• Title/Summary/Keyword: 식별성

Search Result 2,700, Processing Time 0.029 seconds

Personalized Session-based Recommendation for Set-Top Box Audience Targeting (셋톱박스 오디언스 타겟팅을 위한 세션 기반 개인화 추천 시스템 개발)

  • Jisoo Cha;Koosup Jeong;Wooyoung Kim;Jaewon Yang;Sangduk Baek;Wonjun Lee;Seoho Jang;Taejoon Park;Chanwoo Jeong;Wooju Kim
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.2
    • /
    • pp.323-338
    • /
    • 2023
  • TV advertising with deep analysis of watching pattern of audiences is important to set-top box audience targeting. Applying session-based recommendation model(SBR) to internet commercial, or recommendation based on searching history of user showed its effectiveness in previous studies, but applying SBR to the TV advertising was difficult in South Korea due to data unavailabilities. Also, traditional SBR has limitations for dealing with user preferences, especially in data with user identification information. To tackle with these problems, we first obtain set-top box data from three major broadcasting companies in South Korea(SKB, KT, LGU+) through collaboration with Korea Broadcast Advertising Corporation(KOBACO), and this data contains of watching sequence of 4,847 anonymized users for 6 month respectively. Second, we develop personalized session-based recommendation model to deal with hierarchical data of user-session-item. Experiments conducted on set-top box audience dataset and two other public dataset for validation. In result, our proposed model outperformed baseline model in some criteria.

A Study on the Digital Forensics Artifacts Collection and Analysis of Browser Extension-Based Crypto Wallet (브라우저 익스텐션 기반 암호화폐 지갑의 디지털 포렌식 아티팩트 수집 및 분석 연구)

  • Ju-eun Kim;Seung-hee Seo;Beong-jin Seok;Heoyn-su Byun;Chang-hoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.471-485
    • /
    • 2023
  • Recently, due to the nature of blockchain that guarantees users' anonymity, more and more cases are being exploited for crimes such as illegal transactions. However, cryptocurrency is protected in cryptocurrency wallets, making it difficult to recover criminal funds. Therefore, this study acquires artifacts from the data and memory area of a local PC based on user behavior from four browser extension wallets (Metamask, Binance, Phantom, and Kaikas) to track and retrieve cryptocurrencies used in crime, and analyzes how to use them from a digital forensics perspective. As a result of the analysis, the type of wallet and cryptocurrency used by the suspect was confirmed through the API name obtained from the browser's cache data, and the URL and wallet address used for the remittance transaction were obtained. We also identified Client IDs that could identify devices used in cookie data, and confirmed that mnemonic code could be obtained from memory. Additionally, we propose an algorithm to measure the persistence of obtainable mnemonic code and automate acquisition.

A Study on Robust Optimal Sensor Placement for Real-time Monitoring of Containment Buildings in Nuclear Power Plants (원전 격납 건물의 실시간 모니터링을 위한 강건한 최적 센서배치 연구)

  • Chanwoo Lee;Youjin Kim;Hyung-jo Jung
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.36 no.3
    • /
    • pp.155-163
    • /
    • 2023
  • Real-time monitoring technology is critical for ensuring the safety and reliability of nuclear power plant structures. However, the current seismic monitoring system has limited system identification capabilities such as modal parameter estimation. To obtain global behavior data and dynamic characteristics, multiple sensors must be optimally placed. Although several studies on optimal sensor placement have been conducted, they have primarily focused on civil and mechanical structures. Nuclear power plant structures require robust signals, even at low signal-to-noise ratios, and the robustness of each mode must be assessed separately. This is because the mode contributions of nuclear power plant containment buildings are concentrated in low-order modes. Therefore, this study proposes an optimal sensor placement methodology that can evaluate robustness against noise and the effects of each mode. Indicators, such as auto modal assurance criterion (MAC), cross MAC, and mode shape distribution by node were analyzed, and the suitability of the methodology was verified through numerical analysis.

A Study on the Design of Metadata Elements in Textbooks (교과서 메타데이터 요소 설계에 관한 연구)

  • Euikyung Oh
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.401-408
    • /
    • 2023
  • The purpose of this study is to design textbook metadata as a basic task for building a textbook database. To this end, reading textbooks were defined as a category of textbooks, and a metadata development methodology was established through previous research. In order to ensure that bibliographically essential elements are not omitted, the catalog description elements of institutions that collect, accumulate, and service textbooks such as the National Library of Korea were investigated. The elements of Dublin Core, MODS, and KEM were mapped to derive elements suitable for describing textbooks. Finally, a set of textbook metadata elements consisting of 14 elements in three categories - bibliography, context, and textbook characteristics were presented by adding publication type, genre, and curriculum period elements. The 14 elements are titles, authors, publications, formats, identification sign, languages, locations, subject names, annotation, genres, table of contents, subjects, curriculum period, and curriculum information. In this study, we contributed to this field by discussing how to organize textbook resources with national knowledge resources, and in future studies, we proposed to evaluate usability by applying metadata elements to actual textbooks and revise and supplement them according to the evaluation results.

Outlier Detection and Labeling of Ship Main Engine using LSTM-AutoEncoder (LSTM-AutoEncoder를 활용한 선박 메인엔진의 이상 탐지 및 라벨링)

  • Dohee Kim;Yeongjae Han;Hyemee Kim;Seong-Phil Kang;Ki-Hun Kim;Hyerim Bae
    • The Journal of Bigdata
    • /
    • v.7 no.1
    • /
    • pp.125-137
    • /
    • 2022
  • The transportation industry is one of the important industries due to the geographical requirements surrounded by the sea on three sides of Korea and the problem of resource poverty, which relies on imports for most of its resource consumption. Among them, the proportion of the shipping industry is large enough to account for most of the transportation industry, and maintenance in the shipping industry is also important in improving the operational efficiency and reducing costs of ships. However, currently, inspections are conducted every certain period of time for maintenance of ships, resulting in time and cost, and the cause is not properly identified. Therefore, in this study, the proposed methodology, LSTM-AutoEncoder, is used to detect abnormalities that may cause ship failure by considering the time of actual ship operation data. In addition, clustering is performed through clustering, and the potential causes of ship main engine failure are identified by grouping outlier by factor. This enables faster monitoring of various information on the ship and identifies the degree of abnormality. In addition, the current ship's fault monitoring system will be equipped with a concrete alarm point setting and a fault diagnosis system, and it will be able to help find the maintenance time.

Study on Security Policy Distribute Methodology for Zero Trust Environment (제로 트러스트 환경을 위한 보안 정책 배포 방법에 대한 연구)

  • Sung-Hwa Han;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.93-98
    • /
    • 2022
  • Information service technology continues to develop, and information service continues to expand based on the IT convergence trend. The premeter-based security model chosen by many organizations can increase the effectiveness of security technologies. However, in the premeter-based security model, it is very difficult to deny security threats that occur from within. To solve this problem, a zero trust model has been proposed. The zero trust model requires authentication for user and terminal environments, device security environment verification, and real-time monitoring and control functions. The operating environment of the information service may vary. Information security management should be able to response effectively when security threats occur in various systems at the same time. In this study, we proposed a security policy distribution system in the object reference method that can effectively distribute security policies to many systems. It was confirmed that the object reference type security policy distribution system proposed in this study can support all of the operating environments of the system constituting the information service. Since the policy distribution performance was confirmed to be similar to that of other security systems, it was verified that it was sufficiently effective. However, since this study assumed that the security threat target was predefined, additional research is needed on the identification method of the breach target for each security threat.

A Study on Class Sample Extraction Technique Using Histogram Back-Projection for Object-Based Image Classification (객체 기반 영상 분류를 위한 히스토그램 역투영을 이용한 클래스 샘플 추출 기법에 관한 연구)

  • Chul-Soo Ye
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.2
    • /
    • pp.157-168
    • /
    • 2023
  • Image segmentation and supervised classification techniques are widely used to monitor the ground surface using high-resolution remote sensing images. In order to classify various objects, a process of defining a class corresponding to each object and selecting samples belonging to each class is required. Existing methods for extracting class samples should select a sufficient number of samples having similar intensity characteristics for each class. This process depends on the user's visual identification and takes a lot of time. Representative samples of the class extracted are likely to vary depending on the user, and as a result, the classification performance is greatly affected by the class sample extraction result. In this study, we propose an image classification technique that minimizes user intervention when extracting class samples by applying the histogram back-projection technique and has consistent intensity characteristics of samples belonging to classes. The proposed classification technique using histogram back-projection showed improved classification accuracy in both the experiment using hue subchannels of the hue saturation value transformed image from Compact Advanced Satellite 500-1 imagery and the experiment using the original image compared to the technique that did not use histogram back-projection.

Efficient QoS Policy Implementation Using DSCP Redefinition: Towards Network Load Balancing (DSCP 재정의를 통한 효율적인 QoS 정책 구현: 네트워크 부하 분산을 위해)

  • Hanwoo Lee;Suhwan Kim;Gunwoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.715-720
    • /
    • 2023
  • The military is driving innovative changes such as AI, cloud computing, and drone operation through the Fourth Industrial Revolution. It is expected that such changes will lead to a rapid increase in the demand for information exchange requirements, reaching all lower-ranking soldiers, as networking based on IoT occurs. The flow of such information must ensure efficient information distribution through various infrastructures such as ground networks, stationary satellites, and low-earth orbit small communication satellites, and the demand for information exchange that is distributed through them must be appropriately dispersed. In this study, we redefined the DSCP, which is closely related to QoS (Quality of Service) in information dissemination, into 11 categories and performed research to map each cluster group identified by cluster analysis to the defense "information exchange requirement list" on a one-to-one basis. The purpose of the research is to ensure efficient information dissemination within a multi-layer integrated network (ground network, stationary satellite network, low-earth orbit small communication satellite network) with limited bandwidth by re-establishing QoS policies that prioritize important information exchange requirements so that they are routed in priority. In this paper, we evaluated how well the information exchange requirement lists classified by cluster analysis were assigned to DSCP through M&S, and confirmed that reclassifying DSCP can lead to more efficient information distribution in a network environment with limited bandwidth.

An Exploratory Study on Ethical Culture Leadership - Focused on the Case of King Sejong' Leadership - (윤리문화적 리더십 모형에관한탐색적연구 - 세종대왕 리더십 사례를중심으로-)

  • Cho, Hyun-Bong
    • Journal of Ethics
    • /
    • no.97
    • /
    • pp.279-306
    • /
    • 2014
  • This study presents the leadership model that is to build of ethical and cultural leadership. This model is to operat the functions of a systemof leadership that based on the universal principles of life, that is performed bybalance and harmonized judgment of the ideal ethical oughtfulness and cultural values, and practise ethically through relationship, process, and skill of leadership. And this model turn out to lead a real impact and then overcome conflict, problem solving, motivation. To check the validity of leadership, this study analysis the case study of leadership of King Sejong. His leadership is based at heaven that on the basis of the universal principles of life. The ideal ethical oughtfulness is to cares for people and the value of the cultural is to cherish the people's will. His leadership is to be balance and harmonized judgment of the ideal ethical oughtfulness and the cultural values by practice of virtues through relationship, process, and skill of leadership. Leadership relationship is a equal role relationship that are the children of the sky, thus to be coexistence and harmonyin close collaboration. Leadership process is a process of transvaluation to ensure the validity of the values by rational discussion and persuasion. Leadership skills led to active obedience through leading by example and love of learning. King Sejong' leadership is the leadership that ethical and cultural leadership become well-implemented.

A Study on Collection Performance Evaluation of Public Libraries in Korea (우리나라 공공도서관의 장서성과평가에 관한 연구)

  • Soo-Sang Lee;Soon-Young Lee
    • Journal of Korean Library and Information Science Society
    • /
    • v.54 no.3
    • /
    • pp.81-104
    • /
    • 2023
  • This study is a case study in which collection performance evaluation was attempted using key performance indicators presented by EBSM or collectionHQ, taking three public libraries located in Geumjeong-gu, Busan as examples. Focusing on the collection performance evaluation, which evaluates the performance of the collection, not only the evaluation of individual libraries, but also the differences in the evaluation results of libraries were reviewed. The key performance indicators used are grubby items, dead items, popular author provision, popular subject provision, overstocked subject areas and understocked subject areas. The main analysis results are as follows. First, in the evaluation of the grubby items, the ratio of grubby items out of all items in all three libraries was low. Second, in the case of all dead items, the ratio was high in all three libraries, It exceeded the base value suggested by collectionHQ. Third, the Top 10 popular authors were identified, and there were differences among libraries. Fourth, in the evaluation of provision of popular subject areas, all three libraries had almost no popular subject areas. Fifth, in the evaluation of overstocked subject areas, there was no overstock at Geumsaem Library, but many at Geumjeong Library and Seodong Library. Sixth, in the subject area evaluation of understocked inventory, only Geumsaem Library showed a lack of inventory.