• Title/Summary/Keyword: user query

Search Result 700, Processing Time 0.029 seconds

A Study of Multi-Target Localization Based on Deep Neural Network for Wi-Fi Indoor Positioning

  • Yoo, Jaehyun
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.10 no.1
    • /
    • pp.49-54
    • /
    • 2021
  • Indoor positioning system becomes of increasing interests due to the demands for accurate indoor location information where Global Navigation Satellite System signal does not approach. Wi-Fi access points (APs) built in many construction in advance helps developing a Wi-Fi Received Signal Strength Indicator (RSSI) based indoor localization. This localization method first collects pairs of position and RSSI measurement set, which is called fingerprint database, and then estimates a user's position when given a query measurement set by comparing the fingerprint database. The challenge arises from nonlinearity and noise on Wi-Fi RSSI measurements and complexity of handling a large amount of the fingerprint data. In this paper, machine learning techniques have been applied to implement Wi-Fi based localization. However, most of existing indoor localizations focus on single position estimation. The main contribution of this paper is to develop multi-target localization by using deep neural, which is beneficial when a massive crowd requests positioning service. This paper evaluates the proposed multilocalization based on deep learning from a multi-story building, and analyses its learning effect as increasing number of target positions.

A Structured Overlay Network Scheme Based on Multiple Different Time Intervals

  • Kawakami, Tomoya
    • Journal of Information Processing Systems
    • /
    • v.16 no.6
    • /
    • pp.1447-1458
    • /
    • 2020
  • This paper describes a structured overlay network scheme based on multiple different time intervals. Many types of data (e.g., sensor data) can be requested at specific time intervals that depend on the user and the system. These queries are referred to as "interval queries." A method for constructing an overlay network that efficiently processes interval queries based on multiple different time intervals is proposed herein. The proposed method assumes a ring topology and assigns nodes to a keyspace based on one-dimensional time information. To reduce the number of forwarded messages for queries, each node constructs shortcut links for each interval that users tend to request. This study confirmed that the proposed method reduces the number of messages needed to process interval queries. The contributions of this study include the clarification of interval queries with specific time intervals; establishment of a structured overlay network scheme based on multiple different time intervals; and experimental verification of the scheme in terms of communication load, delay, and maintenance cost.

A New N-ary Entities Relation Approach for User Query Mean Desicion (사용자 질의 의미 결정을 위한 새로운 N-ary 개체 관계 디자인 패턴)

  • Su-Kyoung Kim;Kee-Hong Ahn
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.635-638
    • /
    • 2008
  • 본 연구는 웹이나 정보 검색 환경에서 사용자로부터 입력되는 단순한 키워드 형태의 질의가 아닌 문장형태의 질의에 있어 문장이 내포하는 질의의 의미를 결정하여 더 정확한 검색 결과를 제공하기 위해 온톨로지 내 개념들 간의 속성간 연결을 위해 A-Box 기반의 관계 선언과 새로운 N-ary 개체 관계 방법을 제안한다. 특히 개념 개체들 간의 의미를 더 정확히 결정하기 위해 기존의 N-ary 개체 관계 방법이 갖고 있는 속성에 가중치를 포함하는 것이 아니라 가중치에 관련된 새로운 개체를 생성 패턴을 제시하여 특정 개념에 연관된 개념들의 관련성 결정의 성능을 높이도록 하였다. 본 연구의 실험에 있어 사용자가 입력한 병증의 문장을 결정하기 위해, A-Box 기반의 관계 선언과 N-ary 디자인 패턴에 결합하는 지식 도메인 온톨로지 등을 구축하였으며, 이를 통한 실험 결과 문장의 의미에 따른 더 정확한 결과를 보여주었다.

Enhanced Grid-Based Trajectory Cloaking Method for Efficiency Search and User Information Protection in Location-Based Services (위치기반 서비스에서 효율적 검색과 사용자 정보보호를 위한 향상된 그리드 기반 궤적 클로킹 기법)

  • Youn, Ji-Hye;Song, Doo-Hee;Cai, Tian-Yuan;Park, Kwang-Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.8
    • /
    • pp.195-202
    • /
    • 2018
  • With the development of location-based applications such as smart phones and GPS navigation, active research is being conducted to protect location and trajectory privacy. To receive location-related services, users must disclose their exact location to the server. However, disclosure of users' location exposes not only their locations but also their trajectory to the server, which can lead to concerns of privacy violation. Furthermore, users request from the server not only location information but also multimedia information (photographs, reviews, etc. of the location), and this increases the processing cost of the server and the information to be received by the user. To solve these problems, this study proposes the EGTC (Enhanced Grid-based Trajectory Cloaking) technique. As with the existing GTC (Grid-based Trajectory Cloaking) technique, EGTC method divides the user trajectory into grids at the user privacy level (UPL) and creates a cloaking region in which a random query sequence is determined. In the next step, the necessary information is received as index by considering the sub-grid cell corresponding to the path through which the user wishes to move as c(x,y). The proposed method ensures the trajectory privacy as with the existing GTC method while reducing the amount of information the user must listen to. The excellence of the proposed method has been proven through experimental results.

Study on Windows Event Log-Based Corporate Security Audit and Malware Detection (윈도우 이벤트 로그 기반 기업 보안 감사 및 악성코드 행위 탐지 연구)

  • Kang, Serim;Kim, Soram;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.591-603
    • /
    • 2018
  • Windows Event Log is a format that records system log in Windows operating system and methodically manages information about system operation. An event can be caused by system itself or by user's specific actions, and some event logs can be used for corporate security audits, malware detection and so on. In this paper, we choose actions related to corporate security audit and malware detection (External storage connection, Application install, Shared folder usage, Printer usage, Remote connection/disconnection, File/Registry manipulation, Process creation, DNS query, Windows service, PC startup/shutdown, Log on/off, Power saving mode, Network connection/disconnection, Event log deletion and System time change), which can be detected through event log analysis and classify event IDs that occur in each situation. Also, the existing event log tools only include functions related to the EVTX file parse and it is difficult to track user's behavior when used in a forensic investigation. So we implemented new analysis tool in this study which parses EVTX files and user behaviors.

A Study on Implementation of XML-Based Information Retrieval System for Video Contents (XML 기반의 동영상콘텐츠 검색 시스템 설계 및 구현)

  • Kim, Yong;So, Min-Ho
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.4
    • /
    • pp.113-128
    • /
    • 2009
  • Generally, a user uses briefly summarized video data and text information to search video contents. To provide fast and accurate search tool for video contents in the process of searching video contents, this study proposes a method to search video clips which was partitioned from video contents. To manage and control video contents and metadata, the proposed method creates structural information based on XML on a video and metadata, and saves the information into XML database. With the saved information, when a user try to search video contents, the results of user's query to retrieve video contents would be provided through creating Xpath which has class structure information. Based on the proposed method, an information retrieval system for video clips was designed and implemented.

Uncertainty for Privacy and 2-Dimensional Range Query Distortion

  • Sioutas, Spyros;Magkos, Emmanouil;Karydis, Ioannis;Verykios, Vassilios S.
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.3
    • /
    • pp.210-222
    • /
    • 2011
  • In this work, we study the problem of privacy-preservation data publishing in moving objects databases. In particular, the trajectory of a mobile user in a plane is no longer a polyline in a two-dimensional space, instead it is a two-dimensional surface of fixed width $2A_{min}$, where $A_{min}$ defines the semi-diameter of the minimum spatial circular extent that must replace the real location of the mobile user on the XY-plane, in the anonymized (kNN) request. The desired anonymity is not achieved and the entire system becomes vulnerable to attackers, since a malicious attacker can observe that during the time, many of the neighbors' ids change, except for a small number of users. Thus, we reinforce the privacy model by clustering the mobile users according to their motion patterns in (u, ${\theta}$) plane, where u and ${\theta}$ define the velocity measure and the motion direction (angle) respectively. In this case, the anonymized (kNN) request looks up neighbors, who belong to the same cluster with the mobile requester in (u, ${\theta}$) space: Thus, we know that the trajectory of the k-anonymous mobile user is within this surface, but we do not know exactly where. We transform the surface's boundary poly-lines to dual points and we focus on the information distortion introduced by this space translation. We develop a set of efficient spatiotemporal access methods and we experimentally measure the impact of information distortion by comparing the performance results of the same spatiotemporal range queries executed on the original database and on the anonymized one.

Question Analysis and Expansion based on Semantics (의미 기반의 질의 분석 및 확장)

  • Shin, Seung-Eun;Park, Hee-Guen;Seo, Young-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.7
    • /
    • pp.50-59
    • /
    • 2007
  • This paper describes a question analysis and expansion based on semantics for on efficient information retrieval. Results of all information retrieval systems include many non-relevant documents because the index cannot naturally reflect the contents of documents and because queries used in information retrieval systems cannot represent enough information in user's question. To solve this problem, we analyze user's question semantically, determine the answer type, and extract semantic features. And then we expand user's question using them and syntactic structures which are used to represent the answer. Our similarity is to rank documents which include expanded queries in high position. Especially, we found that an efficient document retrieval is possible by a question analysis and expansion based on semantics on natural language questions which are comparatively short but fully expressing the information demand of users.

Comparison research of the Spatial Indexing Methods for ORDBMS in Embedded Systems (임베디드 시스템의 객체 관계형 DBMS에 적합한 공간 인덱스 방법 비교 연구)

  • Lee, Min-Woo;Park, Soo-Hong
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.8 no.1
    • /
    • pp.63-74
    • /
    • 2005
  • The telematics device, which is a typical embedded system on the transportation or vehicle, requires the embedded spatial DBMS based on RTOS (Real Time Operating System) for processing the huge spatial data in real time. This spatial DBMS can be developed very easily by SQL3 functions of the ORDBMS such as UDT (user-defined type) and UDF (user-defined function). However, developing index suitable for the embedded spatial DBMS is very difficult. This is due to the fact that there is no built-in SQL3 functions to construct spatial indexes. In this study, we compare and analyze both Generalized Search Tree and Relational Indexing methods which are suggested as common ways of developing User-Defined Indexes nowadays. Two implementations of R-Tree based on each method were done and region query performance test results were evaluated for suggesting a suitable indexing method of an embedded spatial DBMS, especially for telematics devices.

  • PDF

Design and Implementation of Automatic Script Generator for Mobile Database Applications (모바일 데이터베이스 응용을 위한 스크립트 자동 생성기의 설계 및 구현)

  • Eum, Doo-Hun
    • Journal of Internet Computing and Services
    • /
    • v.10 no.4
    • /
    • pp.71-85
    • /
    • 2009
  • The demand for mobile database applications has been rapidly increased with the growth of mobile users and the development of wireless Internet technology. But the productivity of mobile applications is low and it takes much time to manage the versions of applications because the user interface and query processing code of applications is manually written. In this paper, we describe the design and implementation of the MobileGen that is a script generator for mobile database applications. The generated scripts enhance mobile application productivity by providing the code for operating with a database and processing user queries. Each script provides a corresponding deck that is a set of related cards as user interface. The MobileGen supports easy version management of generated applications and the MobileGen itself because it is based on the templates that are frameworks for scripts. Moreover, the MobileGen provides not only the interested entity but also the entities that are related directly and indirectly with the interested entity unlike the most commercial mobile script generators.

  • PDF