• Title/Summary/Keyword: ID-Based System

Search Result 488, Processing Time 0.028 seconds

Knowledge-Based methodologies for the Credit Rating : Application and Comparison (신용카드 고객의 신용 예측을 위한 지식기반 방법들: 적용 및 비교 연구)

  • 주석진;김재경;성태경;김중한
    • Journal of Intelligence and Information Systems
    • /
    • v.5 no.1
    • /
    • pp.49-64
    • /
    • 1999
  • 본 연구는 백화점 고객이 신용 카드 신청 요구 시에 작성되는 가입 정보 및 사용되고 있는 고객의 거래 정보는 카드 사용 패턴으로 신용도를 예측하는 여러 방법론을 제시하고 성능을 비교하였다. 가입 정보를 분석하기 위해 역전파 신경망(Back-Propagation Neural Network, BPNN), 사례기반추론(Case-Based reasoning)을, 거래 정보를 분석하기 위해 역전파 신경망과 더불어 시간지연 신경망(Time-Delayed Neural Network, TDNN)을 각각 사용하여 그 결과를 비교하였다. 또한 전체시스템의 적중률을 높이기 위햐여, ID3와 신경망을 이용한 Meta-Leaning 방법을 제시하였으며, Meta-Learning 방법과 다른 방법들을 비교, 분석을 하였다. 본 연구에서는 모형 수립과 검증을 위하여 T백화점의 실제 신용 카드 가입 고객 데이터를 이용하여 실험하였다. 데이터의 성격에 따라 각 모델의 예측력에는 차이가 나타났으나, 신경망 모형의 예측력이 우수하였으며, 시간적 특성을 고려하는 시간지연 신경회로망 모형의 예측력은 더욱 우수하게 나타났다. 또한 Meta-Learning 모형을 사용하면 예측력이 더 높아진다는 것을 확인할 수 있었다.

  • PDF

Research on key management for supervisory control and data acquisition system (원격 감시 제어시스템에서 키 관리 방안 연구)

  • Lee, Keonjik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.4
    • /
    • pp.29-42
    • /
    • 2020
  • SCADA (Supervisory Control and Data Acquisition) systems for remote monitoring, data acquisition and control are applied to major industrial infrastructures including power, water and railroad. Recently, there are many researches on key management scheme for secure communication due to change to the open network environment. These systems are located at far distances and are connected to the main control center through various types of communication methods. Due to the nature of these systems, they are becoming the significant targets of cyber attack. We propose an efficient key management scheme which is established on ID-based cryptosystem without an expensive computation on MTU (Master Terminal Unit), Sub-MTU, and RTU (Remote Terminal Unit). The proposed method is secure and effective in key management among multiple legitimate devices.

Location for a Car Crash and The Service System (차량 충돌 사고에 대한 위치 확인 및 서비스 시스템)

  • Moon, Seung-Jin;Lee, Yong-Joo
    • The KIPS Transactions:PartA
    • /
    • v.16A no.5
    • /
    • pp.381-388
    • /
    • 2009
  • The spread of wireless Internet technology development and applications with location information in the form of location-based services are becoming more diverse. In particular, where you recognize the location of objects such as people and things and to provide valuable services based on the ubiquitous and location-based services are emerging as an important service. The collision between the vehicle position measurement in this thesis and offers related service system. Used in the proposed system, the GPS PACKET with information about the location and time of collision for the vehicle crash, the vehicle consists of a NodeID. Cause a conflict between these data at the vehicle, the vehicle through the gateway from the server to decide whether to go on to determine that an emergency situation, Emergency Center, the location information and giving information about whether the conflict is measured. Also, for such an emergency, such as a family on the outside of the wireless terminal related to Wireless (PDA, Phone) is to let me know. The server to want to save the crash information to the database of configuration. Additionally, the proposed U-LBS system to verify the validity of the experiment was performed.

Efficient Methods for the Distributed Disaster Prevention Resources (효과적인 분산 방재자원 관리 방안)

  • Lee, Changyeol
    • Journal of the Society of Disaster Information
    • /
    • v.7 no.4
    • /
    • pp.294-304
    • /
    • 2011
  • Disaster prevention resources consist of persons, equipments, goods, and facilities. Specially, equipments and goods are internally managed in the regional office, and may be leased to the inter-offices. National Disaster Management System(NDMS) managed the resources in the separated system. That is, one system is managed by regional disaster prevention system, the other is managed by the central disaster prevention system which receives the data from the regional disaster prevention system. Because the regional disaster prevention system updates the resource information quarterly, it is difficult to confirm the exact information. In this study, we propose the model which makes to supply in timely the resource to the disaster using the managed resource with RFID technology. Firstly, we classified the resources based on the resource types for the easily search. After then, we defined ID and attributes information of the resources. From the information, we described the management model for the real time resource.

Construction Materials Management System Based on Web Database (웹 데이터베이스 기반의 건축자재 관리 시스템)

  • Mun, Ji-Youn;Hwang, Suk-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.195-200
    • /
    • 2017
  • Due to the rapid development of Internet technology, qualities of Web services are steadily improving and the Web database systems are actively employed to efficiently manage proper informations in various fields. In this paper, we propose a Web database system for the efficient material management for reusing construction materials. The proposed Web-based management system is operated using the spring framework, after constructing a database based on the collected data including tag ID, Location, Material, State, and Cycle, using the RFID(: Radion Frequency IDentification) system equipped with a location estimation module. Recently, the processing problem for a large amount of the residues generated at the demolition stage of various buildings is magnified in the construction site. The proposed Web-based construction material management system is expected for improving the processing problem as increasing the reusability and for reducing the construction cost as efficiently managing the construction materials for the reuse.

A Study on FTN Decoding Method for High Throughput Satellite Communication (고전송율 위성통신을 위한 FTN 신호 복호 기법 연구)

  • Kwon, Hae-Chan;Jung, Ji-Won
    • Journal of Navigation and Port Research
    • /
    • v.38 no.3
    • /
    • pp.211-216
    • /
    • 2014
  • In this paper, high throughput method is studied to provide floating objects with broadband service as ship by using satellite. In recent, satellite broadcastings standard is based on DVB-S3 for communication service using wireless device on navigation communication by satellite. LDPC codes are iterative coding algorithm proposed in DVB-S3. In this paper, FTN technique is applied to LDPC codes with 8-PSK modulation and then present the method to alleviate performance degradation due to FTN through BICM-ID. BICM-ID is the method to improve performance by calculating a new LLR from hard-decision value of decoder output. DVB-S2 system with 8-PSK modulation and FTN technique based on iterative decoding had a better performance than DVB-S2 with 8-PSK modulation and FTN technique over Gaussian channels.

ID-based Authentication Schemes with Forward Secrecy for Smart Grid AMI Environment (스마트그리드 AMI 환경을 위한 전방 보안성이 강화된 ID기반 인증 기법)

  • Park, Dae-Il;Yeo, Sang-Soo
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.736-748
    • /
    • 2013
  • In this paper, we analyse the vulnerabilities of KL scheme which is an ID-based authentication scheme for AMI network, and propose two kinds of authentication schemes which satisfy forward secrecy as well as security requirements introduced in the previous works. In the first scheme, we use MDMS which is the supervising system located in an electrical company for a time-synchronizing server, in order to synchronize smart grid devices in home, and we process device authentication with a new secret value generated by OTP function every session. In the second scheme, we use a secret hash-chain mechanism for authentication process, so we can use a new secret value every session. The proposed two schemes have strong points and weak points respectively and those depend on the services area and its environment, so we can select one of them efficiently considering real aspects of AMI environment.

Design on Protection and Authentication System of IPTV Contents using HSI Watermark (HSI 워터마크를 이용한 IPTV 콘텐츠 보호 및 인증 시스템 설계)

  • Kim, Dae-Jin;Choi, Hong-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.55-62
    • /
    • 2010
  • While the broadband network and multimedia technologies have been developing, the commercial market of digital contents also has been widely spreading with recently starting IPTV. As the IPTV services are getting to be generalized and popularized, the contents illicit copying and distribution of copyright meterials tends to draw more attentions. So we need a right service system that can protect contents and copyright using watermark inserting. Until now, the conventional protection and authentication system is taking advantages of merits both in CAS and DRM. But this system can not protect the contents when acquiring them from TV output using A/D convertor. So we apply watermark method using HSI color space against contents illicit copying. And for distribution of copyright materials. we compound unique settop ID and copyrighter's ID to make new ID that is watermark. When inserting watermark, we use the watermark for copyright protection and authentication. So we can protect copyright and identify last settop's user in illicit distribution. we design download based IPTV contents protection and authentication system using HSI watermark method.

Applying CBR algorithm for cyber infringement profiling system (사례기반추론기법을 적용한 침해사고 프로파일링 시스템)

  • Han, Mee Lan;Kim, Deok Jin;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1069-1086
    • /
    • 2013
  • Nowadays, web defacement becomes the utmost threat which can harm the target organization's image and reputation. These defacement activities reflect the hacker's political motivation or his tendency. Therefore, the analysis of the hacker's activities can give the decisive clue to pursue criminals. A specific message or photo or music on the defaced web site and the outcome of analysis will be supplying some decisive clues to track down criminals. The encoding method or used fonts of the remained hacker's messages, and hacker's SNS ID such as Twitter or Facebook ID also can help for tracking hackers information. In this paper, we implemented the web defacement analysis system by applying CBR algorithm. The implemented system extracts the features from the web defacement cases on zone-h.org. This paper will be useful to understand the hacker's purpose and to plan countermeasures as a IDSS(Investigation Detection Support System).

Development of Urban Object Identification System Based on Network for Intelligent Urban Facility Management (지능형 도시시설물 관리를 위한 네트워크 기반 도시공간객체식별자(UOID) 시스템 개발)

  • Kim, Tae-Hoon
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.14 no.4
    • /
    • pp.172-181
    • /
    • 2011
  • Recently, Urban has been innovated through u-City and Smart City. Urban facility management system is developing using the latest IT technology for real-time monitoring and prevention. In this paper, we propose an UOID(Unique Object IDentification), a standard location-based ID system for urban facility object and develop the UOID service system based on network for innovation of urban facility management system. The system has been tested through Test-bed for connectivity and stability. We wish that the proposed UOID and network service system manages u-City facilities effectively and also provides various ubiquitous services to the citizen, one of the integrate service of u-City platform.