• Title/Summary/Keyword: nature of information

Search Result 2,420, Processing Time 0.033 seconds

A Hybird Antibody Model Design using Genetic Algorithm Scheme (유전 알고리즘 기법을 이용한 HA 모델 설계)

  • Shin, Mi-Yea;Jeon, Seoung-Heup;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.159-166
    • /
    • 2009
  • A nature immunity system responds sensitively to an external invasion with various functions in a lot of bodies, besides it there is a function to remember information to have been currently infected. we propose a hybrid model similar to immune system which combine with the antibody which applied genetic algorithm as select antibody and the arbitrary abnormal system call sequence that applied negative selection of a nature immunity system. A proposed model uses an arbitrary abnormal system Kol sequence in order to reduce a positive defect and a negative defect. Data used to experiment are send mail data processed UNM (University of New Maxico). The negative defect that an experiment results proposal model judged system call more abnormal than the existing negative selection to normal system call appeared 0.55% low.

Fuzzy Petri-net Approach to Fault Diagnosis in Power Systems Using the Time Sequence Information of Protection System

  • Roh, Myong-Gyun;Hong, Sang-Eun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1727-1731
    • /
    • 2003
  • In this paper we proposed backward fuzzy Petri-net to diagnoses faults in power systems by using the time sequence information of protection system. As the complexity of power systems increases, especially in the case of multiple faults or incorrect operation of protective devices, fault diagnosis requires new and systematic methods to the reasoning process, which improves both its accuracy and its efficiency. The fuzzy Petri-net models of protection system are composed of the operating process of protective devices and the fault diagnosis process. Fault diagnosis model, which makes use of the nature of fuzzy Petri-net, is developed to overcome the drawbacks of methods that depend on operator knowledge. The proposed method can reduce processing time and increase accuracy when compared with the traditional methods. And also this method covers online processing of real-time data from SCADA (Supervisory Control and Data Acquisition)

  • PDF

Sentiment Analysis of Korean Using Effective Linguistic Features and Adjustment of Word Senses

  • Jang, Ha-Yeon;Shin, Hyo-Pil
    • Language and Information
    • /
    • v.14 no.2
    • /
    • pp.33-46
    • /
    • 2010
  • This paper introduces a new linguistic-focused approach for sentiment analysis (SA) of Korean. In order to overcome shortcomings of previous works that focused mainly on statistical methods, we made effective use of various linguistic features reflecting the nature of Korean. These features include contextual shifters, modal affixes, and the morphological dependency of chunk structures. Moreover, in order to eschew possible confusion caused by ambiguous words and to improve the results of SA, we also proposed simple adjustment methods of word senses using KOLON ontology mapping information. Through experiments we contend that effective use of linguistic features and ontological information can improve the results of sentiment analysis of Korean.

  • PDF

Grammatical Structure Oriented Automated Approach for Surface Knowledge Extraction from Open Domain Unstructured Text

  • Tissera, Muditha;Weerasinghe, Ruvan
    • Journal of information and communication convergence engineering
    • /
    • v.20 no.2
    • /
    • pp.113-124
    • /
    • 2022
  • News in the form of web data generates increasingly large amounts of information as unstructured text. The capability of understanding the meaning of news is limited to humans; thus, it causes information overload. This hinders the effective use of embedded knowledge in such texts. Therefore, Automatic Knowledge Extraction (AKE) has now become an integral part of Semantic web and Natural Language Processing (NLP). Although recent literature shows that AKE has progressed, the results are still behind the expectations. This study proposes a method to auto-extract surface knowledge from English news into a machine-interpretable semantic format (triple). The proposed technique was designed using the grammatical structure of the sentence, and 11 original rules were discovered. The initial experiment extracted triples from the Sri Lankan news corpus, of which 83.5% were meaningful. The experiment was extended to the British Broadcasting Corporation (BBC) news dataset to prove its generic nature. This demonstrated a higher meaningful triple extraction rate of 92.6%. These results were validated using the inter-rater agreement method, which guaranteed the high reliability.

Collaborative Movie Recommender Considering User Profiles Explicitly

  • Qing Li;Kim, Byeong-Man;Shin, Yoon-Sik;Lim, En-Ki
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04c
    • /
    • pp.386-388
    • /
    • 2003
  • We are developing a web-based movie recommender system that catches and reasons with user profiles and ratings to recommend movies. In the paper, we outline the current status of our implementation with particular emphasis on the mechanisms used to provide effective recommendations. Social recommender systems collect ratings of items from many individuals and use nearest-neighbor techniques to make recommendations to a user. However, these methods only depend on the ratings and ignore other useful information. Our primary concern is to provide an approach that can recommend the movies based on not only the user ratings but also the significant amount of other information that is available about the nature of each items - such as cast list or movie genre. We experimentally evaluate our approach and compare them to conventional social filtering, which suggests merits to our approach.

  • PDF

Online Users' Cynical Attitudes towards Privacy Protection: Examining Privacy Cynicism

  • Hanbyul Choi;Yoonhyuk Jung
    • Asia pacific journal of information systems
    • /
    • v.30 no.3
    • /
    • pp.547-567
    • /
    • 2020
  • As the complexity of managing online personal information is increasing and data breach incidents frequently occur, online users feel a loss of control over their privacy. Such a situation leads to their cynical attitudes towards privacy protection, called privacy cynicism. This study aims to examine the role of privacy cynicism in online users' privacy behaviors. Data were gathered from a survey that 281 people participated in and were analyzed with covariance-based structural equation modeling. The findings of this study reveal that privacy cynicism has not only a direct influence on disclosure intention but also moderates an effect of privacy concerns on the intention. The analytical results also indicate that there is a nonlinear effect of privacy cynicism on the outcome variable. This study developed the concept of privacy cynicism—a phenomenon that significantly affects online privacy behavior but has been rarely examined. The study is an initial research into the nature and implications of privacy cynicism and furthermore clarified its role by the nonlinear relationship between privacy cynicism and the willingness to disclose personal information.

Design of Convergence Platform for companion animal Personalized Services (반려동물 개인화서비스를 위한 융합 플랫폼 설계)

  • Kim, Sam-Taek
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.6
    • /
    • pp.29-34
    • /
    • 2016
  • Nowadays, real-time devices that provide health care for a companion animal is being developed by IoT technology and its demand such as smart puppy tag is increasing. However, it is difficult for IoT devices of companion animals to process complex nature due to miniaturized hardware and constructive nature. There is a clear limit to custom advanced features like health care implementation. This paper designs an integrated platform with statistical analysis which makes it possible to customized services such as feed production, pharmaceutical production, and health care for each companion animal. Middleware that collects sensor information, customer's spending pattern and information from Social Network Service is also designed by making use of IoT devices which companion animals wear. Furthermore, the paper designed data analyzer which analyzes and refines data from collected information that can be applied to personalized services.

A Representation of Data Semantics using Bill of Data (자료 구성표를 이용한 데이터의 생성적 의미 표현 연구)

  • Lee, Choon-Yeul
    • Asia pacific journal of information systems
    • /
    • v.7 no.3
    • /
    • pp.167-180
    • /
    • 1997
  • Data semantics is an well recognized issue in areas of information systems research. It provides indispensable information for management of data, It describes what data mean, how they are created, where they can be applied to, to name a few. Because of these diverse nature of data semantics, it has been described from different perspectives of formalization. This article proposes to formalize data semantics by the processes that data are created or transformed, A scheme is proposed to describe the structure that data are created and transformed, which is called Bill of Data. Bill of Data is a directed graph, whose leaves are primary input data and whose internal nodes are output data objects produced from input data objects. Using Bill of Data, algorithms are developed to compare data semantics.

  • PDF

Security Model for Pervasive Multimedia Environment

  • Djellali, Benchaa;Lorenz, Pascal;Belarbi, Kheira;Chouarfia, Abdallah
    • Journal of Multimedia Information System
    • /
    • v.1 no.1
    • /
    • pp.23-43
    • /
    • 2014
  • With the rapidity of the development on electronic technology, various mobile devices are produced to make human life more convenient. The user is always in constant search of middle with ease of deployment. Therefore, the development of infrastructure and application with ubiquitous nature gets a growing keen interest. Recently, the number of pervasive network services is expanding into ubiquitous computing environment. To get desired services, user presents personal details about this identity, location and private information. The information transmitted and the services provided in pervasive computing environments (PCEs) are exposed to eavesdropping and various attacks. Therefore, the need to protect this environment from illegal accesses has become extremely urgent. In this paper, we propose an anonymous authentication and access control scheme to secure the interaction between mobile users and services in PCEs. The proposed scheme integrates a biometric authentication in PKI model. The proposed authentication aims to secure access remote in PCE for guaranteeing reliability and availability. Our authentication concept can offer pervasive network service users convenience and security.

  • PDF

Project Performance Improvement of Employees: A Psychological Empowerment Approach

  • Oh, Sung-Tae;Kim, Sodam;Kim, Hee-Woong
    • Asia pacific journal of information systems
    • /
    • v.26 no.4
    • /
    • pp.509-525
    • /
    • 2016
  • According to the dynamic changes in the business environment, the structural transformation of firms has had an observable trend. An increasingly large number of firms have been transforming into either project-based organizations or project expert groups. This study aims to investigate the antecedents required for the optimal level of empowerment with consideration of the project-based team environmental nature and job characteristic. Three factors are applied to measure the significant effects on psychological empowerment as the result variables. To determine the antecedents and consequent factors of psychological empowerment, employees' interviews and precedent studies are used. For the empirical study, four determinants of empowerment variables are modeled into a second-order reflective construct. This study finds that psychological empowerment significantly affects performance. Therefore, this study can serve as a guideline for development and operating methods for project success.