• Title/Summary/Keyword: 사용자 유형

Search Result 1,151, Processing Time 0.024 seconds

A Study on Design of Metadata Management Demonstration System for damage prediction from storm and flood (풍수해 피해예측지도 메타데이터 관리 시범 시스템 설계에 대한 연구)

  • Lim, So Mang;Baeck, Seung Hyub;Hwang, Eui Ho
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.472-472
    • /
    • 2017
  • 재해로 인한 피해가 급증함에 따라 이를 예방하기 위한 풍수해 피해예측의 필요성이 증가하였고 관련된 다양한 연구가 진행되고 있다. 타 부처 및 각 지자체에서는 각종 재해지도들을 작성하여 만들어진 재해지도는 작성 유형과 방법 등에 따라 다양한 데이터와 서로 다른 정보를 포함하고 있어 데이터 정보를 표준화 시키고 필요한 정보를 효율적으로 찾아 연계 활용하기 위하여 본 연구를 수행하고자 한다. 메타데이터란 데이터에 대한 정보를 의미하며 데이터 변화의 근원과 변화의 흐름을 말한다. 메타데이터 관련 표준으로는 ISO19115(국제표준), KSXISO19115(국가표준), TTAS.KO-10.0139(유통목록 표준), TTAS.IS-19115(관리용 표준)이 있다. 본 연구에서는 국제표준을 준용하여 풍수해 피해 예측지도의 체계적 관리를 위한 메타데이터 설계 및 관리 시스템 구축 방안을 제시하고자 하였다. 풍수해 피해예측지도 메타데이터 관리 시범 시스템 구축을 위한 표준, 정보의 특성, 사용자 수준 등을 고려하여 설계 기본방향 설정하였으며, 풍수해 피해예측지도 정보 메타데이터 표준안 수립에 반영하였다. 그 결과, 메타데이터 패키지는 총 9개의 섹션(클래스)으로 구성하여 정의하였고 하위개체를 설정 및 연계하여 메타데이터 개체셋 정보를 구성하였다. 풍수해 피해예측지도 메타데이터 관리 시범 시스템 설계 제시를 위해 DB항목 조사 및 도출, 데이터 연계 활용 모델 구축, 프로토타입 개발순으로 연구를 수행하였다. 또한 표출 대상 데이터 항목별 분류, 방재활용 단계, 지역구분 등을 주제로 데이터 Mapping 자료를 작성하였고, 설계 기본 방향에 의하여 설정된 기준으로 데이터 항목별 메타데이터 DB를 작성하여 풍수해 피해예측지도 메타데이터 관리 시범 시스템을 설계하였다. 본 연구 결과는 추후 풍수해 피해예측지도 표준 데이터 및 풍수해 피해예측지도 표준 데이터 모델 구축에 활용 가능하며 표준화 연계활용을 위한 연구에 기여할 것으로 판단된다.

  • PDF

Comparison of prosodic characteristics by question type in left- and right-hemisphere-injured stroke patients (좌반구 손상과 우반구 손상 뇌졸중 환자의 의문문 유형에 따른 운율 특성 비교)

  • Yu, Youngmi;Seong, Cheoljae
    • Phonetics and Speech Sciences
    • /
    • v.13 no.3
    • /
    • pp.1-13
    • /
    • 2021
  • This study examined the characteristics of linguistic prosody in terms of cerebral lateralization in three groups of 9 healthy speakers and 14 speakers with a history of stroke (7 with left hemisphere damage (LHD), 7 with right hemisphere damage (RHD)). Specifically, prosodic characteristics related to speech rate, duration, pitch, and intensity were examined in three types of interrogative sentences (wh-questions, yes-no questions, alternative questions) with auditory perceptual evaluation. As a result, the statistically significant key variables showed flaws in production of the linguistic prosody in the speakers with LHD. The statistically significant variables were more insufficiently produced for wh-questions than for yes-no and alternative questions. This trend was particularly noticeable in variables related to pitch and speech rate. This result suggests that when Korean speakers process linguistic prosody, such as that of lexico-semantic and syntactic information in interrogative sentences, the left hemisphere seems to be superior to the right hemisphere.

Graph Database Benchmarking Systems Supporting Diversity (다양성을 지원하는 그래프 데이터베이스 벤치마킹 시스템)

  • Choi, Do-Jin;Baek, Yeon-Hee;Lee, So-Min;Kim, Yun-A;Kim, Nam-Young;Choi, Jae-Young;Lee, Hyeon-Byeong;Lim, Jong-Tae;Bok, Kyoung-Soo;Song, Seok-Il;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.12
    • /
    • pp.84-94
    • /
    • 2021
  • Graph databases have been developed to efficiently store and query graph data composed of vertices and edges to express relationships between objects. Since the query types of graph database show very different characteristics from traditional NoSQL databases, benchmarking tools suitable for graph databases to verify the performance of the graph database are needed. In this paper, we propose an efficient graph database benchmarking system that supports diversity in graph inputs and queries. The proposed system utilizes OrientDB to conduct benchmarking for graph databases. In order to support the diversity of input graphs and query graphs, we use LDBC that is an existing graph data generation tool. We demonstrate the feasibility and effectiveness of the proposed scheme through analysis of benchmarking results. As a result of performance evaluation, it has been shown that the proposed system can generate customizable synthetic graph data, and benchmarking can be performed based on the generated graph data.

A Study on Joule Heating Simulation Method to Prevent Sensitivity Current Trip of Electric Vehicle Charger (전기자동차 충전기의 누전차단기 감도 전류 Trip 방지를 위한 Joule Heating 시뮬레이션 방안연구)

  • Lee, Beoung-Kug;Eo, Ik-soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.4
    • /
    • pp.150-159
    • /
    • 2021
  • This study aimed to prevent inconvenience to electric vehicle users caused by an interruption of charging by the earth leakage breaker trip that occurs during charging. As a field case study, it was confirmed that during the battery charger failure type, leakage current measurement experiment by vehicle type, and leakage current breaker operation experiment, the internal temperature of the charger rose to more than 60 ℃ in summer, and the earth leakage circuit breaker stopped charging by tripping at 80% of the rated sensitivity current. Through Joule heating modeling, 32A is energized at the reference temperature of 30 ℃ at the initial time t=0 (s). After t=3000 (s), the heat generated around the charging part of the earth leakage breaker increased to 32.4 ℃. The temperature and time factors correlated with the amount of heat generated according to the statistical verification tool with a correlation coefficient of 0.97. Overall, it is possible to prevent the leakage breaker sensitivity current trip due to an increase in temperature inside the charger in summer by performing a Joule heating simulation according to the material of the charging case, the arrangement of the internal wiring, and the dielectric medium when developing the charger device.

Evaluation of Comfort Performance for Modernized Hanok: Targeting Hanok Residence at the Jamjeong-Haetsal Village in Hwasun, Jeonnam Province (신한옥의 쾌적성능 평가: 전남 화순 잠정햇살마을 한옥단지를 대상으로)

  • Choe, Seung-Ju;Lee, Mihyang;Kim, Jae-Hyang;Han, Seung-Hoon
    • Land and Housing Review
    • /
    • v.12 no.2
    • /
    • pp.99-108
    • /
    • 2021
  • With increasing interest in living in hanoks, there's a growing need for more quantitative data on the thermal comfort performance of modern hanoks. With that in mind, this research project studied a modern hanok located in Jamjeong-Haetsal Village in Hwasun, Jeollanam Province as a case study to evaluate the Predicted Mean Vote (PMV) of modernized hanoks. Based on environmental data collected at the hanok and computer simulation both Life-Cycle PMV (L.C.PMV) and Normal PMV (N.PMV) were calculated for the hanok. Study results showed that during the summer and winter seasons the PMV and heat index at major heat and major cold weather points significantly deviated from the comfort zone. The rate of change in PMV was also greater in the winter than in the summer. The study found that the modern hanok lacks proper thermal insulation for maintaining thermal comfort.

A Study on Effective Security Control Model Based on Characteristic of Web Service (웹 서비스 특성 기반 효율적인 보안관제 모델 연구)

  • Lee, Jae-heon;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.175-185
    • /
    • 2019
  • The security control is to protect IT system from cyber infringement by deriving valid result values in the process of gathering and analyzing various information. Currently, security control is very effective by using SIEM equipment which enables analysis of systematic and comprehensive viewpoint based on a lot of data, away from analyzing cyber threat information with only fragmentary information. However, It can also be said that cyber attacks are analyzed and coped with the manual work of security personnel. This means that even if there is excellent security equipment, the results will vary depending on the user using. In case of operating a characteristic web service including information provision, This study suggests the basic point of security control through characteristics information analysis, and proposes a model for intensive security control through the type discovery and application which enable a step-wise analysis and an effective filtering. Using this model would effectively detect, analyze and block attacks.

A Case Study on Comparative Analysis of Four-digit Passwords Usage Type Before and After Using Smart phone (스마트폰 사용 전후 네 자리 숫자 비밀번호 사용형태에 관한 비교 연구)

  • Moon, Soog-Kyung
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.159-164
    • /
    • 2018
  • This paper deals with the comparative analysis the two surveys called term1, term2 by collecting 4-digit password data 1313 for 2006~2011 and 2519 for 2012~ 2017. Numbers lacking prudence were significantly reduced in the term2 survey and over time, the use of four digit PWs became increasingly prudent. There was a difference in the use of digit numbers between male and female. The top five types accounted over 60%, which imply that certain types of preferences are present. It was the outcome of this paper that we can indirectly deduce these facts. Studies such as reuse of four digit PWs in user's convenience will need to be supplemented in the near future.

A Design of a Data Service providing Additional Information of ID Advertising (ID 광고의 부가정보를 제공하는 데이터서비스 설계)

  • KO, Kwangil
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.61-68
    • /
    • 2018
  • As the digital broadcasting era settled in, the TV, which was only used to watch broadcast programs, developed as a medium for operating various data services. This means that an environment, in which the viewers' TV usage behavior can be changed from a passive attitude to an attitude of actively consuming the media, has been established. Since the advertising market is an industry that is heavily influenced by changes in the media, these changes causes changes in the form of advertising and the advertising consumption behavior of viewers. In this environment, the broadcasting industry needs to think about the new growth strategy that links the possibility of data service with the advertisement market. In this study, we designed a data service that provides supplementary information of an ID advertisement, which has the weakness of short exposure time and shortage of information expression space. Specifically, we have designed the usage scenario and user interface of the data service and developed a method, based on the international digital broadcasting standard DV B, that provides the supplementary information defined by the type of ID advertisement to the data service.

  • PDF

An Enhanced method for detecting obfuscated Javascript Malware using automated Deobfuscation (난독화된 자바스크립트의 자동 복호화를 통한 악성코드의 효율적인 탐지 방안 연구)

  • Ji, Sun-Ho;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.869-882
    • /
    • 2012
  • With the growth of Web services and the development of web exploit toolkits, web-based malware has increased dramatically. Using Javascript Obfuscation, recent web-based malware hide a malicious URL and the exploit code. Thus, pattern matching for network intrusion detection systems has difficulty of detecting malware. Though various methods have proposed to detect Javascript malware on a users' web browser, the overall detection is needed to counter advanced attacks such as APTs(Advanced Persistent Treats), aimed at penetration into a certain an organization's intranet. To overcome the limitation of previous pattern matching for network intrusion detection systems, a novel deobfuscating method to handle obfuscated Javascript is needed. In this paper, we propose a framework for effective hidden malware detection through an automated deobfuscation regardless of advanced obfuscation techniques with overriding JavaScript functions and a separate JavaScript interpreter through to improve jsunpack-n.

Real-time Phishing Site Detection Method (피싱사이트 실시간 탐지 기법)

  • Sa, Joon-Ho;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.819-825
    • /
    • 2012
  • Nowadays many phishing sites contain HTTP links to victim web-site's contents such as images, bulletin board etc. to make the phishing sites look more real and similar to the victim web-site. We introduce a real-time phishing site detection system which makes use of the characteristic that the phishing sites' URLs flow into the victim web-site via the HTTP referer header field when the phishing site is visited. The detection system is designed to adopt an out-of-path network configuration to minimize effect on the running system, and a phishing site source code analysis technique to alert administrators in real-time when phishing site is detected. The detection system was installed on a company's web-site which had been targeted for phishing. As result, the detection system detected 40 phishing sites in 6 days of test period.