• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.031 seconds

The Effect of Data Sparsity on Prediction Accuracy in Recommender System (추천시스템의 희소성이 예측 정확도에 미치는 영향에 관한 연구)

  • Kim, Sun-Ok;Lee, Seok-Jun
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.95-102
    • /
    • 2007
  • Recommender System based on the Collaborative Filtering has a problem of trust of the prediction accuracy because of its problem of sparsity. If the sparsity of a preference value is large, it causes a problem on a process of a choice of neighbors and also lowers the prediction accuracy. In this article, a change of MAE based on the sparsity is studied, groups are classified by sparsity and then, the significant difference among MAEs of classified groups is analyzed. To improve the accuracy of prediction among groups by the problem of sparsity, We studied the improvement of an accurate prediction for recommending system through reducing sparsity by sorting sparsity items, and replacing the average preference among them that has a lot of respondents with the preference evaluation value.

  • PDF

Implementation of an Audio Broadcasting Service over the Internet (인터넷상의 실시간 오디오 방송 서비스 구현)

  • 박준석;고대식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.6
    • /
    • pp.1496-1502
    • /
    • 1998
  • In this paper, a real-time audio broadcasting service system which is robust to loaded traffic on the Internet is developed. For implementing reliable real-time data transfer, the transfer characteristics of TCP/IP and UDP/IP was compared and analyzed. For lost packet recovery, redundant audio data algorithm was used and interleaving technique was applied for scattering consecutive packet loss. Test results showed, when using TCP/IP, pause occurred during playback, and when using UDP/IP, a stable receive rate was noticeable but the quality of the sound was lower than that of uisng TCP/IP. The recovery rate using redundant audio data and interleaving technique is shown in Fig. 9 and the delay is shown in Fig 4.

  • PDF

Supporting X Applications through the Firewall (방화벽을 통한 X 응용프로그램의 지원에 관한 연구)

  • Lee, Dong-Heon;Hong, Chang-Yeol;Kim, Yeong-Gon;Park, Yang-Su;Lee, Myeong-Jun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.5
    • /
    • pp.1319-1326
    • /
    • 1997
  • The Internet is a very convenient neteork, but not always a So.many orvanizations often require administrative security policies when they want to connect with ther organizations thtough a pubic network.A firewall is one way of protecting an internal network from the untrusted extemal network with a mechanism for selectively permiting or blocking traffic between the intermal network and the extermal network. The firewall also provides some limited Intemet access such as Ftp.Telet, etc.Usually , through a firewall system, X applications running on the extermal network may not access an X display on the intermal network.Thus, X applications run-ning on the extemal network are not supported through the usual firewall.In this paper, we propose a method of suppoting X application programs effedtively dffectvely through the firewall, overcoming this restriction.

  • PDF

Intrusion Detection System Using the Correlation of Intrusion Signature (침입신호 상관성을 이용한 침입 탐지 시스템)

  • Na Guen-Sik
    • Journal of Internet Computing and Services
    • /
    • v.5 no.2
    • /
    • pp.57-67
    • /
    • 2004
  • In this paper we present the architecture of intrusion detection system that enhances the performance of system and the correctness of intrusion detection. A network intrusion is usually composed of several steps of action taken by the attackers. Each action in the steps can be characterized by its signature. But normal and non-intrusive action can also include the same signature, It can result in incorrect detection. The presented system uses the correlation of series of signatures that consist of an intrusion. So Its decision on an intrusion is highly reliable. And variations of known intrusions can easily be detected without any knowledge of the variations.

  • PDF

Design of a Smart Home System Architecture based on OSGi (OSGi 기반의 스마트 홈 시스템 아키텍처 설계)

  • Son, Min-Woo;Lim, Chul-Ho;Park, Byung-Chul;Shin, Dong-il;Shin, Dong-kyoo
    • Annual Conference of KIPS
    • /
    • 2004.05a
    • /
    • pp.857-860
    • /
    • 2004
  • 인터넷 사용인구가 전 국민의 3분의 2가 넘었고, 초고속 인터넷 설치가구가 벌써 1,100만 이상에 이르게 되었다. 점점 더 사람들은 디지털 생활에 익숙해져 가고 있고, 디지털을 떠나서 살아갈 수 없게 되고 있다. 이러한 분위기에 더하여 가정내의 가전기기들도 디지털화 되고 있고, 이것들을 네트워크로 연결하여 원격지에서 제어하는 홈 네트워크 관련 기술들이 현실화 되고 있다. 그러나, 여러 가전회사들이 각자의 미들웨어를 만들고 이것을 이용해서 제품들을 만들고 있다. 따라서 스마트 홈(Smart Home)[1]을 구성하기 위한 여러 가지 미들웨어 제안들이 나오게 되었고, 이것들은 계속 혼재할 것으로 예상되어 실제로 홈 네트워크를 구성하는데 많은 혼란이 예상되고 있다. 본 논문에서는 여러 가지 미들웨어를 통합하는 OSGi(Open Service Gateway Initiative)[2,3]를 기반으로 구성된 스마트 홈 시스템 아키텍처를 제안하여 홈 네트워크 구성에 대한 위험 부담이 적고 신뢰할 수 있는 방법을 제시하고자 한다.

  • PDF

Mix-based Decentralized Anonymous Transaction for Blockchain (블록체인을 위한 믹스 기반 분산화된 익명 거래)

  • Lee, Yun-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.6
    • /
    • pp.51-56
    • /
    • 2020
  • Cryptocurrencies, including Bitcoin, has decentralization, distribution and P2P properties unlike traditional currencies relies on trusted central party such as banks. All transactions are stored transparently and distributively, hence all participants can check the details of those transactions. Due to the properties of cryptographic hash function, deletion or modification of the stored transations is computationally not possible. However, cryptocurrencies only provide pseudonymity, not anonymity, which is provided by traditional currencies. Therefore many researches were conducted to provide anonymity to cryptocurrencies such as mix-based methods. In this paper, I will propose more efficient hybrid mix-based method for anonymity than previous mix-based one.

Best Practices on Validation and Extraction of Object oriented Designs with Code Visualization Tool-chain (코드 가시화 툴체인 기반 UML 설계 추출 및 검증 사례)

  • Lee, Won-Young;Kim, Robert YoungChul
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.79-86
    • /
    • 2022
  • This paper focuses on realizing design improvement and high quality through visualization of reverse engineering-based software. As new technologies and complex software emerge in various areas of the fourth industry in the future, software verification with both stability and reliability is becoming an issue. We propose a reverse engineering-based UML design extraction and visualization for high-quality software ranging from simple computational software to machine learning-based data-oriented software. Through this study, it is expected to improve software quality through design improvement by checking the accuracy of the target design and identifying the code complexity.

A Study on Lightweight Authentication·Authorization·Accounting for Mobile Device (모바일 디바이스를 위한 경량화된 인증·인가·과금에 관한 연구)

  • Kang, Soo-Young;Yeo, Sang-Soo;Park, Jong Hyuk
    • Annual Conference of KIPS
    • /
    • 2009.11a
    • /
    • pp.709-710
    • /
    • 2009
  • IT 기술은 인터넷 및 휴대 디바이스의 발전으로 인해 유비쿼터스 환경으로 발전해 나가고 있다. 이와 같은 변화는 사용자들에게 다양한 서비스를 제공될 것이며, 사용자들은 모바일 디바이스를 이용하여 이동하면서도 서비스를 받고자 하는 요구가 증대되고 있다. 그러나 현재의 발전 예상과 다양한 서비스와는 반대로 무선 환경이라는 특성으로 인해 기존의 유선망보다 다양한 위협사항 및 취약점을 가지고 있다. 즉 무선 환경에서 모바일 디바이스에 대한 스니핑, 도청, 서비스거부 공격, 중간자 공격, 비인가 장비 공격, 악성소프트웨어 감영 등의 보안 취약성을 내포하고 있으며, 또한 기존의 무선 환경이 가지는 위협사항을 그대로 가지고 있어 모바일 디바이스 보안에 대한 연구는 매우 중요한 실정이다. 이러한 문제점을 해결하는 방안으로 기존의 유선망뿐만 아니라 비약적으로 발전하고 있는 무선망의 WiBro, Mobile IP 등과 같은 다양한 서비스 및 프로토콜 상에서 안전하고 신뢰성 있는 인증 인가 과금을 체계적으로 제공하도록 경량화된 디바이스 보안 기술에 대한 연구를 수행하고자 한다.

Implementation algorithm and system for generating PWM frequency for berthing the train at station (열차의 정위치 정차용 주파수의 PWM 생성 알고리즘과 시스템 구현)

  • Eun-Taek Han;Chang-Sik Park;Ik-Jae Kim;Dong-Kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.24 no.5
    • /
    • pp.37-50
    • /
    • 2023
  • In general, PLL or DDS are mainly used as precise and stable frequency synthesis methods. For stable operation, a PWM frequency generation algorithm was designed and implemented using FPGA. This is an algorithm that creates a frequency 8,192 times the target frequency and then performs the D flip-flop 13 times to generate multiple frequencies with a precision of 1 Hz. Using the designed algorithm, it is applied to the Berthing system for stopping trains in station. The applied product was developed and tested against the existing operating system to confirm its superior performance in terms of frequency generation accuracy.

Study for Design of Defect Management to Improve the Quality of IoT Products (IoT 제품의 품질 개선을 위한 결함관리 설계에 관한 연구)

  • Kim, Jae Gyeong;Choi, Yeong Sook;Cho, Kyeong Rok;Lee, Eun Ser
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.6
    • /
    • pp.229-236
    • /
    • 2022
  • Based on the Internet of Things, a web system that can check the condition around the fire extinguisher, whether a fire has occurred, and an application that can receive fire notifications in real time is implemented. Minimize errors that occur during development by using software engineering to clarify the goals of the system and define the structure in detail. In addition, for IoT-based fire extinguishers, a method of reducing defects by finding product defects in the demand analysis, design, and implementation stages and analyzing the cause thereof is proposed. Through the proposed research, it is possible to secure the reliability of defect management for IoT-based smart fire extinguisher.