• Title/Summary/Keyword: Technique Information

Search Result 15,901, Processing Time 0.038 seconds

Two stage Chang's randomized response technique (2단계 창의 확률화응답기법)

  • Choi, Kyoung-Ho
    • Journal of the Korean Data and Information Science Society
    • /
    • v.21 no.2
    • /
    • pp.271-277
    • /
    • 2010
  • The randomized response technique is an indirect question that employs a randomizing device to protect respondents' privacy. The technique is now considered the most efficient of the newly developed techniques. In this technique, Chang et al. (2004) suggests an improved forced-answer technique and finds more efficient conditions than Warner did in 1965. But it is the weakness of the technique to lose more information than a direct response technique does. Therefore, a lot of researches have developed new techniques to reduce loss of information, to enhance estimated efficiency, and to efficiently use collected information. Considering this tendency, this paper also tries to improve Chang's technique. It suggests the technique that is extended from Chang's and finds more efficient conditions than Chang's technique and Mangat and Singh's (1990) did.

A Keyword Query Processing Technique of OWL Data using Semantic Relationships (의미적 관계를 이용한 OWL 데이터의 키워드 질의 처리 기법)

  • Kim, Youn Hee;Kim, Sung Wan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.59-72
    • /
    • 2013
  • In this paper, we propose a keyword query processing technique based on semantic relationships for OWL data. The proposed keyword query processing technique can improve user's search satisfaction by performing two types of associative search. The first associative search uses information inferred by the relationships between classes or properties during keyword query processing. And it supports to search all information resources that are either directly or indirectly related with query keywords by semantic relationships between information resources. The second associative search returns not only information resources related with query keywords but also values of properties of them. We design a storage schema and index structures to support the proposed technique. And we propose evaluation functions to rank retrieved information resources according to three criteria. Finally, we evaluate the validity and accuracy of the proposed technique through experiments. The proposed technique can be utilized in a variety of fields, such as paper retrieval and multimedia retrieval.

A Study on Distributed Indexing Technique for Digital Library (디지털 도서관을 위한 분산색인 기법에 대한 연구)

  • Yu, Chun-Sik;Lee, Jong-Deuk;Kim, Yong-Seong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.2
    • /
    • pp.315-325
    • /
    • 1999
  • Indexing techniques for distributed resources have much effect on an information service system based on distributed environment like digital library. There is a centralized indexing technique, a distributed technique, and a mixed technique for distributed indexing techniques. In this paper, we propose new distributed indexing technique using EIF(extended Inverted File) structure that mix the centralized technique and t도 distributed technique. And we propose management techniques using EIF structure and retrieval technique using EIF structure. This distributed indexing technique proposed is able to fast process retrieval request and reduce network overload and select servers relevant to query terms. This paper investigated performance of a proposed distributed indexing technique.

  • PDF

A Regression Test Selection and Prioritization Technique

  • Malhotra, Ruchika;Kaur, Arvinder;Singh, Yogesh
    • Journal of Information Processing Systems
    • /
    • v.6 no.2
    • /
    • pp.235-252
    • /
    • 2010
  • Regression testing is a very costly process performed primarily as a software maintenance activity. It is the process of retesting the modified parts of the software and ensuring that no new errors have been introduced into previously tested source code due to these modifications. A regression test selection technique selects an appropriate number of test cases from a test suite that might expose a fault in the modified program. In this paper, we propose both a regression test selection and prioritization technique. We implemented our regression test selection technique and demonstrated in two case studies that our technique is effective regarding selecting and prioritizing test cases. The results show that our technique may significantly reduce the number of test cases and thus the cost and resources for performing regression testing on modified software.

APP-MAC-PHY Cross-Layer Video Streaming Technique over Wireless Channels

  • Park, Jaeyoung;Kim, Jaekwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.7
    • /
    • pp.398-400
    • /
    • 2014
  • In this letter, we propose a cross-layer technique jointly considering modulation coding schemes (MCSs) of medium access control (MAC) layer, source significance information (SSI) and error concealment unit of application (APP) layer, and channel quality information (CQI) of physical (PHY) layer. We demonstrate the improved video quality by the proposed technique when H.264 videos are streamed over Rayleigh fading wireless channels.

The Technique of 4-STTD for Application of W-CDMA 4${\times}$l Downlink (W-CDMA 4${\times}$1 Downlink 적용을 위한 4-STTD 기법)

  • Park Hyon-Su;Min Byoung-Taek;Jeon Jun-Su;Rue Jung-Chan;Kim Cheol-Sung
    • Proceedings of the IEEK Conference
    • /
    • 2004.06a
    • /
    • pp.87-90
    • /
    • 2004
  • This paper proposes 4-STTD(4${\times}$l) technique for the shake of application of W-CDMA which expand Alamouti STTD(2${\times}$l) technique. As the result of analyzing 4-STTD(4${\times}$l) technique proposed in this paper, we can see improvement of quality by approximately 2.2 dB rather than Alamouti STTD(2${\times}$l) technique

  • PDF

A Study for Detection Accuracy Improvement of Malicious Nodes on MANET (MANET에서의 의심노드 탐지 정확도 향상을 위한 기법 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.95-101
    • /
    • 2013
  • MANET has an advantage that can build a network quickly and easily in difficult environment to build network. In particular, routing protocol that uses in existing mobile environment cannot be applied literally because it consists of only mobile node. Thus, routing protocol considering this characteristic is necessary. Malicious nodes do extensive damage to the whole network because each mobile node has to act as a router. In this paper, we propose technique that can detect accurately the suspected node which causes severely damage to the performance of the network. The proposed technique divides the whole network to zone of constant size and is performed simultaneously detection technique based zone and detection technique by collaboration between nodes. Detection based zone translates the information when member node finishes packet reception or transmission to master node managing zone and detects using this. The collaborative detection technique uses the information of zone table managing in master node which manages each zone. The proposed technique can reduce errors by performing detection which is a reflection of whole traffic of network.

Combined Procedure of Direct Question and Randomized Response Technique

  • Choi, Kyoung-Ho
    • Journal of the Korean Data and Information Science Society
    • /
    • v.14 no.2
    • /
    • pp.275-278
    • /
    • 2003
  • In this paper, a simple and obvious procedure is presented that allows to estimate $\pi$, the population proportion of a sensitive group. Suggested procedure is combined procedure of direct question and randomized response technique. It is found that the proposed procedure is more efficient than Warner's(1965).

  • PDF

Detection and segmentation of circular shaped objects using spatial information on boundary neighborhood (테두리 주위의 공간정보를 이용한 둥근 물체의 검색 및 분할)

  • 성효경;김성완;최흥문
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.34S no.6
    • /
    • pp.30-37
    • /
    • 1997
  • We present an efficient technique, bidirectioanl inertial maximum cost search technique, for th edetection and segmentation of circular shaped objects using the spatial information around the neighborhood of the boundary candidates. This technique searches boundary candidates using local pixdl information such as pixel value and its direction. And then to exclude pseudo-boundary caused by shadows or noises, the local contrast is defined between the clique of the boundary candidates and the cliques of the background. In order to effectively segment circular shaped boundary, the technique also uses the curvature based on trigonometirc function which determines circular shaped boundary segments. Since the proposed technique is applied to the pixel cliques instead of a pixel itself, it is proposed method can easily find out circular boundaries form iamges of the PCB containing circular shaped parts and the trees with round fruits compared to boundary detection by using the pixel information and the laplacian curvature.

  • PDF

A Study on Improved Intrusion Detection Technique Using Distributed Monitoring in Mobile Ad Hoc Network (Mobile Ad Hoc Network에서 분산 모니터링을 이용한 향상된 침입탐지 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.1
    • /
    • pp.35-43
    • /
    • 2018
  • MANET composed of only wireless nodes is increasingly utilized in various fields. However, it is exposed to many security vulnerabilities because it doesn't have any infrastructure and transmits data by using multi-hop method. Therefore, MANET should be applied the intrusion detection technique that can detect efficiently malicious nodes and decrease impacts of various attacks. In this paper, we propose a distributed intrusion detection technique that can detect the various attacks while improving the efficiency of attack detection and reducing the false positive rate. The proposed technique uses the cluster structure to manage the information in the center and monitor the traffic of their neighbor nodes directly in all nodes. We use three parameters for attack detection. We also applied an efficient authentication technique using only key exchange without the help of CA in order to provide integrity when exchanging information between cluster heads. This makes it possible to free the forgery of information about trust information of the nodes and attack nodes. The superiority of the proposed technique can be confirmed through comparative experiments with existing intrusion detection techniques.