• Title/Summary/Keyword: Artificial cloud

Search Result 243, Processing Time 0.023 seconds

A Study on Unstructured text data Post-processing Methodology using Stopword Thesaurus (불용어 시소러스를 이용한 비정형 텍스트 데이터 후처리 방법론에 관한 연구)

  • Won-Jo Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.935-940
    • /
    • 2023
  • Most text data collected through web scraping for artificial intelligence and big data analysis is generally large and unstructured, so a purification process is required for big data analysis. The process becomes structured data that can be analyzed through a heuristic pre-processing refining step and a post-processing machine refining step. Therefore, in this study, in the post-processing machine refining process, the Korean dictionary and the stopword dictionary are used to extract vocabularies for frequency analysis for word cloud analysis. In this process, "user-defined stopwords" are used to efficiently remove stopwords that were not removed. We propose a methodology for applying the "thesaurus" and examine the pros and cons of the proposed refining method through a case analysis using the "user-defined stop word thesaurus" technique proposed to complement the problems of the existing "stop word dictionary" method with R's word cloud technique. We present comparative verification and suggest the effectiveness of practical application of the proposed methodology.

The Improvement Plan for Indicator System of Personal Information Management Level Diagnosis in the Era of the 4th Industrial Revolution: Focusing on Application of Personal Information Protection Standards linked to specific IT technologies (제4차 산업시대의 개인정보 관리수준 진단지표체계 개선방안: 특정 IT기술연계 개인정보보호기준 적용을 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.1-13
    • /
    • 2021
  • This study tried to suggest ways to improve the indicator system to strengthen the personal information protection. For this purpose, the components of indicator system are derived through domestic and foreign literature, and it was selected as main the diagnostic indicators through FGI/Delphi analysis for personal information protection experts and a survey for personal information protection officers of public institutions. As like this, this study was intended to derive an inspection standard that can be reflected as a separate index system for personal information protection, by classifying the specific IT technologies of the 4th industrial revolution, such as big data, cloud, Internet of Things, and artificial intelligence. As a result, from the planning and design stage of specific technologies, the check items for applying the PbD principle, pseudonymous information processing and de-identification measures were selected as 2 common indicators. And the checklists were consisted 2 items related Big data, 5 items related Cloud service, 5 items related IoT, and 4 items related AI. Accordingly, this study expects to be an institutional device to respond to new technological changes for the continuous development of the personal information management level diagnosis system in the future.

Combined Artificial Bee Colony for Data Clustering (융합 인공벌군집 데이터 클러스터링 방법)

  • Kang, Bum-Su;Kim, Sung-Soo
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.4
    • /
    • pp.203-210
    • /
    • 2017
  • Data clustering is one of the most difficult and challenging problems and can be formally considered as a particular kind of NP-hard grouping problems. The K-means algorithm is one of the most popular and widely used clustering method because it is easy to implement and very efficient. However, it has high possibility to trap in local optimum and high variation of solutions with different initials for the large data set. Therefore, we need study efficient computational intelligence method to find the global optimal solution in data clustering problem within limited computational time. The objective of this paper is to propose a combined artificial bee colony (CABC) with K-means for initialization and finalization to find optimal solution that is effective on data clustering optimization problem. The artificial bee colony (ABC) is an algorithm motivated by the intelligent behavior exhibited by honeybees when searching for food. The performance of ABC is better than or similar to other population-based algorithms with the added advantage of employing fewer control parameters. Our proposed CABC method is able to provide near optimal solution within reasonable time to balance the converged and diversified searches. In this paper, the experiment and analysis of clustering problems demonstrate that CABC is a competitive approach comparing to previous partitioning approaches in satisfactory results with respect to solution quality. We validate the performance of CABC using Iris, Wine, Glass, Vowel, and Cloud UCI machine learning repository datasets comparing to previous studies by experiment and analysis. Our proposed KABCK (K-means+ABC+K-means) is better than ABCK (ABC+K-means), KABC (K-means+ABC), ABC, and K-means in our simulations.

DeepBlock: Web-based Deep Learning Education Platform (딥블록: 웹 기반 딥러닝 교육용 플랫폼)

  • Cho, Jinsung;Kim, Geunmo;Go, Hyunmin;Kim, Sungmin;Kim, Jisub;Kim, Bongjae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.43-50
    • /
    • 2021
  • Recently, researches and projects of companies based on artificial intelligence have been actively carried out. Various services and systems are being grafted with artificial intelligence technology. They become more intelligent. Accordingly, interest in deep learning, one of the techniques of artificial intelligence, and people who want to learn it have increased. In order to learn deep learning, deep learning theory with a lot of knowledge such as computer programming and mathematics is required. That is a high barrier to entry to beginners. Therefore, in this study, we designed and implemented a web-based deep learning platform called DeepBlock, which enables beginners to implement basic models of deep learning such as DNN and CNN without considering programming and mathematics. The proposed DeepBlock can be used for the education of students or beginners interested in deep learning.

Chemical Transformation of Individual Asian Dust Particles Estimated by the Novel Double Detector System of Micro-PIXE

  • Ma, Chang-Jin
    • Asian Journal of Atmospheric Environment
    • /
    • v.4 no.2
    • /
    • pp.106-114
    • /
    • 2010
  • By the application of novel double detector system of micro-PIXE that can detect light elements (Z<14), we made an attempt to provide a thorough discussion on the aging processes of Asian dust (hereafter called "AD") particle by reaction with sea-slat. The elemental spectra and maps obtained from the microbeam radiation of micro-PIXE to individual AD particles were useful for fractionating AD particles into both internally and externally mixed particles. A spatial distribution of elements in a minute domain of single particle obtained by scanning the microbeam irradiation enabled us not only to estimate the chemical mixing state of individual AD particles but also to presume their aging processes in both ambient air and cloud. By calculating the normalized micro-PIXE net count of elements, it was possible to classify individual AD particles into three distinct groups (i.e., (1) Aging type 1: AD particle coated by the gaseous Cl evaporated by the reaction between artificial acids and sea salt; (2) Aging type 2: AD particle mixed with sea salt but no additional reaction with artificial acids; and (3) Non-aged type) A relatively high transformation rate (63.3-75.9%) was shown in large particles (greater than $5.1\;{\mu}m$ in diameter).

Digital Healthcare and Main Issues (디지털 헬스케어와 주요이슈)

  • Woo, SungHee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.560-563
    • /
    • 2016
  • The changes in the medical and healthcare are started from the digital technology. The new field of digital healthcare has started fused with existing healthcare, medical technology, and digital technology. It can increase the service effect and reduce healthcare costs by applying ICT skills such as ICBM(Internet of Things, Cloud, Big data and Mobile), artificial intelligence, robotics, virtual, augmented reality, and wearable devices to healthcare services including healthcare, disease management. Recently there has been grafted an artificial intelligence technologies such as AlphaGo of Google and Watson of IBM onto the healthcare area. In this study, we analyze the main technology, ecosystem, platforms for digital healthcare, and lastly future changes in health care services and issues of digital healthcare.

  • PDF

Sentiment Analysis of the Quotations of Intensive Care Unit Survivors in Qualitative Studies (질적연구 진술문을 이용한 중환자실 생존자의 감성분석)

  • Kang, Jiyeon
    • Journal of Korean Critical Care Nursing
    • /
    • v.11 no.1
    • /
    • pp.1-14
    • /
    • 2018
  • Purpose : As the intensive care unit (ICU) survival rate increases, interest in the lives of ICU survivors has also been increasing. The purpose of this study was to identify the sentiment of ICU survivors. Method : The author analyzed the quotations from previous qualitative studies related to ICU survivors; a total of 1,074 sentences comprising 429 quotations from 25 relevant studies were analyzed. A word cloud created in the R program was utilized to identify the most frequent adjectives used, and sentiment and emotional scores were calculated using the Artificial Intelligence (AI) program. Results : The 10 adjectives that appeared the most in the quotations were 'difficult', 'different', 'normal', 'able', 'hard', 'bad', 'ill', 'better', 'weak', and 'afraid', in order of decreasing occurrence. The mean sentiment score was negative ($-.31{\pm}.23$), and the three emotions with the highest score were 'sadness'($.52{\pm}.13$), 'joy'($.35{\pm}.22$), and 'fear'($.30{\pm}.25$). Conclusion : The natural language processing of AI used in this study is a relatively new method. As such, it is necessary to refine the methodology through repeated research in various nursing fields. In addition, further studies on nursing interventions that improve the coherency of ICU memory of survivors and familial support for the ICU survivors are needed.

A Study on the Educational Uses of Smart Speaker (스마트 스피커의 교육적 활용에 관한 연구)

  • Chang, Jiyeun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.11
    • /
    • pp.33-39
    • /
    • 2019
  • Edutech, which combines education and information technology, is in the spotlight. Core technologies of the 4th Industrial Revolution have been actively used in education. Students use an AI-based learning platform to self-diagnose their needs. And get personalized training online with a cloud learning platform. Recently, a new educational medium called smart speaker that combines artificial intelligence technology and voice recognition technology has emerged and provides various educational services. The purpose of this study is to suggest a way to use smart speaker educationally to overcome the limitation of existing education. To this end, the concept and characteristics of smart speakers were analyzed, and the implications were derived by analyzing the contents provided by smart speakers. Also, the problem of using smart speaker was considered.

A Study on Building a Test Bed for Smart Manufacturing Technology (스마트 제조기술을 위한 테스트베드 구축에 관한 연구)

  • Cho, Choon-Nam
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.34 no.6
    • /
    • pp.475-479
    • /
    • 2021
  • There are many difficulties in the applications of smart manufacturing technology in the era of the 4th industrial revolution. In this paper, a test bed was built to aim for acquiring smart manufacturing technology, and the test bed was designed to acquire basic technologies necessary for PLC (Programmable Logic Controller), HMI, Internet of Things (IoT), artificial intelligence (AI) and big data. By building a vehicle maintenance lift that can be easily accessed by the general public, PLC control technology and HMI drawing technology can be acquired, and by using cloud services, workers can respond to emergencies and alarms regardless of time and space. In addition, by managing and monitoring data for smart manufacturing, it is possible to acquire basic technologies necessary for embedded systems, the Internet of Things, artificial intelligence, and big data. It is expected that the improvement of smart manufacturing technology capability according to the results of this study will contribute to the effect of creating added value according to the applications of smart manufacturing technology in the future.

Phishing Attack Detection Using Deep Learning

  • Alzahrani, Sabah M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.213-218
    • /
    • 2021
  • This paper proposes a technique for detecting a significant threat that attempts to get sensitive and confidential information such as usernames, passwords, credit card information, and more to target an individual or organization. By definition, a phishing attack happens when malicious people pose as trusted entities to fraudulently obtain user data. Phishing is classified as a type of social engineering attack. For a phishing attack to happen, a victim must be convinced to open an email or a direct message [1]. The email or direct message will contain a link that the victim will be required to click on. The aim of the attack is usually to install malicious software or to freeze a system. In other instances, the attackers will threaten to reveal sensitive information obtained from the victim. Phishing attacks can have devastating effects on the victim. Sensitive and confidential information can find its way into the hands of malicious people. Another devastating effect of phishing attacks is identity theft [1]. Attackers may impersonate the victim to make unauthorized purchases. Victims also complain of loss of funds when attackers access their credit card information. The proposed method has two major subsystems: (1) Data collection: different websites have been collected as a big data corresponding to normal and phishing dataset, and (2) distributed detection system: different artificial algorithms are used: a neural network algorithm and machine learning. The Amazon cloud was used for running the cluster with different cores of machines. The experiment results of the proposed system achieved very good accuracy and detection rate as well.