• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.042 seconds

Hierarchical Text Extraction and Localization on Images (이미지로부터 계층적 문자열 추출에 관한 연구)

  • Jun, Byoung-Min;Jun, Woogyoung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.1
    • /
    • pp.609-614
    • /
    • 2018
  • This study was conducted to investigate the effects of turmeric powder on jeung-pyun. Turmeric jeung-pyun containing 0%, 0.5%, 1%, 1.5%, and 2% turmeric powder was prepared and the moisture, pH, sugar, color, texture, DPPH and sensory properties of the samples were measured. Moisture contents of jeung-pyun were 51.26~51.99% and there were significant differences among the samples(p<0.001). The L-values were significantly decreased with increasing turmeric powder content. The b-value was low in the control and there were significant differences among the samples(p<0.05). Texture profile analysis showed that there were no significant differences among the groups in hardness, adhesiveness, springiness, cohesiveness, gumminess, and chewiness. The hardness was the lowest in the control group and increased with increasing turmeric powder content. The antioxidant activities as measured by DPPH increased with increasing turmeric powder content (p<0.001). In the sensory evaluation, 1% addition of turmeric powder showed the highest preference in terms of color, taste, flavor, texture and overall preference(p<0.001). As determined by this study, the addition of 1% turmeric powder was the most favorable method for making use of turmeric powder in the production of jueng-pyun.

A Study on the Metadata Schema for the Collection of Sensor Data in Weapon Systems (무기체계 CBM+ 적용 및 확대를 위한 무기체계 센서데이터 수집용 메타데이터 스키마 연구)

  • Jinyoung Kim;Hyoung-seop Shim;Jiseong Son;Yun-Young Hwang
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.161-169
    • /
    • 2023
  • Due to the Fourth Industrial Revolution, innovation in various technologies such as artificial intelligence (AI), big data (Big Data), and cloud (Cloud) is accelerating, and data is considered an important asset. With the innovation of these technologies, various efforts are being made to lead technological innovation in the field of defense science and technology. In Korea, the government also announced the "Defense Innovation 4.0 Plan," which consists of five key points and 16 tasks to foster advanced science and technology forces in March 2023. The plan also includes the establishment of a Condition-Based Maintenance system (CBM+) to improve the operability and availability of weapons systems and reduce defense costs. Condition Based Maintenance (CBM) aims to secure the reliability and availability of the weapon system and analyze changes in equipment's state information to identify them as signs of failure and defects, and CBM+ is a concept that adds Remaining Useful Life prediction technology to the existing CBM concept [1]. In order to establish a CBM+ system for the weapon system, sensors are installed and sensor data are required to obtain condition information of the weapon system. In this paper, we propose a sensor data metadata schema to efficiently and effectively manage sensor data collected from sensors installed in various weapons systems.

A Probability Embedded Expert System to Detect and Resolve Network Faults Intelligently (지능적 네트워크 장애 판별 및 문제해결을 위한 확률기반 시스템)

  • Yang, Young-Moon;Chang, Byeong-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.135-143
    • /
    • 2011
  • Currently network management systems(NMS) just give useful information about the criticality of the alarms and the process of the fault analysis is mainly dependent on the experts who have many years experiences in the field. Due to these reasons it takes very much time and manpower cost to localize the real root of the fault from the alarm information. Therefore, to solve these problems in this research we analyze the probability of the fault for each alarm and provide how to give the problem solving procedure with confidence level and give idea to build a system to realize the problem solving procedure. In addition, we give a case study to show how to use the proposed ideas.

Analysis of Harmonics Waveform Distortion for IDC(Internet Data Center) Power System and effect of multi-Phase (집적정보통신시설 전원 고조파 분석 및 다상화 효과 고찰)

  • 서정석;이상중;이희영;박정규
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2002.11a
    • /
    • pp.133-138
    • /
    • 2002
  • As Information society has expanded in large scale. In order to improve the reliability and Qos(Qualify of service), domestic IDC(Internet Data Center) has adopted or will adopt the SLAs(Service Level Agreements). The power quality of internet hosting server unit, power system and UPS is very important for better internet service. Therefore, the higher reliability of power system is imperative for satisfying SLAs. This paper presents the status measurement of domestic IDCs harmonics and illustrates the reduction effect of harmonics through the multi-phase.

  • PDF

MIMO Channel Diagonalization: Linear Detection ZF, MMSE (MIMO 채널 대각화: 선형 검출 ZF, MMSE)

  • Yang, Jae Seung;Shin, Tae Chol;Lee, Moon Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.15-20
    • /
    • 2016
  • Compared to the MIMO system using the spatial multiplexing methods and the MIMO system using the diversity scheme achieved a high rate, but the lower the diversity gain to improve the data transmission reliability should separate the spatial stream at the MIMO receiver. In this paper, we compared Channel capacity detection methods with the Lattice code, the 3-user interference channel and linear channel interference detection methods ZF (Zero Forcing) and MMSE (Minimum Mean Square Error) detection methods. The channel is a Diagonal channel. In other words, Diagonal channel is confirmed by the inverse matrix satisfies the properties of Jacket are element-wise inverse to $[H]_N[H]_N^{-1}=[I]_N$.

A Study for Algorithm of Safe Transmission in Distributed Network (분산 네트워크에서 안전한 전송을 위한 알고리즘에 관한 연구)

  • Kim, Tae-Kyung;Seo, Hee-Suk;Lee, Dong-Young
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.1
    • /
    • pp.35-40
    • /
    • 2009
  • The reliability of processing the distributed application becomes more and more important issues in distributed network as the usage of distributed network increases. Because the distributed network applications are processed in the available resources of Internet. It is important factors that the user can efficiently access the available resources and processed results can be delivered to the user of job request. Therefore in this paper, we suggested the survivability factor for sending data safely whether it can be efficiently accessed between the user and available resource which processes the distributed application. And evaluated the performance of the suggested factor using the data transmission time. Also we suggested the transmission algorithm for safe transmission using the survivability factor.

Federated Learning Based on Ethereum Network (이더리움 네트워크 기반의 연합학습)

  • Seung-Yeon Hwang;Jeong-Joon Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.191-196
    • /
    • 2024
  • Recently, research on intelligent IoT technology has been actively conducted by various companies and research institutes to analyze various data collected from IoT devices and provide it through actual application services. However, security issues such as personal information leakage may arise in the process of transmitting and receiving data to use data collected from IoT devices for research and development. In addition, as data collected from multiple IoT devices increases, data management difficulties exist, and data movement is costly and time consuming. Therefore, in this paper, we intend to develop an Ethereum network-based federated learning system with guaranteed reliability to improve security issues and inefficiencies in a federated learning environment composed of various devices.

A Priority Analysis on E-Commerce Security Factors - Focused on Researchers and Practitioners (전자상거래를 위한 보안 항목 우선순위 분석: 연구자그룹과 실무자그룹을 중심으로)

  • Kim, Hyun-Woo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.5
    • /
    • pp.163-171
    • /
    • 2011
  • In e-commerce environment, security should be considered as an essential factor for success. In this paper, we analyze security requirements for e-commerce system, and it is focused on the practical usage, not theoretical contribution, in the field of e-commerce security. To identify the security requirements being specific to e-commerce environment, the researches related to e-commerce security are surveyed and a phase of Delphi method and Analytic Hierarchy Process(AHP) are used to determine the relative importance of e-commerce security factors. Since researchers and practitioners can have significantly different views because of each different work environment, we divide the professionals into two respondents' group. This survey result can be useful security guidelines in the development of e-commerce service system from the initial system development step to the completion.

Congestion Detection and Avoidance for Reliable Data Transmission in Wireless Sensor Networks (무선 센서 네트워크에서 신뢰성 있는 데이터 전송을 위한 혼잡 탐지와 회피)

  • Park, Hong-Jin;Jang, Jae-Bok
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.3
    • /
    • pp.343-350
    • /
    • 2010
  • Wireless Sensor Network is an event-driven system that a large number of micro sensor nodes are collected, giving and Wing information. Congestion can take place easily since a great number of sensor nodes are sensing data and transferring them to sink nodes when an event occurs, comparing to the existing wired network. Current internet transport protocol is TCP/UDP, however, this is not proper for wireless sensor network event-driven ESRT, STCP and CODA are being studied for reliable data transport in the wireless sensor network. Congestion are being detected local buffer and channel loading with these techniques. Broadcasting is mainly used and can avoid congestion when one happens. The way that combining local buffer and channel loading information and detecting congestion is being studied in this paper. When congestion occurs, buffering state is divided into three in order to lessen the broadcasting sending the message on congestion control to the node having frequent channel loading. Thus they have advantage of decreasing network's loading.

Local Recovery in Reliable Multicast Protocols by Separating NAK-suppression from Error Recovery Request (신뢰성 있는 멀티캐스트 프로토콜에서 NAK 메시지의 기능 분리를 통한 지역적 오류 복구)

  • Jung, Choong-Il;Lee, Yun-Hee;Park, Chang-Yun
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.559-569
    • /
    • 2001
  • With the growth of the Internet, applications using the reliable multicast protocol are increasing. Two important requirements of reliable multicasting are reliability and scalability. To enhance scalability, many methods have been proposed. A typical method is a local recovery scheme. This paper proposes a new stable and effective protocol with the following features. The first is to apply the discipline of the separations of concerns to NAK message. By dividing the functions of the NAK message into the error recovery request and the NAK-suppression, each function can be optimized. Second, a local representative, which is selected gradually and distributively, executes error recovery in somewhat deterministic manner. Finally, by dynamically adjusting the TTL value of the control message, the error recovery domain can be optimized. The proposed scheme has been implemented and experimented on Network Simulator. Compared to the existing schemes, the performance results show that scalability has not only been enhanced but also error recovery time and network overhead have been reduced.

  • PDF