• Title/Summary/Keyword: 코딩 규칙

Search Result 95, Processing Time 0.017 seconds

Content Recommendation Techniques for Personalized Software Education (개인화된 소프트웨어 교육을 위한 콘텐츠 추천 기법)

  • Kim, Wan-Seop
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.95-104
    • /
    • 2019
  • Recently, software education has been emphasized as a key element of the fourth industrial revolution. Many universities are strengthening the software education for all students according to the needs of the times. The use of online content is an effective way to introduce SW education for all students. However, the provision of uniform online contents has limitations in that it does not consider individual characteristics(major, sw interest, comprehension, interests, etc.) of students. In this study, we propose a recommendation method that utilizes the directional similarity between contents in the boolean view history data environment. We propose a new item-based recommendation formula that uses the confidence value of association rule analysis as the similarity level and apply it to the data of domestic paid contents site. Experimental results show that the recommendation accuracy is improved than when using the traditional collaborative recommendation using cosine or jaccard for similarity measurements.

An analysis method for complex attack pattern using the coupling metrics (결합척도를 이용한 복합 공격 패턴 분석 방법)

  • Kwon, Ye-Jin;Park, Young-Bom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1169-1178
    • /
    • 2012
  • Recently, since the most software intensive systems are using internet environment for data exchange, the software security is being treated as a big issue. And, to minimize vulnerability of software system, security ensuring steps which are applying secure coding rules, are introduced in the software development process. But, since actual attacks are using a variety of software vulnerabilities, it is hard to analyze software weakness by monotonic analysis. In this paper, it is tried to against the complex attack on the variety of software vulnerability using the coupling which is one of the important characteristic of software. Furthermore, pre-analysis of the complex attack patterns using a combination of various attack methods, is carried out to predict possible attack patterns in the relationship between software modules. And the complex attack pattern analysis method is proposed based on this result.

LRM's Characterics and Applications Plan Through Comparing with FRBR (FRBR과 비교를 통한 LRM의 특징 및 적용방안)

  • Lee, Mihwa
    • Journal of Korean Library and Information Science Society
    • /
    • v.53 no.2
    • /
    • pp.355-375
    • /
    • 2022
  • This study is to grasp LRM's feature and applications plan to reflect LRM to cataloging related standards and individual system through comparing and analyzing LRM with the FR model in terms of entities, attributes, and relationships. The application plan is suggested as follows. First, the entity can be extended by defining sub-entities of each entity in the standards and the individual system in order to reflect LRM, even though entities such as families, groups, identifiers, authorized access points, concepts, objects, events, agency and rules have been deleted in LRM. Second, the attribute should be subdivided in the standards and the individual system in order to apply LRM, though many attributes have been changed to relationships for linked data and decreased in LRM. In particular, more specific and detailed property names in the standards and the individual system should be clearly presented, and the vocabulary encoding scheme corresponding to each property should be also developed, since properties with similar functions or repetition in various entities, and material specific properties are generalized and integrated into comprehensive property names. Third, the relationship should be extended through newly declaring the refinement or subtype of the relationship and considering a multi-level relationship, since the relationship itself is general and abstract under increasing the number of relationships in comparing to the property. This study will be practically utilized in cataloging related standards and individual system for applying LRM.

Discovering abstract structure of unmet needs and hidden needs in familiar use environment - Analysis of Smartphone users' behavior data (일상적 사용 환경에서의 잠재니즈, 은폐니즈의 추상구조 발견 - 스마트폰 사용자의 행동데이터 수집 및 해석)

  • Shin, Sung Won;Yoo, Seung Hun
    • Design Convergence Study
    • /
    • v.16 no.6
    • /
    • pp.169-184
    • /
    • 2017
  • There is a lot of needs that are not expressed as much as the expressed needs in familiar products and services that are used in daily life such as a smartphone. Finding the 'Inconveniences in familiar use' make it possible to create opportunities for value expanding in the existing products and service area. There are a lot of related works, which have studied the definition of hidden needs and the methods to find it. But, they are making it difficult to address the hidden needs in the cases of familiar use due to focus on the new product or service developing typically. In this study, we try to redefine the hidden needs in the daily familiarity and approach it in the new way to find out. Because of the users' unability to express what they want and the complexity of needs which can not be explained clearly, we can not approach it as the quantitative issue. For this reason, the basic data type selected as the user behavior data excluding all description is the screen-shot of the smartphone. We try to apply the integrated rules and patterns to the individual data using the qualitative coding techniques to overcome the limitations of qualitative analysis based on unstructured data. From this process, We can not only extract meaningful clues which can make to understand the hidden needs but also identify the possibility as a way to discover hidden needs through the review of relevance to actual market trends. The process of finding hidden needs is not easy to systemize in itself, but we expect the possibility to be conducted a reference frame for finding hidden needs of other further studies.

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.