• Title/Summary/Keyword: Issue Word

Search Result 172, Processing Time 0.024 seconds

Influence Maximization Scheme against Various Social Adversaries

  • Noh, Giseop;Oh, Hayoung;Lee, Jaehoon
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.4
    • /
    • pp.213-220
    • /
    • 2018
  • With the exponential developments of social network, their fundamental role as a medium to spread information, ideas, and influence has gained importance. It can be expressed by the relationships and interactions within a group of individuals. Therefore, some models and researches from various domains have been in response to the influence maximization problem for the effects of "word of mouth" of new products. For example, in reality, more than two related social groups such as commercial companies and service providers exist within the same market issue. Under such a scenario, they called social adversaries competitively try to occupy their market influence against each other. To address the influence maximization (IM) problem between them, we propose a novel IM problem for social adversarial players (IM-SA) which are exploiting the social network attributes to infer the unknown adversary's network configuration. We sophisticatedly define mathematical closed form to demonstrate that the proposed scheme can have a near-optimal solution for a player.

Profane or Not: Improving Korean Profane Detection using Deep Learning

  • Woo, Jiyoung;Park, Sung Hee;Kim, Huy Kang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.305-318
    • /
    • 2022
  • Abusive behaviors have become a common issue in many online social media platforms. Profanity is common form of abusive behavior in online. Social media platforms operate the filtering system using popular profanity words lists, but this method has drawbacks that it can be bypassed using an altered form and it can detect normal sentences as profanity. Especially in Korean language, the syllable is composed of graphemes and words are composed of multiple syllables, it can be decomposed into graphemes without impairing the transmission of meaning, and the form of a profane word can be seen as a different meaning in a sentence. This work focuses on the problem of filtering system mis-detecting normal phrases with profane phrases. For that, we proposed the deep learning-based framework including grapheme and syllable separation-based word embedding and appropriate CNN structure. The proposed model was evaluated on the chatting contents from the one of the famous online games in South Korea and generated 90.4% accuracy.

GCC based Compiler Construction for Compact DSP32

  • Cho, Myeong-Jin;Lee, Ho-Kyoon;Huong, Giang Nguyen Thi;Kim, Seon-Wook;Han, Young-Sun;Um, Jung-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.43-45
    • /
    • 2011
  • Very Long Instruction Word (VLIW) executes multiple instructions in parallel. In order to exploit higher performance, i.e., higher parallelism, VLIW compiler groups as many instructions into one word as possible. In this paper, we show how to construct a VLIW C compiler based on GCC for CDSP32 (Compact Digital Signal Processor 32-bit) which is an embedded DSP processor to issue two instructions in one VLIW. Also, we evaluated the compiler on EEMBC benchmark; the experiment result showed that the total number of dynamic instructions of the VLIW compiler was reduced by 18% on average over without VLIW instruction scheduling.

A Study on the Ecologic Design for Urban Collective Dewelling (생태학적 개념의 도심형 공동주택 디자인에 관한 고찰)

  • Kyonne, Jin-Hyun
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 2006.11a
    • /
    • pp.81-85
    • /
    • 2006
  • The current environmental issue is how a dwelling adapts into a given climate in which the design is applied by ecology without damaging the natural environment. In another word, the main issue in the twenty first century will be how we meet the human needs to dwellings applied by the residential environment. Therefore, we have to provide a hospitable place for residents' mental and physical health through "Green Design," emerging as the critical design of urban collective dwellings. Based on these conceptions, the purpose of this study is to suggest the way of designing the urban collective dwelling applied by ecology, proffering wealthy life style to residents with the preservation of natural environment as applying an ecological concept into the design of collective dwellings that represent a contemporary housing type for urban residents. In order to design the urban collective dwelling applied by ecology, this study introduces the outdoor design in friendly surroundings, the collective construct of a delightful housing, and the organic connection between inside and outside rooms.

  • PDF

Design and Implementation of Providing Conditional Access Broadcasting Service System (수신 제한된 방송 서비스 제공 시스템 설계 및 구현)

  • Kim, Dong-Ok;Shin, Ik-Ryong
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.8 no.2
    • /
    • pp.64-71
    • /
    • 2009
  • In this paper, This thesis is cell phone for make CAS service be for hand joining broadcasting Create a way CAS Chip. PerSam issue card inside use Seed Key and algorithm make CID Key and record CAS Chip. PerSam member Card inside use Seed Key and algorithm make Subscriber Key after include Subscriber. Key CAS Chip for record CID Key register EMM. make CAS CHIP in accordance with issue CAS Chip. broadcast service entry be for hand treatment so make low bandwidth for joining massage and make increase a member.

  • PDF

Issue Word Extraction Using Chi-square Statistics (카이제곱 통계량을 이용한 이슈 단어 추출)

  • Shin, Junsoo
    • Annual Conference on Human and Language Technology
    • /
    • 2014.10a
    • /
    • pp.225-227
    • /
    • 2014
  • 최근 온라인 뉴스는 대중의 관심사 및 트렌드에 따라서 다양한 종류의 기사들이 작성된다. 이러한 관심사 및 트렌드는 시간의 흐름에 따라 계속 변한다. 본 논문에서는 온라인 뉴스의 기사 제목을 이용하여 시간에 따라 변하는 관심사 및 트렌드와 관련된 단어를 추출하는 방법을 제안한다. 특정 기간 별 출현하는 뉴스들을 하나의 카테고리로 가정하고 자질 선택 방법에서 널리 사용되는 카이제곱 통계량을 이용하여 각 카테고리의 주요 단어를 추출한다. 실험 결과 특정 기간 별 관심사 및 트렌드와 관련된 단어들이 출현하는 것을 확인하였다.

  • PDF

A Study of Factors Influencing on Receivers' Communication Style in Internet Shopping Mall Contents (인터넷 쇼핑몰 콘텐츠에서 정보수신자의 커뮤니케이션 스타일에 미치는 영향요인에 관한 연구)

  • Chun Myung-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.3
    • /
    • pp.75-84
    • /
    • 2006
  • The internet has the capabilities of supporting and facilitating several forms of consumer interaction including one-to-one, one to many, or many-to-many interactions. Especially, previous studies revealed that the Online Word-of-Mouth communication is widely used as a source of customer's information seeking and purchase decision making. Even with this importance of the Online Word-of-Mouth communication on internet, few research has systematically addressed the issue. This study investigates the effect of interpersonal communication on consumers' information search activities and develops a model that depicts the key antecedents and mediating variables of interpersonal communication in internet shopping environment. The results are as follows: First, choice uncertainty, perceived risk, and knowledge uncertainty play an important role for perceived usefulness. Second, perceived usefulness has directly affected interactive communication of consumers' communication style. Thus, it is essential for internet companies to find ways to encourage their customers to engage in word-of-mouth communication.

  • PDF

Linguistic Features Discrimination for Social Issue Risk Classification (사회적 이슈 리스크 유형 분류를 위한 어휘 자질 선별)

  • Oh, Hyo-Jung;Yun, Bo-Hyun;Kim, Chan-Young
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.11
    • /
    • pp.541-548
    • /
    • 2016
  • The use of social media is already essential as a source of information for listening user's various opinions and monitoring. We define social 'risks' that issues effect negative influences for public opinion in social media. This paper aims to discriminate various linguistic features and reveal their effects for building an automatic classification model of social risks. Expecially we adopt a word embedding technique for representation of linguistic clues in risk sentences. As a preliminary experiment to analyze characteristics of individual features, we revise errors in automatic linguistic analysis. At the result, the most important feature is NE (Named Entity) information and the best condition is when combine basic linguistic features. word embedding, and word clusters within core predicates. Experimental results under the real situation in social bigdata - including linguistic analysis errors - show 92.08% and 85.84% in precision respectively for frequent risk categories set and full test set.

An Exploratory Study of Fairness Structure in the Context of the Online Shopping (온라인 쇼핑에서 소비자가 지각하는 공정성의 구조에 대한 탐색적 연구)

  • Kim, Young-Kyun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.4
    • /
    • pp.128-142
    • /
    • 2009
  • Since fairness issue has been found to be important in many different business contexts such as marketing, organizational psychology and management in general. The purpose of this exploratory study was to identify the factor structure of fairness and its effects on customer satisfaction and word-of-mouth. In this survey, we collected data from the respondents who have experienced online shopping from 61 online shopping companies. The data were analyzed by structural equation model using LISREL 8.5. The results indicated that fairness has a four-factor structure, which is composed of distributive, procedural, interpersonal, and informational fairness, which is different from three-factor structure. In addition, perceived justice as a second-order construct were found to have a positive effect on customer satisfaction and word-of-mouth intention. The study suggests that online shopping mall should increase customer satisfaction and positive word-of-mouth by enhancing multiple aspects related to fairness.

Accelerating Symmetric and Asymmetric Cryptographic Algorithms with Register File Extension for Multi-words or Long-word Operation (다수 혹은 긴 워드 연산을 위한 레지스터 파일 확장을 통한 대칭 및 비대칭 암호화 알고리즘의 가속화)

  • Lee Sang-Hoon;Choi Lynn
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.2 s.308
    • /
    • pp.1-11
    • /
    • 2006
  • In this paper, we propose a new register file architecture called the Register File Extension for Multi-words or Long-word Operation (RFEMLO) to accelerate both symmetric and asymmetric cryptographic algorithms. Based on the idea that most of cryptographic algorithms heavily use multi-words or long-word operations, RFEMLO allows multiple contiguous registers to be specified as a single operand. Thus, a single instruction can specify a SIMD-style multi-word operation or a long-word operation. RFEMLO can be applied to general purpose processors by adding instruction set for multi-words or long-word operands and functional units for additional instruction set. To evaluate the performance of RFEMLO, we use Simplescalar/ARM 3.0 (with gcc 2.95.2) and run detailed simulations on various symmetric and asymmetric cryptographic algorithms. By applying RFEMLO, we could get maximum 62% and 70% reductions in the total instruction count of symmetric and asymmetric cryptographic algorithms respectively. Also, performance results show that a speedup of 1.4 to 2.6 can be obtained in symmetric cryptographic algorithms and a speedup of 2.5 to 3.3 can be obtained for asymmetric cryptographic algorithms when we apply RFEMLO to a processor with an in-order pipeline. We also found that RFEMLO can effectively improve the performance of these cryptographic algorithms with much less cost compared to issue-width increase available in Superscalar implementations. Moreover, the RFEMLO can also be applied to Superscalar processor, leading to additional 83% and 138% performance gain in symmetric and asymmetric cryptographic algorithms.