• Title/Summary/Keyword: 정보인식 유형

Search Result 757, Processing Time 0.028 seconds

A Study on Visitors' and Managers' Perception to National Park Use and Management Attributes -A Case Study on National Parks in Kangwon Area, Korea- (국립공원에서의 이용 및 관리속성에 대한 탐방객과 관리자의 인식에 관한 연구 -강원도 소재 국립공원을 대상으로-)

  • 유기준;김정민
    • Korean Journal of Environment and Ecology
    • /
    • v.17 no.1
    • /
    • pp.35-43
    • /
    • 2003
  • A purpose of this study was to compare visitors' and managers' perception to park use and management attributes f3r developing the effective park management strategies. The questionnaire surveys with 401 samples in visitor and 67 samples in manager group were employed at three different parks(Chiaksan National Park, Odaesan National Park, and Seolaksan National Park) in Kwangwon area, Korea. As the results from comparing perception, some differences of perception about environment damage, damage types, and causes of damage exist between visitor and manager group. In addition, significant perception differences in some use and management attributes, such as trash problem, natural and cultural resource conditions, touting, sanitation and information facility conditions, were found between both groups.

Analysis of the Activities of Public Libraries for Closing the Information Divide in Korea (국내 공공도서관의 정보격차해소 활동에 대한 분석)

  • Cho, Yong-Wan
    • Journal of Korean Library and Information Science Society
    • /
    • v.38 no.4
    • /
    • pp.167-186
    • /
    • 2007
  • The aim of this study is to explore the activities of public libraries in Korea about information divide issues. To do this, the web sites of 58 public libraries in Korea were investigated. On the basis of analysis, this study concluded that the activities of public libraries did not assist information have-nots, for example, people with disabilities, older adults, immigrants, rural residents and low income brackets and were insufficient to related guidelines of library services.

  • PDF

Implementation of Fall Accident Detection System (낙상사고 감지 시스템 구현)

  • Ju, Eun-Su;Im, Hyo-Gyeong;Lee, Sang-Min;Park, Seong-Ik;Jeon, Chan-Ho;Jung, Young-Seok
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.461-462
    • /
    • 2022
  • 최근 지속적인 출산율의 감소와 평균수명의 증가로 인하여, 대한민국의 초고령 사회는 예상보다 훨씬 빠르게 증가하고 있다. 핵가족 형태가 보편화되며 1인 가구도 함께 늘고 있어서 홀로 사는 노인의 수 역시 증가하는 추세이다. 주거 공간에서 낙상사고와 같은 고령화 안전사고가 많이 발생하고 있다. 혼자 사는 독거노인들의 경우 사고 발생 즉시 대처가 가능한 보호자가 없다는 문제점이 있다. 본 논문에서는 MediaPipe를 이용한 낙상사고 감지 시스템을 개발한다. 먼저, 이 시스템은 MediaPipe를 이용해서 카메라를 통해 실시간으로 수신된 영상에서 사람을 인식하고, 자세 유형 분석을 통해 낙상사고 발생 여부를 판별하여 애플리케이션을 통해 보호자에게 현장 상황을 알려주는 시스템이다. 낙상사고가 발생했다면 보호자용 애플리케이션을 통해 사고 발생 알림 및 현장 사진을 보여준다. 이와 같은 기술을 활용하여 응급상황에 처한 노인을 빠르게 구조하며 독거노인의 생활안전사고 문제를 해결하는 데에 기여하고자 한다.

  • PDF

A Comparative Study on Deep Learning Topology for Event Extraction from Biomedical Literature (생의학 분야 학술 문헌에서의 이벤트 추출을 위한 심층 학습 모델 구조 비교 분석 연구)

  • Kim, Seon-Wu;Yu, Seok Jong;Lee, Min-Ho;Choi, Sung-Pil
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.51 no.4
    • /
    • pp.77-97
    • /
    • 2017
  • A recent sharp increase of the biomedical literature causes researchers to struggle to grasp the current research trends and conduct creative studies based on the previous results. In order to alleviate their difficulties in keeping up with the latest scholarly trends, numerous attempts have been made to develop specialized analytic services that can provide direct, intuitive and formalized scholarly information by using various text mining technologies such as information extraction and event detection. This paper introduces and evaluates total 8 Convolutional Neural Network (CNN) models for extracting biomedical events from academic abstracts by applying various feature utilization approaches. Also, this paper conducts performance comparison evaluation for the proposed models. As a result of the comparison, we confirmed that the Entity-Type-Fully-Connected model, one of the introduced models in the paper, showed the most promising performance (72.09% in F-score) in the event classification task while it achieved a relatively low but comparable result (21.81%) in the entire event extraction process due to the imbalance problem of the training collections and event identify model's low performance.

A Study on Comparison of Subjectivity Structure of Korean and Chinese Consumers: Perception on Advertisements of Automobiles (한.중 소비자의 주관성 구조에 관한 비교 연구: 자동차 광고에 대한 인식을 중심으로)

  • Choi, Won-Joo
    • Korean journal of communication and information
    • /
    • v.38
    • /
    • pp.147-182
    • /
    • 2007
  • This study conducted a comparison analysis on the difference in the subjectivity structure of Korean and Chinese consumers based on their types of perception on advertisements of automobiles which has a high degree of self interest. The primary reason for conducting a comparison study of Korean and Chinese consumers was to concretize the characteristics of Chinese consumers who have enormous potential and rapid growth in the global market. In addition, by comparing the characteristics of Korean and Chinese consumers that changed with differences in social systems and socio-economic characteristics, the purpose was to present an advertising strategy idea that is useful for both countries. Furthermore, when taking into consideration the reality that the world must compete in a single market commonly referred to as the global market, understanding the subjectivity structure of perception of Korean and Chinese consumers is critical in establishing a strategy for occupying the upper position of dominance in such competition. Based on the results of the study, subjectivity structures on the perception of advertisements possessed by Korean and Chinese consumers of the same Asian culture differed but were mutually interrelated. Such results suggest that there is a need for further studies of generalization and objectification through a quantitative approach.

  • PDF

Rule-based Speech Recognition Error Correction for Mobile Environment (모바일 환경을 고려한 규칙기반 음성인식 오류교정)

  • Kim, Jin-Hyung;Park, So-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.10
    • /
    • pp.25-33
    • /
    • 2012
  • In this paper, we propose a rule-based model to correct errors in a speech recognition result in the mobile device environment. The proposed model considers the mobile device environment with limited resources such as processing time and memory, as follows. In order to minimize the error correction processing time, the proposed model removes some processing steps such as morphological analysis and the composition and decomposition of syllable. Also, the proposed model utilizes the longest match rule selection method to generate one error correction candidate per point, assumed that an error occurs. For the purpose of deploying memory resource, the proposed model uses neither the Eojeol dictionary nor the morphological analyzer, and stores a combined rule list without any classification. Considering the modification and maintenance of the proposed model, the error correction rules are automatically extracted from a training corpus. Experimental results show that the proposed model improves 5.27% on the precision and 5.60% on the recall based on Eojoel unit for the speech recognition result.

A Variable-Slotted Tree Based Anti-Collision Algorithm Using Bit Change Sensing in RFID Systems (RFID 시스템에서 비트 변화 감지를 이용한 가변 슬롯 트리 기반 충돌 방지 알고리즘)

  • Kim, Won-Tae;Ahn, Kwang-Seon;Lee, Seong-Joon
    • The KIPS Transactions:PartA
    • /
    • v.16A no.4
    • /
    • pp.289-298
    • /
    • 2009
  • Generally, RFID systems are composed of one reader and several passive tags, and share the single wireless channel. For this reason, collisions occurwhen more than two tags simultaneously respond to the reader's inquiry. To achieve this problem, many papers, such as QT[8], HCT[10], BSCTTA[2], and QT-BCS[9], have been proposed. In this paper, we propose the tree-based anti-collision algorithm using a bit change sensing unit (TABCS) based on BSCTTA algorithm. The proposed algorithm can identify bits returned from tags through bit change sensing unit, even if multi collisions occur. So, it rapidly generates the unique prefix to indentify each tag, and reduce the total of bits. As the result, the cost of identifying all tag IDs is relatively reduced as compared with existing algorithms. It is verified through simulations that the proposed algorithm surpass other existing algorithms.

Machine-printed Numeral Recognition using Weighted Template Matching with Chain Code Trimming (체인 코드 트리밍과 가중 원형 정합을 이용한 인쇄체 숫자 인식)

  • Jung, Min-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.4
    • /
    • pp.35-44
    • /
    • 2007
  • This paper proposes a new method of weighted template matching for machine-printed numeral recognition. The proposed weighted template matching, which emphasizes the feature of a pattern using adaptive Hamming distance on local feature areas, improves the recognition rate while template matching processes an input image as one global feature. Template matching is vulnerable to random noises that generate ragged outlines of a pattern when it is binarized. This paper offers a method of chain code trimming in order to remove ragged outlines. The method corrects specific chain codes within the chain codes of the inner and the outer contour of a pattern. The experiment compares confusion matrices of both the template matching and the proposed weighted template matching with chain code trimming. The result shows that the proposed method improves fairly the recognition rate of the machine-printed numerals.

  • PDF

Design of Intelligent Intrusion Context-aware Inference System for Active Detection and Response (능동적 탐지 대응을 위한 지능적 침입 상황 인식 추론 시스템 설계)

  • Hwang, Yoon-Cheol;Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.4
    • /
    • pp.126-132
    • /
    • 2022
  • At present, due to the rapid spread of smartphones and activation of IoT, malicious codes are disseminated using SNS, or intelligent intrusions such as intelligent APT and ransomware are in progress. The damage caused by the intelligent intrusion is also becoming more consequential, threatening, and emergent than the previous intrusion. Therefore, in this paper, we propose an intelligent intrusion situation-aware reasoning system to detect transgression behavior made by such intelligent malicious code. The proposed system was used to detect and respond to various intelligent intrusions at an early stage. The anticipated system is composed of an event monitor, event manager, situation manager, response manager, and database, and through close interaction between each component, it identifies the previously recognized intrusive behavior and learns about the new invasive activities. It was detected through the function to improve the performance of the inference device. In addition, it was found that the proposed system detects and responds to intelligent intrusions through the state of detecting ransomware, which is an intelligent intrusion type.

Social Response to Self-Disclosure of Agents: Context-Awareness and Building Positive Social Relationship (에이전트의 자기노출에 대한 사용자의 사회적 반응: 컨텍스트 인식과 긍정적인 사회적 관계 형성)

  • Park, Joo-Yeon;Lee, Jeong-Eun;Yoon, Young-Chul
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.110-117
    • /
    • 2006
  • 컴퓨터가 우리의 일상적 환경으로 스며드는 유비쿼터스 컴퓨팅 환경에서의 인터페이스는 '컨텍스트 인식'과 더불어 이용자들과의 '긍정적인 사회적 관계'를 형성할 수 있어야 한다. 본 연구에서는 이 두 가지의 관점을 충족시킬 수 있는 인터페이스 에이전트의 유형으로 '자기를 노출하는 에이전트'를 제안하고, 에이전트의 자기노출에 대한 사용자의 사회적 반응을 측정하였다. 실험 결과, 1) 에이전트로부터 친밀성이 높은 노출을 받은 피험자들은 더 깊은 자기노출을, 많은 양의 자기노출을 받은 피험자들은 더 많은 양의 자기노출을 하였다. 2) 에이전트 자기노출의 깊이가 깊을수록 에이전트에 대한 호감과 신뢰는 감소하였다. 3) 피험자들은 처음 만난 자리에서 극히 개인적인 노출을 하는 에이전트보다는 일반적인 노출을 하는 에이전트와 장기적으로 더 친밀해질 것이라고 예측하였다. 이러한 결과는 컨텍스트를 인식하는 인터페이스 에이전트로 자기노출 에이전트를 이용할 경우 사용자의 심리적 구조를 파악하는데 효과적임을 보여주며, 단기적인 사용자 정보의 추출보다는 장기적 관점에서 호감과 신뢰를 쌓을 수 있는 이용자와 에이전트의 사회적 관계 달성이 우선적으로 고려되어야 함을 시사한다.

  • PDF