• Title/Summary/Keyword: Web technologies

Search Result 975, Processing Time 0.025 seconds

Production of Farm-level Agro-information for Adaptation to Climate Change (기후변화 대응을 위한 농장수준 농업정보 생산)

  • Moon, Kyung Hwan;Seo, Hyeong Ho;Shin, Min Ji;Song, Eung Young;Oh, Soonja
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.21 no.3
    • /
    • pp.158-166
    • /
    • 2019
  • Implementing proper land management techniques, such as selecting the best crops and applying the best cultivation techniques at the farm level, is an effective way for farmers to adapt to climate change. Also it will be helpful if the farmer can get the information of agro-weather and the growth status of cultivating crops in real time and the simulated results of applying optional technologies. To test this, a system (web site) was developed to produce agro-weather data and crop growth information of farms by combining agricultural climate maps and crop growth modeling techniques to highland area for summer-season Chinese cabbage production. The system has been shown to be a viable tool for producing farm-level information and providing it directly to farmers. Further improvements will be required in the speed of information access, the microclimate models for some meteorological factors, and the crop growth models to test different options.

An Integrated Emergency Call System based on Public Switched Telephone Network for Elevators

  • Lee, Guisun;Ryu, Hyunmi;Park, Sunggon;Cho, Sungguk;Jeon, Byungkook
    • International journal of advanced smart convergence
    • /
    • v.8 no.3
    • /
    • pp.69-77
    • /
    • 2019
  • Today, most of elevators have an emergency call facility for emergency situations. However, if the network installed in the elevator is also out of power, it cannot be used for the elevator remote monitoring and management. So, we develop an integrated and unified emergency call system, which can transmit not only telephone call but also data signals using PSTN(Public Switched Telephone Network) in order to remote monitoring and management of elevators, even though a power outage occurs. The proposed integrated emergency call system to process multiple data such as voice and operational information is a multi-channel board system which is composed of an emergency phone signal processing module and an operational information processing module in the control box of elevator. In addition, the RMS(remote management server) systems based on the Web consist of a dial-up server and a remote monitoring server where manages the elevator's operating information, status records, and operational faults received via the proposed integrated and unified emergency call system in real time. So even if there's a catastrophic emergency, the proposed RMS systems shall ensure and maintain the safety of passengers inside the elevator. Also, remote control of the elevator by this system should be more efficient and secure. In near future, all elevator emergency call system need to support multifunctional capabilities to transmit operational data as well as phone calls for the safety of passengers. In addition, for safer elevators, it is necessary to improve them more efficiently by combining them with high-tech technologies such as the Internet of Things and artificial intelligence.

Goal Gradient Effect in Reward-based Crowdfunding; Difference in Project Category (후원형 크라우드 펀딩에서의 목표 구배 효과; 프로젝트 카테고리 별 차이를 중심으로)

  • Hwang, Ji Hyeon;Choi, Kang Jun;Lee, Jae Young;Soh, Seung Bum
    • Knowledge Management Research
    • /
    • v.20 no.3
    • /
    • pp.173-193
    • /
    • 2019
  • Reward-based crowdfunding is a funding platform that allows funds to be raised to early operators who have lack of funds, and is seen as an outstanding infrastructure that is going to lead the fourth industrial revolution in that it is a field of realization of new technologies and creative ideas by start-ups. Reward-based crowdfunding has grown in line with the trend of the fourth industrial revolution, and funding success cases are taking place in various industries that culture/art to technology/IT, including as a new means of knowledge management in a rapidly changing industrial environment. The study focused on the fact that consumer's donation purposes may also vary depending on the category of projects classified as reward-based crowdfunding. Because consumer payment decisions and motivation of consumer purchasing behavior are classified according to the purpose of purchase, the previous papers that the goal gradient effect that the main motivation of consumer donation for reward-based crowdfunding introduced vary depending on project category of utilitarian and hedonic. In this study, consumer's daily donation data is collected by Indiegogo which is a leading reward-based crowdfunding company using web-crawling and the model was defined as propensity score matching (PSM) and random effect model. The results showed that the goal gradient effect occurred in utilitarian project category, but no goal gradient effect for the hedonic project category. Furthermore, this paper developed the study of motivation of consumer donation and contributes theoretical foundation by the results consumer donation may vary depending on the project category; also, this paper has implications for an effective marketing strategy depending on the project category leaves real meaning to the projector.

Factors affecting success and failure of Internet company business model using inductive learning based on ID3 algorithm (ID3 알고리즘 기반의 귀납적 추론을 활용한 인터넷 기업 비즈니스 모델의 성공과 실패에 영향을 미치는 요인에 관한 연구)

  • Jin, Dong-su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.111-116
    • /
    • 2019
  • New technologies such as the IoT, Big Data, and Artificial Intelligence, starting from the Web, mobile, and smart device, enable new business models that did not exist before, and various types of Internet companies based on these business models has been emerged. In this research, we examine the factors that influence the success and failure of Internet companies. To do this, we review the recent studies on business model and examine the variables affecting the success of Internet companies in terms of network effect, user interface, cooperation with actors, creating value for users. Using the five derived variables, we will select 14 Internet companies that succeeded and failed in seven commercial business model categories. We derive decision tree by applying inductive learning based on ID3 algorithm to the analysis result and derive rules that affect success and failure based on derived decision tree. With these rules, we want to present the strategic implications for actors to succeed in Internet companies.

A Malware Detection Method using Analysis of Malicious Script Patterns (악성 스크립트 패턴 분석을 통한 악성코드 탐지 기법)

  • Lee, Yong-Joon;Lee, Chang-Beom
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.613-621
    • /
    • 2019
  • Recently, with the development of the Internet of Things (IoT) and cloud computing technologies, security threats have increased as malicious codes infect IoT devices, and new malware spreads ransomware to cloud servers. In this study, we propose a threat-detection technique that checks obfuscated script patterns to compensate for the shortcomings of conventional signature-based and behavior-based detection methods. Proposed is a malicious code-detection technique that is based on malicious script-pattern analysis that can detect zero-day attacks while maintaining the existing detection rate by registering and checking derived distribution patterns after analyzing the types of malicious scripts distributed through websites. To verify the performance of the proposed technique, a prototype system was developed to collect a total of 390 malicious websites and experiment with 10 major malicious script-distribution patterns derived from analysis. The technique showed an average detection rate of about 86% of all items, while maintaining the existing detection speed based on the detection rule and also detecting zero-day attacks.

Development of a Method for Analyzing and Visualizing Concept Hierarchies based on Relational Attributes and its Application on Public Open Datasets

  • Hwang, Suk-Hyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.13-25
    • /
    • 2021
  • In the age of digital innovation based on the Internet, Information and Communication and Artificial Intelligence technologies, huge amounts of datasets are being generated, collected, accumulated, and opened on the web by various public institutions providing useful and public information. In order to analyse, gain useful insights and information from data, Formal Concept Analysis(FCA) has been successfully used for analyzing, classifying, clustering and visualizing data based on the binary relation between objects and attributes in the dataset. In this paper, we present an approach for enhancing the analysis of relational attributes of data within the extended framework of FCA, which is designed to classify, conceptualize and visualize sets of objects described not only by attributes but also by relations between these objects. By using the proposed tool, RCA wizard, several experiments carried out on some public open datasets demonstrate the validity and usability of our approach on generating and visualizing conceptual hierarchies for extracting more useful knowledge from datasets. The proposed approach can be used as an useful tool for effective data analysis, classifying, clustering, visualization and exploration.

A Service Model Development Plan for Countering Denial of Service Attacks based on Artificial Intelligence Technology (인공지능 기술기반의 서비스거부공격 대응 위한 서비스 모델 개발 방안)

  • Kim, Dong-Maeong;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.587-593
    • /
    • 2021
  • In this thesis, we will break away from the classic DDoS response system for large-scale denial-of-service attacks that develop day by day, and effectively endure intelligent denial-of-service attacks by utilizing artificial intelligence-based technology, one of the core technologies of the 4th revolution. A possible service model development plan was proposed. That is, a method to detect denial of service attacks and minimize damage through machine learning artificial intelligence learning targeting a large amount of data collected from multiple security devices and web servers was proposed. In particular, the development of a model for using artificial intelligence technology is to detect a Western service attack by focusing on the fact that when a service denial attack occurs while repeating a certain traffic change and transmitting data in a stable flow, a different pattern of data flow is shown. Artificial intelligence technology was used. When a denial of service attack occurs, a deviation between the probability-based actual traffic and the predicted value occurs, so it is possible to respond by judging as aggressiveness data. In this paper, a service denial attack detection model was explained by analyzing data based on logs generated from security equipment or servers.

Malware Detection Via Hybrid Analysis for API Calls (API call의 단계별 복합분석을 통한 악성코드 탐지)

  • Kang, Tae-Woo;Cho, Jae-Ik;Chung, Man-Hyun;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.89-98
    • /
    • 2007
  • We have come a long way in the information age. Thanks to the advancement of such technologies as the internet, we have discovered new ways to convey information on a broader scope. However, negative aspects exist as is with anything else. These may include invasion of privacy over the web, or identity theft over the internet. What is more alarming is that malwares so called 'maliciouscodes' are rapidly spreading. Its intent is very destructive which can result in hacking, phishing and as aforementioned, one of the most disturbing problems on the net, invasion of privacy. This thesis describes the technology of how you can effectively analyze and detect these kind of malicious codes. We propose sequencial hybrid analysis for API calls that are hooked inside user-mode and kernel-level of Windows. This research explains how we can cope with malicious code more efficiently by abstracting malicious function signature and hiding attribute.

An Intelligent Game Theoretic Model With Machine Learning For Online Cybersecurity Risk Management

  • Alharbi, Talal
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.390-399
    • /
    • 2022
  • Cyber security and resilience are phrases that describe safeguards of ICTs (information and communication technologies) from cyber-attacks or mitigations of cyber event impacts. The sole purpose of Risk models are detections, analyses, and handling by considering all relevant perceptions of risks. The current research effort has resulted in the development of a new paradigm for safeguarding services offered online which can be utilized by both service providers and users. customers. However, rather of relying on detailed studies, this approach emphasizes task selection and execution that leads to successful risk treatment outcomes. Modelling intelligent CSGs (Cyber Security Games) using MLTs (machine learning techniques) was the focus of this research. By limiting mission risk, CSGs maximize ability of systems to operate unhindered in cyber environments. The suggested framework's main components are the Threat and Risk models. These models are tailored to meet the special characteristics of online services as well as the cyberspace environment. A risk management procedure is included in the framework. Risk scores are computed by combining probabilities of successful attacks with findings of impact models that predict cyber catastrophe consequences. To assess successful attacks, models emulating defense against threats can be used in topologies. CSGs consider widespread interconnectivity of cyber systems which forces defending all multi-step attack paths. In contrast, attackers just need one of the paths to succeed. CSGs are game-theoretic methods for identifying defense measures and reducing risks for systems and probe for maximum cyber risks using game formulations (MiniMax). To detect the impacts, the attacker player creates an attack tree for each state of the game using a modified Extreme Gradient Boosting Decision Tree (that sees numerous compromises ahead). Based on the findings, the proposed model has a high level of security for the web sources used in the experiment.

A Study on the Semantic Modeling of Manufacturing Facilities based on Status Definition and Diagnostic Algorithms (상태 정의 및 진단 알고리즘 기반 제조설비 시멘틱 모델링에 대한 연구)

  • Kwang-Jin, Kwak;Jeong-Min, Park
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.1
    • /
    • pp.163-170
    • /
    • 2023
  • This paper introduces the semantic modeling technology for autonomous control of manufacturing facilities and status definition algorithm. With the development of digital twin technology and various ICT technologies of the smart factory, a new production management model is being built in the manufacturing industry. Based on the advanced smart manufacturing technology, the status determination algorithm was presented as a methodology to quickly identify and respond to problems with autonomous control and facilities in the factory. But the existing status determination algorithm informs the user or administrator of error information through the grid map and is presented as a model for coping with it. However, the advancement and direction of smart manufacturing technology is diversifying into flexible production and production tailored to consumer needs. Accordingly, in this paper, a technology that can design and build a factory using a semantic-based Linked List data structure and provide only necessary information to users or managers through graph-based information is introduced to improve management efficiency. This methodology can be used as a structure suitable for flexible production and small-volume production of various types.