RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • 모바일상의 악성 스크립트 탐지 시스템 설계

        이남현,김판구 조선대학교 전자정보통신연구소 2002 電子情報通信硏究所論文誌 Vol.5 No.2

        As the internet becomes widespread and wireless communications technology rapidly develops, the paradigm in the communications market is changing from wired/voiced to wireless/data services. Wireless internet industry has a lot of potential growth because it is based on portable communications and the internet both, yet the industry has some constraints like this : the need of computer and internet connection all the time. So, mobile service using cell phones(PCS) and PDA is a kind of good solutions, but it is so difficult to make a plan for blocking virus such as Timofonica, BAT/119, and Liberty. This paper suggests the virus detection system designed for the mobile environment, especially concerning 'Timofonica' which sent SMS letter messages to the mobile devices through the PCs. This system is to detect viruses for the PCs planned virus detection system for the PCs, detect viruses on the mobile area through the wireless devices and ActiveSync, and save virus information into the DB in the PCs. If the virus detection system for the PCs finds malicious action virus, it blocks viruses to the mobile devices. To block increasing viruses in the PCs, this system search for malicious action by making pattern DB for well-known viruses, based on the existing virus patterns, we define viruses action patterns as a finite automata in order to detect the similar virus action patterns. With the basis of this study, we need to develop further techniques to examine the suspicious viruses automatically to be malicious viruses. This basic detection system on the mobile environment can be applied to the automatic vulnernability patching system or to wireless firewall syste

      • 입모양 특징추출기반 감정인식시스템

        백선경,김판구 조선대학교 전자정보통신연구소 2002 電子情報通信硏究所論文誌 Vol.5 No.2

        In twenty-one century, these studies that add the human's feelings to computer system, so that make more close and natural interface between human and computer have progressed actively. In this study, we design a system that computer recognizes the human's emotion. The system is able to recognize human's feeling by extracting the features of the mouth shapes. It is based that the mouth shapes express the person's emotion well. Most of the previous studies suggested the method that recognize the most common feelings such as pleasure, sadness, surprise, anger, and so on. On the other hand, this study is based on more various 13 kinds of definite feelings. This system extracts the mouth shapes from input data, people's face images. Then, it extracts the feature values of the mouth shapes through the standard of the location and size of mouth. At this time, this system uses the DCT method. After that, we suggest the BP neural network to match the extracted feature values with the learned feelings in the end of this study. In this study, we are able to confirm that this system distinguishes each mouth shapes through the feature values and standard vector values.

      • Linux 시스템에서의 ELF 파일 변형 바이러스의 분석 및 대처방안 연구

        김두현,김판구 조선대학교 전자정보통신연구소 2001 電子情報通信硏究所論文誌 Vol.4 No.1

        As network and Internet is spreading nowadays, Linux has become the most popular operating system in the world. Linux has been launched on the Desktop PC, Server and PDA. More Linux is popular and popular. threat from virus writers is increasing day by day. That is, it becomes a new battle field to virus writer, and they are testing malicious program, for example virus, trojan horse, worm etc. So we needs of new warriors in Linux battle field. In this paper, we propose a synthesized methods for protecting ELF viruses and repair virus infected file. This system diagnose all executable files and a daemon monitor suspicious execution. Our proposed system consists of two parts. One is diagnosis module and another is protection module. Diagnosis module finds viruses using pattern matching and protection module are monitoring in two ways, network daemon and integrity checker.

      • 유전자 알고리즘을 이용한 침입 패턴 인식에 관한 연구

        임명현,김판구 조선대학교 전자정보통신연구소 2001 電子情報通信硏究所論文誌 Vol.4 No.2

        Many methods about IDS have been presented today. But, pattern of intrusion which is the most significant has not been defined clearly. With this fact, a study of pattern detection on unknown anomaly behavior is not sufficient. In this paper, we define DNA SEQUENCE as system calls of application so as to distinguish patterns of normal intrusion behavior. We measure degree of similarity with defined system calls and receiving module using genetic clustering algorithm. We can check out whether the patterns of system call are similar with established normal patterns. If the patterns escape from scope of similarity, the intrusion detection system report the event to system supervisor. System supervisor analyze reported intrusion behaviors and concludes known intrusion or unknown anomaly intrusion. This method has an advantage, finding normal intrusion and established intrusion behavior at the same time. Established intrusion detection systems can distinguish known intrusion behavior, but as defining system call patterns of normal program in this paper, this system can report intrusion behavior. This is able to detect the second intrusion with detecting unknown intrusion behaviors than other systems.

      • Firewall 시스템 분석 및 Viruswall과의 통합(Integration) 방안에 관한 연구

        최준호,김판구 조선대학교 전자정보통신연구소 2001 電子情報通信硏究所論文誌 Vol.4 No.1

        Many kinds of viruses have been occurring in the computer systems. These are able to destroy some critical data and even make the computer system halt their function. Consequently, its damage was enormous. So we need a more efficient method that detects the computer viruses, different from the existing one. As first storage-second detecting method which is inspected by supervisor after storing in the file system can't confront actively the virus intrusion, we propose viruswall system which is able to play a role in warning and data blocking in this paper. In addition, we propose the method that integrates into viruswall system for virus detection and blocking in order to introduce firewall system for this system design.

      • 肉鷄後期飼料의 給與時期가 鷄肉의 理化學的 性質에 미치는 影響 : 貯藏期間別에 따른 pH, 保水性 및 軟度의 變化 Changes in PH, Water Holding Capacity and Tendness

        尹東根,鄭場龍,張判亨,朴久富 진주산업대학교 1985 論文集 Vol.23 No.-

        後期飼料를 3주령부터 조기에 급여한 broiler肉의 흉심부, 대퇴부 및 근위를 냉장온도(4℃)에서 저장한 후 저장시간의 경과(0,8,48,96,168시간)에 따른 pH, 보수성 및 軟度의 變化를 경시적으로 分析한 結果는 다음과 같다. 1. pH의 變化를 보면 各 시험구의 部位間에는 통계적인 유의성이 없었고 저장시간의 경과에 따른 경시적인 차이를 보면 도살직후 6.68~6.77로 나타났으나 저장후 8시간이 경과될 때 pH가 5.67~5.76으로 급격히 저하되었으며 48시간이 경과되면서 부터 상승하여 이후는 서서히 회복되었다. 2. 保水性의 變化를 보면 各 시험구의 부위간에는 통계적인 유의성이 없었고 저장시간의 경과에 따른 경시적인 차이를 보면 도살직후 65.9~67.4%로 나타났으며 저장후 8시간이 경과될 때 흉심, 대퇴, 근위 모두 급격히 감소되었으나 48시간이 경과되면서 부터 증가되어 168시간 이후부터는 서서히 회복되었다. 3. 軟度의 變化는 흉심과 대퇴部位 근육에 비하여 근위가 매우 낮았고 저장기간의 경과에 따른 變化는 도살직후에 비하여 8시간이 경과될때 현저히 낮아진 후 48시간까지는 서서히 감소된후 168시간 부터는 회복되는 결과였다. 4. pH, 保水性 및 軟度等의 물리적인 性質을 究明한 바 각 처리區間에 통계적인 유의성은 인정되지 않았으며 3주령 부터 후기사료를 급여한 결과 pH, 보수성 및 연도 等에 영향을 미치지 않았다. This experiment was conducted to investigate the changes in pH, water holding capacity and tenderness as the passage of storing time(0,8,48 168 hr) after storing at 4℃ the meat cut 3 parts of leg, breast and gizzard of broiler-Hubbard at 9weeks fed early finisher diet from 3 weeks. The results obtained were summarized as follows: 1. In the pH changes during postmorterm storage, there were nonsignificant differences(p>0.05) between treatments. In the pH changes as storage time passed, pH immediately after slaughtering was 6.68 to 6.77 and the lowest with 5.67 to 5.76 when storage time passed 8hours and pH was again high after storage time passed 48 hours. 2. Though the changes in water holding capacity were nonsignificant differences(p>0.05) between leg, breast and gizzard meat. There was lightly difference as the storage time passed, pH immediately after slaughtering was 65.9 to 67.4%, pH of leg, breast and gizzard was decreased as the storage time passed 8 hours, but was increased as the storage time passed 48 hours. 3. The changes in tenderness were lower in gizzard in leg than breast. It was lower in the storage of 8 hours than immediately after slaughtering. After pH was gradually decreased to the storage of 48 hours, again increased from the storage of 168 hours. 4.PH, water holding capacity and tenderness analyzed in this experiment were non significant differences(p>0.05) between treatments and there was not the effect of finisher diet on the physical properties.

      • WordNet상에서 유사성 측정을 이용한 개념 기반 이미지 검색

        조미영,최준호,김판구 조선대학교 전자정보통신연구소 2003 電子情報通信硏究所論文誌 Vol.6 No.1

        Semantic interpretation of image IS incomplete without some mechanism for understanding semantic content that is not directly visible For this reason, human assisted content-annotation through natural language is an attachment of textual description (ie a keyword, or a simple sentence) to image However, keyword-based retrieval is in the level of syntactic pattern matching In other words, dissimilarity computation among terms is usually done by using string matching not concept matching In this paper, we present a solution for qualitative measurement of concept-based retrieval of annotated image We propose a method for computerized conceptual similarity distance calculation in WordNet space. Also we have introduced method that applied similarity measurement on concept-based image retrieval When tested on a image set of Microsofts Design Gallery Live, proposed method outperforms other approach.

      • 한국어 정보 검색 시스템의 설계

        김판구(Pan Koo Kim),조유근(Yoo Kun Cho) 한국정보과학회 1990 한국정보과학회 학술발표논문집 Vol.17 No.2

        본 논문에서는 한글 텍스트에 대한 자동 색인을 행하는 정보 검색 시스템의 설계를 제안한다. 자동 색인(automatic indexing)이라 함은 인간이 주요어를 추출하는 방법대신 컴퓨터가 자동으로 추출하는 것을 말한다. 본 시스템에서는 자동 색인의 recall 율과 precision 율을 높이도록 하는 것을 설계 목표로 하고 있다. 이를 위해서 먼저 입력 문장에 대한 분석을 행하고, 주요어를 가려내게 된다. 여기서는 주요어(keyword)로서 명사만을 추출하는 것으로 한다. 그리고 이 주요어들을 사용한 검색 요구가 있을 때, 관련 텍스트를 신속히 검색할 수 있도록 적절한 화일 구조를 제공해야 한다. 본 설계안에서는 요약 화일(signature file) 구조를 선택 했다.

      • KCI우수등재

        상호 정보에 기반한 한국어 텍스트의 복합어 자동색인

        김판구(Pan Koo Kim),조유근(Yoo Kun Cho) 한국정보과학회 1994 정보과학회논문지 Vol.21 No.7

        최근의 정보 검색 시스템에서는 단일어 뿐만 아니라 복합어를 색인어로 사용하여 문서 내용을 표현하는 것이 보편화되어 있다. 본 논문에서는 교착어, 특히 한국어에 적합한 복합어 자동 색인 기법을 제안한다. 먼저, 색인어로서 복합어를 구성하기 위한 복합어 구성 조건을 제시하고, 또한 문서의 모든 복합어를 추출하기 위해 복합어 분해 규칙을 제시한다. 마지막으로, 복합어의 유용성을 측정하기 위한 척도로 상호 정보 개념을 제시한다. 이 개념은 정보 이론에 기반하며, 복합어의 구성 단어간의 연관도를 측정하는 근거를 제시한다. 이 기법을 시스템에 적용한 결과, 색인어의 정확률이 향상되었다. Recently, it is customary to use compound words as well as single words as indexing terms for the representation of natural language text. In this paper, we propose an auto matic indexing technique about compound words suitable for agglutinative languages, especially for Korean. We present the construction conditions to compose compound words as indexing terms. Also we present the decomposition rules applicable to consecutive words to extract all contents of text. Finally, we present a measure to estimate the usefulness of a term, mutual information, to calculate the degree of word association of compound words, based on the information theoretic notion. By applying this method, our system has raised the precision rate of indexing terms.

      • 한국어 정보 검색을 위한 불용어의 구성 및 적용

        김판구(Pan Koo Kim),조유근(Yoo Kun Cho) 한국정보과학회 1993 한국정보과학회 학술발표논문집 Vol.20 No.1

        정보 검색 시스템에서는 일반적으로 자동 색인시에 불용어 리스트를 구성해두고 색인어로서 불필요한(worthless) 어휘들을 제거한다. 본 논문에서는 한국어 문서에 대해서 자동 색인시에 쓰이는 불용어 리스트를 구성하는 방법을 제안하며, 이를 자동 색인 시스템에 구현하여 실험한 결과를 제시한다. 문헌들을 보면, 주제 분야에 따라 각기 다른 불용어가 존재한다. 그러므로 본 논문에서는 불용어 리스트를 두단계로 분리하여 적용함으로서 각기 주제 분야에 따라 불용어가 제거되도록 한다. 또한 자동 색인시 불용어 제거로 인하여 시스템 성능에 악 영향을 주지 않고, 불필요한 어휘들만 제거되도록 불용어를 구성한다.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼