• Title/Summary/Keyword: electronic documents

Search Result 425, Processing Time 0.03 seconds

Research on the Safety Inspection Plan of Outdoor Advertising Safety Using Drone (드론을 활용한 옥외광고물 안전도 검사 방안에 관한 연구)

  • Jeong, Hee-Jeong;Lee, Suk-Hyung;Chang, Hye-Jung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.530-538
    • /
    • 2020
  • Safety inspections of outdoor advertisements are conducted to determine the aging status, specifications, and compliance with design documents. Regular inspections are conducted on outdoor advertisements from a safety perspective, as they not only undermine the aesthetic elements of the city but also could cause falls on roads or pedestrian paths. However, the current safety inspection methods are at risk of various accidents during the inspection advertisements on the outer wall of the building. And it is difficult to conduct in-depth inspections on them if they are fixed to the elevation of the building. Furthermore, there also is a risk of safety accidents, such as advertising structures falling onto a pedestrian path. Therefore, this paper aims to enhance the safety inspection system of outdoor advertisements using drones. This paper also intends to propose measures for facility inspection history management such as safety inspection cycle, maintenance, and removal of signboards.

Efficient Hangul Word Processor (HWP) Malware Detection Using Semi-Supervised Learning with Augmented Data Utility Valuation (효율적인 HWP 악성코드 탐지를 위한 데이터 유용성 검증 및 확보 기반 준지도학습 기법)

  • JinHyuk Son;Gihyuk Ko;Ho-Mook Cho;Young-Kuk Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.71-82
    • /
    • 2024
  • With the advancement of information and communication technology (ICT), the use of electronic document types such as PDF, MS Office, and HWP files has increased. Such trend has led the cyber attackers increasingly try to spread malicious documents through e-mails and messengers. To counter such attacks, AI-based methodologies have been actively employed in order to detect malicious document files. The main challenge in detecting malicious HWP(Hangul Word Processor) files is the lack of quality dataset due to its usage is limited in Korea, compared to PDF and MS-Office files that are highly being utilized worldwide. To address this limitation, data augmentation have been proposed to diversify training data by transforming existing dataset, but as the usefulness of the augmented data is not evaluated, augmented data could end up harming model's performance. In this paper, we propose an effective semi-supervised learning technique in detecting malicious HWP document files, which improves overall AI model performance via quantifying the utility of augmented data and filtering out useless training data.

A Empirical Study on Determinants Affecting the Participation and Performance of Small and Medium-Size Enterprises in Global Electronic Commerce (해외직구·역직구시장에서 중소기업의 참여와 성과에 영향을 미치는 결정요인에 관한 실증연구)

  • Kim, Chang Bong;Min, Cheol Hong;Park, Sang An
    • International Commerce and Information Review
    • /
    • v.18 no.4
    • /
    • pp.3-29
    • /
    • 2016
  • Recently, the market size of the global electronic-commerce is rapidly growing. The global market size of an overseas direct-purchase is expected to reach 1 trillion won by 2020. This study intends to determine the decision making factors of B2B overseas direct-purchase(DP) and reverse direct-purchase(RDP), and the impact on the vitalization of the small to middle-sized companies'(SMC) overseas DP and RDP. Ultimately, the purpose of this study is to provide a policy insight on the expansion of exports by SMC. For this, we determined the necessary elements for getting good results by Korean SCM in the overseas DP and RDP market through a preceding research based on resource-based theory and industry structure theory. Afterwards, we used the multiple regression model for positive analysis of the survey documents. We were able to confirm through analysis that the company information, logistics delivery, customs process, law and regulations have positive effects on the overseas DP and RDP. This study surveyed the entire overseas DP market, rather than focusing on the cases of harm and responses of the overseas DP, which was the topic for the preceding research, and can be differentiated from the previous study by deducting influence factors for the Korean SMC to succeed in the overseas DP and RDP market. Moreover, the results of this study is meaningful in proposing a strategic direction for the SMC participating in the overseas DP market and the government enacting policies.

  • PDF

Empirical Verification of Conversion and Restoration of Preservation Format for Dataset: Application of Dataset with Disaster Safety Information to SIARD (데이터세트 보존포맷 검증방안에 관한 연구: 재난안전정보 데이터세트의 SIARD 적용을 통해)

  • Han, Hui-Jeong;Yoon, Sung-Ho;Oh, Hyo-Jung;Yang, Dongmin
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.2
    • /
    • pp.251-284
    • /
    • 2020
  • As the use of information has emerged as the core of national competitiveness, major developed countries and the Korean government have realized the importance of data. They have pursued technical research and standard establishment for long-term preservation and continuously strived for systematic management and preservation of data. However, although various types of data are specified for the purpose of record management in the law, there is no specific method on how to collect, manage and preserve them, except standard electronic documents. In particular, management and preservation of huge datasets from the administrative information system have been strongly demanded above all. Any guidelines for datasets do not have been properly provided. After the framework for selecting preservation format must be prepared, the system can be supplemented and built. The framework considering the characteristics of the dataset should be specified more concretely, and empirical verification of the conversion and restoration for the dataset preservation format derived according to the selection criteria is necessary. Therefore, this study intends to propose a method for long-term preservation through empirical verification of the preservation format after deriving an evaluation the framework for the preservation format selection criteria considering the characteristics of the dataset.

A Countermeasures on Credit Card Crime Using Personal Credit Information (개인신용정보이용 신용카드범죄에 대한 대처방안)

  • Kim, Jong-Soo
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.27-68
    • /
    • 2005
  • Recently, because credit card crime using a personal credit information is increasing, professionalizing, and spreading the area, the loss occurring from credit card crime is enormous and is difficult to arrest and punish the criminals. At past, crime from forging and counterfeiting the credit card was originated by minority criminals, but at present, the types and appearance of credit card crime is very different to contrasting past crime. The numbers of people using credit card in the middle of 1990's was increasing and barometer of living conditions was evaluated by the number having credit card, therefore this bad phenomenon occurring from credit card crime was affected by abnormal consumption patterns. There is no need emphasizing the importance of personal credit card in this credit society. so, because credit card crime using personal credit card information has a bad effect, and brings the economic loss and harms to individuals, credit card company, and members joining credit card. Credit card crime using personal credit card information means the conduct using another people's credit card information(card number, expiring duration, secret number) that detected by unlawful means. And crime using dishonest means from another people's credit information is called a crime profiting money-making and a crime lending an illegal advance by making false documents. A findings on countermeasures of this study are as follows: Firstly, Diverting user's mind, improving the art of printing, and legitimating password from payment gateway was suggested. Secondly, Complementing input of password, disseminating the system of key-board protection, and promoting legitimations of immediate notification duty was suggested. Thirdly, Certificating the electronic certificates as a personal certificates, assuring the recognition by sense organ of organism, and lessening the ratio of crime occurrence, and restricting the ratio of the credit card crime was suggested.

  • PDF

A Study of the Automatic Extraction of Hypernyms arid Hyponyms from the Corpus (코퍼스를 이용한 상하위어 추출 연구)

  • Pang, Chan-Seong;Lee, Hae-Yun
    • Korean Journal of Cognitive Science
    • /
    • v.19 no.2
    • /
    • pp.143-161
    • /
    • 2008
  • The goal of this paper is to extract the hyponymy relation between words in the corpus. Adopting the basic algorithm of Hearst (1992), I propose a method of pattern-based extraction of semantic relations from the corpus. To this end, I set up a list of hypernym-hyponym pairs from Sejong Electronic Dictionary. This list is supplemented with the superordinate-subordinate terms of CoroNet. Then, I extracted all the sentences from the corpus that include hypemym-hyponym pairs of the list. From these extracted sentences, I collected all the sentences that contain meaningful constructions that occur systematically in the corpus. As a result, we could obtain 21 generalized patterns. Using the PERL program, we collected sentences of each of the 21 patterns. 57% of the sentences are turned out to have hyponymy relation. The proposed method in this paper is simpler and more advanced than that in Cederberg and Widdows (2003), in that using a word net or an electronic dictionary is generally considered to be efficient for information retrieval. The patterns extracted by this method are helpful when we look fer appropriate documents during information retrieval, and they are used to expand the concept networks like ontologies or thesauruses. However, the word order of Korean is relatively free and it is difficult to capture various expressions of a fired pattern. In the future, we should investigate more semantic relations than hyponymy, so that we can extract various patterns from the corpus.

  • PDF

A Study on the Development of Reference Linking System Based on Digital Object Identifier for Korean Journal Articles (국내 학술지 논문의 DOI 기반 연계시스템 구축에 관한 연구)

  • 한혜영;정동열
    • Journal of the Korean Society for information Management
    • /
    • v.17 no.4
    • /
    • pp.207-227
    • /
    • 2000
  • Recenily, major internalional STM(Science, Trchnical, and Mcdivine) Publichers have been developing prototype systems that can provide the refeence linking of jouinal articles within the scholarly literature on a cross-publisher basis using the URN(Universal Resouree Name). In Korea, it is hard to find the efforts to link the scattered digitalized documents to an individual user through a unified web. In this study, a linking model for an inergrated gatewny fro, bibliographic information to full tcxt has been desugned and 'Electronic Research Resourced Linking system (E3R/LS)' has been developed as a prototype for centralized static reference linking system. There are three major components for constructing refrernce linking systems. The firsl componcnt the Digital Object Identifiet(DO1). is introduced as the public identifier inrended to be applied wherever thr item needs to be identified. For denl~iymg Korean journal articles, llie extended SICI(Serlal Ilem and Conlribut~on Idealifier) has becn newly dehed in 1111s study and is used as a suiiia on DOI. The reierence datubasc conlams the second com~onenl, metadiltil, linkcd to implemenied by all information providers. The CnRI resolution system is used for resolving a DOI into a URL as the third component.

  • PDF

The Effects of Relational Characteristics on the Performance of Business-to-Business Electronic Commerce (거래의 관계특성이 기업간 전자상거래 성과에 미치는 영향에 관한 연구)

  • 진영배
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.4
    • /
    • pp.28-40
    • /
    • 2000
  • As the surrounding of companies is more complicated and intensive. many companies attempt managerial innovations by using information technology(IT) strategically. Recently, information technology, especially Electronic Data Interchange(EDI), is highlighted in the surrounding of companies, because it is regarded as a core technology. EDI is the direct computer-to-computer exchange of business documents in standard formats. EDI brings many benefits to the organization such as reduced costs, faster turnaround, better customer service, and strategic advantage. The Purpose of this study is to identify the effects of relational characteristics-communication, trust, conflict, and commitment- on the performance of Business-to-Business EC. In other words, this study examine the relationships between each characteristics and the effects of these characteristics on the organizational performance. The results of empirical analysis revealed that communications between parties have positive influence on the trust and commitment, and high label of commitment on the EDI is improved the organizational performance. In addition, trust in parties indirectly affects characteristics has unexpectedly positive influence on the trust, commitment, and performance.

  • PDF

A Research on the Use of Information Resources of the Humanities Scholars in Korea (인문학자의 정보자원 이용에 관한 연구)

  • Yoon, Cheong-Ok
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.1
    • /
    • pp.7-34
    • /
    • 2009
  • The purpose of this study is to investigate the use of information resources of the humanities scholars in Korea and suggest the strategic planning of academic library and information services to serve their needs. To collect data, a mail survey was conducted during the period of November 2007 through January 2008. Out of 799 humanities scholars sampled from 25 universities, 132 responded with the completion rate of 16%. Major findings in this study are as follows: First, the majority of the humanities scholars distribute their time equally to research and education, and conduct independent research. Second, they still largely depend on print resources, including scholarly journals, books, and manuscripts for getting information, while using some online information resource mostly in text such as electronic documents and journals. They expect that the frequency of using such print resources would not decline much, but the use of online resources could definitely increase in the next five years. Some variances in the behavior were observed among the groups of scholars according to their research experiences. It is suggested that academic libraries (1) conduct more active outreach, (2) prioritize between traditional and electronic resources, (3) plan information literacy education for traditional resources.

Seeking Alternative Models and Research Trends for Big Deals in the Electronic Journal Consortium (전자저널 빅딜 계약의 연구 동향과 대안 탐색)

  • Kim, Sang-Jun;Kim, Jeong-Hwan
    • Journal of Information Management
    • /
    • v.42 no.1
    • /
    • pp.85-111
    • /
    • 2011
  • The purpose of this study was to seek a workable alternative to replace a big deal related to the journal budget for the maintenance of academic libraries with the largest issue on the E-journal consortium. The contents of this study was to present it. It had examined the current situation, strengths, weaknesses and corresponding to replace the big deal contract. After reviewing the literature, we looked into the alternative activities for the big deal such as open access-based, usage-based, consortium improvement-based, publishers lead, and other models. As a result, the 'consortium cost reapportion model' was an alternative for the KESLI. The alternative was in the short term for cost division format, but long-term oriented for a consortium single(bloc) payment type or national licence model. The model was based on the data from the last year. It had evaluated download the PDF and HTML documents, but the three times weighting more than others, and the rest of 14 factors of 0.5 to 5 out of 100 total score. The total amount negotiated by national units 10, 20 and 30 grades for the final step was allocated to the participating library on the KESLI consortium.