• Title/Summary/Keyword: real-time network

Search Result 4,424, Processing Time 0.035 seconds

Different Impacts of Independent Recurrent and Non-Recurrent Congestion on Freeway Segments (고속도로상의 독립적인 반복 및 비반복정체의 영향비교)

  • Gang, Gyeong-Pyo;Jang, Myeong-Sun
    • Journal of Korean Society of Transportation
    • /
    • v.25 no.6
    • /
    • pp.99-109
    • /
    • 2007
  • There have been few studies on the impacts of independent recurrent and non-recurrent congestion on freeway networks. The main reason is due partly to the lack of traffic data collected during those periods of recurrent and non-recurrent congestion and partly to the difficulty of using the simulation tools effectively. This study has suggested a methodology to analyze the independent impacts of the recurrent and non-recurrent congestion on target freeway segments. The proposed methodology is based on an elaborately calibrated simulation analysis, using real traffic data obtained during the recurrent and non-recurrent congestion periods. This paper has also summarized the evaluation results from the field tests of two ITS technologies, which were developed to provide drivers with real-time traffic information under traffic congestion. As a result, their accuracy may not be guaranteed during the transition periods such as the non-recurrent congestion. In summary, this study has been focused on the importance of non-recurrent congestion compared to recurrent congestion, and the proposed methodology is expected to provide a basic foundation for prioritizing limited government investments for improving freeway network performance degraded by recurrent or non-recurrent congestion.

A Practical Feature Extraction for Improving Accuracy and Speed of IDS Alerts Classification Models Based on Machine Learning (기계학습 기반 IDS 보안이벤트 분류 모델의 정확도 및 신속도 향상을 위한 실용적 feature 추출 연구)

  • Shin, Iksoo;Song, Jungsuk;Choi, Jangwon;Kwon, Taewoong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.385-395
    • /
    • 2018
  • With the development of Internet, cyber attack has become a major threat. To detect cyber attacks, intrusion detection system(IDS) has been widely deployed. But IDS has a critical weakness which is that it generates a large number of false alarms. One of the promising techniques that reduce the false alarms in real time is machine learning. However, there are problems that must be solved to use machine learning. So, many machine learning approaches have been applied to this field. But so far, researchers have not focused on features. Despite the features of IDS alerts are important for performance of model, the approach to feature is ignored. In this paper, we propose new feature set which can improve the performance of model and can be extracted from a single alarm. New features are motivated from security analyst's know-how. We trained and tested the proposed model applied new feature set with real IDS alerts. Experimental results indicate the proposed model can achieve better accuracy and false positive rate than SVM model with ordinary features.

A Study on the Introduction of Electronic Commerce for Purchasing Section in Hospitals - Focused on the Understanding of Purchasing Managers - (병원구매업무에 있어서의 전자상거래 도입에 관한 연구 - 구매부서 관리자의 인식도를 중심으로 -)

  • Hwang, Eun-Bum;Nam, Sang-Yo;Ha, Ho-Uk;Lee, Chang-Eun
    • Korea Journal of Hospital Management
    • /
    • v.6 no.3
    • /
    • pp.69-89
    • /
    • 2001
  • This study is focused that the electronic commerce(EC) on the purchasing section may improve the efficiency and transparency of the hospitals management. After reviewing the purchasing activity of hospitals, I study the introduction, expected effects, and problems of EC. So, I am going to provide basic information for activating EC. The samples are managers of 170 hospitals, which are located on Seoul. As a result of collection this survey, I analyze 79 hospitals. For data analysis, I use $X^2$-test and ANOVA for purchasing management and the relevance of EC according to the level of care. The results of this study are 1. The problems on the management of purchasing section are: firstly, they don't have sufficient time to study market. Secondly, it is difficult to find competitive suppliers. And, lastly, they cannot gather a lot of information about the price of products. 2. There are many answers of the needs on the introduction of B2B. However, some hospitals think they don't need it. But, the most answers are that the EC will be settled within 4 years. So, we can realize that these hospitals are getting interested on the EC. On the other hand, I find that they prefer outside EC companies for the introduction of EC. 3. On the expected effects on EC, first is the effectiveness of the market survey. The next is to collect information of adequate price of products owing to clear transaction, find easier new suppliers and gather useful data. 4. On the external problems of the introduction of EC, there is low credibility related to the security and the weakness of suppliers' information system. Especially, on the Real Transaction Price Payment system, the bigger bed size, the higher understanding on these problems. On the internal problems of the introduction of EC, first is the burden of the introduction of EC and operating cost. Especially, on the burden of the disclosure of revenue source, the smaller bed size, the higher understanding on this problem So, this is a point which deserves my attention statistically. However, this shows relatively little understanding about incomplete the standard of product category and the weak information system of hospital. Through this study, I am going to suggest 3 points for the activation of the introduction of EC on hospitals. 1. The reform of the Real Transaction Price Payment System on medical supplies and materials for medical treatment 2. The establishment of the standard of product category 3. The promotion of information system based on network.

  • PDF

A Study on the Method of Energy Evaluation in Water Supply Networks (상수관망의 에너지 평가기법에 관한 연구)

  • Kim, Seong-Won;Kim, Dohwan;Choi, Doo Yong;Kim, Juhwan
    • Journal of Korea Water Resources Association
    • /
    • v.46 no.7
    • /
    • pp.745-754
    • /
    • 2013
  • The systematic analysis and evaluation of required energy in the processes of drinking water production and supply have attracted considerable interest considering the need to overcome electricity shortage and control greenhouse gas emissions. On the basis of a review of existing research results, a practical method is developed in this study for evaluating energy in water supply networks. The proposed method can be applied to real water supply systems. A model based on the proposed method is developed by combining the hydraulic analysis results that are obtained using the EPANET2 software with a mathematical energy model on the MATLAB platform. It is suggested that performance indicators can evaluate the inherent efficiency of water supply facilities as well as their operational efficiency depending on the pipeline layout, pipe condition, and leakage level. The developed model is validated by applying it to virtual and real water supply systems. It is expected that the management of electric power demand on the peak time of water supply and the planning of an energy-efficient water supply system can be effectively achieved by the optimal management of energy by the proposed method in this study.

The Legal Protection Scope and Limitation of Information (정보의 법적 보호범위와 한계)

  • Kim, Hyung-Man;Yang, Myung-Sub
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.691-699
    • /
    • 2012
  • "Information", which is circulated in society by information technology development represented by computer, has brought innovation not only to physical civilization, but also deep into our daily lives. This is to say that information has brought fundamental change to its form of existence, and value system through being faster regarding the circulation and the way of management being diverse. As time goes by, this kind of change would stimulate more changes to be made as the development of scientific civilization. Therefore, informatization is one of the important characteristic that defines modern society's essence, but on the other side, information has been taken advantage of that temperament and abused in a lot of different ways. "The Law Regarding Computer Network Diffusion Expansion and Usage Promotion"(1986), as a counterplan of informatization is our nation's first Act about informatization, which enacts national policy and system about this issue. Since then, many laws has been enacted down to "Private Information Protection Act"(2011), forming a comprehensive system. The basic background of these laws are based upon the premise that even if the place where the information is managed is virtual space, rules that are considered valid in the real world should be basically applied in the virtual space. Therefore, the violation of the law in the real world is also considered the violation in the virtual space. This direction of current law regarding information is shared with both the theories and the reality. However, current law system and notion are based upon the premise that the law regards material objects, thus the characteristic of the information, which is "Immaterial Being" is not reflected. Also, the management and approach to this issue is allopathic, exposing many problems. Thus, this paper examines the way of protecting information stipulated in the current law, contemplates its protection scope and limitation, and seeks the direction of the improvement, based on the critical mind explained above.

Performance Analysis of Siding Window based Stream High Utility Pattern Mining Methods (슬라이딩 윈도우 기반의 스트림 하이 유틸리티 패턴 마이닝 기법 성능분석)

  • Ryang, Heungmo;Yun, Unil
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.53-59
    • /
    • 2016
  • Recently, huge stream data have been generated in real time from various applications such as wireless sensor networks, Internet of Things services, and social network services. For this reason, to develop an efficient method have become one of significant issues in order to discover useful information from such data by processing and analyzing them and employing the information for better decision making. Since stream data are generated continuously and rapidly, there is a need to deal with them through the minimum access. In addition, an appropriate method is required to analyze stream data in resource limited environments where fast processing with low power consumption is necessary. To address this issue, the sliding window model has been proposed and researched. Meanwhile, one of data mining techniques for finding meaningful information from huge data, pattern mining extracts such information in pattern forms. Frequency-based traditional pattern mining can process only binary databases and treats items in the databases with the same importance. As a result, frequent pattern mining has a disadvantage that cannot reflect characteristics of real databases although it has played an essential role in the data mining field. From this aspect, high utility pattern mining has suggested for discovering more meaningful information from non-binary databases with the consideration of the characteristics and relative importance of items. General high utility pattern mining methods for static databases, however, are not suitable for handling stream data. To address this issue, sliding window based high utility pattern mining has been proposed for finding significant information from stream data in resource limited environments by considering their characteristics and processing them efficiently. In this paper, we conduct various experiments with datasets for performance evaluation of sliding window based high utility pattern mining algorithms and analyze experimental results, through which we study their characteristics and direction of improvement.

Reliable Assessment of Rainfall-Induced Slope Instability (강우로 인한 사면의 불안정성에 대한 신뢰성 있는 평가)

  • Kim, Yun-Ki;Choi, Jung-Chan;Lee, Seung-Rae;Seong, Joo-Hyun
    • Journal of the Korean Geotechnical Society
    • /
    • v.25 no.5
    • /
    • pp.53-64
    • /
    • 2009
  • Many slope failures are induced by rainfall infiltration. A lot of recent researches are therefore focused on rainfall-induced slope instability and the rainfall infiltration is recognized as the important triggering factor. The rainfall infiltrates into the soil slope and makes the matric suction lost in the slope and even the positive pore water pressure develops near the surface of the slope. They decrease the resisting shear strength. In Korea, a few public institutions suggested conservative slope design guidelines that assume a fully saturated soil condition. However, this assumption is irrelevant and sometimes soil properties are misused in the slope design method to fulfill the requirement. In this study, a more relevant slope stability evaluation method is suggested to take into account the real rainfall infiltration phenomenon. Unsaturated soil properties such as shear strength, soil-water characteristic curve and permeability for Korean weathered soils were obtained by laboratory tests and also estimated by artificial neural network models. For real-time assessment of slope instability, failure warning criteria of slope based on deterministic and probabilistic analyses were introduced to complement uncertainties of field measurement data. The slope stability evaluation technique can be combined with field measurement data of important factors, such as matric suction and water content, to develop an early warning system for probably unstable slopes due to the rainfall.

Log Collection Method for Efficient Management of Systems using Heterogeneous Network Devices (이기종 네트워크 장치를 사용하는 시스템의 효율적인 관리를 위한 로그 수집 방법)

  • Jea-Ho Yang;Younggon Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.119-125
    • /
    • 2023
  • IT infrastructure operation has advanced, and the methods for managing systems have become widely adopted. Recently, research has focused on improving system management using Syslog. However, utilizing log data collected through these methods presents challenges, as logs are extracted in various formats that require expert analysis. This paper proposes a system that utilizes edge computing to distribute the collection of Syslog data and preprocesses duplicate data before storing it in a central database. Additionally, the system constructs a data dictionary to classify and count data in real-time, with restrictions on transmitting registered data to the central database. This approach ensures the maintenance of predefined patterns in the data dictionary, controls duplicate data and temporal duplicates, and enables the storage of refined data in the central database, thereby securing fundamental data for big data analysis. The proposed algorithms and procedures are demonstrated through simulations and examples. Real syslog data, including extracted examples, is used to accurately extract necessary information from log data and verify the successful execution of the classification and storage processes. This system can serve as an efficient solution for collecting and managing log data in edge environments, offering potential benefits in terms of technology diffusion.

A USN Based Mobile Object Tracking System for the Prevention of Missing Child (미아방지를 위한 USN 기반 보호대상 이동체 위치확인 시스템)

  • Cha, Maeng-Q;Jung, Dae-Kyo;Kim, Yoon-Kee;Chong, Hak-Jin
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.5
    • /
    • pp.453-463
    • /
    • 2008
  • The missing child problem is no more a personal problem. It became a social problem that all parents must consider. To this, this study applies USN/RFID technology integrated with GIS for the prevention of missing child. Although RFID is not designed for location sensing, but now it is regarded as a device to facilitate real time location awareness. Such advantages of RFID can be integrated with 4S(GIS/GPS/LBS/GNSS) achieving much synergy effects. In order to prevent kidnapping and missing child, it is necessary to provide a missing child preventing system using a ubiquitous computing system. Therefore, the missing child preventing system has been developed using high-tech such as RFID, GPS network, CCTV, and mobile communication. The effectiveness of the missing child prevention system can be improved through an accurate location tracking technology. This study propose and test a location sensing system using the active RFID tags. This study verifies technical applied service, and presents a system configuration model. Finally, this paper confirms missing child prevention system utilization possibility.

Moving Object Tracking Using MHI and M-bin Histogram (MHI와 M-bin Histogram을 이용한 이동물체 추적)

  • Oh, Youn-Seok;Lee, Soon-Tak;Baek, Joong-Hwan
    • Journal of Advanced Navigation Technology
    • /
    • v.9 no.1
    • /
    • pp.48-55
    • /
    • 2005
  • In this paper, we propose an efficient moving object tracking technique for multi-camera surveillance system. Color CCD cameras used in this system are network cameras with their own IP addresses. Input image is transmitted to the media server through wireless connection among server, bridge, and Access Point (AP). The tracking system sends the received images through the network to the tracking module, and it tracks moving objects in real-time using color matching method. We compose two sets of cameras, and when the object is out of field of view (FOV), we accomplish hand-over to be able to continue tracking the object. When hand-over is performed, we use MHI(Motion History Information) based on color information and M-bin histogram for an exact tracking. By utilizing MHI, we can calculate direction and velocity of the object, and those information helps to predict next location of the object. Therefore, we obtain a better result in speed and stability than using template matching based on only M-bin histogram, and we verified this result by an experiment.

  • PDF