• 제목/요약/키워드: Text Messages

검색결과 214건 처리시간 0.026초

디지털 포렌식 조사를 위한 NLP의 텍스트 전처리 연구 (A study on NLP Text Preprocessing for digital forensic investigation)

  • 이성원;김도현
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2022년도 춘계학술대회
    • /
    • pp.189-191
    • /
    • 2022
  • 현대 사회에서 메신저 서비스는 다른 사람과의 의사소통을 위해 필수적으로 사용되고 있으며 이는 범죄자들도 예외는 아니다. 따라서 메신저 데이터는 디지털 포렌식 조사에서 필수적으로 분석해야 하는 대상이며, 대표적으로 2018년 버닝 썬 게이트, 2019년 N 번 방 사건이 메신저 데이터가 범죄를 해결하는 데 중요한 증거로 활용됐다. 메신저 서비스가 널리 사용됨에 따라 디지털 기기에 대량의 메신저 데이터가 저장되고, 이에 따라 디지털 포렌식 조사 과정에서 메신저 데이터를 분석하는데 많은 시간이 소요되고 있기 때문에 이를 효과적으로 대응하기 위한 텍스트 마이닝 연구가 필요하다. 본 논문에서는 인스턴트 메신저를 대상으로 효과적인 NLP 분석을 하기 위해 인스턴트 메시지의 특성에 따른 다양한 자연어 전처리 방법을 연구한다.

  • PDF

A 3D Audio-Visual Animated Agent for Expressive Conversational Question Answering

  • Martin, J.C.;Jacquemin, C.;Pointal, L.;Katz, B.
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 한국정보컨버전스학회 2008년도 International conference on information convergence
    • /
    • pp.53-56
    • /
    • 2008
  • This paper reports on the ACQA(Animated agent for Conversational Question Answering) project conducted at LIMSI. The aim is to design an expressive animated conversational agent(ACA) for conducting research along two main lines: 1/ perceptual experiments(eg perception of expressivity and 3D movements in both audio and visual channels): 2/ design of human-computer interfaces requiring head models at different resolutions and the integration of the talking head in virtual scenes. The target application of this expressive ACA is a real-time question and answer speech based system developed at LIMSI(RITEL). The architecture of the system is based on distributed modules exchanging messages through a network protocol. The main components of the system are: RITEL a question and answer system searching raw text, which is able to produce a text(the answer) and attitudinal information; this attitudinal information is then processed for delivering expressive tags; the text is converted into phoneme, viseme, and prosodic descriptions. Audio speech is generated by the LIMSI selection-concatenation text-to-speech engine. Visual speech is using MPEG4 keypoint-based animation, and is rendered in real-time by Virtual Choreographer (VirChor), a GPU-based 3D engine. Finally, visual and audio speech is played in a 3D audio and visual scene. The project also puts a lot of effort for realistic visual and audio 3D rendering. A new model of phoneme-dependant human radiation patterns is included in the speech synthesis system, so that the ACA can move in the virtual scene with realistic 3D visual and audio rendering.

  • PDF

Validity of Language-Based Algorithms Trained on Supervisor Feedback Language for Predicting Interpersonal Fairness in Performance Feedback

  • Jisoo Ock;Joyce S. Pang
    • Asia pacific journal of information systems
    • /
    • 제33권4호
    • /
    • pp.1118-1134
    • /
    • 2023
  • Previous research has shown that employees tend to react more positively to corrective feedback from supervisors to the extent they perceive that they were treated with empathy, respect, and concern towards fair interpersonal treatment in receiving the feedback information. Then, to facilitate effective supervisory feedback and coaching, it would be useful for organizations to monitor the contents of feedback exchanges between supervisors and employees to make sure that supervisors are providing performance feedback using languages that are more likely to be perceived as interpersonally fair. Computer-aided text analysis holds potential as a useful tool that organizations can use to efficiently monitor the quality of the feedback messages that supervisors provide to their employees. In the current study, we applied computer-aided text analysis (using closed-vocabulary text analysis) and machine learning to examine the validity of language-based algorithms trained on supervisor language in performance feedback situations for predicting human ratings of feedback interpersonal fairness. Results showed that language-based algorithms predicted feedback interpersonal fairness with reasonable level of accuracy. Our findings provide supportive evidence for the promise of using employee language data for managing (and improving) performance management in organizations.

능동적 Geo-Targeting을 위한 5G 기반의 긴급재난문자 서비스 요구사항 및 시나리오 연구 (A Study on 5G-based Text Alert Service Requirements and Scenarios for Realizing Active Geo-Targeting)

  • 이태겸;강승우;김예원;오승희;조오현
    • 융합정보논문지
    • /
    • 제11권11호
    • /
    • pp.23-30
    • /
    • 2021
  • 최근 이동통신기술의 발전과 높은 휴대전화보급률 덕분에 접근성이 높은 긴급재난문자 서비스에 대한 기술연구가 활발하게 이루어지고 있다. 특히, 최근 COVID-19 감염병의 전 세계적인 확산으로 재난에 의한 피해를 막기 위한 노력이 계속되고 있다. 현재 긴급재난문자 서비스는 복잡성이 낮고 효율적이다. 하지만 수신지역이 불명확하여 불필요한 메시지의 반복수신 문제가 빈번하게 발생하고 있다. 본 논문에서는 전문가 인터뷰와 설문 분석을 통하여 긴급재난문자 서비스 개선을 위한 요구사항을 도출하고, 단말의 능동적 재난문자 수신이 가능한 Active Geo-Targeting을 이용한 긴급재난문자 서비스 시나리오를 제안한다. 또한 제안 시나리오를 실현하기 위하여 새로 정의된 CIB(Control Information Block)를 포함하는 인터페이스 프로토콜을 고안한다.

텍스트 기반 채팅에서 미디어 메시지의 지원 (Supporting Media Messages on a Text based Chatting)

  • 김경덕;여재욱;조우찬
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2001년도 가을 학술발표논문집 Vol.28 No.2 (2)
    • /
    • pp.283-285
    • /
    • 2001
  • 본 논문은 텍스트 기반 채팅에서 다양한 미디어 메시지를 대화 행위에 지원하는 방법을 제안한다. 기존 텍스트 기반 채팅은 단순한 텍스트 기반 메시지를 사용함으로써, 미디어의 전송 및 공유 뷰(view)의 지원이 어렵다. 그러므로, 본 논문에서는 XML과 XSLT를 이용하여 텍스트 및 미디어 메시지를 생성하며, 미디어에 대해서는 앵커를 사용하여 웹브라우저에 프레젠테이션을 지원한다. 그리고, XML 태그의 확장 및 변경으로 다양한 효과의 생성과 변경이 용이하다. 이러만 미디어 메시지의 지원으로 다양한 대화 행위의 지원이 가능하며, 응용 분야는 온라인 교육, 게임 등이다.

  • PDF

A Jini-Based Ubiquitous Messaging System Supporting Context Awareness and User Mobility

  • Choi, Tae-Uk;Chung, Ki-Dong
    • 한국멀티미디어학회논문지
    • /
    • 제7권6호
    • /
    • pp.832-840
    • /
    • 2004
  • In ubiquitous environments, context is any information that can be used to characterize the situation of an entity such as a person or an object. Many sensors and small computers collect contexts and provide applications with them. Thus, ubiquitous applications need to represent contexts and exploit them effectively. In this paper, we design and implement a context-aware messaging system, called UMS (Ubiquitous Messaging System), based on Java and Jini. UMS can represent various contexts using XML scripts, and communicate text messages regardless of user's location using the proxy mechanism of Jini.

  • PDF

Feminine Aspirations with the Real World of Men in George Eliot's Middlemarch

  • Shim, Jae-Hwang
    • 영어어문교육
    • /
    • 제13권4호
    • /
    • pp.153-165
    • /
    • 2007
  • The story treats each individual's vision as well as social reality that the author intends to describe. The purpose of this article is to search for the conflict between vision and reality, especially in feminist problem that critics have treated on the works of women writers. Though some articles have studied on the issue similar to this article, I try to analyze the narratives in the text that the author herself confesses to us. I think that we can find out clear messages from the individuals who construct the human relationship and build up their personal history through their dialogue or monologue. We can also catch their main problems in the community. I discuss the topic by mentioning the detailed discourses referred to the heroine and other characters in the text. The passages mentioned by the characters in the story may be a confession for the present and future generation that the author tries to confess. From the excerpts of some discourse, I can conclude that though Dorothea has a vision for her ideal, she is a failed feminist, for society is too strong for her as Miller (1990) argues.

  • PDF

전자메일 자동관리 시스템을 위한 전자메일 분류기의 개발 (Development of e-Mail Classifiers for e-Mail Response Management Systems)

  • 김국표;권영식
    • 한국IT서비스학회지
    • /
    • 제2권2호
    • /
    • pp.87-95
    • /
    • 2003
  • With the increasing proliferation of World Wide Web, electronic mail systems have become very widely used communication tools. Researches on e-mail classification have been very important in that e-mail classification system is a major engine for e-mail response management systems which mine unstructured e-mail messages and automatically categorize them. in this research we develop e-mail classifiers for e-mail Response Management Systems (ERMS) using naive bayesian learning and centroid-based classification. We analyze which method performs better under which conditions, comparing classification accuracies which may depend on the structure, the size of training data set and number of classes, using the different data set of an on-line shopping mall and a credit card company. The developed e-mail classifiers have been successfully implemented in practice. The experimental results show that naive bayesian learning performs better, while centroid-based classification is more robust in terms of classification accuracy.

Hey Host, Do Communicate with Guests: Empirical Evidence from Airbnb

  • Ju, Jae-Hyeon;Kim, Dong-Yeon;Ryu, Il-Han;Ahn, Jae-Hyeon;Bang, Young-Sok
    • 아태비즈니스연구
    • /
    • 제9권3호
    • /
    • pp.1-9
    • /
    • 2018
  • Despite a wide practice of e-market sellers communicating with their consumers, little attention is given to how the practice affects consumers' purchase decision process. Based on the text analysis of 10,479 accommodation cases obtained from Airbnb, we empirically examine the relationship between the sellers' communication efforts and the wish-listing behaviors of guests. We find that the wish-listing is positively associated with the communication efforts of a host, such as (1) the feedback volume, (2) tailored messages and personalized contents, and (3) contingent responses to guest reviews. We discuss the theoretical and practical implications of the study.

Combining Encryption and Preservation in Information Security to Secure Sending a Message

  • Nooh, Sameer
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.285-291
    • /
    • 2022
  • With the growing exchange of data between individuals and institutions through various electronic communication, valuable data protection is in high demand to ensure that it is not hacked and that privacy is protected. Many security techniques, such as encryption and steganography, have emerged to prevent security breaches. The purpose of this research is to integrate cryptographic and steganography techniques to secure text message sending. The Rijndael algorithm was used to encrypt the text message, and the Least Significant Bit algorithm was also used to hide the encrypted message in a color image. Experiments on the suggested method have proven that it can improve the security of sent messages due to the human eye's inability to identify the original image from the image after it has been covered, as well as the encryption of the message using a password.