• Title/Summary/Keyword: Sensitive data

Search Result 2,479, Processing Time 0.029 seconds

Context-sensitive Word Error Detection and Correction for Automatic Scoring System of English Writing (영작문 자동 채점 시스템을 위한 문맥 고려 단어 오류 검사기)

  • Choi, Yong Seok;Lee, Kong Joo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.1
    • /
    • pp.45-56
    • /
    • 2015
  • In this paper, we present a method that can detect context-sensitive word errors and generate correction candidates. Spelling error detection is one of the most widespread research topics, however, the approach proposed in this paper is adjusted for an automated English scoring system. A common strategy in context-sensitive word error detection is using a pre-defined confusion set to generate correction candidates. We automatically generate a confusion set in order to consider the characteristics of sentences written by second-language learners. We define a word error that cannot be detected by a conventional grammar checker because of part-of-speech ambiguity, and propose how to detect the error and generate correction candidates for this kind of error. An experiment is performed on the English writings composed by junior-high school students whose mother tongue is Korean. The f1 value of the proposed method is 70.48%, which shows that our method is promising comparing to the current-state-of-the art.

Analysis of gamma-ray-induced DNA damage in human, mouse and rat peripheral blood lymphocytes using single-cell gel electrophoresis (단세포 전기영동법을 이용한 인체, 마우스 및 랫드 림프구의 방사선에 의해 유발된 DNA 손상 측정)

  • Oh, Heon;Jung, Uhee;Park, Hae-Ran;Kim, Sung-Ho;Jo, Sung-Kee
    • Korean Journal of Veterinary Research
    • /
    • v.44 no.1
    • /
    • pp.41-47
    • /
    • 2004
  • The alkaline single-cell gel electrophoresis (SCGE) assay, called the comet assay, has been applied to detect DNA damage induced by a number of chemicals and biological factors in vivo and in vitro. The DNA damage was analysed by tail moment (TM) and tail length (TL), which were markers of DNA strand breaks in SCGE. Human, mouse and rat peripheral blood lymphocytes (PBLs) were irradiated with different doses of $^{60}Co$ ${\gamma}$-rays, e.g. 1, 2, 4, and 8 Gy at a dose rate of 1 Gy/min. A dose-dependent increase in TM (p<0.01) and TL (p<0.01) was obtained at all the radiation doses (1-8 Gy) in human, mouse and rat PBLs. Mouse PBLs were more sensitive than human PBLs which were in turn more sensitive than rat PBLs when the treated dosages were 1 and 2 Gy. However, human PBLs were more sensitive than mouse PBLs which were in turn more sensitive than rat PBLs when the irradiation dosages were 4 and 8 Gy. Data from all three species could be fitted to a linear-quadratic model. These results indicated that there may be inherent differences in the radio-sensitivity among PBLs of mammalian species.

Two independent mechanisms mediate discrimination of IID textures varying in mean luminance and contrast (평균밝기와 대비성의 차원으로 구성된 결 공간에서 결 분리에 작용하는 두 가지 기제)

  • 남종호
    • Korean Journal of Cognitive Science
    • /
    • v.10 no.3
    • /
    • pp.39-49
    • /
    • 1999
  • The space of IID([ndependently, Identically Distributed) textures was built with axes of mean luminance and contrast, and studied on what kind of mechanisms were required to mediate texture segregation in this space. The conjecture was tested that one of these mechanisms is sensitive to the differences between the means of textures to be discriminated, whereas the other is sensitive to the differences between variances. The probability of discrimination was measured for various pairs of textures in the lID space The data were well fit by a model in which discrimination depends on two mechanisms whose responses are combined by probability summation. The conjecture was rejected that two mechanisms respectively tuned to mean and variance of texture function in segregation. Discrimination within space is mediated by 2 independent channels however: the 2 independent channels are not exactly tuned to texture mean and variance. One m mechanism was primarily sensitive to texture mean, whereas the other was sensitive to b both texture mean and variance.

  • PDF

LORETA analysis of EEG responding to positive/negative emotional stimuli for different sensitivities of behavioral activation and inhibition systems (긍/부정 감성자극에 대한 행동활성화체계 및 행동억제체계 민감도에 따른 뇌파의 LORETA 분석)

  • Kim Wuon-Shik;Jin Seung-Hyun
    • Science of Emotion and Sensibility
    • /
    • v.8 no.4
    • /
    • pp.403-413
    • /
    • 2005
  • The purpose of the present study was to investigate the responses to positive/negative emotional stimuli for the different sensitivities of behavioral activation system (BAS) and behavioral inhibition system (BIS). We recorded If-channel EEG data for 8 BAS sensitive subjects an48 BIS sensitive subjects. EEGs were analyzed with LORETA (Low-resolution electromagnetic tomography) From scalp-recorded electrical potential distribution, LORETA computes the three-dimensional intracerebral distributions of current density for specified EEG frequency bands. hs results , significant differences between the BAS sensitive group ant the BIS sensitive group appeared LORETA alpha activities over the prefrontal lobe and the cingulate gyrus. Prefrontal regions and limbic system including cingulate gyrus are involved in emotional processing. Moreover, subjects with the high BAS sensitivity. responded more sensitively to the positive stimulation than subjects with the high BIS sensitivity. Therefore, our results suggest the possibility of correlation between BAS/BIS sensitivity and positive/negative emotional stimuli.

  • PDF

Effective Access Control Mechanism for Protection of Sensitive Personal Information (민감한 개인정보 보호를 위한 효율적인 접근제어 기법)

  • Mun, Hyung-Jin;Kim, Ki-Soo;Um, Nam-Kyung;Li, Yong-Zhen;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7C
    • /
    • pp.667-673
    • /
    • 2007
  • In order to provide the efficient personalized services, the organizations and the companies collect and manage the personal information. The stored data have some slight differences among each subject. Even though the same attribute information leaks out, the personal privacy violation is different according to personal sensitivity. However, currently the organizations or the companies protect all the information as the same level. This paper reflects the sensitive attribute information of the information subject to each personal policy by the encrypting techniques. And then we propose a policy-based access control mechanism for the personal information which strictly prevents unauthorized information users from illegally accessing the personal information. In the proposed mechanism, the individuals' personal information which is encrypted with different keys is stored into the database. For the access control, information subjects set up their own access control policy for their sensitive personal information. Then it is possible to control the information access by providing the information to the information users according to personal and organizational privacy policy.

Electrical properties and ATP-sensitive K+ channel density of the rat substantia nigra pars compacta neurons (랫드 흑질 신경세포의 전기적 특성과 ATP-sensitive K+채널의 전류밀도)

  • Han, Seong-kyu;Park, Jin-bong;Ryu, Pan-dong
    • Korean Journal of Veterinary Research
    • /
    • v.40 no.2
    • /
    • pp.275-282
    • /
    • 2000
  • Substantia nigra is known to highly express glibenclamide binding site, a protein associated to ATP-sensitive $K^{+}$ ($K_{ATP}$) channel in the brain. However, the functional expression of $K_{ATP}$ channels in the area is not yet known. In this work, we attempted to estimate the functional expression of $K_{ATP}$ channels in neurons of the substantia nigra pars compacta (SNC) in young rats using slice patch clamp technique. Membrane properties and whole cell currents attributable to $K_{ATP}$ channel were examined by the current and voltage clamp method, respectively. In SNC, two sub-populations of neurons were identified. Type I (rhythmic) neurons had low frequency rebound action potentials ($4.5{\pm}0.25Hz$, n=75) with rhythmic pattern. Type II (phasic) neurons were characterized by faster firing ($22.7{\pm}3.16Hz$, n=12). Both time constants and membrane capacitance in rhythmic neurons ($34.0{\pm}1.27$ ms, $270.0{\pm}11.83$ pF) and phasic neurons ($23.7{\pm}4.16$ ms, $184{\pm}35.2$ pF) were also significantly different. The current density of $K_{ATP}$ channels was $6.1{\pm}1.47$ pA/pF (2.44~15.43 pA/pF, n=8) at rhythmic neurons of young rats. Our data show that in SNC there are two types of neurons with different electrical properties and the density of $K_{ATP}$, channel of rhythmic neuron is about 600 channels per neuron.

  • PDF

A Study of the Mitigating Effect Comparison of Voltage Sags by WTG Types Based on the Concept of Area of Vulnerability (타입별 풍력 발전기 설치에 따른 민감 부하의 순간전압강하 저감 효과 비교 분석 연구)

  • Park, Se-Jun;Yoon, Min-Han
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.12
    • /
    • pp.1682-1688
    • /
    • 2017
  • In modern society, the number of industrial customers using equipment sensitive particularly to voltage sags is rapidly increasing. As voltage sags can cause loss of information as well as false operation of the control device, it results in the vast economic damage in industrial processes. One way to mitigate voltage sags in the sensitive loads is the installation of distributed generation (DGs) on the periphery of these loads. In addition, renewable energy sources are currently in the spot light as the potential solution for the energy crisis and environmental issues. In particular, wind power generation which is connected to a grid is rising rapidly because it is energy efficient and also economically feasible compared to other renewable energy sources. On the basis of the above information, in this paper, with Wind Turbine Generators (WTGs) installed nearby the sensitive load, the analysis of the mitigating effect comparison by types of WTGs is performed using voltage sag assessment on the IEEE-30 bus test system. That is, the areas of vulnerability according to types of WTGs are expected to be different by how much reactive power is produced or consumed as WTG reactive power capability is related to the types of WTGs. Using the concept of 'Vulnerable area' with the failure rate for buses and lines, the annual number of voltage sags at the sensitive load with the installation of WTGs per type is studied. This research will be anticipated to be useful data when determining the interconnection of wind power generation in the power system with the consideration of voltage sags.

A Knowledge Graph-based Chatbot to Prevent the Leakage of LLM User's Sensitive Information (LLM 사용자의 민감정보 유출 방지를 위한 지식그래프 기반 챗봇)

  • Keedong Yoo
    • Knowledge Management Research
    • /
    • v.25 no.2
    • /
    • pp.1-18
    • /
    • 2024
  • With the increasing demand for and utilization of large language models (LLMs), the risk of user sensitive information being inputted and leaked during the use of LLMs also escalates. Typically recognized as a tool for mitigating the hallucination issues of LLMs, knowledge graphs, constructed independently from LLMs, can store and manage sensitive user information separately, thereby minimizing the potential for data breaches. This study, therefore, presents a knowledge graph-based chatbot that transforms user-inputted natural language questions into queries appropriate for the knowledge graph using LLMs, subsequently executing these queries and extracting the results. Furthermore, to evaluate the functional validity of the developed knowledge graph-based chatbot, performance tests are conducted to assess the comprehension and adaptability to existing knowledge graphs, the capability to create new entity classes, and the accessibility of LLMs to the knowledge graph content.

Data Sparsity and Performance in Collaborative Filtering-based Recommendation

  • Kim Jong-Woo;Lee Hong-Joo
    • Management Science and Financial Engineering
    • /
    • v.11 no.3
    • /
    • pp.19-45
    • /
    • 2005
  • Collaborative filtering is one of the most common methods that e-commerce sites and Internet information services use to personalize recommendations. Collaborative filtering has the advantage of being able to use even sparse evaluation data to predict preference scores for new products. To date, however, no in-depth investigation has been conducted on how the data sparsity effect in customers' evaluation data affects collaborative filtering-based recommendation performance. In this study, we analyzed the sparsity effect and used a hybrid method based on customers' evaluations and purchases collected from an online bookstore. Results indicated that recommendation performance decreased monotonically as sparsity increased, and that performance was more sensitive to sparsity in evaluation data rather than in purchase data. Results also indicated that the hybrid use of two different types of data (customers' evaluations and purchases) helped to improve the recommendation performance when evaluation data were highly sparse.

Enhanced Security Framework for E-Health Systems using Blockchain

  • Kubendiran, Mohan;Singh, Satyapal;Sangaiah, Arun Kumar
    • Journal of Information Processing Systems
    • /
    • v.15 no.2
    • /
    • pp.239-250
    • /
    • 2019
  • An individual's health data is very sensitive and private. Such data are usually stored on a private or community owned cloud, where access is not restricted to the owners of that cloud. Anyone within the cloud can access this data. This data may not be read only and multiple parties can make to it. Thus, any unauthorized modification of health-related data will lead to incorrect diagnosis and mistreatment. However, we cannot restrict semipublic access to this data. Existing security mechanisms in e-health systems are competent in dealing with the issues associated with these systems but only up to a certain extent. The indigenous technologies need to be complemented with current and future technologies. We have put forward a method to complement such technologies by incorporating the concept of blockchain to ensure the integrity of data as well as its provenance.