• Title/Summary/Keyword: Entity-based

Search Result 755, Processing Time 0.024 seconds

A Study on Quantitative Modeling for EPCIS Event Data (EPCIS Event 데이터 크기의 정량적 모델링에 관한 연구)

  • Lee, Chang-Ho;Jho, Yong-Chul
    • Journal of the Korea Safety Management & Science
    • /
    • v.11 no.4
    • /
    • pp.221-228
    • /
    • 2009
  • Electronic Product Code Information Services(EPCIS) is an EPCglobal standard for sharing EPC related information between trading partners. EPCIS provides a new important capability to improve efficiency, security, and visibility in the global supply chain. EPCIS data are classified into two categories, master data (static data) and event data (dynamic data). Master data are static and constant for objects, for example, the name and code of product and the manufacturer, etc. Event data refer to things that happen dynamically with the passing of time, for example, the date of manufacture, the period and the route of circulation, the date of storage in warehouse, etc. There are four kinds of event data which are Object Event data, Aggregation Event data, Quantity Event data, and Transaction Event data. This thesis we propose an event-based data model for EPC Information Service repository in RFID based integrated logistics center. This data model can reduce the data volume and handle well all kinds of entity relationships. From the point of aspect of data quantity, we propose a formula model that can explain how many EPCIS events data are created per one business activity. Using this formula model, we can estimate the size of EPCIS events data of RFID based integrated logistics center for a one day under the assumed scenario.

Natural language processing techniques for bioinformatics

  • Tsujii, Jun-ichi
    • Proceedings of the Korean Society for Bioinformatics Conference
    • /
    • 2003.10a
    • /
    • pp.3-3
    • /
    • 2003
  • With biomedical literature expanding so rapidly, there is an urgent need to discover and organize knowledge extracted from texts. Although factual databases contain crucial information the overwhelming amount of new knowledge remains in textual form (e.g. MEDLINE). In addition, new terms are constantly coined as the relationships linking new genes, drugs, proteins etc. As the size of biomedical literature is expanding, more systems are applying a variety of methods to automate the process of knowledge acquisition and management. In my talk, I focus on the project, GENIA, of our group at the University of Tokyo, the objective of which is to construct an information extraction system of protein - protein interaction from abstracts of MEDLINE. The talk includes (1) Techniques we use fDr named entity recognition (1-a) SOHMM (Self-organized HMM) (1-b) Maximum Entropy Model (1-c) Lexicon-based Recognizer (2) Treatment of term variants and acronym finders (3) Event extraction using a full parser (4) Linguistic resources for text mining (GENIA corpus) (4-a) Semantic Tags (4-b) Structural Annotations (4-c) Co-reference tags (4-d) GENIA ontology I will also talk about possible extension of our work that links the findings of molecular biology with clinical findings, and claim that textual based or conceptual based biology would be a viable alternative to system biology that tends to emphasize the role of simulation models in bioinformatics.

  • PDF

Autonomic Self Healing-Based Load Assessment for Load Division in OKKAM Backbone Cluster

  • Chaudhry, Junaid Ahsenali
    • Journal of Information Processing Systems
    • /
    • v.5 no.2
    • /
    • pp.69-76
    • /
    • 2009
  • Self healing systems are considered as cognation-enabled sub form of fault tolerance system. But our experiments that we report in this paper show that self healing systems can be used for performance optimization, configuration management, access control management and bunch of other functions. The exponential complexity that results from interaction between autonomic systems and users (software and human users) has hindered the deployment and user of intelligent systems for a while now. We show that if that exceptional complexity is converted into self-growing knowledge (policies in our case), can make up for initial development cost of building an intelligent system. In this paper, we report the application of AHSEN (Autonomic Healing-based Self management Engine) to in OKKAM Project infrastructure backbone cluster that mimics the web service based architecture of u-Zone gateway infrastructure. The 'blind' load division on per-request bases is not optimal for distributed and performance hungry infrastructure such as OKKAM. The approach adopted assesses the active threads on the virtual machine and does resource estimates for active processes. The availability of a certain server is represented through worker modules at load server. Our simulation results on the OKKAM infrastructure show that the self healing significantly improves the performance and clearly demarcates the logical ambiguities in contemporary designs of self healing infrastructures proposed for large scale computing infrastructures.

Dropout Genetic Algorithm Analysis for Deep Learning Generalization Error Minimization

  • Park, Jae-Gyun;Choi, Eun-Soo;Kang, Min-Soo;Jung, Yong-Gyu
    • International Journal of Advanced Culture Technology
    • /
    • v.5 no.2
    • /
    • pp.74-81
    • /
    • 2017
  • Recently, there are many companies that use systems based on artificial intelligence. The accuracy of artificial intelligence depends on the amount of learning data and the appropriate algorithm. However, it is not easy to obtain learning data with a large number of entity. Less data set have large generalization errors due to overfitting. In order to minimize this generalization error, this study proposed DGA(Dropout Genetic Algorithm) which can expect relatively high accuracy even though data with a less data set is applied to machine learning based genetic algorithm to deep learning based dropout. The idea of this paper is to determine the active state of the nodes. Using Gradient about loss function, A new fitness function is defined. Proposed Algorithm DGA is supplementing stochastic inconsistency about Dropout. Also DGA solved problem by the complexity of the fitness function and expression range of the model about Genetic Algorithm As a result of experiments using MNIST data proposed algorithm accuracy is 75.3%. Using only Dropout algorithm accuracy is 41.4%. It is shown that DGA is better than using only dropout.

Development of Sensor Monitoring System for Emergency Response of Old School Buildings (노후학교 건축물의 재난대응을 위한 센서 모니터링 시스템 개발)

  • Park, Choon-Wook;Lee, Gyeong-Won;Lee, Ji-Soo
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.27 no.1
    • /
    • pp.3-10
    • /
    • 2020
  • Due to the frequent occurrence of large-scale disasters such as recent earthquakes, the problem of the safety of old school buildings has emerged. The need to secure safety management technology through constant monitoring is increasing in an attempt to supplement old school buildings with weak disaster response capabilities. Traditional research is approaching the development of an existing sensor-based risk precursor information monitoring system. However, unlike this, in this study, we will focus on the development of a data analysis platform as part of the development of a continuous monitoring system that can be prepared for earthquakes, collapses, and fires, based on constantly measured data. For this reason, the development of a safety diagnostic algorithm based on the optimal sensor-attached points and sensor data reflecting the fragile characteristics of old school buildings was derived. Utilizing this, a message and action manual system for each management / use entity of school buildings after retirement was constructed.

Development of Application Service for Secure Container Transport Based on CSD (CSD 기반의 컨테이너 안전운송 응용 서비스 개발)

  • Choo, Young-Yeol;Choi, Su-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.10
    • /
    • pp.2203-2208
    • /
    • 2011
  • In this paper, we describe application service development for secure land and marine transport based on CSD (Conveyance Security Device) systems. Based on CSD systems, we present application service and security service according to relevant standards as well as test procedure of developed services. Exploiting temperature, moisture, impact sensors, state monitoring function of container freight was developed to prevent disaster during transportation in addition to security function with CSD. For confidentiality of messages exchanged among application service entity and CSD systems, Encryption and decryption functions going by RC5 and AES-128 algorithms were implemented at desktop PC and 8 bit CPU environments, respectively. Measuring the elapsed time during encryption and decryption shows that two algorithms are allowable for the application service.

A Study on the based on FRAD Conceptual Model based Authority Data Scheme for Academic Papers (FRAD 개념 모형 기반의 학술논문 전거데이터 구조에 관한 연구)

  • Lee, Seok-Hyoung;Kwak, Seung-Jin
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.45 no.3
    • /
    • pp.235-257
    • /
    • 2011
  • In this study, we proposed the FRAD concept model of authority data schema for author, organization and journal titles included in the academic papers. Academic information includes author names, affiliations, publishers, journals and conferences. They are used as access points, and there are multiple relationships among these entities. It is expected that the use of authority data for academic information based on FRAD conceptual model could improve more accurate retrieval of information, systematic management of academic information, and various forms of knowledge representation. In this study, our entity-relationship authority data will be linked to the document, and included the several properties and relationship to identify the object.

Trust Measurement Using Fuzzy Theory and Trade Protocol Recommendation Based on Trust Level in Trusted Auction System (신뢰 기반 경매 시스템에서의 퍼지를 이용한 신뢰도 측정과 신뢰도에 따른 거래 방식 추천)

  • 양근우;허순영
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.28 no.2
    • /
    • pp.17-33
    • /
    • 2003
  • The explosive growth of the internet-based transactions requires not only a secure payment system but also an appropriate trust measuring methodology and secure transaction protocols to guarantee the minimal risk for the transacting entities involved in specific transactions. Especially, in internet auction systems where either buyers or sellers or both can be more than one in one transaction, providing those systems that make sure no one transacting entity takes a major risk becomes critical. In this paper, an improved trust measuring method using a relationship-based internet community for an auction system is proposed. The proposed system incorporates fuzzy set and calculation concepts to help build trust matrices and models, which is used to measure the level of risk involved in a specific auction trade concerned. Also, to optimize the auction trade process in terms of cost and time, the proposed system recommends a differentiated trade protocol according to the risk level involved in each auction trade. To test the appropriateness of the proposed trusted auction system, a prototype system has been developed under a Windows-NT environment.

RFID Tag's Security Level Based RFID Authentication Protocol (전자 태그의 보안 레벨을 기반으로 하는 RFID 인증 프로토콜)

  • Oh Soo-hyun;kwak Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6C
    • /
    • pp.593-600
    • /
    • 2005
  • Recently, RFID system is a main technology to realize ubiquitous computing environments. Because RFID system that is an automatic identification technology using radio frequency is a system to read and write the data of the entity. Therefore, many companies are interested in RFID system to reduce supply chain management and inventory control cost. However, for providing secure service, RFID authentication technology secure against tracking by an adversary is researched first. In this paper, we proposed security level based RFID authentication protocol providing reduce computational and communicational workload in the back-end database. The proposed protocol is secure against reply attack, spoofing attack, traffic analysis, and location privacy, since the proposed protocol based on the security of the hash function.

A Study on the Development of a Web-based Broadcasting Information System (웹 기반 방송정보시스템 개발에 관한 연구)

  • Kim, Ji Hyuk;Yum, Chang Sun
    • Smart Media Journal
    • /
    • v.6 no.1
    • /
    • pp.54-60
    • /
    • 2017
  • Recently, broadcasting companies have been faced with changes in social environment, particularly, the emergence of new media, including the internet, cable TV and DMB, and in the political environment, such as convergence in broadcasting and communications media. To cope with these changes, broadcasting companies are showing increasing interest in building new broadcasting information systems. This study presents how to develop a web-based broadcasting information system for the small and medium-sized broadcasting company. For developing the system, the study describes system configuration, business function relationship diagrams and business flow diagrams, entity relationship diagrams, major programs, and graphic user interfaces. The newly developed web-based broadcasting information system is expected to increase business productivity to a significant extent through faster decision-making and business execution in and out of the company.