• Title/Summary/Keyword: user discrimination

Search Result 63, Processing Time 0.03 seconds

Improvement of Multicultural Awareness and Story Building by Community Radio (공동체 라디오를 통한 다문화 인식개선과 스토리설계 방안)

  • Hong, Sook-Yeong
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.5
    • /
    • pp.98-107
    • /
    • 2015
  • This study analyzed the story of 'Good Morning, Ladies of the World', a multicultural program of a community radio Gwanak FM. Furthermore, the study performed an in-depth interview on Korean producing staffs and migrant casts in order to figure out the contents for the improvement of awareness and for the design of multicultural media story telling. As a result, the migrant women presented overall public discourses on their own culture, climate and customs as a sense of representative. While Korean staffs wanted to understand and communicate with their culture and to share private experiences, migrant women wished understanding and respect to their culture and removal of discrimination or prejudice. Accordingly, the storytelling design for the improvement of multicultural awareness must be a private discourse on the basis of a public discourse, and it turned out that the user of a mediator who experienced and knew culture of Korea and the migrant is necessary. And, this study recommended the need of education of migrant women and media support for a proper story planning, structuring and delivery.

Mepelyzer : Malicious App Identification Mechanism based on Method & Permission Similarity Analysis of Server-Side Polymorphic Mobile Apps (Mepelyzer : 서버 기반 다형상 모바일 앱에 대한 메소드 및 퍼미션 유사도 기반 악성앱 판별)

  • Lee, Han Seong;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.3
    • /
    • pp.49-61
    • /
    • 2017
  • Recently, convenience and usability are increasing with the development and deployment of various mobile applications on the Android platform. However, important information stored in the smartphone is leaked to the outside without knowing the user since the malicious mobile application is continuously increasing. A variety of mobile vaccines have been developed for the Android platform to detect malicious apps. Recently discovered server-based polymorphic(SSP) malicious mobile apps include obfuscation techniques. Therefore, it is not easy to detect existing mobile vaccines because some other form of malicious app is newly created by using SSP mechanism. In this paper, we analyze the correlation between the similarity of the method in the DEX file constituting the core malicious code and the permission similarity measure through APK de-compiling process for the SSP malicious app. According to the analysis results of DEX method similarity and permission similarity, we could extract the characteristics of SSP malicious apps and found the difference that can be distinguished from the normal app.

Genuine discrimination application using image matching (칼러정보 및 망점 정보를 활용한 코드인증시스템 개발)

  • Choi, Do-young;Kim, Jin-su;Kim, Ji-su;Han, Ga-young;Han, Ha-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.170-172
    • /
    • 2017
  • Due to the technological advances in modern society, the distinction between mask and authenticity is becoming very difficult. to solve these problems, this paper describes a high-level improvement of the image processing technique of the code authentication system which discriminates the good and the bad by using the color information and the dot information. Labels were given to each genuine article and the article, which can not be distinguished from each other. In the proposed method, image matching of labels is performed using the opencv library, and genuine and good products are discriminated by using the halftone dots and w dot dots of each label. In this paper, the proposed method stores genuine and good labels on the server and compares them with the user's labels to determine genuine products.

  • PDF

Study on History Tracking Technique of the Document File through RSID Analysis in MS Word (MS 워드의 RSID 분석을 통한 문서파일 이력 추적 기법 연구)

  • Joun, Jihun;Han, Jaehyeok;Jung, Doowon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1439-1448
    • /
    • 2018
  • Many electronic document files, including Microsoft Office Word (MS Word), have become a major issue in various legal disputes such as privacy, contract forgery, and trade secret leakage. The internal metadata of OOXML (Office Open XML) format, which is used since MS Word 2007, stores the unique Revision Identifier (RSID). The RSID is a distinct value assigned to a corresponding word, sentence, or paragraph that has been created/modified/deleted after a document is saved. Also, document history, such as addition/correction/deletion of contents or the order of creation, can be tracked using the RSID. In this paper, we propose a methodology to investigate discrimination between the original document and copy as well as possible document file leakage by utilizing the changes of the RSID according to the user's behavior.

Analysis of changes in artificial intelligence image of elementary school students applying cognitive modeling-based artificial intelligence education program (인지 모델링기반 인공지능 교육 프로그램을 적용한 초등학생의 인공지능 이미지 변화 분석)

  • Kim, Tae-ryeong;Han, Sun-gwan
    • Journal of The Korean Association of Information Education
    • /
    • v.24 no.6
    • /
    • pp.573-584
    • /
    • 2020
  • This study is about the development of AI algorithm education program using cognition modeling to positively improve students' image on AI. First, we analyzed the concept of user-based collaborative filtering and developed the education program using the cognition modeling method. We checked the adequacy of program through the expert validity test. Both CVR values for the content development method of cognitive modeling and the developed program showed validity above .80. We applied the developed program to elementary school students in class. The test was conducted using a semantic discrimination to examine changes in students' perception of artificial intelligence before and after. We were able to confirm that the students' AI images were significant positive change in 12 of the 23 words in the adjective pair.

A Model of Natural Language Information Retrieval Using Main Keywords and Sub-keywords (주 키워드와 부 키워드를 이용한 자연언어 정보 검색 모델)

  • Kang, Hyun-Kyu;Park, Se-Young
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.3052-3062
    • /
    • 1997
  • An Information Retrieval (IR) is to retrieve relevant information that satisfies user's information needs. However a major role of IR systems is not just the generation of sets of relevant documents, but to help determine which documents are most likely to be relevant to the given requirements. Various attempts have been made in the recent past to use syntactic analysis methods for the generation of complex construction that are essential for content identification in various automatic text analysis systems. Unfortunately, it is known that methods based on syntactic understanding alone are not sufficiently powerful to Produce complete analyses of arbitrary text samples. In this paper, we present a document ranking method based on two-level ranking. The first level is used to retrieve the documents, and the second level to reorder the retrieved documents. The main keywords used in the first level can be defined as nouns and/or compound nouns that possess good document discrimination powers. The sub-keywords used in the second level can be also defined as adjectives, adverbs, and/or verbs that are not main keywords, and function words. An empirical study was conducted from a Korean encyclopedia with 23,113 entries and 161 Korean natural language queries collected by end users. 850% of the natural language queries contained sub-keywords. The two-level document ranking methods provides significant improvement in retrieval effectiveness over traditional ranking methods.

  • PDF

A Study on Rational Improvement of the Gift Regulation in the Telecommunications Market (통신시장의 경품규제에 대한 합리적 개선방안 연구)

  • Kim, Yong-Beom;Kwak, Jeong Ho
    • Journal of Internet Computing and Services
    • /
    • v.18 no.6
    • /
    • pp.137-144
    • /
    • 2017
  • A variety of customized marketing strategies are being implemented in the telecommunications market, including the offering of gifts to consumers, as competition in the market is being restructured with the focus on bundled products. However, the Korea Communications Commission (KCC) has recently imposed fines for user discrimination on telecommunication carriers whose marketing strategies have included the award of excessive prizes. In that regard, various issues related to the suitability and appropriate limit of the current gift regulation in the telecommunications market have been raised. Since the Fair Trade Commission, which had a similar scheme to that of the KCC, abolished the regulation on gifts in July 2016, disputes have arisen as to whether the current regulation on gifts is practically effective from the perspective of consumer benefit. In other words, discussions on the rationality of the theoretical and empirical grounds for the regulation on gifts only in the telecommunication market but not in other commodities markets have begun. As such, this study aims to empirically analyze the suitability of the current regulation on gifts in the domestic telecommunications market under the new competitive environment centered on bundled products, and to seek the rational improvement of, and infer the implications for, the regulation on gifts in the telecommunications market based on the results of the analysis.

Performance Comparison of Out-Of-Vocabulary Word Rejection Algorithms in Variable Vocabulary Word Recognition (가변어휘 단어 인식에서의 미등록어 거절 알고리즘 성능 비교)

  • 김기태;문광식;김회린;이영직;정재호
    • The Journal of the Acoustical Society of Korea
    • /
    • v.20 no.2
    • /
    • pp.27-34
    • /
    • 2001
  • Utterance verification is used in variable vocabulary word recognition to reject the word that does not belong to in-vocabulary word or does not belong to correctly recognized word. Utterance verification is an important technology to design a user-friendly speech recognition system. We propose a new utterance verification algorithm for no-training utterance verification system based on the minimum verification error. First, using PBW (Phonetically Balanced Words) DB (445 words), we create no-training anti-phoneme models which include many PLUs(Phoneme Like Units), so anti-phoneme models have the minimum verification error. Then, for OOV (Out-Of-Vocabulary) rejection, the phoneme-based confidence measure which uses the likelihood between phoneme model (null hypothesis) and anti-phoneme model (alternative hypothesis) is normalized by null hypothesis, so the phoneme-based confidence measure tends to be more robust to OOV rejection. And, the word-based confidence measure which uses the phoneme-based confidence measure has been shown to provide improved detection of near-misses in speech recognition as well as better discrimination between in-vocabularys and OOVs. Using our proposed anti-model and confidence measure, we achieve significant performance improvement; CA (Correctly Accept for In-Vocabulary) is about 89%, and CR (Correctly Reject for OOV) is about 90%, improving about 15-21% in ERR (Error Reduction Rate).

  • PDF

Verifying the Classification Accuracy for Korea's Standardized Classification System of Research F&E by using LDA(Linear Discriminant Analysis) (선형판별분석(LDA)기법을 적용한 국가연구시설장비 표준분류체계의 분류 정확도 검증)

  • Joung, Seokin;Sawng, Yeongwha;Jeong, Euhduck
    • Management & Information Systems Review
    • /
    • v.39 no.1
    • /
    • pp.35-57
    • /
    • 2020
  • Recently, research F&E(Facilities and Equipment) have become very important as tools and means to lead the development of science and technology. The government has been continuously expanding investment budgets for R&D and research F&E, and the need for efficient operation and systematic management of research F&E built up nationwide has increased. In December 2010, The government developed and completed a standardized classification system for national research F&E. However, accuracy and trust of information classification are suspected because information is collected by a method in which a user(researcher) directly selects and registers a classification code in NTIS. Therefore, in the study, we analyzed linearly using linear discriminant analysis(LDA) and analysis of variance(ANOVA), to measure the classification accuracy for the standardized classification system(8 major-classes, 54 sub-classes, 410 small-classes) of the national research facilities and equipment established in 2010, and revised in 2015. For the analysis, we collected and used the information data(50,271 cases) cumulatively registered in NTIS(National Science and Technology Service) for the past 10 years. This is the first case of scientifically verifying the standardized classification system of the national research facilities and equipment, which is based on information of similar classification systems and a few expert reviews in the in-outside of the country. As a result of this study, the discriminant accuracy of major-classes organized hierarchically by sub-classes and small-classes was 92.2 %, which was very high. However, in post hoc verification through analysis of variance, the discrimination power of two classes out of eight major-classes was rather low. It is expected that the standardized classification system of the national research facilities and equipment will be improved through this study.

A Study on the Development and usefulness of the x/y Plane and z Axis Resolution Phantom for MDCT Detector (MDCT 검출기의 x/y plane과 z축 분해능 팬텀 개발 및 유용성에 관한 연구)

  • Kim, Yung-Kyoon;Han, Dong-Kyoon
    • Journal of the Korean Society of Radiology
    • /
    • v.16 no.1
    • /
    • pp.67-75
    • /
    • 2022
  • The aim of this study is to establish a new QC method that can simultaneously evaluate the resolution of the x/y plane and the z-axis by producing a phantom that can reflect exposure and reconstruction parameter of MDCT system. It was used with Aquilion ONE(Cannon Medical System, Otawara, Japan), and the examination was scanned using of 120 kV, 260 mA, and the D-FOV of 300 mm2. It produced new SSP phantom modules in which two aluminum plates inclined at 45° to a vertical axis and a transverse axis to evaluate high contrast resolution of x/y plane and z axis. And it changed factors such as the algorithm, distance from gantry iso-center. All images were reconstructed in five steps from 0.6 mm to 10.0 mm slice thickness to measure resolution of x/y plane and z-axis. The image data measured FWHM and FWTM using Profile tool of Aquarius iNtusion Edition ver. 4.4.13 P6 software(Terarecon, California, USA), and analysed SPQI and signal intensity by ImageJ program(v1.53n, National Institutes of Health, USA). It decreased by 4.09~11.99%, 4.12~35.52%, and 4.70~37.64% in slice thickness of 2.5 mm, 5.0 mm, and 10.0 mm for evaluating the high contrast resolution of x/y plane according to distance from gantry iso-center. Therefore, the high contrast resolution of the x/y plane decreased when the distance from the iso-center increased or the slice thickness increased. Additionally, the slice thicknesses of 2.5 mm, 5.0 mm, and 10.0 mm with a high algorithm increased 74.83, 15.18 and 81.25%. The FWHM was almost constant on the measured SSP graph for evaluating the accuracy of slice thickness which represents the resolution of x/y plane and z-axis, but it was measured to be higher than the nominal slice thickness set by user. The FWHM and FWTM of z-axis with axial scan mode tended to increase significantly as the distance increased from gantry iso-center than the helical mode. Particularly, the thinner slice thickness that increased error range compare with the nominal slice thickness. The SPQI increased with thick slice thickness, and that was closer to 90% in the helical scan than the axial scan. In conclusion, by producing a phantom suitable for MDCT detectors and capable of quantitative resolution evaluation, it can be used as a specific method in the management of research quality and management of outdated equipment. Thus, it is expected to contribute greatly to the discrimination of lesions in the field of CT imaging.