• Title/Summary/Keyword: User Management System

Search Result 3,221, Processing Time 0.032 seconds

The Comparative Study of Software Optimal Release Time Based on Weibull Distribution Property (와이블 분포 특성에 근거한 소프트웨어 최적 방출시기에 관한 비교 연구)

  • Kim, Hee-Cheul;Park, Hyoung-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1903-1910
    • /
    • 2009
  • In this paper, we were researched decision problem called an optimal release policies after testing a software system in development phase and transferring it to the user. The applied model of release time exploited infinite failure non-homogeneous Poisson process This infinite failure non-homogeneous Poisson process is a model which reflects the possibility of introducing new faults when correcting or modifying the software. The failure life-cycle distribution used the Weibull distribution which has the efficient various property which has the place efficient quality. Thus, optimal software release policies which minimize a total average software cost of development and maintenance under the constraint of satisfying a software reliability requirement becomes an optimal release policies. In a numerical example, after trend test applied and estimated the parameters using maximum likelihood estimation of inter-failure time data, estimated software optimal release time.

Design and Implementation of Realtime Information Service based on Ubiquitous Sensor Network Using MySQL and Tiny-DB (Tiny-DB와 MySQL을 이용한 유비쿼터스 센서 네트워크 기반의 실시간 정보 서비스 설계 및 구현)

  • Kang, Kyoung-Ok;Kim, Yong-Woo;Kwon, Hoon;Kim, Bu-Rim;Kim, Do-Hyeun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.2
    • /
    • pp.175-181
    • /
    • 2006
  • Wireless sensor network forms the self-organization network, and transfers the information among sensor nodes that have computing technology ability and wireless communication ability. The recent sensor network is study for low-power, micro, low cost of node is proceeded. Recently, the research of application services in wireless sensor networks is proceeded. Therefore, in this paper, we design the prototype of the real-time information service that support a user the information of temperature, illumination etc. And, we implement the alarm application service fer the disaster prevention on Internet base on IPv4/IPv6. We develop the module of the extract information using the query processing based on TinyOS, and the module of the server's database using MySQL data base management system and JDBC. Additionally, we develop the client module that receive the real-time sensing data using ODBC in Internet based on IPv4/IPv6.

  • PDF

Using RSS for Library Information Services : The Case of France (도서관 정보서비스 향상을 위한 기술의 RSS 응용 : 프랑스 사례를 중심으로)

  • Na, Eun-Joo
    • Journal of Information Management
    • /
    • v.38 no.4
    • /
    • pp.119-143
    • /
    • 2007
  • The new technology, RSS(Really Simple Syndication), allows people to send and receive a lot of up-to-date information by constant monitoring websites and databases for new information, without having to visit the site or database. The "gatekeeping" task for capturing and delivering various information influx via new digital channels as speedy as possible, is being discussed as a new form of service in the field of information service system nowadays. Given this situation, the RSS tool can be greatly useful in the gatekeeping task. This paper, by analyzing concrete cases in which RSS is actually employed in libraries and also newly applied to other diverse information services in France, expects to provide insightful ideas for developing innovative information services in other countries.

Video Browsing Using An Efficient Scene Change Detection in Telematics (텔레매틱스에서 효율적인 장면전환 검출기법을 이용한 비디오 브라우징)

  • Shin Seong-Yoon;Pyo Seong-Bae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.147-154
    • /
    • 2006
  • Effective and efficient representation of color features of multiple video frames is an important vet challenging task for visual information management systems. This paper Proposes a Video Browsing Service(VBS) that provides both the video content retrieval and the video browsing by the real-time user interface on Web. For the scene segmentation and key frame extraction of video sequence, we proposes an efficient scene change detection method that combine the RGB color histogram with the X2 (Chi Square) histogram. Resulting key frames are linked by both physical and logical indexing. This system involves the video editing and retrieval function of a VCR's. Three elements that are the date, the need and the subject are used for video browsing. A Video Browsing Service is implemented with MySQL, PHP and JMF under Apache Web Server.

  • PDF

A Managed Hybrid Web implementation for a .NET Smart Web development (.NET 스마트 웹 개발을 위한 매니즈드 하이브리드 웹 구현)

  • Jang, Seung-Young;Oh, Jeong-Jin;Jung, Byeong-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.105-112
    • /
    • 2012
  • The purpose of this paper is to suggest a method that .NET smart web development is enhanced through Managed Hybrid Web to improve the problems of UI development and representation in Hybrid Web. Improvement of structured system design of Managed Hybrid Web can enhance the efficiency and extendability of the interface objects. In particular, Source convenience is further enhanced regarding to coexistence of the objects if a client and server technique is applied to the class generation ways. It comes to the conclusion that the application of the user interface has the free representation ways, and the extension of representation ways can be achieved by each part independence.

Tax Judgment Analysis and Prediction using NLP and BiLSTM (NLP와 BiLSTM을 적용한 조세 결정문의 분석과 예측)

  • Lee, Yeong-Keun;Park, Koo-Rack;Lee, Hoo-Young
    • Journal of Digital Convergence
    • /
    • v.19 no.9
    • /
    • pp.181-188
    • /
    • 2021
  • Research and importance of legal services applied with AI so that it can be easily understood and predictable in difficult legal fields is increasing. In this study, based on the decision of the Tax Tribunal in the field of tax law, a model was built through self-learning through information collection and data processing, and the prediction results were answered to the user's query and the accuracy was verified. The proposed model collects information on tax decisions and extracts useful data through web crawling, and generates word vectors by applying Word2Vec's Fast Text algorithm to the optimized output through NLP. 11,103 cases of information were collected and classified from 2017 to 2019, and verified with 70% accuracy. It can be useful in various legal systems and prior research to be more efficient application.

A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing

  • Dai, Yingling;Weng, Jian;Yang, Anjia;Yu, Shui;Deng, Robert H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2827-2848
    • /
    • 2021
  • Mobile Crowdsourcing (MCS) has become an emerging paradigm evolved from crowdsourcing by employing advanced features of mobile devices such as smartphones to perform more complicated, especially spatial tasks. One of the key procedures in MCS is to collect answers from mobile users (workers), which may face several security issues. First, authentication is required to ensure that answers are from authorized workers. In addition, MCS tasks are usually location-dependent, so the collected answers could disclose workers' location privacy, which may discourage workers to participate in the tasks. Finally, the overhead occurred by authentication and privacy protection should be minimized since mobile devices are resource-constrained. Considering all the above concerns, in this paper, we propose a lightweight and privacy-preserving answer collection scheme for MCS. In the proposed scheme, we achieve anonymous authentication based on traceable ring signature, which provides authentication, anonymity, as well as traceability by enabling malicious workers tracing. In order to balance user location privacy and data availability, we propose a new concept named current location privacy, which means the location of the worker cannot be disclosed to anyone until a specified time. Since the leakage of current location will seriously threaten workers' personal safety, causing such as absence or presence disclosure attacks, it is necessary to pay attention to the current location privacy of workers in MCS. We encrypt the collected answers based on timed-release encryption, ensuring the secure transmission and high availability of data, as well as preserving the current location privacy of workers. Finally, we analyze the security and performance of the proposed scheme. The experimental results show that the computation costs of a worker depend on the number of ring signature members, which indicates the flexibility for a worker to choose an appropriate size of the group under considerations of privacy and efficiency.

A Study on Effective Security Control Model Based on Characteristic of Web Service (웹 서비스 특성 기반 효율적인 보안관제 모델 연구)

  • Lee, Jae-heon;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.175-185
    • /
    • 2019
  • The security control is to protect IT system from cyber infringement by deriving valid result values in the process of gathering and analyzing various information. Currently, security control is very effective by using SIEM equipment which enables analysis of systematic and comprehensive viewpoint based on a lot of data, away from analyzing cyber threat information with only fragmentary information. However, It can also be said that cyber attacks are analyzed and coped with the manual work of security personnel. This means that even if there is excellent security equipment, the results will vary depending on the user using. In case of operating a characteristic web service including information provision, This study suggests the basic point of security control through characteristics information analysis, and proposes a model for intensive security control through the type discovery and application which enable a step-wise analysis and an effective filtering. Using this model would effectively detect, analyze and block attacks.

A Study on the Color Image of Environment Shape Objects in University -Focusing on the Case of Kongju University- (대학 내 공공 환경조형물 색채 감성이미지 분석 연구 -공주대학교 사례를 중심으로-)

  • Kim, Hye-Jin;Chung, Ji-Bok;Choi, Jung-In
    • Journal of Digital Convergence
    • /
    • v.17 no.6
    • /
    • pp.349-354
    • /
    • 2019
  • The purpose of this study is to measure and analyze color image scale when viewing the public objects installed in Kongju National University and the installation environment, and preferred colors and color image scale in the color planning. The research was conducted with the analysis of the sculpture installed in the school and the questionnaire for the students. As a result of the study, suggestions were made for points to be considered for user's perception of environmental sculptures in the school and when constructing the sculpture. This study approaches the color of the public environment sculpture installed in the school academically, and proposes factors to be considered in the color planning stage in the future. Therefore, it is expected that this study will provide appropriate guidelines for the installation and planning of the sculpture in the school.

Design and Analysis of Technical Management System of Personal Information Security using Web Crawer (웹 크롤러를 이용한 개인정보보호의 기술적 관리 체계 설계와 해석)

  • Park, In-pyo;Jeon, Sang-june;Kim, Jeong-ho
    • Journal of Platform Technology
    • /
    • v.6 no.4
    • /
    • pp.69-77
    • /
    • 2018
  • In the case of personal information files containing personal information, there is insufficient awareness of personal information protection in end-point areas such as personal computers, smart terminals, and personal storage devices. In this study, we use Diffie-Hellman method to securely retrieve personal information files generated by web crawler. We designed SEED and ARIA using hybrid slicing to protect against attack on personal information file. The encryption performance of the personal information file collected by the Web crawling method is compared with the encryption decryption rate according to the key generation and the encryption decryption sharing according to the user key level. The simulation was performed on the personal information file delivered to the external agency transmission process. As a result, we compared the performance of existing methods and found that the detection rate is improved by 4.64 times and the information protection rate is improved by 18.3%.