The social consciousness on fake reviews has triggered researchers to suggest ways to cope with them by analyzing contents of fake reviews or finding ways to discover them by means of structural characteristics of them. This research tried to collect data from blog posts in Naver and detect habitual patterns users use unconsciously by variables extracted from blogs and blog posts by a machine learning model and wanted to use the technique in predicting fake reviews. Data analysis showed that there was a very high relationship between the number of all the posts registered in the blog of the writer of the related writing and the date when it was registered. And, it was found that, as model to detect advertising reviews, Random Forest is the most suitable. If a review is predicted to be an advertising one by the model suggested in this research, it is very likely that it is fake review, and that it violates the guidelines on investigation into markings and advertising regarding recommendation and guarantee in the Law of Marking and Advertising. The fact that, instead of using analysis of morphemes in contents of writings, this research adopts behavior analysis of the writer, and, based on such an approach, collects characteristic data of blogs and blog posts not by manual works, but by automated system, and discerns whether a certain writing is advertising or not is expected to have positive effects on improving efficiency and effectiveness in detecting fake reviews.
As electronic mails are being widely used for facility and speedness of information communication, as the amount of spam mails which have malice and advertisement increase and cause lots of social and economic problem. A number of approaches have been proposed to alleviate the impact of spam. These approaches can be categorized into pre-acceptance and post-acceptance methods. Post-acceptance methods include bayesian filters, collaborative filtering and e-mail prioritization which are based on words or sentances. But, spammers are changing those characteristics and sending to avoid filtering system. In the case of Korean, the abnormal usages can be much more than other languages because syllable is composed of chosung, jungsung, and jongsung. Existing formal expressions and learning algorithms have the limits to meet with those changes promptly and efficiently. So, we present an methods for recognizing Korean abnormal language(Koral) to improve accuracy and efficiency of filtering system. The method is based on syllabic than word and Smith-waterman algorithm. Through the experiment on filter keyword and e-mail extracted from mail server, we confirmed that Koral is recognized exactly according to similarity level. The required time and space costs are within the permitted limit.
Purpose - This study was conducted to present a study on the perception and satisfaction with the brand agricultural products targeted at consumers who use a lot of local products. According to the data of 2011, the total number of the brand agricultural products of Korea is 5,291 with various kinds. Research design, data and methodology - The survey shows that the brand agricultural products are being used by some specific people. However, it can be a useful idea which can help the consumption of brand agricultural products to be expanded if we understand how consumers' recognitions are different between various groups. For an empirical Analysis, the response data of 110 adult patients residing in the metropolitan area were used and conducted with a factor analysis, frequency analysis in order to ensure the validity and conducted a regression analysis and correlation analysis using SPSS statistical program. Results - According to the analysis, it showed consumers with an interest in brand agricultural products are 40-50 age housewives and the middle class of about 5 million won in monthly income more than 3 million won with a college education. As for consumers' purchasing status, all the subjects said that they had experienced buying brand agricultural products and the level of satisfaction for them was very high. Relatively, consumers' satisfaction level with high income and education is high. And recognition of the brand agricultural products was found mainly goes through word of mouth. The age and income are very important factors in customers' repurchase for brand agricultural products. The result of the analysis for the influences on brand agricultural products of customer satisfaction suggests even if the recognitions for safety, quality, and value are vital factors, the recognition of quality doesn't influence on brand agricultural products statistically and significantly. It was analysed if there were any differences between recognitions by group to brand agricultural products, that is to say recognition of safety, quality and value and the result can be summarized as follows. There are all statistical significant differences depending on their age, educational background and income. In the case of 30 or 40 aged, as they got the education level of college and graduate school and earned relatively high income, most customers have positive recognition on the brand agricultural products. This implies the group which can buy and consume the brand agricultural more easily has much more positive recognition. Conclusion - The results of this study shows consumers' brand awareness and satisfaction with brand agricultural products are affected by their age and income level. The purpose of this study is to find the information that can help brand agricultural products markets to be expanded by understanding the factors which encourage consumers to behave repurchase as well as customers' various levels of recognition to the brand agricultural products. The survey says that brand agricultural products are being used by some specific people.
In this study, the target detection using both high-resolution satellite SAR and Elecro-Optical (EO) images such as TerraSAR-X and WorldView-2 is performed, considering the characteristics of targets. The targets of our interest are featured by being stationary and appearing as cluster targets. After the target detection of SAR image by using Constant False Alarm Rate (CFAR) algorithm, a series of processes is performed in order to reduce false alarms, including pixel clustering, network clustering and coherence analysis. We extend further our algorithm by adopting the fast and effective ellipse detection in EO image using randomized hough transform, which is significantly reducing the number of false alarms. The performance of proposed algorithm has been tested and analyzed on TerraSAR-X SAR and WordView-2 EO images. As a result, the average false alarm for group of targets is 1.8 groups/$64km^2$ and the false alarms of single target range from 0.03 to 0.3 targets/$km^2$. The results show that groups of targets are successfully identified with very low false alarms.
Journal of Elementary Mathematics Education in Korea
/
v.12
no.2
/
pp.149-163
/
2008
The purpose of this study was to investigate research trends of the articles in Math-Educational journals between 1998 and 2006 in a bid to discuss whether the articles evenly dealt with different fields and whether studies on elementary mathematics education were in line with the 7th national curricula. It's basically meant to determine some of the right directions for future research on elementary mathematics education. The articles included in Math-Educational journals during the selected period were analyzed to find out the theme, area, method and subjects of the studies and when the studies were conducted. After checking National Assembly Digital Library by inputting a keyword 'elementary mathematics', 235 articles were found, and a content analysis was carried out, and statistical data on percentage were obtained. The results of this study were as follows: First, there had been steady research efforts about elementary mathematics education, as 20 or 30 studies had been conducted on a yearly basis. Second, as for theme of research, the most common themes were instructional design and method(25.5%), and an analysis of curricula and textbook(15.3%) was the second most dominant theme. Third, regarding the area of study, the most widely investigated area was number and operation (30.0%), followed by character/expression(27.8%), figure (23.9%), regularity/function (8.9%), probability/statistics(5.6%), and measurement (3.9%). Fourth, concerning the method of research, didactical analysis(43.8%) was most prevalent, followed by quantitative research(29.8%), qualitative research(16.6%) and a combination of qualitative and quantitative approaches(9.8%). Fifth, as to subjects, many of the studies(21.7%) investigated upper graders. In conclusion, it has to be accomplished the impartial researches for the whole area in order to develop elementary mathematics education and attain the objects of the 7th national curricula.
In many continuous speech recognition systems based on HMMs, decision tree-based state tying has been used for not only improving the robustness and accuracy of context dependent acoustic modeling but also synthesizing unseen models. To construct the phonetic decision tree, standard method performs one-level pruning using just single Gaussian triphone models. In this paper, two novel approaches, two-level decision tree and multi-mixture decision tree, are proposed to get better performance through more accurate acoustic modeling. Two-level decision tree performs two level pruning for the state tying and the mixture weight tying. Using the second level, the tied states can have different mixture weights based on the similarities in their phonetic contexts. In the second approach, phonetic decision tree continues to be updated with training sequence, mixture splitting and re-estimation. Multi-mixture Gaussian as well as single Gaussian models are used to construct the multi-mixture decision tree. Continuous speech recognition experiment using these approaches on BN-96 and WSJ5k data showed a reduction in word error rate comparing to the standard decision tree based system given similar number of tied states.
Many people have recently posted about personal interests on social media. The development of the Internet and computer technology has enabled the storage of digital forms of documents that has resulted in an explosion of the amount of textual data generated; subsequently there is an increased demand for technology to create valuable information from a large number of documents. A text mining technique is often used since text-based data is mostly composed of unstructured forms that are not suitable for the application of statistical analysis or data mining techniques. This study analyzed the Meteorological Yearbook data of the Korea Meteorological Administration (KMA) with a text mining technique. First, a term dictionary was constructed through preprocessing and a term-document matrix was generated. This term dictionary was then used to calculate the annual frequency of term, and observe the change in relative frequency for frequently appearing words. We also used regression analysis to identify terms with increasing and decreasing trends. We analyzed the trends in the Meteorological Yearbook of the KMA and analyzed trends of weather related news, weather status, and status of work trends that the KMA focused on. This study is to provide useful information that can help analyze and improve the meteorological services and reflect meteorological policy.
Risk regarding the possibility of loss can be especially problematic. If a loss is certain to occur, it may be planned for in advance and treated as a definite, known expense. It is when there is uncertainty about the occurrence of a loss that risk becomes an important problem. The word risk is often used in connection with insurance. No one generally accepted definition of risk exists, however. Of the many definitions, two distinctive ones are commonly used. One defines risk as the variation in possible outcomes of an event based on chance. That is, the greater the number of different outcomes that may occur, the greater the risk. Another way of expressing this concept is to state: The greater the variation around an average expected loss, the greater the risk. The second definition of risk is the uncertainty concerning a possible loss. The definition of risk as a useful one because it focuses attention on the degree of risk in given situations. The degree of risk is a measure of the accuracy with which the outcome of an event based on chance can be predicted. For now, it will serve our purpose to note the more accurate the prediction of the outcome of an event based on chance, the lower the degree of risk. After sources of risks are identified and measured, a decision can be made as to how the risk should be handled. A pure risk that is not identified does not disappear, the business merely loses the opportunity to consciously decide on the best technique for dealing with that risk. The process used to systematically manage risk exposures is known as risk management. Some persons use the term risk management only in connection with businesses, and often the term refers only to the management of pure risks. In this sense, the traditional risk management goal has been to minimize the cost of pure risk to the company. But as firms broaden the ways that they view and manage many different types of risk, the need for new terminology has become apparent. The terms integrated risk management and enterprise risk management reflect the intent to manage all forms of risk, regardless of type. International trade transaction is called between countries has features of globalism, cultural gap, long distance and long terms for the transaction. It is riskier than domestic transaction has its specific risks, such as foreign exchange risk and political risk, and requires various active risk management skills. Risks in relation to the international trade transaction are the contract risk, transit risk and payment risk, etc. The risk management in relation to the international trade transaction is to identify and measure these risks. The purpose of this study is to analyse the practical problems and its solution plan by analyzing various cases related to the risk management of bill of lading in the international trade transaction.
Tuberculosis (TB) remains a serious health issue around the word. Adenovirus (Ad)-based vaccine and modified vaccinia virus Ankara (MVA)-based vaccine have emerged as two of the most promising immunization candidates over the past few years. However, the performance of the homologous and heterologous prime-boost immunization regimens of these two viral vector-based vaccines remains unclear. In the present study, we constructed recombinant Ad and MVA expressing an Ag85B-TB10.4 fusion protein (AdH4 and MVAH4) and evaluated the impact of their different immunization regimens on the humoral and cellular immune responses. We found that the viral vector-based vaccines could generate significantly higher levels of antigen-specific antibodies, $IFN-{\gamma}$-producing splenocytes, $CD69^+CD8^+$ T cells, and $IFN-{\gamma}$ secretion when compared with bacillus Calmette-$Gu{\acute{e}}rin$ (BCG) in a mouse model. AdH4-containing immunization regimens (AdH4-AdH4, AdH4-MVAH4, and MVAH4-AdH4) induced significantly stronger antibody responses, much more $IFN-{\gamma}$-producing splenocytes and $CD69^+CD8^+$ T cells, and higher levels of $IFN-{\gamma}$ secretion when compared with the MVAH4-MVAH4 immunization regimen. The number of $IFN-{\gamma}$-producing splenocytes sensitive to $CD8^+$ T-cell restricted peptides of Ag85B (9-1p and 9-2p) and Th1-related cytokines ($IFN-{\gamma}$ and $TNF-{\alpha}$) in the AdH4-MVAH4 heterologous prime-boost regimen immunization group was significantly higher than that in the other viral vector-based vaccine- and BCG-immunized groups, respectively. These results indicate that an immunization regimen involving AdH4 may have a higher capacity to induce humoral and cellular immune responses against TB in mice than that by regimens containing BCG or MVAH4 alone, and the AdH4-MVAH4 prime-boost regimen may generate an ideal protective effect.
Choseon Dynasty, from many aspects, saw the institutional establishment of its royal palaces in the 17th and 18th century, with 'donggwol (east palace)' as the most representative form in the era. In that period, palaces were managed in the best way that fits the royal etiquette and order to maintain the Confucian framework of the times. While the royal palace was the place for the king to conduct state affairs, it was also a compound for the royal family to lead a life in. Since the royal family was also based on the Confucian system, women in the royal palace seldom revealed their existence to outside world. Yet daebi,(a Queen Mother) who was often called 'dongjo,' enjoyed the highest level of honor not only as a member of the royal family but in the hierarchical order of the dynasty. As they often engaged themselves in political affairs, daebi raised their reputation through rites and rituals. So, in the 16th century, they largely used Changgyeong-gung palace in the eastern part of the royal compound since they sometimes had to go out of the royal residence. While it was called 'dongjo' because it was seated in the eastern part, it was also used as a word symbolizing daebi. And, therefore, it has become a general principle of royal palaces to build the palace for daebi in the eastern wing of the compound. However, the residence for daebi was not always built in the eastern part in the 17th and 18th century and, instead, edifices for daebi were sometimes erected in several points within the royal compound. Beside, daebi's residence in this period had additional spaces for ceremonies since they had a number of official events there. Construction of daebi's residences in this era was not confined to the symbolic institutions and they became the peculiar palaces with specific characteristics for official ceremonies of the queen mothers. Consequently, it could be said that the architectural style of dongjo, which was the place of the supreme female in the hierarchical order, stemmed from donggwol where daebi spent the longest time of the royal life.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.