• Title/Summary/Keyword: Social Computing

Search Result 491, Processing Time 0.023 seconds

A Technology of Context-aware based Building Management for Energy Efficiency (에너지 효율화를 위한 상황인지 기반 건물 관리 기술)

  • Lee, Hyunjeong;Han, Jinsoo;Jeong, Youn-Kwae;Lee, Il-Woo;Lee, Sang Ho
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.1
    • /
    • pp.69-75
    • /
    • 2012
  • As the global warming and climate change cause the various social problems, such as disasters, abnormal temperature and diseases, technologies and studies for energy conservation and efficiency are increased. Energy use in buildings accounted for 22% of national energy use, so energy saving technology is promoted for residence, commercial and public buildings. Existing methods for energy conservation are passive ways, in that they consider heat loss and low-energy equipment. In recent years, active technologies emerge by converging with ICT, which detect and remove the energy waste situation by measuring, monitoring and controlling the energy use. In this paper, we describe technology trends for building energy optimization and investigates issues for active energy savings.

  • PDF

A FCA-based Classification Approach for Analysis of Interval Data (구간데이터분석을 위한 형식개념분석기반의 분류)

  • Hwang, Suk-Hyung;Kim, Eung-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.1
    • /
    • pp.19-30
    • /
    • 2012
  • Based on the internet-based infrastructures such as various information devices, social network systems and cloud computing environments, distributed and sharable data are growing explosively. Recently, as a data analysis and mining technique for extracting, analyzing and classifying the inherent and useful knowledge and information, Formal Concept Analysis on binary or many-valued data has been successfully applied in many diverse fields. However, in formal concept analysis, there has been little research conducted on analyzing interval data whose attributes have some interval values. In this paper, we propose a new approach for classification of interval data based on the formal concept analysis. We present the development of a supporting tool(iFCA) that provides the proposed approach for the binarization of interval data table, concept extraction and construction of concept hierarchies. Finally, with some experiments over real-world data sets, we demonstrate that our approach provides some useful and effective ways for analyzing and mining interval data.

A Technique for Requirements Normalization and Selection based on Practical Approach (사례 기반의 요구사항 정형화 및 선정 평가 기법)

  • Byun, Jung-Won;Rhew, Sung-Yul;Kim, Jin-Su
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.149-161
    • /
    • 2012
  • In the customer-centered world, which is used internet and social network services actively, it is important that their needs should be embraced into systems. Our study proposes a technique to normalize and select 1,800 customer's needs at C company. In order to normalize the requirements, we have specified requirements by considering a standard for requirements specification, have identified a set of keywords of requirements and have constructed a relation-graph of requirements. The graph presents objectives to design and build a system, and shows a degree of relative importance for each requirement. And then, we propose a techniques for requirements selection according to their contribution points, which are calculated using relative degree. We demonstrates our techniques by a case study of C company.

Development and Comparison of Centralized and Decentralized ATIS Models with Simulation Method

  • Kim, Hoe-Kyoung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.2
    • /
    • pp.1-8
    • /
    • 2011
  • Traffic congestion is a source of significant economic and social costs in urban areas. Intelligent Transportation Systems (ITS) are a promising means to help alleviate congestion by utilizing advanced sensing, computing, and communication technologies. This paper proposes and investigates a basic and advanced ITS framework Advanced Traveler Information System (ATIS) using wireless Vehicle to Roadside (Centralized ATIS model: CA model) and Vehicle to Vehicle (DeCentralized ATIS model: DCA model) communication and assuming an ideal communication environment in the typical $6{\times}6$ urban grid traffic network. Results of this study indicate that an ATIS using wireless communication can save travel time given varying combinations of system characteristics: traffic flow, communication radio range, and penetration ratio. Also, all tested metrics of the CA and DCA models indicate that the system performance of both models is almost identical regardless of varying traffic demand and penetration ratios. Therefore, DCA model can be a reasonable alternative to the fixed infrastructure based ATIS model (CA model).

Avatar's Lip Synchronization in Talking Involved Virtual Reality (대화형 가상 현실에서 아바타의 립싱크)

  • Lee, Jae Hyun;Park, Kyoungju
    • Journal of the Korea Computer Graphics Society
    • /
    • v.26 no.4
    • /
    • pp.9-15
    • /
    • 2020
  • Having a virtual talking face along with a virtual body increases immersion in VR applications. As virtual reality (VR) techniques develop, various applications are increasing including multi-user social networking and education applications that involve talking avatars. Due to a lack of sensory information for full face and body motion capture in consumer-grade VR, most VR applications do not show a synced talking face and body. We propose a novel method, targeted for VR applications, for talking face synced with audio with an upper-body inverse kinematics. Our system presents a mirrored avatar of a user himself in single-user applications. We implement the mirroring in a single user environment and by visualizing a synced conversational partner in multi-user environment. We found that a realistic talking face avatar is more influential than an un-synced talking avatar or an invisible avatar.

Development of Software Education Program Using Robot for Students with Developmental Disorder

  • Kim, Jeong-Rang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.209-216
    • /
    • 2019
  • In view of the educational effects and social changes of software education, equal opportunities for software education are needed regardless of general students and students with disabilities. However, studies on software education for general students have been actively conducted, but studies on software education for students with disabilities are insufficient. In this study, we developed a robot education software education program for students with developmental disabilities. Developing robot-enabled software education programs for students with developmental disabilities is meaningful in terms of expanding software education opportunities for all. In addition, the robot-based software education program is easy to motivate students with developmental disabilities with low task concentration, short-term memory, and low sociality. Significant changes will be made not only in terms of management capacity, but also in terms of self-efficacy and confidence.

Study on the Application Methods of Big Data at a Corporation -Cases of A and Y corporation Big Data System Projects- (기업의 빅데이터 적용방안 연구 -A사, Y사 빅데이터 시스템 적용 사례-)

  • Lee, Jae Sung;Hong, Sung Chan
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.103-112
    • /
    • 2014
  • In recent years, the rapid diffusion of smart devices and growth of internet usage and social media has led to a constant production of huge amount of valuable data set that includes personal information, buying patterns, location information and other things. IT and Production Infrastructure has also started to produce its own data with the vitalization of M2M (Machine-to-Machine) and IoT (Internet of Things). This analysis study researches the applicable effects of Structured and Unstructured Big Data in various business circumstances, and purposes to find out the value creation method for a corporation through the Structured and Unstructured Big Data case studies. The result demonstrates that corporations looking for the optimized big data utilization plan could maximize their creative values by utilizing Unstructured and Structured Big Data generated interior and exterior of corporations.

Ontology and Text Mining-based Advanced Historical People Finding Service (온톨로지와 텍스트 마이닝 기반 지능형 역사인물 검색 서비스)

  • Jeong, Do-Heon;Hwang, Myunggwon;Cho, Minhee;Jung, Hanmin;Yoon, Soyoung;Kim, Kyungsun;Kim, Pyung
    • Journal of Internet Computing and Services
    • /
    • v.13 no.5
    • /
    • pp.33-43
    • /
    • 2012
  • Semantic web is utilized to construct advanced information service by using semantic relationships between entities. Text mining can be applied to generate semantic relationships from unstructured data resources. In this study, ontology schema guideline, ontology instance generation, disambiguation of same name by text mining and advanced historical people finding service by reasoning have been proposed. Various relationships between historical event, organization, people, which are created by domain experts, are linked to literatures of National Institute of Korean History (NIKH). It improves the effectiveness of user access and proposes advanced people finding service based on relationships. In order to distinguish between people with the same name, we compares the structure and edge, nodes of personal social network. To provide additional information, external resources including thesaurus and web are linked to all of internal related resources as well.

A study on integrating and discovery of semantic based knowledge model (의미 기반의 지식모델 통합과 탐색에 관한 연구)

  • Chun, Seung-Su
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.99-106
    • /
    • 2014
  • Generation and analysis methods have been proposed in recent years, such as using a natural language and formal language processing, artificial intelligence algorithms based knowledge model is effective meaning. its semantic based knowledge model has been used effective decision making tree and problem solving about specific context. and it was based on static generation and regression analysis, trend analysis with behavioral model, simulation support for macroeconomic forecasting mode on especially in a variety of complex systems and social network analysis. In this study, in this sense, integrating knowledge-based models, This paper propose a text mining derived from the inter-Topic model Integrated formal methods and Algorithms. First, a method for converting automatically knowledge map is derived from text mining keyword map and integrate it into the semantic knowledge model for this purpose. This paper propose an algorithm to derive a method of projecting a significant topic map from the map and the keyword semantically equivalent model. Integrated semantic-based knowledge model is available.

A Study on Security Improvement in Hadoop Distributed File System Based on Kerberos (Kerberos 기반 하둡 분산 파일 시스템의 안전성 향상방안)

  • Park, So Hyeon;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.803-813
    • /
    • 2013
  • As the developments of smart devices and social network services, the amount of data has been exploding. The world is facing Big data era. For these reasons, the Big data processing technology which is a new technology that can handle such data has attracted much attention. One of the most representative technologies is Hadoop. Hadoop Distributed File System(HDFS) designed to run on commercial Linux server is an open source framework and can store many terabytes of data. The initial version of Hadoop did not consider security because it only focused on efficient Big data processing. As the number of users rapidly increases, a lot of sensitive data including personal information were stored on HDFS. So Hadoop announced a new version that introduces Kerberos and token system in 2009. However, this system is vulnerable to the replay attack, impersonation attack and other attacks. In this paper, we analyze these vulnerabilities of HDFS security and propose a new protocol which complements these vulnerabilities and maintains the performance of Hadoop.