• Title/Summary/Keyword: Information access

Search Result 10,231, Processing Time 0.04 seconds

Algorithm Development for Extract O/D of Air Passenger via Mobile Telecommunication Bigdata (모바일 통신 빅데이터 기반 항공교통이용자 O/D 추출 알고리즘 연구)

  • Bumchul Cho;Kihun Kwon
    • The Journal of Bigdata
    • /
    • v.8 no.2
    • /
    • pp.1-13
    • /
    • 2023
  • Current analysis of air passengers mainly relies on statistical methods, but there are limitations in analyzing detailed aspects such as travel routes, number of regional passengers and airport access times. However, with the advancement of big data technology and revised three data acts, big data-based transportation analysis has become more active. Mobile communication data, which can precisely track the location of mobile phone terminals, can serve as valuable analytical data for transportation analysis. In this paper, we propose a air passenger Origin/Destination (O/D) extraction algorithm based on mobile communication data that overcomes the limitations of existing air transportation user analysis methods. The algorithm involves setting airport signal detection zones at each airport and extracting air passenger based on their base station connection history within these zones. By analyzing the base station connection data along the passenger's origin-destination paths, we estimate the entire travel route. For this paper, we extracted O/D information for both domestic and international air passengers at all domestic airports from January 2019 to December 2020. To compensate for errors caused by mobile communication service provider market shares, we applied a adjustment to correct the travel volume at a nationwide citizen level. Furthermore correlation analysis was performed on O/D data and aviation statistics data for air traffic users based on mobile communication data to verify the extracted data. Through this, there is a difference in the total amount (4.1 for domestic and 4.6 for international), but the correlation is high at 0.99, which is judged to be useful. The proposed algorithm in this paper enables a comprehensive and detailed analysis of air transportation users' travel behavior, regional/age group ratios, and can be utilized in various fields such as formulating airport-related policies and conducting regional market analysis.

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.

Practical Study on Learning Effects of University e-Learning (대학 e-러닝 학습효과에 관한 실증연구)

  • Kim, Joon-Ho
    • Information Systems Review
    • /
    • v.12 no.3
    • /
    • pp.19-48
    • /
    • 2010
  • This study focused on characterizing various factors in order for learners to maintain their interests in learning and to maximize learning effects as the top priority purpose of university e-Learning, on the basis of results of conceptual studies on existing e-Learning and practical studies, and then on examining them practically. It also analyzed which factors would have greater influence on learning effects of e-Learning in general. Moreover, in comparison with existing numerous studies which examined only factor such as learning effects of e-Learning, it analyzed such things in detail according to division into three items such as learning satisfaction, learning transfer and learning recommendation. To achieve such purposes of the study, it characterized and set 3 factors such as learning contents, instructional design and user convenience on the assumption that such factors have a significant influence on learning effects of e-Learning. Moreover, the factor of learning contents includes 3 detailed elements, i.e., learning issue and objective, knowledge information, and consistency and propriety, and the factor of instructional design includes 4 detailed elements, i.e., interest and sympathy, interaction, contents presentation and explanatory strategy. Lastly, the factor of user convenience includes 2 detailed elements such as screen configuration, and check-up of contents and teaching schedule. According to analytical results, it showed all 3 factors such as learning contents, instructional design and user convenience have a significant influence on learning effects of e-Learning(i.e., learning satisfaction, learning transfer and learning recommendation). In more detail, it showed the learning issue and objective from the factor of learning contents have the greatest influence on learning satisfaction of e-Learning. Then, it is the most important to set the learning issue and objective with given priority to learners and set the learning objective estimable, in order to raise the learning satisfaction. It showed the contents presentation from the factor of instructional design on the learning transfer. Therefore, it is the most important to structuralize mutual relation and presentation orders to promote learning systematically and to let learners access to such things, for the purpose of raising the learning transfer. Moreover, it showed the interest and sympathy from the factor of instructional design has the greatest influence on the learning recommendation. Thus, it is the most important to promote learners' interests to the maximum using well-timed media, and to give a lecture enough to arouse learners' sympathy.

Design and Implementation of Game Server using the Efficient Load Balancing Technology based on CPU Utilization (게임서버의 CPU 사용율 기반 효율적인 부하균등화 기술의 설계 및 구현)

  • Myung, Won-Shig;Han, Jun-Tak
    • Journal of Korea Game Society
    • /
    • v.4 no.4
    • /
    • pp.11-18
    • /
    • 2004
  • The on-line games in the past were played by only two persons exchanging data based on one-to-one connections, whereas recent ones (e.g. MMORPG: Massively Multi-player Online Role-playings Game) enable tens of thousands of people to be connected simultaneously. Specifically, Korea has established an excellent network infrastructure that can't be found anywhere in the world. Almost every household has a high-speed Internet access. What made this possible was, in part, high density of population that has accelerated the formation of good Internet infrastructure. However, this rapid increase in the use of on-line games may lead to surging traffics exceeding the limited Internet communication capacity so that the connection to the games is unstable or the server fails. expanding the servers though this measure is very costly could solve this problem. To deal with this problem, the present study proposes the load distribution technology that connects in the form of local clustering the game servers divided by their contents used in each on-line game reduces the loads of specific servers using the load balancer, and enhances performance of sewer for their efficient operation. In this paper, a cluster system is proposed where each Game server in the system has different contents service and loads are distributed efficiently using the game server resource information such as CPU utilization. Game sewers having different contents are mutually connected and managed with a network file system to maintain information consistency required to support resource information updates, deletions, and additions. Simulation studies show that our method performs better than other traditional methods. In terms of response time, our method shows shorter latency than RR (Round Robin) and LC (Least Connection) by about 12%, 10% respectively.

  • PDF

Function of the Korean String Indexing System for the Subject Catalog (주제목록을 위한 한국용어열색인 시스템의 기능)

  • Yoon Kooho
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.15
    • /
    • pp.225-266
    • /
    • 1988
  • Various theories and techniques for the subject catalog have been developed since Charles Ammi Cutter first tried to formulate rules for the construction of subject headings in 1876. However, they do not seem to be appropriate to Korean language because the syntax and semantics of Korean language are different from those of English and other European languages. This study therefore attempts to develop a new Korean subject indexing system, namely Korean String Indexing System(KOSIS), in order to increase the use of subject catalogs. For this purpose, advantages and disadvantages between the classed subject catalog nd the alphabetical subject catalog, which are typical subject ca-alogs in libraries, are investigated, and most of remarkable subject indexing systems, in particular the PRECIS developed by the British National Bibliography, are reviewed and analysed. KOSIS is a string indexing based on purely the syntax and semantics of Korean language, even though considerable principles of PRECIS are applied to it. The outlines of KOSIS are as follows: 1) KOSIS is based on the fundamentals of natural language and an ingenious conjunction of human indexing skills and computer capabilities. 2) KOSIS is. 3 string indexing based on the 'principle of context-dependency.' A string of terms organized accoding to his principle shows remarkable affinity with certain patterns of words in ordinary discourse. From that point onward, natural language rather than classificatory terms become the basic model for indexing schemes. 3) KOSIS uses 24 role operators. One or more operators should be allocated to the index string, which is organized manually by the indexer's intellectual work, in order to establish the most explicit syntactic relationship of index terms. 4) Traditionally, a single -line entry format is used in which a subject heading or index entry is presented as a single sequence of words, consisting of the entry terms, plus, in some cases, an extra qualifying term or phrase. But KOSIS employs a two-line entry format which contains three basic positions for the production of index entries. The 'lead' serves as the user's access point, the 'display' contains those terms which are themselves context dependent on the lead, 'qualifier' sets the lead term into its wider context. 5) Each of the KOSIS entries is co-extensive with the initial subject statement prepared by the indexer, since it displays all the subject specificities. Compound terms are always presented in their natural language order. Inverted headings are not produced in KOSIS. Consequently, the precision ratio of information retrieval can be increased. 6) KOSIS uses 5 relational codes for the system of references among semantically related terms. Semantically related terms are handled by a different set of routines, leading to the production of 'See' and 'See also' references. 7) KOSIS was riginally developed for a classified catalog system which requires a subject index, that is an index -which 'trans-lates' subject index, that is, an index which 'translates' subjects expressed in natural language into the appropriate classification numbers. However, KOSIS can also be us d for a dictionary catalog system. Accordingly, KOSIS strings can be manipulated to produce either appropriate subject indexes for a classified catalog system, or acceptable subject headings for a dictionary catalog system. 8) KOSIS is able to maintain a constistency of index entries and cross references by means of a routine identification of the established index strings and reference system. For this purpose, an individual Subject Indicator Number and Reference Indicator Number is allocated to each new index strings and new index terms, respectively. can produce all the index entries, cross references, and authority cards by means of either manual or mechanical methods. Thus, detailed algorithms for the machine-production of various outputs are provided for the institutions which can use computer facilities.

  • PDF

The Reinforcing Mechanism of Sustaining Participations in Open Source Software Developers: Based on Social Identity Theory and Organizational Citizenship Behavior Theory (오픈 소스 개발자들의 참여 의도 강화 기제 및 참여 지속 의도에 관한 연구: 사회 정체성 이론과 조직시민행동 이론에 기반하여)

  • Choi, Junghong;Choi, Joohee;Lee, Hye Sun;Hwangbo, Hwan;Lee, Inseong;Kim, Jinwoo
    • Asia pacific journal of information systems
    • /
    • v.23 no.3
    • /
    • pp.1-23
    • /
    • 2013
  • Open Source Software Development (OSSD) differentiates itself from traditional closed software development in that it reveals its source codes online and allows anyone to participate in projects. Even though its success was in doubt, many of the open collaborative working models produced successful results. Academia started to get interested in how developers are willing to participate even when there are no extrinsic rewards for their efforts. Many studies tried to explain developers' motivations, and the pursuit of ideology, reputation, and altruism are found to be the answers. Those studies, however, focused mostly on how the first contribution is made out of a certain motivation. Nowadays, OSSD reaches at its maturity and 70% of professional developers have used or utilized open source software or code in their works. As the proportion of people experiencing OSS, the accounts from previous studies are expected to be weakened. Also, extant literature fails to explain how the motivation of participating in OSS evolves over time and experiences. Given that changing over time or over experiences is the natural in the perception of motivation, studies in an attempt to understand how the motivation changes or evolves are in need. In this study, we aimed to explain how the perception about OSS from past usage or related experiences leads to the intention to sustain OSS participations. By doing so, we try to bridge the gap between previous studies and the actual phenomenon. We argued that perceived instrumentality about OSS learned from past experiences will first affect the formation of organizational identity towards general OSS community. And once the organizational identity is formed, it will affect the one's following behaviors related to OSS development, most likely to sustain the favoring stance toward OSS community. Our research distinguishes itself from previous one in that it divides the paths from organizational identity formed to the intention to sustain the voluntary helping behaviors, by altruistic and conforming intentions. Drawing on this structural model, we could explain how organizational identity engages in forming the sustaining intention from past experiences, and that the intention to help at individual level and organizational level works at different level in OSS community. We grounded our arguments on Social identity theory and Organizational Citizenship theory. We examined our assumption by constructing a structural equation model (SEM) and had 88 developers to answer our online surveys. The result is analyzed by PLS (partial least square) method. Consequently, all paths but one in our model are supported, the one which assumed the association between perceived instrumentality and altruistic intention. Our results provide directions in designing online collaborative platforms where open access collaboration is meant to occur. Theoretically, our study suggests that organizational citizenship behavior can occur from organizational identity, even in bottom-up organizational settings. More specifically, we also argue to consider both organizational level and individual level of motivation in inducing sustained participations within the platforms. Our result can be interpreted to indicate the importance of forming organizational identity in sustaining the participatory behaviors. It is because there was no direct association between perceived instrumentality from past experiences and altruistic behavior, but the perception of organizational identity bridges the two constructs. This means that people with no organizational identity can sustain their participations through conforming intention from only the perception of instrumentality, but it needs little more than that for the people to feel the intention to directly help someone in the community-first to form the self-identity as a member of the given community.

Data Mining Approaches for DDoS Attack Detection (분산 서비스거부 공격 탐지를 위한 데이터 마이닝 기법)

  • Kim, Mi-Hui;Na, Hyun-Jung;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.279-290
    • /
    • 2005
  • Recently, as the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not effectively defend against these attacks, or the defense capability of some mechanisms is only limited to specific DDoS attacks. In this paper, we propose a detection architecture against DDoS attack using data mining technology that can classify the latest types of DDoS attack, and can detect the modification of existing attacks as well as the novel attacks. This architecture consists of a Misuse Detection Module modeling to classify the existing attacks, and an Anomaly Detection Module modeling to detect the novel attacks. And it utilizes the off-line generated models in order to detect the DDoS attack using the real-time traffic. We gathered the NetFlow data generated at an access router of our network in order to model the real network traffic and test it. The NetFlow provides the useful flow-based statistical information without tremendous preprocessing. Also, we mounted the well-known DDoS attack tools to gather the attack traffic. And then, our experimental results show that our approach can provide the outstanding performance against existing attacks, and provide the possibility of detection against the novel attack.

Laying the Siting of High-Level Radioactive Waste in Public Opinion (고준위 방폐장 입지 선정의 공론화 기초 연구)

  • Lee, Soo-Jang
    • Journal of Environmental Policy
    • /
    • v.7 no.4
    • /
    • pp.105-134
    • /
    • 2008
  • Local opposition and protest constitute single greatest hurdle to the siting of locally unwanted land uses(LULUs), especially siting of high-level radioactive disposal not only throughout Korea but also throughout the industrialized world. It can be attributed mainly to the NIMBYism, equity problem, and lack of participation. These problems are arisen from rational planning process which emphasizes instrumental rationality. But planning is a value-laden political activity, in which substantive rationality is central. To achieve this goals, we need a sound planning process for siting LULUs, which should improve the ability of citizens to influence the decisions that affects them. By a sound planning process, we mean one that is open to citizen input and contains accurate and complete information. In other word, the public is also part of the goal setting process and, as the information and analyses developed by the planners are evaluated by the public, strategies for solutions can be developed through consensus-building. This method is called as a co-operative siting process, and must be structured in order to arrive at publicly acceptable decisions. The followings are decided by consensus-building method. 1. Negotiation will be held? 2. What is the benefits and risks of negotiation? 3. What are solutions when collisions between national interests and local ones come into? 4. What are the agendas? 5. What is the community' role in site selection? 6. Are there incentives to negotiation. 7. Who are the parties to the negotiation? 8. Who will represent the community? 9. What groundwork of negotiation is set up? 10. How do we assure that the community access to information and expert? 11. What happens if negotiation is failed? 12. Is it necessary to trust each other in negotiations? 13. Is a mediator needed in negotiations?

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

A New Approach to Mobile Device Design - focused on the Communication Tool & it's GUI for Office Workers in the Near Future - (모바일 기기 디자인의 새로운 접근 - 근 미래 작업환경에서의 커뮤니케이션 도구 디자인과 GUI 연구를 중심으로 -)

  • Yang, Sung-Ho
    • Archives of design research
    • /
    • v.19 no.2 s.64
    • /
    • pp.31-42
    • /
    • 2006
  • This study originates from the following critical mind; what will the office of the future be like? and what technology will we rely upon most to communicate with colleagues or to access business information. In the office environment today, new technology has compelled new work paradigm and has greatly affected the capabilities of the individual to work in a more productive and efficient manner. However, even though new computer technology has changed the business world so rapidly, it is very difficult to see the changes that have been taken place. As an aim of the study, creating a mobile tool for office workers that successfully supports their work and communication was explored, and this study explored future work environment with a 5 years technological and social perspective. As a result of this study, the bON brings new visions to the mobile professionals via various interfaces. The bON, a mobile device, is both a system of work and of communication for office workers. The bON, as an integrated tool for working and communicating, forms the basis for a mobile information gateway that is equally capable of functioning as a mobile desk. The basic underlying idea is that all formal meeting places and hallways in the office are equipped with large wall-mounted screens. The bON collaborates with these media in various ways to enhance productivity and efficiency. The main challenge for the bON to enhance both mobility and quality of information is using new technology including bendable and flexible display and soft material display and sensors. To answer for the strong needs for mobility, the whole size of the device is fairly small while the screen is rolled inside the device. For Graphical User Interface, moreover, a new technique called Multi-layering Interface was adopted to stretch user's visual limits and suggests new direction in designing mobile device, equipped with small size display.

  • PDF