• Title/Summary/Keyword: meta information

Search Result 1,258, Processing Time 0.025 seconds

Massive Surveillance by US-UK intelligence services : Crisis of the Internet and the Rule of Law (미국/영국 정보기관의 무차별 정보수집행위: 인터넷과 법치주의의 위기)

  • Kim, Keechang
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.78-85
    • /
    • 2013
  • The revelations made possible by Edward Snowden, a contractor of the US intelligence service NSA, are a sobering reminder that the Internet is not an 'anonymous' means of communication. In fact, the Internet has never been conceived with anonymity in mind. If anything, the Internet and networking technologies provide far more detailed and traceable information about where, when, with whom we communicate. The content of the communication can also be made available to third parties who obtain encryption keys or have the means of exploiting vulnerabilities (either by design or by oversight) of encryption software. Irrebuttable evidence has emerged that the US and the UK intelligence services have had an indiscriminate access to the meta-data of communications and, in some cases, the content of the communications in the name of security and protection of the public. The conventional means of judicial scrutiny of such an access turned out to be ineffectual. The most alarming attitude of the public and some politicians is "If you have nothing to hide, you need not be concerned." Where individuals have nothing to hide, intelligence services have no business in the first place to have a peek. If the public espouses the groundless assumption that State organs are benevolent "( they will have a look only to find out whether there are probable grounds to form a reasonable suspicion"), then the achievements of several hundred years of struggle to have the constitutional guarantees against invasion into privacy and liberty will quickly evaporate. This is an opportune moment to review some of the basic points about the protection of privacy and freedom of individuals. First, if one should hold a view that security can override liberty, one is most likely to lose both liberty and security. Civilized societies have developed the rule of law as the least damaging and most practicable arrangement to strike a balance between security and liberty. Whether we wish to give up the rule of law in the name of security requires a thorough scrutiny and an informed decision of the body politic. It is not a decision which can secretly be made in a closed chamber. Second, protection of privacy has always depended on human being's compliance with the rules rather than technical guarantees or robustness of technical means. It is easy to tear apart an envelope and have a look inside. It was, and still is, the normative prohibition (and our compliance) which provided us with protection of privacy. The same applies to electronic communications. With sufficient resources, surreptitiously undermining technical means of protecting privacy (such as encryption) is certainly 'possible'. But that does not mean that it is permissible. Third, although the Internet is clearly not an 'anonymous' means of communication, many users have a 'false sense of anonymity' which make them more vulnerable to prying eyes. More effort should be made to educate the general public about the technical nature of the Internet and encourage them to adopt user behaviour which is mindful of the possibilities of unwanted surveillance. Fourth, the US and the UK intelligence services have demonstrated that an international cooperation is possible and worked well in running the mechanism of massive surveillance and infiltration into data which travels globally. If that is possible, it should equally be possible to put in place a global mechanism of judicial scrutiny over a global attempt at surveillance.

  • PDF

Design and Application of User Preference Information Structure and Program Information Structure (사용자 적응적 방송 수신을 위한 사용자 선호도 정보구조와 프로그램 정보구조의 설계 및 응용)

  • 윤경로;이진수;이희연
    • Journal of Broadcast Engineering
    • /
    • v.5 no.1
    • /
    • pp.94-101
    • /
    • 2000
  • User adaptive reception of broadcast programs includes the functionality such as the user adaptive filtering and browsing functionality. The user adaptive filtering means that the user can limit the list of programs to include only his/her favorite programs among hundreds of available programs. The user adaptive browsing means that the user can view a short summary of his/her selection in the way that he/she prefers. When the receiving system include the random access storage device, the automatic recording functionality of users favorite programs can be included. The user adaptive reception requires support from various meta-data such as user preference data and content description data. TV Anytime forum is a standardization effort to enable user adaptive TV reception, which means that the user can watch what s/he wants when s/he want in the way s/he wants. MPEG-7 includes not only the content description for broadcast applications but also other content descriptions such as structure information. This paper addresses the relationship between MPEG-7 and TV Anytime and investigates how MPEG-7 should be designed and be used to satisfy the requirements of the user adaptive reception of broadcast program.

  • PDF

Research on Text Classification of Research Reports using Korea National Science and Technology Standards Classification Codes (국가 과학기술 표준분류 체계 기반 연구보고서 문서의 자동 분류 연구)

  • Choi, Jong-Yun;Hahn, Hyuk;Jung, Yuchul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.1
    • /
    • pp.169-177
    • /
    • 2020
  • In South Korea, the results of R&D in science and technology are submitted to the National Science and Technology Information Service (NTIS) in reports that have Korea national science and technology standard classification codes (K-NSCC). However, considering there are more than 2000 sub-categories, it is non-trivial to choose correct classification codes without a clear understanding of the K-NSCC. In addition, there are few cases of automatic document classification research based on the K-NSCC, and there are no training data in the public domain. To the best of our knowledge, this study is the first attempt to build a highly performing K-NSCC classification system based on NTIS report meta-information from the last five years (2013-2017). To this end, about 210 mid-level categories were selected, and we conducted preprocessing considering the characteristics of research report metadata. More specifically, we propose a convolutional neural network (CNN) technique using only task names and keywords, which are the most influential fields. The proposed model is compared with several machine learning methods (e.g., the linear support vector classifier, CNN, gated recurrent unit, etc.) that show good performance in text classification, and that have a performance advantage of 1% to 7% based on a top-three F1 score.

Multimodal Sentiment Analysis Using Review Data and Product Information (리뷰 데이터와 제품 정보를 이용한 멀티모달 감성분석)

  • Hwang, Hohyun;Lee, Kyeongchan;Yu, Jinyi;Lee, Younghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.1
    • /
    • pp.15-28
    • /
    • 2022
  • Due to recent expansion of online market such as clothing, utilizing customer review has become a major marketing measure. User review has been used as a tool of analyzing sentiment of customers. Sentiment analysis can be largely classified with machine learning-based and lexicon-based method. Machine learning-based method is a learning classification model referring review and labels. As research of sentiment analysis has been developed, multi-modal models learned by images and video data in reviews has been studied. Characteristics of words in reviews are differentiated depending on products' and customers' categories. In this paper, sentiment is analyzed via considering review data and metadata of products and users. Gated Recurrent Unit (GRU), Long Short-Term Memory (LSTM), Self Attention-based Multi-head Attention models and Bidirectional Encoder Representation from Transformer (BERT) are used in this study. Same Multi-Layer Perceptron (MLP) model is used upon every products information. This paper suggests a multi-modal sentiment analysis model that simultaneously considers user reviews and product meta-information.

Individual Ortho-rectification of Coast Guard Aerial Images for Oil Spill Monitoring (유출유 모니터링을 위한 해경 항공 영상의 개별정사보정)

  • Oh, Youngon;Bui, An Ngoc;Choi, Kyoungah;Lee, Impyeong
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.6_1
    • /
    • pp.1479-1488
    • /
    • 2022
  • Accidents in which oil spills occur intermittently in the ocean due to ship collisions and sinkings. In order to prepare prompt countermeasures when such an accident occurs, it is necessary to accurately identify the current status of spilled oil. To this end, the Coast Guard patrols the target area with a fixed-wing airplane or helicopter and checks it with the naked eye or video, but it was difficult to determine the area contaminated by the spilled oil and its exact location on the map. Accordingly, this study develops a technology for direct ortho-rectification by automatically geo-referencing aerial images collected by the Coast Guard without individual ground reference points to identify the current status of spilled oil. First, meta information required for georeferencing is extracted from a visualized screen of sensor information such as video by optical character recognition (OCR). Based on the extracted information, the external orientation parameters of the image are determined. Images are individually orthorectified using the determined the external orientation parameters. The accuracy of individual orthoimages generated through this method was evaluated to be about tens of meters up to 100 m. The accuracy level was reasonably acceptable considering the inherent errors of the position and attitude sensors, the inaccuracies in the internal orientation parameters such as camera focal length, without using no ground control points. It is judged to be an appropriate level for identifying the current status of spilled oil contaminated areas in the sea. In the future, if real-time transmission of images captured during flight becomes possible, individual orthoimages can be generated in real time through the proposed individual orthorectification technology. Based on this, it can be effectively used to quickly identify the current status of spilled oil contamination and establish countermeasures.

The Effects of Whole-task Sequencing Emphasis Manipulation on Expertise Acquisition in Web Based Complex Task (웹기반 복합적 과제에서 전체과제 계열화 강조변화 방법이 전문성 향상에 미치는 영향)

  • Kim, Kyung-Jin;Kim, Kyung
    • Journal of The Korean Association of Information Education
    • /
    • v.20 no.6
    • /
    • pp.629-644
    • /
    • 2016
  • The purpose of this study was to investigate the effects of whole-task sequencing emphasis manipulation on expertise acquisition in web based complex task. To achieve the purpose, emphasis manipulation sequencing type is composed of a simple emphasis manipulation, a snowballing manipulation, and a full emphasis manipulation sequencing and participants was drawn from a pool of 93 undergraduate students sampled for the study. According to the findings, a snowballing manipulation group invested significantly lower cognitive load than a full emphasis manipulation group but did not a simple emphasis manipulation group. Based on these findings, though complex task is included of high interactivity owing to real task, learner cannot suffer cognitive overload because emphasis manipulation which can view the whole task and the part task in parallel provides meta cognition for learner. And whole-task sequencing emphasis manipulation affects to transfer. The snowballing emphasis manipulation group invested significantly higher than simple emphasis manipulation group and full emphasis manipulation group. Based on these findings, the snowballing manipulation which learner use whole-task sequencing and part-task sequencing simultaneously contribute to understandings and ability to solve problems for complex task and it will in turn, lead to expertise acquisition.

Big Data Based Dynamic Flow Aggregation over 5G Network Slicing

  • Sun, Guolin;Mareri, Bruce;Liu, Guisong;Fang, Xiufen;Jiang, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.4717-4737
    • /
    • 2017
  • Today, smart grids, smart homes, smart water networks, and intelligent transportation, are infrastructure systems that connect our world more than we ever thought possible and are associated with a single concept, the Internet of Things (IoT). The number of devices connected to the IoT and hence the number of traffic flow increases continuously, as well as the emergence of new applications. Although cutting-edge hardware technology can be employed to achieve a fast implementation to handle this huge data streams, there will always be a limit on size of traffic supported by a given architecture. However, recent cloud-based big data technologies fortunately offer an ideal environment to handle this issue. Moreover, the ever-increasing high volume of traffic created on demand presents great challenges for flow management. As a solution, flow aggregation decreases the number of flows needed to be processed by the network. The previous works in the literature prove that most of aggregation strategies designed for smart grids aim at optimizing system operation performance. They consider a common identifier to aggregate traffic on each device, having its independent static aggregation policy. In this paper, we propose a dynamic approach to aggregate flows based on traffic characteristics and device preferences. Our algorithm runs on a big data platform to provide an end-to-end network visibility of flows, which performs high-speed and high-volume computations to identify the clusters of similar flows and aggregate massive number of mice flows into a few meta-flows. Compared with existing solutions, our approach dynamically aggregates large number of such small flows into fewer flows, based on traffic characteristics and access node preferences. Using this approach, we alleviate the problem of processing a large amount of micro flows, and also significantly improve the accuracy of meeting the access node QoS demands. We conducted experiments, using a dataset of up to 100,000 flows, and studied the performance of our algorithm analytically. The experimental results are presented to show the promising effectiveness and scalability of our proposed approach.

Estimation of Forest Management Ratio under Article 3.4 of the Kyoto Protocol: A Case Study on the Chungcheongbuk-do (교토의정서 제3조 4항의 산림경영율 추정방안 및 사례분석 - 충청북도를 대상으로 -)

  • Kim, Hyungho;Kang, Hyeondeug;Kim, Rae Hyun;Kim, Cheol Min;Koh, Kwang Chul;Lee, Kyeong Hak
    • Journal of Korean Society of Forest Science
    • /
    • v.102 no.4
    • /
    • pp.608-616
    • /
    • 2013
  • The objective of this study was to suggest contingent valuation method, simple random sampling method, systematic sampling method, maximum practice area method, and overlay practice area method as the estimation methods for forest management area to estimate carbon dioxide sink by forest management as stated in Article 3.4 of the Kyoto Protocol. A case study for Chungcheongbuk-do was performed using maximum practice area method which was thought of as the most rational method within MRV(Measurable, reportable and verifiable). The forest management ratio was defined as forest management area over the total forest area. Based on the definition of forest management activity, forest area was divided into practice forest land and non-practice forest land. The area of forest mangement for practices was based on the 'National Forest Management Information System' and the history of practices from the 'Proposals on Private Management Information Database'. The area of forest management for non-practices was based on the public used forest land from 'Categorial map of forest land'. It was shown that the forest management area of Chuncheongbuk-do was 115,566 ha for practice forest land, and 131,008 ha for non-practice forest land. The forest managent ratio was 49.7% of the total forest area of 495,806 ha. This study made possible to the estimation of the forest management ratio under Kyoto Protocol, and had an advantage in searching for a practical method of forest management plan in which the forest management ratio could be enhanced.

Relationship between Cognitive Anxiety and Performance in Closed Loop Skill Sports (폐쇄기술 스포츠의 인지불안과 수행력의 관계 : 메타분석)

  • Kang, Kyoung Doo;Jung, Hye Yeon;Ha, Eun Joo;Han, Doug Hyun
    • Korean Journal of Psychosomatic Medicine
    • /
    • v.25 no.1
    • /
    • pp.19-26
    • /
    • 2017
  • Objectives : The aim of this meta-analysis study was to examine the relationship between cognitive anxiety and performance in closed loop skill sports. Methods : A comprehensive literature search was conducted using databases including Korean Information Service System, DBpia, Research Information Sharing Service, and National Assembly Library from 1980 to 2015. Search terms included 'Golf', 'Shooting', 'Archery', 'Anxiety', and 'Performance'. Standardized mean difference and 95% CI(confidence intervals) were calculated, and the heterogeneity of the studies was estimated using Q statistic. Results : Ten studies have satisfied the inclusion criteria. The main findings indicate that cognitive anxiety was significantly reverse correlated with performance in closed loop skill sports(r=-.198). The mean effect size for men(r=-.31) was significantly greater than that for women(r=-.05). Conclusions : Our results suggest that cognitive anxiety in closed loop skill sports is correlated with performance of athletes. Future study related to psychological aspects on athletes in sports is required in order to understand the specific evidence of relationship between anxiety and performance.

The Design of Fault Tolerant System for Semantic Web based Visual Media Retrieval Framework (분산 시각미디어 검색 프레임워크를 위한 결함허용 시스템 설계)

  • Jin, Hyu-Jeong;Shim, J.Y.;Kim, S.C.;Won, J.H.;Kim, Jung-Sun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10b
    • /
    • pp.228-232
    • /
    • 2006
  • Ontology를 이용한 분산 시각미디어 검색 프레임워크인 HERMES(The Retrieval Framework for Visual Media Service)[1][2]는 보다 정확한 시각미디어 정보를 제공하고 웹서비스(Web Services)를 적용하여 HERMES/Provider[1][2]의 자율성을 보장한다. 웹기반의 분산 환경에서 Visual Media Data에 대한 지능적인 검색을 위하여 Meta Data와 Ontology를 이용하고 이기종간 통신을 위한 웹서비스를 제공하는 HERMES/ Broker[1][2]에서 예상치 못한 문제가 발생할 경우 문제를 해결할 수 있는 방법이 제시되지 않았다. 일반적으로 웹 서비스를 제공하는 서버에서 발생되는 결함은 해당 웹 서비스를 이용하여 개발되는 어플리케이션의 갑작스런 중단이나 오류의 원인이 된다. 따라서 결함을 해결할 수 있는 대책이 필요하며 HERMES의 Broker 서버 또한 웹 서비스의 결함이 발생하더라고 이를 효과적으로 해결하여 클라이언트에게 웹 서비스를 정상적으로 제공할 수 있는 결함허용 시스템 도입이 매우 중요하다. 때문에 HERMES 프레임워크가 클라이언트에게 신뢰성과 안정성이 보장된 웹 서비스의 제공을 위해서 Broker 서버에서 발생할 수 있는 결함을 효과적으로 극복할 수 있는 메커니즘이 필요하다. 본 논문에서는 Broker 서버 에서 웹 서비스와 관련된 결함이 발생하더라고 올바르게 운영될 수 있으며 분산 이미지 검색 프레임워크인 HERMES의 구조적 특성에 적합한 결함허용 시스템 설계 기법을 제안하여 HERMES 프레임워크가 클라이언트에게 투명성 있는 서비스를 제공하고 높은 신뢰성과 안정성이 확보될 수 있도록 구성하고자 한다. Query 수행을 여러 서버로 분산처리하게 함으로써 성능에 대한 신뢰성을 향상 시킬 수 있는 Load Balancing System을 제안한다.할 때 가장 효과적인 라우팅 프로토콜이라고 할 수 있다.iRNA 상의 의존관계를 분석할 수 있었다.수안보 등 지역에서 나타난다 이러한 이상대 주변에는 대개 온천이 발달되어 있었거나 새로 개발되어 있는 곳이다. 온천에 이용하고 있는 시추공의 자료는 배제하였으나 온천이응으로 직접적으로 영향을 받지 않은 시추공의 자료는 사용하였다 이러한 온천 주변 지역이라 하더라도 실제는 온천의 pumping 으로 인한 대류현상으로 주변 일대의 온도를 올려놓았기 때문에 비교적 높은 지열류량 값을 보인다. 한편 한반도 남동부 일대는 이번 추가된 자료에 의해 새로운 지열류량 분포 변화가 나타났다 강원 북부 오색온천지역 부근에서 높은 지열류량 분포를 보이며 또한 우리나라 대단층 중의 하나인 양산단층과 같은 방향으로 발달한 밀양단층, 모량단층, 동래단층 등 주변부로 NNE-SSW 방향의 지열류량 이상대가 발달한다. 이것으로 볼 때 지열류량은 지질구조와 무관하지 않음을 파악할 수 있다. 특히 이러한 단층대 주변은 지열수의 순환이 깊은 심도까지 가능하므로 이러한 대류현상으로 지표부근까지 높은 지온 전달이 되어 나타나는 것으로 판단된다.의 안정된 방사성표지효율을 보였다. $^{99m}Tc$-transferrin을 이용한 감염영상을 성공적으로 얻을 수 있었으며, $^{67}Ga$-citrate 영상과 비교하여 더 빠른 시간 안에 우수한 영상을 얻을 수 있었다. 그러므로 $^{99m}Tc$-transierrin이 감염 병소의 영상진단에 사용될 수

  • PDF