• Title/Summary/Keyword: 보편문자

Search Result 58, Processing Time 0.024 seconds

Development of a User-Customizable Voice Command Application for Android Phones (안드로이드폰용 사용자 정의 음성명령 앱 개발)

  • Gwak, Juri;Lee, Joohyeon;Lim, Hyojin;Lee, Ki Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.1171-1174
    • /
    • 2014
  • 최근 Siri, S Voice 등과 같이 스마트폰에 음성으로 명령을 내리는 기능이 보편화되고 있다. 하지만 기존의 음성명령 시스템은 사전에 정의된 명령어가 아니면 사용이 불가능하며 어떤 명령어들이 사용가능한지 확인하기도 어렵다. 본 논문에서는 사용자에게 좀 더 편리한 인터페이스를 제공하기 위한 목적으로, 사용자가 직접 음성명령을 등록할 수 있는 안드로이드폰용 음성명령 앱을 개발한다. 본 논문에서 개발한 음성명령 앱은 사용자가 등록한 임의의 음성을 인식하여 안드로이드폰에 설치된 애플리케이션을 실행시키거나, 특정 번호로 전화를 걸거나, 특정 번호로 문자메시지를 보낼 수 있다. 본 논문에서 개발한 앱을 통해 사용자는 보다 편리하게 스마트폰에 음성명령을 내릴 수 있다.

The input data normalization studies using secure coding (시큐어 코딩을 적용한 입력데이터 정규화 검증 연구)

  • Lee, Ji-Sun;Choi, Jin-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.644-647
    • /
    • 2013
  • 인터넷과 정보기술의 발전으로 정보시스템들이 보편화 되고, 편리함을 제공하고 있다. 반면에 시스템은 더욱 복잡해지고, 프라이버시 침해, 개인정보 수집 등 사이버공격은 계속적으로 증가하고 있으며 이로 인한 피해가 심각하다. 사이버 공격을 예방하기 위해서는 정보시스템 제품출시 이전 단계에서 제품의 보안 취약점을 제거하는 것이 중요하다. 따라서 개발단계부터 보안을 고려한 소프트웨어를 개발하는 것은 향후 발생 가능한 보안취약점을 예방하고 피해를 최소화 하여 보다 안전한 소프트웨어를 개발하는 근본적인 해결책이 된다. 본 논문에서는 소프트웨어 개발과정에서 발생할 수 있는 보안약점을 최소화 하여 안전한 소프트웨어를 개발하기 위한 시큐어 코딩(secure coding)과 입력 데이터 값(문자열)을 정규화 함으로써 크로스 사이트 스크립팅(XSS)의 공격을 사전에 예방할 수 있는 방법을 제시한다.

A Passport Recognition and face Verification Using Enhanced fuzzy ART Based RBF Network and PCA Algorithm (개선된 퍼지 ART 기반 RBF 네트워크와 PCA 알고리즘을 이용한 여권 인식 및 얼굴 인증)

  • Kim Kwang-Baek
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.1
    • /
    • pp.17-31
    • /
    • 2006
  • In this paper, passport recognition and face verification methods which can automatically recognize passport codes and discriminate forgery passports to improve efficiency and systematic control of immigration management are proposed. Adjusting the slant is very important for recognition of characters and face verification since slanted passport images can bring various unwanted effects to the recognition of individual codes and faces. Therefore, after smearing the passport image, the longest extracted string of characters is selected. The angle adjustment can be conducted by using the slant of the straight and horizontal line that connects the center of thickness between left and right parts of the string. Extracting passport codes is done by Sobel operator, horizontal smearing, and 8-neighborhood contour tracking algorithm. The string of codes can be transformed into binary format by applying repeating binary method to the area of the extracted passport code strings. The string codes are restored by applying CDM mask to the binary string area and individual codes are extracted by 8-neighborhood contour tracking algerian. The proposed RBF network is applied to the middle layer of RBF network by using the fuzzy logic connection operator and proposing the enhanced fuzzy ART algorithm that dynamically controls the vigilance parameter. The face is authenticated by measuring the similarity between the feature vector of the facial image from the passport and feature vector of the facial image from the database that is constructed with PCA algorithm. After several tests using a forged passport and the passport with slanted images, the proposed method was proven to be effective in recognizing passport codes and verifying facial images.

  • PDF

Automatic Generation of Snort Content Rule for Network Traffic Analysis (네트워크 트래픽 분석을 위한 Snort Content 규칙 자동 생성)

  • Shim, Kyu-Seok;Yoon, Sung-Ho;Lee, Su-Kang;Kim, Sung-Min;Jung, Woo-Suk;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.666-677
    • /
    • 2015
  • The importance of application traffic analysis for efficient network management has been emphasized continuously. Snort is a popular traffic analysis system which detects traffic matched to pre-defined signatures and perform various actions based on the rules. However, it is very difficult to get highly accurate signatures to meet various analysis purpose because it is very tedious and time-consuming work to search the entire traffic data manually or semi-automatically. In this paper, we propose a novel method to generate signatures in a fully automatic manner in the form of sort rule from raw packet data captured from network link or end-host. We use a sequence pattern algorithm to generate common substring satisfying the minimum support from traffic flow data. Also, we extract the location and header information of the signature which are the components of snort content rule. When we analyzed the proposed method to several application traffic data, the generated rule could detect more than 97 percentage of the traffic data.

De Morgan's view on the development of algebra (대수 발달의 단계에 관한 드모르간의 관점 연구)

  • Yu, Mi-Kyung;Kim, Jae-Hong;Kwon, Seok-Il;Park, Sun-Yong;Choi, Ji-Sun;Park, Kyo-Sik
    • Journal for History of Mathematics
    • /
    • v.21 no.4
    • /
    • pp.61-78
    • /
    • 2008
  • In this paper, we discuss about De Morgan's view on the development of algebra according to following distinctions: arithmetic, universal arithmetic, symbolic algebra, significant algebra. De Morgan thought that the differences between arithmetic and universal arithmetic lie in the usage of letters and the immediate performance of computation. In his viewpoint, universal arithmetic is a transitional phase, in which absurd phenomena occur, from arithmetic to algebra and these absurd phenomena call for algebra. The feature of De Morgan's view on the development of algebra is that symbolic calculus which consist of symbol system without symbol's meaning is acquired, then as extended meanings are furnished to symbols, symbolic calculus become logical so significant calculus is developed. For example, Single algebra is developed, as an extended meaning is furnished to a symbol -1, and double algebra is developed, as an extended meaning is furnished to a symbol $\sqrt{-1}$. According to De Morgan, a symbol system is derived from the incompleteness of a prior symbol system.

  • PDF

Typography Media(Emoticon) for the Public Service and Communication (타이포그래피 미디어(이모티콘)의 소통과 공공성)

  • Kim, Young-Kook
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.6
    • /
    • pp.197-204
    • /
    • 2011
  • In line with the development of Media, the use of character has been developed in various ways. Specially, it has been emerged the functions of written language of visualization and delivery of emotion in the digitalized environment due to speedy growth of internet and Mobile. The emoticons emerged as a tool for the convenience of communication proved to have taken effective role in the part of communication culture. Particularly, Hangul emoticons which contains the meaning of communication and sharing in tandem with the principle of Hangul invention, provides convenience in combination & use due to its structural and design characteristic for which it plays a significant role of visual element. Hangul emoticon is definitely a part of Hangul culture and in view of globalization of visual language in connection with media development, there is a huge potential being to be used as a international communication tool. In this study, it will be reviewed on the increased utilization of Hangul emoticons and related public issues as being a part of typography media, in view of the generalization of private media as well as change of subjective user.

A Study on the Korean-Stroke based Graphical Password Approach (한국어 획 기반 그래피컬 패스워드 기법에 관한 연구)

  • Ko, Tae-Hyoung;Shon, Tae-Shik;Hong, Man-Pyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.189-200
    • /
    • 2012
  • With increasing the number of smart device such as Tablet PC, smart phone and netbook, information security which based on smart device in mobile environment have become the issue. It is important to enter a password safety. In various types of mobile devices, because of hardware limitation of device, it is difficult that to equip secondary input device such as keyboard and mouse. Also, a loss of accuracy becomes a problem because input information was entered by touch screen. Because of problem mentioned above it can be predicted to change password scheme text based password scheme to graphical password scheme, graphical password scheme is easy to use and is resistant to shoulder surfing attack. So this paper proposes new graphical password scheme based 5 strokes which are made by decomposed the Korean to defend against shoulder surfing attack.

Design of an Enhanced Group Keypad to Prevent Shoulder-Surfing Attacks and Enable User Convenience (어깨 너머 공격을 차단하고 사용 편의성이 가능한 개선된 그룹 키패드 설계)

  • Hyung-Jin Mun
    • Journal of Practical Engineering Education
    • /
    • v.15 no.3
    • /
    • pp.641-647
    • /
    • 2023
  • In the fintech environment, ensuring secure financial transactions with smartphones requires authenticating the device owner. Smartphone authentication techniques encompass a variety of approaches, such as passwords, biometrics, SMS authentication, and more. Among these, password-based authentication is commonly used and highly convenient for user authentication. Although it is a simple authentication mechanism, it is susceptible to eavesdropping and keylogging attacks, alongside other threats. Security keypads have been proposed to address vulnerabilities in password input on smartphones. One such innovation is a group keypad, resistant to attacks that guess characters based on touch location. However, improvements are needed for user convenience. In this study, we aim to propose a method that enhances convenience while being resistant to eavesdropping and recording attacks on the existing group keypad. The proposed method uses new signs to allow users to verify instead of the last character confirmation easily and employs dragging-to-touch for blocking recording attacks. We suggest diverse positioning methods tailored for domestic users, improving efficiency and security in password input compared to existing methods.

Design and implementation of e-mail extraction engine for mobile with image conversion facilities. (이미지 변환 엔진을 탑재한 모바일용 전자우편 추출 엔진의 설계 및 구현)

  • 정영지
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.4
    • /
    • pp.638-645
    • /
    • 2003
  • In existing internet, e-mail protocols including POP3 and IMAP4, provide e-mail services fir exchanging messages with texts, hypertext and images as well. For the e-mail services in wireless mobile network, mobile e-mail service providers have to install a mobile exclusive e-mail server or have to convert e-mail to mobile exclusive e-mail with wireless application format in case of POP3 protocol. In the e-mail service of IMAP4 case known as web-mail, it is difficult to view e-mail directly from server without IMAP4 mobile client because e-mail is stored in mail server side with remote file server. In either case, it also has the problems of viewing the e-mail of hypertext and image information at mobile. This paper provides e-mail extraction engine with image and hypertext conversion facilities that can be applied in wireless mobile internet and it is optimized in mobile communication environments such as a small display, small size of memory with web-mail protocol based on IMAP4 as well as POP3 mail protocol.

The Development and Application of Web-Based Learning System for Correct Use of Internet Communication Words in Elementary Schools ("바른말 고운말" 교실 웹기반 학습시스템 개발 및 적용)

  • Yoon, Hee-Soo;Kim, Dong-Ho
    • Journal of The Korean Association of Information Education
    • /
    • v.8 no.2
    • /
    • pp.191-201
    • /
    • 2004
  • In accordance with wide spread of personal computer and the expansion of network access, the use of internet has been popular and communication by text message is much more normal than that of voice and image. Accordingly, the side effect of communication language brings about gap between diverse social class, the isolation of communication between generations, abusive expressions, obstacles of juvenile mental development and so on. It appears by the form of slang and vulgar word and has a negative effect on education of mother tongue and usage of children's real language. To deal with these problems, we developed new web-based education system through the analysis of learners' requirement; "Barun Mal, Goeun Mal class". So we verified its efficiency to apply to real class. We also found that this system increased the learners' interest and educational effectiveness. Also, this system contributed to the proper use of language.

  • PDF