• Title/Summary/Keyword: Address of Things

Search Result 125, Processing Time 0.027 seconds

Performance Analysis of Siding Window based Stream High Utility Pattern Mining Methods (슬라이딩 윈도우 기반의 스트림 하이 유틸리티 패턴 마이닝 기법 성능분석)

  • Ryang, Heungmo;Yun, Unil
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.53-59
    • /
    • 2016
  • Recently, huge stream data have been generated in real time from various applications such as wireless sensor networks, Internet of Things services, and social network services. For this reason, to develop an efficient method have become one of significant issues in order to discover useful information from such data by processing and analyzing them and employing the information for better decision making. Since stream data are generated continuously and rapidly, there is a need to deal with them through the minimum access. In addition, an appropriate method is required to analyze stream data in resource limited environments where fast processing with low power consumption is necessary. To address this issue, the sliding window model has been proposed and researched. Meanwhile, one of data mining techniques for finding meaningful information from huge data, pattern mining extracts such information in pattern forms. Frequency-based traditional pattern mining can process only binary databases and treats items in the databases with the same importance. As a result, frequent pattern mining has a disadvantage that cannot reflect characteristics of real databases although it has played an essential role in the data mining field. From this aspect, high utility pattern mining has suggested for discovering more meaningful information from non-binary databases with the consideration of the characteristics and relative importance of items. General high utility pattern mining methods for static databases, however, are not suitable for handling stream data. To address this issue, sliding window based high utility pattern mining has been proposed for finding significant information from stream data in resource limited environments by considering their characteristics and processing them efficiently. In this paper, we conduct various experiments with datasets for performance evaluation of sliding window based high utility pattern mining algorithms and analyze experimental results, through which we study their characteristics and direction of improvement.

A Scientific Consideration of Military Thought (군사사상의 학문적 고찰)

  • Jin, Seok-Yong
    • Journal of National Security and Military Science
    • /
    • s.7
    • /
    • pp.1-24
    • /
    • 2009
  • This article deals with military thought in general. First I tried to distinguish 'thought' from 'theory', 'philosophy', and 'principle'. Thought means the act of thinking about or considering something, an idea or opinion, or a set of ideas about a particular subject, e.g. military affairs in the present discussion. Theory means a formal statement of the rules on which a subject of study is based or of ideas which are suggested to explain a fact or event or, more generally, an opinion or explanation. Philosophy means the use of reason in understanding such things as the nature of reality and existence, the use and limits of knowledge. Principle means a basic idea or rule that explains or controls how something happens or works. Chapter 3 summarized the characteristics of military thoughts into five points', (i) it is closely related with concrete experiences of a nation; (ii) it includes philosophical and logical arguments; (iii) it relies heavily on the political thought of a nation; (iv) it includes necessarily value-judgments; (v) it contains visions of a nation which are not only descriptions or explanations of military affairs, but also evaluations and advocacies. Chapter 4 considers the relation of international political thoughts to military thought. Throughout the history of the modem states system there have been three competing traditions of thought: the Hobbesian or realist tradition, which views international politics as a state of war; the Kantian or universalist tradition, which sees at work in international politics a potential community of mankind; and the Grotian or internationalist tradition, which views international politics as taking place within an international society. Chapter 5 considers the law of war, which is a body of law concerning acceptable justifications to engage in war (jus ad bellum) and the limits to acceptable wartime conduct (jus in bello). Among other issues, modem laws of war address declarations of war, acceptance of surrender and the treatment of prisoners of war, military necessity along with distinction and proportionality, and the prohibition of certain weapons that may cause unnecessary suffering.

  • PDF

The Teachers' Recognition and a Plan for the Improvement of the System on Selection of Gifted Students in Science Using Teachers' Observation and Nomination (과학 영재 관찰.추천 선발 방식에 대한 교사의 인식 조사 및 개선 방안)

  • Bang, Mi Seon;Kim, Yong Gwon
    • Journal of Korean Elementary Science Education
    • /
    • v.32 no.2
    • /
    • pp.169-184
    • /
    • 2013
  • The purpose of this study is to investigate teachers' recognition and to suggest an improvement in the system of teacher's observation and nomination used to selecting gifted and talented students in Science in the Busan Metropolitan School District in 2013 by investigating teachers' recognition of the system and their expressed needs. The results are as follows. First, it was observed that teachers are of the opinion that it is difficult to determine the science gifted students by observation due to their lack of expertise in giftedness and gifted education, the lack of a check list to use, and the difficulty of ensuring the objectivity of the results of the determination. Second, the absence of objective screening tools used for the selection, the selection of gifted students based on their subjective judgment, and the possibility to select students based only on visible manifestations of ability may cause parents to mistrust the system. Thus, institutional support is required to address the concerns of teachers and parents. Third, the teachers who are in charge of observation, nomination, selection and determination need to be trained. After that, at least one of these teachers should be assigned in each school and training should operate continuously and systematically. Lastly, while these things are occurring, the process of observation and nomination of by teachers, which is the basis of pooling gifted students at the level of Busan Metropolitan School District, should be continued.

Responses of Autonomic Nervous System and Gastrointestinal Function to Acupuncture at Abdominal Anterior Cutaneous Nerve : A Pilot Study (복부전방피부신경 영역의 자침으로 유발한 자율신경 및 위장관기능 변화에 대한 연구)

  • Park, Seohyun;Kim, Hojun;Keum, Dongho
    • The Journal of Korean Medicine
    • /
    • v.40 no.1
    • /
    • pp.99-113
    • /
    • 2019
  • Objectives: This study is designed to identify the responses of autonomic nervous system and gastrointestinal function which are induced by acupuncture at abdominal anterior cutaneous nerve. Methods: This study is one group before and after pilot study. Subjects were treated once, after having been fasting six hours. They had before tests, labeling points for acupuncture, acupuncture, and after tests in order. The points of acupuncture were motor points of rectus abdominis where the abdominal anterior cutaneous nerve came to the skin from abdominal wall. Before and after tests were consisted of three things: Digital Infrared Thermographic Imaging(D.I.T.I.), Heart Rate Variability(HRV), and Recording of bowel sounds. Results: There were significant differences on the skin temperature of upper body and the frequency of bowel sounds(p<0.001, p<0.001). The HRV parameters and volume of bowel sounds had no significant differences(p>0.05, p>0.05). Conclusion: Even though no significant differences in HRV parameters, the significant differences of skin temperature of upper body and frequency of bowel sounds could mean acupuncture at abdominal anterior cutaneous nerve could affect the autonomic nervous system and gastrointestinal function. However, this study had no group to compare with. Future randomized project should address this issue.

Study on the Security R&R of OT-IT for Control System Network Boundaries (제어 네트워크 경계에 대한 OT-IT 책임 역할 연구)

  • WOO, Young Han;Kwon, Hun Yeong
    • Journal of Information Technology Services
    • /
    • v.19 no.5
    • /
    • pp.33-47
    • /
    • 2020
  • In recent years, due to the demand for operating efficiency and cost reduction of industrial facilities, remote access via the Internet is expanding. the control network accelerates from network separation to network connection due to the development of IIoT (Industrial Internet of Things) technology. Transition of control network is a new opportunity, but concerns about cybersecurity are also growing. Therefore, manufacturers must reflect security compliance and standards in consideration of the Internet connection environment, and enterprises must newly recognize the connection area of the control network as a security management target. In this study, the core target of the control system security threat is defined as the network boundary, and issues regarding the security architecture configuration for the boundary and the role & responsibility of the working organization are covered. Enterprises do not integrate the design organization with the operation organization after go-live, and are not consistently reflecting security considerations from design to operation. At this point, the expansion of the control network is a big transition that calls for the establishment of a responsible organization and reinforcement of the role of the network boundary area where there is a concern about lack of management. Thus, through the organization of the facility network and the analysis of the roles between each organization, an static perspective and difference in perception were derived. In addition, standards and guidelines required for reinforcing network boundary security were studied to address essential operational standards that required the Internet connection of the control network. This study will help establish a network boundary management system that should be considered at the enterprise level in the future.

Lessons from the Application of GIS for Local Government - Some Examples from Korea and Australia - (지방자치단체에서의 GIS 활용에 대한 제언 - 한국과 호주에서의 사례연구를 중심으로 -)

  • Peterson, Jim;Kim, Chang Hwan;Yoo, Jae Yong
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.5 no.3
    • /
    • pp.107-117
    • /
    • 2002
  • Public policy responses to the digital/information revolution and the micro-economic reforms that it facilitates have inspired exploration of the scope for local government implementation of digital spatial data handling(DSDH) of information relating to, among other things, asset inventory, environmental and utility management, address management, and planning. The results from these explorations are such that few doubt the value of bringing the public policies to practice, but diffusion rate and pattern of the approaches demonstrated by the scoping experiments will reflect institutional/cultural matters, indicators of the relative significance of which might be at least partly predicted from appraisal of case studies. This argument is exemplified by reference to case studies in adoption of DSDH by local government organizations in Korea and in Australia.

  • PDF

Self-organization Scheme of WSNs with Mobile Sensors and Mobile Multiple Sinks for Big Data Computing

  • Shin, Ahreum;Ryoo, Intae;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.943-961
    • /
    • 2020
  • With the advent of IoT technology and Big Data computing, the importance of WSNs (Wireless Sensor Networks) has been on the rise. For energy-efficient and collection-efficient delivery of any sensed data, lots of novel wireless medium access control (MAC) protocols have been proposed and these MAC schemes are the basis of many IoT systems that leads the upcoming fourth industrial revolution. WSNs play a very important role in collecting Big Data from various IoT sensors. Also, due to the limited amount of battery driving the sensors, energy-saving MAC technologies have been recently studied. In addition, as new IoT technologies for Big Data computing emerge to meet different needs, both sensors and sinks need to be mobile. To guarantee stability of WSNs with dynamic topologies as well as frequent physical changes, the existing MAC schemes must be tuned for better adapting to the new WSN environment which includes energy-efficiency and collection-efficiency of sensors, coverage of WSNs and data collecting methods of sinks. To address these issues, in this paper, a self-organization scheme for mobile sensor networks with mobile multiple sinks has been proposed and verified to adapt both mobile sensors and multiple sinks to 3-dimensional group management MAC protocol. Performance evaluations show that the proposed scheme outperforms the previous schemes in terms of the various usage cases. Therefore, the proposed self-organization scheme might be adaptable for various computing and networking environments with big data.

Design and Implementation of SDN-based 6LBR with QoS Mechanism over Heterogeneous WSN and Internet

  • Lee, Tsung-Han;Chang, Lin-Huang;Cheng, Wei-Chung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.1070-1088
    • /
    • 2017
  • Recently, the applications of Internet of Things (IoTs) are growing rapidly. Wireless Sensor Network (WSN) becomes an emerging technology to provide the low power wireless connectivity for IoTs. The IPv6 over low-power wireless personal area networks (6LoWPAN) has been proposed by IETF, which gives each WSN device an IPv6 address to connect with the Internet. The transmission congestion in IoTs could be a problem when a large numbers of sensors are deployed in the field. Therefore, it is important to consider whether the WSN devices have be completely integrated into the Internet with proper quality of service (QoS) requirements. The Software Defined Network (SDN) is a new architecture of network decoupling the data and control planes, and using the logical centralized control to manage the forwarding issues in large-scale networks. In this research, the SDN-based 6LoWPAN Border Router (6LBR) is proposed to integrate the transmission from WSNs to Internet. The proposed SDN-based 6LBR communicating between WSNs and the Internet will bring forward the requirements of end-to-end QoS with bandwidth guarantee. Based on our experimental results, we have observed that the selected 6LoWPAN traffic flows achieve lower packet loss rate in the Internet. Therefore, the 6LoWPAN traffic flows classified by SDN-based 6LBR can be reserved for the required bandwidth in the Internet to meet the QoS requirements.

Bridge Inspection and condition assessment using Unmanned Aerial Vehicles (UAVs): Major challenges and solutions from a practical perspective

  • Jung, Hyung-Jo;Lee, Jin-Hwan;Yoon, Sungsik;Kim, In-Ho
    • Smart Structures and Systems
    • /
    • v.24 no.5
    • /
    • pp.669-681
    • /
    • 2019
  • Bridge collapses may deliver a huge impact on our society in a very negative way. Out of many reasons why bridges collapse, poor maintenance is becoming a main contributing factor to many recent collapses. Furthermore, the aging of bridges is able to make the situation much worse. In order to prevent this unwanted event, it is indispensable to conduct continuous bridge monitoring and timely maintenance. Visual inspection is the most widely used method, but it is heavily dependent on the experience of the inspectors. It is also time-consuming, labor-intensive, costly, disruptive, and even unsafe for the inspectors. In order to address its limitations, in recent years increasing interests have been paid to the use of unmanned aerial vehicles (UAVs), which is expected to make the inspection process safer, faster and more cost-effective. In addition, it can cover the area where it is too hard to reach by inspectors. However, this strategy is still in a primitive stage because there are many things to be addressed for real implementation. In this paper, a typical procedure of bridge inspection using UAVs consisting of three phases (i.e., pre-inspection, inspection, and post-inspection phases) and the detailed tasks by phase are described. Also, three major challenges, which are related to a UAV's flight, image data acquisition, and damage identification, respectively, are identified from a practical perspective (e.g., localization of a UAV under the bridge, high-quality image capture, etc.) and their possible solutions are discussed by examining recently developed or currently developing techniques such as the graph-based localization algorithm, and the image quality assessment and enhancement strategy. In particular, deep learning based algorithms such as R-CNN and Mask R-CNN for classifying, localizing and quantifying several damage types (e.g., cracks, corrosion, spalling, efflorescence, etc.) in an automatic manner are discussed. This strategy is based on a huge amount of image data obtained from unmanned inspection equipment consisting of the UAV and imaging devices (vision and IR cameras).

Message Security Level Integration with IoTES: A Design Dependent Encryption Selection Model for IoT Devices

  • Saleh, Matasem;Jhanjhi, NZ;Abdullah, Azween;Saher, Raazia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.328-342
    • /
    • 2022
  • The Internet of Things (IoT) is a technology that offers lucrative services in various industries to facilitate human communities. Important information on people and their surroundings has been gathered to ensure the availability of these services. This data is vulnerable to cybersecurity since it is sent over the internet and kept in third-party databases. Implementation of data encryption is an integral approach for IoT device designers to protect IoT data. For a variety of reasons, IoT device designers have been unable to discover appropriate encryption to use. The static support provided by research and concerned organizations to assist designers in picking appropriate encryption costs a significant amount of time and effort. IoTES is a web app that uses machine language to address a lack of support from researchers and organizations, as ML has been shown to improve data-driven human decision-making. IoTES still has some weaknesses, which are highlighted in this research. To improve the support, these shortcomings must be addressed. This study proposes the "IoTES with Security" model by adding support for the security level provided by the encryption algorithm to the traditional IoTES model. We evaluated our technique for encryption algorithms with available security levels and compared the accuracy of our model with traditional IoTES. Our model improves IoTES by helping users make security-oriented decisions while choosing the appropriate algorithm for their IoT data.