• Title/Summary/Keyword: 자동화 메커니즘

Search Result 71, Processing Time 0.027 seconds

Development of a Braille Translation and Document Summarization System for the Visually Impaired Education (시각장애인 교육용 점자 번역 및 문서요약 시스템 개발)

  • Hee-Jin Kim;Bo-Yeong Park;Eun-Ju Park;Ji-Hae Jeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.969-970
    • /
    • 2023
  • 본 연구는 기존의 점자 교육 및 번역 서비스의 한계를 극복하기 위해 16가지의 다양한 번역 메커니즘과 문서 요약 기능을 제공하여 시각장애인의 학습자료의 접근성을 향상한다. 점역사의 번역 작업을 자동화하여 정확하고 빠른 점역 및 교정을 지원한다. 음성파일을 제공하여 시각장애인의 학습 시간을 단축할 수 있다. E-yes 는 시각장애인의 학습 효율을 높이고 학습자료 접근성 개선을 목적으로 한다.

Reinforcement Learning-based Traffic Load Balancing in Service Mesh Environments (서비스 메시 환경에서 강화학습을 이용한 트래픽 부하 분산 메커니즘에 관한 연구)

  • Chae-Ho Kim;Jaehyun Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.839-842
    • /
    • 2024
  • 서비스 메시 환경에서의 트래픽 분산은 시스템의 성능과 안정성, 그리고 보안에 필수적인 기능을 담당한다. 현재의 트래픽 분산 방식들은 대부분 정적 설정을 기반으로 하기 때문에 시스템 환경의 변화에 신속하게 대응하기 어렵고 최적화된 성능을 보장하기 힘들다. 본 논문에서는 강화학습을 활용해 서비스 메시 환경 내에서의 트래픽 분산을 자동화하고 최적화할 수 있는 새로운 시스템을 제안한다. 특히, 텔레메트리 기술을 활용해 트래픽의 분산을 실시간으로 추적하며, 강화학습 알고리즘을 이용해 트래픽 가중치를 조정함으로써 기존의 로드 밸런싱 방법들에 비해 더 빠른 처리 시간과 보다 효율적인 로드 밸런싱을 달성할 수 있을 것으로 기대한다.

Deep Learning-Based Automation Cyber Attack Convergence Trend Analysis Mechanism for Deep Learning-Based Security Vulnerability Analysis (사이버공격 융합 동향 분석을 위한 딥러닝 기반 보안 취약점 분석 자동화 메커니즘)

  • Kim, Jinsu;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.99-107
    • /
    • 2022
  • In the current technological society, where various technologies are converged into one and being transformed into new technologies, new cyber attacks are being made just as they keep pace with the changes in society. In particular, due to the convergence of various attacks into one, it is difficult to protect the system with only the existing security system. A lot of information is being generated to respond to such cyber attacks. However, recklessly generated vulnerability information can induce confusion by providing unnecessary information to administrators. Therefore, this paper proposes a mechanism to assist in the analysis of emerging cyberattack convergence technologies by providing differentiated vulnerability information to managers by learning documents using deep learning-based language learning models, extracting vulnerability information and classifying them according to the MITRE ATT&CK framework.

Automatic Test case Generation Mechanism from the Decision Table of Requirement Specification Techniques based on Metamodel (메타모델 기반 요구사항 명세 기법인 의사 결정표를 통한 자동 테스트 케이스 생성 메커니즘)

  • Hyun Seung Son
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.2
    • /
    • pp.228-234
    • /
    • 2023
  • As the increasing demand for high-quality software, there is huge requiring for quality certification of international standards, industrial functional safety (IEC 61508), automotive (ISO 26262), embedded software guidelines for weapon systems, etc., in the industry. Software companies are very difficult to systematically acquire the quality certification in terms of cost and manpower of Startup, venture small-sized companies. For their companies one test case automatic generation is considered as a core technique to evaluate or improve software quality. This paper proposes a test case automatic generation method based on the design decision table for system and software design verification. We apply the proposed method with OMG's standard techniques of metamodel and model transformation for automatically generating test cases. To do this, we design the metamodels of design decision table (Model) and test case document (Text) and define model transformation to automatically generate test cases, which will expect to easily work MC/DC coverage.

Design and Implementation of Administration Tool in Distributed Transactional Workflow Management System (분산 트랜잭션 워크플로우 운용관리 툴 설계와 구현)

  • 이봉석;강태규;김광훈;백수기;유영철
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10b
    • /
    • pp.230-232
    • /
    • 1999
  • 워크플로우 시스템은 한 조직체 내에서 운용되는 정보와 제어의 흐름을 효과적으로 자동화 해주는 역할을 담당해야 한다. 그러나 기업내의 실제업무에는 많은 변수들이 존재하고 다양하게 변화하고 있다. 또한 시스템이 분산 컴퓨팅화되어 가기 때문에 그 흐름을 추적, 관리의 차원을 넘어서 업무들의 최적화, 통합화는 물론 분산된 시스템내 서버들 관리까지도 개입을 해야한다. 또한 특정작업의 과부하 또는 병목현상을 운용자가 개입하여 방지하고 개선함으로서 전체 작업의 효율을 향상시켜야 한다. 이에 운용관리 툴도 독립 서버로 존재하는 것보다 여러 개의 서버로 분산시켜 구축함으로써 수행 객체들을 효율적으로 통제할 수 있다. 또한, 시스템을 구성하고 있는 서버들의 관리도 중앙에서 모든 것을 통제하는 것보다 각각의 분산된 운용 서버들이 각각 관리함으로써 신뢰성, 안정성의 한계를 극복할 수 있다. 국제표준기구 역할을 하고 있는 WfMC(Workflow Management Coalision)에서 제시한 표준 모델을 근거로 각각의 인터페이스 규약에 따라 시스템을 개발하는데 있어 실질적인 기업의 업무에 적용되기에는 턱없이 부족한 점들을 이 논문을 통해 지적한다. 또한 좀 더 빠르게 변화하는 사회에 적격인 적응형(Adaptive) 워크플로우 관리 시스템의 특성을 지니도록 했다. 그리고 데이터베이스의 트랜잭션의 개념을 워크플로우 레벨에서 업무들의 수행시 에러나 장애시 복구처리 메커니즘으로 설계하고 구현을 하였다.

  • PDF

A Study on Future Container Cranes (차세대 컨테이너크레인에 대한 고찰)

  • Jung Hyun-Soo;Lee Suk-Jae;Hong Keum-Shik
    • Journal of Navigation and Port Research
    • /
    • v.29 no.3 s.99
    • /
    • pp.291-298
    • /
    • 2005
  • In this article. the specifications of a future container crane for a 18,000 TEU megaship are investigated After studying the transitions of containerships through the past half century, the characteristics of the past and current container cranes are outlined. together with various research trends throughout the world Upon these results, the size and performance of the container crane that will be used beyond the year 2014 are forecast. Specifically, the structure, trolley and hoist mechanism, control method, outreach. backreach, rail gage, loading capacity, stability, durability, and others are summarized.

A Design and Implementation of A Rule-based Security Evaluation System for W Security Engine (IP Security 엔진을 위한 규칙기반 보안평가 시스템의 설계 및 구현)

  • Gwon, Hyeok-Chan;Hyeon, Jeong-Sik;Kim, Sang-Chun;Na, Jae-Hun;Son, Seung-Won
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.367-374
    • /
    • 2002
  • IPsec offers not odd Internet security service such as Internet secure communication and authentication but also the safe key exchange and anti-replay attack mechanism. Recently IPsec is implemented on the various operating systems. But there is no existing tool that checks the servers, which provide IPsec services, work properly and provide their network security services well. In this paper, we design and implement the rule based security evaluation system for IPsec engine. This system operated on Windows and UNX platform. We developed the system using Java and C language.

Automated Technology for Pipelines Inspection Using Inpipe Robot (배관 로봇을 이용한 배관 검사 자동화 기술)

  • Roh, Se-Gon;Choi, Hyouk-Ryeol
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.22 no.3
    • /
    • pp.261-266
    • /
    • 2002
  • Up to now a wide variety of researches on inpipe robots for inspection have been introduced, but it still seems to be difficult to construct a robot providing mobility sufficient to navigate inside the complicated configuration of underground pipelines. The robot for the inspection of pipelines should freely move along the basic configuration of pipelines such as along horizontal or vertical pipelines. Moreover it should be able to travel along reducers and elbows, and especially the capability for steering in branches is essential to it. In this report, citical points and technologies in the development of the inpipe inspection robots are introduced and inpipe robots developed for last several years are introduced.

Workflow Oriented Domain Analysis (워크플로우 지향 도메인 분석)

  • Kim Yun-Jeong;Kim Young-Chul
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.54-63
    • /
    • 2006
  • In this paper we will propose a domain analysis methodology that uses an extended workflow mechanism based on dynamic modeling to solve problems of a traditional domain analysis on legacy systems. This methodology is called WODA(Workflow Oriented Domain Analysis). Following procedures on WODA, we can identify common/uncommon component, and also extract the cluster of components. It will be effectively reusable on developing new systems with these components. With our proposed component testing metrics, we can determine highly reusable component/scenario on identifying possible scenarios of the particular system. We can also recognize most critical/most frequent reusable components and prioritize possible component scenarios of the system. This paper contains one application of UPS that illustrates our autonomous modeling tool, WODA.

  • PDF

The Modification of UML for Developing of the Efficient Ontology (효율적인 온톨로지 개발을 위한 UML의 변경)

  • Kim, Young-Tae;Lim, Jae-Hyun;Kim, Chi-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.2
    • /
    • pp.415-421
    • /
    • 2008
  • The increasing interest in ontologies is driven by the large volumes of information now available as well as by the increasing complexity and diversity of this information. These trends have also increased interest in automating many activities that were traditionally performed manually. We are currently engaged in this paper that have realized benefits in productivity and clarity by utilizing UML class diagrams to develop and to display complex OWL ontologies. UML has many features, such as profiles, global modularity and extension mechanisms that are not generally available in most ontology languages. However, ontology languages have some features that UML does not support. Our paper identifies the similarities and differences between UML and the ontology languages RDF and OWL. To reconcile these differences, we propose a modification to the UML metamodel to address some of the most problematic differences.