• Title/Summary/Keyword: Translation service

Search Result 120, Processing Time 0.026 seconds

The Directions for the Development of Korean Online Mediation System for e-Commerce Dispute Resolution (전자상거래 분쟁해결을 위한 우리나라 온라인 조정제도의 발전방향)

  • Kim, Sun-Kwang;Hong, Sung-Kyu
    • International Commerce and Information Review
    • /
    • v.6 no.2
    • /
    • pp.43-62
    • /
    • 2004
  • The present study reviewed the meanings of mediation and the roles of mediators, and examined the necessities of online mediation system, prerequisites for the settlement of the system, foreign cases of promoting online mediation and the current state of online mediation in Korea. It also identified problems in the mediation system in Korea and, based on the analysis of problems, discussed directions for the development of Korean mediation system in broad perspective. Directions for the development of Korean online mediation system suggested in this study can be summarized as follows. Firstly, the government must make an unsparing investment in order to activate online mediation system in Korea. Secondly, from the aspect of online mediation procedure, it is necessary to introduce online mediation system in combination with online seal system or certification marks. Thirdly, the judicial circle must take an amicable attitude toward ADR system and, furthermore, it is necessary for the court to be active in introducing various ADR systems. Fourthly, it is necessary to establish an integrated mediation system for the efficiency of mediation and cost saving. Fifthly, mediators must be provided with systematic and exhaustive periodical retraining programs. Lastly, it is necessary to help people to recognize that mediation system is a better service than other forms of dispute resolution procedure and particularly to enhance users' confidence in online mediation through advertising its advantages and safety. Moreover, in order to make e-commerce-related online dispute resolution available to everybody, it is necessary to overcome language barriers by establishing perfect service systems including automatic translation system in the governmental dimension.

  • PDF

A Study on Analysis of Current Status and Improvement Suggestions for Massive Open Online Courses (온라인 공개 강좌 MOOC의 현황 분석 및 개선안 연구)

  • Bae, Ye-Sun;Jun, Woo-Chun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.3005-3012
    • /
    • 2014
  • Massive Open Online Courses(MOOC), originally started from United States, have recently received a great deal of attention all over the world. MOOC means free online courses that anyone can attend anytime. In Korea, KERIS(Korea Education and Research Information Service) and some universities provide various MOOC services. The purpose of this paper is to present current status and improvement suggestions of MOOC. We first introduce the formal definition and history of MOOC, then discuss current status of MOOC services in Korea and other countries. We finally present improvement suggestions that include induction of active participation for universities, value creation for campus, development of revenue model, providing motivation to students for finishing courses, development of LMS(Learning Management System), securing well-trained lecturers, translation of lecture materials, ensuring quality of authentification system of MOOC services.

MPICH-GP : An MPI Extension to Supporting Private IP Clusters in Grid Environments (MPICH-GP : 그리드 상에서 사설 IP 클러스터 지원을 위한 MPI 확장)

  • Park, Kum-Rye;Yun, Hyun-Jun;Park, Sung-Yong;Kwon, Oh-Young;Kwon, Oh-Kyoung
    • The KIPS Transactions:PartA
    • /
    • v.14A no.1 s.105
    • /
    • pp.1-14
    • /
    • 2007
  • MPICH-G2 is an MPI implementation to solve complex computational problems by utilizing geographically dispersed computing resources in grid environments. However, the computation nodes in MPICH-G2 are exposed to the external network due to the lack of supporting the private IP clusters, which raises the possibility of malicious security attacks. In order to address this problem, we propose MPICH-GP with a new relay scheme combining NAT(Network Address Translation) service and an user-level proxy. The proxy running on the front-end system of private IP clusters forwards the incoming connection requests to the systems inside the clusters. The outgoing connection requests out of the cluster are forwarded through the NAT service on the front-end system. Through the connection path between the pair of processes, the requested MPI jobs can be successfully executed in grid environments with various clusters including private IP clusters. By simulations, we show that the performance of MPICH-GP reaches over 80% of the performance of MPICH-G2, and over 95% in ease of using RANK management method.

A Comparative Study on the Differences of Arbitration Systems between Mongol and Korea (몽골 중재제도의 주요특징과 유의사항에 관한 연구)

  • Kim, Suk-Chul
    • Journal of Arbitration Studies
    • /
    • v.23 no.4
    • /
    • pp.55-76
    • /
    • 2013
  • This study aims to analyze the main features of Mongolian arbitration system compared with Korean Arbitration Law which was revised under the UNCITRAL Arbitration Model Law. On the basis of this comparative study, certain differences are suggested: First, the environment of Mongolian arbitration is still insufficient in terms of its operation and usage at the international level. Second, the Mongol National Arbitration Court has established Ad-hoc Arbitration Rules and has promoted Ad-hoc Arbitration although it is an institutional arbitration organization. Third, the arbitration objects are defined as the types of tangible and intangible assets in Mongolia which are different from those of the Korean Arbitration Law. Accordingly, court and officer disputes, family disputes, labor-management relations, and criminal matters are covered by the arbitration objects. Fourth, Mongol Arbitration Law specifies the following persons disqualified for arbitrator appointment: the member of the Constitutional Court, judge, procurator, inquiry officer, investigator, court decision enforcement officer, attorney, or notary who has previously rendered legal service to any party of the disputes, and any officials who are prohibited by laws to be engaged in positions above the scope of their duties. Fifth, the arbitrator selection and appointment criteria should be documented, and the arbitrator should have the ability to resolve the disputes independently and fairly and achieve concord from both parties. Sixth, if there is no agreement between the parties, the arbitration language should be Mongolian, and the arbitral tribunal has no power to decide on it. Seventh, despite the agreement for a documentary hearing between the parties, there should be provided opportunities for an oral hearing if either of the parties requires it. Eighth, if the parties do not understand the language of the arbitration, the parties can directly ask the translation service. They should also keep secrets in the process of arbitration. Ninth, the cancellation of arbitral award is allowed by the application of the parties, not by the authority of the court. Except for the nine differences above, the Mongolian arbitration system is similar to that of the Korean Arbitration Law. This paper serves to contribute to the furtherance in trade relationship between Mongolia and Korea after the rapid and efficient resolution of disputes.

  • PDF

Design of the Shortcut based Integrated & Advanced Networking Server(IANS) for QoS path (QoS 경로 설정을 위한 Shortcut 기반 통합 서버 설계)

  • 김기영;이상호
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.4
    • /
    • pp.74-84
    • /
    • 2001
  • In the current Internet, InteServ model based on Resource reSerVation Protocol (RSVP), DiffServ Model based on service differentiation according to per hope behavior(PHB) and traffic engineering policy, and two-tire model of above mentioned two models which are adapted differently as the target network status for providing the end-to-end QoS Path are suggested. But, when we integrated this internet QoS into the ATM based network, differences of the connection setup procedure, name/address translation methods, and QoS provisioning mechanisms for end-to-end path setup procedures are introduced. In this paper, we propose the method of shortcut based QoS path setup procedure to solve these problems, and to guarantee the integration and scalability of Next Generation Internet(NGI) names/address in Integrated IP network into ATM based network. This network should support the engineering differentiated into the multiple service classes, which depend on established by this path is designed suitably into the target router and host step by step. In the near future, this function which provide the QoS guaranteed path based on end-to-end shortcut between the configuration devices are extended into the NGI target network.

  • PDF

Modeling and Implementation of Multilingual Meta-search Service using Open APIs and Ajax (Open API와 Ajax를 이용한 다국어 메타검색 서비스의 모델링 및 구현)

  • Kim, Seon-Jin;Kang, Sin-Jae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.5
    • /
    • pp.11-18
    • /
    • 2009
  • Ajax based on Java Script receives attention as an alternative to ActiveX technology. Most portal sites in korea show a tendency to reopen existing services by combining the technology, because it supports most web browsers, and has the advantages of such a brilliant interface, excellent speed, and traffic reduction through asynchronous interaction. This paper modeled and implemented a multilingual meta-search service using the Ajax and open APIs provided by international famous sites. First, a Korean query is translated into one of the language of 54 countries around the world by Google translation API, and then the translated result is used to search the information of the social web sites such as Flickr, Youtube, Daum, and Naver. Searched results are displayed fast by dynamic loading of portion of the screen using Ajax. Our system can reduce server traffic and per-packet communications charges by preventing redundant transmission of unnecessary information.

Multicast Secure Architecture based on PIM-SM (소규모 멀티캐스트를 기반으로 한 멀티캐스트 보안구조)

  • 김성선;이상순;정영목
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.2
    • /
    • pp.116-122
    • /
    • 2001
  • A conventional multicast secure protocol. MVMRP, CBT is designed for a large scaled r protocol so the PIM-SM (protect Independent Multicst-Sparse Mode) routing protocol which small number of clients, long distance path among the hosts and shortest path routing chara weak point of require it's own Core tree and re-keying when the traffic is pass through the ro In this study, proposes a architect for a licit information secure of join/leave to all the user or on-service user. With proposed architect, subgroups for multicast secure group mana will be divided by RP (Rendezvous-Point) unit and each RP has a subgroup manager. As a result, the transmitting time is shortened because there is no need to data translation by group key on data sending and the whole architecture size is samller than the other multicast secure architecture.

Design of Multicast Group Key Management Protocol for Information Security in PIM_SM (PIM-SM 정보 보안을 위한 멀티캐스트 그룹 키 관리 프로토콜 설계)

  • 홍종준
    • Journal of Internet Computing and Services
    • /
    • v.3 no.5
    • /
    • pp.87-94
    • /
    • 2002
  • This paper proposes a group key management protocol for a secure of all the multcast user in PIM-SM multicast group communication. Each subgroup manager gives a secure key to it's own transmitter and the transmitter compress the data with it's own secure key from the subgroup manager, Before the transmitter send the data to receiver, the transmitter prepares to encrypt a user's service by sending a encryption key to the receiver though the secure channel. after checking the user's validity through the secure channel, As the transmitter sending a data after then, the architecture is designed that the receiver will decode the received data with the transmitter's group key, Therefore, transmission time is shortened because there is no need to data translation by the group key on data sending and the data transmition is possible without new key distribution at path change to shortest path of the router characteristic.

  • PDF

The Design and Implementation of Domain Model Based Electronic Document Translation System in e-business Environment (e-비즈니스 환경 하에서의 도메인 모델 방식 기반의 전자문서 변환시스템 설계 및 구현)

  • Shim, Eon-Seob;Kim, Jin-Woo;Baik, Doo-Kwon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.377-381
    • /
    • 2006
  • e-Business 환경이 다양화되고 활성화되면서, 전자적으로 교환되는 문서의 종류와 형태가 다양해지고 있다. 다양한 문서 형태를 지원해야 하는 요구사항이 대두되고 이를 충족하기 위해 하나 이상의 문서 변환 시스템을 도입하여 사용하고 있다. 기존의 문서 변환 시스템은 하나 또는 두 가지의 문서 형태만을 지원함으로 인해, 동시에 다양한 문서 형태를 지원할 수 없는 단점이 존재하였다. 또한 단일 형태의 문서 변환만을 지원하고 있어 문서 형태별 변환 기능을 지원할 수 없고 파싱된 문서 요소와 비즈니스 로직이 혼합되어 순차적으로 처리됨으로써, 처리가 완료되기 전까지 하나의 트랜잭션으로 처리되고 있다. 변환 절차가 하나의 트랜잭션 내에서 처리됨으로 인해 정보의 재사용성이나 효율적으로 시스템 자원을 사용할 수 없었다. 이러한 문제를 해결하기 위해 본 논문에서는 문서 형태별 비즈니스 로직을 포함하는 전자문서변환 시스템을 도메인 모델방식 개념을 기반으로 설계, 구현함으로써 개선 가능한 시스템을 제안하고자 한다. 본 논문은 제안 시스템을 통해 기능별로 모듈화가 가능하게 되고 트랜잭션도 단계별로 분리하여, 처리 복잡성을 해결할 뿐 아니라, SOA(Service Oriented Architecture)기반의 진보된 개념을 쉽게 적용 가능한 확장성을 갖추는데 그 의의가 있다.

  • PDF

Intrusion Detection: Supervised Machine Learning

  • Fares, Ahmed H.;Sharawy, Mohamed I.;Zayed, Hala H.
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.4
    • /
    • pp.305-313
    • /
    • 2011
  • Due to the expansion of high-speed Internet access, the need for secure and reliable networks has become more critical. The sophistication of network attacks, as well as their severity, has also increased recently. As such, more and more organizations are becoming vulnerable to attack. The aim of this research is to classify network attacks using neural networks (NN), which leads to a higher detection rate and a lower false alarm rate in a shorter time. This paper focuses on two classification types: a single class (normal, or attack), and a multi class (normal, DoS, PRB, R2L, U2R), where the category of attack is also detected by the NN. Extensive analysis is conducted in order to assess the translation of symbolic data, partitioning of the training data and the complexity of the architecture. This paper investigates two engines; the first engine is the back-propagation neural network intrusion detection system (BPNNIDS) and the second engine is the radial basis function neural network intrusion detection system (BPNNIDS). The two engines proposed in this paper are tested against traditional and other machine learning algorithms using a common dataset: the DARPA 98 KDD99 benchmark dataset from International Knowledge Discovery and Data Mining Tools. BPNNIDS shows a superior response compared to the other techniques reported in literature especially in terms of response time, detection rate and false positive rate.