• Title/Summary/Keyword: support of entity

Search Result 136, Processing Time 0.025 seconds

LCT: A Lightweight Cross-domain Trust Model for the Mobile Distributed Environment

  • Liu, Zhiquan;Ma, Jianfeng;Jiang, Zhongyuan;Miao, Yinbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.914-934
    • /
    • 2016
  • In the mobile distributed environment, an entity may move across domains with great frequency. How to utilize the trust information in the previous domains and quickly establish trust relationships with others in the current domain remains a challenging issue. The classic trust models do not support cross-domain and the existing cross-domain trust models are not in a fully distributed way. This paper improves the outstanding Certified Reputation (CR) model and proposes a Lightweight Cross-domain Trust (LCT) model for the mobile distributed environment in a fully distributed way. The trust certifications, in which the trust ratings contain various trust aspects with different interest preference weights, are collected and provided by the trustees. Furthermore, three factors are comprehensively considered to ease the issue of collusion attacks and make the trust certifications more accurate. Finally, a cross-domain scenario is deployed and implemented, and the comprehensive experiments and analysis are conducted. The results demonstrate that our LCT model obviously outperforms the Bayesian Network (BN) model and the CR model in our cross-domain scenario, and significantly improves the successful interaction rates of the honest entities without increasing the risks of interacting with the malicious entities.

TAKES: Two-step Approach for Knowledge Extraction in Biomedical Digital Libraries

  • Song, Min
    • Journal of Information Science Theory and Practice
    • /
    • v.2 no.1
    • /
    • pp.6-21
    • /
    • 2014
  • This paper proposes a novel knowledge extraction system, TAKES (Two-step Approach for Knowledge Extraction System), which integrates advanced techniques from Information Retrieval (IR), Information Extraction (IE), and Natural Language Processing (NLP). In particular, TAKES adopts a novel keyphrase extraction-based query expansion technique to collect promising documents. It also uses a Conditional Random Field-based machine learning technique to extract important biological entities and relations. TAKES is applied to biological knowledge extraction, particularly retrieving promising documents that contain Protein-Protein Interaction (PPI) and extracting PPI pairs. TAKES consists of two major components: DocSpotter, which is used to query and retrieve promising documents for extraction, and a Conditional Random Field (CRF)-based entity extraction component known as FCRF. The present paper investigated research problems addressing the issues with a knowledge extraction system and conducted a series of experiments to test our hypotheses. The findings from the experiments are as follows: First, the author verified, using three different test collections to measure the performance of our query expansion technique, that DocSpotter is robust and highly accurate when compared to Okapi BM25 and SLIPPER. Second, the author verified that our relation extraction algorithm, FCRF, is highly accurate in terms of F-Measure compared to four other competitive extraction algorithms: Support Vector Machine, Maximum Entropy, Single POS HMM, and Rapier.

Community Survey in Korean Public Libraries: Current States of Performance, Problems and Recommendations (공공도서관의 지역사회조사 수행 현황과 문제점 및 활성화 방안)

  • Chang, Hye-Rhan;Lee, Mi-Young
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.15 no.2
    • /
    • pp.161-176
    • /
    • 2004
  • To examine the current states of community survey performance with its contents and methods, a questionnaire survey was made for 92 public libraries in Seoul, Gyeonggi, and Incheon area. 47 libraries(70%) have conducted community survey during last 5 years. The frequency has increased since 2001. Considering the content item as separate entity, the average is 1.7 times per library. The main purpose of the survey was to understand the resident's need and a questionnaire survey method was applied dominantly. Problems involved with the lack of budget, time, and the librarian's ability are identified as obstacles. Based on the analysis, recommendations such as acknowledgement, administrations and financial support, establishment of standards, education and train information are suggested to promote the community survey.

  • PDF

Context Information Modeling Method based on Ontology (온톨로지 기반의 컨택스트 정보 모델링 기법)

  • Kim, Jin-Hyung;Hwang, Myung-Gwon;Jung, Han-Min
    • Journal of Digital Contents Society
    • /
    • v.12 no.4
    • /
    • pp.437-447
    • /
    • 2011
  • Ubiquitous Computing is required to define models for broad context information occurrence by surrounding environment and to study how to model a mechanism for selectively collecting useful pieces of context information and providing relevant intelligent services. Further, studies are also required as to process of context information, and its maintenance and reasoning. However, current context-aware research area still lacks modeling technique that reflects the characteristics of ontology effectively for providing relevant intelligent services. It has also limitation about context reasoning and interoperability among context information. Therefore, this paper proposes ontology-based context-aware modeling technique and framework enabling efficient specification of context information for providing intelligent context-aware services that support context management and reasoning.

Design and Implementation on T.120 Convergence Layer Protocol to Support Multicast Transport Protocols (멀티캐스트 수송계층 프로토콜을 지원하기 위한 T.120 수렴계층 프로토콜의 설계 및 구현)

  • Kim, Su-Yeon;Kim, Ho-Yong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.1
    • /
    • pp.137-148
    • /
    • 1998
  • In this paper, we proposed the algorithm to run MCS protocol, the core technology of T.120 series, over Multicast Transport Protocol and described an implementation architecture we proposed. An algorithm implemented can utilize some functions of Multicast Transport Layer fully, keeping the backward compatibility with the existing Mes. In order to do so, when a connection sets up, the Multicast Transport Layer looks into whether that of the peer entity does have multicast functionality. If it has, multicast functionality can be used. Unless, it can not. We are going to contribute these technologies to IMTC organizing the interoperability test of T.l20 series.

  • PDF

Coreference Resolution for Korean using Mention Pair with SVM (SVM 기반의 멘션 페어 모델을 이용한 한국어 상호참조해결)

  • Choi, Kyoung-Ho;Park, Cheon-Eum;Lee, Changki
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.4
    • /
    • pp.333-337
    • /
    • 2015
  • In this paper, we suggest a Coreference Resolution system for Korean using Mention Pair with SVM. The system introduced in this paper, also be able to extract Mention from document which is including automatically tagged name entity information, dependency trees and POS tags. We also built a corpus, including 214 documents with Coreference tags, referencing online news and Wikipedia for training the system and testing the system's performance. The corpus had 14 documents from online news, along with 200 question-and-answer documents from Wikipedia. When we tested the system by corpus, the performance of the system was extracted by MUC-F1 55.68%, B-cube-F1 57.19%, and CEAFE-F1 61.75%.

A Study on the Activation Strategy of Underground Shopping Malls: Focusing on Public Underground Shopping Malls in Six Major Cities

  • KIM, Gi Pyoung;LEE, Yong Kyu;LEE, Guen Woo;YOU, Chang Kwon
    • The Journal of Industrial Distribution & Business
    • /
    • v.13 no.6
    • /
    • pp.39-49
    • /
    • 2022
  • Purpose: As part of these efforts, in-depth research is needed on efficient and practical utilization of underground spaces and underground shopping malls. In addition, efforts are being made to find effective alternatives to various problems currently occurring in underground shopping malls, but it is not easy. In addition, the development entity and the maintenance entity are different from each other, and the management is not unified, making it difficult to maintain underground shopping malls. From this point of view, it can be said that it is time to actively and specifically discuss ways to revitalize underground shopping malls. Data and methodology: In the domestic distribution environment, traditional markets and shops are stagnating due to rapid changes in consumption patterns, such as the spread of large companies with advanced distribution techniques such as hypermarkets, shopping malls, and SCM, the rapid increase in Internet and home shopping, and the importance of convenience for young consumers. In order to revitalize underground shopping malls, it is necessary to strengthen the organization and self-rescue efforts of merchants' associations, change consciousness through merchant education, change to specialized markets, find nuclear stores and representative restaurants, and support the hardware sector. Results: The connection of underground shopping malls in each region of the country, where commercial districts are separated from each other, will also play an important role in reviving the function of the city in the future. To do this, it is first necessary to connect underground shopping malls that have been cut off. In other words, connection between connectable underground shopping malls should be promoted. Of course, long-term projects should be promoted step by step, and many consultations should be made on how to connect with the ground for each local government. Conclusion: This is because in the future, the underground space cannot just be a walking place, but another space of the Korean Wave where you can experience satisfying the five senses. K-shopping Hallyu content can be created by creating a characteristic story for each underground shopping mall in the city, permanently this story-oriented event, and creating a safe and elegant environment. If there is a story, so-called "Senomi Shopping" will be possible. A new Korean Wave will be created that can satisfy "the fun of writing, the fun of seeing, and the fun of feeling" at the same time.

The Political Recognition Surrounding Candlelight Rally and Taegeukgi Rally: A Big Data Analytics on Online News Comments (촛불 집회와 태극기 집회를 둘러싼 정국 인식: 온라인 뉴스 댓글에 대한 빅데이터 분석)

  • Kim, ChanWoo;Jung, Byungkee
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.6
    • /
    • pp.875-885
    • /
    • 2018
  • This study analyzed the major issues of the Candlelight Rally and Taegukgi Rally registered in news comments of the politics section of the portal site from October 24, 2016 to March 19, 2017. We examined the political recognition of the two rallies with the Named Entity Recognition. The main analytical items are the responsibility for impeachment, the subject and method of settlement, and other major issues. As a result of the analysis, the comments of the Candlelight Rally focused on the impeachment support and the legal penalties of the regime ministers, and insisted on resolving the political situation through the next election after impeachment. The comments of the Taegukgi Rally focused on the rejection of the impeachment to maintain the regime and insisted on rejecting the impeachment of the Constitutional Court. The conflicts between the group that supported Candlelight Rallis and the group that supported Taegukgi rallies are predicted to last at least for the time being (Park Geun-hye's trial period) after the presidential election. After the impeachment of the President and replacement of the regime this conflict will develop into the confrontation between the pursuit of liquidation and new politics and the attempt to influence the trial of Park Geun-hye. Therefore, the efforts to integrate society in the aftermath are necessary.

Inferring and Visualizing Semantic Relationships in Web-based Social Network (웹 기반 소셜 네트워크에서 시맨틱 관계 추론 및 시각화)

  • Lee, Seung-Hoon;Kim, Ji-Hyeok;Kim, Heung-Nam;Jo, Geun-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.1
    • /
    • pp.87-102
    • /
    • 2009
  • With the growth of Web 2.0, lots of services allow yours to post their personal information and useful knowledges on networked information spaces such as blogs and online communities etc. As the services are generalized, recent researches related to social network have gained momentum. However, most social network services do not support machine-processable semantic knowledge, so that the information cannot be shared and reused between different domains. Moreover, as explicit definitions of relationships between individual social entities do not be described, it is difficult to analyze social network for inferring unknown semantic relationships. To overcome these limitations, in this paper, we propose a social network analysis system with personal photographic data up-loaded by virtual community users. By using ontology, an informative connectivity between a face entity extracted from photo data and a person entity which already have social relationships was defined clearly and semantic social links were inferred with domain rules. Then the inferred links were provided to yours as a visualized graph. Based on the graph, more efficient social network analysis was achieved in online community.

  • PDF

The Analysis of the Differences in the SME's Perception about Industrial Technology Security Support Policy (산업기술 보안 지원정책에 대한 중소기업의 인식차이 분석)

  • Jung, Yuhan;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.4
    • /
    • pp.15-32
    • /
    • 2020
  • Increasing uncertainties in the technological innovation environment and increasing technology competition also present new challenges in terms of industrial technology security. Therefore, the purpose of this study was to identify the direction of policy change necessary for the improvement of related policies in the future by examining the importance and implementation of the government's industrial technology security support policies for small and medium-sized enterprises engaged in industrial technology innovation activities. As a result of the analysis, first of all, small and medium-sized enterprises that responded to the government's industrial technology security support policy were perceived to be less performing than the importance of the program. These results can be said to mean that selective budget expansion for related policy programs may be necessary, along with efforts to improve the quality of each program. Second, an analysis of the differences in group recognition between new technology certification firms and industrial technology verification(certification) companies showed that significant differences exist between groups for the program. These results suggest that more effective operation of the relevant policies may require policy enforcement in consideration of the level of security and will of each company in industrial technology, as much as the quantitative characteristics of the entity. This study is meaningful in providing the necessary policy directional basic information for the design and execution of more specific and effective industrial technology security policies by presenting empirical research results that domestic small and medium-sized enterprises are aware of about the government's industrial technology security policies.