• Title/Summary/Keyword: 완전(完全)

Search Result 8,463, Processing Time 0.038 seconds

Design and Development of e-Mentoring System for Full Inclusion (완전통합교육 지원을 위한 전자멘토링 시스템 설계 및 구현)

  • Lee, Jae-Ho;Kim, Sung-Wan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.6
    • /
    • pp.91-99
    • /
    • 2010
  • The purpose of this study is to design and develop an e-mentoring system for full inclusion. Through the literature review of related studies, the e-mentoring performance model was drawn. Based on this model, an e-mentoring system was designed and developed. Especially the horizontal mentoring was mainly considered during the procedure. To evaluate the usability of the system, 2 system managers, 5 mentors, and 5 mentees were chosen and they were interviewed by researchers. Researchers used an interview instrument(10 items) consisting of mentoring support(cognitive support, affective support, adaptability) and technical support(convenience, accuracy, look & feel) categories. On the whole affirmative responses were given in both mentoring support and technical support areas. It can be concluded that the e-mentoring system is very effective in supporting full inclusion. In future it is recommended that several empirical studies of utilizing the e-mentoring should be performed.

A Survey of applying Fully Homomorphic Encryption in the Cloud system (클라우드 컴퓨팅 환경에서의 개인정보보호를 위한 완전 동형 암호 적용 방안 고찰)

  • Kim, Sehwan;Yoon, Hyunsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.941-949
    • /
    • 2014
  • Demands for cloud computing service rapidly increased along with the expansion of supplying smart devices. Interest in cloud system has led to the question whether it is really safe. Due to the nature of cloud system, cloud service provider can get a user's private information and disclose it. There is a large range of opinion on this issue and recently many researchers are looking into fully homomorphic encryption as a solution for this problem. Fully homomorphic encryption can permit arbitrary computation on encrypted data. Many security threats will disappear by using fully homomorphic encryption, because fully homomorphic encryption keeps the confidentiality. In this paper, we research possible security threats in cloud computing service and study on the application method of fully homomorphic encryption for cloud computing system.

Estimation of Shear-Wave Velocities of Layered Half-Space Using Full Waveform Inversion with Genetic Algorithm (유전 알고리즘을 활용한 완전파형역산 기법의 층상 반무한 지반 전단파 속도 추정)

  • Lee, Jin Ho;Lee, Se Hyeok
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.34 no.4
    • /
    • pp.221-230
    • /
    • 2021
  • This paper proposes full waveform inversion (FWI) for estimating the physical properties of a layered half-space. An FWI solution is obtained using a genetic algorithm (GA), which is a well-known global optimization approach. The dynamic responses of a layered half-space subjected to a harmonic vertical disk load are measured and compared with those calculated using the estimated physical properties. The responses are calculated using the thin-layer method, which is accurate and efficient for layered media. Subsequently, a numerical model is constructed for a layered half-space using mid-point integrated finite elements and perfectly matched discrete layers. An objective function of the global optimization problem is defined as the L2-norm of the difference between the observed and estimated responses. A GA is used to minimize the objective function and obtain a solution for the FWI. The accuracy of the proposed approach is applied to various problems involving layered half-spaces. The results verify that the proposed FWI based on a GA is suitable for estimating the material properties of a layered half-space, even when the measured responses include measurement noise.

AI Security Vulnerabilities in Fully Unmanned Stores: Adversarial Patch Attacks on Object Detection Model & Analysis of the Defense Effectiveness of Data Augmentation (완전 무인 매장의 AI 보안 취약점: 객체 검출 모델에 대한 Adversarial Patch 공격 및 Data Augmentation의 방어 효과성 분석)

  • Won-ho Lee;Hyun-sik Na;So-hee Park;Dae-seon Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.245-261
    • /
    • 2024
  • The COVID-19 pandemic has led to the widespread adoption of contactless transactions, resulting in a noticeable increase in the trend towards fully unmanned stores. In such stores, all operational processes are automated, primarily using artificial intelligence (AI) technology. However, this AI technology has several security vulnerabilities, which can be critical in the environment of fully unmanned stores. This paper analyzes the security vulnerabilities that AI-based fully unmanned stores may face, focusing particularly on the object detection model YOLO, demonstrating that Hiding Attacks and Altering Attacks using adversarial patches are possible. It is confirmed that objects with adversarial patches attached may not be recognized by the detection model or may be incorrectly recognized as other objects. Furthermore, the paper analyzes how Data Augmentation techniques can mitigate security threats by providing a defensive effect against adversarial patch attacks. Based on these results, we emphasize the need for proactive research into defensive measures to address the inherent security threats in AI technology used in fully unmanned stores.

Trend of Light-Field Image Acquisition and Representation Technology (Light-Field 영상획득 및 재현 기술동향)

  • Lee, G.S.;Lee, E.D.;Cheong, W.S.;Hur, N.H.
    • Electronics and Telecommunications Trends
    • /
    • v.31 no.3
    • /
    • pp.50-59
    • /
    • 2016
  • Light-field(LF) 기술은 자연스러운 완전 입체영상을 재현하면서도 홀로그램에 앞서 실현 가능한 기술로 알려져 있으며, 이에 대한 기술개발이 국내외에서 활발히 진행되고 있다. LF 기술은 카메라로 빛의 세기와 방향 정보를 획득 후 디스플레이로 그대로 재현함으로써 시각적으로 왜곡이 없는 완전 입체의 실감영상을 시청하게 하는 것이다. 조밀한 시점영상, 깊이영상의 제공으로 3D 단말 분야뿐만 아니라, 초점조절 기능을 통해 다양한 2D 응용 기술로 활용할 수 있다. LF 기술은 대형 디스플레이에서 완전 입체영상 제공을 목적으로 개발이 시작되었지만, 최근에는 모바일 단말, HMD와 같은 개인용 단말에 LF 기술을 적용하기 위한 기술개발이 시도되고 있다. 본고에서는 LF 카메라 및 단말 기술의 원리와 개발동향에 대해 살펴보고자 한다.

  • PDF

Norwood Procedure on Beating Heart (심장 박동을 유지하면서 시행한 Norwood 술식)

  • 곽재건;최창휴;김진현;정요천;오세진;이정렬;김용진;노준량;김웅한
    • Journal of Chest Surgery
    • /
    • v.37 no.9
    • /
    • pp.793-795
    • /
    • 2004
  • Modified Norwood procedure with maintaining cardiac beat was done in a 30-day-old neonate. Procedure was done with regional perfusion of innominate and coronary artery. Postoperative course was uneventful. Second-stage operation (bi-directional cavopulmonary shunt) was done 4 months later. The diameter of ascending aorta was more than 5 mm, Norwood procedure can be done in beating hearts.

Design and Performance Analysis of BLSR/4 WDM/SHR in All-Optical Transport Network (완전 광전달망에서 BLSR/4 WMD/SHR의 설계 및 성능 분석)

  • 강안구;최한규;김지홍;김광현;김호건;조규섭
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.10B
    • /
    • pp.1832-1840
    • /
    • 1999
  • This paper proposed a network to implement all optical bidirectional BLSR/4 WDM/SHR allowing restoration in the event of a failure. The proposed network can provide a high degree of transparency using all-optical components with no electric implementation and effective failure restoration due to BLSR/4 WDM/SHR architecture. This paper also presented a genetic simulation model for the survivability analysis of the proposed BLSR/4 WDM/SHR under failure scenarios, the restoration performance of the proposed network is analyzed in terms of performance parameters such as propagation time, processing time, optical switch time.

  • PDF

A Signcryption based E-mail Protocol providing Perfect Forward Secrecy (Signcryption 기반의 완전한 전방향 안전성을 제공하는 이메일 프로토콜)

  • Lee Chang-Yong;Kim Dae-Young;Kim Sang-Jin;Oh Hee-Kuck
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.344-348
    • /
    • 2006
  • 현재 PGP(Pretty Good Privacy)와 S/MIME(Secure/Multipurpose Internet Mail Extension)와 같은 여러 가지 이메일 보안 프로토콜들이 제안되어 사용되고 있으나 이들 프로토콜은 최근 중요시되고 있는 보안 요구사항인 전방향 안전성을 보장하지 못한다. 최근에 이 요구사항을 충족하는 이메일 보안 프로토콜들이 제안되었으나 현실적이지 못한 가정 하에 설계되었거나 효율성 측면에서 개선이 필요한 프로토콜들이다. 또한 일부 프로토콜들은 실제 완전한 전방향 안전성을 제공하지 못하고 있다. 이 논문에서는 이 부분을 개선하고, 완전한 전방향 안전성을 제공하는 안전한 이메일 프로토콜을 제안한다. 제안되는 프로토콜은 Zheng 의 signcryption 기법을 사용하여 효율적이고 안전한 인증을 제공한다.

  • PDF

Nonparametric Approaches of Analyzing Randomly Incomplete Ranking Data (임의의 불완전 순위자료 분석을 위한 비모수적 방법)

  • 임동훈
    • The Korean Journal of Applied Statistics
    • /
    • v.13 no.1
    • /
    • pp.45-53
    • /
    • 2000
  • 본 논문에서는 모든 판정자(judge)들이 모든 객체(object)들에 대해 순위를 부여할 수 없는 경우에 얻어지는 불완전 순위자료에서 판정자들의 처리 효과에 대한 유의성을 검정하는데 관심이 있다. 이를 위해 불완전 순위자료를 완전자료로 바꾸는 알고리즘을 제안하고 알고리즘에 의해 얻어진 완전 순위자료에 Friedman 검정법을 적용하고자 한다. 제안된 검정법은 결측 객체에 순위를 부여하는데 있어서 완전순위를 갖는 판정자들의 정보를 이용함으로서 효율적이며 검정을 시행하는데 기존의 Friedman 통계량에 대한 분포표를 사용할 수 있어 간편하다. 그리고 몬테칼로 모의실험을 통하여 제안된 검정법과 기존의 평균 순위법, 최대/최소 Friedman 검정법과 검정력을 비교하였다.

  • PDF