• Title/Summary/Keyword: Filtering types

Search Result 267, Processing Time 0.021 seconds

A personalized recommendation procedure with contextual information (상황 정보를 이용한 개인화 추천 방법 개발)

  • Moon, Hyun Sil;Choi, Il Young;Kim, Jae Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.15-28
    • /
    • 2015
  • As personal devices and pervasive technologies for interacting with networked objects continue to proliferate, there is an unprecedented world of scattered pieces of contextualized information available. However, the explosive growth and variety of information ironically lead users and service providers to make poor decision. In this situation, recommender systems may be a valuable alternative for dealing with these information overload. But they failed to utilize various types of contextual information. In this study, we suggest a methodology for context-aware recommender systems based on the concept of contextual boundary. First, as we suggest contextual boundary-based profiling which reflects contextual data with proper interpretation and structure, we attempt to solve complexity problem in context-aware recommender systems. Second, in neighbor formation with contextual information, our methodology can be expected to solve sparsity and cold-start problem in traditional recommender systems. Finally, we suggest a methodology about context support score-based recommendation generation. Consequently, our methodology can be first step for expanding application of researches on recommender systems. Moreover, as we suggest a flexible model with consideration of new technological development, it will show high performance regardless of their domains. Therefore, we expect that marketers or service providers can easily adopt according to their technical support.

Baseline Wander Removing Method Based on Morphological Filter for Efficient QRS Detection (효율적인 QRS 검출을 위한 형태 연산 기반의 기저선 잡음 제거 기법)

  • Cho, Ik-Sung;Kim, Joo-Man;Kim, Seon-Jong;Kwon, Hyeog-Soong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.166-174
    • /
    • 2013
  • QRS detection of ECG is the most popular and easy way to detect cardiac-disease. But it is difficult to analyze the ECG signal because of various noise types. The important problem in recording ECG signal is a baseline wandering, which is occurred by rhythm of respiration and muscle contraction attaching to an electrode. Particularly, in the healthcare system that must continuously monitor people's situation, it is necessary to process ECG signal in realtime. In other words, the design of algorithm that exactly detects QRS region using minimal computation by analyzing the person's physical condition and/or environment is needed. Therefore, baseline wander removing method based on morphological filter for efficient QRS detection method is presented in this paper. For this purpose, we detected QRS through the preprocessing method using morphological filter, adaptive threshold, and window. The signal distortion ratio of the proposed method is compared with other filtering method. Also, R wave detection is evaluated by using MIT-BIH arrhythmia database. Experiment result show that proposed method removes baseline wanders effectively without significant morphological distortion.

Design and Implementation of an E-mail Worm-Virus Filtering System on MS Windows (MS 윈도우즈에서 E-메일 웜-바이러스 차단 시스템의 설계 및 구현)

  • Choi Jong-Cheon;Chang Hye-Young;Cho Seong-Je
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.37-47
    • /
    • 2005
  • Recently, the malicious e-mail worm-viruses have been widely spreaded over the Internet. If the recipient opens the e-mail attachment or an e-mail itself that contains the worm-virus, the worm-virus can be activated and then cause a tremendous damage to the system by propagating itself to everyone on the mailing list in the user's e-mail package. In this paper, we have designed and implemented two methods blocking e-mail worm-viruses. In the fist method, each e-mail is transmitted only by sender activity such as the click of button on a mail client application. In the second one, we insert the two modules into the sender side, where the one module transforms a recipient's address depending on a predefined rule only in time of pushing button and the other converts the address reversely with the former module whenever an e-mail is sent. The lader method also supports a polymorphism model in order to cope with the new types of e-mail worm-virus attacks. The two methods are designed not to work for the e-mail viruses. There is no additional fraction on the receiver's side of the e-mail system. Experimental results show that the proposed methods can screen the e-mail worm-viruses efficiently with a low overhead.

Research on illegal copyright distributor tracking and profiling technology (불법저작물 유포자 행위분석 프로파일링 기술 연구)

  • Kim, Jin-gang;Hwang, Chan-woong;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.75-83
    • /
    • 2021
  • With the development of the IT industry and the increase of cultural activities, the demand for works increases, and they can be used easily and conveniently in an online environment. Accordingly, copyright infringement is seriously occurring due to the ease of copying and distribution of works. Some special types of Online Service Providers (OSP) use filtering-based technology to protect copyrights, but they can easily bypass them, and there are limits to blocking all illegal works, making it increasingly difficult to protect copyrights. Recently, most of the distributors of illegal works are a certain minority, and profits are obtained by distributing illegal works through many OSP and majority ID. In this paper, we propose a profiling technique for heavy uploader, which is a major analysis target based on illegal works. Creates a feature containing information on overall illegal works and identifies major heavy uploader. Among these, clustering technology is used to identify heavy uploader that are presumed to be the same person. In addition, heavy uploaders with high priority can be analyzed through illegal work Distributor tracking and behavior analysis. In the future, it is expected that copyright damage will be minimized by identifying and blocking heavy uploader that distribute a large amount of illegal works.

A Study to Hierarchical Visualization of Firewall Access Control Policies (방화벽 접근정책의 계층적 가시화 방법에 대한 연구)

  • Kim, Tae-yong;Kwon, Tae-woong;Lee, Jun;Lee, Youn-su;Song, Jung-suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1087-1101
    • /
    • 2020
  • Various security devices are used to protect internal networks and valuable information from rapidly evolving cyber attacks. Firewall, which is the most commonly used security device, tries to prevent malicious attacks based on a text-based filtering rule (i.e., access control policy), by allowing or blocking access to communicate between inside and outside environments. However, in order to protect a valuable internal network from large networks, it has no choice but to increase the number of access control policy. Moreover, the text-based policy requires time-consuming and labor cost to analyze various types of vulnerabilities in firewall. To solve these problems, this paper proposes a 3D-based hierarchical visualization method, for intuitive analysis and management of access control policy. In particular, by providing a drill-down user interface through hierarchical architecture, Can support the access policy analysis for not only comprehensive understanding of large-scale networks, but also sophisticated investigation of anomalies. Finally, we implement the proposed system architecture's to verify the practicality and validity of the hierarchical visualization methodology, and then attempt to identify the applicability of firewall data analysis in the real-world network environment.

Effects of Grade and Wearing Time of Industrial Filtering Facepiece Respirator on Workers: Subjective Discomfort Level (산업용 방진마스크 등급 및 착용시간이 작업자에게 미치는 영향 : 주관적 불편 수준)

  • Young-Mi, Kim;Won, Choi;Woo-Je, Lee;Doo-Young, Kim;Ki-Youn, Kim
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.32 no.4
    • /
    • pp.435-448
    • /
    • 2022
  • Objectives: As the time spent wearing masks has increased with spread of COVID-19, various research related to masks have been reported. However, there are still few experiments on the physiological response of the body to wearing industrial dust masks in South Korea. Considering the actual working hours at the work site, it is necessary to investigate the comfort of industrial dust masks. Therefore, this study aims to confirm the change in subjective discomfort level according to the wearing time for industrial dust masks in South Korea that have been certified for safety by KCS. Methods: This study evaluated subjective discomfort level over four hours. The experimental conditions were five types: not worn (control group), special grade, first grade, second grade (with valve), and second grade (without valve). The subjective discomfort levels were classified for breathing, warmth (body and face) and wetness (body and face). Subjects recorded their discomfort level on a checklist every one hour. Results: In special grade and second grade (without valve), the discomfort level in terms of breathing, warmth (face), and wetness (face) was significantly higher than that of the control group. However, the effects of all kinds of industrial dust masks on the discomfort level in the body were low. Conclusions: Since this study was conducted on subjects working in an office with a comfortable working environment, it is difficult to apply it to workers at actual industrial sites. However, it is considered meaningful as the first clinical study to evaluate the subjective level of discomfort over a long time for domestic industrial dust masks that have been certified for safety by KCS.

Skin Protection Effect of Grape Pruning Stem Extract on UVB-induced Connective Tissue Injury (포도전정가지 추출물이 UVB로 유도된 결합 조직 손상에 미치는 피부 보호 효과)

  • Kim, Joung-Hee;Kim, Keuk-Jun
    • Journal of Life Science
    • /
    • v.28 no.2
    • /
    • pp.141-147
    • /
    • 2018
  • This study aimed to analyze the contents of rutin, procyanidin B3, quercetin, and kaempferol, known to have antioxidant, anti-inflammatory, and anti-carcinogenic effects, among the polyphenol types contained in grape pruning stem extracts (GPSE). It utilized grape stems discarded after harvest to measure the effects of GPSE on skin moisture, inhibition of skin cell proliferation, and anti-inflammatory activity on the damaged skin of HR-1 mice induced with ultraviolet B (UVB), and to verify the applicability of GPSE as a material for functional food and functional cosmetics. The polyphenol was extracted from grape pruning stems with 80% EtOH, and then the extract was used while storing at $-20^{\circ}C$, after filtering, concentrating, and freeze-drying it. The content of an active ingredient of GPSE was analyzed using high performance liquid chromatography (HPLC). From 53 kg of the grape pruning stem specimen, 2.34 kg of the EtOH fraction extracts were extracted to achieve a 4.42% yield ratio. Analysis of the active ingredients showed 0.28 mg/g of procyanidin B3, 12.81 mg/g of rutin, 0.51 mg/g of quercetin, and 8.24 mg/g of kaempferol. After UVB irradiation on the dermis, to confirm the degree of inhibition of collagen synthesis, we examined the protein expression of MMP-9 using immunohistochemical staining. The results of this study confirm the existence of active polyphenol types, such as rutin, kaempferol, quercetin, and procyanidin B3, in GPSE. Moreover, the study found that GPSE has anti-collagenase effects and it decreases the effects of UV damage on skin barrier function. GPSE is a functional ingredient with a potential for skin protection effects, and it has high utilization potential as an ingredient for functional cosmetics.

Development of Preliminary Quality Assurance Software for $GafChromic^{(R)}$ EBT2 Film Dosimetry ($GafChromic^{(R)}$ EBT2 Film Dosimetry를 위한 품질 관리용 초기 프로그램 개발)

  • Park, Ji-Yeon;Lee, Jeong-Woo;Choi, Kyoung-Sik;Hong, Semie;Park, Byung-Moon;Bae, Yong-Ki;Jung, Won-Gyun;Suh, Tae-Suk
    • Progress in Medical Physics
    • /
    • v.21 no.1
    • /
    • pp.113-119
    • /
    • 2010
  • Software for GafChromic EBT2 film dosimetry was developed in this study. The software provides film calibration functions based on color channels, which are categorized depending on the colors red, green, blue, and gray. Evaluations of the correction effects for light scattering of a flat-bed scanner and thickness differences of the active layer are available. Dosimetric results from EBT2 films can be compared with those from the treatment planning system ECLIPSE or the two-dimensional ionization chamber array MatriXX. Dose verification using EBT2 films is implemented by carrying out the following procedures: file import, noise filtering, background correction and active layer correction, dose calculation, and evaluation. The relative and absolute background corrections are selectively applied. The calibration results and fitting equation for the sensitometric curve are exported to files. After two different types of dose matrixes are aligned through the interpolation of spatial pixel spacing, interactive translation, and rotation, profiles and isodose curves are compared. In addition, the gamma index and gamma histogram are analyzed according to the determined criteria of distance-to-agreement and dose difference. The performance evaluations were achieved by dose verification in the $60^{\circ}$-enhanced dynamic wedged field and intensity-modulated (IM) beams for prostate cancer. All pass ratios for the two types of tests showed more than 99% in the evaluation, and a gamma histogram with 3 mm and 3% criteria was used. The software was developed for use in routine periodic quality assurance and complex IM beam verification. It can also be used as a dedicated radiochromic film software tool for analyzing dose distribution.

Database Security System supporting Access Control for Various Sizes of Data Groups (다양한 크기의 데이터 그룹에 대한 접근 제어를 지원하는 데이터베이스 보안 시스템)

  • Jeong, Min-A;Kim, Jung-Ja;Won, Yong-Gwan;Bae, Suk-Chan
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1149-1154
    • /
    • 2003
  • Due to various requirements for the user access control to large databases in the hospitals and the banks, database security has been emphasized. There are many security models for database systems using wide variety of policy-based access control methods. However, they are not functionally enough to meet the requirements for the complicated and various types of access control. In this paper, we propose a database security system that can individually control user access to data groups of various sites and is suitable for the situation where the user's access privilege to arbitrary data is changed frequently. Data group(s) in different sixes d is defined by the table name(s), attribute(s) and/or record key(s), and the access privilege is defined by security levels, roles and polices. The proposed system operates in two phases. The first phase is composed of a modified MAC (Mandatory Access Control) model and RBAC (Role-Based Access Control) model. A user can access any data that has lower or equal security levels, and that is accessible by the roles to which the user is assigned. All types of access mode are controlled in this phase. In the second phase, a modified DAC(Discretionary Access Control) model is applied to re-control the 'read' mode by filtering out the non-accessible data from the result obtained at the first phase. For this purpose, we also defined the user group s that can be characterized by security levels, roles or any partition of users. The policies represented in the form of Block(s, d, r) were also defined and used to control access to any data or data group(s) that is not permitted in 'read ' mode. With this proposed security system, more complicated 'read' access to various data sizes for individual users can be flexibly controlled, while other access mode can be controlled as usual. An implementation example for a database system that manages specimen and clinical information is presented.

A Study on Efficiency of Water Purification of Korean Village Bangjuk[dike] as a Means of Ecological Watershed Management (생태적 유역관리 도구로써 마을방죽의 수질정화 효율성 고찰)

  • An, Byung-Chul
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.30 no.2
    • /
    • pp.90-100
    • /
    • 2012
  • This study centering on 10 village - Bangjuks analyzed multifunctionality value of village Bangjuks which have been main water treatment system in Korean traditional villages. On the basis of understanding the structure and character of components such as the well, common spring, village waterway and others which making water-flow and consisting of aquatic system in Korean traditional village Bangjuk, the conclusion as the instrumental device of social and ecological role and ecological watershed management, securing the ecosystem soundness of the damaged or deteriated aquatic ecosystem due to the industrialization and urbanization is as below; 1. The traditional village Bangjuk was environmentally friendly hydraulic system which gathers waterways of village into a point including sewage water, retains and flows out to village through agricultural waterway. Through this Bangjuk, they have managed sewage and rainfall runoff flowed out village efficiently. It is not only a detention system of water but a kind of eco-friendly system that flow out water into the rivers after reusing and filtering it. 2. Around five traditional villages and five villages after modernization, this study classified the types of village Bangjuk as three types considering geographic location, size, etc; marsh type of low swamp, high water -low rice field type of natural flow stucture, low water - high rice field type requiring artificial irrigation facility. All the five traditional villages were turned out to be marsh type of low swamp. Geoji, Sanjeri, Ma-am, Yangchon of the agricultural villages were high water-low rice filed type, and Sangchoenri village was classified low water-high rice field type. 3. This study checked up the function of water purification of village Bangjuk. In Wonteo and Geji villages affected by discharge of village sewer and domestic sewage, the efficiency of ammonia nitrogen($NH_3-N$) and total phosphorus(T-P) was 56~95%, which was high. In Sangcheonri and Sanjeri villages strongly affected by stall and farmland, the efficiency of suspended solids(SS) was 70~85%, and that of total nitrogen(T-N) and total phosphorus(T-P) was 5.3~65%. 4. A water purification system can be found out in the system of village Bangjuk that filter out village sewage and rainfall runoff flowed through the settle and filter of pollution source and denitrification of plants. Through this system of village Bangjuk, it must be used as the basic facilities for the ecological watershed management. The sewage management system of village Bangjuk as a eco-filter must be used and studied as an eco-friendly facility for the ecological watershed management around the subwatershed and catchment.