• Title/Summary/Keyword: 기술 분류

Search Result 6,674, Processing Time 0.028 seconds

Measurement of wave propagation environment in Korean terrain and comparison with the environments(models) of the other nations in pager system (무선호출 주파수 전파환경측정 및 외국 환경과의 비교)

  • 이형수;조삼모;정진욱
    • The Proceeding of the Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.6 no.3
    • /
    • pp.15-23
    • /
    • 1995
  • The antenna height of the mobile communications lower than its typical surroundings causes multipath fading usually resulting in fast fluctuations of both signal strength and wave length in mobile radio communications. Therefore, there have been developed and used various wave be- havior prediction models, in some other foreign countries, based on the measurement data rather than on theoretical derivation. The main purpose of this paper is to examine the wave propagation characteristics particularly in Korean terrain with the measurements made in four types of different areas - a large city area, a small city area, a flat terrain area, and a mountain area. Those areas have been classified according to the terrain characteristics with which the particular area contains, such as scale and number of buildings, highways, trees, and so on. With the measured data of the field strength in the frequency band of pager system obtained from those four different areas, we compared the calculated ones from both Hata's and TIREM prediction models which are often applied in Korea.

  • PDF

The Development and Application Effect of Coding Game for the Childhood Cognitive Development (유아인지발달을 위한 코딩게임의 개발과 적용 효과)

  • HONG, Dae Sun;YU, Mi;LEE, Hyoung Gu
    • Journal of Korea Game Society
    • /
    • v.18 no.5
    • /
    • pp.103-112
    • /
    • 2018
  • "Ito2", an early childhood educational coding game that allows students to learn sequential, loop, and conditional statement concepts through games is introduced. The developed game is a two-stage process of mock and practical classes for children in actual nursing cares, and coding education is conducted for actual children to determine its effectiveness. The degree of change is observed by observing trends in childhood cognitive development performance in all six areas, including parts and the overall, space, observation, shape and measurement, classification, comparison, and listing, as the coding training is conducted. In this paper, the improvement of cognitive development and spatial perceptual abilities were achieved by children playing games with infant functional coding with fun elements plus learning factors.

Development of a system for detecting game user's addiction (게임 이용자의 과몰입을 탐지하기 위한 시스템 개발)

  • Oh, Sung-kyun;Yoon, Taebok
    • Journal of Korea Game Society
    • /
    • v.18 no.5
    • /
    • pp.23-30
    • /
    • 2018
  • With the development of ICT technology, the game industry is growing rapidly. However, due to the excessive play of the game, there are cases where normal life is difficult. It is necessary to study the diagnosis and countermeasures against such game addiction. This paper study a system for diagnosing game addiction based on game usage information of game users. In order to develop a game addiction diagnostic system, this study classifies game addiction and abuse users and collects and models log information in real game environment. In addition, the addiction and good use model of game users was used as a knowledge to diagnose the addiction of new game users. Through the experiment, we could confirm the meaningful results. Also, according to the result of the diagnosis, the service such as SMS and reporting was suggested.

Recommender System using Association Rule and Collaborative Filtering (연관 규칙과 협력적 여과 방식을 이용한 추천 시스템)

  • 이기현;고병진;조근식
    • Journal of Intelligence and Information Systems
    • /
    • v.8 no.2
    • /
    • pp.91-103
    • /
    • 2002
  • A collaborative filtering which supports personalized services of users has been common use in existing web sites for increasing the satisfaction of users. A collaborative filtering is demanded that items are estimated more than specified number. Besides, it tends to ignore information of other users as recommending them on the basis of information of partial users who have similar inclination. However, there are valuable hidden information into other users' one. In this paper, we use Association Rule, which is common wide use in Data Mining, with collaborative filtering for the purpose of discovering those information. In addition, this paper proved that Association Rule applied to Recommender System has a effects to recommend users by the relation between groups. In other words, Association Rule based on the history of all users is derived from. and the efficiency of Recommender System is improved by using Association Rule with collaborative filtering.

  • PDF

A Study of Office Open XML Document-Based Malicious Code Analysis and Detection Methods (Office Open XML 문서 기반 악성코드 분석 및 탐지 방법에 대한 연구)

  • Lee, Deokkyu;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.429-442
    • /
    • 2020
  • The proportion of attacks via office documents is increasing in recent incidents. Although the security of office applications has been strengthened gradually, the attacks through the office documents are still effective due to the sophisticated use of social engineering techniques and advanced attack techniques. In this paper, we propose a method for detecting malicious OOXML(Office Open XML) documents and a framework for detection. To do this, malicious files used in the attack and benign files were collected from the malicious code repository and the search engine. By analyzing the malicious code types of collected files, we identified six "suspicious object" elements that are meaningful in determining whether they are malicious in a document. In addition, we implemented an OOXML document-based malware detection framework based on the detection method to classify the collected files and found that 98.45% of malicious filesets were detected.

3X Serial GF($2^m$) Multiplier Architecture on Polynomial Basis Finite Field (Polynomial basis 방식의 3배속 직렬 유한체 곱셈기)

  • Moon, Sang-Ook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.2
    • /
    • pp.328-332
    • /
    • 2006
  • Efficient finite field operation in the elliptic curve (EC) public key cryptography algorithm, which attracts much of latest issues in the applications in information security, is very important. Traditional serial finite multipliers root from Mastrovito's serial multiplication architecture. In this paper, we adopt the polynomial basis and propose a new finite field multiplier, inducing numerical expressions which can be applied to exhibit 3 times as much performance as the Mastrovito's. We described the proposed multiplier with HDL to verify and evaluate as a proper hardware IP. HDL-implemented serial GF (Galois field) multiplier showed 3 times as fast speed as the traditional serial multiplier's adding only partial-sum block in the hardware. So far, there have been grossly 3 types of studies on GF($2^m$) multiplier architecture, such as serial multiplication, array multiplication, and hybrid multiplication. In this paper, we propose a novel approach on developing serial multiplier architecture based on Mastrovito's, by modifying the numerical formula of the polynomial-basis serial multiplication. The proposed multiplier architecture was described and implemented in HDL so that the novel architecture was simulated and verified in the level of hardware as well as software.

An Evaluation on Management Types by Characteristics of Urban Parks (도시공원 특성에 따른 관리유형의 평가)

  • Kim, Hyo-Jung;Kang, Eun-Jee;Cho, Joong-Hyun
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.38 no.5
    • /
    • pp.21-30
    • /
    • 2010
  • The purpose of this study was to suggest customized management methods tailored to the characteristics of each type of park. Related literature was reviewed to determine the types of and management methods for urban parks to discuss the possibility of the involvement of citizens in park management and committing park management to the private sector. As a result of analyzing the literature, it has been found that each park should be managed separately according to its type in light of its characteristics and the strengths and weaknesses of each management method. For this reason, this must be a very important element for preventing damaging behavior at tourist destinations. First, natural mountainous parks are ordinary parks that do not require any professional management knowledge or skills. Accordingly, these parks should be managed by the districts in which they are located. Second, eco-oriented parks ask for specialized management. As domestic cases show, it will be advisable to commit the management of these parks to specialized, highly-experienced private organizations. Third, facilities-centered parks are large in size in response to the diverse needs of citizens, and it seems that a combination of different methods is better than merely sticking to any particular method.

Phishing Detection Methodology Using Web Sites Heuristic (웹사이트 특징을 이용한 휴리스틱 피싱 탐지 방안 연구)

  • Lee, Jin Lee;Park, Doo Ho;Lee, Chang Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.10
    • /
    • pp.349-360
    • /
    • 2015
  • In recent year, phishing attacks are flooding with services based on the web technology. Phishing is affecting online security significantly day by day with the vulnerability of web pages. To prevent phishing attacks, a lot of anti-phishing techniques has been made with their own advantages and dis-advantages respectively, but the phishing attack has not been eradicated completely yet. In this paper, we have studied phishing in detail and categorize a process of phishing attack in two parts - Landing-phase, Attack-phase. In addition, we propose an phishing detection methodology based on web sites heuristic. To extract web sites features, we focus on URL and source codes of web sites. To evaluate performance of the suggested method, set up an experiment and analyze its results. Our methodology indicates the detection accuracy of 98.9% with random forest algorithm. The evaluation of proof-of-concept reveals that web site features can be used for phishing detection.

Lambda Architecture Used Apache Kudu and Impala (Apache Kudu와 Impala를 활용한 Lambda Architecture 설계)

  • Hwang, Yun-Young;Lee, Pil-Won;Shin, Yong-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.9
    • /
    • pp.207-212
    • /
    • 2020
  • The amount of data has increased significantly due to advances in technology, and various big data processing platforms are emerging, to handle it. Among them, the most widely used platform is Hadoop developed by the Apache Software Foundation, and Hadoop is also used in the IoT field. However, the existing Hadoop-based IoT sensor data collection and analysis environment has a problem of overloading the name node due to HDFS' Small File, which is Hadoop's core project, and it is impossible to update or delete the imported data. This paper uses Apache Kudu and Impala to design Lambda Architecture. The proposed Architecture classifies IoT sensor data into Cold-Data and Hot-Data, stores it in storage according to each personality, and uses Batch-View created through Batch and Real-time View generated through Apache Kudu and Impala to solve problems in the existing Hadoop-based IoT sensor data collection analysis environment and shorten the time users access to the analyzed data.

Modified HAZUS Method for Seismic Fragility Assessment of Domestic PSC-I Girder Bridges (PSC-I 거더교의 지진취약도 평가를 위한 HAZUS 방법의 국내 적용성 연구)

  • Seo, Hyeong-Yeol;Yi, Jin-Hak;Kim, Doo-Kie;Song, Jong-Keol
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.14 no.2
    • /
    • pp.161-170
    • /
    • 2010
  • To reduce the amount of seismic damage, several design codes are being improved considering the earthquake resistant systems, and many researches are being conducted to develop the earthquake damage evaluation techniques. This study develops the Korean seismic fragility function using the modified HAZUS method applicable to PSC-I girder bridges in Korea. The major coefficients are modified considering the difference between the seismic design levels of America and Korea. Seismic fragility function of the PSC-I girder bridge (one of the standard bridge types in Korea) is evaluated using two methods: numerical analysis and modified HAZUS method. The main coefficients are obtained about 70% of the proposed values in HAZUS. It is found that the seismic fragility function obtained using the modified HAZUS method closes to the fragility function obtained by conventional numerical analysis method.