• Title/Summary/Keyword: Real-time News

Search Result 90, Processing Time 0.025 seconds

Development of an online robot education community based on Web 2.0 (웹2.0 기반 온라인 로봇교육 커뮤니티의 개발)

  • Sung, Young-Hoon;Ha, Seok-Wun
    • Journal of The Korean Association of Information Education
    • /
    • v.13 no.3
    • /
    • pp.273-280
    • /
    • 2009
  • The internet becomes a new communication tool in the knowledge and information society and the people are expanded at the place of information interchange and exchange of view. In recent robot education institutions provide their own official homepages to introduce the robot educational resources. But because they have restrictive searching the functions and providing general robot education resources and don't offer a place that teachers can express their thoughts and share common interests with other users, online community among teachers for robot education and users couldn't have built. In this paper, we propose an Online Robot Education Community(OREC) that teachers and users in different robot education institutions can interchange or share their technical information, learn robot techniques, participate in discussion of their experiences on work, share their common interests, and be provided updated latest news in real-time.

  • PDF

A Study of SPA Vulnerability on 8-bit Implementation of Ring-LWE Cryptosystem (8 비트 구현 Ring-LWE 암호시스템의 SPA 취약점 연구)

  • Park, Aesun;Won, Yoo-Seung;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.439-448
    • /
    • 2017
  • It is news from nowhere that post-quantum cryptography has side-channel analysis vulnerability. Side-channel analysis attack method and countermeasures for code-based McEliece cryptosystem and lattice-based NTRU cryptosystem have been investigated. Unfortunately, the investigation of the ring-LWE cryptosystem in terms of side-channel analysis is as yet insufficient. In this paper, we propose a chosen ciphertext simple power analysis attack that can be applied when ring-LWE cryptography operates on 8-bit devices. Our proposed attack can recover the key only with [$log_2q$] traces. q is a parameter related to the security level. It is used 7681 and 12289 to match the common 128 and 256-bit security levels, respectively. We identify the vulnerability through experiment that can reveal the secret key in modular add while the ring-LWE decryption performed on real 8-bit devices. We also discuss the attack that uses a similarity measurement method for two vectors to reduce attack time.

A study on the digital transformation strategy of a fashion brand - Focused on the Burberry case - (패션 브랜드의 디지털 트랜스포메이션 전략에 관한 연구 - 버버리 사례를 중심으로 -)

  • Kim, Soyoung;Ma, Jin Joo
    • The Research Journal of the Costume Culture
    • /
    • v.27 no.5
    • /
    • pp.449-460
    • /
    • 2019
  • Today, the fashion business environment of the 4.0 generation is changing based on fashion technology combined with advanced digital technologies such as AI (Artificial Intelligence), big data and IoT (Internet of Things). "Digital Transformation" means a fundamental change and innovation in a digital paradigm including corporate strategy, organization, communication, and business model, based on the utilization of digital technology. Thus, this study examines digital transformation strategies through the fashion brand Burberry. The study contents are as follows. First, it examines the theoretical concept of digital transformation and its utilization status. Second, it analyzes the characteristics of Burberry's digital transformation based on its strategies. For the research methodology, a literature review was performed on books and papers, aligning with case studies through websites, social media, and news articles. The result showed that first, Burberry has reset their main target to Millennials who actively use mobile and social media, and continues to communicate with them by utilizing digital strategy in the entire management. Second, Burberry is quickly delivering consistent brand identity to consumers by internally creating and providing social media-friendly content. Third, they have started real-time product sales and services by using IT to enhance access to brands and to lead consumers towards more active participation. In this study, Burberry's case shows that digital transformation can contribute to increased brand value and sales, keeping up with the changes in the digital paradigm. Therefore, the study suggests that digital transformation will serve as an important business strategy for fashion brands in the future.

Improving the Accuracy of Document Classification by Learning Heterogeneity (이질성 학습을 통한 문서 분류의 정확성 향상 기법)

  • Wong, William Xiu Shun;Hyun, Yoonjin;Kim, Namgyu
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.3
    • /
    • pp.21-44
    • /
    • 2018
  • In recent years, the rapid development of internet technology and the popularization of smart devices have resulted in massive amounts of text data. Those text data were produced and distributed through various media platforms such as World Wide Web, Internet news feeds, microblog, and social media. However, this enormous amount of easily obtained information is lack of organization. Therefore, this problem has raised the interest of many researchers in order to manage this huge amount of information. Further, this problem also required professionals that are capable of classifying relevant information and hence text classification is introduced. Text classification is a challenging task in modern data analysis, which it needs to assign a text document into one or more predefined categories or classes. In text classification field, there are different kinds of techniques available such as K-Nearest Neighbor, Naïve Bayes Algorithm, Support Vector Machine, Decision Tree, and Artificial Neural Network. However, while dealing with huge amount of text data, model performance and accuracy becomes a challenge. According to the type of words used in the corpus and type of features created for classification, the performance of a text classification model can be varied. Most of the attempts are been made based on proposing a new algorithm or modifying an existing algorithm. This kind of research can be said already reached their certain limitations for further improvements. In this study, aside from proposing a new algorithm or modifying the algorithm, we focus on searching a way to modify the use of data. It is widely known that classifier performance is influenced by the quality of training data upon which this classifier is built. The real world datasets in most of the time contain noise, or in other words noisy data, these can actually affect the decision made by the classifiers built from these data. In this study, we consider that the data from different domains, which is heterogeneous data might have the characteristics of noise which can be utilized in the classification process. In order to build the classifier, machine learning algorithm is performed based on the assumption that the characteristics of training data and target data are the same or very similar to each other. However, in the case of unstructured data such as text, the features are determined according to the vocabularies included in the document. If the viewpoints of the learning data and target data are different, the features may be appearing different between these two data. In this study, we attempt to improve the classification accuracy by strengthening the robustness of the document classifier through artificially injecting the noise into the process of constructing the document classifier. With data coming from various kind of sources, these data are likely formatted differently. These cause difficulties for traditional machine learning algorithms because they are not developed to recognize different type of data representation at one time and to put them together in same generalization. Therefore, in order to utilize heterogeneous data in the learning process of document classifier, we apply semi-supervised learning in our study. However, unlabeled data might have the possibility to degrade the performance of the document classifier. Therefore, we further proposed a method called Rule Selection-Based Ensemble Semi-Supervised Learning Algorithm (RSESLA) to select only the documents that contributing to the accuracy improvement of the classifier. RSESLA creates multiple views by manipulating the features using different types of classification models and different types of heterogeneous data. The most confident classification rules will be selected and applied for the final decision making. In this paper, three different types of real-world data sources were used, which are news, twitter and blogs.

A Experimental Study on the 3-D Image Restoration Technique of Submerged Area by Chung-ju Dam (충주댐 수몰지구의 3차원 영상복원 기법에 관한 실험적 연구)

  • 연상호
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.22 no.1
    • /
    • pp.21-27
    • /
    • 2004
  • It will be a real good news fer the people who were lost their hometown by the construction of a large dam to be restored to the farmer state. Focused on Cheung-pyung around where most part were submerged by the Chungju large Dam founded in eurly 1980s, It used remote sensing image restoration Technique in this study in order to restore topographical features before the flood with stereo effects. We gathered comparatively good satellite photos and remotely sensed digital images, then its made a new fusion image from these various satellite images and the topographical map which had been made before the water filled by the DAM. This task was putting together two kinds of different timed images. And then, we generated DEM including the outskirts of that area as matching current contour lines with the map. That could be a perfect 3D image of test areas around before when it had been water filled by making perspective images from all directions included north, south, east and west, fer showing there in 3 dimensions. Also, for close range visiting made of flying simulation can bring to experience their real space at that time. As a result of this experimental task, it made of new fusion images and 3-D perspective images and simulation live images by remotely sensed photos and images, old paper maps about vanished submerged Dam areas and gained of possibility 3-D terrain image restoration about submerged area by large Dam construction.

Analysis of Twitter for 2012 South Korea Presidential Election by Text Mining Techniques (텍스트 마이닝을 이용한 2012년 한국대선 관련 트위터 분석)

  • Bae, Jung-Hwan;Son, Ji-Eun;Song, Min
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.141-156
    • /
    • 2013
  • Social media is a representative form of the Web 2.0 that shapes the change of a user's information behavior by allowing users to produce their own contents without any expert skills. In particular, as a new communication medium, it has a profound impact on the social change by enabling users to communicate with the masses and acquaintances their opinions and thoughts. Social media data plays a significant role in an emerging Big Data arena. A variety of research areas such as social network analysis, opinion mining, and so on, therefore, have paid attention to discover meaningful information from vast amounts of data buried in social media. Social media has recently become main foci to the field of Information Retrieval and Text Mining because not only it produces massive unstructured textual data in real-time but also it serves as an influential channel for opinion leading. But most of the previous studies have adopted broad-brush and limited approaches. These approaches have made it difficult to find and analyze new information. To overcome these limitations, we developed a real-time Twitter trend mining system to capture the trend in real-time processing big stream datasets of Twitter. The system offers the functions of term co-occurrence retrieval, visualization of Twitter users by query, similarity calculation between two users, topic modeling to keep track of changes of topical trend, and mention-based user network analysis. In addition, we conducted a case study on the 2012 Korean presidential election. We collected 1,737,969 tweets which contain candidates' name and election on Twitter in Korea (http://www.twitter.com/) for one month in 2012 (October 1 to October 31). The case study shows that the system provides useful information and detects the trend of society effectively. The system also retrieves the list of terms co-occurred by given query terms. We compare the results of term co-occurrence retrieval by giving influential candidates' name, 'Geun Hae Park', 'Jae In Moon', and 'Chul Su Ahn' as query terms. General terms which are related to presidential election such as 'Presidential Election', 'Proclamation in Support', Public opinion poll' appear frequently. Also the results show specific terms that differentiate each candidate's feature such as 'Park Jung Hee' and 'Yuk Young Su' from the query 'Guen Hae Park', 'a single candidacy agreement' and 'Time of voting extension' from the query 'Jae In Moon' and 'a single candidacy agreement' and 'down contract' from the query 'Chul Su Ahn'. Our system not only extracts 10 topics along with related terms but also shows topics' dynamic changes over time by employing the multinomial Latent Dirichlet Allocation technique. Each topic can show one of two types of patterns-Rising tendency and Falling tendencydepending on the change of the probability distribution. To determine the relationship between topic trends in Twitter and social issues in the real world, we compare topic trends with related news articles. We are able to identify that Twitter can track the issue faster than the other media, newspapers. The user network in Twitter is different from those of other social media because of distinctive characteristics of making relationships in Twitter. Twitter users can make their relationships by exchanging mentions. We visualize and analyze mention based networks of 136,754 users. We put three candidates' name as query terms-Geun Hae Park', 'Jae In Moon', and 'Chul Su Ahn'. The results show that Twitter users mention all candidates' name regardless of their political tendencies. This case study discloses that Twitter could be an effective tool to detect and predict dynamic changes of social issues, and mention-based user networks could show different aspects of user behavior as a unique network that is uniquely found in Twitter.

Investigating Dynamic Mutation Process of Issues Using Unstructured Text Analysis (비정형 텍스트 분석을 활용한 이슈의 동적 변이과정 고찰)

  • Lim, Myungsu;Kim, Namgyu
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.1
    • /
    • pp.1-18
    • /
    • 2016
  • Owing to the extensive use of Web media and the development of the IT industry, a large amount of data has been generated, shared, and stored. Nowadays, various types of unstructured data such as image, sound, video, and text are distributed through Web media. Therefore, many attempts have been made in recent years to discover new value through an analysis of these unstructured data. Among these types of unstructured data, text is recognized as the most representative method for users to express and share their opinions on the Web. In this sense, demand for obtaining new insights through text analysis is steadily increasing. Accordingly, text mining is increasingly being used for different purposes in various fields. In particular, issue tracking is being widely studied not only in the academic world but also in industries because it can be used to extract various issues from text such as news, (SocialNetworkServices) to analyze the trends of these issues. Conventionally, issue tracking is used to identify major issues sustained over a long period of time through topic modeling and to analyze the detailed distribution of documents involved in each issue. However, because conventional issue tracking assumes that the content composing each issue does not change throughout the entire tracking period, it cannot represent the dynamic mutation process of detailed issues that can be created, merged, divided, and deleted between these periods. Moreover, because only keywords that appear consistently throughout the entire period can be derived as issue keywords, concrete issue keywords such as "nuclear test" and "separated families" may be concealed by more general issue keywords such as "North Korea" in an analysis over a long period of time. This implies that many meaningful but short-lived issues cannot be discovered by conventional issue tracking. Note that detailed keywords are preferable to general keywords because the former can be clues for providing actionable strategies. To overcome these limitations, we performed an independent analysis on the documents of each detailed period. We generated an issue flow diagram based on the similarity of each issue between two consecutive periods. The issue transition pattern among categories was analyzed by using the category information of each document. In this study, we then applied the proposed methodology to a real case of 53,739 news articles. We derived an issue flow diagram from the articles. We then proposed the following useful application scenarios for the issue flow diagram presented in the experiment section. First, we can identify an issue that actively appears during a certain period and promptly disappears in the next period. Second, the preceding and following issues of a particular issue can be easily discovered from the issue flow diagram. This implies that our methodology can be used to discover the association between inter-period issues. Finally, an interesting pattern of one-way and two-way transitions was discovered by analyzing the transition patterns of issues through category analysis. Thus, we discovered that a pair of mutually similar categories induces two-way transitions. In contrast, one-way transitions can be recognized as an indicator that issues in a certain category tend to be influenced by other issues in another category. For practical application of the proposed methodology, high-quality word and stop word dictionaries need to be constructed. In addition, not only the number of documents but also additional meta-information such as the read counts, written time, and comments of documents should be analyzed. A rigorous performance evaluation or validation of the proposed methodology should be performed in future works.

Intelligent Web Crawler for Supporting Big Data Analysis Services (빅데이터 분석 서비스 지원을 위한 지능형 웹 크롤러)

  • Seo, Dongmin;Jung, Hanmin
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.575-584
    • /
    • 2013
  • Data types used for big-data analysis are very widely, such as news, blog, SNS, papers, patents, sensed data, and etc. Particularly, the utilization of web documents offering reliable data in real time is increasing gradually. And web crawlers that collect web documents automatically have grown in importance because big-data is being used in many different fields and web data are growing exponentially every year. However, existing web crawlers can't collect whole web documents in a web site because existing web crawlers collect web documents with only URLs included in web documents collected in some web sites. Also, existing web crawlers can collect web documents collected by other web crawlers already because information about web documents collected in each web crawler isn't efficiently managed between web crawlers. Therefore, this paper proposed a distributed web crawler. To resolve the problems of existing web crawler, the proposed web crawler collects web documents by RSS of each web site and Google search API. And the web crawler provides fast crawling performance by a client-server model based on RMI and NIO that minimize network traffic. Furthermore, the web crawler extracts core content from a web document by a keyword similarity comparison on tags included in a web documents. Finally, to verify the superiority of our web crawler, we compare our web crawler with existing web crawlers in various experiments.

An Investigation of Social Commerce Service Quality on Consumer's Satisfaction (소셜커머스의 서비스품질과 소비자 만족도의 상관관계 분석)

  • Shin, Seung-Soo;Shin, Miyea;Jeong, Yoon-Su;Lee, Jihea
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.2
    • /
    • pp.27-32
    • /
    • 2015
  • Recently, service-related products have gained more attention than general products on the existing social commerce sites. Based on the situation, the effect that the service quality of social commerce has on customer satisfaction was analyzed in this study. It is a study that analyzes how much the service quality affects the customer satisfaction after the purchase, targeting consumers who have made purchases of social commerce products. In the case of social commerce, it is well-known that the diversity and convenience of products have a significant effect on customer satisfaction. Social commerce is currently being dumped beyond the 900 sites and dozens of cases of news, real-time searches of popular portal sites appeared not to be bored enough to related sites to drive the popularity coming quickly dug into our everyday lives of human beings. Yet the perception of social commerce seems not properly established because of the new concept was suddenly going to go through penetration without a collective interpretation and acceptance process. Most of the companies that often mimic the syoseol commerce is large, the blame did not depart from the forms of social shopping. We believe that personal and exhibit their skills and talents, and to wonder to see the social rather than the individuals who make unilateral companies.

  • PDF

Social Factors Affecting Internet Searches on Cyber Bullying in Korea and America Using Social Big Data and Google Search Trends (소셜 빅데이터와 Google 검색트렌드를 활용한 한국과 미국의 사이버불링 검색에 영향을 미치는 요인 분석)

  • Song, Tae-Min;Song, Juyoung;Cheon, Mi-Kyung
    • The Journal of Bigdata
    • /
    • v.1 no.1
    • /
    • pp.67-75
    • /
    • 2016
  • The study analyzed big data extracted from Google and social media to identify factors related to searches on cyber bullying in Korea and America. Korea's cyber bullying analysis was conducted social big data collected from online news sites, blogs, $caf{\acute{e}}s$, social network services and message for between January 1, 2011 and March 31, 2013. Google search trends for the search words of stress, exercise, drinking, and cyber bullying were obtained for January 1, 2004 and December 22, 2013. The main results of this study were as follows: first, the significant factors stress were cyber bullying that Korea more than America. Secondly, a positive relationship was found between stress and drinking, exercise and cyber bullying both Korea and America. Thirdly, significant differences were found all path both Korea and America. The study shows that both adults and teenagers are influenced in Korea. We need to develop online application that if cyber bullying behavior was predicted can intervene in real time because these actual cyber bullying-related exposure to psychological and behavioral characteristic.

  • PDF