• Title/Summary/Keyword: Microsoft

Search Result 900, Processing Time 0.024 seconds

Design and Implementation of Chatbot based on Microsoft Bot Framework (Microsoft Bot Framework 기반의 챗봇 설계 및 구현)

  • Won Joo Lee;Yong Soo Jang;Woo Min An;So Yi Kang;Min Ju Choi
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.33-34
    • /
    • 2023
  • 본 논문에서는 Microsoft Bot Framework 기반의 챗봇(Chat Bot)을 설계하고 구현한다. 이 챗봇은 인하공업전문대학 컴퓨터정보과에 진학하려는 학생이나 재학생을 대상으로 서비스를 제공하는 챗봇이다. 사용자는 간단한 정보를 보다 빠르게 찾아볼 수 있다. 또한, 교과과정과 교수진에 대한 정보를 얻을 수 있고, 취업정보를 알 수 있으며 전공 스터디룸을 예약할 수 있다. 전공 스터디룸 예약 같은 경우 데이터베이스 연동을 통해 예약 정보를 저장할 수 있으며, 삭제하여 취소하는 기능을 제공한다.

  • PDF

Microsoft의 Mobile & Embedded 개발 플랫폼의 소개

  • Lee, Geon-Bok
    • KSCI Review
    • /
    • v.12 no.2
    • /
    • pp.25-46
    • /
    • 2004
  • $\bullet$ Windows CE 5.0 $\triangleright$ 사용자 환경에 맞도록 수정/확장 $\triangleright$ 최적의 개발 생산성 제공 $\triangleright$ 네트워크/멀티미디어 기능 $\triangleright$ 안전된 운영체제 성능 $\triangleright$ Window CE 개발방법 $\triangleright$ 다양한 선택사항 $\triangleright$ 각각의 방법에 따른 장단점 $\triangleright$ 상황에 따른 방법의 결정

  • PDF

A Study on Test Set to prevent illegal films searches (불법촬영물 검색 방지를 위한 시험 세트 방안 연구)

  • Yong-Nyuo Shin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.27-33
    • /
    • 2023
  • Countries around the world are calling for stronger law enforcement to combat the production and distribution of child sexual exploitation images, such as child grooming. Given the scale and importance of this social problem, it requires extensive cooperation between law enforcement, government, industry, and government organizations. In the wake of the Nth Room Case, there have been some amendments to the Enforcement Decree of the Telecommunications Business Act regarding additional telecommunications services provided by precautionary operators in Korea. While Naver and others in Korea use Electronics and Telecommunications Research Institute's own technology to filter illegal images, Microsoft uses its own PhotoDNA technology. Microsoft's PhotoDNA is so good at comparing and identifying illegal images that major global operators such as Twitter are using it to detect and filter images. In order to meet the Korean government's testing standards, Microsoft has conducted more than 16 performance tests on "PhotoDNA for Video 2.0A," which is being applied to the Bing service, in cooperation with the Korea Communications Commission and Telecommunications Technology Association. In this paper, we analyze the cases that did not pass the standards and derive improvement measures related to adding logos. In addition, we propose to use three video datasets for the performance test of filtering against illegal videos.

A Study on Virtual Studio Application using Microsoft Hololens

  • Lee, Jaehyun;Kim, Seunghyeon;Kim, Lyounghui;Kang, Jinwook;Lee, Seunghyun;Kwon, Soonchul
    • International journal of advanced smart convergence
    • /
    • v.6 no.4
    • /
    • pp.80-87
    • /
    • 2017
  • Mixed Reality (MR) shows a composite image of a virtual object in the real world. It has been applied to various fields by the introduction of head mounted display (HMD) such as Microsoft's Hololens [1-3]. The virtual studio in broadcasting combines the contents created by computer graphics with the actual set to reproduce the 3D image screen. This requires physical space such as a set of chroma keys. It also requires professional knowledge and manpower and costly equipment to post-process the graphics and information for long periods of time. Therefore, in this paper, we aim to study the implementation of virtual studio based on Mixed Reality using Microsoft Hololens. Through the implementation of 'Holo-studio' application, realistic and virtual objects of broadcasting camera viewpoint were acquired at the same time. Using Microsoft's spectator view library, the frame rate is degraded in objects with high polygons (100,000 polygons). The proposed method maintains 60 fps image transmission in high polygon objects. The results of this paper show the possibility of using virtual studio at low cost which does not need separate physical space.

Integration of AutoCAD and Microsoft Excel for Forest Survey Application

  • Mamat, Mohd Rizuwan;Hamzah, Khali Aziz;Rashid, Muhammad Farid;Faidi, Mohd Azahari;Norizan, Azharizan Mohd
    • Journal of Forest and Environmental Science
    • /
    • v.29 no.4
    • /
    • pp.307-313
    • /
    • 2013
  • Forest Survey consists of road survey, topographic survey, tree mapping survey, stream survey and also ridge survey. Information from forest survey is important and become essential in preparing base map to be used for forest harvesting planning and control. With the current technologies technique of data processing and mapping from traditionally hand drawn method had shifted to a computer system particularly the use of Computer Aided Design (CAD). This gives great advantages to the forest managers and logging operators. However data processing and mapping duration could be further reduced by integrating CAD with other established software such as Microsoft Excel. This time study to show that there is significance difference in term of duration for data processing and efficiency using AutoCAD in combination with Microsoft Excel program as compare to the use of AutoCAD program alone. From the study, it shows that the integration of AutoCAD and Microsoft Excel is able to reduce 70% of duration for data processing and mapping as compared to the use of AutoCAD program alone.

Comparing Recoverability of Deleted Data According to Original Source Collection Methods on Microsoft SQL Server (Microsoft SQL Server의 원본 수집 방식에 따른 삭제 데이터의 복구 가능성 비교)

  • Shin, Jiho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.859-868
    • /
    • 2018
  • Previous research related to recovering deleted data in database has been mainly based on transaction logs or detecting and recovering data using original source files by physical collection method. However there was a limit to apply if the transaction log does not exist in the server or it is not possible to collect the original source file because a database server owner does not permit stopping the database server because of their business loss or infringement at the scene. Therefore it is necessary to examine various collection methods and check the recoverability of the deleted data in order to handling the constraints of evidence collection situation. In this paper we have checked an experiment that the recoverability of deleted data in the original database source according to logical and physical collection methods on digital forensic investigation of Microsoft SQL Server database.

Improvement of the Mathematical Creativity Using Engineering Tools in Mathematics Mentorship Program (수학 사사과정에서 공학도구를 이용한 창의력 증진)

  • Boo, Deok Hoon
    • Communications of Mathematical Education
    • /
    • v.35 no.1
    • /
    • pp.119-136
    • /
    • 2021
  • We performed the research and education programs using engineering tools such as Mathematica, Microsoft Excel and GeoGebra for the students in mathematics mentorship program of the institute of science education for the gifted. We used the engineering tools to solve the problems and found the rules by observing the solutions. Then we generalized the rules to theorems by proving the rules. Mathematica, the professional mathematical computation program, was used to calculate and find the length of the repeating portion of the repeating decimal. Microsoft Excel, the spreadsheet software, was used to investigate the Beatty sequences. Also GeoGebra, the dynamic geometric software, was used to investigate the Voronoi diagram and develop the Voronoi game. Using GeoGebra, we designed the Voronoi game plate for the game. In this program, using engineering tools improved the mathematical creativity and the logical thinking of the gifted students in mathematics mentorship program.

A Study on Message Acquisition from Electron Apps: Focused on Collaboration Tools such as Jandi, Slack, and Microsoft Teams (Electron App의 메시지 획득 방안에 관한 연구: 협업 툴 잔디, 슬랙, 팀즈 중심으로)

  • Kim, Sung-soo;Lee, Sung-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.11-23
    • /
    • 2022
  • Collaboration tools are used widely as non-face-to-face work increases due to social distancing after COVID-19. The tools are being developed in a cross-platform manner with 'Electron', an open source framework based on Chromium, to ensure accessibility on multiple devices. Electron Apps, applications built with Electron framework, store data in a manner similar to Chromium-based web browsers, so the data can be acquired in the same way as the data is acquired from a web browser. In this paper we analyze the data structure of web storage and suggest a method to get the message from Electron Apps focused on collaboration tools such as Jandi, Slack, and Microsoft Teams. For Jandi, we get the message from Cache by using previously developed tools, and in the case of Slack and Microsoft Teams, we get the message from IndexedDB by using the message carving tool we developed.

A Study on Injection Attacks and Defenses on Microsoft Windows (MS Windows에서 인젝션 공격 및 방어 기법 연구)

  • Seong, HoJun;Cho, ChangYeon;Lee, HoWoong;Cho, Seong-Je
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.9-23
    • /
    • 2020
  • Microsoft's Windows system is widely used as an operating system for the desktops and enterprise servers of companies or organizations, and is a major target of cyber attacks. Microsoft provides various protection technologies and strives for defending the attacks through periodic security patches, however the threats such as DLL injection and process injection still exist. In this paper, we analyze 12 types of injection techniques in Microsoft Windows, and perform injection attack experiments on four application programs. Through the results of the experiments, we identify the risk of injection techniques, and verify the effectiveness of the mitigation technology for defending injection attacks provided by Microsoft. As a result of the experiments, we have found that the current applications are vulnerable to several injection techniques. Finally, we have presented the mitigation techniques for these injection attacks and analyzed their effectiveness.