• Title/Summary/Keyword: 제시유형

Search Result 4,944, Processing Time 0.031 seconds

The Layered Structural Tagging Program for Seaching (언어자료 검색을 위한 계층구조형 형태소 분석 프로그램)

  • Kang, Yong-Hee
    • Annual Conference on Human and Language Technology
    • /
    • 2001.10d
    • /
    • pp.89-96
    • /
    • 2001
  • 1999년 제1회 형태소 분석기 및 품사태거 평가 워크숍 이후 표준안에 대한 새로운 대안이나 문제제기등을 제시한 논문은 전무하다. 본 연구에서는 평가대회 참가 이후 표준안을 수정한 새로운 유형의 형태소 분석 프로그램을 제작하여 그 실용성과 앞으로의 발전 가능성과 문제점을 밝혀, 계층구조형의 형태소분석 시스템을 채택하고 있는 일본의 JUMAN을 참조 새로운 유형의 형태소 분석형식을 제시한다. 본 연구는 일본방송협회 방송기술연구소(이하 NHK기술 연구소)의 의뢰에 인한 것이며 어절단위의 표준안과 다른 형태소 단위를 기본요소로 삼고 있으며 활용형을 갖고 있는 용언에 대해서는 활용형의 전개를 하고 있다. 어절단위로 탈피한 이유는 형태소 분석의 기본요소로써 어절단위 보다는 형태소 단위를 기준으로 삼는 것이 생산성이 높다고 생각된다. 어절정보와 문장정보는 XML(extensible makrup language)등의 별도의 정보를 주는 방법을 채택했다. 음절말음이 자음인지 모음인지의 음운 정보에 따라 활용형을 차별했으며 표준안과 달리 명사의 종류와 개념을 세분화했다. 아울러 조사와 어미등의 검색어와 함께 음절을 형성하고 있는 비검색어 대상은 배제하는 프로그램과 표준안의 어절방식으로 출력하는 3가지 프로그램을 작성했다. 본 연구에서는 계층구조의 형태소분석 프로그램의 가능성과 한국어의 특성을 고려한 출력항목등을 고찰하는 것을 목적으로 한다.

  • PDF

Efficient Verification Method with Random Vectors for Embedded Control RISC Cores (내장형 제어 RISC코어를 위한 효율적인 랜덤 벡터 기능 검증 방법)

  • Yang, Hun-Mo;Gwak, Seung-Ho;Lee, Mun-Gi
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.10
    • /
    • pp.735-745
    • /
    • 2001
  • Processors require both intensive and extensive functional verification in their design phase due to their general purpose. The proposed random vector verification method for embedded control RISC cores meets this goal by contributing assistance for conventional methods. The proposed method proved its effectiveness during the design of CalmRISCTM-32 developed by Yonsei Univ. and Samsung. It adopts a cycle-accurate instruction level simulator as a reference model, runs simulation in both the reference and the target HDL and reports errors if any difference is found between them. Consequently, it successfully covers errors designers easily pass over and establishes other new error check points.

  • PDF

A research for self-supporting management of business incubation center in region (지역 내 창업보육센터의 발전 방향에 대한 소고(小考))

  • Moon, Hyung-Joo;Choi, Kyo-Won;Hong, Ki-Hak;Lee, Gi-Sung;Son, Chang-Kyun
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2007.04a
    • /
    • pp.313-328
    • /
    • 2007
  • In this paper we investigated the organization of regional business incubation center itself and that of companies m center and scrutinized the problems and obstacles to take self-supporting administration for both of center and companies in it. We classified the companies operating inside the center into four types according to the formation of organizations analyzed them, and proposed some solutions to enhance their operating abilities to obtain elf-supporting administration.

  • PDF

New Trend of Scholarly Communication : Open Access (학술 커뮤니케이션의 새로운 동향 : 자유이용을 중심으로)

  • Lee, Too-Young;Hwang, Ok-Gyung
    • Journal of Information Management
    • /
    • v.34 no.2
    • /
    • pp.1-23
    • /
    • 2003
  • The serials pricing and licensing crises have caused the problem of limited access to scholarly information and the problem of its preservation. To cope with these crises, various types of scholarly communication models are under study now. Open Access is one of the possible solutions among these new trials. This study has investigated the history of Open Access, articulated the first considerations for the spread of Open Access, and proposed the role of librarians during the progress.

Design & Evaluation of an Intelligent Model for Extracting the Web User' Preference (웹 사용자의 선호도 추출을 위한 지능모델 설계 및 평가)

  • Kim, Kwang-Nam;Yoon, Hee-Byung;Kim, Hwa-Soo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.4
    • /
    • pp.443-450
    • /
    • 2005
  • In this paper, we propose an intelligent model lot extraction of the web user's preference and present the results of evaluation. For this purpose, we analyze shortcomings of current information retrieval engine being used and reflect preference weights on learner. As it doesn't depend on frequency of each word but intelligently learns patterns of user behavior, the mechanism Provides the appropriate set of results about user's questions. Then, we propose the concept of preference trend and its considerations and present an algorithm for extracting preference with examples. Also, we design an intelligent model for extraction of behavior patterns and propose HTML index and process of intelligent learning for preference decision. Finally, we validate the proposed model by comparing estimated results(after applying the Preference) of document ranking measurement.

A research for self-supporting management of business incubation center in region (지역 내 창업보육센터의 발전 방향에 대한 소고(小考))

  • Moon, Hyung-Joo;Choi, Kyo-Won;Hong, Ki-Hak;Lee, Gi-Sung;Son, Chang-Kyun
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.2 no.1
    • /
    • pp.1-14
    • /
    • 2007
  • In this paper we investigated the organization of regional business incubation center itself and that of companies in center and scrutinized the problems and obstacles to take self-supporting administration for both of center and companies in it. We classified the companies operating inside the center into four types according to the formation of organizations analyzed them, and proposed some solutions to enhance their operating abilities to obtain elf- supporting administration.

  • PDF

A Study on Implementation and Applying Relationship Ontology System Using RDF/OWL Object Property (RDF/OWL의 객체속성을 이용한 관계온톨로지 시스템 구축과 활용에 관한 연구)

  • Kang, Hyen-Min
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.4
    • /
    • pp.219-237
    • /
    • 2010
  • This study proposes a 'Bibliographic Universe Relationship Vocabulary'(burv) using the RDF/OWL Object Property under the SPO predicate logic according to the relationship type among all entities of bibliographic universe and implemented a 'relationship ontology system' to establish a new cataloging business domain called 'Relationship Description Cataloging' based on the ontology.

Domestic and Foreign Case Studies of Virtual Drought Exercise (가상가뭄 훈련의 국내외 사례 연구)

  • Ahn, Sang-Hyun;Kim, Jitae;Chung, Il-Moon;Lee, Jeong Eun
    • The Journal of Engineering Geology
    • /
    • v.30 no.4
    • /
    • pp.415-421
    • /
    • 2020
  • Drought has repeatedly occurred due to the climate change effect. The government is working on ways to reduce drought damage and is conducting drought exercise. This study analyzed drought literature and exercise cases in the United States, Australia and Korea. Based on the analysis results, the study suggested considerations in selecting exercise types which are workshop, tabletop exercise and functional exercise, and process of the drought exercise. The results of the study can be used as an effective tool to prepare the virtual drought exercise.

A Study on Influencing Factors on Intention to Adopt NFTs Using UTAUT (UTAUT를 활용한 NFT 잠재적 수용자의 수용의도 영향요인 연구)

  • Cho, Kwang-Hyun;Lee, Won-boo
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.3
    • /
    • pp.17-34
    • /
    • 2022
  • Although NFTs are a new technology with a fast-growing industry, the studies for consumer protection and promotion are insufficient. Thus, this study analyzes the relationship of variables that affect intention to use NFT based on the UTUAT model, additionally, moderating effect of NFT types and crypto investment experience. Subjects of this study are limited to potential NFT users. The independent variables such as performance expectations, network externality, and innovation are statistically significant, however, the moderating effect is not suggested. With low awareness, the tendencies of subjects lead to adoption rather than technical understanding.

A Study on Security Requirement against Denial of Service Attack in Sensor Network (센서 네트워크에서의 서비스 거부(Denial of Service) 공격에 대한 보안요구사항 연구)

  • Lim, Hui-Bin;Park, Sang-Jin;Kim, Mi-Joo;Shin, Yong-Tae;Choe, Jong-Won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.631-632
    • /
    • 2009
  • 센서 네트워크에 대한 보안은 일반 네트워크와 동일하게 보안성, 무결성, 가용성 등이 요구된다. 그러나 일반적으로 센서 네트워크는 무선 통신을 하는 네트워크이고, 고정된 인프라가 없으며, 네트워크 토폴로지가 자주 변하는 특징으로 인해 보안문제는 어려운 것으로 인식되고 있다. 특히, 센서 노드의 에너지와 같은 자원 고갈을 유발하여 정상적인 동작을 못하게 하는 서비스 거부(Denial of Service, DoS)와 같은 공격에 취약하다. 본 논문에서는 센서 네트워크의 일반적인 구성을 통해 발생할 수 있는 DoS 공격의 유형을 분석하고, 보안요구사항을 제시하였다. 제시한 보안요구사항은 DoS 공격 뿐 아니라 센서 네트워크에서 발생할 수 있는 다양한 공격 유형에 대한 보안요구사항을 마련하는 데에 기초가 될 것으로 기대한다.