RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Linux 시스템에서의 ELF 파일 변형 바이러스의 분석 및 대처방안 연구

        김두현,김판구 조선대학교 전자정보통신연구소 2001 電子情報通信硏究所論文誌 Vol.4 No.1

        As network and Internet is spreading nowadays, Linux has become the most popular operating system in the world. Linux has been launched on the Desktop PC, Server and PDA. More Linux is popular and popular. threat from virus writers is increasing day by day. That is, it becomes a new battle field to virus writer, and they are testing malicious program, for example virus, trojan horse, worm etc. So we needs of new warriors in Linux battle field. In this paper, we propose a synthesized methods for protecting ELF viruses and repair virus infected file. This system diagnose all executable files and a daemon monitor suspicious execution. Our proposed system consists of two parts. One is diagnosis module and another is protection module. Diagnosis module finds viruses using pattern matching and protection module are monitoring in two ways, network daemon and integrity checker.

      • 입모양 특징추출기반 감정인식시스템

        백선경,김판구 조선대학교 전자정보통신연구소 2002 電子情報通信硏究所論文誌 Vol.5 No.2

        In twenty-one century, these studies that add the human's feelings to computer system, so that make more close and natural interface between human and computer have progressed actively. In this study, we design a system that computer recognizes the human's emotion. The system is able to recognize human's feeling by extracting the features of the mouth shapes. It is based that the mouth shapes express the person's emotion well. Most of the previous studies suggested the method that recognize the most common feelings such as pleasure, sadness, surprise, anger, and so on. On the other hand, this study is based on more various 13 kinds of definite feelings. This system extracts the mouth shapes from input data, people's face images. Then, it extracts the feature values of the mouth shapes through the standard of the location and size of mouth. At this time, this system uses the DCT method. After that, we suggest the BP neural network to match the extracted feature values with the learned feelings in the end of this study. In this study, we are able to confirm that this system distinguishes each mouth shapes through the feature values and standard vector values.

      • Firewall 시스템 분석 및 Viruswall과의 통합(Integration) 방안에 관한 연구

        최준호,김판구 조선대학교 전자정보통신연구소 2001 電子情報通信硏究所論文誌 Vol.4 No.1

        Many kinds of viruses have been occurring in the computer systems. These are able to destroy some critical data and even make the computer system halt their function. Consequently, its damage was enormous. So we need a more efficient method that detects the computer viruses, different from the existing one. As first storage-second detecting method which is inspected by supervisor after storing in the file system can't confront actively the virus intrusion, we propose viruswall system which is able to play a role in warning and data blocking in this paper. In addition, we propose the method that integrates into viruswall system for virus detection and blocking in order to introduce firewall system for this system design.

      • 유전자 알고리즘을 이용한 침입 패턴 인식에 관한 연구

        임명현,김판구 조선대학교 전자정보통신연구소 2001 電子情報通信硏究所論文誌 Vol.4 No.2

        Many methods about IDS have been presented today. But, pattern of intrusion which is the most significant has not been defined clearly. With this fact, a study of pattern detection on unknown anomaly behavior is not sufficient. In this paper, we define DNA SEQUENCE as system calls of application so as to distinguish patterns of normal intrusion behavior. We measure degree of similarity with defined system calls and receiving module using genetic clustering algorithm. We can check out whether the patterns of system call are similar with established normal patterns. If the patterns escape from scope of similarity, the intrusion detection system report the event to system supervisor. System supervisor analyze reported intrusion behaviors and concludes known intrusion or unknown anomaly intrusion. This method has an advantage, finding normal intrusion and established intrusion behavior at the same time. Established intrusion detection systems can distinguish known intrusion behavior, but as defining system call patterns of normal program in this paper, this system can report intrusion behavior. This is able to detect the second intrusion with detecting unknown intrusion behaviors than other systems.

      • 모바일상의 악성 스크립트 탐지 시스템 설계

        이남현,김판구 조선대학교 전자정보통신연구소 2002 電子情報通信硏究所論文誌 Vol.5 No.2

        As the internet becomes widespread and wireless communications technology rapidly develops, the paradigm in the communications market is changing from wired/voiced to wireless/data services. Wireless internet industry has a lot of potential growth because it is based on portable communications and the internet both, yet the industry has some constraints like this : the need of computer and internet connection all the time. So, mobile service using cell phones(PCS) and PDA is a kind of good solutions, but it is so difficult to make a plan for blocking virus such as Timofonica, BAT/119, and Liberty. This paper suggests the virus detection system designed for the mobile environment, especially concerning 'Timofonica' which sent SMS letter messages to the mobile devices through the PCs. This system is to detect viruses for the PCs planned virus detection system for the PCs, detect viruses on the mobile area through the wireless devices and ActiveSync, and save virus information into the DB in the PCs. If the virus detection system for the PCs finds malicious action virus, it blocks viruses to the mobile devices. To block increasing viruses in the PCs, this system search for malicious action by making pattern DB for well-known viruses, based on the existing virus patterns, we define viruses action patterns as a finite automata in order to detect the similar virus action patterns. With the basis of this study, we need to develop further techniques to examine the suspicious viruses automatically to be malicious viruses. This basic detection system on the mobile environment can be applied to the automatic vulnernability patching system or to wireless firewall syste

      • WordNet상에서 유사성 측정을 이용한 개념 기반 이미지 검색

        조미영,최준호,김판구 조선대학교 전자정보통신연구소 2003 電子情報通信硏究所論文誌 Vol.6 No.1

        Semantic interpretation of image IS incomplete without some mechanism for understanding semantic content that is not directly visible For this reason, human assisted content-annotation through natural language is an attachment of textual description (ie a keyword, or a simple sentence) to image However, keyword-based retrieval is in the level of syntactic pattern matching In other words, dissimilarity computation among terms is usually done by using string matching not concept matching In this paper, we present a solution for qualitative measurement of concept-based retrieval of annotated image We propose a method for computerized conceptual similarity distance calculation in WordNet space. Also we have introduced method that applied similarity measurement on concept-based image retrieval When tested on a image set of Microsofts Design Gallery Live, proposed method outperforms other approach.

      • Genome analysis of <i>Hibiscus syriacus</i> provides insights of polyploidization and indeterminate flowering in woody plants

        Kim, Yong-Min,Kim, Seungill,Koo, Namjin,Shin, Ah-Young,Yeom, Seon-In,Seo, Eunyoung,Park, Seong-Jin,Kang, Won-Hee,Kim, Myung-Shin,Park, Jieun,Jang, Insu,Kim, Pan-Gyu,Byeon, Iksu,Kim, Min-Seo,Choi, JinH Oxford University Press 2017 DNA research Vol.24 No.1

        <P><B>Abstract</B></P><P><I>Hibiscus syriacus</I> (L.) (rose of Sharon) is one of the most widespread garden shrubs in the world. We report a draft of the <I>H. syriacus</I> genome comprised of a 1.75 Gb assembly that covers 92% of the genome with only 1.7% (33 Mb) gap sequences. Predicted gene modeling detected 87,603 genes, mostly supported by deep RNA sequencing data. To define gene family distribution among relatives of <I>H. syriacus</I>, orthologous gene sets containing 164,660 genes in 21,472 clusters were identified by OrthoMCL analysis of five plant species, including <I>H. syriacus</I>, <I>Arabidopsis thaliana, Gossypium raimondii, Theobroma cacao</I> and <I>Amborella trichopoda.</I> We inferred their evolutionary relationships based on divergence times among Malvaceae plant genes and found that gene families involved in flowering regulation and disease resistance were more highly divergent and expanded in <I>H. syriacus</I> than in its close relatives, <I>G. raimondii</I> (DD) and <I>T. cacao</I>. Clustered gene families and gene collinearity analysis revealed that two recent rounds of whole-genome duplication were followed by diploidization of the <I>H. syriacus</I> genome after speciation. Copy number variation and phylogenetic divergence indicates that WGDs and subsequent diploidization led to unequal duplication and deletion of flowering-related genes in <I>H. syriacus</I> and may affect its unique floral morphology.</P>

      • KCI우수등재

        상호 정보에 기반한 한국어 텍스트의 복합어 자동색인

        김판구(Pan Koo Kim),조유근(Yoo Kun Cho) 한국정보과학회 1994 정보과학회논문지 Vol.21 No.7

        최근의 정보 검색 시스템에서는 단일어 뿐만 아니라 복합어를 색인어로 사용하여 문서 내용을 표현하는 것이 보편화되어 있다. 본 논문에서는 교착어, 특히 한국어에 적합한 복합어 자동 색인 기법을 제안한다. 먼저, 색인어로서 복합어를 구성하기 위한 복합어 구성 조건을 제시하고, 또한 문서의 모든 복합어를 추출하기 위해 복합어 분해 규칙을 제시한다. 마지막으로, 복합어의 유용성을 측정하기 위한 척도로 상호 정보 개념을 제시한다. 이 개념은 정보 이론에 기반하며, 복합어의 구성 단어간의 연관도를 측정하는 근거를 제시한다. 이 기법을 시스템에 적용한 결과, 색인어의 정확률이 향상되었다. Recently, it is customary to use compound words as well as single words as indexing terms for the representation of natural language text. In this paper, we propose an auto matic indexing technique about compound words suitable for agglutinative languages, especially for Korean. We present the construction conditions to compose compound words as indexing terms. Also we present the decomposition rules applicable to consecutive words to extract all contents of text. Finally, we present a measure to estimate the usefulness of a term, mutual information, to calculate the degree of word association of compound words, based on the information theoretic notion. By applying this method, our system has raised the precision rate of indexing terms.

      • 한국어 정보 검색을 위한 불용어의 구성 및 적용

        김판구(Pan Koo Kim),조유근(Yoo Kun Cho) 한국정보과학회 1993 한국정보과학회 학술발표논문집 Vol.20 No.1

        정보 검색 시스템에서는 일반적으로 자동 색인시에 불용어 리스트를 구성해두고 색인어로서 불필요한(worthless) 어휘들을 제거한다. 본 논문에서는 한국어 문서에 대해서 자동 색인시에 쓰이는 불용어 리스트를 구성하는 방법을 제안하며, 이를 자동 색인 시스템에 구현하여 실험한 결과를 제시한다. 문헌들을 보면, 주제 분야에 따라 각기 다른 불용어가 존재한다. 그러므로 본 논문에서는 불용어 리스트를 두단계로 분리하여 적용함으로서 각기 주제 분야에 따라 불용어가 제거되도록 한다. 또한 자동 색인시 불용어 제거로 인하여 시스템 성능에 악 영향을 주지 않고, 불필요한 어휘들만 제거되도록 불용어를 구성한다.

      • 한국어 정보 검색 시스템의 설계

        김판구(Pan Koo Kim),조유근(Yoo Kun Cho) 한국정보과학회 1990 한국정보과학회 학술발표논문집 Vol.17 No.2

        본 논문에서는 한글 텍스트에 대한 자동 색인을 행하는 정보 검색 시스템의 설계를 제안한다. 자동 색인(automatic indexing)이라 함은 인간이 주요어를 추출하는 방법대신 컴퓨터가 자동으로 추출하는 것을 말한다. 본 시스템에서는 자동 색인의 recall 율과 precision 율을 높이도록 하는 것을 설계 목표로 하고 있다. 이를 위해서 먼저 입력 문장에 대한 분석을 행하고, 주요어를 가려내게 된다. 여기서는 주요어(keyword)로서 명사만을 추출하는 것으로 한다. 그리고 이 주요어들을 사용한 검색 요구가 있을 때, 관련 텍스트를 신속히 검색할 수 있도록 적절한 화일 구조를 제공해야 한다. 본 설계안에서는 요약 화일(signature file) 구조를 선택 했다.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼