• Title/Summary/Keyword: 폐쇄동작

Search Result 35, Processing Time 0.02 seconds

Design of a Question-Answering System based on RAG Model for Domestic Companies

  • Gwang-Wu Yi;Soo Kyun Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.7
    • /
    • pp.81-88
    • /
    • 2024
  • Despite the rapid growth of the generative AI market and significant interest from domestic companies and institutions, concerns about the provision of inaccurate information and potential information leaks have emerged as major factors hindering the adoption of generative AI. To address these issues, this paper designs and implements a question-answering system based on the Retrieval-Augmented Generation (RAG) architecture. The proposed method constructs a knowledge database using Korean sentence embeddings and retrieves information relevant to queries through optimized searches, which is then provided to the generative language model. Additionally, it allows users to directly manage the knowledge database to efficiently update changing business information, and it is designed to operate in a private network to reduce the risk of corporate confidential information leakage. This study aims to serve as a useful reference for domestic companies seeking to adopt and utilize generative AI.

Design and Implementation of Internal Network and VPN-based NVR System (내부망 및 VPN 기반 NVR 시스템 설계 및 구현)

  • Byeong-Seon Park;Hee-Kwon Lee;Dong-Hwan Hwang;Yong-Kab Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.1-6
    • /
    • 2024
  • In this paper, we designed and implemented the security network NVR system that can flexibly use the internal network and VPN network. In general, the NVR systems that only use internal networks cannot be access from the outside, which has the disadvantage of unnecessary inspections and inability to access from the outside. External access has made possible using the VPN security network, and a NVR system software was designed and implemented so that the existing internal network could be used. We compared with the NVR system usage environment in the internal network through the client and the NVR system. It also has implemented usage environment with the VPN network through the mobile APP, and confirmed that the same NVR was operating normally with the same functions. We also studied on IP based NVR for flexible access with closed loop network based on VPN system.

Study on Improvement of Weil Pairing IBE for Secret Document Distribution (기밀문서유통을 위한 Weil Pairing IBE 개선 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.59-71
    • /
    • 2012
  • PKI-based public key scheme is outstanding in terms of authenticity and privacy. Nevertheless its application brings big burden due to the certificate/key management. It is difficult to apply it to limited computing devices in WSN because of its high encryption complexity. The Bilinear Pairing emerged from the original IBE to eliminate the certificate, is a future significant cryptosystem as based on the DDH(Decisional DH) algorithm which is significant in terms of computation and secure enough for authentication, as well as secure and faster. The practical EC Weil Pairing presents that its encryption algorithm is simple and it satisfies IND/NM security constraints against CCA. The Random Oracle Model based IBE PKG is appropriate to the structure of our target system with one secret file server in the operational perspective. Our work proposes modification of the Weil Pairing as proper to the closed network for secret file distribution[2]. First we proposed the improved one computing both encryption and message/user authentication as fast as O(DES) level, in which our scheme satisfies privacy, authenticity and integrity. Secondly as using the public key ID as effective as PKI, our improved IBE variant reduces the key exposure risk.

Spectral Properties of the Sound From the Mechanical Valve Employed in an Implantable Biventricular Assist Device (이식형 양심실 보조 장치에 사용된 기계식 판막의 음향 스펙트럼 특성)

  • 최민주;이서우;이혁수;민병구
    • Journal of Biomedical Engineering Research
    • /
    • v.22 no.5
    • /
    • pp.439-448
    • /
    • 2001
  • This paper considers the acoustical characteristics of the closing click sounds of the mechanical valves employed in an implantable biventricular assist device (BYAD) and their re1evance to the Physical states of the valved. Bj rk Shiley Convexo Concave tilting disk valve was chosen for the study and acoustic measurement was made for the BYAD operated in a mock circulatory system as well as implanted in an animal (sheep). In the BYAD operated in the mock circulatory system. three different states of the valve were examined, ie. normal. mechanically damaged. pseudo-thrombus attached. Microphone measurement for the BVAD implanted in the animal was carried out for five days at a regular time interval from one day after implantation. Characteristic spectrum of the sound from the valve was estimated using Multiple Signal Classification (MUSIC) in which the optimal order was determined according to Bayesian Information Criterion (BIC) . It was observed that the mechanical damage of the valve resulted in changes of the structure of the acoustic spectrum. In contrast. the thrombus formed on the valve did not change much the basic structure of the spectrum but brought about altering the spectral Peak frequencies and energies. Maximum spectral Peak (MSP) with the greatest energy was seen at 2 kHz for the normal valve and it was shifted to 3 kHz for the calve attaching the Pseudo-thrombus. Unlike the normal valve, strong spectral Peak appeared around 7 kHz in the sound from the valve mechanically damaged. In the case of the BYAD implanted in the animal. as the thrombus grew, acoustic energy was reduced relatively more in the low frequency components (〈 2 kHz) and the frequencies of the 1st, 2nd and 3rd MSP were increased little. The thrombus formation would result in reduction in both the variability of the 1st, 2nd and 3rd MSP and the value of the BIC optimal order.

  • PDF

A Study on Communication Safety and Evaluation Tool in Railway Communication System (열차제어시스템 통신 안정성 및 평가 도구 연구)

  • Kim, Sung-Un;Seo, Sang-Bo;Song, Seung-Mi;Jo, Chan-Hyo;Hwang, Jong-Gyu;Jo, Hyun-Jeong
    • Journal of the Korean Society for Railway
    • /
    • v.11 no.4
    • /
    • pp.349-356
    • /
    • 2008
  • Put Safety-critical systems related to the railway communications are currently undergoing changes. Mechanical and electro-mechanical devices are being replaced by programmable electronics that are often controlled remotely via communication networks. Therefore designers and operators now not only have to contend with component failures and user errors, but also with the possibility that malicious entities are seeking to disrupt the services provided by theirs systems. Recognizing the safety-critical nature of the types of communications required in rail control operations, the communications infrastructure will be required to meet a number of safety requirements such as system faults, user errors and the robustness in the presence of malicious attackers who are willing to take determined action to interfere in the correct operation of a system. This paper discusses the safety strategies employed in the railway communications and proposes a security mechanism for Korean railway communication system. We present the developed communication safety evaluation tool based on the proposed security mechanism and also evaluate its protecting capability against the threats of masquerading, eavesdropping, and unauthorized message manipulation.