• Title/Summary/Keyword: Domain name

Search Result 163, Processing Time 0.024 seconds

A Study on Named Entity Recognition for Effective Dialogue Information Prediction (효율적 대화 정보 예측을 위한 개체명 인식 연구)

  • Go, Myunghyun;Kim, Hakdong;Lim, Heonyeong;Lee, Yurim;Jee, Minkyu;Kim, Wonil
    • Journal of Broadcast Engineering
    • /
    • v.24 no.1
    • /
    • pp.58-66
    • /
    • 2019
  • Recognition of named entity such as proper nouns in conversation sentences is the most fundamental and important field of study for efficient conversational information prediction. The most important part of a task-oriented dialogue system is to recognize what attributes an object in a conversation has. The named entity recognition model carries out recognition of the named entity through the preprocessing, word embedding, and prediction steps for the dialogue sentence. This study aims at using user - defined dictionary in preprocessing stage and finding optimal parameters at word embedding stage for efficient dialogue information prediction. In order to test the designed object name recognition model, we selected the field of daily chemical products and constructed the named entity recognition model that can be applied in the task-oriented dialogue system in the related domain.

A study on non­storage data recording system and non­storage data providing method by smart QR code (스마트한 QR코드에 의한 비저장식 데이터 기록 시스템 및 비저장식 데이터 제공방법에 관한 연구)

  • Oh, Eun-Yeol
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.4
    • /
    • pp.14-20
    • /
    • 2019
  • The purpose of this paper is to present a smart QR code recording system and a method of non­storage data delivery that transforms the original data into a form of URL information by encrypting it and encoding the URL information into a QR code so that the QR code can be written and decrypted in a medium without storing the original data. The method of the study was presented by the prior art study and the literature research. Analysis results show that the system is built on the online administration server. The data input signal matching secret code is stored in DB, the QR code generation command converts input data from the password DB to the password information combined into the subordinate locator of the admin server's domain name, URL code. Therefore, the smart QR method of data management (recording and providing) indicates that there are no limitations in the ease and space of use or obstacles to capacity use.

A Strategy for Validation in Preliminary Design Stage using The Simulation of Model Behavior (모델 행동 양식의 시뮬레이션을 이용한 초기 디자인 검증 방법)

  • Shin, Seung-Hun;Park, Seung-Kyu;Choi, Kyung-Hee
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.153-160
    • /
    • 2010
  • Most part of errors in software development process are included during the stage of requirements definition and design. And correction or elimination of errors from those stages requires much more efforts and costs than those from the later part of software development process. However, despite of the importance of the validation of requirement definition and design stages, several kinds of problem have made it hard to be done successfully. Therefore, in this paper, we introduce a novel validation process for the preliminary design stage. The validation process is based on simulations of model and it can be used to validate requirements and model simultaneously. Models in the validation process will take only the behavior of software and be built on Ptolemy framework. The usability of our validation process is confirmed with a case study over DNS system environment. And the result of simulation shows well-known errors or vulnerabilities can be found with simulations of model which has the behavior of software. This means our validation process can be used as a process to validate requirements and models during the early stage of software development process.

Livestock Telemedicine System Prediction Model for Human Healthy Life (인간의 건강한 삶을 위한 가축원격 진료 예측 모델)

  • Kang, Yun-Jeong;Lee, Kwang-Jae;Choi, Dong-Oun
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.8
    • /
    • pp.335-343
    • /
    • 2019
  • Healthy living is an essential element of human happiness. Quality eating provides the basis for life, and the health of livestock, which provides meat and dairy products, has a direct impact on human health. In the case of calves, diarrhea is the cause of all diseases.In this paper, we use a sensor to measure calf 's biometric data to diagnose calf diarrhea. The collected biometric data is subjected to a preprocessing process for use as meaningful information. We measure calf birth history and calf biometrics. The ontology is constructed by inputting environmental information of housing and biochemistry, immunity, and measurement information of human body for disease management. We will build a knowledge base for predicting calf diarrhea by predicting calf diarrhea through logical reasoning. Predict diarrhea with the knowledge base on the name of the disease, cause, timing and symptoms of livestock diseases. These knowledge bases can be expressed as domain ontologies for parent ontology and prediction, and as a result, treatment and prevention methods can be suggested.

A Phenomenological Study on Experience of Sexual Offender in Prison (수감되어 있는 성폭력 가해자의 경험에 대한 현상학적 연구)

  • Han, In-Young;Kim, Jin-Sook;Kim, Ji-Hae
    • Korean Journal of Social Welfare Studies
    • /
    • v.42 no.3
    • /
    • pp.121-155
    • /
    • 2011
  • The purpose of this study as a research of experience of sexual offenders who are in confinement in prisons and forensic facilities is to theoretically investigate fundamental structures of their experiences and to practically construct basic data to present intervention programs of sexual offenders. This study was conducted by hermeneutical and phenomenological methods invoked of the analytic framework of Van-Manen (1990) about seven sexual offenders. The data were collected through in-depth interviews, and the results of the interpretation are shown as perception that they were victims of public opinion, the mark of Cain, loss of opportunity of examination caused by show window, collective differentiation through distinction, expression of metaphysical being that wants to slip out of the skin, counterplot of scientific management techniques, undifferentiation from the Imaginary, sexual acts shown as inverted communication, discovering dominant domain as forming reaction to being controlled, not being free from capitalistic attributes in which even children's sex is commercialized, distortion in socialization of sexual identity, paternity stamped as embodiment of suppressed desire, recovery of lost virginity of mother through children, and family as a name broken to pieces.

A inquiry into the Conceptual model of religious education in school curriculum (학교 교육과정에서 종교교육의 개념모형 탐색)

  • Kim, Gwi-Seong
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.18
    • /
    • pp.1-24
    • /
    • 2004
  • This paper is to inquiry into the conceptual model of religious education in school curriculum focused on 7th revised curriculum, subject matter and teacher training system. We have to consider the related variables for the operation of school curriculum: student, school, teacher. In school curricula of Korea, religious education can be practiced as a elective course of subject, discretion activity and special activity, latent curriculum etc. And also it should be considered student's right of option and autonomy of private school, because at least those are the important variables effect upon the religious education in school curriculum. Now I'd like to abstract results of this paper as followed. First, it should be considered student's right of option for religious education in private school curriculum. But at this case, also under the name of education it should be justified precondition of purpose, content, approach method. If not, it easy to access to pejorative meaning as a religious indoctrination. Second, in case of conflict between student and school, I think that a proper method is to adjust the related variables. Third, if the purpose of religious education in school based on religiosity, it can be cover the understanding of religious culture, affectionate domain of religiosity, behavioral religiosity. Finally, in order to accomplish such an conceptual model of religious education in school, it should be set a condition for teacher training system, subject matter etc.

  • PDF

Copper Tolerance of Novel Rhodotorula sp. Yeast Isolated from Gold Mining Ore in Gia Lai, Vietnam

  • Kim Cuc Thi Nguyen;Phuc Hung Truong;Cuong Tu Ho;Cong Tuan Le;Khoa Dang Tran;Tien Long Nguyen;Manh Tuan Nguyen;Phu Van Nguyen
    • Mycobiology
    • /
    • v.51 no.6
    • /
    • pp.379-387
    • /
    • 2023
  • In this study, twenty-five yeast strains were isolated from soil samples collected in the gold mining ore in Gia Lai, Vietnam. Among them, one isolate named GL1T could highly tolerate Cu2+ up to 10 mM, and the isolates could also grow in a wide range of pH (3-7), and temperature (10-40 ℃). Dried biomass of GL1 was able to remove Cu2+ effectively up to 90.49% with a maximal biosorption capacity of 18.1 mg/g at pH 6, temperature 30 ℃, and incubation time 60 min. Sequence analysis of rDNA indicated this strain was closely related to Rhodotorula mucilaginosa but with 1.53 and 3.46% nucleotide differences in the D1/D2 domain of the 28S rRNA gene and the ITS1-5.8S rRNA gene-ITS2 region sequence, respectively. Based on phylogenetic tree analysis and the biochemical characteristics, the strain appears to be a novel Rhodotorula species, and the name Rhodotorula aurum sp. nov. is proposed. This study provides us with more information about heavy metal-tolerant yeasts and it may produce a new tool for environmental control and metal recovery operations.

Access Restriction by Packet Capturing during the Internet based Class (인터넷을 이용한 수업에서 패킷캡쳐를 통한 사이트 접속 제한)

  • Yi, Jungcheol;Lee, Yong-Jin
    • 대한공업교육학회지
    • /
    • v.32 no.1
    • /
    • pp.134-152
    • /
    • 2007
  • This study deals with the development of computer program which can restrict students to access to the unallowable web sites during the Internet based class. Our suggested program can find the student's access list to the unallowable sites, display it on the teacher's computer screen. Through the limitation of the student's access, teacher can enhance the efficiency of class and fulfill his educational purpose for the class. The use of our results leads to the effective and safe utilization of the Internet as the teaching tools in the class. Meanwhile, the typical method is to turn off the LAN (Local Area Network) power in order to limit the student's access to the unallowable web sites. Our program has been developed on the Linux operating systems in the small network environment. The program includes following five functions: the translation function to change the domain name into the IP(Internet Protocol) address, the search function to find the active students' computers, the packet snoop to capture the ongoing packets and investigate their contents, the comparison function to compare the captured packet contents with the predefined access restriction IP address list, and the restriction function to limit the network access when the destination IP address is equal to the IP address in the access restriction list. Our program can capture all passing packets through the computer laboratory in real time and exactly. In addition, it provides teacher's computer screen with the all relation information of students' access to the unallowable sites. Thus, teacher can limit the student's unallowable access immediately. The proposed program can be applied to the small network of the elementary, junior and senior high school. Our research results make a contribution toward the effective class management and the efficient computer laboratory management. The related researches provides teacher with the packet observation and the access limitation for only one host, but our suggested program provides teacher with those for all active hosts.

Wearable Computers

  • Cho, Gil-Soo;Barfield, Woodrow;Baird, Kevin
    • Fiber Technology and Industry
    • /
    • v.2 no.4
    • /
    • pp.490-508
    • /
    • 1998
  • One of the latest fields of research in the area of output devices is tactual display devices [13,31]. These tactual or haptic devices allow the user to receive haptic feedback output from a variety of sources. This allows the user to actually feel virtual objects and manipulate them by touch. This is an emerging technology and will be instrumental in enhancing the realism of wearable augmented environments for certain applications. Tactual displays have previously been used for scientific visualization in virtual environments by chemists and engineers to improve perception and understanding of force fields and of world models populated with the impenetrable. In addition to tactual displays, the use of wearable audio displays that allow sound to be spatialized are being developed. With wearable computers, designers will soon be able to pair spatialized sound to virtual representations of objects when appropriate to make the wearable computer experience even more realistic to the user. Furthermore, as the number and complexity of wearable computing applications continues to grow, there will be increasing needs for systems that are faster, lighter, and have higher resolution displays. Better networking technology will also need to be developed to allow all users of wearable computers to have high bandwidth connections for real time information gathering and collaboration. In addition to the technology advances that make users need to wear computers in everyday life, there is also the desire to have users want to wear their computers. In order to do this, wearable computing needs to be unobtrusive and socially acceptable. By making wearables smaller and lighter, or actually embedding them in clothing, users can conceal them easily and wear them comfortably. The military is currently working on the development of the Personal Information Carrier (PIC) or digital dog tag. The PIC is a small electronic storage device containing medical information about the wearer. While old military dog tags contained only 5 lines of information, the digital tags may contain volumes of multi-media information including medical history, X-rays, and cardiograms. Using hand held devices in the field, medics would be able to call this information up in real time for better treatment. A fully functional transmittable device is still years off, but this technology once developed in the military, could be adapted tp civilian users and provide ant information, medical or otherwise, in a portable, not obstructive, and fashionable way. Another future device that could increase safety and well being of its users is the nose on-a-chip developed by the Oak Ridge National Lab in Tennessee. This tiny digital silicon chip about the size of a dime, is capable of 'smelling' natural gas leaks in stoves, heaters, and other appliances. It can also detect dangerous levels of carbon monoxide. This device can also be configured to notify the fire department when a leak is detected. This nose chip should be commercially available within 2 years, and is inexpensive, requires low power, and is very sensitive. Along with gas detection capabilities, this device may someday also be configured to detect smoke and other harmful gases. By embedding this chip into workers uniforms, name tags, etc., this could be a lifesaving computational accessory. In addition to the future safety technology soon to be available as accessories are devices that are for entertainment and security. The LCI computer group is developing a Smartpen, that electronically verifies a user's signature. With the increase in credit card use and the rise in forgeries, is the need for commercial industries to constantly verify signatures. This Smartpen writes like a normal pen but uses sensors to detect the motion of the pen as the user signs their name to authenticate the signature. This computational accessory should be available in 1999, and would bring increased peace of mind to consumers and vendors alike. In the entertainment domain, Panasonic is creating the first portable hand-held DVD player. This device weight less than 3 pounds and has a screen about 6' across. The color LCD has the same 16:9 aspect ratio of a cinema screen and supports a high resolution of 280,000 pixels and stereo sound. The player can play standard DVD movies and has a hour battery life for mobile use. To summarize, in this paper we presented concepts related to the design and use of wearable computers with extensions to smart spaces. For some time, researchers in telerobotics have used computer graphics to enhance remote scenes. Recent advances in augmented reality displays make it possible to enhance the user's local environment with 'information'. As shown in this paper, there are many application areas for this technology such as medicine, manufacturing, training, and recreation. Wearable computers allow a much closer association of information with the user. By embedding sensors in the wearable to allow it to see what the user sees, hear what the user hears, sense the user's physical state, and analyze what the user is typing, an intelligent agent may be able to analyze what the user is doing and try to predict the resources he will need next or in the near future. Using this information, the agent may download files, reserve communications bandwidth, post reminders, or automatically send updates to colleagues to help facilitate the user's daily interactions. This intelligent wearable computer would be able to act as a personal assistant, who is always around, knows the user's personal preferences and tastes, and tries to streamline interactions with the rest of the world.

  • PDF

A Multi-Strategic Mapping Approach for Distributed Topic Maps (분산 토픽맵의 다중 전략 매핑 기법)

  • Kim Jung-Min;Shin Hyo-phil;Kim Hyoung-Joo
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.1
    • /
    • pp.114-129
    • /
    • 2006
  • Ontology mapping is the task of finding semantic correspondences between two ontologies. In order to improve the effectiveness of ontology mapping, we need to consider the characteristics and constraints of data models used for implementing ontologies. Earlier research on ontology mapping, however, has proven to be inefficient because the approach should transform input ontologies into graphs and take into account all the nodes and edges of the graphs, which ended up requiring a great amount of processing time. In this paper, we propose a multi-strategic mapping approach to find correspondences between ontologies based on the syntactic or semantic characteristics and constraints of the topic maps. Our multi-strategic mapping approach includes a topic name-based mapping, a topic property-based mapping, a hierarchy-based mapping, and an association-based mapping approach. And it also uses a hybrid method in which a combined similarity is derived from the results of individual mapping approaches. In addition, we don't need to generate a cross-pair of all topics from the ontologies because unmatched pairs of topics can be removed by characteristics and constraints of the topic maps. For our experiments, we used oriental philosophy ontologies, western philosophy ontologies, Yahoo western philosophy dictionary, and Yahoo german literature dictionary as input ontologies. Our experiments show that the automatically generated mapping results conform to the outputs generated manually by domain experts, which is very promising for further work.