• Title/Summary/Keyword: 개인 프로파일

Search Result 649, Processing Time 0.024 seconds

Self-Configuration System based on Context Adaptiveness (상황적응기능기반 자가구성 시스템)

  • Lee, Seung-Hwa;Lee, Eun-Seok
    • The KIPS Transactions:PartD
    • /
    • v.12D no.4 s.100
    • /
    • pp.647-656
    • /
    • 2005
  • This paper proposes an adaptive resource self-management system that collects system resources, user information, and usage patterns as context information for utilization in self-configuration. This system ill ease the system maintenance burden on users by automation of large part of configuration tasks such as install, reconfiguration and update, and will also decrease cost and errors. Working from the gathered context information, this system allows users to select appropriate components and install them for user's system context. This also offers a more personalized configuration setting by using user's existing application setting and usage pattern. To avoid the overload on central server to transfer and manage related files, we employ Peer-to-Peer method. h prototype was developed to evaluate the system and a comparison study with the conventional methods of manual configuration and MS-IBM systems was conducted to validate the proposed system in terms of functional capacity, install time and etc.

P2P-based Collaboration Framework: Openwar (P2P기반 협업 프레임워크: 오픈웨어)

  • Song, Jin-Su;Park, Chung-Sik;Kim, Yun-Sang;Gwon, Sun-Beom
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.11a
    • /
    • pp.453-460
    • /
    • 2005
  • P2P(Peer to Peer) 기술은 잠재적 능력에도 불구하고 컨텐츠의 저작권문제와 보안문제 등으로 인하여 많은 사람들이 충분히 활용하지 못하고 있다. 본 연구는 인터넷 사용자(개인)와 소규모 서버를 운영하는 조직들이 정보 제공, 분배, 공유의 정보시스템 구조를 자신들의 목적에 맞게 자유롭게 만들 수 있는 프레임워크인 오픈웨어 (Openware)의 개발에 관한 것이다. 오픈웨어는 P2P기반 시스템으로 다음과 같은 특징올 갖는다. 1) 다수의 서버와 클라이언트로 이루어지는 구조로, 사용자의 목적에 맞게 집중형 혹은 분산형 구조를 자유롭게 혼합하여 정보시스템을 구성 할 수 있다. 이러한 정보 구조의 유연성은 다양한 형태의 협업(개인과 개인, 개인과 그룹, 그룹과 그룹)이 요구되는 응용 시스템의 기반을 제공한다. 2) 데이터 관점에서 오픈웨어는 개인이 데이터베이스를 손쉽게 생성, 관리 할 수 있고, 자신의, 데이터 혹은 데이터베이스 구조를 다른 사람이나 그룹과 공유 하거나 통합 할 수 있다. 3) 데이터 통신면에서 오픈웨어는 HTTP(HyperText Transfer Protocol) 프로토콜만을 사용하는 웹 기반 시스템으로 인터넷에 연결 되어있는 누구와도 오픈웨어를 통해 협업이 가능하다. 4) 소프트웨어 이름에서 알 수 있듯이 오픈웨어는 Java, JSP, Apache, Resin등 공개소프트어로 만들어져 있고, 오픈웨어 자체도 공개소프트웨어이다. 오픈웨어는 개인과 그룹의 흠페이지 생성과 관리, 파일 공유 기능이 구현 되어있고, 데이터베이스 공유, 통합 기능을 이용하여 개인이나 그룹의 주소록관리, 일정관리 등이 가능하다. 오픈웨어는 사용자 흑은 개발자가 다양한 형태의 응용컴포넌트를 자유롭게 등록하여 기능을 추가 할 수 있는 확장성올 제공하고 있어서, 앞으로 e-메일, 매신저, 전자결재, 지식관리시스템, 인터넷 방송 시스템의 기반 구조 역할을 할 수 있다. 현재 오픈웨어에 적용하기 위한 P2P 기반의 지능형 BPM(Business Process Management)에 관한 연구와 X인터넷 기술을 이용한 RIA (Rich Internet Application) 기반 웹인터페이스 연구를 진행하고 있다.

  • PDF

Technique for Malicious Code Detection using Stacked Convolution AutoEncoder (적층 콘볼루션 오토엔코더를 활용한 악성코드 탐지 기법)

  • Choi, Hyun-Woong;Heo, Junyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.39-44
    • /
    • 2020
  • Malicious codes cause damage to equipments while avoiding detection programs(vaccines). The reason why it is difficult to detect such these new malwares using the existing vaccines is that they use "signature-based" detection techniques. these techniques effectively detect already known malicious codes, however, they have problems about detecting new malicious codes. Therefore, most of vaccines have recognized these drawbacks and additionally make use of "heuristic" techniques. This paper proposes a technology to detecting unknown malicious code using deep learning. In addition, detecting malware skill using Supervisor Learning approach has a clear limitation. This is because, there are countless files that can be run on the devices. Thus, this paper utilizes Stacked Convolution AutoEncoder(SCAE) known as Semi-Supervisor Learning. To be specific, byte information of file was extracted, imaging was carried out, and these images were learned to model. Finally, Accuracy of 98.84% was achieved as a result of inferring unlearned malicious and non-malicious codes to the model.

Development of Automatic Voice System for Foreign Patients in Testing of Magnetic Resonance Imaging (자기공명영상 검사에서 외국인 환자를 위한 자동음성 시스템 개발)

  • Goo, Eun-Hoe
    • Journal of the Korean Society of Radiology
    • /
    • v.10 no.1
    • /
    • pp.59-64
    • /
    • 2016
  • The purpose of this study intend to develop the automatic voice system for language communicating over foreign patients in testing of magnetic resonance imaging. Used sentences for the automatic voice system was selected with twelve sentences and five foreign languages in hospital in use. These translated texts were provided free of charge from Oddcast's website, which is recorded each language-specific voice as Wav files, The recorded audio file were produced by the two types of a power-point show of MS-office 2013(extension; ppsx) form and Web-enabled system using the PHP program to be applied in the mobile phone environment. It is considered to relieve the stress about an language barrier to medical technician and the voice system designed with the variable language will be enhanced the diagnostic information on foreign patients. Because automatic voice system designed for this study can enhance the understanding of test in between korean medical technician and foreign patients, It will be expected to utilize more usefully in clinical practice.

Automated Building Fuzzing Environment Using Test Framework (테스트 프레임워크를 활용한 라이브러리 퍼징 환경 구축 자동화)

  • Ryu, Minsoo;Kim, Dong Young;Jeon Sanghoonn;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.587-604
    • /
    • 2021
  • Because the library cannot be run independently and used by many applications, it is important to detect vulnerabilities in the library. Fuzzing, which is a dynamic analysis, is used to discover vulnerabilities for the library. Although this fuzzing technique shows excellent results in terms of code coverage and unique crash counts, it is difficult to apply its effects to library fuzzing. In particular, a fuzzing executable and a seed corpus are needed that execute the library code by calling a specific function sequence and passing the input of the fuzzer to reproduce the various states of the library. Generating the fuzzing environment such as fuzzing executable and a seed corpus is challenging because it requires both understanding about the library and fuzzing knowledge. We propose a novel method to improve the ease of library fuzzing and enhance code coverage and crash detection performance by using a test framework. The systems's performance in this paper was applied to nine open-source libraries and was verified through comparison with previous studies.

Algorithm for Block Packing of Main Memory Allocation Problem (주기억장치 할당 문제의 블록 채우기 알고리즘)

  • Lee, Sang-Un
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.6
    • /
    • pp.99-105
    • /
    • 2022
  • This paper deals with the problem of appropriately allocating multiple processors arriving at the ready queue to the block in the user space of the main memory is divided into blocks of variable size at compilation time. The existing allocation methods, first fit(FF), best fit(BF), worst fit(WF), and next fit(NF) methods, had the disadvantage of waiting for a specific processor because they failed to allocate all processors arriving at the ready queue. The proposed algorithm in this paper is a simple block packing algorithm that allocates as many processors as possible to the largest block by sorting the size of the partitioned blocks(holes) and the size of the processor in the ready queue in descending order. The application of the proposed algorithm to nine benchmarking experimental data showed the performance of allocating all processors while having minimal internal fragment(IF) for all eight data except one data in which the weiting processor occurs due to partition errors.

Analysis of Test Result at Secondary Science Using Cognitive Diagnosis theory (인지 진단 이론을 활용한 중학교 과학 시험 결과의 분석)

  • Kim, Ji-Young;Kim, Soo-Jin
    • Journal of The Korean Association For Science Education
    • /
    • v.29 no.8
    • /
    • pp.812-823
    • /
    • 2009
  • The purpose of this study is to search effective assessments methods by using the Fusion model of Cognitive diagnosis theory. Attributes are skills or cognitive processes that are required to perform correctly on a particular item. After test items were developed, item's attributes were decided and Q-matrix about item's attributes was made. After testing, the result was analyzed according to gender and achievement level. The results of the analysis showed that students mastered 'Interpreting data' best, and 'synthesizing' worst among the five attributes. Female students showed higher ability than male students in 'recalling.' Students of high achievement level mastered more scientific attributes than students of low achievement level. Conventional assessments only provided a single summary score but Cognitive diagnosis modeling provided useful information by estimating individual knowledge states by assessing whether an examinee has mastered specific attributes measured by the science test. The skill profiles can offer a skill level of strong, weak, or mixed for each student for each skill. Therefore, the skill profiles will provide useful diagnostic information in addition to single overall scores.

Heat-Transfer Performance Analysis of a Multi-Channel Volumetric Air Receiver for Solar Power Tower (타워형 태양열 발전용 공기흡수기의 열전달 성능해석)

  • Jung, Eui-Guk
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.36 no.3
    • /
    • pp.277-284
    • /
    • 2012
  • In this study, a heat-transfer performance analysis is carried out for a multi-channel volumetric air receiver for a solar power tower. On the basis of a series of reviews regarding the relevant literature, a calculation process is proposed for the prediction of the wall- and air- temperature distributions of a single channel at given geometric and input conditions. Furthermore, a unique mathematical model of the receiver effectiveness is presented through analysis of the temperature profile. The receiver is made of silicon carbide. A total of 225 square straight channels per module are molded to induce the air flow, and each channel has the dimensions of $2mm(W){\times}2mm(H){\times}0.2mm(t){\times}320mm(L)$. The heat-transfer rate, temperature distribution and effectiveness are presented according to the variation of the channel and module number under uniform irradiation and mass flow rate. The available air outlet temperature applied to the solar power tower should be over $700^{\circ}C$. This numerical model was actually used in the design of a 200 kW-level commercial solar air receiver, and the required number of modules satisfying the thermal performance could be obtained for the specified geometric and input conditions.

Effective Normalization Method for Fraud Detection Using a Decision Tree (의사결정나무를 이용한 이상금융거래 탐지 정규화 방법에 관한 연구)

  • Park, Jae Hoon;Kim, Huy Kang;Kim, Eunjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.133-146
    • /
    • 2015
  • Ever sophisticated e-finance fraud techniques have led to an increasing number of reported phishing incidents. Financial authorities, in response, have recommended that we enhance existing Fraud Detection Systems (FDS) of banks and other financial institutions. FDSs are systems designed to prevent e-finance accidents through real-time access and validity checks on client transactions. The effectiveness of an FDS depends largely on how fast it can analyze and detect abnormalities in large amounts of customer transaction data. In this study we detect fraudulent transaction patterns and establish detection rules through e-finance accident data analyses. Abnormalities are flagged by comparing individual client transaction patterns with client profiles, using the ruleset. We propose an effective flagging method that uses decision trees to normalize detection rules. In demonstration, we extracted customer usage patterns, customer profile informations and detection rules from the e-finance accident data of an actual domestic(Korean) bank. We then compared the results of our decision tree-normalized detection rules with the results of a sequential detection and confirmed the efficiency of our methods.

The Analysis of Vocational Behavior in the Inconsistency Profiles using Holland's Hexagonal Model (비일관성의 Holland 6각형 프로파일 직업행동 분석)

  • Choi, Seon-Hee;Seo, Seol-Hwa;Song, Soo-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.509-525
    • /
    • 2017
  • This study analyzed a unique method of problem-handling, attitudes, and specific interest propensity in the career path of the type with inconsistency in the relative distance between personality type in Holland's hexagonal model. In-depth interviews and theme analysis with six clients who showed inconsistent personality type were conducted. These six were selected from 87 participants that had received training at the Korea Vocational Counselling Association, Korea Training Institute for Self-Sufficiency and Korea Employment Agency for the Disabled. From the analysis, the six clients with inconsistent 3 Codes showed four characteristics - more than three career experience, various interest pursuits, career involvement, and career identity. They were affected in their vocational behavior by their own Holland 3 Codes and showed vocational behavior very different from Holland's theory of person-environment fit approach. They showed positive, ambivalent and chaotic types on career identity. Furthermore, Conventional(C)-Investigative(I)-Social(S) 3 Codes type and Artistic(A)-Enterprising(E)-Realistic(R) 3 Codes type in the same inconsistent personality type showed different vocational behaviors in career path development, which relates to the meaning of Holland's 3 Codes. The significance of this research lies in its provision of various points for improving career counselling.