• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.024 seconds

A Spelling Error Correction Model in Korean Using a Correction Dictionary and a Newspaper Corpus (교정사전과 신문기사 말뭉치를 이용한 한국어 철자 오류 교정 모델)

  • Lee, Se-Hee;Kim, Hark-Soo
    • The KIPS Transactions:PartB
    • /
    • v.16B no.5
    • /
    • pp.427-434
    • /
    • 2009
  • With the rapid evolution of the Internet and mobile environments, text including spelling errors such as newly-coined words and abbreviated words are widely used. These spelling errors make it difficult to develop NLP (natural language processing) applications because they decrease the readability of texts. To resolve this problem, we propose a spelling error correction model using a spelling error correction dictionary and a newspaper corpus. The proposed model has the advantage that the cost of data construction are not high because it uses a newspaper corpus, which we can easily obtain, as a training corpus. In addition, the proposed model has an advantage that additional external modules such as a morphological analyzer and a word-spacing error correction system are not required because it uses a simple string matching method based on a correction dictionary. In the experiments with a newspaper corpus and a short message corpus collected from real mobile phones, the proposed model has been shown good performances (a miss-correction rate of 7.3%, a F1-measure of 97.3%, and a false positive rate of 1.1%) in the various evaluation measures.

Implementation of Data Mining Engine for Analyzing Alert Data of Security Policy Server (보안정책 서버의 경보데이터 분석을 위한 데이터마이닝 엔진의 구현)

  • 정경자;신문선
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.4
    • /
    • pp.141-149
    • /
    • 2002
  • Recently, a number of network systems are developed rapidly and network architectures are more complex than before, and a policy-based network management should be used in network system. Especially, a new paradigm that policy-based network management can be applied for the network security is raised. A security policy server in the management layer can generate new policy, delete. update the existing policy and decide the policy when security policy is requested. The security server needs to analyze and manage the alert message received from server Policy enforcement system in the enforcement layer for the available information. In this paper, we implement an alert analyzer that analyze the stored alert data for making of security policy efficiently in framework of the policy-based network security management. We also propose a data mining system for the analysis of alert data The implemented mining system supports alert analyzer and the high level analyzer efficiently for the security.

  • PDF

A Study on the Design and the Performance Improvement of TCP User Authentication ECC Algorithm Protocol for Mobile terminal (이동단말을 위한 TCP 사용자 인증 타원곡선 알고리즘 프로토콜의 설계 및 성능 개선에 관한 연구)

  • 임승린;박대우
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.7-17
    • /
    • 2004
  • It requires that user have to verify and conform with user authentication Protocol on non-meet face to face internet services offered by mobile terminal which user make known user's own intention, and user be using the normal. It is more operation time authentication protocol than Access control Protocol. That is what need to be user authentication protocol have verified security. non-reputation, and improved high-performance in operation time for mobile terminal. In order to solve the above demand, in this paper, we would design for mobile terminal of TCP User Authentication ECC Algorithm Protocol with a performance test. Algorithm has 160 bit key and designed IPv4 & IPv6 frame architecture. We should conclude that the proposed protocol have more verified security, non-reputation, confidentiality, and improved high-performance in operation time of mobile terminal from 1 to 17 times than before.

  • PDF

Performance evaluation of WAVE communication systems under a high-speed driving condition in a highway (고속주행 환경에서의 WAVE 통신장치 성능분석)

  • Song, Yoo Seung;Lee, Sang Woo;Oh, Hyun Seo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.3
    • /
    • pp.96-102
    • /
    • 2013
  • In recent years, a variety of ITS services are available such as driving information, road conditions, V2X messages as well as navigation and traffic jams notification. The development of ITS services is accelerating by V2X communication technologies for high-speed vehicles. In this paper, WAVE communication devices based on the IEEE802.11p standard is introduced as a solution of V2X communication technologies. The H/W and S/W structures of the WAVE communication device and the characteristics of RF/antenna are described. The performance is evaluated in the test road by measuring throughput, PER and latency. The implemented WAVE communication device has 6~7 Mbps throughput with 10% PER at 1km coverage. The packet latency is less than 3ms for the whole test road. It is shown that the implemented WAVE technology is satisfactory to provide ITS services and Internet video-streaming services.

Defining Semantics of Live Sequence Chart Specification (Live Sequence Chart 명세언어의 의미론적 정의)

  • Lee, Eun-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.49-57
    • /
    • 2006
  • While developing a complex reactive software system. it is very important to analyze the user requirement and reflect it to the developed system. Therefore understanding the need of users precisely and promptly is the key to the successful software system development. Among several requirement specification languages, message sequence charts (MSCs), also known as sequence diagrams in UML are the most widely used scenario notation. Live Sequence Charts (LSCs) are a variant ot MSCs, characterized by its message abstraction facility and the modality of scenarios. In this paper, I define the formal semantics of LSC specification including the essential language constructs such as pre-charts, variables, assignment and conditions. The range of the formalized LSC language has been broadened, and the scope of the formalized semantics is much closer to the complete LSC specification.

  • PDF

Real Time simulation programming in Object Oriented Distributed Computing Systems (객체지향 분산 컴퓨팅 시스템에서 실시간 시뮬레이션 프로그래밍)

  • Bae, Yong-Geun;Chin, Dal-Bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.159-168
    • /
    • 2002
  • Real-time(RT) object-oriented(OO) distributed computing is a form of RT distributed computing realized with a distributed computer system structured in the form of an object network. Several approached proposed in recent years for extending the conventional object structuring scheme to suit RT applications, are briefly reviewed. Then the approach named the Real Time Simulation Programing(RTSP) structuring scheme was formulated with the goal of instigating a quantum productivity jump in the design of distributed time triggered simulation. The RTSP scheme is intended to facilitate the pursuit of a new paradigm in designing distributed time triggered simulation which is to realize real-time computing with a common and general design style that does not alienate the main-stream computing industry and yet to allow system engineers to confidently produce certifiable distributed time triggered simulation for safety-critical applications. The RTSP structuring scheme is a syntactically simple but semantically Powerful extension of the conventional object structuring approached and as such, its support tools can be based on various well-established OO programming languages such as C+ + and on ubiquitous commercial RT operating system kernels. The Scheme enables a great reduction of the designers efforts in guaranteeing timely service capabilities of application systems.

IEEE 802.15.4a based Localization Algorithm for Location Accuracy Enhancement in the NLOS Environment (실내 NLOS환경에서 정밀도 향상을 위한 IEEE 802.15.4a 기반의 위치추정 알고리즘)

  • Cha, Jae-Young;Kong, Young-Bae;Choi, Jeung-Won;Ko, Jong-Hwan;Kwon, Young-Goo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1789-1798
    • /
    • 2012
  • IEEE 802.15.4a standard can provide a variety of location-based services for ZigBee or wireless network applications by adapting the time-of-arrival (TOA) ranging technique. The non-line-of-sight (NLOS) condition is the critical problem in the IEEE 802.15.4a networks, and it can significantly degrade the performance of the TOA-based localization. To enhance the location accuracy due to the NLOS problem, this paper proposes an energy-efficient low complexity localization algorithm. The proposed approach performs the ranging with the multicast method, which can reduce the message overhead due to packet exchanges. By limiting the search region for the location of the node, the proposed approach can enhance the location accuracy. Experimental results show that the proposed algorithm outperforms previous algorithms in terms of the energy consumption and the localization accuracy.

Does Disney's Frozen offer a subversive feminine gender representation? Discussion based on Greimas's semiotic analysis (그레마스 기호학을 이용한 서사 분석의 문제 <겨울왕국>을 중심으로)

  • Joo, Hyoungil
    • Korean journal of communication and information
    • /
    • v.76
    • /
    • pp.7-30
    • /
    • 2016
  • The purpose of this study is to review and criticize the articles that analyzed Frozen by using the semiotic method of Greimas. The study also aims to apply the semiotic method of Greimas correctly to find the deep structure of the narrative of Frozen. The results of the narrative analysis based on the actantial model and the semiotic square show that Frozen is not Elsa's heroic narrative but Anna's one. Because Elsa and Anna are the opposing elements in this narrative, the success of Anna is the failure of Elsa. Frozen does not convey the subversive message about the gender roles by representing an independent and active woman who resists the patriarchal discourse. Instead, Frozen reproduces the conformist ideology by saying that love is the most valuable thing and that everyone should accept the role given to him/her by the community.

  • PDF

Advanced Sensor-based Control Reagent Cabinet Monitoring System (첨단센서 제어 기반 시약장 모니터링 시스템)

  • Yang, Xitong;Jang, Jaemyung;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.199-204
    • /
    • 2017
  • Recently, the reagent in the laboratory can not only confirm the internal environment through the sensor but also check the status inside the reagent cabinet in real time. Also, if an abnormality occurs in the inside of the reagent cabinet, a serious accident may occur. To solve these problems, this paper proposes a reagent monitoring system that integrates reagent and ICT. The sensor data measured in real time is displayed to the user in real time through the monitor and stored in the database. In addition, by using the stored data, it is possible to inform the registered administrator in real time of the dangerous situation by informing the dangerous situation in case of danger, and to be able to check and control remotely. This can improve safety by making control and confirmation of the state of the inside of the reagent everywhere.

Design and Implementation of Web Mail Filtering Agent for Personalized Classification (개인화된 분류를 위한 웹 메일 필터링 에이전트)

  • Jeong, Ok-Ran;Cho, Dong-Sub
    • The KIPS Transactions:PartB
    • /
    • v.10B no.7
    • /
    • pp.853-862
    • /
    • 2003
  • Many more use e-mail purely on a personal basis and the pool of e-mail users is growing daily. Also, the amount of mails, which are transmitted in electronic commerce, is getting more and more. Because of its convenience, a mass of spam mails is flooding everyday. And yet automated techniques for learning to filter e-mail have yet to significantly affect the e-mail market. This paper suggests Web Mail Filtering Agent for Personalized Classification, which automatically manages mails adjusting to the user. It is based on web mail, which can be logged in any time, any place and has no limitation in any system. In case new mails are received, it first makes some personal rules in use of the result of observation ; and based on the personal rules, it automatically classifies the mails into categories according to the contents of mails and saves the classified mails in the relevant folders or deletes the unnecessary mails and spam mails. And, we applied Bayesian Algorithm using Dynamic Threshold for our system's accuracy.