• Title/Summary/Keyword: 프레임 분류

Search Result 549, Processing Time 0.029 seconds

An Innovative Framework to Classify Online Platforms (온라인 플랫폼의 분류 프레임워크 : 국내 플랫폼 사례연구를 중심으로)

  • Kang, Hyoung Goo;Kang, Chang-Mo;Jeon, Seong Min
    • The Journal of Information Systems
    • /
    • v.31 no.1
    • /
    • pp.59-90
    • /
    • 2022
  • Purpose This paper presents a new method of classifying online platforms. It also explains how to apply the framework using case studies and generate new insight about platform strategies and policy development. Design/methodology/approach This paper focuses on the relationship between platforms, especially the hierarchy and power relations, and broadly classifies platforms as follows: content/services, meta information, app stores, operating systems, and cloud. Both the content/service platform and the meta information platform have matching as their main function. However, most content/services tend to collect and access information through meta-information platforms, so meta-information platforms are closer to infrastructure than content/service platforms. App store, operating system, and cloud can be said to be platforms of platforms. A small number of companies in the US and China dominate platforms of platforms, and become the recent development and regulatory targets of their respective governments. Findings We should be wary of the attempts to regulate domestic platforms by importing foreign regulations that ignore the hierarchical structure that our framework highlights. We believe that Korea's strategy to become a true platform powerhouse is clear. As one of the few countries with significant companies in the area of meta information platforms, it will be necessary to fully utilize the position and advance into the strategically important area of platforms of platforms. Furthermore, it is necessary to encourage world-class companies to appear in Korea in the app store, operating system, and cloud. To do so, the government needs to introduce promotion policies to strategically nurture such platforms rather than to regulate them.

Development of a Cloud-Based Infrastructure Engineering Design Platform Prototype (클라우드 기반의 인프라 엔지니어링 설계 플랫폼 프로토타입 개발)

  • Cho, Myung-Hwan;Pyo, Kil Seop;Youn, Seung Wook;Jung, Nahm-Chung
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.42 no.4
    • /
    • pp.559-569
    • /
    • 2022
  • Infrastructure engineering is a field that supports construction (assembly) as a representative industry that creates high added value and jobs by combining science and technology with knowledge, though its importance is underestimated. According to a report from the Ministry of Land, Infrastructure and Transport (Korea), the value-added rate (65.3%) of the engineering industry and the employment inducement coefficient (14 employees per billion won) are three times higher than in manufacturing. In particular,the forward value chain (such as project management and basic design) accounts for less than 10~15% of the total project cost but determines the overall price and quality of the infrastructure facilities. In this study, a work break-down system, design support module and database development method for road design projects for design platform development is presented. Based on the presented development method, a cloud-based infrastructure design platform's prototype is developed. The developed infrastructure engineering platform is expected to provide a web-based design work environment without time/space restrictions and greatly contribute to winning overseas business orders and securing competitiveness.

Deep Learning-Based Automation Cyber Attack Convergence Trend Analysis Mechanism for Deep Learning-Based Security Vulnerability Analysis (사이버공격 융합 동향 분석을 위한 딥러닝 기반 보안 취약점 분석 자동화 메커니즘)

  • Kim, Jinsu;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.99-107
    • /
    • 2022
  • In the current technological society, where various technologies are converged into one and being transformed into new technologies, new cyber attacks are being made just as they keep pace with the changes in society. In particular, due to the convergence of various attacks into one, it is difficult to protect the system with only the existing security system. A lot of information is being generated to respond to such cyber attacks. However, recklessly generated vulnerability information can induce confusion by providing unnecessary information to administrators. Therefore, this paper proposes a mechanism to assist in the analysis of emerging cyberattack convergence technologies by providing differentiated vulnerability information to managers by learning documents using deep learning-based language learning models, extracting vulnerability information and classifying them according to the MITRE ATT&CK framework.

The Direction of the Korean Real Estate STO Market: Focused on MZ Generation (국내 부동산 STO 시장 발전 방향: MZ 세대를 중심으로)

  • Lee, Sangyeon;Son, Yerim;Yang, Hee-Dong
    • Knowledge Management Research
    • /
    • v.23 no.1
    • /
    • pp.27-46
    • /
    • 2022
  • The current era's focus is on the surge in real estate prices triggered by the global economic downturn. This study advocated STO-based dispersed investment for the MZ generation, who has less capital than earlier generations. Existing real estate investment methods were categorized into online, offline, and hybrid formats and the effectiveness of the suggested STO was given in this study through case analysis domestically and overseas. The entry of STO into the financial industry was positively proved, and the efficacy of blockchain technology was validated, through the investigation of the STO framework. The findings of this study are projected to revitalize the new real estate sector by actively supporting the access of the MZ generation into the current inflexible real estate investment market by the application of blockchain and reflecting MZ generation's investment propensity.

Trends in Cryptocurrency Custody Services and Evaluation Guidelines for DeFi Protocols' Custody Poten (가상자산 커스터디 서비스의 최신 동향 및 DeFi 프로토콜 커스터디 가능성 평가 가이드라인 제시)

  • Hyunggeun Lee;Moonho Joo;Jihun Lim;Beomjoong Kim;Kiseok Jeon;Junsik Sim;Junghee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.811-831
    • /
    • 2024
  • This paper has two main objectives. The primary objective is to conduct a comprehensive review of existing survey papers on the advantages, disadvantages, taxonomy, and technical vulnerabilities of cryptocurrency custody services. Additionally, we examined recent regulatory developments, the application of existing frameworks, conditions for performing custody services, and service providers' obligations. The secondary objective is to identify DeFi protocols in the regulatory 'grey area' and analyze their technical aspects and governance mechanisms. By synthesizing these findings, we propose guidelines for assessing DeFi decentralization and their potential for integration within the regulatory framework, providing insights for industry experts, regulators, and policymakers to balance industry needs with societal benefits.

A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain (사이버 킬체인 기반 사이버 지휘통제체계 방어 및 공격 모델 연구)

  • Lee, Jung-Sik;Cho, Sung-Young;Oh, Heang-Rok;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • Cyber Kill Chain is derived from Kill chain of traditional military terms. Kill chain means "a continuous and cyclical process from detection to destruction of military targets requiring destruction, or dividing it into several distinct actions." The kill chain has evolved the existing operational procedures to effectively deal with time-limited emergency targets that require immediate response due to changes in location and increased risk, such as nuclear weapons and missiles. It began with the military concept of incapacitating the attacker's intended purpose by preventing it from functioning at any one stage of the process of reaching it. Thus the basic concept of the cyber kill chain is that the attack performed by a cyber attacker consists of each stage, and the cyber attacker can achieve the attack goal only when each stage is successfully performed, and from a defense point of view, each stage is detailed. It is believed that if a response procedure is prepared and responded, the chain of attacks is broken, and the attack of the attacker can be neutralized or delayed. Also, from the point of view of an attack, if a specific response procedure is prepared at each stage, the chain of attacks can be successful and the target of the attack can be neutralized. The cyber command and control system is a system that is applied to both defense and attack, and should present defensive countermeasures and offensive countermeasures to neutralize the enemy's kill chain during defense, and each step-by-step procedure to neutralize the enemy when attacking. Therefore, thist paper proposed a cyber kill chain model from the perspective of defense and attack of the cyber command and control system, and also researched and presented the threat classification/analysis/prediction framework of the cyber command and control system from the defense aspect

The Style and Cultural Significance of Film Color White (영화색채 하양의 활용 양상과 문화적 의미)

  • Kim, Jong-Guk
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.4
    • /
    • pp.187-198
    • /
    • 2020
  • With the cultural background of whiteness I did examine the universal meaning of absolute good, the special of psychosis, and the fantastic of femininity and memory/record. As an example I analyzed the symbolic meaning of white used in Korean films. Unconditional goodness, white as a generality: White color in all the films of good-evil confrontation falls into this category. The most obvious and the simplest configuration are the black-white dichotomy. In Nameless Gangster: Rules of Time(2011), The Merciless(2016), Asura: The City of Madness(2016) and The Bad Guys: Reign of Chaos(2019), white is the absolute good but it is not limited to a fair key figure. Paradoxically, black is not given only to the side of absolute evil. White is used to be a flexible visual device that reflects the socio-political situation without changing the meaning of the general good. Psychosis and pills, white as a peculiarity: The visual function that emphasizes sado-masochism in the absolute good and the universal symbol of white extends to psychotic specificities such as hysteria. In all the films creating horror, white symbolizes the mentally disabled and the pill for healing. Femininity and haunted white: White of absolute good is expressed by the socio-cultural tendency of femininity and the black-white contrast of vision is applied to the gender difference. In general the women's sexuality is emphasized in color red, but white is arranged in the background. In TaeGukGi: Brotherhood Of War(2004), 71: Into The Fire(2010), My Way(2011), The Front Line(2011), Roaring Currents(2014), Northern Limit Line(2015), The Battle: Roar to Victory(2019) and Battle of Jangsari(2019), white given to female figures sticks to the traditional femininity such as motherhood, sacrifice and weakness. The concept of specters is applied to desires, memories/records, history, fantasy, virtual/reality and social media images. The film history capturing to list memories and moments brings up the specters of socio-political genealogy. Most of films aiming for socio-political change are its examples and white constituting Mise-en-scene records to remember a historical event in Peppermint Candy(2000), The Attorney(2013) and A Taxi Driver(2017).

Analysis of Metadata Standards of Record Management for Metadata Interoperability From the viewpoint of the Task model and 5W1H (메타데이터 상호운용성을 위한 기록관리 메타데이터 표준 분석 5W1H와 태스크 모델의 관점에서)

  • Baek, Jae-Eun;Sugimoto, Shigeo
    • The Korean Journal of Archival Studies
    • /
    • no.32
    • /
    • pp.127-176
    • /
    • 2012
  • Metadata is well recognized as one of the foundational factors in archiving and long-term preservation of digital resources. There are several metadata standards for records management, archives and preservation, e.g. ISAD(G), EAD, AGRkMs, PREMIS, and OAIS. Consideration is important in selecting appropriate metadata standards in order to design metadata schema that meet the requirements of a particular archival system. Interoperability of metadata with other systems should be considered in schema design. In our previous research, we have presented a feature analysis of metadata standards by identifying the primary resource lifecycle stages where each standard is applied. We have clarified that any single metadata standard cannot cover the whole records lifecycle for archiving and preservation. Through this feature analysis, we analyzed the features of metadata in the whole records lifecycle, and we clarified the relationships between the metadata standards and the stages of the lifecycle. In the previous study, more detailed analysis was left for future study. This paper proposes to analyze the metadata schemas from the viewpoint of tasks performed in the lifecycle. Metadata schemas are primarily defined to describe properties of a resource in accordance with the purposes of description, e.g. finding aids, records management, preservation and so forth. In other words, the metadata standards are resource- and purpose-centric, and the resource lifecycle is not explicitly reflected in the standards. There are no systematic methods for mapping between different metadata standards in accordance with the lifecycle. This paper proposes a method for mapping between metadata standards based on the tasks contained in the resource lifecycle. We first propose a Task Model to clarify tasks applied to resources in each stage of the lifecycle. This model is created as a task-centric model to identify features of metadata standards and to create mappings among elements of those standards. It is important to categorize the elements in order to limit the semantic scope of mapping among elements and decrease the number of combinations of elements for mapping. This paper proposes to use 5W1H (Who, What, Why, When, Where, How) model to categorize the elements. 5W1H categories are generally used for describing events, e.g. news articles. As performing a task on a resource causes an event and metadata elements are used in the event, we consider that the 5W1H categories are adequate to categorize the elements. By using these categories, we determine the features of every element of metadata standards which are AGLS, AGRkMS, PREMIS, EAD, OAIS and an attribute set extracted from DPC decision flow. Then, we perform the element mapping between the standards, and find the relationships between the standards. In this study, we defined a set of terms for each of 5W1H categories, which typically appear in the definition of an element, and used those terms to categorize the elements. For example, if the definition of an element includes the terms such as person and organization that mean a subject which contribute to create, modify a resource the element is categorized into the Who category. A single element can be categorized into one or more 5W1H categories. Thus, we categorized every element of the metadata standards using the 5W1H model, and then, we carried out mapping among the elements in each category. We conclude that the Task Model provides a new viewpoint for metadata schemas and is useful to help us understand the features of metadata standards for records management and archives. The 5W1H model, which is defined based on the Task Model, provides us a core set of categories to semantically classify metadata elements from the viewpoint of an event caused by a task.

Intelligent VOC Analyzing System Using Opinion Mining (오피니언 마이닝을 이용한 지능형 VOC 분석시스템)

  • Kim, Yoosin;Jeong, Seung Ryul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.113-125
    • /
    • 2013
  • Every company wants to know customer's requirement and makes an effort to meet them. Cause that, communication between customer and company became core competition of business and that important is increasing continuously. There are several strategies to find customer's needs, but VOC (Voice of customer) is one of most powerful communication tools and VOC gathering by several channels as telephone, post, e-mail, website and so on is so meaningful. So, almost company is gathering VOC and operating VOC system. VOC is important not only to business organization but also public organization such as government, education institute, and medical center that should drive up public service quality and customer satisfaction. Accordingly, they make a VOC gathering and analyzing System and then use for making a new product and service, and upgrade. In recent years, innovations in internet and ICT have made diverse channels such as SNS, mobile, website and call-center to collect VOC data. Although a lot of VOC data is collected through diverse channel, the proper utilization is still difficult. It is because the VOC data is made of very emotional contents by voice or text of informal style and the volume of the VOC data are so big. These unstructured big data make a difficult to store and analyze for use by human. So that, the organization need to automatic collecting, storing, classifying and analyzing system for unstructured big VOC data. This study propose an intelligent VOC analyzing system based on opinion mining to classify the unstructured VOC data automatically and determine the polarity as well as the type of VOC. And then, the basis of the VOC opinion analyzing system, called domain-oriented sentiment dictionary is created and corresponding stages are presented in detail. The experiment is conducted with 4,300 VOC data collected from a medical website to measure the effectiveness of the proposed system and utilized them to develop the sensitive data dictionary by determining the special sentiment vocabulary and their polarity value in a medical domain. Through the experiment, it comes out that positive terms such as "칭찬, 친절함, 감사, 무사히, 잘해, 감동, 미소" have high positive opinion value, and negative terms such as "퉁명, 뭡니까, 말하더군요, 무시하는" have strong negative opinion. These terms are in general use and the experiment result seems to be a high probability of opinion polarity. Furthermore, the accuracy of proposed VOC classification model has been compared and the highest classification accuracy of 77.8% is conformed at threshold with -0.50 of opinion classification of VOC. Through the proposed intelligent VOC analyzing system, the real time opinion classification and response priority of VOC can be predicted. Ultimately the positive effectiveness is expected to catch the customer complains at early stage and deal with it quickly with the lower number of staff to operate the VOC system. It can be made available human resource and time of customer service part. Above all, this study is new try to automatic analyzing the unstructured VOC data using opinion mining, and shows that the system could be used as variable to classify the positive or negative polarity of VOC opinion. It is expected to suggest practical framework of the VOC analysis to diverse use and the model can be used as real VOC analyzing system if it is implemented as system. Despite experiment results and expectation, this study has several limits. First of all, the sample data is only collected from a hospital web-site. It means that the sentimental dictionary made by sample data can be lean too much towards on that hospital and web-site. Therefore, next research has to take several channels such as call-center and SNS, and other domain like government, financial company, and education institute.

An experimental study on prednisolone-induced interstitial pneumonia caused by Pneumocystis carinii (프레드니솔론 투여에 의한 조폐포자충(Pneumocystis carinii)성 간질성 폐염에 대한 실험적 연구)

  • 신대환;이영하;나영은
    • Parasites, Hosts and Diseases
    • /
    • v.27 no.2
    • /
    • pp.101-108
    • /
    • 1989
  • This study was performed to observe the role of Pneumocystis carinii as an etiologic agent of interstitial pneumonia in immunocompromised hosts. Total 90 male Sprague-Dawley rats, approxi. mately 150-180 g, were used. Fifteen of them were used as control group and remaining 75 (5 groups) were as immunosuppression groups; group 1 received prednisolone (25 mg/kg twice weekly) only; group 2 Prednisolone and tetracycline (75 mk/kg/day) ; group 3 Prednisolone, tetracycline and trimethoprim-sulfamethoxasole (50~250 mg/kg/day) : group 4 prednisolone and trimethoprim-sulfamethoxasole; and group 5 prednisolone and griseofulvin (300 mg/kg/day) until death. The survival days of each group rat were calculated, and upon death their lungs were removed immediately and then stamp smears were prepared and stained by Giemsa or toluidine blue O. For histopathologic observation, lungs were fixed in 10% formalin, cut into sections and stained with Gomori's methenamine silvei, hematoxylin-rosin, and Brovkn & Brenn stain. The results obtained were as follows: 1. The mean survival time of each group rat was 19.3$\pm$5.2 days (group 1), 41.1$\pm$14.0 days (group 2), 50.5$\pm$18.4 days (group 3), 43.0$\pm$22.9 days (group 4) or 21.8$\pm$5.1 days (group 5). Significant differences were noted between group 1 and group 2(p<0.01), group 1 and group 3 (p<0.01), and group 1 and group 4 (p<0.01), which represented bacterial infections were most fatal in immunocompromised rats. Group 5 revealed no difference in the survival day from group 1, while significant differences were noted between group 2 and group 5(P<0.01), group 3 and group 5(p<0.01), and group 4 and group 5(p<0, 01), which represented little importance of fungal infection as the cause of death of the rats. 2. The first fatality due to p. carinii pneumonia occurred 17 days after the beginning of the immunosuppression. The occurrence rate of P. carinii pneumonia in the decreasing order was 92.9% (group 3), 80.0% (group 2 and group 5), 78.6% (group 4) and 33.3% (group 1). With regard to the pathological stage of P. carinii pneumonia, the stage 1 was 11.3%, the stage 2, 28.3%, and the stage 3, 60.4%. 3. Viewing from the duration of immunosuppression, bacterial pneumonia chieay appeared in 1 month, mixed infections (P. carinii and bacteria, or p. carinii and fungi) in 1~2 months, and pure P. carinii pneumonia after 2 months. The present study revealed that P. carinii pneumonia was the most important cause of death of immunocompromised rats later than 1 month after the start of immunosuppression.

  • PDF