• Title/Summary/Keyword: 연합모델

Search Result 170, Processing Time 0.029 seconds

Non-intrusive Calibration for User Interaction based Gaze Estimation (사용자 상호작용 기반의 시선 검출을 위한 비강압식 캘리브레이션)

  • Lee, Tae-Gyun;Yoo, Jang-Hee
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.45-53
    • /
    • 2020
  • In this paper, we describe a new method for acquiring calibration data using a user interaction process, which occurs continuously during web browsing in gaze estimation, and for performing calibration naturally while estimating the user's gaze. The proposed non-intrusive calibration is a tuning process over the pre-trained gaze estimation model to adapt to a new user using the obtained data. To achieve this, a generalized CNN model for estimating gaze is trained, then the non-intrusive calibration is employed to adapt quickly to new users through online learning. In experiments, the gaze estimation model is calibrated with a combination of various user interactions to compare the performance, and improved accuracy is achieved compared to existing methods.

RBAC-based Trust Negotiation Model for Grid Security (그리드 보안을 위한 역할 기반의 신뢰 협상 모델)

  • Cho, Hyun-Sug;Lee, Bong-Hwan
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.455-468
    • /
    • 2008
  • In this paper, we propose FAS model for establishing trust based on digital certificates in Grid security framework. The existing RBAC(Role Based Access Control) model is extended to provide permissions depending on the users‘ roles. The FAS model is designed for a system independent integrated Grid security by detailing and extending the fundamental architecture of user, role, and permission. FAS decides each user’s role, allocates access right, and publishes attribute certificate. FAS is composed of three modules: RDM, PCM, and CCM. The RDM decides roles of the user during trust negotiation process and improves the existing low level Grid security in which every single user maps a single shared local name. Both PCM and CCM confirm the capability of the user based on various policies that can restrict priority of the different user groups and roles. We have analyzed the FAS strategy with the complexity of the policy graph-based strategy. In particular, we focused on the algorithm for constructing the policy graph. As a result, the total running time was significantly reduced.

Distributed Identity Management Model using SAML in Digital Ecosystem (디지털 생태계에서 SAML을 이용한 분산 아이디 관리모델)

  • Jang, In-Yong;Youm, Heung-Youl
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.6
    • /
    • pp.141-154
    • /
    • 2009
  • Digital Ecosystem is a new word for dynamic IT business environments. Digital Ecosystem can consist of various enterprise federations such as competing, collaborating and stable or unstable ones. They make it difficult to implement identity management for the environment. Existing solutions are either too restricting and inflexible to support the dynamic nature of ecosystems since they are too complex and difficult to adopt. This paper is to propose an distributed identity management model for automated processing of identity information between ecosystems. It is featured with being practical, clear and easy to deploy. And it is based on the new OASIS SAML3.0 standard to provide interoperability between existing identity technologies. This paper presents the basic and extended identity model for single service and multiple services. The model presented in this paper can be applied to enterprise context easily.

  • PDF

A Study on Assessment Model of Interoperability in Weapon Systems based on LISI (LISI 기반의 무기체계 상호운용성 평가모델에 관한 연구)

  • Oh, Haeng-Rok;Koo, Heung-Seo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.3
    • /
    • pp.410-416
    • /
    • 2007
  • There are many demands for interoperability between weapon systems as the operational needs for joint and coalition based on network in modern and future warfare have been increasingly needed. In DoD, LISI has been applied throughout information system life cycle from the planning phase to the development phase to assess the level of interoperability. We also developed SITES which is a tool to assess the level of interoperability in information systems. But we should extend the assessment model from the previous information systems to the weapon systems to assess the level of interoperability including weapon systems as well as information systems. In this paper, we proposed the assessment model of interoperability, implemented the E-SITE based on the proposed model, applied 12 weapon systems and analyzed the experimental result.

A GDPR based Approach to Enhancing Blockchain Privacy (GDPR에 기반한 블록체인 프라이버시 강화 방안)

  • Han, Sejin;Kim, Suntae;Park, Sooyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.33-38
    • /
    • 2019
  • In this paper, we propose a new blockchain technology that could comply with GDPR. The proposed model can prevent illegal access by controlling access to the personal information according to a access policy. For example, it can control access to the information on a role-basis and information validation period. The core mechanism of the proposed model is to encrypt the personal information with public key which is associated with users attributes policy, and then decrypt it with a private key and users attributes based on a Attribute-based Encryption scheme. It can reduce a trusted third-part risk by replacing it with a number of nodes selected from the blockchain. And also the private key is generated in the form of one-time token to improve key management efficiency. We proved the feasibility by simulating the proposed model using the chaincode of the Hyperledger Fabric and evaluate the security.

Design of weighted federated learning framework based on local model validation

  • Kim, Jung-Jun;Kang, Jeon Seong;Chung, Hyun-Joon;Park, Byung-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.13-18
    • /
    • 2022
  • In this paper, we proposed VW-FedAVG(Validation based Weighted FedAVG) which updates the global model by weighting according to performance verification from the models of each device participating in the training. The first method is designed to validate each local client model through validation dataset before updating the global model with a server side validation structure. The second is a client-side validation structure, which is designed in such a way that the validation data set is evenly distributed to each client and the global model is after validation. MNIST, CIFAR-10 is used, and the IID, Non-IID distribution for image classification obtained higher accuracy than previous studies.

World Interest and Activities on Marine Litter (해양쓰레기의 전 지구적 관심과 실행)

  • Jung, Rho-Taek
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.12 no.3
    • /
    • pp.173-180
    • /
    • 2009
  • After the UN General Assembly on 2006, Interest on the marine litter has rapidly increased internationally. The UN sub-organizations, UNEP/Regional Seas, FAO(Food and Agriculture Organization of the United Nations) and OC(Ocean Conservancy) as a one of world NGO had been tackled to collect information and prepared world reports related on marine litter, recently, those are published. Through the 10years experience of Korea's policy on marine litter since 1999, it is re-evaluated as a roll model internationally. In this paper, brief introduction of structure and function of Korea's authorities which are responsible for or are involved in the marine litter issue as well as the National Marine Litter Management Basic Plan which is established in 2008, has been provided. This paper also included the structure and roll of the marine litter initiative center in the plan. Change of the paradigm of action plan on marine litter in Korea already had been started.

  • PDF

A Study on Interference Analysis between Base Stations with FDD and TDD Modes for IMT-2000 (FDD 및 TDD 모드 채용 IMT-2000 시스템 기지국간 간섭분석 연구)

  • 이일근;이형수;이정규;신경철;김경태
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.12 no.1
    • /
    • pp.11-17
    • /
    • 2001
  • This paper introduces an interference analyzer based on the statistical approach called the Monte Carlo methodology, which has been chosen as one of the interference analyzing techniques in ITU-R. Furthermore, using the interference analyzer developed in this paper with modified Hata model, computer simulation is performed to examine probability of interference affecting between the base stations with FDD and TDD modes for IMT-2000. Through the simulation results, it is confirmed that two different systems with FDD/TDD modes of same frequency bands can be simultaneously used in a cell without significant interference, under the parameter conditions specified in this paper.

  • PDF

A Study on Establishment of 3D Digital Restoration of Cheongju Townscape in the 1960s - Focused on the Simplified Modeling of Nammun-ro 2ga dong - (1960년대 청주 도심경관의 3차원 디지털 복원모델 구축에 관한 연구 - 남문로 2가동의 간략화 모델작성을 중심으로 -)

  • Kim, Tai-Young;Cho, Sang-Min;Son, In-Bin
    • Journal of the Regional Association of Architectural Institute of Korea
    • /
    • v.21 no.6
    • /
    • pp.31-40
    • /
    • 2019
  • This study aims to establish Nammun-ro 2ga in Cheongju city in the 1960s as three-dimensional digital information data for the restoration of urban archetypes. For this purpose, referring to the existing restoration map and model of Cheongju urban area in the 1960s, and the results of this study are as follows. Firstly, the buildings that can be generally classified are prepared through the modeling of parametric families. Secondly, the untypical models(combined and broken roofs, atypical and large scale buildings) of them are simply performed through solid modeling. And then, these simplified models are simulated through a sky view, a walking sight, and information analysis. Through this study, it will be possible to visualize and regenerate the low and dense area of Cheongju city in the 1960s.

A Space Analysis Model of Evacuation Overcrowding at Hospital Outpatient Department (병원 외래진료부에서의 피난 과밀 공간 분석 모델에 관한 연구)

  • Lee, Joohee;Kewon, Jihoon
    • Journal of the Regional Association of Architectural Institute of Korea
    • /
    • v.21 no.3
    • /
    • pp.109-116
    • /
    • 2019
  • This study aimed to suggest a quantitative model analyzing overcrowding area under emergency evacuation situation in the outpatient department of hospital. Overall study process included the review on legal conditions of an emergency evacuation, the investigation of precedent research documents and the analysis of spatial configuration. The user movement with considering exit gates and the one without considering exit gates were analyzed for routine activity condition. An agent-based simulation was applied for the analysis. Also, user movement for the emergency condition was tested with evacuation simulation. The variation of simulation conditions revealed the difference between overcrowding spaces from situation change. At all nodes, visit frequencies derived from different conditions and situations were compared. The overcrowding spaces are to increase the risk of delaying emergency evacuation time which is critical for user safety. It suggests the need for dispersing overcrowding spaces under evacuation situation. The suggested analysis model can evaluate overcrowding spaces in the outpatient department of hospital and provide locational data for distributing evacuation design resources.