• Title/Summary/Keyword: 접속 정보

Search Result 3,012, Processing Time 0.03 seconds

Current status of automatic translation service by artificial intelligence specialized in Korean astronomical classics (천문 고문헌 특화 인공지능 자동번역 서비스의 현황)

  • Seo, Yoon Kyung;Kim, Sang Hyuk;Ahn, Young Sook;Choi, Go-Eun;Choi, Young Sil;Baik, Hangi;Sun, Bo Min;Kim, Hyun Jin;Choi, Byung Sook;Lee, Sahng Woon;Park, Raejin
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.46 no.2
    • /
    • pp.64.3-65
    • /
    • 2021
  • 인공지능 기계학습에 의한 한문고전 자동번역기는 승정원일기 뿐만 아니라, 한국 고문헌 중 천문 기록에 특화되어 한자로 된 천문 고전을 한글로 번역해 서비스하고 있다. 한국천문연구원은 한국지능정보사회진흥원이 주관하는 2019년도 Information and Communication Technology 기반 공공서비스 촉진사업에 한국고전번역원과 공동 참여하여 이 자동 번역기 개발을 완료한 것이다. 이 번역기의 개발 목적은 초벌 번역 수준일지라도 문장 형태의 한문을 한글로 자동 번역하는 것이며, 이 연구는 현재 번역기 운용 현황을 서비스 별로 분석하고자 한다. 자동 번역관련 서비스는 크게 3가지이다. 첫째, 누구나 웹 접속을 통해 사용 가능한 한문고전 자동번역 대국민 서비스이다. 1년간 자체 시험을 거쳐 2021년 1월 12일 시험판을 오픈하여 운용 중에 있다. 둘째, 기관별로 구축된 코퍼스와 도메인 특화된 번역 모델 등을 관리할 수 있는 한문고전 자동번역 확산 플랫폼 서비스이다. 대국민 서비스와 함께 클라우드 기반으로 서비스되며, 한국고전번역원이 관리를 담당한다. 셋째, 자동번역 Applied Programmable Interface를 활용한 한국천문연구원 내 자체 활용이 가능한 천문고전 자동번역 서비스이다. 서비스 현황 분석은 기관별 관리 서비스에 해당되는 한문고전 자동번역 확산 플랫폼에서 집계하여 제공하는 대시보드의 통계 기능을 활용한다. 각 서비스별 문장과 파일 번역 이용 건수, 번역 속도, 평균 자수 뿐만 아니라, 번역 모델 프로필에 따른 이용률 분석이 가능하다. 이에 따른 주요 분석 중 하나인 올해 전체 번역 이용 건수는 한 해 각 기관의 평균 방문자수 대비 87% 성과 목표에 해당되는 약 38만 건에 근접할 것으로 예측된다. 이 자동 번역기는 원문 해독 시간을 단축시키는 효과와 함께 미번역 천문 고문헌의 활용성을 높여 다양한 연구에 기여할 것이다.

  • PDF

Cloud security authentication platform design to prevent user authority theft and abnormal operation during remote control of smart home Internet of Things (IoT) devices (스마트 홈 사물인터넷 기기(IoT)의 원격제어 시 사용자 권한 탈취 및 이상조작 방지를 위한 클라우드 보안인증 플랫폼 설계)

  • Yoo Young Hwan
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.99-107
    • /
    • 2022
  • The use of smart home appliances and Internet of Things (IoT) devices is growing, enabling new interactions and automation in the home. This technology relies heavily on mobile services which leaves it vulnerable to the increasing threat of hacking, identity theft, information leakage, serious infringement of personal privacy, abnormal access, and erroneous operation. Confirming or proving such security breaches have occurred is also currently insufficient. Furthermore, due to the restricted nature of IoT devices, such as their specifications and operating environments, it is difficult to provide the same level of internet security as personal computers. Therefore, to increase the security on smart home IoT devices, attention is needed on (1) preventing hacking and user authority theft; (2) disabling abnormal manipulation; and (3) strengthening audit records for device operation. In response to this, we present a plan to build a cloud security authentication platform which features security authentication management functionality between mobile terminals and IoT devices.

A Study on the Application of Security Reinforcement Technology Reflecting Zero Trust Principles (제로 트러스트 원리를 반영한 보안 강화 요소 기술 적용 방안 연구)

  • DA-IN Lee;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.3-11
    • /
    • 2022
  • With increasingly sophisticated cyber threats, accelerating cloud adoption, and the adoption of remote and hybrid work environments due to the COVID-19 pandemic, the traditional security model, in which many businesses implicitly trust everything within their boundaries, is changing without boundaries, allowing data and users The concept of zero trust is getting more and more attention as the fact that it is not suitable for today's increasingly decentralized environment has been highlighted. Zero Trust is a cyber security model on the premise that 'no one trusts'. In principle, there is no safe area or user in the entire system, and internal users are also verified. is a way As telecommuting becomes commonplace due to the COVID-19 pandemic, and existing cyber security measures are facing limitations, Zero Trust technology is drawing more attention. Accordingly, it is expected that the Korean government will also check the status of acceptability of the domestic public and private sectors and tasks that need improvement when introducing Zero Trust with reference to the NIST standard. In this paper, the basic principles, philosophy, and considerations of Zero Trust and Zero Trust are explained, and practical basic measures to strengthen security by combining Zero Trust technology are presented.

Python Package Production for Agricultural Researcher to Use Meteorological Data (농업연구자의 기상자료 활용을 위한 파이썬 패키지 제작)

  • Hyeon Ji Yang;Joo Hyun Park;Mun-Il Ahn;Min Gu Kang;Yong Kyu Han;Eun Woo Park
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.25 no.2
    • /
    • pp.99-107
    • /
    • 2023
  • Recently, the abnormal weather events and crop damages occurred frequently likely due to climate change. The importance of meteorological data in agricultural research is increasing. Researchers can download weather observation data by accessing the websites provided by the KMA (Korea Meteorological Administration) and the RDA (Rural Development Administration). However, there is a disadvantage that multiple inquiry work is required when a large amount of meteorological data needs to be received. It is inefficient for each researcher to store and manage the data needed for research on an independent local computer in order to avoid this work. In addition, even if all the data were downloaded, additional work is required to find and open several files for research. In this study, data collected by the KMA and RDA were uploaded to GitHub, a remote storage service, and a package was created that allows easy access to weather data using Python. Through this, we propose a method to increase the accessibility and usability of meteorological data for agricultural personnel by adopting a method that allows anyone to take data without an additional authentication process.

Weblog Analysis of University Admissions Website using Google Analytics (구글 애널리틱스를 활용한 대학 입시 홈페이지 웹로그 분석)

  • Su-Hyun Ahn;Sang-Jun Lee
    • Journal of Practical Engineering Education
    • /
    • v.16 no.1_spc
    • /
    • pp.95-103
    • /
    • 2024
  • With the rapid decline of the school-age population, the competition for admissions has increased and marketing through digital channels has become more important, so universities are investing more resources in online promotion and communication to recruit new students. This study uses Google Analytics, a web log analysis tool, to track the visitor behavior of a university admissions website and establish a digital marketing strategy based on it. The analysis period was set from July 1, 2023, when Google Analytics 4(GA4) was integrated, to January 10, 2024, when the college admissions process was completed. The analysis revealed interesting patterns such as geographical information based on visitors' access location, devices(operating systems) and browsers used by visitors, acquisition channels through visitors traffic, conversions on pages and screens that visitors engaged with and visitor flow. Based on this study, we expect universities to find ways to strengthen their admission promotion through digital marketing and effectively communicate with applicants to gain a competitive edge.

A Performance Evaluation of the e-Gov Standard Framework on PaaS Cloud Computing Environment: A Geo-based Image Processing Case (PaaS 클라우드 컴퓨팅 환경에서 전자정부 표준프레임워크 성능평가: 공간영상 정보처리 사례)

  • KIM, Kwang-Seob;LEE, Ki-Won
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.21 no.4
    • /
    • pp.1-13
    • /
    • 2018
  • Both Platform as a Service (PaaS) as one of the cloud computing service models and the e-government (e-Gov) standard framework from the Ministry of the Interior and Safety (MOIS) provide developers with practical computing environments to build their applications in every web-based services. Web application developers in the geo-spatial information field can utilize and deploy many middleware software or common functions provided by either the cloud-based service or the e-Gov standard framework. However, there are few studies for their applicability and performance in the field of actual geo-spatial information application yet. Therefore, the motivation of this study was to investigate the relevance of these technologies or platform. The applicability of these computing environments and the performance evaluation were performed after a test application deployment of the spatial image processing case service using Web Processing Service (WPS) 2.0 on the e-Gov standard framework. This system was a test service supported by a cloud environment of Cloud Foundry, one of open source PaaS cloud platforms. Using these components, the performance of the test system in two cases of 300 and 500 threads was assessed through a comparison test with two kinds of service: a service case for only the PaaS and that on the e-Gov on the PaaS. The performance measurements were based on the recording of response time with respect to users' requests during 3,600 seconds. According to the experimental results, all the test cases of the e-Gov on PaaS considered showed a greater performance. It is expected that the e-Gov standard framework on the PaaS cloud would be important factors to build the web-based spatial information service, especially in public sectors.

Assessment of the Potential Consumers' Preference for the V2G System (V2G 시스템에 대한 잠재적 소비자의 선호 평가)

  • Lim, Seul-Ye;Kim, Hee-Hoon;Yoo, Seung-Hoon
    • Journal of Energy Engineering
    • /
    • v.25 no.4
    • /
    • pp.93-102
    • /
    • 2016
  • Vehicle-to-Grid (V2G) system, bi-direction power trading technology, enables drivers possessing electric vehicle to sell the spare electricity charged in the vehicle to power distribution company. The drivers gain profit by charging electricity in the day time of high electricity rate. In this regard, the government is preparing the policies of building and supporting V2G infrastructure and demanding the potential consumers' preference for the V2G system. This paper attempts to analyze the consumers' preference using the data from obtained a survey of randomly selected 1,000 individuals. To this end, choice experiment, an economic technique, is employed here. The attributes considered in the study are residual amount of electricity, electricity trading hours, required plug-in time, and price measured as an amount additional to current gasoline vehicle price. The multinomial logit model, which requires the assumption of 'independence of irrelevant alternatives', is applied but the assumption could not be satisfied in our data. Thus, we finally utilized nested logit model which does not require the assumption. All the parameter estimates in the utility function are statistically significant at the 10% level. The estimation results show that the marginal willingness to pay (MWTP) for one hour increase in electricity trading hours is estimated to be KRW 1,601,057. On the other hand, a one percent reduction in residual amount of electricity and one hour reduction in required plug-in time in V2G system are computed to be KRW -91,911 and -470,619, respectively. The findings can provide policy makers with useful information for decision-making about introducing and managing V2G system.

Handover Functional Architecture for Next Generation Wireless Networks (차세대 무선 네트워크를 위한 핸드오버 기능 구조 제안)

  • Baek, Joo-Young;Kim, Dong-Wook;Kim, Hyun-Jin;Choi, Yoon-Hee;Kim, Duk-Jin;Kim, Woo-Jae;Suh, Young-Joo;Kang, Suk-Yang;Kim, Kyung-Suk;Shin, Kyung-Chul
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.268-273
    • /
    • 2006
  • 차세대 무선 네트워크 (4G)는 새로운 무선 접속 기술의 개발과 함께 많은 연구가 필요한 분야이다. 그 중에서 특히 단말의 끊김없는 이동성을 제공해 주기 위한 핸드오버 기술이 가장 중요하다고 할 수 있다. 차세대 무선 네트워크는 새로운 무선 접속 기술과 함께 기존의 무선랜이나 이동통신망 등과 같이 사용될 것으로 예상되며, 네트워크 계층에서의 이동성 지원을 위하여 Mobile IPv6를 사용할 것으로 예상되는 네트워크이다. 이러한 네트워크에서 끊김없는 이동성을 제공해 주기 위해서는 현재까지 연구된 핸드오버 기능 및 구조에 대한 연구와 함께 보다 다양해진 네트워크 환경과 QoS 등을 고려한 종합적인 핸드오버 기능에 대한 연구가 필요하다. 본 논문에서는 차세대 무선 네트워크에서 단말의 끊김없는 핸드오버를 제공해 주기 위하여 필요한 기능들을 도출하고, 이들간의 유기적인 연관관계를 정의하여 다양한 네트워크 환경과 사용자의 우선순위, 어플리케이션의 QoS 요구 조건 등을 고려한 종합적인 핸드오버 기능 구조를 제안하고자 한다. 제안하는 핸드오버 구조는 Monitoring, Triggering, Handover의 세 가지 module로 나뉘어져 있으며, 각각은 필요에 따라 sub-module로 다시 세분화된다. 제안하는 핸드오버 구조의 가장 큰 특징은 핸드오버를 유발시킬 수 있는 여러 가지 요소를 종합적으로 고려하며 이들간의 수평적인 비교가 아닌 다단계 비교를 수행하여 보다 정확한 triggering이 가능하도록 한다. 또한 단말의 QoS 요구 사항을 보장하고 네트워크의 혼잡도(congestion) 및 부하 조절 (load balancing)을 위한 기능을 핸드오버 기능에 추가하여 효율적인 네트워크의 자원 사용이 가능하도록 설계하였다.서버로 분산처리하게 함으로써 성능에 대한 신뢰성을 향상 시킬 수 있는 Load Balancing System을 제안한다.할 때 가장 효과적인 라우팅 프로토콜이라고 할 수 있다.iRNA 상의 의존관계를 분석할 수 있었다.수안보 등 지역에서 나타난다 이러한 이상대 주변에는 대개 온천이 발달되어 있었거나 새로 개발되어 있는 곳이다. 온천에 이용하고 있는 시추공의 자료는 배제하였으나 온천이응으로 직접적으로 영향을 받지 않은 시추공의 자료는 사용하였다 이러한 온천 주변 지역이라 하더라도 실제는 온천의 pumping 으로 인한 대류현상으로 주변 일대의 온도를 올려놓았기 때문에 비교적 높은 지열류량 값을 보인다. 한편 한반도 남동부 일대는 이번 추가된 자료에 의해 새로운 지열류량 분포 변화가 나타났다 강원 북부 오색온천지역 부근에서 높은 지열류량 분포를 보이며 또한 우리나라 대단층 중의 하나인 양산단층과 같은 방향으로 발달한 밀양단층, 모량단층, 동래단층 등 주변부로 NNE-SSW 방향의 지열류량 이상대가 발달한다. 이것으로 볼 때 지열류량은 지질구조와 무관하지 않음을 파악할 수 있다. 특히 이러한 단층대 주변은 지열수의 순환이 깊은 심도까지 가능하므로 이러한 대류현상으로 지표부근까지 높은 지온 전달이 되어 나타나는 것으로 판단된다.의 안정된 방사성표지효율을 보였다. $^{99m}Tc$-transferrin을 이용한 감염영상을 성공적으로 얻을 수 있었으며, $^{67}Ga$-citrate 영상과 비교하여 더 빠른 시간 안에 우수한 영상을 얻을 수 있었다. 그러므로 $^{99m}Tc$-transierrin이 감염 병소의 영상진단에 사용될 수 있을 것으로 기대된다.리를 정량화 하였다. 특히 선

  • PDF

Medical Information Dynamic Access System in Smart Mobile Environments (스마트 모바일 환경에서 의료정보 동적접근 시스템)

  • Jeong, Chang Won;Kim, Woo Hong;Yoon, Kwon Ha;Joo, Su Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the environment of a hospital information system is a trend to combine various SMART technologies. Accordingly, various smart devices, such as a smart phone, Tablet PC is utilized in the medical information system. Also, these environments consist of various applications executing on heterogeneous sensors, devices, systems and networks. In these hospital information system environment, applying a security service by traditional access control method cause a problems. Most of the existing security system uses the access control list structure. It is only permitted access defined by an access control matrix such as client name, service object method name. The major problem with the static approach cannot quickly adapt to changed situations. Hence, we needs to new security mechanisms which provides more flexible and can be easily adapted to various environments with very different security requirements. In addition, for addressing the changing of service medical treatment of the patient, the researching is needed. In this paper, we suggest a dynamic approach to medical information systems in smart mobile environments. We focus on how to access medical information systems according to dynamic access control methods based on the existence of the hospital's information system environments. The physical environments consist of a mobile x-ray imaging devices, dedicated mobile/general smart devices, PACS, EMR server and authorization server. The software environment was developed based on the .Net Framework for synchronization and monitoring services based on mobile X-ray imaging equipment Windows7 OS. And dedicated a smart device application, we implemented a dynamic access services through JSP and Java SDK is based on the Android OS. PACS and mobile X-ray image devices in hospital, medical information between the dedicated smart devices are based on the DICOM medical image standard information. In addition, EMR information is based on H7. In order to providing dynamic access control service, we classify the context of the patients according to conditions of bio-information such as oxygen saturation, heart rate, BP and body temperature etc. It shows event trace diagrams which divided into two parts like general situation, emergency situation. And, we designed the dynamic approach of the medical care information by authentication method. The authentication Information are contained ID/PWD, the roles, position and working hours, emergency certification codes for emergency patients. General situations of dynamic access control method may have access to medical information by the value of the authentication information. In the case of an emergency, was to have access to medical information by an emergency code, without the authentication information. And, we constructed the medical information integration database scheme that is consist medical information, patient, medical staff and medical image information according to medical information standards.y Finally, we show the usefulness of the dynamic access application service based on the smart devices for execution results of the proposed system according to patient contexts such as general and emergency situation. Especially, the proposed systems are providing effective medical information services with smart devices in emergency situation by dynamic access control methods. As results, we expect the proposed systems to be useful for u-hospital information systems and services.

An exploratory study on Social Network Services in the context of Web 2.0 period (웹 2.0 시대의 SNS(Social Network Service)에 관한 고찰)

  • Lee, Seok-Yong;Jung, Lee-Sang
    • Management & Information Systems Review
    • /
    • v.29 no.4
    • /
    • pp.143-167
    • /
    • 2010
  • Diverse research topics relating to Social Network Services (SNS) such as, social affective factors in relationships among internet users, social capital value of SNS, comparing attributes why users are intending to participate in SNS, user's lifestyle and their preferences, and the exploratory seeking potential of SNS as a social capital need to be focused on. However, these researches that have been undertaken only consider facts at a particular period of the changing computing environment. In accordance with this indispensability, the integrated view on what technical, social and business characteristics and attributes need to be acknowledged. The purpose of this study is to analyze the evolving attributes and characteristics of SNS from Web 1.0 to Mobile web 2.0 through the Web 2.0 and Mobile 1.0 period. Based on the relevant literature, the attributes that drive the changing technological, social and business aspects of SNS have been developed and analyzed. This exploratory study analyzed major attributes and relationships between SNS and users by changing the paradigms which represented each period. It classified and chronicled each period by representing paradigms and deducted the attributes by considering three aspects such as technological, social and business administration. The major findings of this study are, firstly, the web based computing environment has been changed into the platform attribute for users in the aspect of technology. Users can only read, listen and view information through the web site in the early stages, but now it is possible that users can create, modify and distribute all kinds of information. Secondly, the few knowledge producers of web services have been changed into a collective intelligence by groups of people in the aspect of society. Information authority has been distributed and there is no limit to its spread. Many businesses recognized the potential of the SNS and they are considering how to utilize these advantages toward channel of promotion and marketing. Thirdly, the conventional marketing channel has been changed into oral transmission by using SNS. The market of innovative mobile technology such as smart phones, which provide convenience and access-ability toward customers, has been enlarged. New opportunities to build friendly relationship between business and customers as a new marketing chance have been created. Finally, the role of the consumer has been changed into the leading role of a prosumer. Users can create, modify and distribute information, and are performing the dual role of customer and producer.

  • PDF