• Title/Summary/Keyword: Cyber language

Search Result 141, Processing Time 0.027 seconds

An Efficient Intel Assembler Tool Design (효율적인 인텔 어셈블러 도구 설계)

  • Jung, Seungil;Ryou, Jae-Cheol
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.119-122
    • /
    • 2020
  • 소스 코드가 없는 악성코드를 분석하거나 소프트웨어 취약점 분석을 위해 바이너리 분석이 요구된다. 바이너리 분석을 위한 도구 중 어셈블러는 사용자의 입력 없이 컴파일러 내부에서 수행되기 때문에 사용자 관점의 연구는 많지 않다. 그러나 바이너리 분석 과정 중 역어셈블과 중간언어(Intermediate Representation)의 정확성을 검증하기 위해 사용자가 어셈블리어를 입력하여 결과를 확인할 수 있는 어셈블러가 요구된다. 본 논문에서는 어셈블리어를 바이너리 코드로 변환하는 어셈블러 도구를 함수형 언어인 F#으로 구현하여 어셈블리 과정을 효율적으로 설계한 어셈블러 도구를 제안한다. F#의 강력한 패턴 매칭 기능을 사용하여 수백개의 명령어를 일괄적이고 직관적으로 처리하는 과정을 설계하고 구현하였다.

  • PDF

Creating an e-Benchmarking Model for Authentic Learning: Reflections on the Challenges of an International Virtual Project

  • LEPPISAARI, Irja;HERRINGTON, Jan;IM, Yeonwook;VAINIO, Leena
    • Educational Technology International
    • /
    • v.12 no.1
    • /
    • pp.21-46
    • /
    • 2011
  • International virtual teamwork offers new opportunities for the professional development of teachers. In this paper, we examine the initial experiences in an ongoing international virtual benchmarking project coordinated by the Finnish Online University of Applied Sciences. What challenges does an international context present for project construction and collaboration? Data from five countries, in the form of participant reflections and researchers' observations, were analysed according to four types of barriers: language, time, technical and mental barriers. Initial data indicates that trust is an essential starting point, as there is neither time nor possibilities to build mutual trust by traditional means. Organisational confidentiality issues, however, can complicate the situation. The project introduces 'collision' as a method of professional development, in which physical and organisational borders are crossed and the skills and competencies needed in global learning environments are acquired.

A Survey on Retrieval-Augmented Generation (검색 증강 생성(RAG) 기술에 대한 최신 연구 동향)

  • Eun-Bin Lee;Ho Bae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.745-748
    • /
    • 2024
  • 글로벌 시장에서 Large Language Model(LLM)의 발전이 급속하게 이루어지며 활용도가 높아지고 있지만 특정 유형이나 전문적 지식이 부족할 수 있어 일반화하기 어려우며, 새로운 데이터로 업데이트하기 어렵다는 한계점이 있다. 이를 극복하기 위해 지속적으로 업데이트되는 최신 정보를 포함한 외부 데이터베이스에서 정보를 검색해 응답을 생성하는 Retrieval- Augmented Generation(RAG, 검색 증강 생성) 모델을 도입하여 LLM의 환각 현상을 최소화하고 효율성과 정확성을 향상시키려는 연구가 활발히 이루어지고 있다. 본 논문에서는 LLM의 검색 기능을 강화하기 위한 RAG의 연구 및 평가기법에 대한 최신 연구 동향을 소개하고 실제 산업에서 활용하기 위한 최적화 및 응용 사례를 소개하며 이를 바탕으로 향후 연구 방향성을 제시하고자 한다.

Development of Online Education Program and Feasibility Study on Cyberbullying Response in Schools since COVID-19 (코로나-19 이후 증가한 학교 사이버폭력 대응에 대한 온라인 교육 프로그램 개발과 타당성 연구)

  • Choi, Eunsun;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1071-1082
    • /
    • 2021
  • COVID-19 has changed a lot in our daily lives, where school classes and remote classes have been combined or converted to remote classes. Many students spent more time online, and cyberbullying, such as indiscriminate disclosure of their personal information, bullying of their classmates online, increased. In this paper, we propose an online education program as a countermeasure against cyberbullying. This program is designed for elementary, middle, and high school students and can also be used for informatics or ethics classes in the 2015 curriculum. The proposed program is divided into four major themes: 'Cyberbullying,' 'Information Security,' 'Cyber Crime,' and 'Language Violence,' and is divided into a total of ten topics according to its connection. It was organized to teach the topics evenly by grade. Also, the program's feasibility was verified by experts on the selection of educational contents and organizing of contents. In the future, it will be necessary to apply for this program and conduct an effectiveness analysis to measure whether it has effectively contributed to the decrease in cyberbullying rates among students and the improvement of coping skills.

Data Modeling for Cyber Security of IoT in Artificial Intelligence Technology (인공지능기술의 IoT 통합보안관제를 위한 데이터모델링)

  • Oh, Young-Taek;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.12
    • /
    • pp.57-65
    • /
    • 2021
  • A hyper-connected intelligence information society is emerging that creates new value by converging IoT, AI, and Bigdata, which are new technologies of the fourth industrial revolution, in all industrial fields. Everything is connected to the network and data is exploding, and artificial intelligence can learn on its own and even intellectual judgment functions are possible. In particular, the Internet of Things provides a new communication environment that can be connected to anything, anytime, anywhere, enabling super-connections where everything is connected. Artificial intelligence technology is implemented so that computers can execute human perceptions, learning, reasoning, and natural language processing. Artificial intelligence is developing advanced technologies such as machine learning, deep learning, natural language processing, voice recognition, and visual recognition, and includes software, machine learning, and cloud technologies specialized in various applications such as safety, medical, defense, finance, and welfare. Through this, it is utilized in various fields throughout the industry to provide human convenience and new values. However, on the contrary, it is time to respond as intelligent and sophisticated cyber threats are increasing and accompanied by potential adverse functions such as securing the technical safety of new technologies. In this paper, we propose a new data modeling method to enable IoT integrated security control by utilizing artificial intelligence technology as a way to solve these adverse functions.

Implementation of Real-time Recognition System for Continuous Korean Sign Language(KSL) mixed with Korean Manual Alphabet(KMA) (지문자를 포함한 연속된 한글 수화의 실시간 인식 시스템 구현)

  • Lee, Chan-Su;Kim, Jong-Sung;Park, Gyu-Tae;Jang, Won;Bien, Zeung-Nam
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.35C no.6
    • /
    • pp.76-87
    • /
    • 1998
  • This paper deals with a system which recognizes dynmic hand gestures, Korean Sign Language(KSL), mixed with static hand gesture, Korean Manual Alphabet(KMA), continuously. Recognition of continuous hand gestures is very difficult for lack of explicit tokens indicating beginning and ending of signs and for complexity of each gesture. In this paper, state automata is used for segmenting sequential signs into individual ones, and basic elements of KSL and KMA, which consist of 14 hand directions, 23 hand postures and 14 hand orientations are used for recognition of complex gestures under consideration of expandability. Using a pair of CyberGlove and Polhemus sensor, this system recognizes 131 Korean signs and 31 KMA's in real-time with recognition rate 94.3% for KSL excluding no recognition case and 96.7% for KMA.

  • PDF

Application of C Language Based Cryptographic Module with KCMVP in Java Environment (C언어로 개발된 검증필 암호모듈을 자바환경에서 활용하기 위한 방안)

  • Choi, Hyunduk;Lee, Jaehoon;Yi, Okyeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.398-401
    • /
    • 2014
  • Due to recent arise of cybercrime, importance of cyber security is highlighted more than ever. Korean government has been running Korea Cryptographic Module Validation Program, namely KCMVP, to validate security level of cryptographic modules for public organizations: indeed, many are achieving the validation. According to the program, operating environments for any specific cryptographic module are fixed. In other words, running validated module in other software environment is strictly prohibited. However, this paper asserts that it is possible for a C language based module to operate in Java based environment as long as the module is running on a validated environment. We expect this paper to help saving great amount of money and time for developing another cryptographic modules for the same operating environment. Also, this method will provide an idea for developing faster modules.

  • PDF

A Study on the Exploration of English Learning Design Elements Applying Immersive Virtual Reality (몰입형 가상현실을 적용한 영어학습 설계요소 탐색에 관한 연구)

  • Choi, Dong-Yeon
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.5
    • /
    • pp.209-217
    • /
    • 2022
  • Virtual reality entered a new phase with the introduction of wearable devices represented by Oculus. This study proposes an immersive virtual reality based on Oculus Rift that enables direct immersion in virtual reality from a first-person perspective for English learning. At this point, it is meaningful to provide considerations when designing instruction for language learning through a comprehensive and integrated review of immersive virtual reality. Therefore, the main purpose of this study is to find a way to maximize the application of language education in the immersive virtual world. And for the design elements for English learning through immersive virtual reality, the setting of learning theory, consideration of differences in learning, selection of learning tasks, regulation of teachers' influence, determination of types of applied senses, flexibility of design, and usage environment were suggested. By integrating the results, various discussions and directions for instructional design were presented.

The Detection and Correction of Context Dependent Errors of The Predicate using Noun Classes of Selectional Restrictions (선택 제약 명사의 의미 범주 정보를 이용한 용언의 문맥 의존 오류 검사 및 교정)

  • So, Gil-Ja;Kwon, Hyuk-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.25-31
    • /
    • 2014
  • Korean grammar checkers typically detect context-dependent errors by employing heuristic rules; these rules are formulated by language experts and consisted of lexical items. Such grammar checkers, unfortunately, show low recall which is detection ratio of errors in the document. In order to resolve this shortcoming, a new error-decision rule-generalization method that utilizes the existing KorLex thesaurus, the Korean version of Princeton WordNet, is proposed. The method extracts noun classes from KorLex and generalizes error-decision rules from them using the Tree Cut Model and information-theory-based MDL (minimum description length).

Development and Learning Outcome Analysis of an Efficient e-Learning Environment using Open Source LMS (오픈소스 LMS를 이용한 효율적 e-Learning 환경 구축과 학습결과 분석에 관한 연구)

  • Heo, Won;Yang, Yong-Seok;Park, Gi-Won;Bu, Ti-Tu
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.559-570
    • /
    • 2005
  • This paper presents how to establish an efficient e-Learning environment using open source software. A LMS with additional functionalities on the top of dotLRN. which is a open source project for LMS, is presented. Additional functionalities include modification of the language for Korean, adoption of SCORM educational standard, and management of learning outcome. This system had been serviced for Kongju cyber university for one year on stable basis. The scope of this paper covers introduction, characteristics review, and the learner's learning outcome analysis.

  • PDF