• Title/Summary/Keyword: 소프트웨어감정

Search Result 221, Processing Time 0.019 seconds

A Korean Document Sentiment Classification System based on Semantic Properties of Sentiment Words (감정 단어의 의미적 특성을 반영한 한국어 문서 감정분류 시스템)

  • Hwang, Jae-Won;Ko, Young-Joong
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.4
    • /
    • pp.317-322
    • /
    • 2010
  • This paper proposes how to improve performance of the Korean document sentiment-classification system using semantic properties of the sentiment words. A sentiment word means a word with sentiment, and sentiment features are defined by a set of the sentiment words which are important lexical resource for the sentiment classification. Sentiment feature represents different sentiment intensity in general field and in specific domain. In general field, we can estimate the sentiment intensity using a snippet from a search engine, while in specific domain, training data can be used for this estimation. When the sentiment intensity of the sentiment features are estimated, it is called semantic orientation and is used to estimate the sentiment intensity of the sentences in the text documents. After estimating sentiment intensity of the sentences, we apply that to the weights of sentiment features. In this paper, we evaluate our system in three different cases such as general, domain-specific, and general/domain-specific semantic orientation using support vector machine. Our experimental results show the improved performance in all cases, and, especially in general/domain-specific semantic orientation, our proposed method performs 3.1% better than a baseline system indexed by only content words.

A Preliminary Study for Emotional Expression of Software Robot -Development of Hangul Processing Technique for Inference of Emotional Words- (소프트웨어 로봇의 감성 표현을 위한 기반연구 - 감성어 추론을 위한 한글 처리 기술 개발 -)

  • Song, Bok-Hee;Yun, Han-Kyung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2012.05a
    • /
    • pp.3-4
    • /
    • 2012
  • 사용자 중심의 man machine interface 기술의 발전은 사용자 인터페이스 기술과 인간공학의 접목으로 인하여 많은 진전이 있으며 계속 진행되고 있다. 근래의 정보전달은 사운드와 텍스트 또는 영상을 통하여 이루어지고 있으나, 감성적인 측면에서의 정보전달에 관한 연구는 활발하지 못한 실정이다. 특히, Human Computer Interaction분야에서 음성이나 표정의 전달에 관한 감성연구는 초기단계로 이모티콘이나 플래쉬콘 등이 감정전달을 위하여 사용되고 있으나 부자연스럽고 기계적인 실정이다. 본 연구는 사용자와 상호작용에서 컴퓨터 또는 응용소프트웨어 등이 자신의 가상객체(Software Robot, Sobot)를 활용하여 인간친화적인 상호작용을 제공하기위한 기반연구로써 한글에서 감성어를 추출하여 분류하고 처리하는 기술을 개발하여 컴퓨터가 전달하고자하는 정보에 인공감정을 이입시켜 사용자들의 감성만족도를 향상시키는데 적용하고자한다.

  • PDF

A Personalized Movie Recommendation System Based On Personal Sentiment and Collaborative Filtering (개인의 감정과 협업필터링을 이용한 개인화 영화 추천 시스템)

  • Kim, Sun-Ho;Park, Doo-Soon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.1176-1178
    • /
    • 2013
  • 협업 필터링(Collaborative Filtering)이란 많은 사용자들로부터 얻은 기호정보(taste information)에 따라 사용자들의 관심사들을 자동적으로 예측하여, 아이템에 대한 목표 사용자의 선호도와 다른 사용자의 선호도를 비교 분석하여 목표 사용자가 좋아할 만한 아이템을 추천하는 기법이다. 그러나 협업 필터링 기법은 고객 정보와 평가 정보가 충분히 많아야 정확성이 높은 추천 결과가 나타난다. 본 논문에서는 영화를 한 번도 평가하지 않은 사용자들에게 영화를 추천 해주기 위한 즉, 협업 필터링의 희박성 문제(Sparsity Problem)를 해결하기 위한 한 가지 방법으로 개인의 감정 정보를 이용하여 문제를 해결하는 방법을 소개한다.

Static Analysis Tools Against Cross-site Scripting Vulnerabilities in Web Applications : An Analysis

  • Talib, Nurul Atiqah Abu;Doh, Kyung-Goo
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.125-142
    • /
    • 2021
  • Reports of rampant cross-site scripting (XSS) vulnerabilities raise growing concerns on the effectiveness of current Static Analysis Security Testing (SAST) tools as an internet security device. Attentive to these concerns, this study aims to examine seven open-source SAST tools in order to account for their capabilities in detecting XSS vulnerabilities in PHP applications and to determine their performance in terms of effectiveness and analysis runtime. The representative tools - categorized as either text-based or graph-based analysis tools - were all test-run using real-world PHP applications with known XSS vulnerabilities. The collected vulnerability detection reports of each tool were analyzed with the aid of PhpStorm's data flow analyzer. It is observed that the detection rates of the tools calculated from the total vulnerabilities in the applications can be as high as 0.968 and as low as 0.006. Furthermore, the tools took an average of less than a minute to complete an analysis. Notably, their runtime is independent of their analysis type.

An Overview of Time Estimation in the Appraisal of Completeness for Software

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.21-26
    • /
    • 2020
  • The completeness appraisal of software is performed in various forms, such as assessing the completion level in the development process, calculating the defect rate, estimating the development cost, and calculating the redevelopment cost. Along with this, the problem that is often dealt with is estimation of the development time. Even in a dispute over completeness due to delays in software development, issues of calculating an appropriate development time required to develop a delivery software or a development time required for change requests are often included in the appraisal request. In this paper, we introduce the procedure and method for estimating the appropriate project time of software development so that the appraiser can be applied to the appraisal work for determining the completeness. The method is based on the manual for calculating the appropriate project period of software development project.

Microcontroller Modeling for Virtual Experiment in Microprocessor Education (마이크로프로세서 교육을 위한 가상실험용 마이크로컨트롤러 모델링)

  • Ki, Jang-Geun;Kwon, Kee-Young
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.93-99
    • /
    • 2021
  • The demand for online education has rapidly increased due to the influence of COVID-19. One of the biggest challenges in engineering education is how to efficiently conduct experiments online. In this paper, for the virtual experimental system for microcontroller application that is essential for education in the field of electrical, electronic, and control engineering, we described the microcontroller functional modeling and implementation with Java language. The usefulness of the developed microcontroller module has been verified through educational field application.

A Study on Deep Learning Model-based Object Classification for Big Data Environment

  • Kim, Jeong-Sig;Kim, Jinhong
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.59-66
    • /
    • 2021
  • Recently, conceptual information model is changing fast, and these changes are coming about as a result of individual tendency, social cultural, new circumstances and societal shifts within big data environment. Despite the data is growing more and more, now is the time to commit ourselves to the development of renewable, invaluable information of social/live commerce. Because we have problems with various insoluble data, we propose about deep learning prediction model-based object classification in social commerce of big data environment. Accordingly, it is an increased need of social commerce platform capable of handling high volumes of multiple items by users. Consequently, responding to rapid changes in users is a very significant by deep learning. Namely, promptly meet the needs of the times, and a widespread growth in big data environment with the goal of realizing in this paper.

Model Based Vulnerability Analysis for SOA (SOA를 위한 모델기반 취약점 분석)

  • Kim, Hyunha;Kim, Yukyong;Doh, Kyung-Goo
    • Journal of Software Assessment and Valuation
    • /
    • v.8 no.2
    • /
    • pp.45-51
    • /
    • 2012
  • This paper is to identify and assess vulnerabilities of services considering the nature of service layers for analyzing vulnerability of SOA security. It is a model driven approach which provides the way to present security requirements of the business model and identify the vulnerabilities of the services to extract the secure service model. We validate the proposed method with the analytic evaluation because the predictive nature of our methodology poses some specific challenges for its validation.

Trust Evaluation Metrics for Selecting the Optimal Service on SOA-based Internet of Things

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.129-140
    • /
    • 2019
  • In the IoT environment, there is a huge amount of heterogeneous devices with limited capacity. Existing trust evaluation methods are not adequate to accommodate this requirement due to the limited storage space and computational resources. In addition, since IoT devices are mainly human operated devices, the trust evaluation should reflect the social relations among device owners. There is also a need for a mechanism that reflects the tendency of the trustor and environmental factors. In this paper, we propose an adaptable trust evaluation method for SOA-based IoT system to deal with these issues. The proposed model is designed to minimize the confidence bias and to dynamically respond to environmental changes by combining direct evaluation and indirect evaluation. It is expected that it will be possible to secure trust through quantitative evaluation by providing feedback based on social relationships.

A study on program development for character web drama production (캐릭터 웹드라마 제작을 위한 프로그램 개발 연구)

  • Hyun-soo Lee;Min-Ha Kim;Ji-Won Seo;Sung-Jin Jo;Jong-Won Lee;Jung-Yi Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.591-596
    • /
    • 2023
  • This study developed a program that can produce videos easily and conveniently, focusing on teenage media producers. Through user research, we identified the needs and problems of teenage producers, and implemented a character customization function desired by users and an emotion and action recommendation system using GPT. In the rendering process, the final image was created by combining audio and video using OpenCV and FFmpeg. Teenage users who do not have expertise in video production can customize web drama characters through a simple interface and receive recommendations for emotions and actions with the help of GPT. The program of this study is expected to be a tool that can help teenage users who do not have expertise in editing and directing to produce high-quality videos, lower the entry barrier to video production, and contribute to the development of the one-person media industry. do. In the future, we plan to provide a video production environment considering mobile or vertical resolution versions.