• Title/Summary/Keyword: Political Filtering

Search Result 9, Processing Time 0.024 seconds

Political Information Filtering on Online News Comment (정보 중립성 확보를 위한 인터넷 뉴스 댓글의 정치성향 분석)

  • Choi, Hyebong;Kim, Jaehong;Lee, Jihyun;Lee, Mingu
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.575-582
    • /
    • 2020
  • We proposes a method to estimate political preference of users who write comments on internet news. We collected and analyzed a massive amount of new comment data from internet news to extract features that effectively characterizes political preference of users. We expect that it helps user to obtain unbiased information from internet news and online discussion by providing estimated political stance of news comment writer. Through comprehensive tests we prove the effectiveness of two proposed methods, lexicon-based algorithm and similarity-based algorithm.

U-Net-based Recommender Systems for Political Election System using Collaborative Filtering Algorithms

  • Nidhi Asthana;Haewon Byeon
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.1
    • /
    • pp.7-13
    • /
    • 2024
  • User preferences and ratings may be anticipated by recommendation systems, which are widely used in social networking, online shopping, healthcare, and even energy efficiency. Constructing trustworthy recommender systems for various applications, requires the analysis and mining of vast quantities of user data, including demographics. This study focuses on holding elections with vague voter and candidate preferences. Collaborative user ratings are used by filtering algorithms to provide suggestions. To avoid information overload, consumers are directed towards items that they are more likely to prefer based on the profile data used by recommender systems. Better interactions between governments, residents, and businesses may result from studies on recommender systems that facilitate the use of e-government services. To broaden people's access to the democratic process, the concept of "e-democracy" applies new media technologies. This study provides a framework for an electronic voting advisory system that uses machine learning.

Detection of Forged Regions and Filtering Regions of Digital Images Using the Characteristics of Re-interpolation (재보간의 특성을 이용한 디지털 이미지의 합성 영역 및 필터링 영역 검출)

  • Hwang, Min-Gu;Har, Dong-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.2
    • /
    • pp.179-194
    • /
    • 2012
  • Digital image forgery is becoming a topic of great interest with regard to honesty in imaging. We can often see forged digital images in a variety of places, such as the internet, and magazines, and in images used in political ads, etc. These can reduce the reliability and factual basis of the information contained in image. Therefore, objectivity is needed to determine if the image is forged so as to prevent confusion in the viewing public. Most digital forgeries consist of image resizing, rotating including the following interpolations. To find evidence of interpolation in forged images, this paper proposes a new method for detecting digital image forgery using general interpolation factors analyzed through re-interpolation algorithm of the forged images in order to determine the differences in the patterns. Through the re-interpolation algorithm we could detect the forged region and filtering region used image retouching included to interpolation.

Design of Intrustion Prevention System(IPS) in Linux Environment (리눅스 환경에서의 침입방지시스템(IPS) 설계)

  • 이상훈;김우년;이도훈;박응기
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.1-7
    • /
    • 2004
  • The growth of incidents on the Internet has reflected growth of the internet itself and growth of the computing Power. while in Previous years, external attacks tended to originate from those interested trend in exploring the Internet for its own sake and testing their skills, there is an increasing trend towards intrusions motivated by financial, Political, and military objectives. so, attacks on the nation's computer infrastructures are becoming an increasingly serious problem. Even though the problem is ubiquitious, government agencies are particularly appealing targets and they tend to be more willing to reveal such events than commercial organizations. The threat of damage made necessity of security's recognition, as a result, many researches have been carried out into security of system actively. Intrusion Detection technology is detection of intrusion using audit data differently from using traditional simple filtering and informs manager of it. It has security manager of system deal with the intrusion more quickly. but, cause current environment of Internet manager can't doing response Intrusion alert immediately That's why IPS needed. IPS can response automatically the intrusion alert. so, manager is more comfortable and can response quickly.

  • PDF

Multi-faceted Citation Analysis for Quality Assessment of Scholarly Publications (학술논문 품질평가를 위한 다방면 인용분석방식)

  • Yang, Ki-Duk;Meho, Lokman
    • Journal of the Korean Society for information Management
    • /
    • v.28 no.2
    • /
    • pp.79-96
    • /
    • 2011
  • Despite the widespread use, critics claim that citation analysis has serious limitations in evaluating the research performance of scholars. First, conventional citation analysis methods yield one-dimensional and sometimes misleading evaluation as a result of not taking into account differences in citation quality, not filtering out citation noise such as self-citations, and not considering non-numeric aspects of citations such as language, culture, and time. Second, the citation database coverage of today is disjoint and incomplete, which can result in conflicting quality assessment outcomes across different data sources. This paper discuss the findings from a citation analysis study that measured the impact of scholarly publications based on the data mined from Web of Science, Scopus, and Google Scholar, and briefly describes a work-in-progress prototype system called CiteSearch, which is designed to overcome the weaknesses of existing citation analysis methods with a robust citation-based quality assessment approach.

Plan of Information System for Combined Treatment of the Oriental and the Western Medicine (한.양방 협진 정보시스템 구축방안 연구)

  • Yea, Sang-Jun;Jang, Hyun-Chul;Kim, Chul;Kim, Jin-Hyun;Kim, Sang-Kyun;Song, Mi-Young
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.13 no.3
    • /
    • pp.19-28
    • /
    • 2009
  • Background : Recently, Medical Act was amended to encourage the induction of combined treatment between Oriental Medicine doctors and Western doctors. As yet, the information infra for combined treatment has not been studied. Objectives : This study aimed to design the architecture of information system for combined treatment of the Oriental and the Western Medicine. Methods : First, we defined the information of combined treatment through the analysis of research trends from the inside and outside of the country. Because the data compatibility is very important, the definition of information must be ahead of anything else. Second, we designed the architecture of information system based on the prior definition. Results : We classified the information for combined treatment by subject such as law, clinic, research, manpower, facilities, and education. In this paper information system examined in three aspects. First the infra layer is organized as hardware, netware, and security. Second is data warehouse layer for the storing, filtering, and extraction of data. Third is service layer which is related to data transmission. And Finally all information for combined treatment is provided through the portal system for medical consumer, political planner, and R&D researcher. Conclusion : In this paper, we studied the essential factors of combined treatment information in the view point of information system. But the detailed design and implementation of information system must be followed to effect this results.

  • PDF

Design of Intrusion Prevention System(IPS) in Linux Environment (Linux 환경에서의 침입방지시스템(IPS) 설계)

  • 이상훈;김우년;이도훈;박응기
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.21-26
    • /
    • 2004
  • The growth of incidents on the Internet has reflected growth of the internet itself and growth of the computing power. while in previous years, external attacks tended to originate from those interested trend in exploring the Internet for its own sake and testing their skills, there is an increasing trend towards intrusions motivated by financial, political, and military objectives. so, attacks on the nation's computer infrastructures are becoming an increasingly serious problem. Even though the problem is ubiquitious, government agencies are particularly appealing targets and they tend to be more willing to reveal such events than commercial organizations. The threat of damage made necessity of security's recognition, as a result, many researches have been carried out into security of system actively. Intrusion Detection technology is detection of intrusion using audit data differently from using traditional simple filtering and informs manager of it. It has security manager of system deal with the intrusion more quickly. but, cause current environment of Internet manager can't doing response Intrusion alert immediately. That's why IPS needed. IPS can response automatically the intrusion alert. so, manager is more comfortable and can response quickly.

  • PDF

A Study on the Linkage and integration of UCI (Universal Content Identifier) between ICN (Integrated Copyright Number) (디지털콘텐츠 식별체계 UCI (Universal Content Identifier)와 통합저작권 관리번호 ICN (Integrated Copyright Number)간의 연계와 통합에 관한 연구)

  • Kim, Yoon-Ho;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.27-33
    • /
    • 2014
  • As UCI (Universal Content Identifier) identification system becomes a national standard for content distribution, many digital contents are distributed through UCI identification system. However, problems associated with copyright infringement and copyright contracts occur due to lack of copyright information. ICN (Integrated Copyright Number), a code system developed for copyright management, includes copyright-related information for the purposes of usage settlement and accounting, illegal usage monitoring, and content filtering. ICN, however, has no information about distribution and content properties. Therefore, the linkage and integration between UCI and ICN can be a basis for the transparent and effective distribution of digital contents. In this paper, we propose a model for linking and integrating UCI and ICN, developing the efficiency in the value chain of each identified system by analyzing political factors and key technical elements between the two identification systems.

A Study on the Improvement of Filter Bubble Phenomenon by Echo Chamber in Social Media (소셜미디어에서 에코챔버에 의한 필터버블 현상 개선 방안 연구)

  • Cho, Jinhyung;Kim, Kyujung
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.5
    • /
    • pp.56-66
    • /
    • 2022
  • Due to the recent increase in information encountered on social media, algorithm-based recommendation formats selectively provide information based on user information, which often causes a filter bubble effect by an Echo Chamber. Eco-chamber refers to a phenomenon in which beliefs are amplified or strengthened by communication only in an enclosed system, and filter bubbles refer to a phenomenon in which information providers provide customized information according to users' interests, and users encounter only filtered information. The purpose of this study is to propose a method of efficiently selecting information as a way to improve the filter bubble phenomenon by such an echo chamber. The research progress method analyzed recommended algorithms used on YouTube, Facebook and Amazon. In this study, humanities solutions such as training critical thinking skills of social media users and strengthening objective ethical standards according to self-preservation laws, and technical solutions of model-based cooperative filtering or cross-recommendation methods were presented. As a result, recommended algorithms should continue to supplement technology and develop new techniques, and humanities should make efforts to overcome cognitive dissonance and prevent users from falling into confirmation bias through critical thinking training and political communication education.