• Title/Summary/Keyword: 자동로그인

Search Result 117, Processing Time 0.025 seconds

An Integrated Data Mining Model for Customer Relationship Management (고객관계관리를 위한 통합 데이터마이닝 모형 연구)

  • Song, In-Young;Yi, Tae-Seok;Shin, Ki-Jeong;Kim, Kyung-Chang
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.3
    • /
    • pp.83-99
    • /
    • 2007
  • Nowadays, the advancement of digital information technology resulting in the increased interest of the management and the use of information has given stimulus to the research on the use and management of information. In this paper, we propose an integrated data mining model that can provide the necessary information and interface to users of scientific information portal service according to their respective classification groups. The integrated model classifies users from log files automatically collected by the web server based on users' behavioral patterns. By classifying the existing users of the web site, which provides information service, and analyzing their patterns, we proposed a web site utilization methodology that provides dynamic interface and user oriented site operating policy. In addition, we believe that our research can provide continuous web site user support, as well as provide information service according to user classification groups.

  • PDF

An Implementation of XML Database System for Semantic-Based E-Catalog Image Retrieval (의미기반 전자 카탈로그 이미지 검색을 위한 XML 데이타베이스 시스템 구현)

  • Hong Sungyong;Nah Yunmook
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.9
    • /
    • pp.1219-1232
    • /
    • 2004
  • Recently, the web sites, such as e-business sites and shopping mall sites, deal with lots of catalog image information and contents. As a result, it is required to support semantic-based image retrieval efficiently on such image data. This paper presents a semantic-based image retrieval system, which adopts XML and Fuzzy technology. To support semantic-based retrieval on product catalog images containing multiple objects, we use a multi-level metadata structure which represents the product information and semantics of image data. To enable semantic-based retrieval on such image data, we design a XML database for storing the proposed metadata and study how to apply fuzzy data. This paper proposes a system, generate the fuzzy data automatically to use the image metadata, that can support semantic-based image retrieval by utilizing the generating fuzzy data. Therefore, it will contribute in improving the retrieval correctness and the user's satisfaction on semantic-based e-catalog image retrieval.

  • PDF

Development of Feature-Based 3D CAD Assembly Data Simplification System for Equipment and Materials (특징형상 기반 기자재 3D CAD 조립체 데이터 간략화 시스템 개발)

  • Kim, Byung Chul;Kwon, Soonjo;Park, Sunah;Mun, Duhwan;Han, Soonhung
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.38 no.10
    • /
    • pp.1075-1084
    • /
    • 2014
  • It is necessary to construct an equipment catalog in plant design. A different level of detail may be needed for the three-dimensional (3D) computer aided design (CAD) data for equipment, depending on the purpose. Equipment suppliers provide CAD data with high complexity, whereas plant designers need CAD data with low complexity. Therefore, it is necessary to simplify the 3D CAD assembly data. To resolve this issue, a system for automatically simplifying the 3D CAD assembly data of equipment was developed. This paper presents the architecture of the system, the detailed functions of the system, and a neutral data format used for uploading simplified 3D CAD assembly data to a plant 3D CAD system. In addition, experiment results using the prototype system are explained.

Fast Modulation Classifier for Software Radio (소프트웨어 라디오를 위한 고속 변조 인식기)

  • Park, Cheol-Sun;Jang, Won;Kim, Dae-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4C
    • /
    • pp.425-432
    • /
    • 2007
  • In this paper, we deals with automatic modulation classification capable of classifying incident signals without a priori information. The 7 key features which have good properties of sensitive with modulation types and insensitive with SNR variation are selected. The numerical simulations for classifying 9 modulation types using the these features are performed. The numerical simulations of the 4 types of modulation classifiers are performed the investigation of classification accuracy and execution time to implement the fast modulation classifier in software radio. The simulation result indicated that the execution time of DTC was best and SVC and MDC showed good classification performance. The prototype was implemented with DTC type. With the result of field trials, we confirmed the performance in the prototype was agreed with the numerical simulation result of DTC.

Design and Implementation of Internet Throats and Vulnerabilities Auto Collector for Cyber Threats Management (사이버위협 관리를 위한 인터넷 위협 및 취약점 정보 수집기 설계 및 구현)

  • Lee, Eun-Young;Paek, Seung-Hyun;Park, In-Sung;Yun, Joo-Beom;Oh, Hung-Geun;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.21-28
    • /
    • 2006
  • Beginning flag security it was limited in Firewall but currently many information security solutions like Anti-virus, IDS, Firewall are come to be many. For efficiently managing different kinds of information security products ESM (Enterprise Security management) are developed and operated. Recently over the integrated security management system, TMS (Threat Management System) is rising in new area of interest. It follows in change of like this information security product and also collection information is being turning out diversification. For managing cyber threats, we have to analysis qualitative information (like vulnerabilities and malware codes, security news) as well as the quantity event logs which are from information security products of past. Information Threats and Vulnerability Auto Collector raises the accuracy of cyber threat judgement and can be utilized to respond the cyber threat which does not occur still by gathering qualitative information as well as quantity information.

  • PDF

Dropout Prediction Modeling and Investigating the Feasibility of Early Detection in e-Learning Courses (일반대학에서 교양 e-러닝 강좌의 중도탈락 예측모형 개발과 조기 판별 가능성 탐색)

  • You, Ji Won
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.1
    • /
    • pp.1-12
    • /
    • 2014
  • Since students' behaviors during e-learning are automatically stored in LMS(Learning Management System), the LMS log data convey the valuable information of students' engagement. The purpose of this study is to develop a prediction model of e-learning course dropout by utilizing LMS log data. Log data of 578 college students who registered e-learning courses in a traditional university were used for the logistic regression analysis. The results showed that attendance and study time were significant to predict dropout, and the model classified between dropouts and completers of e-learning courses with 96% accuracy. Furthermore, the feasibility of early detection of dropouts by utilizing the model were discussed.

  • PDF

Video Object Extraction Using Contour Information (윤곽선 정보를 이용한 동영상에서의 객체 추출)

  • Kim, Jae-Kwang;Lee, Jae-Ho;Kim, Chang-Ick
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.48 no.1
    • /
    • pp.33-45
    • /
    • 2011
  • In this paper, we present a method for extracting video objects efficiently by using the modified graph cut algorithm based on contour information. First, we extract objects at the first frame by an automatic object extraction algorithm or the user interaction. To estimate the objects' contours at the current frame, motion information of objects' contour in the previous frame is analyzed. Block-based histogram back-projection is conducted along the estimated contour point. Each color model of objects and background can be generated from back-projection images. The probabilities of links between neighboring pixels are decided by the logarithmic based distance transform map obtained from the estimated contour image. Energy of the graph is defined by predefined color models and logarithmic distance transform map. Finally, the object is extracted by minimizing the energy. Experimental results of various test images show that our algorithm works more accurately than other methods.

Restoration for Speech Records Managed by the National Archives of Korea (국가기록원 음성 기록물의 복원과 분석)

  • Oh, Sejin;Kang, Hong-Goo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.32 no.3
    • /
    • pp.269-278
    • /
    • 2013
  • The speech recording of the National Archives of Korea contains very important traces which represent modern times of Korea. But the way to be recorded by analogue is easily contaminated as time goes by. So it has to be digitalized for management and services. Consequently, restoration method of distorted speech is needed. We propose the four classes for each distortion kind and apply restoration algorithms for the cases of speech level, stationary noise and abrupt noise. As a result, speech volume adjusts to -26 dBov for only on the speech region and SNR improves above 10dB. Especially, conventional way to remove the noise is almost impossible because we need to listen to all of them but it can be more effective by adaptation of auto restoration algorithm.

Design and Implementation of Web-Based Cyber-University System (웹-기반 가상대학 시스템의 설계 및 구현)

  • Lee, Sei-Young;Yong, Hwan-Seung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.12
    • /
    • pp.3577-3588
    • /
    • 1999
  • This paper describes design and implementation of a general purpose cyber educational system. In this system, there are different types of menus and services according to such user's rights as system operators, professors, assistant instructors, students. In order to keep in close contact between students and professors, provided are various services such as the official announcement, transcripts of lecture, bulletin board, Q/A corner, report box, archive of study materials, electronic mail box, memorandum including checking of one's attendance and school record. For the purpose of activating small group studies and discussion about given subject, it can organize into groups automatically and provide with debating rooms. The system is implemented by separating with both HTML design and programming part by templete concept. Overload of iterative server is solved by adjusting the numbers of DB servers of each service.

  • PDF

Proposal of Security Orchestration Service Model based on Cyber Security Framework (사이버보안 프레임워크 기반의 보안 오케스트레이션 서비스 모델 제안)

  • Lee, Se-Ho;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.7
    • /
    • pp.618-628
    • /
    • 2020
  • The purpose of this paper is to propose a new security orchestration service model by combining various security solutions that have been introduced and operated individually as a basis for cyber security framework. At present, in order to respond to various and intelligent cyber attacks, various single security devices and SIEM and AI solutions that integrate and manage them have been built. In addition, a cyber security framework and a security control center were opened for systematic prevention and response. However, due to the document-oriented cybersecurity framework and limited security personnel, the reality is that it is difficult to escape from the control form of fragmentary infringement response of important detection events of TMS / IPS. To improve these problems, based on the model of this paper, select the targets to be protected through work characteristics and vulnerable asset identification, and then collect logs with SIEM. Based on asset information, we established proactive methods and three detection strategies through threat information. AI and SIEM are used to quickly determine whether an attack has occurred, and an automatic blocking function is linked to the firewall and IPS. In addition, through the automatic learning of TMS / IPS detection events through machine learning supervised learning, we improved the efficiency of control work and established a threat hunting work system centered on big data analysis through machine learning unsupervised learning results.