• Title/Summary/Keyword: Text features

Search Result 580, Processing Time 0.028 seconds

A Study on 'Dokyeok(毒疫)' of Byeokyeoksinbang(辟疫神方) (『피역신방(辟疫神方)』의 독역(毒疫)에 대한 고찰)

  • Kim, Sang-Hyun;Jang, Woo-Chang;Baik, You-Sang;Lyu, Jeong-Ah;Jeong, Chang-Hyun
    • Journal of Korean Medical classics
    • /
    • v.28 no.2
    • /
    • pp.33-45
    • /
    • 2015
  • Objectives : Through the study on Byeokyeoksinbang(辟疫神方), it would be expected to analyze Dokyeok(毒疫)'s characteristic and to comprehend how the changes in viewpoints of epidemic febrile disease were made. Methods : It has been done to analyze the original text of Byeokyeoksinbang(辟疫神方), and to compare the theory of Onbyeongjobyeon(溫病條辨) associated with the signature symptom of Dokyeok(毒疫). Results : Heo Jun(許浚) experienced a specific epidemic disease called 'Dokyeok(毒疫)', on which he made observations and analyzed its features and wrote Byeokyeoksinbang(辟疫神方). In Byeokyeoksinbang(辟疫神方), 'Dokyeok(毒疫)' is characterized by rash[疹], its pathogenesis is warm temperature, thus its treatment principle is removing interior and exterior heat. The book's pragmatic perspective is highly appreciated, as HeoJun improved and solidified existing medical knowledge up to date. In addition, Byeokyeoksinbang(辟疫神方) is significant in that it differentiated between macula[癍疹] and rash[疹], much earlier than the febrile disease school of the Qing dynasty. Conclusions : Between Byeokyeoksinbang(辟疫神方) and Onbyeongjobyeon(溫病條辨), there are differences in treatments and patterns of rash[疹]. Based on this, it will be able to compare each disease that is written in two books. And a study on comparing the development between epidemic febrile disease[瘟疫學] of the Joseon dynasty and febrile disease[溫病學] of the Qing dynasty will be carried out with a follow-up study.

Construction Scheme of Training Data using Automated Exploring of Boundary Categories (경계범주 자동탐색에 의한 확장된 학습체계 구성방법)

  • Choi, Yun-Jeong;Jee, Jeong-Gyu;Park, Seung-Soo
    • The KIPS Transactions:PartB
    • /
    • v.16B no.6
    • /
    • pp.479-488
    • /
    • 2009
  • This paper shows a reinforced construction scheme of training data for improvement of text classification by automatic search of boundary category. The documents laid on boundary area are usually misclassified as they are including multiple topics and features. which is the main factor that we focus on. In this paper, we propose an automated exploring methodology of optimal boundary category based on previous research. We consider the boundary area among target categories to new category to be required training, which are then added to the target category sementically. In experiments, we applied our method to complex documents by intentionally making errors in training process. The experimental results show that our system has high accuracy and reliability in noisy environment.

Technology Clustering Using Textual Information of Reference Titles in Scientific Paper (과학기술 논문의 참고문헌 텍스트 정보를 활용한 기술의 군집화)

  • Park, Inchae;Kim, Songhee;Yoon, Byungun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.2
    • /
    • pp.25-32
    • /
    • 2020
  • Data on patent and scientific paper is considered as a useful information source for analyzing technological information and has been widely utilized. Technology big data is analyzed in various ways to identify the latest technological trends and predict future promising technologies. Clustering is one of the ways to discover new features by creating groups from technology big data. Patent includes refined bibliographic information such as patent classification code whereas scientific paper does not have appropriate bibliographic information for clustering. This research proposes a new approach for clustering data of scientific paper by utilizing reference titles in each scientific paper. In this approach, the reference titles are considered as textual information because each reference consists of the title of the paper that represents the core content of the paper. We collected the scientific paper data, extracted the title of the reference, and conducted clustering by measuring the text-based similarity. The results from the proposed approach are compared with the results using existing methodologies that one is the approach utilizing textual information from titles and abstracts and the other one is a citation-based approach. The suggested approach in this paper shows statistically significant difference compared to the existing approaches and it shows better clustering performance. The proposed approach will be considered as a useful method for clustering scientific papers.

The Application of Geography Markup Language(GML) to the Maritime Information

  • Oh, Se-Woong;Park, Jong-Min;Suh, Sang-Hyun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.1
    • /
    • pp.519-524
    • /
    • 2006
  • This paper describes an application of information presentation based geographic map for maritime information, including navigation information. The work is motivated by the need to prepare maritime information representation and distribution for future generation Web network technology. This works consist of map generation using GML and application to maritime information. GML 3.0 became an adopted specification of the Open Geospatial Consortium(OGC) in January 2003, and is rapidly emerging as the world standard for the encoding, transport and storage of all forms of geographic information. This paper looks at the application of GML to one of the more challenging areas of maritime information. Specific features of GML of interest to maritime information provider are discussed and then illustrated through a series of maritime information case studies. The first phase of the work consists of the construction of GML application schema for using as a base map of maritime information. Maritime information is acquired from multiple sources, including standards documents, database schemas, lexicons, collections of symbol definition. The sources of GML ontological knowledge and the contribution of each source to the overall ontology are described in this paper. In the second phase, the prepared GML is used to create a prototype of the mixed maritime information as a base map - for tagging documents within the maritime domain. An overview of this prototype is included. One application area for these information elements described here is the integrated retrieval of maritime information from diverse sources, ranging from Web sites to nautical chart databases and text documents.

  • PDF

A Study on the Printed Korean and Chinese Character Recognition (인쇄체 한글 및 한자의 인식에 관한 연구)

  • 김정우;이세행
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.11
    • /
    • pp.1175-1184
    • /
    • 1992
  • A new classification method and recognition algorithms for printed Korean and Chinese character is studied for Korean text which contains both Korean and Chinese characters. The proposed method utilizes structural features of the vertical and horizontal vowel in Korean character. Korean characters are classified into 6 groups. Vowel and consonant are separated by means of different vowel extraction methods applied to each group. Time consuming thinning process is excluded. A modified crossing distance feature is measured to recognize extracted consonant. For Chinese character, an average of stroke crossing number is calculated on every characters, which allows the characters to be classified into several groups. A recognition process is then followed in terms of the stroke crossing number and the black dot rate of character. Classification between Korean and Chinese character was at the rate of 90.5%, and classification rate of Ming-style 2512 Korean characters was 90.0%. The recognition algorithm was applied on 1278 characters. The recognition rate was 92.2%. The densest class after classification of 4585 Chinese characters was found to contain only 124 characters, only 1/40 of total numbers. The recognition rate was 89.2%.

  • PDF

A Study on the de'paysment characteristics in modern architecture - In light of Rene Magritte - (현대 건축공간에 나타나는 데페이즈망 특성에 관한 연구 - 르네 마그리트를 중심으로 -)

  • Jang, Han-Sol;Hur, Bum-Pall
    • Korean Institute of Interior Design Journal
    • /
    • v.18 no.6
    • /
    • pp.96-103
    • /
    • 2009
  • Man has an unconscious desire to free oneself from everyday selves and a strong intellectual desire to see and analyze things in a different perspective. This provided a momentum for architectural design that has long been confined to its limits of modernism of being rational and objective. The ever-changing society that we live in filled with various attempts and pluralistic characteristics shows a complex set of attributes that can hardly be defined by a single term. As society moves towards an uncertain and volatile state, the boundary between literature, philosophy and art has dimmed out and converged. Such tendencies have been observable in recent establishments in architecture in the form of introducing external elements and create an alien and farfetched architectural space. Using the 'depaysement' defamiliarization method expressing irrationality and randomness, it is applied in various aspects, sharing the counter-rational structure and features of such architectural space. Hence, it is the purpose of this study to delve into the unique characteristics of depaysement through Magritte's work which reflects the unique pictorial world built under the influence of surrealism, and discover the $D\acute{e}paysement$ tendencies in modern architectural space. It is apparent in Modern architecture that, owing to the development in digital technology, it is showing process changes in design and an interfacial $D\acute{e}paysement$ effect in cyberspace, an interlace of reality and the virtual world. In this study, the focus of analysis was architectural properties such as the program, figure/spatial, material and the objective side, but due to mutual text properties, it is bound to be an overlapping analysis.

Influence of mobile phone texting on gait parameters during ramp ascent and descent

  • Kim, Hyunjin;Park, Jaemyoung;Cha, Jaeyun;Song, Chang-Ho
    • Physical Therapy Rehabilitation Science
    • /
    • v.3 no.1
    • /
    • pp.43-48
    • /
    • 2014
  • Objective: The purpose of this study was to examine the influences on gait features during mobile phone use while ramp walking. Design: Cross-sectional study. Methods: Thirty-three healthy adult subjects performed four walking conditions on an outside ramp with a 5 m length, 1.5 m width, and a $5^{\circ}$ angle. All participants were touch screen mobile phone users. Four walking conditions were used: 1) ramp ascent, 2) ramp descent, 3) texting during ramp ascent, and 4) texting during ramp descent. In conditions 3) and 4), subjects texted the words of "Aegukga"-the song of patriotism-while walking. Upon the signal of start, the subjects walked the ramp during texting. Gait parameters were measured at the length of 3 m excluding 1 m of the start and end of the total length. Each situation was repeated three times for each subject, and mean values were calculated. For gait examination, a gait analyzer was used (OptoGait). Results: Subjects ranged in age from 23 to 38 years (mean age, 27.73). Eighty-three percent of subjects in our study had experienced an accident during mobile phone use. Texting on a mobile phone while walking significantly decreased ramp gait, speed, cadence, stride length, step length, and single support (p<0.05) and significantly increased stride time, step time, gait cycle, and double support (p<0.05). There was a significant difference in cadence, step length, stride time, step time, and single support during ramp ascent and descent (p<0.05). Conclusions: Texting on a mobile phone while walking significantly decreased gait quality.

A study to detect and leaked personal information on the smartphone. (스마트폰 상에서의 개인정보 유출 탐지 모니터링 연구)

  • Kim, Wung-Jun;Park, Sang-Hwi;Park, Sang-No;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.606-608
    • /
    • 2014
  • Recent smartphone users constantly increases, an increase in malicious applications smartphones indiscretions exists within the Terminal, through the deployment of privacy disclosure, Singh and other victims also are on the rise. A typical personal way to malicious code masquerading as a normal application and install it on the handset of my text message or a personal note, such as personal information, the certificate directory, is the way that leaked. Therefore, to obtain permission to attack the root Terminal event by collecting malware infections and respond to determine whether it is necessary for the technique. In this paper, check the features of a Smartphone in real time systems, to carry out a study on the application throughout the Terminal to collect my attack event analysis, malware infection can determine whether or not the mobile security monitoring system. This prevents a user's personal information and take advantage of the top and spill are expected to be on the field.

  • PDF

A Review on Smart Two Wheeler Helmet with Safety System Using Internet of Things

  • Ilanchezhian, P;Shanmugaraja, P;Thangaraj, K;Aldo Stalin, JL;Vasanthi, S
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.11-16
    • /
    • 2021
  • At the present time, the number of accidents has enlarged speedily and in country like India per day there are about 204 accidents occurred. Accidents of two-wheeler compose a foremost segment of every accident and it can be true for the reason that two-wheelers like bikes not able to produce as many as security measurements normally incorporated in cars, truks and bus etc. General main rootcost of the two-wheeler accidents happen only when people community not remember to wearing a device helmet and during the driving time feels like sleep condition, alcohol disbursement, many of the drivers doesn't know heavy vehicles like Loory and buses approaching into very closer to their two wheelers, contravention of two wheelers in traffic rules and regulations. Let's overcome the above situations; our important objective is to develop an intelligent system device that can successfully facilitate in avoidance of every kind of problems. Suppose any of the above stated situations occurs, at that moment how system device identify and represents the commanders and community, and finally the stated situation be able to taken care of straight away without any further delay. A smart intelligent helmet system is a defending head covering used by rider for making bike riding safer than earlier. This is finished by incorporating sophisticated features like detecting the usage of helmet by the rider, connected Bluetooth module in helmet. In order to maintain the temperature inside the helmet device we need to include CPU fan module inside the device. RF based helmet prevents road accidents and identify whether people community is not using a component helmet or used. Main responsibility of the system is to detect accidents by vibration sensors, accelerometers and also with the help of modules global positioning system and global system for mobile commnicaiton module. A wireless communication device used to discover the accident area site location and likewise notifying the two-wheeler drived people's relatives and short message text information passed to the positioned hospitals.

Smart Deaf Emergency Application Based on Human-Computer Interaction Principles

  • Ahmed, Thowiba E;Almadan, Naba Abdulraouf;Elsadek, Alma Nabil;Albishi, Haya Zayed;Al-Qahtani, Norah Eid;Alghamdi, arah Khaled
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.284-288
    • /
    • 2021
  • Human-computer interaction is a discipline concerned with the design, evaluation, and implementation of interactive systems for human use. In this paper we suggest designing a smart deaf emergency application based on Human-Computer Interaction (HCI) principles whereas nowadays everything around us is becoming smart, People already have smartphones, smartwatches, smart cars, smart houses, and many other technologies that offer a wide range of useful options. So, a smart mobile application using Text Telephone or TeleTYpe technology (TTY) has been proposed to help people with deafness or impaired hearing to communicate and seek help in emergencies. Deaf people find it difficult to communicate with people, especially in emergency status. It is stipulated that deaf people In all societies must have equal rights to use emergency services as other people. With the proposed application the deafness or impaired hearing can request help with one touch, and the location will be determined, also the user status will be sent to the emergency services through the application, making it easier to reach them and provide them with assistance. The application contains several classifications and emergency status (traffic, police, road safety, ambulance, fire fighting). The expected results from this design are interactive, experiential, efficient, and comprehensive features of human-computer interactive technology which may achieve user satisfaction.