• Title/Summary/Keyword: Network capabilities

Search Result 701, Processing Time 0.028 seconds

Inference System Fusing Rough Set Theory and Neuro-Fuzzy Network (Rough Set Theory와 Neuro-Fuzzy Network를 이용한 추론시스템)

  • Jung, Il-Hun;Seo, Jae-Yong;Yon, Jung-Heum;Cho, Hyun-Chan;Jeon, Hong-Tae
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.9
    • /
    • pp.49-57
    • /
    • 1999
  • The fusion of fuzzy set theory and neural networks technologies have concentrated on applying neural networks to obtain the optimal rule bases of fuzzy logic system. Unfortunately, this is very hard to achieve due to limited learning capabilities of neural networks. To overcome this difficulty, we propose a new approach in which rough set theory and neuro-fuzzy fusion are combined to obtain the optimal rule base from input/output data. Compared with conventional FNN, the proposed algorithm is considerably more realistic because it reduces overlapped data when construction a rule base. This results are applied to the construction of inference rules for controlling the temperature at specified points in a refrigerator.

  • PDF

DEEP-South: Round-the-Clock Physical Characterization and Survey of Small Solar System Bodies in the Southern Sky

  • Moon, Hong-Kyu;Kim, Myung-Jin;Roh, Dong-Goo;Park, Jintae;Yim, Hong-Suh;Choi, Young-Jun;Bae, Young-Ho;Lee, Hee-Jae;Oh, Young-Seok
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.41 no.1
    • /
    • pp.54.2-54.2
    • /
    • 2016
  • Korea Microlensing Telescope Network (KMTNet) is the first optical survey system of its kind in a way that three KMTNet observatories are longitudinally well-separated, and thus have the benefit of 24-hour continuous monitoring of the southern sky. The wide-field and round-the-clock operation capabilities of this network facility are ideal for survey and the physical characterization of small Solar System bodies. We obtain their orbits, absolute magnitudes (H), three dimensional shape models, spin periods and spin states, activity levels based on the time-series broadband photometry. Their approximate surface mineralogy is also identified using colors and band slopes. The automated observation scheduler, the data pipeline, the dedicated computing facility, related research activity and the team members are collectively called 'DEEP-South' (DEep Ecliptic Patrol of Southern sky). DEEP-South observation is being made during the off-season for exoplanet search, yet part of the telescope time is shared in the period between when the Galactic bulge rises early in the morning and sets early in the evening. We present here the observation mode, strategy, software, test runs, early results, and the future plan of DEEP-South.

  • PDF

Symmetric Inter-Communication Scheme among Mobile Objects in Wireless Sensor Networks (무선 센서 네트워크에서 이동 객체 간 대칭적인 상호 통신)

  • Kim, Sangdae;Kim, Cheonyong;Cho, Hyunchong;Yang, Taehun;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.2014-2025
    • /
    • 2015
  • Wireless Sensor Networks (WSNs) are special network which has purpose of usage for gathering information of certain area and observing situation. WSNs consist of small nodes with sensing event such as temperature, movement or certain objects. The sensor has the capabilities to collect data and route data back to the sink. The sensors route data either to other sensors or back to a sink in one direction. That is, traditional WSNs communicate asymmetrically. However, under the new paradigm of the Internet of Things (IoTs) or Cyber Physical system (CPS), WSNs have potential to be used as important area. So, more research is necessary to communicate with each moving objects symmetrically in WSNs. In this paper, we proposed symmetric communication scheme among mobile objects in wireless sensor network. Simulation results show that our scheme is superior th the existing ones in terms of energy consumption and transmission success ratio.

J-JDBS: Java Distributed Batch-processing System Using Jini (J-JDBS: Jini를 이용한 자바 분산 일괄처리 시스템)

  • Goo, Geon;Kim, JungSun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.39 no.1
    • /
    • pp.1-13
    • /
    • 2002
  • In Distributed Batch-processing Systems (DBSs), CPU-intensive jobs are automatically transferred and executed using idle computers across a network, there by increasing the resource usage and throughput. To be successful, the systems must guarantee the scalablility, fault-tolerance, and flexibility of dynamic configurations. In practice, however, it is very difficult to provide such capabilities in a non-deterministic environment in which the available set of resources is unpredictable because of network failures, computer failures, or voluntary withdrawal from a pool by a machine owner. In this paper, we present the design and implementation of the J-JDBS (Jini-based Java Distributed Batch-processing System) system which is based on the core Jini services like Discovery service, Lookup service, Lease service and etc. We show that the Jini core services can be very effectively used to build reliable, scalallle, fault-tolerant, and flexible DBS systems with little effort.

User Adaptation Using User Model in Intelligent Image Retrieval System (지능형 화상 검색 시스템에서의 사용자 모델을 이용한 사용자 적응)

  • Kim, Yong-Hwan;Rhee, Phill-Kyu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.12
    • /
    • pp.3559-3568
    • /
    • 1999
  • The information overload with many information resources is an inevitable problem in modern electronic life. It is more difficult to search some information with user's information needs from an uncontrolled flood of many digital information resources, such as the internet which has been rapidly increased. So, many information retrieval systems have been researched and appeared. In text retrieval systems, they have met with user's information needs. While, in image retrieval systems, they have not properly dealt with user's information needs. In this paper, for resolving this problem, we proposed the intelligent user interface for image retrieval. It is based on HCOS(Human-Computer Symmetry) model which is a layed interaction model between a human and computer. Its' methodology is employed to reduce user's information overhead and semantic gap between user and systems. It is implemented with machine learning algorithms, decision tree and backpropagation neural network, for user adaptation capabilities of intelligent image retrieval system(IIRS).

  • PDF

The Implementation of Real Time Communication Simulation using TMO in Distributed Network systems (분산네트워크시스템에서 TMO를 이용한 실시간 통신 시뮬레이션 구현)

  • Kim, Gwang-Jun;Seo, Jong-Joo;Kang, Ki-Woong;Yoon, Chan-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.5
    • /
    • pp.897-905
    • /
    • 2007
  • In this paper, we present a new framework and synchronization mechanism to effectively support developing real-time communication service by using a real-time object model named TMO (Time-Triggered Message-Triggered Object). Also, we describes the application environment as the DHS(distributed high-precision simulation) to guarantee real-time service message with TMO structure in distributed network systems. The TMO scheme is aimed for enabling a great reduction of the designer's effort in guaranteeing timely real-time communication service capabilities of among distributed multi-nodes systems. Our real-time framework provide the consistent construction and configuration of tine-triggered processing components across heterogeneous distributed object environment more easily. It has been formulated from the beginning with the objective of enabling design-time guaranteeing of timely action. In the real time simulation techniques based on TMO object modeling, we have observed several advantages to the TMO structuring scheme. TMO object modeling has a strong traceability between requirement specification and design.

Semantic Structure Represented in College Presidents' Welcome Greetings Using Network Analysis : Daegu & Gyeongbuk Provinces (연결망 분석을 활용한 대학 총장 인사말의 의미론적 구조: 대구·경북 지역을 중심으로)

  • Son, Ji-Hoon;Kim, Jae-Hun;Park, Han-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.9
    • /
    • pp.24-33
    • /
    • 2021
  • This study examined a semantic relationship expressed in college presidents' welcome greetings in order to explore the promotion strategies and future direction of universities in Daegu & Gyeongbuk provinces in South Korea. Greetings were collected from university websites as of September, 2020. According to word frequency analysis, "everyone," "welcome," and "visiting" were mostly used in the headlines. In the body texts, "college" and "education" were frequently paired. While the two- & three-year colleges focus on industrial and technical capabilities, four-year universities tend to emphasize educational excellence and academic research performance. This study is valuable in that it understands the direction that universities in Daegu and North Gyeongsang Province put forward amid the decreasing school-age population and the changing social environment.

Towards Integrating the Knowledge Management Mechanisms to Employ Innovation Factors within Universities: Critical Appraisal Study

  • Alsereihy, Hassan Awad M.;Harasani, Meshal Hesham
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.327-341
    • /
    • 2021
  • The knowledge management was considered as the inevitable result of the rule of knowledge in this era, and its importance became clear in being the main source for achieving success, the need to consider and manage knowledge as an independent field that must be addressed with a clear scientific methodology has become intangible - they are very valuable and a strategic asset. On the other hand, the innovation process relates to all parts of the organization, and helps to improve the behavioral patterns of individuals and their attitudes towards adopting modern and innovative ideas, it is a purposeful process adopted by the senior management and works to provide the capabilities and requirements for embodying the innovative behavior in it. In the field of dealing with the market, it is a product of the organization's innovative approach, which aims at advancement, change, and intended and organized renewal. The main objective of this article is to determine the most appropriate ways to integrate knowledge management mechanisms to employ innovation factors within universities based on the role of universities in supporting innovation. This was achieved through reviewing many relevant research and listing the most prominent concepts of knowledge management, its importance, objectives, and processes determining the stages of knowledge management application, the requirements for applying knowledge management, and the obstacles that impede its application; Then the statement "Innovation in universities, through which it addressed the concept of innovation, its importance, stages, and requirements for its application, as well as identifying the most prominent models of innovation, and obstacles to innovation, in addition to that the role of universities in supporting innovation will be identified. From the surveyed study done in this article, we concluded that the relationship among organizational culture, knowledge management and innovation capability can provide useful insights for managers regarding developing a strong culture, promote knowledge management practices effectively and eventually enhance the whole organization's innovation capability. Also, we found that different components of Knowledge Management as Knowledge activities, Knowledge types, transformation of knowledge and technology have a significant positive effect in bringing innovation through transformation of knowledge into knowledge assets in universities.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

User Dynamic Access Control Mechanism Using Smart Contracts in Blockchain Environment (블록체인 환경에서 스마트 컨트랙트를 활용한 사용자 동적 접근제어 메커니즘)

  • Cho, Do-Eun
    • Journal of Platform Technology
    • /
    • v.9 no.1
    • /
    • pp.46-57
    • /
    • 2021
  • Recently, research has been actively conducted to utilize blockchain technology in various fields. In particular, blockchain-based smart contracts are applied to various automation systems that require reliability as they have the characteristics of recording data in a distributed ledger environment to verify the integrity and validity of data. However, blockchain does not provide data access control and information security because data is shared among network participants. In this paper, we propose a user dynamic access control mechanism utilizing smart contracts in blockchain environments. The proposed mechanism identifies the user's contextual information when accessing data, allocating the user's role and dynamically controlling the data access range. This can increase the security of the system and the efficiency of data management by granting data access dynamically at the time of user authentication, rather than providing the same services in roles assigned to each user group of the network system. The proposed mechanism is expected to provide flexible authentication capabilities through dynamic data access control by users to enhance the security of data stored within blockchain networks.