• Title/Summary/Keyword: Information gathering

Search Result 841, Processing Time 0.04 seconds

A GTS-based Sensor Data Gathering under a Powerful Beam Structure (파워 빔 구조에서 GTS 기반 센서 데이터 수집 방안)

  • Lee, Kil Hung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.39-45
    • /
    • 2014
  • This paper proposes an architecture of a sensor network for gathering data under a powerful beam cluster tree architecture. This architecture is used when there is a need to gather data from sensor node where there is no sink node connected to an existing network, or it is required to get a series of data specific to an event or time. The transmit distance of the beam signal is longer than that of the usual sensor node. The nodes of the network make a tree network when receiving a beam message transmitting from the powerful root node. All sensor nodes in a sink tree network synchronize to the superframe and know exactly the sequence value of the current superframe. When there is data to send to the sink node, the sensor node sends data at the corresponding allocated channel. Data sending schemes under the guaranteed time slot are tested and the delay and jitter performance is explained.

Intrusion Detection System for Home Windows based Computers

  • Zuzcak, Matej;Sochor, Tomas;Zenka, Milan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4706-4726
    • /
    • 2019
  • The paper is devoted to the detailed description of the distributed system for gathering data from Windows-based workstations and servers. The research presented in the beginning demonstrates that neither a solution for gathering data on attacks against Windows based PCs is available at present nor other security tools and supplementary programs can be combined in order to achieve the required attack data gathering from Windows computers. The design of the newly proposed system named Colander is presented, too. It is based on a client-server architecture while taking much inspiration from previous attempts for designing systems with similar purpose, as well as from IDS systems like Snort. Colander emphasizes its ease of use and minimum demand for system resources. Although the resource usage is usually low, it still requires further optimization, as is noted in the performance testing. Colander's ability to detect threats has been tested by real malware, and it has undergone a pilot field application. Future prospects and development are also proposed.

Researcher's Behavior of Gathering Cited References in field of Library and Information Science (문헌정보학 분야 연구자들의 인용문헌수집행태에 관한 연구)

  • 신동민
    • Journal of the Korean Society for information Management
    • /
    • v.13 no.1
    • /
    • pp.83-101
    • /
    • 1996
  • The purpose of this study was to analyse the gathering channel of cited references and the behavior of researchers in the field of library and information science. The survey by questionnaire was used to collect data for the study and the SPSS program was used for the statistical analysis such as correlation analysis and trend analysis by descriptive statistics. The main results of this study are so follows : - The hypothesis suggested for the study was proved to be true. - There was no statistically significant correlation between the research experience or the number of published papers and gathering channel of cited references. - Most of the researchers responded favorably to the exchange of informations among researchers includingsource materials and details of ongoing researches.

  • PDF

Accounting Information Gathering System for Grid Environment

  • Jang Haeng Jin;Doo Gil Su;Lee Jeong Jin;Kim Beob Kyun;Hwang Ho Jeon;An Dong Un;Chung Seung Jong
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.703-706
    • /
    • 2004
  • Grid computing represents the fundamental computing shift from a localized resource computing model to a fully-distributed virtual organization with shared resources. Accounting is one of the main obstacles to widespread adoption of the grid. Accounting has until recently, been a sparsely-addressed problem, particularly in practice. In this paper, we design and implement the accounting information gathering system. Implemented system is based on OGSA, following GSAX framework of RUS-WG in GGF. And the schema of gathered and serviced accounting information is following Usage Record Fields of UR-WG in GGF. Also, the accounting information integrating and monitoring tool for system management in the grid environment are implemented.

  • PDF

Information World of the Urban Poor in Busan Metro Area as Viewed Through Their Everyday-Life Experiences (일상을 통해 본 부산지역 도시 저소득층의 정보세계)

  • Chang, Duk-Hyun
    • Journal of Korean Library and Information Science Society
    • /
    • v.37 no.4
    • /
    • pp.443-462
    • /
    • 2006
  • This study intends to portray the everyday lives of the urban poor in Busan metro area, especially in terms of the information perspective. Employing basic qualitative data collection tools such as interviews and participant observation, the study attempts to illustrate such phenomena as information needs and behaviors, and to scrutinize the reasons of particular behaviors in information seeking and gathering. This paper, specifically, focuses on the following characteristics of information need and information-related behavior of the urban poor; types of everyday concerns and ways to cope with such concerns; types of the help providers; characteristics of information channels of everyday information seeking and information gathering. The role that interpersonal sources play in their everyday lives, has been emphasized in reality of their information environment along with information needs and information related behaviors including information gathering and information seeking.

  • PDF

Use of Tree Traversal Algorithms for Chain Formation in the PEGASIS Data Gathering Protocol for Wireless Sensor Networks

  • Meghanathan, Natarajan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.6
    • /
    • pp.612-627
    • /
    • 2009
  • The high-level contribution of this paper is to illustrate the effectiveness of using graph theory tree traversal algorithms (pre-order, in-order and post-order traversals) to generate the chain of sensor nodes in the classical Power Efficient-Gathering in Sensor Information Systems (PEGASIS) data aggregation protocol for wireless sensor networks. We first construct an undirected minimum-weight spanning tree (ud-MST) on a complete sensor network graph, wherein the weight of each edge is the Euclidean distance between the constituent nodes of the edge. A Breadth-First-Search of the ud-MST, starting with the node located closest to the center of the network, is now conducted to iteratively construct a rooted directed minimum-weight spanning tree (rd-MST). The three tree traversal algorithms are then executed on the rd-MST and the node sequence resulting from each of the traversals is used as the chain of nodes for the PEGASIS protocol. Simulation studies on PEGASIS conducted for both TDMA and CDMA systems illustrate that using the chain of nodes generated from the tree traversal algorithms, the node lifetime can improve as large as by 19%-30% and at the same time, the energy loss per node can be 19%-35% lower than that obtained with the currently used distance-based greedy heuristic.

Efficient Context-Aware Scheme for Sensor Network in Ubiquitous Devices

  • Shim, Jong-Ik;Sho, Su-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.12
    • /
    • pp.1778-1786
    • /
    • 2009
  • Many sensor network applications have been developed for smart home, disaster management, and a wide range of other applications. These applications, however, generally assume a fixed base station as well as fixed sensor nodes. Previous research on sensor networks mainly focused on efficient transmission of data from sensors to fixed sink nodes. Recently there has been active research on mobile sink nodes, sink mobility is one of the most comprehensive trends for information gathering in sensor networks, but the research of an environment where both fixed sink nodes and mobile sinks are present at the same time is rather scarce. This paper proposes a scheme for context-aware by ubiquitous devices with the sink functionality added through fixed sinks under a previously-built, cluster-based multi-hop sensor network environment. To this end, clustering of mobile devices were done based on the fixed sinks of a previously-built sensor network, and by using appropriate fixed sinks, context gathering was made possible. By mathematical comparison with TTDD routing protocol, which was proposed for mobile sinks, it was confirmed that performance increases by average 50% in energy with the number of mobile sinks, and with the number of movements by mobile devices.

  • PDF

Study of Mash-up Gathering Disaster Information based on Twitter (트위터의 재난정보 자동 추출 매시업 연구)

  • Seo, Tae-Woong;Kim, Chang-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.515-516
    • /
    • 2011
  • We proposal social network service available for disaster and include crowd-soucing in order to improve using only for notification information. Therefore, We design new mash-up which is gathering disaster information from twitter. The mash-up has differences with current systems, because it does not use application software for acquisition disaster information.

  • PDF

An implementation of stable transmission and security management system of massive acoustic data in unsecurity and low speed network area (비보호 저속망 환경에서의 고용량 음향데이터의 최적화 전송 및 보호 시스템 구현)

  • Sun, Doo-Young;Kim, Duk-Young;Kim, Yong-Deuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.6
    • /
    • pp.1323-1330
    • /
    • 2010
  • The amount of acoustic data gathered from the acoustic data gathering system is increased dramatically as the acoustic data gathering system become various and highly effective. It is needed to transmit this acoustic data to analysis environment for precise analysis. In this gathering/analysis system, it is also needed the stable transmitting as well as highly perfect security. But the existing system using the conveying method needs a lot of time. In case of using networks, the low speed networking vulnerable in the stable transmitting and the information security is impossible to materialize. In this paper, I would like to propose a transmitting and management system sending a massive gathering acoustic data in the unsecurity and low speed networking environment. The implemented system is to transmit the acoustic data safely in low speed networking environment and secure the acoustic data from various threats.

The Technique for Gathering, Analyzing and Processing of Field Information (현장정보 수집 및 분석.처리기술)

  • Kim, Yong-Soo
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2007.09a
    • /
    • pp.431-439
    • /
    • 2007
  • Data logger is generally needed for gathering field information automatically(or manually), using various sensors. However it, currently used in the county, is produced and developed by overseas. It is difficult to upgrade related program due to developed system and limited user in terms of environment it is used. On the other hand, several companies developed and sold unique data logger based their technique expertise in the country. But enhancement and practical use of related technology has much difficulties because feasibility, marketability and demand for technique are uncertain. In this study, it is the main purpose to offer basic information to select equipment suitable for field characteristic through analysis and comparison with features about method of information collection, operating program and process technique data logger which is used primarily in geotechnical engineering in both domestic and international.

  • PDF