• Title/Summary/Keyword: identity link

Search Result 58, Processing Time 0.04 seconds

Change Acceptable In-Depth Searching in LOD Cloud for Efficient Knowledge Expansion (효과적인 지식확장을 위한 LOD 클라우드에서의 변화수용적 심층검색)

  • Kim, Kwangmin;Sohn, Yonglak
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.171-193
    • /
    • 2018
  • LOD(Linked Open Data) cloud is a practical implementation of semantic web. We suggested a new method that provides identity links conveniently in LOD cloud. It also allows changes in LOD to be reflected to searching results without any omissions. LOD provides detail descriptions of entities to public in RDF triple form. RDF triple is composed of subject, predicates, and objects and presents detail description for an entity. Links in LOD cloud, named identity links, are realized by asserting entities of different RDF triples to be identical. Currently, the identity link is provided with creating a link triple explicitly in which associates its subject and object with source and target entities. Link triples are appended to LOD. With identity links, a knowledge achieves from an LOD can be expanded with different knowledge from different LODs. The goal of LOD cloud is providing opportunity of knowledge expansion to users. Appending link triples to LOD, however, has serious difficulties in discovering identity links between entities one by one notwithstanding the enormous scale of LOD. Newly added entities cannot be reflected to searching results until identity links heading for them are serialized and published to LOD cloud. Instead of creating enormous identity links, we propose LOD to prepare its own link policy. The link policy specifies a set of target LODs to link and constraints necessary to discover identity links to entities on target LODs. On searching, it becomes possible to access newly added entities and reflect them to searching results without any omissions by referencing the link policies. Link policy specifies a set of predicate pairs for discovering identity between associated entities in source and target LODs. For the link policy specification, we have suggested a set of vocabularies that conform to RDFS and OWL. Identity between entities is evaluated in accordance with a similarity of the source and the target entities' objects which have been associated with the predicates' pair in the link policy. We implemented a system "Change Acceptable In-Depth Searching System(CAIDS)". With CAIDS, user's searching request starts from depth_0 LOD, i.e. surface searching. Referencing the link policies of LODs, CAIDS proceeds in-depth searching, next LODs of next depths. To supplement identity links derived from the link policies, CAIDS uses explicit link triples as well. Following the identity links, CAIDS's in-depth searching progresses. Content of an entity obtained from depth_0 LOD expands with the contents of entities of other LODs which have been discovered to be identical to depth_0 LOD entity. Expanding content of depth_0 LOD entity without user's cognition of such other LODs is the implementation of knowledge expansion. It is the goal of LOD cloud. The more identity links in LOD cloud, the wider content expansions in LOD cloud. We have suggested a new way to create identity links abundantly and supply them to LOD cloud. Experiments on CAIDS performed against DBpedia LODs of Korea, France, Italy, Spain, and Portugal. They present that CAIDS provides appropriate expansion ratio and inclusion ratio as long as degree of similarity between source and target objects is 0.8 ~ 0.9. Expansion ratio, for each depth, depicts the ratio of the entities discovered at the depth to the entities of depth_0 LOD. For each depth, inclusion ratio illustrates the ratio of the entities discovered only with explicit links to the entities discovered only with link policies. In cases of similarity degrees with under 0.8, expansion becomes excessive and thus contents become distorted. Similarity degree of 0.8 ~ 0.9 provides appropriate amount of RDF triples searched as well. Experiments have evaluated confidence degree of contents which have been expanded in accordance with in-depth searching. Confidence degree of content is directly coupled with identity ratio of an entity, which means the degree of identity to the entity of depth_0 LOD. Identity ratio of an entity is obtained by multiplying source LOD's confidence and source entity's identity ratio. By tracing the identity links in advance, LOD's confidence is evaluated in accordance with the amount of identity links incoming to the entities in the LOD. While evaluating the identity ratio, concept of identity agreement, which means that multiple identity links head to a common entity, has been considered. With the identity agreement concept, experimental results present that identity ratio decreases as depth deepens, but rebounds as the depth deepens more. For each entity, as the number of identity links increases, identity ratio rebounds early and reaches at 1 finally. We found out that more than 8 identity links for each entity would lead users to give their confidence to the contents expanded. Link policy based in-depth searching method, we proposed, is expected to contribute to abundant identity links provisions to LOD cloud.

Implementation of Policy based In-depth Searching for Identical Entities and Cleansing System in LOD Cloud (LOD 클라우드에서의 연결정책 기반 동일개체 심층검색 및 정제 시스템 구현)

  • Kim, Kwangmin;Sohn, Yonglak
    • Journal of Internet Computing and Services
    • /
    • v.19 no.3
    • /
    • pp.67-77
    • /
    • 2018
  • This paper suggests that LOD establishes its own link policy and publishes it to LOD cloud to provide identity among entities in different LODs. For specifying the link policy, we proposed vocabulary set founded on RDF model as well. We implemented Policy based In-depth Searching and Cleansing(PISC for short) system that proceeds in-depth searching across LODs by referencing the link policies. PISC has been published on Github. LODs have participated voluntarily to LOD cloud so that degree of the entity identity needs to be evaluated. PISC, therefore, evaluates the identities and cleanses the searched entities to confine them to that exceed user's criterion of entity identity level. As for searching results, PISC provides entity's detailed contents which have been collected from diverse LODs and ontology customized to the content. Simulation of PISC has been performed on DBpedia's 5 LODs. We found that similarity of 0.9 of source and target RDF triples' objects provided appropriate expansion ratio and inclusion ratio of searching result. For sufficient identity of searched entities, 3 or more target LODs are required to be specified in link policy.

A Study on identity of scape for Historical city, Gyeongju - With a characteristic of landscape elements of Gyeongju in the Silla period - (역사도시 경주의 경관정체성에 관한 연구 I -고대 신라시대 왕경 경주의 경관요소 특성 연구를 통한 경관정체성 규명을 중심으로-)

  • Hong, Sa-Chul
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.11 no.1
    • /
    • pp.43-51
    • /
    • 2011
  • Thanks to the historic sites, the identity of historical landscape of Gyeongju is definitely recognized. When explaining, in other words, the identity of urban scape, we have to know the characteristics of landscape with the changes of the times. Therefore this study is tried to understand the urban scape form and meaning of the historic city Gyeongju, futhermore to find out the identity of urban scape, catching hold of the characteristics of landscape by periods. The research was proceeded through the classifying the concept of Urban form by periods and the basic ideology and adopting the representative landscape at that time with the literatures and maps in the Silla period. And then tried to find out the identity of landscape with the link between the concepts of the representative landscape and that of Urban form in chronological order. The results of this study is relativeness between city and natural environment, type of the Grid - Pattern on urban form, basic ideals were inspired by Buddhism.

A Lightweight Authentication Mechanism for Acknowledgment Frame in IEEE 802.15.4 (IEEE 802.15.4에서 확인 프레임을 위한 경량 인증 메커니즘)

  • Heo, Joon;Hong, Choong-Seon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.3
    • /
    • pp.175-185
    • /
    • 2007
  • In IEEE 802.15.4 (Low-Rate Wireless Personal Area Network) specification, a successful reception and validation of a data or MAC command frame can be confirmed with an acknowledgment. However, the specification does not support security for acknowledgment frame; the lack of a MAC covering acknowledgments allows an adversary to forge an acknowledgment for any frame. This paper proposes an identity authentication mechanism at the link layer for acknowledgment frame in IEEE 802.15.4 network. With the proposed mechanism there is only three bits for authentication, which can greatly reduce overhead of device. The encrypted bit stream for identity authentication will be transmitted to device by coordinator within association process. Statistical method and simulation results prove that our mechanism is successful in handling MAC layer attack.

A Study on identity of scape for Historical city, Gyeongju II - With a characteristic of landscape elements of Gyeongju in unified Silla period by Computer Graphic - (역사도시 경주의 경관정체성에 관한 연구 II - C.G.를 이용한 통일신라시대 경주의 경관요소 특성 연구를 통한 경관정체성 규명을 중심으로 -)

  • Hong, Sa-Chul
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.11 no.2
    • /
    • pp.21-30
    • /
    • 2011
  • Urban scape of Gyeongju is overlapped by periods. So, a study of each Periodical urban scape is required to understanding the present urban scape. All it requires study is on account of different a characteristic and the meaning of the scape. Especially, unified Silla period was most flourished in all time, has Abundant image of urban scape, heavily influences present urban scape. The research was proceeded through the classifying the concept of Urban form and the basic ideology and adopting the representative landscape at that time with the literatures and maps, on Unified Silla Period. And then tried to find out the identity of landscape with the link between the concepts of the representative landscape and that of Urban form in chronological order. The identity of historical landscape in Gyeongju on Unified Silla Period from the result of research has been influenced on by the connection with natural environment, urban form revealed by grid, space organized by vigorously heading up the inside, and Buddhistic ideology and esthetics.

A Lightweight Authentication Mechanism for Acknowledgment in LR-WPAN Environment

  • Heo, Joon;Hong, Choong-Seon;Choi, Sang-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.973-976
    • /
    • 2005
  • In IEEE 802.15.4 (Low-Rate Wireless Personal Area Network) specification, a successful reception and validation of a data or MAC command frame can be confirmed with an acknowledgment. However, the specification does not support security for acknowledgment frame; the lack of a MAC covering acknowledgments allows an adversary to forge an acknowledgment for any frame. This paper proposes an identity authentication mechanism at the link layer for acknowledgment frame in IEEE 802.15.4 network. With the proposed mechanism there is only three bits for authentication, which can greatly reduce overhead. The encrypted bit stream for identity authentication will be transmitted to device by coordinator within association process. Statistical method indicates that our mechanism is successful in handling MAC layer attack.

  • PDF

An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages

  • Yang, Haomiao;Kim, Hyunsung;Li, Hongwei;Yoon, Eunjun;Wang, Xiaofen;Ding, Xuefeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.10
    • /
    • pp.2544-2560
    • /
    • 2013
  • As a cornerstone of the next generation air traffic management (ATM), automatic dependent surveillance-broadcast (ADS-B) system can provide continual broadcast of aircraft position, identity, velocity and other messages over unencrypted data links to generate a common situational awareness picture for ATM. However, since ADS-B messages are unauthenticated, it is easy to insert fake aircrafts into the system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, we propose an efficient broadcast authentication scheme with batch verification for ADS-B messages which employs an identity-based signature (IBS). Security analysis indicates that our scheme can achieve integrity and authenticity of ADS-B messages, batch verification, and resilience to key leakage. Performance evaluation demonstrates that our scheme is computationally efficient for the typical avionics devices with limited resources, and it has low communication overhead well suitable for low-bandwidth ADS-B data link.

A Study of the Change of ABAKO Identity from 1950 to 1960 (1950-1960년 콩고민주공화국 바콩고동맹(ABAKO)의 정체성 변화에 대한 고찰)

  • KIM, Kwang-Su
    • Journal of the Korean Association of African Studies
    • /
    • v.43
    • /
    • pp.3-48
    • /
    • 2014
  • ABAKO(Alliance des Bakongo) of Democratic Republic of Congo is an organization founded by an ethnic group who sought to preserve its language, culture and tradition. It later developed into a political organization and led an independence movement from Belgium. In 1950, Edmond Nzeza-Nlandu founded the ABAKO in Leopoldville (currently known as Kinshasa), the capital of Belgian Congo. ABAKO changed into a political organization, however, when Nzeza-Nlandu stepped down from his position and Joseph Kasa-Vubu was elected instead as the chief of ABAKO in March 21, 1954. The Bakongo nationalism, as a link between the Kongo Kingdom of the past and the Bakongo people of the present, had influence on their cultural identity, attitude towards authority, political orientation, a common ground for geographical boundaries, and provided foundation for group mobilization. Moreover, the Kimbangu Church, founded by Simon Kimbangu had close ties with ABAKO. They struggled to obtain independece from the Belgian colonial rule. In conclusion, the leaders and members of ABAKO regarded the 'ethnic, linguistic and historical' affinities as the identity of their Bakongo nationalist group.

Security and Authentication System for Bluetooth Mobile Phone (블루투스 모바일 폰을 위한 보안인증 시스템)

  • S.P, Balakannan;Lee, Moon-Ho;B, Karthik.
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.261-263
    • /
    • 2007
  • Authentication is a mechanism to establish proof of identities, the authentication process ensure that. Who a particular user is. Nowadays PC and laptop user authentication systems are always done once a hold until s explicitly revoked by the user, or asking the user to frequently reestablish his identity which encouraging him to disable authentication. Zero-Interaction Authentication (ZIA) provides solution to this problem. In ZIA,. a user wears a small authentication token that communicates with a laptop over a short-range, wireless link. ZIA combine authentication with a file encryption. Here we proposed a Laptop-user Authentication Based Mobile phone (LABM). In our model of authentication, a user uses his Bluetooth-enabled mobile phone, which work as an authentication token that provides the authentication for laptop over a Bluetooth wireless link, m the concept of transient authentication with our combining It with encryption file system. The user authenticate to the mobile phone infrequently. In turn, the mobile phone continuously authenticates to the laptop by means of the short-range, wireless link.

  • PDF

A study on the actual state of learning competences in students at a college (J 대학교 재학생의 학습역량 실태조사)

  • Song, Kyoung-hee
    • Journal of Korean Dental Hygiene Science
    • /
    • v.1 no.2
    • /
    • pp.21-39
    • /
    • 2018
  • The purpose of this study was to examine the learning competencies of students at a college from September 1 to November 30, 2017, in an effort to provide some information on how to foster learning competencies in college years, which lay the foundation for work and social lives. 1. The learning competencies of the subjects consisted of academic vision, student identity, cognitive regulation, emotional regulation, learning management and creating learning environments. Out of five points, they scored the highest in academic vision and student identity with 3.34, followed by learning management with 3.20, creating learning environments with 3.18, emotional regulation with 3.16 and cognitive regulation with 3.14. 2. There were statistically significant differences in academic vision according to age, the area of major, the academic credential of their fathers, commuting time, military service experience and career plans. 3. There were statistically significant differences in student identity and cognitive regulation according to gender, age, the area of major, the academic credential of their fathers, commuting time, military service experience and career plans. 4. There were statistically significant differences in emotional regulation according to age, the area of major, the academic credential of their fathers, commuting time, career plans and daily mean study hours. 5. There were statistically significant differences in learning management according to gender, age, the area of major, grade point average, the academic credential of their fathers, career plans and daily mean study hours. 6. There were statistically significant differences in creating learning environments according to gender, age, the area of major, the academic credential of fathers, commuting time, career plans and daily mean study hours. As they were poorest at the cognitive regulation area among the areas of learning competencies, self-directed learning programs that deal with how to study, learning process, how to take notes and arrange them, how to link different pieces of acquired knowledge and how to map out study plans should be developed to give support to students.

  • PDF