• Title/Summary/Keyword: User Connection

Search Result 580, Processing Time 0.027 seconds

Multi-Document Summarization Method Based on Semantic Relationship using VAE (VAE를 이용한 의미적 연결 관계 기반 다중 문서 요약 기법)

  • Baek, Su-Jin
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.341-347
    • /
    • 2017
  • As the amount of document data increases, the user needs summarized information to understand the document. However, existing document summary research methods rely on overly simple statistics, so there is insufficient research on multiple document summaries for ambiguity of sentences and meaningful sentence generation. In this paper, we investigate semantic connection and preprocessing process to process unnecessary information. Based on the vocabulary semantic pattern information, we propose a multi-document summarization method that enhances semantic connectivity between sentences using VAE. Using sentence word vectors, we reconstruct sentences after learning from compressed information and attribute discriminators generated as latent variables, and semantic connection processing generates a natural summary sentence. Comparing the proposed method with other document summarization methods showed a fine but improved performance, which proved that semantic sentence generation and connectivity can be increased. In the future, we will study how to extend semantic connections by experimenting with various attribute settings.

Arduino-based power control system implemented by the MyndPlay (MyndPlay를 이용한 Arduino기반의 전원제어시스템 구현)

  • Kim, Byeongsu;Kim, Seungjin;Kim, Taehyung;Baek, Dongin;Shin, Jaehwan;An, Jeong-Eun;Jeong, Deok-Gil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.924-926
    • /
    • 2015
  • In this paper, we use the interface, which many countries concentrates research of Brain - Computer Interface with the device and MyndPlay based on the IoT intelligent Arduino. Finally we will make the Brain - Computer Connection environment, the purpose of Brain - Computer Interface. Recognizes the EEG of a person who wearing the equipment, analyze, classify, and we did a research to design an intelligent thing to suit user's condition. In addition, we use the XBee, and Bluetooth to communicate to other devices, such as smart phone. In conclusion, this paper check users current status via brain waves, and it allows to control the power and other objects by using the EEG(Electroencephalography).

  • PDF

Near-field Data Exchange by Motion Recognition of mobile phone (모바일 폰의 모션 인식에 의한 근거리 데이터 교환)

  • Hwang, Tae-won;Seo, Jung-hee;Park, Hung-bog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.800-801
    • /
    • 2017
  • Location-based services (LBS) are used in various applications such as emergency support, navigation, location, traffic routes, information gathering, and entertainment due to the rapid growth of information communication technologies and mobile phones. In general, locations are represented by coordinates and are related to terrain. These are of great interest in mobile-based data transmission. This paper proposes a method to exchange the contact of the other party by detecting the movement of the mobile phone of the individual user based on the location-based service. The proposed method extracts motion using the acceleration sensor of the mobile phone and transmits the location and time information to the server when the motion continues for a predetermined time. Attempts to establish a connection between users who are experiencing motion in mobile phones in the short distance have been made from the server. Once the connection between the users is made, the encrypted contact is received from the server. Experimental results show that the proposed method can exchange data by minimizing the processing in the handset compared with the existing method.

  • PDF

Interworking architecture between Smart-TV and Smart-phone using NFC and QR technology (NFC와 QR기술을 사용한 스마트TV와 스마트폰의 연동구조)

  • Eun, Sung Bae;Chae, Yi Geun;So, Sun Sup
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.38 no.4
    • /
    • pp.463-469
    • /
    • 2014
  • We propose an interworking architecture between a smart TV and a smart phone. This architecture provides control mechanism for the newly adopted App on Smart-TV with smart phone. The general method connecting between a smart phone and a mobile AP is very carefully complex and troublesome procedure. The mobile AP transfers data from a smart phone to a smart TV after getting the connection. Connecting procedure between a smart phone and a mobile AP is therefore necessary operation. We worked out the new procedure and control method that acquires some information from Near Field Communication or Quick Reference codes for connecting between a smart TV and a smart phone. Our proposed architecture was confirmed practical possibility as user-oriented automatic connection and simple manipulation for control a kiosk or various display equipment.

MITM Attack on Bluetooth Pairing in Passkey Entry Mode and Its Countermeasure (블루투스 Passkey Entry 인증 모드에 대한 MITM 공격과 대응방법)

  • Lee, Jearyong;Choi, Wonsuk;Lee, DongHoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.481-490
    • /
    • 2016
  • Bluetooth utilizes a symmetric key that is exchanged at the first pairing to establish a secure channel. There are four authentication modes which enables device authentication, Just work, Passkey Entry, Out of Band, and Numeric Comparison. Up to now, Just work has been considered as the authentication mode that is vulnerable to Man-In-The-Middle (MITM) Attack. In addition, it is possible to intentionally change any authentication mode to Just work mode, in order to succeed in MITM Attack under Just work mode. However, this kind of attacks have just worked under the assumption that users should not notice that authentication mode was changed. In this paper, We analyze the specification of Secure Simple Pairing, LE Legacy Pairing and LE Secure Connection Pairing. When using Passkey Entry mode on each approach, it seems the MITM attack is possible. Also it offers Passkey Entry MITM attack that does not require assumptions about the user's fault, because it isn't change verification process of the authentication mode unlike traditional attacks. We implement the proposed MITM attacks. Also we presents a scenario in which an attack can be exploited and a countermeasure.

A Study on the Interconnection and Utilization of National Authority and ISNI: Focusing on the case of National Library of Korea (국가전거와 ISNI 연계 및 활용 방안 연구 - 국립중앙도서관을 중심으로 -)

  • Sungsook Lee;Ziyoung Park;Hyewon Lee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.57 no.1
    • /
    • pp.457-483
    • /
    • 2023
  • As ISNI spreads, the process and utilization method of authority control that identifies and links individual or group names is also expanding. In this study, the characteristics of the connection and utilization of ISNI and national authorities in the United States, the United Kingdom, France, and Germany were derived, and a plan to improve the connection and utilization of national authorities and ISNI was presented, focusing on the National Library of Korea. Focusing on major countries actively participating in the establishment and utilization of ISNI since its founding, national authorities and ISNI linkage methods and ISNI data used in services were analyzed. The implications of this study for the linkage and convergence of national authority and ISNI data were: first, applying ISNI to support authority work, second, establishing a close cooperation system with the publishing community, and third, establishing infrastructure for linking ISNI and authority records at the national level, and finally, providing user service pages based on authority data.

Analysis of OpinionMining on Consumer Satisfaction of InternetBanks: Focusing on the app review (인터넷전문은행의 소비자 만족에 관한 오피니언 마이닝 분석: 앱 사용 후기 중심으로)

  • Lee, Jong Hwa;Lee, Hyun Kyu
    • The Journal of Information Systems
    • /
    • v.32 no.3
    • /
    • pp.151-164
    • /
    • 2023
  • Purpose This study aims to analyze the current status of consumer awareness on Internet banks by conducting a full investigation and collecting user opinions presented on Google Play. After cateogorizing the current dissatisfaction, we would like to present not only the direction of the Internet bank service of but also the improvements of the platform. Design/methodology/approach Using opinion mining, subjectivity analysis, polarity analysis, and polarity information analysis of comments were conducted step by step to extract negative and positive keywords. The extracted keywords analyzed the weights of the frequently appearing positive and negative keywords using the TF-IDF model. Based on previous studies that negative information is more sensitive to positive information, we tried to confirm the connection, proximity, and mediation of negative keywords. Semantic Network Analysis (SNA) was used to visualize the connection relationship between the negative comment keywords of the three Internet banks. Findings Domestic Internet banks such as Kakao Bank, K-Bank, and Toss Bank have attracted a lot of attention even before they were established, and after establishment, they have secured a wide range of users through platforms that are completely different from existing banks. This study found out that the convenience of the app affects the opening and transaction of non-face-to-face accounts, which are characteristics of domestic Internet banks, which also affects the bank's business strategy. In addition, this study shows that the business characteristics of the company can be identified.

A Cognitive Study on the Usability of Cross-referencing link ad Multiple hierarchies (교차적 연결과 다계층구조의 유용성에 관한 인지적 연구 : 사이버쇼핑몰의 커스터머 인터페이스를 중심으로)

  • 이정원;김진우
    • Korean Journal of Cognitive Science
    • /
    • v.10 no.1
    • /
    • pp.25-43
    • /
    • 1999
  • The focus of this study is on the elements of structure design that facilitate u user interaction with applications within cyberspace Structure design entails decisions regarding the optimal classification and hierarchical organization of information into s successively higher units. i.e .. the grouping of highly related information in the form of nodes of a site and the subsequent connection of nodes that are inter-related. The decisions are based on the designer's subjective classification framework. which is not always compatible with that of the user. We propose that the ensuing cognitive dissonance can be reduced via the employment of multiple hierarchies and cross-referencing links. Multiple hierarchies represent a single information space in terms of a number of single hierarchies. each of which represent a different perspective Cross-referencing refers to the inter-connection between the constituent hierarchies by providing a link to the alternate hierarchy for information that is most likely to be categorized in diverse manners by users with differing perspectives. In this study we conducted two empirical studies to gauge the effectiveness of multiple hierarchies and Cross-referencing links in the domain of cyber shopping malls. In the first phase. an experiment was conducted to determine how subjects classified given products with respect to two different perspectives for categorization. Experimental cyber malls were developed based on the results from the first phase to test the effectiveness of multiple hierarchies and cross-referencing links. Results show that the ease of navigation was higher for cyber malls that had implemented cross-referencing links are of greater value when used in conjunction with single hierarchical designs rather than multiple hierarchies. Users satisfaction with and ease of navigation was higher for cyber malls that had not implemented multiple hierarchies. This paper concludes with discussion of these results and their implications for designers of cyber malls.

  • PDF

3G+ CDMA Wireless Network Technology Evolution: Application service QoS Performance Study (3G+ CDMA망에서의 기술 진화: 응용 서비스 QoS 성능 연구)

  • 김재현
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.10
    • /
    • pp.1-9
    • /
    • 2004
  • User-Perceived application-level performance is a key to the adoption and success of CDMA 2000. To predict this performance in advance, a detailed end-to-end simulation model of a CDMA network was built to include application traffic characteristics, network architecture, network element details, and protocol features. We assess the user application performance when a Radio Access Network (RAN) and a Core Network (CN) adopt different transport architectures such as ATM and If. For voice Performance, we found that the vocoder bypass scenario shows 8% performance improvement over the others. For data packet performance, we found that HTTP v.1.1 shows better performance than that of HTTP v.1.0 due to the pipelining and TCP persistent connection. We also found that If transport technology is better solution for higher FER environment since the IP packet overhead is smaller than that of ATM for web browsing data traffic, while it shows opposite effect to small size voice packet in RAN architecture. Though simulation results we showed that the 3G-lX EV system gives much better packet delay performance than 3G-lX RTT, the main conclusion is that end-to-end application-level performance is affected by various elements and layers of the network and thus it must be considered in all phases of the technology evolution process.

An Empirical Study of SNS Users' Switching Intention Toward Closed SNS (SNS 이용자의 폐쇄형 SNS로의 전환의도에 영향을 미치는 요인에 관한 연구)

  • Park, Hyunsun;Kim, Sanghyun
    • Information Systems Review
    • /
    • v.16 no.3
    • /
    • pp.135-160
    • /
    • 2014
  • Most Social Network Service (SNS) provide online chat, video and file sharing, blogging and others. Because of this advantage, people depend on SNS to communicate with others. However, recently SNS encourage people to reveal too much information broadly so SNS users are concerned about privacy invasion and data spill. They also feel fatigue in process of touching people they don't know while using SNSs. That is the reason why they attempt to switch from opened SNS to Closed SNS. Therefore, the purpose of this study is to empirically investigate and analyze the effect of the factors on the SNS users' switching behavior when using SNS. To accomplish this purpose, this research adopted "Push-Pull-Mooring (PPM)" framework. The PPM is proposed by population geologist, who used it to explain the incentives of demographic migration. Following PPM model, this research empirically examines the three categories of antecedents for SNS switching intention toward closed SNS: push (i.e., weak connection, privacy concern, relative complexity), pull (i.e., enjoyment, belongingness, peer influence), mooring (i.e., SNS fatigue, user resistance) factors. The survey was conducted for 285 users on SNS communities in Korea. The results of this study are as follows; First, wear connection and privacy concern are significantly related to SNS switching intention. Second, enjoyment and belongingness are significantly related to SNS switching intention. Finally, the results show that SNS fatigue has a moderating effect on the links between push factors and SNS switching Intention. Also, user resistance has a moderating effect on the links between pull factors and SNS switching Intention. These findings contribute to the SNS literature both theoretically and practically.