• Title/Summary/Keyword: key-word

Search Result 542, Processing Time 0.025 seconds

Personal Information Management System (PIMS) improvement research using cloud computing security (개인정보관리체계계(PIMS)를 이용한 클라우드컴퓨팅 개인정보 보안 개선 방안 연구)

  • Jeong, Hyein;Kim, Seongjun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.133-155
    • /
    • 2016
  • Recently, in the adoption of cloud computing are emerging as locations are key requirements of security and privacy, at home and abroad, several organizations recognize the importance of privacy in cloud computing environments and research-based transcription and systematic approach in progress have. The purpose of this study was to recognize the importance of privacy in the cloud computing environment based on personal information security methodology to the security of cloud computing, cloud computing, users must be verified, empirical research on the improvement plan. Therefore, for existing users of enhanced security in cloud computing security consisted framework of existing cloud computing environments. Personal information protection management system: This is important to strengthen security for existing users of cloud computing security through a variety of personal information security methodology and lead to positive word-of-mouth to create and foster the cloud industry ubiquitous expression, working environments.

A Study on the Fairy tale Narration System with Key-word Exchange (맞춤형 동화구연 시스템구연에 관한 연구)

  • Park, Won;Bae, Myung-Jin
    • Proceedings of the IEEK Conference
    • /
    • 2000.09a
    • /
    • pp.819-822
    • /
    • 2000
  • 최근 유아기 아이들을 위한 교육매체의 발달로 각종 CD-ROM이나 테이프 등에서 성우의 목소리로 동화를 읽어주는 시스템이 많이 나와 있고, 또한 Web Book이 점차적으로 보편화가 되 가고 있다. 하지만 이런 획일적이고 균일화된 매체들은 아이들에게 금새 실증을 내게 하기 때문에 흥미 유발을 위해 동화의 주인공을 자기자신이나 친근한 사람의 이름 등으로 바꾸어 발성해 준다면 더욱 친근감 있게 받아들일 것이다. 본 논문에서는 기존의 성우가 발성하는 동화의 주인공 이름을 Test화자가 새로운 이름으로 발성을 해주면 기존 성우의 목소리패턴으로 바꾸어 동화를 읽어주는 시스템에 대해서 제안하고자 한다. 우선 Test화자가 발성한 목소리를 성우의 목소리로 바꾸어 주기 위해서 기존의 성우가 발성한 동화주인공 이름과 Test화자가 발성한 이름과의 운율패턴을 비교하여 성우의 운율패턴에 일치시키고 성우의 목소리 패턴으로 변경된 새로운 주인공의 이름만을 기존의 동화 DB에 삽입하였다. 또한 에너지 패턴조절은 기존의 성우가 발성한 기준패턴에 근사화 시켰고 끝점을 스므딩 시킴으로써 자연스런 발성이 되게 만들어주었다. 결과적으로 Mos Score가 3.873로 비교적 좋은 결과를 얻을 수 있었다.

  • PDF

A analysis on the characteristics of digital life reflected in web sites (웹사이트에 나타난 디지털 라이프의 특성 분석)

  • 김현경;김미정;조명은;이현수
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 2000.11b
    • /
    • pp.179-188
    • /
    • 2000
  • The purpose of this study is to analysis web sites which relate to housing environment on Internet and to suggest guidelines which are needed in digital life. Data are from key words in 53 web sites searched by housing environmental word such as people, living, town and so on. The results of this study were as follow: The web sites are divided into e-housing community, e-housing management, e-housing workplace and e-housing design. These are the digital life of new type. E-housing community sites make new wired community cross time and space. E -housing management sites provide the useful information of housing environment. E-housing workplace. sites enable us to work in cyberspace and e-housing design sites relate to consulting interior design. The web life style on Internet is common and makes many changes happen in house life and environment.

  • PDF

Cyber-attack group analysis method based on association of cyber-attack information

  • Son, Kyung-ho;Kim, Byung-ik;Lee, Tae-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.260-280
    • /
    • 2020
  • Cyber-attacks emerge in a more intelligent way, and various security technologies are applied to respond to such attacks. Still, more and more people agree that individual response to each intelligent infringement attack has a fundamental limit. Accordingly, the cyber threat intelligence analysis technology is drawing attention in analyzing the attacker group, interpreting the attack trend, and obtaining decision making information by collecting a large quantity of cyber-attack information and performing relation analysis. In this study, we proposed relation analysis factors and developed a system for establishing cyber threat intelligence, based on malicious code as a key means of cyber-attacks. As a result of collecting more than 36 million kinds of infringement information and conducting relation analysis, various implications that cannot be obtained by simple searches were derived. We expect actionable intelligence to be established in the true sense of the word if relation analysis logic is developed later.

A Study on Developing Fashion Items of Korean Image I (한국적 이미지의 패션 상품 개발에 관한 연구 I)

  • 이상은;이영미
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.3 no.1
    • /
    • pp.93-115
    • /
    • 2001
  • Korean textile industry is faced a turning point, And the culture of a country itself is getting a main competetive items. Therefore, this study is focused upon developing fashion items of Korean image. For this study purpose, I carried out literature review and questionnaires were surveyed with 129 women, to see how Korean women interested in costume are conscious of Korean image and the way to develop Korean image fashion items. The study results are as follows. 1. To Koreans, the elements of Korean image were Hanbok(Korean traditional cloths) and Saeckdong(traditional multi-coloured stripes), but to foreigners they were national image. 2. To develop competetive fashion items of Korean image, I recommend as follows. - set up a typical key-word of Korean image - promote top designer - globalization of Hanbok - take advantage of 2002 Wold Cup - bring Korean image fashion into vogue to the younger from domestic to abroad - make Korean image into universal fashion - start with accessories, hats, bags, scarves

  • PDF

A Concept Analysis of Gratitude in Patients Based on Rodgers' Evolutionary Method

  • Jung, Miran;Han, Kuemsun
    • International Journal of Contents
    • /
    • v.13 no.2
    • /
    • pp.44-49
    • /
    • 2017
  • This article presents a concept analysis of the gratitude experience of diseased patients. The Rodgers' Evolutionary Method was used for conducting the analysis. A search of CINAHL, MEDLINE, PsycARTICLES, and Springer databases was conducted using "gratitude or appreciation or thanks" and "patient or illness" as a key word, 22 final articles were selected. Three critical attributes of gratitude in patients were identified: positive emotions, acceptance of the current status, and a driving force to plant the will of life. In addition, two antecedents of gratitude in patients were identified: interactions with people or the environment, and the perception of a favorable stimuli or help. Two consequences of gratitude in patients were identified: an increased compliance in implemented treatment, and an enhancement of trust relationship. The concept analysis describes diseased patients' gratitude. This paper will become the basis for future clinical research related to diseased patients' gratitude.

Application of Word Vector with Korean Specific Feature to Bi-LSTM model for Named Entity Recognition (한국어 특질을 고려한 단어 벡터의 Bi-LSTM 기반 개체명 모델 적용)

  • Nam, Sukhyun;Hahm, Younggyun;Choi, Key-Sun
    • 한국어정보학회:학술대회논문집
    • /
    • 2017.10a
    • /
    • pp.147-150
    • /
    • 2017
  • Deep learning의 개발에 따라 개체명 인식에도 neural network가 적용된 연구가 활발히 일어나고 있다. 영어권 개체명 인식에서는 F1 score 90%을 웃도는 성능을 내는 연구들이 나오고 있다. 하지만 한국어는 영어와 언어적 특질이 많이 달라 이를 그대로 적용시키는 데는 어려움이 있어 영어권 개체명 인식기에 비해 비교적 낮은 성능을 보인다. 본 논문에서는 "하다" 접사의 동사형이 보존된 워드 임베딩을 사용하고 한국어 개체명의 특징을 담은 one-hot 벡터를 추가하여 한국어의 특질에 보다 적합한 데이터를 deep learning 기술에 적용하였다.

  • PDF

Research on the Automatic Software Keyboard Based on Database (데이터베이스에 근거한 자동 키보드의 입력 방법)

  • Lee Kye Suk;Yong Hwan Seung
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.1
    • /
    • pp.101-110
    • /
    • 2005
  • Recently software keyboard is widely used in mobile devices where restrictive hardware keyboard is available. In this paper, new software-driven keyboard input method is proposed, which use minimum number of keyboard input with small keyboard space generated after analyzing of database. In this software keyboard is generated dynamically at each input step by analyzing all possible input words. Software keyboard, only possible key buttons are displayed for minimizing keyboard space and preventing mistyping. And it also provide input word completion function when the number of the candidate words is within threshold scope.

  • PDF

Developing an Automatic Classification System for Botanical Literatures (식물학문헌을 위한 자동분류시스템의 개발)

  • 김정현;이경호
    • Journal of Korean Library and Information Science Society
    • /
    • v.32 no.4
    • /
    • pp.99-117
    • /
    • 2001
  • This paper reports on the development of an automatic book classification system using the faced classification principles of CC(Colon Classification). To conduct this study, some 670 words in the botanical field were selected, analyzed in terms [P], [M], [E], [S], [T] employed in CC 7, and included in a database for classification. The principle of an automatic classification system is to create classification numbers automatically through automatic subject recognition and processing of key words in titles through the facet combination method of CC. Particularly, a classification database was designed along with a matrix-principle specifying the subject field for each word, which can allow automatic subject recognition possible.

  • PDF

Decreasing of Correlations Among Hidden Neurons of Multilayer Perceptrons (비선형 변환에 의한 중간층 뉴런 상관계수 감소)

  • 오상훈
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.3
    • /
    • pp.98-102
    • /
    • 2003
  • For elucidating the key role of hidden neurons in information processing of Multilayer perceptrons(MLPs), we prove that the correlation coefficient between weighted sums to hidden neurons decreases under element-wise nonlinear transformations. This is verified through training of MLPs for an isolated word recognition problem. From this result, we can say that the element-wise nonlinear functions reduces redundancy in the information contents of hidden neurons.

  • PDF