• Title/Summary/Keyword: String

Search Result 1,090, Processing Time 0.022 seconds

Enrichment of POI information based on LBSNS (위치기반 소셜 네트워크 서비스(LBSNS)를 이용한 POI 정보 강화 방안)

  • Cho, Sung-Hwan;Ga, Chil-O;Huh, Yong
    • Journal of Cadastre & Land InformatiX
    • /
    • v.48 no.2
    • /
    • pp.109-119
    • /
    • 2018
  • Point of interest (POI) of the city is a special place that has what importance to the user. For example, it is such landmark, restaurants, museums, hotels, and theaters. Because of its role in the social and economic life of us, these have attracted a lot of interest in location-based applications such as social networks and online map. However, while it can easily be obtained through the Web, the basic information of POI such as geographic location, another effort is required to obtain detailed information such as Wi-Fi, accepting credit cards, opening hours, romper room and the assessment and evaluation of other users. To solve these problems, a new method for correcting position error is required to link location-based social network service (LBSNS) data and POIs. This paper attempts to propose a position error correction method of POI and LBSNS data to enrich POI information from the vast information that is accumulated in LBSNS. Through this study, we can overcome the limitation of individual POI information via the information fusion method of LBSNS and POI, and we have discovered the possibility to be able to provide additional information which users need. As a result, we expect to be able to collect a variety of POI information quickly.

Material Analysis of Bosu of the Royal Seals of the Joseon Dynasty and the Korean Empire (조선 왕실과 대한제국 황실 어보 보수(寶綬)의 재료학적 분석)

  • Lee, Hyeyoun;Kim, Jooyoung;Cho, Mungyeong;Kim, Minji;Park, Daewoo;Lee, Jungmin
    • Journal of Conservation Science
    • /
    • v.37 no.2
    • /
    • pp.154-166
    • /
    • 2021
  • The royal seal, in either gold or jade, is used to symbolize Joseon's royal family, and it is made up of a Bonu (a handle), Bosin (a body), Bomun (a letter inscribed on the seal), and Bosu (a string attached to the seal). The Bosu was designed to enhance the seal's dignity and facilitate convenient handling. Bosu consists of Kkeun-mog and Bangwool-sul (decorated with gilt paper), which are made of Bangwool, Bangwool-mog, and Sul. In this study, the form survey, color, material, and composition of 318 Bosu pieces from the Joseon Dynasty and Korean Empire produced from 1441 to 1928 were analyzed. As time passed, the strings on the seals became longer and thinner. Bangwool-mog disappeared from the mid-1800s, and a ring appeared at the end of the Sul. Most of the colors used were scarlet, but orange and purple were also identified. Although most of the Bosu are silk, five Bosu from the 1900s and one Bosu from the 1740s (likely replaced in the 1900s) are estimated to be rayon. The gilt paper's main chemical components used to decorate the Bangwool-sul vary according to age. Until the mid-1800s, gold (Au) was used for the Sul and Bangwool, but since the mid-1800s, gold (Au) and brass (Cu-Zn) were used for Sul and Bangwool, respectively, and then brass (Cu-Zn) was used for Sul and Bangwool. While the Bosu was a seal accessory, it can be used to identify changes in the manufacturing techniques and materials of the period.

Application of Integrated Security Control of Artificial Intelligence Technology and Improvement of Cyber-Threat Response Process (인공지능 기술의 통합보안관제 적용 및 사이버침해대응 절차 개선 )

  • Ko, Kwang-Soo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.10
    • /
    • pp.59-66
    • /
    • 2021
  • In this paper, an improved integrated security control procedure is newly proposed by applying artificial intelligence technology to integrated security control and unifying the existing security control and AI security control response procedures. Current cyber security control is highly dependent on the level of human ability. In other words, it is practically unreasonable to analyze various logs generated by people from different types of equipment and analyze and process all of the security events that are rapidly increasing. And, the signature-based security equipment that detects by matching a string and a pattern has insufficient functions to accurately detect advanced and advanced cyberattacks such as APT (Advanced Persistent Threat). As one way to solve these pending problems, the artificial intelligence technology of supervised and unsupervised learning is applied to the detection and analysis of cyber attacks, and through this, the analysis of logs and events that occur innumerable times is automated and intelligent through this. The level of response has been raised in the overall aspect by making it possible to predict and block the continuous occurrence of cyberattacks. And after applying AI security control technology, an improved integrated security control service model was newly proposed by integrating and solving the problem of overlapping detection of AI and SIEM into a unified breach response process(procedure).

Genome-wide identification and analysis of long noncoding RNAs in longissimus muscle tissue from Kazakh cattle and Xinjiang brown cattle

  • Yan, Xiang-Min;Zhang, Zhe;Liu, Jian-Bo;Li, Na;Yang, Guang-Wei;Luo, Dan;Zhang, Yang;Yuan, Bao;Jiang, Hao;Zhang, Jia-Bao
    • Animal Bioscience
    • /
    • v.34 no.11
    • /
    • pp.1739-1748
    • /
    • 2021
  • Objective: In recent years, long noncoding RNAs (lncRNAs) have been identified in many species, and some of them have been shown to play important roles in muscle development and myogenesis. However, the differences in lncRNAs between Kazakh cattle and Xinjiang brown cattle remain undefined; therefore, we aimed to confirm whether lncRNAs are differentially expressed in the longissimus dorsi between these two types of cattle and whether differentially expressed lncRNAs regulate muscle differentiation. Methods: We used RNA-seq technology to identify lncRNAs in longissimus muscles from these cattle. The expression of lncRNAs were analyzed using StringTie (1.3.1) in terms of the fragments per kilobase of transcript per million mapped reads values of the encoding genes. The differential expression of the transcripts in the two samples were analyzed using the DESeq R software package. The resulting false discovery rate was controlled by the Benjamini and Hochberg's approach. KOBAS software was utilized to measure the expression of different genes in Kyoto encyclopedia of genes and genomes pathways. We randomly selected eight lncRNA genes and validated them by quantitative reverse transcription polymerase chain reaction (RT-qPCR). Results: We found that 182 lncRNA transcripts, including 102 upregulated and 80 downregulated transcripts, were differentially expressed between Kazakh cattle and Xinjiang brown cattle. The results of RT-qPCR were consistent with the sequencing results. Enrichment analysis and functional annotation of the target genes revealed that the differentially expressed lncRNAs were associated with the mitogen-activated protein kinase, Ras, and phosphatidylinositol 3-kinase (PI3k)/Akt signaling pathways. We also constructed a lncRNA/mRNA coexpression network for the PI3k/Akt signaling pathway. Conclusion: Our study provides insights into cattle muscle-associated lncRNAs and will contribute to a more thorough understanding of the molecular mechanism underlying muscle growth and development in cattle.

SPA-Resistant Unsigned Left-to-Right Receding Method (SPA에 안전한 Unsigned Left-to-Right 리코딩 방법)

  • Kim, Sung-Kyoung;Kim, Ho-Won;Chung, Kyo-Il;Lim, Jong-In;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.21-32
    • /
    • 2007
  • Vuillaume-Okeya presented unsigned receding methods for protecting modular exponentiations against side channel attacks, which are suitable for tamper-resistant implementations of RSA or DSA which does not benefit from cheap inversions. The proposed method was using a signed representation with digits set ${1,2,{\cdots},2^{\omega}-1}$, where 0 is absent. This receding method was designed to be computed only from the right-to-left, i.e., it is necessary to finish the receding and to store the receded string before starting the left-to-right evaluation stage. This paper describes new receding methods for producing SPA-resistant unsigned representations which are scanned from left to right contrary to the previous ones. Our contributions are as follows; (1) SPA-resistant unsigned left-to-right receding with general width-${\omega}$, (2) special case when ${\omega}=1$, i.e., unsigned binary representation using the digit set {1,2}, (3) SPA-resistant unsigned left-to-right Comb receding, (4) extension to unsigned radix-${\gamma}$ left-to-right receding secure against SPA. Hence, these left-to-right methods are suitable for implementing on memory limited devices such as smartcards and sensor nodes

Research on Malicious code hidden website detection method through WhiteList-based Malicious code Behavior Analysis (WhiteList 기반의 악성코드 행위분석을 통한 악성코드 은닉 웹사이트 탐지 방안 연구)

  • Ha, Jung-Woo;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.61-75
    • /
    • 2011
  • Recently, there is significant increasing of massive attacks, which try to infect PCs that visit websites containing pre-implanted malicious code. When visiting the websites, these hidden malicious codes can gain monetary profit or can send various cyber attacks such as BOTNET for DDoS attacks, personal information theft and, etc. Also, this kind of malicious activities is continuously increasing, and their evasion techniques become professional and intellectual. So far, the current signature-based detection to detect websites, which contain malicious codes has a limitation to prevent internet users from being exposed to malicious codes. Since, it is impossible to detect with only blacklist when an attacker changes the string in the malicious codes proactively. In this paper, we propose a novel approach that can detect unknown malicious code, which is not well detected by a signature-based detection. Our method can detect new malicious codes even though the codes' signatures are not in the pattern database of Anti-Virus program. Moreover, our method can overcome various obfuscation techniques such as the frequent change of the included redirection URL in the malicious codes. Finally, we confirm that our proposed system shows better detection performance rather than MC-Finder, which adopts pattern matching, Google's crawling based malware site detection, and McAfee.

A Study on Considerations in the Authority Control to Accommodate LRM Nomen (LRM 노멘을 수용하기 위한 전거제어시 고려사항에 관한 연구)

  • Lee, Mihwa
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.1
    • /
    • pp.109-128
    • /
    • 2021
  • This paper is to explore considerations in authority control to accommodate LRM nomen entities through the literature reviews, the analysis of RDA rules, and the opinion survey of domestic catalog experts. As a result, for authority control, considerations were proposed in the aspect of nomen's attribute elements, catalog description, and MARC authority format. First, it is necessary to describe in as much detail as possible the category, the scheme, intended audience, the context of use, the reference source, the language, the script, the script conversion as the attributes of the nomen with the status of identification, note, and indifferentiated name indicators added in RDA. Second, the description method of attribute elements and relational elements of nomen can be unstructured, structured, identifier, and IRI as suggested in RDA, and vocabulary encoding scheme (VES) and string encoding scheme (SES) should be written for structured description, Also, cataloging rules for structuring authorized access points and preferred names/title should be established. Third, an additional expansion plan based on Maxwell's expansion (draft) was proposed in order to prepare the MARC 21 authority format to reflect the LRM nomen. (1) The attribute must be described in 4XX and 5XX so that the attribute can be entered for each nomen, and the attributes of the nomen to be described in 1XX, 5XX and 4XX are presented separately. (2) In order to describe the nomen category, language, script, script conversion, context of use, and date of usage as a nomen attribute, field and subfield in MARC 21 must be added. Accordingly, it was proposed to expand the subfield of 368, 381, and 377, and to add fields to describe the context of use and date of usage. The considerations in authority control for the LRM nomen proposed in this paper will be the basis for establishing an authority control plan that reflects LRM in Korea.

Improved Method for Learning Context-Free Grammar using Tabular representation

  • Jung, Soon-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.2
    • /
    • pp.43-51
    • /
    • 2022
  • In this paper, we suggest the method to improve the existing method leaning context-free grammar(CFG) using tabular representation(TBL) as a chromosome of genetic algorithm in grammatical inference and show the more efficient experimental result. We have two improvements. The first is to improve the formula to reflect the learning evaluation of positive and negative examples at the same time for the fitness function. The second is to classify partitions corresponding to TBLs generated from positive learning examples according to the size of the learning string, proceed with the evolution process by class, and adjust the composition ratio according to the success rate to apply the learning method linked to survival in the next generation. These improvements provide better efficiency than the existing method by solving the complexity and difficulty in the crossover and generalization steps between several individuals according to the size of the learning examples. We experiment with the languages proposed in the existing method, and the results show a rather fast generation rate that takes fewer generations to complete learning with the same success rate than the existing method. In the future, this method can be tried for extended CYK, and furthermore, it suggests the possibility of being applied to more complex parsing tables.

Target engagement of ginsenosides in mild cognitive impairment using mass spectrometry-based drug affinity responsive target stability

  • Zhu, Zhu;Li, Ruimei;Qin, Wei;Zhang, Hantao;Cheng, Yao;Chen, Feiyan;Chen, Cuihua;Chen, Lin;Zhao, Yunan
    • Journal of Ginseng Research
    • /
    • v.46 no.6
    • /
    • pp.750-758
    • /
    • 2022
  • Background: Mild cognitive impairment (MCI) is a transitional condition between normality and dementia. Ginseng is known to have effects on attenuating cognitive deficits in neurogenerative diseases. Ginsenosides are the main bioactive component of ginseng, and their protein targets have not been fully understood. Furthermore, no thorough analysis is reported in ginsenoside-related protein targets in MCI. Methods: The candidate protein targets of ginsenosides in brain tissues were identified by drug affinity responsive target stability (DARTS) coupled with label-free liquid chromatography-mass spectrometry (LC-MS) analysis. Network pharmacology approach was used to collect the therapeutic targets for MCI. Based on the above-mentioned overlapping targets, we built up a proteineprotein interaction (PPI) network in STRING database and conducted gene ontology (GO) enrichment analysis. Finally, we assessed the effects of ginseng total saponins (GTS) and different ginsenosides on mitochondrial function by measuring the activity of the mitochondrial respiratory chain complex and performing molecular docking. Results: We screened 2526 MCI-related protein targets by databases and 349 ginsenoside-related protein targets by DARTS. On the basis of these 81 overlapping genes, enrichment analysis showed the mitochondria played an important role in GTS-mediated MCI pharmacological process. Mitochondrial function analysis showed GTS, protopanaxatriol (PPT), and Rd increased the activities of complex I in a dose-dependent manner. Molecular docking also predicted the docking pockets between PPT or Rd and mitochondrial respiratory chain complex I. Conclusion: This study indicated that ginsenosides might alleviate MCI by targeting respiratory chain complex I and regulating mitochondrial function, supporting ginseng's therapeutic application in cognitive deficits.

Comparison of Commercial Multi-use Mask Patterns for Korean Adult Women

  • Cha, Su-Joung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.10
    • /
    • pp.185-193
    • /
    • 2022
  • This study attempted to compare and analyze the commercially available multi-use patterns to develop mask patterns suitable for the face types of adult women. Through this, it was intended to provide necessary data to mask pattern development and products. As a results of comparing the dimensions and shapes of commercial multi-use mask patterns, there was a significant difference in dimensions even though it was a L-size mask manufactured for adults. As a result of the appearance evaluation of the virtual outfit, there were significant differences by design in the vertical of the center front line, the cover and space of the mask, the height of the nose, and the lower part of the mask. The side also showed significant differences in the covering of the side of the face, the space of the side, and the width and length of the string. As a result of the appearance evaluation, Mask 4 received the best evaluation. The shape of the mask pattern had a large dart in the lower part of the nose so that it can cover the three-dimensional shape of the face, but there was a difference in the degree and angle of the curve depending on the mask. Although the upper part of the mask, the lower part of the mask, and the cheek part are in close contact, the evaluation of the mask pattern, which has room in the nose and mouth, was high. It is thought that the mask pattern should be set according to the upper length, lower length, and nose height of the mask through analysis of the face shape and dimensions.