• Title/Summary/Keyword: Class of Service

Search Result 1,288, Processing Time 0.036 seconds

An Extraction Method of Bibliographic Information from the US Patents: Using an HTML Parsing Technique (미국 특허 서지정보 추출 방법에 대한 연구: HTML 파싱 기법의 활용을 중심으로)

  • Han, Yoo-Jin;Oh, Seung-Woo
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.2
    • /
    • pp.7-20
    • /
    • 2010
  • This study aims to provide a method of extracting the most recent information on US patent documents. An HTML paring technique that can directly connect to the US Patent and Trademark Office (USPTO) Web page is adopted. After obtaining a list of 50 documents through a keyword searching method, this study suggested an algorithm, using HTML parsing techniques, which can extract a patent number, an applicant, and the US patent class information. The study also revealed an algorithm by which we can extract both patents and subsequent patents using their closely connected relationship, that is a very distinctive characteristic of US patent documents. Although the proposed method has several limitations, it can supplement existing databases effectively in terms of timeliness and comprehensiveness.

Research on Fashion Edutech XR Content Applying Skeuomorphism (스큐어모피즘을 적용한 패션 에듀테크 XR 콘텐츠 연구)

  • Hyang-Ja, Kim
    • Fashion & Textile Research Journal
    • /
    • v.25 no.5
    • /
    • pp.560-567
    • /
    • 2023
  • This study aims to rediscover the industrial value of a borderless service in the hyper-connected era by producing fashion content at the forefront of the cultural industry as XR content and contributing to developing fashion content for edutech. The research method employed design aesthetic theory, while the empirical proposal utilized scientific knowledge information to build a framework for 3D convergence content. The characteristics of fashion content exhibitions that apply the neumorphism technique are as follows: The first is a virtual space that produces clothing culture by type. Africa, where dyeing and crafts are developed, selects a product-oriented exhibition type; Asia, where weaving and textiles are excellent, selects a random movement type; and Europe, where the evolution of clothing design over time is evident, selects a guided movement type to create a three-dimensional fashion edutech. The goal was to produce content. The second is creative reproducibility, which combines a new fashion design that embraces the aura of the original with a trendy sense. The realistic folk costume style of the original allowed for its implementation in the AR exhibition space using historical traditional style techniques such as weaving and textiles. The third is building organic, modular content. By designing and then saving/editing/arranging the basic VP zone for each style, learners and instructors can freely edit the content for each fashion class topic and create various presentations to ensure that it functions as non-face-to-face edutech content around the world.

Parallel Multistage Interconnection Switching Network for Broadband ISDN (광대역 ISDN을 위한 병렬 다단계 상호 연결 스위치 네트워크)

  • 박병수
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.3 no.4
    • /
    • pp.274-279
    • /
    • 2002
  • ATM packet switching technologies for the purpose of the B-ISDN service are focused on high performance which represents good qualities on throughput, packet loss, and packet delay. ATM switch designs on a class of parallel interconnection network have been researched. But these are based on the self-routing function of it. It leads to conflict with each other, and to lose the packets. Therefore, this paper proposes the method based on Sort-Banyan network should be adopted for optimal routing algorithm. It is difficult to expect good hardware complexity. For good performance, a switch design based on the development of new routing algorithm is required. For the design of switch network, the packet distributor and multiplane are proposed. They prevent each packet from blocking as being transmitted selectively by two step distributed decision algorithm. This switch will be proved to be a good performance switch network that internal blocking caused from self-routing function is removed. Also, it is expected to minimize the packet loss and decrease the packet delay according to packet transmission.

  • PDF

Implementation of Secure Keypads based on Tetris-Form Protection for Touch Position in the Fintech (핀테크에서 터치 위치 차단을 위한 테트리스 모양의 보안 키패드의 구현)

  • Mun, Hyung-Jin;Kang, Sin-Young;Shin, ChwaCheol
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.144-151
    • /
    • 2020
  • User-authentication process is necessary in Fintech Service. Especially, authentication on smartphones are carried out through PIN which is inputted through virtual keypads on touch screen. Attacker can analogize password by watching touched letter and position over the shoulder or using high definition cameras. To prevent password spill, various research of virtual keypad techniques are ongoing. It is hard to design secure keypad which assures safety by fluctuative keypad and enhance convenience at once. Also, to reconfirm user whether password is wrongly pressed, the inputted information is shown on screen. This makes the password easily exposed through high definition cameras or Google Class during recording. This research analyzed QWERTY based secure keypad's merits and demerits. And through these features, creating Tetris shaped keypad and piece them together on Android environment, and showing inputted words as Tetris shape to users through smart-screen is suggested for the ways to prevent password spill by recording.

A Deep Learning Approach with Stacking Architecture to Identify Botnet Traffic

  • Kang, Koohong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.123-132
    • /
    • 2021
  • Malicious activities of Botnets are responsible for huge financial losses to Internet Service Providers, companies, governments and even home users. In this paper, we try to confirm the possibility of detecting botnet traffic by applying the deep learning model Convolutional Neural Network (CNN) using the CTU-13 botnet traffic dataset. In particular, we classify three classes, such as the C&C traffic between bots and C&C servers to detect C&C servers, traffic generated by bots other than C&C communication to detect bots, and normal traffic. Performance metrics were presented by accuracy, precision, recall, and F1 score on classifying both known and unknown botnet traffic. Moreover, we propose a stackable botnet detection system that can load modules for each botnet type considering scalability and operability on the real field.

A Case Study on an Artificial Intelligence Fashion Curation Practice Subject through Industrial-academic Project-based Learning (산학 연계 프로젝트 기반 학습(PBL)을 활용한 AI 패션 큐레이션 실습 교과목 운영 사례 연구)

  • An, Hyosun;Park, Minjung
    • Fashion & Textile Research Journal
    • /
    • v.23 no.3
    • /
    • pp.337-346
    • /
    • 2021
  • In the fourth industrial revolution, fashion students are expected to work with various technologies to show creativity. This study aimed to conduct project-based learning(PBL) in collaboration with industry experts to design and operate artificial intelligence(AI) in the practice subject of fashion curation through the industrial academic teaching method. We first looked at teaching methods and strategies incorporating PBL in various academic fields. Next, we analyzed fashion projects and fashion curation services applying AI. Then through the question-and-answer method and by consulting with industry experts, we developed a curriculum for AI fashion curation, applying PBL(fashion market and trend analysis; new styles and time, place, and occasion planning; AI machine learning data set production; curation model development; and evaluation) suitable for the university's educational environment, information technology company conditions, and fashion students. As part of a close cooperation system with the industry, we conducted a 15-week Fashion Project II (Capstone Design) course and evaluated the outcomes and student satisfaction with the course. Students were able to develop new style, and time, place, and occasion categories and to utilize strategies for AI fashion curation services reflecting the unique needs of Millennials and Generation Z. Students showed high satisfaction with the curriculum. Further, it was confirmed that the study successfully applied PBL in class using AI technology in fashion education.

Research on the Medical Tourism Attributes by IPA (IPA를 이용한 의료관광선택속성 연구)

  • Ko, Seon-Hee;Park, Eun-Suk
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.4
    • /
    • pp.438-447
    • /
    • 2012
  • The objectives of this research are: to provide fundamental data for tourism policy and investigate medical tourism attributes by IPA(Importance-Performance Analysis) to attract Japanese medical tourists to Korea. Utilizing Japanese medical tourists as subjects of inquiry, this study evaluated the importance of medical tourism selection attributes and the rate at which these attributes were performed. Consequently, this study deduced 'convenience, service quality, differentiation, approximation' factors by factor analysis as well as the ranking among each selection attributes using T-test. The importance-performance analysis showed 'Concentrate Here' in quadrant I, 'Keep up the Good Work' in quadrant II, 'Low Priority' in quadrant III and 'Possible Overkill' in quadrant IV. The results show that "Concentrate Here" part in quadrant I is reservation procedure rapidity and information system simplicity. This means that these attributes are very important but they indicate low performance. Thus, concentration among tourism managers should be focused along these attributes. The study, then, suggests that employee who speaks Japanese fluently should be arranged during reservation procedure. Furthermore, Japanese class should become mandatory during basic employee training to improve reservation procedure rapidity. Moreover, clinic websites should concentrate on accessibility of Japanese users in such a way that they can consult their needs on line. Finally, managers should find diverse ways to bring about good service rapidly and conveniently.

A Sensor Overlay Network Providing Middleware Services on Wireless Sensor Networks (무선 센서 네트워크에서 미들웨어 서비스를 제공하는 센서 오버레이 네트워크)

  • Kim, Yong-Pyo;Jung, Eui-Hyun;Park, Yong-Jin
    • The KIPS Transactions:PartC
    • /
    • v.16C no.5
    • /
    • pp.653-660
    • /
    • 2009
  • A research for middleware of WSN can provide sensor applications with avoiding tight coupling of hardware, ease of development, and abstract data access. However, previous works have some limitations which should install their own middleware onto the all sensor nodes resulting in computational and communication overhead. In order to address it, we proposed a virtual sensor overlay network, called TinyONet-Lite which introduced virtual sensors to model a virtual counterpart of physical sensors. These virtual sensors dynamically grouped into an overlay network, Slice, which provides middleware services. We implemented TinyONet-Lite on mote class hardware with TinyOS. In accordance with experiments and comparison with existing researches, TinyONet-Lite was proved to show advantages of extensibility, dynamic service composition and reducing overhead.

A study of Big-data analysis for relationship between students (학생들의 관계성 파악을 위한 빅-데이터 분석에 관한 연구)

  • Hwang, Deuk-Young;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.113-119
    • /
    • 2015
  • Recent, cyber violence is increasing in a school and the severity of the problems encountered day by day. In particular, the severity of the cyber force using the smart phone is recognized as a very high and great problems socially. Cyberbullying have long damage degree and a wide range time duration against of existed physical cyber violence. Then student's affects is very seriously. Therefore, we analyzes the relationship and languages in the classroom for students to use to identify signs of cyber violence that may occur between friends in the class. And we support this information to identified parent, classroom teachers and school sheriff for prevent cyberbullying accidents in the school. For this research, we will design and implement a messenger in the cyber classroom. It have many components that are Big-data vocabulary, analyzer, and communication interface. Our proposed messenger can analyze lingual sign and friendship between students using Big-data analysis method such as text mining. It can analysis relationship by per-student, per-classroom.

A Network Management Architecture Using XML-based PIB (XML기반 PIB를 이용한 네트워크 관리구조)

  • 윤권섭;홍충선
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5B
    • /
    • pp.414-426
    • /
    • 2003
  • XML is being used to describe components and applications in a vendor and language neutral. Therefore it already has a role in distributed system. XML is also being used as a data interchange format between components and applications in loosely coupled large-scale application. Until now, policy is described for specific applications and devices. Its use has been very limited. In current network management system, we can only invoke predefined operations and actions using policy-based network management. The main motivation for the recent interests in policy-based networks is to support dynamic adaptability of behavior by changing policy without recoding or stopping system. For these reasons we present the use of the XML for describing the policy and PIB(Policy Information Base) in COPS-PR. It improves flexibility and interoperability among heterogeneous network systems. It also can add new functionality into network components. In this paper, we propose a dynamically extensible network management architecture using XML-based PIB.