• Title/Summary/Keyword: 정보검색능력

Search Result 313, Processing Time 0.026 seconds

IP router-based W-PAN (Wireless Personal Area Network) Authentication Control Technology (IP 공유기 기반 W-PAN(Wireless Personal Area Network) 인증 제어기술 개발)

  • Choi, Jung-In;Lee, Sun-Sook;Lee, Ha-Kyung;Lee, Jun-Hyeong;Jeong, Jung-Su;Young, Hwan-Seung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.07a
    • /
    • pp.311-313
    • /
    • 2013
  • 본 논문에서는 W-PAN 환경에서 IP공유기를 표준설계하고 구현하며 효율적인 실시간 사용자 웹기반 인증 기법을 연구하였다. 또한 W-PAN Device & Service Application 인증과 접근, 권한제어를 위한 인증 Client 모듈과 Server 모듈, Supplicant를 개발하고 제안하였다. 이를 통해 IP 공유기 기반 환경에서의 W-PAN 환경에서 인증 제어 솔루션에 대한 개발로 생산되는 단말기의 서비스 품질을 향상시키고 무선 접속 기술을 표준화 할 수 있다. 또한 유해한 트래픽을 검색하고 보호하는 안정적인 시스템 관리가 가능해졌다. W-PAN Device와 Service Application 인증, 접근 및 권한 제어를 위한 인증 시스템의 플랫폼 구축으로 향후 관련 기술의 통합과 융합 기술을 적용할 수 있는 능력을 확보하였다.

  • PDF

Design of agent intrusion detection system applying data mining (데이터 마이닝을 적용한 에이전트 침입 탐지 시스템 설계)

  • Jeong Jong Kun;Lee Sung Tae;Kim Yong Ho;Lee Yun Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.676-679
    • /
    • 2001
  • As network security is coning up with significant problem after the major Internet sites were hacked nowadays, IDS(Intrusion Detection System) is considered as a next generation security solution for more reliable network and system security rather than firewall. In this paper, we propose the new IDS model which tan detect intrusion in different systems as well as which ran make real-time detection of intrusion in the expanded distributed environment in host level of drawback of existing IDS. We implement its prototype and verify its validity. We use pattern extraction agent so that we can extract automatically audit file needed in distributed intrusion detection even in other platforms.

  • PDF

Case Study of Building Special-Purpose Simple Browser (단순 웹브라우저의 설계와 구현 사례)

  • 우원택
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.06a
    • /
    • pp.136-147
    • /
    • 2002
  • The purpose of this study is to understand what we need to know about Microsoft's powerful web browser control so that we will be able to code and create a special-purpose browser. For this purpose, first of all, some literature survey was undertaken to study how the web browser looks like and is operated. One case design and coding was devoted to using visual basic to create our own web browser. The primary task of this job was accomplished with the form making up of a bunch of image controls, a status bar on the button, a picture box to contain the image buttons, the combo box, the command button and the menus and the statements shown in the above exhibits and tables respectively. After putting it all together, the form was implemented to see if it would work properly. The program was also enhanced to have a special purpose functions permitting filtering functions. The result was more or less successful, however has some limitations such as the simplicity of the programming structures and functions. However, this study is useful for understanding general outline of special-purpose web browser development.

  • PDF

A Study on Model of Web Based Reading Strategy (웹 기반 독서전략 모형 연구)

  • Choi, Young-Im
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.25 no.2
    • /
    • pp.41-57
    • /
    • 2014
  • The objectives of this study is to propose the direction of developing the reading activities of the individuals in the future society, and to develop the "model of Web-based reading strategy", based on the understanding of the information literacy reading strategies, and the characteristic and concept of web 3.0., for adapting to the changes in the media environment. In this study, 6 reading strategy models based on the web platform were developed. These 6 strategy models are Metacognitive Strategy, Information Retrieval Model, Personalization Strategy, Reading Strategy, Writing Strategy and Interpreting Strategy.

A Study on Caching Methods in Client-Server Systems for Mobile GIS (모바일 GIS를 위한 클라이언트-서버 시스템에서 캐슁기법 연구)

  • 김진덕;김미란;최진오
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.201-204
    • /
    • 2002
  • Although the reuse of the cached data for scrolling the map reduces the amount of passed data between client and server, it needs the conversions of data coordinates, selective deletion of objects and cache compaction at client. The conversion is time intensive operation due to limited resources of mobile phones such as low computing power, small memory. Therefore, for the efficient map control in the vector map service based mobile phone, it is necessary to study the method for reducing wireless network bandwidth and for overwhelming the limited resources of mobile phone as well. This paper proposes the methods for caching pre-received spatial objects in client-server systems for mobile GIS. We also analyze the strengths and drawbacks between the reuse of cached data and transmission of raw data respectively.

  • PDF

Design of data mining IDS for transformed intrusion pattern (변형 침입 패턴을 위한 데이터 마이닝 침입 탐지 시스템 설계)

  • 김용호;정종근;이윤배;김판구;염순자
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.479-482
    • /
    • 2001
  • IDS has been studied mainly in the field of the detection decision and collecting of audit data. The detection decision should decide whether successive behaviors are intrusions or not, the collecting of audit data needs ability that collects precisely data for intrusion decision. Artificial methods such as rule based system and neural network are recently introduced in order to solve this problem. However, these methods have simple host structures and defects that can't detect transformed intrusion patterns. So, we propose the method using data mining that can retrieve and estimate the patterns and retrieval of user's behavior in the distributed different hosts.

  • PDF

Design of Intrusion Detection System applying for data mining agent (데이터 마이닝 에이전트를 적용한 침입 탐지 시스템 설계)

  • 정종근;구제영;김용호;오근탁;이윤배
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.619-622
    • /
    • 2002
  • IDS has been studied mainly in the field of the detection derision and collecting of audit data. The detection decision should decide whether successive behaviors are intrusions or not , the collecting of audit data needs ability that collects precisely data for intrusion decision. Artificial methods such as rule based system and neural network are recently introduced in order to solve this problem. However, these methods have simple host structures and defects that can't detect transformed intrusion patterns. So, we propose the method using data mining agent that can retrieve and estimate the patterns and retrieval of user's behavior in the distributed different hosts.

  • PDF

A Study on the Development of an Educational APP using Image Recognition Technology (이미지 인식 기술을 이용한 교육용 APP의 개발과 활용에 관한 연구)

  • Kim, Jong-Min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.473-475
    • /
    • 2022
  • In this paper, as children's smartphone penetration and usage time increase, the need for educational application development is increasing.Therefore, in this paper, we propose an idea for the development of an application service that is optimized for children and designed to be easily used by children by applying image recognition technology. Using image recognition technology, we propose a service that helps children easily take pictures of objects with their smartphone's camera and easily identify appropriate search results for them. Through this, even in an environment where it is difficult to receive direct guidance from a teacher due to online classes, children can easily study on their own initiative or find a subject they want to learn more about and learn.

  • PDF

국가전자도서관 DL 사례

  • 공봉석
    • Proceedings of the Korea Database Society Conference
    • /
    • 1998.09a
    • /
    • pp.293-312
    • /
    • 1998
  • $\square$ 정보화 혁명의 대국민 인식수단과 초고속정보통신망의 주요 응용 서비스로서 부각 $\square$ 전통적인 정보이용방법에 대한 이용자들의 인식의 변화로 도서관 활성화 방안으로써 정보통신기술의 도입 $\square$ 선진 각국의 전자도서관 구축의 국가적 추진 $\square$ 국내 초고속정보통신망의 구축과 보급 확대 $\square$ 모든 국민이 지역, 시간의 제약없이 도서관에 접근하여 필요한 자료를 획득 $\square$ 정보획득시간 단축으로 국내연구자들의 연구력 증진 $\square$ 정보화의 지역격차 해소 $\square$ 국내 도서관의 전자도서관 사업 촉진 $\square$ 주요 전자도서관의 통합연동체제를 마련 $\square$ 주요 도서관별 대상분야 조정으로 중복투자 방지 $\square$ 초고속정보통신망의 주요한 응용서비스로 가시화 - 초고속정보통신망의 선도적 대국민 가시화 - 이에 따른 민간부문의 참여 및 투자 촉진 $\square$ 국가, 산업, 국민생활 정보화의 주요한 기반 구축 $\square$ 지역적 정보불균형 해소 - 일부지역에 편중되어 있는 정보를 인터넷을 이용하여 시.공간 제약없이 제공함으로써 정보의 불균형 해소 $\square$ 전자도서관의 기본모델 제시 -전자도서관의 주요기능인 타기관간 자료연동 및 검색시스템을 구현함으로써 향후 구축되는 전자도서관의 기본모델 제시 $\square$ 전자도서관간 자료공유체제 구축 -시범사업 참여도서관간 분산 관리하고 있는 정보의 공유를 위한 표준체제 구축(중략) 것으로 나타났다.까지 증가율을 보여 주었다. 것으로 나타났다.대표하는 압밀계수의 추정이 가능할 것으로 사료된다. $O_3$/라는 결정학적 관계를 가지며 에피탁샬 성장했음을 알 수 있었다.있었다.다(p<0.05)..8800-0.6800로 각각 표시되었다.~$\pm$10 V의 측정범위에서 memory window가 계속 증가하는 것을 보여주었다./$^{\circ}C$의 고주파 유전특성을 얻었다. 얻었다.끼쳤다.보였다.다. 싸이클링 성능을 보였다.다.보였다.다.고 입력 반사손실을 그림 I, 2, 3에 각각 나타내었다. 대책을 요구하고 있다.하는 경향을 보였다. 생존율은 48시간째부터 폐사하기 시작하여 144시간째에는 전량폐사하였다. 삼투압 조절 능력을 위한 여러가지 파라메타에서 15 $\textperthousand$구는 이상이 없는 것으로 추측되나, 0 $\textperthousand$구에서는 코티졸, Na$^{+}$, K$^{+}$, Cl ̄, 총단백질 및 AST에서 시간경과에 따른 삼투압 조절 능력에 문제가 있는 것으로 보여진다.c}C$에서 5시간 가열조리 후 잔존율은 각각 84.7% 및 73.3%였고, 질소가스 통기하에서는 잔존율이 88.9% 및 81.8%로 더욱 안정하였다.8% 및 12.44%, 201일 이상의 경우 13.17% 및 11.30%로 201일 이상의 유기의 경우에만 대조구와 삭제 구간에 유의적인(p<0.05) 차이를 나타내었다.는 담수(淡水)에서 10%o의 해수(海水)로 이주된지 14일(日) 이후에 신장(腎臟)에서 수축된 것으로 나타났다. 30%o의 해수(海水)에 적응(適應)된 틸라피아의 평균 신사구체(腎絲球體)의 면적은 담수(淡水)에 적응된 개체의 면적보다 유의성

  • PDF

Nationwide Comprehensive GIS for Natural Environment using Spatial Data Integration Technique (공간데이타 통합 기능을 활용한 국가자연환경 종합 GIS구축)

  • Um, Jung-Sup;Kim, Yeun-Jung
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.4 no.1
    • /
    • pp.1-17
    • /
    • 2001
  • This research is primarily intended to develop a decision-making support system about the natural environment in the country by integrating various formats of spatial data into a comprehensive GIS database. The first part of the research is to design GIS database as a means of combining thematic cartographic data with field survey records. Ecosystem records acquired by a field sampling have been reproduced as digital thematic maps. The database also included various natural environment related data (map for forestry, soil, national park etc.) collected from many other agencies. The second part of the research is devoted to the design of efficient man-machine interfaces. A key concern in the GUI (graphic user interface) design process was to address the need to handle and to manage large databases by non-GIS experts. The system has been checked experimentally, enabled the users to quarry the data required simply and execute spatial analysis accommodating versatile alternatives in decision-making process. Detailed visual maps can be generated over large areas quickly and easily. The system will serve to increase the scientific and objective decision-making by overcoming serious constraints suffered from the past non-GIS-based approach. It is anticipated that this research output could be used as a valuable reference in building a nationwide natural environment GIS-DB (database) in the central and local governments.

  • PDF