• Title/Summary/Keyword: Approach of Network

Search Result 4,633, Processing Time 0.039 seconds

An Automatic Pattern Recognition Algorithm for Identifying the Spatio-temporal Congestion Evolution Patterns in Freeway Historic Data (고속도로 이력데이터에 포함된 정체 시공간 전개 패턴 자동인식 알고리즘 개발)

  • Park, Eun Mi;Oh, Hyun Sun
    • Journal of Korean Society of Transportation
    • /
    • v.32 no.5
    • /
    • pp.522-530
    • /
    • 2014
  • Spatio-temporal congestion evolution pattern can be reproduced using the VDS(Vehicle Detection System) historic speed dataset in the TMC(Traffic Management Center)s. Such dataset provides a pool of spatio-temporally experienced traffic conditions. Traffic flow pattern is known as spatio-temporally recurred, and even non-recurrent congestion caused by incidents has patterns according to the incident conditions. These imply that the information should be useful for traffic prediction and traffic management. Traffic flow predictions are generally performed using black-box approaches such as neural network, genetic algorithm, and etc. Black-box approaches are not designed to provide an explanation of their modeling and reasoning process and not to estimate the benefits and the risks of the implementation of such a solution. TMCs are reluctant to employ the black-box approaches even though there are numerous valuable articles. This research proposes a more readily understandable and intuitively appealing data-driven approach and developes an algorithm for identifying congestion patterns for recurrent and non-recurrent congestion management and information provision.

Minimizing Redundant Route Nodes in USN by Integrating Spatially Weighted Parameters: Case Study for University Campus (가중치가 부여된 공간변수에 의거하여 USN 루트노드 최소화 방안 -대학 캠퍼스를 사례로-)

  • Kim, Jin-Taek;Um, Jung-Sup
    • Journal of the Korean Geographical Society
    • /
    • v.45 no.6
    • /
    • pp.788-805
    • /
    • 2010
  • The present USN (Ubiquitous Sensor Networks) node deployment practices have many limitations in terms of positional connectivity. The aim of this research was to minimize a redundancy of USN route nodes, by integrating spatially weighted parameters such as visibility, proximity to cell center, road density, building density and cell overlapping ratio into a comprehensive GIS database. This spatially weighted approach made it possible to reduce the number of route nodes (11) required in the study site as compared to that of the grid network method (24). The field test for RSSI (Received Signal Strength Indicator) indicates that the spatially weighted deployment could comply with the quality assurance standard for node connectivity, and that reduced route nodes do not show a significant degree of signal fluctuation for different site conditions. This study demonstrated that the spatially weighted deployment can be used to minimize a redundancy of USN route nodes in a routine manner, and the quantitative evidence removing a redundancy of USN route nodes could be utilized as major tools to ensure the strong signal in the USN, that is frequently encountered in real applications.

Web Service-based SCM Process Execution Using BPM (BPM을 이용한 웹서비스 기반의 SCM 프로세스 실행)

  • Seo, Yong-Won;Choi, Yong-Sun;Jang, Jin-Yong;Bae, Hye-Rim
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.4
    • /
    • pp.65-83
    • /
    • 2004
  • Keen competence in business environments induces companies to introduce Supply Chain Management (SCM), which is accelerated by emerging information technology. Consequently, supply chain integration requires interacting and information sharing among the companies participating in the supply chain. Web services, platform independent technologies, are recently used for SCM. However, web services themselves do not provide high level supply chain integration. Therefore, the ways to control and manage global processes over supply chain need to be developed. In this paper, we introduce a method of executing and managing supply chain process using Business Process Management (BPM) system. BPM system is a software system to support an efficient execution and management of complex business processes, and it is applied to supply chain processes . The supply chain processes can be regarded network of activities, each of which is served as web service and related to one of the participants. Our approach enables not only efficient managing but also effective monitoring of the process, which can be a good basis for improvement of the processes. For a speedy execution of processes, we provide a method to support decision making in course of executing process by software agents, which are also web services.

  • PDF

Potential of Children's Museum as a Base for Donation Network - Focused on Chicago Children's Museum - (기부네트워크 구축 거점으로서 어린이박물관의 잠재성 분석 연구 - 시카고 어린이박물관 사례를 중심으로 -)

  • Lee, Yeunsook;Lim, Yeaji;Kim, Kwangmi
    • KIEAE Journal
    • /
    • v.12 no.3
    • /
    • pp.3-10
    • /
    • 2012
  • The purpose of this study is to seek a planning approach for children's museum within Korean context that promotes community participation. A literature review method and a field survey method were used. Literature reviews on community participation paradigm, residents' participation and donation networks in community regeneration processes, and finally on case studies on children's museum in Korea were carried out. Through the field survey on Chicago Children's Museum(CCM) located in downtown Chicago, its role was identified as networking systems of community participation and donation and was verified as a socio-physical base for vitalizing donation culture that is an active and a leading community participation method. As a result, CCM has engaged many partnerships with city organizations and local schools to provide diverse and unique programs that are not only targeted to children but also parents, teachers and visitors. Also, an evolution of CCM through various types of donations and community participation was delineated. CCM was found successfully in restoring community spirit and vitalizing economical growth where it once was a decayed city area. Rather than focusing on descriptive technique of typical children's museum, this study explored how community fabric is made and acted out, through rethinking community participation's value, and how it can influence a physical space. CCM, as a good example of community participatory museum, the results can be used as a reference in planning and directing community participation based children's museums in Korea. It is significant to shed light on children's museum as an opportunity of social space which can empower community.

An Approach to Detect Spam E-mail with Abnormal Character Composition (비정상 문자 조합으로 구성된 스팸 메일의 탐지 방법)

  • Lee, Ho-Sub;Cho, Jae-Ik;Jung, Man-Hyun;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.129-137
    • /
    • 2008
  • As the use of the internet increases, the distribution of spam mail has also vastly increased. The email's main use was for the exchange of information, however, currently it is being more frequently used for advertisement and malware distribution. This is a serious problem because it consumes a large amount of the limited internet resources. Furthermore, an extensive amount of computer, network and human resources are consumed to prevent it. As a result much research is being done to prevent and filter spam. Currently, research is being done on readable sentences which do not use proper grammar. This type of spam can not be classified by previous vocabulary analysis or document classification methods. This paper proposes a method to filter spam by using the subject of the mail and N-GRAM for indexing and Bayesian, SVM algorithms for classification.

An Architecture of a Dynamic Cyber Attack Tree: Attributes Approach (능동적인 사이버 공격 트리 설계: 애트리뷰트 접근)

  • Eom, Jung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.67-74
    • /
    • 2011
  • In this paper, we presented a dynamic cyber attack tree which can describe an attack scenario flexibly for an active cyber attack model could be detected complex and transformed attack method. An attack tree provides a formal and methodical route of describing the security safeguard on varying attacks against network system. The existent attack tree can describe attack scenario as using vertex, edge and composition. But an attack tree has the limitations to express complex and new attack due to the restriction of attack tree's attributes. We solved the limitations of the existent attack tree as adding an threat occurrence probability and 2 components of composition in the attributes. Firstly, we improved the flexibility to describe complex and transformed attack method, and reduced the ambiguity of attack sequence, as reinforcing composition. And we can identify the risk level of attack at each attack phase from child node to parent node as adding an threat occurrence probability.

Blockchain Based Data-Preserving AI Learning Environment Model for Cyber Security System (AI 사이버보안 체계를 위한 블록체인 기반의 Data-Preserving AI 학습환경 모델)

  • Kim, Inkyung;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.12
    • /
    • pp.125-134
    • /
    • 2019
  • As the limitations of the passive recognition domain, which is not guaranteed transparency of the operation process, AI technology has a vulnerability that depends on the data. Human error is inherent because raw data for artificial intelligence learning must be processed and inspected manually to secure data quality for the advancement of AI learning. In this study, we examine the necessity of learning data management before machine learning by analyzing inaccurate cases of AI learning data and cyber security attack method through the approach from cyber security perspective. In order to verify the learning data integrity, this paper presents the direction of data-preserving artificial intelligence system, a blockchain-based learning data environment model. The proposed method is expected to prevent the threats such as cyber attack and data corruption in providing and using data in the open network for data processing and raw data collection.

Youtube Influencer's Startup Strategy Using Lean Startup Technique (린스타트업 기법을 활용한 유튜브 인플루언서의 창업전략)

  • Park, Jeong Sun;Park, Sang Hyeok;Kim, Young Lag
    • The Journal of Information Systems
    • /
    • v.31 no.1
    • /
    • pp.147-173
    • /
    • 2022
  • Purpose As the use of social network services has become common, it has become possible to freely communicate and establish relationships with other people anytime, anywhere for communication and information sharing. Influencers who have a strong influence on consumers' perceptions and attitudes through their own opinions and stories have appeared on various social media channels such as YouTube. Recently, companies utilize influencers with a large number of followers to check interactions with customers to understand customer attitudes and opinions about products in real time. Start-ups with insufficient resources need to quickly examine customer responses to reduce the probability of failure after product planning. The Lean process of creating an MVP and quickly confirming and learning the market response should be repeated over and over again. Findings In this paper, we try to suggest that the YouTube platform can play a sufficient role as a customer experiment space through examples. The case company is a company that has successfully commercialized products by continuously interacting with customers through the YouTube platform for the first four months of its founding. This paper is expected to be helpful in the experimental process for prospective founders and early founders to examine customer responses to reduce the probability of market failure before commercialization. Design/methodology/approach This paper analyzed the YouTube channel data of case companies based on the netnography methodology and presented the contents of the lean process management carried out in the experimental stage and the post-production stage through interview research.

Motion Generation of a Single Rigid Body Character Using Deep Reinforcement Learning (심층 강화 학습을 활용한 단일 강체 캐릭터의 모션 생성)

  • Ahn, Jewon;Gu, Taehong;Kwon, Taesoo
    • Journal of the Korea Computer Graphics Society
    • /
    • v.27 no.3
    • /
    • pp.13-23
    • /
    • 2021
  • In this paper, we proposed a framework that generates the trajectory of a single rigid body based on its COM configuration and contact pose. Because we use a smaller input dimension than when we use a full body state, we can improve the learning time for reinforcement learning. Even with a 68% reduction in learning time (approximately two hours), the character trained by our network is more robust to external perturbations tolerating an external force of 1500 N which is about 7.5 times larger than the maximum magnitude from a previous approach. For this framework, we use centroidal dynamics to calculate the next configuration of the COM, and use reinforcement learning for obtaining a policy that gives us parameters for controlling the contact positions and forces.

SDL-OPNET Co-Simulation Technique for the Development of Communication Protocols with an Integrated Approach to Functional Verification and Performance Evaluation (기능 검증 및 성능 평가 통합 접근 방법을 통한 통신 프로토콜 개발을 위한 SDL-OPNET 코-시뮬레이션 기법)

  • Yang, Qi-Ping;Kim, Tae-Hyong
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.157-164
    • /
    • 2010
  • While both functional verification and performance evaluation of a system are necessary for the development of effective and reliable communication systems, they have been usually performed individually through functional modeling with formal language tools and performance modeling with professional network performance evaluation tools, respectively. However, separate and duplicated modeling of a system may cause increase of the cost and inconsistency between the models. In order to overcome this problem, this paper proposes an integrated design technique that estimates the performance of a communication protocol designed in SDL with SDL-OPNET co-simulation. The proposed technique presents how to design a co-simulation system with the environment functions of Tau and the external system module of OPNET. InRes protocol was used as an example to show the applicability and usefulness of the proposed technique.