• Title/Summary/Keyword: 구글 검색

Search Result 178, Processing Time 0.025 seconds

Application Scheme of PostgreSQL-PostGIS Server Engine based on Open Source for GIS Portal Building (GIS 포털 구축을 위한 공개 소스 기반 PostgreSQL-PostGIS 서버 엔진의 응용 설계)

  • Han, Sun-Mook;Lee, Ki-Won
    • Proceedings of the KSRS Conference
    • /
    • 2009.03a
    • /
    • pp.134-138
    • /
    • 2009
  • 최근 GIS 포털에 대한 수요자 요구 사항이 증가하고 있고 기존의 웹 GIS 응용 프로그램 개발 기법과의 연계와 통합이 중요한 연구 주제로 부각되고 있다. 본 연구에서는 공개 소스인 PostgreSQL - PostGIS를 이용하여 GIS 포털 구축을 위한 응용 설계 연구를 수행하였다. PostgreSQL를 데이터베이스 시스템으로 하여 공간 질의 및 분석 기능 등 GIS 기능을 연동시키는 PostGIS는 서버 GIS 엔진으로 점점 활용 가치가 증가하고 있으나 GIS 포털에서 이를 적용한 사례는 현재까지 보고된 바가 거의 없다. 본 응용 설계는 전체 시스템 설계 보다는 주로 포털에서의 인터페이스 부분을 주로 다루고자 하며 시험 구현 프로그램의 라이브러리는 PostGIS의 C Language Interface(LIBPQ)와 OGC library를 이용하여 공간 데이터에 대한 기본 기능을 구현하였다. 본 연구를 통하여 구글, 다음, 네이버 등과 같은 일반 검색 엔진에서 경쟁적으로 제공하는 웹 맵핑 수준에서 위성영상정보와 지도정보 서비스가 보다 체계적으로 웹 GIS 기술과 연계될 수 있는 기반을 마련하고자 한다.

  • PDF

A Study on ICS Attack Method (ICS 공격 방법에 관한 연구)

  • Yun, Joo-Yeong;Lee, Cha-Gyu;Choi, Sun-Oh
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.405-406
    • /
    • 2019
  • ICS 해커들의 주요 목적은 재정적 이득, 기업간첩, 테러리스트 활동, 국가간의 사이버전쟁, 잘못된 윤리적 해킹 등의 이유들이 있다. 이에 따른 해킹 경로로는 산업제어 시스템이 공용 인터넷에 노출되는 경우, 기기 초기 설정을 방치, 장기간의 비밀번호 미 변경, 포트스캐닝, 구글 해킹 등이 있다. 이에 따른 대표적인 해킹방식 5 가지가 있는데 첫째, Shodan 을 이용한 일종의 검색해킹, 둘째, ZAP 툴을 이용하여 전수공격을 하는 패스워드 퍼징, 셋째, 목표 사이트의 취약점을 이용하여 인증을 우회하는 공격인 SQL Injection, 넷째, Modbus 툴을 이용한 해당 시설의 전압을 변경하는 네트워크 공격, 다섯째, zbgoodfind 툴을 통한 원격장치공격이 있다.

Performance Comparison and Analysis of Embedding methods based on Clustering Algorithms (클러스터링 알고리즘 기반의 임베딩 기법 성능 비교 및 분석)

  • Park, Jungmin;Park, Heemin;Yang, Seona;Sun, Yuxiang;Lee, Yongju
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • fall
    • /
    • pp.164-167
    • /
    • 2021
  • 최근 구글, 아마존, LOD 등을 중심으로 지식 그래프(Knowledge graph)와 같은 검색 고도화 연구가 활발히 수행되고 있다.그러나 대규모 지식 그래프 인덱싱 시스템에서 데이터가 어떻게 임베딩(embedding)되고, 딥러닝(deep learning) 되는지는 상대적으로 거의 연구가 되지 않고 있다. 이에 본 논문에서는 임베딩 모델에 대한 성능평가를 통해 데이터셋에 대해 어떤 모델이 가장 좋은 지식 임베딩 방법을 도출하는지 분석한다.

  • PDF

Design of an Information Service for Cited Articles through Citation Analysis (인용 구문 분석을 통한 피인용 논문 정보 서비스 설계)

  • Jung, Hanmin;Kim, Taehong;Choi, Heeseok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.743-744
    • /
    • 2020
  • 인용 분석은 정보 검색 위주의 단순 학술정보 서비스를 고도화시킬 기회를 제공한다. 그렇지만, 대부분의 연구가 커뮤니티, 연구자, 논문 간 인용 지수 중심의 분석에 초점을 맞추고 있어, 인용 특성파악을 통한 피인용 논문 정보 서비스를 제공하기에는 어려움이 있다. 본 연구는 논문 내 인용 문구분석을 통해 피인용 논문의 인용 특성을 구조적으로 제시할 수 있는, 피인용 논문을 위한 정보 서비스 가능성을 파악하는 것을 목표로 한다. 구글 스칼라를 통해 확보한 인용-피인용 논문 원문들을 대상으로 인용 유형 비율 분석과 인용 확산 분석을 수행하는 방식으로 피인용 논문 특성을 파악하였으며, 정보 서비스에 반영할 수 있는 가능성을 확인하였다.

A Research of Home Network Middleware on Android Platform (안드로이드 플랫폼상의 홈네트워크 미들웨어 연구)

  • Keun-Tae Shin;Eun-Sun Cho;Sang-Hun Park;Sung-Jun Park
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1004-1007
    • /
    • 2008
  • 2007년 구글에서 공개된 안드로이드는 개방형 모바일 플랫폼으로 모바일 장치를 목표로 한다. 안드로이드 플랫폼은 다양한 모바일 제품에 적용 할 수 있는 구조로 되어 있어 확장이 용이하며 향후 다양한 모바일 장치에 사용될 것으로 생각된다. 이러한 발전성을 고려하여 선행연구 차원에서 연구 될 가치가 충분하다고 판단이 된다. 본 논문에서는 안드로이드 플랫폼에 대표적 홈네트워크 미들웨어인 UPnP와 DLNA에서 명시하는 UPnP for A/V에 준하는 스택을 구현하여 UPnP를 통한 장치들을 검색 및 제어를 하고 DLNA에 준하여 디지털 콘텐츠를 공유, 전송 한다. 또한 안드로이드 플랫폼과 디지털 액자간의 네트워킹을 통해 홈네트워크 플랫폼으로서의 안드로이드 가능성을 확인한다.

Implementation Techniques to Apply the PageRank Algorithm (페이지랭크 알고리즘 적용을 위한 구현 기술)

  • Kim, Sung-Jin;Lee, Sang-Ho;Bang, Ji-Hwan
    • The KIPS Transactions:PartD
    • /
    • v.9D no.5
    • /
    • pp.745-754
    • /
    • 2002
  • The Google search site (http://www.google.com), which was introduced in 1998, implemented the PageRank algorithm for the first time. PageRank is a ranking method based on the link structure of the Web pages. Even though PageRank has been implemented and being used in various commercial search engines, implementation details did not get documented well, primarily due to business reasons. Implementation techniques introduced in [4,8] are not sufficient to produce PageRank values of Web pages. This paper explains the techniques[4,8], and suggests major data structure and four implementation techniques in order to apply the PageRank algorithm. The paper helps understand the methods of applying PageRank algorithm by means of showing a real system that produces PageRank values of Web pages.

Location-based Mashup service for elementary, middle and high school information (위치 기반 초·중·고 학교 정보 매쉬업 서비스)

  • Kim, Hae-Jin;Kim, Hae-Ran;Han, Soon-Hee;Cho, Hyug-Hyun;Ceong, Hee-Taek
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.6
    • /
    • pp.651-656
    • /
    • 2010
  • In the homepage of 16 municipal provincial office of education, school information service displays text-based results through search step or presents the simple information of the selected area when an area is clicked on the static image map. And it has several problems such as server load and slow transfer speed by the search of the synchronous transfer. Thus, in this study, we used the open API of Google map to provide location-based school information and implemented the mash up service for school information with the Ajax program of asynchronous transfer to reduce server load and to increase transmission speed. This service gives the efficiency and convenience to students, teachers, parents and education family members of various levels because it includes the location with school information on a dynamic map.

Improvement Mechanism of Security Monitoring and Control Model Using Multiple Search Engines (다중 검색엔진을 활용한 보안관제 모델 개선방안)

  • Lee, Je-Kook;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.284-291
    • /
    • 2021
  • As the current security monitoring system is operated as a passive system only for response after an attacker's attack, it is common to respond to intrusion incidents after an attack occurs. In particular, when new assets are added and actual services are performed, there is a limit to vulnerability testing and pre-defense from the point of view of an actual hacker. In this paper, a new security monitoring model has been proposed that uses multiple hacking-related search engines to add proactive vulnerability response functions of protected assets. In other words, using multiple search engines with general purpose or special purpose, special vulnerabilities of the assets to be protected are checked in advance, and the vulnerabilities of the assets that have appeared as a result of the check are removed in advance. In addition, the function of pre-checking the objective attack vulnerabilities of the protected assets recognized from the point of view of the actual hacker, and the function of discovering and removing a wide range of system-related vulnerabilities located in the IP band in advance were additionally presented.

An Analysis on Current Research Funding and Open Access Status for Science and Technology Articles Published by S University Faculties (이공계 학술논문의 연구비 지원 및 오픈액세스 현황 분석:S대를 중심으로)

  • Shin, Eun-Ja
    • Journal of Information Management
    • /
    • v.41 no.4
    • /
    • pp.1-21
    • /
    • 2010
  • To identify current status of research funding and open access, this study analyzed the data available in science and technology articles had been published by S university's faculty members. The study showed that 71% of the articles funded by their universities or other research sponsors, whereas very few of articles have been self-archived for open access. So, government-sponsored research outputs could not be found in search engine Google Scholar. In developed countries, researchers who have received grants by the public or private sponsors should not only publish articles on scholarly journals but also deposit their digital research outputs in the repositories. Therefore, it is advisable for Korea research sponsors to strengthen and carry out open access mandate related laws. It is very important for universities as well as for their faculties that published articles' impact can be maximized by enabling open access. So, universities may as well construct their repositories and collect the contents with enthusiasm.

PIRS : Personalized Information Retrieval System using Adaptive User Profiling and Real-time Filtering for Search Results (적응형 사용자 프로파일기법과 검색 결과에 대한 실시간 필터링을 이용한 개인화 정보검색 시스템)

  • Jeon, Ho-Cheol;Choi, Joong-Min
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.4
    • /
    • pp.21-41
    • /
    • 2010
  • This paper proposes a system that can serve users with appropriate search results through real time filtering, and implemented adaptive user profiling based personalized information retrieval system(PIRS) using users' implicit feedbacks in order to deal with the problem of existing search systems such as Google or MSN that does not satisfy various user' personal search needs. One of the reasons that existing search systems hard to satisfy various user' personal needs is that it is not easy to recognize users' search intentions because of the uncertainty of search intentions. The uncertainty of search intentions means that users may want to different search results using the same query. For example, when a user inputs "java" query, the user may want to be retrieved "java" results as a computer programming language, a coffee of java, or a island of Indonesia. In other words, this uncertainty is due to ambiguity of search queries. Moreover, if the number of the used words for a query is fewer, this uncertainty will be more increased. Real-time filtering for search results returns only those results that belong to user-selected domain for a given query. Although it looks similar to a general directory search, it is different in that the search is executed for all web documents rather than sites, and each document in the search results is classified into the given domain in real time. By applying information filtering using real time directory classifying technology for search results to personalization, the number of delivering results to users is effectively decreased, and the satisfaction for the results is improved. In this paper, a user preference profile has a hierarchical structure, and consists of domains, used queries, and selected documents. Because the hierarchy structure of user preference profile can apply the context when users perfomed search, the structure is able to deal with the uncertainty of user intentions, when search is carried out, the intention may differ according to the context such as time or place for the same query. Furthermore, this structure is able to more effectively track web documents search behaviors of a user for each domain, and timely recognize the changes of user intentions. An IP address of each device was used to identify each user, and the user preference profile is continuously updated based on the observed user behaviors for search results. Also, we measured user satisfaction for search results by observing the user behaviors for the selected search result. Our proposed system automatically recognizes user preferences by using implicit feedbacks from users such as staying time on the selected search result and the exit condition from the page, and dynamically updates their preferences. Whenever search is performed by a user, our system finds the user preference profile for the given IP address, and if the file is not exist then a new user preference profile is created in the server, otherwise the file is updated with the transmitted information. If the file is not exist in the server, the system provides Google' results to users, and the reflection value is increased/decreased whenever user search. We carried out some experiments to evaluate the performance of adaptive user preference profile technique and real time filtering, and the results are satisfactory. According to our experimental results, participants are satisfied with average 4.7 documents in the top 10 search list by using adaptive user preference profile technique with real time filtering, and this result shows that our method outperforms Google's by 23.2%.