• Title/Summary/Keyword: Domain Service

Search Result 830, Processing Time 0.023 seconds

ONTOLOGY DESIGN FOR THE EFFICIENT CUSTOMER INFORMATION RETRIEVAL

  • Gu, Mi-Sug;Hwang, Jeong-Hee;Ryu, Keun-Ho
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.345-348
    • /
    • 2005
  • Because the current web search engine estimates the similarity of documents, using the frequency of words, many documents irrespective of the user query are provided. To solve these kinds of problems, the semantic web is appearing as a future web. It is possible to provide the service based on the semantic web through ontology which specifies the knowledge in a special domain and defines the concepts of knowledge and the relationships between concepts. In this paper to search the information of potential customers for home-delivery marketing, we model the specific domain for generating the ontology. And we research how to retrieve the information, using the ontology. Therefore, in this paper, we generate the ontology to define the domain about potential customers and develop the search robot which collects the information of customers.

  • PDF

Distributed CoAP Handover Using Distributed Mobility Agents in Internet-of-Things Networks

  • Choi, Sang-Il;Koh, Seok-Joo
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.1
    • /
    • pp.37-42
    • /
    • 2017
  • The constrained application protocol (CoAP) can be used for remotely controlling various sensor devices in Internet of Things (IoT) networks. In CoAP, to support the handover of a mobile sensor device, service discovery and message transmission needs to be repeated, although doing so would increase the handover delay significantly. To address this limitation of CoAP, a centralized CoAP scheme has been proposed. However, it tends to result in performance degradation for an inter-domain handover case. In this letter, we propose a distributed CoAP handover scheme to support the inter-domain handover. In the proposed scheme, a distributed mobility agent (DMA) is used for managing the location of mobile sensors in a domain and performing handover control operations with its neighboring DMAs in a distributed manner. A performance comparison reveals that the proposed scheme offers a performance improvement of up to 29.5% in terms of the handover delay.

Data hiding in partially encrypted HEVC video

  • Xu, Dawen
    • ETRI Journal
    • /
    • v.42 no.3
    • /
    • pp.446-458
    • /
    • 2020
  • In this study, an efficient scheme for hiding data directly in partially encrypted versions of high efficiency video coding (HEVC) videos is proposed. The content owner uses stream cipher to selectively encrypt some HEVC-CABAC bin strings in a format-compliant manner. Then, the data hider embeds the secret message into the encrypted HEVC videos using the specific coefficient modification technique. Consequently, it can be used in third-party computing environments (more generally, cloud computing). For security and privacy purposes, service providers cannot access the visual content of the host video. As the coefficient is only slightly modified, the quality of the decrypted video is satisfactory. The encrypted and marked bitstreams meet the requirements of format compatibility, and have the same bit rate. At the receiving end, data extraction can be performed in the encrypted domain or decrypted domain that can be adapted to different application scenarios. Several standard video sequences with different resolutions and contents have been used for experimental evaluation.

Unsupervised learning with hierarchical feature selection for DDoS mitigation within the ISP domain

  • Ko, Ili;Chambers, Desmond;Barrett, Enda
    • ETRI Journal
    • /
    • v.41 no.5
    • /
    • pp.574-584
    • /
    • 2019
  • A new Mirai variant found recently was equipped with a dynamic update ability, which increases the level of difficulty for DDoS mitigation. Continuous development of 5G technology and an increasing number of Internet of Things (IoT) devices connected to the network pose serious threats to cyber security. Therefore, researchers have tried to develop better DDoS mitigation systems. However, the majority of the existing models provide centralized solutions either by deploying the system with additional servers at the host site, on the cloud, or at third party locations, which may cause latency. Since Internet service providers (ISP) are links between the internet and users, deploying the defense system within the ISP domain is the panacea for delivering an efficient solution. To cope with the dynamic nature of the new DDoS attacks, we utilized an unsupervised artificial neural network to develop a hierarchical two-layered self-organizing map equipped with a twofold feature selection for DDoS mitigation within the ISP domain.

A Study on Performance Improvements about Duct of Smoke Control System Combined with Air-Conditioning Equipment (공기조화설비 겸용 제연설비 덕트의 성능개선을 위한 연구)

  • Oh, Teakhum;Park, Chanseok
    • Journal of the Korea Safety Management & Science
    • /
    • v.23 no.4
    • /
    • pp.67-72
    • /
    • 2021
  • To ensure the safety and functionality of a railroad bridge, maintaining the integrity of the bridge via continuous structural health monitoring is important. However, most structural integrity monitoring methods proposed to date are based on modal responses which require the extracting process and have limited availability. In this paper, the applicability of the existing damage identification method based on free-vibration reponses to time-domain deflection shapes due to moving train load is investigated. Since the proposed method directly utilizes the time-domain responses of the structure due to the moving vehicles, the extracting process for modal responses can be avoided, and the applicability of structural health evaluation can be enhanced. The feasibility of the presented method is verified via a numerical example of a simple plate girder bridge.

Synergy and contingency fit analysis for digital convergence value attributes (디지털융합 가치요소의 시너지와 상황 적합 분석)

  • Han, Hyun-Soo;Moon, Tae-Eun
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.403-418
    • /
    • 2012
  • In this paper, we attempted to theorize the synergy effect between the value creating attributes for digital convergence model in the service industry. Our investigation is based upon contingency fit theory to understand the strategic fit for the two inherent value attributes of fixed and mobile value, as well as resolving fundamental limitations of service processes. Empirical validation of the derived research model is analyzed using hierarchical regression method. The results indicate that the relative advantage of each value creating attributes are strongly associated with the characteristics of domain service industries, and compatibility is critical to user adoption of convergent service model. Moreover, the less significant statistical impact of the synergy between mobile and fixed value attributes and others implies that each value attribute uniquely contributes to particular IT convergence model, which thereby offers critical insight that focusing the convergent value in conjunction with specific application domain is the most appealing managerial focus. The findings provide useful insight for the further research in IT based industry convergent business model areas.

A Healthcare Service for Ubiquitous Environment (유비쿼터스 환경을 위한 헬스 케어 서비스 제공 방안)

  • Park Yong-Min;Park Joo-Hee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.275-278
    • /
    • 2005
  • We describe the Ubiquitous Healthcare Service(UHS) architecture, a new service-provision architecture, covering the basic concept, component and their roles and the service-provision mechanism. A UHS provides services in two phases, a service composition phase in which Healthcare Service Elements (HSEs) are combined on the basis of Healthcare Service Agents (HSAs), and a Healthcare Service emergence phase in which a new HSA is obtained on the basis of the history usage of HSEs and HSAs. A UHS can handle various types of HSEs, representing web services, resources about healthcare domain. The establishment of UHS technologies on networks will provide various services within ubiquitous-computing environments.

  • PDF

Application of Web Service Technology to Project Evaluation Management (웹서비스 기술의 프로젝트 평가관리시스템에의 응용)

  • ;dhgust,d
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.27 no.1
    • /
    • pp.57-63
    • /
    • 2004
  • Evaluating a project is one of the key activities in managing projects, and thus it should be implemented as a part of the entire project management system. However, currently deployed systems suffer from deficiencies such as the lack of supporting distributed environment and integrity problems. Web service technology, which enables applications to work inter-operatively under a distributed computing environment, is said to solve such problems. In this paper, the web service technology is applied to evaluation management systems. The process of evaluation is designed based on the web service, data is modeled and a pilot system is implemented to test the feasibility of the technology to the domain of project evaluation.

A Design of University Information System Operation Audit Model based on ITIL V3

  • Kim, Hee-Wan;Kang, Bo-Ra;Kim, Dong-Soo;Moon, Song-Chul
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.3
    • /
    • pp.29-41
    • /
    • 2018
  • The purpose of constructing university information system is for improvement in diversification and throughput of information, streamlines business processes, rapid exchange of information, sharing of information, decision-making information, and securing educational facilities. Similar to business information technology system, university information system does not have a review system for sharing and overlapping investment of information. Due to the lack of project management for outsourcing and vulnerability of system suitability, system audit is absolutely needed for the university information system. This paper especially focuses on an operational phase in the audit of university information system. Additionally, we proposed operating model and checklists of the university information system based on Management Guidelines of ITIL V3 Operational and Information System. We derived the checklists of operation audit by each domain of service strategy, service design, service transition, service operation, and continual service improvement. As the result, this study appear to have more than average satisfaction the suitability results were.

Exploring the Antecedents of Price Fairness in the Fast Food: A case of McDonald's

  • Song, Myung-Keun;Moon, Joon-Ho;Park, Sun-Woo
    • Asia-Pacific Journal of Business
    • /
    • v.10 no.4
    • /
    • pp.181-195
    • /
    • 2019
  • This study aims to investigate the influencing attributes on price fairness in the domain of fast food service context. As the research subject, this research selects McDonald's business because of its market share in the fast food market. Five attributes are examined to account for price fairness. The attributes are advertising attitude, employee service, waiting, convenience, and brand love. This study performed survey to collect the data. The survey participants are university students because they are essential market segment for fast food business. The number of observation is 299 for the data analysis. To analyze the data, this research used various statistical instruments (e.g., frequency analysis, mean and standard computation, exploratory factor analysis, reliability test, correlation matrix, and multiple regression analysis). Regarding the results, this research identified advertising attitude, employee service, and brand love are influential attributes to establish price fairness of university students. This research could inform the marketing director of food service business to understand university students target better.