• Title/Summary/Keyword: Internet search

Search Result 1,637, Processing Time 0.029 seconds

Deep learning based image retrieval system for O2O shopping mall platform service design (O2O 쇼핑몰 플랫폼 서비스디자인을 위한 딥 러닝 기반의 이미지 검색 시스템)

  • Sung, Jae-Kyung;Park, Sang-Min;Sin, Sang-Yun;Kim, Yung-Bok;Kim, Yong-Guk
    • Journal of Digital Convergence
    • /
    • v.15 no.7
    • /
    • pp.213-222
    • /
    • 2017
  • This paper proposes a new service design which is deep learning-based image retrieval system for product search on O2O shopping mall platform. We have implemented deep learning technology that provides more convenient retrieval service for diverse images of many products that are sold in the internet shopping malls. In order to implement this retrieval system, real data used by shopping mall companies were used as experimental data. However, result from several experiments have confirmed deterioration of retrieval performance due to data components. In order to improve the performance, the learning data that interferes with the retrieval is revised several times, and then the values of experimental result are quantified with the verification data. Using the numerical values of these experiments, we have applied them to the new service design in this system.

Development of Security Audit Agent for the Safety in School Network (학내전산망의 안전성 확보를 위한 보안진단 에이전트 개발)

  • Park, Jong-O;Lee, Chul-Hyun;Kim, Seong-Sik
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.1
    • /
    • pp.27-34
    • /
    • 2002
  • Internet has being grown explosively in recent years, hence it becomes easy to search and access information. But it is happening frequently to access illegally into the systems and data, there are many damage caused by them. So, it is very important that we construct security plan for the systems and data. It is not exception on school network being diffused to all schools. But, we have weakness about security to manage server and network safely. So it is causing much anxieties. In this paper, we searched security points make sure of safety of school network, and developed security audit agent helping management of security. Through simple registration process, this agent is able to audit basic and important security problems about not only server systems but also pc systems, and notify to administrator automatically. It is expected to provide efficiency in managing school network.

  • PDF

The Recognition of the Substitute Teacher System between Substitute Teachers by Public Funds Support and Substitute Teachers by Local Province Funds Support (대체교사 제도에 대한 국비지원과 도비지원 대체교사의 인식)

  • Baek, Sun Jung;Kim, Hye Gum
    • Korean Journal of Childcare and Education
    • /
    • v.9 no.3
    • /
    • pp.209-228
    • /
    • 2013
  • The purpose of this study was to analyze the recognition of the substitute teacher system between public funds support and local province funds support and to search for a policy guideline. The participants were 49 substitute teachers supported by public funds and 53 substitute teachers supported by local province funds. Results were as follows: Firstly, substitute teachers supported by public funds participated through an internet site but substitute teachers supported by local province funds participated through printed materials from the Childcare Information Center and ambient solicitors. The participating motive for substitute teachers were to work together in different roles. Secondly, Substitute teachers thought the most important characteristics of substitute teachers was the flexibility to cope with various situations in childcare centers. Finally, substitute teachers by public funds support were satisfied with no overtime work but substitute teachers by local province funds were satisfied with experiences in various childcare centers.

3D Special Makeup Mask Program Development and Utilization (Ver. 2) (3D 특수 분장 마스크 시뮬레이션 프로그램 개발과 활용 (제2보))

  • Barng, Kee-Jung;Kim, Jin-Seo
    • Journal of Fashion Business
    • /
    • v.19 no.5
    • /
    • pp.63-76
    • /
    • 2015
  • The purpose of this study was to design a training program for utilization of 3D special makeup mask program. This study was conducted with a 3D computer graphics software program, for special makeup mask using a variety of creative educational models and case study with comparative analysis. The makeup program applied to the majors and liberal arts classes for program design. Inthis study, the selected major courses included ' stage make up ', make up application', and illustrations and color '. Students were required to take a class targeted to questionnaire completion and analysis. The research method included literature search, and Internet navigation, of experimental research. The research targeted select college students attending a 4-year university located in Dae-jeon, Korea. ETRI's "3D mask special makeup simulation program" was used in support. A survey of the study conducted from September 1, 2013, to August 30, 2014, showed a total of 94 additional statistical analyses. First, grade 3 44.6% was attained by 91.7% of the first year student majoring in liberal arts classes, Second, students' in the 3D special dress up mask program Interestingly, attained high recognition in its mastering, usability, and creativity. Furthermore, the major student satisfaction was higher for the '3D special makeup mask program. Third, students '3D special dress up was one of the biggest advantages of the program', the mask ' that models 3D ' faces. In addition, the student's delicate dress called for critical technology skills. It is thought to be suitable for practical training and improving the efficiency and performance if applied to universities and beauty schools, such as the regular high school curriculum through research.

A Study on the Privacy Policy of Behavioral Advertising (행태 광고의 개인정보 조치사항에 관한 연구)

  • Kong, Hee-Kyung;Jun, Hyo-Jung;Yoon, Seokung
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.3
    • /
    • pp.231-240
    • /
    • 2018
  • Recently, personal information processing are becoming more important in the behavioral advertising based on online and mobile platform. The behavioral advertising analyzes and utilizes individual's search & purchase history, hobbies, and tendency based on the personal behavior information collected using the automatic collection device. Therefore, it collects and stores other types of personal information which did't defined in Privacy Act and can analyze personal behavior. This characteristics may cause disclosure of personal information and exposure to intrusion. In this paper, we investigate and analyze the privacy policy of the advertising agencies, and discussded the measures to be taken in collecting, storing and using personal information suitable for behavior information.

An Efficient Neighbor Discovery Method for Cooperative Video Surveillance Services in Internet of Vehicles (차량 인터넷에서 협업 비디오 감시 서비스를 위한 효율적인 이웃 발견 방법)

  • Park, Taekeun;Lee, Suk-Kyoon
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.97-109
    • /
    • 2016
  • The rapid deployment of millions of mobile sensors and smart devices has resulted in high demand for opportunistic encounter-based networking. For the cooperative video surveillance of dashboard cameras in nearby vehicles, a fast and energy-efficient asynchronous neighbor discovery protocol is indispensable because a dashboard camera is an energy-hungry device after the vehicle's engine has turned off. In the existing asynchronous neighbor discovery protocols, all nodes always try to discover all neighbors. However, a dashboard camera needs to discover nearby dashboard cameras when an event is detected. In this paper, we propose a fast and energy-efficient asynchronous neighbor discovery protocol, which enables nodes : 1) to have different roles in neighbor discovery, 2) to discover neighbors within a search range, and 3) to report promptly the exact discovery result. The proposed protocol has two modes: periodic wake-up mode and active discovery mode. A node begins with the periodic wake-up mode to be discovered by other nodes, switches to the active discovery mode on receiving a neighbor discovery request, and returns to the periodic wake-up mode when the active discovery mode finishes. In the periodic wake-up mode, a node wakes up at multiples of number ${\alpha}$, where ${\alpha}$ is determined by the node's remaining battery power. In the active discovery mode, a node wakes up for consecutive ${\gamma}$ slots. Then, the node operating in the active discovery mode can discover all neighbors waking up at multiples of ${\beta}$ for ${\beta}{\leq}{\gamma}$ within ${\gamma}$ time slots. Since the proposed protocol assigns one half of the duty cycle to each mode, it consumes equal to or less energy than the existing protocols. A performance comparison shows that the proposed protocol outperforms the existing protocols in terms of discovery latency and energy consumption, where the frequency of neighbor discovery requests by car accidents is not constantly high.

An XML Access Control Method through Filtering XPath Expressions (XPath 표현식의 필터링을 통한 XML 접근 제어 기법)

  • Jeon Jae-myeong;Chung Yon Dohn;Kim Myoung Ho;Lee Yoon Joon
    • Journal of KIISE:Databases
    • /
    • v.32 no.2
    • /
    • pp.193-203
    • /
    • 2005
  • XML (extensible Markup Language) is recognized as a standard of data representation and transmission on Internet. XPath is a standard for specifying parts of XML documents anda suitable language for both query processing and access control of XML. In this paper, we use the XPath expression for representing user queries and access control for XML. And we propose an access control method for XML, where we control accesses to XML documents by filtering query XPath expressions through access control XPath expressions. In the proposed method, we directly search XACT (XML Access Control Tree) for a query XPath expression and extract the access-granted parts. The XACT is our proposedstructure, where the edges are structural summary of XML elements and the nodes contain access-control information. We show the query XPath expressions are successfully filtered through the XACT by our proposed method, and also show the performance improvement by comparing the proposed method with the previous work.

The Effect on Science-Related Attitudes of High School Students for Newspaper in Education(NIE) (NIE 수업이 고등학생들의 과학과 관련된 태도에 미치는 영향)

  • Joo, Min-Sun;Youn, Seok-Tai;Koh, Yeong-Koo;Kim, Jong-Hee;Oh, Kang-Ho
    • Journal of the Korean Society of Earth Science Education
    • /
    • v.9 no.1
    • /
    • pp.27-38
    • /
    • 2016
  • Through the systematic analysis on articles about the environment in newspapers, the news reports were considered as effective materials, so after being reconstructed, they were used as learning materials in a lesson on environment contamination which is newly introduced in Earth Science I from the 2009 curriculum revision. To examine students' attitude toward science, before and after NIE application to the students, Test of Science Related Attitudes(TOSRA) as a test tool was carried out which was composed of 7 categories - four optional questionnaires for each category, 28 in total were used. The result was as follows: in a pretest, based upon the average scores by factors the factors ranked from the highest to the lowest as follows: the social meaning of science, the acceptance of the scientific attitude, the commonness of a scientist, the attitude to scientific exploration, the pleasure in science class, the vocational interest in science, the concern over science as a hobby, and in posttest, their ranking as follows: the acceptance of the scientific attitude, the pleasure in science class, the commonness of a scientist, the social meaning of science, the attitude to scientific exploration, the vocational interest in science, the concern over science as a hobby. Also they were all statistically significant at a significant level p<0.05. However, the test revealed that there were some negative effects on the social meaning of science and the attitude to scientific exploration and therefore it is judged that in order to overcome those influences, some bright articles about solving the environment contamination should be applied to the lessons and be complemented effectively by experiments and various media: NIE as well as science magazines, data from Internet search and treatises on science.

A Study on the Symbolic Features and Wearing Types of Pearl Necklaces (진주목걸이의 상징적 특성과 착용유형에 대한 연구)

  • Cho, Jungmee
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.37 no.8
    • /
    • pp.1029-1043
    • /
    • 2013
  • The pearl is a highly valuable gem that has historically represented wealth and power. Pearl necklaces have developed intro various types and represent an essential status item for modern women. This study first examines the symbolic and various meanings of pearls. Second, this study examines wearing types and pearl necklace patterns based on historical figures and modern fashion icons famous for personal displays of pearls. This study examines and analyzes various specialty publications about jewels, history of costumes, fashion magazines, academic research data, and internet search results. The conclusion of this study is as follows. Pearls have various symbolic meanings that are unlike other gems. Pearls represent purity, innocence, marital fidelity, an intimate relationship with the moon, frozen tears of God, solitude, triumph over adversity, wisdom, and sensual attraction. The societies and people traditionally famous for pearls were the Roman Empire, Queen Cleopatra of Egypt, Queen Theodora of the Byzantine Empire, Queen Elizabeth I, Queen Marie Antoinette, Empress of Eugenie Napoleon III, and Queen Alexandra. They showed a special affection for pearl necklaces and various wearing patterns unique to the time. Their pearl necklaces became a historic and symbolic legacy. Reestablished through the costume jewelry of cultivated pearls designed by Coco Chanel in the $20^{th}$ century, the pearl necklace has showed a variety of fashion trends in addition to a traditional symbolism of wealth and power. Josephine Baker, Louise Brooks, Marilyn Monroe, Elizabeth Taylor, Jacqueline Kennedy, Queen Elizabeth II, Princess Diana, Michelle Obama and Sarah Jessica Parker have worn notable pearl necklaces and established an individual style that utilizes the adornment of fashionable and stylish pearl necklaces. They have worn pearl necklaces while applying various fashion trend motifs to symbolic pearl features of that have changed the perception of the pearl and themselves.

Design of DRM System in P2P Network Environment (P2P네트워크 환경을 위한 DRM 시스템 설계)

  • Lee Jeong-Gi;Kim Kuk-Se;Lee Gwang;Ahn Seong-Soo;Lee Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.829-832
    • /
    • 2006
  • The word P2P implies significant changes in current business dynamics. The P2P service enables individuals to be connected to the Internet for the direct provision of information and even downloads from one another without the conventional method of passing through search engines. This can be utilized to extend the path of retrieving information from limited web sites to personal and enterprise databases. That is, it is now possible for individuals to manage their own information on a national or global scope, share various information with other members, form communities of users interested in sharing homogeneous information, and utilize remote conference and remote education using groupware.

  • PDF