• Title/Summary/Keyword: Information manipulation

Search Result 566, Processing Time 0.024 seconds

Effects of the Manner of Deleting Typical Items in a Scene on False Memory (풍경 그림에서 전형적인 정보의 삭제 방법이 오기억에 미치는 영향)

  • Do, Kyung-Soo;Bae, Kyung-Sue
    • Korean Journal of Cognitive Science
    • /
    • v.18 no.2
    • /
    • pp.113-138
    • /
    • 2007
  • The effects of schema on accurate and false memories of items in a scene were investigated in two experiments: Recognition of items in a scene was tested immediately in Experiment 1 and three days later in Experiment 2. In both experiments, the following three variables were manipulated: Exposure time (250ms or 10000ms), picture mode (completed pictures or scrambled pictures), and manipulation mode (missing item or substituted item). Experiment 1 had yielded three important results: First, although accurate memory for presented items got increased when the exposure time was longer, false memory of the critical lures was not changed. Second, false memory of critical lures in the missing condition, where there was not any conflict between verbatim information and gist information, was higher than that of the substituted condition, where verbatim information of the item that replaced the lure was in conflict with the gist information. Third, accurate memory for atypical items in the substituted rendition, which had replaced the critical lures and in conflict with the schema, was higher than that in the missing condition. In Experiment 2, recognition test were administered 72 hours after the participants saw the picture. The three effects mentioned in Experiment 1 had disappeared in Experiment 2. The results of Experiment 2 might be due to the selective weakening of verbatim information compared to the persistence of the gist (or schematic) information. The results of Experiments 1 and 2 showed that false memory of critical lures is more persistent than the accurate memory of non-critical information. Theoretical implications of the results were considered in terms of the function of the verbatim and gist information.

  • PDF

A Study on the Development of a Home Mess-Cleanup Robot Using an RFID Tag-Floor (RFID 환경을 이용한 홈 메스클린업 로봇 개발에 관한 연구)

  • Kim, Seung-Woo;Kim, Sang-Dae;Kim, Byung-Ho;Kim, Hong-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.2
    • /
    • pp.508-516
    • /
    • 2010
  • An autonomous and automatic home mess-cleanup robot is newly developed in this paper. Thus far, vacuum-cleaners have lightened the burden of household chores but the operational labor that vacuum-cleaners entail has been very severe. Recently, a cleaning robot was commercialized to solve but it also was not successful because it still had the problem of mess-cleanup, which pertained to the clean-up of large trash and the arrangement of newspapers, clothes, etc. Hence, we develop a new home mess-cleanup robot (McBot) to completely overcome this problem. The robot needs the capability for agile navigation and a novel manipulation system for mess-cleanup. The autonomous navigational system has to be controlled for the full scanning of the living room and for the precise tracking of the desired path. It must be also be able to recognize the absolute position and orientation of itself and to distinguish the messed object that is to be cleaned up from obstacles that should merely be avoided. The manipulator, which is not needed in a vacuum-cleaning robot, has the functions of distinguishing the large trash that is to be cleaned from the messed objects that are to be arranged. It needs to use its discretion with regard to the form of the messed objects and to properly carry these objects to the destination. In particular, in this paper, we describe our approach for achieving accurate localization using RFID for home mess-cleanup robots. Finally, the effectiveness of the developed McBot is confirmed through live tests of the mess-cleanup task.

A Study on the Automatic Inspection of Sewer Facility Map (하수도시설물도 자동 검수 방안 연구)

  • Kim, Chang-Hwan;Ohk, Won-Soo;Yoo, Jae-Yong
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.9 no.2
    • /
    • pp.67-78
    • /
    • 2006
  • Local governments began to construct geographic information system to improve government productivity and performance. In support, central government organized a national commission for GIS. The master plan by NGIS has been the base for local government to participate in the construction of GIS at the local level in the under ground facilities management including water and sewers. The challenge faced by sewer facility managers includes controlling 'data accuracy'. The input for sewer data handling for efficient performance in local government requires accurate data. However data manipulation to get the 'good quality' data can be burdensome. Thus, the aim of this research is to provide the appropriate tool to guarantee the high quality of digital data in sewer facility management. It is helpful to pass the data examination by government as well as to insure confidence of decision and data analysis works in local government. In this research, error types of sewer data were classified and pointed the limitation of traditional examination methods. Thus this research suggested more improved method for finding and correcting errors in data input using sewer volume analysis and prediction model as immigrating sewer facility management work to Geographic Information System.

  • PDF

A Data Cleansing Strategy for Improving Data Quality of National R&D Information - Case Study of NTIS (데이터 품질을 고려한 국가R&D정보 데이터베이스의 통합 사례 연구 - NTIS 데이터베이스 통합 사례)

  • Shin, Sung-Ho;Yoon, Young-Jun;Yang, Myung-Suk;Kim, Jin-Man;Shon, Kang-Ryul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.6
    • /
    • pp.119-130
    • /
    • 2011
  • On the point of data quality management, data quality is influenced by quality policy, quality organization, business process, and business rule. Business rules, guide of data manipulation, have effects on data quality directly. In case of building an integration database among distributed databases, defining business rule is more important because data integration needs to consider heterogeneous structure, code, and data standardization. Also data value has various figures depended on data type, unit, and transcription. Finally, database structure and data value problem have to be solved to improve data quality. For handling them, it is needed to draw database integration model and cleanse data in integrated database. NTIS(stands for National science and Technology Information Service) has an aim to serve users who need all information about national R&D by internet, and for that aim, it has a integrated database which has been made with several database sources. We prove that database integration model and data cleansing are needed to build a successful integrated database through NTIS case study.

Study on Perceptions through Big data Analysis on Gambling related News in Korea (한국 사행산업 관련 뉴스의 빅데이터 분석을 통한 인식 연구)

  • Moon, HyeJung;Kim, SungKyung
    • Journal of Broadcast Engineering
    • /
    • v.22 no.4
    • /
    • pp.438-447
    • /
    • 2017
  • The purpose of this study is to understand the recognition of gambling industry through the semantic analysis of news data on lottery, sports betting, horse racing and casino that was reported between 1990 to 2015 in South Korea. This paper revealed the difference between journalists' intention and public's perception about news by analyzing the frequency and connectivity of news with framing and public's interest through semantic network analysis and explored the policy characteristics and innovation task. The result of analysis, news on lottery game mainly has been reported social issue related with win such as 'winning number', 'prize money', 'suspicion of manipulation' and etc. News on sports betting has been reported mandatory information related with business project and illegal site such as 'bidding', 'illegal site', 'sales target' and etc. News about horse racing has been reported the information about the business advertisement such as 'online race track' and 'promotion'. Lastly, casino related news has been reported 'major information' such as illegality', 'gambling place' and 'foreigner'. As a result of times series analysis, news about casino in the 1990s, news about lottery in the 2000s and news about horse racing in 2010s have been increased. Public's interest also has been moved to 'business scandal', 'winning game', 'citizens' campaign' and etc. Gambling related news has been classified by four types, 1. advertising publicity(horse racing), 2. mandatory information(sports betting), 3. social issue(public agenda, lottery), 4. major information(casino). We could get the insight that news can be formed a public agenda, when news is reported as a social issue with high frequency and public's interest like lottery related news.

Monitoring system for packet analysis on Wi-Fi environment (Wi-Fi 환경에서 패킷 분석을 위한 모니터링 시스템)

  • Seo, Hee-Suk;Kim, Hee-Wan;Ahn, Woo-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.227-234
    • /
    • 2011
  • Many technologies for wireless internet are increasing as more and more laptop computers, net books, smart phone and other terminals, which provide wireless network, are created. IEEE 802.11 is computer wireless network technology that used in small area, called wireless LAN or Wi-Fi. IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). AP (Access Point) is installed at cafes and public places providing wireless environment. It is more convenient to use wireless internet, however, It can be seen easily around us and possible to communicate with AP. IEEE 802.11 has many vulnerability, such as packet manipulation and information disclosure, so we should pay more attention when using IEEE 802.11. Therefore this paper developing monitoring system which can find out AP and Stations that connect with it, and capturing AP's information to find out vulnerability. This paper suggests monitoring system which traffic analysis in wireless environment.

Analysis and Optimization of ICT Application in Construction Phase (시공단계 ICT 도입 효과분석 및 최적화 방안)

  • Go, Tae-Yong;Kim, Ryul-Hee;Lee, Dong-Eun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.19 no.2
    • /
    • pp.175-184
    • /
    • 2019
  • This paper presents a modeling prototype that optimizes construction processes implementing information communication technology (ICT). Using "IAMB", each and every actual steps of the construction process may be defined visually and explicitly by elaborating ICT to improve productivity and management efficiency. It contributes to identify the features on what parts of construction task are covered by ICT, and the effects of ICT on process performance. After analyzing 10 real project cases, ICT application types are classified into four categories according to ICT type, job functions that ICT applied, and the project phase in which ICT used. As a reuslt, it was confirmed that the positive outcomes on the construction process were beneficial to mostly the general contractors and mainly obtained by automated information processing, external consignment and consistent information use. Negative effects, which were occurred by mainly manual manipulation and duplication of information handling, were accrued to general contractors minimally, but to subcontractors maximally. Expert focus group commends that several important issues should be considered when implementing ICT.

A research on improving client based detection feature by using server log analysis in FPS games (FPS 게임 서버 로그 분석을 통한 클라이언트 단 치팅 탐지 기능 개선에 관한 연구)

  • Kim, Seon Min;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1465-1475
    • /
    • 2015
  • Cheating detection models in the online games can be divided into two parts. The one is on client based model, which is designed to detect malicious programs not to be run while playing the games. The other one is server based model, which distinguishes the difference between benign users and cheaters by the server log analysis. The client based model provides various features to prevent games from cheating, For instance, Anti-reversing, memory manipulation and so on. However, being deployed and operated on the client side is a huge weak point as cheaters can analyze and bypass the detection features. That Is why the server based model is an emerging way to detect cheating users in online games. But the simple log data such as FPS's one can be hard to find validate difference between two of them. In this paper, In order to compensate for the disadvantages of the two detection model above, We use the existing game security solution log as well as the server one to bring high performance as well as detection ratio compared to the existing detection models in the market.

Design and Development of Multiple Input Device and Multiscale Interaction for GOCI Observation Satellite Imagery on the Tiled Display (타일드 디스플레이에서의 천리안 해양관측 위성영상을 위한 다중 입력 장치 및 멀티 스케일 인터랙션 설계 및 구현)

  • Park, Chan-Sol;Lee, Kwan-Ju;Kim, Nak-Hoon;Lee, Sang-Ho;Seo, Ki-Young;Park, Kyoung Shin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.541-550
    • /
    • 2014
  • This paper describes a multi-scale user interaction based tiled display visualization system using multiple input devices for monitoring and analyzing Geostationary Ocean Color Imager (GOCI) observation satellite imagery. This system provides multi-touch screen, Kinect motion sensing, and moblie interface for multiple users to control the satellite imagery either in front of the tiled display screen or far away from a distance to view marine environmental or climate changes around Korean peninsular more effectively. Due to a large amount of memory required for loading high-resolution GOCI satellite images, we employed the multi-level image load technique where the image was divided into small tiled images in order to reduce the load on the system and to be operated smoothly by user manipulation. This system performs the abstraction of common input information from multi-user Kinect motion and gestures, multi-touch points and mobile interaction information to enable a variety of user interactions for any tiled display application. In addition, the unit of time corresponding to the selected date of the satellite images are sequentially displayed on the screen and multiple users can zoom-in/out, move the imagery and select buttons to trigger functions.

The e-Business Component Construction based on Distributed Component Specification (분산 컴포넌트 명세를 통한 e-비즈니스 컴포넌트 구축)

  • Kim, Haeng-Gon;Choe, Ha-Jeong;Han, Eun-Ju
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.705-714
    • /
    • 2001
  • The computing systems of today expanded business trade and distributed business process Internet. More and more systems are developed from components with exactly reusability, independency, and portability. Component based development is focused on advanced concepts rater than passive manipulation or source code in class library. The primary component construction in CBD. However, lead to an additional cost for reconstructing the new component with CBD model. It also difficult to serve component information with rapidly and exactly, which normalization model are not established, frequency user logging in Web caused overload. A lot of difficult issues and aspects of Component Based Development have to be investigated to develop good component-based products. There is no established normalization model which will guarantee a proper treatment of components. This paper elaborates on some of those aspects of web application to adapt user requirement with exactly and rapidly. Distributed components in this paper are used in the most tiny size on network and suggest the network-addressable interface based on business domain. We also discuss the internal and external specifications for grasping component internal and external relations of user requirements to be analyzed. The specifications are stored on Servlets after dividing the information between session and entity as an EJB (Enterprise JavaBeans) that are reusable unit size in business domain. The reusable units are used in business component through query to get business component. As a major contribution, we propose a systems model for registration, auto-arrange, search, test, and download component, which covers component reusability and component customization.

  • PDF