• 제목/요약/키워드: Knowledge-based systems

Search Result 2,131, Processing Time 0.027 seconds

Reorganizing Social Issues from R&D Perspective Using Social Network Analysis

  • Shun Wong, William Xiu;Kim, Namgyu
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.3
    • /
    • pp.83-103
    • /
    • 2015
  • The rapid development of internet technologies and social media over the last few years has generated a huge amount of unstructured text data, which contains a great deal of valuable information and issues. Therefore, text mining-extracting meaningful information from unstructured text data-has gained attention from many researchers in various fields. Topic analysis is a text mining application that is used to determine the main issues in a large volume of text documents. However, it is difficult to identify related issues or meaningful insights as the number of issues derived through topic analysis is too large. Furthermore, traditional issue-clustering methods can only be performed based on the co-occurrence frequency of issue keywords in many documents. Therefore, an association between issues that have a low co-occurrence frequency cannot be recognized using traditional issue-clustering methods, even if those issues are strongly related in other perspectives. Therefore, in this research, a methodology to reorganize social issues from a research and development (R&D) perspective using social network analysis is proposed. Using an R&D perspective lexicon, issues that consistently share the same R&D keywords can be further identified through social network analysis. In this study, the R&D keywords that are associated with a particular issue imply the key technology elements that are needed to solve a particular issue. Issue clustering can then be performed based on the analysis results. Furthermore, the relationship between issues that share the same R&D keywords can be reorganized more systematically, by grouping them into clusters according to the R&D perspective lexicon. We expect that our methodology will contribute to establishing efficient R&D investment policies at the national level by enhancing the reusability of R&D knowledge, based on issue clustering using the R&D perspective lexicon. In addition, business companies could also utilize the results by aligning the R&D with their business strategy plans, to help companies develop innovative products and new technologies that sustain innovative business models.

A Cooperation Mechanism among Seller Agents based on Exchanging Goods in Agent-mediated Electronic Commerce

  • Ito, Takayuki;Hattori, Hiromitsy;Shintani, Toramatsu
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.89-96
    • /
    • 2001
  • Agent-mediated electronic markets have been a grow-ing area of agent research and developmen tin recent year. There exist a lot of e-commerce sites on the In-ternet(e.g. Priceline, com, Amazon, com etc). These e-commerce site have proposed new business models for effective and efficient commerce activity. Intelli-gent agents have been studied very widely in the field of artificial intelligence, For purpose of this paper, an agent can act autonomously and collaboratively in a network environment on behalf of its users. It is hard for people to effectively and efficiently monitor, buy, and sell at multiple e-commerce sites. If we intro-duce agent technologies into e-commerce systems, we can expect to further enhance the intelligence of their support. In this paper, we propose a new coopera-tion mechanism among seller agents based on exchang-ing their goods in our agent-mediated electronic market system. G-Commerce. On G-Commerce, seller agents and buyer agents negotiate with each other. In our model, seller agents cooperatively negotiate in order to effectively sell goods in stock. Buyer agents coopera-tively form coalitions in order to buy goods based an discount proices. Seller agent's negotiation goods. Our current experiments show that exchanging mechanism enables seller agents to effectively sell goods in stock. Also, we present the Pareto optimality of our exchang-ing mechanism.

  • PDF

A Study on the Model of History Ontology: A Focus on Korean Modern Historical Person (역사용어 온톨로지 모형 적용 방안 연구 - 한국근현대사 인물을 중심으로 -)

  • Lee, Hye-Won;Yoon, So-Young
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.22 no.1
    • /
    • pp.263-280
    • /
    • 2011
  • The purpose of the study is to construct a History Ontology Model for historical person to analyse issues of Korean History Thesaurus and interview history specialists who are use information systems in National Institute of Korean History. This study verifies the difference between both descriptions through comparative analysis of term concept in Korean History Thesaurus and mind-map written by history major. Based on this, we build history ontology model to meet users' information needs and adapt to information retrieval system. First, to organize unique features of history, we define class and attribute and then enlisted considerations for instance input. The study suggests a possibility of new service through combination multiple features using concept extension that is a strength of ontology.

Context-based Social Network Configuration Method between Users (컨텍스트 기반 사용자 간 소셜 네트워크 구성 방법)

  • Han, Jong-Hyun;Woo, Woon-Tack
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.11-14
    • /
    • 2009
  • In this paper, we propose the method configuring social networks among users based on users' context and profile. Recently, many researchers are concerned about social networks related with collaborative systems. In case of the existing researches, however, it is difficult to configure social networks dynamically because they are based on static data types, such as log and profile of users. The proposed method uses not only user profiles but also context reflecting users' behavior dynamically. It computes the similarity among users' behavior contexts using hierarchical structure of context domain knowledge model. And it calculates relationships between contexts by given weight factors of category of context model. In order to verify usefulness of the method, we conduct an experiment on configuring social network according to change of user context. We expect that it makes dynamic analysis of relationship of users possible.

  • PDF

Diagnosing Multiple Faults using Multiple Context Spaces (다중 상황공간을 이용한 다중 오류의 고장 진단)

  • Lee, Gye-Sung;Gwon, Gyeong-Hui
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.1
    • /
    • pp.137-148
    • /
    • 1997
  • Diagnostic problem solving is a major application area of knowledge-based systems research. However, most of the current approaches, both heuristic and model-based, are designed to identify single faults, and do not generalize easily to multiple fault diagnosis without exhibiting exponential behavior in the amount of computation required. In this paper, we employ a decomposition approach based on system configuration to generate an efficient algorithm for multiple fault diagnosis. The basic idea of the algorithm is to reduce the inherent combinatorial explosion that occurs in generating multiple faults by partitioning the circuit into groups that correspond to output measurement points. Rules are multiple faults by partitioning the circuit into groups that correspond to output measurement points. rules are developed for combining candidates from individual groups, and forming consistent sets of minimal candidates.

  • PDF

A Software Architecture Design Method that Matches Problem Frames and Architectural Patterns (문제틀과 아키텍처 패턴의 매칭을 이용한 소프트웨어 아키텍처 설계 방법)

  • Kim, Jungmin;Kang, Sungwon;Lee, Jihyun
    • Journal of KIISE
    • /
    • v.42 no.3
    • /
    • pp.341-360
    • /
    • 2015
  • While architectural patterns provide software development solutions by providing schemas for structural organizations of software systems based on empirical knowledge, Jackson's problem frames provide a method of analyzing software problems. Problem frames are useful to understanding the software development problem, by putting emphasis on the problem domain, rather than on the solution space. Research exists that relates problem frames and software architecture, but most of this research uses problem frames only to understand given problems. Moreover, none of the existing research derives architectural patterns by considering both problem frames and quality attributes. In this paper, we propose a software architecture design method for pattern-based architecture design, by matching problem frames and architectural patterns. To that end, our approach first develops the problem model based on the problem frames approach, and then uses it to match with candidate architectural patterns, from the perspectives of both functionality, and quality attributes. Functional matching uses the problem frame diagram to match the problem model of an architectural pattern. We conduct a case study to show that our approach can systematically decide the right architectural patterns, and provide a basis for fine-grained software architecture design.

OntCIA: Software Change Impact Analysis System Based on the Semantic Web (OntCIA: 시맨틱 웹 기술 기반의 소프트웨어 변경 영향분석 시스템)

  • Song Hee Seok
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.2
    • /
    • pp.111-131
    • /
    • 2004
  • Software change is an essential operation for software evolution. To maintain the system competently, managers as well as developers must be able to understand the structure of the system but the structure of software is hidden to the developers and managers who need to change it. In this paper, we present a system (OntCIA) for supporting change impact analysis for rating and billing domain based on the semantic web technology. The basic idea of OntCIA is to build a domain knowledge base using an OWL ontology and RDF to implement change impact analysis system that would support the managers and software developers in finding out information about structure of large software system. OntCIA allows users to incrementally build an ontology in rating and billing domain and provides useful information in response to user queries concerning the code, such as, for example 'Find the modules which have a role for confirming new subscription'. The strengths of OntCIA are its architecture for easy maintenance as well as semantic indexing by automatic reasoning.

  • PDF

Goal-oriented Geometric Model Based Intelligent System Architecture for Adaptive Robotic Motion Generation in Dynamic Environment

  • Lee, Dong-Hun;Hwang, Kyung-Hun;Chung, Chae-Wook;Kuc, Tae-Yong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.2568-2574
    • /
    • 2005
  • Control architecture of the action based robot engineering can be divided into two types of deliberate type - and reactive type- controller. Typical deliberate type, slow in reaction speed, is well suited for the realization of the higher intelligence with its capability to forecast on the basis of environmental model according to time flow, while reactive type is suitable for the lower intelligence as it fits to the realization of speedy reactive action by inputting the sensor without a complete environmental model. Looking at the environments in the application areas in which robots are actually used, we can see that they have been mostly covered by the uncertain and unknown dynamic changes depending on time and place, the previously known knowledge being existed though. It may cause, therefore, any deterioration of the robot performance as well as further happen such cases as the robots can not carry out their desired performances, when any one of these two types is solely engaged. Accordingly this paper aims at suggesting Goal-oriented Geometric Model(GGM) Based Intelligent System Architecture which leads the actions of the robots to perform their jobs under variously changing environment and applying the suggested system structure to the navigation issues of the robots. When the robots do perform navigation in human life changing in a various manner with time, they can appropriately respond to the changing environment by doing the action with the recognition of the state. Extending this concept to cover the highest hierarchy without sticking only to the actions of the robots can lead us to apply to the algorithm to perform various small jobs required for the carrying-out of a large main job.

  • PDF

A Study on the Law2Vec Model for Searching Related Law (연관법령 검색을 위한 워드 임베딩 기반 Law2Vec 모형 연구)

  • Kim, Nari;Kim, Hyoung Joong
    • Journal of Digital Contents Society
    • /
    • v.18 no.7
    • /
    • pp.1419-1425
    • /
    • 2017
  • The ultimate goal of legal knowledge search is to obtain optimal legal information based on laws and precedent. Text mining research is actively being undertaken to meet the needs of efficient retrieval from large scale data. A typical method is to use a word embedding algorithm based on Neural Net. This paper demonstrates how to search relevant information, applying Korean law information to word embedding. First, we extracts reference laws from precedents in order and takes reference laws as input of Law2Vec. The model learns a law by predicting its surrounding context law. The algorithm then moves over each law in the corpus and repeats the training step. After the training finished, we could infer the relationship between the laws via the embedding method. The search performance was evaluated based on precision and the recall rate which are computed from how closely the results are associated to the search terms. The test result proved that what this paper proposes is much more useful compared to existing systems utilizing only keyword search when it comes to extracting related laws.

Cryptanalysis of an Identity-Based Message Authentication Scheme in VANETs (신원기반의 차량통신망 메시지 인증 스킴에 대한 안전성 분석)

  • Ryu, Eun-Kyung;Lee, Sung-Woon;Yoo, Kee-Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.167-172
    • /
    • 2013
  • In a paper recently published in the International Journal of Parallel, Emergent and Distributed Systems, Biswas et al. proposed a VANET message authentication scheme which uses an identity-based proxy signature mechanism as an underlying primitive. The authors claimed that their scheme supports various security features including the security of proxy-key, the security against message forgery and the security against replay attack, with non-repudiation and resistance to proxy-key compromise. Here, we show how an active attacker, who has no knowledge of an original message sender's private key, can compute the proxy-signature key of the corresponding message sender, meaning that the scheme is completely insecure. We also suggest an enhanced version of the protocol capable of solving such serious security holes.