• Title/Summary/Keyword: 특수문자

Search Result 92, Processing Time 0.028 seconds

A Study on the Rehabilitative Education in Prison Library (교도소도서관의 교화교육에 관한 연구)

  • Hong, Myung-Ja
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.37 no.4
    • /
    • pp.199-221
    • /
    • 2003
  • This study briefly analysed the situation of rehabilitative education in Korean prisons; examined the purposes of the prison and prison library, and the relationship between the prison library and rehabilitative education; and explained the literacy, open teaming, self-directed study and higher education provided by the prison library.

NIBI Line Code for High-Speed Interconnection (고속 interconnection을 위한 NIBI 선로 부호)

  • Koh, Jae-Chan;Lee, Bhum-Cheol;Kim, Bong-Soo;Choi, Eun-Chang
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.8
    • /
    • pp.1-10
    • /
    • 2001
  • This paper describes new line code algorithm, called NIDI(Nibble Inversion mock Inversion) which is well suited for interconnection and transmission technology, The proposed line code which includes only one redundancy bit serves primary features of line code and synchronization patterns for byte or frame synchronization in interconnection, Also, this line code provides in-band signals and speciaI characters.

  • PDF

A study on producing cartoon contents for culture and art education for disabled children: Focusing on mild mentally retarded children on stage of pre-operational period (장애아 문화예술교육을 위한 만화콘텐츠 제작에 관한 연구: 전조작기 단계의 경도 정신지체 아동을 중심으로)

  • Lee, Kkot-Song-Yi;Kim, Jae-Woong
    • Cartoon and Animation Studies
    • /
    • s.20
    • /
    • pp.141-157
    • /
    • 2010
  • Though the education of culture and art for disabled children is very important, it has not been brisk yet until recently due to 'absence of the teaching methods suitable for disability types, levels and programs.'. In this situation, cartoon contents can be used as the most appropriate tools for culture and art education for mentally retarded children. Entertainment functions and genre features of cartoon contents can motivate the applicable children to participate more voluntarily and positively and function as teaching tools for interesting activities. Of course, since it is not proper to apply the cartoon contents for normal children to Special Education Field as they are, cartoon works should be made by understanding closely the characteristics and degrees of retardation of the applicable children and applying them to the composition of cartoons. However, for the contribution of this attempt to education field, it is thought that concrete guidelines for producing cartoon contents considering the concept of various types of disability, emotion, social behavioral traits, ability of cognition, school achievements, and the characteristics of language and physical health should be necessary, and to improve the application of the developed cartoon contents so that they will not remain as superficial results, sufficient communication with the applicable children such as application to classes in the process of development is necessary.

  • PDF

A Study on IP Camera Security Issues and Mitigation Strategies (IP 카메라 보안의 문제점 분석 및 보완 방안 연구)

  • Seungjin Shin;Jungheum Park;Sangjin Lee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.111-118
    • /
    • 2023
  • Cyber attacks are increasing worldwide, and attacks on personal privacy such as CCTV and IP camera hacking are also increasing. If you search for IP camera hacking methods in spaces such as YouTube, SNS, and the dark web, you can easily get data and hacking programs are also on sale. If you use an IP camera that has vulnerabilities used by hacking programs, you easily get hacked even if you change your password regularly or use a complex password including special characters, uppercase and lowercase letters, and numbers. Although news and media have raised concerns about the security of IP cameras and suggested measures to prevent damage, hacking incidents continue to occur. In order to prevent such hacking damage, it is necessary to identify the cause of the hacking incident and take concrete measures. First, we analyzed weak account settings and web server vulnerabilities of IP cameras, which are the causes of IP camera hacking, and suggested solutions. In addition, as a specific countermeasure against hacking, it is proposed to add a function to receive a notification when an IP camera is connected and a function to save the connection history. If there is such a function, the fact of damage can be recognized immediately, and important data can be left in arresting criminals. Therefore, in this paper, we propose a method to increase the safety from hacking by using the connection notification function and logging function of the IP camera.

Speech Recognition in the Pager System displaying Defined Sentences (문자출력 무선호출기를 위한 음성인식 시스템)

  • Park, Gyu-Bong;Park, Jeon-Gue;Suh, Sang-Weon;Hwang, Doo-Sung;Kim, Hyun-Bin;Han, Mun-Sung
    • Annual Conference on Human and Language Technology
    • /
    • 1996.10a
    • /
    • pp.158-162
    • /
    • 1996
  • 본 논문에서는 문자출력이 가능한 무선호출기에 음성인식 기술을 접목한, 특성화된 한 음성인식 시스템에 대하여 설명하고자 한다. 시스템 동작 과정은, 일단 호출자가 음성인식 서버와 접속하게 되면 서버는 호출자의 자연스런 입력음성을 인식, 그 결과를 문장 형태로 피호출자의 호출기 단말기에 출력시키는 방식으로 되어 있다. 본 시스템에서는 통계적 음성인식 기법을 도입하여, 각 단어를 연속 HMM으로 모델링하였다. 가우시안 혼합 확률밀도함수를 사용하는 각 모델은 전통적인 HMM 학습법들 중의 하나인 Baum-Welch 알고리듬에 의해 학습되고 인식시에는 이들에 비터비 빔 탐색을 적용하여 최선의 결과를 얻도록 한다. MFCC와 파워를 혼용한 26 차원 특징벡터를 각 프레임으로부터 추출하여, 최종적으로, 83 개의 도메인 어휘들 및 무음과 같은 특수어휘들에 대한 모델링을 완성하게 된다. 여기에 구문론적 기능과 의미론적 기능을 함께 수행하는 FSN을 결합시켜 자연발화음성에 대한 연속음성인식 시스템을 구성한다. 본문에서는 이상의 사항들 외에도 음성 데이터베이스, 레이블링 등과 갈이 시스템 성능과 직결되는 시스템의 외적 요소들에 대해 고찰하고, 시스템에 구현되어 있는 다양한 특성들에 대해 밝히며, 실험 결과 및 앞으로의 개선 방향 등에 대해 논의하기로 한다.

  • PDF

Accepting Method in Classical Literature and Education ; Past, Present, and Future (고전문학의 향유방식과 교육; 과거, 현재, 미래)

  • Son, Tae-do
    • Journal of Korean Classical Literature and Education
    • /
    • no.37
    • /
    • pp.5-45
    • /
    • 2018
  • Today, in the case of literary works such as modern poetry, novels, 'literature production : literature acceptance' are relatively simple as 'writing : reading'. However, in classical literature, there are ways of 'singing, chanting, narrating, performing, public reading, writing : listening, reading.' Modern literary works such as poetry and novels are sole arts made up only of literature, but classical literature have many complex arts accompanied by music, theater, etc. In order to understand the way classical literature, it is necessary to consider music, theater, etc. also. There are a number of subjects to research today in relation to the accepting method of classical literature. There are such things at Hyang-ga (향가), Goryeo Sog-yo (고려속요), Sijo (시조) and Gasa (가사) in of classical poetry. There is a public reading in classical novels. There is securing video materialㄴ for narrators in oral literature. And there are Si-chang (시창. 詩唱) and aloud reading in chinese proses. 'Listening literature', such as the oral literature needs to have the A. Lord's 'formular theory' - 'formular' (general words), 'themes' (general subject), and 'improvisation.' It is the opposite of contemporary poetry and novels that value ' special words', 'special contents', and 'original text.' Classical literature with a great deal of 'listening literature' besides ' reading literature' needs to have this 'formular theory' too basically. In the case of 'excessive pornographic' oriented events in Goryeo Gayo (고려가요) and Pansori (판소리), a vision is required to set up a space for the realization of literature. The haman basic elements like a man and woman's body subject can be evoked as a literature means at open place for anonymous people. Unlike modern poetry and novels, which are 'reading literature', and contain only literature, classical literature have 'listening literature' besides 'reading literature', and have complex arts - classical poetry (literature and music), and oral literature (literature, music, theater etc.) These aspects are available to research modern mass media literature, which are all 'listening literature,' and all complex arts - pop songs (literature and music), movies (literature, drama, image, music etc.) and TV dramas (literature, drama, image, music etc.). Thus, a proper understanding and consideration of the accepting method is very important in understanding, researching and educating classical literature.

Implementation of Hangul to $T_EX$ conversion software (아래아 한글 파일의 텍 파일로의 변환 소프트웨어 구현)

  • Kim, Sung-Won;Lee, Han-Na;Park, Sang-Hoon;Oh, Chang-Hyuck
    • Journal of the Korean Data and Information Science Society
    • /
    • v.21 no.1
    • /
    • pp.99-107
    • /
    • 2010
  • This research is for implementation of a software that can convert Hangul format file to $T_EX$ format file. Hangul is a word processor that has widely been used in Korea. It is known that Hangul is relatively easy of typing in equations and tables in preparing a paper draft. $T_EX$ has been developed as a computer programming language for preparing and publishing documents. Documents are first typed in with a plain text editor with $T_EX$ commands and then is compiled and linked. The software implemented in this research converts Hangul format files which are written under the specific format of a journal to $T_EX$ format file with the given style specific file. It converts special symbols, texts, tables, equations, and paragraph formats. We have used Hangul format of Journal of the Korean Data & Information Science Society (JKDISS) and the style file of $T_EX$ for the beta-test for the software.

Passwordless Protection for Private Key Using USIM Information (USIM 정보를 활용한 패스워드리스 방식의 개인키 보호 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.32-38
    • /
    • 2017
  • Despite the opinion that certificate is useless, half of the population in Korea (approx. 35 million) get an certificate, and use it for internet banking, internet shopping, stock trading, and so on. Most users store their certificates on a usb memory or smartphone, and certificates or passwords stored on such storage media can be easily attacked and used to disguise as legitimate users. Due to these security problem of certificate, a various authentication technologies has been proposed such as smartphone owner authentication using SMS, and a personal authentication using biometric authentication. However, a safe technique is not presented yet without user password, and certificate. In this paper, I proposed a method to secure certificate/private key without a user password using a combination of USIM card and smartphone's information. Even if a hacker gets the user password, the certificate, and the private key, he can not use the certificate. User do not need to remember complex password which is a combination of alphabetic / numeric / special characters, and use his certificate safely.

Abusive Detection Using Bidirectional Long Short-Term Memory Networks (양방향 장단기 메모리 신경망을 이용한 욕설 검출)

  • Na, In-Seop;Lee, Sin-Woo;Lee, Jae-Hak;Koh, Jin-Gwang
    • The Journal of Bigdata
    • /
    • v.4 no.2
    • /
    • pp.35-45
    • /
    • 2019
  • Recently, the damage with social cost of malicious comments is increasing. In addition to the news of talent committing suicide through the effects of malicious comments. The damage to malicious comments including abusive language and slang is increasing and spreading in various type and forms throughout society. In this paper, we propose a technique for detecting abusive language using a bi-directional long short-term memory neural network model. We collected comments on the web through the web crawler and processed the stopwords on unused words such as English Alphabet or special characters. For the stopwords processed comments, the bidirectional long short-term memory neural network model considering the front word and back word of sentences was used to determine and detect abusive language. In order to use the bi-directional long short-term memory neural network, the detected comments were subjected to morphological analysis and vectorization, and each word was labeled with abusive language. Experimental results showed a performance of 88.79% for a total of 9,288 comments screened and collected.

  • PDF

Convenient User Authentication Mechanism Using only User Identification (사용자 ID만을 활용한 간편한 사용자 인증 방안)

  • Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.11
    • /
    • pp.501-508
    • /
    • 2015
  • Most web sites, information systems use the ID/Password technique to identify and authenticate users. But ID/Password technique is vulnerable to security. The user must remember the ID/Password and, the password should include alphabets, numbers, and special characters, not to be predicted easily. User also needs to change your password periodically. In this paper, we propose the user authentication method that the user authentication information stored in the external storage to authenticate a user. If another person knows the ID/Password, he can't log in a system without the external storage. Whenever a user logs in a system, authentication information is generated, and is stored in the external storage. Therefore, the proposed user authentication method is the traditional ID/Password security technique, but it enhances security and, increases user convenience.