• Title/Summary/Keyword: 시각정보체계

Search Result 439, Processing Time 0.025 seconds

Debelppment of C++ Compiler and Programming Environment (C++컴파일러 및 프로그래밍 환경 개발)

  • Jang, Cheon-Hyeon;O, Se-Man
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.3
    • /
    • pp.831-845
    • /
    • 1997
  • In this paper,we proposed and developed a compiler and interactive programming enviroments for C++ wich is mostly worth of nitice among the object -oriented languages.To develope the compiler for C++ we took front=end/back-end model using EM virtual machine.In develpoing Front-End,we formailized C++ gram-mar with the context semsitive tokens which must be manipulated by dexical scanner and designed a AST class li-brary which is the hierarchy of AST node class and well defined interface among them,In develpoing Bacik-End,we proposed model for three major components :code oprtimizer,code generator and run-time enviroments.We emphasized the retargatable back-end which can be systrmatically reconfigured to genrate code for a variety of distinct target computers.We also developed terr pattern matching algorithm and implemented target code gen-erator which produce SPARC code.We also proposed the theroy and model for construction interative pro-gramming enviroments. To represent language features we adopt AST as internal reprsentation and propose uncremental analysis algorithm and viseal digrams.We also studied unparsing scheme, visual diagram,graphical user interface to generate interactive environments automatically Results of our resarch will be very useful for developing a complier and programming environments, and also can be used in compilers for parallel and distributed enviroments.

  • PDF

A Study on the Korean National Police's Protesting Policing Policy through the Analysis of Negotiated Management Model (협의관리모델 분석을 통한 한국 경찰의 집회시위 관리정책 연구)

  • Hwang, Kyu-Jin;Kim, Hak-Kyong
    • Convergence Security Journal
    • /
    • v.11 no.2
    • /
    • pp.65-77
    • /
    • 2011
  • In Western Europo and the US, there has been a general trend over 30 years of reducing the amount of force by the police, through a paradigm shift from 'Escalated Force Model' towards 'Negotiated Management Model'. In tune with this trend, for example, the Swedish Police have implemented the uniformed 'Dialogue Police' system, in order to establish communication contact with demonstrators, before, during, and after their events, The Negotiated Management Model involves a greater respect for the rights of protesters, a more tolerant approach to community, and improved intelligence, communication, and flexibility, in order to facilitate lawful protests and to reduce the possibility of an escalation of major public disorder. The Korean National Police (KNP) appears to be operated within this negotiated management framework, since in preparation for the G20 Seoul Summit, they have also emphasized good communication between the police and protest groups, by newly creating the concept of 'Protest Policing Through Facilitation of Lawful Protests'. In this context, this study first attempts to analyze not only the negotiated management model, but also the Swedish dialogue police. Secondly, the study conducts a comparative study between the KNP's Protest Policing Through Facilitation of Lawful Protest and the Swedish dialogue police system, particularly, in conjunction with the negotiated management. Although Korean and western police have different system and history, protest policing model is now approaching with each other through a link between conflict resolution techniques, such as dialogue, negotiation, mediation and facilitation. Finally, the study is to prove if the KNP's protest policing model corresponds with the negotiated management model, and further to suggest new 'Facilitation of Conflict Resolution Model' as a desirable future of the KNP's protest policing.

Model Design and Applicability Analysis of Interactive Electronic Technical Manual for Planning Stage of Construction Projects (건설공사 기획단계 전자매뉴얼의 적용 모형 구성 및 효과 분석)

  • Kwak, Joong-Min;Kang, Leen-Seok
    • Land and Housing Review
    • /
    • v.12 no.2
    • /
    • pp.121-139
    • /
    • 2021
  • Technical documents in the construction field are changing from paper documents to electronic ones. As a result, the industry witnesses a trend of using portable electronic devices in searching or retrieving necessary information such as relevant regulations. Despite the improvement in the accessibility to general technical documents, a limitation is still found in accessing the electronic documents on the regulations. We see the barrier for field engineers to enhance their technical knowledge. One of major barriers is that videos, animations, and virtual reality information to enhance the visual understanding of technical content related to regulations are not linked. It is the interactive electronic technical manual (IETM) that can address such issues. The IETM is an electronic document system that enables real-time information acquisition while operating in the form of conversations with users by linking multimedia functions to document types such as specifications and guidelines. This study establishes a model of the IETM that can be operated in the planning stage of a construction project. The study also verifies its usability with a hypothetical case study. This study aims to improve the usability of the IETM in the construction project by analyzing the application effect of the IETM using the AHP technique.

A Study on the Classification of Unstructured Data through Morpheme Analysis

  • Kim, SungJin;Choi, NakJin;Lee, JunDong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.105-112
    • /
    • 2021
  • In the era of big data, interest in data is exploding. In particular, the development of the Internet and social media has led to the creation of new data, enabling the realization of the era of big data and artificial intelligence and opening a new chapter in convergence technology. Also, in the past, there are many demands for analysis of data that could not be handled by programs. In this paper, an analysis model was designed and verified for classification of unstructured data, which is often required in the era of big data. Data crawled DBPia's thesis summary, main words, and sub-keyword, and created a database using KoNLP's data dictionary, and tokenized words through morpheme analysis. In addition, nouns were extracted using KAIST's 9 part-of-speech classification system, TF-IDF values were generated, and an analysis dataset was created by combining training data and Y values. Finally, The adequacy of classification was measured by applying three analysis algorithms(random forest, SVM, decision tree) to the generated analysis dataset. The classification model technique proposed in this paper can be usefully used in various fields such as civil complaint classification analysis and text-related analysis in addition to thesis classification.

A Study on the Expressive Technique of Sando(山圖) Included in 『Seonweon Bogam(璿源寶鑑)』 (『선원보감(璿源寶鑑)』에 수록된 산도(山圖)의 표현기법(表現技法)에 관한 연구)

  • Hwang, In-Hyuk;Kim, Taeg-Jin;Kim, Ki-Duk
    • Journal of Korean Historical Folklife
    • /
    • no.44
    • /
    • pp.39-70
    • /
    • 2014
  • "Seonweon Bogam" was made for the purpose of delivering information on the tomb of members of the royal family of the Joseon Dynasty. Accordingly, it covered all of Sando making a pictorial expression of the tomb. But its value has been doubted as it is roughly expressed and different from the picture of the actual scene. But "Seonweon Bogam" is the only book that covers Sando of all the kings of the Joseon Dynasty but contains the elements making it possible to estimate the possibility that the original Sando might be used in making Sando. Accordingly, it is a high time to make an in-deep study of this. This study attempted to investigate Sando included in "Seonweon Bogam" with a focus on the expressive style. For this purpose, it sought to analyze seven elements such as the exposure, the legend, locational information, direction, waterway and road, expression on water and Fengshui(風水) terminology. As a result, the following conclusion was drawn: Sando concerning the tombs of members of the Joseon Dynasty was continually made. It was made in two ways such as the way of drawing the scene on spot and the way of imitating the existing made material. And it could be estimated that there is a possibility that Sando of "Seonweon Bogam" might be copied by the figure with only a little expertise about Sando but on the basis of several materials about the existing Sando of the royal family.

The Effect of Artificial Intelligence on Human Life by the Role of Increasing Value Added in the Industrial Sector (인공지능의 산업 분야 부가 가치 증대 역할에 따른 정책 수립 및 인간 생활에 미치는 영향)

  • Kim, Ji-Hyun;Yu, Ji-in;Jung, Ji-Won;Choi, Hun;Han, Jeong-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.505-508
    • /
    • 2022
  • Artificial intelligence itself has the value of advancing technology, and it is used in various industrial fields to enhance the added value of products and services produced in various industries. Therefore, regulations and policies related to artificial intelligence should be considered from a broader perspective. However, researchers have different understandings, and there is no agreement on how to regulate artificial intelligence. Therefore, we will examine the direction of government regulation on artificial intelligence technology in an exploratory manner. First, accountability, transparency, stability, and fairness are derived as the goals of artificial intelligence regulation, and the system itself, development process, and utilization process are set as the scope of regulation, and users and developers are subject to regulation. The academic significance of this study can be seen as analyzing the current level of artificial intelligence technology and laying the foundation for consistent discussions on artificial intelligence regulations in the future. Considering the life cycle from AI development to application, what is important is the balance of promotion policies to promote the artificial intelligence industry and regulatory policies to respond to the resulting risks. The goal of law related to artificial intelligence is to establish a system in which artificial intelligence can be accommodated in a positive direction to all participants, including developers, companies, and users.

  • PDF

Customer Voices in Telehealth: Constructing Positioning Maps from App Reviews (고객 리뷰를 통한 모바일 앱 서비스 포지셔닝 분석: 비대면 진료 앱을 중심으로)

  • Minjae Kim;Hong Joo Lee
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.4
    • /
    • pp.69-90
    • /
    • 2023
  • The purpose of this study is to evaluate the service attributes and consumer reactions of telemedicine apps in South Korea and visualize their differentiation by constructing positioning maps. We crawled 23,219 user reviews of 6 major telemedicine apps in Korea from the Google Play store. Topics were derived by BERTopic modeling, and sentiment scores for each topic were calculated through KoBERT sentiment analysis. As a result, five service characteristics in the application attribute category and three in the medical service category were derived. Based on this, a two-dimensional positioning map was constructed through principal component analysis. This study proposes an objective service evaluation method based on text mining, which has implications. In sum, this study combines empirical statistical methods and text mining techniques based on user review texts of telemedicine apps. It presents a system of service attribute elicitation, sentiment analysis, and product positioning. This can serve as an effective way to objectively diagnose the service quality and consumer responses of telemedicine applications.

Managing Duplicate Memberships of Websites : An Approach of Social Network Analysis (웹사이트 중복회원 관리 : 소셜 네트워크 분석 접근)

  • Kang, Eun-Young;Kwahk, Kee-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.153-169
    • /
    • 2011
  • Today using Internet environment is considered absolutely essential for establishing corporate marketing strategy. Companies have promoted their products and services through various ways of on-line marketing activities such as providing gifts and points to customers in exchange for participating in events, which is based on customers' membership data. Since companies can use these membership data to enhance their marketing efforts through various data analysis, appropriate website membership management may play an important role in increasing the effectiveness of on-line marketing campaign. Despite the growing interests in proper membership management, however, there have been difficulties in identifying inappropriate members who can weaken on-line marketing effectiveness. In on-line environment, customers tend to not reveal themselves clearly compared to off-line market. Customers who have malicious intent are able to create duplicate IDs by using others' names illegally or faking login information during joining membership. Since the duplicate members are likely to intercept gifts and points that should be sent to appropriate customers who deserve them, this can result in ineffective marketing efforts. Considering that the number of website members and its related marketing costs are significantly increasing, it is necessary for companies to find efficient ways to screen and exclude unfavorable troublemakers who are duplicate members. With this motivation, this study proposes an approach for managing duplicate membership based on the social network analysis and verifies its effectiveness using membership data gathered from real websites. A social network is a social structure made up of actors called nodes, which are tied by one or more specific types of interdependency. Social networks represent the relationship between the nodes and show the direction and strength of the relationship. Various analytical techniques have been proposed based on the social relationships, such as centrality analysis, structural holes analysis, structural equivalents analysis, and so on. Component analysis, one of the social network analysis techniques, deals with the sub-networks that form meaningful information in the group connection. We propose a method for managing duplicate memberships using component analysis. The procedure is as follows. First step is to identify membership attributes that will be used for analyzing relationship patterns among memberships. Membership attributes include ID, telephone number, address, posting time, IP address, and so on. Second step is to compose social matrices based on the identified membership attributes and aggregate the values of each social matrix into a combined social matrix. The combined social matrix represents how strong pairs of nodes are connected together. When a pair of nodes is strongly connected, we expect that those nodes are likely to be duplicate memberships. The combined social matrix is transformed into a binary matrix with '0' or '1' of cell values using a relationship criterion that determines whether the membership is duplicate or not. Third step is to conduct a component analysis for the combined social matrix in order to identify component nodes and isolated nodes. Fourth, identify the number of real memberships and calculate the reliability of website membership based on the component analysis results. The proposed procedure was applied to three real websites operated by a pharmaceutical company. The empirical results showed that the proposed method was superior to the traditional database approach using simple address comparison. In conclusion, this study is expected to shed some light on how social network analysis can enhance a reliable on-line marketing performance by efficiently and effectively identifying duplicate memberships of websites.

A Case Study of a Text Mining Method for Discovering Evolutionary Patterns of Mobile Phone in Korea (국내 휴대폰의 진화패턴 규명을 위한 텍스트 마이닝 방안 제안 및 사례 연구)

  • On, Byung-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.2
    • /
    • pp.29-45
    • /
    • 2015
  • Systematic theory, concepts, and methodology for the biological evolution have been developed while patterns and principles of the evolution have been actively studied in the past 200 years. Furthermore, they are applied to various fields such as evolutionary economics, evolutionary psychology, evolutionary linguistics, making significant progress in research. In addition, existing studies have applied main biological evolutionary models to artifacts although such methods do not fit to them. These models are also limited to generalize evolutionary patterns of artifacts because they are designed in terms of a subjective point of view of experts who know well about the artifacts. Unlike biological organisms, because artifacts are likely to reflect the imagination of the human will, it is known that the theory of biological evolution cannot be directly applied to artifacts. In this paper, beyond the individual's subjective, the aim of our research is to present evolutionary patterns of a given artifact based on peeping the idea of the public. For this, we propose a text mining approach that presents a systematic framework that can find out the evolutionary patterns of a given artifact and then visualize effectively. In particular, based on our proposal, we focus mainly on a case study of mobile phone that has emerged as an icon of innovation in recent years. We collect and analyze review posts on mobile phone available in the domestic market over the past decade, and discuss the detailed results about evolutionary patterns of the mobile phone. Moreover, this kind of task is a tedious work over a long period of time because a small number of experts carry out an extensive literature survey and summarize a huge number of materials to finally draw a diagram of evolutionary patterns of the mobile phone. However, in this work, to minimize the human efforts, we present a semi-automatic mining algorithm, and through this research we can understand how human creativity and imagination are implemented. In addition, it is a big help to predict the future trend of mobile phone in business and industries.

No-reference objective quality assessment of image using blur and blocking metric (블러링과 블록킹 수치를 이용한 영상의 무기준법 객관적 화질 평가)

  • Jeong, Tae-Uk;Kim, Young-Hie;Lee, Chul-Hee
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.3
    • /
    • pp.96-104
    • /
    • 2009
  • In this paper, we propose a no-reference objective Quality assessment metrics of image. The blockiness and blurring of edge areas which are sensitive to the human visual system are modeled as step functions. Blocking and blur metrics are obtained by estimating local visibility of blockiness and edge width, For the blocking metric, horizontal and vertical blocking lines are first determined by accumulating weighted differences of adjacent pixels and then the local visibility of blockiness at the intersection of blocking lines is obtained from the total difference of amplitudes of the 2-D step function which is modelled as a blocking region. The blurred input image is first re-blurred by a Gaussian blur kernel and an edge mask image is generated. In edge blocks, the local edge width is calculated from four directional projections (horizontal, vertical and two diagonal directions) using local extrema positions. In addition, the kurtosis and SSIM are used to compute the blur metric. The final no-reference objective metric is computed after those values are combined using an appropriate function. Experimental results show that the proposed objective metrics are highly correlated to the subjective data.