• Title/Summary/Keyword: 사용자 유형

Search Result 1,148, Processing Time 0.022 seconds

A Study on the Printed Matter for the Publicity of the General Hospitals (종합병원 홍보용 인쇄물에 관한 연구)

  • 백진경;송진아
    • Archives of design research
    • /
    • v.16 no.4
    • /
    • pp.453-462
    • /
    • 2003
  • As the competition among the hospital becomes heavier and cognition in patient's right of knowledge increases, of general hospital becomes more important public relation part of hospital administration. Due to the restriction of the public advertisement of a hospital, strategic plans and new ideas are needed. Leaflet or hospital publication, for example, could be excellent publicity materials since they provide specific and detailed information for patients, which results in great improvement on the hospital image. Therefore, the editorial design for hospital publicity is the necessary research field. Also questionnaires of user's sense regarding the Hospital's printed matter for the publicity were conducted and analyzed. From these analyses, new improved printed matter design for the publicity of general hospital that are useful for the users as well as hospital competition was suggested.

  • PDF

Text Corpus-based Question Answering System (문서 말뭉치 기반 질의응답 시스템)

  • Kim, Han-Joon;Kim, Min-Kyoung;Chang, Jae-Young
    • Journal of Digital Contents Society
    • /
    • v.11 no.3
    • /
    • pp.375-383
    • /
    • 2010
  • In developing question-answering (QA) systems, it is hard to analyze natural language questions syntactically and semantically and to find exact answers to given query questions. In order to avoid these difficulties, we propose a new style of question-answering system that automatically generate natural language queries and can allow to search queries fit for given keywords. The key idea behind generating natural queries is that after significant sentences within text documents are applied to the named entity recognition technique, we can generate a natural query (interrogative sentence) for each named entity (such as person, location, and time). The natural query is divided into two types: simple type and sentence structure type. With the large database of question-answer pairs, the system can easily obtain natural queries and their corresponding answers for given keywords. The most important issue is how to generate meaningful queries which can present unambiguous answers. To this end, we propose two principles to decide which declarative sentences can be the sources of natural queries and a pattern-based method for generating meaningful queries from the selected sentences.

Vulnerability Analysis of the Creativity and Personality Education based on Digital Convergence Curation System (창의·인성 교육기반의 디지털 융합 큐레이션 시스템에 관한 취약점 분석)

  • Shin, Seung-Soo;Kim, Jung-In;Youn, Jeong-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.4
    • /
    • pp.225-234
    • /
    • 2015
  • With the growing number of people that use web services, the perception of the importance of securing web applications is also increasing. There are many different types of attacks that target web applications. In the rapidly-changing knowledge and information society, which came into being with the advancements made in information and communication technology, there is currently an urgent need for building web sites for the purposes of developing one's creativity and character. In this paper, attack schemes that use SQL injections and XSS and target educational digital curation systems which provide educational contents with the aim of developing of one's creativity and character are analyze, in terms of how the attacks are carried out and their vulnerabilities. Furthermore, it suggests ways of dealing appropriately with these web-based attacks that use SQL injections and XSS.

A Study on the Comprehensive Artificial Intelligence Utilization Analysis of Online Research Platform (온라인 리서치 플랫폼의 종합적인 인공지능 활용 분석 연구)

  • Lim, Hye-Won;Nam, Won-Suk
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.10
    • /
    • pp.187-195
    • /
    • 2020
  • The purpose of study is to find ways to improve online research work in the near future environment. Study methods and results are as follows. First, the basis of research was secured through theoretical consideration. Second, three types were derived by collecting examples. There are reward, execution and visualization. Third, comprehensive matrix and directions were derived through case analysis. According to the study, the most frequently used phase of AI technology were analysis, visualization, execution, casting, design, and matching, The direction of use of AI can be largely divided into work efficiency, human thought assistance, and changes in research methods. But the plan phase is generally scarce. Overall, the lack of in function is provided, including AI technology. At a time when research plans are becoming more important as users and products diversify.

Implementation of Anti-Porn Spam System based on Hyperlink Analysis Technique's of the Web Robot Agent (웹 로봇 에이전트의 하이퍼링크 분석기법을 이용한 음란메일 차단 시스템의 구현)

  • Lee, Seung-Man;Jung, Hui-Sok;Han, Sang;Song, Woo-Seok;Lee, Do-Han;Hong, Ji-Young;Ban, Eui-Hwan;Yang, Joon-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06c
    • /
    • pp.332-335
    • /
    • 2007
  • 이메일은 누구나 쉽게 정보를 교환할 수 있는 편리함 때문에 인터넷에서 가장 중요한 수단으로 사용되고 있다. 그러나 순수한 의사소통의 수단이 아닌 스팸메일의 범람은 성인뿐만 아니라, 어린이 청소년에게도 무차별적으로 전송됨으로써 심각한 부작용을 낳고 있다. 본 논문은 점차 지능화 되는 신 유형의 음란 스팸메일로부터 청소년을 보호하기 위하여 새로운 방법의 음란메일 차단시스템을 제안하고자 한다. 기존의 스팸메일 차단시스템은 사용자가 직접 음란한 메일이라고 판단되는 메일에 대해 일일이 키워드를 설정하거나, 메일 내용 중에 텍스트만을 추출하여 패턴 매칭방법으로 분류하는 것이 대부분이었지만, 본 논문은 기존 방법의 문제점을 해결하기 위하여 이미지 내 Skin-Color분포의 Human Detection 알고리즘과 웹 로봇 에이전트의 하이퍼링크 분석기법을 사용하였다. 성능 측정결과, 형태소 분석과 Human Detection 알고리즘을 병합하여 적용한 경우 성능 측정에서 90% 정도의 F-measure를 보였지만, 추가적으로 웹 로봇 에이전트의 하이퍼링크 분석기법을 병합하여 적용한 경우 97% 이상의 F-measure를 보이며, 신뢰성이 높은 음란스팸메일 차단 시스템을 구현할 수 있다는 것을 증명하였다.

  • PDF

Improving Security Awareness about Smishing through Experiment on the Optimistic Bias on Risk Perception (위험인식의 낙관적 편향 실험을 통한 스미싱 보안인식 개선)

  • Kang, Ji Won;Lee, Ae Ri;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.475-487
    • /
    • 2016
  • Recently, various risks of smartphone hacking are emerging. Smishing crime techniques become more cunning and its damage has been increasing, thereby requiring effective ways of preventing and coping with smishing. Especially, it is emphasized the need for smartphone users' security awareness and training besides technological approach. This study investigates the effective method for providing news messages in order to improve the perception of risk from smishing. This research empirically examines that the degree of optimistic bias on risk perception can vary depending on news frame, topic type, and involvement regarding smishing. Based on the findings, it identifies the factors influencing risk perception and verifies effective ways of promoting individual security awareness on smishing. The results of this study provide implications that assist in educating, campaigning and promoting information security awareness for smart device users.

A Study of Eavesdropping and Attack about Smart Phone VoIP Services (Smart Phone VoIP 서비스에 대한 공격과 도청 연구)

  • Chun, Woo-Sung;Park, Dea-Woo;Yang, Jong-Han
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1313-1319
    • /
    • 2011
  • VoIP service by taking advantage of the current PSTN network and internet over the existing telephone network at an affordable price allows you to make voice calls to the service is being expanded. However, the security of public must be maintained for security vulnerabilities in Smart Phone VoIP case problems arise, and is likely to be attacked by hackers. In this paper, the Internet, using wired and Smart Phone VoIP services may occur during analysis of the type of incident and vulnerability analysis, the eavesdropping should conduct an attack. Smart Phone VoIP with institutional administration to analyze the vulnerability OmniPeek, AirPcap the equipment is installed in a lab environment to conduct eavesdropping attack. Packet according to the analysis and eavesdropping attacks, IP confirmed that the incident as an attack by the eavesdropping as to become the test proves. In this paper, as well as Smart Phone VoIP users, the current administration and the introduction of Smart Phone service and VoIP service as a basis for enhanced security will be provided.

Digital Satellite Radio Broadcast Channel Information Search Process Method (Digital Satellite Radio 방송의 채널 정보 Searching 처리 Method에 관한 연구)

  • Lee, Seung-Hun;Na, Sang-Sin;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.4
    • /
    • pp.803-809
    • /
    • 2011
  • In this paper, we present a very useful method for updating digital satellite radio broadcast channel information. When a devices equipped with function to receive Digital Satellite Radio such as Home Theater, MP3 player, mobile phones, car audio system and various other types of Digital Devices, receives new Digital satellite radio (will be mentioned as XM radio onwards) broadcast channel information, only the current received XM radio broadcast channel and N number of pre/post nearby broadcast channels are scanned randomly in zigzag manner. Then the previous XM radio broadcast channel information updated with the newly received XM radio broadcast channel information. Since this method can prevent batch update for all XM radio channel, including some channels which less likely did not select by user, update process for real time frequently changed XM radio broadcast channel information can be performed efficiently with minimal or without delay.

Realignment of Clients in Client-server Database System (클라이언트-서버 데이터베이스에서 의 온라인 클라이언트 재배치)

  • Park, Young-B.;Park, J.
    • The KIPS Transactions:PartD
    • /
    • v.10D no.4
    • /
    • pp.639-646
    • /
    • 2003
  • Conventional two-tier databases have shown performance limitation in the presence of many concurrent clients. To this end, the three-tier architecture that exploits similarities in client's object access behavior has been proposed. In this system, clients are partitioned into clusters, and object requests can be then served in inter-cluster manner. Introducing an intermediate layer between server(s) and clients enables this. In this paper, we introduce the problem of client realignment in which access behavior changes, and propose on-line client clustering. This system facilitates adaptive reconfiguration and redistribution of sites. The core issue in this paper is to demonstrate the effectiveness of on-line client clustering. We experimentally investigate the performance of the scheme and necessary costs.

A New Dynamic-ID based RFID Mutual Authentication Protocol Eliminated Synchronization Problem (동기화 문제를 해결한 새로운 동적 아이디기반 RFID 상호 인증 프로토콜)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.469-480
    • /
    • 2008
  • The recently proposed RFID(Radio Frequency Identification) authentication protocol based on a hash function can be divided into two types according to the type of information used for authentication between a reader and a tag: either a value fixed or one updated dynamically in a tag memory. In this paper, we classify the protocols into a static ID-based and a dynamic-ID based protocol and then analyze their respective strengths and weaknesses. Also, we define a new security model including forward/backward traceability, synchronization, forgery attacks. Based on the model, we analyze the previous protocols and propose a new dynamic-ID based RFID mutual authentication protocol. Our protocol provide enhanced RFID user privacy compared to previous protocols and identify a tag efficiently in terms of the operation quantity of a tag and database.