• 제목/요약/키워드: Usage pattern

검색결과 644건 처리시간 0.031초

그래프 속성을 이용한 온라인 소셜 네트워크 스팸 탐지 동향 분석 (Exploratory study on the Spam Detection of the Online Social Network based on Graph Properties)

  • 정시현;오하영
    • 한국정보통신학회논문지
    • /
    • 제24권5호
    • /
    • pp.567-575
    • /
    • 2020
  • 온라인 소셜 네트워크가 현대인의 정보 공유 및 교류의 핵심적인 매체로 사용됨에 따라, 그 이용자는 매해 급격하게 증가하고 있다. 이는 단순히 사용량 증가뿐만 아니라 정보의 신뢰성에서도 기존 언론 매체를 능가하기도 하는데, 최근 등장하는 마케팅 전략들은 이 점을 노리고 교묘하게 소셜 네트워크를 공격하고 있다. 그에 따라 자연스럽게 형성되어야 할 여론이 온라인 공격으로 인해 인위적으로 구성되기도 하고, 이를 신뢰하는 사람들도 많아지게 되었다. 따라서 온라인 소셜 네트워크를 공격하는 주체들을 탐지하고자 하는 연구들이 최근 많이 진행되고 있다. 본 논문에서는 이러한 온라인 소셜 네트워크 공격자들을 탐지하고자 하는 연구들의 동향을 분석하는데, 그 중 소셜 네트워크 그래프 특성을 이용한 연구들에 집중하고 있다. 기존의 contents-based 기법이 사생활 침해 및 공격 전략 변화에 따른 분류 오류를 나타낼 수 있음에 반해, 그래프 기반 방법은 공격자 패턴을 이용하여 보다 강건한 탐지 방법을 제안하고 있다.

네트워크 특징에 따른 수질-수리 제약조건 기반 상수도관망 다목적 최적 설계 기술개발 (Development of multi-objective optimal design approach for water distribution systems based on water quality-hydraulic constraints according to network characteristic)

  • 고문진;최영환
    • 한국수자원학회논문집
    • /
    • 제55권1호
    • /
    • pp.59-70
    • /
    • 2022
  • 상수도관망은 대표적인 사회기반시설로 수원에서 수용가에게 물을 공급하는 과정에서 병원성 미생물을 소독하기 위해 염소를 주입한다. 안전한 물의 공급을 위해 잔류염소 농도 기준(0.1-4.0 mg/L)을 유지하도록 규정하고 있으나, 사용자의 사용 패턴, 수령, 상수도관망의 형식 및 특징은 수리학적(i.e., 절점의 압력, 관로의 유속) 및 수질적(i.e., 잔류염소 농도) 특징에 영향을 미친다. 따라서, 본 연구에서는 Multi-objective Harmony Search (MOHS)를 사용하여 수질-수리 인자를 고려한 상수도관망 최적 설계 기법을 개발하였다. 설계인자로는 설계비용과 시스템 탄력성을 고려하였으며, 절점의 압력과 잔류염소 농도를 제약조건으로 적용하였다. 도출된 최적설계안은 상수도관망의 형식 및 특징에 따라 분석하였다. 이러한 최적설계안은 경제적인 측면과 수질 측면의 안전성을 충족할 수 있으며, 사용자의 사용성을 증가시킬 수 있다.

공공자전거 임대내역 데이터를 활용한 마이크로 모빌리티 패턴분석 연구 (A Study on Micro-Mobility Pattern Analysis using Public Bicycle Rental History Data)

  • 조재희;백가은
    • 한국IT서비스학회지
    • /
    • 제20권6호
    • /
    • pp.83-95
    • /
    • 2021
  • In this study, various usage patterns were analyzed after establishing a data mart for micro mobility analysis based on the rental history of public bicycles in Seoul. Rental history data is origin-destination data that includes the rental location and time, and the return location and time. About 1500 rental locations were classified according to the characteristics of the location to create a 'station type' dimension. We also created a 'path type' dimension that displays whether the rental location and return location are the same. In addition, a derived variable called speed, which is obtained by dividing the distance used by the time used, is added, and through this, the characteristics of the riding area and the reason for the rental can be estimated. Meanwhile, administrative district link, administrative neighborhood link, and station type link were created to apply network analysis. Through this analysis, the roles and proportions of administrative districts, public facilities, and private facilities engaged in micro-mobility services were visualized. 49.9% of rentals occur at rental offices near transportation facilities, and half of them occur at rental offices near subway stations. The number of rentals during the evening rush hour is more than double that of the morning rush hour. When the path type is unidirectional, there is a fixed destination, so the distance and time used are short, and the movement speed tends to be high. In the case of round-trip, the purpose of use is exercise or leisure, so the distance and time used are long, and the movement speed is slow. It is expected that the results of the analysis can be used as reference materials for selecting new rental locations, providing convenient services for users, and developing user-specialized products.

유한 요소 해석을 이용한 DED 공정의 코너 반경 및 위치에 따른 보수 영역 부근 잔류응력 분포 영향성 조사 (Investigation of the Influence of Radius and Corner Position on the Residual Stress Distribution in the Vicinity of the Repaired Region via Directed Energy Deposition by using Finite Element Analysis)

  • 알리예브 알리술탄;이광규;안동규
    • 한국기계가공학회지
    • /
    • 제20권7호
    • /
    • pp.33-40
    • /
    • 2021
  • Current industrial flow is directed toward reducing the usage of raw materials by reusing parts, which is referred to as a circular economy (CE). Repair is one of the most value-added approaches in CE, which can be efficiently accomplished via additive manufacturing. The repair technology of metallic parts via the directed energy deposition process, which includes the selective removal and redeposition of damaged regions of metallic parts. Residual stress characteristics depend on the shape of the part and the shape of the redeposition region. The objective of this study is to investigate the effects of the radius and corner position of the substrate on the residual stresses for repair by using finite element analysis (FEA). The residual stress distribution of the 45° angle groove at the edge of the circular shape models on the outer and inner radii was analytically investigated. The analysis was accomplished using SYSWELD software by applying a moving heat source with defined material properties and cooling conditions integrated into the FEA model. The results showed a similar pattern of concentrated stress distribution for all models except the 40-mm and 60-mm radii, for which the maximum stress locations were different. The maximum residual stresses are high but lower than the yield strength, suggesting the absence of cracks and fractures due to residual stresses.

수도권 일부 남녀 대학생의 달걀요리 선호도와 이용실태에 따른 활용 촉진 (Promotion and Utilization of Eggs according to Egg Dish Preference among University Students)

  • 한수진;이인숙;강은주;안효리;엄애선
    • 급식외식위생학회지
    • /
    • 제2권1호
    • /
    • pp.30-35
    • /
    • 2021
  • This study was conducted to understand the perception and the usage pattern of egg dishes in university students. The questionnaires were collected from 200 university students residing in Seoul. The age group was 118 (59.0%) in 20s, 50 (25.0%) in 30s, and 32 (16.5%) in 40s and older. Also, 179 (89.5%) were undergraduate students and 21 (10.5%) were graduates. The result of food preferences in the overall survey was as follows: Meats and Poultry (4.46±1.03) > Seafoods (2.92±1.41) > Fruits (2.91±1.17) > Eggs (2.50±1.10) > Vegetables (2.21±1.17). The preference of foods using eggs as the main ingredient was as follows: Rolled egg (4.07±0.81) > Steamed egg (4.05±0.91) > Scrambled egg (3.83±1.03) > Rice omelet (3.77±1.03). The preference of foods using eggs as sub-ingredient was Egg in Ramyeon (4.11±1.08) > Fried egg over Bibimbob (3.87±0.91) > Sliced boiled egg in Naengmyeon (3.78±1.11). The preference of eggs as desserts was Egg tart (4.01±1.08) > Sponge cake (3.72±1.09) > Egg bread (3.63±1.13). The result of the frequency of eating eggs indicating that approximately two-thirds of university students consumed eggs more than 3 times a week. Although there was no significant difference, male students not only consumed eggs more frequently than female students, but also consumed a higher amount. In recent years, since one-person household in college students tends to increase, it is more important to save cooking time and food quality. Thus, the development and dissemination of various egg recipes should be prioritized for university students.

교통약자 유형별 공유형 자율주행 자동차의 이동경로에 대한 기초연구 (A Basic Study on the Route of Shared Self-driving Cars by Type of Transportation Disability person)

  • 김선주;김건욱;장원준;정원웅;민현기
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제31권3호
    • /
    • pp.47-65
    • /
    • 2022
  • Purpose With the recent development of Big Data and Artificial Intelligence technology, self-driving technology has developed into three stages (partial self-driving) or four stages (conditional self-driving), it is expected to bring a new paradigm to transportation in the city. Although many researchers are researching related technologies, there is no research on self-driving for disabled persons. In this study, the basic research was conducted based on the assumption that the shared self-driving car used by the disabled person is similar to the special transportation currently driving. Design In this study, data analysis and machine learning techniques were utilized to analyze the mobility patterns of disabled persons by type and to search for leading factors affecting the traffic volume of special transportation. Findings The study found that external physical disorders and developmental disorders often visit general welfare centers, internal organ disorders often visit general hospitals, and the elderly and mental disorders have various destinations. In addition, machine learning analysis showed that the main transportation routes for the disabled person use arterial roads and auxiliary arterial roads and that the ratio of building usage-related variables affecting the use of special transportation for a disabled person is high. In addition, the distance to the subway and bus stops was also mentioned as a meaningful variable. Based on these analysis results, it is expected that the necessary infrastructure for shared self-driving cars for disability person traffic will be used as meaningful research data in the future.

A comparative study of Water Public-Private partnership characteristics in Guangdong and Shandong provinces in China

  • Jihye Oh
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2023년도 학술발표회
    • /
    • pp.182-182
    • /
    • 2023
  • Since China adopted Public Private Partnerships (PPPs) in the 1980s, China has relied on water PPPs to expand appropriate water facilities.. According to the World Bank data from 1994 to 2020, the top five provinces hosted over 40 percent of total PPPs, with four of them located in the Huadong area and one in the Henan area. A vast gap exists between the group attracting the most PPPs and the group hosting the least. This study explores Guangdong and Shandong provinces, which have led most PPPs in China. Coincidently, these areas are also famous for the typical areas to show the Chinese economic policy after the open-door policy. They have achieved economic development and rapid urbanization rates based on the large scale of Foreign Direct Investment inflow and export-oriented manufacturing industry, as well as their active participation in PPPs over the last thirty years. An economic approach can provide valuable insights into the development of water infrastructure. Adequate urban infrastructure has been shown to impact local economic development positively. Water infrastructure also provides a basic and sustainable environment for economic activities by satisfying more water usage, improving the efficiency of the water supply, and reducing water pollution caused by industrial activities. However, it remains only partially understood without inclusive research on the issues related to water resources in each province. For instance, existing studies have been limited to explaining slightly different patterns of water PPPs between Guangdong and Shandong at the beginning of the PPP era. This study aims to elucidate the development pattern of water PPPs in each province from multi-dimensional aspects. Therefore, the study will help understand why China boosted the development of the private water market.

  • PDF

제약 조건에서의 예보를 위한 기상 응용의 실행 패턴 분석 (An Analysis of Execution Patterns of Weather Forecast Application in Constraints Conditions)

  • 오지선;김윤희
    • KNOM Review
    • /
    • 제22권3호
    • /
    • pp.25-30
    • /
    • 2019
  • 기상 응용의 경우 시간적, 자원적 한계 내에서도 의미 있는 결과를 도출해 제공해야 한다. 수많은 과거 데이터를 통한 예보는 시간적인 소요가 크며, 국지성 태풍 예보와 같은 재난 안전 관련 분석/예측의 경우에는 여전히 자원적 한계가 존재한다. 태풍 예보, 도로별 침수/홍수 지역 예측 서비스 등 시간 제약하에 결과를 도출해야 하는 경우와 제한적인 물리적 환경 조건으로 인해 발생하는 문제 없이 적합한 예보를 제공해야 한다. 본 논문에서는 시간적, 자원적 조건에서도 원활한 예보 서비스 제공을 위해 기상 및 기후 예측 응용을 분석한다. 격자 크게 따른 수행 시간 분석을 통해 격자 조절을 통해 시간적 제약 조건이 있는 경우에 대처할 수있음을 확인하였다. 또한 메모리 자원 조절을 통해 수행 시간을 분석하여 성능에 영향을 미치지 않는 최소 자원 조건을 확인하였으며 swap, mlock 분석을 통해 응용의 자원 사용 패턴을 확인하였다.

회귀 분석을 이용한 Intel SGX 상의 안전한 전력 수요 예측 (Secure power demand forecasting using regression analysis on Intel SGX)

  • 윤예진;임종혁;이문규
    • 한국차세대컴퓨팅학회논문지
    • /
    • 제13권4호
    • /
    • pp.7-18
    • /
    • 2017
  • 현대사회에서 가장 중요한 에너지원 중 하나인 전력 에너지는 적절한 수요 공급 조절이 매우 중요하다. 하지만 수요 예측을 위해 필요한 전력데이터는 전력 사용자의 행위에 대한 정보가 포함 될 수 있어, 이를 분석할 경우 프라이버시 침해 문제로 이어질 수 있다. 이에 본 논문에서는 사용자의 전력 사용 정보에 회귀 분석을 적용하여 사용자의 향후 전력 사용량을 예측하되, Intel SGX가 제공하는 안전한 실행 환경 상에서 이를 수행함으로써 사용자의 전력 사용 정보를 안전하게 보호하는 방법을 제안한다. 다양한 차수의 회귀 관계식에 대한 실험을 수행하여 오차를 최소로 하는 회귀 관계식을 선정하였으며, 제안하는 방법을 이용하면 프라이버시 보호 기능을 제공하는 기존의 전력 수요 예측 방법보다 낮은 평균오차율을 보임을 확인하였다.

Montgomery Multiplier with Very Regular Behavior

  • Yoo-Jin Baek
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제16권1호
    • /
    • pp.17-28
    • /
    • 2024
  • As listed as one of the most important requirements for Post-Quantum Cryptography standardization process by National Institute of Standards and Technology, the resistance to various side-channel attacks is considered very critical in deploying cryptosystems in practice. In fact, cryptosystems can easily be broken by side-channel attacks, even though they are considered to be secure in the mathematical point of view. The timing attack(TA) and the simple power analysis attack(SPA) are such side-channel attack methods which can reveal sensitive information by analyzing the timing behavior or the power consumption pattern of cryptographic operations. Thus, appropriate measures against such attacks must carefully be considered in the early stage of cryptosystem's implementation process. The Montgomery multiplier is a commonly used and classical gadget in implementing big-number-based cryptosystems including RSA and ECC. And, as recently proposed as an alternative of building blocks for implementing post quantum cryptography such as lattice-based cryptography, the big-number multiplier including the Montgomery multiplier still plays a role in modern cryptography. However, in spite of its effectiveness and wide-adoption, the multiplier is known to be vulnerable to TA and SPA. And this paper proposes a new countermeasure for the Montgomery multiplier against TA and SPA. Briefly speaking, the new measure first represents a multiplication operand without 0 digits, so the resulting multiplication operation behaves in a very regular manner. Also, the new algorithm removes the extra final reduction (which is intrinsic to the modular multiplication) to make the resulting multiplier more timing-independent. Consequently, the resulting multiplier operates in constant time so that it totally removes any TA and SPA vulnerabilities. Since the proposed method can process multi bits at a time, implementers can also trade-off the performance with the resource usage to get desirable implementation characteristics.