• Title/Summary/Keyword: 가상의

Search Result 12,350, Processing Time 0.046 seconds

Graph Database Benchmarking Systems Supporting Diversity (다양성을 지원하는 그래프 데이터베이스 벤치마킹 시스템)

  • Choi, Do-Jin;Baek, Yeon-Hee;Lee, So-Min;Kim, Yun-A;Kim, Nam-Young;Choi, Jae-Young;Lee, Hyeon-Byeong;Lim, Jong-Tae;Bok, Kyoung-Soo;Song, Seok-Il;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.12
    • /
    • pp.84-94
    • /
    • 2021
  • Graph databases have been developed to efficiently store and query graph data composed of vertices and edges to express relationships between objects. Since the query types of graph database show very different characteristics from traditional NoSQL databases, benchmarking tools suitable for graph databases to verify the performance of the graph database are needed. In this paper, we propose an efficient graph database benchmarking system that supports diversity in graph inputs and queries. The proposed system utilizes OrientDB to conduct benchmarking for graph databases. In order to support the diversity of input graphs and query graphs, we use LDBC that is an existing graph data generation tool. We demonstrate the feasibility and effectiveness of the proposed scheme through analysis of benchmarking results. As a result of performance evaluation, it has been shown that the proposed system can generate customizable synthetic graph data, and benchmarking can be performed based on the generated graph data.

Development of a Bodice BlockforWomen in Their 20s with a Turtle Neck Syndrome Body Shape (거북목 증후군 체형의 20대 여성의 상의 원형패턴 개발)

  • Seo, Yoo Ra;Kim, Hyo Sook
    • Journal of Fashion Business
    • /
    • v.25 no.3
    • /
    • pp.144-158
    • /
    • 2021
  • The purpose of this study is to develop a bodice block suitable for women in their 20s with turtle neck syndrome. The problem of turtle neck syndrome body type was derived through the evaluation of bodice blocks. First, the length of the front bodice was longer and the length of the back bodice was shorter. Second, the front neck point, back neck point, and the shoulder line were not in place. Third, the side neck was pushed up. Fourth, the length of armhole was long and it floated. Fifth, the front hem was attached to the body and the back hem was away from the body. A finally developed pattern was designed by developing four test patterns to solve the problem that appeared in a selected bodice pattern, and a t-test was conducted to determine the difference in the appearance evaluation by virtual clothing between the two patterns, bodice block and the development pattern. According to the result, the fit was not good from the side body because the position of the side neck point was not in a place due to the characteristics of the body shape of turtle neck syndrome, but the problems of the anterior neck position, the position of the back neck point, the shoulder line position, and the armhole shape were improved in the developed pattern.

Design of Distributed Hadoop Full Stack Platform for Big Data Collection and Processing (빅데이터 수집 처리를 위한 분산 하둡 풀스택 플랫폼의 설계)

  • Lee, Myeong-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.7
    • /
    • pp.45-51
    • /
    • 2021
  • In accordance with the rapid non-face-to-face environment and mobile first strategy, the explosive increase and creation of many structured/unstructured data every year demands new decision making and services using big data in all fields. However, there have been few reference cases of using the Hadoop Ecosystem, which uses the rapidly increasing big data every year to collect and load big data into a standard platform that can be applied in a practical environment, and then store and process well-established big data in a relational database. Therefore, in this study, after collecting unstructured data searched by keywords from social network services based on Hadoop 2.0 through three virtual machine servers in the Spring Framework environment, the collected unstructured data is loaded into Hadoop Distributed File System and HBase based on the loaded unstructured data, it was designed and implemented to store standardized big data in a relational database using a morpheme analyzer. In the future, research on clustering and classification and analysis using machine learning using Hive or Mahout for deep data analysis should be continued.

A survey on unsupervised subspace outlier detection methods for high dimensional data (고차원 자료의 비지도 부분공간 이상치 탐지기법에 대한 요약 연구)

  • Ahn, Jaehyeong;Kwon, Sunghoon
    • The Korean Journal of Applied Statistics
    • /
    • v.34 no.3
    • /
    • pp.507-521
    • /
    • 2021
  • Detecting outliers among high-dimensional data encounters a challenging problem of screening the variables since relevant information is often contained in only a few of the variables. Otherwise, when a number of irrelevant variables are included in the data, the distances between all observations tend to become similar which leads to making the degree of outlierness of all observations alike. The subspace outlier detection method overcomes the problem by measuring the degree of outlierness of the observation based on the relevant subsets of the entire variables. In this paper, we survey recent subspace outlier detection techniques, classifying them into three major types according to the subspace selection method. And we summarize the techniques of each type based on how to select the relevant subspaces and how to measure the degree of outlierness. In addition, we introduce some computing tools for implementing the subspace outlier detection techniques and present results from the simulation study and real data analysis.

Economic Activities in Digital Platforms: Types, Natures, Risks, Policy Suggestions (플랫폼 경제활동에 대한 시론적 고찰: 유형, 특성, 예상위험, 정책대안을 중심으로)

  • Kim, Suyoung;Kang, Myungjoo;Ha, Eunsol
    • 한국사회정책
    • /
    • v.25 no.4
    • /
    • pp.199-231
    • /
    • 2018
  • The development of ICT has led to changes in the pattern and the meaning of work and requires restructuring of the existing social security system, which was established chiefly for the wage workers in the industrial economy. However, while economic activities within the digital platform markets are different from industrial labour, there is still a lack of discussion on what social problems platform workers can face and how to cope with them. As a comprehensive sketch of economic activities in platform economy, this study identifies the types of platform workers and analyses three characteristics of their economic activities - flexibility, virtuality, and connectivity. It then examines what social risks can be derived form the three characteristics. This research lastly suggests alternative social safety nets and policies to alleviates the social risks and problems that platform workers may face in the digital society.

The Meaning of Namgyeong on Shimchungga of Shin, Jae-hyo (신재효 판소리 사설 <심청가>에 구현된 남경의 중의적 의미)

  • Lee, Moon Sung
    • (The) Research of the performance art and culture
    • /
    • no.36
    • /
    • pp.169-184
    • /
    • 2018
  • This paper reveals the double meaning of the temporal background and spatial background on Shimchungga. Its temporal background is the fictional and romantic time of the story, while the time of the weary lives of ordinary people is realistic and historical in the late Joseon Dynasty. The spatial background has a dual meaning that reminds us of the ancient capital of China and Seoul of the Joseon Dynasty. Namgyeong, a spatial background is fictional and romantic where the daughter of the public, Simcheong, becomes "The mother of all the people." In addition, Namgyeong reminds us of Seoul, the capital of Joseon Dynasty. Shimchungga is based on the customs and manners of the late Joseon Dynasty, and it is embodied by borrowing time and space from China. It is recalled Joseon's as backgrounds of China First of all, Namgyeong on Shimchungga is the ultimate attraction of the free imagination of the ordinary people as well as Shin, Jae-hyo in the late Joseon Dynasty.

A Study on the Indirect Copy of Dancheong Patterns Using Three-dimensional Scanning (3차원 스캐닝을 활용한 단청문양의 간접전사 연구)

  • An, Ji Eun;Choi, Chan Ho;Kim, Sung June;Yoon, Man Young
    • Journal of Conservation Science
    • /
    • v.34 no.6
    • /
    • pp.471-479
    • /
    • 2018
  • Seonunsa Temple is a site of Dancheong cultural significance in Daewoongjeon. Three-dimensional (3D) scanning can be used to create a simulation in 1:1 ratio without touching the Dancheong patterns directly. The traditional method of recreating Dancheong was paining with tracing paper using a fix pin. However, manual direct copy processes can cause and damage to the objects. This study shows the results of a simulation of a tranditional Dancheong patterns as an alternative; the simulation was able to reduce dimensional errors and prevent damage by using 3D scanning. As a result, objective and precise proportions of the simulation were acquired. The 3D scanning method may be applied for work such as the replication and restoration of the drawing, 3D fabrication of the original data, and printing of the additional drawing. In addition, with the production of 3D materials, a virtual museum is possible.

Meltdown Threat Dynamic Detection Mechanism using Decision-Tree based Machine Learning Method (의사결정트리 기반 머신러닝 기법을 적용한 멜트다운 취약점 동적 탐지 메커니즘)

  • Lee, Jae-Kyu;Lee, Hyung-Woo
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.209-215
    • /
    • 2018
  • In this paper, we propose a method to detect and block Meltdown malicious code which is increasing rapidly using dynamic sandbox tool. Although some patches are available for the vulnerability of Meltdown attack, patches are not applied intentionally due to the performance degradation of the system. Therefore, we propose a method to overcome the limitation of existing signature detection method by using machine learning method for infrastructures without active patches. First, to understand the principle of meltdown, we analyze operating system driving methods such as virtual memory, memory privilege check, pipelining and guessing execution, and CPU cache. And then, we extracted data by using Linux strace tool for detecting Meltdown malware. Finally, we implemented a decision tree based dynamic detection mechanism to identify the meltdown malicious code efficiently.

Hansel and Gretel : GFG Detection Scheme Based on In-Game Item Transactions (헨젤과 그레텔 : 게임 내 아이템 거래를 기반으로 한 GFG 탐지 방안)

  • Lee, Gyung Min;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1415-1425
    • /
    • 2018
  • MMORPG genre is based on the belief that all users in virtual world are equal. All users are able to obtain the corresponding wealth or status as they strive under the same resource, time. However, game bot is the main factor for harming this fair competition, causing benign gamers to feel a relative deprivation and deviate from the game. Game bots mainly form GFG(Gold Farming Group), which collects the goods in the game indiscriminately and adversely affects the economic system of the game. A general game bot detection algorithm is useful for detecting each bot, but it only covers few portions of GFG, not the whole, so it needs a wider range of detecting method. In this paper, we propose a method of detecting GFG based on items used in MMORPG genre. Several items that are mainly traded in the game were selected and the flows of those items were represented by a network. We Identified the characteristics of exchanging items of GFG bots and can identify the GFG's item trade network with real datasets from one of the popular online games.

Evaluation of Key Elements and Priorities of Initial Coin Offering(ICO) for Integrating Blockchain Technology and Digital Content (디지털 콘텐츠 산업과 블록체인 기술의 융합 활성화를 위한 ICO(Initial Coin Offering) 핵심요인 중요도 평가)

  • Ryu, Gui Jin;Baek, Bo Hyun;Kwon, Hyeog In
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.8
    • /
    • pp.194-204
    • /
    • 2019
  • This study aims to review previous research on the key elements of an Initial Coin Offering (ICO) and establish their priorities in order to help relevant stakeholders build and invigorate an ecosystem that integrates blockchain technology with the digital content industry. To achieve this goal, we first structured the key elements identified from previous studies into a hierarchy model. We then assigned weighted values to each element using the Analytic Hierarchy Process (AHP) methodology. Among the main elements, the priorities were identified as follows, from most important to least: Business (0.422) > Technology (0.172) > Contents (0.144) > Human Resources (0.104) > Institutions (0.099) > Token (0.059). With regard to the sub-elements, the weighted values were found to be as follows, in descending order: Probability (0.162) > Laws and Regulations (0.071) > Estimated Growth (0.063). The implications of the results are also described within the present study. The findings of this study will be of great value to ICO founders as well as investors and provide a much-needed academic basis for the burgeoning blockchain-integrated ecosystems and businesses.