• Title/Summary/Keyword: 정보인식 유형

Search Result 751, Processing Time 0.033 seconds

The Analysis on Patterns and the Case Study on Standardization Competition in the field of Telecommunications (정보통신 표준화 경쟁 유형 및 사례 조사 분석)

  • Park, Wung;Lee, Byoung-Nam
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.728-731
    • /
    • 2005
  • Standardization is essential strategic tool for a firm to preoccupy a market in the telecommunication industry. WTO TBT(Technical Barriers to Trade) makes importance of standardization greater in telecommunication industry. Therefore countries, not to speak of firms, recognize standards essential strategy to preoccupy markets. In this paper, we will analyze the patterns and study the case on standardization competition in the field of telecommunications.

  • PDF

A Study on the Improvement Strategies of Policy Information Services for National Library of Korea, Sejong (국립세종도서관 정책정보서비스 개선 전략 연구)

  • Choi, Jae-Hwang;Jeong, Hong-Sang;Park, Sungjae;Lee, Jae-Young;Lee, Jongwook
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.54 no.1
    • /
    • pp.71-88
    • /
    • 2020
  • The purpose of this study is to propose the improvement strategies for policy information services of National Library of Korea, Sejong through analysis of their current status and problems. For the study, we conducted interviews with service providers and users and identified some issues in provision and use of the services. Specifically, we found problems of service provision system characterized by dualization and decentralization, and further identified specific issues with provision of individual services. Moreover, the interviews with service users suggested user types, user perception of the service, and problems in the use of individual services. Based on the findings, we proposed improvement strategies in six aspects: collection, services, organization, system, promotion, and cooperation. We hope these strategies contribute to vitalizing the policy information services of National Library of Korea, Sejong.

유비쿼터스 네트워크에서 서비스 거부(Denial of Service) 공격의 특성 및 위험성 분석

  • 이병주;홍순좌;이승형
    • Review of KIISC
    • /
    • v.14 no.1
    • /
    • pp.35-45
    • /
    • 2004
  • 미래 유비쿼터스 컴퓨팅 환경의 네트워크 인프라 구축을 위한 핵심기술은 무선 ad hoc 네트워크이다. 이러한 ad hoc 네트워크에 대한 보안은 일반 네트워크와 마찬가지로 보안성, 무결성, 가용성 등이 요구되지만. 일반적으로 무선네트워크라는 점, 고정 인프라가 없다는 점, 네트워크 토폴로지가 수시로 변한다는 점 등 때문에 보안문제는 훨씬 어려운 것으로 인식되고 있다. 본 논문에서는 보안 요구사항 중에서 가용성에 중점을 두어, 일반 네트워크와는 다른 유비쿼터스 네트워크에서의 DoS 공격의 여러 가지 유형을 분석한다. 또한 이러한 DoS 공격이 유비쿼터스 네트워크에 미치는 영향을 컴퓨터 시뮬레이션을 통해 전송성능과 생존성의 측면에서 분석한다. 본 논문의 실험결과는 같은 유형의 DoS 공격이더라도 무선 ad hoc 네트워크가 일반적인 네트워크에 비해 더 심각한 피해를 당할 수 있음을 보여준다.

Design and Implement of Reservation Call Service based SIP (SIP 기반 예약통화 시스템 설계 및 구현)

  • 국장미;정국상;최덕재
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.409-411
    • /
    • 2002
  • VoIP(Voice over IP)는 저렴한 비용과 다양한 응용서비스 기능으로 기존의 전화서비스를 보조 또는 대체할 서비스로 인식되고 있다. 특히 SIP(Session Initiation Protocol)는 텍스트 기반으로 다양한 애플리케이션과 쉽게 연동될 수 있다는 장점 때문에 차세대 VoIP프로토콜로 급성장하고 있으며 이를 이용한 VoIP 망 구성 및 부가서비스에 대한 관심이 증대되고 있다. 부가서비스는 콜의 발생 여부에 따라 사용자의 콜을 처리하여 서비스를 제공하는 형태와 서버가 직접 콜을 발생시켜 서비스를 제공하는 형태의 두 가지 유형으로 나눌 수 있다. 현재 SIP기반 VoIP에서는 사용자의 콜을 처리하는 서비스를 위한 CPL(Call Processing Language)이 표준화 중이며 이를 기반으로 여러 서비스도 구현되어 있다. 그러나 특정시간에 콜을 발생시켜 사용자에게 서비스를 제공하는 형태의 서비스는 논의되지 않고 있으며 구현된 사례도 아직 없는 상황이다. 따라서 본 논문에서는 이러한 유형의 새로운 서비스의 하나로 예약통화 시스템을 제안한다. 예약통화 시스템은 예약된 시간에 콜을 발생시켜 두 사용자간의 통화를 연결해 주는 예약 시간 기반의 서비스를 개발하는데 이용될 수 있다.

  • PDF

Developing a New Algorithm for Conversational Agent to Detect Recognition Error and Neologism Meaning: Utilizing Korean Syllable-based Word Similarity (대화형 에이전트 인식오류 및 신조어 탐지를 위한 알고리즘 개발: 한글 음절 분리 기반의 단어 유사도 활용)

  • Jung-Won Lee;Il Im
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.3
    • /
    • pp.267-286
    • /
    • 2023
  • The conversational agents such as AI speakers utilize voice conversation for human-computer interaction. Voice recognition errors often occur in conversational situations. Recognition errors in user utterance records can be categorized into two types. The first type is misrecognition errors, where the agent fails to recognize the user's speech entirely. The second type is misinterpretation errors, where the user's speech is recognized and services are provided, but the interpretation differs from the user's intention. Among these, misinterpretation errors require separate error detection as they are recorded as successful service interactions. In this study, various text separation methods were applied to detect misinterpretation. For each of these text separation methods, the similarity of consecutive speech pairs using word embedding and document embedding techniques, which convert words and documents into vectors. This approach goes beyond simple word-based similarity calculation to explore a new method for detecting misinterpretation errors. The research method involved utilizing real user utterance records to train and develop a detection model by applying patterns of misinterpretation error causes. The results revealed that the most significant analysis result was obtained through initial consonant extraction for detecting misinterpretation errors caused by the use of unregistered neologisms. Through comparison with other separation methods, different error types could be observed. This study has two main implications. First, for misinterpretation errors that are difficult to detect due to lack of recognition, the study proposed diverse text separation methods and found a novel method that improved performance remarkably. Second, if this is applied to conversational agents or voice recognition services requiring neologism detection, patterns of errors occurring from the voice recognition stage can be specified. The study proposed and verified that even if not categorized as errors, services can be provided according to user-desired results.

Re-defining Named Entity Type for Personal Information De-identification and A Generation method of Training Data (개인정보 비식별화를 위한 개체명 유형 재정의와 학습데이터 생성 방법)

  • Choi, Jae-hoon;Cho, Sang-hyun;Kim, Min-ho;Kwon, Hyuk-chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.206-208
    • /
    • 2022
  • As the big data industry has recently developed significantly, interest in privacy violations caused by personal information leakage has increased. There have been attempts to automate this through named entity recognition in natural language processing. In this paper, named entity recognition data is constructed semi-automatically by identifying sentences with de-identification information from de-identification information in Korean Wikipedia. This can reduce the cost of learning about information that is not subject to de-identification compared to using general named entity recognition data. In addition, it has the advantage of minimizing additional systems based on rules and statistics to classify de-identification information in the output. The named entity recognition data proposed in this paper is classified into twelve categories. There are included de-identification information, such as medical records and family relationships. In the experiment using the generated dataset, KoELECTRA showed performance of 0.87796 and RoBERTa of 0.88.

  • PDF

Improving Security Awareness about Smishing through Experiment on the Optimistic Bias on Risk Perception (위험인식의 낙관적 편향 실험을 통한 스미싱 보안인식 개선)

  • Kang, Ji Won;Lee, Ae Ri;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.475-487
    • /
    • 2016
  • Recently, various risks of smartphone hacking are emerging. Smishing crime techniques become more cunning and its damage has been increasing, thereby requiring effective ways of preventing and coping with smishing. Especially, it is emphasized the need for smartphone users' security awareness and training besides technological approach. This study investigates the effective method for providing news messages in order to improve the perception of risk from smishing. This research empirically examines that the degree of optimistic bias on risk perception can vary depending on news frame, topic type, and involvement regarding smishing. Based on the findings, it identifies the factors influencing risk perception and verifies effective ways of promoting individual security awareness on smishing. The results of this study provide implications that assist in educating, campaigning and promoting information security awareness for smart device users.

생체신호를 이용한 텔레바이오인식기술 동향 및 전망

  • Kim, Jason;Lee, Saewoom
    • Review of KIISC
    • /
    • v.26 no.4
    • /
    • pp.41-46
    • /
    • 2016
  • 전통적으로 바이오인식기술은 출입국심사(전자여권, 승무원 승객 신원확인), 출입통제(도어락, 출입통제 근태관리), 행정(무인민원발급, 전자조달), 사회복지(미아찾기, 복지기금관리), 의료(원격의료, 의료진 환자 신원확인), 정보통신(휴대폰 PC 인터넷 인증), 금융(온라인 뱅킹, ATM 현금인출) 등 다방면에서 폭넓게 보급되어 실생활에서 널리 활용되고 있다. [그림1]은 신체적 특징(Physiological biometrics)과 행동적 특징(Behavioral biometrics)을 이용한 사용자 인증기술인 바이오인식기술의 유형과 함께 각 기술별 보안취약점(괄호 안 빨강색글자)을 나타내고 있다. 최근 들어, 모바일 지급결제서비스 ATM 인출기 인터넷전문은행 등과 같은 핀테크 분야에서 비대면 인증기술로 바이오인식기술이 각광을 받기 시작했다. 한편, 가짜지문 등 기존의 신체적 특징을 이용한 바이오인식기술의 위변조 위협에 대한 우려 존재함에 따라 뇌파 심전도 근전도 맥박 등 살아있는 사람의 행동적(신체의 기능적) 특징을 이용한 생체신호를 이용하여 비대면 인증기술로서 활용하기 위하여 주요 선진국에서 차세대 바이오인식 기술개발이 가속화되고 있는 추세이다.[1] 또한, 이러한 생체신호는 최근에 삼성전자, LG전자, 애플 등에서 스마트워치를 통해 심장박동수를 측정하고 스마트폰을 통하여 모바일 지급결제, 헬스케어 등과 같은 IoT 모바일 융복합 응용서비스에 활용될 전망이다. 본고에서는 뇌파 심전도(심박수)와 같은 생체신호를 측정하는 스마트워치 밴드형 의복형 또는 패치형태의 웨어러블 디바이스와 같은 생체신호센서, 생체신호 인증기술 및 관련표준화 동향을 고찰해 보기로 한다. 국내외 관련기술과 표준화 동향을 면밀히 분석하여 지난 2015년 5월29일에 발족한 국내외 전문가그룹인 KISA"모바일 생체신호 인증기술 표준연구회"(이하 KISA 표준연구회)가 구심점이 되어 한국형 생체신호를 이용한 차세대 텔레바이오인식기술에 대한 연구개발과 국내외 표준화 추진에 박차를 가할 계획이다.

An Investigation of the Types of Analogies Generated by Science-Gifted Student, Mapping Errors on the Chromatography, and the Perceptions on Generating Analogy (크로마토그래피 개념에 대해 중학교 과학영재가 만든 비유의 유형과 대응 오류 및 비유 만들기 활동에 대한 인식 조사)

  • Kim, You-Jung;Moon, Se-Jeong;Noh, Tae-Hee
    • Journal of The Korean Association For Science Education
    • /
    • v.29 no.8
    • /
    • pp.861-873
    • /
    • 2009
  • This study investigated the types of analogies generated by science-gifted students, mapping errors on the chromatography, and the perceptions on generating analogy. The subjects were science-gifted eighth-graders (N=68) enrolled at four gifted-education centers in Seoul. Analyses of the results revealed that most science-gifted students represented the analogies using verbal and pictorial forms based on concrete and everyday experiences, and they elaborately explained them including the functional attributes and the causal relationships of the target concept. Science-gifted students selected the analogies having rich similarities or similar structure and principle between the target concept and the analogy as the best of the self-generated analogies. And they used mainly their 'school life' as analogy materials. The results of the mapping test showed that many science-gifted students had mapping errors such as 'failure to map' and 'overmapping'. They were found to have the positive perceptions on generating analogy. The present study will provide the basic information to develop an instructional model in generating analogy in an education program for science-gifted students.

A Typology of Media-Public Sphere Relationships (공론장-미디어 관계의 유형화)

  • Cho, Hang-Je;Park, Hong-Won
    • Korean journal of communication and information
    • /
    • v.50
    • /
    • pp.5-28
    • /
    • 2010
  • The theoretical scope of the public sphere has been dramatically expanded as a result of new academic inquiries into the nature of the political and the public in contemporary societies. While appreciating the value of the concept of the public sphere for understanding democratic roles of the media, scholars began to raise questions on Habermasians' exclusive focus on news and public affairs programs, arguing that various entertainment programs also can invoke political deliberation. Terms like affective public sphere, emotional public sphere, aesthetic public sphere, expressive public sphere were used to capture this new conception. To comprehend the theoretical and practical implications of the conceptual expansion of the public sphere for media studies, this study attempted to provide a typology of media-public sphere relationships. By using public-private and rational-emotional axes as two criteria for classification, we created four prototypes of the public sphere (i.e., political public sphere, populism, difference pluralism, and intimacy/privacy) and discussed the characteristics of each type. After setting out media communication as a form of meta-public sphere that mediates and coordinates the four different types of the public sphere, we presented public service broadcasting as an exemplar meta-public sphere in the contemporary society of multiple social antagonisms and differences.

  • PDF