• Title/Summary/Keyword: Semantic Computing

Search Result 252, Processing Time 0.023 seconds

Semantics-aware Obfuscation for Location Privacy

  • Damiani, Maria Luisa;Silvestri, Claudio;Bertino, Elisa
    • Journal of Computing Science and Engineering
    • /
    • v.2 no.2
    • /
    • pp.137-160
    • /
    • 2008
  • The increasing availability of personal location data pushed by the widespread use of location-sensing technologies raises concerns with respect to the safeguard of location privacy. To address such concerns location privacy-preserving techniques are being investigated. An important area of application for such techniques is represented by Location Based Services (LBS). Many privacy-preserving techniques designed for LBS are based on the idea of forwarding to the LBS provider obfuscated locations, namely position information at low spatial resolution, in place of actual users' positions. Obfuscation techniques are generally based on the use of geometric methods. In this paper, we argue that such methods can lead to the disclosure of sensitive location information and thus to privacy leaks. We thus propose a novel method which takes into account the semantic context in which users are located. The original contribution of the paper is the introduction of a comprehensive framework consisting of a semantic-aware obfuscation model, a novel algorithm for the generation of obfuscated spaces for which we report results from an experimental evaluation and reference architecture.

Word Sense Disambiguation Using Embedded Word Space

  • Kang, Myung Yun;Kim, Bogyum;Lee, Jae Sung
    • Journal of Computing Science and Engineering
    • /
    • v.11 no.1
    • /
    • pp.32-38
    • /
    • 2017
  • Determining the correct word sense among ambiguous senses is essential for semantic analysis. One of the models for word sense disambiguation is the word space model which is very simple in the structure and effective. However, when the context word vectors in the word space model are merged into sense vectors in a sense inventory, they become typically very large but still suffer from the lexical scarcity. In this paper, we propose a word sense disambiguation method using word embedding that makes the sense inventory vectors compact and efficient due to its additive compositionality. Results of experiments with a Korean sense-tagged corpus show that our method is very effective.

Enhancing Text Document Clustering Using Non-negative Matrix Factorization and WordNet

  • Kim, Chul-Won;Park, Sun
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.4
    • /
    • pp.241-246
    • /
    • 2013
  • A classic document clustering technique may incorrectly classify documents into different clusters when documents that should belong to the same cluster do not have any shared terms. Recently, to overcome this problem, internal and external knowledge-based approaches have been used for text document clustering. However, the clustering results of these approaches are influenced by the inherent structure and the topical composition of the documents. Further, the organization of knowledge into an ontology is expensive. In this paper, we propose a new enhanced text document clustering method using non-negative matrix factorization (NMF) and WordNet. The semantic terms extracted as cluster labels by NMF can represent the inherent structure of a document cluster well. The proposed method can also improve the quality of document clustering that uses cluster labels and term weights based on term mutual information of WordNet. The experimental results demonstrate that the proposed method achieves better performance than the other text clustering methods.

A Programmable Electronic Systems Dedicated to Safety Related Applications (안전성이 요구되는 응용분야에 사용하는 프로그램 가능한 전자시스템)

  • Jeong, Sun-Gi;Wolfgang A. Halang;Coen Bron
    • The Transactions of the Korea Information Processing Society
    • /
    • v.1 no.4
    • /
    • pp.438-451
    • /
    • 1994
  • A low complexity, fault detecting computer architecture for utilisation in programmable logic controllers is designed. The cyclic operating mode of PLCs and a specification level, graphical programming paradigm based on the interconnection of application oriented standard software function modules are architecturally supported. Thus, by design, there is no semantic gap between the programming and machine execution levels enabling the safety licensing of application software by an extremely simple, but rigorous method, viz, diverse back translation.

  • PDF

Design And Implementation of Video Retrieval System for Using Semantic-based Annotation (의미 기반 주석을 이용한 비디오 검색 시스템의 설계 및 구현)

  • 홍수열
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.3
    • /
    • pp.99-105
    • /
    • 2000
  • Video has become an important element of multimedia computing and communication environments, with applications as varied as broadcasting, education, publishing, and military intelligence. The necessity of the efficient methods for multimedia data retrieval is increasing more and more on account of various large scale multimedia applications. According1y, the retrieval and representation of video data becomes one of the main research issues in video database. As for the representation of the video data there have been mainly two approaches: (1) content-based video retrieval, and (2) annotation-based video retrieval This paper designs and implements a video retrieval system for using semantic-based annotation.

  • PDF

An extended Access Control with Uncertain Context

  • Kang, Woojun
    • International journal of advanced smart convergence
    • /
    • v.7 no.4
    • /
    • pp.66-74
    • /
    • 2018
  • While new information technology advances have made information access and acquisition methods much more diverse and easier, there are side effects that allow illegal access using diverse and high-performance tools. In order to cope with such threats, there are access control methods in database technology, and various studies are being conducted to extend traditional access control to cope with new computing environments. In this paper, we propose an extended access control with uncertain context-awareness. It enables appropriate security policy enforcement even if the contextual constraints specified by the security policy does not match those accompanied by access request query. We extract semantic implications from context tree, and define the argument that can quantitatively measure the semantic difference between two nodes in the context tree. It is used to semantically enforce the security policy, and to prevent the excessive authorization caused by the implication.

Systematic Review on Chatbot Techniques and Applications

  • Park, Dong-Min;Jeong, Seong-Soo;Seo, Yeong-Seok
    • Journal of Information Processing Systems
    • /
    • v.18 no.1
    • /
    • pp.26-47
    • /
    • 2022
  • Chatbots were an important research subject in the past. A chatbot is a computer program or an artificial intelligence program that participates in a conversation via auditory or textual methods. As the research on chatbots progressed, some important issues regarding them changed over time. Therefore, it is necessary to review the technology with a focus on recent advancements and core research technologies. In this paper, we introduce five different chatbot technologies: natural language processing, pattern matching, semantic web, data mining, and context-aware computer. We also introduce the latest technology for the chatbot researchers to recognize the present situation and channelize it in the right direction.

A Semantic Approach to the Design of Valid and Reversible Semistructured Views

  • Chen, Yabing;Ling, Tok Wang;Lee, Mong Li;Nakanishi, Masatake;Dobbie, Gillian
    • Journal of Computing Science and Engineering
    • /
    • v.1 no.1
    • /
    • pp.95-123
    • /
    • 2007
  • Existing systems that support semistructured views do not maintain semantics during the process of designing the views. Thus, these systems do not guarantee the validity and reversibility of the views. In this paper, we propose an approach to address the issue of valid and reversible semistructured views, We design a set of view operators for designing semistructured views. These operators are select, drop, join and swap. For each operator, we develop a complete set of rules to maintain the semantics of the views. In particular, we maintain the evolution and integrity of relationships once an operator is applied. We also examine the reversible view problem under our operators and develop rules to guarantee that the designed views are reversible. Finally, we examine the changes in the participation constraints of relationship types during the view design process, and develop rules to ensure the correctness of the participation constraints.

Gen-Z memory pool system implementation and performance measurement

  • Kwon, Won-ok;Sok, Song-Woo;Park, Chan-ho;Oh, Myeong-Hoon;Hong, Seokbin
    • ETRI Journal
    • /
    • v.44 no.3
    • /
    • pp.450-461
    • /
    • 2022
  • The Gen-Z protocol is a memory semantic protocol between the memory and CPU used in computer architectures with large memory pools. This study presents the implementation of the Gen-Z hardware system configured using Gen-Z specification 1.0 and reports its performance. A hardware prototype of a DDR4 Gen-Z memory pool with an optimized character, a block device driver, and a file system for the Gen-Z hardware was designed. The Gen-Z IP was targeted to the FPGA, and a 512 GB Gen-Z memory pool was configured on an ×86 server. In the experiments, the latency and throughput of the Gen-Z memory were measured and compared with those of the local memory, SATA SSD, and NVMe using character or block device interfaces. The Gen-Z hardware exhibited superior throughput and latency performance compared with SATA SSD and NVMe at block sizes under 4 kB. The MySQL and File IO benchmark of Gen-Z showed good write performance in all block sizes and threads. Besides, it showed low latency in RocksDB's fillseq dbbench using the ext4 direct access filesystem.

A Semantic Service Discovery System for Smart-Cities (스마트시티를 위한 시맨틱 서비스 디스커버리 시스템)

  • Yun, Chang Ho;Park, Jong Won;Jung, Hae Sun;Lee, Yong Woo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.6
    • /
    • pp.281-288
    • /
    • 2017
  • In Smart-cities, various types of integrated services must be linked to provide services to applications. Therefore, flexibility must be ensured between services so that various services can be efficiently provided. In order to secure the flexibility among services, it is very important to have a function to dynamically discover and invoke a desired service by searching for a semantic service by reflecting a recognized context through real-time context-aware in smart-cities. To date, quite a number of semantic service discovery techniques have been developed. However, they have not been verified as suitable for use in the smart-city domain. In this study, we tried to verify the existing ones to use a suitable one. We tested most of existing semantic service discovery techniques, but we found that none of them is suitable to our research. Therefore, we developed our own semantic service discovery technique. This paper introduces our work and presents the performance evaluation results that demonstrate that our developed works well and show good performance. For the performance evaluation, the experimental system was actually constructed and the real performance was measured. In the experiment, we implemented the semantic service discovery scenario that dynamically searches and calls the services needed to provide fire accident management services in smart cities.