• Title/Summary/Keyword: Smart Document

Search Result 119, Processing Time 0.027 seconds

Design and Implementation of a Document System based On Smart Client Application (스마트 클라이언트 응용을 이용한 문서 시스템의 설계 및 구현)

  • Park Jong-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.593-596
    • /
    • 2006
  • 최근 스마트 클라이언트 기술에 대한 관심이 비약적으로 증가하고 있다. 인터넷 상에서 이뤄지는 입력, 출력 정보는 인터넷을 통해 서버에 저장되며, 이와 같은 정보 전달을 위해 웹 브라우저를 이용한다. 그러나 웹 브라우저는 단지 페이지를 사용자에게 전송하고, 이를 받아본 사용자는 브라우저 자체의 기능 미비로 인해 페이지의 내용 또는 하이퍼링크를 탐색하거나 입력, 수정, 삭제된 데이터를 전송하는 용도에 머물고 있으며, 특히 브라우저를 이용해서 양식을 표현하고자 할 경우 사용자 친화적인 화면으로 구현하기 위해서는 개발자의 많은 노력이 필요했다. 따라서, 본 논문에서는 브라우저 보다 기능과 인터페이스 구성이 뛰어난 스마트 클라이언트 어플리케이션을 이용한 비이민비자 신청서 시스템을 구현하였다. 이러한 결과 사용자 친화적인 화면을 구성하는데 비용이 적게 들었고 스마트 클라이언트 어플리케이션을 이용하기 때문에 배포 문제가 해결되었으며, 보안성이 증가하게 되었다.

  • PDF

Convolutional Neural Networks for Character-level Classification

  • Ko, Dae-Gun;Song, Su-Han;Kang, Ki-Min;Han, Seong-Wook
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.6 no.1
    • /
    • pp.53-59
    • /
    • 2017
  • Optical character recognition (OCR) automatically recognizes text in an image. OCR is still a challenging problem in computer vision. A successful solution to OCR has important device applications, such as text-to-speech conversion and automatic document classification. In this work, we analyze character recognition performance using the current state-of-the-art deep-learning structures. One is the AlexNet structure, another is the LeNet structure, and the other one is the SPNet structure. For this, we have built our own dataset that contains digits and upper- and lower-case characters. We experiment in the presence of salt-and-pepper noise or Gaussian noise, and report the performance comparison in terms of recognition error. Experimental results indicate by five-fold cross-validation that the SPNet structure (our approach) outperforms AlexNet and LeNet in recognition error.

Educational smart media authoring tool system (교육용 스마트 미디어 저작 도구 시스템)

  • Kwon, Sun-Ock;Kim, Jong-Oh;Jeong, Ji-Seong;Kim, Do-Hyeong;Ju, Seong-Yeon;Lee, Jae-Won;Kim, Jin-Kook;Yoo, Kwan-Hee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2013.05a
    • /
    • pp.21-22
    • /
    • 2013
  • 기존의 스마트 미디어(전자책) 저작 도구의 경우 현장 교육의 주체가 되는 일선 교사나 교육 전문인이 직접 스마트 미디어(전자책)를 출판하기 어렵다는 문제점이 있다. 본 논문에서는 콘텐츠 전문가, 일선교사 또는 일반 사용자들도 손쉽게 교육용 스마트 미디어(전자책)를 제작할 수 있고 다양한 스마트 디바이스에 호환 가능한 교육용 스마트 미디어 저작 도구 시스템을 제안한다. 제안하는 교육용 스마트 미디어 저작 도구 시스템은 WPF의 FlowDocument 기반의 문서 구조를 따른다.

  • PDF

The Design of Data Hub System for Integration of Group In the Cloud Environment

  • Kim, Hyung-Seok;Lee, Jong-Yong;Jung, Kye-Dong
    • International journal of advanced smart convergence
    • /
    • v.4 no.2
    • /
    • pp.61-68
    • /
    • 2015
  • For a recent most companies to make efficient business management, we are using a groupware service of integrated information system of the entire group. Groupware service integrates the cooperation in excellent synergy and duplicates has been business functions of the business, through the improvement of multi-purpose business processing capacity, there is an advantage of reduced operating costs. However, if the parent company and subsidiary, or to handle common tasks such information agency, which may cause differences in the format of the data passed in the case of a need to provide a document. Therefore, in this paper, in order to solve the heterogeneity problem in data between groups, the data system of the hub base of the cloud is provided. The proposed system is intended to improve the groupware environment including the interoperability of integrated standardized environmental data sharing service.

Best Practice on Software Traceability Environment based on PaaS Cloud Service

  • Jang, Woo Sung;Kim, Janghwan;Kim, R. Young Chul
    • International journal of advanced smart convergence
    • /
    • v.9 no.4
    • /
    • pp.149-155
    • /
    • 2020
  • In the software industry of Korean Small and Medium-sized Enterprise(SME)s, the development process is often not mature. This may lead to failures in quality control and output management. As a result, the quality of the software can be degraded. To solve the problem, the software visualization technique, which is from the National IT Industry Promotion Agency Software Engineering Center can be applied. We have experienced with mentoring not only the visualization of software development process, but also various visualization process of SMEs. However, the existing software visualization method was difficult to install environment and its time cost was high. This paper proposes a software visualization environment through a cloud service along with a case of building a software visualization environment. We expect that this method will make it easier to build a visualization environment and improve the quality of SME software.

Query Processing based Branch Node Stream for XML Message Broker

  • Ko, Hye-Kyeong
    • International journal of advanced smart convergence
    • /
    • v.10 no.2
    • /
    • pp.64-72
    • /
    • 2021
  • XML message brokers have a lot of importance because XML has become a practical standard for data exchange in many applications. Message brokers covered in this document store many users. This paper is a study of the processing of twig pattern queries in XML documents using branching node streams in XML message broker structures. This work is about query processing in XML documents, especially for query processing with XML twig patterns in the XML message broker structure and proposed a method to reduce query processing time when parsing documents with XML twig patterns by processing information. In this paper, the twig pattern query processing method of documents using the branching node stream removes the twigging value of the branch node that does not include the labeling value of the branch node stream when it receives a twig query from the client. In this paper, the leaf node discovery time can be reduced by reducing the navigation time of nodes in XML documents that are matched to leaf nodes in twig queries for client twig queries. Overall, the overall processing time to respond to queries is reduced, allowing for rapid question-answer processing.

Improving the Accuracy of Document Classification by Learning Heterogeneity (이질성 학습을 통한 문서 분류의 정확성 향상 기법)

  • Wong, William Xiu Shun;Hyun, Yoonjin;Kim, Namgyu
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.3
    • /
    • pp.21-44
    • /
    • 2018
  • In recent years, the rapid development of internet technology and the popularization of smart devices have resulted in massive amounts of text data. Those text data were produced and distributed through various media platforms such as World Wide Web, Internet news feeds, microblog, and social media. However, this enormous amount of easily obtained information is lack of organization. Therefore, this problem has raised the interest of many researchers in order to manage this huge amount of information. Further, this problem also required professionals that are capable of classifying relevant information and hence text classification is introduced. Text classification is a challenging task in modern data analysis, which it needs to assign a text document into one or more predefined categories or classes. In text classification field, there are different kinds of techniques available such as K-Nearest Neighbor, Naïve Bayes Algorithm, Support Vector Machine, Decision Tree, and Artificial Neural Network. However, while dealing with huge amount of text data, model performance and accuracy becomes a challenge. According to the type of words used in the corpus and type of features created for classification, the performance of a text classification model can be varied. Most of the attempts are been made based on proposing a new algorithm or modifying an existing algorithm. This kind of research can be said already reached their certain limitations for further improvements. In this study, aside from proposing a new algorithm or modifying the algorithm, we focus on searching a way to modify the use of data. It is widely known that classifier performance is influenced by the quality of training data upon which this classifier is built. The real world datasets in most of the time contain noise, or in other words noisy data, these can actually affect the decision made by the classifiers built from these data. In this study, we consider that the data from different domains, which is heterogeneous data might have the characteristics of noise which can be utilized in the classification process. In order to build the classifier, machine learning algorithm is performed based on the assumption that the characteristics of training data and target data are the same or very similar to each other. However, in the case of unstructured data such as text, the features are determined according to the vocabularies included in the document. If the viewpoints of the learning data and target data are different, the features may be appearing different between these two data. In this study, we attempt to improve the classification accuracy by strengthening the robustness of the document classifier through artificially injecting the noise into the process of constructing the document classifier. With data coming from various kind of sources, these data are likely formatted differently. These cause difficulties for traditional machine learning algorithms because they are not developed to recognize different type of data representation at one time and to put them together in same generalization. Therefore, in order to utilize heterogeneous data in the learning process of document classifier, we apply semi-supervised learning in our study. However, unlabeled data might have the possibility to degrade the performance of the document classifier. Therefore, we further proposed a method called Rule Selection-Based Ensemble Semi-Supervised Learning Algorithm (RSESLA) to select only the documents that contributing to the accuracy improvement of the classifier. RSESLA creates multiple views by manipulating the features using different types of classification models and different types of heterogeneous data. The most confident classification rules will be selected and applied for the final decision making. In this paper, three different types of real-world data sources were used, which are news, twitter and blogs.

A Study on the Document Topic Extraction System Based on Big Data (빅데이터 기반 문서 토픽 추출 시스템 연구)

  • Hwang, Seung-Yeon;An, Yoon-Bin;Shin, Dong-Jin;Oh, Jae-Kon;Moon, Jin Yong;Kim, Jeong-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.5
    • /
    • pp.207-214
    • /
    • 2020
  • Nowadays, the use of smart phones and various electronic devices is increasing, the Internet and SNS are activated, and we live in the flood of information. The amount of information has grown exponentially, making it difficult to look at a lot of information, and more and more people want to see only key keywords in a document, and the importance of research to extract topics that are the core of information is increasing. In addition, it is also an important issue to extract the topic and compare it with the past to infer the current trend. Topic modeling techniques can be used to extract topics from a large volume of documents, and these extracted topics can be used in various fields such as trend prediction and data analysis. In this paper, we inquire the topic of the three-year papers of 2016, 2017, and 2018 in the field of computing using the LDA algorithm, one of Probabilistic Topic Model Techniques, in order to analyze the rapidly changing trends and keep pace with the times. Then we analyze trends and flows of research.

Software Architecture Recovery for Android Application Reuse (안드로이드 어플리케이션의 재사용을 위한 소프트웨어 아키텍처 생성)

  • Park, Jin-Soo;Kwon, Jang-Jin;Hong, Jang-Eui;Choi, Min
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.2
    • /
    • pp.9-17
    • /
    • 2013
  • Android applications market has increased rapidly due to the popularity of smart phones. In order to high competitiveness in the application market should be high productivity, reduce cost. And short development cycle is required because of increased the android applications demand. Owing to develop applications in short time, the requirements analysis, design process are able to omitted. But in the case of reuse application at development phase, involved many problems because omit document or design. so target of this paper is android application source code that omit document or design. we propose architecture recovery techniques from android application source code by reverse engineering with identify functions are reused. We expect that increase productivity and reduce development cost, smooth maintain by proposed technique.

  • PDF

An Automatically Extracting Formal Information from Unstructured Security Intelligence Report (비정형 Security Intelligence Report의 정형 정보 자동 추출)

  • Hur, Yuna;Lee, Chanhee;Kim, Gyeongmin;Jo, Jaechoon;Lim, Heuiseok
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.233-240
    • /
    • 2019
  • In order to predict and respond to cyber attacks, a number of security companies quickly identify the methods, types and characteristics of attack techniques and are publishing Security Intelligence Reports(SIRs) on them. However, the SIRs distributed by each company are huge and unstructured. In this paper, we propose a framework that uses five analytic techniques to formulate a report and extract key information in order to reduce the time required to extract information on large unstructured SIRs efficiently. Since the SIRs data do not have the correct answer label, we propose four analysis techniques, Keyword Extraction, Topic Modeling, Summarization, and Document Similarity, through Unsupervised Learning. Finally, has built the data to extract threat information from SIRs, analysis applies to the Named Entity Recognition (NER) technology to recognize the words belonging to the IP, Domain/URL, Hash, Malware and determine if the word belongs to which type We propose a framework that applies a total of five analysis techniques, including technology.