impaired to communicate well with other poeple and to acquire easily useful information through the phone. We analyze the hearing ability of the hearing impaired, design the new model of the hearing aid telephone and test the telephone in three fields-electrical, word perception, user test. Our new tolephone has lour band pass filter channels and the center frequencies of these filters are 500, 1000, 2000, 3000Hz which are considered psychoacoustic factors and telephone line characteristics. The hearing impaired can adjust the total gain characteristics of receiving sound to his hearing ability by setting four volumes in the telelphone. This procedure is called fitting which is a very important factor for the hearing impaired to take meaning of speech. The total gain of this telephone is over 20dB from 250Hz to 3200Hz range. From the results of the tests we certify that our new model is better for the hearing impaired to understand the meaning or telephone speech than the old general models. The next step of developing the hearing aid telephone is to study about compressing sidetone and noise, dividing frequency bands, selecting hearing aid pattern and compensating psychoacoustic loudness. we expect that the advanced hearing aid telephone can be developed by the research about speech perception characteristics of the hearing impaired in engineering and clinical side.

  • PDF

A novel architecture of CCN for better security and applicability (향상된 보안 및 적용 가능성을 위한 컨텐츠 중심 네트워킹(CCN)의 새로운 아키텍처 연구)

  • Sharma, Aashis;Kim, Yun Seon
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.1
    • /
    • pp.21-38
    • /
    • 2017
  • Information Centric Networking is changing the way how content is being transmitted. The shift from IP and host based networking towards content based networking scenario is growing day by day. Many researches have been done about different frameworks of ICN. Caching is an important part of ICN and many researchers have also proposed different ways for caching the data. With caching of data in intermediate devices like the network devices as well the user devices in some cases, the issue of content security as well as the role of the content producer becomes a major concern. A modified ICN architecture based on the current Content Centric Networking (CCN) model is presented in the paper. The architecture mainly focuses on involving the content producer in content delivery in the real time. The proposed architecture provides better security aspects for the CCN architecture. Apart from security the paper will also consider the issue of applicability of CCN architecture to replace the TCP/IP based architecture. The efficiency of the proposed architecture is compared with the previous CCN architecture based on the response time for a content delivery which shows very comparable level of efficiency. The paper than analyzes different beneficial aspects of the proposed architecture over the current architecture.

The Sociological Antecedents of Brand Attachment: A comparison of Broadcasting and Passive Consumption on Social Networking Sites (상표 애착의 사회적 선행변수에 대한 연구)

  • Shin, Jong-Kuk;Park, Min-Sook;Ross, Corey Allen
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.159-170
    • /
    • 2016
  • In this study, the authors examine the ways in which social media ultimately affects the attachment of individuals to their favorite brands. Through an analysis of data using multiple linear regression, this study finds that SNS (social networking site) users that post status updates for a wide audience have no bearing on the individual's use of socialization agents. Those who consume social news passively are, however, likely to depend on socialization agents for determining their final purchase decisions. Socialization agents, both personal and non-personal, also play a role in the formation of brand attachment among individuals who depend on these social sources. Based on these results, marketers are encouraged to establish an online footprint of a social nature to formulate brand awareness and to provide a means for users of social media to improve their brand attachments to their favored brands. As this research was conducted exclusively in the predominantly collective culture of South Korea, further studies could attempt to analyze social networking use and socialization agent use via a cross-culture study, particularly one including an individualistic culture.

The Success Factors and Strategy of Social Network Online Game in Korea: A Case Study of Nexon (국내 Social Network Online Game(SNOG)의 성공 요인 및 전략: Nexon 사례 연구)

  • Yoo, Byung-Joon;Kim, Kwan-Soo
    • Journal of Korea Game Society
    • /
    • v.11 no.6
    • /
    • pp.127-138
    • /
    • 2011
  • The creation and interchange of information through the Internet network forms online community and makes Social Network Game (SNG) as a new entertainment by grafting it onto the most popular online games. SNG means the service which amalgamates social network service (e.g., Facebook, Twitter, etc) strong points and the fun of online game. It promotes the intimacy of relation between the friends above social network service and the gaming amusement for users. The domestic SNG market is currently fast changing according to the smart environment which is quickly shifted. The existing online game field will continuously maintain a market size. SNOG will be more developed because it is competitive from the business perspective of managing cost and production cost when compares with the existing online game. In relation to Facebook, Twitter, etc. overseas SNS platform base SNOG service, the domestic competition for launching SNG is expected to heat up as NHN, Daum and SK Communication introduce open type SNS. This study examines the successful factors and strategy for domestic SNOG by studying the case of MapleStory Adventures successful possibility. The possible successful factors are combing SNS on the existing popular online game, marketing through the existing users, and solving the platform problem of a failure factor of NexonStar. This case study is expected to contribute to the domestic SNOG industry development by providing several implications for the successful factors and strategy of SNOG which will be continuously developed.