• Title/Summary/Keyword: 사용자 문서

Search Result 1,725, Processing Time 0.027 seconds

Korean Machine Reading Comprehension for Patent Consultation Using BERT (BERT를 이용한 한국어 특허상담 기계독해)

  • Min, Jae-Ok;Park, Jin-Woo;Jo, Yu-Jeong;Lee, Bong-Gun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.4
    • /
    • pp.145-152
    • /
    • 2020
  • MRC (Machine reading comprehension) is the AI NLP task that predict the answer for user's query by understanding of the relevant document and which can be used in automated consult services such as chatbots. Recently, the BERT (Pre-training of Deep Bidirectional Transformers for Language Understanding) model, which shows high performance in various fields of natural language processing, have two phases. First phase is Pre-training the big data of each domain. And second phase is fine-tuning the model for solving each NLP tasks as a prediction. In this paper, we have made the Patent MRC dataset and shown that how to build the patent consultation training data for MRC task. And we propose the method to improve the performance of the MRC task using the Pre-trained Patent-BERT model by the patent consultation corpus and the language processing algorithm suitable for the machine learning of the patent counseling data. As a result of experiment, we show that the performance of the method proposed in this paper is improved to answer the patent counseling query.

XML Document Encrypt Implementation using Elliptic Curve Cryptosystem (타원곡선 알고리즘을 이용한 XML 문서 암호 구현)

  • Ko, Hoon
    • Journal of Internet Computing and Services
    • /
    • v.8 no.1
    • /
    • pp.79-85
    • /
    • 2007
  • As the use of the computer and networks generalized, the various tasks which are requested secrets can be processed such os the banking transaction. And because of increasing of data exchange, Internet, and mobile networks, the method which is not connected only but also used with many users has been changed. Especially because of the structural problem of the Internet, a lot of information is leaked out when we use the Internet banking. If we check the Internet banking by using an existing cypher method which is either simple of slow, a credit card number, an account number or password will be leaked out. Because the security of information doesn't meet our expectation, we need more powerful cryptography. But, the wasted space-time which is required shouldn,t be ignored when the whole transferred data are encrypted. So, by using both the Elliptic Curve algorithm which is based on mobile networks and the partial encryption of the DTD of XML in this essay, we will implement more faster cypher method of the partial XML.

  • PDF

Information Management System for Construction Works using Web GIS (Web GIS를 이용한 건설공사 정보관리 시스템 구축)

  • Woo, Je-Yoon;Koo, Jee-Hee;Na, Joon-Yeep;Pyeon, Mu-Wook
    • Journal of Korea Spatial Information System Society
    • /
    • v.3 no.2 s.6
    • /
    • pp.45-51
    • /
    • 2001
  • It is difficult for existing construction support system to provide real-world information such as geographical and spatial data, geographic information system is expected to be able to supply efficiently analyzing and supporting function as well as actual data by connecting construction support system. Furthermore, the providing method and content of GIS are varied by building various network and information service, and use of web GIS which can offer diverse and dynamic solution on network is spreaded. In this study, information management system for construction works(CIMSGIS : Construction Information Management System on Web GIS) based on web GIS is developed, which can confirm instantly state of advance and manage construction progress by real-time reporting and instruction. Also CIMSGIS can support decision making on intuitive understanding and manifold operation reporting.

  • PDF

Statistical Characteristic Analysis of the Spatial Channel Model for Performance Evaluation of MIMO Systems (MIMO 송수신 시스템 성능 평가를 위한 공간 채널 모델의 통계적 특성 분석)

  • Shin, Junsik;Suh, Junyeub;Kang, Hosik;Sung, Wonjin
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.8
    • /
    • pp.748-757
    • /
    • 2015
  • MIMO systems utilizing multiple antenna transmission and reception is one of the key technologies to enhance the capacity of 5G wireless communications. In order to obtain an appropriate performance evaluation of MIMO techniques, the usage of wireless channel model reflecting spatial channel characteristics is required, such as the 3-dimensional spatial channel model(3D SCM) proposed by 3GPP TR36.873 documentation. In this paper, we implement and verify the channel simulation environment based on 3D SCM, to present and compare the characteristics of UMi and UMa environments. We also apply MIMO transmission to the UMa scenario to investigate the channel correlation among antenna elements with different array distances and to identify the corresponding throughput changes. By evaluating the channel power correlations for randomly distributed users within the sector for different horizontal and vertical antenna distances, we present the statistical characteristics which determine the transmission performance under the SCM environment.

Study on Procedure for Escrow Account to Resolve Controversy of Intellectual Property Right of Software for Rolling Stock (철도차량 Software 지적 재산권 분쟁 해결을 위한 Escrow Account 적용 절차에 대한 연구)

  • Park, Jun-Hyung;Cho, Chi-Hwan;Kang, Chan-Yong
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.1479-1485
    • /
    • 2008
  • This paper shows the result of study on the detailed applicable procedure of software Escrow account applied for rolling stock. The customer as end-user requires software source code, related critical technical documents etc. about software based system of train for maintenance purpose through software modification and enhancement after completion of warranty period. Otherwise, it is not easy to keep up with the customer's requirement of demanding supplier's exclusive information because it is considered as intellectual property rights of supplier as software developer. Therefore, the main contractor(normally called as Car-builder) need to introduce software Escrow service in order to coordinate the different a standpoint between software developer and end-user. Software Escrow is a legal arrangement in which an software Escrow packages (software source code, software development tool, build process, proprietary information, copyright and etc.) is deposited into and Escrow account under the trust of a reliable third party (Escrow agent) depending on mutual agreement on Escrow contract condition as signing off Escrow agreement document. This paper deals with the study on the detailed procedure about the following general category of Escrow procedure and purpose to apply this specific procedure of Escrow into the future project onward.

  • PDF

A Post-Management System of Digital Assets on Social network Services (소셜 네트워크 서비스에 게시된 디지털 자산의 사후 관리 시스템)

  • Moon, Wonsuk;Kim, Seoksoo
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.209-214
    • /
    • 2015
  • Social network services such as Facebook and Flickr is a very useful service that was the foundation of the Internet. If a state in which the Internet is connected, music, photos, and us to be able to share it freely post such as documents. However, even when the digital information posted in such social network services the user has died, and have been published, it is also used for people who do not intend the bad purposes some problems can occur. Facebook is trying to apply the findings Jed R. Brubaker of UC Irvine University in order to solve this problem. However, in Korea, such efforts, not much appears for now. Therefore, we proposed a method that can be managed by delegated Facebook, safely a Delegator digital information posted on social networking services such as Flickr. Our proposed system, as compared with Jed R. Brubaker and Jeong-Kyung Moon is executed previous studies, we studied a method proposed by the appropriate compensates points shortage is passed through the future research. And I consider to have been proposed a method to safely use posted digital assets in a social network service.

Ranked Web Service Retrieval by Keyword Search (키워드 질의를 이용한 순위화된 웹 서비스 검색 기법)

  • Lee, Kyong-Ha;Lee, Kyu-Chul;Kim, Kyong-Ok
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.2
    • /
    • pp.213-223
    • /
    • 2008
  • The efficient discovery of services from a large scale collection of services has become an important issue[7, 24]. We studied a syntactic method for Web service discovery, rather than a semantic method. We regarded a service discovery as a retrieval problem on the proprietary XML formats, which were service descriptions in a registry DB. We modeled services and queries as probabilistic values and devised similarity-based retrieval techniques. The benefits of our way are follows. First, our system supports ranked service retrieval by keyword search. Second, we considers both of UDDI data and WSDL definitions of services amid query evaluation time. Last, our technique can be easily implemented on the off-theshelf DBMS and also utilize good features of DBMS maintenance.

  • PDF

Design and Implementation of eRTOS Real-time Operating Systems for Wearable Computers (웨어러블 컴퓨터를 위한 저전력 실시간 운영체제 eRTOS 설계 및 구현)

  • Cho, Moon-Haeng;Choi, Chan-Woo;Lee, Cheol-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.9
    • /
    • pp.42-54
    • /
    • 2008
  • In recent years, embedded systems have been expanding their application domains from traditional embedded systems such as military weapons, robots, satellites and digital convergence systems such as celluar phones, PMP(Portable Multimedia Player), PDAs(Personal Digital Assistants) to Next Generation Personal Computers(NGPCs) such as eating PCs, wearable computers. The NGPCs are network-based, human-centric digital information devices diverged from the traditional PCs used mainly for document writing, internet searching and database management. Wearable computers with battery capacity and memory size limitations have to use real-time operating systems with small footprints and low power management techniques to provide user's QoS in spite of hardware constraints. In this paper, we have designed and implemented a low-power RTOS (called eRTOS) for wearable computers. The implemented eRTOS has 18KB footprints and the dynamic power management and the device power management schemes are adapted in it. Experimental results with wearable computer applications show that the low power techniques could save energy up to 47 %.

The practical use with online database program of cosmetics' raw materials. (화장품원료 온라인 데이터베이스 구축과 활용)

  • Jeon Sang-hoon;Kim Ju-Duck
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.29 no.2 s.43
    • /
    • pp.233-250
    • /
    • 2003
  • We often use the KCID(Korean Cosmetic Ingredient Dictionary) and ICID(International Cosmetic Ingredient Dictionary) within cosmetics research and within their export and import. so far, we do not have a database of a cosmetics' raw materials. Because of this, we consume a lot of time to find the raw material data that is needed. This study constructs a cosmetics' raw material database and develops the program to retrieve it. We used a Linux machine as the equipment for this study and we used Apache web server, MySQL database server and PHP as the tools of this study. 11,817 kinds of raw materials data were registered as ICID, 866 kinds of raw materials data were registered as KCID and 28,008 kinds of raw materials data with registered trade name into the database. Also, The database was composed of the database of the association form. The database of the online form could ultimately reduce the task time as soon as it did its purpose. The product of this study can become a good basis of data to reconfigure. In the future, it can become a good database in relation with different databases.

A Study on Security Technology using Mobile Virtualization TYPE-I (모바일 가상화 TYPE-I을 이용한 보안 기술 연구)

  • Kang, Yong-Ho;Jang, Chang-Bok;Kim, Joo-Man
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.1-9
    • /
    • 2015
  • Recently, with smart device proliferation and providing the various services using this, they have interested in mobile and Smart TV security. Smartphone users are enjoying various service, such as cloud, game, banking. But today's mobile security solutions and Study of Smart TV Security simply stays at the level of malicious code detection, mobile device management, security system itself. Accordingly, there is a need for technology for preventing hacking and leakage of sensitive information, such as certificates, legal documents, individual credit card number. To solve this problem, a variety of security technologies(mobile virtualization, ARM TrustZone, GlobalPlatform, MDM) in mobile devices have been studied. In this paper, we propose an efficient method to implement security technology based on TYPE-I virtualization using ARM TrustZone technology.