• Title/Summary/Keyword: Multi-Target Information Management

Search Result 45, Processing Time 0.027 seconds

Design of Efficient Hacking Prevention Systems Using a Smart Card (스마트카드 기반의 효율적인 해킹 방지 시스템 설계)

  • 황선태;박종선
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.179-190
    • /
    • 2004
  • This paper describes the design of hacking prevention systems using a smart card. It consists of two parts, i.e., PC authentication and Keyboard-buffer hacking prevention. PC authentication function is a procedure to handle the access control to the target PC. The card's serial number is used for PIN(Personal Identification Number) and is converted into hash-code by SHA-1 hash-function to verify the valid users. The Keyboard-buffer hacking prevention function converts the scan codes into the encoded forms using RSA algorithm on the Java Card, and puts them into the keyboard-buffer to protect from illegal hacking. The encoded information in the buffer is again decoded by the RSA algorithm and displayed on the screen. in this paper, we use RSA_PKCS#1 algorithm for encoding and decoding. The reason using RSA technique instead of DES or Triple-DES is for the expansion to multi-functions in the future on PKI. Moreover, in the ubiquitous computing environment, this smart card security system can be used to protect the private information from the illegal attack in any computing device anywhere. Therefore, our security system can protect PC user's information more efficiently and guarantee a legal PC access authority against any illegal attack in a very convenient way.

  • PDF

Decision Support System for Determination of Types and Locations of Low Impact Development Practices

  • Abdulai, Patricia Jitta;Song, Jae Yeol;Chung, Eun-Sung
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.181-181
    • /
    • 2017
  • Low impact development (LID) practices has become important to mitigate the damage from natural disasters in urban areas. Thereby many hydrological simulation models can simulate the hydrological impact of LID practices. However, commonly used models are not able to provide specific information to most users such as where LIDs should be placed and what kind of LID should be designed. In this study, a decision support system which can be used with the EPA's SWMM was developed for the determination of LID types and locations of LID practices, named Water Management Prioritization Module (WMPM), was applied to a urbanized university campus. Eight sub-catchments were selected as feasible candidate areas for the planning of LID practices. Pre-designated infiltration trenches and permeable pavements were applied to each selected sub-catchments, followed by peak and total runoffs comparison between before/after planning of LIDs. Moreover, TOPSIS, one of a multi-criteria decision analysis method was used in the procedure of selecting target sub-catchment areas and final prioritization of LID types and locations. As a result, sub-catchments S4 with permeable pavements and S16 with infiltration trenches has shown the most decrease in total and peak runoffs, respectively. Therefore, WMPM was found to be effective in determining the best alternative among various scenarios generated and simulated.

  • PDF

Design and Implementation for Efficient Multi Version ADS-B Target Report Message Processing (효율적인 다중 버전 ADS-B 타깃 리포트 메시지 처리를 위한 모듈 설계 및 구현)

  • Kim, Kanghee;Jang, Eunmee;Song, Inseong;Cho, Taehwan;Choi, Sangbang
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.4
    • /
    • pp.265-277
    • /
    • 2015
  • Automatic dependent surveillance-broadcast (ADS-B) is the core technology of communication, navigation and surveillance/air traffic management (CNS/ATM), automatically broadcasts its own position information using GNSS and has an advantage of lower geological constraints and faster update speed compared with legacy radar systems. EUROCONTROL defined all purpose structured eurocontrol surveillance information exchange (ASTERIX) CAT.021. ASTERIX CAT.021 is modified several times, but it has compatibility issues with previous version of it. In this paper, we have designed an efficient message processing module regardless of the version of ASTERIX CAT.021. This implemented module generates patterns to collect messages received from the network, after that, received messages are processed in the routine that is defined in accordance with the patterns.

Extended Forecasts of a Stock Index using Learning Techniques : A Study of Predictive Granularity and Input Diversity

  • Kim, Steven H.;Lee, Dong-Yun
    • Asia pacific journal of information systems
    • /
    • v.7 no.1
    • /
    • pp.67-83
    • /
    • 1997
  • The utility of learning techniques in investment analysis has been demonstrated in many areas, ranging from forecasting individual stocks to entire market indexes. To date, however, the application of artificial intelligence to financial forecasting has focused largely on short predictive horizons. Usually the forecast window is a single period ahead; if the input data involve daily observations, the forecast is for one day ahead; if monthly observations, then a month ahead; and so on. Thus far little work has been conducted on the efficacy of long-term prediction involving multiperiod forecasting. This paper examines the impact of alternative procedures for extended prediction using knowledge discovery techniques. One dimension in the study involves temporal granularity: a single jump from the present period to the end of the forecast window versus a web of short-term forecasts involving a sequence of single-period predictions. Another parameter relates to the numerosity of input variables: a technical approach involving only lagged observations of the target variable versus a fundamental approach involving multiple variables. The dual possibilities along each of the granularity and numerosity dimensions entail a total of 4 models. These models are first evaluated using neural networks, then compared against a multi-input jump model using case based reasoning. The computational models are examined in the context of forecasting the S&P 500 index.

  • PDF

A Receiver-Aided Seamless And Smooth Inter-RAT Handover At Layer-2

  • Liu, Bin;Song, Rongfang;Hu, Haifeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4015-4033
    • /
    • 2015
  • The future mobile networks consist of hyper-dense heterogeneous and small cell networks of same or different radio access technologies (RAT). Integrating mobile networks of different RATs to provide seamless and smooth mobility service will be the target of future mobile converged network. Generally, handover from high-speed networks to low-speed networks faces many challenges from application perspective, such as abrupt bandwidth variation, packet loss, round trip time variation, connection disruption, and transmission blackout. Existing inter-RAT handover solutions cannot solve all the problems at the same time. Based on the high-layer convergence sublayer design, a new receiver-aided soft inter-RAT handover is proposed. This soft handover scheme takes advantage of multihoming ability of multi-mode mobile station (MS) to smooth handover procedure. In addition, handover procedure is seamless and applicable to frequent handover scenarios. The simulation results conducted in UMTS-WiMAX converged network scenario show that: in case of TCP traffics for handover from WiMAX to UMTS, not only handover latency and packet loss are eliminated completely, but also abrupt bandwidth/wireless RTT variation is smoothed. These delightful features make this soft handover scheme be a reasonable candidate of mobility management for future mobile converged networks.

Separation of Dynamic RCS using Hough Transform in Multi-target Environment (허프 변환을 이용한 다표적 환경에서 동적 RCS 분리)

  • Kim, Yu-Jin;Choi, Young-Jae;Choi, In-Sik
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.9
    • /
    • pp.91-97
    • /
    • 2019
  • When a radar tracks the warhead of a ballistic missile, decoys of a ballistic missile put a heavy burden on the radar resource management tracking the targets. To reduce this burden, it is necessary to be able to separate the signal of the warhead from the received dynamic radar cross section (RCS) signal on the radar. In this paper, we propose the method of separating the dynamic RCS of each target from the received signal by the Hough transform which extracts straight lines from the image. The micro motion of the targets was implemented using a 3D CAD model of the warhead and decoys. Then, we calculated the dynamic RCS from the 3D CAD model having micromotion and verified the performance by applying the proposed algorithm. Simulation results show that the proposed method can separate the signals of the warhead and decoys at the signal-to-noise ratio (SNR) of 10dB.

An Image Processing Algorithm for Detection and Tracking of Aerial Vehicles in Short-Range (무인항공기의 근거리 비행체 탐지 및 추적을 위한 영상처리 알고리듬)

  • Cho, Sung-Wook;Huh, Sung-Sik;Shim, Hyun-Chul;Choi, Hyoung-Sik
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.39 no.12
    • /
    • pp.1115-1123
    • /
    • 2011
  • This paper proposes an image processing algorithms for detection and tracking of aerial vehicles in short-range. Proposed algorithm detects moving objects by using image homography calculated from consecutive video frames and determines whether the detected objects are approaching aerial vehicles by the Probabilistic Multi-Hypothesis Tracking method(PMHT). This algorithm can perform better than simple color-based detection methods since it can detect moving objects under complex background such as the ground seen during low altitude flight and consider the characteristics of vehicle dynamics. Furthermore, it is effective for the flight test due to the reduction of thresholding sensitivity against external factors. The performance of proposed algorithm is verified by applying to the onboard video obtained by flight test.

An Improvement of FSDD for Evaluating Multi-Dimensional Data (다차원 데이터 평가가 가능한 개선된 FSDD 연구)

  • Oh, Se-jong
    • Journal of Digital Convergence
    • /
    • v.15 no.1
    • /
    • pp.247-253
    • /
    • 2017
  • Feature selection or variable selection is a data mining scheme for selecting highly relevant features with target concept from high dimensional data. It decreases dimensionality of data, and makes it easy to analyze clusters or classification. A feature selection scheme requires an evaluation function. Most of current evaluation functions are based on statistics or information theory, and they can evaluate only for single feature (one-dimensional data). However, features have interactions between them, and require evaluation function for multi-dimensional data for efficient feature selection. In this study, we propose modification of FSDD evaluation function for utilizing evaluation of multiple features using extended distance function. Original FSDD is just possible for single feature evaluation. Proposed approach may be expected to be applied on other single feature evaluation method.

Inferring Undiscovered Public Knowledge by Using Text Mining-driven Graph Model (텍스트 마이닝 기반의 그래프 모델을 이용한 미발견 공공 지식 추론)

  • Heo, Go Eun;Song, Min
    • Journal of the Korean Society for information Management
    • /
    • v.31 no.1
    • /
    • pp.231-250
    • /
    • 2014
  • Due to the recent development of Information and Communication Technologies (ICT), the amount of research publications has increased exponentially. In response to this rapid growth, the demand of automated text processing methods has risen to deal with massive amount of text data. Biomedical text mining discovering hidden biological meanings and treatments from biomedical literatures becomes a pivotal methodology and it helps medical disciplines reduce the time and cost. Many researchers have conducted literature-based discovery studies to generate new hypotheses. However, existing approaches either require intensive manual process of during the procedures or a semi-automatic procedure to find and select biomedical entities. In addition, they had limitations of showing one dimension that is, the cause-and-effect relationship between two concepts. Thus;this study proposed a novel approach to discover various relationships among source and target concepts and their intermediate concepts by expanding intermediate concepts to multi-levels. This study provided distinct perspectives for literature-based discovery by not only discovering the meaningful relationship among concepts in biomedical literature through graph-based path interference but also being able to generate feasible new hypotheses.

A Study on Application of Test Bed for Verification of Realistic Fire Management Technology (실감형 화재관리기술 검증을 위한 테스트베드 적용방안 연구)

  • Choi, Woo-Chul;Kim, Tae-Hoon;Youn, Joon-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.745-753
    • /
    • 2021
  • Recently, a large fire occurred in a multi-use facility used by a large number of citizens, including the vulnerable, resulting in a lot of injuries and damages. Although several pilot studies have been conducted to reduce such incidents, the development of advanced disaster response technology using the latest spatial information and IoT technology is still insufficient. In this study, a pilot test bed is built to demonstrate detailed technologies derived through the first stage of realistic fire management technology research for the development of applied technology in the field. In detail, the building conditions and candidate sites of the test bed were first investigated and analyzed to derive satisfactory conditions and candidate target buildings. A second pilot test bed was then selected, and the necessary sensor and facility infrastructure were built to demonstrate the outcomes. Finally, a scenario was produced for technology verification, and a test bed system was developed. The pilot test bed is expected to contribute to verifying intermediate outcomes of realistic fire management research projects, enhancing the quality of the developed technologies.