• Title/Summary/Keyword: 통신어

Search Result 482, Processing Time 0.029 seconds

Ontology-based Culture·Tourist Attraction Search Application (온톨로지 기반의 문화·관광지 검색 어플리케이션 구현)

  • Hwang, Tae-won;Seo, Jung-hee;Park, Hung-bog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.772-774
    • /
    • 2017
  • Currently, there are many simple searches for local culture and tourism, but systematic information retrieval using ontology technology is weak. The keyword-based search, which is an existing search method, derives a search result that is different from a user's wanted intention. On the other hand, semantic search using ontology constructs shows the information related to the search term by creating a relation between words and words. Therefore, when tourists search for cultural and tourist attractions in the area, they provide information that includes meaning relevance in the search results. If the ontology provides information on the culture, sightseeing area, transportation, Can be more easily grasped. In this paper, we propose an ontology-based retrieval system based on culture and tourist sites utilizing public institutions database by using mobile application by extending search system which relied only on existing internal database to provide accurate and reliable information to users. This efficient structure of the ontology makes it possible to provide information suitable for the user quickly and accurately.

  • PDF

Web Document Analysis based Personal Information Hazard Classification System (웹 문서 분석 기반 개인정보 위험도 분류 시스템)

  • Lee, Hyoungseon;Lim, Jaedon;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.69-74
    • /
    • 2018
  • Recently, personal information leakage has caused phishing and spam. Previously developed systems focus on preventing personal information leakage. Therefore, there is a problem that the leakage of personal information can not be discriminated if there is already leaked personal information. In this paper, we propose a personal information hazard classification system based on web document analysis that calculates the hazard. The system collects web documents from the Twitter server and checks whether there are any user-entered search terms in the web documents. And we calculate the hazard classification weighting of the personal information leaked in the web documents and confirm the authority of the Twitter account that distributed the personal information. Based on this, the hazard can be derived and the user can be informed of the leakage of personal information of the web document.

Reduction of Dynamic False Contours based on Gray Level Selection method in PDP (계조 수 감소를 이용한 PDP내에서 의사 윤곽 제거 기법)

  • Ahn Sang-Jun;Eo Yoon-Phil;Lee Sang-Uk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7C
    • /
    • pp.716-725
    • /
    • 2005
  • In this paper, we propose a new approach for the reduction of the dynamic false contours, which detects and compensates false contour artifacts adaptively. First, we develop a simple but effective method to select the pixels that are likely to cause the motion artifacts, based on the distribution of pixel values. Then, we merge the selected pixels into several regions using tree structure. Next, we reduce number of gray levels within the regions slightly to reduce the false contours. Note that reducing number of gray levels yield the distortion, thus it is applied only to the selected regions, instead of the whole picture. Intensive simulations on real moving image show that the proposed algorithm alleviates the dynamic false contours effectively with tolerable computational complexity.

New Byzantine Resilient Multi-Path Key Establishment Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 비잔틴 공격에 강인한 새로운 다중 패스 키 설정 방법)

  • Kim, Young-Sik;Jang, Ji-Woong;Lim, Dae-Woon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9C
    • /
    • pp.855-862
    • /
    • 2009
  • The path key establishment phase in the wireless sensor network is vulnerable to Byzantine attack. Huang and Hedhi proposed a Byzantine resilient multi-key establishment scheme using a systematic RS code, which has shortcomings of exposing a part of message symbols and inefficient transmission. In this paper, we propose a new Byzantine resilient multi-path key establishment scheme in which direct message symbols are not exposed to an adversary and are more efficiently transmitted the RS-encoded symbols to the destination node. In the Proposed scheme, a non-systematic RS code is used to transmit a generated indirect secret key and each encoded symbol is relayed through available paths between two sensor nodes. If enough symbols are collected at the destination node, it is possible to reconstruct the secret message through RS decoding.

Image Retrieval for Electronic illustrated Fish Book (전자어류도감을 위한 영상검색)

  • Ahn, Soo-Hong;Oh, Jeong-Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.4C
    • /
    • pp.226-231
    • /
    • 2011
  • To improve the conventional illustrated fish book, this paper introduces the concept of an electronic illustrated fish book which applies IT techniques to the conventional one, and proposes the image retrieval for it. The image retrieval is a core technology of the electronic illustrated fish book and make it overwhelm the conventional one. Since fishes, even if the same kind, have different features in shape, color, and texture and the same fish can even have different features by its pose or environment at that time for taking a picture, the conventional image retrieval, that uses simple features in shape, color, and texture, is not suitable for the electronic illustrated fish book. The proposed image retrieval adopts detail shape features extracted from head, body, and tail of a fish and different weights are given to the features depending on their invariability. The simulation results show that the proposed algorithm is far superior to the conventional algorithm.

An Interchannel Interference Self-Cancellation Scheme for the Orthogonal Frequency Division Multiplexing System (직교 주파수분할다중화 시스템을 위한 채널간간섭 자기소거법)

  • Chen, Huijie;Kang, Seog-Geun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.4
    • /
    • pp.729-736
    • /
    • 2018
  • Due to the frequency offset, interchannel interference (ICI) is occurred in the received symbols of the orthogonal frequency division multiplexing (OFDM) systems. The ICI self-cancellation (ICI-SC) technique appropriately adjusts the subchannel signal assignment of the OFDM symbols, thereby canceling the interference caused by other subchannels. The conventional adjacent symbol repetition (ASR) method can reduce the interference caused by remote subchannels. However, it may not mitigate or even increases the ICI produced by some nearest subchannels. To solve the problem, a new ASR based ICI-SC technique is proposed and its performance is analyzed in this paper. Here, a t-parameter obtained by the interference coefficients of 3 successive subchannels is applied. As a result, the proposed method has the same capability to reduce the influence of remote subchannels. However, it can reduce the ICI caused by the nearest subchannels significantly.

A Cooperative Hybrid ARQ Scheme with Adaptive Retransmission (적응 재전송을 적용한 협력 하이브리드 ARQ 기법)

  • Kang, Seong-Kyo;Wang, Jin-Soo;Kim, Yun-Hee;Song, Iick-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3A
    • /
    • pp.213-220
    • /
    • 2009
  • Cooperative diversity is a promising technique for range extension and diversity increase without the use of multiple transmit antennas at the user equipment. In this paper, we propose a cooperative hybrid automatic repeat request relay method with adaptive retransmission to increase the throughput when the SNR of a source user is low. In the proposed method, the source user transmits the first segment of a codeword to relay users and a base station. If the base station fails to recover the information from the received packet, it requests the source or some relay users to retransmit the packet previously sent. In addition, the retransmission type of a selected user is chosen from repetition or incremental redundancy according to the quality of systematic bits in a turbo codeword. Simulation results show that the proposed method improves the throughput compared to conventional methods, and the improvement is significant when the source user has a low SNR.

Automatic Meeting Summary System using Enhanced TextRank Algorithm (향상된 TextRank 알고리즘을 이용한 자동 회의록 생성 시스템)

  • Bae, Young-Jun;Jang, Ho-Taek;Hong, Tae-Won;Lee, Hae-Yeoun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.5
    • /
    • pp.467-474
    • /
    • 2018
  • To organize and document the contents of meetings and discussions is very important in various tasks. However, in the past, people had to manually organize the contents themselves. In this paper, we describe the development of a system that generates the meeting minutes automatically using the TextRank algorithm. The proposed system records all the utterances of the speaker in real time and calculates the similarity based on the appearance frequency of the sentences. Then, to create the meeting minutes, it extracts important words or phrases through a non-supervised learning algorithm for finding the relation between the sentences in the document data. Especially, we improved the performance by introducing the keyword weighting technique for the TextRank algorithm which reconfigured the PageRank algorithm to fit words and sentences.

Design of DatawareHouse Real-Time Cleansing System using XMDR (XMDR을 이용한 데이터웨어하우스 실시간 데이터 정제 시스템 설계)

  • Song, Hong-Youl;Jung, Kye-Dong;Choi, Young-Keum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1861-1867
    • /
    • 2010
  • A datawarehouse is generally used in organizations for decision and policy making. And In a distribute environment when a new system is added, there needs considerable amount of time and cost due to the difference between the systems. Therefore, to solve this matter. Firstly, heterogeneous data structures can be handled by creating abstract queries according to the standard schema and by separating the queries using XMDR. Secondly, metadata dictionary which defines synonyms of metadata and methods for data expression is used to overcome difference of definition and expression of data. Especially, work presented in this thesis provides standardized information for data integration and minimizing the effects of integration on local systems in discrete environments using XMDR to create information of data warehouse in realtime.

An Insight Study on Keyword of IoT Utilizing Big Data Analysis (빅데이터 분석을 활용한 사물인터넷 키워드에 관한 조망)

  • Nam, Soo-Tai;Kim, Do-Goan;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.146-147
    • /
    • 2017
  • Big data analysis is a technique for effectively analyzing unstructured data such as the Internet, social network services, web documents generated in the mobile environment, e-mail, and social data, as well as well formed structured data in a database. The most big data analysis techniques are data mining, machine learning, natural language processing, and pattern recognition, which were used in existing statistics and computer science. Global research institutes have identified analysis of big data as the most noteworthy new technology since 2011. Therefore, companies in most industries are making efforts to create new value through the application of big data. In this study, we analyzed using the Social Matrics which a big data analysis tool of Daum communications. We analyzed public perceptions of "Internet of things" keyword, one month as of october 8, 2017. The results of the big data analysis are as follows. First, the 1st related search keyword of the keyword of the "Internet of things" has been found to be technology (995). This study suggests theoretical implications based on the results.

  • PDF