• Title/Summary/Keyword: 정보호환

Search Result 1,333, Processing Time 0.03 seconds

Personal Training Suggestion System based Hybrid App (하이브리드 앱 기반의 퍼스널 트레이닝 제안 시스템)

  • Kye, Min-Seok;Lee, Hye-Soo;Park, Sung-Hyun;Kim, Dong-Ok;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.665-667
    • /
    • 2014
  • Wellness is IT fused with the user manage and maintain the health of a service can help you. If you are using an existing Fitness Center to yourself by choosing appliances that fit with the risk of injury in order to learn how the efficient movement had existed for a long time was needed. To resolve, use the personal training but more expensive cost of people's problems, and shown again in the habit of exercising alone will have difficulty. This paper provides a variety of smart phones based on a hybrid app with compatibility with the platform and personalized training market system. Users of the Fitness Center is built into smart phones in the history of their movement sensors or transmits to the Web by typing directly. This is based on exercise programs tailored to users via the training market. Personal training marketplace has a variety of users, check the history of this movement he can recommend an exercise program for themselves can be applied by selecting the. This provides users with the right exercise program can do long-term exercise habits can be proactive and goal setting.

  • PDF

Development of KBIMS Architectural and Structural Element Library and IFC Property Name Conversion Methodology (KBIMS 건축 및 구조 부재 라이브러리 및 IFC 속성명 변환 방법 개발)

  • Kim, Seonwoo;Kim, Sunjung;Kim, Honghyun;Bae, Kiwoo
    • Journal of the Korea Institute of Building Construction
    • /
    • v.20 no.6
    • /
    • pp.505-514
    • /
    • 2020
  • This research introduces the method of developing Korea BIM standard (KBIMS) architectural and structural element library and the methodology of converting KBIMS IFC property names with special characters. Diverse BIM tools are utilizing in project, however BIM library researches lack diversity on BIM tool selection. This research described the method to generate twelve categories and seven hundred and ninety-three elements library containing geometrical and numerical data in CATIA V6. KBIMS has its special property data naming systems which was the challenge inputting to ENOVIA IFC database. Three mapping methods for special naming characters had been developed and the ASCII code method was applied. In addition, the convertor prototype had been developed for searching and replacing the ASCII codes into the original KBIMS IFC property names. The methodology was verified by exporting 2,443 entities without data loss in the sample model conversion test. This research would provide a wider choice of BIM tool selection for applying KBIMS. Furthermore, the research would help on the reduction of data interoperability issues in projects. The developed library would be open to the public, however the continuous update and maintenance would be necessary.

Construction of Open-source Program Platform for Efficient Numerical Analysis and Its Case Study (효율적 수치해석을 위한 오픈소스 프로그램 기반 해석 플랫폼 구축 및 사례 연구)

  • Park, Chan-Hee;Kim, Taehyun;Park, Eui-Seob;Jung, Yong-Bok;Bang, Eun-Seok
    • Tunnel and Underground Space
    • /
    • v.30 no.6
    • /
    • pp.509-518
    • /
    • 2020
  • This study constructed a new simulation platform, including mesh generation process, numerical simulation, and post-processing for results analysis based on exploration data to perform real-scale numerical analysis considering the actual geological structure efficiently. To build the simulation platform, we applied for open-source programs. The source code is open to be available for code modification according to the researcher's needs and compatibility with various numerical simulation programs. First, a three-dimensional model(3D) is acquired based on the exploration data obtained using a drone. Then, the domain's mesh density was adjusted to an interpretable level using Blender, the free and open-source 3D creation suite. The next step is to create a 3D numerical model by creating a tetrahedral volume mesh inside the domain using Gmsh, a finite element mesh generation program. To use the mesh information obtained through Gmsh in a numerical simulation program, a converting process to conform to the program's mesh creation protocol is required. We applied a Python code for the procedure. After we completed the stability analysis, we have created various visualization of the study using ParaView, another open-source visualization and data analysis program. We successfully performed a preliminary stability analysis on the full-scale Dokdo model based on drone-acquired data to confirm the usefulness of the proposed platform. The proposed simulation platform in this study can be of various analysis processes in future research.

Development of an X3D Python Language Binding Viewer Providing a 3D Data Interface (3D 데이터 인터페이스를 제공하는 X3D Python 언어 바인딩 뷰어 개발)

  • Kim, Ha Seong;Lee, Myeong Won
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.6
    • /
    • pp.243-250
    • /
    • 2021
  • With the increased development of 3D VR applications augmented by recent VR/AR/MR technologies and by the advance of 3D devices, interchangeability and portability of 3D data have become essential. 3D files should be processed in a standard data format for common usage between applications. Providing standardized libraries and data structures along with the standard file format means that a more efficient system organization is possible and unnecessary processing due to the usage of different file formats and data structures depending on the applications can be omitted. In order to provide the function of using a common data file and data structure, this research is intended to provide a programming binding tool for generating and storing standardized data so that various services can be developed by accessing the common 3D files. To achieve this, this paper defines a common data structure including classes and functions to access X3D files with a standardized scheme using the Python programming language. It describes the implementation of a Python language binding viewer, which is an X3D VR viewer for rendering standard X3D data files based on the language binding interface. The VR viewer includes Python based 3D scene libraries and a data structure for creation, modification, exchange, and transfer of X3D objects. In addition, the viewer displays X3D objects and processes events using the libraries and data structure.

Analysis of Anti-Reversing Functionalities of VMProtect and Bypass Method Using Pin (VMProtect의 역공학 방해 기능 분석 및 Pin을 이용한 우회 방안)

  • Park, Seongwoo;Park, Yongsu
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.11
    • /
    • pp.297-304
    • /
    • 2021
  • Commercial obfuscation tools (protectors) aim to create difficulties in analyzing the operation process of software by applying obfuscation techniques and Anti-reversing techniques that delay and interrupt the analysis of programs in software reverse engineering process. In particular, in case of virtualization detection and anti-debugging functions, the analysis tool exits the normal execution flow and terminates the program. In this paper, we analyze Anti-reversing techniques of executables with Debugger Detection and Viralization Tools Detection options through VMProtect 3.5.0, one of the commercial obfuscation tools (protector), and address bypass methods using Pin. In addition, we predicted the location of the applied obfuscation technique by finding out a specific program termination routine through API analysis since there is a problem that the program is terminated by the Anti-VM technology and the Anti-DBI technology and drew up the algorithm flowchart for bypassing the Anti-reversing techniques. Considering compatibility problems and changes in techniques from differences in versions of the software used in experiment, it was confirmed that the bypass was successful by writing the pin automation bypass code in the latest version of the software (VMProtect, Windows, Pin) and conducting the experiment. By improving the proposed analysis method, it is possible to analyze the Anti-reversing method of the obfuscation tool for which the method is not presented so far and find a bypass method.

What factors drive AI project success? (무엇이 AI 프로젝트를 성공적으로 이끄는가?)

  • KyeSook Kim;Hyunchul Ahn
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.1
    • /
    • pp.327-351
    • /
    • 2023
  • This paper aims to derive success factors that successfully lead an artificial intelligence (AI) project and prioritize importance. To this end, we first reviewed prior related studies to select success factors and finally derived 17 factors through expert interviews. Then, we developed a hierarchical model based on the TOE framework. With a hierarchical model, a survey was conducted on experts from AI-using companies and experts from supplier companies that support AI advice and technologies, platforms, and applications and analyzed using AHP methods. As a result of the analysis, organizational and technical factors are more important than environmental factors, but organizational factors are a little more critical. Among the organizational factors, strategic/clear business needs, AI implementation/utilization capabilities, and collaboration/communication between departments were the most important. Among the technical factors, sufficient amount and quality of data for AI learning were derived as the most important factors, followed by IT infrastructure/compatibility. Regarding environmental factors, customer preparation and support for the direct use of AI were essential. Looking at the importance of each 17 individual factors, data availability and quality (0.2245) were the most important, followed by strategy/clear business needs (0.1076) and customer readiness/support (0.0763). These results can guide successful implementation and development for companies considering or implementing AI adoption, service providers supporting AI adoption, and government policymakers seeking to foster the AI industry. In addition, they are expected to contribute to researchers who aim to study AI success models.

Establishment of Risk Database and Development of Risk Classification System for NATM Tunnel (NATM 터널 공정리스크 데이터베이스 구축 및 리스크 분류체계 개발)

  • Kim, Hyunbee;Karunarathne, Batagalle Vinuri;Kim, ByungSoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.25 no.1
    • /
    • pp.32-41
    • /
    • 2024
  • In the construction industry, not only safety accidents, but also various complex risks such as construction delays, cost increases, and environmental pollution occur, and management technologies are needed to solve them. Among them, process risk management, which directly affects the project, lacks related information compared to its importance. This study tried to develop a MATM tunnel process risk classification system to solve the difficulty of risk information retrieval due to the use of different classification systems for each project. Risk collection used existing literature review and experience mining techniques, and DB construction utilized the concept of natural language processing. For the structure of the classification system, the existing WBS structure was adopted in consideration of compatibility of data, and an RBS linked to the work species of the WBS was established. As a result of the research, a risk classification system was completed that easily identifies risks by work type and intuitively reveals risk characteristics and risk factors linked to risks. As a result of verifying the usability of the established classification system, it was found that the classification system was effective as risks and risk factors for each work type were easily identified by user input of keywords. Through this study, it is expected to contribute to preventing an increase in cost and construction period by identifying risks according to work types in advance when planning and designing NATM tunnels and establishing countermeasures suitable for those factors.

Propose a Static Web Standard Check Model

  • Hee-Yeon Won;Jae-Woong Kim;Young-Suk Chung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.4
    • /
    • pp.83-89
    • /
    • 2024
  • After the end of the service of Internet Explorer, the use of ActiveX ended, and the Non-ActiveX policy spread. HTML5 is used as a standard protocol for web pages established based on the Non-ActiveX policy. HTML5, developed in the W3C(World Wide Web Consortium), provides a better web application experience through API, with various elements and properties added to the browser without plug-in. However, new security vulnerabilities have been discovered from newly added technologies, and these vulnerabilities have widened the scope of attacks. There is a lack of research to find possible security vulnerabilities in HTML5-applied websites. This paper proposes a model for detecting tags and attributes with web vulnerabilities by detecting and analyzing security vulnerabilities in web pages of public institutions where plug-ins have been removed within the last five years. If the proposed model is applied to the web page, it can analyze the compliance and vulnerabilities of the web page to date even after the plug-in is removed, providing reliable web services. And it is expected to help prevent financial and physical problems caused by hacking damage.

Comparative Study of User Reactions in OTT Service Platforms Using Text Mining (텍스트 마이닝을 활용한 OTT 서비스 플랫폼별 사용자 반응 비교 연구)

  • Soonchan Kwon;Jieun Kim;Beakcheol Jang
    • Journal of Internet Computing and Services
    • /
    • v.25 no.3
    • /
    • pp.43-54
    • /
    • 2024
  • This study employs text mining techniques to compare user responses across various Over-The-Top (OTT) service platforms. The primary objective of the research is to understand user satisfaction with OTT service platforms and contribute to the formulation of more effective review strategies. The key questions addressed in this study involve identifying prominent topics and keywords in user reviews of different OTT services and comprehending platform-specific user reactions. TF-IDF is utilized to extract significant words from positive and negative reviews, while BERTopic, an advanced topic modeling technique, is employed for a more nuanced and comprehensive analysis of intricate user reviews. The results from TF-IDF analysis reveal that positive app reviews exhibit a high frequency of content-related words, whereas negative reviews display a high frequency of words associated with potential issues during app usage. Through the utilization of BERTopic, we were able to extract keywords related to content diversity, app performance components, payment, and compatibility, by associating them with content attributes. This enabled us to verify that the distinguishing attributes of the platforms vary among themselves. The findings of this study offer significant insights into user behavior and preferences, which OTT service providers can leverage to improve user experience and satisfaction. We also anticipate that researchers exploring deep learning models will find our study results valuable for conducting analyses on user review text data.

A Study on Practical Classes for Healthcare Administration Education Program Using Health and Medical Big Data (보건의료 빅데이터를 활용한 보건행정 교육프로그램 실무수업에 관한 고찰)

  • Ok-Yul Yang;Yeon-Hee Lee
    • Journal of the Health Care and Life Science
    • /
    • v.10 no.1
    • /
    • pp.1-14
    • /
    • 2022
  • This study is a study on the possibility of using big data-related education programs in health and medical administration-related departments using health and medical big data. This paper intends to examine the health and medical big data from five perspectives. 1st, in addition to the aforementioned 'Health and Medical Big Data Open System', I would like to examine the characteristics and application technologies of public big data disclosed by 'Korea Welfare Panel', 'Public Big Data', 'Seoul City Big Data', 'Statistical Office Big Data', etc. 2nd, it is intended to examine the appropriateness of whether the applicable health and medical big data can be used as living data in regular subjects of health and medical administration and health information related departments of junior colleges. 3rd, we want to select the most appropriate tool for classroom lectures using existing statistical processing packages and programming languages. Fourth, finally, by using verified health and medical big data and appropriate tools, we want to test the possibility of expressing graphs, etc. in class and the steps from writing a report. 4th, I would like to describe the relative advantages of R language that can satisfy portability, installability, cost effectiveness, compatibility, and big data processing potential.