• Title/Summary/Keyword: S&T information service

Search Result 816, Processing Time 0.025 seconds

Analysis of Behavior Patterns from Human and Web Crawler Events Log on ScienceON (ScienceON 웹 로그에 대한 인간 및 웹 크롤러 행위 패턴 분석)

  • Poositaporn, Athiruj;Jung, Hanmin;Park, Jung Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.6-8
    • /
    • 2022
  • Web log analysis is one of the essential procedures for service improvement. ScienceON is a representative information service that provides various S&T literature and information, and we analyze its logs for continuous improvement. This study aims to analyze ScienceON web logs recorded in May 2020 and May 2021, dividing them into humans and web crawlers and performing an in-depth analysis. First, only web logs corresponding to S (search), V (detail view), and D (download) types are extracted and normalized to 658,407 and 8,727,042 records for each period. Second, using the Python 'user_agents' library, the logs are classified into humans and web crawlers, and third, the session size was set to 60 seconds, and each session is analyzed. We found that web crawlers, unlike humans, show relatively long for the average behavior pattern per session, and the behavior patterns are mainly for V patterns. As the future, the service will be improved to quickly detect and respond to web crawlers and respond to the behavioral patterns of human users.

  • PDF

Definition of New SIBs for Service Description and Implementation of SCE in Intelligent Network (지능망에서 서비스 기술을 위한 새로운 SIB들의 정의와 SCE의 구현)

  • 김연중;이지영;마영식;안순신
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.2
    • /
    • pp.209-220
    • /
    • 2004
  • The Goals of Intelligent Network(IN) provide the methods that create, test and apply the various hinds of services to satisfy the user's need. In this environments, we can create new IN service by description of GSL(Global Service Logic) using that SCE(Service Creation Environment). In the ITU-T CS-2, the various SIBs(Service Independent Building-blocks) are defined to develop the services. There are limitations to develop the various services using the SIBs defined in recommendation. So, in this paper, we define the new SIBs and implement the SCE. The new SIBs are defined in this paper are Connect SIB and BCSM Event SIB. The Connect Call SIB provides the connectivity between SLPI(Service Logic processing Program Instance) and call after connecting the calling party to called party. The BCSMEvent SIB provides the functions that request SSF to report the call processing event and receive it. In this paper, we design and implement the SCE that supports the SIBs defined by recommendation and this paper, provides GUI environment to specify GSI, and generates the code used by SCP.

Transmission Interval Optimization by Analysis of Collision Probability in Low Power TPMS (저전력 운영 TPMS에서 충돌 확률 분석을 통한 전송주기 최적화)

  • Lim, Sol;Choi, Han Wool;Kim, Dae Jin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.5
    • /
    • pp.364-371
    • /
    • 2017
  • TPMS is a vehicle electric system that measures the air pressure of a tire, and informs the driver of current tire states. The TPMS sensor typically uses unidirectional communication for small size, light weight, and low power. The transmission period of the sensor indicates the service quality of monitoring the tire. In order to determine the optimal transmission period, frame collision probability and the life time of the sensor should be analyzed. In this paper, collision probability model using Venn diagram is designed in low power TPMS with the normal and warning mode. And the life time and a collision probability were analyzed with the ratio(n) of the normal mode to warning mode transmission period. As a result, $T_{nP}=31sec$ and $T_{wP}=2.4sec$ at 5 years, and $T_{nP}=71sec$ and $T_{wP}=2.5sec$ at 7 years.

An Vulnerability Analysis and Countermeasures for Security in Outdoor Risk Management System based on IoT Technology

  • Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.85-92
    • /
    • 2020
  • Following the development of Internet of Things (IoT) technology, the scope of application of IoT technology is expanding to industrial safety areas that detect and prevent possible risks in outdoor environments in advance, away from improving the convenience of living in indoor environments. Although this expansion of IoT service provides many advantages, it also causes security problems such as data leakage and modulation, so research on security response strategies is being actively carried out. In this paper, the IoT-based road construction risk management system in outdoor environment is proposed as a research subject. As a result of investigating the security vulnerabilities of the low-power wide-area (LPWA, BLE) communication protocol applied to the research targets, the security vulnerabilities were identified in terms of confidentiality, integrity, and availability, which are the three major elements of information security, and countermeasures for each vulnerability were proposed. This study is meaningful in investigating and analyzing possible vulnerabilities in the operation of the IoT-based risk management system and proposing practical security guidelines for each vulnerability.

A Study on Algorithm for Travel Time Estimation using Restricted GPS Data (제한된 GPS정보를 활용한 통행 시간 추정 알고리즘에 관한 연구)

  • Yoo, Nam-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.12
    • /
    • pp.1373-1380
    • /
    • 2014
  • In order to calculate accurate traffic and traffic speed, qualified and sufficient GPS data should be provided. However, it is difficult to provide accurate traffic information using restricted GPS data from probe vehicles because of communication costs. This paper developed a algorithm that recovers links omitted by restricted GPS data with topology information, and calculate traffic speed with original links and recovered links. T traffic information service of city with a new algorithm can provide more accurate traffic and traffic speed than the original system.

Energy Monitoring System with IoT Devices (IoT 디바이스 기반 에너지 모니터링 및 분석 시스템)

  • Lim, Hojung;Kang, Jeonghoon;Kim, Sanghan;Jung, Hyedong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.900-903
    • /
    • 2016
  • A variety of measures in various fields, buildings, factories, offices, supermarkets, etc. through a sensor installed for energy savings and user convenience are transmitted and received by the cloud server. Also, this kind of sensor service increases considering the user's convenience. In this paper, we research a variety of meter data linkage between oracle database and time series database, and data analysis.

  • PDF

Implementation of OPNET-based simulation model for the performance evaluation of ATM VP Transit network (ATM VP 중계망의 성능 시험을 위한 OPNET 기반의 시뮬레이션 모델 구현)

  • 구수용;김영탁
    • Journal of the Korea Society for Simulation
    • /
    • v.8 no.4
    • /
    • pp.125-136
    • /
    • 1999
  • In the forthcoming public ATM/B-ISDN, the efficient resource management with pre-planned transit networking which public domain NNI signaling is essential to maintain high network utilization and to assure QoS to the multimedia service users. For this purpose the transit networks must be managed according to the bearer service capability which is defined by ATM Forum and ITU-T. In this paper, we introduce an implementation of ATM transit networking with ATM VP-XC(Virtual Path cross-connect) and US(Network Management System). The functions of ATM VP-XC and NMS have been simulated with OPNET 6.1 modules. We implemented the F4 OAM functions of ATM VP connection according to the ITU-T 1.610 recommendation. Also, the ATM VP transit networking is managed by the NMS according to the connection management architecture of the TWN(Telecommunications Management Network) /TINA ( Telecommunications Information Networking Architecture).

  • PDF

Service Architecture Models For Fog Computing: A Remedy for Latency Issues in Data Access from Clouds

  • Khalid, Adnan;Shahbaz, Muhammad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2310-2345
    • /
    • 2017
  • With the emergence of the Internet of Things (IoT) the world is projecting towards a scenario where every object in the world (including humans) acts as a sender and receiver of data and if we were to see that concept mature we would soon be talking of billions more users of the cloud networks. The cloud technology is a very apt alternative to permanent storage when it comes to bulk storage and reporting. It has however shown weaknesses concerning real-time data accessibility and processing. The bandwidth availability of the cloud networks is limited and combined with the highly centralized storage structure and geographical vastness of the network in terms of distance from the end user the cloud just does not seem like a friendly environment for real-time IOT data. This paper aims at highlighting the importance of Flavio Bonomi's idea of Fog Computing which has been glamorized and marketed by Cisco but has not yet been given a proper service architecture that would explain how it would be used in terms of various service models i-e IaaS, PaaS and SaaS, of the Cloud. The main contribution of the paper would be models for IaaS, PaaS and SaaS for Fog environments. The paper would conclude by highlighting the importance of the presented models and giving a consolidated overview of how they would work. It would also calculate the respective latencies for fog and cloud to prove that our models would work. We have used CloudSim and iFogSim to show the effectiveness of the paradigm shift from traditional cloud architecture to our Fog architecture.

Intelligent & Predictive Security Deployment in IOT Environments

  • Abdul ghani, ansari;Irfana, Memon;Fayyaz, Ahmed;Majid Hussain, Memon;Kelash, Kanwar;fareed, Jokhio
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.185-196
    • /
    • 2022
  • The Internet of Things (IoT) has become more and more widespread in recent years, thus attackers are placing greater emphasis on IoT environments. The IoT connects a large number of smart devices via wired and wireless networks that incorporate sensors or actuators in order to produce and share meaningful information. Attackers employed IoT devices as bots to assault the target server; however, because of their resource limitations, these devices are easily infected with IoT malware. The Distributed Denial of Service (DDoS) is one of the many security problems that might arise in an IoT context. DDOS attempt involves flooding a target server with irrelevant requests in an effort to disrupt it fully or partially. This worst practice blocks the legitimate user requests from being processed. We explored an intelligent intrusion detection system (IIDS) using a particular sort of machine learning, such as Artificial Neural Networks, (ANN) in order to handle and mitigate this type of cyber-attacks. In this research paper Feed-Forward Neural Network (FNN) is tested for detecting the DDOS attacks using a modified version of the KDD Cup 99 dataset. The aim of this paper is to determine the performance of the most effective and efficient Back-propagation algorithms among several algorithms and check the potential capability of ANN- based network model as a classifier to counteract the cyber-attacks in IoT environments. We have found that except Gradient Descent with Momentum Algorithm, the success rate obtained by the other three optimized and effective Back- Propagation algorithms is above 99.00%. The experimental findings showed that the accuracy rate of the proposed method using ANN is satisfactory.

The Current State and Determinants of Korean Baby-Boomers' Welfare Consciousness

  • Lee, Hyoung-Ha
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.5
    • /
    • pp.193-200
    • /
    • 2016
  • This study was conducted in order to assess the effect of variables influencing Korean baby-boomers' welfare consciousness. For this purpose, data from the $8^{th}$ supplementary survey of the Korea Welfare Panel in 2013 were analyzed. The subjects of analysis were 2,035 people who were born between 1955 and 1965 whose welfare panel data did not have missing values for the variables of the research model. According to the results of analysis, first, when the descriptive statistics of the major variables were analyzed, those showing a relatively high mean score among the sub-factors of the baby-boomers' welfare consciousness were 'expansion of expenditure for public assistance' (mean 3.65, SD .557), 'expansion of expenditure for social insurance' (mean 3.53, SD .646), and 'expansion of expenditure for social services' (mean 3.26, SD .424). The mean score of the baby-boomers' overall welfare consciousness was relatively high as 3.45 (SD .428), advocating the expansion of welfare expenditure. Second, the independent variables influencing the baby-boomers' welfare consciousness was found to have explanatory power of 12.9%. In the results of regression analysis, variables found to have a significant effect were gender (B=.100, t=2.573, p<.01), personal responsibility for poverty (B=-.151, t=-3.635, p<.01), social responsibility for poverty (B=.149, t=3.437, p<.001), and recipient's laziness (B=.251, t=6.578, p<.001). Based on these results were discussed major relevant policies.