• Title/Summary/Keyword: 전화번호

Search Result 269, Processing Time 0.021 seconds

A Point-Of-Interest Allomorph Database Construction System (POI 이형태 데이타베이스 구축 시스템)

  • Yang, Seung-Weon;Lee, Hyun-Young;Wang, Ji-Hyun
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.3
    • /
    • pp.226-235
    • /
    • 2009
  • People use various information for searching POI in the navigation system such as name, category, address, phone number. Most of users use name and category to search their POT. They don't know exact name in POI DB provided by Maker. They use abbreviated or generalized name as key word for searching POI. Because of these reasons, the hit ratio has been very low. In this paper, We suggest a extra DB_construction system for raising the hit ratio. It generates allomorphes DB link to the POI name in original DB. We classified the POI names in original DB into seven types of allomorph by analyzing the gathered patterns from the POI DB which has over 650,000 entries. For auto_generating the allomorphes, we made 577 rules based on the classified types. And we generated the allomorphes manually for the entries which are difficult to make the rule and has low frequency The generated allomorphes account for 35.8% of all original DB. The hit ratio is 89% under suggested system.

An Analysis on the Status of Inappropriate Material Posting and Personal Information Exposure in Elementary Schools' Web Sites (초등학교 홈페이지에서의 불건전 정보 유통 및 개인정보 노출 실태 분석)

  • Kim, Min-Ki
    • Journal of The Korean Association of Information Education
    • /
    • v.8 no.4
    • /
    • pp.489-500
    • /
    • 2004
  • In this paper, an investigation on internet safety of 244 national or public elementary schools' web sites was performed with two points of view : inappropriate material posting and personal information exposure. The investigation results showed that obscene materials and commercial advertisements were uploaded into the bulletin board(67.2%) and students' personal information such as photograph, address, telephone number were exposed(87.3%). Most of the inappropriate materials were posted by auto-register programs. This problem was occurred due to reckless bulletin board opening and inappropriate management. On the contrary, personal information was exposed by teachers and students. They didn't not care about their personal information. It shows the fact that they have not recognized the danger of personal information exposure. Therefore managing real-name membership and enforcing permission to bulletin board were required to construct and use a safe school web site. Teachers have to understand not only negative effects appeared in a school web site but also latent dangerous factors.

  • PDF

Memory Management Model Using Combined ART and Fuzzy Logic (ART와 퍼지를 이용한 메모리 관리 모델)

  • Kim, Joo-Hoon;Kim, Seong-Joo;Choi, Woo-Kyung;Kim, Jong-Soo;Jeon, Hong-Tae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.7
    • /
    • pp.920-926
    • /
    • 2004
  • The human being receives a new information from outside and the information shows gradual oblivion with time. But the information remains in memory and isn't forgotten for a long time if the information is read several times over. For example, we assume that we memorize a telephone number when we listen and never remind we may forget it soon, but we commit to memory long time by repeating. If the human being received new information with strong stimulus, it could remain in memory without recalling repeatedly. The moments of almost losing one's life in an accident or getting a stroke of luck are rarely forgiven. The human being can keep memory for a long time in spite of the limit of memory for the mechanism mentioned above. In this paper, we propose a model to explain the mechanism mentioned above using a neural network and fuzzy.

Knowledge Graph-based Korean New Words Detection Mechanism for Spam Filtering (스팸 필터링을 위한 지식 그래프 기반의 신조어 감지 매커니즘)

  • Kim, Ji-hye;Jeong, Ok-ran
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.79-85
    • /
    • 2020
  • Today, to block spam texts on smartphone, a simple string comparison between text messages and spam keywords or a blocking spam phone numbers is used. As results, spam text is sent in a gradually hanged way to prevent if from being automatically blocked. In particular, for words included in spam keywords, spam texts are sent to abnormal words using special characters, Chinese characters, and whitespace to prevent them from being detected by simple string match. There is a limit that traditional spam filtering methods can't block these spam texts well. Therefore, new technologies are needed to respond to changing spam text messages. In this paper, we propose a knowledge graph-based new words detection mechanism that can detect new words frequently used in spam texts and respond to changing spam texts. Also, we show experimental results of the performance when detected Korean new words are applied to the Naive Bayes algorithm.

Design and Implementation of the English Education Testing System Interface Based on VoiceXML (VoiceXML 기반 영어 교육 평가 시스템 설계 및 구현)

  • Jang, Seung Ju
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.6
    • /
    • pp.75-83
    • /
    • 2005
  • In this paper we studied English listening and speaking test part of foreign language using web and VoiceXML-based education testing system, which is irrespective of time and space. The testing system interface based on VoiceXML consists of user registration module, testing module, and testing result module. User registration module registers user's name and ID, password in user database, and when a tester calls for testing, the User listens to the telephone sound supported by vxml scenario. After that, if a tester logs in, the tester is verified, In the VoiceXML-based education testing system, the manager can reduce time and effort for gaining testing result. The tester listens to the voice by scenario supported by VoiceXML markup language using wire/wireless telephone at any time or anywhere and can improve the effect of foreign language studying by valuating in voice directly. verified. In the VoiceXML-based education testing system, the manager can reduce time and effort for gaining testing result. The tester listens to the voice by scenario supported by VoiceXML markup language using wire/wireless telephone at any time or anywhere and can improve the effect of foreign language studying by valuating in voice directly.

  • PDF

Personal Information Exposure on Social Network Service (소셜네트워크서비스 개인정보 노출 실태 분석)

  • Choi, Daeseon;Kim, Seok Hyun;Cho, Jin-Man;Jin, Seung-Hun;Cho, Hyun-Sook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.977-983
    • /
    • 2013
  • This paper presents result of researching personal information exposure of Korean twitter and facebook users. Personally identifiable information such as e-mail and phone numer is exposed in the accounts less than 1%. However there are many cases that a person is identified by non personally identifiable information. For example, 350 thousands accounts are distinguished with other accounts because its name is unique. Using combination of information such as name and high school, we can distinguish 2.97 millions accounts. We also found 170 thousands account pairs that are candidate of one users' own account. Linkability between two accounts in two different domains means that the person is identified. Currently, only personally identifiable information is protected by policy. This paper shows that the policy has limited effects under the circumstances that a person can be identified by non personally identifiable information and the account linking is possible.

Study on the Improvement of Speech Recognizer by Using Time Scale Modification (시간축 변환을 이용한 음성 인식기의 성능 향상에 관한 연구)

  • 이기승
    • The Journal of the Acoustical Society of Korea
    • /
    • v.23 no.6
    • /
    • pp.462-472
    • /
    • 2004
  • In this paper a method for compensating for thp performance degradation or automatic speech recognition (ASR) is proposed. which is mainly caused by speaking rate variation. Before the new method is proposed. quantitative analysis of the performance of an HMM-based ASR system according to speaking rate is first performed. From this analysis, significant performance degradation was often observed in the rapidly speaking speech signals. A quantitative measure is then introduced, which is able to represent speaking rate. Time scale modification (TSM) is employed to compensate the speaking rate difference between input speech signals and training speech signals. Finally, a method for compensating the performance degradation caused by speaking rate variation is proposed, in which TSM is selectively employed according to speaking rate. By the results from the ASR experiments devised for the 10-digits mobile phone number, it is confirmed that the error rate was reduced by 15.5% when the proposed method is applied to the high speaking rate speech signals.

A Case Study of Mixed-Mode Design Incorporated Mobile RDD into Telephone RDD (유·무선 RDD를 결합한 혼합조사설계: 2011 서울시장 보궐선거 예측조사 사례 연구)

  • Lee, Kay-O;Jang, Duk-Hyun;Hong, Young-Taek
    • The Korean Journal of Applied Statistics
    • /
    • v.25 no.1
    • /
    • pp.153-162
    • /
    • 2012
  • We proposed a mixed-mode design with a landline survey and mobile survey as the solution for the problems of election opinion polls by the original telephone survey method, mostly with limited population coverage for young people not living at home and with lower efficiency in selecting valid voters. We numerically verified the applicability of the proposed dual frame survey by analyzing the preliminary opinion poll results of the Seoul mayor by-election of October 26 2011. This research achieved the result that relative standard errors were similar between a mobile RDD sample and landline RDD sample though the variance was bigger in the former. Though the combination of mobile RDD and landline RDD is not found to improve the forecast accuracy, it still is expected to have higher reliability for election polls by expanding the population coverage and compensating the weakness of each survey method.

Profile Management System for Contact Information Privacy in Social Network Service (소셜 네트워크 서비스에서 사용자 연락정보 프라이버시 강화를 위한 개인 프로필 관리 시스템 연구)

  • Youn, Taek-Young;Hong, Do-Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.141-148
    • /
    • 2011
  • Recently, various social network services have been grown. Among them, personal relationships based social network services such as Facebook and Twitter make a remarkable growth of industry. In such services, users' profiles are very important for establishing the relationship between two users. However some information in a user's profile causes the leakage of the user's privacy, and thus we have to deal with the information in the profile. Especially, we have to treat contact information, such as the phone number and the e-mail address, very carefully since an adversary can use the information to violate the user's privacy in real life. In this paper, we propose two profile management systems that can enhance the privacy of users in social network services. We compare our systems with existing profile management techniques in well-known social network services such as Facebook and Twitter, and show that our systems provide enhanced privacy.

Combination Key Generation Scheme Robust to Updates of Personal Information (결합키 생성항목의 갱신에 강건한 결합키 생성 기법)

  • Jang, Hobin;Noh, Geontae;Jeong, Ik Rae;Chun, Ji Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.915-932
    • /
    • 2022
  • According to the Personal Information Protection Act and Pseudonymization Guidelines, the mapping is processed to the hash value of the combination key generation items including Salt value when different combination applicants wish to combine. Example of combination key generation items may include personal information like name, phone number, date of birth, address, and so on. Also, due to the properties of the hash functions, when different applicants store their items in exactly the same form, the combination can proceed without any problems. However, this method is vulnerable to combination in scenarios such as address changing and renaming, which occur due to different database update times of combination applicants. Therefore, we propose a privacy preserving combination key generation scheme robust to updates of items used to generate combination key even in scenarios such as address changing and renaming, based on the thresholds through probabilistic record linkage, and it can contribute to the development of domestic Big Data and Artificial Intelligence business.