• Title/Summary/Keyword: Intelligent Techniques

Search Result 972, Processing Time 0.028 seconds

A Study on the DB establishment and traceable management of the Urban transit standardization project (도시철도 표준화사업의 데이터베이스 구축 및 추적성 관리에 관한 연구)

  • Lee, Woo-Dong;Chung, Jong-Duck
    • Journal of the Korean Society for Railway
    • /
    • v.14 no.6
    • /
    • pp.501-506
    • /
    • 2011
  • The study and techniques of system engineering have been applied to various fields including space-air, national defense division in advanced countries. Korea is currently in the early stages of introducing system engineering scheme in railway system and national defense division restrictedly. As theory and application of system engineering covers a wide scope, documents management and requirement analysis technology applied to establishment of standard and core unit development of the research target. The techniques which are historical management and trace among standards for establishment of standard are introduced using SE tools and participating agencies shared the information by constructing of database from all documents which are generated from the project. Through the functional analysis of the requirements for the intelligent station monitoring system in basic design stage, established requirements are verified and will be made official announcement as standard of the intelligent station monitoring system.

A Conceptual Framework for an Information Behavior Model Based on the Collaboration Perspective between User and System for Information Retrieval

  • Yangyuen, Wachira;Phetkaew, Thimaporn;Nuntapichai, Siwanath
    • Journal of Information Science Theory and Practice
    • /
    • v.8 no.3
    • /
    • pp.30-46
    • /
    • 2020
  • This research aimed (1) to study and analyze the ability of current information retrieval (IR) systems based on views of information behavior (IB), and (2) to propose a conceptual framework for an IB model based on the collaboration between the system and user, with the intent of developing an IR system that can apply intelligent techniques to enhance system efficiency. The methods in this study consisted of (1) document analysis which included studying the characteristics and efficiencies of the current IR systems and studying the IB models in the digital environment, and (2) implementation of the Delphi technique through an indepth interview method with experts. The research results were presented in three main parts. First, the IB model was categorized into eight stages, different from traditional IB, in the digital environment, which can correspond to all behaviors and be applied to with an IR system. Second, insufficient functions and log file storage hinder the system from effectively understanding and accommodating user behavior in the digital environment. Last, the proposed conceptual framework illustrated that there are stages that can add intelligent techniques to the IR system based on the collaboration perspective between the user and system to boost the users' cognitive ability and make the IR system more user-friendly. Importantly, the conceptual framework for the IB model based on the collaboration perspective between the user and system for IR assisted the ability of information systems to learn, recognize, and comprehend human IB according to individual characteristics, leading to enhancement of interaction between the system and users.

One-time Session Key based HTTP DDoS Defense Mechanisms (일회성 세션 키 기반 HTTP DDoS 공격 방어기법)

  • Choi, Sang-Yong;Kang, Ik-Seon;Kim, Yong-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.8
    • /
    • pp.95-104
    • /
    • 2013
  • DDoS attacks have became as a social threat since 2009 7.7 DDoS turmoil. Even though defence techniques have been developing to provide against those threats, they become much more sophisticate. In recent years, the attack form of DDoS is changing from high amount of traffic attack of network layers to highly sophisticate small amount of application layers. To make matters worse, attack agent for the attack has became very intelligent so that it is difficult to be blocked since it can't be distinguished from normal PCs. In the user authentication system(such as CAPTCHA) User intervention is required to distinguish normal PCs and intelligent attack agents and in particular, in a NAT environment, IP-based blocking method can be cut off the normal users traffic at the same time. This research examined defense techniques which are able to distinguish between agent and normal PC and effectively block ways the HTTP DDoS offense applying one-time session key based authentication method using Cookie which is used in HTTP protocol to protect web sever from sophisticate application layer of DDoS.

An Enhancement Scheme of Dynamic Analysis for Evasive Android Malware (분석 회피 기능을 갖는 안드로이드 악성코드 동적 분석 기능 향상 기법)

  • Ahn, Jinung;Yoon, Hongsun;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.519-529
    • /
    • 2019
  • Nowadays, intelligent Android malware applies anti-analysis techniques to hide malicious behaviors and make it difficult for anti-virus vendors to detect its presence. Malware can use background components to hide harmful operations, use activity-alias to get around with automation script, or wipe the logcat to avoid forensics. During our study, several static analysis tools can not extract these hidden components like main activity, and dynamic analysis tools also have problem with code coverage due to partial execution of android malware. In this paper, we design and implement a system to analyze intelligent malware that uses anti-analysis techniques to improve detection rate of evasive malware. It extracts the hidden components of malware, runs background components like service, and generates all the intent events defined in the app. We also implemented a real-time logging system that uses modified logcat to block deleting logs from malware. As a result, we improve detection rate from 70.9% to 89.6% comparing other container based dynamic analysis platform with proposed system.

Real-Time Traffic Information Provision Using Individual Probe and Five-Minute Aggregated Data (개별차량 및 5분 집계 프로브 자료를 이용한 실시간 교통정보 제공)

  • Jang, Jinhwan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.1
    • /
    • pp.56-73
    • /
    • 2019
  • Probe-based systems have been gaining popularity in advanced traveler information systems. However, the high possibility of providing inaccurate travel-time information due to the inherent time-lag phenomenon is still an important issue to be resolved. To mitigate the time-lag problem, different prediction techniques have been applied, but the techniques are generally regarded as less effective for travel times with high variability. For this reason, current 5-min aggregated data have been commonly used for real-time travel-time provision on highways with high travel-time fluctuation. However, the 5-min aggregation interval itself can further increase the time-lags in the real-time travel-time information equivalent to 5 minutes. In this study, a new scheme that uses both individual probe and 5-min aggregated travel times is suggested to provide reliable real-time travel-time information. The scheme utilizes individual probe data under congested conditions and 5-min aggregated data under uncongested conditions, respectively. As a result of an evaluation with field data, the proposed scheme showed the best performance, with a maximum reduction in travel-time error of 18%.

A Meta-Model for Development Process of IoT Application by Using UML

  • Cho, Eun-Sook;Song, Chee-Yang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.121-128
    • /
    • 2019
  • An Internet of Things(IoT) technology which provides intelligent services by combining context-awareness based intelligences, inter-communication is made of between things and things or between things and person through the network connected with intelligent things is spreading rapidly. Especially as this technology is converged into smart device, mobile, cloud, big data technologies, it is applied into various domains. Therefore, this is different from existing Web or Mobile Application. New types of IoT applications are emerging by adapting IoT into Web or mobile. Because IoT application is not only focused on software but also considering hardware or things aspect, there are limitations existing development process. Existing development processes don't consider analysis and design techniques considering both hardware and things. We propose not only a meta-model for development process which can support IoT application's development but also meta-models for main activities in this paper. Especially we define modeling elements by using UML's extension mechanisms, provide development process, and suggest design techniques how to apply those elements into IoT application's modeling phase. Because there are many types of IoT application's type, we propose an Android and Arduino-based on IoT application as a case study. We expect that proposed technique can be applied into many of various IoT application development and design with a form of flexible and extensible as well as main functionalities or elements are more concretely described. As a result, it brings IoT application's flexibility and the effect of quality improvement.

A Study on the Development of CCTV Camera Autonomous Posture Calibration Algorithm for Simultaneous Operation of Traffic Information Collection and Monitoring (교통정보 수집 및 감시 동시운영을 위한 CCTV 카메라 자율자세 보정 알고리즘 개발에 관한 연구)

  • Jun Kyu Kim;Jun Ho Jung;Hag Yong Han;Chi Hyun SHIN
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.1
    • /
    • pp.115-125
    • /
    • 2023
  • This paper relates to the development of CCTV camera posture calibration algorithm that can simultaneously collect traffic information such as traffic volume and speed in the state of view of the CCTV camera set for traffic monitoring. The developed autonomous posture calibration algorithm uses vehicle recognition and tracking techniques to identify the road, and automatically determines the angle of view for the operator's traffic surveillance and traffic information collection. To verify the performance of the proposed algorithm, a CCTV installed on site was used, and the results of the angle of view automatically calculated by the autonomous posture calibration algorithm for the angle of view set for traffic surveillance and traffic information collection were compared.

Analysis of Defection Customer Using Customer Segmentation on Bank -Focusing on Personal Deposit- (은행고객 세분화를 통한 이탈고객 관리분석 -가계성 예금을 중심으로-)

  • 이건창;권순재;신경식
    • Journal of Intelligence and Information Systems
    • /
    • v.7 no.1
    • /
    • pp.177-197
    • /
    • 2001
  • This paper is aimed at proposing a data mining-driven analysis to manage the customer defection rate in the bank. After 1997 IMF crisis, Korean banks were suffering from hard-pressed restructuring. At the heart of such restructuring effects, there was the need to manage the customer more effectively than ever. So far, many banks in Korea used to a poor management of customers without any highly-skillful techniques. In line with this argument, we propose several data mining techniques to determine more effective technique far managing customer deflection. We applied three data mining techniques such as logit model, neural network, and C5.0. Experiment data were collected from personal deposit account data of a specific bank in Korea. After experiments, we found that C5.0 showed more robust performance compared to other two techniques. On the basis of those experiment results, we proposed customer defection management policy.

  • PDF

Web-Based Data Processing and Model Linkage Techniques for Agricultural Water-Resource Analysis (농촌유역 물순환 해석을 위한 웹기반 자료 전처리 및 모형 연계 기법 개발)

  • Park, Jihoon;Kang, Moon Seong;Song, Jung-Hun;Jun, Sang Min;Kim, Kyeung;Ryu, Jeong Hoon
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.57 no.5
    • /
    • pp.101-111
    • /
    • 2015
  • Establishment of appropriate data in certain formats is essential for agricultural water cycle analysis, which involves complex interactions and uncertainties such as climate change, social & economic change, and watershed environmental change. The main objective of this study was to develop web-based Data processing and Model linkage Techniques for Agricultural Water-Resource analysis (AWR-DMT). The developed techniques consisted of database development, data processing technique, and model linkage technique. The watershed of this study was the upper Cheongmi stream and Geunsam-Ri. The database was constructed using MS SQL with data code, watershed characteristics, reservoir information, weather station information, meteorological data, processed data, hydrological data, and paddy field information. The AWR-DMT was developed using Python. Processing technique generated probable rainfall data using non-stationary frequency analysis and evapotranspiration data. Model linkage technique built input data for agricultural watershed models, such as the TANK and Agricultural Watershed Supply (AWS). This study might be considered to contribute to the development of intelligent watercycle analysis by developing data processing and model linkage techniques for agricultural water-resource analysis.

Improving Neighborhood-based CF Systems : Towards More Accurate and Diverse Recommendations (추천의 정확도 및 다양성 향상을 위한 이웃기반 협업 필터링 추천시스템의 개선방안)

  • Kwon, YoungOk
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.3
    • /
    • pp.119-135
    • /
    • 2012
  • Among various recommendation techniques, neighborhood-based Collaborative Filtering (CF) techniques have been one of the most widely used and best performing techniques in literature and industry. This paper proposes new approaches that can enhance the neighborhood-based CF techniques by identifying a few best neighbors (the most similar users to a target user) more accurately with more information about neighbors. The proposed approaches put more weights to the users who have more items co-rated by the target user in similarity computation, which can help to better understand the preferences of neighbors and eventually improve the recommendation quality. Experiments using movie rating data empirically demonstrate simultaneous improvements in both recommendation accuracy and diversity. In addition to the typical single rating setting, the proposed approaches can be applied to the multi-criteria rating setting where users can provide more information about their preferences, resulting in further improvements in recommendation quality. We finally introduce a single metric that measures the balance between accuracy and diversity and discuss potential avenues for future work.