• Title/Summary/Keyword: Internet Use

Search Result 6,016, Processing Time 0.034 seconds

The Influence and Impact of syntactic-grammatical knowledge on the Phonetic Outputs of a 'Reading Machine' (통사문법적 지식이 '독서기계'의 음성출력에 미치는 영향과 중요성)

  • Hong, Sungshim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.225-230
    • /
    • 2020
  • This paper highlights the influence and the importance of the syntactic-grammatical knowledge on "the reading machine", appeared in Jackendoff (1999). Due to the lack of the detailed testing and implementation in his research, this paper tests an extensive data array using a component of Google Translate, currently available freely and most widely on the internet. Although outdated, Jackendoff's paper, "Why can't Computers use English?", argues that syntactic-grammatical knowledge plays a key role in the outputs of computers and computer-based reading machines. The current research has implemented some testings of his thought-provoking examples, in order to find out whether Google Translate can handle the same problems after two decades or so. As a result, it is argued that in the field of NLP, I-language in the sense of Chomsky (1986, 1995 etc) is real and the syntactic, grammatical, and categorial knowledge is essential in the faculty of language. Therefore, it is reassured in this paper that when it comes to human language, even the most advanced "machine" is still no match for human faculty of language, the syntactic-grammatical knowledge.

The Locational Characteristics of Cultural Sites Found in South Korea (남한에 분포하는 유적의 분포 특성)

  • Lee, Jin-Young;Hong, Sei-Sun;Yang, Dong-Yoon;Kim, Ju-Yong
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.14 no.2
    • /
    • pp.14-27
    • /
    • 2011
  • Cultural remains distribution maps have been published in 172 volumes of books, and the information about the remains in South Korea is also disclosed via the Internet to those who are interested in conducting archeological examinations or to those who are planning the national land use for various purposes. The purpose of this study is to statistically review the locational characteristics of the sites appearing in cultural sites map, and to determine the locational characteristics of these remains or sites. The location of sites was statistically analyzed based on the point density function of geographic information system of 87,859 sites found in cultural site maps. The results of this study show that the sites found in South Korea are mainly distributed around historical cities and the distributions are closely related to their proximity to rivers. Given that the period of time and type is very important to archeological studies, the results of this study indicate that detailed period of time and type may be necessary for further analysis. This study has highlighted that the research into the spatial analysis and interpretation of cultural heritage sites can contribute to the field of archeological studies.

Restoration of an Edentulous Patient with CAD/CAM Guided Implant Surgery ($NobelGuide^{TM}$) and Immediate Loading: Case Report (무치악 환자에서 CAD/CAM을 이용한 임플란트 식립($NobelGuide^{TM}$) 및 즉시하중 증례)

  • Ko, Kyoung-Ho;Lim, Kwang-Gil;Kim, Dae-Gon;Park, Chan-Jin;Cho, Lee-Ra
    • Journal of Dental Rehabilitation and Applied Science
    • /
    • v.27 no.2
    • /
    • pp.233-245
    • /
    • 2011
  • With the use of computed tomography (CT), computer-aided design/computer-assisted machining (CAD/CAM) technology and internet, the implant dentistry has been evolved. The surgical templates made by CAD/CAM technology and precise installation of implants, permit restorations to be inserted immediately after implants have been placed. The advantages of CAD/CAM guided implant procedures are flapless, minimally invasive surgery and shorter surgery time. With this technique, less postoperative morbidity and delivery of prosthesis for immediate function would be possible. A patient with an edentulous maxilla and mandible received 7 implants in mandible using CAD/CAM surgical templates. Prefabricated provisional fixed prostheses were connected immediately after implant installation. Provisional prostheses were evaluated for aesthetics and function during 6 months. Definitive prostheses were fabricated. At 6 months recall appointment, patient's occlusion was slightly changed. To prevent additional adverse effect, regular check-up and occlusal adjustment would be needed.

An Analysis of Factors Influencing the Intention to Use Social Network Services (소셜 네트워크 서비스의 사용의도에 영향을 미치는 요인)

  • Kim, Jongki;Kim, Jinsung
    • Informatization Policy
    • /
    • v.18 no.3
    • /
    • pp.25-49
    • /
    • 2011
  • As a way to gather diverse information required for everyday living, the importance of social networks has been growing. Social network services have been spreading rapidly because of diffusion of the Internet, evolution of social network sites, and recognition of the importance of social networks. Recently, the social network service has been evolved based on a new paradigm, Web 2.0, pursuing participation and openness. Following the adoption of Web 2.0 technologies, the social network service allows users to make and maintain new relationships in a more convenient way. Users of the social network service tend to reveal their personal information, and share their ideas and content with other people; in the process they become aware of their existence, feel satisfaction with life and exert influence to others as a member of the society. This study uses higher order factor analysis to analyze factors that affect the intention of using the social network service. A research model was developed with second-order factors including perceived social presence, perceived gratification and perceived social influence. First-order factors are grouped by technical, individual and social factors. Smart PLS 2.0 was used to conduct empirical analysis. The analysis results supported the validity of the research model.

  • PDF

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

Maximizing Bandwidth Utilization by Sharing Method of SSID Hiding in Multiple Wireless Routers (다중 무선 공유기에서 SSID Hiding 공유 기법을 이용한 대역폭 이용률 극대화)

  • Yoon, Young-Hyo;Kim, Myung-Won;Kwak, Hu-Keun;Chung, Kyu-Sik
    • The KIPS Transactions:PartC
    • /
    • v.15C no.2
    • /
    • pp.111-118
    • /
    • 2008
  • A wireless router is a device which allows several wireless clients to share an internet line using NAT (Network Address Translation). In a school or a small office environment where many clients use multiple wireless routers, a client may select any one of wireless routers so that most clients can be clustered to a small set of the wireless routers. In such a case, there exists load unbalancing problem between clients and wireless routers. One of its result is that clients using the busiest router get poor service. The other is that the resource utilization of the whole wireless routers becomes very low. In order to resolve the problems, we propose a load sharing scheme to maximize network bandwidth utilization based on SSID(Service Set IDentifier) hiding. The proposed scheme keeps checking the available bandwidth of all the possible wireless routers in a time interval and select the most available one. If a new client appears, the most available router is visible to him or her whereas the others are not visible. This is handled by SSID hiding in the proposed scheme. We implemented the proposed scheme with ASUS WL 500G wireless router and performed experiments. Experimental results show the bandwidth utilization improvement compared to the existing method.

Digital Video Source Identification Using Sensor Pattern Noise with Morphology Filtering (모폴로지 필터링 기반 센서 패턴 노이즈를 이용한 디지털 동영상 획득 장치 판별 기술)

  • Lee, Sang-Hyeong;Kim, Dong-Hyun;Oh, Tae-Woo;Kim, Ki-Bom;Lee, Hae-Yeoun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.1
    • /
    • pp.15-22
    • /
    • 2017
  • With the advance of Internet Technology, various social network services are created and used by users. Especially, the use of smart devices makes that multimedia contents can be used and distributed on social network services. However, since the crime rate also is increased by users with illegal purposes, there are needs to protect contents and block illegal usage of contents with multimedia forensics. In this paper, we propose a multimedia forensic technique which is identifying the video source. First, the scheme to acquire the sensor pattern noise (SPN) using morphology filtering is presented, which comes from the imperfection of photon detector. Using this scheme, the SPN of reference videos from the reference device is estimated and the SPN of an unknown video is estimated. Then, the similarity between two SPNs is measured to identify whether the unknown video is acquired using the reference device. For the performance analysis of the proposed technique, 30 devices including DSLR camera, compact camera, camcorder, action cam and smart phone are tested and quantitatively analyzed. Based on the results, the proposed technique can achieve the 96% accuracy in identification.

A RSU-Aided Resource Search and Cloud Construction Mechanism in VANETs (차량 네트워크에서 RSU를 이용한 리소스 검색 및 클라우드 구축 방안)

  • Lee, Yoonhyeong;Lee, Euisin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.3
    • /
    • pp.67-76
    • /
    • 2020
  • With the fast development in wireless communications and vehicular technologies, vehicular ad hoc networks (VANETs) have enabled to deliver data between vehicles. Recently, VANETs introduce a Vehicular Cloud (VC) model for collaborating to share and use resources of vehicles to create value-added services. To construct a VC, a vehicle should search vehicles that intend to provide their own resource. The single-hop search cannot search enough provider vehicles due to a small coverage and non-line-of-sights of communications. On the other hand, the multi-hop search causes very high traffics for large coverage searching and frequent connection breakages. Recently, many Roadside Units (RSUs) have been deployed on roads to collect the information of vehicles in their own coverages and to connect them to Internet. Thus, we propose a RSU-aided vehicular resource search and cloud construction mechanism in VANETS. In the proposed mechanism, a RSU collects the information of location and mobility of vehicles and selects provider vehicles enabled to provide resources needed for constructing a VC of a requester vehicle based on the collected information. In the proposed mechanism, the criteria for determining provider vehicles to provide resources are the connection duration between each candidate vehicle and the requester vehicle, the resource size of each candidate vehicle, and its connection starting time to the requester vehicle. Simulation results verify that the proposed mechanism achieves better performance than the existing mechanism.

The Design and Implementation of the System for Processing Well-Formed XML Document on the Client-side (클라이언트 상의 Well-Formed XML 문서 처리 시스템의 설계 및 구현)

  • Song, Jong-Chul;Moon, Byung-Joo;Hong, Gi-Chai;Cheong, Hyun-Soo;Kim, Gyu-Tae;Lee, Soo-Youn
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3236-3246
    • /
    • 2000
  • XML is a meta-language as SGML and also can be xonsructed as an Internet versionof simplified SGML being used in confunction with XLL. Xpointer and XSL. Also W3C established DTDless Well-Formed XML document to use XML document on the Web. But it isnt offered system that consists of browsing, link and DTD generating facihty, and efficiently processes DTDless Well-Formed XML document. This paper studies on an implementation and design of system to process DTDless Well-Formed XML document on the client-side. This system consists of Well-Formed XML viewer displaying Well-Formed XML documet, XLL Processor processing Xll and Auto DTD generator constructing automatically DTDs based on multiple documents of the same class. This study focuses on automatic DTD generation during hyperlink navigation and an implementation of extended links based on XLL and Xpointer. ID and Xpointer location address are used as the address mode in the links. As a result of implement of this system, it conforms to validationof extended link facihties, extracts DTD from Well-Fromed XML Documents including same root element at the same class and constructs generalized DTD.

  • PDF

Patients' perception about opioids and addiction in South Korea

  • Kim, Cho Long;Hong, Sung Jun;Lim, Yun Hee;Jeong, Jae Hun;Moon, Ho Sik;Choi, Hey Ran;Park, Sun Kyung;Kim, Jung Eun;You, Hakjong;Kim, Jae Hun
    • The Korean Journal of Pain
    • /
    • v.33 no.3
    • /
    • pp.234-244
    • /
    • 2020
  • Background: Chronic pain affects approximately 22% of the world's population. Opioids can be useful in chronic pain management. However, some patients have negative perception of opioids. The purpose of this research was to evaluate patients' perception about opioids and investigate problems associated with prescribing and taking opioids in South Korea. Methods: Patients who visited a pain clinic in 14 university hospitals of South Korea from September through October 2018 were asked to complete anonymous questionnaires about taking opioids. Results: Of the 368 patients that were surveyed (female 53.3%, male 46.7%), 56.8% were prescribed opioids. In the opioid group, 92.8% patients had heard of opioids from their doctor and 72.6% of them had a positive perception about opioids. The side effects associated with opioid use were constipation (35.4%), dizziness (24.6%), nausea and vomiting (17.4%), dysuria (6.2%), and addiction (2.0%). In the no opioid group, the primary sources of information about opioids were doctors (49.2%), mass media (30.8%), and the internet (16.2%). The main reasons why 39.0% patients did not take opioids were fear of addiction (57.7%) and side effects (38.5%). There were 71.5% and 60.9% patients in the opioid and no opioid group, respectively, who wished to take opioids when their numeric rating scale pain score was ≥ 7. Conclusions: Perception of opioids among patients who take them was either neutral or positive. However, 39.0% patients who have not been prescribed opioids did not want an opioid prescription, citing fear of addiction and side effects as the primary reasons.