• Title/Summary/Keyword: 개념그래프

Search Result 273, Processing Time 0.027 seconds

Science Gifted Students' Interpretation and Understanding of Concept about T-S Diagram (과학영재학생의 수온-염분도에 대한 해석과 개념 이해)

  • Yu, Eun-Jeong;Jeong, Deuk Sil
    • Journal of the Korean earth science society
    • /
    • v.40 no.6
    • /
    • pp.639-653
    • /
    • 2019
  • The purpose of this study is to investigate the science gifted students' level of interpreting the oceanic graph and of understanding the oceanic physical concept through analyzing the Temperature-Salinity (T-S) diagram and inferring the SOFAR (SOund Fixing And Ranging) channel. A total of 106 gifted students in the 3rd year of a science gifted high school, using T-S diagrams published in one of the journals of Oceanology, developed descriptive questions asking the depth of the SOFAR channel to conduct the quantitative and qualitative analysis of graph interpretation ability. As a result, there was a big difference in the level of graphs interpretation and concepts understanding for each science gifted students such as interpreting, modeling, and converting, and exposed their alternative concepts about water temperature, salinity, and density. The results of this study will be used to understand the levels of science gifted students' graph interpretation in oceanology, and to provide the basic data for improving the teaching and learning methods of oceanology and also provide basic data for teaching material development related to graph analysis.

A Method for Efficient Malicious Code Detection based on the Conceptual Graphs (개념 그래프 기반의 효율적인 악성 코드 탐지 기법)

  • Kim Sung-Suk;Choi Jun-Ho;Bae Young-Geon;Kim Pan-Koo
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.45-54
    • /
    • 2006
  • Nowadays, a lot of techniques have been applied for the detection of malicious behavior. However, the current techniques taken into practice are facing with the challenge of much variations of the original malicious behavior, and it is impossible to respond the new forms of behavior appropriately and timely. There are also some limitations can not be solved, such as the error affirmation (positive false) and mistaken obliquity (negative false). With the questions above, we suggest a new method here to improve the current situation. To detect the malicious code, we put forward dealing with the basic source code units through the conceptual graph. Basically, we use conceptual graph to define malicious behavior, and then we are able to compare the similarity relations of the malicious behavior by testing the formalized values which generated by the predefined graphs in the code. In this paper, we show how to make a conceptual graph and propose an efficient method for similarity measure to discern the malicious behavior. As a result of our experiment, we can get more efficient detection rate.

개념그래프 소개

  • 양기철
    • Communications of the Korean Institute of Information Scientists and Engineers
    • /
    • v.12 no.9
    • /
    • pp.72-79
    • /
    • 1994
  • PDF

Dependence Graph Creation of C Program (C 프로그램의 의존성 그래프 생성)

  • Kim, Yong-Ho;Shin, Seung-Cheol
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11b
    • /
    • pp.961-963
    • /
    • 2005
  • 의존성 그래프는 컴파일러 최적화 분야에서 도입되어 유용하게 사용되고 있으며 프로그램 자르기(program slicing) 분야 등 활용가치를 높여가고 있는 프로그램 표현 방식이다. 우리는 실제적인 C 프로그램의 의존성 그래프를 생성하는 시스템을 구현하였으며 본 논문에서는 의존성 그래프의 개념과 구현과정을 설명한다.

  • PDF

Efficient Authorization Conflict Detection Using Prime Number Graph Labeling in RDF Access Control (RDF 접근 제어에서 소수 그래프 레이블링을 사용한 효율적 권한 충돌 발견)

  • Kim, Jae-Hoon;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.35 no.2
    • /
    • pp.112-124
    • /
    • 2008
  • RDF and OWL are the primary base technologies for implementing Semantic Web. Recently, many researches related with them, or applying them into the other application domains, have been introduced. However, relatively little work has been done for securing the RDF and OWL data. In this article, we briefly introduce an RDF triple based model for specifying RDF access authorization related with RDF security. Next, to efficiently find the authorization conflict by RDF inference, we introduce a method using prime number graph labeling in detail. The problem of authorization conflict by RDF inference is that although the lower concept is permitted to be accessed, it can be inaccessible due to the disapproval for the upper concept. Because by the RDF inference, the lower concept can be interpreted into the upper concept. Some experimental results show that the proposed method using the prime number graph labeling has better performance than the existing simple method for the detection of the authorization conflict.

Analysis of Misunderstood Types Relate to Trigonometric Function and Its Teaching Method (삼각함수에 관한 오류 유형 분석과 그 지도 방법)

  • 강윤수;박수정
    • Journal of the Korean School Mathematics Society
    • /
    • v.6 no.1
    • /
    • pp.101-113
    • /
    • 2003
  • The purpose of this study is to analyze students misunderstood types relate to trigonometric function and to devise its teaching method using GSP. To do this, we performed several steps as followings: First, we performed questionnaire survey to 70 students belong to second year at high school to find students comprehension degree about radian angle representation and trigonometric function graph. Second, we devised the teaching-learning materials relate to trigonometric function graph using GSP. And then, we used them in the class of 35 students who are at the time to learn trigonometric function in the first year at high school. Third, we conducted Questionnaire survey to students studied through teaching and learning materials using GSP. As a result of doing the survey, we found that general students were interested in the class using GSP and they could also operate computer without difficulty.

  • PDF

지능형 전자상거래를 위한 온톨로지의 효율적인 생성

  • Kim, Tae-Seok;Yang, Jin-Hyeok;Lee, Ji-Hong;Son, Jong-Su;Jeong, In-Jeong
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.11a
    • /
    • pp.273-279
    • /
    • 2005
  • 월드와이드웹 (WWW) 기반의 전자상거래는 주로 데이터베이스를 기반으로 서비스를 제공하고 있다. 그러나 월드와이드웹 기반의 전자상거래는 단순 키워드 검색에만 의존하고 있다. 이러한 검색은 데이터베이스 자체로는 의미적인 정보를 효과적으로 처리하기에는 많은 문제점이 있다. 1999년 말에 의미적인 정보를 효과적으로 처리하기 할 수 있는 시맨틱 웹 이 제안되었다. 시맨틱 웹은 의미적인 정보를 담고 있는 지식베이스(Knowledge Bases)인 온톨로지를 기반으로 하고 있다. 그러나 온툴로지의 생성은 많은 부분을 휴리스틱에 의존하고 있기 때문에 많은 시간과 비용이 소비된다. 따라서 우리는 이와 같은 문제를 해결하기 위하여 데이터베이스에서 온톨로지를 생성하는 방법을 제안한다. 데이터베이스는 도메인을 잘 나타내고 있는 정보의 저장소이므로 데이터베이스로부터의 온톨로지 생성은 분석, 설계 등의 사전 작업이 필요하지 않아 시간과 비용의 소비를 줄 일 수 있는 장점이 있다. 우리는 데이터베이스에서 스키마를 추출, 뼈대그래프$^{1}$ 를 생성하고 개념그래프로 확장하여 도메인을 잘 나타낼 수 있는 온톨로지를 생성하는 알고리즘을 제안하고 제안된 알고리즘을 통하여 온톨로지를 생성을 함으로서 제안된 생성 방법을 검증한다. 제안한 방법으로 생성된 온톨로지는 단순 키워드 검색에서 의미적인 검색을 할 수 있는 시맨틱 웹 서비스의 기반이 되므로 의미적 검색이 가능한 전자상거래 서비스를 구축하는데 시간과 비용의 소비를 줄임으로 차세대 전자상거래의 초석이 된다.

  • PDF

An Enhanced Concept Search Method for Ontology Schematic Reasoning (온톨로지 스키마 추론을 위한 향상된 개념 검색방법)

  • Kwon, Soon-Hyun;Park, Young-Tack
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.11
    • /
    • pp.928-935
    • /
    • 2009
  • Ontology schema reasoning is used to maintain consistency of concepts and build concept hierarchy automatically. For the purpose, the search of concepts must be inevitably performed. Ontology schema reasoning performs the test of subsumption relationships of all the concepts delivered in the test set. The result of subsumption tests is determined based on the creation of complete graphs, which seriously weighs with the performance of reasoning. In general, the process of creating complete graph has been known as expressive procedure. This process is essential in improving the leading performance. In this paper, we propose a method enhancing the classification performance by identifying unnecessary subsumption test supported by optimized searching method on subsumption relationship test among concepts. It is achieved by propagating subsumption tests results into other concept.

Collaborative Hangul Editor (한글 공동 편집기)

  • Kim, Sang-Wook;Cha, Kyung-Ae;Kim, Woo-Nyun
    • Annual Conference on Human and Language Technology
    • /
    • 1997.10a
    • /
    • pp.454-460
    • /
    • 1997
  • 여러 응용 분야에 따라 많은 공동작업 시스템이 있다. 이러한 시스템들은 각 응용 영역에 따라 요구되는 문제가 다르다. 이 논문에서는 공동작업객체의 개념을 제시한다. 이 개념은 어떠한 멀티미디어 공동작업 시스템에도 적용할 수 있는 시스템 소프트웨어의 구조적인 모델이다. 이 모델은 지식베이스에서 이벤트를 자동으로 공유하고 각 이벤트에 대한 동작을 비동기적 동기적으로 수행한다. 이 논문에서의 공동작업객체는 멀티미디어 객체의 집합인데, 개념 그래프와 지식 쉘로 표현된다. 이 공동작업객체에서 수행되는 한글 공동텍스트 편집기는 한글 편집 지식에 의하여 공동으로 편집할 수 있다. 또한 한글 공동텍스트 편집기는 공동작업을 위하여 공동작업 객체를 관리, 유지하는 기능을 제공한다. 앞으로는 일반적인 공동작업 객체의 이론적 모델을 연구한다.

  • PDF

Design and Implementation of a Tense Helper for a Korean-to-English Machine Translation System (한/영 기계번역 시스템을 위한 시제 도우미의 설계와 구현)

  • 이병희
    • Journal of Internet Computing and Services
    • /
    • v.2 no.4
    • /
    • pp.55-67
    • /
    • 2001
  • Commercial machine translation systems have been announcing recently, However, there are problems that the systems have shown mistranslations, yet. Among these mistranslations, this paper is interested in the mistakes of tense processing. The paper compares Korean tenses with 12 English ones: present. past, future, present perfect. past perfect, future perfect. present progressive, past progressive, future progressive, present perfect progressive, past perfect progressive. future perfect progressive. Next, we perform the meaning analysis of Korean tenses. Then we describe the structure of the tenses based on Conceptual Graph(CG). In the experiment. the paper implements the program that translates sentences included in the tenses into CG.

  • PDF