• Title/Summary/Keyword: 사용행위

Search Result 1,872, Processing Time 0.049 seconds

Aspects of Korean and English Translation of 'KURERU' in the Novel - about NATSUMESOSEKI 『KOKORO』 (소설 속의 'くれる類'동사에 대한 한국어와 영어의 번역양상 - 하목수석(夏目漱石)의 『こころ』를 중심으로 -)

  • Yang, Jungsoon
    • Cross-Cultural Studies
    • /
    • v.46
    • /
    • pp.327-353
    • /
    • 2017
  • This study analyzed how an aspect of translation can be shown on the 'Kureru type(くれる類)' verbs in "Kokoro", which was a Japanese modern novel when it was reproduced by translators. It focused on 'the use in accordance with a subject of expression and the other person' and 'the object of movement'. 'The use in accordance with a subject of expression and the other person' could be summarized as follows: The 'Kureru type' verbs were not translated only in accordance with the use of vocabulary in a dictionary. 'Kudasaru' was used in many examples of letter writing when 'the giver' was younger and it was translated to a polite form in Korean. 'Kureru' had a characteristic when 'the giver' was older in Korean translation. The act of parents was translated to an honorific form if parents were 'givers' regardless of whether a listener was an internal character or an external character in parent-child relationships. The degree of politeness was different in English translation when the 'Kureru type' verbs were used for asking a favor request command. 'Please' was used more for 'Kudasaru' than 'Kureru'. An aspect of translation in accordance with 'the object of movement' could be summarized as follows: The 'Kureru type' verbs were used as main verbs. 'Kureru' and 'Kudasaru' were translated to 'Juda' 'Jusida' in Korean translation, but they were translated to various vocabulary words in accordance with the characteristic of 'the object of movement' and were translated to imply a specific act, the process of possession and the result of possession in English translation. The 'Kureru type' verbs were also used as auxiliary verbs. The translated vocabulary words for Korean translation and English translation were different in accordance with whether the movement of things other than the movement of act was included or not. Examples were translated predominantly to expressions of profit such as '-Jada' '-Dalla' '-Jusida' when there was a movement of act as well as specific things in Korean translation. Also, some examples were translated to expressions of profit when there was the movement of act with an abstract matter and there was only the act of the object of movement, but many examples were translated to the act of first verbs. Examples were translated predominantly to the act of first verbs when there was the movement which included specific things and abstract matters or there was only the movement of act in English translation. Expressions of asking a favor request such as 'Kureru' and 'Kudasaru' were translated to '-Dalla' '-Juseyo' in Korean translation, but they were translated to expressions which specify an act while focusing on the structure of sentences or the function of language, such as 'must', 'ask', 'wish', 'would', and 'would like to' 'please' in English translation.

A Study on Anomaly Detection based on User's Command Analysis (사용자 명령어 분석을 통한 비정상 행위 판정에 관한 연구)

  • 윤정혁;오상현;이원석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.59-71
    • /
    • 2000
  • Due to the advance of computer and communication technology, intrusions or crimes using a computer have been increased rapidly while various information has been provided to users conveniently. As a results, many studies are necessary to detect the activities of intruders effectively. In this paper, a new association algorithm for the anomaly detection model is proposed in the process of generating user\`s normal patterns. It is that more recently observed behavior get more affection on the process of data mining. In addition, by clustering generated normal patterns for each use or a group of similar users, it is possible to identify the usual frequency of programs or command usage for each user or a group of uses. The performance of the proposed anomaly detection system has been tested on various system Parameters in order to identify their practical ranges for maximizing its detection rate.

A Study on the Factors Affecting User Behavior of Internet Medical Apps (인터넷 의료 애플리케이션 사용 행위에 영향을 미치는 요소에 관한 연구)

  • Han, Xiao;Lee, Hong;Kim, Hyeong-woo
    • Smart Media Journal
    • /
    • v.9 no.4
    • /
    • pp.81-90
    • /
    • 2020
  • Due to the recent economic development and the improvement of income level in China, the desire for quality medical services is increasing compared to the past. As an alternative to satisfy these needs, various applications using smart phones and the like are being developed. The new corona that occurred in December 2019 began to show great interest in non-face-to-face telemedicine services using smart phones due to the worldwide spread of the coronavirus. Therefore, in this study, a total of 200 people were surveyed on the top three mobile medical applications in China, and the data of 120 people who actually used medical applications were analyzed based on Venkatesh's UTAUT2 theory. A study was conducted on the intent to use and the factors affecting the in-law behavior. First, it has become clear that the interactive characteristics, expectations for effort, price value, interest in privacy, habits, and promotional conditions have a positive impact on the user's use. Second, it was investigated that the user's intention to use influences the behavior of use, and among the intentions of use, it was found that the mobilization characteristic expectation, hedonistic motivation, price value, habits, and promotion conditions affect the use behavior. Third, a study result was derived that the controlling variables such as gender, age, school age, and annual income do not affect the user's intention to use mobile medical applications as a controlling variable. Finally, due to the nature of mobile devices that use the Internet, various security vulnerabilities exist, and this can cause great damage or personal and social impact. Therefore, for the development of mobile medical services in China, it is necessary to re-establish a research model through comprehensive and in-depth considerations to supplement these problems in the future.

Pattern Validation using Temporal Logic for Fraud Detection (부정행위 탐색을 위한 시간 논리 기반의 패턴 유효성 검사 방법)

  • 이건수;김민구;이형수
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.148-150
    • /
    • 2004
  • 부정행위 탐지는 개별 사용자의 행동 기록과 그 사용자와 유사한 프로필을 갖고 있는 사용자들의 행동 기록을 바탕으로 행동 패턴 혹은 행동 규칙을 찾아내, 이 패턴/규칙과의 비교를 통해 현재 행위가 부정한 것인지를 결정하는 방법을 주로 사용한다. 그러나, 특정 사용자의 행위패턴이 급격하게 바뀌는 경우, 과거의 기록을 바탕으로 생성된 패턴의 유효성은 보장받을 수 없다. 더구나 기존 기록과 상이한 행위에 대한 새로운 패턴이 생성되기 위해서는 계속해서 그런 행위가 쌓여야만 하고, 그 쌓이는 양은 기존 패턴의 견고성에 비례된다. 또한 동일 사용자에게 털러 패턴을 적용시키는 방법 역시 패턴간의 충돌이 일어나는 등의 한계가 존재한다. 본 논문에서는 시간 논리(Temporal Logic)를 적용하여, 과거의 패턴의 유효성을 검증하고 신규패턴을 빠르게 찾아내는 방법을 제안하고자 한다.

  • PDF

A Study on Hierarchical Avatar Behavior Representation and Control Technique (계층적 아바타 행위 표현 및 제어 기법에 관한 연구)

  • 김재경;오재균;임순범;최윤철
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2004.05a
    • /
    • pp.538-541
    • /
    • 2004
  • 아바타는 최근 각광 받고 있는 기술로서 다양한 분야에서 많은 활용 및 발전이 기대된다. 그러나 현재 아바타 행위 표현 및 제어에는 체계적이고 표준적인 접근 방식이 결여되어 있어 아바타 행위 표현의 어려움이 있는 실정이다 본 논문에서는 다양한 도메인 환경에서 아바타의 제어를 보다 용이하게 하기위해서 아바타 행위 표현의 계층적인 접근 방식을 제안하였다. 이를 위해 작업레벨 스크립트를 정의하여 특정 도메인에서 필요한 작업을 수행하기위한 행위들을 표현하고 추상적인 표현방식의 상위레벨 모션 및 물리적 표현형식의 기본 모션 스크립트를 정의하였다. 이와 같은 접근 방식을 통하여 사용자 측면에서 보다 쉽게 아바타의 행위를 제어할 수 있으며, 계층적인 표현 및 제어방식으로 아바타 모션의 사용자의 제어 용이성, 스크립트의 확장성 및 재사용성을 높였다.

  • PDF

Automatic generation of web system behavioral model using web server log (웹 서버 로그를 이용한 웹 시스템 행위 모델 자동 생성)

  • Yoon, Young-Dong;Bae, Jung-Ho;Chae, Heung-Suk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.990-993
    • /
    • 2013
  • 웹 시스템의 사용자들이 웹을 이용하면 그에 대한 기록이 웹 서버에 남는다. 기록된 웹 서버 로그를 분석하면 웹 시스템에 어떤 부류의 사용자가 있는지 각 사용자들이 어떤 방식으로 웹 시스템을 사용하는지 알 수 있다. 이러한 사용자들의 행위를 행위 모델로 표현할 수 있다면 웹 시스템에 대한 명세가 없더라도 행위 모델을 분석하여 시스템의 명세를 추정하고 테스트하기 용이해진다. 뿐만 아니라 웹 시스템 사용자들의 사용자 별 이용 패턴 및 통계정보 역시 알 수 있다. 그러나 웹 서버 로그를 일일이 담당자가 분석하여 행위 모델을 생성하기에 웹 서버 로그는 그 양이 너무 방대하다. 따라서 본 논문은 웹 서버 로그를 이용하여 웹 시스템의 행위 모델을 자동 생성하는 방법에 대해서 제시한다.

Design of Stream Data Processing Operators for Real-time Activity Recognition System (실시간 행위인식 시스템을 위한 스트림데이터 처리기 연산자 설계)

  • Jeong, Jongyoung;Lee, Young-Koo;Han, Yong-koo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.302-305
    • /
    • 2009
  • 본 논문은 오프라인 환경에서 연구되던 행위인식 연구들이 온라인 환경에서 통합되어 동작할 수 있도록 하기 위해 스트림데이터 처리기를 이용한 행위인식 시스템을 제안하였다. 스트림데이터 처리는 멀티 센서 환경에서의 방대한 센서 데이터를 처리하기 위한 기술로서, 행위인식 시스템의 실시간으로 발생하는 데이터를 즉각 처리하여 결과를 추론하여야 한다는 요구사항을 만족시킬 수 있다. 이를 위해 행위인식에 사용되는 필수적인 연산을 정의하여 스트림데이터 처리기에 추가할 수 있도록 행위 인식에 필요한 각종 연산자를 설계하였다.

Violent Behavior Detection using Motion Analysis in Surveillance Video (감시 영상에서 움직임 정보 분석을 통한 폭력행위 검출)

  • Kang, Joohyung;Kwak, Sooyeong
    • Journal of Broadcast Engineering
    • /
    • v.20 no.3
    • /
    • pp.430-439
    • /
    • 2015
  • The demand of violence detection techniques using a video analysis to help prevent crimes is increasing recently. Many researchers have studied vision based behavior recognition but, violent behavior analysis techniques usually focus on violent scenes in television and movie content. Many methods previously published usually used both a color(e.g., skin and blood) and motion information for detecting violent scenes because violences usually involve blood scenes in movies. However, color information (e.g., blood scenes) may not be useful cues for violence detection in surveillance videos, because they are rarely taken in real world situations. In this paper, we propose a method of violent behavior detection in surveillance videos using motion vectors such as flow vector magnitudes and changes in direction except the color information. In order to evaluate the proposed algorithm, we test both USI dataset and various real world surveillance videos from YouTube.

Deadlock Detection of Software System Using UML State Machine Diagram (UML State Machine Diagram을 이용한 소프트웨어 시스템의 데드락 탐지)

  • Min, Hyun-Seok
    • Journal of Convergence Society for SMB
    • /
    • v.1 no.1
    • /
    • pp.75-83
    • /
    • 2011
  • Unified Modeling Language (UML) is widely accepted in industry and particularly UML State Machine Diagram is popular for describing the dynamic behavior of classes. This paper discusses deadlock detection of System using UML State Machine Diagram. Since a State Machine Diagram is used for indivisual class' behavior, all the State Machine Diagrams of the classes in the system are combined to make a big system-wide State Machine Diagram to describe system behavior. Generally this system-wide State Machine Diagram is very complex and contains invalid state and transitions. To make it a usable and valid State Machine Diagram, synchronization and externalization are applied. The reduced State Machine Diagram can be used for describing system behavior thus conventional model-checking technique can be applied. This paper shows how deadlock detection of system can be applied with simple examples. All the procedures can be automatically done in the tool.

  • PDF

Context Awareness Model using the Improved Google Activity Recognition (개선된 Google Activity Recognition을 이용한 상황인지 모델)

  • Baek, Seungeun;Park, Sangwon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.1
    • /
    • pp.57-64
    • /
    • 2015
  • Activity recognition technology is gaining attention because it can provide useful information follow user's situation. In research of activity recognition before smartphone's dissemination, we had to infer user's activity by using independent sensor. But now, with development of IT industry, we can infer user's activity by using inner sensor of smartphone. So, more animated research of activity recognition is being implemented now. By applying activity recognition system, we can develop service like recommending application according to user's preference or providing information of route. Some previous activity recognition systems have a defect using up too much energy, because they use GPS sensor. On the other hand, activity recognition system which Google released recently (Google Activity Recognition) needs only a few power because it use 'Network Provider' instead of GPS. Thus it is suitable to smartphone application system. But through a result from testing performance of Google Activity Recognition, we found that is difficult to getting user's exact activity because of unnecessary activity element and some wrong recognition. So, in this paper, we describe problems of Google Activity Recognition and propose AGAR(Advanced Google Activity Recognition) applied method to improve accuracy level because we need more exact activity recognition for new service based on activity recognition. Also to appraise value of AGAR, we compare performance of other activity recognition systems and ours and explain an applied possibility of AGAR by developing exemplary program.