• Title/Summary/Keyword: Information Transferring

Search Result 404, Processing Time 0.021 seconds

Design and Implementation of Component for Location Information of Moving Objects (이동체 위치정보 컴포넌트 설계 및 구현)

  • Lee, Hye-Jin;Kim, Jin-Suk
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.7 no.4
    • /
    • pp.65-76
    • /
    • 2004
  • This paper suggests design and implementation of moving objects management system using GML which is the XML encoding standard of geographic data. The proposed system integrates spatial data and moving objects data, utilizing the concept of Web Feature Services. While integrating data, standard data model and interfaces, proposed by OGC, are used. Since GML is standard for storing and transferring spatial/non-spatial data, interoperability and extendibility can be obtained. In addition, we propose efficient developing environment for the moving object management system by providing components having Web/Mobile interface. If the proposed component be development methods are used, it is easy to add or modifyservices in the mobile system and pla

  • PDF

Adaptive Load Balancing based on Consistency (일관성에 기초한 적응 부하 평형)

  • Kim, Jun-Hyeong;O, Ha-Ryeong;Lee, Jae-Mun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.3
    • /
    • pp.288-298
    • /
    • 1995
  • Load balancing attempts to improve the performance of a distributed computing system by transferring some of the workload of a congested site to others. A load balancing scheme that supports both the source-initiated and the server- initiated load balancing is proposed in this paper. It can model both the m/m/1 queue(no load balancing) and the m/m/n queue(perfect load balancing) as the extreme State variables are replicated into every site, and copy consistency constraints are relaxed more weakly. We propose weak copy consistency constraints which correlate the outdated state information to that of the current state. We also derive sufficient conditions under which each scheduler can guarantee the load balancing without communication Using this model, the problem of load balancing is converted to that of maintaining the consistency of states and communication overhead becomes less than that of the bidding algorithm. The scheme is simulated by event tracing, compared to the two extreme cases and the bidding algorithm. The results show that the mean response time and the number of messages are reduced by 0-35% and 40-100% respectively, compared with the bidding algorithm. Finally the effects of some system parameters are described.

  • PDF

Reliable Contention-Based Forwarding Approach (Contention-Based Forwarding의 신뢰성 향상 방안)

  • Sung, Yoon-Young;Jo, Sun-Mi;Lee, Mee-Jeong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8B
    • /
    • pp.695-705
    • /
    • 2012
  • Due to recent advances in wireless devices and the automotive industry, Vehicular Ad hoc Networks (VANETs) have emerged as a very promising technology for transferring data collected on the road by moving cars. The delivered data may contain emergency information which affects the safety of passengers and drivers as well as the traffic congestion, and the routing protocols have thus a significant impact on the performance of VANETs. In this paper, we study the impact of movement direction of the participating cars which forward data packets on the performance of data delivery and present a new approach which extends the contention-based forwarding (CBF). The proposed reliable CBF (R-CBF) increases the reliability of data deliver on the traffic lights installed roads and reduces the overall propagation delay without routing loops or interruption of data forwarding that may be caused by changes of relative positions of involving cars in routing. Simulation demonstrates that the R-CBF diminishes propagation delay by 38% in comparison to G-SRMB which forwards data to moving cars in the backward direction and eliminates unnecessary retransmissions.

Real-time Water Supply Facilities Monitoring System based on the USN (USN 기반의 실시간 수도설비 모니터링 시스템)

  • Kim, Yong-Tae;Yoo, Neung-Hwan;Park, Gil-Cheol;Kim, Seok-Soo;Kim, Tai-Hoon;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.6
    • /
    • pp.1207-1213
    • /
    • 2007
  • This paper has researched water supply facilities management using real-time water utility monitoring system based on USN(Ubiquitous Sensor Network) which is consisted of wireless sensors transferring waterworks facilities md treatment information about a valve-room and flowmeter-room of water supply installation. In the manholes, it was installed with flowmeter, pressure sensors, vibration sensors, Co-sensors, and hydro-thermograph sensors. These measurement values which are received by PDA are used for facilities operation on the spot safely and conveniently. It has also provided safe installation management via CDMA(Code Division Multiple Access) network which transfers data to remote servers to monitoring at a distance place. With safety management system of water supply facilities on USN technology convenience and safety is increased in real situation, and it is expected that we can supply clean water to people as much safer and more effective water supply installation management.

Cybersquatting-related Precedent Tendency (사이버스쿼팅 관련 판례 동향)

  • Oh, Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.221-227
    • /
    • 2013
  • Cybersquatting is a type of conflicts between a trademark and a domain, and refers to "behaviors of registering, retaining, transferring, and using the identical or similar domain name in bad faith for the profit from the mark such as trademark". That is, it is preoccupying behavior to abuse the fact that the domain name in the Internet can be freely registered on a first come, first served basis and can't duplicate. Though this should be prohibited, given the reality that most of our daily lives are based in the Internet, this is creating many problems in IT environment beyond social structure in rule of law. Therefore, this study has the purpose that it provides cybersquatting-related information and suggests legislative implications hereafter through the analysis of cybersquatting-related precedent from the Supreme Court.

An Artificial Intelligence Approach for Word Semantic Similarity Measure of Hindi Language

  • Younas, Farah;Nadir, Jumana;Usman, Muhammad;Khan, Muhammad Attique;Khan, Sajid Ali;Kadry, Seifedine;Nam, Yunyoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2049-2068
    • /
    • 2021
  • AI combined with NLP techniques has promoted the use of Virtual Assistants and have made people rely on them for many diverse uses. Conversational Agents are the most promising technique that assists computer users through their operation. An important challenge in developing Conversational Agents globally is transferring the groundbreaking expertise obtained in English to other languages. AI is making it possible to transfer this learning. There is a dire need to develop systems that understand secular languages. One such difficult language is Hindi, which is the fourth most spoken language in the world. Semantic similarity is an important part of Natural Language Processing, which involves applications such as ontology learning and information extraction, for developing conversational agents. Most of the research is concentrated on English and other European languages. This paper presents a Corpus-based word semantic similarity measure for Hindi. An experiment involving the translation of the English benchmark dataset to Hindi is performed, investigating the incorporation of the corpus, with human and machine similarity ratings. A significant correlation to the human intuition and the algorithm ratings has been calculated for analyzing the accuracy of the proposed similarity measures. The method can be adapted in various applications of word semantic similarity or module for any other language.

A Novel RGB Image Steganography Using Simulated Annealing and LCG via LSB

  • Bawaneh, Mohammed J.;Al-Shalabi, Emad Fawzi;Al-Hazaimeh, Obaida M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.143-151
    • /
    • 2021
  • The enormous prevalence of transferring official confidential digital documents via the Internet shows the urgent need to deliver confidential messages to the recipient without letting any unauthorized person to know contents of the secret messages or detect there existence . Several Steganography techniques such as the least significant Bit (LSB), Secure Cover Selection (SCS), Discrete Cosine Transform (DCT) and Palette Based (PB) were applied to prevent any intruder from analyzing and getting the secret transferred message. The utilized steganography methods should defiance the challenges of Steganalysis techniques in term of analysis and detection. This paper presents a novel and robust framework for color image steganography that combines Linear Congruential Generator (LCG), simulated annealing (SA), Cesar cryptography and LSB substitution method in one system in order to reduce the objection of Steganalysis and deliver data securely to their destination. SA with the support of LCG finds out the optimal minimum sniffing path inside a cover color image (RGB) then the confidential message will be encrypt and embedded within the RGB image path as a host medium by using Cesar and LSB procedures. Embedding and extraction processes of secret message require a common knowledge between sender and receiver; that knowledge are represented by SA initialization parameters, LCG seed, Cesar key agreement and secret message length. Steganalysis intruder will not understand or detect the secret message inside the host image without the correct knowledge about the manipulation process. The constructed system satisfies the main requirements of image steganography in term of robustness against confidential message extraction, high quality visual appearance, little mean square error (MSE) and high peak signal noise ratio (PSNR).

Fuzzy Logic-based Bit Compression Method for Distributed Face Recognition (분산 얼굴인식을 위한 퍼지로직 기반 비트 압축법)

  • Kim, Tae-Young;Noh, Chang-Hyeon;Lee, Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.2
    • /
    • pp.9-17
    • /
    • 2009
  • A face database has contained a large amount of facial information data since face recognition was widely used. With the increase of facial information data, the face recognition based on distributed processing method has been noticed as a major topic. In existing studies, there were lack of discussion about the transferring method for large data. So, we proposed a fuzzy logic-based bit compression rate selection method for distributed face recognition. The proposed method selects an effective bit compression rate by fuzzy inference based on face recognition rate, processing time for recognition, and transferred bit length. And, we compared the facial recognition rate and the recognition time of the proposed method to those of facial information data with no compression and fixed bit compression rates. Experimental results demonstrates that the proposed method can reduce processing time for face recognition with a reasonable recognition rate.

Rational Allocation of Liability for Damages in Personal Information Infringement by Third Party (제3자의 행위에 의한 개인정보침해사고로 발생한 손해배상책임의 합리적 배분)

  • Yoo, Beeyong;Kwon, Hunyeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.231-242
    • /
    • 2020
  • In the case of damages caused by personal information infringement accidents caused by information infringer such as hackers, the information subject will usually claim damages to the information controller rather than the information infringer who is the perpetrator, and the information controller who has been claimed will claim damages again to the information security enterprise that has entrusted the information protection business. These series of claims for damages, which are expected to be carried out between the information subject, the information controller and the information security enterprise, are nothing but quarrels for transferring of liability among themselves who are also victims of infringement. So the problem of damage compensation should be discussed from the perspective of multi-faceted rational distribution of the damages among the subjects who make up the information security industry ecosystem rather than the conventional approach. In addition, due to the nature of personal information infringement accidents, if a large amount of personal information infringement occurs, the amount of compensation can be large enough to affect the survival of the company and so this study insist that a concrete and realistic alternatives for society to share damages is needed.

COBie-based Building Information Exchange System Framework for Building Facility Management (건축물 유지관리를 위한 COBie기반 건축정보교환체계 프레임웍 연구)

  • Kang, Tae-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.370-378
    • /
    • 2020
  • The Construction Operations Building Information Exchange (COBie) collects and documents a large amount of information from different paths in one place during design and construction projects. This documented information is readily available as a means of continuously transferring data to the facility management systems used by building engineers. In this process, the COBie Worksheet, an open standard form, is used to input the information by simplifying the list required by the user. As a result, COBie was developed to improve dramatically how relevant information is obtained and updated to support operations, maintenance, and asset management at the design and construction stages. On the other hand, to use COBie, a great deal of manual work is required for information linkage and quality inspection with heterogeneous data models. These issues become obstacles to COBie-based facility management system development. This study analyzed the COBie information system and defined the framework for simpler operating maintenance information from BIM (Building Information Modeling). Moreover, the rules for facility management information submission, quality inspection, role definition of framework components, and information linkage were derived. COBie DB schema and support data linkages could be generated effectively based on the proposed framework in prototype development.