Digital Library[ Search Result ]
Social Network Spam Detection using Recursive Structure Features
Boyeon Jang, Sihyun Jeong, Chongkwon Kim
http://doi.org/10.5626/JOK.2017.44.11.1231
Given the network structure in online social network, it is important to determine a way to distinguish spam accounts from the network features. In online social network, the service provider attempts to detect social spamming to maintain their service quality. However the spammer group changes their strategies to avoid being detected. Even though the spammer attempts to act as legitimate users, certain distinguishable structural features are not easily changed. In this paper, we investigate a way to generate meaningful network structure features, and suggest spammer detection method using recursive structural features. From a result of real-world dataset experiment, we found that the proposed algorithm could improve the classification performance by about 8%.
Message Delivery Techniques using Group Intimacy Information among Nodes in Opportunistic Networks
Seohyang Kim, Hayoung Oh, Chongkwon Kim
In opportunistic networks, each message is delivered to the destination by repeating, storing, carrying, and forwarding the message. Recently, with the vitalization of social networks, a large number of existing articles have shown performance improvement when delivering the message and considering its social relational networks. However, these works only deliver messages when they find nodes, assuming that every node cooperates with each other unconditionally. Moreover, they only consider the number of short-term contacts and local social relations, but have not considered each node’s average relation with the destination node. In this paper, we propose novel message sending techniques for opportunistic networks using nodes’ social network characteristics. In this scheme, each message is delivered to the destination node with fewer copies by delivering it mostly through nodes that have high intimacy with the destination node. We are showing that our proposed scheme presents a 20% performance increase compared to existing schemes.
Similarity Analysis and API Mapping with HLA and DDS for L-V-C Realization
Kunryun Cho, Giseop No, Chongkwon Kim
The rapid growth of network technology makes the high-tech weapon. Thus, in the modern war, the ability to immediately use of the high-tech weapon is important. To realize this ability, continuous trainning is necessary but, this trainning spends many money. To improve the budget efficiency, Modeling and Simulation(M&S) are used. However, they seriously decrease the reality. Recently, the system which can support the combination of Live with Virtual simulation is on the rise. The typical example is L-V-C Environment and many kind of middleware which can support the L-V-C Envrionment are already proposed. Previous middleware can support the interoperability between different simulations but, it cannot completely interoperate three(Live, Virtual, Constructive) simulation environments. In this paper, to solve this problem, we propose the scheme which is combination between different middlewares. And we conduct the API mapping between HLA and DDS which are typical middleware and verify the scheme.
A Method of Interoperating Heterogeneous Simulation Middleware for L-V-C Combined Environment
Kunryun Cho, Giseop No, Sihyun Jung, Nopphon Keerativoranan, Chongkwon Kim
Simulation is used these days to verify the hypothesis or the new technology. In particular, National Defense Modeling & Simulation (M&S) is used to predict wartime situation and conduct the military training. National Defense M&S can be divided into three parts, live simulation, virtual simulation, and constructive simulation. Live simulation is based on the real environment, which allows more realistic sumulation; however, it has decreased budget efficiency, but reduced depictions of reality. In contrast, virtual and constructive simulations which are based on the virtual environment, have increased budget efficiency, but reduced depictions of reality. Thus, if the three parts of the M&S are combined to make the L-V-C combined environment, the disadvantages of each simulation can be complemented to increases the quality of the simulation. In this paper, a method of interworking heterogeneous simulation middeware for L-V-C combined environment is proposed, and the test results of interworking between Data Distribution Service (DDS) and High Level Architecture (HLA) are shown.
Search

Journal of KIISE
- ISSN : 2383-630X(Print)
- ISSN : 2383-6296(Electronic)
- KCI Accredited Journal
Editorial Office
- Tel. +82-2-588-9240
- Fax. +82-2-521-1352
- E-mail. chwoo@kiise.or.kr