• Title/Summary/Keyword: 사용자 문서

Search Result 1,731, Processing Time 0.04 seconds

A Suggestion of Methodologies for Modular and Integrated Verification of WA-DGNSS Reference Station Software Suitable for Validation & Verification of DO-278 (DO-278의 Validation & Verification에 적합한 WA-DGNSS 기준국 소프트웨어의 모듈별 통합 검증 방법론 제시)

  • Yoon, Donghwan;Park, Byung-Woon;Choi, Wan-Sik;Kee, Changdon;Seo, Seungwoo;Park, Junpyo
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.1
    • /
    • pp.15-21
    • /
    • 2015
  • WA-DGNSS is a system to service for users using a satellite which received correction data from ground station that calculates the relative errors of the tracked GNSS signals and sends to a satellite. Users are guaranteed the reliability of the GNSS signal and the accuracy of positioning. ICAO recommends the application of WA-DGNSS for the airplane taking off and landing process. In this paper, we suggests methods to verify of the pre-developed WA-DGNSS reference software constituting modules and an integration test process refer to the RTCA DO-278 which is a document for the development process of an aeronautics software. Also, we statistically verified the reference software test through our methods. And then, we confirmed to performance the function of the reference software properly.

Design and Implementation of Ontology-Based Natural Language Search System (온톨로지 기반의 자연어 검색 시스템 설계 및 구현)

  • Kang, Rae-Goo;Lim, Dong-Il;Jung, Chai-Yeoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.875-878
    • /
    • 2007
  • Up until now, when a user search product information, the keyword-based search that mainly uses frequency of words or vocabulary information has been utilized in large. In the keyword-based research, the user should have to bear additional burden in order to search the displayed results manually once again because it shows those files that have no connection at all with the inquiries made by the user. To resolve such a problem, ontology has been emerged. In this paper, product search system using ontology was constructed directly and also tested how accurate search it does perform through the searching according to classification. To test this, about 40,000 product data of A discount store, which was operating on/off line discount stores, were constructed as database, and developmental environment for User Interface was tested by having developed the search system using JSP and PowerBuilder 9.0. Results from the test proved that the search method using Domain Ontology for product presented and designed in this paper was superior to the existing keyword-based search method.

  • PDF

User Centered Information of Navigation Process Saving Techniques Based on X3D Virtual Environment (X3D 기반 사용자 중심 가상환경 탐색항해를 위한 의미정보 저장 기법)

  • Song, Teuk-Seob
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.627-630
    • /
    • 2007
  • XML is becoming a de facto standard for exchanging data in Internet data processing environments due to the inherent characteristics such as hierarchical self-describing structures. Nowadays the number of 3D VE(Virtural Environment) available on the internet is constantly increasing, most of them focused low-level geometric data that lack any semantic information. VRML is composed of simple science graph. X3D is constructed based on XML and has many advantage. However, previous researches can not apply various advantage of XML. This work proposes an alternate approach for association semantic information to X3D VE based on XML. These information use navigation to VE. Moreover, we study extraction method of sematic information to XML document. In this work, we study saving techniques for navigation processing.

  • PDF

Relevant Keyword Collection using Click-log (클릭로그를 이용한 연관키워드 수집)

  • Ahn, Kwang-Mo;Seo, Young-Hoon;Heo, Jeong;Lee, Chung-Hee;Jang, Myung-Gil
    • The KIPS Transactions:PartB
    • /
    • v.19B no.2
    • /
    • pp.149-154
    • /
    • 2012
  • The aim of this paper is to collect relevant keywords from clicklog data including user's keywords and URLs accessed using them. Our main hyphothesis is that two or more different keywords may be relevant if users access same URLs using them. Also, they should have higher relationship when the more same URLs are accessed using them. To validate our idea, we collect relevant keywords from clicklog data which is offered by a portal site. As a result, our experiment shows 89.32% precision when we define answer set to only semantically same words, and 99.03% when we define answer set to broader sense. Our approach has merits that it is independent on language and collects relevant words from real world data.

Development of Search Method using Semantic technologies about RESTful Web Services (시맨틱 기술을 활용한 RESTful 웹서비스의 검색 기법 개발)

  • Cha, Seung-Jun;Choi, Yun-Jeong;Lee, Kyu-Chul
    • Journal of Korea Spatial Information System Society
    • /
    • v.12 no.1
    • /
    • pp.100-104
    • /
    • 2010
  • Recently with advent of Web 2.0, RESTful Web Services are becoming increasing trend to emphasize Web as platform. There are already many services and the number of service increases in very fast pace. So it is difficult to find the service what we want by keyword based search. To solve this problem, we developed the search method using sem antic technologies about RESTful Web Services. For that, first we define the system structure and model the description format based on the integrated search system for OpenAPIs, and then we add Semantic Markup (tagging, semantic annotation) on the HTML description pages. Next we extract RDF document from them and store it in service repository. Based on the keywords that are extended by means of ontology, the developed system provides more purified and extended results than similarity-based keyword searching system.

Voice-based messenger using NXT touch-sensor input unit and the Bluetooth wireless communication for the blind (터치 센서 입력기와 블루투스 무선 통신을 이용한 시각 장애인용 음성 기반 메신저)

  • Lee, Jung-Il;Kim, Soon-Cheol;Won, Hui-Chul
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.5
    • /
    • pp.78-86
    • /
    • 2008
  • Many people have conveniently used various messengers to talk with remote friends or to send urgent files to remote co-workers. Recently, it is also possible to use messenger with user's image. However, these messenger technologies are of no use for the blind. In order to cope with this problem, we propose voice-based messenger with a Braille system for the blind. The proposed messenger enables the blind to listen to the received sentences from remote user. It also enables them to listen to the written sentences before sending to remote user for the purpose of checking that the sentences are correctly written. The Braille system for writing sentences can be implemented by using the programmable NXT system, which contains a 32-bit ARM-7 micro-controller, with 4 touch-sensors. Finally, we apply the Bluetooth technology for wireless communication between the Braille system and the proposed messenger.

  • PDF

Inverse Document Frequency-Based Word Embedding of Unseen Words for Question Answering Systems (질의응답 시스템에서 처음 보는 단어의 역문헌빈도 기반 단어 임베딩 기법)

  • Lee, Wooin;Song, Gwangho;Shim, Kyuseok
    • Journal of KIISE
    • /
    • v.43 no.8
    • /
    • pp.902-909
    • /
    • 2016
  • Question answering system (QA system) is a system that finds an actual answer to the question posed by a user, whereas a typical search engine would only find the links to the relevant documents. Recent works related to the open domain QA systems are receiving much attention in the fields of natural language processing, artificial intelligence, and data mining. However, the prior works on QA systems simply replace all words that are not in the training data with a single token, even though such unseen words are likely to play crucial roles in differentiating the candidate answers from the actual answers. In this paper, we propose a method to compute vectors of such unseen words by taking into account the context in which the words have occurred. Next, we also propose a model which utilizes inverse document frequencies (IDF) to efficiently process unseen words by expanding the system's vocabulary. Finally, we validate that the proposed method and model improve the performance of a QA system through experiments.

Effectual Fuzzy Query Evaluation Method based on Fuzzy Linguistic Matrix in Information Retrieval (정보검색에서 퍼지 언어 매트릭스에 근거한 효율적인 퍼지 질의 평가 방법)

  • 최명복;김민구
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.10 no.3
    • /
    • pp.218-227
    • /
    • 2000
  • In this paper, we present a new fuzzy information retrieval method based on thesaurus. In the proposed method th thesaurus is represented by a fuzzy linguistic matrix, where the elements in fuzzy linguistic matrix represent a qualitative linguistic values between terms. In the fuzzy linguistic matrix, there are three kinds of fuzzy relationships between terms, i.e., similar relation, hierarchical relation, and associative relation. The implicit fuzzy relationships between terms are inferred by the transitive closure of the fuzzy linguistic matrix based on fuzzy theory. And the proposed method has the capability to deal with a qualitative linguistic weights in a query and in indexing of information items to reflect qualitative measure of human based on vague and uncertain decisions rather than a quantitiative measure. Therefore the proposed method is more flexible than the ones presented in papers[1-3]. Moreover our method is more effectual of time than the ones presented in papers[1-3] because we use a fuzzy linguistic matrix and AON (Associate Ordinary Number) values in query evaluation process. As a result, the proposed method allows the users to perform fuzzy queries in a more flexible and more intelligent manner.

  • PDF

Design and experiment for prototype of safety route service for passenger ships considering quality in use (사용상 품질을 고려한 여객선 안전항로 서비스 프로토타입 설계 및 실험)

  • Kim, Kilyong;Lee, Seojeong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.10a
    • /
    • pp.45-46
    • /
    • 2015
  • The guideline on software quality assurance and human-centered design for e-Navigation was approved as IMO circular June 2015. e-Navigation software systems are characterized by a high proportion of data quality and quality in use. The purpose of this paper is to improve the quality in use of the maritime software quality assurance for the safety route guiding service. In this study, we added the stage which the stockholders such as a project manager, software developers, and end-users use the prototype that was developed based on the scenarios before the stage of design and development. Through this, we could review the requirement about the quality in use for a limited time at the beginning of the project. also we could raise understanding the concept of this project and goal system.

  • PDF

Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM (모바일 가상화 기술과 ARM의 Trustzone을 사용한 효율적인 보안 방법)

  • Choi, Hwi-Min;Jang, Chang-Bok;Kim, Joo-Man
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.299-308
    • /
    • 2014
  • Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.