• Title/Summary/Keyword: Information processing knowledge

Search Result 1,093, Processing Time 0.034 seconds

A Study on Sharing Method of Business Connection Information for Knowledge Management (지식관리 측면에서의 거래처 정보 공유 방법에 대한 연구)

  • Han, Hee-Jun;Huh, Tae-Sang;Lee, Seung-Bock;Yae, Yong-Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.631-634
    • /
    • 2005
  • 공공기관 및 국가 연구기관 뿐만 아니라, 대학 및 모든 기업체는 연구 및 업무 수행 중 발생하는 모든 제반 지식 및 성과 정보를 관리하고 공동 활용하기 위하여 지식관리 시스템(Knowledge Management System)을 구축하여 업무 수행의 효율성을 꾀하고 있다. 각 기관은 연구 활동 및 업무 수행에 필요한 기자재 구입이나 연구비(비용) 지출에 대한 거래처 정보(거래 관계자 및 해당 은행 계좌정보)를 관리 및 활용하고 있는데, 거래처 정보는 일반적으로 특정 부서 및 업무 담당자에 의해 관리됨으로 인해 유용한 정보를 공유하는데 있어서 어려움을 지닌다. 본 논문에서는 지식관리 측면에서의 거래처 정보 공유 방법을 제시함으로써, 연구 활동 및 업무 수행에 있어서 거래처 정보 및 구매 혹은 지출 등의 관련 거래 정보를 유용한 지식으로써 공동 활용코자 한다.

  • PDF

Construction of Korean Linguistic Information for the Korean Generation on KANT (Kant 시스템에서의 한국어 생성을 위한 언어 정보의 구축)

  • Yoon, Deok-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.12
    • /
    • pp.3539-3547
    • /
    • 1999
  • Korean linguistic information for the generation modulo of KANT(Knowledge-based Accurate Natural language Translation) system was constructed. As KANT has a language-independent generation engine, the construction of Korean linguistic information means the development of the Korean generation module. Constructed information includes concept-based mapping rules, category-based mapping rules, syntactic lexicon, template rules, grammar rules based on the unification grammar, lexical rules and rewriting rules for Korean. With these information in sentences were successfully and completely generated from the interlingua functional structures among the 118 test set prepared by the developers of KANT system.

  • PDF

Monitoring Environment Design for Web Connection Information (웹 클라이언트 연결 정보 모니터링 설계 및 구현)

  • Jo, A-Ra;Jeong, Chi-Yoon;Chang, Beom-Hwan;Na, Jung-Chan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1466-1469
    • /
    • 2009
  • 최근 웹 서비스 환경에서 공격자가 자신의 근원지를 은닉하기 위하여 여러 단계의 경유지를 거쳐 공격을 시도하는 사례가 증가하고 있으며, 이에 대한 법률적 증거 확보 및 능동적인 대처를 위하여 웹 어플리케이션에서의 역추적 기술이 필요하다. 현재 자바 애플릿이나 ActiveX, 플러그인, 웹 로그 등을 이용한 응용 계층의 추적 기술이 개발되고 있지만, 웹 클라이언트에 의하여 차단될 가능성이 높고, 플러그인 종류 및 호환되지 않는 운영 환경 등 제약조건으로 인하여 사용에 제한이 있다. 본 논문에서는 액션 스크립트를 이용한 웹 클라이언트 모니터링 시스템을 제안한다. 제안된 시스템은 웹 클라이언트가 실행을 인식하지 못하고 수행되어 웹 클라이언트에 의한 차단을 막을 수 있고, 다양한 운영 환경에서 사용이 가능하다.

Design of Knowledge Information Transfer Method in Groups (집단 내의 지식 정보 전수 방법의 설계)

  • Jung, Nam-Chae
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.15 no.4
    • /
    • pp.119-127
    • /
    • 2014
  • Recently, various methods derived from the experiences and the practices to manage knowledge have been proposed. However, the effects of the most of those methods have not been demonstrated quantitatively, but only the successful cases reported. In this paper, a method for knowledge transfer in a group is proposed to evaluate the effect of knowledge management and to express a shape that knowledge is transferred in the group by the multi-agent simulation. Simulation results show that the performance of the entire group is improved by introducing a knowledge database and a knowledge manager. In addition, the experience knowledge of the entire group is shown to be lost by reviewing results of the social issues by the proposed method. As a countermeasure for that, it was confirmed that the introduction of the knowledge database and the knowledge manager is more effective than those of an extension of the retirement age and of an increase of the intermediate recruitment.

Verb Pattern Based Korean-Chinese Machine Translation System

  • Kim, Changhyun;Kim, Young-Kil;Hong, Munpyo;Seo, Young-Ae;Yang, Sung-Il;Park, Sung-Kwon
    • Proceedings of the Korean Society for Language and Information Conference
    • /
    • 2002.02a
    • /
    • pp.157-165
    • /
    • 2002
  • This paper describes our ongoing Korean-Chinese machine translation system, which is based on verb patterns. A verb pattern consists of a source language pattern part for analysis and a target language pattern part for generation. Knowledge description on lexical level makes it easy to achieve accurate analyses and natural, correct generation. These features are very important and effective in machine translation between languages with quite different linguistic structures including Korean and Chinese. We performed a preliminary evaluation of our current system and reported the result in the paper.

  • PDF

Anonymous Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment

  • Park, Sung-Wook;Lee, Im-Yeong
    • Journal of Information Processing Systems
    • /
    • v.9 no.3
    • /
    • pp.461-476
    • /
    • 2013
  • Recently, smart devices for various services have been developed using converged telecommunications, and the markets for near field communication mobile services is expected to grow rapidly. In particular, the realization of mobile NFC payment services is expected to go commercial, and it is widely attracting attention both on a domestic and global level. However, this realization would increase privacy infringement, as personal information is extensively used in the NFC technology. One example of such privacy infringement would be the case of the Google wallet service. In this paper, we propose an zero-knowledge proof scheme and ring signature based on NTRU for protecting user information in NFC mobile payment systems without directly using private financial information of the user.

A Mechanism for Controlling Accesses Dynamically in Smartwork Environment (스마트워크 환경에서 동적으로 접근 권한을 제어하기 위한 메커니즘)

  • Yoon, Kwansik;Kim, Kangseok;Kim, Ki-Hyung;Yeh, Hongjin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.877-880
    • /
    • 2012
  • 정보통신기술의 발전으로 기업의 내에서만 업무를 하던 시대에서 벗어나 언제 어디서나 손쉽게 업무를 수행할 수 있는 스마트워크 환경이 가능하게 되었다. 특히 모바일 디바이스의 성능 발전과 급속한 보급은 스마트워크를 이용하는 환경이 다양해지는 계기가 되었고 이로 인해 동일한 사용자라 할지라도 스마트워크에 접근하는 방법이나 환경이 동적으로 변경 될 수 있다. 이러한 특성은 보안 위협의 유형도 다양하게 하여 기업 내부의 정보를 보호하기 어렵게 만들었다. 이로 인해 기존의 사용자 정보 중심의 통합 인증 관리시스템인 EAM(Extranet Access Management)만으로 다양한 위협에 대응하기에는 부족하게 되었다. 이에 본 논문에서는 기존 EAM 시스템의 한계를 알아보고 스마트워크 환경에서 사용자 정보 외에 디바이스, 네트워크, 위치 정보를 활용하여 접근 시의 환경에 따라 사용자의 권한도 동적으로 생성하는 방식을 제안한다.

An Unauthorized AP Detection Approach Based on Internal Network Information in Wireless LAN (무선랜 환경에서 내부 네트워크 정보를 이용한 비인가 AP 탐지 기법)

  • Park, Beomjin;Lee, Taekkyeun;Hong, Manpyo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.761-763
    • /
    • 2013
  • AP 접속을 통한 인터넷 사용시에 인가되지 않은 AP의 경우 모바일 단말로부터 무선랜 연결을 유도하여 피해자가 주고 받는 패킷 정보를 도청한다. 특히 피해자가 무선랜 자동 연결 설정을 활성화한 경우 의도하지 않게 공격에 노출 될 수 있다. 따라서 이를 보안하기 위해 연결할 AP의 내부 네트워크 정보를 비교하여 정상적인 AP 인지 구별할 수 있는 방법을 제안하고자 한다.

Enhancing Recommender Systems by Fusing Diverse Information Sources through Data Transformation and Feature Selection

  • Thi-Linh Ho;Anh-Cuong Le;Dinh-Hong Vu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1413-1432
    • /
    • 2023
  • Recommender systems aim to recommend items to users by taking into account their probable interests. This study focuses on creating a model that utilizes multiple sources of information about users and items by employing a multimodality approach. The study addresses the task of how to gather information from different sources (modalities) and transform them into a uniform format, resulting in a multi-modal feature description for users and items. This work also aims to transform and represent the features extracted from different modalities so that the information is in a compatible format for integration and contains important, useful information for the prediction model. To achieve this goal, we propose a novel multi-modal recommendation model, which involves extracting latent features of users and items from a utility matrix using matrix factorization techniques. Various transformation techniques are utilized to extract features from other sources of information such as user reviews, item descriptions, and item categories. We also proposed the use of Principal Component Analysis (PCA) and Feature Selection techniques to reduce the data dimension and extract important features as well as remove noisy features to increase the accuracy of the model. We conducted several different experimental models based on different subsets of modalities on the MovieLens and Amazon sub-category datasets. According to the experimental results, the proposed model significantly enhances the accuracy of recommendations when compared to SVD, which is acknowledged as one of the most effective models for recommender systems. Specifically, the proposed model reduces the RMSE by a range of 4.8% to 21.43% and increases the Precision by a range of 2.07% to 26.49% for the Amazon datasets. Similarly, for the MovieLens dataset, the proposed model reduces the RMSE by 45.61% and increases the Precision by 14.06%. Additionally, the experimental results on both datasets demonstrate that combining information from multiple modalities in the proposed model leads to superior outcomes compared to relying on a single type of information.

A Study on Comprehensive Domain Ontology Methodology (도메인 온톨로지 구축에 관한 연구)

  • Liu, Haitao;Shin, Ju-Hyun;Kim, Pan-Koo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.651-654
    • /
    • 2005
  • Ontology developing process has aroused a lot of controversy among knowledge engineers and knowledge users. The recent surges on ontology building methodologies and practical ontology applications have explored a broad spectrum of knowledge management challenges. On the one hand, the abundant methodology theories provide us with a set of useful heuristic rules, from which we get the overview of ontology building process. But on the other hand, every research groups would like to justify their theories by listing their specific characteristics and unique method when approaching the right way. However, there is still no one “correct” way or methodology for developing ontologies. In this case, the methods used to evaluate only a subset of specific domain do not make any sense to the commonsense users. As a result, a comprehensive understanding of domain ontology is urgent and necessary.

  • PDF