RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
          펼치기
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • A Dynamic Information-Based Parking Guidance for Megacities considering Both Public and Private Parking

        Shin, Jong-Ho,Kim, Namhun,Jun, Hong-bae,Kim, Duck Young Hindawi Limited 2017 Journal of advanced transportation Vol.2017 No.-

        <P>The constantly increasing number of cars in the megacities is causing severe parking problems. To resolve this problem, many cities adopt parking guidance system as a part of intelligent transportation system (ITS). However, the current parking guidance system stays in its infant stage since the obtainable information is limited. To enhance parking management in the megacity and to provide better parking guidance to drivers, this study introduces an intelligent parking guidance system and proposes a new methodology to operate it. The introduced system considers both public parking and private parking so that it is designed to maximize the use of spatial resources of the city. The proposed methodology is based on the dynamic information related parking in the city and suggests the best parking space to each driver. To do this, two kinds of utility functions which assess parking spaces are developed. Using the proposed methodology, different types of parking management policies are tested through the simulation. According to the experimental test, it is shown that the centrally managed parking guidance can give better results than individually preferred parking guidance. The simulation test proves that both a driver’s benefits and parking management of a city from various points of view can be improved by using the proposed methodology.</P>

      • Error Estimates on Hybridizable Discontinuous Galerkin Methods for Parabolic Equations with Nonlinear Coefficients

        Moon, Minam,Jun, Hyung Kyu,Suh, Tay Hindawi Limited 2017 Advances in mathematical physics Vol.2017 No.-

        <P>HDG method has been widely used as an effective numerical technique to obtain physically relevant solutions for PDE. In a practical setting, PDE comes with nonlinear coefficients. Hence, it is inevitable to consider how to obtain an approximate solution for PDE with nonlinear coefficients. Research on using HDG method for PDE with nonlinear coefficients has been conducted along with results obtained from computer simulations. However, error analysis on HDG method for such settings has been limited. In this research, we give error estimations of the hybridizable discontinuous Galerkin (HDG) method for parabolic equations with nonlinear coefficients. We first review the classical HDG method and define notions that will be used throughout the paper. Then, we will give bounds for our estimates when nonlinear coefficients obey “Lipschitz” condition. We will then prove our main result that the errors for our estimations are bounded.</P>

      • Runtime Detection Framework for Android Malware

        Kim, TaeGuen,Kang, BooJoong,Im, Eul Gyu Hindawi Limited 2018 Mobile information systems Vol.2018 No.-

        <P>As the number of Android malware has been increased rapidly over the years, various malware detection methods have been proposed so far. Existing methods can be classified into two categories: static analysis-based methods and dynamic analysis-based methods. Both approaches have some limitations: static analysis-based methods are relatively easy to be avoided through transformation techniques such as junk instruction insertions, code reordering, and so on. However, dynamic analysis-based methods also have some limitations that analysis overheads are relatively high and kernel modification might be required to extract dynamic features. In this paper, we propose a dynamic analysis framework for Android malware detection that overcomes the aforementioned shortcomings. The framework uses a suffix tree that contains API (Application Programming Interface) subtraces and their probabilistic confidence values that are generated using HMMs (Hidden Markov Model) to reduce the malware detection overhead, and we designed the framework with the client-server architecture since the suffix tree is infeasible to be deployed in mobile devices. In addition, an application rewriting technique is used to trace API invocations without any modifications in the Android kernel. In our experiments, we measured the detection accuracy and the computational overheads to evaluate its effectiveness and efficiency of the proposed framework.</P>

      • Determination of Pavement Rehabilitation Activities through a Permutation Algorithm

        Lee, Sangyum,Mun, Sungho,Moon, Hyungchul Hindawi Limited 2013 Journal of applied mathematics (JAM) Vol.2013 No.-

        <P>This paper presents a mathematical programming model for optimal pavement rehabilitation planning. The model maximized the rehabilitation area through a newly developed permutation algorithm, based on the procedures outlined in the harmony search (HS) algorithm. Additionally, the proposed algorithm was based on an optimal solution method for the problem of multilocation rehabilitation activities on pavement structure, using empirical deterioration and rehabilitation effectiveness models, according to a limited maintenance budget. Thus, nonlinear pavement performance and rehabilitation activity decision models were used to maximize the objective functions of the rehabilitation area within a limited budget, through the permutation algorithm. Our results showed that the heuristic permutation algorithm provided a good optimum in terms of maximizing the rehabilitation area, compared with a method of the worst-first maintenance currently used in Seoul.</P>

      • Efficient Channel Selection and Routing Algorithm for Multihop, Multichannel Cognitive Radio Networks with Energy Harvesting under Jamming Attacks

        Thanh, Pham-Duy,Vu-Van, Hiep,Koo, Insoo Hindawi Limited 2018 Security and communication networks Vol.2018 No.-

        <P>We study jamming attacks in the physical layer of multihop cognitive radio networks (MHCRNs) where energy-constrained relays forward information from the source to the destination. Meanwhile, a jammer can transmit interfering signals on a channel such that all ongoing transmissions on this channel will be corrupted. In this paper, all jammers can attack only one of the predefined channels in each time slot. Moreover, they can randomly switch channels to start jamming another channel at the beginning of every time slot. The switching behavior is assumed to follow a Gaussian distribution. Due to limited battery capacity in the relays, energy harvesting is utilized to solve the energy-constrained problem in the cognitive radio network. Subsequently, relays are able to harvest energy from non-radio frequency (non-RF) signals such as solar, wind, or temperature. In this paper, we determine the throughput/delay ratio as a key metric to evaluate the performance in MHCRNs. Owing to the limited battery capacity in the relays and the jamming problem, the source needs to select proper relays and channels for each data transmission frame to optimize overall network performance in terms of end-to-end delay, throughput, and energy efficiency. Therefore, we provide two novel multihop allocation schemes to maximize achievable end-to-end throughput while minimizing delay in the presence of jammers. Through simulation results, we validate the effectiveness of the proposed schemes under multiple jamming attacks in MHCRNs.</P>

      • Semisupervised Particle Swarm Optimization for Classification

        Zhang, Xiangrong,Jiao, Licheng,Paul, Anand,Yuan, Yongfu,Wei, Zhengli,Song, Qiang Hindawi Limited 2014 Mathematical problems in engineering Vol.2014 No.-

        <P>A semisupervised classification method based on particle swarm optimization (PSO) is proposed. The semisupervised PSO simultaneously uses limited labeled samples and large amounts of unlabeled samples to find a collection of prototypes (or centroids) that are considered to precisely represent the patterns of the whole data, and then, in principle of the “nearest neighborhood,” the unlabeled data can be classified with the obtained prototypes. In order to validate the performance of the proposed method, we compare the classification accuracy of PSO classifier, k-nearest neighbor algorithm, and support vector machine on six UCI datasets, four typical artificial datasets, and the USPS handwritten dataset. Experimental results demonstrate that the proposed method has good performance even with very limited labeled samples due to the usage of both discriminant information provided by labeled samples and the structure information provided by unlabeled samples.</P>

      • Low-Rank Representation-Based Object Tracking Using Multitask Feature Learning with Joint Sparsity

        Kim, Hyuncheol,Paik, Joonki Hindawi Limited 2014 Abstract and applied analysis Vol.2014 No.-

        <P>We address object tracking problem as a multitask feature learning process based on low-rank representation of features with joint sparsity. We first select features with low-rank representation within a number of initial frames to obtain subspace basis. Next, the features represented by the low-rank and sparse property are learned using a modified joint sparsity-based multitask feature learning framework. Both the features and sparse errors are then optimally updated using a novel incremental alternating direction method. The low-rank minimization problem for learning multitask features can be achieved by a few sequences of efficient closed form update process. Since the proposed method attempts to perform the feature learning problem in both multitask and low-rank manner, it can not only reduce the dimension but also improve the tracking performance without drift. Experimental results demonstrate that the proposed method outperforms existing state-of-the-art tracking methods for tracking objects in challenging image sequences.</P>

      • An Obstacle Recognizing Mechanism for Autonomous Underwater Vehicles Powered by Fuzzy Domain Ontology and Support Vector Machine

        Mi, Zhen-Shu,Bukhari, Ahmad C.,Kim, Yong-Gi Hindawi Limited 2014 Mathematical problems in engineering Vol.2014 No.-

        <P>The autonomous underwater vehicle (AUV) and the problems associated with its safe navigation have been studied for the last two decades. The real-time underwater obstacle recognition procedure still has many complications associated with it and the issue becomes worse with vague sensor data. These problems can be coped with the merger of a robust classification mechanism and a domain knowledge acquisition technique. In this paper, we introduce a hybrid mechanism to recognize underwater obstacles for AUV based on fuzzy domain ontology and support vector machine (SVM). SVM is an efficient algorithm that was developed for recognizing 3D object in recent years and is a new generation learning system based on recent advances in statistical learning theory. The amalgamation of fuzzy domain ontology with SVM boosts the performance of the obstacle recognition module by providing the timely semantic domain information of the surrounding circumstances. Also the reasoning ability of the fuzzy domain ontology can expedite the obstacle avoidance process. In order to evaluate the performance of the system, we developed a prototype simulator based on OpenGL and VC++. We compared the outcomes of our proposed technique with backpropagation algorithm and classic SVM based techniques.</P>

      • Computation of Pressure Fields around a Two-Dimensional Circular Cylinder Using the Vortex-In-Cell and Penalization Methods

        Lee, Seung-Jae,Lee, Jun-Hyeok,Suh, Jung-Chun Hindawi Limited 2014 Modelling and simulation in engineering Vol.2014 No.-

        <P>The vorticity-velocity formulation of the Navier-Stokes equations allows purely kinematical problems to be decoupled from the pressure term, since the pressure is eliminated by applying the curl operator. The Vortex-In-Cell (VIC) method, which is based on the vorticity-velocity formulation, offers particle-mesh algorithms to numerically simulate flows past a solid body. The penalization method is used to enforce boundary conditions at a body surface with a decoupling between body boundaries and computational grids. Its main advantage is a highly efficient implementation for solid boundaries of arbitrary complexity on Cartesian grids. We present an efficient algorithm to numerically implement the vorticity-velocity-pressure formulation including a penalty term to simulate the pressure fields around a solid body. In vorticity-based methods, pressure field can be independently computed from the solution procedure for vorticity. This clearly simplifies the implementation and reduces the computational cost. Obtaining the pressure field at any fixed time represents the most challenging goal of this study. We validate the implementation by numerical simulations of an incompressible viscous flow around an impulsively started circular cylinder in a wide range of Reynolds numbers: Re=40, 550, 3000, and 9500.</P>

      • Ubi-RKE: A Rhythm Key Based Encryption Scheme for Ubiquitous Devices

        Lee, Jae Dong,Im, Hyung Jin,Kang, Won Min,Park, Jong Hyuk Hindawi Limited 2014 Mathematical problems in engineering Vol.2014 No.-

        <P>As intelligent ubiquitous devices become more popular, security threats targeting them are increasing; security is seen as one of the major challenges of the ubiquitous computing. Now a days, applying ubiquitous computing in number of fields for human safety and convenience was immensely increased in recent years. The popularity of the technology is rising day by day, and hence the security is becoming the main focused point with the advent and rising popularity of the applications. In particular, the number of wireless networks based on ubiquitous devices has increased rapidly; these devices support transmission for many types of data traffic. The convenient portability of ubiquitous devices makes them vulnerable to security threats, such as loss, theft, data modification, and wiretapping. Developers and users should seriously consider employing data encryption to protect data from such vulnerabilities. In this paper, we propose a Rhythm Key based Encryption scheme for ubiquitous devices (Ubi-RKE). The concept of Rhythm Key based Encryption has been applied to numerous real world applications in different domains. It provides key memorability and secure encryption through user touching rhythm on ubiquitous devices. Our proposed scheme is more efficient for users than existing schemes, by providing a strong cipher.</P>

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼