• Title/Summary/Keyword: Unfamiliar

Search Result 503, Processing Time 0.028 seconds

Malicious URL Detection by Visual Characteristics with Machine Learning: Roles of HTTPS (시각적 특징과 머신 러닝으로 악성 URL 구분: HTTPS의 역할)

  • Sung-Won HONG;Min-Soo KANG
    • Journal of Korea Artificial Intelligence Association
    • /
    • v.1 no.2
    • /
    • pp.1-6
    • /
    • 2023
  • In this paper, we present a new method for classifying malicious URLs to reduce cases of learning difficulties due to unfamiliar and difficult terms related to information protection. This study plans to extract only visually distinguishable features within the URL structure and compare them through map learning algorithms, and to compare the contribution values of the best map learning algorithm methods to extract features that have the most impact on classifying malicious URLs. As research data, Kaggle used data that classified 7,046 malicious URLs and 7.046 normal URLs. As a result of the study, among the three supervised learning algorithms used (Decision Tree, Support Vector Machine, and Logistic Regression), the Decision Tree algorithm showed the best performance with 83% accuracy, 83.1% F1-score and 83.6% Recall values. It was confirmed that the contribution value of https is the highest among whether to use https, sub domain, and prefix and suffix, which can be visually distinguished through the feature contribution of Decision Tree. Although it has been difficult to learn unfamiliar and difficult terms so far, this study will be able to provide an intuitive judgment method without explanation of the terms and prove its usefulness in the field of malicious URL detection.

Children's Inferring Word Meaning From Understanding of the Speaker's Mind (단어의미 추론에서 나타나는 아동의 마음이론)

  • Song, Young Joo
    • Korean Journal of Child Studies
    • /
    • v.27 no.2
    • /
    • pp.167-180
    • /
    • 2006
  • This study investigated how children rely on the mind of the speaker to infer unfamiliar words. Sixty 3 to 5-year-old children were interviewed individually with word inference and false belief tasks. Children's sensitivity to the speakers' intentions and prior experiences increased with age. Unexpectedly, their performance was not different with the condition of mind construct. Children's inferring word meanings were positively, but not significantly, correlated with understanding others' false beliefs.

  • PDF

International Exchanges for Aspiring Students in Engineering Field

  • Sato, Takashi;Sakamoto, Shuichi;Shimizu, Tadaaki;Ikeda, Hideki;Oka, Tetsuo
    • Journal of Engineering Education Research
    • /
    • v.15 no.4
    • /
    • pp.3-7
    • /
    • 2012
  • In 1996, the Faculty of Engineering, Niigata University, Japan entered an era of open student-exchange with Otto-von-Guericke-University Magdeburg, Germany. Thus far, more than 50 of our students have devoted anywhere from three months, to an entire year of their courses, to collaborative efforts with fellow students, (-and some cases, the local citizenry) -in their native environment experiencing unfamiliar education systems and cultures.

Bechet`s Disease with Multiple Aterial Abeurysm; A Case Report (Bechet`s disease에 동반된 다발성 동맥류;1례 보고)

  • 조재호
    • Journal of Chest Surgery
    • /
    • v.26 no.4
    • /
    • pp.316-319
    • /
    • 1993
  • Although Behcet`s disease, characterized by oro-genital ulceration and ocular abnormalities, is rare and unfamiliar disease to thoracic surgeon, one must remember that it can cause serious complications on the vascular system such as thrombophlebitis,thrombotic obstuction and aneurysm.We report a case of multiple arterial aneurysms with Behcet`s disease. This 31 year-old female had five times surgical interventions during short period[19 months]. 6 aneurysms were developed in this case, 3 were spontaneous aneurysms, 2 were anastomotic aneurysms and 1 was false aneurysm due to arterial puncture.

  • PDF

A Microcomputer Program for Loading Pattern of Pallet and Container (컨테이너와 팔레트 적재패턴에 대한 마이크로 컴퓨터 프로그램)

  • Hwang, Hark;Lim, Joon-Mook
    • IE interfaces
    • /
    • v.5 no.2
    • /
    • pp.75-85
    • /
    • 1992
  • A common problem for manufacturing industries, especially consumer goods industries, is how to establish standardized procedures for loading finished goods onto pallets or containers for subsequent storage and distribution. Utilizing previous research results on the palletizing problem, this paper develops micro-computer based programs which generate an optimum loading pattern leading to the minimum amount of unused pallet or container space. Development of pallet layout chart is also included in the computer programs. The results are displayed by computer-graphic. For the users who are unfamiliar with pallet loading problem and computer system, pull-down menu and user-computer interactive data input procedures are adopted.

  • PDF

A Study on the Evaluation of Commercial Softwares for Bank Risk Management by AHP (AHP 기법에 의한 금융위험관리 소프트웨어 평가에 관한 연구)

  • 최희성;황규승
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.16 no.2
    • /
    • pp.51-51
    • /
    • 1991
  • Recently financial institutions in Korea are experiencing an unfamiliar challenge in terms of their operational risk management due to the volatility of global financial market and the incessant development of new financial products. In this paper, we present an AHP(Analytic Hierarchy Process) model to evaluate the effectiveness of commercial softwares for risk management in banking. The AHP model considers software's performance. utility, serviceability and durability as major evaluation criteria. The weight of each criterion is generated by the questionnaire survey given to practitioners in risk management in domestic commercial banks.

Design of the Busan-Geoje Fixed Links Immersed tunnel (기획특집 - 거가대교 침매터널의 설계)

  • Lee, Jung-Sang
    • Journal of the Korean Professional Engineers Association
    • /
    • v.43 no.2
    • /
    • pp.30-33
    • /
    • 2010
  • Immersed tunnel had been a rather new term in Korea before Busan-Geoje fixed link project was started and became known through the media. Although Korean is unfamiliar with the immersed tunnel, this construction method has a long history in the world. Busan-Geoje Fixed Link immersed tunnel consist of 18 elements and each element is approximately 180m long. These tunnel elements are prefabricated of reinforced concrete in a temporary dry dock and are towed to the site and lowered into final position in a dredged trench and are placed on a screeded gravel bed directly without temporary support.

  • PDF

Visualizer: An Interactive Execution Tool for Java Programs

  • Kim, Hyung-Rok;Kim, Yong-Seok
    • Journal of Industrial Technology
    • /
    • v.26 no.B
    • /
    • pp.215-220
    • /
    • 2006
  • Effective use of debugging in computer science education is a topic that has received little attention. Existing tools either are too overwhelming for the novice or are too basic and inflexible. Furthermore, the integration of the debugger into complex IDEs have unfamiliar debuggers from students, resulting in a harmful proliferation of console I/O. In this paper, a new stand-alone educational debugging tool is presented, with simple but powerful tools for easily observing and modifying program execution state. This tool is analyzed from an user perspective, and is compared with existing tools.

  • PDF

A Study on the Evaluation of Commercial Softwares for Bank Risk Management by AHP (AHP 기법에 의한 금융위험관리 소프트웨어 평가에 관한 연구)

  • 최희승;황규승
    • Korean Management Science Review
    • /
    • v.16 no.2
    • /
    • pp.51-59
    • /
    • 1999
  • Recently financial institutions in Korea are experiencing an unfamiliar challenge in terms of their operational risk management due to the volatility of global financial market and the incessant development of new financial products. In this paper, we present an AHP(Analytic Hierarchy Process) model to evaluate the effectiveness of commercial softwares for risk management in banking. The AHP model considers software's performance. utility, serviceability and durability as major evaluation criteria. The weight of each criterion is generated by the questionnaire survey given to practitioners in risk management in domestic commercial banks.

  • PDF

Protocol Design for Opportunistic Direct M2M Communication in Wearable Computing Environment (웨어러블 단말과 이웃 단말 간 기회기반 직접 사물통신 프로토콜 설계)

  • Oh, Young-Ho;Lee, Jae-Shin;Kang, Soon-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.2
    • /
    • pp.151-163
    • /
    • 2014
  • The recent wearable device's applications concentrates on providing diverse services such as location based service, context aware service to the users. These various services are implemented by the interactions between the wearable device and the user. In the legacy system, the interaction requires certain explicit configuration from the user. If the user is unfamiliar with the IT technology, it will be impossible to get the wanted service. Therefore, a new autonomous communication concept among neighbor devices is essential for people who is unfamiliar with the IT technology. The implicit human computer interface enables the user to acquire the services, even though the user don't know the IT technology. In this paper, we propose two BLE based protocols (B-LIDx protocol, B-PniP). B-LIDx protocol is the protocol for locationing the mobile device in indoor. B-PniP is a zero-configure opportunistic direct M2M communication protocol between neighbor devices to achieve the autonomous communication concept with zero-configuration. The protocol's evaluations are performed by measuring the time for finding the location of a mobile device in actual environment and aligning the time spent in services using the B-PniP.