• Title/Summary/Keyword: Inappropriate Information

Search Result 380, Processing Time 0.023 seconds

Nutrient Profiling-based Pet Food Recommendation Algorithm (영양성분 프로파일링 기반 사료추천 알고리듬)

  • Song, Hee Seok
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.4
    • /
    • pp.145-156
    • /
    • 2018
  • This study proposes a content-based recommendation algorithm (NRA) for pet food. The proposed algorithm tries to recommend appropriate or inappropriate feed by using collective intelligence based on user experience and prior knowledge of experts. Based on the physical and health status of the dogs, this study suggests what kind of nutrients are necessary for the dogs and the most recommended pet food containing these nutrients. Performance evaluation was performed in terms of recall, precision, F1 and AUC. As a result of the performance evaluation, the AUC and F1 value of the proposed NRA was 15% and 42% higher than that of the baseline model, respectively. In addition, the performance of NRA is shown higher for recommendation of normal dogs than disease dogs.

Cyberbullying Detection by Sentiment Analysis of Tweets' Contents Written in Arabic in Saudi Arabia Society

  • Almutairi, Amjad Rasmi;Al-Hagery, Muhammad Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.112-119
    • /
    • 2021
  • Social media has become a global means of communication in people's lives. Most people are using Twitter for communication purposes and its inappropriate use, which has negative effects on people's lives. One of the widely common misuses of Twitter is cyberbullying. As the resources of dialectal Arabic are rare, so for cyberbullying most people are using dialectal Arabic. For this reason, the ultimate goal of this study is to detect and classify cyberbullying on Twitter in the Arabic context in Saudi Arabia. To help in the detection and classification of tweets, Pointwise Mutual Information (PMI) to generate a lexicon, and Support Vector Machine (SVM) algorithms are used. The evaluation is performed on both methods in terms of the F1-score. However, the F1-score after applying the PMI is 50%, while after the SVM application on the resampling data it is 82%. The analysis of the results shows that the SVM algorithm outperforms better.

The Structural Relationship among Viewing Motivation, Viewing Commitment, Reviewing Intention and Game Use Intention of e-Sports Competition Broadcasting

  • Kim, Seyun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.205-212
    • /
    • 2022
  • The purpose of this study is to investigate the structural relationship between the viewing motivation, viewing commitment, re-audience intention, and game use intention of e-sports competition broadcast viewers. According to the purpose of the study, an online survey was conducted on 300 college students with experience watching broadcasting of e-sports competitions. After excluding inappropriate data from 8 out of 300 people, 292 people's data were used for final data processing. For data processing, the validity and reliability were verified using SPSS 26 and AMOS 23, and then the research hypothesis was verified. We has the results were shown as follows. First, it was found that entertainment, social intercourse and vicarious satisfaction had a positive effect on viewing commitment, but information has not significantly effect on viewing commitment. Second, it was found that viewing commitment had a positive effect on reviewing intention and game use intention. Third, it was found that reviewing intention had a positive effect on game use intention.

Analysis of AI Content Detector Tools

  • Yo-Seob Lee;Phil-Joo Moon
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.154-163
    • /
    • 2023
  • With the rapid development of AI technology, ChatGPT and other AI content creation tools are becoming common, and users are becoming curious and adopting them. These tools, unlike search engines, generate results based on user prompts, which puts them at risk of inaccuracy or plagiarism. This allows unethical users to create inappropriate content and poses greater educational and corporate data security concerns. AI content detection is needed and AI-generated text needs to be identified to address misinformation and trust issues. Along with the positive use of AI tools, monitoring and regulation of their ethical use is essential. When detecting content created by AI with an AI content detection tool, it can be used efficiently by using the appropriate tool depending on the usage environment and purpose. In this paper, we collect data on AI content detection tools and compare and analyze the functions and characteristics of AI content detection tools to help meet these needs.

Institutionalization for the Real Estate Electronic Commerce System (부동산정보윤리의 개념 정립 및 부동산정보윤리 확립 방안에 관한 연구)

  • Lee, Kook-Chul;Kang, Byung-Gi;Kim, Dong-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.2
    • /
    • pp.129-142
    • /
    • 2008
  • The present paper questionable matter and necessity of real estate information ethics, triangular position method etc. is an escape and for is. And currently the real estate information ethical violate action where becomes the problem the plan which raises an ethical level is an escape and for is. Preceding research led first of all and justice a real estate information ethics and necessity, scope, function and basic principle escape. Also at current law escape sent 'accidental incorrect reports', 'preservation of the list must erase', 'light plagiarism' and 'information is inappropriate managed' in the object of the real estate information ethics which excepts the illegal act. With the real estate relation specialty led interview together and currently actual condition real estate current price information where becomes the problem and article for sale information type nonly-ethical and also the cause analyzed together. This led and also the real estate information ethical raising plan did escape together.

  • PDF

A Method for Information Source Selection using Teasaurus for Distributed Information Retrieval

  • Goto, Shoji;Ozono, Tadachika;Shintani, Toramatsu
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.272-277
    • /
    • 2001
  • In this paper, we describe a new method for selecting information sources in a distributed environment. Recently, there has been much research on distributed information retrieval, that is information retrieval (IR) based on a multi-database model in which the existence of multiple sources is modeled explicitly. In distributed IR, a method is needed that would enable selecting appropriate sources for users\` queries. Most existing methods use statistical data such as document frequency. These methods may select inappropriate ate sources if a query contains polysemous words. In this paper, we describe an information-source selection method using two types of thesaurus. One is a thesaurus automatically constructed from documents in a source. The other is a hand-crafted general-purpose thesaurus(e.g. WordNet). Terms used in documents in a source differ from one another and the meanings of a term differ depending on th situation in which the term is used. The difference is a characteristic of the source. In our method, the meanings of a term are distinguished between by the relationship between the term and other terms, and the relationship appear in the co-occurrence-based thesaurus. In this paper, we describe an algorithm for evaluating a usefulness of a source for a query based on a thesaurus. For a practical application of our method, we have developed Papits, a multi-agent-based in formation sharing system. An experiment of selection shows that our method is effective for selecting appropriate sources.

  • PDF

Detecting Spam Data for Securing the Reliability of Text Analysis (텍스트 분석의 신뢰성 확보를 위한 스팸 데이터 식별 방안)

  • Hyun, Yoonjin;Kim, Namgyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.2
    • /
    • pp.493-504
    • /
    • 2017
  • Recently, tremendous amounts of unstructured text data that is distributed through news, blogs, and social media has gained much attention from many researchers and practitioners as this data contains abundant information about various consumers' opinions. However, as the usefulness of text data is increasing, more and more attempts to gain profits by distorting text data maliciously or nonmaliciously are also increasing. This increase in spam text data not only burdens users who want to obtain useful information with a large amount of inappropriate information, but also damages the reliability of information and information providers. Therefore, efforts must be made to improve the reliability of information and the quality of analysis results by detecting and removing spam data in advance. For this purpose, many studies to detect spam have been actively conducted in areas such as opinion spam detection, spam e-mail detection, and web spam detection. In this study, we introduce core concepts and current research trends of spam detection and propose a methodology to detect the spam tag of a blog as one of the challenging attempts to improve the reliability of blog information.

Lane Information Fusion Scheme using Multiple Lane Sensors (다중센서 기반 차선정보 시공간 융합기법)

  • Lee, Soomok;Park, Gikwang;Seo, Seung-woo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.12
    • /
    • pp.142-149
    • /
    • 2015
  • Most of the mono-camera based lane detection systems are fragile on poor illumination conditions. In order to compensate limitations of single sensor utilization, lane information fusion system using multiple lane sensors is an alternative to stabilize performance and guarantee high precision. However, conventional fusion schemes, which only concerns object detection, are inappropriate to apply to the lane information fusion. Even few studies considering lane information fusion have dealt with limited aids on back-up sensor or omitted cases of asynchronous multi-rate and coverage. In this paper, we propose a lane information fusion scheme utilizing multiple lane sensors with different coverage and cycle. The precise lane information fusion is achieved by the proposed fusion framework which considers individual ranging capability and processing time of diverse types of lane sensors. In addition, a novel lane estimation model is proposed to synchronize multi-rate sensors precisely by up-sampling spare lane information signals. Through quantitative vehicle-level experiments with around view monitoring system and frontal camera system, we demonstrate the robustness of the proposed lane fusion scheme.

Enhancing Information Sharing in the Public Sector: An Empirical Study (행정정보공동이용제도의 개선방안에 관한 연구)

  • Yoon, Kwang Seok
    • Informatization Policy
    • /
    • v.19 no.4
    • /
    • pp.83-104
    • /
    • 2012
  • Information sharing is one of the key factors enhancing government efficiency and public convenience. However, critics argue that Korean government is now facing various kinds of barriers such as insufficient collaboration among agencies, inappropriate statutes, and technical problems. Thus, this study aims to develop policy alternatives that help resolve the existing problems suggested above. In order to achieve research objectives, this study employs both quantitative and qualitative methods as ways to investigate different dimensions of information sharing in government. Both survey and interview include six dimensions such as organization, technology, culture, management, policy and law. The results show that Korean government needs to implement following alternatives; developing its own database that helps support government decision making, changing organizational culture, continuous extension in terms of the number of object information and affiliated agency, and developing a statute dealing with government information sharing.

  • PDF

Measures for Enhancing System of Crime Victim's Information Protection (범죄피해자 정보보호법제의 개선방안에 대한 연구)

  • Lee, Kwon Cheol
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.10
    • /
    • pp.175-187
    • /
    • 2016
  • Protection of personal information has significant meaning in current information age. Information of crime victim is one of top in value in that divulgence of the information to perpetrators may threat safety of the victim or cause psychological demage as $2^{nd}$ harm if disclosed to public. Legal system protects the information with scattered statutes including Criminal Procedure Act. Existing studies have been limited to discussion of the single statute without integrated approach. Bearing necessity of the approach in mind, as issues of protection system this research proffers too broad subject of eligible inspection of case document, inactive practice of identity management cards and omission of personal information, and inappropriate punishment on the disclosure or divulgence. After reviewing systems of foreign jurisdictions to get useful implications, this paper suggests several measures with two separate aspect of legal provisions and protection practice.