• Title/Summary/Keyword: Multi-Attributes

Search Result 378, Processing Time 0.038 seconds

A Tool to Support Efficient Development of Node Software for Various Operating System Platforms in Sensor Network Environment (센서 네트워크 환경에서 다양한 운영체제 플랫폼을 위한 노드 소프트웨어의 효율적인 개발을 지원하는 도구)

  • Lee, Woo-Jin;Choi, Il-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.7
    • /
    • pp.4536-4544
    • /
    • 2014
  • This paper proposes a development tool to efficiently develop node software for various operating system platforms in a sensor network. The proposed tool consisted of several modules, such as writing graphical model diagram, PIM and PSM design, code generation, and deployment file generation. Through the proposed tool, the users can graphically draw a sensor network model and design the PIM and PSM of the node software by setting the values of the predefined attributes. The source code of the node software is generated automatically from the PSM using the code templates of the target platform. The deployment files for installing node software on each node are generated automatically. The proposed tool helps the users to develop node software easily for a range of target platforms, even though they do not have details of the low-level information for a sensor network.

Decision Model of the Effectiveness for Advanced that Security Visualization (발전된 보안 시각화 효과성 결정 모델)

  • Lee, Min-Sun;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.147-162
    • /
    • 2017
  • With the advent of various services and devices in the change of IT environment, increasing the complexity of the data, and increasing scale of IT, Many organizations are experiencing the difficulty of analyzing and processing with a large amounts of data for security situations awareness. Therefore, propose the enhancement of security situational awareness through visualization in order to solve the problems of slow response and security situational awareness in organizational risk management. In this paper, we selected the evaluation factors and alternatives for effective visualization by considering user type, situational awareness step, and information visualization attributes through various studies on visualization. And established AHP layer model. Based on this, by using the AHP method for solving the problem of multi-criteria decision making, by calculating the factors for effectively visualizing and the importance of alternative by factor, try to propose a visualization method that can improve the effectiveness of the security situational awareness according to the purpose of visualization and the type of user.

Web-based Geovisualization System of Oceanographic Information using Dynamic Particles and HTML5 (동적 파티클과 HTML5를 이용한 웹기반 해양정보 가시화시스템)

  • Kim, Jinah;Kim, Sukjin
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.12
    • /
    • pp.660-669
    • /
    • 2017
  • In order to improve user accessibility and interactivity, system scalability, service speed, and a non-standard internet web environment, we developed a Web-based geovisualization system of oceanographic information using HTML5 and dynamic particles. In particular, oceanographic and meteorological data generated from a satellite remote sensing and radar measurement and a 3-dimensioanl numerical model, has the characteristics of a heterogeneous large-capacity multi-dimensional continuous spatial and temporal variability, based on geographic information. Considering those attributes, we applied dynamic particles represent the spatial and temporal variations of vector type oceanographic data. HTML5, WebGL, Canvas, D3, and Leaflet map libraries were also applied to handle various multimedia data, graphics, map services, and location-based service as well as to implement multidimensional spatial and statistical analyses such as a UV chart.

National Comparative Study on the Technology Ecosystem of the Smart Surgical Medical System: Focused on the Patent Data Analysis (스마트 수술 의료시스템 기술 생태계에 대한 국가 간 비교 연구: 특허 데이터 분석을 중심으로)

  • Sawng, Yeong-wha;Choi, Jinwoo;Joung, Seokin;Lim, Seonyeong
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.1
    • /
    • pp.125-145
    • /
    • 2020
  • We explore technology ecosystem of smart surgical medical system by analyzing patent data applied for in Korea and Japan. First, a review of trends of patent application by country/technological domain show that there exist a minority of technology domains focused on R&D, which represent their trends have been increasingly active. Also, while a number of Japanese firms mainly consist of the patent market of Japan, in case of the Korean market, a few universities, SMEs, and foreign firms are found to be the main applicants. As a result of the network analysis with the links as the relations of co-patenting, the relationships, which are active of convergence and knowledge spillover among the heterogeneous technology domains within each market, as well as the technology domains, which are the most active in international cooperation among each homogeneous domain, could get derived and visualized in the ecosystem. In addition, the technology domains in each patent market with leading locations, roles, and influence in the network can also be identified through the centrality analysis. In this study, the analysis for technology competitiveness are carried out focusing on patent activity and patent impact. The results denote that across all domains, the Japanese market may possess higher patent activity and patent impact compared to the Korean market. In consequence, we derive the position map for comparison by country and technology domain from a perspective considering comprehensively the multi-dimensional attributes based on the results of both network analysis and technology competitiveness.

Advanced Mandatory Authentication Architecture Designed for Internet Bank (인터넷은행을 위한 개선된 본인확인 구조)

  • Hong, Ki-seok;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1503-1514
    • /
    • 2015
  • Non-face-to-face real name verification policy that financial authorities announced, in order to secure a face-to-face or more of accuracy, are in principle of multi check. The business model and legal entities of Internet banks is different from existing Internet banking. Relpacing real name verification from face-to-facd to non-face-to-face while maintaining the structure of identification can not only cause inconvenience to a first time member, but also can be more vulnerable to verious security risks. In this study, to evaluate a service level of a bank of the Internet, and provide an improved identification of the structure such that the registration and use of differentiated services is performed in accordance with the evaluation. In addition, the security that may occur with respect to Bank of the Internet to establish a vulnerability and attack model, the results of the analysis of the safety of the step-by-step security attributes and services of the authentication medium of each attack model, existing the safer than Internet banking, confirmed the usefulness in user registration guide.

An efficient access control techniques between different IoT devices in a cloud environment (클라우드 환경에서 서로 다른 IoT 장치간 효율적인 접근제어 기법)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.57-63
    • /
    • 2018
  • IoT devices are used in many areas to perform various roles and functions in a cloud environment. However, a method of access control that can stably control the IoT device has not been proposed yet. In this paper, we propose a hierarchical multi-level property access control scheme that can perform stable access of IoT devices used in a cluster environment. In order to facilitate the access of the IoT device, the proposed method not only provides the ID key (security token) unique to the IoT device by providing the IoT Hub, but also allows the IoT Hub to authenticate the X.509 certificate and the private key, So that the private key of the IoT device can not be seen outside the IoT device. As a result of the performance evaluation, the proposed method improved the authentication accuracy by 10.5% on average and the processing time by 14.3%. The overhead of IoT Hub according to the number of IoT attributes was 9.1% lower than the conventional method.

The Characteristics of Lifestyles of Health and Sustainability (LOHAS) Fashion by Design Types (로하스 패션 디자인 유형에 따른 특성 연구)

  • Park, Hye-Won;Cho, Min-Young
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.33 no.10
    • /
    • pp.1575-1589
    • /
    • 2009
  • Lifestyles of Health and Sustainability (LOHAS) is based on environmental social responsibility and has become important factor in fashion trends. This study was to correct the types of LOHAS fashion design systems and to analyze attributes based on a case study of LOHAS in the fashion industry and the inquiry into leading studies. This study was carried out and the visual research material was analyzed based on the data of: Internet sites and mediums of communication (literature in the field of design, newspaper, magazines, and TV); after the year 2000 a preceding study about LOHAS also provides a new concept. In addition, the types of LOHAS fashion design were arranged and considered based on analyzed special qualities of a LOHAS the notion. The types of LOHAS fashion design that could be divided into nine patterns are 1) environmentally friendly material practical use 2) re-design 3) message transmission 4) nature motive practical use 5) multi-function design 6) retrenchment design 7) the higher sensitivity pursuit design 8) order production 9) society-morals design. In addition, LOHAS fashion did not appear in any single emphasized special quality of independent type among these, but appeared as a mutually united special feature based on the consciousness of society-morals. It is known that expression is possible to combine into one fashion design with various types and it is possible for various uses.

A Vector Tagging Method for Representing Multi-dimensional Index (다차원 인덱스를 위한 벡터형 태깅 연구)

  • Jung, Jae-Youn;Zin, Hyeon-Cheol;Kim, Chong-Gun
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.9
    • /
    • pp.749-757
    • /
    • 2009
  • A Internet user can easily access to the target information by web searching using some key-words or categories in the present Internet environment. When some meta-data which represent attributes of several data structures well are used, then more accurate result which is matched with the intention of users can be provided. This study proposes a multiple dimensional vector tagging method for the small web user group who interest in maintaining and sharing the bookmark for common interesting topics. The proposed method uses vector tag method for increasing the effect of categorization, management, and retrieval of target information. The vector tag composes with two or more components of the user defined priority. The basic vector space is created time of information and reference value. The calculated vector value shows the usability of information and became the metric of ranking. The ranking accuracy of the proposed method compares with that of a simply link structure, The proposed method shows better results for corresponding the intention of users.

The Case Study of Foreign Scenery Inventory Map and the Applicability of Domestic - focused on macro inventory map - (자연경관 경관도의 국외사례 및 국내 적용가능성 연구 - 거시적 경관관리도를 중심으로 -)

  • Joo, Shin-Ha;Lee, Song-Hee
    • Journal of Korean Society of Rural Planning
    • /
    • v.17 no.3
    • /
    • pp.103-111
    • /
    • 2011
  • The purpose of this study is to review foreign scenic inventory map for the systematic management of natural scenic resources. Several foreign cases were surveyed and analyzed to apply the scenery inventory map in domestic, such as Visual Resource Management(VRM) from United States Bureau of Land Management, Scenery Management System(SMS) from USDA Forest Service and Visual Landscape Inventory(VLI) from British Columbia Ministry of Forest's, that were already established scenery inventory maps. The results are as follows. First, the characteristic of Korean landscape is quite a different from those of north american's, which is much smaller and more complex in topography and land use. So, it would be difficult to apply foreign system directly and we need more researches to our own system. The multi-stepped landscape unit system is highly recommended. Second, scenic quality could be estimated by the pre-built database, such as land forms, vegetation, hydrology and land uses. Historical and cultural attributes should be complemented. Third, existing scenic integrity could be grasped by scenic damage, landscape alteration caused by human activities and land exfoliation. Also, subjective evaluation method should be supplemented by objective criteria through further detailed studies. Finally, about landscape view conditions, landscape control points should be surveyed and established in advance, and viewing distance, viewing frequency, amount of observers and public interests should be considered.

Suggestion of Weighted Utopian Approach for Combining Weighting Methods and Utopian Approach (가중치 산정기법과 Utopian Approach를 결합한 Weighted Utopian Approach의 제안)

  • Yoo, Do-Guen;Jun, Hwan-Don;Jung, Dong-Hwi;Kim, Joong-Hoon
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.10 no.4
    • /
    • pp.119-125
    • /
    • 2010
  • The most important part in the decision making is to decide the weight of attributes which indicate the relative importance of the properties to be estimated with different criteria respectively. In this study, the new MCDM method which consider typical preexisting methods all together is proposed. For doing those, Weighted Utopian Approach is newly suggested by combining typical 7 weighting methods and distance-based Utopian Approach which is one of the MCDM methods. The suggested method has the advantage of accomplishing representativeness and universality of the MCDM methods because it incorporates multiple weighting methods of diverse characteristics. It also yields not only the one final result but also the results calculated from each weighting method, broadening the options of the choice to the alternatives. The application of the new model to virtual engineering problems show that we can perform the decision making and the assessment of priority order more objectively with it and that it has high applicability to the practice, giving us simple calculation process.