• Title/Summary/Keyword: 주소 유효성 검증

Search Result 10, Processing Time 0.023 seconds

A Method of Recognizing and Validating Road Name Address from Speech-oriented Text (음성 기반 도로명 주소 인식 및 주소 검증 기법)

  • Lee, Keonsoo;Kim, Jung-Yeon;Kang, Byeong-Gwon
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.31-39
    • /
    • 2021
  • Obtaining delivery addresses from calls is one of the most important processes in TV home shopping business. By automating this process, the operational efficiency of TV home shopping can be increased. In this paper, a method of recognizing and validating road name address, which is the address system of South Korea, from speech oriented text is proposed. The speech oriented text has three challenges. The first is that the numbers are represented in the form of pronunciation. The second is that the recorded address has noises that are made from repeated pronunciation of the same address, or unordered address. The third is that the readability of the resulted address. For resolving these problems, the proposed method enhances the existing address databases provided by the Korea Post and Ministry of the Interior and Safety. Various types of pronouncing address are added, and heuristic rules for dividing ambiguous pronunciations are employed. And the processed address is validated by checking the existence in the official address database. Even though, this proposed method is for the STT result of the address pronunciation, this also can be used for any 3rd party services that need to validate road name address. The proposed method works robustly on noises such as positions change or omission of elements.

Junk-Mail Filtering by Mail Address Validation and Title-Content Weighting (메일 주소 유효성과 제목-내용 가중치 기법에 의한 스팸 메일 필터링)

  • Kang Seung-Shik
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.2
    • /
    • pp.255-263
    • /
    • 2006
  • It is common that a junk mail has an inconsistency of mail addresses between those of the mail headers and the mail recipients. In addition, users easily know that an email is a junk or legitimate mail only by looking for the title of the email. In this paper, we tried to apply the filtering classifiers of mail address validation check and the combination method of title-content weighting to improve the performance of junk mail filtering system. In order to verify the effectiveness of the proposed method, we performed an experiment by applying them to Naive Bayesian classifier. The experiment includes the unit testing and the combination of the filtering techniques. As a result, we found that our method improved 11.6% of recall and 2.1% of precision that it contributed the enhancement of the junk mail filtering system.

  • PDF

Remote Application Control Technology and Implementation of HTML5 based Smart TV Platform Standard (HTML5 기반 스마트 TV 플랫폼 표준의 원격 앱 제어 기술과 구현)

  • Lee, Dong-Hoon;Hong, Sung-Wook;Kim, Ho-Youn;Park, Dong-Young
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2016.06a
    • /
    • pp.325-328
    • /
    • 2016
  • 본 논문은 2016 년 6 월 TTA 개정 표준 "HTML5 기반 스마트 TV 플랫폼(TTAK.KO-07.0111/R2)"에서 스마트폰, 태블릿 등 컴패니언 디바이스를 통해 스마트 TV 에 설치된 서비스 애플리케이션(이하, 앱)을 원격으로 조회, 실행, 종료 등의 제어를 지원하는 표준 기술을 소개한다. 이 기술은 표준에서 이미 정의된 멀티스크린 기술을 바탕으로 컴패니언 디바이스(모바일, 테블릿 등)를 통해 스마트 TV 를 인지하고 해당 TV 의 IP 주소 정보를 인식하여 JSON-RPC 프로토콜을 이용한 함수 형식 제어 요청을 통해 정보를 전달하는 방식으로 스마트 TV 수신기는 앱 정보 제공, 특정 앱 실행, 앱 종료 등 다양한 원격 앱 제어 기능을 서비스한다. 또한, 해당 원격 앱 제어 기술을 PC 기반의 가상환경인 스마트 TV 2.0 에뮬레이터 구현으로 표준기술에 유효성 검증과 서비스 응용 사례를 설명한다.

  • PDF

A Disassembly Technique of ARM Position-Independent Code with Value-Set Analysis Having Symbol-Form Domain (기호 형태의 값-집합 분석을 이용한 ARM 위치 독립적 코드의 정교한 역어셈블리 기법)

  • Ha, Dongsoo;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1233-1246
    • /
    • 2018
  • With the proliferation of smart mobiles, disassembly techniques for position-independent code (PIC) composed of ARM architecture instructions in computer security are becoming more important. However, existing techniques have been studied on x86 architecture and are focused on solving problems of non-PIC and generality. Therefore, the accuracy of the collected address information is low to apply to advanced security technologies such as binary measurement. In this paper, we propose a disassembly technique that reflects the characteristics of PIC composed of ARM instructions. For accuratly collecting traceable addresses, we designed value-set analysis having symbol-form domain. To solve the main problem of disassembly, we devised a heuristic using the characteristics of the code generated by the compiler. To verify the accuracy and effectiveness of our technique, we tested 669 shared libraries and executables in the Android 8.1 build, resulting in a total disassembly rate of 91.47%.

Method to Verify the Validity of Device in a Home Network (홈 네트워크에서 디바이스의 유효성 검증 방법)

  • Kim Do-Woo;Kim Geon-Woo;Lee Jun-Ho;Han Jong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1065-1069
    • /
    • 2006
  • With a home network, a device can dynamically join a home network obtain an IP address, convey its capabilities, and learn about the presence and capabilities of other devices. Devices can subsequently communicate with each other directly. Device discovery protocol defines how network services can be discovered on the network. In this paper, we propose the secure discovery method of devices that uses mutual authentication with symmetric key between devices. This method that we present distributes symmetric-key to home network devices by the home server. Using this key, mutual authentication is performed between home appliances. It enables any appliance under any middleware's control to securely communicate any other appliances.

A Formal Security Analysis on the Enhanced Route Optimization Protocol for Mobile IPv6 (이동 IPv6의 확장된 경로 최적화프로토콜에 대한 형식화된 보안 분석)

  • You, Il-Sun;Kim, Heung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.4
    • /
    • pp.691-699
    • /
    • 2009
  • Recently, the ERO protocol has been adopted as a standard to protect the routing optimization mode introduced by MIPv6. This protocol uses the public key cryptography and the early binding update method to improve the Return Routeability protocol while optimizing both security and performance. On the other hand, though various security approaches including the ERO protocol have been proposed for MIPv6, they lack formal verification. Especially, to our best knowledge, there is no formal analysis on the ERO protocol. In order to provide a good example for formal analysis on MIPv6 security protocols, this paper verifies the correctness of the ERO protocol through BAN-logic. For this goal, BAN-logic is extended to consider the address tests on the mobile nodes's CoA and HoA. It is expected that the analysis presented in this paper will be useful for the formal verifications on the security protocols related to MIPv6.

Design of Standard Data Model for the Informatization of Signboards (간판의 정보화를 위한 표준 데이터 모델 설계)

  • Kwon, Sang Il;Kim, Eui Myoung
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.38 no.3
    • /
    • pp.197-209
    • /
    • 2020
  • Signboards are installed in different types and sizes depending on the shop characteristics. However, the local government is having difficulty managing signboards with frequent opening and closing of stores and insufficient management personnel. In this study, a methodology was proposed to standardize and efficiently manage signboard information. To this end, the signboard display method of the enforcement ordinance related to outdoor advertising was analyzed to define the attribute elements of standard signboard data. In addition, physical information of signboards was obtained through signboard recognition technology, which is a prior study, and attribute elements of signboard standard data were defined through information that can be read with the naked eye, building integration information of the Ministry of the Interior and Safety, and street name address. In order to standardize the signboard information by spatial characteristics, data product specifications and metadata were defined according to the national spatial information standard. Lastly, standard data for signboards were produced in XML (Extensible Markup Language) format for compatibility, and XSD (XML Schema Definition) was defined for XML integrity so that data validity could be verified. Through this, a standard data model for the informatization of signboards was designed.

Implementation of ROS-Based Intelligent Unmanned Delivery Robot System (ROS 기반 지능형 무인 배송 로봇 시스템의 구현)

  • Seong-Jin Kong;Won-Chang Lee
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.610-616
    • /
    • 2023
  • In this paper, we implement an unmanned delivery robot system with Robot Operating System(ROS)-based mobile manipulator, and introduce the technologies employed for the system implementation. The robot consists of a mobile robot capable of autonomous navigation inside the building using an elevator and a Selective Compliance Assembly Robot Arm(SCARA)-Type manipulator equipped with a vacuum pump. The robot can determines the position and orientation for picking up a package through image segmentation and corner detection using the camera on the manipulator. The proposed system has a user interface implemented to check the delivery status and determine the real-time location of the robot through a web server linked to the application and ROS, and recognizes the shipment and address at the delivery station through You Only Look Once(YOLO) and Optical Character Recognition(OCR). The effectiveness of the system is validated through delivery experiments conducted within a 4-story building.

A Real-Time and Statistical Visualization Methodology of Cyber Threats Based on IP Addresses (IP 주소 기반 사이버공격 실시간 및 통계적 가시화 방법)

  • Moon, Hyeongwoo;Kwon, Taewoong;Lee, Jun;Ryou, Jaecheol;Song, Jungsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.465-479
    • /
    • 2020
  • Regardless of the domestic and foreign governments/companies, SOC (Security Operation Center) has operated 24 hours a day for the entire year to ensure the security for their IT infrastructures. However, almost all SOCs have a critical limitation by nature, caused from heavily depending on the manual analysis of human agents with the text-based monitoring architecture. Even though, in order to overcome the drawback, technologies for a comprehensive visualization against complex cyber threats have been studying, most of them are inappropriate for the security monitoring in large-scale networks. In this paper, to solve the problem, we propose a novel visual approach for intuitive threats monitoring b detecting suspicious IP address, which is an ultimate challenge in cyber security monitoring. The approach particularly makes it possible to detect, trace and analysis of suspicious IPs statistically in real-time manner. As a result, the system implemented by the proposed method is suitably applied and utilized to the real-would environment. Moreover, the usability of the approach is verified by successful detecting and analyzing various attack IPs.

A Clinical Study of Soeumin Doksamkwankaeijungtang (독삼관계이중탕(獨參官桂理中湯)의 소음인(小陰人) 인후통(咽喉痛) 치험례(治驗例))

  • Huh, Manhn-hoi;Song, Il-byung
    • Journal of Sasang Constitutional Medicine
    • /
    • v.12 no.1
    • /
    • pp.240-259
    • /
    • 2000
  • 1. Background and Purpose I intented to be helpful to understand the consitutional symptoms of soar throat and the application of the prescription through a clinical study of Soeumin Doksamkwankaeijungtang. 2. Methods I studied 16 patients(1 man and 15 women) treated by Doksamkwankaeijungtang in Chewon Oriental Clinic. And then I investigated the characteristics of patients treated by Doksamkwankaeijungtang, remedial values and side effects. 3. Results Doksamkwankaeijungtang was used in the age groups between twenties and sixties. There were 28 kinds of chief complaints including soar throat, tonsilitis, allergic rheum, bitter taste, dry throat, dry cough, stomatitis, lower abdominal pains, climacteric syndrome, etc. The distributions of remedial values were completely recovered (56.25%), much improved (18.75%), slightly improved(6.25%), no improved(12.5%), aggravated(6.25%), side effects(18.75%). There was one aggravated patient. Using the prescription, I prescribed it without any changing and addition according to the symptoms of soar throat. The remedial value of Doksamkwankaeijungtang was effective and not influenced by the dosage of Ginseng. The onset of action was very quick by the changes of dosage without the relation of age. Side effects were upward tendency of blood presser, headache, chest pain, etc. 4. Conclusion Doksamkwankaeijungtang was specifically effective in soar throat of Soeumin.

  • PDF