• Title/Summary/Keyword: Address Translation

Search Result 124, Processing Time 0.024 seconds

Deletion-Based Sentence Compression Using Sentence Scoring Reflecting Linguistic Information (언어 정보가 반영된 문장 점수를 활용하는 삭제 기반 문장 압축)

  • Lee, Jun-Beom;Kim, So-Eon;Park, Seong-Bae
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.3
    • /
    • pp.125-132
    • /
    • 2022
  • Sentence compression is a natural language processing task that generates concise sentences that preserves the important meaning of the original sentence. For grammatically appropriate sentence compression, early studies utilized human-defined linguistic rules. Furthermore, while the sequence-to-sequence models perform well on various natural language processing tasks, such as machine translation, there have been studies that utilize it for sentence compression. However, for the linguistic rule-based studies, all rules have to be defined by human, and for the sequence-to-sequence model based studies require a large amount of parallel data for model training. In order to address these challenges, Deleter, a sentence compression model that leverages a pre-trained language model BERT, is proposed. Because the Deleter utilizes perplexity based score computed over BERT to compress sentences, any linguistic rules and parallel dataset is not required for sentence compression. However, because Deleter compresses sentences only considering perplexity, it does not compress sentences by reflecting the linguistic information of the words in the sentences. Furthermore, since the dataset used for pre-learning BERT are far from compressed sentences, there is a problem that this can lad to incorrect sentence compression. In order to address these problems, this paper proposes a method to quantify the importance of linguistic information and reflect it in perplexity-based sentence scoring. Furthermore, by fine-tuning BERT with a corpus of news articles that often contain proper nouns and often omit the unnecessary modifiers, we allow BERT to measure the perplexity appropriate for sentence compression. The evaluations on the English and Korean dataset confirm that the sentence compression performance of sentence-scoring based models can be improved by utilizing the proposed method.

Overhead Reduction Methods in Communication between 6LoWPAN and External Node (6LoWPAN 노드와 외부 노드의 통신 시에 오버헤드 감소 방법)

  • Choi, Dae-In;Enkhzul, Doopalam;Park, Jong-Tak;Kahng, Hyun-K.
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5B
    • /
    • pp.437-442
    • /
    • 2011
  • As an Internet Engineering Task Force (IETF) Working Group, 6LoWPAN is standardizing the IPv6 packet transfer technology in accordance with IEEE 802.15.4. It has completed two Request for Comments (RFC) documents, one of which, RFC 4944, addresses fragmentation, reassembly, and header compression technologies. In this paper, a communication mechanism is proposed to provide efficient communication between 6LoWPAN and external nodes. In this mechanism, the gateway between 6LoWPAN and external networks serves as the proxy gateway between nodes. The simulation was conducted using QualNet to compare the performance of the proposed mechanism and the existing RFC 4944 method. The comparative analysis of the proposed mechanism and the existing method showed that the proposed method performed better.

On the Direction of the Application of the Concepts of Computational Thinking for Elementary Education (Computational Thinking의 초등교육 활용 방향)

  • Moon, Gyo Sik
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.6
    • /
    • pp.518-526
    • /
    • 2013
  • The notion of computational thinking is currently gaining much attention from a variety of disciplines. Accordingly, computer education community needs to address this issue for formal education. In the paper, the translation issue on the terminology - 'computational thinking' - is discussed. As a brief introduction to computational thinking the characteristics and necessities as well as its importance are presented. The types of learning computational thinking are presented, which are learning with computing tools on one hand and without them on the other hand. Furthermore, learning objectives of computational thinking as well as the contents are also investigated for the application of computational thinking in elementary education. A survey was conducted for thirty three elementary school teachers on behalf of investigating directions of teaching computational thinking in elementary education. It shows that almost all respondents agree to teaching computational thinking in formal education and it also shows other interesting results as stated in the paper.

P-HDNS : A New Scheme to Support Multilingual Domain Names (한글도메인이름을 지원하기 위한 Proxy HDNS 구현)

  • Kim, Weon;Chin, Yong-Ohk
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.36C no.12
    • /
    • pp.1-10
    • /
    • 1999
  • Given a domain, client applications over the Internet are in support of the DNS (Domain Name System) to get its corresponding IP address. Currently, only domain names expressed by ASCII code are recognized over the Internet. This enforces the usage of ASCII domain names even in countries which use languages based on multilingual code other than ASCII code. In this paper, we present a methodology to support multilingual domain names on top of the existing DNS. The methodology is based on code translation of domain names in multilingual code into ASCII code via UTF5. We implement a gateway, called Proxy Hangul DNS (P-HDNS) based on the proposed methodology. This paper presents the principles of the methodology and the implementation details of P-HDNS.

  • PDF

A Study on Auto Inspection System of Cross Coil Movement Using Machine Vision (머신비젼을 이용한 Cross Coil Movement 자동검사 시스템에 관한 연구)

  • Lee, Chul-Hun;Seol, Sung-Wook;Joo, Jae-Heum;Lee, Sang-Chan;Nam, Ki-Gon
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.11
    • /
    • pp.79-88
    • /
    • 1999
  • In this paper we address the tracking method which tracks only target object in image sequence including moving object. We use a contour tracking algorithm based on intensity and motion boundaries. The motion of the moving object contour in the image is assumed to be well describable by an affine motion model with a translation, a change in scale and a rotation. The moving object contour is represented by B-spline, the position and motion of which is estimated along the image sequence. we use pattern recognition to identify target object. In order to use linear Kalman Filters we decompose the estimation process into two filters. One is estimating the affine motion parameters and the other the shape of moving object contour. In some experiments with dial plate we show that this method enables us to obtain the robust motion estimates and tracking trajectories even in case of including obstructive object.

  • PDF

Design and implementation of an Embedded Network Processor (내장형 네트워크 프로세서의 설계 및 구현)

  • Joung Jinoo;Kim Seong-cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.6
    • /
    • pp.1211-1217
    • /
    • 2005
  • Current generation embedded systems are built around only a small number of SOCs, which are again based on general-purpose embedded micro-processors, such as ARM and MIPS. These RISC-based processors are not, however, designed for specific functions such as networking and multimedia processing, whose importances have increased dramatically in recent years. Network devices for small business and home networks, are especially dependent upon such SOCs based on general processors. Except for PHY and MAC layer functions, which are built with hardware, all the network functions are processed by the embedded micro-processor. Enabling technologies such as VDSL and FTTH promise Internet access with a much higher speed, while at the same time explore the limitations of general purpose microprocessors. In this paper we design a network processor, embed it into an SOC for Home gateway, evaluate the performance rigorously, and gauge a possibility for commercialization.

A NAT Proxy Server for an Internet Telephony Service (인터넷 전화 서비스를 위한 NAT 프럭시 서버)

  • 손주영
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.47-59
    • /
    • 2003
  • The Internet telephony service is one of the commercially successful Internet application services. VoIP technology makes the service come true. VoIP deploys H.323 or SIP as the standard protocol for the distributed multimedia services over the Internet in which QoS is not guaranteed. VoIP carries the packetized voice over the RTP/UDP/IP protocol stack. The data transmission trouble is caused by UDP when the service is provided in private networks and some ISP-provided Internet access networks in the private address space. The Internet telephony users in such networks cannot listen the voices of the other parties in the public Internet or PSTN. Making the problem more difficult, the Internet telephony service considered in this paper gets the incoming voice packets of every session through only one UDP port number. In this paper, three schemes including the terminal proxy, the gateway proxy, and the protocol translation are suggested to solve the problems. The design and implementation of the NAT proxy server based on gateway proxy scheme are described in detail.

Crystal Structure of Histidine Triad Nucleotide-Binding Protein from the Pathogenic Fungus Candida albicans

  • Jung, Ahjin;Yun, Ji-Sook;Kim, Shinae;Kim, Sang Ryong;Shin, Minsang;Cho, Dong Hyung;Choi, Kwang Shik;Chang, Jeong Ho
    • Molecules and Cells
    • /
    • v.42 no.1
    • /
    • pp.56-66
    • /
    • 2019
  • Histidine triad nucleotide-binding protein (HINT) is a member of the histidine triad (HIT) superfamily, which has hydrolase activity owing to a histidine triad motif. The HIT superfamily can be divided to five classes with functions in galactose metabolism, DNA repair, and tumor suppression. HINTs are highly conserved from archaea to humans and function as tumor suppressors, translation regulators, and neuropathy inhibitors. Although the structures of HINT proteins from various species have been reported, limited structural information is available for fungal species. Here, to elucidate the structural features and functional diversity of HINTs, we determined the crystal structure of HINT from the pathogenic fungus Candida albicans (CaHINT) in complex with zinc ions at a resolution of $2.5{\AA}$. Based on structural comparisons, the monomer of CaHINT overlaid best with HINT protein from the protozoal species Leishmania major. Additionally, structural comparisons with human HINT revealed an additional helix at the C-terminus of CaHINT. Interestingly, the extended C-terminal helix interacted with the N-terminal loop (${\alpha}1-{\beta}1$) and with the ${\alpha}3$ helix, which appeared to stabilize the dimerization of CaHINT. In the C-terminal region, structural and sequence comparisons showed strong relationships among 19 diverse species from archea to humans, suggesting early separation in the course of evolution. Further studies are required to address the functional significance of variations in the C-terminal region. This structural analysis of CaHINT provided important insights into the molecular aspects of evolution within the HIT superfamily.

Introduction of the Korea BioData Station (K-BDS) for sharing biological data

  • Byungwook Lee;Seungwoo Hwang;Pan-Gyu Kim;Gunwhan Ko;Kiwon Jang;Sangok Kim;Jong-Hwan Kim;Jongbum Jeon;Hyerin Kim;Jaeeun Jung;Byoung-Ha Yoon;Iksu Byeon;Insu Jang;Wangho Song;Jinhyuk Choi;Seon-Young Kim
    • Genomics & Informatics
    • /
    • v.21 no.1
    • /
    • pp.12.1-12.8
    • /
    • 2023
  • A wave of new technologies has created opportunities for the cost-effective generation of high-throughput profiles of biological systems, foreshadowing a "data-driven science" era. The large variety of data available from biological research is also a rich resource that can be used for innovative endeavors. However, we are facing considerable challenges in big data deposition, integration, and translation due to the complexity of biological data and its production at unprecedented exponential rates. To address these problems, in 2020, the Korean government officially announced a national strategy to collect and manage the biological data produced through national R&D fund allocations and provide the collected data to researchers. To this end, the Korea Bioinformation Center (KOBIC) developed a new biological data repository, the Korea BioData Station (K-BDS), for sharing data from individual researchers and research programs to create a data-driven biological study environment. The K-BDS is dedicated to providing free open access to a suite of featured data resources in support of worldwide activities in both academia and industry.

Access Restriction by Packet Capturing during the Internet based Class (인터넷을 이용한 수업에서 패킷캡쳐를 통한 사이트 접속 제한)

  • Yi, Jungcheol;Lee, Yong-Jin
    • 대한공업교육학회지
    • /
    • v.32 no.1
    • /
    • pp.134-152
    • /
    • 2007
  • This study deals with the development of computer program which can restrict students to access to the unallowable web sites during the Internet based class. Our suggested program can find the student's access list to the unallowable sites, display it on the teacher's computer screen. Through the limitation of the student's access, teacher can enhance the efficiency of class and fulfill his educational purpose for the class. The use of our results leads to the effective and safe utilization of the Internet as the teaching tools in the class. Meanwhile, the typical method is to turn off the LAN (Local Area Network) power in order to limit the student's access to the unallowable web sites. Our program has been developed on the Linux operating systems in the small network environment. The program includes following five functions: the translation function to change the domain name into the IP(Internet Protocol) address, the search function to find the active students' computers, the packet snoop to capture the ongoing packets and investigate their contents, the comparison function to compare the captured packet contents with the predefined access restriction IP address list, and the restriction function to limit the network access when the destination IP address is equal to the IP address in the access restriction list. Our program can capture all passing packets through the computer laboratory in real time and exactly. In addition, it provides teacher's computer screen with the all relation information of students' access to the unallowable sites. Thus, teacher can limit the student's unallowable access immediately. The proposed program can be applied to the small network of the elementary, junior and senior high school. Our research results make a contribution toward the effective class management and the efficient computer laboratory management. The related researches provides teacher with the packet observation and the access limitation for only one host, but our suggested program provides teacher with those for all active hosts.