• Title/Summary/Keyword: 행위패턴

Search Result 381, Processing Time 0.033 seconds

A Study on Spatial Planning of Children's Library: Focused on the Aspect of Space Use According to the Age Step of Children (어린이 도서관의 공간계획에 관한 연구: 어린이의 연령 단계별 공간이용 실태를 중심으로)

  • Lee Jeong-Mi;Kwak Chul-Wan
    • Journal of Korean Library and Information Science Society
    • /
    • v.36 no.4
    • /
    • pp.177-198
    • /
    • 2005
  • The objective of this paper is to obtain the knowledge for spatial Planning of children's library which serves various users. The study method is to observes the children and their parents' space use according to the age step of children in public library, and analyzes it in the relation with the classified 4-types of children's section. Five characteristics were identified. First, children area was influenced by library location and user's characteristics. Second, children area was used various aged group with children. Third, there were different use patterns based upon age. Fourth, various reading space was needed through areas. And, last the behavior and the characteristics of area and furnishings were described.

  • PDF

Ransomware Detection and Recovery System Based on Cloud Storage through File System Monitoring (파일 시스템 모니터링을 통한 클라우드 스토리지 기반 랜섬웨어 탐지 및 복구 시스템)

  • Kim, Juhwan;Choi, Min-Jun;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.357-367
    • /
    • 2018
  • As information technology of modern society develops, various malicious codes with the purpose of seizing or destroying important system information are developing together. Among them, ransomware is a typical malicious code that prevents access to user's resources. Although researches on detecting ransomware performing encryption have been conducted a lot in recent years, no additional methods have been proposed to recover damaged files after an attack. Also, because the similarity comparison technique was used without considering the repeated encryption, it is highly likely to be recognized as a normal behavior. Therefore, this paper implements a filter driver to control the file system and performs a similarity comparison method that is verified based on the analysis of the encryption pattern of the ransomware. We propose a system to detect the malicious process of the accessed process and recover the damaged file based on the cloud storage.

Efficient Processing method of OLAP Range-Sum Queries in a dynamic warehouse environment (다이나믹 데이터 웨어하우스 환경에서 OLAP 영역-합 질의의 효율적인 처리 방법)

  • Chun, Seok-Ju;Lee, Ju-Hong
    • The KIPS Transactions:PartD
    • /
    • v.10D no.3
    • /
    • pp.427-438
    • /
    • 2003
  • In a data warehouse, users typically search for trends, patterns, or unusual data behaviors by issuing queries interactively. The OLAP range-sum query is widely used in finding trends and in discovering relationships among attributes in the data warehouse. In a recent environment of enterprises, data elements in a data cube are frequently changed. The problem is that the cost of updating a prefix sum cube is very high. In this paper, we propose a novel algorithm which reduces the update cost significantly by an index structure called the Δ-tree. Also, we propose a hybrid method to provide either approximate or precise results to reduce the overall cost of queries. It is highly beneficial for various applications that need quick approximate answers rather than time consuming accurate ones, such as decision support systems. An extensive experiment shows that our method performs very efficiently on diverse dimensionalities, compared to other methods.

Changing Industrial Structure and Employment of Older Males in the United States: 1880~1940 (미국 산업구조의 변화가 고령 남성의 고용에 미친 영향: 1880~1940)

  • Lee, Chulhee
    • Journal of Labour Economics
    • /
    • v.26 no.3
    • /
    • pp.1-28
    • /
    • 2003
  • This article examines the employment status of older male workers in the era of industrialization, focusing on the questions of how the extent of pressure toward retirement varied across different occupations, and how it changed over time. A comparison of hazard of retirement across occupations shows that men who had better occupations in terms of economic status and work conditions were less likely to retire than were those with poorer jobs. This result tends to reject the recent view that retirement was more voluntary than forced as early as a century ago. The difficulty faced by older workers in the labor market, as measured by the relative incidence of long-term unemployment, was relatively severe among craftsmen, operatives, and salesmen. In contrast, aged farmers, professionals, managers, and proprietors appear to have fared well in the labor market. The pattern of shifts in the occupational structure that occurred between 1880 and 1940 suggests that industrialization had brought a growth of the sectors in which the pressure toward departure from employment at older ages was relatively strong.

  • PDF

A Study of Security for a Spam Attack of VoIP Vulnerability (VoIP 취약점에 대한 스팸 공격과 보안에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.215-224
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among Vulnerability of VoIP at these papers study. Write scenario of a spam attack regarding VoIP Vulnerability, and execute Call spam. Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove. and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN. and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

Feature Selection for Anomaly Detection Based on Genetic Algorithm (유전 알고리즘 기반의 비정상 행위 탐지를 위한 특징선택)

  • Seo, Jae-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.1-7
    • /
    • 2018
  • Feature selection, one of data preprocessing techniques, is one of major research areas in many applications dealing with large dataset. It has been used in pattern recognition, machine learning and data mining, and is now widely applied in a variety of fields such as text classification, image retrieval, intrusion detection and genome analysis. The proposed method is based on a genetic algorithm which is one of meta-heuristic algorithms. There are two methods of finding feature subsets: a filter method and a wrapper method. In this study, we use a wrapper method, which evaluates feature subsets using a real classifier, to find an optimal feature subset. The training dataset used in the experiment has a severe class imbalance and it is difficult to improve classification performance for rare classes. After preprocessing the training dataset with SMOTE, we select features and evaluate them with various machine learning algorithms.

New Strategy of Potential-Based Customer Management: A Case of S-Card's ECI Approach (추정소득 분석을 통한 S카드사의 잠재가치 기반의 고객관리 전략)

  • Park, Jin-Soo;Chang, Nam-Sik
    • Information Systems Review
    • /
    • v.9 no.2
    • /
    • pp.129-147
    • /
    • 2007
  • At the time the local credit-card companies plunged into a liquidity crisis in 2002, S-Card was urged to take into account the estimated customer income (ECI) to enhance its customer credit evaluation function for the first time in Korean financial industry. Before this new attempt by S-Card, most credit-card companies including S-Card had performed a customer's credit evaluation based on the customer's behavioral factors such as the amount of purchase on credit, debt payment, and financial history that is provided from the Credit Bureau. However, this approach failed to measure customer's potential value which is one of the major factors in judging the customer's ability to pay, and hence, led to difficulties in risk management. The purpose of this case study is to present the better approach to sophisticated risk management for financial firms in Korea by reviewing S-Card's process of customer income estimation and its application to risk management.

Esthetic & Rsychology of Cosmetics (에스테틱과 화장심리학)

  • 김봉인
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.22 no.1
    • /
    • pp.3-4
    • /
    • 1996
  • 오늘날 화장품 산업은 역동적으로 끊임없이 변화하고 있다. 화장품은 한 사회 구성원들의 다양한 욕구, 가치관 및 생할양식에 영향을 미치며 심지어는 국가의 정치적 기후나 경제적인 상태를 나타내는 지표역할을 담당하기도 한다. 즉, 화장품 과학은 예방의학, 건강과학이라는 차원에서 뿐만 아니라 미적인 차원에서 새로운 상품개발이 진행되어갈 것이다. 지금 우리는 21세기를 향하여 1990년대의 중반기에 들어섰다. 80년대는 물질 문명의 중심으로 생활의 질의 풍요로움을 추구하였으나 90년대는 소비자 우선의 풍요로움을 향수하는 시대가 되었다. 또한 여성이 사회진출, 고령화의 급속한 진전, 고 학력화, 개인의 가치관 존중 및 많은 생활패턴의 변화가 마음의 풍요로움을 구하는 사람들이 늘어나고 물질적 의존도로 부터의 탈피가 크게 강조되고 있다. 이에 마음의 풍요로움을 창조하여 연출하는 화장품산업의 역할이 고기능성에 의한 부가가치를 높이고 마음의 풍요로움을 지원하기 위한 연구개발에 중점을 두고 진행되어 가고 있다. 화장품을 여성들의 치장이라고 하는 주체적 행위에 도움을 주는 하드웨어라고 한다면 소비자의 마음은 소프트웨어로써 소비자 입장에서 만족할 수 있는 전략을 구사하는 아이디어가 있어야 하는데 그에 상응하는 대책으로 스킨케어를 들 수 있다. 스킨케어란 병든 피부를 제외한 여러 가지 유형의 피부를 화장품과 미용기기를 이용하여 그에 맞게 예방관리 하여 건강하고 아름답게 보호 유지하는 전문 분야이다. 즉, 스킨케어는 화장품 이용을 통하여 미래의 소비자들의 다양한 비용 욕구 및 소망에 효과적으로 대응할 수 있는 소프트웨어라고 할 수 있다., 또한 스킨케어는 화장품 뿐만 아니라 신체적 접촉을 통하여 안위를 제공하는 수단으로 단순한 피부손질이라는 문제에 그치지 않고 접촉을 통해 마음과 신체의 균형을 꾀하는 생명현상의 심층과 연관되는 중요한 의미가 있다. 스킨케어는 불어로 Soin Esthetique 라고 하는데 어원을 보면 손질, 처치, 보살핌 그리고 배려를 의미한다. 지금으로부터 200년전 독일의 미학자인 Baumgarten이 미는 인간에게 만족과 쾌감을 주는 대상이며 미는 보는 사람의 마음에 있다라는 감성의 미학에서 Esthetique라는 단어를 처음 사용했다. 다시 말하면 Soim Esthetique는 인간의 마음 만족과 쾌감을 주는 배려 있는 조치로써 여성이 화장을 함으로써 외모의 조화에서 마음과 신체의 균형을 꾀하는 생명현상의 심층과 연관되는 것과 마찬가지로 에스테틱과 화장의 심리는 매우 땔래야 땔 수 없는 불과분의 밀접한 관계라 볼 수 있다.

  • PDF

A Usability and Product in Unsubstantial Space (물리적 실체가 없는 공간에서의 Product,그리고 사용성에 관한 연구)

  • 김시만
    • Archives of design research
    • /
    • v.15 no.3
    • /
    • pp.93-102
    • /
    • 2002
  • The changing pattern of living and communication, combined with wireless technologies has given rise to more fluidity between spaces and relationships. Despite this, the way we use technology and the qualities of product and service are limited. For example, ON or OFF is like BLACK or WHITE, it presents a harsh distinction This severity in definition can make me uncomfortable when using products. The aim of this project is to improve the use of a product's functions and Qualities. As an example, the switch button has limited the possible interaction of a product. even each function is different. 1 intend this study is to imbue the switch with a greater freedom of interpretation. What will happen If I create a journey in between on and off\ulcorner For instance, time, pattern, state, rhythm and so on are analogue properties of a switch. The playful, spontaneous, and enjoyable behaviour of a switch will be able to bring other qualities of function and service. The switch will then be able to be an object with more human qualities, not simply an on and off button.

  • PDF

A study on the analysis of customer loan for the credit finance company using classification model (분류모형을 이용한 여신회사 고객대출 분석에 관한 연구)

  • Kim, Tae-Hyung;Kim, Yeong-Hwa
    • Journal of the Korean Data and Information Science Society
    • /
    • v.24 no.3
    • /
    • pp.411-425
    • /
    • 2013
  • The importance and necessity of the credit loan are increasing over time. Also, it is a natural consequence that the increase of the risk for borrower increases the risk of non-performing loan. Thus, we need to predict accurately in order to prevent the loss of a credit loan company. Our final goal is to build reliable and accurate prediction model, so we proceed the following steps: At first, we can get an appropriate sample by using several resampling methods. Second, we can consider variety models and tools to fit our resampling data. Finally, in order to find the best model for our real data, various models were compared and assessed.