• Title/Summary/Keyword: Internet-based checking

Search Result 79, Processing Time 0.022 seconds

A Junk Mail Checking Model using Fuzzy Relational Products (퍼지관계곱을 이용한 내용기반 정크메일 분류 모델)

  • Park, Jeong-Seon;Kim, Chang-Min;Kim, Yong-Gi
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.10
    • /
    • pp.726-735
    • /
    • 2002
  • E-mail service has been a general method for communication as internet is widely used instead of post mails. Many companies have invested in e-mail advertisement as e-mail service is spread. E-mail advertisement has an advantage that it can consider personal characters. A lot of e-mail users have been given e-mails that they did not want to receive because their e-mail addresses were opened out to companies on internet. Therefore, they need junk mail checking systems and several e-mail service providers have supported junk mail filters. However, the junk mail filters can check the junk mail with constraint because they don't check the junk degree of mails by the contents of e-mail. This paper suggests a content-based junk mail checking model using fuzzy relational products. The process of the junk mail checking model using fuzzy relational products is as following: (1) analyzes semantic relation between junk words-base and e-mails, (2) checks the junk degree of the e-mail using the semantic relation, (3) checks the mails with SVJ(Standard Value of Junk) if those are junk mail or non-junk mail. The efficiency of the proposed technique is proved by comparing the junk degree of the e-mail and the number of junk mails that was checked by e-mail users and checked by the proposed junk mail checking model.

A Study for Implement of Generalize Valuation System for A Performance Assessment (학생 수행평가를 위한 종합평가 시스템 구현에 관한 연구)

  • Lee, Jin-Kwan;Jang, Hae-Suk;Lee, Jong-Chan;Park, Ki-Hong
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.97-106
    • /
    • 2006
  • We have been setting in The age of Ubiquitous that people are able to connect networks whenever and wherever by developing network. We can take any classes anytime we want even right checking out the result of a test through the internet with the spread of networks. The development of net-works has created WBI(Web Based Instruction) which has covered the limit of conservative education for instance, there are some content differences whenever a teacher teaches for each class, it is hard to take a lesson after having a certain period, the process of the class is changed as time goes by and so on. As the study of WBI is actively being worked in this moment, a various of class models are showing and materializing. In WBI, the exiting Objective Checking Assessment is applicable, some of the Performance Assessment which inspects and judges students' actual performance is Working whereas teachers who actually give them points don't have a embodied Performance Assessment Program. In this paper, I will present a Performance Assessment to use conveniently Performance Assessment Program not just students carrying out Performance Assessment using the internet but also teachers dealing with actual administrative works.

  • PDF

UML-based Quality Requirement Specifications and Design Traceability (UML 기반의 품질 요구 표현 및 설계 추적성 연구)

  • Seo, Dong-Su
    • Journal of Internet Computing and Services
    • /
    • v.10 no.1
    • /
    • pp.175-182
    • /
    • 2009
  • Less efforts has been made in developing specifications and verification techniques for quality requirements. This paper suggests specification and traceability methods supporting quality issues such as usability, performance, and understandability when developing information systems with UML notation. With traceability checking methods that augment quality extension to the use cases and sequence diagrams, developers can confirm the level of implementation for both functional and nonfunctional requirements beforehand.

  • PDF

Automated Detection of Cattle Mounting using Side-View Camera

  • Chung, Yongwha;Choi, Dongwhee;Choi, Heesu;Park, Daihee;Chang, Hong-Hee;Kim, Suk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.3151-3168
    • /
    • 2015
  • Automatic detection of estrus in cows is important in cattle management. This paper proposes a method of estrus detection by automatically checking cattle mounting. We use a side-view video camera and apply computer vision techniques to detect mounting behavior. In particular, we extract motion information to select a potential mount-up and mount-down motion and then verify the true mounting behavior by considering the direction, magnitude, and history of the mount motion. From experimental results using video data obtained from a Korean native cattle farm, we believe that the proposed method based on the abrupt change of a mounting cow's height and motion history information can be utilized for detecting mounting behavior automatically, even in the case of fence occlusion.

PDA System for Maximizing the Efficiency of Smart Pallet Based Rarts Delivery System (스마트 파렛트 기반 부품공급시스템의 운영 효율성 증대를 위한 PDA 시스템)

  • Lee, Young-Du;Koo, In-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.115-120
    • /
    • 2010
  • Products companies, which manufactures finished goods with modular parts, will expect that the proper parts should be delivered to assembly line not only just in time (JIT) but also just in sequence (JIS) and also expect that faulty goods will not be produced due to the delivery of wrong parts. In order to satisfy the above requirements, recently Smart Pallet based Parts Delivery system (SPPD) was proposed. SPPD system can overcome the drawback of bar code based part delivery system in which much time for checking proper and in sequence parts is wasted due to labors' working in hand as well as the drawback of RFID based part delivery system in which recognition distance of RFID is very limited. In the paper, a PDA system is proposed and further implemented to maximize the efficiency of SPPD's operation as well as to manage the limited power of smart pallets efficiently.

Design and Implementation of a Latency Efficient Encoder for LTE Systems

  • Hwang, Soo-Yun;Kim, Dae-Ho;Jhang, Kyoung-Son
    • ETRI Journal
    • /
    • v.32 no.4
    • /
    • pp.493-502
    • /
    • 2010
  • The operation time of an encoder is one of the critical implementation issues for satisfying the timing requirements of Long Term Evolution (LTE) systems because the encoder is based on binary operations. In this paper, we propose a design and implementation of a latency efficient encoder for LTE systems. By virtue of 8-bit parallel processing of the cyclic redundancy checking attachment, code block (CB) segmentation, and a parallel processor, we are able to construct engines for turbo codings and rate matchings of each CB in a parallel fashion. Experimental results illustrate that although the total area and clock period of the proposed scheme are 19% and 6% larger than those of a conventional method based on a serial scheme, respectively, our parallel structure decreases the latency by about 32% to 65% compared with a serial structure. In particular, our approach is more latency efficient when the encoder processes a number of CBs. In addition, we apply the proposed scheme to a real system based on LTE, so that the timing requirement for ACK/NACK transmission is met by employing the encoder based on the parallel structure.

Development of a Hybrid Recognition System Using Biometrics to Manage Smart Devices based on Internet of Things

  • Ban, Ilhak;Jo, Seonghun;Park, Haneum;Um, Junho;Kim, Se-Jin
    • Journal of Integrative Natural Science
    • /
    • v.11 no.3
    • /
    • pp.148-153
    • /
    • 2018
  • In this paper, we propose a hybrid-recognition system to obtain the state information and control the Internet of Things (IoT) based smart devices using two recognitions. First, we use a facial recognition for checking the owner of the mobile devices, i.e., smartphones, tablet PCs, and so on, and obtaining the state information of the IoT based smart devices, i.e., smart cars, smart appliance, and so on, and then we use a fingerprint recognition to control them. Further, in the conventional system, the message of the state and control information between the mobile devices and smart devices is only exchanged through the cellar mobile network. Thus, we also propose a direct communication to reduce the total transmission time. In addition, we develop a testbed of the proposed system using smartphones, desktop computers, and Arduino vehicle as one of the smart devices. We evaluate the total transmission time between the conventional and direct communications and show that the direct communication with the proposed system has better performance.

RPFuzzer: A Framework for Discovering Router Protocols Vulnerabilities Based on Fuzzing

  • Wang, Zhiqiang;Zhang, Yuqing;Liu, Qixu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.1989-2009
    • /
    • 2013
  • How to discover router vulnerabilities effectively and automatically is a critical problem to ensure network and information security. Previous research on router security is mostly about the technology of exploiting known flaws of routers. Fuzzing is a famous automated vulnerability finding technology; however, traditional Fuzzing tools are designed for testing network applications or other software. These tools are not or partly not suitable for testing routers. This paper designs a framework of discovering router protocol vulnerabilities, and proposes a mathematical model Two-stage Fuzzing Test Cases Generator(TFTCG) that improves previous methods to generate test cases. We have developed a tool called RPFuzzer based on TFTCG. RPFuzzer monitors routers by sending normal packets, keeping watch on CPU utilization and checking system logs, which can detect DoS, router reboot and so on. RPFuzzer' debugger based on modified Dynamips, which can record register values when an exception occurs. Finally, we experiment on the SNMP protocol, find 8 vulnerabilities, of which there are five unreleased vulnerabilities. The experiment has proved the effectiveness of RPFuzzer.

Best Practices on Validation and Extraction of Object oriented Designs with Code Visualization Tool-chain (코드 가시화 툴체인 기반 UML 설계 추출 및 검증 사례)

  • Lee, Won-Young;Kim, Robert YoungChul
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.79-86
    • /
    • 2022
  • This paper focuses on realizing design improvement and high quality through visualization of reverse engineering-based software. As new technologies and complex software emerge in various areas of the fourth industry in the future, software verification with both stability and reliability is becoming an issue. We propose a reverse engineering-based UML design extraction and visualization for high-quality software ranging from simple computational software to machine learning-based data-oriented software. Through this study, it is expected to improve software quality through design improvement by checking the accuracy of the target design and identifying the code complexity.

Photo Management Cloud Service Using Deep Learning

  • Kim, Sung-Dong;Kim, Namyun
    • International journal of advanced smart convergence
    • /
    • v.9 no.3
    • /
    • pp.183-191
    • /
    • 2020
  • Today, taking photos using smartphones has become an essential element of modern people. According to these social changes, modern people need a larger storage capacity, and the number of unnecessary photos has increased. To support the storage, cloud-based photo storage services from various platforms have appeared, and many people are using the services. As the number of photos increases, it is difficult for users to find the photos they want, and it takes a lot of time to organize. In this paper, we propose a cloud-based photo management service that facilitates photo management by classifying photos and recommending unnecessary photos using deep learning. The service provides the function of tagging photos by identifying what the subject is, the function of checking for wrongly taken photos, and the function of recommending similar photos. By using the proposed service, users can easily manage photos and use storage capacity efficiently.