• Title/Summary/Keyword: processing

Search Result 68,804, Processing Time 0.08 seconds

Meta Data Model based on C-A-V Structure for Context Information in Ubiquitous Environment (유비쿼터스 환경에서 컨텍스트 정보를 위한 C-A-V구조 기반의 메타 데이터 모델)

  • Choi, Ok-Joo;Yoon, Yong-Ik
    • The KIPS Transactions:PartD
    • /
    • v.15D no.1
    • /
    • pp.41-46
    • /
    • 2008
  • In ubiquitous computer environment, by improving the computer's access to context information for dynamic service adaptation, we can increase richness of communication in human computer interaction and make it possible to produce more useful computational services. We need new data structure in order to flexible apply dynamic information to current context information repository and enhance the communication ability between human and computer. In this paper, we proposed to C-A-V (Category-Attribute-Value) context metadata structure required to support dynamic service adaptation for increasing communication ability in user-centric environments. We also classify the context metadata, as well as define its relationship with other context information on the basis of the application services, changes in the external environments.

Web Ontology Building Methodology for Semantic Web Application (시맨틱 웹 응용을 위한 웹 온톨로지 구축기법)

  • Kim, Su-Kyung;Ahn, Kee-Hong
    • The KIPS Transactions:PartD
    • /
    • v.15D no.1
    • /
    • pp.47-60
    • /
    • 2008
  • Success of a semantic web application, currently base on web technology, depend on web ontology construction that provided rule and inference function about knowledge. For, this study compared the ontology construction methods that were already proposed, and analyzed, and investigated characteristics of semantic web and web ontology, investigated characteristics of semantic web and web ontology, and defined characteristics of web ontology as-based technology of a semantic web application and knowledge representation steps, and studied a technical element that related currently web technology, and proposed a web ontology construction method for a semantic web application with bases to these. Established web ontologies of various knowledge fields as applied the construction method that proposed. Also evaluate performance of web ontology through inference verification of web ontologies established, web ontologies evaluated performance of web ontology as used inference verification. According to this, we confirmed that proposed construction method that can establish the ontology suitable for semantic web application.

Phishing Detection Methodology Using Web Sites Heuristic (웹사이트 특징을 이용한 휴리스틱 피싱 탐지 방안 연구)

  • Lee, Jin Lee;Park, Doo Ho;Lee, Chang Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.10
    • /
    • pp.349-360
    • /
    • 2015
  • In recent year, phishing attacks are flooding with services based on the web technology. Phishing is affecting online security significantly day by day with the vulnerability of web pages. To prevent phishing attacks, a lot of anti-phishing techniques has been made with their own advantages and dis-advantages respectively, but the phishing attack has not been eradicated completely yet. In this paper, we have studied phishing in detail and categorize a process of phishing attack in two parts - Landing-phase, Attack-phase. In addition, we propose an phishing detection methodology based on web sites heuristic. To extract web sites features, we focus on URL and source codes of web sites. To evaluate performance of the suggested method, set up an experiment and analyze its results. Our methodology indicates the detection accuracy of 98.9% with random forest algorithm. The evaluation of proof-of-concept reveals that web site features can be used for phishing detection.

Study on the Femtocell Vulnerability Analysis Using Threat Modeling (위협 모델링 기법을 이용한 펨토셀 취약점 분석에 대한 연구)

  • Kim, Jae-ki;Shin, Jeong-Hoon;Kim, Seung-joo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.8
    • /
    • pp.197-210
    • /
    • 2016
  • Lately smartphone uasage is increasing and many Internet of Things (IoT) devices support wireless communications. Accordingly, small base stations which called femtocells are supplied to prevent saturation of existing base stations. However, unlike the original purpose of the femtocell with the advanced hacking technologies, Vulnerability such as gaining the administrator authority was discovered and this can cause serious problems such as the leakage of personal information of femtocell user. Therefore, identify security threats that may occur in the femtocell and it is necessary to ways for systematic vulnerability analysis. In this paper, We analyzed the security threats that can be generated in the femtocell and constructed a checklist for vulnerability analysis using the Threat Modeling method. Then, using the constructed checklist provides a scheme that can improve the safety of the femto cell through the actual analysis and taken the results of the femtocell vulnerabilities analysis.

A Time Synchronization Protocol for Wireless Body Sensor Networks (무선 인체 센서 네트워크용 시각 동기화 프로토콜)

  • Bae, Shi-Kyu
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.6
    • /
    • pp.127-134
    • /
    • 2016
  • WBSN (Wireless Body Sensor Network), also called WBAN (Wireless Body Area Networks) generally, is a kind of WSN (Wireless Sensor Network) applications, which is composed of the various sensor nodes residing in human body embodied or in wearable way. The measured data at each sensor node in WBSN requires being synchronized at sink node for exact analysis for status of human body, which is like WSN. Although many time synchronization protocols for WSN has been already developed, they are not appropriate to WBSN. In this paper, a new time synchronization protocol for WBSN considering the characteristics of WBSN is proposed. The proposed scheme is not only simple, but also consumes less power, leading to increasing network life time. We will show that the proposed scheme is appropriate to WBSN by evaluating its performance by simulation.

Design and Implementation of IMAP Server Supporting E-mail Address Internationalization(EAI) in a Mobile Environment (모바일 환경에서 다국어 전자 우편 주소 지원을 위한 IMAP 서버 설계 및 구현)

  • Lee, Jin-Kyu;Kim, Kyongsok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.10
    • /
    • pp.343-348
    • /
    • 2015
  • Due to the need for multilingual e-mail address, EAI Working Group of the IETF has created a wide range of standards associated with e-mail address internationalization(EAI) since 2006. One of the authors and colleagues designed and implemented the mail server, SMTPUTF8, that supports EAI RFC protocols. SMTPUTF8 mail server is composed of new SMTP and POP3 servers supporting EAI RFC protocols. However, SMTPUTF8 did not include a new IMAP server supporting EAI RFC protocol. Recently many people are using smart phones to read and send e-mail messages in a mobile environment. IMAP server is more useful than POP3 server in a mobile environment. Therefore, in this paper, the authors have designed and implemented IMAP server and client app that complies with the IMAP standard (RFC) published by EAI WG of IETF to support multilingual e-mail address. This IMAP server is added to the SMTPUTF8 mail server so that users can access e-mail messages via IMAP client app in a mobile environment.

Road Sign Detection with Weather/Illumination Classifications and Adaptive Color Models in Various Road Images (날씨·조명 판단 및 적응적 색상모델을 이용한 도로주행 영상에서의 이정표 검출)

  • Kim, Tae Hung;Lim, Kwang Yong;Byun, Hye Ran;Choi, Yeong Woo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.11
    • /
    • pp.521-528
    • /
    • 2015
  • Road-view object classification methods are mostly influenced by weather and illumination conditions, thus the most of the research activities are based on dataset in clean weathers. In this paper, we present a road-view object classification method based on color segmentation that works for all kinds of weathers. The proposed method first classifies the weather and illumination conditions and then applies the weather-specified color models to find the road traffic signs. Using 5 different features of the road-view images, we classify the weather and light conditions as sunny, cloudy, rainy, night, and backlight. Based on the classified weather and illuminations, our model selects the weather-specific color ranges to generate Gaussian Mixture Model for each colors, Green, Yellow, and Blue. The proposed method successfully detects the traffic signs regardless of the weather and illumination conditions.

High Utility Itemset Mining Using Transaction Utility of Itemsets (항목집합의 트랜잭션 유틸리티를 이용한 높은 유틸리티 항목집합 마이닝)

  • Lee, Serin;Park, Jong Soo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.11
    • /
    • pp.499-508
    • /
    • 2015
  • High utility itemset(HUI) mining refers to the discovery of itemsets with high utilities which are not less than a user-specified minimum utility threshold, by considering both the quantities and weight factors of items in a transaction database. Recently the utility-list based HUI mining algorithms have been proposed to avoid numerous candidate itemsets and the algorithms need the costly join operations. In this paper, we propose a new HUI mining algorithm, using the utility-list with additional attributes of transaction utility and common utility of itemsets. The new algorithm decreases the number of join operations and efficiently prunes the search space. Experimental results on both synthetic and real datasets show that the proposed algorithm outperforms other recent algorithms in runtime, especially when datasets are dense or contain many long transactions.

A Case Study on Model Checking Online-Game Server Party System Using SPIN (온라인 게임 서버의 파티 시스템 검증을 위한 스핀 모델 체커 적용에 관한 연구)

  • Kim, Goanghun;Choi, Yunja
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.11
    • /
    • pp.479-486
    • /
    • 2015
  • Model checking method is able to check all possible cases automatically and is applicable to specifications or design before actual implementation so that some critical systems have adopted this method actively. However, the current practice of software verification is largely dependant on basic methods such as manual testing because of lack of understanding about this rigorous method and high verification cost. In this paper we conducted an experimental research for the automated verification using the SPIN model checker on an online-game server to study the applicability of the technique in this domain. The results show that we could verify major features of the online-game server party system with 5~7 GB memory and within 10 minutes execution time, and also found a hidden system error that passed existing testing process. This result shows the possibility of rigorous and effective verification with reasonable cost in comparison to manual testing.

A Novel Clustering Method for Increasing Connection Durability in Sensor Network Environment (센서 네트워크에서 연결 지속성 향상 가능한 새로운 클러스터링 기법에 관한 연구)

  • Kim, Dae-Hyun;Kim, Jin-Mook;Lee, Kyung-Oh
    • The KIPS Transactions:PartC
    • /
    • v.15C no.2
    • /
    • pp.119-124
    • /
    • 2008
  • The LEACH is a study method of a clustering base that was representative in many routing techniques that was suggested in sensor network environment. This is suggested technique to manage the sensor network group which consisted of many sensors in efficiency. However, it does not consider energy remaining quantity of the cluster header to manage cluster group, the problem where the cluster group is able to destroyed on the middle which transmits data. We are going to propose to solve such a problem by this paper for new clustering technique to accomplish management for a cluster group. It uses the technique which it proposes from the dissertation which it sees and are to the data transfer and the control also the connection directivity of the cluster group to improve also the lag time diminishes, test result it will lead and the possibility which it will know it was.