• Title/Summary/Keyword: 시스템서비스

Search Result 17,909, Processing Time 0.05 seconds

RFID Indoor Location Recognition Using Neural Network (신경망을 이용한 RFID 실내 위치 인식)

  • Lee, Myeong-hyeon;Heo, Joon-bum;Hong, Yeon-chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.3
    • /
    • pp.141-146
    • /
    • 2018
  • Recently, location recognition technology has attracted much attention, especially for locating people or objects in an indoor environment without being influenced by the surrounding environment GPS technology is widely used as a method of recognizing the position of an object or a person. GPS is a very efficient, but it does not allow the positions of objects or people indoors to be determined. RFID is a technology that identifies the location information of a tagged object or person using radio frequency information. In this study, an RFID system is constructed and the position is measured using tags. At this time, an error occurs between the actual and measured positions. To overcome this problem, a neural network is trained using the measured and actual position data to reduce the error. In this case, since the number of read tags is not constant, they are not suitable as input values for training the neural network, so the neural network is trained by converting them into center-of-gravity inputs and median value inputs. This allows the position error to be reduce by the neural network. In addition, different numbers of trained data are used, viz. 50, 100, 200 and 300, and the correlation between the number of data input values and the error is checked. When the training is performed using the neural network, the errors of the center-of-gravity input and median value input are compared. It was found that the greater the number of trained data, the lower the error, and that the error is lower when the median value input is used than when the center-of-gravity input is used.

Network Anomaly Detection Technologies Using Unsupervised Learning AutoEncoders (비지도학습 오토 엔코더를 활용한 네트워크 이상 검출 기술)

  • Kang, Koohong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.617-629
    • /
    • 2020
  • In order to overcome the limitations of the rule-based intrusion detection system due to changes in Internet computing environments, the emergence of new services, and creativity of attackers, network anomaly detection (NAD) using machine learning and deep learning technologies has received much attention. Most of these existing machine learning and deep learning technologies for NAD use supervised learning methods to learn a set of training data set labeled 'normal' and 'attack'. This paper presents the feasibility of the unsupervised learning AutoEncoder(AE) to NAD from data sets collecting of secured network traffic without labeled responses. To verify the performance of the proposed AE mode, we present the experimental results in terms of accuracy, precision, recall, f1-score, and ROC AUC value on the NSL-KDD training and test data sets. In particular, we model a reference AE through the deep analysis of diverse AEs varying hyper-parameters such as the number of layers as well as considering the regularization and denoising effects. The reference model shows the f1-scores 90.4% and 89% of binary classification on the KDDTest+ and KDDTest-21 test data sets based on the threshold of the 82-th percentile of the AE reconstruction error of the training data set.

Factors affecting the Continuance Usage Intention of Biometric Technology : Comparing Dark Scenario with Bright Scenario (생체인식기술의 지속사용의도에 영향을 미치는 요인에 관한 연구 : 다크 시나리오와 브라이트 시나리오의 비교)

  • Lee, Byung-Yong;Kim, Min-Yong
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.3
    • /
    • pp.1-22
    • /
    • 2011
  • The purpose of this study is to verify the relationship between expectancy confirmation and continuance usage intention in biometric technology. We extend the continuance usage intention model, TAM and expectation confirmation theory by adding perceived privacy, perceived security and trust. Results was analyzed by using structural equations model. The results show that satisfaction and perceived usefulness have positive effect on continuance usage intention in the bright scenario. Perceived privacy and perceived security are positive factors on perceived usefulness, and perceived privacy is positive effect on perceived security. On the other hand, the respondents who are exposed to the dark scenario have negative effects on the perceived privacy, perceived security and trust. And finally, trust has no significant effect on the perceived usefulness.

Performance of an Efficient Association Control Scheme for Public Wireless LAN Systems (고속 공중 무선랜 시스템을 위한 효율적인 연결 요청 제어방법의 성능분석)

  • Lee Hyun woo;Kim Se han;Ryu Won;Yoon Chong ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.3A
    • /
    • pp.209-216
    • /
    • 2005
  • This paper generally relates to the field of wireless local area networks(WLANs), and more particularly, to AP selection and association methods for the performance of a station. In these days, IEEE 802.11 Wireless LAN network is widely deployed and used as an emerging service to connect high-speed Internet in the public wireless environment. But, if there are many users in hot spot area, they suffer a severe decrease of performance. Thus it needs an association and access control mechanism especially when it is used in the public environment. In this paper, we suggest a selection and association method using Beacon or Probe Response frames based IEEE 802.11. Station selects AP using the information of the capacity area in a Beacon or a Probe Response frame. According to the present paper, an association method for a public WLAN service, which includes a WLAN user terminal and an AP for relaying WLAN communications to and from the user terminal, includes the steps of the user terminal asking the AP's states for access to a radio channel; and the station selects and associates with the AP According to the above-described selection in a high speed wireless Internet service based on public WLAN technologies that are currently in operations. Further, it is possible to improve the efficiency of network management.

LFH: Low-Cost and Fast Handoff Scheme in Proxy Mobile IPv6 Networks with Multicasting Support (프록시 모바일 IPv6 네트워크에서 멀티캐스팅을 지원하는 저비용의 빠른 이동성관리 기법)

  • Kim, Eunhwa;Jeong, Jongpil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.6
    • /
    • pp.265-278
    • /
    • 2013
  • With the recent advancements in various wireless communication technologies, the importance of mobile multicasting is coming to the fore, in an effort to use network resources more efficiently. In the past, when various mobile IP-based multicast techniques were proposed, the focus was put on the costs needed for network delivery for providing multicast services, as well as on minimizing the multicast handover delay. For techniques using MIPv6 (Mobile IPv6), a host-based mobility management protocol, however, it is fundamentally difficult to resolve the problems of handover delay and tunnel convergence. To resolve these problems, a network-based mobility management protocol called PMIPv6 (Proxy Mobile IPv6) was standardized. Although performance is improved in PMIPv6 over MIPv6, it still suffers from the problems of handover delay and tunnel convergence. In this paper, to overcome these limitations, a technique called LFH (Low-cost and Fast Handoff) is proposed for fast and low-cost mobility management with multicasting support in PMIPv6 networks. To reduce the interactions between the complex multicast routing protocol and the multicast messages, a simplified proxy method called MLD (Multicast Listener Discovery) is implemented and modified. Furthermore, a TCR (Tunnel Combination and Reconstruction) algorithm was used in the multicast handover procedure within the LMA (Local Mobility Anchor) domain, as well as in the multicast handover procedure between domains, in order to overcome the problem of tunnel convergence. As a result, it was found that LFH has reduced multicast delay compared to other types of multicast techniques, and that it requires lower costs as well.

A Study on the Function and Intention of the Health Care Application in the Analysis of Smartphone Usage Behavior (스마트폰 사용행태 분석과 헬스케어 어플리케이션의 기능 및 사용의도에 대한 연구)

  • Yang, Jae Min;Hyun, Byung Hwan;Ok, Jun Woo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.15 no.4
    • /
    • pp.303-315
    • /
    • 2020
  • The development of ICT is spreading various contents to enhance health care and management efficiency through convergence between mobile and healthcare, but it indicates consumer acceptance and imbalance of mobile healthcare, and there is a lack of empirical research on functions and acceptability required according to consumer behavior and characteristics. This study sought to understand whether users were aware of and how to address the risks associated with smartphone use, and to conduct research on the acceptability and function and price of healthcare applications. For the purpose of the study, the data prepared in depth 1:1 survey for those who participated in and attended the 'BIO 2018 in Boston' exhibition was used for the actual analysis. The collected sample data included frequency analysis, technical statistical analysis, speech only correlation, chi square test, one-way analysis, and accuracy test. As a result, the more you realize the wrong attitude, the higher the awareness of risk and willingness to take action to solve problems. Second, it is necessary to increase satisfaction with the functions of healthcare apps, as well as to utilize health care and healthcare apps. Third, focus should be placed on systems or functional implementations centered on user behavior changes. Fourth, it is necessary to develop services that can enhance visual motivation. This study is meaningful in that it identifies a variety of consumer characteristics and provides directions for development of functions, and can be used as a basis for providing efficient healthcare applications in the future.

Comparative Analyses of the Uses of Information and Information Technologies in the Everyday Life of Undergraduate and Graduate Students Majoring Science and Engineering (넷세대 이공계 학부생과 대학원생들의 학업 및 일상생활에서의 정보이용과 정보기기 활용 비교분석)

  • Kwon, Nahyun;Lee, Jungyeoun;Chung, Eunkyung;Chang, Gilsoo;Yoon, Hyejin
    • Journal of the Korean Society for information Management
    • /
    • v.30 no.2
    • /
    • pp.269-295
    • /
    • 2013
  • This study purported to study the uses of information and communication technology (ICT) tools in their daily life among the undergraduate and graduate students majoring science and engineering. It also examined the purposes of the uses of the major ICT tools, the differences in their information technology uses between graduate and undergraduate students. The data were collected from 83 undergraduate and graduate students from four universities using content analysis of an observational logs and a survey questionnaire. The observational logs were collected using an instant message application available on a smart phone. Study results revealed desktop computers, laptop computers, and smart phones as the three most heavily used ICT tools among the participants and typical situations students use each of the three tools. There were also sharp distinctions between graduate and undergraduate students in their selection of the tools, and distinctions between work and non-work situations. The findings of this study can be used to redesign information services and systems for the scientists and engineers in the next generation.

A Study on a Project Management Improvement Method for the Development of Next Generation Geostationary Earth Observation Satellite System (차세대 정지궤도 지구관측 위성시스템 개발 사업관리 개선 방안에 관한 연구)

  • Choi, Won Jun;Eun, Jong Won
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.4
    • /
    • pp.95-100
    • /
    • 2015
  • These days, satellite core technologies are being developed as a way to provide various information by considering simultaneously sending, wide area covering, highly precide, and anti-disaster technologies. Not only global positioning, and image but also space launcher, satellite bus, satellite payload, earth station are being convergently developed in a different technological field. Especially, it is required a lot of initial investing expenditure to provide the Earth observational information service based on the space technologies. Such a trend and change of satellite technologies Korea has realized the necessity for the domestic independent development of next generation earth observation satellites, and are preparing the profound items such as a detailed implementation plan for the efficient development project. Like the satellite advanced countries, it should be transparently carried out that an efficient implementation of the developing target related to the geostationary earth observation satellite development, establishment of technological auditing function and quality assurance system, implementation plan, progressing courses and results of the satellite development program by way of planning, evaluation and management. For these things cited above, it is necessary to operate systematically and continuously the professional structural system by the governmental department in order to control the geostationary earth observation satellite development project. Therefore, this study proposes a development project management improvement method of the Korea next generation geostationary earth observation satellite based on the development project management system of the domestic geostationary satellite system.

Optimized Path Finding Algorithm for Walking Convenience of the People with Reduced Mobility (교통약자의 이동편의를 위한 최적경로 탐색 기법)

  • Moon, Mikyeong;Lee, Youngmin;Yu, Kiyun;Kim, Jiyoung
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.34 no.3
    • /
    • pp.273-282
    • /
    • 2016
  • There has been growing social interest recently in the movement rights of people with reduced mobility. However, it simply eliminates the temporary inconvenience of walking of people with reduced mobility because it focuses only on supply of institutional facilities. Therefore, we look forward to improving movement welfare by proposing an optimized path finding algorithm for people with reduced mobility that takes into consideration physical elements affecting their movement, such as slope, steps etc. We selected Walking barrier factor by analyzing previous studies and calculated the relative importance of Walking barrier factors using an Analytic Hierarchy Process(AHP). Next, through the fuzzy system, the Walking disturbance level of link, which integrates the weights of Walking barrier factors and the attributes of each link, is derived. Then, Walking path cost that takes into consideration the ‘length’ factors is calculated and an optimized path for people with reduced mobility is searched using Dijkstra’s Algorithm. Nineteen different paths were searched and we confirmed that the derived paths are meaningful in terms of improving the mobility of people with reduced mobility by conducting a field test. We look forward to improving movement welfare by providing a navigation service using the path finding algorithm proposed in this study.

An Adaptive Priority-based Sequenced Route Query Processing Method in Road Networks (도로 네트워크 환경에서 적응적 우선순위 기반의 순차적 경로 처리 기법)

  • Ryu, Hyeongcheol;Jung, Sungwon
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.12
    • /
    • pp.652-657
    • /
    • 2014
  • Given a starting point, destination point and various Points Of Interest (POIs), which contain a full or partial order, for a user to visit we wish to create, a sequenced route from the starting point to the destination point that includes one member of each POI type in a particular order. This paper proposes a method for finding the approximate shortest route between the start point, destination point and one member of each POI type. There are currently two algorithms that perform this task but they both have weaknesses. One of the algorithms only considers the distance between the visited POI (or starting point) and POI to visit next. The other algorithm chooses candidate points near the straight-line distance between the start point and destination but does not consider the order of visits on the corresponding network path. This paper outlines an algorithm that chooses the candidate points that are nearer to the network path between the start point and destination using network search. The algorithm looks for routes using the candidate points and finds the approximate shortest route by assigning an adaptive priority to the route that visits more POIs in a short amount of time.