• Title/Summary/Keyword: 유효성 증명

Search Result 207, Processing Time 0.033 seconds

Study on customized empathetic response patterns for Chatbots: focusing on MBTI psychological functions ST, NF (챗봇을 위한 성향별 청자의 공감적 반응 패턴 연구 - MBTI 심리기능 분류 ST, NF를 중심으로)

  • Jimin Seong;Hansaem Kim
    • Annual Conference on Human and Language Technology
    • /
    • 2023.10a
    • /
    • pp.44-49
    • /
    • 2023
  • 이 연구는 MBTI 심리기능을 근거로 사용자 유형을 ST와 NF로 구분하고, 그룹별로 나눈 일상대화를 전사 후 분석하여 대화에서 나타나는 청자의 공감적 반응이 성향에 따라 차별화되는 점을 발견하고 이를 챗봇 대화 실험에 적용하여 분석결과의 유효성을 귀납적으로 증명하였다. 고성능의 초대규모 생성모델을 필두로 한 채팅 에어전트 구현이 보편화된 시점에서 진정 가치있는 대화 모델은 유창한 언어 구사 능력뿐만 아니라 사용자의 성향에 적합한 만족스러운 대화 경험을 제공할 수 있어야 함을 시사한다. 이 연구는 리얼월드의 대화 방식을 모방하여 챗봇 대화로 재현하였다는 점에서 실질적인 B2C 대화 서비스의 질적 향상에 기여도가 높을 것으로 기대된다.

  • PDF

Algebraic Formal Specification and Formal Validation of the Standard and an Implementation of the OSPF Protocol (OSPF Protocol 표준 및 구현의 대수 정형적 명세 및 정형적 검증)

  • 박재현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3B
    • /
    • pp.360-374
    • /
    • 2004
  • The OSPF protocol is the most widely used Interior Gateway Routing Protocol. Therefore, for the reliability of behavior of gigabit swiching routers, it is essential to guarantee the interoperability and the safety of the OSPF protocol. In this paper, we analyze the standard document of the OSPF protocol, so that we provide a formal specification that specifies the protocol behaviors by detailed design level using the algebraic formal method. By referring available source codes of the OSPF protocol, we supplement the formal specification to express more detailed behaviors that is not specified definitely in the standard. We also formally verify the interoperability and the safety of the protocol state machine of the specification. By showing that the formal specification specify all of the states and the transition events that appear in the standard document of the OSPF protocol, we prove that the state machine has the completeness, and prove it has the interoperability. To prove that the specification of the protocol has the safety, we formally verify the reachability, the liveness, the livelock-free property, and the deadlock-free property. As a result, we prove the protocol has the consistency. The specification and the validation are also effective to the OSPF Version 3 that inherit the protocol mechanism of the OSPF Version 2.

A Study for Task Detection Acquiring Abnormal Permission in Linux (리눅스의 비정상 권한 획득 태스크의 탐지방법 연구)

  • Kim, Won-Il;Yoo, Sang-Hyun;Kwak, Ju-Hyun;Lee, Chang-Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.11
    • /
    • pp.427-432
    • /
    • 2014
  • The Purpose of local system attacks is to acquire administrator's(root) privilege shell through the execution of the malicious program or change the flow of the program. This acquiring shell through attack is still valid approach method and it is difficult to cope with improving each of vulnerability because the attacker can select various forms of attack. Linux allocate a set of credentials when login, in order to manage user permissions. Credentials were issued and managed by the kernel directly, and also the kernel ensures that any change cannot be occurred outside of kernel. But, user's credentials that acquired root privilege through system attacks occurs a phenomenon that does not remain consistent. In this paper we propose a security module to detect a security threats that may cause to users and tasks by analysis user task execution and inconsistency credentials.

Full Wave Analysis of EM Absorbers Using 3D Hybrid Finite Element Method (3차원 혼성 유한요소법을 이용한 전파흡수체의 전파 특성 해석)

  • 정영춘;김병욱;박동철
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.10 no.3
    • /
    • pp.440-448
    • /
    • 1999
  • This paper describes a full wave analysis of the scattering from electromagnetic absorbers which can be approximated as infinite periodic structure using hybrid finite element method. By introducing fictitious boundaries, equivalent finite region is defined and proper boundary conditions of each boundary are obtained by Floquet theorem. Since higher-order Floquet modes are employed, the method presented in this paper can be readily applied to the periodic structure haying a relatively long period. To reduce difficulty in evaluating the surface integral, the normal component to the surface were represented with the tangential component to the surface. Comparisons of calculated results with analytical or published ones show the validation of the method.

  • PDF

A study on the convergence of Wegmann's method applying a low frequency pass filter (저주파필터를 적용한 Wegmann 방법의 수렴성에 관한 연구)

  • Song, Eun-Jee
    • The KIPS Transactions:PartA
    • /
    • v.11A no.2
    • /
    • pp.203-206
    • /
    • 2004
  • Wegmann's method has been known as the most efficient one for the Theodorsen equation that is needed to solve conformal mapping. It was researched in the earlier studies (1). However divergence was revealed in some difficult problems by numerical experiment using Wegmann's method. We analyzed the cause of divergence and proposed an improved method by applying a low frequency pass filter to Wegmann's method. Numerical experiments using the improved method showed convergence for all divergent problems using the Wegmann's method. In this paper, we prove theroretically the cause of convergence in the Numerical experiment using the improved method by applying a low frequency pass filter to Wegmann's method. We make use of Fourier transforms in this theoretical proof of convergence.

A Study on the Trends of User Authentication Technology and its Future Application in Metaverse (사용자 인증 기술 동향과 메타버스에서의 적용 방향 연구)

  • Lee, Chan Hee;Azzaoui, Abir EL;Gang, Jeong-Ho;Park, Ji-Su;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.216-218
    • /
    • 2022
  • 최근 공인인증서가 폐지되고 보다 발급이 간편하고 유효기간이 긴 사설인증서가 부상했다. 더불어 탈중앙화를 핵심 개념으로 하는 블록체인 기반 분산 신원 증명(Decentralized Identity, DID)기술이 대두되고 있다. 서비스 환경의 변화에 따라 사용자 인증 기술도 변화가 요구된다. 더욱이 메타버스라는 새로운 인터넷 환경이 조성되고 있는 바 현재 사용자 인증 기술의 동향을 살펴보고 미래에 사용자 인증이 나아갈 방향성을 제시하는 것은 의미가 있어 보인다. 본 논문에서는 사용자 인증 기술의 개요와 사용자 인증 기술의 변천과정을 시작으로 공개키 기반 구조(Public Key Infrastructure, PKI)와 분산 신원 증명을 중심으로 시장에서의 사용자 인증 기술의 동향을 살펴본다. 나아가 메타버스가 상용화되었을 시기에 사용자 인증 기술이 나아가야할 세가지 방향성(분산화, 플랫폼 초월, 생체 기반 인증 중심)을 제시한다.

Modeling of Distance Localization by Using an Extended Auditory Parallax Model (확장된 음향적 시차 모델을 이용한 음상 거리정위의 모델화)

  • 김해영
    • The Journal of the Acoustical Society of Korea
    • /
    • v.23 no.1
    • /
    • pp.30-39
    • /
    • 2004
  • This study aims at establishing a digital signal processing technique to control 3-D sound localization, especially focusing our ores on the role of information provided by Head-Related Transfer Function (HRTF). In order to clarify the cues to control the auditory distance perception, two conventional models named Hirsch-Tahara model and auditory parallax model were examined. As a result, it was shown that both models have limitations to universally explain the auditory distance perception. Hence, the auditory parallax model was extended so as to apply in broader cases of auditory distance perception. The results of the experiment by simulating HRTFs based on the extended parallax model showed that the cues provided by the new model were almost sufficient to control the perception of auditory distance from an actual sound source located within about 2m.

A Study on the Sensitivity Compensation of Three-dimensional Acoustic Intensity Probe in the Higher Frequency Range (3차원 음향 인텐시티 프로브의 고주파 영역 감도 보상 연구)

  • Kim, Suk-Jae;Hideo, Suzuki;Kim, Chun-Duck
    • The Journal of the Acoustical Society of Korea
    • /
    • v.13 no.5
    • /
    • pp.40-50
    • /
    • 1994
  • In this paper, the sensitivity compensation method for three-dimensional acoustic intensity probe in the higher frequency range has been studied. The measurement error in the higher frequency range is generated from the phase mismatch between microphone's signals of the probe. If the wavelength of sound signal measured is less than those of the distance between microphones of the probe, that is, the higher frequency of the sound signal, the bigger measurement error is generated. In this study, we proposed the compensation methods for one-dimensional acoustic intensity probe with two-microphones, and the efficiency of those methods were investigated by numerical calculation of computer. It was most effective method to compensate the phase mismatch between microphone for the acoustic intensity probe was investigated for the sound estimated. and the efficiency of this method in a three-dimensional probe was investigated for the sound wave travelling in the arbitrary direction by numerical calculation of computer. In this result, the efficiency was proved that, for the measurement error of 1dB or less with the three-dimensional probe of 60mm space, the frequency should be less than 1.2kHz without the error compensation method, but the frequency increased up to 2.8kHz with the error compensation method.

  • PDF

A Study on Vehicle to Road Tracking Methodology with Consideration of vehicle lateral dynamics (차량 횡방향 운동 방정식을 고려한 차대도로간 트래킹 기법)

  • Shin, Dongho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.6
    • /
    • pp.219-230
    • /
    • 2017
  • This paper proposes a vehicle to road tracking algorithm based on vision sensor by using EKF(Extended Kalman Filter). The lateral offset, heading angle, and curvature which are obtained from vehicle to road tracking might be used as inputs to steering controller of LKAS(Lane Keeping Assist System) or for the warning decision logic of LDWS(Lane Departure Warning System). To the end, in this paper, the yaw rate, steering angle, and vehicle speed as well as lane raw points together with considering of vehicle lateral dynamics are utilized to improve the exactness and convergence of the vehicle to road tracking. The proposed algorithm has been tested at a proving ground that consists of straight and curve sections and compared with GPS datum using DGPS-RTK equipment to show the feasibility of the proposed algorithm.

Statistical Model for Typhoon-Induced Rainfall around Korean Peninsular (한반도의 태풍 동반 강우의 통계적 모형)

  • Ku, Hye-Yun;Lee, Sung-Su;Lee, Young-Kyu
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.8 no.5
    • /
    • pp.45-51
    • /
    • 2008
  • Due to recent increases of typhoon damages primarily owing to heavy rainfall and stron wind, estimation and analysis of a typhoon's influence has become more important. In this perspective, the statistical models to estimate the rainfall rate during a typhoon were presented in this paper. Central pressure of the typhoon is modeled to be the primary parameter affecting typhoon rainfall rate while relative angle and distance between the center of typhoon and the specific location for observation are secondary variables. Comparisons between the estimated rainfall rate of these models and the observed value in the duration of Typhoon NARI(2007) were analyzed to confirm the availability of these models. The result shows that the present statistical models can estimate typhoon-induced rainfall around Korean Peninsular to some extent.