• Title/Summary/Keyword: 사용자 관심

Search Result 2,456, Processing Time 0.027 seconds

Genetic Algorithm Based Routing Method for Efficient Data Transmission for Reliable Data Transmission in Sensor Networks (센서 네트워크에서 데이터 전송 보장을 위한 유전자 알고리즘 기반의 라우팅 방법)

  • Kim, Jin-Myoung;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.3
    • /
    • pp.49-56
    • /
    • 2007
  • There are many application areas of wireless sensor networks, such as combat field surveillance, terrorist tracking and highway traffic monitoring. These applications collect sensed data from sensor nodes to monitor events in the territory of interest. One of the important issues in these applications is the existence of the radio-jamming zone between source nodes and the base station. Depending on the routing protocol the transmission of the sensed data may not be delivered to the base station. To solve this problem we propose a genetic algorithm based routing method for reliable transmission while considering the balanced energy depletion of the sensor nodes. The genetic algorithm finds an efficient routing path by considering the radio-jamming zone, energy consumption needed fur data transmission and average remaining energy level. The fitness function employed in genetic algorithm is implemented by applying the fuzzy logic. In simulation, our proposed method is compared with LEACH and Hierarchical PEGASIS. The simulation results show that the proposed method is efficient in both the energy consumption and success ratio of delivery.

  • PDF

3D Visualization of Forest Information Using LiDAR Data and Forest Type Map (LiDAR 데이터와 임상도를 이용한 산림정보의 3차원 시각화)

  • Bang, Eun-Gil;Yoon, Dong-Hyun;Koh, June-Hwan
    • Spatial Information Research
    • /
    • v.22 no.5
    • /
    • pp.53-63
    • /
    • 2014
  • As recent interest in ecological resources increases, an effort in three-dimensional visualization of the ecological resources has increased for the restoration and preservation of the natural environment as well as the evaluation of the landscape. However, in the case of forest resources, information extraction has been active, but the effort in trying to apply that information into an effective visualization has not happened. In other words, the effort for effective visualization is lacking when it comes to the visualization of forest resources, and numerous cases are ether non-realistic or the simulation required for analysis is inappropriate. Therefore, this paper extracts information through the use of airborne LiDAR data, aerial photograph, and forest type maps to create a vegetation layer, and then uses Flora3D forest modeling tools and ArcGlobe to accurately visualize the vegetation layer into the three dimension. An effective application for restoration and preservation of ecological resources as well as analysis on the urban landscape can be considered as a result of intuitively and realistically enabling the user's awareness of forest information within the Geographic Information System.

Measurement of S/W Development Processes and Maturity using Agile Methodologies (Agile 방법론을 이용한 S/W개발 프로세스 및 성숙도 측정)

  • Kim, Tai-Dal
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.147-154
    • /
    • 2015
  • Recently agile development process became increasing effectiveness, quality, attention to experts in customer satisfaction, as evidenced in this methodology when selecting projects promoting productive efficiency. With regard to contemporary needs and user requirements on the methodology selected to meet this paper is the product based Cross functional team suggested methodology Feature Team model to solve problems of this model, and organizing the Cross functional team, this team but this outcome (product) basis, were examined for the model that points to progress the development across multiple product as a functional unit, value-driven agile project through the Skills-based model and proposed a difference. And it examined the Agile Maturity metrics. PRINCE2 Agile Health-check entries future development direction of Agile techniques is a requirement of the project outset has studied the subject objective evaluation by the assumption that they can be changed at any time, not fixed this way and for the project team through research The proposed.

A Study on Security Technology using Mobile Virtualization TYPE-I (모바일 가상화 TYPE-I을 이용한 보안 기술 연구)

  • Kang, Yong-Ho;Jang, Chang-Bok;Kim, Joo-Man
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.1-9
    • /
    • 2015
  • Recently, with smart device proliferation and providing the various services using this, they have interested in mobile and Smart TV security. Smartphone users are enjoying various service, such as cloud, game, banking. But today's mobile security solutions and Study of Smart TV Security simply stays at the level of malicious code detection, mobile device management, security system itself. Accordingly, there is a need for technology for preventing hacking and leakage of sensitive information, such as certificates, legal documents, individual credit card number. To solve this problem, a variety of security technologies(mobile virtualization, ARM TrustZone, GlobalPlatform, MDM) in mobile devices have been studied. In this paper, we propose an efficient method to implement security technology based on TYPE-I virtualization using ARM TrustZone technology.

A Scheme for User Authentication using Pupil (눈동자를 이용한 사용자 인증기법)

  • Lee, Jae-Wook;Kang, Bo-Seon;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.325-329
    • /
    • 2016
  • Facial authentication has the limelight because it has less resistance and it is hard to falsify among various biometric identification. The algorithm of facial authentication can bring about huge difference in accuracy and speed by the algorithm construction. Along with face-extracted data by tracing and extracting pupil, the thesis studied algorithm which extracts data to improve error rate and to accurately authenticate face. It detects face by cascade, selects as significant area, divides the facial area into 4 equal parts to save the coordinate of object. Also, to detect pupil from the eye, the binarization is conducted and it detects pupil by Hough conversion. The core coordinate of detected pupil is saved and calculated to conduct facial authentication through data matching. The thesis studied optimized facial authentication algorithm which accurately calculates facial data with pupil trace.

A Study on an Estimation of Adjusted Coefficient for the Maintenance of Information Security Software in Korea Industry (정보보안 소프트웨어 유지보수 대가기준을 위한 보정계수 산정에 관한 연구)

  • Park, You-Jin;Park, Eun-Ju
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.109-123
    • /
    • 2011
  • The maintenance prices in information security industry between Korean companies and foreign companies have been a big difference. Korea Information Security SW maintenance standards were not adequate for the rate, and there was disagreement between domestic companies and governments. This research, therefore, surveyed a standard of information SW and the status of maintenance payment rates. The study suggests an estimation method and verifies the method and an appropriate maintenance cost rate. According to the results of the study, the current maintenance cost should be increased or decreased independent with a kind of information security systems. Based on the study, Korea government is able to change the maintenance policy in information security. And the domestic companies get a theoretical ground for improving the rates of maintenance costs in information security systems and are able to allot the resources effectively.

Efficient Authentication Establishment Scheme between IoT Device based on Pascal Triangle Theory (파스칼 삼각 이론 기반의 IoT 장치간 효율적인 인증 설립 기법)

  • Han, Kun-Hee;Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.7
    • /
    • pp.15-21
    • /
    • 2017
  • Recently, users' interest in IoT related products is increasing as the 4th industrial revolution has become social. The types and functions of sensors used in IoT devices are becoming increasingly diverse, and mutual authentication technology of IoT devices is required. In this paper, we propose an efficient double signature authentication scheme using Pascal's triangle theory so that different types of IoT devices can operate smoothly with each other. The proposed scheme divides the authentication path between IoT devices into two (main path and auxiliary path) to guarantee authentication and integrity of the IoT device. In addition, the proposed scheme is suitable for IoT devices that require a small capacity because they generate keys so that additional encryption algorithms are unnecessary when authenticating IoT devices. As a result of the performance evaluation, the delay time of the IoT device is improved by 6.9% and the overhead is 11.1% lower than that of the existing technique. The throughput of IoT devices was improved by an average of 12.5% over the existing techniques.

Representative Keyword Extraction from Few Documents through Fuzzy Inference (퍼지추론을 이용한 소수 문서의 대표 키워드 추출)

  • 노순억;김병만;허남철
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.9
    • /
    • pp.837-843
    • /
    • 2001
  • In this work, we propose a new method of extracting and weighting representative keywords(RKs) from a few documents that might interest a user. In order to extract RKs, we first extract candidate terms and them choose a number of terms called initial representative keywords (IRKs) from them through fuzzy inference. Then, by expanding and reweighting IRKs using term co-occurrence similarity, the final RKs are obtained. Performance of our approach is heavily influenced by effectiveness of selection method of IRKs so that we choose fuzzy inference because it is more effective in handling the uncertainty inherent in selecting representative keywords of documents. The problem addressed in this paper can be viewed as the one of calculating center of document vectors. So, to show the usefulness of our approach, we compare with two famous methods - Rocchio and Widrow-Hoff - on a number of documents collections. The result show that our approach outperforms the other approaches.

  • PDF

A Study on Channel Access Mechanism of LTE for Coexistence with Wi-Fi on 5 GHz Unlicensed Spectrum (5 GHz 비면허대역 무선랜과의 상호공존을 위한 LTE 시스템의 채널접속방법에 관한 연구)

  • Um, Jungsun;Yoo, Sungjin;Park, Seungkwon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.4
    • /
    • pp.374-380
    • /
    • 2015
  • With explosion of wireless traffic it is required to further investigate the technologies on acquiring available spectrum resources and on sharing frequency with existing users. In 3GPP, it is started to study on feasibility and functional requirement of LTE standard in order to extend cellular services offered on only licensed band to 5 GHz unlicensed band. Operating scenario on LTE in unlicensed band is focused on carrier aggregation with licensed band, and the coexistence with Wi-Fi services in 5 GHz band is concerned as a major requirement. For a single global solution framework for licensed assisted access to unlicensed spectrum, listen-before-talk(LBT) mechanism of European regulation for fair access to channel under the coexistence environments is currently examined in 3GPP. In this paper, we evaluate two types of LBT, frame based equipment and load based equipment, with considering LTE carrier aggregation feature and performances of file transferred time and throughput.

Influences of Relationship Benefits of Social Network Service on User-Perceived Usability and Brand Attitude (소셜네트워크서비스의 관계적 혜택이 이용자의 지각된 유용성 및 브랜드 태도에 미치는 영향)

  • Baek, Seung-Hee;Lee, Sang-Won
    • CRM연구
    • /
    • v.4 no.2
    • /
    • pp.31-41
    • /
    • 2011
  • Supporting communications among users, Social Network has encouraged various information flows through relationships among them. This paper studies on mentality or attitude of Social Network Services (SNS for short) users, on the basis of Technology Acceptance Model (TAM for short) and then proposes so-called TAMS, Technology Acceptance Model for Social Network Services. SNS users make full use of SNS as channels in order to create, expand, and obtain some information related to personal concerns. We will research on how the benefits that users get by using SNS exert influence on user-perceived usability. The SNS-using benefits focus on relationship benefits that are formed by interactions among users. Provided that perceived usability affects mental or informational benefits according to involvement of SNS users, we will check how perceived usability or ease of use is connected to brand attitude.

  • PDF