• Title/Summary/Keyword: 뉴스웹

Search Result 171, Processing Time 0.026 seconds

Development and Operation of Marine Environmental Portal Service System (해양환경 포탈서비스시스템 구축과 운영)

  • 최현우;권순철
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.338-341
    • /
    • 2003
  • According to a long-term master plan for the implementing of MOMAF's marine environmental informatization, we have developed marine environment portal web site which consists of 7 main-menu and 39 sub-menu including various types of contents (text, image and multimedia) based on RDBMS. This portal site was opened in Oct., 2002 (http://www.meps.info). Also, for the national institutions' distributed DB which is archived and managed respectively the marine chemical data and biological data, the integrated retrieval system was developed. This system is meaningful for the making collaborative use of real data and could be applied for data mining, marine research, marine environmental GIS and making-decisions.

  • PDF

Analysis and Visualization for Comment Messages of Internet Posts (인터넷 게시물의 댓글 분석 및 시각화)

  • Lee, Yun-Jung;Ji, Jeong-Hoon;Woo, Gyun;Cho, Hwan-Gue
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.7
    • /
    • pp.45-56
    • /
    • 2009
  • There are many internet users who collect the public opinions and express their opinions for internet news or blog articles through the replying comment on online community. But, it is hard to search and explore useful messages on web blogs since most of web blog systems show articles and their comments to the form of sequential list. Also, spam and malicious comments have become social problems as the internet users increase. In this paper, we propose a clustering and visualizing system for responding comments on large-scale weblogs, namely 'Daum AGORA,' using similarity analysis. Our system shows the comment clustering result as a simple screen view. Our system also detects spam comments using Needleman-Wunsch algorithm that is a well-known algorithm in bioinformatics.

Enhancing Classification Performance of Temporal Keyword Data by Using Moving Average-based Dynamic Time Warping Method (이동 평균 기반 동적 시간 와핑 기법을 이용한 시계열 키워드 데이터의 분류 성능 개선 방안)

  • Jeong, Do-Heon
    • Journal of the Korean Society for information Management
    • /
    • v.36 no.4
    • /
    • pp.83-105
    • /
    • 2019
  • This study aims to suggest an effective method for the automatic classification of keywords with similar patterns by calculating pattern similarity of temporal data. For this, large scale news on the Web were collected and time series data composed of 120 time segments were built. To make training data set for the performance test of the proposed model, 440 representative keywords were manually classified according to 8 types of trend. This study introduces a Dynamic Time Warping(DTW) method which have been commonly used in the field of time series analytics, and proposes an application model, MA-DTW based on a Moving Average(MA) method which gives a good explanation on a tendency of trend curve. As a result of the automatic classification by a k-Nearest Neighbor(kNN) algorithm, Euclidean Distance(ED) and DTW showed 48.2% and 66.6% of maximum micro-averaged F1 score respectively, whereas the proposed model represented 74.3% of the best micro-averaged F1 score. In all respect of the comprehensive experiments, the suggested model outperformed the methods of ED and DTW.

Time-Series based Dataset Selection Method for Effective Text Classification (효율적인 문헌 분류를 위한 시계열 기반 데이터 집합 선정 기법)

  • Chae, Yeonghun;Jeong, Do-Heon
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.1
    • /
    • pp.39-49
    • /
    • 2017
  • As the Internet technology advances, data on the web is increasing sharply. Many research study about incremental learning for classifying effectively in data increasing. Web document contains the time-series data such as published date. If we reflect time-series data to classification, it will be an effective classification. In this study, we analyze the time-series variation of the words. We propose an efficient classification through dividing the dataset based on the analysis of time-series information. For experiment, we corrected 1 million online news articles including time-series information. We divide the dataset and classify the dataset using SVM and $Na{\ddot{i}}ve$ Bayes. In each model, we show that classification performance is increasing. Through this study, we showed that reflecting time-series information can improve the classification performance.

Design and Implementation of Mobile Contents to provide Marine Leisure Information (해양레저정보를 제공하기 위한 모바일 콘텐츠의 설계 및 구현)

  • Jeong, Seong-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.1
    • /
    • pp.11-18
    • /
    • 2009
  • As a marine leisure industry has being developed and demands for leisure culture have rapidly increased, the needs for services offering marine safety and related information are growing. Accordingly, in the study I developed the contents providing server to support this with ENC agent who presents geographical information of digitalized Electronic Nautical Chart satisfying with the standard(S-57) by International Hydrographic Organization and a web searching agent who builds a database by collecting marine-related information in order to provide a variety of realtime information such as weather, fishing and news. In addition, I designed and embodied network based mobile contents which can be presented on a WIPI(Wireless Internet Platform for Interoperability) based portable handset by receiving an ENC and other processed information from server. With the results produced by such experiments, I measured a compressibility corresponding to a image compression format of electronic nautical chart transmitted and analyzed the correlation between increase in packets of requested information and the cost.

  • PDF

An Automatic Classification System of Korean Documents Using Weight for Keywords of Document and Word Cluster (문서의 주제어별 가중치 부여와 단어 군집을 이용한 한국어 문서 자동 분류 시스템)

  • Hur, Jun-Hui;Choi, Jun-Hyeog;Lee, Jung-Hyun;Kim, Joong-Bae;Rim, Kee-Wook
    • The KIPS Transactions:PartB
    • /
    • v.8B no.5
    • /
    • pp.447-454
    • /
    • 2001
  • The automatic document classification is a method that assigns unlabeled documents to the existing classes. The automatic document classification can be applied to a classification of news group articles, a classification of web documents, showing more precise results of Information Retrieval using a learning of users. In this paper, we use the weighted Bayesian classifier that weights with keywords of a document to improve the classification accuracy. If the system cant classify a document properly because of the lack of the number of words as the feature of a document, it uses relevance word cluster to supplement the feature of a document. The clusters are made by the automatic word clustering from the corpus. As the result, the proposed system outperformed existing classification system in the classification accuracy on Korean documents.

  • PDF

Detecting Spam Data for Securing the Reliability of Text Analysis (텍스트 분석의 신뢰성 확보를 위한 스팸 데이터 식별 방안)

  • Hyun, Yoonjin;Kim, Namgyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.2
    • /
    • pp.493-504
    • /
    • 2017
  • Recently, tremendous amounts of unstructured text data that is distributed through news, blogs, and social media has gained much attention from many researchers and practitioners as this data contains abundant information about various consumers' opinions. However, as the usefulness of text data is increasing, more and more attempts to gain profits by distorting text data maliciously or nonmaliciously are also increasing. This increase in spam text data not only burdens users who want to obtain useful information with a large amount of inappropriate information, but also damages the reliability of information and information providers. Therefore, efforts must be made to improve the reliability of information and the quality of analysis results by detecting and removing spam data in advance. For this purpose, many studies to detect spam have been actively conducted in areas such as opinion spam detection, spam e-mail detection, and web spam detection. In this study, we introduce core concepts and current research trends of spam detection and propose a methodology to detect the spam tag of a blog as one of the challenging attempts to improve the reliability of blog information.

Online learning Assessment System using a Hybrid-App (하이브리드 앱을 이용한 온라인 학습 평가 시스템)

  • Bang, Jin-Suk;Choi, Kwang-Il;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.638-641
    • /
    • 2013
  • In college, you can view the online quiz through the cyber education, and online learning. However, if there is no computer has a problem that can not be many students it is in place or not the Internet watch online quizzes. In recent years, many college students have a smart phone, from anywhere, using smartphone, you have utilized various Web surfing, news, and Messenger. In addition, office workers and students, have to learn to put to PDF necessary materials through the smartphone. Advantage of smart phones, have a feature that can be easy to carry and use anywhere at any time. Online learning from anywhere via a smart phone, so that you can see the online quizzes, in this paper, the system that not only online quizzes through a smartphone using the Hybrid-App, you can see in real time the results and scores of the person I proposed.

  • PDF

The Result of Question Investigation about the Awareness of Light Pollution in Korea

  • Cho, Jaesang;Lee, Won-Chul;Lim, Hyung-Jin;Sul, Ah-Chim
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.39 no.1
    • /
    • pp.89.1-89.1
    • /
    • 2014
  • 빛공해란, 불필요하거나 필요 이상의 인공빛이 야생 동식물들과 우리 인간들에게 악영향을 미치는 현상을 말하며, 실생활에서 인공빛 에너지를 목적에 맞지 않게 사용하는 것이 이 현상의 주요 원인이라고 할 수 있다. 빛공해 현상은 야생 동식물들에게 악영향을 주어 개체수를 감소시킬뿐만 아니라 멸종에까지 이르게 할 수 있으며, 지구 자전의 영향으로 하루 24시간 주기로 설정되어 있는 우리 인간의 생체리듬을 교란시켜 암, 비만, 당뇨병, 그리고 우울증 등과 같은 인간의 목숨을 위협할 수 있는 질병들을 일으키기도 한다. 하지만 인공빛을 목적에 맞게 올바르게 사용한다면 그로 인해 절약된 에너지와 그 비용을 다른 필요한 분야에 대체하여 사용할 수 있을 것이다. 우리는 과거의 빛공해 관련 논문과 보고서의 설문조사 결과를 통하여 빛공해로 인한 피해와 에너지 낭비 문제가 빛공해에 대한 일반 시민들의 무관심으로부터 발생하고 있다는 사실을 확인할 수 있었다. 따라서 우리는 빛공해에 대한 일반 시민들의 인식 변화를 알아보기 위하여 기존에 진행된 설문조사와 같은 문답내용의 설문조사를 올해 다시 실시하였다. 그 설문조사의 결과를 통하여 우리는 과거보다 빛공해에 대한 인식이 많이 확산되어 있다는 사실을 알 수 있었으며, 그 이유로는 최근 빛공해와 관련된 많은 뉴스 기사들과 함께 웹상의 소셜네트워크와 같은 다양한 경로의 정보매체들을 통하여 빛공해에 대한 정보를 보다 빠르고 쉽게 접할 수 있는 환경이 조성되었기 때문이라고 분석하였다. 빛공해 인식 확산에 더욱 더 기여하기 위하여 최근에 우리는 국제 어두운 밤하늘 협회 한국 지부 (Korean Chapter, International Dark-Sky Association) 인가를 받아 그 단체 이름으로 빛공해 방지 홍보 사업을 온라인과 오프라인을 통하여 보다 더 활발히 진행하기 위하여 많은 노력을 하고 있다.

  • PDF

Browser fuzzing and analysis using known vulnerability (소프트웨어 취약점의 종류와 탐색 방법)

  • Kim, Nam-gue;Kim, Hyun Ho;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.753-756
    • /
    • 2015
  • Internet technology is universal, news from the Web browser, shopping, search, etc., various activities have been carried out. Its size becomes large, increasing the scale of information security incidents, as damage to this increases the safety for the use of the Internet is emphasized. IE browser is ASLR, such as Isolated Heap, but has been continually patch a number of vulnerabilities, such as various protection measures, this vulnerability, have come up constantly. And, therefore, in order to prevent security incidents, it is necessary to be removed to find before that is used to exploit this vulnerability. Therefore, in this paper, we introduce the purge is a technique that is used in the discovery of the vulnerability, we describe the automation technology related thereto. And utilizing the known vulnerabilities, and try to show any of the typical procedures for the analysis of the vulnerability.

  • PDF