09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Downloadable computer software for use in database management, network security management, mobile device data security management for managing and monitoring mobile devices and securing access to software programs and proprietary data stored on said mobile devices, all in the field of Enterprise Mobility Management, which uses bi-directional data sync between a network and mobile devices; downloadable computer programs for use in database management, network security management, mobile device data security management for managing and monitoring mobile devices and securing access to software programs and proprietary data stored on said mobile devices, all in the field of Enterprise Mobility Management, which uses bi-directional data sync between a network and mobile devices; downloadable software applications for use in database management, network security management, mobile device data security management for managing and monitoring mobile devices and securing access to software programs and proprietary data stored on said mobile devices, all in the field of Enterprise Mobility Management, which uses bi-directional data sync between a network and mobile devices (1) Development, updating, installation, maintenance and repair of computer software in the field of Enterprise Mobility Management, which uses bi-directional data sync between a network and mobile devices, for use in database management, security management and mobile device management for managing and monitoring mobile devices and securing access to software programs and proprietary data stored on said mobile devices; development, updating, installation, maintenance and repair of computer programs in the field of Enterprise Mobility Management, which uses bi-directional data sync between a network and mobile devices, for use in database management, security management and mobile device management for managing and monitoring mobile devices and securing access to software programs and proprietary data stored on said mobile devices; computer programming in the field of Enterprise Mobility Management, which uses bi-directional data sync between a network and mobile devices, for use in database management, security management and mobile device management for managing and monitoring mobile devices and securing access to software programs and proprietary data stored on said mobile devices
2.
METHOD FOR IMPLEMENTING PRIVATE SET INTERSECTION PROTOCOL USING OBLIVIOUS PSEUDO-RANDOM FUNCTION BASED ON MINICRYPT, AND TERMINAL DEVICE USING SAME
A processor-implemented method including instructing a receiver to generate an OKVS (oblivious key-value store) matrix by applying an OKVS encoding algorithm to first data and hash data of the first data, generating a vector or scalar parameters satisfying a preset linear equation using vector oblivious linear evaluation (VOLE) for a subspace based on Minicrypt, and distributing a preset first group and a preset second group among the parameters to a sender and a receiver, respectively, instructing receiver to generate a masking matrix by masking the OKVS matrix to a first vector included in the first group and transmit the masking matrix to the sender, instructing the sender to update one of the vectors included in the second group using the masking matrix, and instructing the receiver to generate first comparison data by applying an OKVS decoding algorithm to a second vector included in the first group and the first data.
A method for identifying a grid-format object in a robotic process automation (RPA) environment, the method being performed by a computing device, is provided. The method may comprise receiving a search reference object, searching for an ancestor object of the search reference object on a hierarchical structure tree and determining the searched ancestor object as a first row candidate object, determining a sibling object of the first row candidate object on the hierarchical structure tree as a second row candidate object, determining whether a child object of the first row candidate object and a child object of the second row candidate object satisfy a column relationship with each other on the hierarchical structure tree and identifying each of the first row candidate object and the second row candidate object as a grid-format object, based on the determination result.
A method for providing task automation service using LLM is provided. The method according to some embodiments may include receiving a description of a target task, generating a first object information list by collecting information on a plurality of objects displayed on a first execution screen of a program used for the target task, selecting at least one candidate object related to the target task from among the plurality of objects by feeding the first object information list and the description of the target task into the LLM, selecting a first target object from among the at least one candidate object by feeding information of the selected candidate object and the description of the target task into the LLM and generating an automation scenario corresponding to the target task based on a first activity related to the first target object.
Disclosed are a chat service providing method that uses a large language model (LLM) and a chat service server using the same. A chat service provision method of a chat service server that uses a large language model according to an embodiment may include an operation of receiving a natural language-based query message from a user, an operation of searching for a target catalog corresponding to the query message from among a plurality of catalogs generated based on data assets, an operation of associating the target catalog with an online workspace assigned to the user, an operation of calling an LLM application that provides an LLM service corresponding to the query message in the workspace, and generating an inference result for the query message based on the target catalog by using the LLM application, and an operation of providing a response message including the inference result to the user.
The present disclosure relates to a method, a device, a system, and a computer program for automatically performing PQC migration on an application, and more specifically, the present disclosure discloses a method for automatically performing PQC migration on an application using a computing device, the method including: determining whether or not a first application has quantum vulnerability on the basis of information about the first application, which is collected from an application distribution server configured to distribute source code of an application; modifying one or more of source code, settings, or environment variables for the first application, based on a result of the determination, by the application distribution server; and generating an execution file for the first application by reflecting the modified source code, settings, or environment variables.
A method and a system for implementing a task assistant are provided. The method according to some embodiments may include receiving a user's command including a task description regarding a target task, generating a screen description by analyzing a screen of a task execution device, configuring a first prompt for determining a first action associated with the target task based on the task description and the screen description, determining the first action by inputting the first prompt to a generative model and executing the first action through the task execution device.
The present disclosure relates to a method, an apparatus, a system, and a computer program for enhancing security of a heterogeneous operating system device and, more specifically, provides a security method for a computing apparatus in which a heterogeneous operating system is driven, the method including an operation of collecting, by a first security agent driven in a host OS of the computing apparatus, guest OS information for a guest OS installed on the host OS and an operation of performing, by the first security agent on the basis of the guest OS information, management for a second security agent driven on the guest OS.
G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
G06F 21/55 - Detecting local intrusion or implementing counter-measures
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
9.
METHOD AND SYSTEM FOR CREATING OPTIMAL SUPPLY PLAN
A method for creating an optimal supply plan is provided. The method may include creating supply plans for multiple goods demands, creating a plurality of candidate supply plans by modifying at least a part of the supply plans based on priorities and goods resources information of the multiple goods demands, selecting a first candidate supply plan from among the plurality of candidate supply plans based on results of evaluation of the plurality of candidate supply plans, and replacing at least a part of the supply plans with the first candidate supply plan.
G06Q 10/0637 - Strategic management or analysis, e.g. setting a goal or target of an organisationPlanning actions based on goalsAnalysis or evaluation of effectiveness of goals
G06Q 10/087 - Inventory or stock management, e.g. order filling, procurement or balancing against orders
G06Q 30/0202 - Market predictions or forecasting for commercial activities
10.
METHOD AND SYSTEM FOR MANAGING CACHE DATA BASED ON SCORE
A system for managing cache data based on a score is provided. The system includes at least one processor that implements: a score management module configured to receive an inquiry request for data from a client terminal and obtain a score of the data by using inquiry frequency information of the data for each time period; and a data management module configured to store the data in a local cache of a service server or a cache server based on the score.
G06F 12/0813 - Multiuser, multiprocessor or multiprocessing cache systems with a network or matrix configuration
G06F 12/122 - Replacement control using replacement algorithms of the least frequently used [LFU] type, e.g. with individual count value
G06F 12/128 - Replacement control using replacement algorithms adapted to multidimensional cache systems, e.g. set-associative, multicache, multiset or multilevel
There is provided a method for encrypting a message, performed by a computing device. The method may comprise receiving a public signature key and a public mid term key, which are generated in a terminal, from the terminal and storing them; forwarding the stored public signature key and the stored public mid term key to all terminals participating in a chat room; designating a key generator based on a timestamp-based first random number value included in all the terminals; and generating a message encryption key by using a private mid term key of the designated key generator, wherein the message encryption key is shared is all the terminals.
There is provided a method for protecting a user data encryption key in a simple authentication environment, performed by a computing system. The method may include encrypting a private key, generated through a key management server, based on a password acquired from login information of a user terminal; receiving an authentication key, generated through the key management server, in response to a simple authentication registration request of the user terminal; decrypting the encrypted private key based on the password acquired from the login information; encrypting the decrypted private key based on the authentication key; and transmitting the encrypted private key to the user terminal.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
There is provided a method for protecting a message, performed by a transmitting terminal. The method may comprise acquiring a protection message; configuring message data for transmission by excluding at least a portion of a text of the protection message; transmitting the message data to a receiving terminal of the protection message; receiving a text request for the protection message from the receiving terminal; and transmitting the text of the protection message to the receiving terminal in response to the text request.
There is provided a method for controlling message sending, performed by at least one computing device The method may comprise acquiring sending information of a target message; configuring input data of a machine-learning model based on the sending information, the machine-learning model being trained through a task of predicting a future load of a message sending module; predicting a load of the message sending module according to sending the target message from the input data through the machine-learning model; and controlling the message sending module based on the predicted load.
An apparatus for dynamic control of a network, the apparatus includes a processor, and a storage medium recording one or more programs configured to be executable by the processor. The one or more programs include instructions for executing collecting network monitoring information, determining, based on the network monitoring information, whether a network abnormality condition is satisfied, and loading, based on a result of the determination, an extended Berkeley packet filter (eBPF) program controlling a network environment.
The present disclosure relates to a method, an apparatus, a system, and a computer program for function notification of a function accelerator card in a cloud system and, more particularly, to a method performed by a control server of a cloud system, an apparatus, a system, and a computer program, wherein the method includes: receiving, from a function accelerator card included in at least one unit task server of the cloud system, a list of acceleration functions that are capable of being performed by the function accelerator card; and assigning a first task to the function accelerator card in consideration of the acceleration function list. According to the present disclosure, a list of acceleration functions of a functional acceleration card included in a unit task server of a cloud system may be notified to a control server, thereby enabling efficient distribution of the workload and improving the overall performance of the cloud system.
There is provided a communication device. The communication device may comprise one or more processors; a communication interface; and a memory that stores a computer program executed by the one or more processors, wherein the computer program includes instructions for operations of: forming a general security channel according to a first transport layer security (TLS) protocol that does not support a post-quantum cryptography algorithm with another communication device; forming a communication channel of an application layer (L7) with another communication device through the general security channel; forming a quantum security channel by performing a handshake procedure according to a second TLS protocol that supports the post-quantum cryptography algorithm with another communication device through the communication channel; and communicating with another communication device through the quantum security channel.
The disclosure relates to a method, an apparatus, a system, and a computer program for identifying and responding to quantum vulnerability with respect to an application by using a dynamic analysis agent and, specifically, as a method of identifying quantum vulnerability with respect to an application by using a computing apparatus, the disclosure may include an operation of identifying one or more cryptographic associated functions performed in an application based on analysis of a code, executed while the application is in an operating state, by using a dynamic analysis agent corresponding to the application, an operation of calculating, based on the one or more cryptographic associated functions, a cryptography algorithm list used in the application, and an operation of identifying, based on the cryptography algorithm list, quantum vulnerability with respect to the application.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
A method of creating a Robotic Process Automation (RPA) scenario is provided. The method may include: receiving input from a user that designates a target application or an RPA object within the target application, identifying and displaying one or more RPA objects that belong to the target application, receiving input from the user that selects a target RPA object and a user activity associated with the target RPA object, and transforming the selected user activity into a corresponding RPA activity sequence and displaying the corresponding RPA activity sequence.
A method for providing a task automation service, performed by at least one computing device is provided. The method may include collecting information on an object, in which a user's input occurs, by using a recording engine, generating an object information list for the object based on the information collected by the recording engine, determining first object information corresponding to the user's input based on a result of comparing a plurality of kinds of candidate object information included in the object information list, and automatically generating an activity corresponding to the user's input based on the first object information and predefined pattern information.
Provided is a method performed by a computing system for providing an integrated chatbot-based service. The method includes receiving, by an integrated chatbot, a query from a user device; extracting a main keyword from the query; transmitting the extracted main keyword to a first chatbot and a second chatbot; receiving, from the first chatbot and the second chatbot, a content search result corresponding to the extracted main keyword; and providing a response to the query to the user device based on the received content search result.
The present disclosure relates to a message notification method of an online messenger, and a computing device using the same. The message notification method of the online messenger according to an embodiment of the present disclosure includes determining, when a new message is received, the importance of the new message based on keywords included in the new message; identifying a user status configured within the online messenger; and controlling a notification display indicating reception of the new message based on the importance of the new message and the user status.
KOOKMIN UNIVERSITY INDUSTRY ACADEMY COOPERATION FOUNDATION (Republic of Korea)
Inventor
Kwon, Jihoon
Lee, Joohee
Cho, Jihoon
Han, Jaeseung
Lee, Taeho
Han, Dong-Guk
Abstract
A ciphertext comparison method according to an embodiment is performed by a processor in a computing apparatus, and the method includes an operation of segmenting a first ciphertext and a second ciphertext into m part bitstreams (in this instance, m is a natural number satisfying 1
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
42 - Scientific, technological and industrial services, research and design
Goods & Services
Design and development of computer software providing enterprise generative artificial intelligence services in the fields of manufacturing, retail, financial and public business; Installation, maintenance and updating of computer software providing enterprise generative artificial intelligence services in the fields of manufacturing, retail, financial and public business; Software as a service (SaaS) services featuring enterprise software providing generative artificial intelligence services in the fields of manufacturing, retail, financial and public business; Platform as a service (PaaS) featuring enterprise computer software platforms providing generative artificial intelligence services in the fields of manufacturing, retail, financial and public business; Software as a service (SaaS) services featuring online non-downloadable enterprise software using generative artificial intelligence to synthesize data from external knowledge systems, internal corporate systems and business processes in the fields of manufacturing, retail, financial and public business; Platform as a service (PaaS) services featuring online non-downloadable enterprise software platforms using generative artificial intelligence to synthesize data from external knowledge systems, internal corporate systems and business processes in the fields of manufacturing, retail, financial and public business; Software as a service (SaaS) services featuring software using generative artificial intelligence to provide text and image-based chat services in the fields of manufacturing, retail, financial and public business; Platform as a service (PaaS) services featuring software platforms using generative artificial intelligence to provide text and image-based chat services in the fields of manufacturing, retail, financial and public business
25.
METHOD OF PROCESSING OPERATIONS OF POLYNOMIAL-BASED SECURITY ALGORITHM AND APPARATUS FOR IMPLEMENTING THE METHOD
KOOKMIN UNIVERSITY INDUSTRY ACADEMY COOPERATION FOUNDATION (Republic of Korea)
Inventor
Lee, Sang Yub
Lee, Jong Hyeok
Han, Jae Seung
Huh, Jae Won
Choi, Keon Hee
Han, Dong Guk
Kwon, Ji Hoon
Yoon, Hyo Jin
Cho, Ji Hoon
Abstract
The present disclosure according to at least one embodiment provides a method of processing operations of a polynomial-based security algorithm, the method being performed by a computing system. The method comprises identifying a plurality of operations using secret information in the polynomial-based security algorithm, generating a random index to be applied to the identified operations, and performing the operations using the random index.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
26.
SOFTWARE DEVELOPMENT PLATFORM AND OPERATING METHOD THEREOF
The present disclosure according to at least one embodiment provides a software development platform, a software development platform comprising a config manager receiving config information of target software through a graphical user interface (GUI)-based config interface—the config information including config information on a plurality of items, at least some of which are for configuring a common component—, a code generator generating a code of the target software based on the config information; and an execution engine executing the generated code by using the common component in which the config information of the at least some of the items is reflected.
A method for providing a credential service may include transmitting, to a user terminal, data of a request page including a cloud service selection field for selecting one cloud service from a list of a plurality of cloud services; receiving, from the user terminal, a request for issuing a temporary key for a credential for calling an API served by a second cloud service selected in the cloud service selection field; transmitting an account issuance request signal to a system of the second cloud service in response to the receiving the request for issuing the temporary key; receiving credential key information for a first account issued to an institution, from the system of the second cloud service in response to the transmitting the account issuance request signal; and transferring the credential key information to the user terminal in response to the request for issuing the temporary key.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
28.
SYSTEM AND METHOD FOR CONTROLLING AND EXECUTING ANOMALY COMMANDS IN MULTI-NETWORK ENVIRONMENT
A method of controlling and executing an anomaly command in a multi-network environment is includes: extracting a command, which is input by a user to a target instance through an accessed bastion worker; determining whether the extracted command is an anomaly command by comparing the extracted command with anomaly command patterns; based on the extracted command being determined to be the anomaly command, determining whether an execution of the anomaly command is permitted in the target instance; and based on the execution of the anomaly command being not permitted, notifying the user of a procedure for approving the execution of the anomaly command based on a level of the anomaly command being one of levels, which are classified in advance based on the anomaly command patterns; either executing or blocking the command input by the user, wherein the procedure is determined differently depending on the level of the anomaly command.
A method for providing a cloud-based application programming interface (API) service is provided. The method may include issuing an authentication key corresponding to an application for some of a plurality of API services, performing authentication for a first user using the issued authentication key in response to a call for a first API service by the first user, and executing the first API service based on a result of the authentication.
A logistics center layout generation method and a device therefor are provided. The logistics center layout generation method includes: receiving basic configuration information for generating a layout of the logistics center; generating, based on an inventory history of the logistics center, storage cells configured to store items handled in the logistics center; arranging, based on an outgoing history of the logistics center, the storage cells in each stacking area according to possible combinations of types and arrangement directions of the items; and generating, multiple alternative layouts based on combinatorial optimization, multiple alternative layouts, comparing outgoing times of the alternative layouts, and providing a recommended layout among the multiple alternative layouts.
G06Q 10/08 - Logistics, e.g. warehousing, loading or distributionInventory or stock management
G06F 30/13 - Architectural design, e.g. computer-aided architectural design [CAAD] related to design of buildings, bridges, landscapes, production plants or roads
G06F 111/20 - Configuration CAD, e.g. designing by assembling or positioning modules selected from libraries of predesigned modules
31.
METHOD FOR SYNCHRONIZING MESSAGES BETWEEN PLURALITY OF MESSENGER CLIENT DEVICES AND MESSENGER CLIENT DEVICE USING SAME
The disclosure relates to a method for synchronizing messages between a plurality of messenger client devices, and a messenger client device using the same, and the method for synchronizing messages between a plurality of messenger client devices to which a user account is shared according to an embodiment of the disclosure may include: accessing a pre-configured public repository and downloading public data including a previous chat list shared between the plurality of messenger client devices by a messenger client device; and generating merged data by merging the public data and local data including a previous chat list stored in a local repository of the messenger client device by the messenger client device.
A method for providing a video conference service is provided. The method may include receiving status data of a plurality of terminals logged in with an account of a first participant; determining video priorities of the plurality of terminals based on the received status data; selecting a first terminal, among the plurality of terminals, to transmit a video of the first participant based on the video priorities; and transmitting the video of the first participant received from the first terminal to terminals of other participants.
UIF (University Industry Foundation), Yonsei University (Republic of Korea)
Inventor
Lim, Hak Soo
Kim, Min-Jung
Park, Se Won
Park, No Seong
Abstract
A method for an anomaly detection is provided. The method may include acquiring a score predictor trained using normal time-series data, wherein the score predictor is a deep learning model configured to output a conditional score for previous time-series data and the conditional score represents a gradient of data density, extracting data for a specific time and data segments corresponding to a period before the specific time from target time-series data, and predicting a conditional score for the data segments through the trained score predictor and conducting an anomaly determination for the data for the specific time using the predicted conditional score.
A method for predictive maintenance through automatic detection of a pump anomaly is provided. The method according to some embodiments may include receiving a plurality of sensing values of two or more categories, among a plurality of categories, from a plurality of sensors provided in a first pump; inputting a feature representing each of sensing values, selected among the plurality of sensing values, to a first anomaly prediction model that is machine-learned in advance; determining whether a future anomaly of the first pump is predicted to occur, by using data output from the first anomaly prediction model; and providing alarm information based on a determination that the future anomaly is predicted to occur, wherein the first pump belongs to a first pump model group, among a plurality of pump model groups, matched with the first anomaly prediction model.
There is provided a cloud-based application programming interface (API) service providing system. The system may comprise a cloud management console issuing authentication information for a requested API among a plurality of APIs, an API manager receiving a call message for a specific API, which comprises authentication information, from a user's terminal, performing authentication using the authentication information in the call message, and requesting the execution of the specific API based on the authentication result and an API execution engine generating the result of executing the specific API in response to a request from the API manager, wherein the cloud management console is a module belonging to a control plane, and the call message is received by the API manager belonging to a data plane without via the control plane.
The present disclosure relates to a method for providing a cloud-based API service and a system therefor. A method for providing a cloud-based API service according to some embodiments of the present disclosure may comprise the steps of: issuing an authentication key corresponding to an application for some of a plurality of API services; performing authentication for a first user by using the issued authentication key in response to a call for a first API service of the first user; and executing the first API service on the basis of a result of the authentication.
Provided is a method for providing a cloud service-related credential service. The method for providing a cloud service-related credential service, according to an embodiment of the present disclosure, may comprise the steps of: transmitting, to a user terminal, data of a request page including a cloud service selection field for selecting one cloud service from a list of a plurality of cloud services including a first cloud service and a second cloud service; receiving, from the user terminal, a request for issuance of a temporary key for credentials for calling an API serviced by the first cloud service; in response to the reception of the request for issuance of the temporary key, transmitting an account issuance request signal to a system of the first cloud service; in response to the transmission of the account issuance request signal, receiving, from the system of the first cloud service, key information for credentials for a first account issued to an institution that operates a computing system; and in response to the request for issuance of the temporary key, transmitting the key information for credentials to the user terminal.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
38.
CLOUD-BASED API SERVICE PROVISION SYSTEM, AND METHOD THEREOF
A cloud-based application programming interface (API) service provision system, and a method thereof are provided. The cloud-based API service provision system according to some embodiments may comprise: a cloud management console of a control plane for issuing authentication information about an application API from among a plurality of APIs; an API manager of a data plane, which receives, from a terminal of a user, a call message for a specific API including the authentication information, uses the authentication information of the call message so as to perform authentication, and requests execution of the specific API on the basis of the result of the authentication; and an API execution engine for generating an execution result for the specific API in response to the request of the API manager. According to the system, a high-quality API service can be provided to users.
SEOUL NATIONAL UNIVERSITY R&DB FOUNDATION (Republic of Korea)
Inventor
Yoon, Sung Roh
Hwang, Bong Kyu
Yun, Jae Woong
Joe, Seong Ho
Song, Jong Yoon
Park, Noh Ii
Gwon, Young June
Abstract
A method for generating a summary performed by at least one computing device is provided. The method may include: acquiring a first sample pair, the first sample pair including an original text and a summary corresponding to the original text, extracting a common phrase that appears simultaneously in the original text and the summary of the first sample pair, selecting a first phrase among common phrases based on a prediction probability of a summary model for the common phrases, generating a second sample pair by modifying the first phrase in the original text and the summary of the first sample pair, and updating the summary model by performing a summary task using the second sample pair.
A method of connecting to and managing connections to instances in a multi-network environment includes: accessing, by a bastion host, a bastion worker among bastion workers, the bastion workers being included in subnets of a plurality of networks, and connecting to a target instance connected with the accessed bastion worker; monitoring, by the bastion host, a connection to the target instance; and comparing, by the bastion host, a traffic of a subnet, in which the target instance is located, with a predefined threshold, and adjusting a number of a bastion worker included in the subnet, in which the target instance is located, based on a result of the comparing, wherein the traffic includes data obtained from a result of the monitoring the connection to the target instance.
UNIST (ULSAN NATIONAL INSTITUTE OF SCIENCE AND TECHNOLOGY) (Republic of Korea)
Inventor
Yang, Jae Ho
Seong, Rak-Kyeong
Lee, Chang Hyeong
Choi, Hee Jin
Lee, Min Ji
Abstract
A routing method in a multilayer structure is provided. The routing method may include: acquiring a routing problem, wherein the routing problem is a problem of generating a path set that includes respective paths for multiple node groups arranged in a multilayer structure, generating a routing order example for the multiple node groups, generating a path set for the multiple node groups by executing a routing algorithm based on the routing order example, establishing a training set by obtaining a cost of the generated path set based on a predefined evaluation function, and training a deep learning model to predict a routing order using the training set.
A method is provided to identify attributes that are expressions within text that most accurately describe the meaning of a named entity included in the text. A method for entity attribute identifying in an embodiment of this disclosure may comprise recognizing one or more entities in an input text and selecting an attribute of a first entity included in the one or more entities among tokens included in the input text. The selecting of the attribute of the first entity may include selecting the attribute of the first entity among tokens that do not include the recognized one or more entities.
G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
A method for transmitting voice data is provided. The method may include receiving voice data of a particular speaker from a voice data collection server; determining whether destination terminals are first-type terminals; and based on a determination that the destination terminals are the first-type terminals, transmitting the received voice data to the destination terminals through a channel corresponding to the particular speaker, from among a plurality of predefined channels for the destination terminals.
G10L 17/02 - Preprocessing operations, e.g. segment selectionPattern representation or modelling, e.g. based on linear discriminant analysis [LDA] or principal componentsFeature selection or extraction
G10L 25/51 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination
A method for a performance evaluation may include: obtaining a first model trained using a labeled dataset of a source domain; obtaining a second model built by performing domain adaptation to a target domain on the first model; generating a pseudo label for an evaluation dataset of the target domain using the second model; and evaluating performance of the first model using the pseudo label. The evaluation dataset is an unlabeled dataset, and the generating of the pseudo label may include adjusting an upper limit of a size constraint of adversarial noise; deriving the adversarial noise for a data sample belonging to the evaluation dataset within a range that satisfies the size constraint; generating a noisy sample by reflecting the derived adversarial noise in the data sample; and generating a pseudo label for the data sample based on a predicted label of the noisy sample obtained through the second model.
Provided are a method for image segmentation and a system therefor. The method according to some embodiments may include acquiring a deep learning model trained through an image segmentation task, extracting motion information associated with a current frame of a given image, and performing image segmentation for the current frame by reflecting the extracted motion information into class-specific feature maps of the deep learning model, the class-specific feature maps being generated by the deep learning model based on the current frame.
G06V 10/25 - Determination of region of interest [ROI] or a volume of interest [VOI]
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
G06V 10/771 - Feature selection, e.g. selecting representative features from a multi-dimensional feature space
H04N 5/272 - Means for inserting a foreground image in a background image, i.e. inlay, outlay
Provided are a method for generating a common identifier and an apparatus therefor. The method according to some embodiments may include acquiring a matching function, which is used for record matching between a first record set and a second record set, the first record set and the second record set being a record set of the first party and a record set of a second party, respectively, and the second record set having an identifier column with identifiers assigned, performing a containment operation on the second record set and column values of records in the first record set, and determining an identifier for at least some of the record in the first record set based on the identifiers of the second record set and an output value of the matching function for a result of the containment operation.
A method for embedding a graph and a system therefor are provided. The method according to some embodiments may include acquiring a colored graph for a target graph, calculating an edge weight for the colored graph based on node color values of the colored graph, generating an edge filtration for the colored graph using the edge weight as a connectivity metric between nodes, and generating an embedding representation of the target graph based on topology information extracted from the edge filtration.
Provided are a method for analyzing quantum vulnerability and a system therefor. The method according to some embodiments may include configuring quantum-vulnerable algorithm detection rule based on a type of encryption algorithm, configuring an analysis level for analyzing a quantum vulnerability of target software, from among a plurality of predefined analysis levels, analyzing the target software based on the configured quantum-vulnerable algorithm detection rule, using an analysis technique corresponding to the configured analysis level, and assessing the quantum vulnerability of the target software based on a result of the analyzing.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
49.
APPARATUS FOR AUTOMATING CONSULTING BASED ON WEB FOR CLOUD MIGRATION
An apparatus for automating consulting for cloud migration including one or more processors and a storage medium storing one or more programs configured to be executable by the one or more processors, the one or more processors are configured to analyze a migration method, a type of migration, migration difficulty and a migration effort to migrate resources of an existing computer room for a work system to a cloud, and compute at least one of an architecture of the cloud, a result of comparison of total cost ownership (TCO) for resources of the cloud versus resources of the existing computer room for the work system, and a roadmap for each migration stage when migrating to the cloud based on at least one of the migration method, the type of migration, the migration difficulty and the migration effort.
H04L 41/0826 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability for reduction of network costs
A method performed in a computing device including a processor and a storage medium in which one or more programs configured to be executable by the processor are written includes receiving configuration information for one of a plurality of processes for building a cloud and processing one of the processes based on the received configuration information, the plurality of processes includes one or more sub-processes, and wherein the processing one of the processes includes determining whether to process a sub-process included in one of the processes based on the configuration information, and processing a sub-process determined to be processed as a result of the determination.
A method for automating cloud building performed in a computing device including a processor and a storage medium in which one or more programs specified to be executed by the processor are recorded, the method including receiving cloud configuration information; determining an operation type based on the received cloud configuration information; extracting one or more processes mapped to the operation type from a plurality of processes in a cloud building process, and generating a pipeline by combining the one or more extracted processes; and executing the pipeline based on the cloud configuration information.
H04L 41/08 - Configuration management of networks or network elements
H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
52.
METHOD FOR COMPARING DOCUMENTS AND SYSTEM THEREFOR
A method for comparing documents and a system therefor are provided. The method according to some embodiments may include acquiring a first document image and a second document image, extracting a first feature set from the first document image and a second feature set from the second document image through an encoder, generating a correlation feature set by analyzing a correlation between at least part of the first feature set and at least part of the second feature set, and outputting a result of comparison between the first document image and the second document image based on a result of decoding the correlation feature set.
G06V 30/418 - Document matching, e.g. of document images
G06V 10/44 - Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersectionsConnectivity analysis, e.g. of connected components
G06V 10/771 - Feature selection, e.g. selecting representative features from a multi-dimensional feature space
53.
METHOD FOR MULTIMODAL EMBEDDING AND SYSTEM THEREFOR
Seoul National University R&DB Foundation (Republic of Korea)
Inventor
Park, Jae Yoo
Park, Jeong Hyung
Han, Bo Hyung
Abstract
Provided are a method for multimodal embedding and a system therefor. The method according to some embodiments may include generating a plurality of patch features for an image sample through an image encoder, wherein the image sample and text sample form a positive pair, generating a plurality of token features for a text sample through a text encoder, softly masking patch features associated with a specific token of the text sample, generating a joint embedding by inputting the masked patch features and the token features into a multimodal encoder, and updating the multimodal encoder by performing an image-text matching (ITM) task based on the joint embedding.
G06V 10/44 - Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersectionsConnectivity analysis, e.g. of connected components
G06V 10/74 - Image or video pattern matchingProximity measures in feature spaces
54.
METHOD FOR SECURE NETWORK COMMUNICATION AND SYSTEM THEREOF
Korea Advanced Institute of Science and Technology (Republic of Korea)
Inventor
Choi, Kyu Young
Cho, Beumjin
Jhi, Yoonchan
Yoon, Hyojin
Cho, Jihoon
Park, Kyoungsoo
Yoon, Junghan
Kim, Duckwoo
Do, Seunghyun
Abstract
The present disclosure relates to a secure network communication method and a system therefor. The secure network communication method using a proxy connecting a client and a server according to an embodiment of the present disclosure may include: receiving, from the client, a session encryption key shared for generation of a secure channel between the client and the server; and when a packet encrypted with the session encryption key and transmitted from the client to the server is received, decrypting the encrypted packet with the session encryption key and analyzing the decrypted packet, or forwarding the encrypted packet to the server without change of an encrypted state.
The present disclosure according to at least one embodiment provides a network congestion control method performed by a computing device, the method comprising transmitting data in units of packets to a receiving terminal connected to a network by performing a first step of increasing a data transmission amount for the data by increasing a window size; and performing a second step of reducing the data transmission amount by reducing the window size in response to an increase in round trip time (RTT) exceeding a predefined threshold value.
H04L 47/27 - Evaluation or update of window size, e.g. using information derived from acknowledged [ACK] packets
H04L 47/12 - Avoiding congestionRecovering from congestion
H04L 47/283 - Flow controlCongestion control in relation to timing considerations in response to processing delays, e.g. caused by jitter or round trip time [RTT]
56.
METHOD FOR PREDICTING USAGE FOR CLOUD STORAGE SERVICE AND SYSTEM THEREFOR
Provided are a method for predicting usage for cloud storage service and system therefor. The method according to some embodiments may include obtaining a time series dataset through monitoring usage of storage resource, extracting a plurality of candidate training sets from the time series dataset, evaluating suitability of the plurality of candidate training sets to a linear regression model, wherein an independent variable of the linear regression model comprises a time variable and a dependent variable represents usage of the storage resource; selecting a training set from the plurality of candidate training sets based on the evaluation result, and predicting future usage of the storage resource through the linear regression model trained with the training set.
An apparatus for calibrating prediction models of an inference service, including a computer program and a processor for executing the computer program according to an example embodiment of the present disclosure, wherein the apparatus includes: a drift pattern creating unit configured to detect a latent factor of learning data and create a possible drift pattern for the learning data based on the detected latent factor; and an instruction executing an individual drift calibrating unit configured to pre-learn calibration information according to a loss function between the learning data and the drift pattern for each drift pattern, and an ensemble drift calibrating unit including a similarity determining unit configured to perform prelearning to determine similarity between recovery data recovered by reconstructing the input drift pattern and the drift pattern.
The present disclosure relates to a method, apparatus, system, and computer program for task deployment in a cloud system including a function accelerator card, and more particularly to a method, apparatus, system, and computer program for task deployment in a cloud system including a function accelerator card, which can efficiently perform task deployment in the cloud system including the function accelerator card to increase the efficiency of the cloud system.
The present disclosure relates to a method, apparatus, system, and computer program for task deployment in a cloud system including a function accelerator card, and more particularly to a method, apparatus, system, and computer program for task deployment in a cloud system including a function accelerator card, which can efficiently perform task deployment in the cloud system including the function accelerator card to increase the efficiency of the cloud system.
In the present disclosure, disclosed is a task deployment method in a cloud system including one or more host servers and one or more function accelerator cards, which is performed by one or more processors in a task deployment apparatus, the task deployment method including: determining the status of each of available resources for the one or more host servers and the one or more function accelerator cards; calculating each of performance estimation values when the task to be deployed is executed in the one or more host servers or the one or more function accelerator cards under the condition of each of the available resources; and selecting the host servers or function accelerator cards in which the task is to be deployed in consideration of each of the performance estimation values.
Disclosed is a marketplace security method performed by a cloud service provider (CSP), and the method includes an operation of downloading a virtual machine (VM) image selected by a cloud service customer from the marketplace into a cloud space of the corresponding cloud service customer, an operation of obtaining an electronic signature associated with the downloaded VM image in response to an operation request from the cloud service customer, an operation of verifying the obtained electronic signature, and an operation of determining, based on a verification result, whether to operate a VM instance corresponding to the downloaded VM image.
G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
G06F 21/33 - User authentication using certificates
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
60.
PQC-BASED MQTT COMMUNICATION METHOD, DEVICE, SYSTEM, AND COMPUTER PROGRAM
The present disclosure relates to a POC-based MQTT communication method, device, system, and computer program, and more particularly, to a POC-based communication method, device, system, and computer program enabling POC-based communication between MOTT brokers. The present disclosure provides a POC-based MQTT communication method performed by one or more processors in a first MQTT broker, the method including: collecting a message from one or more MQTT clients; performing POC-based encryption on the collected message by using a POC processing module; and transmitting the encrypted message to a second MQTT broker.
H04L 67/1001 - Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
H04L 67/61 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources taking into account QoS or priority requirements
61.
METHOD FOR GENERATING TIME SERIES DATA AND SYSTEM THEREFOR
UIF (University Industry Foundation), Yonsei University (Republic of Korea)
Inventor
Park, Se Won
Kim, Min Jung
Park, No Seong
Abstract
Provided are a method for generating time series data and system therefor. The method according to some embodiments may include obtaining an autoencoder trained using original time series data, wherein the autoencoder includes an encoder and a decoder, obtaining a score predictor trained using latent vectors of original time series data generated through the encoder, extracting a plurality of noise vectors from a prior distribution, generating a plurality of synthetic latent vectors by updating the plurality of noise vectors using scores of the plurality of noise vectors predicted through the score predictor, and reconstructing the plurality of synthetic latent vectors into a plurality of synthetic time series samples through the decoder and outputting them.
Provided are a method for generating a summary and system therefor. The method according to some embodiments may include generating a first view sample corresponding to a local view of a reference sample. generating a second view sample corresponding to a view greater than the local view from the reference sample; generating a first output value by inputting the first view sample to a first embedding model. generating a second output value by inputting the second view sample to a second embedding model. and updating parameters of the first embedding model based on a difference between the first output value and the second output value.
G06N 3/084 - Backpropagation, e.g. using gradient descent
G06V 10/774 - Generating sets of training patternsBootstrap methods, e.g. bagging or boosting
G06V 10/80 - Fusion, i.e. combining data from various sources at the sensor level, preprocessing level, feature extraction level or classification level
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable and recorded computer software for supply chain management; downloadable and recorded computer software for managing throughput of goods from manufacture to customer delivery; downloadable and recorded computer software for performing electronic commerce business transactions and electronic data transformations in the field of procurement and supply chain management; downloadable and recorded computer software for use by businesses to build integrated decision support systems, and to optimize supply chain planning; downloadable and recorded computer software for the purpose of optimising supplier relationship management through artificial intelligence and adaptive reporting; downloadable and recorded computer software for business process management and enterprise resource planning for supporting areas of accounting, manufacturing, distribution, retailing, equipment rental management, project management and costing, equipment maintenance management, business forecasting, budgeting and sales reporting, customer and supplier relationship management, inventory and warehouse management, quality management, supply chain management, and content database management Design and development of software modular applications for the purpose of optimising supplier relationship management through artificial intelligence and adaptive reporting; computer software development services for supply chain management; consultancy, technical support and information services relating to supply chain management software; installation and maintenance of supply chain management software; computer software design for others in the field of supply chain management; software as a service (SAAS) services featuring software using artificial intelligence for businesses to use in optimizing their data and processes; software as a service (SAAS) services, featuring software for use by others to automate, manage, maintain, track and reconcile billing, purchase, sales, customer service, asset, resource management, inventory, credit card, disbursement, and accounting records; Software as a service (SAAS) services featuring software for supply chain management; software as a service (SaaS) services featuring software for supply chain management and supply chain collaboration, cargo management and supply chain visibility and prediction; Software as a service (SAAS) services featuring software that provides supplier relationship management, supplier selection and registration, and supplier data management; software as a service (SaaS) services featuring software for Supplier Relationship Management (SRM); Software as a service (SaaS) services featuring software for business process management and enterprise resource planning for supporting areas of accounting, manufacturing, distribution, retailing, equipment rental management, project management and costing, equipment maintenance management, business forecasting, budgeting and sales reporting, customer and supplier relationship management, inventory and warehouse management, quality management, supply chain management, and content database management; providing on-line non-downloadable software for supplier-relationship management, namely, for data compilation, calculation and scoring of performances and compliance of suppliers and corporations and for database management
64.
METHOD FOR AUTOMATICALLY UPDATING APPLICATION INSTALLED IN CONTAINER ENVIRONMENT AND COMPUTING DEVICE THEREFOR
The present disclosure relates to a method for automatically updating an application installed in a container environment, and a computing device therefor. A method for automatically updating an application installed in a container environment according to an embodiment of the present disclosure may include: receiving a cryptogram corresponding to an update package for updating the application; decrypting the cryptogram by a decryption module installed in the container environment so as to extract an update script and an electronic signature regarding the update script from the update package; verifying the electronic signature by using a verification key regarding the electronic signature; and updating the application by executing the update script if the electronic signature is successfully verified.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
65.
SYSTEM FOR BUSINESS PROCESS AUTOMATION AND METHOD THEREOF
Provided are a system for business process automation and a method thereof. The system according to some embodiments may include a connect manager configured to register and manage application programming interface (API) information for services, a process execution engine configured to execute a target business process comprising a particular service task, which is a task using a particular service provided by a service module, and a connect broker configured to acquire API information for the particular service, registered through the connect manager, during execution of the target business process in response to a request from the process execution engine, and process the particular service task by sending a request for the particular service to the service module using the acquired API information.
Korea Advanced Institute of Science and Technology (Republic of Korea)
Inventor
Kim, Seongkwang
Moon, Dukjae
Kwon, Jihoon
Lee, Sangyub
Lee, Jooyoung
Son, Mincheol
Lee, Byeonghak
Ha, Jincheol
Abstract
A calculation method using an efficient one-way function in a zero-knowledge proof, performed by a computing device according to an embodiment of the disclosure includes calculating a second bit stream from one or more first substitution-boxes (S-boxes) by an input based on the first bit stream; calculating a third bit stream by inputting the second bit stream to a processing matrix; and calculating a fourth bit stream from one or more second S-boxes by an input based on the third bit stream.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
Provided are a method for processing a graph and system therefor. The method according to some embodiments may include calculating spectral information associated with a target graph, and generating an embedding representation of the target graph based on information on nodes constituting the target graph and the spectral information.
The present disclosure relates to a method, an apparatus, a system, and a computer program for managing a software component and, more specifically, to a method, an apparatus, a system, and a computer program for managing several software components such as an operating system and a hypervisor constituting a cloud environment. The present disclosure provides a method for managing multiple types of software components, the method being performed by one or more processors in a proxy server, and including: receiving a request for installation of one or more software components among the multiple types of software components, and transferring the received request to each corresponding software provision unit; receiving, from the software provision unit, each of one or more pieces of software installation data for installation of the one or more software components; and determining whether to provide the one or more pieces of software installation data, so as to perform installation of the one or more software components, through verification of the one or more pieces of software installation data.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
A robotic process automation (RPA) bot execution optimization method is provided. The method includes installing an RPA agent and a default RPA engine on the computing system in a process of installing an RPA solution; acquiring, by the installed RPA agent, an execution request for an RPA bot; determining, by the installed RPA agent, a representative version of an RPA scenario for the RPA bot; preparing, by the installed RPA agent, an optimal RPA engine version for executing the RPA scenario representative version; and controlling, by the installed RPA agent, the prepared optimal RPA engine version to execute the RPA scenario.
A method for displaying suggested items associated with a message, the method, which performed by at least one processor, includes: based on a preset first keyword that is detected in a message that is input to an input window of a chat room, displaying suggested items comprising a conversation group or a content associated with the preset first keyword, wherein the conversation group corresponds to a reception target of the message; and based on an item selected from the suggested items, displaying the message comprising information on the conversation group or the content corresponding to the selected item.
A method for providing a core conversation preview of an unread conversation, the method being performed by at least one processor and includes: determining, in response to an input for a first chat room in a list of chat rooms, at least one core conversation of unread conversations included in the first chat room; and displaying a preview window comprising the at least one core conversation.
Provided is a method for recording a task including: recording a task using robotic process automation (RPA) solution; sequentially obtaining each event included in an event sequence generated as a result of the recording, wherein the event sequence includes information about a type of user manipulation, information about a target object position, and information about a target object type; correcting the target object type of the obtained event using the target object position of the obtained event; reproducing the obtained event using the target object position of the obtained event and a corrected target object type of the obtained event; and repeating the obtaining, the correcting, and the reproducing until an event included in the event sequence is exhausted.
G05B 19/4155 - Numerical control [NC], i.e. automatically operating machines, in particular machine tools, e.g. in a manufacturing environment, so as to execute positioning, movement or co-ordinated operations by means of programme data in numerical form characterised by programme execution, i.e. part programme or machine function execution, e.g. selection of a programme
SEOUL NATIONAL UNIVERSITY R&DB FOUNDATION (Republic of Korea)
Inventor
Yoon, Sung Roh
Hwang, Bong Kyu
Kim, Ju Dong
Yun, Jae Woong
Lee, Hyun Jae
Choi, Hyun Jin
Song, Jong Yoon
Park, Noh Ii
Joe, Seong Ho
Gwon, Young June
Abstract
Provided are a method for generating a summary and a system therefor. The method according to some embodiments may include calculating a likelihood loss for a summary model using a first text sample and a first summary sentence corresponding to the first text sample, calculating an unlikelihood loss for the summary model using a second text sample and the first summary sentence, the second text sample being a negative sample generated from the first text sample, and updating the summary model based on the likelihood loss and the unlikelihood loss.
Provided is a method for providing a speech bubble in a video conference. The method is performed by a user terminal and includes: receiving a first speech text converted from a voice signal of a first conference participant participating in a video conference into text; determining whether to activate a cartoon mode; displaying, based on determining to activate the cartoon mode, a conference screen including a first participant object and a first speech bubble, wherein the first participant object indicates the first conference participant and the first speech bubble is generated using the first speech text; and displaying, in response to a user input to select the first speech bubble, a sequence of speech texts of the video conference, the sequence including a speech text corresponding to the first speech bubble.
An apparatus for grouping work request contents selected from a work request content list including one or more processors and a memory storing instructions, an execution of the instructions configuring the one or more processors to display a work request content list, the work request content list including work request contents associated with a function for requesting handling by a user are enumerated, receive a user selection of two or more work request contents from among a plurality of work request contents enumerated in the displayed work request content list, and group two or more selected work request contents according to a classification criteria.
A processor-implemented method for correcting a profile image in an online communication service including extracting emotion information of a terminal user based on user input information and correcting a profile image of the terminal user based on the extracted emotion information
An apparatus for supporting business transactions including one or more processors configured to execute instructions and a memory storing the instructions, the execution of the instructions configures the one or more processors to receive a business process notification from a business system, the business process notification including one or business notification details and business process details, generate an app card based on the one of the business notification details and the business process notification, and transmit the app card to a messenger server, the app card being transmitted to a user terminal through the messenger server to be displayed using a messenger application of the user terminal and the generation of the app card being performed using standard data obtained by converting the one of the business notification details or the business process details included in the business process notification according to a preset standard format.
An event processing method performed by at least one computing device is provided. The method may include collecting a plurality of events; grouping at least some of the collected plurality of events based on code values respectively associated with the collected plurality of events, wherein the code values indicate at least one of originating service devices in which the plurality of events have occurred or services provided by the originating service devices; and regenerating the grouped events into a single event.
A method, which is performed by at least one processor, includes: displaying a currently running application list in response to a first user input; generating a recommended application set including one or more recommended applications for configuring a split screen for a first application included in the currently running application list; displaying the recommended application set for the first application at a position adjacent to the first application; selecting, based on a second user input, a recommended application in the recommended application set for the first application; configuring a split screen including the first application and the selected recommended application; and automatically displaying the split screen.
Provided is a method performed by at least one processor, including: obtaining a content search term, the content search term including a first plurality of search keywords; performing a search for a plurality of contents using the first plurality of search keywords; extracting, based on no result of the search, a second plurality of search keywords from the first plurality of search keywords, wherein the second plurality of search keywords exclude keywords that are not included in a first keyword set, and the first keyword set includes keywords extracted from the plurality of contents; and performing a search for the plurality of contents using the second plurality of search keywords.
A method for providing a messenger service, which is performed by at least one processor, includes: creating a conversation group by grouping conversations relevant to a first conversation of a plurality of conversations displayed in a chat room; and providing at least one recommended target screen based on a target-relevant word included in the conversation group.
A system for partitioning a keyspace includes: a system for partitioning a keyspace, includes: a server configured to transmit a partition setting item based on a keyspace creation request; and a database configured to receive the partition setting item and configured to create a first partition for the keyspace based on the received partition setting item, wherein the partition setting item includes a replication factor and at least one of a size of a second partition for storing data or a storage period of the data.
A method of performing chatroom transition, performed by a user terminal is provided. The method may include: continuously displaying, while a screen of a first chatroom that is active is displayed on a user terminal, a first notification bar indicating at least one first new message occurring in a second chatroom; and activating the second chatroom and displaying a screen of the second chatroom, instead of the screen of the first chatroom, in response to a first user input to select the first notification bar.
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06F 3/0488 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
84.
METHOD FOR PROVIDING RECOMMENDED CHAT ROOM FOR SENDING MESSAGE, AND APPARATUS FOR IMPLEMENTING THE SAME
Provided is a method for providing a recommended chat room for sending a message. The method, which is performed by at least one processor, includes: identifying a user matching a name entered on a message writing screen; and providing a recommended chat room list in which at least one chat room having the user is displayed.
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
H04L 51/046 - Interoperability with other network applications or services
85.
APPARATUS FOR EXECUTING WORKFLOW TO PERFORM DISTRIBUTED PROCESSING ANALYSIS TASKS IN CONTAINER ENVIRONMENT AND METHOD FOR SAME
A workflow execution apparatus and workflow execution method for processing distributed processing analysis tasks in a container environment including a user interface (UI) unit configured to receive an input target workflow of an analysis task to be processed, a workflow scheduler configured to retrieve resource templates executable by the target workflow from among a plurality of resource templates, and generate a final workflow by applying a resource configuration corresponding to the retrieved resource template to the target workflow according to a selected template, and a workflow worker configured to request execution of a distributed processing driver in a container environment, reuse a currently executed distributed processing driver when processing each of tasks included in the final workflow, and execute the final workflow.
A processor-implemented method of interlinking a first video conference system and a second video conference system for combining and transmitting voice signals of a plurality of users in a video conference system interlinking apparatus including a plurality of video sharing units including receiving second video conference data of a plurality of users from the second video conference system and transmitting voice data including combined voices of two or more users, among the transmitted second video conference data, through a single one of the plurality of video sharing units.
H04L 65/401 - Support for services or applications wherein the services involve a main real-time session and one or more additional parallel real-time or time sensitive sessions, e.g. white board sharing or spawning of a subconference
KOREA ADVANCED INSTITUTE OF SCIENCE AND TECHNOLOGY (Republic of Korea)
Inventor
Whang, Joyce Jiyoung
Chung, Chanyoung
Lee, Jaejun
Abstract
Provided is a method for embedding a knowledge graph. The method includes: obtaining a basic knowledge instance and a qualifier instance associated with the basic knowledge instance, wherein at least one of the basic knowledge instance or the qualifier instance comprises a mask element; generating, through an embedder, a first instance embedding corresponding to the basic knowledge instance and a second instance embedding corresponding to the qualifier instance; and performing a prediction of the mask element by inputting, to a predictor, an instance embedding associated with the mask element, wherein the instance embedding corresponds to the first instance embedding or the second instance embedding.
A method and device for providing a closed messenger service to a second authority-level user includes receiving, from a first terminal, a first identity of a first authority-level user who invited the second authority-level user, a second identity of the second authority-level user, and information identifying a workspace to which the second authority-level user is invited, transmitting an authorization request to an approver when it is determined that authorization for the second authority-level user is required on the basis of the first identity, and performing a workspace member registration procedure based on the second identity and the information identifying the workspace when receiving an authorization confirmation to the authorization request from a second terminal.
Provided is a method performed in a terminal for processing an interest message. The method includes receiving a message from a message server after a login event for a user of the terminal occurs, wherein the login event is related to a message service provided by the message server; storing, in response to determining that the received message corresponds to an interest message of the user, the received message in a local storage of the terminal; receiving a search request for the interest message of the user; and searching and providing the interest message of the user through the local storage of the terminal in response to the search request.
Provided is a method performed by a least one computing device for a message service. The method comprises receiving a transmission request for a compound message which is a bundled message comprising a parent message and a plurality of child messages, obtaining permission information for a sender of the compound message, determining whether to allow each of the child messages to be sent based on the permission information and controlling transmission of the compound message based on the determination result.
A receiving device for processing an attention message, the receiving device includes a transmitting/receiving module configured to receive a message, a control module configured to determine whether the received message is an attention message, and to set an attention display flag, and an input/output module configured to display the attention indicator in the chat room in response to the set attention display flag. The message includes an ID of the chat room, an ID of the transmitting device, an ID of the first user, a type of the message, a content of the message, and a transmission time. The control module is configured to determine, based on at least one of the type of the message, the content of the message, and the transmission time, whether the message is the attention message.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
H04L 51/04 - Real-time or near real-time messaging, e.g. instant messaging [IM]
H04L 51/224 - Monitoring or handling of messages providing notification on incoming messages, e.g. pushed notifications of received messages
92.
TOKEN VERIFICATION METHOD AND SERVICE SERVER USING THE SAME
Provided is a method for a token verification performed by a service server. The method according to some embodiments of the present disclosure comprises receiving a service request message comprising a token from a client, performing a first verification process for the token through local storage of the service server in response to the service request message and performing a second verification process for the token through another service server related to a used service list in response to failure of the first verification process, wherein the service request message further comprises the used service list of the client.
Provided are a method for evaluating performance and a system thereof. The method according to some embodiments may include obtaining a first model trained using a labeled dataset, obtaining a second model built by performing unsupervised domain adaptation on the first model, generating pseudo labels for an evaluation dataset using the second model, wherein the evaluation dataset is an unlabeled dataset, and evaluating performance of the first model using the pseudo labels.
Provided are a method for domain adaptation and a system thereof. The method according to some embodiments of the present disclosure may include obtaining a model trained using a labeled dataset of a source domain, wherein the model comprises a feature extractor configured to extract a feature from an input data sample and a predictor configured to predict a label based on the extracted feature, selecting a first data sample from an unlabeled dataset of a target domain, generating a second data sample through data augmentation on the first data sample, calculating a consistency loss between the first data sample and the second data sample by using at least one of the feature extractor or the predictor, and updating the feature extractor based on the consistency loss.
A device for retrieving previous chat history from a chat room includes a control module configured to generate a chat history retrieval request, a transmitting/receiving module configured to transmit the generated chat history retrieval request to a server, and to receive, from the server, a previous chat history, and an input/output module configured to display the received previous chat history in a chat window. The invitation message at least includes an ID of the first user, an ID of the second user, an ID of the chat room, a transmission time of the invitation message, and a previous message code. The previous message code is unit time for limiting the retrieval start point.
A method for extracting an area of interest in a document is provided. The method may comprise extracting one or more target pages from a document composed of a plurality of pages and extracting an area of interest including a plurality of sentences from a target page based on a first part-of-speech characteristic and a sentence characteristic of the target page.
A method for protecting data based on a private set union (PSU) protocol includes: generating a Boolean vector for a first information set, based on whether or not each of a plurality of first groups that are groups of elements of the first information set stored in a first computing device is the same as each of a plurality of second groups that are groups of elements of a second information set stored in a second computing device, obtaining a random vector for the first information set as a result of shuffling performed by using the Boolean vector generated by the first computing device as an input and using order information and encryption information selected by the second computing device as inputs, and generating information on a union of the first information set and the second information set based on the random vector.
A device for storing cylindrical material according to an embodiment of the present disclosure includes a rack shelf including one or more racks in which a circular axis is stored, a rack master including a first rack master fork configured to collect a first circular axis in which an article stored in a target rack is not mounted, and a second rack master fork configured to transport a second circular axis in which the article is mounted in the target rack from which the first circular axis is collected, a turn skid configured to collect the first circular axis collected from the first rack master fork; and an input/output port configure to mount the article in the first circular axis collected from the turn skid.
A semantic segmentation method performed by at least one computing device is provided. The method may include extracting a plurality of support features, which include a first-level feature and a second-level feature, from a support image; generating a plurality of prototypes for a class associated with the support image, based on the plurality of support features; and predicting a segmentation mask for a query image using the plurality of prototypes, wherein the plurality of prototypes comprise a first prototype generated based on the first-level feature and a second prototype generated based on the second-level feature.
G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
G06V 10/40 - Extraction of image or video features
G06V 10/74 - Image or video pattern matchingProximity measures in feature spaces
Provided is a embedding transformation method performed by at least one computing device. The method comprises obtaining a source-side embedding model, transforming source-side data into a first embedding vector through the source-side embedding model and transforming the first embedding vector into a second embedding vector located in a target-side embedding space through a transformation model.