• Title/Summary/Keyword: Research Information Systems

Search Result 12,224, Processing Time 0.05 seconds

Formation of Nearest Neighbors Set Based on Similarity Threshold (유사도 임계치에 근거한 최근접 이웃 집합의 구성)

  • Lee, Jae-Sik;Lee, Jin-Chun
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.2
    • /
    • pp.1-14
    • /
    • 2007
  • Case-based reasoning (CBR) is one of the most widely applied data mining techniques and has proven its effectiveness in various domains. Since CBR is basically based on k-Nearest Neighbors (NN) method, the value of k affects the performance of CBR model directly. Once the value of k is set, it is fixed for the lifetime of the CBR model. However, if the value is set greater or smaller than the optimal value, the performance of CBR model will be deteriorated. In this research, we propose a new method of composing the NN set using similarity scores as themselves, which we shall call s-NN method, rather than using the fixed value of k. In the s-NN method, the different number of nearest neighbors can be selected for each new case. Performance evaluation using the data from UCI Machine Learning Repository shows that the CBR model adopting the s-NN method outperforms the CBR model adopting the traditional k-NN method.

  • PDF

A method of sensor data stream processing based on RFID middleware (RFID 미들웨어 기반 센서 데이터 스트림 처리 방법)

  • Yang, Moon-Seok;Byun, Yung-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.2
    • /
    • pp.231-239
    • /
    • 2008
  • USN and RFID, as new technologies for realization of ubiquitous computing, are closely related with each other technically. Nevertheless, these technologies are recognized as a separate research topic, and there are few researches on technical convergence of the two research areas. In this paper, we propose an efficient processing method of various kinds of sensor data which are used in USN environment to provide efficiency from the view point of not only convergence of USN and RFID technologies but also cost and extensibility. Especially, we propose a method of conversion of various sensor data into EPC data format which can be handled in a RFID middleware. Using the proposed method, RFID middleware systems based on international standard specification can handle not only RFID tag data but also general sensor data efficiently, and various types of ubiquitous application services can be implemented at low cost and in a short time.

An Energy- Efficient Optimal multi-dimensional location, Key and Trust Management Based Secure Routing Protocol for Wireless Sensor Network

  • Mercy, S.Sudha;Mathana, J.M.;Jasmine, J.S.Leena
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3834-3857
    • /
    • 2021
  • The design of cluster-based routing protocols is necessary for Wireless Sensor Networks (WSN). But, due to the lack of features, the traditional methods face issues, especially on unbalanced energy consumption of routing protocol. This work focuses on enhancing the security and energy efficiency of the system by proposing Energy Efficient Based Secure Routing Protocol (EESRP) which integrates trust management, optimization algorithm and key management. Initially, the locations of the deployed nodes are calculated along with their trust values. Here, packet transfer is maintained securely by compiling a Digital Signature Algorithm (DSA) and Elliptic Curve Cryptography (ECC) approach. Finally, trust, key, location and energy parameters are incorporated in Particle Swarm Optimization (PSO) and meta-heuristic based Harmony Search (HS) method to find the secure shortest path. Our results show that the energy consumption of the proposed approach is 1.06mJ during the transmission mode, and 8.69 mJ during the receive mode which is lower than the existing approaches. The average throughput and the average PDR for the attacks are also high with 72 and 62.5 respectively. The significance of the research is its ability to improve the performance metrics of existing work by combining the advantages of different approaches. After simulating the model, the results have been validated with conventional methods with respect to the number of live nodes, energy efficiency, network lifetime, packet loss rate, scalability, and energy consumption of routing protocol.

Assessment of Upland Drought Using Soil Moisture Based on the Water Balance Analysis (물수지 기반 지역별 토양수분을 활용한 밭가뭄 평가)

  • Jeon, Min-Gi;Nam, Won-Ho;Yang, Mi-Hye;Mun, Young-Sik;Hong, Eun-Mi;Ok, Jung-Hun;Hwang, Seonah;Hur, Seung-Oh
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.63 no.5
    • /
    • pp.1-11
    • /
    • 2021
  • Soil moisture plays a critical role in hydrological processes, land-atmosphere interactions and climate variability. It can limit vegetation growth as well as infiltration of rainfall and therefore very important for agriculture sector and food protection. Recently, due to the increased damage from drought caused by climate change, there is a frequent occurrence of shortage of agricultural water, making it difficult to supply and manage stable agricultural water. Efficient water management is necessary to reduce drought damage, and soil moisture management is important in case of upland crops. In this study, soil moisture was calculated based on the water balance model, and the suitability of soil moisture data was verified through the application. The regional soil moisture was calculated based on the meteorological data collected by the meteorological station, and applied the Runs theory. We analyzed the spatiotemporal variability of soil moisture and drought impacts, and analyzed the correlation between actual drought impacts and drought damage through correlation analysis of Standardized Precipitation Index (SPI). The soil moisture steadily decreased and increased until the rainy season, while the drought size steadily increased and decreased until the rainy season. The regional magnitude of the drought was large in Gyeonggi-do and Gyeongsang-do, and in winter, severe drought occurred in areas of Gangwon-do. As a result of comparative analysis with actual drought events, it was confirmed that there is a high correlation with SPI by each time scale drought events with a correlation coefficient.

A Study on Implementation of Remote Control System using Wireless Technologies (무선통신을 이용한 원격제어 기술 구현)

  • Jang, Dong-won;Cho, In-Kwee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.307-309
    • /
    • 2016
  • This paper present about the system for sensing and controlling a wireless power transfer system using bluetooth protocol in robot, healthcare, smart-grid, and autonomous car. Recently a variety of applications using the Internet of Things (Internet of Things) and machine to machine (Machine to Machine) have been raised in many industries. To do this, it requires the fusion technology which is constituted with control, computing and networking. Embedded system is centered existing control system and Cyber Physical System(CPS) is the systems which was converged of a computing technologies using a wired or wireless network. CPS was adopted in the future government-led technology in the United States and Europe and is being pursued in cooperation with institutes, industries, and academia. In this paper, we implement and describe a technique for controlling the system for transmitting power wirelessly by sensing method using the matching of CPS technology concepts.

  • PDF

Derivation of Security Requirements for Cloud Managing Security Services System by Threat Modeling Analysis (위협 모델링 분석에 의한 클라우드 보안관제시스템 보안요구사항 도출)

  • Jang, Hwan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.5
    • /
    • pp.145-154
    • /
    • 2021
  • Recently, the introduction of Cloud Managing Security Services System to respond to security threats in cloud computing environments is increasing. Accordingly, it is necessary to analyze the security requirements for the Cloud Managing Security Services System. However, the existing research has a problem that does not reflect the virtual environment of the cloud and the data flow of the Cloud Managing Security Services System in the process of deriving the requirements. To solve this problem, it is necessary to identify the information assets of the Cloud Managing Security Services System in the process of threat modeling analysis, visualize and display detailed components of the cloud virtual environment, and analyze the security threat by reflecting the data flow. Therefore, this paper intends to derive the security requirements of the Cloud Managing Security Services System through threat modeling analysis that is an improved existing research.

Design and Implementation of Mode S EXTENDED SQUITTER Demodulator (Mode S 확장 스퀴터 수신기 복조부 설계 및 구현)

  • Shin, Hee-sung;Yoon, Jun-chul;Seo, Jong-deok;Choi, Sang-bang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.189-192
    • /
    • 2014
  • Recently, U.S. and Europe, which are advanced to Air Traffic Control Management, are interest in replacing Radar System with Communications, Navigation and Surveillance(CNS) and Air Traffic Management(ATM). They pursue to research the efficient Air Traffic Control Management. This paper covers ADS-B 1090ES system which is one of CNS/ATM surveillance systems. This research satisfied all performance required by RTCA DO-268B and EUROCAE ED-129. It optimized algorism to mainly enhance performance such as quality of receiver signal, dynamic range, and so on. The optimized mechanism provided stable performance of demodulation, tuned the level of signal, and had reduced the false reception ratio by the signal level difference. The analyzed algorism helped great performance and will be considered to apply broad system applications.

  • PDF

Development and Research of SMT(Smart Monitor Target) Game Interface for Airsoft Gun Users (AirSoft Gun 사용자를 위한 SMT(Smart Monitor Target)게임 인터페이스 개발 연구)

  • Chung, Ju Youn;Kang, Yun Geuk
    • Journal of Information Technology Applications and Management
    • /
    • v.28 no.1
    • /
    • pp.83-93
    • /
    • 2021
  • The purpose of this study was to develop a personalized SMT (smart monitor target) game interface for game users who enjoy airsoft sports as individual purchases of SMT have increased since the advent of the untouched era. For this study, the UX (user experience) of the game interface was designed based on previous research. In particular, the personalized game service was reinforced by adding the CP (command post) of the SMT system that performs the home function of the console game, which was intended to help the user maintain immersed in the game in the personalized space of the SMT. Major design elements for the SMT game interface included layout, color, graphics, buttons, and text, and the interface design was proceeded based on them. After composing a grid with a layout in which the tab function was applied to the interface with a vertical three-segment structure and the outer margin value secured, the military camouflage pattern and texture were applied to the colored tone to perform graphics work. Targets and thumbnails were produced as illustrations using experts to ensure the consistency of the interface, and then function buttons and texts on each page were used concisely for intuitive information delivery. The design sources organized in this way were developed using the Unity engine. In the future, we hope that game user-centered personalized interfaces will continue to develop and provide differentiated services unique to SMT systems in the airsoft gun market.

Vessel and Navigation Modeling and Simulation based on DEVS Formalism : Case Studies in Collision Avoidance Simulation of Vessels by COLREG (DEVS 형식론 기반의 선박 항해 모델링 및 시뮬레이션 (II) : COLREG 기반 선박 충돌회피 시뮬레이션을 통한 사례연구)

  • Hwang, Hun-Gyu;Woo, Sang-Min;Lee, Jang-Se
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1700-1709
    • /
    • 2019
  • Recently, many researches have been under way to develop systems (services) to support the safety navigation of ships, and in these studies, common difficulties have been encountered in assessing the usefulness and effectiveness of the developed system. To solve these problems, we propose the DEVS-based ship navigation modeling and simulation technique. Following the preceding study, we analyze the COLREG rules and reflected to officer and helmsman agent models for decision making. Also we propose estimation and interpolation techniques to adopt the motion characteristics of the actual vessel to simulation. In addition, we implement the navigation simulation system to reflect the designed proposed methods, and we present five-scenarios to verify the developed simulation system. And we conduct simulations according to each scenario and the results were reconstructed. The simulation results confirm that the components modelled in each scenario enable to operate according to the navigation relationships.

Development of X-Ray Array Detector Signal Processing System (X-Ray 어레이 검출 모듈 신호처리 시스템 개발)

  • Lim, Ik-Chan;Park, Jong-Won;Kim, Young-Kil;Sung, So-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1298-1304
    • /
    • 2019
  • Since the 9·11 terror attack in 2001, the Maritime Logistics Security System has been strengthened and required X-ray image for every imported cargos from manufacturing countries to United States. For scanning cargos, the container inspection systems use high energy X-rays for examination of contents of a container to check the nuclear, explosive, dangerous and illegal materials. Nowadays, the X-ray cargo scanners are established and used by global technologies for inspection of suspected cargos in the customs agency but these technologies have not been localized and developed sufficiently. In this paper, we propose the X-ray array detector system which is a core component of the container scanning system. For implementation of X-ray array detector, the analog and digital signal processing units are fabricated with integrated hardware, FPGA logics and GUI software for real-time X-ray images. The implemented system is superior in terms of resolution and power consumption compared to the existing products currently used in ports.