• Title/Summary/Keyword: 코드상관

Search Result 302, Processing Time 0.026 seconds

Language Model Evaluation Based on Korean-English Empathetic Dialogue Datasets and Personality (한국어-영어 공감대화 데이터셋과 성격을 기반으로 한 언어모델 평가)

  • Young-Jun Lee;JongHwan Hyeon;DoKyong Lee;Joo-Won Sung;Ho-Jin Choi
    • Annual Conference on Human and Language Technology
    • /
    • 2023.10a
    • /
    • pp.312-318
    • /
    • 2023
  • 본 연구는 다양한 대규모 언어 모델들의 한국어/영어 공감 대화 생성에서 성능을 실험적으로 비교 분석하는 것과 개인의 성향과 공감 사이에서의 상관 관계를 실험적으로 분석하는 것을 목표로 한다. 이를 위해, 한국어 공감 대화 데이터셋인 KorEmpatheticDialogues 를 구축하였고, personality-aware prompting 방법을 제안한다. 실험을 통해, 총 18개의 언어 모델들 간의 공감 대화 생성 성능을 비교 분석하였고, 개인의 성향에 맞춤형 제공하는 공감이 더 상호작용을 이끌어낼 수 있다는 점을 보여준다. 코드와 데이터셋은 게재가 허용되면 공개할 예정이다.

  • PDF

Design and Implementation of an Intrusion Detection System based on Outflow Traffic Analysis (유출트래픽 분석기반의 침입탐지시스템 설계 및 구현)

  • Shin, Dong-Jin;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.131-141
    • /
    • 2009
  • An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are growing quickly. This paper proposes an intrusion detection system based outflow traffic analysis. Many research efforts and commercial products have focused on preventing intrusion by filtering known exploits or unknown ones exploiting known vulnerabilities. Complementary to these solutions, the proposed IDS can detect intrusion of unknown new mal ware before their signatures are widely distributed. The proposed IDS is consists of a outflow detector, user monitor, process monitor and network monitor. To infer user intent, the proposed IDS correlates outbound connections with user-driven input at the process level under the assumption that user intent is implied by user-driven input. As a complement to existing prevention system, proposed IDS decreases the danger of information leak and protects computers and networks from more severe damage.

Real-time Abnormal Behavior Detection System based on Fast Data (패스트 데이터 기반 실시간 비정상 행위 탐지 시스템)

  • Lee, Myungcheol;Moon, Daesung;Kim, Ikkyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1027-1041
    • /
    • 2015
  • Recently, there are rapidly increasing cases of APT (Advanced Persistent Threat) attacks such as Verizon(2010), Nonghyup(2011), SK Communications(2011), and 3.20 Cyber Terror(2013), which cause leak of confidential information and tremendous damage to valuable assets without being noticed. Several anomaly detection technologies were studied to defend the APT attacks, mostly focusing on detection of obvious anomalies based on known malicious codes' signature. However, they are limited in detecting APT attacks and suffering from high false-negative detection accuracy because APT attacks consistently use zero-day vulnerabilities and have long latent period. Detecting APT attacks requires long-term analysis of data from a diverse set of sources collected over the long time, real-time analysis of the ingested data, and correlation analysis of individual attacks. However, traditional security systems lack sophisticated analytic capabilities, compute power, and agility. In this paper, we propose a Fast Data based real-time abnormal behavior detection system to overcome the traditional systems' real-time processing and analysis limitation.

Performance Analysis of the Parallel CUPID Code for Various Parallel Programming Models in Symmetric Multi-Processing System (Symmetric Multi-Processing 시스템에서 다양한 병렬 기법 모델을 적용한 병렬 CUPID 코드의 성능분석)

  • Jeon, Byoung Jin;Lee, Jae Ryong;Yoon, Han Young;Choi, Hyoung Gwon
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.38 no.1
    • /
    • pp.71-79
    • /
    • 2014
  • A parallelization of the bi-conjugate gradient solver for the pressure equation of the CUPID (component unstructured program for interfacial dynamics) code, which was developed for analyzing the components of a pressurized water-cooled reactor, was studied in a symmetric multi-processing system. The parallel performance was investigated for three typical parallel programming models (MPI, OpenMP, Hybrid) by solving incompressible backward-facing step flow at various grid resolutions. It was confirmed that parallel performance was low when problem size was small or the memory requirement for each thread was considerably higher than the cache memory. Furthermore, it was shown that MPI was better than OpenMP regardless of the problem size, and Hybrid was the best when the number of threads was relatively small.

Effect of Regional Navigation Signals upon an Interference Cancellation Capable GNSS Receiver Performance (지역항법 신호에 의한 위성항법수신기 간섭상쇄 성능영향)

  • Lee, Jang-Yong;Jang, Jae-Gyu;Ahn, Woo-Guen;Seo, Seung-Woo;Lee, Sang-Jeong
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.3
    • /
    • pp.258-263
    • /
    • 2017
  • This paper analyzed GNSS signal acquisition performance of a regional navigation receiver when an interference cancellation capability is applied. Intereference between the regional navigation and GNSS signal can be mitigated by the interference cancellation technique such as the successive interference cancellation (SIC) algorithm. However signal acquisition performance will be degraded when jamming-to-signal ratio (J/S) is large due to a cross-correlation properties of residual signals. In this paper we analyzed signal acquisition performance degradation due to the interference between the Kasami and GNSS Gold code signal. Monte Carlo simulation is used for the analysis and compared results with those of GNSS Gold code only condition.

A Study of Middle School Students' Perception regarding Territorial Identity: Assessing their Freehand Sketch Maps of Territory, National Border, and Neighboring Countries (중학생의 영토정체성에 관한 연구 -스케치맵에 나타난 영토, 국경, 이웃한 나라에 대한 인식을 바탕으로-)

  • Chun, Bo Ae
    • Journal of the Korean Geographical Society
    • /
    • v.47 no.6
    • /
    • pp.899-920
    • /
    • 2012
  • The purpose of this study is to examine and better understand student's perception of territory in the deterritorialized world. Students' sketch maps were analyzed to investigate the way of which they recognized the form of national territory, border, geographic location, and neighboring countries. In addition, students' values, attitudes, and affection for their homeland and other countries were observed through the awareness of North Korea, DMZ, and Dok-do island. Scrutinizing students' sketch maps and follow-up interviews provided much more in-depth context for understanding students' narratives about territorial identity than did the analysis of structured surveys since they can freely draw and sketch their cognition. A qualitative data analysis builded a code list with 67 codes generated from 626 quotations. These data were exported to CSV format to elicit and evaluate differential variances of territorial identity along with student's Social Studies score and Grade Point Average for inferential statistics and quantitative data analysis using SPSS. Based on the results of data analysis and discussion, some suggestions to build a model of territorial education and to develop teaching and learning materials in the domain of geography education were provided.

  • PDF

An Experimental Study on the Temperature Difference between the Top and Bottom Flange in Steel Girder without Concrete Slab (콘크리트 슬래브가 없는 강재주형에서 상하연 온도차에 대한 실측연구)

  • Shin, Dong-Wook;Kim, Kyoung-Nam;Jung, Kyoung-Sup;Lee, Seong-Haeng
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.18 no.4
    • /
    • pp.99-106
    • /
    • 2014
  • In order to study the reasonable design thermal loads, the steel box girder bridge specimen which have no concrete slab was manufactured with the real size dimension. The temperature data were measured for 5 month at the 18 thermo gauges which were attached according to height. The temperature differences between the top and bottom flange in steel box girder specimen were calculated and the temperature gradient models were proposed by the probabilistic method. This proposed model showed a correlation of approximately 97% when compared with the similar model of Euro Code. Thus, the temperature gradient models which were suggested in this study may be used as the basis data in calculating the design load temperature.

Prediction of Lift Performance of Automotive Glass Using Finite Element Analysis (유한요소해석을 통한 자동차용 글라스의 승강성능 예측)

  • Moon, Hyung-Il;Kim, Heon-Young;Choi, Cheon;Lee, In-Heok;Kim, Do-Hyung
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.34 no.11
    • /
    • pp.1749-1755
    • /
    • 2010
  • The performance of power window system was decided by driving characteristics of the window regulator part and reaction by the glass run. The performance of power window system usually has been predicted by experimental methods. In this paper, an analytical method using the explicit code was suggested to overcome the limit of the experimental methods. The friction coefficient of glass run was obtained by the friction test at various conditions and the Mooney-Rivlin model was used. Also, a mechanism of window regulator consisted of the fast belt system and the slip ring elements. And, we conducted the analysis considering characteristic of a motor and obtained the lifting speed of automotive glass with high reliability

A Formal Specification of Reusable Framework of Embedded System (임베디드 시스템의 재사용 프레임워크에 대한 정형명세)

  • Cho, Eun-Sook;Kim, Chul-Jin;Song, Chee-Yang
    • The KIPS Transactions:PartD
    • /
    • v.17D no.6
    • /
    • pp.431-442
    • /
    • 2010
  • Because embedded system is combined system of hardware and software, we should design by considering elements such as real-time, reactive, small size, low weight, safe, reliable, harsh environment, low cost, and so on. However, those are poorly reflected on current embedded system development. Especially, there is few existed framework-based embedded system development. As a result, there are many internal codes which is not related with system operation in currently developed embedded system, and reusability or variability is not considered into embedded system development. Therefore we propose a formal specification technique using Z language to guarantee completeness or consistency of design of reusability framework proposed for improving reusability of embedded system. Also we assure correctness of framework design by checking Z model through Z-Eves Tool.

Criticality Safety Analysis of Spent Fuel Storage Facility for Bo-Ri Unit 1 (핵연료 저장시설의 임계 안전성 분석)

  • Dong Ha Kim;Un Chul Lee
    • Nuclear Engineering and Technology
    • /
    • v.14 no.2
    • /
    • pp.86-91
    • /
    • 1982
  • In 1977, spent fuel storage capacity of Ko-Ri Unit 1 was raised to contain 4-2/3 core, by reducing the center-to-center spacing between fuel assemblies from 53.34cm to 36cm. In this paper the adequacy is discussed in detail by examining the previous design analysis report. According to the analytic method presented by Core Performance Branch, study on credible abnormal moderator density condition is performed by using KENO-IV for the redesigned spent fuel storage facility. Result shows that 36cm for the center-to-center spacing between fuel assemblies is not enough to keep the storage safe at water density of 0.1143g/㎤, which gives the maximum $K_{eff}$ 0.9958$\pm$0.0048, which exceeds the CPB regulation limit 0.98. From sensitivity study regarding to the center-to-center spacing, it should be maintained to space greater than 43cm in order to meet the CPB requirements.s.

  • PDF