• Title/Summary/Keyword: 개체 기반

Search Result 923, Processing Time 0.027 seconds

커뮤니티 컴퓨팅을 위한 미들웨어 아키텍처

  • Ji, Gyeong-Hwan;Yang, Jeong-Jin
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.11a
    • /
    • pp.171-173
    • /
    • 2005
  • 커뮤니티 컴퓨팅은 유비쿼터스 컴퓨팅 환경을 기반으로 다양한 요구와 이를 수용하기 위한 서비스 혹은 개체를 나열하는 것 에서부터 이들 간 일시적으로 협력하고 주어진 상황을 효과적으로 인지할 뿐만 아니라 다수의 장치가 협력 관계를 추구하는 컴퓨팅 모델이다. 본 논문은 커뮤니티 모델과 미들웨어의 아키텍처를 확립하기 위한 요구사항과 구조에 대하여 논한다.

  • PDF

Token Classification for Detecting Modified Profanity (변형된 비속어 탐지를 위한 토큰 분류)

  • Sung-Min Ko;Youhyn Shin
    • Annual Conference of KIPS
    • /
    • 2023.11a
    • /
    • pp.498-499
    • /
    • 2023
  • 비속어 탐지 기법으로 주로 사용되는 비속어 데이터베이스 활용 방식 혹은 문장 자체를 혐오, 비혐오로 분류하는 방식은 변형된 비속어 탐지에 어려움이 있다. 본 논문에서는 자연어 처리 태스크 중 하나인 개체명 인식 방법에서 착안하여 시퀀스 레이블링 기반의 비속어 탐지 방법을 제안한다. 한국어 악성 댓글 중 비속어 부분에 대해 레이블링 된 데이터셋을 구축하여 실험을 진행하고, 이를 통해 F1-Score 약 0.88 의 결과를 보인다.

Efficient Authentication Protocol for Low-Cost RFID System (저비용 RFID 시스템에 적합한 효율적인 인증 방법)

  • Kim, Jin-Ho;Seo, Jae-Woo;Lee, Pil-Joong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.117-128
    • /
    • 2008
  • Compared with the existing bar code system, RFID system has lots of advantages such as it identifies automatically massive objects. We might anticipate RFID technology will be a substitution for an optical bar code system in the near future. However, their feature that uses radio waves may cause various security problems. Many kinds of solutions have been researched to overcome these security problems. In this paper, we analyze the previous proposed protocols. And then, we categorize RFID authentication into two types according to the synchronization requirement between a Back-end Database and a Tag. In addition, we introduce the previous proposed approaches to tag search problem in RFID authentication. And we propose an efficient method which provides fast tag search by using membership test algorithm, a Bloom filter.

Multitask Transformer Model-based Fintech Customer Service Chatbot NLU System with DECO-LGG SSP-based Data (DECO-LGG 반자동 증강 학습데이터 활용 멀티태스크 트랜스포머 모델 기반 핀테크 CS 챗봇 NLU 시스템)

  • Yoo, Gwang-Hoon;Hwang, Chang-Hoe;Yoon, Jeong-Woo;Nam, Jee-Sun
    • Annual Conference on Human and Language Technology
    • /
    • 2021.10a
    • /
    • pp.461-466
    • /
    • 2021
  • 본 연구에서는 DECO(Dictionnaire Electronique du COreen) 한국어 전자사전과 LGG(Local-Grammar Graph)에 기반한 반자동 언어데이터 증강(Semi-automatic Symbolic Propagation: SSP) 방식에 입각하여, 핀테크 분야의 CS(Customer Service) 챗봇 NLU(Natural Language Understanding)을 위한 주석 학습 데이터를 효과적으로 생성하고, 이를 기반으로 RASA 오픈 소스에서 제공하는 DIET(Dual Intent and Entity Transformer) 아키텍처를 활용하여 핀테크 CS 챗봇 NLU 시스템을 구현하였다. 실 데이터을 통해 확인된 핀테크 분야의 32가지의 토픽 유형 및 38가지의 핵심 이벤트와 10가지 담화소 구성에 따라, DECO-LGG 데이터 생성 모듈은 질의 및 불만 화행에 대한 양질의 주석 학습 데이터를 효과적으로 생성하며, 이를 의도 분류 및 Slot-filling을 위한 개체명 인식을 종합적으로 처리하는 End to End 방식의 멀티태스크 트랜스포머 모델 DIET로 학습함으로써 DIET-only F1-score 0.931(Intent)/0.865(Slot/Entity), DIET+KoBERT F1-score 0.951(Intent)/0.901(Slot/Entity)의 성능을 확인하였으며, DECO-LGG 기반의 SSP 생성 데이터의 학습 데이터로서의 효과성과 함께 KoBERT에 기반한 DIET 모델 성능의 우수성을 입증하였다.

  • PDF

Study on Human Motion based Smartphone UX Pattern using User Experience Design (사용자 경험 디자인을 이용한 인간 동작 기반 스마트폰 UX 패턴 연구)

  • Joo, Jeong-Gyu;Lee, Jun-Hwan;Cho, Han-Jin
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.345-350
    • /
    • 2012
  • People established a network much more using smart equipments by means of the development of the mobile industry. They can get useful information easily, make new personal connections and communities, and form various personal connections using the communities. The importance of contact, timing, and utility of time plays an important role in human relations. Many programs related to personal relations are already saturated. In other words, they are very significant and difficult to use. Many programs that didn't be concerned ahead of time about how to deal with a lot of the amount of information effectively and take it out in order to use it could bring about negative results. Human being already makes use of physical-empirical language in all of the conscious and unconscious areas. This study begins at the supposition that how to make it easy to apply humane gestures and languages to applications with portable equipment close to human beings.

Transition of Archival Description from ISAD(G) to Record in Context Conceptual Model (ISAD(G)에서 RiC-CM으로의 전환에 관한 연구)

  • Park, Zi-young
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.17 no.1
    • /
    • pp.93-115
    • /
    • 2017
  • In this study, the RiC-CM (Records in Context-Conceptual Model) draft of the International Council on Archives Expert Group on Archival Description (ICA EGAD) was analyzed, mapped with the descriptive elements of ISAD(G), and the archival description of the record group based on RiC-CM was piloted. This was done to identify trends in the archival descriptive standards and to derive considerations in relation to improving existing descriptive standards. The mapping types of RiC-CM and ISAD(G) include inter-attribute mapping, attribute-entity mapping, and attribute-relation mapping. In addition to the mapping between descriptive elements, a frame for the archival information that can construct a record through the objects, attributes, and relationships of RiC-CM is constructed using the protege, and the example data is inputted for trial. As a result, it was possible to express most of the existing descriptive information of ISAD(G) through RiC-CM. In addition, in RiC-CM, the recording descriptive information is classified in detail, and the characteristic of browsing the relation between individual objects is enhanced.

A Study on the Database Integration Methodology using XML (XML을 이용한 데이터베이스 통합방안에 관한 연구)

  • Oh Se-Woong;Lee Hong-Girl;Lee Chul-Young;Park Jong-Min;Suh Sang-Hyung
    • Journal of Navigation and Port Research
    • /
    • v.29 no.10 s.106
    • /
    • pp.883-890
    • /
    • 2005
  • Database Integration problems has been recognized as a critical issue for effective logistics service in logistics environment. However, researches related to effective methodology for this have been studied theoretically in the DB schema integration, are insufficient in the side of the system realization. The aim of this paper is to present a schema integration technique to integrate DB using XML( eXtensible Markup Language) in the part of practical DB integration, a quantitative methodology for the identification of conflict that is a representative problem on database integration. To achieve this aim, we extracted the entity name and attribute name from DB schema and suggested a quantitative methodology to easily fine name conflict that frequently give raise to a trouble when schema integration, based on the level of semantic similarity between attributes and entities.

Design and Implementation of a Cryptograhic API considering a DRM Environment (DRM 환경을 고려한 보안 통신 API의 설계 및 구현)

  • Jung, In-Sung;Shin, Yong-Tae
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.163-170
    • /
    • 2004
  • The additional mechanism Is required to set up a secure connection among the communication subjects in the internet environment. Each entity should transfer and receive the encrypted and hashed data to guarantee the data integrity. Also, the mutual authentication procedure should be processed using a secure communication protocol. The SSL/TLS is a protocol which creates the secure communication channel among the communication subjects and sends/receives a data. Although the OpenSSL which implements the TLS is using by many developers and its stability and performance are proved, it has a difficulty in using because of its large size. So, this Paper designs and implements the secure communication which the users can use easily by modification works of OpenSSL library API. We proved the real application results using the DRM client/server case which supports a secure communication using the implemented API.

The method of grouping query based on EPCIS to improve the RFID application performance in EPC Network (EPC Network 기반 RFID 응용 시스템의 성능 향상을 위한 EPCIS 주소별 그룹 질의 기법)

  • Park, Sung-Jin;Kim, Dae-Hwan;Son, Min-Young;Yeom, Keun-Hyuk
    • The KIPS Transactions:PartD
    • /
    • v.18D no.2
    • /
    • pp.111-122
    • /
    • 2011
  • These days RFID application has been developed rapidly. It has been applied to many business areas such as logistics and supply chains. The Electronic Product Code (EPC) Network Architecture, an open global standard, is proposed by EPCglobal for developing RFID enabled systems. People who want to obtain the product information which are master information and event information have to apply with EPC Network Architecture. However, EPCIS which has master information and event information has to be accessed base on each EPC. Therefore, there is lots of duplicate accessing to EPCIS because RFID application has to access the same EPCIS over again which makes all performance down in EPC Network. This paper proposes how to reduce access times to EPCIS using EPC grouping based on EPCIS address. We build EPC Network environment to experiment about performance of RFID application system and we prove the improvement of EPC Network. Our result shows the reducing the EPCIS communication time by maximum 99 percentages.

Smart Phone Picture Recognition Algorithm Using Electronic Maps of Architecture Configuration (건물 배치 전자도면을 이용한 모바일 폰의 피사체 인지 방법)

  • Yim, Jae-Geol;Joo, Jae-Hun;Lee, Gye-Young
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.3
    • /
    • pp.1-14
    • /
    • 2012
  • As the techniques of electronic and information are advancing, the computing power of a smart phone is becoming more powerful and the storage capacity of a smart phone is becoming larger. As the result, various new useful services are becoming available on smart phones. The context-aware service and mobile augmented reality have recently been the most popular research topics. For those newly developed services, identifying the object in the picture taken by the camera on the phone performs an extremely important role. So, many researches of identifying pictures have been published and most of them are based on the time consuming image recognition techniques. On the contrary, this paper introduces a very fast and effective method of identifying the objects on the photo making use of the sensor data obtained from the smart phone and electronic maps. Our method estimates the line of sight of the camera with the location and orientation information provided by the smart phone. Then it finds any element of the map which intersects the line of sight. By investigating those intersecting elements, our method identifies the objects on the photo.