• Title/Summary/Keyword: Trust Evaluation

Search Result 290, Processing Time 0.028 seconds

A Linguistic Evaluation of English-to-Korean Translation - Centered on Machine Translation - (영한 번역의 언어학적 평가 모델 연구 - 기계번역을 중심으로 -)

  • 김덕봉;조병은;김명철;권용현
    • Korean Journal of Cognitive Science
    • /
    • v.12 no.4
    • /
    • pp.11-27
    • /
    • 2001
  • Machine translation (MT) quality assessment is an outstanding problem. In the present situation in which the quality of machine-translated products are far from the user\\`s satisfaction objective evaluation of MT system is a prerequisite to building mutual trust between the users and the vendors stimulating constructive competition among the developers and finally leading to improve the quality of MT systems. Especially there emerges a need for an intensive study on how to evaluate the quality of MT systems from both linguistic and data processing aspects and to secure a steady improvement of the translation quality. With due regard to such points we in this paper present a linguistic evaluation of English-to-Korean machine translation based on a test suite composed of 3.373 sentences that were classified into their linguistic phenomena and complexity levels and report the experimental results made from several commercial MT systems.

  • PDF

A Study on the Evaluation System for On-line Community Service (온라인 커뮤니티 평가 시스템 개발에 관한 연구)

  • 이종호;변정환
    • Archives of design research
    • /
    • v.16 no.1
    • /
    • pp.149-158
    • /
    • 2003
  • On-line community service should be considered with sociability and usability as well in website development because community in general is composed of various social factors. But, most on-line community services are developed and operated without having correct concepts and strategies concerning social factors. For that reason, community services in most web sites are not that successful. In this paper, twelve social factors are identified for developing community service evaluation system. Those factors are as follows: 1) Purpose, 2) Identity, 3) Reputation, 4) Governance, 5) Communication, 6) Groups, 7) Environment, 8) Boundaries, 9) Trust, 10) Exchange, 11) Expression, 12) History. Eight different types of community services are evaluated to see variations of 12 social factors. As a result, each types of community services has different types of value variations. The evaluation diagrams of each type will be used as a guideline for comparison and this comparative research will tell designers future development direction of their community services.

  • PDF

Consumer Perception and Evaluation of Cynanchi Atrati Radix Fermented Oriental Cosmetics for Skin Whitening (피부 미백용 백미발효 한방 화장품에 대한 소비자 인식과 평가)

  • Son, Chang-gue;Jang, Eun-su;Lee, Sam-keun;Barng, Kee-jung
    • Journal of Fashion Business
    • /
    • v.23 no.5
    • /
    • pp.137-150
    • /
    • 2019
  • This study aimed to provide consumer perception and evaluation of natural Cynanchi Atrium Fermented Original Cosmetics for Skin Whitening that can improve skin by using oriental medicinal ingredients. The product was applied three times a day for two weeks by a total of 60 users who agreed to participate in a clinical trial assessing the usability and skin sensitivity to extracts that had already completed component safety testing. This study subjects reported which images were most reminiscent of Korea. They preferred products that bore Korean images because they felt trust and recognized that the quality of the cosmetics was excellent. The responses also showed that many consumers were willing to buy a product, even though it was luxurious, elegant, and expensive. The cognitive evaluation of Original Cosmetics was high and showed that the quality was likely to be good. The usability and CMF(Color, Material, Finishing) evaluation of Original Cosmetics showed good product the product is long-lasting and tightened and moisturized skin naturally. They are think about that this product it has moisturizing effects and good application for use, so it is light and soft to use. And had a whitening effect. It was intended to assist in the development of products that meet consumers' desires and expectations for safe, healthy, and beautiful skin by developing a skin whitening Original Cosmetics prototype that can inhibit the production of melanin and tyrosinase activity safely and effectively.

Study on the Application of Artificial Intelligence Model for CT Quality Control (CT 정도관리를 위한 인공지능 모델 적용에 관한 연구)

  • Ho Seong Hwang;Dong Hyun Kim;Ho Chul Kim
    • Journal of Biomedical Engineering Research
    • /
    • v.44 no.3
    • /
    • pp.182-189
    • /
    • 2023
  • CT is a medical device that acquires medical images based on Attenuation coefficient of human organs related to X-rays. In addition, using this theory, it can acquire sagittal and coronal planes and 3D images of the human body. Then, CT is essential device for universal diagnostic test. But Exposure of CT scan is so high that it is regulated and managed with special medical equipment. As the special medical equipment, CT must implement quality control. In detail of quality control, Spatial resolution of existing phantom imaging tests, Contrast resolution and clinical image evaluation are qualitative tests. These tests are not objective, so the reliability of the CT undermine trust. Therefore, by applying an artificial intelligence classification model, we wanted to confirm the possibility of quantitative evaluation of the qualitative evaluation part of the phantom test. We used intelligence classification models (VGG19, DenseNet201, EfficientNet B2, inception_resnet_v2, ResNet50V2, and Xception). And the fine-tuning process used for learning was additionally performed. As a result, in all classification models, the accuracy of spatial resolution was 0.9562 or higher, the precision was 0.9535, the recall was 1, the loss value was 0.1774, and the learning time was from a maximum of 14 minutes to a minimum of 8 minutes and 10 seconds. Through the experimental results, it was concluded that the artificial intelligence model can be applied to CT implements quality control in spatial resolution and contrast resolution.

The Relationship among Domestic Violence, Self-Evaluation, and Teenagers' Deviation (가정폭력 노출경험, 자기평가, 그리고 청소년 비행 간의 관련성)

  • Um, Soon-Ok;Lee, Mee-Ae;Moon, Jae-Woo
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.11 no.1
    • /
    • pp.117-134
    • /
    • 2010
  • Background & Objectives: Recently, problems such as in-school violence of teenagers, gang fight, habitual drinking, smoking, running away from home and group isolation can be regarded as the most fundamental causes of teenagers' deviation. It is said that such fundamental causes are originated from their home, the base for the psychological and behavioral development. Methods: In this study, the data for 3,188 students studying in the 3rd grade at middle school, which have been obtained from the second year survey for the panel of the 2nd grade students in 2004 by to Korea Youth Panel Survey, have been used for the analysis of the study. Results: According to the result of the study, there seems to be no difference between two genders for differences of average values. Regarding the analysis of correlation coefficients between such related variables as domestic violence, self-control, self-worth, self-trust and family relationship (sociability), and teenagers' deviation, When variables increase, teenagers' deviation decreases. Regarding the relationship between domestic violence and teenagers' deviation, physical violence is more related than lingual violence. The relationship between self-control and teenagers' deviation is the highest. By studying the deviation of teenagers exposed to domestic violence and carrying out the regression analysis, physical violence influences, teenagers' deviation was greater. As self-control, self-worth and family relationship(sociability) increase, teenagers' deviation decreases. Regarding the analytic results of this study, the experience of domestic violence seems to influence teenagers' deviation greatly. Among various types of domestic violence, physical violence is analyzed to influence teenagers' deviation greatly. Self-control, self-worth and family relationship(sociability) increase, teenagers' deviation decreases. Conclusions: In order to prevent teenagers' deviation and decrease the second conviction rate, it is necessary to provide a method of decreasing the domestic violence. It is necessary for schools and local communities to provide social support for teenagers.

  • PDF

The Reliability Evaluation of User Account on Facebook (페이스북 사용자 계정의 신뢰도 평가에 대한 연구)

  • Park, Jeongeun;Park, Minsu;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1087-1101
    • /
    • 2013
  • Most people are connected to Social Network Services (SNS) through smart devices. Social Network Services are tools that transport information fast and easily. It does not care where he or she comes from. A lot of information circulates and is shared on Social Network Services. but Social Network Services faults are magnified and becoming a serious issue. For instance, malicious users generate multiple IDs easily on Facebook and he can use personal information of others on purpose, because most people tend to undoubtedly accept friend requests. In this paper, we have specified research scope to Facebook, which is one of most popular Social Network Services in the world. We propose a way of minimizing the number of malicious actions on Facebook from malignant users and malicious bots by setting criteria and applying reputation system.

An Exploratory Study on the Derivation of Characteristics of Personal Cloud Computing (개인용 클라우드 컴퓨팅의 특성 도출에 관한 탐색적 연구)

  • Moon, Hye Young;Ryu, Jae Hong;Choi, Jinho
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.2
    • /
    • pp.57-68
    • /
    • 2013
  • Recently, cloud computing has been viewed as a technology of great influence. Despite the importance of personal cloud services, the majority of cloud computing studies has been focused on an enterprise level. Therefore, in this research, we list variables of personal cloud computing characteristics (accessibility, storage, trust, perceived ease of use, availability) from preceding research done on an enterprise level. So, through pilot testing, we analyze whether examined characteristic variables affect the intention to use personal cloud computing. Next, we investigate the relevancy between user characteristics, including gender, age, and occupation, and the usage rate of personal cloud computing. Lastly, we implement an analysis of variance in order to speculate whether there is any difference between the five characteristic variables in using personal cloud computing between cloud service enterprises. For empirical testing people with experience in personal cloud computing are surveyed. Frequency analysis, exploratory factor analysis, internal consistency analysis, T-test, ANOVA, and multiple regression analysis are implemented with 325 valid samples. The analysis results are as follows: First, among user characteristic variables, 'occupation' shows a significant relationship with cloud service usage, Second, between cloud service enterprises, all five characteristic variables of 'Naver N Drive' are thoroughly evaluated and 'Google Drive' receives a high evaluation in availability and accessibility. Third and finally, all of the selected characteristic variables affect the intention to use personal cloud computing. However, availability is identified to be the most important factor. This research will serve as a reference to enterprises for the practical implementation of personal cloud computing service.

A Study on Scalable Federated ID Interoperability Method in Mobile Network Environments (모바일 환경으로 확장 가능한 federated ID 연동 방안에 관한 연구)

  • Kim, Bae-Hyun;Ryoo, In-Tae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.27-35
    • /
    • 2005
  • While the current world wide network offers an incredibly rich base of information, it causes network management problem because users should have many independent IDs and passwords for accessing different sewers located in many places. In order to solve this problem users have employed single circle of trust(COT) ID management system, but it is still not sufficient for clearing the problem because the coming ubiquitous network computing environment will be integrated and complex networks combined with wired and wireless network devices. The purpose of this paper is to describe the employment and evaluation of federated ID interoperability method for solving the problem. The use of the proposed model can be a solution for solving network management problem in the age of mobile computing environment as well as wired network computing environment.

A Method of Device Validation Using SVDD-Based Anormaly Detection Technology in SDP Environment (SDP 환경에서 SVDD 기반 이상행위 탐지 기술을 이용한 디바이스 유효성 검증 방안)

  • Lee, Heewoong;Hong, Dowon;Nam, Kihyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1181-1191
    • /
    • 2021
  • The pandemic has rapidly developed a non-face-to-face environment. However, the sudden transition to a non-face-to-face environment has led to new security issues in various areas. One of the new security issues is the security threat of insiders, and the zero trust security model is drawing attention again as a technology to defend against it.. Software Defined Perimeter (SDP) technology consists of various security factors, of which device validation is a technology that can realize zerotrust by monitoring insider usage behavior. But the current SDP specification does not provide a technology that can perform device validation.. Therefore, this paper proposes a device validation technology using SVDD-based abnormal behavior detection technology through user behavior monitoring in an SDP environment and presents a way to perform the device validation technology in the SDP environment by conducting performance evaluation.

Standard Model for Mobile Forensic Image Development

  • Sojung, Oh;Eunjin, Kim;Eunji, Lee;Yeongseong, Kim;Gibum, Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.626-643
    • /
    • 2023
  • As mobile forensics has emerged as an essential technique, the demand for technology development, education and training is increasing, wherein images are used. Academic societies in South Korea and national institutions in the US and the UK are leading the Mobile Forensic Image development. However, compared with disks, images developed in a mobile environment are few cases and have less active research, causing a waste of time, money, and manpower. Mobile Forensic Images are also difficult to trust owing to insufficient verification processes. Additionally, in South Korea, there are legal issues involving the Telecommunications Business Act and the Act on the Protection and Use of Location Information. Therefore, in this study, we requested a review of a standard model for the development of Mobile Forensic Image from experts and designed an 11-step development model. The steps of the model are as follows: a. setting of design directions, b. scenario design, c. selection of analysis techniques, d. review of legal issues, e. creation of virtual information, f. configuring system settings, g. performing imaging as per scenarios, h. Developing a checklist, i. internal verification, j. external verification, and k. confirmation of validity. Finally, we identified the differences between the mobile and disk environments and discussed the institutional efforts of South Korea. This study will also provide a guideline for the development of professional quality verification and proficiency tests as well as technology and talent-nurturing tools. We propose a method that can be used as a guide to secure pan-national trust in forensic examiners and tools. We expect this study to strengthen the mobile forensics capabilities of forensic examiners and researchers. This research will be used for the verification and evaluation of individuals and institutions, contributing to national security, eventually.