• Title/Summary/Keyword: Duplicate word

Search Result 9, Processing Time 0.024 seconds

Morphological Processing with LR Techniques (LR 테크닉을 이용한 형태소 분석)

  • 이강혁
    • Korean Journal of Cognitive Science
    • /
    • v.4 no.2
    • /
    • pp.115-143
    • /
    • 1994
  • In this paper,I present an extended two-level model using LR parsing techniques.The LR-based two-level model not only guarantees effcient morphological processing but also achieves a higher degree of descriptive adequacy than Koskenniemi's original model.The two-level model is augmented with an independent morphosyntactic module based on feature-based CF word grammar.By adopting a CF word grammar,our model is capable of dealing with complex words with discontinuous dependencies without having duplicate lexicons.It is shown how LR predictions manifested in the parsing table can help the morphological processor to minimize the dictionary lookup process.

Development of a 1:1 Presentation Coaching Application (1:1 발표력 코칭 애플리케이션의 개발)

  • Wi, Seung-Hyun;Moon, Mi-kyeong
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.992-998
    • /
    • 2018
  • Presentation is a technique that is logically and confidently conveying your thoughts and opinions in front of others. It is essential when you go to school or work. However, it takes a lot of time, money, and effort to improve your presentation skills. In this paper, we describe the development of a presentation coaching application that analyzes the presentation practice video. The application program can analyze the presentation time, the speaker's expression, the use of duplicate words, etc.

Does Cloned Template Text Compromise the Information Integrity of a Paper, and is it a New Form of Text Plagiarism?

  • Jaime A. Teixeira da Silva
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.13 no.2
    • /
    • pp.23-35
    • /
    • 2023
  • Word templates exist for select journals, and their primary objective is to facilitate submissions to those journals, thereby optimizing editors' and publishers' time and resources by ensuring that the desired style (e.g., of sections, references, etc.) is followed. However, if multiple unrelated authors use the exact same template, a risk exists that some text might be erroneously cloned if template-based papers are not carefully screened by authors, journal editors or proof copyeditors. Elsevier Procedia® was used as an example. Select cloned text, presumably derived from MS Word templates used for submissions to Elsevier Procedia® journals, was assessed using Science Direct. Typically, in academic publishing, identical text is screened using text similarity software during the submission process, and if detected, may be flagged as plagiarism. After searching for "heading should be left justified, bold, with the first letter capitalized", 44 Elsevier Procedia® papers were found to be positive for vestigial template text. The integrity of the information in these papers has been compromised, so these errors should be corrected with an erratum, or in the case of extensive errors and vast tracts (e.g., pages long) of template text, papers should be retracted and republished.

Design and Implementation of a Micropayment Protocol in Electronic Commerce Environments (소액 지불 전자상거래 환경을 위한 프로토콜의 설계 및 구현)

  • 손병록;박기현;유상진
    • Korean Management Science Review
    • /
    • v.18 no.1
    • /
    • pp.69-78
    • /
    • 2001
  • An electronic micropayment system, one of electronic payment systems, is suitable especially when a small amount of money is to be paid frequently in order to purchase on-line goods (i.e. database search, software distribution, electronic news service, etc). In addition, since the amount of payment is small, possible damages caused by system failures are lower than other payment system. In this paper, a micropayment protocol in electronic commerce environments on the Internet is proposed, based on the PayWord system. And a micropayment electronic commerce system which executes the protocol proposed is implemented. Unlike the PayWord system, however, the micropayment protocol proposed in this paper is designed in such a way that a merchant does not need to request a payment at the end of every business day since a customer cannot purchase goods beyond length of hash chains, which is specified on a certificate. In addition, the system is able to check the validity as well as the duplicate spending of hash chains. The electronic micropayment system with the proposed protocol is consists of Customers, Merchants, and Brokers. Customers are implemented on Windows NT 4.0 using VC++. Merchants are implemented on Solaris 2.5.1 and gcc 2.8.0 using Netscape Web Server and CGI Methods. HP UX 10.20 is used for Brokers.

  • PDF

Proposal of keyword extraction method based on morphological analysis and PageRank in Tweeter (트위터에서 형태소 분석과 PageRank 기반 화제단어 추출 방법 제안)

  • Lee, Won-Hyung;Cho, Sung-Il;Kim, Dong-Hoi
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.157-163
    • /
    • 2018
  • People who use SNS publish their diverse ideas on SNS every day. The data posted on the SNS contains many people's thoughts and opinions. In particular, popular keywords served on Twitter compile the number of frequently appearing words in user posts and rank them. However, this method is sensitive to unnecessary data simply by listing duplicate words. The proposed method determines the ranking based on the topic of the word using the relationship diagram between words, so that the influence of unnecessary data is less and the main word can be stably extracted. For the performance comparison in terms of the descending keyword rank and the ratios of meaningless keywords among high rank 20 keywords, we make a comparison between the proposed scheme which is based on morphological analysis and PageRank, and the existing scheme which is based on the number of appearances. As a result, the proposed scheme and the existing scheme have included 55% and 70% of meaningless keywords among high rank 20 keywords, respectively, where the proposed scheme is improved about 15% compared with the existing scheme.

A study on maxillofacial prosthesis: systematic considerations (악안면 보철 연구: 체계적 고찰)

  • Hwang, Seong-Sig;Im, Yong-Woon
    • Journal of Technologic Dentistry
    • /
    • v.43 no.4
    • /
    • pp.139-144
    • /
    • 2021
  • Purpose: This study aimed to provide basic data to identify the current status of use of maxillofacial prosthesis across the world and discuss its application and research directions in Korea. Methods: Existing literature (study period, 2010 to 2020) from international studies was collected from PsycINFO, CINAHL, and PubMed, whereas domestic studies were searched using KISS and RISS. Maxillofacial prosthesis was used as the search word. A total of three foreign and two domestic articles were searched, and as a result, a total of 12 documents were selected for analysis. Results: A total of 3,311 studies were searched in this study. Among them, 3,253 articles contained in duplicate inspection and exclusion criteria were removed, and 12 articles were selected by removing literature that did not meet the research criteria through title and green and text reviews. Finally, two researchers selected the final 12 articles through handwritten searches. Eleven of them were case studies, and the remaining one was a descriptive study. Conclusion: This study identified the current status of studies that implemented maxillofacial prosthesis, published from January 2010 to January 2020. Facial prosthetics improve the quality of life of patients by restoring defects that appear on different types of mouth and face and promote both function and aesthetics. Therefore, they can be used to treat various conditions and have a positive impact on the future.

Analysis of University Unification Education Research Trends Using Text Network Analysis and Topic Modeling

  • Do-Young LEE
    • Journal of Wellbeing Management and Applied Psychology
    • /
    • v.6 no.4
    • /
    • pp.27-31
    • /
    • 2023
  • Purpose: This study analyzed papers identified by entering the two keywords 'unification education' and 'university' during research from 2013 to 2022 in order to identify trends and key concepts in unification education research at domestic universities. Research design, data, and methodology: The study analyzed 224 papers, excluding those on primary, middle, and high school unification education, as well as unrelated and duplicate papers. The analysis included developing a co-occurrence network of keywords, utilizing topic modeling to categorize research types, and confirming visualizations such as word clouds and sociograms. Results: In the final analysis, the research identified 1,500 keywords, with notable ones like 'Korea,' 'education,' 'unification.' Centrality analysis, measuring influence through connected keywords, revealed that 'Korea,' 'education,' 'north,' and 'unification' held significant positions. Keywords with high centrality compared to their frequency included 'learning,' 'development,' 'training,' 'peace,' and 'language,' in that order. Conclusions: This study investigated trends and structures in university-level unification education by analyzing papers identified with the keywords 'unification education' and 'university.' The use of keyword network analysis aimed to elucidate patterns and structures in university-level unification education. The significance of the study lies in offering foundational data for future research directions in the field of unification education at universities.

System Implement to Identify Copyright Infringement Based on the Text Reference Point (텍스트 기준점 기반의 저작권 침해 판단 시스템 구현)

  • Choi, Kyung-Ung;Park, Soon-Cheol;Yang, Seung-Won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.77-84
    • /
    • 2015
  • Most of the existing methods make the index key with every 6 words in every sentence in a document in order to identify copyright infringement between two documents. However, these methods has the disadvantage to take a long time to inspect the copyright infringement because of the long indexing time for the large-scale document. In this paper, we propose a method to select the longest word (called a feature bock) as an index key in the predetermined-sized window which scans a document character by character. This method can be characterized by removing duplicate blocks in the process of scanning a document, dramatically reducing the number of the index keys. The system with this method can find the copyright infringement positions of two documents very accurately and quickly since relatively small number of blocks are compared.

HBase-based Automatic Summary System using Twitter Trending Topics (트위터 트랜딩 토픽을 이용한 HBase 기반 자동 요약 시스템)

  • Lee, Sanghoon;Moon, Seung-Jin
    • Journal of Internet Computing and Services
    • /
    • v.15 no.5
    • /
    • pp.63-72
    • /
    • 2014
  • Twitter has been a popular social media platform where people post short messages of 140 characters or less via the web. A hashtag is a word or acronym created by Twitter users to open a discussion about certain topics and issues that have a very high percentage of trending. Since the hashtag posts are sorted by time, not relevancy, people who firstly use Twitter have had difficulty understanding their context. In this paper, we propose a HBase-based automatic summary system in order to reduce the difficulty of understanding. The proposed system combines an automatic summary method with a fuzzy system after storing the streaming data provided by Twitter API to the HBase. Throughout this procedure, we have eliminated the duplicate of contents in the hashtag posts and have computed scores between posts so that the users can access to the trending topics with relevancy.