• Title/Summary/Keyword: 실용설계

Search Result 525, Processing Time 0.023 seconds

A study on narrative text analysis from the perspective of information processing - focusing on four computational methodologies (정보처리 관점에서의 서사 텍스트 분석에 관한 연구 - 네 가지 전산적 방법론을 중심으로)

  • Kwon, Hochang
    • Trans-
    • /
    • v.13
    • /
    • pp.141-169
    • /
    • 2022
  • Analysis of narrative texts has been regarded as academically and practically important, and has been made from various perspectives and methods. In this paper, the computational narrative analysis methodology from the perspective of information processing was examined. From the point of view of information processing, the creation and acceptance of narrative is a bidirectional coding process mediated by narrative text, and narrative text can be said to be a multi-layered structured code. In this paper, four methodologies that share this point of view - character network analysis, text mining and sentiment analysis, continuity analysis of event composition, and knowledge analysis of narrative agents - were examined together with cases. Through this, the mechanism and possibility of computational methodology in narrative analysis were confirmed. In conclusion, the significance and side effects of computational narrative analysis were examined, and the necessity of designing a human-computer collaboration model based on the consilience of the humanities and science/technology was discussed. Based on this model, it was argued that aesthetically creative, ethically good, politically progressive, and cognitively sophisticated narratives could be made more effectively.

A Study on the Protection of Creators' Rights Using Social Media for Non-fungible Token Marketplaces (대체 불가능 토큰 마켓플레이스를 위한 소셜미디어를 활용한 창작자 권리 보호 방법에 대한 연구)

  • Lee, Eun Mi
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.667-673
    • /
    • 2021
  • Unauthorized generations and sales of non-funable tokens (NFTs) without the consent of the creator is one of the biggest problems that arise in NFT Marketplaces. This study proposes a method to practically reduce the problem of NFT sales without the consent of the creator by means of authentication with social media accounts. Through the proposed method, creators who are already using social media as a means of communication and marketing for creative activities can authenticate with their own accounts. Creators who have difficulty authenticating with their own accounts will be provided with alternatives to authenticate using human networks. In addition, the proposed method of protecting creator rights was designed using a flowchart to enable development using only the public API (Application Programming Interface) provided by social media. The proposed method can protect creators' rights and reduce damage caused by NFT fraud by inducing buyers to trade NFTs of authorized sellers through social media.

2-Stage Detection and Classification Network for Kiosk User Analysis (디스플레이형 자판기 사용자 분석을 위한 이중 단계 검출 및 분류 망)

  • Seo, Ji-Won;Kim, Mi-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.668-674
    • /
    • 2022
  • Machine learning techniques using visual data have high usability in fields of industry and service such as scene recognition, fault detection, security and user analysis. Among these, user analysis through the videos from CCTV is one of the practical way of using vision data. Also, many studies about lightweight artificial neural network have been published to increase high usability for mobile and embedded environment so far. In this study, we propose the network combining the object detection and classification for mobile graphic processing unit. This network detects pedestrian and face, classifies age and gender from detected face. Proposed network is constructed based on MobileNet, YOLOv2 and skip connection. Both detection and classification models are trained individually and combined as 2-stage structure. Also, attention mechanism is used to improve detection and classification ability. Nvidia Jetson Nano is used to run and evaluate the proposed system.

Proxy-Based Scalable Server Access Management Framework Using Reverse Webshell Protocol (웹쉘 기술을 통한 프록시 기반의 확장 가능한 서버 관리 프레임워크)

  • Daeun Kim;Sangwook Bae;Seongmin Kim;Eunyoung Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.661-670
    • /
    • 2023
  • With the emergence of serverless computing paradigm and the innovations of cloud technology, the structure of backend server infrastructure has evolved from on-premises to container-based serverless computing. However, an access control on the server still heavily relies on the traditional SSH protocol, which poses limitations in terms of security and scalability. This hampers user convenience and productivity in managing server infrastructure. A web shell is an interface that allows easy access to servers and execution of commands from any device with a web browser. While hackers often use it to exploit vulnerabilities in servers, we pay attention to the high portability of web shell technology for server management. This study proposes a novel proxy-based server management framework utilizing web shell technology. Our evaluation demonstrates that the proposed framework addresses the drawbacks of SSH without additional overhead, and efficiently operates large-scale infrastructures in diverse computing environments.

A Study of Air Cargo Logistic System Process (항공물류 시스템 프로세스의 개선에 관한 연구)

  • Lee, Hwi-Young;Lee, Jae-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.9
    • /
    • pp.179-187
    • /
    • 2009
  • The national boundary's meanings turn to weak according to advent of Global enterprises. The place for design a product and marketing are separated to actual market. R&D is to the area where the knowledge activity is well, and low skilful product assembling is to the place the low wage is acceptable. It shows that the importance of net work structure. From early 90's, production system is diversified to markets where with the consumer as the central as multifarious items and creation new demands through consumer's participation into manufacturing process. This phenomenon show that logistics structures adapt to demand of technical variation, and the development of e-business with VAN(:value added network) and EDI(:Electronic data interchange) prove it. This study tried to analyze utilitarian assay about systems those land, sea, air logistics through documents research, and this study also present the direction of logistics system of airline company and goal of development on the based to the model of domestic airline company accordingly.

Development of multi-depth and artificial intelligence smart measuring device for analyzing surface water-groundwater correlation characteristics (지표수-지하수 연계 특성 분석용 다심도 및 인공지능 스마트 계측장치 개발)

  • Lim, Woo-Seok;Hwang, Chan-Ik;Choi, Myoung-Rak;Kim, Gyoo-Bum
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.380-380
    • /
    • 2020
  • 가뭄 피해 극복을 위한 인공 함양지 통합관리시스템의 일부로써 지표수-지하수 연계 특성 분석용 의사결정을 전달하는 인공지능 스마트 계측기의 필요성이 꾸준히 제기되어 왔으나 실용성과 효율성을 동시에 갖춘 계측기는 시장에 출시되지 않았다. 기존의 계측기는 단순 측정이 목적이었으며 분석을 위해서는 일정 기간 직접 계측하여 분석하거나, 계측데이터를 원격 망을 통하여 서버로 전송하고 관리자가 데이터를 해석하는 방식을 취하였다. 또한, 수질 계측과 수질의 미소 변동성을 동시에 계측하여 수질 변화상태를 판단 할 수 있는 수질 계측기는 상품화되지 않아 다목적 수질 분석에 한계점을 갖고 있다. 이러한 한계점이 기존의 지하수 수질 계측기로는 불가능한 수중 라돈을 채수 없이 계측 가능하도록 하고, 순간 수질 변화 및 수질 변화 요인분석이 가능한 계측을 위하여 라돈, 전도도, 수위, 수온 및 필름형 pH 센서를 개발하여 적용한 다항목 계측기로 통합하는 연구가 필요한 이유이다. 개발한 계측기는 빅데이터 기반의 지능형 수질 변동성 분석 알고리즘을 내장하고 수직 깊이 방향의 다중심도 계측이 가능하도록 핵심적인 통신 연결성을 확보하였고 다양한 수질에서 견딜 수 있으며 특히 인공함양에서 발생하는 철, 망간에 부식되지 않는 재질을 이용하여 설계한 '지표수-지하수 연계 특성 분석용 다심도 및 인공지능 스마트 계측장치'이다. 본 장치는 기존 지하수 수질 계측기에서는 불가능하였던 순간 수위변화 및 수위변화 요인분석이 가능한 계측을 위하여 초당 측정 샘플링 주파수(10Hz)를 높인 계측회로를 개발하여 적용하였다.

  • PDF

A Study of Development of Change Process for Configuration Management in Construction Project Management (건설사업관리에서 형상관리에 관한 변경 프로세스 개선에 관한 연구)

  • Ko, Ho-Un;Park, Hyung-Keun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.1D
    • /
    • pp.81-89
    • /
    • 2009
  • CM(Configuration Management) is a field of management that focuses on establishing and maintaining consistency of a product's performance and its functional and physical attributes with its requirements, design, and operational information throughout its life. Recently upcoming concept of CM, regardless of various definitions, consists of the organization and the process for value creation through project change management, value preservation by Risk, Project Management implementation by Change management. The CM provide a basis for, and a record of, the project's performance in meeting the scope, time, cost. Overseas international companies have already adopted the CM system and enjoyed the benefits arising from such systems. And the CM provides perspectives and insights applicable to all types of projects. This study presents the review on the current systems now in use at jobsites and known to be efficient, and the introduction and application of configuration systems now at big issue. Hereby indicates the connective system consisted of work process, change control and knowledge referring to the methods and actual cases as an effective promotion of CM.

Analysis on Decryption Failure Probability of TiGER (TiGER의 복호화 실패율 분석)

  • Seungwoo Lee;Jonghyun Kim;Jong Hwan Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.157-166
    • /
    • 2024
  • Probability of decryption failure of a public key cryptography based on LWE(learning with errors) is determined by its architecture and parameter settings. Since large decryption failure probability leads to attacks[1] on scheme as well as degradation of performance, TiGER[2], a Ring-LWE(R)-based KEM proposed for the first round of KpqC, tried to reduce the decryption failure probability by using error correction code Xef and D2 encoding method. However, D'Anvers et al. has shown that the commonly assumed independence of each bit error is not established since in the case of an encryption scheme based on Ring-LWE(R) using an error correction code, there is error dependency which is not negligible[3]. In this paper, since TiGER does not consider the error dependency, we calcualte the decryption failure probability of TiGER by considering the error dependency. In addition, we found that the bit error probability is incorrectly calculated in TiGER, so we present the correct calculation.

Problem Analysis and Enhancement of 'An Improved of Enhancements of a User Authentication Scheme'

  • Mi-Og Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.53-60
    • /
    • 2024
  • In this paper, we analyze the authentication scheme of Hwang et al. proposed in 2023 and propose a new authentication scheme that improves its problems. Hwang et al. claimed that their authentication scheme was practical and secure, but as a result of analysis in this paper, it is possible to attack the password/ID guessing attack and session key disclosure attack due to insider attack and stolen smart card attack. In addition, Hwang et al.'s authentication scheme, which provides user anonymity, does not provide user untraceability due to its unstable design. The proposed authentication scheme, which improves these problems, not only provides user untraceability, but also is secure for stolen smart card attack, insider attack, session key disclosure attack, and replay attack. In addition, except for one fuzzy extraction operation, it shows the same complexity or very similar one as related authentication schemes. Therefore, the proposed authentication scheme can be said to be an authentication scheme with safety and practicality.

Fabric Mapping and Placement of Field Programmable Stateful Logic Array (Field Programmable Stateful Logic Array 패브릭 매핑 및 배치)

  • Kim, Kyosun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.12
    • /
    • pp.209-218
    • /
    • 2012
  • Recently, the Field Programmable Stateful Logic Array (FPSLA) was proposed as one of the most promising system integration technologies which will extend the life of the Moore's law. This work is the first proposal of the FPSLA design automation flow, and the approaches to logic synthesis, synchronization, physical mapping, and automatic placement of the FPSLA designs. The synchronization at each gate for pipelining determines the x-coordinates of cells, and reduces the placement to 1-dimensional problems. The objective function and its gradients for the non-linear optimization of the net length and placement density have been remodeled for the reduced global placement problem. Also, a recursive algorithm has been proposed to legalize the placement by relaxing the density overflow of bipartite bin groups in a top-down hierarchical fashion. The proposed model and algorithm are implemented, and validated by applying them to the ACM/SIGDA benchmark designs. The output state of a gate in an FPSLA needs to be duplicated so that each fanout gate can be connected to a dedicated copy. This property has been taken into account by merging the duplicated nets into a hyperedge, and then, splitting the hyperedge into edges as the optimization progresses. This yields additional 18.4% of the cell count reduction in the most dense logic stage. The practicality of the FPSLA can be further enhanced primarily by incorporating into the logic synthesis the constraint to avoid the concentrated fains of gates on some logic stages. In addition, an efficient algorithm needs to be devised for the routing problem which is based on a complicated graph. The graph models the nanowire crossbar which is trimmed to be embedded into the FPSLA fabric, and therefore, asymmetric. These CAD tools can be used to evaluate the fabric efficiency during the architecture enhancement as well as automate the design.