• Title/Summary/Keyword: Text network

Search Result 1,122, Processing Time 0.028 seconds

Implementation of a WWW Interface for Multiuser Interactive Intelligent Systems (다중사용자 대화형 지능시스템을 위한 WWW 인터페이스 구현)

  • Kim, Chang-Min;Kim, Yong-Gi
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.4
    • /
    • pp.479-488
    • /
    • 1999
  • 인터넷의 성장과 더불어 수많은 응용시스템들이 인터넷 기반 시스템으로 바뀌고 있다. 특히, 인터넷 기반 전문가시스템은 다양한 구조와 방법으로 설계될 수 있고 이미 제작되었던 수많은 인터넷 기반 전문가시스템들은 그 나름대로의 장단점을 가지고 있다. 본 연구는 특정 전문가시스템의 개발이 아니라 WWW(World Wide Web)을 사용자 인터페이스로 이용할 수 있는 전문가시스템 쉘에 관한 연구이다. 본 시스템은 WWW 하부구조에 대한 의존성을 제거, 클라이언트와 네크워크에 부담 격감, HTML과 부합하는 텍스트에 기초한 통신과 같은 장점 외에 중앙 집중적 다중 사용자 접근 관리 기능을 제공한다. 본 시스템은 다중사용자를 위한 서버/클라이언트 환경 구축을 위해 소켓을 이용하여 큐잉(queueing)과 직렬화(serialization)를 해결하고 비연결 지향적인 WWW의 특성으로 인한 사용자 관리의 어려움은 사용자의 IP 주소와 Timer를 이용한 휴무기간 검사를 이용하여 해결한다.Abstract The growth of internet drives many applications into internet-based systems. Internet-based expert systems can be designed with various concepts and methodologies, and they have their own merits and demerits. This papers is a study on a development of not expert system itself but expert system shell which is able to use WWW(World Wide Web) as user interface. The suggested system supports functions on multiuser management controlled by a server system as well as independence on development environments, minimization of the load for clients and network, and text-based communications such as HTML. The system uses socket, which solves problems of queuing and serialization, in order to construct multiuser server/client environmen and also the system solves the non-connective property of WWW which makes it difficult to control users and processes by using IP address and idle time which is supported by the timer.

A Usability Evaluation on the Visualization of Information Extraction Output (정보추출결과의 시각화 표현방법에 관한 이용성 평가 연구)

  • Lee Jee-Yeon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.39 no.2
    • /
    • pp.287-304
    • /
    • 2005
  • The goal of this research is to evaluate the usability of visually browsing the automatically extracted information. A domain-independent information extraction system was used to extract information from news type texts to populate the visually browasable knowledge base. The information extraction system automatically generated Concept-Relation-Concept triples by applying various Natural Language Processing techniques to the text portion of the news articles. To visualize the information stored in the knowledge base, we used PersoanlBrain to develop a visualization portion of the user interface. PersonalBrain is a hyperbolic information visualization system, which enables the users to link information into a network of logical associations. To understand the usability of the visually browsable knowledge base, IS test subjects were observed while they use the visual interface and also interviewed afterward. By applying a qualitative test data analysis method. a number of usability Problems and further research directions were identified.

A Study on the Core Values of Presidents Based on the Content Analysis of the Presidential Speech Archives (대통령 연설기록 내용분석을 통한 역대 대통령의 중심가치 연구)

  • Park, JunHyeong;Yoo, Ho-Suon;Kim, Tae-Young;Han, Hui Jeong;Oh, Hyo-Jung
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.17 no.2
    • /
    • pp.57-78
    • /
    • 2017
  • This study reveals the core values of presidents based on the content analysis of the Presidential Speech Archives and examines the policy direction of each government from a macro perspective. For this purpose, we collected the speech archives provided by the Presidential Archives and compared central words. The Presidential Speech Archives is helpful for understanding the problem-solving capacity and consciousness of presidents. Among them, we particularly selected statements in the diplomatic and trade fields as the main study targets. As a result, the presidents have basically pursued peaceful resolution and cooperation on diplomatic issues. In addition, they placed a high priority in the implementation of the economic policy in the diplomatic and trade fields.

Implementation of a Display and Analysis Program to improve the Utilization of Radar Rainfall (레이더강우 자료 활용 증진을 위한 표출 및 분석 프로그램 구현)

  • Noh, Hui-Seong
    • Journal of Digital Contents Society
    • /
    • v.19 no.7
    • /
    • pp.1333-1339
    • /
    • 2018
  • Recently, as disasters caused by weather such as heavy rains have increased, interests in forecasting weather and disasters using radars have been increasing, and related studies have also been actively performed. As the Ministry of Environment(ME) has established and operated a radar network on a national scale, utilization of radars has been emphasized. However, persons in charge and researchers, who want to use the data from radars need to understand characteristics of the radar data and are also experiencing a lot of trials and errors when converting and calibrating the radar data from Universal Format(UF) files. Hence, this study developed a Radar Display and Analysis Program(RaDAP) based on Graphic User Interface(GUI) using the Java Programming Language in order for UF-type radar data to be generated in an ASCII-formatted image file and text file. The developed program can derive desired radar rainfall data and minimize the time required to perform its analysis. Therefore, it is expected that this program will contribute to enhancing the utilization of radar data in various fields.

Research on Effects of Three Different Designs and Implementations on Cyber Education (정보활용기술 발전에 따른 효과적 사이버 교육을 위한 설계 및 구현의 차이에 대한 연구)

  • Ha, Tai-Hyun;Kang, Jung-Hwa
    • The Journal of Korean Association of Computer Education
    • /
    • v.6 no.4
    • /
    • pp.71-83
    • /
    • 2003
  • This study is aimed to develop and evaluate different approaches for cyber education. The project involved the development of sample cyber education programs using different design approaches, with built-in evaluation mechanisms. The different design approaches depend on what delivery technologies are involved. In the First Generation, the delivery technologies use text, flash and animation, whereas the synchronized content to video and audio are used in the Second and the Third Generations but the difference is the delivery method used by the videoclip. Tests were carried out through self-assessment to measure and analyze the efficient teaching. The results show that the Third generation technologies were the most effective method for cyber education. However, since the Third generation program is developed in multimedia, it tends 10 require higher development costs, and more advanced hardware and software as well as a higher bandwidth for network. Therefore, the research indicates that the development of technical supports, like loading speed, has to be solved simultaneously with the development of multimedia products for effective cyber education.

  • PDF

Predicting changes of realtime search words using time series analysis and artificial neural networks (시계열분석과 인공신경망을 이용한 실시간검색어 변화 예측)

  • Chong, Min-Yeong
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.333-340
    • /
    • 2017
  • Since realtime search words are centered on the fact that the search growth rate of an issue is rapidly increasing in a short period of time, it is not possible to express an issue that maintains interest for a certain period of time. In order to overcome these limitations, this paper evaluates the daily and hourly persistence of the realtime words that belong to the top 10 for a certain period of time and extracts the search word that are constantly interested. Then, we present the method of using the time series analysis and the neural network to know how the interest of the upper search word changes, and show the result of forecasting the near future change through the actual example derived through the method. It can be seen that forecasting through time series analysis by date and artificial neural networks learning by time shows good results.

A Design of MILENAGE Algorithm-based Mutual Authentication Protocol for The Protection of Initial Identifier in LTE (LTE 환경에서 초기 식별자를 보호하기 위한 MILENAGE 알고리즘 기반의 상호인증)

  • Yoo, Jae-hoe;Kim, Hyung-uk;Jung, Yong-hoon
    • Journal of Venture Innovation
    • /
    • v.2 no.1
    • /
    • pp.13-21
    • /
    • 2019
  • In LTE environment, which is 4th generation mobile communication systems, there is concern about private information exposure by transmitting initial identifier in plain text. This paper suggest mutual authentication protocol, which uses one-time password utilizing challenge-response and AES-based Milenage key generation algorithm, as solution for safe initial identification communication, preventing unique identification information leaking. Milenage key generation algorithm has been used in LTE Security protocol for generating Cipher key, Integrity key, Message Authentication Code. Performance analysis evaluates the suitability of LTE Security protocol and LTE network by comparing LTE Security protocol with proposed protocol about algorithm operation count and Latency.Thus, this paper figures out initial identification communication's weak points of currently used LTE security protocol and complements in accordance with traditional protocol. So, it can be applied for traditional LTE communication on account of providing additional confidentiality to initial identifier.

The Design and Implementation of a Chatting System Sharing Paths (경로 공유 채팅 시스템의 설계 및 구현)

  • Kim, Dong-Hyun;Lee, Han-Bin;Ban, Chae-Hoon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.2
    • /
    • pp.281-286
    • /
    • 2017
  • SNS is a platformwhere users build a social relationship and share opinions and informations. To do these, it supports a text, an image and a video data. As it is possible to exploit the location data of a smart device, SNS tries to use the location data. However,since SNS does not support the coordinate data, it provides the restricted function sharing the image map instead of the vector map. In this paper, we propose a chatting systemsharing pathsto support the coordinate data on a classical SNS. On the proposed system, it is possible for usersjoined in a roomto watch a vector map of same area and exchange texts. If a user builds a path on the map, the system propagates the coordinate data of the generated path and the other users joined in the room watch the path immediately. The implemented chatting systemhasthe benefit to share the information related a map between users using coordinate data.

A Study on the Improvement of DTW with Speech Silence Detection (음성의 묵음구간 검출을 통한 DTW의 성능개선에 관한 연구)

  • Kim, Jong-Kuk;Jo, Wang-Rae;Bae, Myung-Jin
    • Speech Sciences
    • /
    • v.10 no.4
    • /
    • pp.117-124
    • /
    • 2003
  • Speaker recognition is the technology that confirms the identification of speaker by using the characteristic of speech. Such technique is classified into speaker identification and speaker verification: The first method discriminates the speaker from the preregistered group and recognize the word, the second verifies the speaker who claims the identification. This method that extracts the information of speaker from the speech and confirms the individual identification becomes one of the most efficient technology as the service via telephone network is popularized. Some problems, however, must be solved for the real application as follows; The first thing is concerning that the safe method is necessary to reject the imposter because the recognition is not performed for the only preregistered customer. The second thing is about the fact that the characteristic of speech is changed as time goes by, So this fact causes the severe degradation of recognition rate and the inconvenience of users as the number of times to utter the text increases. The last thing is relating to the fact that the common characteristic among speakers causes the wrong recognition result. The silence parts being included the center of speech cause that identification rate is decreased. In this paper, to make improvement, We proposed identification rate can be improved by removing silence part before processing identification algorithm. The methods detecting speech area are zero crossing rate, energy of signal detect end point and starting point of the speech and process DTW algorithm by using two methods in this paper. As a result, the proposed method is obtained about 3% of improved recognition rate compare with the conventional methods.

  • PDF

Design and embodiment of XrML Document editing system for digital contents copyright administration (디지털 컨텐츠 저작권 관리를 위한 XrML 문서편집 시스템의 설계 및 구현)

  • 임지훈;강치원;정회경;최범석;홍진우
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.368-372
    • /
    • 2002
  • Channel of distribution of contents of digitalised multimedia contents is changing in form passed directly to consumer from manufacturer through digital network of high speed. Together, diffusion of various digital equipment that do is changing Past multimedia consumption structure with the wonderful speed so that can consume easily digital contents. Specially, Multimedia Personal Computer and fast diffusion of a digital television are acting role such as catalyst that promote easy purchase and consumption of multimedia contents of good qualify. However, this system is no method that can sell digital contents and express right that original owner for the contents can insist nothing but consume. Because consumer can distribute to another person copying contents that buy because of and user can distribute producing ashes again according to necessary field by oneself as well as, can lose meaning for original contents. In this paper, Text editing system for XrML (extensible Rights Markup Language) that describe about integrity of message and entity authentication in addition to necessary rights, fees, condition etc. and this to do fetters XML (eXtensible Markup Language) for copyright protection for digital contents in treatise that see hereupon and use digital contents design and embody.

  • PDF