• Title/Summary/Keyword: ID mapping

Search Result 43, Processing Time 0.027 seconds

Management Plan of Urban Object IDentification through Status-Analysis of Existing Object Management Code (기존 공간정보 관리코드 현황분석을 통한 도시공간정보 객체식별자 관리 방향)

  • Jang, Yong-Gu;Lee, Woo-Sik;Kim, Hyung-Su
    • Spatial Information Research
    • /
    • v.16 no.1
    • /
    • pp.51-64
    • /
    • 2008
  • Recently, development and research of u-City established the ubiquitous environment which can be anytime, anywhere computing or network, has been much highlighted. Thus, current urban facilities should be managed by ubiquitous concept, and monitored location and status information in a real-time manner, and controled if necessary. In order to be establish in the purpose of management, indirect mapping through id-tag is better than facility management directly. For instance, RFID, UCODE, UFID. In this paper, we propose that represent facility object through UOID(Unique Object IDentification). UOID comprises three parts; 1) sensing object, 2) facility object, 3) cell object consists of facilities. and Life cycle management system in UOID, and network system connected with internet is proposed. We wish that proposed UOID and network system mange u-City facilities effectively, and also provide ubiquitous service to the citizen, one of the integrate service of u-City platform.

  • PDF

A study on Password Input Method to Protect Keyboard hooking (Keyboard hooking 방지를 위한 패스워드 입력 방법 연구)

  • Kang, Seung-Gu;Kwak, Jin-Suk;Lee, Young-Sil;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.241-244
    • /
    • 2011
  • Recently, Due to development of Internet techniques, user suddenly increased that Used of Web services and with out constraints of place and time has been provided. typically, Web services used ID/Password authentication. User confirmed personal data Stored on Web servers after user authorized. web service provider is to provide variety security techniques for the protection personal information. However, recently accident has happened is the malicious attackers may capture user information such as users entered personal information through new keyboard hooking. In this paper, we propose a keyboard hooking protected password input method using CAPTCHA. The proposed password input method is based on entering the password using mouse click or touch pad on the CAPTCHA image. The mapping of CAPTCHA image pixels is random.

  • PDF

Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks

  • N. Nithiyanandam;C. Mahesh;S.P. Raja;S. Jeyapriyanga;T. Selva Banu Priya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1706-1727
    • /
    • 2023
  • Under Water Sensor Networks (UWSN) has gained attraction among various communities for its potential applications like acoustic monitoring, 3D mapping, tsunami detection, oil spill monitoring, and target tracking. Unlike terrestrial sensor networks, it performs an acoustic mode of communication to carry out collaborative tasks. Typically, surface sink nodes are deployed for aggregating acoustic phenomena collected from the underwater sensors through the multi-hop path. In this context, UWSN is constrained by factors such as lower bandwidth, high propagation delay, and limited battery power. Also, the vulnerabilities to compromise the aquatic environment are in growing numbers. The paper proposes an Energy-Efficient standalone Intrusion Detection System (EEIDS) to entail the acoustic environment against malicious attacks and improve the network lifetime. In EEIDS, attributes such as node ID, residual energy, and depth value are verified for forwarding the data packets in a secured path and stabilizing the nodes' energy levels. Initially, for each node, three agents are modeled to perform the assigned responsibilities. For instance, ID agent verifies the node's authentication of the node, EN agent checks for the residual energy of the node, and D agent substantiates the depth value of each node. Next, the classification of normal and malevolent nodes is performed by determining the score for each node. Furthermore, the proposed system utilizes the sheep-flock heredity algorithm to validate the input attributes using the optimized probability values stored in the training dataset. This assists in finding out the best-fit motes in the UWSN. Significantly, the proposed system detects and isolates the malicious nodes with tampered credentials and nodes with lower residual energy in minimal time. The parameters such as the time taken for malicious node detection, network lifetime, energy consumption, and delivery ratio are investigated using simulation tools. Comparison results show that the proposed EEIDS outperforms the existing acoustic security systems.

Approximate Life Cycle Assessment of Classified Products using Artificial Neural Network and Statistical Analysis in Conceptual Product Design (개념 설계 단계에서 인공 신경망과 통계적 분석을 이용한 제품군의 근사적 전과정 평가)

  • 박지형;서광규
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.20 no.3
    • /
    • pp.221-229
    • /
    • 2003
  • In the early phases of the product life cycle, Life Cycle Assessment (LCA) is recently used to support the decision-making fer the conceptual product design and the best alternative can be selected based on its estimated LCA and its benefits. Both the lack of detailed information and time for a full LCA fur a various range of design concepts need the new approach fer the environmental analysis. This paper suggests a novel approximate LCA methodology for the conceptual design stage by grouping products according to their environmental characteristics and by mapping product attributes into impact driver index. The relationship is statistically verified by exploring the correlation between total impact indicator and energy impact category. Then a neural network approach is developed to predict an approximate LCA of grouping products in conceptual design. Trained learning algorithms for the known characteristics of existing products will quickly give the result of LCA for new design products. The training is generalized by using product attributes for an ID in a group as well as another product attributes for another IDs in other groups. The neural network model with back propagation algorithm is used and the results are compared with those of multiple regression analysis. The proposed approach does not replace the full LCA but it would give some useful guidelines fer the design of environmentally conscious products in conceptual design phase.

Brain MRI Template-Driven Medical Images Mapping Method Based on Semantic Features for Ischemic Stroke (허혈성 뇌졸중을 위한 뇌 자기공명영상의 의미적 특징 기반 템플릿 중심 의료 영상 매핑 기법)

  • Park, Ye-Seul;Lee, Meeyeon;Lee, Jung-Won
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.2
    • /
    • pp.69-78
    • /
    • 2016
  • Ischemic stroke is a disease that the brain tissues cannot function by reducing blood flow due to thrombosis or embolisms. Due to the nature of the disease, it is most important to identify the status of cerebral vessel and the medical images are necessarily used for its diagnosis. Among many indicators, brain MRI is most widely utilized because experts can effectively obtain the semantic information such as cerebral anatomy aiding the diagnosis with it. However, in case of emergency diseases like ischemic stroke, even though a intelligent system is required for supporting the prompt diagnosis and treatment, the current systems have some difficulties to provide the information of medical images intuitively. In other words, as the current systems have managed the medical images based on the basic meta-data such as image name, ID and so on, they cannot consider semantic information inherent in medical images. Therefore, in this paper, to provide core information like cerebral anatomy contained in brain MRI, we suggest a template-driven medical images mapping method. The key idea of the method is defining the mapping characteristics between anatomic feature and representative images by using template images that can be representative of the whole brain MRI image set and revealing the semantic relations that only medical experts can check between images. With our method, it will be possible to manage the medical images based on semantic.

Automatic gasometer reading system using selective optical character recognition (관심 문자열 인식 기술을 이용한 가스계량기 자동 검침 시스템)

  • Lee, Kyohyuk;Kim, Taeyeon;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.1-25
    • /
    • 2020
  • In this paper, we suggest an application system architecture which provides accurate, fast and efficient automatic gasometer reading function. The system captures gasometer image using mobile device camera, transmits the image to a cloud server on top of private LTE network, and analyzes the image to extract character information of device ID and gas usage amount by selective optical character recognition based on deep learning technology. In general, there are many types of character in an image and optical character recognition technology extracts all character information in an image. But some applications need to ignore non-of-interest types of character and only have to focus on some specific types of characters. For an example of the application, automatic gasometer reading system only need to extract device ID and gas usage amount character information from gasometer images to send bill to users. Non-of-interest character strings, such as device type, manufacturer, manufacturing date, specification and etc., are not valuable information to the application. Thus, the application have to analyze point of interest region and specific types of characters to extract valuable information only. We adopted CNN (Convolutional Neural Network) based object detection and CRNN (Convolutional Recurrent Neural Network) technology for selective optical character recognition which only analyze point of interest region for selective character information extraction. We build up 3 neural networks for the application system. The first is a convolutional neural network which detects point of interest region of gas usage amount and device ID information character strings, the second is another convolutional neural network which transforms spatial information of point of interest region to spatial sequential feature vectors, and the third is bi-directional long short term memory network which converts spatial sequential information to character strings using time-series analysis mapping from feature vectors to character strings. In this research, point of interest character strings are device ID and gas usage amount. Device ID consists of 12 arabic character strings and gas usage amount consists of 4 ~ 5 arabic character strings. All system components are implemented in Amazon Web Service Cloud with Intel Zeon E5-2686 v4 CPU and NVidia TESLA V100 GPU. The system architecture adopts master-lave processing structure for efficient and fast parallel processing coping with about 700,000 requests per day. Mobile device captures gasometer image and transmits to master process in AWS cloud. Master process runs on Intel Zeon CPU and pushes reading request from mobile device to an input queue with FIFO (First In First Out) structure. Slave process consists of 3 types of deep neural networks which conduct character recognition process and runs on NVidia GPU module. Slave process is always polling the input queue to get recognition request. If there are some requests from master process in the input queue, slave process converts the image in the input queue to device ID character string, gas usage amount character string and position information of the strings, returns the information to output queue, and switch to idle mode to poll the input queue. Master process gets final information form the output queue and delivers the information to the mobile device. We used total 27,120 gasometer images for training, validation and testing of 3 types of deep neural network. 22,985 images were used for training and validation, 4,135 images were used for testing. We randomly splitted 22,985 images with 8:2 ratio for training and validation respectively for each training epoch. 4,135 test image were categorized into 5 types (Normal, noise, reflex, scale and slant). Normal data is clean image data, noise means image with noise signal, relfex means image with light reflection in gasometer region, scale means images with small object size due to long-distance capturing and slant means images which is not horizontally flat. Final character string recognition accuracies for device ID and gas usage amount of normal data are 0.960 and 0.864 respectively.

3D-QSARs analyses for Tyrosinase Inhibitory Activity of 2-Phenyl-1,4-benzopyrone (Flavones) Analogues and Molecular Docking (2-Phenyl-1,4-benzopyrone 유도체 (Flavones)의 Tyrosinase 저해활성에 관한 3D-QSARs 분석과 분자도킹)

  • Park, Joon-Ho;Sung, Nack-Do
    • Journal of Applied Biological Chemistry
    • /
    • v.53 no.4
    • /
    • pp.225-231
    • /
    • 2010
  • To understand the inhibitory activity with changing hydroxyl substituents ($R_l-R_9$) of polyhydroxy substituted 2-phenyl-l,4-benzopyrone analogues (1-25) against tyrosinase (PDB ID: oxy-form; 1WX2), molecular docking and the three dimensional quantitative structure-activity relationships (3D-QSARs: Comparative molecular field analysis (CoMFA) & Comparative molecular similarity indices analysis (CoMSIA)) were studied quantitatively. The statistically best models were CoMFA 1 and CoMSIA 1 model from the results. The optimized CoMSIA 1 model with the sensitivity of the perturbation and the prediction produced ($dq^2'/dr_{yy'}^2$=1.009 & $q^2$=0.51l) by a progressive scrambling analysis were not dependent on chance correlation. The inhibitory activities with optimized CoMSIA 1 model were dependent upon electrostatic factor (51.4%) of substrate molecules. Contour mapping the 3D-QSAR models to the active site of tyrosinase provides new insight into the interaction between tyrosinase as receptor and 2-phenyl-l,4-benzopyrone analogues as inhibitor. Therefore, the results will he able to apply to the optimization of a new potent tyrosinase inhibitors.

HTTP Request - SQL Query Mapping Scheme for Malicious SQL Query Detection in Multitier Web Applications (Multitier 웹 어플리케이션 환경에서 악의적인 SQL Query 탐지를 위한 HTTP Request - SQL Query 매핑 기법)

  • Seo, Yeongung;Park, Seungyoung
    • Journal of KIISE
    • /
    • v.44 no.1
    • /
    • pp.1-12
    • /
    • 2017
  • The continuously growing internet service requirements has resulted in a multitier system structure consisting of web server and database (DB) server. In this multitier structure, the existing intrusion detection system (IDS) detects known attacks by matching misused traffic patterns or signatures. However, malicious change to the contents at DB server through hypertext transfer protocol (HTTP) requests at the DB server cannot be detected by the IDS at the DB server's end, since the DB server processes structured query language (SQL) without knowing the associated HTTP, while the web server cannot identify the response associated with the attacker's SQL query. To detect these types of attacks, the malicious user is tracked using knowledge on interaction between HTTP request and SQL query. However, this is a practical challenge because system's source code analysis and its application logic needs to be understood completely. In this study, we proposed a scheme to find the HTTP request associated with a given SQL query using only system log files. We first generated an HTTP request-SQL query map from system log files alone. Subsequently, the HTTP request associated with a given SQL query was identified among a set of HTTP requests using this map. Computer simulations indicated that the proposed scheme finds the HTTP request associated with a given SQL query with 94% accuracy.

Comparative Reverse Screening Approach to Identify Potential Anti-neoplastic Targets of Saffron Functional Components and Binding Mode

  • Bhattacharjee, Biplab;Vijayasarathy, Sandhya;Karunakar, Prashantha;Chatterjee, Jhinuk
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.11
    • /
    • pp.5605-5611
    • /
    • 2012
  • Background: In the last two decades, pioneering research on anti-tumour activity of saffron has shed light on the role of crocetin, picrocrocin and safranal, as broad spectrum anti-neoplastic agents. However, the exact mechanisms have yet to be elucidated. Identification and characterization of the targets of bioactive constituents will play an imperative role in demystifying the complex anti-neoplastic machinery. Methods: In the quest of potential target identification, a dual virtual screening approach utilizing two inverse screening systems, one predicated on idTarget and the other on PharmMapper was here employed. A set of target proteins associated with multiple forms of cancer and ranked by Fit Score and Binding energy were obtained from the two independent inverse screening platforms. The validity of the results was checked by meticulously analyzing the post-docking binding pose of the picrocrocin with Hsp90 alpha in AutoDock. Results: The docking pose reveals that electrostatic and hydrogen bonds play the key role in inter-molecular interactions in ligand binding. Picrocrocin binds to the Hsp90 alpha with a definite orientation appropriate for nucleophilic attacks by several electrical residues inside the Hsp90-alpha ATPase catalytic site. Conclusion: This study reveals functional information about the anti-tumor mechanism of saffron bioactive constituents. Also, a tractable set of anti-neoplastic targets for saffron has been generated in this study which can be further authenticated by in vivo and in vitro experiments.

Implementation of C++ ID Compiler (C++ IDL 컴파일러 구현)

  • Park, Chan-Mo;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.5
    • /
    • pp.970-976
    • /
    • 2001
  • In this paper, OUIG IDL CFE, provided by Sunsoft, is used to take a IDL definitions as inputs and parse those. OmniORB3 is introduced to support functionality of the ORB. Suns CFE produce AST after parsing inputs. Actually, the node of AST Is instances of classes which are derived from CFE classes. As the compiler back end visit the node of the AST using iterator class, UTL_ScopeActiveIterator, it dumps codes of output. During processing, two files are generated. Routines of generating code are invoked by BE_produce.cc and codes are produced while visiting root of AST, idl_global->root(). The dump* functions which dump codes is called according to the type of node. In this paper, Mapping C++ of IDL definition is experimented and results In the same as that of omniidl which is provided by omniORB3. The code of results behavior correctly on omniORB3. In the future, we are interested in optimizing the performance of marshalling code via IDL compiler.

  • PDF