• Title/Summary/Keyword: 버전 관리자

Search Result 71, Processing Time 0.034 seconds

Multilingual Product Retrieval Agent through Semantic Web and Semantic Networks (Semantic Web과 Semantic Network을 활용한 다국어 상품검색 에이전트)

  • Moon Yoo-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.2
    • /
    • pp.1-13
    • /
    • 2004
  • This paper presents a method for the multilingual product retrieval agent through XML and the semantic networks in e-commerce. Retrieval for products is an important process, since it represents interfaces of the customer contact to the e-commerce. Keyword-based retrieval is efficient as long as the product information is structured and organized. But when the product information is expressed across many online shopping malls, especially when it is expressed in different languages with cultural backgrounds, buyers' product retrieval needs language translation with ambiguities resolved in a specific context. This paper presents a RDF modeling case that resolves semantic problems in the representation of product information and across the boundaries of language domains. With adoption of UNSPSC code system, this paper designs and implements an architecture for the multilingual product retrieval agents. The architecture is based on the central repository model of product catalog management with distributed updating processes. It also includes the perspectives of buyers and suppliers. And the consistency and version management of product information are controlled by UNSPSC code system. The multilingual product names are resolved by semantic networks, thesaurus and ontology dictionary for product names.

  • PDF

Automatic Patch Information Collection System Using Web Crawler (웹 크롤러를 이용한 자동 패치 정보 수집 시스템)

  • Kim, Yonggun;Na, Sarang;Kim, Hwankuk;Won, Yoojae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1393-1399
    • /
    • 2018
  • Companies that use a variety of software use patch management systems provided by security vendor to manage security vulnerabilities of software to improve security. System administrators monitor the vendor sites that provide new patch information to maintain the latest software versions, but it takes a lot of cost and monitoring time to find and collect patch information because the patch cycle is irregular and the structure of web page is different. In order to reduce this, studies to automate patch information collection based on keyword or web service have been conducted, but since the structure to provide patch information in vendor site is not standardized, it was applicable only to specific vendor site. In this paper, we propose a system that automates the collection of patch information by analyzing the structure and characteristics of the vendor site providing patch information and using web crawler to reduce the cost and monitoring time consumed in collecting patch information.

POP based Integration Management System for Vehicle Parts Production Enhancement (자동차 부품 생산성 향상을 위한 POP 기반 통합관리 시스템)

  • Kim, Gui-Jung;Han, Jung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.5
    • /
    • pp.1265-1270
    • /
    • 2008
  • In the parts including a vehicle, standard and contents are different according to type of automobile. Although the parts are same, the quality and requirement all are different according to vehicle production version. Also the business is shared at each department in a production line. So if a part is changed, each team or the department must recognize information which is changed. But currently if the event can occur at like this each department, because of parts management through handwork, the unification of information is difficult. Therefore in this paper, we applied POP systems at the automobile part enterprise and constructed POP based the automobile part productive integrated management system. This system supported productive information from mechanical, equipment, worker, and products in real-time and data update also is processed automatically. When this system is introduced, work time and cost remarkably will be reduced.

Design and Implementation of Template-based Web Database Application Generator (템플릿 기반 웹 데이터베이스 응용 생성기의 설계 및 구현)

  • Jo, In-Ae;Shin, E.K.;Eum, Doo-Hun;Kang, Min-Jeong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.66-71
    • /
    • 2006
  • 데이터베이스와 연동하는 웹 응용에 대한 수요가 비즈니스를 포함하는 모든 분야에서 급속히 증가하고 있다. 그러나 급증하는 수요에 비해 웹 응용의 작성 및 유지.보수에 많은 시간과 노력이 소요되고 있다. 본 논문에서 소개하는 웹 데이터베이스 응용 자동 생성기 WebGen은 웹 응용에 필요한 폼들과 이 폼들을 통해 이루어지는 질의에 대해 데이터베이스와 연동하여 처리하는 웹 스크립트들을 자동 생성하는 소프트웨어 도구다. WebGen은 웹 응용 개발자가 작성하는 구성파일(configuration file)에 정의된 선언적인 내용을 스크립트의 기본 원형인 내장된 템플릿(template)에 반영하여 5개의 웹 스크립트들(Search, Select, Edit, Information, Action)을 생성한다. Action 스크립트를 제외한 나머지 스크립트들은 사용자 인터페이스로 각각 해당되는 웹 폼을 생성한다. 따라서 웹 응용 작성을 위한 시간과 노력을 크게 줄여 웹 응용의 생산성을 향상시킨다. 상용 웹 응용 생성기들과 달리, WebGen은 독립적인 템플릿을 기반으로 하기 때문에 버전 관리가 용이하고 한 폼에 표현 가능한 정보도 관심의 대상인 엔티티 외에 이 엔티티와 직.간접적으로 연관된 모든 엔티티들을 포함한다.

  • PDF

Designing of Attributes for Development of Korean Reach File (한국형 Reach File 개발을 위한 속성 설계)

  • Lee, Chol-Young;Kim, Kye-Hyun;Park, Yong-Gil;Lee, Hyuk
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2011.05a
    • /
    • pp.242-247
    • /
    • 2011
  • 본 연구는 한국형 Reach File을 개발하기 위한 선행 연구로써 한국형 Reach File의 필수 구성요소 중 하나인 속성을 설계하는 것을 목표로 하였다. 이를 위해 우선 미국 Reach File 구축 사례를 검토하였고, 특히 최종 버전인 RF3(Reach File version 3)의 속성 내역을 정리하여 설계에 참조하였다. 국내 TMDL 업무 분석을 수행하여 업무 활용 측면에서 요구되는 속성도 모델링을 통해 속성 설계에 반영하였으며, 아울러 아크-노드 모델(Arc-node model) 기반의 네트워크 형식의 공간자료를 구축하는 것을 가정하여 네트워크 분석에도 활용이 가능하도록 선형 및 점형 도형자료 간 위상관계도 속성 설계에 반영하였다. 연구 결과에서 한국형 Reach File의 속성은 '위상(topology)', '위치(location)', '주제(theme)'의 세 가지 대분류에 따라 모델링되었으며, 각 분류에 따라 세부 속성이 정의되었다. 고유 식별자를 포함하여 선형 도형자료의 경우 총 53개, 점형 도형자료의 경우 총 13개의 세부 속성이 정의되었고, 각 속성에 대한 속성명, 필드명, 데이터 타입 및 길이 등에 관한 상세 설계서가 작성되었다. 본 연구를 통해 개발된 속성 설계서는 향후 한국형 Reach File 구축에 직접 활용이 가능하며, 따라서 한국형 Reach File의 구체적인 개발 방향의 설정에도 기여할 것으로 예상된다. 향후 연구에서는 속성 설계서 결과를 바탕으로 한국형 Reach File 구축 및 활용에 관한 연구가 뒤따라야 한다.

  • PDF

XML based Software Architecture Restructuring and Specification Model (XML 기반 소프트웨어 아키텍쳐 재구성과 명세 모델)

  • 박근순
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.1
    • /
    • pp.117-124
    • /
    • 2002
  • In software development process, appropriate design can exist more than one. And software architectures can be restructured by modification and update during design processes. Therefore, the method that specify efficiently the modification elements of architectures, and manage different versions of architecture designed through various aspects is required. In this study, we propose software architecture restructuring mechanism that can restructure legacy architecture and a new software architecture designed with reuse of it in integrated form, and define specification elements and structure of the proposed restructured architecture specification. It provides the method that can reference and reuse architectures designed with various aspects of developers in architecture design processes. In addition, it supports flexible specification method for specification of modification elements such as revision, substitution, update of legacy software architecture.

  • PDF

Assessment Instruments for Disaster Behavioral Health (재난정신건강 평가도구)

  • Park, Joo Eon;Kang, Suk-Hoon;Won, Sung-Doo;Roh, Daeyoung;Kim, Won-Hyoung
    • Anxiety and mood
    • /
    • v.11 no.2
    • /
    • pp.91-105
    • /
    • 2015
  • Objectives : After disaster, some people develop posttraumatic stress sequelae such as posttraumatic stress disorder (PTSD), major depression, substance use disorders, and suicide. To date, numerous screening and assessment tools for behavioral health issues including mental health problems, psychosocial maladjustment and status of recovery after disaster have been developed. In this condition, one of important topics is to choose instruments that can quickly and accurately measure the issues. Methods : This article reviewed several self-reported scales in adults for disaster behavioral health, which were searched using academic search engines like PubMed, Scopus, KoreaMed and KISS from the earliest available date of indexing through January 31, 2015. Results : More than 40 eligible instruments evaluating the disaster behavioral health issues containing posttraumatic stress sequelae, psychological and social resources, non-disaster stress, and general functions were presented in terms of availability, effectiveness, and expeditiousness. Also, we introduced basic frame aiming on practical usage, which includes standard version and brief version of the instruments for disaster behavioral health. Conclusion : We suggest the accessibility and the applicability of assessment instruments for disaster behavioral health. The systemic review of this article will provide further directions for them.

Design and Implementation of Wrapper to Support POSIX Standards on UbiFOSTM Real-Time Operating System (UbiFOSTM 실시간 운영체제에서 POSIX지원을 위한 래퍼의 설계 및 구현)

  • Song, Ye-Jin;Cho, Moon-Haeng;Lee, Cheol-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.8
    • /
    • pp.31-40
    • /
    • 2007
  • Recently, Embedded systems are different with the past as loading of a simple application program that executed specific functions according to the use and are evolved in the digital convergence integrated multimedia functions and then the complication of the application program is remarkably increased. This application program is combined and evolved with many application program in accordance with the demand of the age. For develope and manage this developing application is necessary standardized interface between developer and manager. POSIX was developed as the standard of the operating system in the standard interface which has the open system structure in computing system, and there is a posix.4 to standard for the system demands the loading of real-time operating system like a digital convergence devices. In this paper, we present the contents of designing and implementing the real-time operating system UbiFOSTM to wrapper for supporting the POSIX.4. Also, Experimental results show that implemented wrapper to application program standardizing POSIX.4 in linux and UbiFOSTM is slight only $3{\sim}9{\mu}s$.

Parking Lot Vehicle Counting Using a Deep Convolutional Neural Network (Deep Convolutional Neural Network를 이용한 주차장 차량 계수 시스템)

  • Lim, Kuoy Suong;Kwon, Jang woo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.5
    • /
    • pp.173-187
    • /
    • 2018
  • This paper proposes a computer vision and deep learning-based technique for surveillance camera system for vehicle counting as one part of parking lot management system. We applied the You Only Look Once version 2 (YOLOv2) detector and come up with a deep convolutional neural network (CNN) based on YOLOv2 with a different architecture and two models. The effectiveness of the proposed architecture is illustrated using a publicly available Udacity's self-driving-car datasets. After training and testing, our proposed architecture with new models is able to obtain 64.30% mean average precision which is a better performance compare to the original architecture (YOLOv2) that achieved only 47.89% mean average precision on the detection of car, truck, and pedestrian.

금융사고 실태 조사

  • Lee, Sang-Kyung
    • Journal of the Korea society of information convergence
    • /
    • v.7 no.1
    • /
    • pp.25-46
    • /
    • 2014
  • After examining the current situations of financial frauds and the reasons for their occurrence in the financial institutions through examples of financial frauds in domestic and abroad, this study presents ways to prevent such financial scams. The preventive measures consist of activities before and after the occurrence of financial frauds and during normal financial operations. The activities are as follows: 1. Preventive activity should be strengthened before the occurrence of financial frauds. That is, first, the enforcement of consistent internal control is needed. Second, in order to block the probability of financial frauds involved with employees, ethics education and a reward program for inside tippers need to be run. Third, financial institutions need to apply for comprehensive insurance policy to minimize the lost in case. 2. Preventive activity should be strengthened during normal financial operations. First, self authentication system for customers needs to be introduced. Second, dealings of day, week, and month need to be thoroughly checked and the system of audit needs to be expanded. Third, message service for the information on financial frauds and their preventive measures needs to be expanded. Fourth, public notification system against examples of financial frauds needs to be expanded. 3. Preventive activity after the occurrence of financial frauds should be strengthened. First, awareness for preventive measures such as imposing penalty on the manager needs to be enhanced. Second, strict restrictions on financial frauders such as a criminal charge needs to be strengthened. Third, there should be legal devices and resolutions in order to retrieve all the money deceived by financial frauds.

  • PDF