• Title/Summary/Keyword: online algorithm

Search Result 587, Processing Time 0.027 seconds

Design of Query Processing System to Retrieve Information from Social Network using NLP

  • Virmani, Charu;Juneja, Dimple;Pillai, Anuradha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1168-1188
    • /
    • 2018
  • Social Network Aggregators are used to maintain and manage manifold accounts over multiple online social networks. Displaying the Activity feed for each social network on a common dashboard has been the status quo of social aggregators for long, however retrieving the desired data from various social networks is a major concern. A user inputs the query desiring the specific outcome from the social networks. Since the intention of the query is solely known by user, therefore the output of the query may not be as per user's expectation unless the system considers 'user-centric' factors. Moreover, the quality of solution depends on these user-centric factors, the user inclination and the nature of the network as well. Thus, there is a need for a system that understands the user's intent serving structured objects. Further, choosing the best execution and optimal ranking functions is also a high priority concern. The current work finds motivation from the above requirements and thus proposes the design of a query processing system to retrieve information from social network that extracts user's intent from various social networks. For further improvements in the research the machine learning techniques are incorporated such as Latent Dirichlet Algorithm (LDA) and Ranking Algorithm to improve the query results and fetch the information using data mining techniques.The proposed framework uniquely contributes a user-centric query retrieval model based on natural language and it is worth mentioning that the proposed framework is efficient when compared on temporal metrics. The proposed Query Processing System to Retrieve Information from Social Network (QPSSN) will increase the discoverability of the user, helps the businesses to collaboratively execute promotions, determine new networks and people. It is an innovative approach to investigate the new aspects of social network. The proposed model offers a significant breakthrough scoring up to precision and recall respectively.

A Study on Security Consideration and Utilization of Domestic Encryption Algorithm for Developing Secure Smartphone Applications (안전한 스마트폰 애플리케이션 개발을 위한 보안 고려사항 및 국산암호알고리즘 적용 방안 연구)

  • Kim, Jee Yeon;Jeon, Woong Ryul;Lee, Young Sook;Kim, Mi Joo;Jung, Hyun Chul;Won, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.51-61
    • /
    • 2011
  • A smartphone is a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone. Unlike feature phone, a smartphone allows the user to install and run more advanced applications based on a specific platform. Smartphones run complete operating system software providing a platform for application developers. A smartphone will become the default computing method for many point activities in the not-too-distant future, such as e-mail, online shopping, gaming, and even video entertainment. For smartphone that contains sensitive information and access the Internet, security is a major issue. In the 1980s, security issues were hardly noticed; however, security is a major issue for users today, which includes smart phones. Because security is much more difficult to address once deployment and implementation are underway, it should be considered from the beginning. Recently our government recognized the importance of smartphone security and published several safety tips for using the smartphone. However, theses tips are user-oriented measures. Maintaining the security of a smartphone involves the active participation of the user. Although it is a important users understand and take full advantage of the facilities afforded by smarphone, it is more important developers distribute the secure smartphone application through the market. In this paper we describe some scenarios in which user is invaded his/her privacy by smartphone stolen, lost, misplaced or infected with virus. Then we suggest the security considerations for securing smartphone applications in respect with developers. We also suggest the methods applying domestic encryption algorithms such as SEED, HIGHT and ARIA in developing secure applications. This suggested security considerations may be used by developers as well as users (especially organizations) interested in enhancing security to related security incidents for current and future use of smartphones.

Development of a Diagnosis Algorithm of Influent Loading Levels Using Pattern Matching Method in Sequencing Batch Reactor (SBR) (연속회분식반응기에서 패턴매칭방법을 이용한 유입수 부하수준 진단 알고리즘 개발)

  • Kim, Ye-Jin;Ahn, Yu-Ga;Kim, Hyo-Su;Shin, Jung-Phil;Kim, Chang-Won
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.31 no.2
    • /
    • pp.102-108
    • /
    • 2009
  • DO, ORP and pH values measured during SBR operation can provide information about removal reaction of organic contaminants and nutrient materials in the reactor. It is already generalized control strategy to control reaction phase time using their special patterns indicating the end of the removal reactions. However, those informations are limited to point out the end time of oxidative reaction in the aerobic phase or reductive reaction in the anoxic phase without giving quantitative value of influent loading level. In this research, a diagnosis algorithm which can estimate the loading level of carbon and ammonia as high, medium and low was developed using the basic measurements like DO, ORP, and pH. It will be possible to know the level of influent loading rate from those online measurements without experimental analysis.

Development of High Speed Scalar Product Operation System for ECC Public Key (타원곡선 공개키 생성을 위한 고속 스칼라곱 연산 시스템 구현)

  • Kim, Kap-Yol;Lee, Chul-Soo;Park, Seok-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.394-402
    • /
    • 2010
  • At a recent, enterprises based on online-service are established because of rapid growth of information network. These enterprises collect personal information and do customer management. If customers use a paid service, company send billing information to customer and customer pay it. Such circulation and management of information is big issue but most companies don't care of information security. Actually, personal information that was managed by largest internal open-market was exposed. For safe customer information management, this paper proposes the method that decrease load of RSA cryptography algorithm that is commonly used for preventing from illegal attack or hacking. The method for decreasing load was designed by Binary NAF Method and it can operates modular Exponentiation rapidly. We implemented modular Exponentiation algorithm using existing Binary Method and Windows Method and compared and evaluated it.

Development of Statistical/Probabilistic-Based Adaptive Thresholding Algorithm for Monitoring the Safety of the Structure (구조물의 안전성 모니터링을 위한 통계/확률기반 적응형 임계치 설정 알고리즘 개발)

  • Kim, Tae-Heon;Park, Ki-Tae
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.20 no.4
    • /
    • pp.1-8
    • /
    • 2016
  • Recently, buildings tend to be large size, complex shape and functional. As the size of buildings is becoming massive, the need for structural health monitoring(SHM) technique is ever-increasing. Various SHM techniques have been studied for buildings which have different dynamic characteristics and are influenced by various external loads. Generally, the visual inspection and non-destructive test for an accessible point of structures are performed by experts. But nowadays, the system is required which is online measurement and detect risk elements automatically without blind spots on structures. In this study, in order to consider the response of non-linear structures, proposed a signal feature extraction and the adaptive threshold setting algorithm utilized to determine the abnormal behavior by using statistical methods such as control chart, root mean square deviation, generalized extremely distribution. And the performance of that was validated by using the acceleration response of structures during earthquakes measuring system of forced vibration tests and actual operation.

A Study on the Development of Product Planning Prediction Model Using Logistic Regression Algorithm (로지스틱 회귀 알고리즘을 활용한 상품 기획 예측 모형 개발에 관한 연구)

  • Ahn, Yeong-Hwil;Park, Koo-Rack;Kim, Dong-Hyun;Kim, Do-Yeon
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.9
    • /
    • pp.39-47
    • /
    • 2021
  • This study was conducted to propose a product planning prediction model using logistic regression algorithm to predict seasonal factors and rapidly changing product trends. First, we collected unstructured data of consumers in portal sites and online markets using web crawling, and analyzed meaningful information about products through preprocessing for transformation of standardized data. The datasets of 11,200 were analyzed by Logistic Regression to analyze consumer satisfaction, frequency analysis, and advantages and disadvantages of products. The result of analysis showed that the satisfaction of consumers was 92% and the defective issues of products were confirmed through frequency analysis. The results of analysis on the use satisfaction, system efficiency, and system effectiveness items of the developed product planning prediction program showed that the satisfaction was high. Defective issues are very meaningful data in that they provide information necessary for quickly recognizing the current problem of products and establishing improvement strategies.

3D spatial data generation and data cross-utilization for monitoring Geoparks: Using Unmanned Aerial Vehicle and Virtual Reality (지질공원 모니터링을 위한 3D 공간데이터 구축과 데이터 교차활용 방안연구: 무인항공기와 가상현실을 이용하여)

  • Park, Haekyung;Lee, Dongkun
    • Journal of the Geological Society of Korea
    • /
    • v.54 no.5
    • /
    • pp.501-511
    • /
    • 2018
  • Geoparks are worth preserving in an environmentally and heritage. Monitoring and public attention are essential for the conservation and protection of geoparks. The use of Unmanned Aerial Vehicles and the Structure from Motion algorithm enables effective monitoring of geoparks that are difficult to manage due to their wide range of manpower, and various spatial data derived from SfM can be utilized to improve awareness of geoparks that have been lacking. In order to prove this, firstly, we created the 3D spatial data by using the UAV and the SfM algorithm, which is one of the National geoparks of the Hantan-Imjin River area. Using this 3D data for Virtual Reality and 3D printing. After that, we verified the possibility of promoting the geopark through a simple online survey. Finally, we propose a method to utilize all the generated data from each step to promote and research for geoparks.

Robust Object Tracking based on Weight Control in Particle Swarm Optimization (파티클 스웜 최적화에서의 가중치 조절에 기반한 강인한 객체 추적 알고리즘)

  • Kang, Kyuchang;Bae, Changseok;Chung, Yuk Ying
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.14 no.6
    • /
    • pp.15-29
    • /
    • 2018
  • This paper proposes an enhanced object tracking algorithm to compensate the lack of temporal information in existing particle swarm optimization based object trackers using the trajectory of the target object. The proposed scheme also enables the tracking and documentation of the location of an online updated set of distractions. Based on the trajectories information and the distraction set, a rule based approach with adaptive parameters is utilized for occlusion detection and determination of the target position. Compare to existing algorithms, the proposed approach provides more comprehensive use of available information and does not require manual adjustment of threshold values. Moreover, an effective weight adjustment function is proposed to alleviate the diversity loss and pre-mature convergence problem in particle swarm optimization. The proposed weight function ensures particles to search thoroughly in the frame before convergence to an optimum solution. In the existence of multiple objects with similar feature composition, this algorithm is tested to significantly reduce convergence to nearby distractions compared to the other existing swarm intelligence based object trackers.

Stochastic Optimization of Multipath TCP for Energy Minimization and Network Stability over Heterogeneous Wireless Network

  • Arain, Zulfiqar Arain;Qiu, Xuesong;Zhong, Lujie;Wang, Mu;Chen, Xingyan;Xiong, Yongping;Nahida, Kiran;Xu, Changqiao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.195-215
    • /
    • 2021
  • Multipath Transport Control Protocol (MPTCP) is a transport layer protocol that enables multiple TCP connections across various paths. Due to path heterogeneity, it incurs more energy in a multipath wireless network. Recent work presents a set of approaches described in the literature to support systems for energy consumption in terms of their performance, objectives and address issues based on their design goals. The existing solutions mainly focused on the primary system model but did not discourse the overall system performance. Therefore, this paper capitalized a novel stochastically multipath scheduling scheme for data and path capacity variations. The scheduling problem formulated over MPTCP as a stochastic optimization, whose objective is to maximize the average throughput, avoid network congestion, and makes the system more stable with greater energy efficiency. To design an online algorithm that solves the formulated problem over the time slots by considering its mindrift-plus penalty form. The proposed solution was examined under extensive simulations to evaluate the anticipated stochastic optimized MPTCP (so-MPTCP) outcome and compared it with the base MPTCP and the energy-efficient MPTCP (eMPTCP) protocols. Simulation results justify the proposed algorithm's credibility by achieving remarkable improvements, higher throughput, reduced energy costs, and lower-end to end delay.

Algorithm for Freight Transportation Performance Estimation on Expressway Using TCS and WIM Data (TCS 및 WIM 데이터를 활용한 고속도로 화물수송실적 산정 알고리즘 개발)

  • Youjeong Kang;Jungyeol Hong;Yoonhyuk Choi
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.3
    • /
    • pp.116-130
    • /
    • 2023
  • Expressways play pivotal roles in cargo transportation because of their superior accessibility and mobility compared to rail and air. On the other hand, there is a limit to the accurate calculation of cargo transportation performance using existing highways owing to the mixture of vehicle types and difficulty in identifying cargo loads of individual cargo vehicles. This paper presents an algorithm for calculating more reliable cargo transportation performance using big data. The traffic performance (veh·km/day) was derived using the data collected from Toll Collecting System. The average tolerance weight for each vehicle type and the cargo load unit (ton/unit) considering it was calculated using vehicle specification information data and high-speed and low-speed axis data. This study calculated the cargo transportation performance by section and type using various online integrated highway data and presented a method for calculating the transportation performance by linking open business offices and private highways.