RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • SCOPUS

        Identifying Unusual Days

        Kim, Min-Kyong,Kotz, David Korean Institute of Information Scientists and Eng 2011 Journal of Computing Science and Engineering Vol.5 No.1

        Pervasive applications such as digital memories or patient monitors collect a vast amount of data. One key challenge in these systems is how to extract interesting or unusual information. Because users cannot anticipate their future interests in the data when the data is stored, it is hard to provide appropriate indexes. As location-tracking technologies, such as global positioning system, have become ubiquitous, digital cameras or other pervasive systems record location information along with the data. In this paper, we present an automatic approach to identify unusual data using location information. Given the location information, our system identifies unusual days, that is, days with unusual mobility patterns. We evaluated our detection system using a real wireless trace, collected at wireless access points, and demonstrated its capabilities. Using our system, we were able to identify days when mobility patterns changed and differentiate days when a user followed a regular pattern from the rest. We also discovered general mobility characteristics. For example, most users had one or more repeating mobility patterns, and repeating mobility patterns did not depend on certain days of the week, except that weekends were different from weekdays.

      • SCOPUS

        Designing Technology for Visualisation of Interactions on Mobile Devices

        Deray, Kristine,Simoff, Simeon Korean Institute of Information Scientists and Eng 2009 Journal of Computing Science and Engineering Vol.3 No.4

        Interactions are intrinsic part of what we do. We interact when we work, when we learn, when we visit a doctor, and when we play. With the advent of information and communications technology we can collect rich data (video, audio, and various transcripts including text chat) about such interactions. This opens an opportunity to monitor the dynamics of interactions and to get deeper insights of how they unfold and deliver this information to the interacting parties. This paper presents the design of a technology for visualising information about the dynamics of unfolding of interactions and presenting it in an ambient display on mobile devices. The purpose of this technology is the delivery of such information to the point of decision making.

      • KCI우수등재

        Improvement in Network Intrusion Detection based on LSTM and Feature Embedding

        Hyeokmin Gwon(권혁민),Chungjun Lee(이청준),Rakun Keum(금락운),Heeyoul Choi(최희열) Korean Institute of Information Scientists and Eng 2021 정보과학회논문지 Vol.48 No.4

        Network Intrusion Detection System (NIDS) is an essential tool for network perimeter security. NIDS inspects network traffic packets to detect network intrusions. Most of the existing works have used machine learning techniques for building the system. While the reported works demonstrated the effectiveness of various artificial intelligence algorithms, only a few of them have utilized the time-series information of network traffic data. Also, categorical information of network traffic data has not been included in neural network-based approaches. In this paper, we propose network intrusion detection models based on sequential information using the long short-term memory (LSTM) network and categorical information using the embedding technique. We have conducted experiments using models with UNSW-NB15, which is a comprehensive network traffic dataset. The experiment results confirm that the proposed method improves the performance, with a binary classification accuracy rate of 99.72%.

      • SCOPUS

        Protecting the iTrust Information Retrieval Network against Malicious Attacks

        Chuang, Yung-Ting,Melliar-Smith, P. Michael,Moser, Louise E.,Lombera, Isai Michel Korean Institute of Information Scientists and Eng 2012 Journal of Computing Science and Engineering Vol.6 No.3

        This paper presents novel statistical algorithms for protecting the iTrust information retrieval network against malicious attacks. In iTrust, metadata describing documents, and requests containing keywords, are randomly distributed to multiple participating nodes. The nodes that receive the requests try to match the keywords in the requests with the metadata they hold. If a node finds a match, the matching node returns the URL of the associated information to the requesting node. The requesting node then uses the URL to retrieve the information from the source node. The novel detection algorithm determines empirically the probabilities of the specific number of matches based on the number of responses that the requesting node receives. It also calculates the analytical probabilities of the specific numbers of matches. It compares the observed and the analytical probabilities to estimate the proportion of subverted or non-operational nodes in the iTrust network using a window-based method and the chi-squared statistic. If the detection algorithm determines that some of the nodes in the iTrust network are subverted or non-operational, then the novel defensive adaptation algorithm increases the number of nodes to which the requests are distributed to maintain the same probability of a match when some of the nodes are subverted or non-operational as compared to when all of the nodes are operational. Experimental results substantiate the effectiveness of the detection and defensive adaptation algorithms for protecting the iTrust information retrieval network against malicious attacks.

      • KCI우수등재

        Automatic Product Review Helpfulness Estimation based on Review Information Types

        Munhyong Kim(김문형),Hyopil Shin(신효필) Korean Institute of Information Scientists and Eng 2016 정보과학회논문지 Vol.43 No.9

        Many available online product reviews for any given product makes it difficult for a consumer to locate the helpful reviews. The purpose of this study was to investigate automatic helpfulness evaluation of online product reviews according to review information types based on the target of information. The underlying assumption was that consumers find reviews containing specific information related to the product itself or the reliability of reviewers more helpful than peripheral information, such as shipping or customer service. Therefore, each sentence was categorized by given information types, which reduced the semantic space of review sentences. Subsequently, we extracted specific information from sentences by using a topic-based representation of the sentences and a clustering algorithm. Review ranking experiments indicated more effective results than other comparable approaches.

      • KCI우수등재

        Application of Improved Variational Recurrent Auto-Encoder for Korean Sentence Generation

        Sangchul Hahn(한상철),Seokjin Hong(홍석진),Heeyoul Choi(최희열) Korean Institute of Information Scientists and Eng 2018 정보과학회논문지 Vol.45 No.2

        Due to the revolutionary advances in deep learning, performance of pattern recognition has increased significantly in many applications like speech recognition and image recognition, and some systems outperform human-level intelligence in specific domains. Unlike pattern recognition, in this paper, we focus on generating Korean sentences based on a few Korean sentences. We apply variational recurrent auto-encoder (VRAE) and modify the model considering some characteristics of Korean sentences. To reduce the number of words in the model, we apply a word spacing model. Also, there are many Korean sentences which have the same meaning but different word order, even without subjects or objects; therefore we change the unidirectional encoder of VRAE into a bidirectional encoder. In addition, we apply an interpolation method on the encoded vectors from the given sentences, so that we can generate new sentences which are similar to the given sentences. In experiments, we confirm that our proposed method generates better sentences which are semantically more similar to the given sentences.

      • SCOPUS

        Design and Development of a Multimodal Biomedical Information Retrieval System

        Demner-Fushman, Dina,Antani, Sameer,Simpson, Matthew,Thoma, George R. Korean Institute of Information Scientists and Eng 2012 Journal of Computing Science and Engineering Vol.6 No.2

        The search for relevant and actionable information is a key to achieving clinical and research goals in biomedicine. Biomedical information exists in different forms: as text and illustrations in journal articles and other documents, in images stored in databases, and as patients' cases in electronic health records. This paper presents ways to move beyond conventional text-based searching of these resources, by combining text and visual features in search queries and document representation. A combination of techniques and tools from the fields of natural language processing, information retrieval, and content-based image retrieval allows the development of building blocks for advanced information services. Such services enable searching by textual as well as visual queries, and retrieving documents enriched by relevant images, charts, and other illustrations from the journal literature, patient records and image databases.

      • SCOPUS

        A Clustered Dwarf Structure to Speed up Queries on Data Cubes

        Bao, Yubin,Leng, Fangling,Wang, Daling,Yu, Ge Korean Institute of Information Scientists and Eng 2007 Journal of Computing Science and Engineering Vol.1 No.2

        Dwarf is a highly compressed structure, which compresses the cube by eliminating the semantic redundancies while computing a data cube. Although it has high compression ratio, Dwarf is slower in querying and more difficult in updating due to its structure characteristics. We all know that the original intention of data cube is to speed up the query performance, so we propose two novel clustering methods for query optimization: the recursion clustering method which clusters the nodes in a recursive manner to speed up point queries and the hierarchical clustering method which clusters the nodes of the same dimension to speed up range queries. To facilitate the implementation, we design a partition strategy and a logical clustering mechanism. Experimental results show our methods can effectively improve the query performance on data cubes, and the recursion clustering method is suitable for both point queries and range queries.

      • SCOPUS

        Ensuring Sound Numerical Simulation of Hybrid Automata

        Hur, Yerang,Sim, Jae-Hwan,Kim, Je-Sung,Chai, Jin-Young Korean Institute of Information Scientists and Eng 2009 Journal of Computing Science and Engineering Vol.3 No.2

        A hybrid system is a dynamical system in which states can be changed continuously and discretely. Simulation based on numerical methods is the widely used technique for analyzing complicated hybrid systems. Numerical simulation of hybrid systems, however, is subject to two types of numerical errors: truncation error and round-off error. The effect of such errors can make an impossible transition step to become possible during simulation, and thus, to generate a simulation behavior that is not allowed by the model. The possibility of an incorrect simulation behavior reduces con.dence in simulation-based analysis since it is impossible to know whether a particular simulation trace is allowed by the model or not. To address this problem, we define the notion of Instrumented Hybrid Automata (IHA), which considers the effect of accumulated numerical errors on discrete transition steps. We then show how to convert Hybrid Automata (HA) to IRA and prove that every simulation behavior of IHA preserves the discrete transition steps of some behavior in HA; that is, simulation of IHA is sound with respect to HA.

      • SCOPUS

        An FCA-based Solution for Ontology Mediation

        Cure, Olivier,Jeansoulin, Robert Korean Institute of Information Scientists and Eng 2009 Journal of Computing Science and Engineering Vol.3 No.2

        In this paper, we present an ontology mediation solution based on the methods frequently used in Formal Concept Analysis. Our approach of mediation is based on the existence of instances associated to two source ontologies, then we can generate concepts in a new ontology if and only if they share the same extent. Hence our approach creates a merged ontology which captures the knowledge of these two source ontologies. The main contributions of this work are (i) to enable the creation of concepts not originally in the source ontologies, (ii) to propose a solution to label these emerging concepts and finally (iii) to optimize the resulting ontology by eliminating redundant or non pertinent concepts. Another contribution of this work is to emphasize that several forms of mediated ontology can be defined based on the relaxation of certain criteria produced from our method. The solution that we propose for tackling these issues is an automatic solution, meaning that it does not require the intervention of the end-user, excepting for the definition of the common set of ontology instances.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼