• Title/Summary/Keyword: Entity-based

Search Result 755, Processing Time 0.03 seconds

A Study on Modeling of Bibliographic Framework Based on FRBR for Television Program Materials (방송영상자료의 FRBR기반 서지구조모형에 관한 연구)

  • Chung, Jin-Gyoo
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.41 no.1
    • /
    • pp.185-214
    • /
    • 2007
  • This study intends to design the bibliographic framework based on IFLA-FRBR model for television program materials and to evaluate this in terms of effectiveness of retrieval and usability of the system. The FRBR model supplies mote suitable bibliographic framework of audio-visual material which has a sufficient hierarchical relations and relative bibliographical records. The followings are research methods designed by this study; (1) The experimental metadata system named it FbCS based on FRBR was developed by using the entity-related database and composed of multi-layed and hierarchy. FbCS is developed through benchmarking of a case study for iMMix model in Netherlands based on FRBR. (2) To evaluate effectiveness of retrieval and usability of FbCS, this study made a experiment and survey by user groups of professionals.

A Study on the Tolerance Modeler for Feature-based CAPP (특징형상에 기반한 자동공정설계용 공차 모델러 연구)

  • Kim, Jae-Gwan;No, Hyeong-Min;Lee, Su-Hong
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.26 no.1
    • /
    • pp.48-54
    • /
    • 2002
  • A part definition must not only provide shape information of a nominal part but also contain non-shape information such as tolerances, surface roughness and material specifications. Although machining features are useful for suitable shape information fur process reasoning in CAPP, they need to be integrated with tolerance information for effective process planning. We develop a tolerance modeler that efficiently integrates the machining features with the tolerance information fur feature-based CAPP. It is based on the association of machining features, tolerance features, and tolerances. The tolerance features in this study, where tolerances are assigned, are classified into two types; one type is a face that is a topological entity on a solid model and the other type is a functional geometry that is not referenced to topological entities. The (unctional geometry is represented by using machining features. All the data fur representing the tolerance information are stored completely and unambiguously in an independent tolerance data structure. The developed tolerance modeler is implemented as a module of a comprehensive feature-based CAPP system.

Plagiarism Detection among Source Codes using Adaptive Methods

  • Lee, Yun-Jung;Lim, Jin-Su;Ji, Jeong-Hoon;Cho, Hwaun-Gue;Woo, Gyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1627-1648
    • /
    • 2012
  • We propose an adaptive method for detecting plagiarized pairs from a large set of source code. This method is adaptive in that it uses an adaptive algorithm and it provides an adaptive threshold for determining plagiarism. Conventional algorithms are based on greedy string tiling or on local alignments of two code strings. However, most of them are not adaptive; they do not consider the characteristics of the program set, thereby causing a problem for a program set in which all the programs are inherently similar. We propose adaptive local alignment-a variant of local alignment that uses an adaptive similarity matrix. Each entry of this matrix is the logarithm of the probabilities of the keywords based on their frequency in a given program set. We also propose an adaptive threshold based on the local outlier factor (LOF), which represents the likelihood of an entity being an outlier. Experimental results indicate that our method is more sensitive than JPlag, which uses greedy string tiling for detecting plagiarism-suspected code pairs. Further, the adaptive threshold based on the LOF is shown to be effective, and the detection performance shows high sensitivity with negligible loss of specificity, compared with that using a fixed threshold.

Success Factors of Internet-based Business in the Start-up Phase (창업단계의 인터넷 비즈니스 성공요인에 관한 탐색적 연구)

  • 김승운
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.4
    • /
    • pp.65-84
    • /
    • 2003
  • The Purpose of this study is to Identify and analyze the factors that determine the survival or success of internet-based companies in the start-up phase. The reason why we focus on companies which are in the early stage of development is because internet business is still at its early stage, and statistics indicate that many internet businesses have failed during the start-up phase. Using the model of new product outcomes proposed by Cooper(1979), we have formulated a conceptual model for more successful internet business ventures. On the basis of this model, the relationship between the financial and non-financial performance and various variables in the model is analyzed. For collecting empirical data, a web-based survey questionnaire was designed. A total of 97 usable questionnaires were gathered from internet companies nationwide. The results showed that controllable variables such as the commercial entity and information acquired during the new business process are related to the non-financial performance, while environment variables such as the compatibility of the resource base of the firm with the business, including a few controllable variables, are related to the financial performance. Future research needs to explore more precisely how the success factors are different according to the types of internet businesses and/or the stages of growth of the business.

  • PDF

Framework of Security Development Method based on Component (컴포넌트기반 보안개발방법의 프레임워크)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.926-930
    • /
    • 2010
  • This paper is about a development framework, which is required to develop of security system is based on component. With applying of SDLC(system development life cycle) of information system, the application of information security products DLC is required at this point of time. In this paper, we review NIST requirement specification of development method, requirement criteria of SDLC in each stage, and major security guidelines of risk assessment. Also we are reviewed major security element of SDLC, and to aid understanding of security framework based on component, present the relationship fo security design and DFD in respect of spoofing for the outside entity based on threat tree STRIDE.

A Study on Appraisal in Electronic Records Environment (전자기록 환경에서의 평가에 관한 연구)

  • Kim, Myoung-hun
    • The Korean Journal of Archival Studies
    • /
    • no.11
    • /
    • pp.91-122
    • /
    • 2005
  • Appraisal is a basic archival function that analyzes values of records and determines the eventual disposal of records based upon their archival values. In electronic records environment, however, appraisal is different from traditional appraisal system that mainly is based on paper records. Since electronic records don't have physical entity and strongly depend on computer technologies, archivists fall into various dilemma in appraisal of electronic records. Moreover, because creation environment of electronic records is remarkably complex and diversified, appraisal of electronic records cannot be done until the later stages of the life cycle of the records. In Korea, appraisal system is founded on the Tables of Transaction for Records Scheduling through which disposal activities of all records are definite in a concrete form. However, there are little institutional infrastructures associated with appraisal of electronic records. Therefore this paper will intend to analyze characteristic features about appraisal of electronic records as a preliminary study for establishing appraisal system of electronic records in Korea. For this purpose, I have firstly compared creation environment of electronic records with traditional creation environment mainly based on paper records, and analyzed differences between appraisal of electronic records and traditional appraisal system based on paper records in view of recordness of electronic record. then I have examined functional appraisal that focuses on functions and activities in which the records are created and used, and discussed about main issues in relation to establishing appraisal system of electronic records.

Phenotype of Chronic Obstructive Pulmonary Disease Based on Computed Tomography-Defined Underlying Pathology

  • Kim, Won-Dong
    • Tuberculosis and Respiratory Diseases
    • /
    • v.85 no.4
    • /
    • pp.302-312
    • /
    • 2022
  • Chronic obstructive pulmonary disease (COPD) is a complex and heterogeneous disease. Not all patients with COPD respond to available drugs. Identifying respondents to therapy is critical to delivering the most appropriate treatment and avoiding unnecessary medication. Recognition of individual patients' dominant characteristics by phenotype is a useful tool to better understand their disease and tailor treatment accordingly. To look for a suitable phenotype, it is important to understand what makes COPD complex and heterogeneous. The pathology of COPD includes small airway disease and/or emphysema. Thus, COPD is not a single disease entity. In addition, there are two types (panlobular and centrilobular) of emphysema in COPD. The coexistence of different pathological subtypes could be the reason for the complexity and heterogeneity of COPD. Thus, it is necessary to look for the phenotype based on the difference in the underlying pathology. Review of the literature has shown that clinical manifestation and therapeutic response to pharmacological therapy are different depending on the presence of computed tomography-defined airway wall thickening in COPD patients. Defining the phenotype of COPD based on the underlying pathology is encouraging as most clinical manifestations can be distinguished by the presence of increased airway wall thickness. Pharmacological therapy has shown significant effect on COPD with airway wall thickening. However, it has limited use in COPD without an airway disease. The phenotype of COPD based on the underlying pathology can be a useful tool to better understand the disease and adjust treatment accordingly.

Automatic Target Recognition Study using Knowledge Graph and Deep Learning Models for Text and Image data (지식 그래프와 딥러닝 모델 기반 텍스트와 이미지 데이터를 활용한 자동 표적 인식 방법 연구)

  • Kim, Jongmo;Lee, Jeongbin;Jeon, Hocheol;Sohn, Mye
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.145-154
    • /
    • 2022
  • Automatic Target Recognition (ATR) technology is emerging as a core technology of Future Combat Systems (FCS). Conventional ATR is performed based on IMINT (image information) collected from the SAR sensor, and various image-based deep learning models are used. However, with the development of IT and sensing technology, even though data/information related to ATR is expanding to HUMINT (human information) and SIGINT (signal information), ATR still contains image oriented IMINT data only is being used. In complex and diversified battlefield situations, it is difficult to guarantee high-level ATR accuracy and generalization performance with image data alone. Therefore, we propose a knowledge graph-based ATR method that can utilize image and text data simultaneously in this paper. The main idea of the knowledge graph and deep model-based ATR method is to convert the ATR image and text into graphs according to the characteristics of each data, align it to the knowledge graph, and connect the heterogeneous ATR data through the knowledge graph. In order to convert the ATR image into a graph, an object-tag graph consisting of object tags as nodes is generated from the image by using the pre-trained image object recognition model and the vocabulary of the knowledge graph. On the other hand, the ATR text uses the pre-trained language model, TF-IDF, co-occurrence word graph, and the vocabulary of knowledge graph to generate a word graph composed of nodes with key vocabulary for the ATR. The generated two types of graphs are connected to the knowledge graph using the entity alignment model for improvement of the ATR performance from images and texts. To prove the superiority of the proposed method, 227 documents from web documents and 61,714 RDF triples from dbpedia were collected, and comparison experiments were performed on precision, recall, and f1-score in a perspective of the entity alignment..

Application Design and Execution Framework in Role-Based Access Control Systems (역할기반 접근통제 시스템에서 응용 프로그램의 설계 및 시행지원 프레임워크)

  • Lee, Hyeong-Hyo;Choe, Eun-Bok;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.3020-3033
    • /
    • 1999
  • Role-Based Access Control(RBAC) security policy is being widely accepted not only as an access control policy for information security but as both a natural modeling tool for management structure of organizations and flexible permission management framework in various commercial environments. Important functions provided by the current RBAC model are to administrate the information on the components of RBAC model and determine whether user's access request to information is granted or not, and most researches on RBAC are for defining the model itself, describing it in formal method and other important properties such as separation of duty. As the current RBAC model which does not define the definition, design and operation for applications is not suitable for automated information systems that consist of various applications, it is needed that how applications should be designed and then executed based on RBAC security model. In this paper, we describe dynamic properties of session which is taken for a passive entity only activated by users, as a vehicle for building and executing applications in an automated information systems. And, a framework for session-oriented separation of duty property, application design and operation is also presented.

  • PDF

Contents-based Image Retrieval Using Color & Edge Information (칼라와 에지 정보를 이용한 내용기반 영상 검색)

  • Park, Dong-Won;An, Syungog;Ma, Ming;Singh, Kulwinder
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.1
    • /
    • pp.81-91
    • /
    • 2005
  • In this paper we present a novel approach for image retrieval using color and edge information. We take into account the HSI(Hue, Saturation and Intensity) color space instead of RGB space, which emphasizes more on visual perception. In our system colors in an image are clustered into a small number of representative colors. The color feature descriptor consists of the representative colors and their percentages in the image. An improved cumulative color histogram distance measure is defined for this descriptor. And also, we have developed an efficient edge detection technique as an optional feature to our retrieval system in order to surmount the weakness of color feature. During the query processing, both the features (color, edge information) could be integrated for image retrieval as well as a standalone entity, by specifying it in a certain proportion. The content-based retrieval system is tested to be effective in terms of retrieval and scalability through experimental results and precision-recall analysis.

  • PDF