• Title/Summary/Keyword: 사용자 패턴 정보

Search Result 1,286, Processing Time 0.024 seconds

An Efficient Filtering Technique of GPS Traffic Data using Historical Data (이력 자료를 활용한 GPS 교통정보의 효율적인 필터링 방법)

  • Choi, Jin-Woo;Yang, Young-Kyu
    • Journal of Korea Spatial Information System Society
    • /
    • v.10 no.3
    • /
    • pp.55-65
    • /
    • 2008
  • For obtaining telematics traffic information(travel time or speed in an individual link), there are many kinds of devices to collect traffic data. Since the GPS satellite signals have been released to civil society, thank to the development of GPS technology, the GPS has become a very useful instrument for collecting traffic data. GPS can reduce the cost of installation and maintenance in contrast with existing traffic detectors which must be stationed on the ground. But. there are Problems when GPS data is applied to the existing filtering techniques used for analyzing the data collected by other detectors. This paper proposes a method to provide users with correct traffic information through filtering abnormal data caused by the unusual driving in collected data based on GPS. We have developed an algorithm that can be applied to real-time GPS data and create more reliable traffic information, by building patterns of past data and filtering abnormal data through selection of filtering areas using Quartile values. in order to verify the proposed algorithm, we experimented with actual traffic data that include probe cars equipped with a built-in GPS receiver which ran through Gangnam Street in Seoul. As a result of these experiments, it is shown that link travel speed data obtained from this algorithm is more accurate than those obtained by existing systems.

  • PDF

A Dynamic Service Supporting Model for Semantic Web-based Situation Awareness Service (시맨틱 웹 기반 상황인지 서비스를 위한 동적 서비스 제공 모델)

  • Choi, Jung-Hwa;Park, Young-Tack
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.9
    • /
    • pp.732-748
    • /
    • 2009
  • The technology of Semantic Web realizes the base technology for context-awareness that creates new services by dynamically and flexibly combining various resources (people, concepts, etc). According to the realization of ubiquitous computing technology, many researchers are currently working for the embodiment of web service. However, most studies of them bring about the only predefined results those are limited to the initial description by service designer. In this paper, we propose a new service supporting model to provide an automatic method for plan related tasks which achieve goal state from initial state. The inputs on an planner are intial and goal descriptions which are mapped to the current situation and to the user request respectively. The idea of the method is to infer context from world model by DL-based ontology reasoning using OWL domain ontology. The context guide services to be loaded into planner. Then, the planner searches and plans at least one service to satisfy the goal state from initial state. This is STRIPS-style backward planner, and combine OWL-S services based on AI planning theory that enabling reduced search scope of huge web-service space. Also, when feasible service do not find using pattern matching, we give user alternative services through DL-based semantic searching. The experimental result demonstrates a new possibility for realizing dynamic service modeler, compared to OWLS-XPlan, which has been known as an effective application for service composition.

Similarity checking between XML tags through expanding synonym vector (유사어 벡터 확장을 통한 XML태그의 유사성 검사)

  • Lee, Jung-Won;Lee, Hye-Soo;Lee, Ki-Ho
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.9
    • /
    • pp.676-683
    • /
    • 2002
  • The success of XML(eXtensible Markup Language) is primarily based on its flexibility : everybody can define the structure of XML documents that represent information in the form he or she desires. XML is so flexible that XML documents cannot be automatically provided with an underlying semantics. Different tag sets, different names for elements or attributes, or different document structures in general mislead the task of classifying and clustering XML documents precisely. In this paper, we design and implement a system that allows checking the semantic-based similarity between XML tags. First, this system extracts the underlying semantics of tags and then expands the synonym set of tags using an WordNet thesaurus and user-defined word library which supports the abbreviation forms and compound words for XML tags. Seconds, considering the relative importance of XML tags in the XML documents, we extend a conventional vector space model which is the most generally used for document model in Information Retrieval field. Using this method, we have been able to check the similarity between XML tags which are represented different tags.

Design of an Intellectual Smart Mirror Appication helping Face Makeup (얼굴 메이크업을 도와주는 지능형 스마트 거울 앱의설계)

  • Oh, Sun Jin;Lee, Yoon Suk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.497-502
    • /
    • 2022
  • Information delivery among young generation has a distinct tendency to prefer visual to text as means of information distribution and sharing recently, and it is natural to distribute information through Youtube or one-man broadcasting on Internet. That is, young generation usually get their information through this kind of distribution procedure. Many young generation are also drastic and more aggressive for decorating themselves very uniquely. It tends to create personal characteristics freely through drastic expression and attempt of face makeup, hair styling and fashion coordination without distinction of sex. Especially, face makeup becomes an object of major concern among males nowadays, and female of course, then it is the major means to express their personality. In this study, to meet the demands of the times, we design and implement the intellectual smart mirror application that efficiently retrieves and recommends the related videos among Youtube or one-man broadcastings produced by famous professional makeup artists to implement the face makeup congruous with our face shape, hair color & style, skin tone, fashion color & style in order to create the face makeup that represent our characteristics. We also introduce the AI technique to provide optimal solution based on the learning of user's search patterns and facial features, and finally provide the detailed makeup face images to give the chance to get the makeup skill stage by stage.

Case Study on Big Data Sampling Population Collection Method Errors in Service Business (서비스 비즈니스의 빅데이터 모집단 산정방식 오류에 관한 사례연구)

  • Ahn, Jinho;Lee, Jeungsun
    • Journal of Service Research and Studies
    • /
    • v.10 no.2
    • /
    • pp.1-15
    • /
    • 2020
  • As big data become more important socially and economically in recent years, many problems have been derived from the indiscriminate application of big data. Big data are valuable because it can figure out the meaning of informative information hidden within the data. In particular, to predict customer behavior patterns and experiences, structured data that were extracted from Customer Relationship Management (CRM) or unstructured data that were extracted from Social Network Service(SNS) can be defined as a population to interpret the data, during which many errors can occur. However, those errors are usually overlooked. In addition to data analysis techniques, some data, which should be considered in the analysis, are not included in the population and thus do not show any meaningful patterns. Therefore, this study presents the measurement and interpretation of the data generated when the cause of error in the population setting is strong relationship and interaction between people or a person and an object. In other words, it will be shown that if the relationship and interaction are strong, it is important to include data collected from the perspective of user experience and ethnography in the population by comparing various cases of big data application, through which the meaning will be derived and the best direction will be suggested.

Design of detection method for malicious URL based on Deep Neural Network (뉴럴네트워크 기반에 악성 URL 탐지방법 설계)

  • Kwon, Hyun;Park, Sangjun;Kim, Yongchul
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.5
    • /
    • pp.30-37
    • /
    • 2021
  • Various devices are connected to the Internet, and attacks using the Internet are occurring. Among such attacks, there are attacks that use malicious URLs to make users access to wrong phishing sites or distribute malicious viruses. Therefore, how to detect such malicious URL attacks is one of the important security issues. Among recent deep learning technologies, neural networks are showing good performance in image recognition, speech recognition, and pattern recognition. This neural network can be applied to research that analyzes and detects patterns of malicious URL characteristics. In this paper, performance analysis according to various parameters was performed on a method of detecting malicious URLs using neural networks. In this paper, malicious URL detection performance was analyzed while changing the activation function, learning rate, and neural network structure. The experimental data was crawled by Alexa top 1 million and Whois to build the data, and the machine learning library used TensorFlow. As a result of the experiment, when the number of layers is 4, the learning rate is 0.005, and the number of nodes in each layer is 100, the accuracy of 97.8% and the f1 score of 92.94% are obtained.

Design and Implementation of an Intrusion Detection System based on Outflow Traffic Analysis (유출트래픽 분석기반의 침입탐지시스템 설계 및 구현)

  • Shin, Dong-Jin;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.131-141
    • /
    • 2009
  • An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are growing quickly. This paper proposes an intrusion detection system based outflow traffic analysis. Many research efforts and commercial products have focused on preventing intrusion by filtering known exploits or unknown ones exploiting known vulnerabilities. Complementary to these solutions, the proposed IDS can detect intrusion of unknown new mal ware before their signatures are widely distributed. The proposed IDS is consists of a outflow detector, user monitor, process monitor and network monitor. To infer user intent, the proposed IDS correlates outbound connections with user-driven input at the process level under the assumption that user intent is implied by user-driven input. As a complement to existing prevention system, proposed IDS decreases the danger of information leak and protects computers and networks from more severe damage.

Line Laser Image Processing for Automated Crack Detection of Concrete Structures (콘크리트 구조물의 자동화 균열탐지를 위한 라인 레이저 영상분석)

  • Kim, Junhee;Shin, Yoon-Soo;Min, Kyung-Won
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.31 no.3
    • /
    • pp.147-153
    • /
    • 2018
  • Cracking in concrete structure must be examined according to appropriate methods, to ensure structural serviceability and to prevent structural deterioration, since cracks opened wide for a long time expedite corrosion of rebar. A site investigation is conducted in a regular basis to monitor structural deterioration by tracking growing cracks. However, the visual inspection are labor intensive. and judgment are subject. To overcome the limit of the on-site visual investigation image processing for identifying the cracks of concrete structures by analyzing 2D images has been developed. This study develops a unique 3D technique utilizing a line laser and its projection image onto concrete surfaces. Automated process of crack detection is developed by the algorithms of automatizing crack map generation and image data acquisition. Performance of the developed method is experimentally evaluated.

A Study on Digital Fingerprinting Technology for the Copyright Protection of the Image Contents Printout (이미지 콘텐츠 출력물의 저작권보호를 위한 디지털 핑거프린팅 기술에 관한 연구)

  • Seo, Yong-Seok;Kim, Won-Gyum;Lee, Seon-Hwa;Suh, Young-Ho;Hwang, Chi-Jung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.242-245
    • /
    • 2006
  • This paper addresses an image fingerprinting scheme for the print-to-capture model performed by a photo printer and digital camera. When capturing an image by a digital camera, various kinds of distortions such as noise, geometrical distortions, and lens distortions are applied slightly and simultaneously. In this paper, we consider several steps to extract fingerprints from the distorted image in print-and capture scenario. To embed ID into an image as a fingerprint, multi-bits embedding is applied. We embed 64 bits ID information as a fingerprint into spatial domain of color images. In order to restore a captured image from distortions a noise reduction filter is performed and a rectilinear tiling pattern is used as a template. To make the template a multi-bits fingerprint is embedded repeatedly like a tiling pattern into the spatial domain of the image. We show that the extracting is successful from the image captured by a digital camera through the experiment.

  • PDF

The Development of Data Base Program on the Catch of Long-Iine Tuna (원양 다랭이 연승어업의 어획량 데이터 베이스 프로그램 개발)

  • 배봉성
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.32 no.4
    • /
    • pp.356-362
    • /
    • 1996
  • In order to suggest the useful information of fishing ground, a data base system on 32bit personal computer was developed and handled by using the catch data of Korean tuna long -line. This data base system was programmed using Quick Basic, and consisted of three kinds of programs, one for displaying the catch rate on the fishing ground by fishing area and year ranges, another for indicating the catch rate or number on table or graph, and the other for estimating the fishing ground in economical points, mainly targeting total tunas, yellowfin and bigeye tuna respectively. When this system was started, the map of oceans such as the Pacific, the Indian and the Atlantic, is drawn on the monitor. And then the catch rates of all species and each one are indicated by the figured symbols on the sea divisions of$5^{\circ}$ space of latitute and longitude.

  • PDF