• Title/Summary/Keyword: 자동 응답

Search Result 362, Processing Time 0.037 seconds

A Self Visual-Acuity Testing System based on the Hand-Gesture Recognition by the KS Standard Optotype (KS 표준 시표를 어용한 손-동작 인식 기반의 자가 시력 측정 시스템)

  • Choi, Chang-Yur;Lee, Woo-Beom
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.11 no.4
    • /
    • pp.303-309
    • /
    • 2010
  • We proposes a new approach for testing the self visual-acuity by using the KS standard optotype. The proposed system provides their hand-gesture recognition method for the convenient response of subjects in the visual acuity measurement. Also, this system can measure a visual-acuity that excludes the examiner's subjective judgement or the subject's memorized guess, because of presenting a random optotype automatically by computer without a examiner. Especially, Our system guarantees the reliability by using the KS standard optotype and its presentation(KS P ISO 8596), which is defined by the Korea Standards Association in 2006. And the database management function of our system can provide the visual-acuity data to the EMR client easily. As a result, Our system shows the 98% consistency in the limit of the ${\pm}1$ visual-acuity level error by comparing the visual-acuity chart test.

Design and Implementation of Web-Based Cyber-University System (웹-기반 가상대학 시스템의 설계 및 구현)

  • Lee, Sei-Young;Yong, Hwan-Seung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.12
    • /
    • pp.3577-3588
    • /
    • 1999
  • This paper describes design and implementation of a general purpose cyber educational system. In this system, there are different types of menus and services according to such user's rights as system operators, professors, assistant instructors, students. In order to keep in close contact between students and professors, provided are various services such as the official announcement, transcripts of lecture, bulletin board, Q/A corner, report box, archive of study materials, electronic mail box, memorandum including checking of one's attendance and school record. For the purpose of activating small group studies and discussion about given subject, it can organize into groups automatically and provide with debating rooms. The system is implemented by separating with both HTML design and programming part by templete concept. Overload of iterative server is solved by adjusting the numbers of DB servers of each service.

  • PDF

Traffic Control using Q-Learning Algorithm (Q 학습을 이용한 교통 제어 시스템)

  • Zheng, Zhang;Seung, Ji-Hoon;Kim, Tae-Yeong;Chong, Kil-To
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.11
    • /
    • pp.5135-5142
    • /
    • 2011
  • A flexible mechanism is proposed in this paper to improve the dynamic response performance of a traffic flow control system in an urban area. The roads, vehicles, and traffic control systems are all modeled as intelligent systems, wherein a wireless communication network is used as the medium of communication between the vehicles and the roads. The necessary sensor networks are installed in the roads and on the roadside upon which reinforcement learning is adopted as the core algorithm for this mechanism. A traffic policy can be planned online according to the updated situations on the roads, based on all the information from the vehicles and the roads. This improves the flexibility of traffic flow and offers a much more efficient use of the roads over a traditional traffic control system. The optimum intersection signals can be learned automatically online. An intersection control system is studied as an example of the mechanism using Q-learning based algorithm, and simulation results showed that the proposed mechanism can improve the traffic efficiency and the waiting time at the signal light by more than 30% in various conditions compare to the traditional signaling system.

Materialized View Selection Algorithm using Clustering Technique in Data Warehouse (데이터 웨어하우스에서 클러스터링 기법을 이용한 실체화 뷰 선택 알고리즘)

  • Yang, Jin-Hyuk;Chung, In-Jeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.04a
    • /
    • pp.28-35
    • /
    • 2000
  • In order to acquire the precise and fast response for an analytical query, proper selection of the views to materialize in data warehouse is very crucial. In traditional algorithms, the whole relation is considered to be selected as materialized views. However, materializing the whole relation rather than a part of relation results in much worse performance in terms of time and space cost. Therefore, we present a new algorithm for selection of views to materialize using clustering method in order to improve the performance of data warehouse including this problem. In the presented algorithm, ASVMR(Algorithm for Selection of Views to Materialize using Reduced table), we first generate reduced tables in data warehouse using automatic clustering based on attribute-values density, then we consider the combination of reduced tables as materialized views instead of the combination of the original base relations. We also show the experimental results in which both time and space cost are approximately 1.8 times better than the conventional algorithms.

  • PDF

Development of Data Profiling Software Supporting a Microservice Architecture (마이크로 서비스 아키텍처를 지원하는 데이터 프로파일링 소프트웨어의 개발)

  • Chang, Jae-Young;Kim, Jihoon;Jee, Seowoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.127-134
    • /
    • 2021
  • Recently, acquisition of high quality data has become an important issue as the expansion of the big data industry. In order to acquiring high quality data, accurate evaluation of data quality should be preceded first. The quality of data can be evaluated through meta-information such as statistics on data, and the task to extract such meta-information is called data profiling. Until now, data profiling software has typically been provided as a component or an additional service of traditional data quality or visualization tools. Hence, it was not suitable for utilizing directly in various environments. To address this problem, this paper presents the development result of data profiling software based on a microservice architecture that can be serviced in various environments. The presented data profiler provides an easy-to-use interface that requests of meta-information can be serviced through the restful API. Also, a proposed data profiler is independent of a specific environment, thus can be integrated efficiently with the various big data platforms or data analysis tools.

Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems (UHF 수동형 RFID 시스템에 적합한 경량 고속의 보안 프로토콜 설계 및 구현)

  • Kang, You-Sung;Choi, Yong-Je;Choi, Doo-Ho;Lee, Sang-Yeoun;Lee, Heyung-Sup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.117-134
    • /
    • 2010
  • A passive RFID tag which received attention as a future technology for automatic and quick identification faces some difficulties about security problems such as tag authentication, reader authentication, data protection, and untraceability in addition to cost and reliable identification. A representative passive RFID technology is the ISO/IEC 18000-6 Type C which is an international standard for 900 MHz UHF-band. This standard has some difficulties in applying to the security services such as originality verification, tag's internal information protection, and untraceability, because it does not provide high-level security solution. In this paper, we summarize security requirements of ISO/IEC ITC 1/SC 31 international standardization group, propose security protocols suitable for the UHF-band passive RFID system using a crypto engine, and analyze its security strength. In addition, we verify that it is possible to implement a tag conforming with the proposed security protocols by presenting concrete command/response pairs and cryptographic method.

Inducing Harmful Speech in Large Language Models through Korean Malicious Prompt Injection Attacks (한국어 악성 프롬프트 주입 공격을 통한 거대 언어 모델의 유해 표현 유도)

  • Ji-Min Suh;Jin-Woo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.451-461
    • /
    • 2024
  • Recently, various AI chatbots based on large language models have been released. Chatbots have the advantage of providing users with quick and easy information through interactive prompts, making them useful in various fields such as question answering, writing, and programming. However, a vulnerability in chatbots called "prompt injection attacks" has been proposed. This attack involves injecting instructions into the chatbot to violate predefined guidelines. Such attacks can be critical as they may lead to the leakage of confidential information within large language models or trigger other malicious activities. However, the vulnerability of Korean prompts has not been adequately validated. Therefore, in this paper, we aim to generate malicious Korean prompts and perform attacks on the popular chatbot to analyze their feasibility. To achieve this, we propose a system that automatically generates malicious Korean prompts by analyzing existing prompt injection attacks. Specifically, we focus on generating malicious prompts that induce harmful expressions from large language models and validate their effectiveness in practice.

A Suvey on Satisfaction Measurement of Automatic Milking System in Domestic Dairy Farm (자동착유시스템 설치농가의 설치 후 만족도에 관한 실태조사)

  • Ki, Kwang-Seok;Kim, Jong-Hyeong;Jeong, Young-Hun;Kim, Yun-Ho;Park, Sung-Jai;Kim, Sang-Bum;Lee, Wang-Shik;Lee, Hyun-June;Cho, Won-Mo;Baek, Kwang-Soo;Kim, Hyeon-Shup;Kwon, Eung-Gi;Kim, Wan-Young;Jeo, Joon-Mo
    • Journal of Animal Environmental Science
    • /
    • v.17 no.1
    • /
    • pp.39-48
    • /
    • 2011
  • The present survey was conducted to provide basic information on automatic milking system (AMS) in relation to purchase motive, milk yield and quality, customer satisfaction, difficulties of operation and customer suggestions, etc. Purchase motives of AMS were insufficient labor (44%), planning of dairy experience farm (25%), better performance of high yield cows (19%) and others (6%), respectively. Average cow performance after using AMS was 30.9l/d for milk yield, 3.9% for milk fat, 9,100/ml for bacterial counts. Sixty-eight percentage of respondents were very positive in response to AMS use for their successors but 18% were negative. The AMS operators were owner (44%), successor (44%), wife (6%) and company worker (6%), respectively. The most difficulty (31%) in using AMS was operating the system and complicated program manual. The rate of response to system error and breakdown was 25%. The reasons for culling cow after using AMS were mastitis (28%), reproduction failure (19%), incorrect teat placement (12%), metabolic disease (7%) and others (14%), respectively. Fifty-six percentages of the respondents made AMS maintenance contract and 44% did not. Average annual cost of the maintenance contract was 6,580,000 won. Average score for AMS satisfaction measurement (1 to 5 range) was 3.2 with decrease of labor cost 3.7, company A/S 3.6, increase of milk yield 3.2 and decrease of somatic cell count 2.8, respectively. Suggestions for the higher efficiency in using AMS were selecting cows with correct udder shape and teat placement, proper environment, capital and land, and attitude for continuous observation. Systematic consulting was highly required for AMS companies followed by low cost for AMS setup and systematization of A/S.

Forward Security Protection Protocol of RFID System using New Key Generation Method (새로운 키 생성 방법을 통한 RFID시스템의 전방위보안성 보호 프로토콜)

  • Cho Jung-Hwan;Cho Jung-Sik;Yeo Sang-Soo;Kim Sung kwon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.19-21
    • /
    • 2005
  • 현대의 산업화 사회에서는 자동인식을 통해서 사람과 사물을 식별하고자 하는 연구들이 진행되고 있다. 그 대표적인 예로 바코드를 이용한 접촉식 판별기술이 있고, 라디오 주파수를 이용한 RFID(Radio Frequency Identification) 기술을 들 수 있다. RFID의 경우는 무선 주파수를 이용하기 때문에 대량의 사물을 동시에 인식 할 수 있다는 장점이 있다. 하지만. 어떠한 상황에서 리더의 요청에 응답을 하는 리더-태그 시스템이기 때문에 사용자의 프라이버시 침해 문제를 야기 할 수 있다. 사용자의 프라이버시 침해문제를 막기 위해서 많은 연구들이 진행되고 있다. 그 중에서, Miyako Ohkubo의 Hash체인을 이용한 프라이버시 보호 기법은 정보유출, 위치추적공격(Location Tracking Attack), 전방위보안성(Forward Security)과 같은 프라이버시 침해문제들로부터 사용자의 프라이버시를 보호 할 수 있는 프로토콜이다. 그러나 Hash함수를 태그에 구현하는 것은 현재까지는 불가능한 상황이다. 또, Martin Feldhofer의 AES(Advanced Encryption Standard)를 사용한 프로토콜은 실제로 태그에 구현 가능하면서 내부구조가 8bit인 AES를 사용함으로써 암호학적인 강도를 높였으나, 프라이버시 침해 문제에서 단점을 드러냈다. 이러한 단점을 보완한 AES기반에서의 개선된 RFID 프라이버시 보호 프로토콜은 실제적으로 태그에 구현 가능한 AES를 이용한 암호화 체인을 통해서 프라이버시 보호에 우수하면서 실제 사용이 가능한 프로토콜을 제안하였다[1]. 그러나, 이 프로토콜은 생성되는 키 값들이 물리적 공격을 통해서 노출이 되었을 때, 이전의 seed값과 키 값들이 노출 되는 단점이 있다. 본 논문에서는 이러한 문제들을 해결하고자 프라이버시보호에 새로운 키 생성 방법을 통한 강력한 프로토콜을 제안 한다.하였으나 사료효율은 증진시켰으며, 후자(사양, 사료)와의 상호작용은 나타나지 않았다. 이상의 결과는 거세비육돈에서 1) androgen과 estrogen은 공히 자발적인 사료섭취와 등지방 침적을 억제하고 IGF-I 분비를 증가시키며, 2) 성선스테로이드호르몬의 이 같은 성장에 미치는 효과의 일부는 IGF-I을 통해 매개될 수도 있을을 시사한다. 약 $70 {\~} 90\%$의 phenoxyethanol이 유상에 존재하였다. 또한, 미생물에 대한 항균력도 phenoxyethanol이 수상에 많이 존재할수록 증가하는 경향을 나타내었다. 따라서, 제형 내 oil tomposition을 변화시킴으로써 phenoxyethanol의 사용량을 줄일 수 있을 뿐만 아니라, 피부 투과를 감소시켜 보다 피부 자극이 적은 저자극 방부시스템 개발이 가능하리라 보여 진다. 첨가하여 제조한 curd yoghurt는 저장성과 관능적인 면에서 우수한 상품적 가치가 인정되는 새로운 기능성 신제품의 개발에 기여할 수 있을 것으로 사료되었다. 여자의 경우 0.8이상이 되어서 심혈관계 질환의 위험 범위에 속하는 수준이었다. 삼두근의 두겹 두께는 남녀 각각 $20.2\pm8.58cm,\;22.2\pm4.40mm$으로 남녀간에 유의한 차이는 없었다. 조사대상자의 식습관 상태는 전체 대상자의 $84.4\%$가 대부분이 하루 세끼 식사를 규칙적으로 하고 있었으며 식사속도는 허겁지겁 빨리 섭취하는 경우가 남자는 $31.0\%$, 여자는 $21.4\%$로 나타났고 이들을 제외한 나머지 사람들은 보통 속도 혹은 충분한 시간을 가지고 식사를 하였다. 평소 식사량은 조금 적게 혹은 적당하게 섭취하는 사람이 대부분이었으며 남자가 여자보다는 배부르게 먹는 경 향이 유의적으로 높았다(p<0.05). 식사는 혼자 하는 경우가 남자

  • PDF

Home Health Care Service Using Routine Vital Sign Checkup and Electronic Health Questionnaires (주기적인 생리변수 측정과 전자건강설문을 이용한 재택건강관리서비스)

  • 박승훈;우응제;이광호;김종철
    • Journal of Biomedical Engineering Research
    • /
    • v.22 no.5
    • /
    • pp.469-477
    • /
    • 2001
  • In this Paper. we describe a home health care service using electronic health questionnaires and routine checkup of vital signs Including ECG (Electrocardiography) , blood pressure. and SpO$_2$ (Oxygen Saturation) . This system is for patients at home with chronic diseases, discharged Patients, or any normal people for the Prevention of disease The service requires a home health care terminal and a PC with Interned connection installed at Patient home. The distance health care management center is equipped with a vital-sign and questionnaire interpreter as well as database, Web, and notification servers with UMS (Unified Messaging System). Participating Physician can access the servers at the center using a Web browser running on a PC available to them at any time. These components are linked together through various kinds of data and voice communication channels including PSTN (Public Switched Telephone Network) . CATV(Community Antenna TV) . Interned. and mobile communication network. Following the Physician's direction given to a Patient. he or she uses the home health care terminal to collect vital signs and fill out the questionnaire. When the terminal automatically transmits these data to the management center. the data interpreter and servers at the center process the information fo1lowing the Protocol implemented on the system. Physicians can retrieve and review data corresponding to their Patients and send back their diagnostic reports to the center. UMS at the center delivers the physician 's recommendation to the corresponding patient through the notification server. Patients can also reprieve and review their own records as well as diagnostic reports from physicians. The system Provides a new way of collecting diagnostic information and delivering doctor's recommendation to patients at home for their health management. Future works are needed in the development of new technology for measurements and interpretations of various vital signs .

  • PDF