• Title/Summary/Keyword: ID management system

Search Result 197, Processing Time 0.026 seconds

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

A Generalized Adaptive Deep Latent Factor Recommendation Model (일반화 적응 심층 잠재요인 추천모형)

  • Kim, Jeongha;Lee, Jipyeong;Jang, Seonghyun;Cho, Yoonho
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.1
    • /
    • pp.249-263
    • /
    • 2023
  • Collaborative Filtering, a representative recommendation system methodology, consists of two approaches: neighbor methods and latent factor models. Among these, the latent factor model using matrix factorization decomposes the user-item interaction matrix into two lower-dimensional rectangular matrices, predicting the item's rating through the product of these matrices. Due to the factor vectors inferred from rating patterns capturing user and item characteristics, this method is superior in scalability, accuracy, and flexibility compared to neighbor-based methods. However, it has a fundamental drawback: the need to reflect the diversity of preferences of different individuals for items with no ratings. This limitation leads to repetitive and inaccurate recommendations. The Adaptive Deep Latent Factor Model (ADLFM) was developed to address this issue. This model adaptively learns the preferences for each item by using the item description, which provides a detailed summary and explanation of the item. ADLFM takes in item description as input, calculates latent vectors of the user and item, and presents a method that can reflect personal diversity using an attention score. However, due to the requirement of a dataset that includes item descriptions, the domain that can apply ADLFM is limited, resulting in generalization limitations. This study proposes a Generalized Adaptive Deep Latent Factor Recommendation Model, G-ADLFRM, to improve the limitations of ADLFM. Firstly, we use item ID, commonly used in recommendation systems, as input instead of the item description. Additionally, we apply improved deep learning model structures such as Self-Attention, Multi-head Attention, and Multi-Conv1D. We conducted experiments on various datasets with input and model structure changes. The results showed that when only the input was changed, MAE increased slightly compared to ADLFM due to accompanying information loss, resulting in decreased recommendation performance. However, the average learning speed per epoch significantly improved as the amount of information to be processed decreased. When both the input and the model structure were changed, the best-performing Multi-Conv1d structure showed similar performance to ADLFM, sufficiently counteracting the information loss caused by the input change. We conclude that G-ADLFRM is a new, lightweight, and generalizable model that maintains the performance of the existing ADLFM while enabling fast learning and inference.

A Dynamic Management Method for FOAF Using RSS and OLAP cube (RSS와 OLAP 큐브를 이용한 FOAF의 동적 관리 기법)

  • Sohn, Jong-Soo;Chung, In-Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.39-60
    • /
    • 2011
  • Since the introduction of web 2.0 technology, social network service has been recognized as the foundation of an important future information technology. The advent of web 2.0 has led to the change of content creators. In the existing web, content creators are service providers, whereas they have changed into service users in the recent web. Users share experiences with other users improving contents quality, thereby it has increased the importance of social network. As a result, diverse forms of social network service have been emerged from relations and experiences of users. Social network is a network to construct and express social relations among people who share interests and activities. Today's social network service has not merely confined itself to showing user interactions, but it has also developed into a level in which content generation and evaluation are interacting with each other. As the volume of contents generated from social network service and the number of connections between users have drastically increased, the social network extraction method becomes more complicated. Consequently the following problems for the social network extraction arise. First problem lies in insufficiency of representational power of object in the social network. Second problem is incapability of expressional power in the diverse connections among users. Third problem is the difficulty of creating dynamic change in the social network due to change in user interests. And lastly, lack of method capable of integrating and processing data efficiently in the heterogeneous distributed computing environment. The first and last problems can be solved by using FOAF, a tool for describing ontology-based user profiles for construction of social network. However, solving second and third problems require a novel technology to reflect dynamic change of user interests and relations. In this paper, we propose a novel method to overcome the above problems of existing social network extraction method by applying FOAF (a tool for describing user profiles) and RSS (a literary web work publishing mechanism) to OLAP system in order to dynamically innovate and manage FOAF. We employed data interoperability which is an important characteristic of FOAF in this paper. Next we used RSS to reflect such changes as time flow and user interests. RSS, a tool for literary web work, provides standard vocabulary for distribution at web sites and contents in the form of RDF/XML. In this paper, we collect personal information and relations of users by utilizing FOAF. We also collect user contents by utilizing RSS. Finally, collected data is inserted into the database by star schema. The system we proposed in this paper generates OLAP cube using data in the database. 'Dynamic FOAF Management Algorithm' processes generated OLAP cube. Dynamic FOAF Management Algorithm consists of two functions: one is find_id_interest() and the other is find_relation (). Find_id_interest() is used to extract user interests during the input period, and find-relation() extracts users matching user interests. Finally, the proposed system reconstructs FOAF by reflecting extracted relationships and interests of users. For the justification of the suggested idea, we showed the implemented result together with its analysis. We used C# language and MS-SQL database, and input FOAF and RSS as data collected from livejournal.com. The implemented result shows that foaf : interest of users has reached an average of 19 percent increase for four weeks. In proportion to the increased foaf : interest change, the number of foaf : knows of users has grown an average of 9 percent for four weeks. As we use FOAF and RSS as basic data which have a wide support in web 2.0 and social network service, we have a definite advantage in utilizing user data distributed in the diverse web sites and services regardless of language and types of computer. By using suggested method in this paper, we can provide better services coping with the rapid change of user interests with the automatic application of FOAF.

A refinement of customer satisfactory factors in multimedia contentware evaluation process - focused on company website design - (멀티미디어 컨텐트웨어 상품에 대한 소비자 감성 평가 요소(문화성 인자)추출에 관한 연구 - 기업 웹사이트를 중심으로 -)

  • 이종호;김명석;이현이;김태균
    • Archives of design research
    • /
    • v.11 no.1
    • /
    • pp.291-302
    • /
    • 1998
  • This paper covers the development process of multimedia evaluation system, especially focused on customer satisfactory factors while customers navigating net-based Interactive multimedia system. Customers usually experience new level of interaction cased by newly developed web-based technology In ordinary multimedia system. However, if it gives customers satisfactory experience is a matter of question. To find out the relationship between customer satisfaction and interactivity factors exposed by multimedia system, a model has been developed which describes the structure of web-based multimedia system and its relation to customer satisfactory factors. Five different experiments, including 'semantic differential', 'focus group interview', and 'expert review', has been conducted and four customer satisfactory factors were identified. Those are 'customery value', 'structural perfectness', 'visual perfectness', and 'contemporaneity'. With these factors and newly delveoped evaluation system, 7 different web-site has been evaluated and analyzed at the end of this report.

  • PDF

A Study on U-Drawing Information System Based on Risk Assessment (위험성 평가 기반의 U-도면정보 시스템에 관한 연구)

  • Ko, Jae-Wook;Yoo, Jin-Hwan;Lee, Heon-Seok
    • Journal of the Korean Institute of Gas
    • /
    • v.11 no.2 s.35
    • /
    • pp.71-77
    • /
    • 2007
  • This research proposes the U-drawing information system (U-DIS) based on risk assessment. One of the most outstanding features of U-DIS is to perform the Quantitative Risk Assessment directly on the screen utilizing the Process Information. U-DIS revolutionizes the existing way to do a risk assessment and helps finding information more efficiently and simply. It is designed to open all CAD drawing files on the web-based environment without having the CAD S/W installed on the PC. The U terminal platform in U-DIS supports IPv6 and wireless broadband network and U-DIS can be accessible through a sensor or personal authorization. This results in providing a systematic safety enhancement tool considering not only the operation of the process but also its risk level in the equipment industry. Additionally to aid the decision making process it offers comprehensive and thorough information based on engineering technical theory.

  • PDF

Development of Acquisition System for Biological Signals using Raspberry Pi (라즈베리 파이를 이용한 생체신호 수집시스템 개발)

  • Yoo, Seunghoon;Kim, Sitae;Kim, Dongsoo;Lee, Younggun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1935-1941
    • /
    • 2021
  • In order to develop an algorithm using deep learning, which has been recently applied to various fields, it is necessary to have rich, high-quality learning data. In this paper, we propose an acquisition system for biological signals that simultaneously collects bio-signal data such as optical videos, thermal videos, and voices, which are mainly used in developing deep learning algorithms and useful in derivation of information, and transmit them to the server. To increase the portability of the collector, it was made based on Raspberry Pi, and the collected data is transmitted to the server through the wireless Internet. To enable simultaneous data collection from multiple collectors, an ID for login was assigned to each subject, and this was reflected in the database to facilitate data management. By presenting an example of biological data collection for fatigue measurement, we prove the application of the proposed acquisition system.

Development and Application of the Slope Management Program in Urban Area (대도시 사면관리프로그램 개발 및 적용)

  • Kim, Kyeong-Su;Chae, Byung-Gon;Cho, Yong-Chan;Lee, Choon-Oh;Song, Young-Suk
    • The Journal of Engineering Geology
    • /
    • v.17 no.1 s.50
    • /
    • pp.15-25
    • /
    • 2007
  • In general, the life and asset casualties that occur due to landslide or slope failure in urban areas are larger than that in rural areas. In order to reduce the casualties, a slope management program is necessary to categorize slopes based on properties and to manage them systematically. The slope management system is the establishment of the data base for the geological and geotechnical factor according to slope stability, and the utilization of the data base to manage slopes. The suitable system must develop to slopes in urban area through the survey, analysis and evaluation process. Based on the above necessity, the slope management program which is applicable to slope management in an urban area has been developed at Hwangryung Mt. in Busan as a target area. The developed slope management program has various functions such as slope ID number of each slope or sub-region of a mountain, making a slope data sheet, analysis and grouping of slope stability, and establishment of a data base. The slope management program is constructed by use of GIS, and the survey, test and analysis data according to all slopes can be input and edited into the program. The program can also be utilized practically by end users due to the convenient input, edition printing, management and operation of slope data. Therefore, the slope management system has been established on the application of the developed program in Busan which is located in slope area. As the system is widely applied to other cities, the slope in urban area can be managed systematically and the slope hazards can be minimized.

A multi-user selective undo/redo approach for collaborative CAD systems

  • Cheng, Yuan;He, Fazhi;Xu, Bin;Han, Soonhung;Cai, Xiantao;Chen, Yilin
    • Journal of Computational Design and Engineering
    • /
    • v.1 no.2
    • /
    • pp.103-115
    • /
    • 2014
  • The engineering design process is a creative process, and the designers must repeatedly apply Undo/Redo operations to modify CAD models to explore new solutions. Undo/Redo has become one of most important functions in interactive graphics and CAD systems. Undo/Redo in a collaborative CAD system is also very helpful for collaborative awareness among a group of cooperative designers to eliminate misunderstanding and to recover from design error. However, Undo/Redo in a collaborative CAD system is much more complicated. This is because a single erroneous operation is propagated to other remote sites, and operations are interleaved at different sites. This paper presents a multi-user selective Undo/Redo approach in full distributed collaborative CAD systems. We use site ID and State Vectors to locate the Undo/Redo target at each site. By analyzing the composition of the complex CAD model, a tree-like structure called Feature Combination Hierarchy is presented to describe the decomposition of a CAD model. Based on this structure, the dependency relationship among features is clarified. B-Rep re-evaluation is simplified with the assistance of the Feature Combination Hierarchy. It can be proven that the proposed Undo/Redo approach satisfies the intention preservation and consistency maintenance correctness criteria for collaborative systems.

A Design and Implementation of In/Out Bound Call Flow Module for SOHO CTI (SOHO CTI용 인/아웃바운드 콜 플로우 모듈 설계 및 구현)

  • Park Chan Il;Moon Seung-Jin
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.71-84
    • /
    • 2005
  • Recently, the expert call center solution has become the center of interest, since finance and tele-marketing system, which is focused on a communication industry, have been increasing, Specially, the call center market is growing up with a supporting Caller-ID for a cellular phone in Korea, In the present, although large size companies are developing expensive solutions and instruments to service only for the big companies, there little solutions for SOHO markets, Therefore, in this paper we have shown a design and an implementation of a CTI system which is capable of in/outbound call processing by using CTI, and providing stable services by linking the customer's DB. And these functionalities have become possible by integrating functions of PBX and the computer control of the PBX. First, we have constructed call flows and analyzed packets for the standard communication through the PBX in call. Then, we have designed and implemented a middleware which linked a call between a client and a customer. Finally, we have constructed a database module for applying the CRM technology to the management of customer's contents.

  • PDF

On the HIDE based Group Signature for Secure Personal Healthcare Record Service (안전한 개인의료정보 서비스를 위한 HIDE 기반의 그룹서명)

  • Cho, Young-bok;Woo, Sung-hee;Lee, Sang-ho;Park, Jong-bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2481-2490
    • /
    • 2015
  • The issue of PHR is maintained on the server will be in the hospital. PHR information stored on the server, such as a patient's illness and treatment is very sensitive information. Therefore, patients should be guaranteed the protection of privacy. In addition, the PHR should be allowed to group access of it's approach. Therefore, in this paper the proposed group signature using hierarchical identity-based encryption schemes into can guarantee the PHR data privacy. The session key generated by group signature, it is use a tiered approach. The generated session keys safe PHR data transmission is possible. The proposed method is average 80% than the PKI encryption and ID-based encryption rather than average 50% the algorithm processing is more efficient