• Title/Summary/Keyword: Semantic Technique

Search Result 297, Processing Time 0.025 seconds

Check of Concurrency in Parallel Programs using Image Information (영상정보를 이용한 병렬 프로그램내의 병행성 판별)

  • Park, Myeong-Chul;Ha, Seok-Wun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.12
    • /
    • pp.2132-2139
    • /
    • 2006
  • A parallel program including a nested parallelism has a complex execution aspects and tasks are executed concurrently. This concurrency is a main cause raising most of errors. In this paper, a new method for checking concurrency between two tasks is proposed. The existing techniques for checking the concurrency have their limits to represent a global structure. A new labeling technique that appropriate for image visualization is proposed. To show the global structure by imaging of execution aspects through region partition on 2D plane. On the basis of it, each of the tasks that can distinguish the ordered relation create an independent image. Image information generated by the result simplifies semantic analysis of the related task, and provides an outline of a global execution aspects structure of the program to user effectively.

Two-Level Clausal Segmentation using Sense Information (의미 정보를 이용한 이단계 단문분할)

  • Park, Hyun-Jae;Woo, Yo-Seop
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.9
    • /
    • pp.2876-2884
    • /
    • 2000
  • Clausal segmentation is the method that parses Korean sentences by segmenting one long sentence into several phrases according to the predicates. So far most of researches could be useful for literary sentences, but long sentences increase complexities of the syntax analysis. Thus this paper proposed Two-Level Clausal Segmentation using sense information which was designed and implemented to solve this problem. Analysis of clausal segmentation and understanding of word senses can reduce syntactic and semantic ambiguity. Clausal segmentation using Sense Information is necessary because there are structural ambiguity of sentences and a frequent abbreviation of auxiliary word in common sentences. Two-Level Clausal Segmentation System(TLCSS) consists of Complement Selection Process(CSP) and Noncomplement Expansion Process(NEP). CSP matches sentence elements to subcategorization dictionary and noun thesaurus. As a result of this step, we can find the complement and subcategorization pattern. Secondly, NEP is the method that uses syntactic property and the others methods for noncomplement increase of growth. As a result of this step, we acquire segmented sentences. We present a technique to estimate the precision of Two-Level Clausal Segmentation System, and shows a result of Clausal Segmentation with 25,000 manually sense tagged corpus constructed by ETRl-KONAN group. An Two-Level Clausal Segmentation System shows clausal segmentation precision of 91.8%.

  • PDF

Public Telephone Design by Approach Method of Human Sensibility (감성적 접근방법에 의한 공중전화기 디자인에 대한 연구)

  • 홍현주;정석길;이상도
    • Archives of design research
    • /
    • v.11 no.3
    • /
    • pp.35-44
    • /
    • 1998
  • Acording to the trend of highly increasing the public telephone, understanding consumer's design sensibility is based on designing consumer products reflecting user's identity and it comes out as a result of wore competitive products. For this study, consumer's desirous sensibility of the public telephone has been measured in checkable numbers. First of all, 35 sensible words are narrowed down from 168 whole sensible(adjective) words using the SD method. By this result, 7 scale form the SD method is applied to reserch on 10 current distributed products form 30 male and female university students. Element factor analysis is used to group the selected sensible words, duster analysis is used yo dassify them, and finally discriminant analysis is used to predict the relationship between design elements and the sensible words. As a result, words of human sensibility is known to divide into 3 factors; esthetics, functionality and safety, and the correlation of design factor is closely related with the the telephone's body, handset, dial board, dial button, ontrol button, color and material. To sum up, better public telephone design comes out from scientific and systematic consumer's desire analysis not designer's design technique.

  • PDF

A Ranking Technique of XML Documents using Path Similarity for Expanded Query Processing (확장된 질의 처리를 위해 경로간 의미적 유사도를 고려한 XML 문서 순위화 기법)

  • Kim, Hyun-Joo;Park, So-Mi;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.37 no.2
    • /
    • pp.113-120
    • /
    • 2010
  • XML is broadly using for data storing and processing. XML is specified its structural characteristic and user can query with XPath when information from data document is needed. XPath query can process when the tern and structure of document and query is matched with each other. However, nowadays there are lots of data documents which are made by using different terminology and structure therefore user can not know the exact idea of target data. In fact, there are many possibilities that target data document has information which user is find or a similar ones. Accordingly user query should be processed when their term usage or structural characteristic is slightly different with data document. In order to do that we suggest a XML document ranking method based on path similarity. The method can measure a semantic similarity between user query and data document using three steps which are position, node and relaxation factors.

Prediction of Pain Expression Using the Extended Gate Control Theory of Pain and Fishbein′s Model (관문통제동통이론과 FISHBEIN의 모델을 이용한 동통표현 예견에 대한 연구)

  • 이은옥
    • Journal of Korean Academy of Nursing
    • /
    • v.13 no.2
    • /
    • pp.1-21
    • /
    • 1983
  • The purposes of this study were to(a) develop theoretical modifications of the extended gate control theory of pain using Fishbein's model and(b) test the efficacy of these modifications. Attitude, social subjective norm, personal subjective norm, habit and state anxiety were operationalized to represent internal stimuli for the cognitive-evaluative and motivational-affective dimensions of the theory. Pain expression was operationalized as sensory and affective responses to pain, and pain endurance. Sixty-two female nurses from 20 to 50 years of age participated. A semantic differential scale measured attitude and motivations to comply; a Likerty-type scale measured personal and social norms and habit. Spielberger's STAI measured state anxiety, Pain was produced using a modified submaximum effort tourniquet technique. Pair expression was measured using ratio scales of sensory intensity and unpleasantness developed by Gracely and his associates. Pain endurance was measured by subtracting time of pain threshold from pain tolerance. The first hypothesis examining whether pain endurance would be more significantly related to the affective response than to the sensory response was net rejected. Four remaining hypotheses, testing the ability of the five variables to predict the sensory and affective responses were not rejected. However, the habit of pain expression and the attitude toward pain expression contributed to the prediction of both sensory and affective responses to pain. The interaction between the cognitive-evaluative and the sensory-discriminative dimensions and the interaction between the cognitive-evaluative and motivational-affective dimensions were partially supported by the data from these two variables. The interaction between the motivational-affective and the sensory-discriminative dimensions was also supported by the relationship of sensory to affective responses. The variables which did not significantly predict pain expression appeared to have potential for prediction. Revision and testing of the tools for better reliability, validity, and clinical usuability are needed. The study contributed to theory building. The identification of variables which pre-dict pain behavior must occur before effective nursing interventions can be developed.

  • PDF

A Methodology of the Information Retrieval System Using Fuzzy Connection Matrix and Document Connectivity Order (색인어 퍼지 관계와 서열기법을 이용한 정보 검색 방법론)

  • Kim, Chul;Lee, Seung-Chai;Kim, Byung-Ki
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.5
    • /
    • pp.1160-1169
    • /
    • 1996
  • In this study, an experiment of information retrieval using fuzzy connection matrix of keywords was conducted. A query for retrieval was constructed from each keyword and Boolean operator such as AND, OR, NOT. In a workstation environment, the performance of the fuzzy retrieval system was proved to be considerably effective than that of the system using the crisp set theory. And both recall ratio and precision ratio showed that the proposed technique would be a possible alternative in future information retrieval. Some special features of this experimental system were ; ranking the results in the order of connectivity, making the retrieval results correspond flexibly by changing the threshold value, trying to accord the retrieval process with the retrieval semantics by treating the averse-connectivity (fuzzy value) as a semantic approximation between kewords.

  • PDF

An Automatic Issues Analysis System using Big-data (빅데이터를 이용한 자동 이슈 분석 시스템)

  • Choi, Dongyeol;Ahn, Eungyoung
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.2
    • /
    • pp.240-247
    • /
    • 2020
  • There have been many efforts to understand the trends of IT environments that have been rapidly changed. In a view point of management, it needs to prepare the social systems in advance by using Big-data these days. This research is for the implementation of Issue Analysis System for the Big-data based on Artificial Intelligence. This paper aims to confirm the possibility of new technology for Big-data processing through the proposed Issue Analysis System using. We propose a technique for semantic reasoning and pattern analysis based on the AI and show the proposed method is feasible to handle the Big-data. We want to verify that the proposed method can be useful in dealing with Big-data by applying latest security issues into the system. The experiments show the potentials for the proposed method to use it as a base technology for dealing with Big-data for various purposes.

Improving Performance of Search Engine Using Category based Evaluation (범주 기반 평가를 이용한 검색시스템의 성능 향상)

  • Kim, Hyung-Il;Yoon, Hyun-Nim
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.1
    • /
    • pp.19-29
    • /
    • 2013
  • In the current Internet environment where there is high space complexity of information, search engines aim to provide accurate information that users want. But content-based method adopted by most of search engines cannot be used as an effective tool in the current Internet environment. As content-based method gives different weights to each web page using morphological characteristics of vocabulary, the method has its drawbacks of not being effective in distinguishing each web page. To resolve this problem and provide useful information to the users, this paper proposes an evaluation method based on categories. Category-based evaluation method is to extend query to semantic relations and measure the similarity to web pages. In applying weighting to web pages, category-based evaluation method utilizes user response to web page retrieval and categories of query and thus better distinguish web pages. The method proposed in this paper has the advantage of being able to effectively provide the information users want through search engines and the utility of category-based evaluation technique has been confirmed through various experiments.

Study on the Next Disaster Safety Communication Network in M2M Communication (사물지능통신을 이용한 차세대 재난안전통신망에 관한 연구)

  • Kang, Heau-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.585-590
    • /
    • 2011
  • In the past few years, M2M (Machine-to-Machine) applications have become a hot topic in the wireless industry. While M2M applications can be used for many purposes (smart homes, smart metering/electricity meter reading, fleet management, mobile workforce, automobile insurance, vending machines, etc), and in many sectors (healthcare, agriculture, commercial, industrial, retail, utility, etc.), smart metering applications or smart grids present the biggest growth potential in the M2M market today. M2M platform is the future ubiquitous network technologies which provide the integrated service with the networks and devices. The promising technologies to tackle these problems are the Semantic technologies, for interoperability, and the Agent technologies for management of complex systems. In this paper the information communication technique based on the disaster prevention system's for the M2M, concepts and its requirement technology and application are studied.

Four Consistency Levels in Trigger Processing (트리거 처리 4 단계 일관성 레벨)

  • ;Eric Hanson
    • Journal of KIISE:Databases
    • /
    • v.29 no.6
    • /
    • pp.492-501
    • /
    • 2002
  • An asynchronous trigger processor (ATP) is a oftware system that processes triggers after update transactions to databases are complete. In an ATP, discrimination networks are used to check the trigger conditions efficiently. Discrimination networks store their internal states in memory nodes. TriggerMan is an ATP and uses Gator network as the .discrimination network. The changes in databases are delivered to TriggerMan in the form of tokens. Processing tokens against a Gator network updates the memory nodes of the network and checks the condition of a trigger for which the network is built. Parallel token processing is one of the methods that can improve the system performance. However, uncontrolled parallel processing breaks trigger processing semantic consistency. In this paper, we propose four trigger processing consistency levels that allow parallel token processing with minimal anomalies. For each consistency level, a parallel token processing technique is developed. The techniques are proven to be valid and are also applicable to materialized view maintenance.