• Title/Summary/Keyword: Usage Control Model

Search Result 192, Processing Time 0.023 seconds

Grout Injection Control using AI Methodology (인공지능기법을 활용한 그라우트의 주입제어)

  • Lee Chung-In;Jeong Yun-Young
    • Tunnel and Underground Space
    • /
    • v.14 no.6 s.53
    • /
    • pp.399-410
    • /
    • 2004
  • The utilization of AS(Artificial Intelligence) and Database could be considered as an useful access for the application of underground information from the point of a geotechnical methodology. Its detailed usage has been recently studied in many fields of geo-sciences. In this paper, the target of usage is on controlling the injection of grout which more scientific access is needed in the grouting that has been used a major method in many engineering application. As the proposals for this problem it is suggested the methodology consisting of a fuzzy-neural hybrid system and a database. The database was firstly constructed for parameters dynamically varied according to the conditions of rock mass during the injection of grout. And then the conceptional model for the fuzzy-neural hybrid system was investigated fer optimally finding the controlling range of the grout valve. The investigated model applied to four cases, and it is found that the controlling range of the grout valve was reasonably deduced corresponding to the mechanical phenomena occurred by the injection of grout. Consequently, the algorithm organizing the fuzzy-neural hybrid system and the database as a system can be considered as a tool for controlling the injection condition of grout.

Analysis of Usage Patterns and Security Vulnerabilities in Android Permissions and Broadcast Intent Mechanism (안드로이드 권한과 브로드캐스트 인텐트 매커니즘의 사용 현황 및 보안 취약성 분석)

  • Kim, Young-Dong;Kim, Ikhwan;Kim, Taehyoun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1145-1157
    • /
    • 2012
  • Google Android employs a security model based on application permissions to control accesses to system resources and components of other applications from a potentially malicious program. But, this model has security vulnerabilities due to lack of user comprehension and excessive permission requests by 3rd party applications. Broadcast intent message is widely used as a primary means of communication among internal application components. However, this mechanism has also potential security problems because it has no security policy related with it. In this paper, we first present security breach scenarios caused by inappropriate use of application permissions and broadcast intent messages. We then analyze and compare usage patterns of application permissions and broadcast intent message for popular applications on Android market and malwares, respectively. The analysis results show that there exists a characteristic set for application permissions and broadcast intent receiver that are requested by typical malwares. Based on the results, we propose a scheme to detect applications that are suspected as malicious and notify the result to users at installation time.

Channel Statistical MAC Protocol for Cognitive Radio

  • Xiang, Gao;Zhu, Wenmin;Park, Hyung-Kun
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.1
    • /
    • pp.40-44
    • /
    • 2010
  • opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, with bring new research challenges in MAC design. We propose a cognitive MAC protocol using statistical channel information and selecting appropriate idle channel for transmission. The protocol based on the CSMA/CA, exploits statistics of spectrum usage for decision making on channel access. Idle channel availability, spectrum hole sufficiency and available channel condition will be included in algorithm statistical information. The model include the control channel and data channel, the transmitter negotiates with receiver on transmission parameters through control channel, statistical decision results (successful rate of transmission) from exchanged transmission parameters of control channel should pass the threshold and decide the data transmission with spectrum hole on data channel. A dynamical sensing range as a important parameter introduced to maintain the our protocol performance. The proposed protocol's simulation will show that proposed protocol does improve the throughput performance via traditional opportunistic spectrum access MAC protocol.

Multi-Channel MAC Protocol Using Statistical Channel Utilization for Cognitive Networks

  • Xiang, Gao;Zhu, Wen-Min;Park, Hyung-Kun
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.3
    • /
    • pp.273-276
    • /
    • 2010
  • Opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, with bring new research challenges in MAC design. We propose a cognitive MAC protocol using statistical channel information and selecting appropriate idle channel for transmission. The protocol based on the CSMA/CA, exploits statistics of spectrum usage for decision making on channel access. Idle channel availability, spectrum hole sufficiency and available channel condition will be included in algorithm statistical information. The model include the control channel and data channel, the transmitter negotiates with receiver on transmission parameters through control channel, statistical decision results (successful rate of transmission) from exchanged transmission parameters of control channel should pass the threshold and decide the data transmission with spectrum hole on data channel. The proposed protocol's simulation will show that proposed protocol does improve the throughput performance via traditional opportunistic spectrum access MAC protocol.

The Control Model and The Authentication Model for a Virtual Computing Environment (가상환경을 위한 제어모델과 인증모델)

  • Yoo, Jin-Ho;Lee, Byoung-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.12
    • /
    • pp.5107-5112
    • /
    • 2010
  • This paper is related to the access to the control platform who manages their resources on the virtual environment. The computing performance of hardware supersedes the computing performance human demands. In this case, making the platform on the virtual computing environment has been developed for the usage of computing resource's residues which is available. This virtual computing environment is quite similar with the real environment in aspect of some functions but is quite different with that in aspect of the real configurations. This paper found that the virtual computing environment has another problems besides the problems the real computer might be happening. This paper found that the virtual environment needs the proper control platform. This paper will suggest a control platform for managing the virtual computing environment properly.

LS-SVM Based Modeling of Winter Time Apartment Hot Water Supply Load in District Heating System (지역난방 동절기 공동주택 온수급탕부하의 LS-SVM 기반 모델링)

  • Park, Young Chil
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.28 no.9
    • /
    • pp.355-360
    • /
    • 2016
  • Continuing to the modeling of heating load, this paper, as the second part of consecutive works, presents LS-SVM (least square support vector machine) based model of winter time apartment hot water supply load in a district heating system, so as to be used in prediction of heating energy usage. Similar, but more severely, to heating load, hot water supply load varies in highly nonlinear manner. Such nonlinearity makes analytical model of it hardly exist in the literatures. LS-SVM is known as a good modeling tool for the system, especially for the nonlinear system depended by many independent factors. We collect 26,208 data of hot water supply load over a 13-week period in winter time, from 12 heat exchangers in seven different apartments. Then part of the collected data were used to construct LS-SVM based model and the rest of those were used to test the formed model accuracy. In modeling, we first constructed the model of district heating system's hot water supply load, using the unit heating area's hot water supply load of seven apartments. Such model will be used to estimate the total hot water supply load of which the district heating system needs to provide. Then the individual apartment hot water supply load model is also formed, which can be used to predict and to control the energy consumption of the individual apartment. The results obtained show that the total hot water supply load, which will be provided by the district heating system in winter time, can be predicted within 10% in MAPE (mean absolute percentage error). Also the individual apartment models can predict the individual apartment energy consumption for hot water supply load within 10% ~ 20% in MAPE.

Single Image-Based 3D Tree and Growth Models Reconstruction

  • Kim, Jaehwan;Jeong, Il-Kwon
    • ETRI Journal
    • /
    • v.36 no.3
    • /
    • pp.450-459
    • /
    • 2014
  • In this paper, we present a new, easy-to-generate system that is capable of creating virtual 3D tree models and simulating a variety of growth processes of a tree from a single, real tree image. We not only construct various tree models with the same trunk through our proposed digital image matting method and skeleton-based abstraction of branches, but we also animate the visual growth of the constructed 3D tree model through usage of the branch age information combined with a scaling factor. To control the simulation of a tree growth process, we consider tree-growing attributes, such as branching orders, branch width, tree size, and branch self-bending effect, at the same time. Other invisible branches and leaves are automatically attached to the tree by employing parametric branch libraries under the conventional procedural assumption of structure having a local self-similarity. Simulations with a real image confirm that our system makes it possible to achieve realistic tree models and growth processes with ease.

An Index-Based Context-Aware Energy Management System in Ubiquitous Smart Space (유비쿼터스 지능 공간에서의 지수 기반 상황인지 에너지경영 시스템)

  • Kwon, Ohyung;Lee, Yonnim
    • Knowledge Management Research
    • /
    • v.9 no.4
    • /
    • pp.51-63
    • /
    • 2008
  • Effective energy consumption now becomes one of the area of knowledge management which potentially gives global impact. It is considerable for the energy management to optimize the usage of energy, rather than decreasing energy consumption at any cases. To resolve these challenges, an intelligent and personalized system which helps the individuals control their own behaviors in an optimal and timely manner is needed. So far, however, since the legacy energy management systems are nation-wide or organizational, individual-level energy management is nearly impossible. Moreover, most estimating methods of energy consumption are based on forecasting techniques which tend to risky or analysis models which may not be provided in a timely manner. Hence, the purpose of this paper is to propose a novel individual-level energy management system which aims to realize timely and personalized energy management based on context-aware computing approach. To do so, an index model for energy consumption is proposed with a corresponding service framework.

  • PDF

Fast Fuzzy Control of Warranty Claims System

  • Lee, Sang-Hyun;Cho, Sung-Eui;Moon, Kyung-Li
    • Journal of Information Processing Systems
    • /
    • v.6 no.2
    • /
    • pp.209-218
    • /
    • 2010
  • Classical warranty plans require crisp data obtained from strictly controlled reliability tests. However, in a real situation these requirements might not be fulfilled. In an extreme case, the warranty claims data come from users whose reports are expressed in a vague way. Furthermore, there are special situations where several characteristics are used together as criteria for judging the warranty eligibility of a failed product. This paper suggests a fast reasoning model based on fuzzy logic to handle multi-attribute and vague warranty data.

Joint Production and Disposal Decisions for Sustainable Operations of the Hybrid Production System (혼성 생산 시스템의 지속 가능 운영을 위한 신제품 생산과 회수제품 수용 통제의 통합 구현)

  • Kim, Eungab
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.39 no.5
    • /
    • pp.440-449
    • /
    • 2013
  • We consider a reverse supply chain with a production facility and a recovery facility, and address the joint control of production and disposal decisions for sustainable operations. Demands are satisfied from on-hand inventory of serviceable products, replenished via manufacturing or remanufacturing. Sold products may be returned after usage and each returned product is disposed of or accepted for recovery. Accepted returned products are converted into serviceable products after remanufacturing process. Formulating the model as a Markov decision process, we characterized the structure of the optimal production and disposal policy as two monotone switching curves under a special condition. Three types of heuristic policies are presented and their performance is numerically compared.