• Title/Summary/Keyword: 계획 개념

Search Result 1,496, Processing Time 0.03 seconds

Building a Korean Sentiment Lexicon Using Collective Intelligence (집단지성을 이용한 한글 감성어 사전 구축)

  • An, Jungkook;Kim, Hee-Woong
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.2
    • /
    • pp.49-67
    • /
    • 2015
  • Recently, emerging the notion of big data and social media has led us to enter data's big bang. Social networking services are widely used by people around the world, and they have become a part of major communication tools for all ages. Over the last decade, as online social networking sites become increasingly popular, companies tend to focus on advanced social media analysis for their marketing strategies. In addition to social media analysis, companies are mainly concerned about propagating of negative opinions on social networking sites such as Facebook and Twitter, as well as e-commerce sites. The effect of online word of mouth (WOM) such as product rating, product review, and product recommendations is very influential, and negative opinions have significant impact on product sales. This trend has increased researchers' attention to a natural language processing, such as a sentiment analysis. A sentiment analysis, also refers to as an opinion mining, is a process of identifying the polarity of subjective information and has been applied to various research and practical fields. However, there are obstacles lies when Korean language (Hangul) is used in a natural language processing because it is an agglutinative language with rich morphology pose problems. Therefore, there is a lack of Korean natural language processing resources such as a sentiment lexicon, and this has resulted in significant limitations for researchers and practitioners who are considering sentiment analysis. Our study builds a Korean sentiment lexicon with collective intelligence, and provides API (Application Programming Interface) service to open and share a sentiment lexicon data with the public (www.openhangul.com). For the pre-processing, we have created a Korean lexicon database with over 517,178 words and classified them into sentiment and non-sentiment words. In order to classify them, we first identified stop words which often quite likely to play a negative role in sentiment analysis and excluded them from our sentiment scoring. In general, sentiment words are nouns, adjectives, verbs, adverbs as they have sentimental expressions such as positive, neutral, and negative. On the other hands, non-sentiment words are interjection, determiner, numeral, postposition, etc. as they generally have no sentimental expressions. To build a reliable sentiment lexicon, we have adopted a concept of collective intelligence as a model for crowdsourcing. In addition, a concept of folksonomy has been implemented in the process of taxonomy to help collective intelligence. In order to make up for an inherent weakness of folksonomy, we have adopted a majority rule by building a voting system. Participants, as voters were offered three voting options to choose from positivity, negativity, and neutrality, and the voting have been conducted on one of the largest social networking sites for college students in Korea. More than 35,000 votes have been made by college students in Korea, and we keep this voting system open by maintaining the project as a perpetual study. Besides, any change in the sentiment score of words can be an important observation because it enables us to keep track of temporal changes in Korean language as a natural language. Lastly, our study offers a RESTful, JSON based API service through a web platform to make easier support for users such as researchers, companies, and developers. Finally, our study makes important contributions to both research and practice. In terms of research, our Korean sentiment lexicon plays an important role as a resource for Korean natural language processing. In terms of practice, practitioners such as managers and marketers can implement sentiment analysis effectively by using Korean sentiment lexicon we built. Moreover, our study sheds new light on the value of folksonomy by combining collective intelligence, and we also expect to give a new direction and a new start to the development of Korean natural language processing.

An Exploratory Study on Determinants Affecting R Programming Acceptance (R 프로그래밍 수용 결정 요인에 대한 탐색 연구)

  • Rubianogroot, Jennifer;Namn, Su Hyeon
    • Management & Information Systems Review
    • /
    • v.37 no.1
    • /
    • pp.139-154
    • /
    • 2018
  • R programming is free and open source system associated with a rich and ever-growing set of libraries of functions developed and submitted by independent end-users. It is recognized as a popular tool for handling big data sets and analyzing them. Reflecting these characteristics, R has been gaining popularity from data analysts. However, the antecedents of R technology acceptance has not been studied yet. In this study we identify and investigates cognitive factors contributing to build user acceptance toward R in education environment. We extend the existing technology acceptance model by incorporating social norms and software capability. It was found that the factors of subjective norm, perceived usefulness, ease of use affect positively on the intention of acceptance R programming. In addition, perceived usefulness is related to subjective norms, perceived ease of use, and software capability. The main difference of this research from the previous ones is that the target system is not a stand-alone. In addition, the system is not static in the sense that the system is not a final version. Instead, R system is evolving and open source system. We applied the Technology Acceptance Model (TAM) to the target system which is a platform where diverse applications such as statistical, big data analyses, and visual rendering can be performed. The model presented in this work can be useful for both colleges that plan to invest in new statistical software and for companies that need to pursue future installations of new technologies. In addition, we identified a modified version of the TAM model which is extended by the constructs such as subjective norm and software capability to the original TAM model. However one of the weak aspects that might inhibit the reliability and validity of the model is that small number of sample size.

Correlations between the Stream Morphological Characteristics and the Hydraulic Geometry Characteristics for the Basin (유역(流域)의 하천형태학적(河川形態學的) 특성(特性)과 수리기하학적(水理幾何學的) 특성(特性)과의 상관성(相關性))

  • Ahn, Sang Jin;Yoon, Yong Nam;Kang, Kwan Won
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.2 no.1
    • /
    • pp.1-17
    • /
    • 1982
  • The stream morphological characteristics of a river basin has a close correlation with the hydrological and hydraulic characteristics of the basin. In this study the correlations of flow duration and Hydraulic geometry with the stream morphological characteristics as well as the correlation between flow duration and hydraulic geometry were analyzed bases on the data for the Geum River basin. The purpose of this study was to provide the necessary informations for water utilization projects at ungauged locations along the river course. First of all, the stream morphological characteristics was analyzed based on the Horton's three laws on the morphology of a stream that is, the law of stream number, the law of average stream length and the law of average stream slope. As is the case for majority of the rivers it was found that the Geum River basin was well developed according to the Horton's laws. High correlations were also found between the basin characteristics and the channel characteristics. The flow duration curves obtained with the daily stream flow data of 10~90% frequency of occurences at the five stage gauging stations in the Geum River could, in general, be expressed as an exponential functional relationship. The concept of proportional stream ordering system was employed to describe continuously the longitudinal variation of the stream morphological characteristics, and the mathematical model was formulated for the discharge-frequency-proportional stream order relationship. With the morphological characteristics as a common parameter the relationships with flow duration, drainage area were established in mathematical expressions, respectively.

  • PDF

A study on an evaluation model for industrial information systems by industry sectors (업종별 특성을 고려한 기업정보화 성숙모형)

  • 진경수;임춘성;박찬권
    • Proceedings of the CALSEC Conference
    • /
    • 2002.01a
    • /
    • pp.86-106
    • /
    • 2002
  • Informatization is a process that corporation's external environmental factors and internal environmental factors influence as complex. is a phenomenon that appears via this process. To evaluate that informatization was propeled well or informatization level is high can be dangerous work extremely by only once-over-lightly some factors, organization information ability is superior or infrastructure is constructed well. Therefore, an evaluation for industrial information systems that consider corporation's external environment and internal environment configurationally and objective estimation through this is required in national dimension. This research sorted types of business using types of business classification of 2001 EIII(Evaluation Indices of Industrial Informatization) laying stress on corporation's product and product production process for reflecting various industrial classification. And we are dividing whole our country corporations by manufacture industry, the construction industry, distribution industry, service industry, banking industry 5 types of business. To see such classed types industry classification from consistent viewpoint, we saw them within new framework, purchase, operation, physical distribution, marketing and sale. service etc. laying stress on primary businesses except support businesses of planning, financial management etc. To draw special quality of business center from primary business of each types of business, we draw industry classification Key Capability that centers when plans corporation's corporate strategy and information strategy. And we deducted industrial classification key production business connected with industry classification Key Capability. After drawing an evaluation items for industrial information systems in informatization analysis viewpoint laying stress on drawn businesses. Finally we did Case Study by making out an evaluation for industrial information systems questionnaire that considers special quality of manufacturing industry. Through EIII that consider the industrial classification, we could know that it explains the corporation's purchase, production, distribution in general and detail.

  • PDF

Analysis on the Use Characteristics of Citizen based on Urban Green Spaces Type - Focuses on Suwon-City - (도시녹지 유형에 따른 도시민의 이용 특성 연구 - 수원시를 대상으로 -)

  • Kim, Yea Sung;Kim, Hyun;Ko, Jinsoo
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.42 no.5
    • /
    • pp.31-40
    • /
    • 2014
  • The importance of green spaces in the city is growing each day. Local governments are taking charge of park development works that are having difficulty in developing and managing urban parks due to high land value as well as a shortage in finances. This is even though an urban park is defined as an urban planning facility and the law provides park area per person. Civil residents, meanwhile, are using not only urban parks provided by law but also other green areas such as rivers, reservoirs, and school playgrounds because they recognize urban green areas by the concept of use. In this study, accordingly, urban green areas were sorted into two types, urban parks, parks provided by law, and other green areas, and the difference in use pattern and use satisfaction by type was analyzed. As a result of analysis, there was no remarkable difference between the two types. According to such results, it was found that it is necessary to include other green areas, such as rivers, reservoirs, school green areas, and apartment green areas in addition to the current park green areas provided by law when park area per person is calculated, and such calculation of urban green areas reflecting local characteristics can reduce local governments' financial burden and improve the effectiveness of future urban park policies. It is judged that such results can become a plan against the cancellation of unexecuted urban facilities. The fact that accessibility factors, such as road satisfaction, access convenience, and convenient movement, are affecting satisfaction with the use of urban parks suggests that it is important to improve urban park accessibilities rather than to quantitatively expand park area in order to improve satisfaction with urban parks. Considering that people travel to urban green areas mostly by walking, it is necessary for access convenience to conduct follow-up studies such as barrier-free and securing walking stability through analysis of routes to urban green areas.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Analysis on Efficiency of Hierarchical Structure for a Grid Transit Network (격자형 대중교통 노선망의 위계구조 효율성 분석)

  • Park, Jun-Sik;Go, Seung-Yeong;Jeon, Gyeong-Su
    • Journal of Korean Society of Transportation
    • /
    • v.25 no.4
    • /
    • pp.123-133
    • /
    • 2007
  • This study analyzed whether a transit network with hierarchy is efficient or not, and if transit network hierarchy has cost efficiency, then which condition guarantees the efficiency of the transit network hierarchy. The authors modeled the total cost of the transit network and suggested the conditions in which the transit network hierarchy has cost efficiency through comparing the cost of the transit network with and without hierarchy. The efficiency of transit network hierarchy is guaranteed when the travel cost savings induced by using a higher hierarchy transit network is larger than the increasing non-travel cost, which is the sum of access cost, waiting cost, and operating cost, induced by the introduction of a higher hierarchy transit network. This result is consistent with common sense and with the concept of cost and benefit analysis. If a passenger traveling within the area divided by a higher hierarchy transit network uses only a lower hierarchy transit network and the passenger traveling out of the area divided by the higher hierarchy transit network uses both lower and higher hierarchy transit networks, the travel demand using the higher hierarchy transit network is inversely proportional to the square of the line spacing. This means that the transit network becomes more efficient and small increases of travel demand guarantee the efficiency of the transit network hierarchy as the connectivity of the network becomes higher. This result shows that transit networks have economies of aggregation. This study is the first analytical research on transit network hierarchy and is expected to be a basis for numerical research. However, numerical research should complement this study, since analytical research has some limitations for considering a real network.

Study of Geological Log Database for Public Wells, Jeju Island (제주도 공공 관정 지질주상도 DB 구축 소개)

  • Pak, Song-Hyon;Koh, Giwon;Park, Junbeom;Moon, Dukchul;Yoon, Woo Seok
    • Economic and Environmental Geology
    • /
    • v.48 no.6
    • /
    • pp.509-523
    • /
    • 2015
  • This study introduces newly implemented geological well logs database for Jeju public water wells, built for a research project focusing on integrated hydrogeology database of Jeju Island. A detailed analysis of the existing 1,200 Jeju Island geological logs for the public wells developed since 1970 revealed six major indications to be improved for their use in Jeju geological logs DB construction: (1) lack of uniformity in rock name classification, (2) poor definitions of pyroclastic deposits and sand and gravel layers, (3) lack of well borehole aquifer information, (4) lack of information on well screen installation in many water wells, (5) differences by person in geological logging descriptions. A new Jeju geological logs DB enabling standardized input and output formats has been implemented to overcome the above indications by reestablishing the names of Jeju volcanic and sedimentary rocks and utilizing a commercial, database-based input structured, geological log program. The newly designed database structure in geological log program enables users to store a large number of geology, well drilling, and test data at the standardized DB input structure. Also, well borehole groundwater and aquifer test data can be easily added without modifying the existing database structure. Thus, the newly implemented geological logs DB could be a standardized DB for a large number of Jeju existing public wells and new wells to be developed in the future at Jeju Island. Also, the new geological logs DB will be a basis for ongoing project 'Developing GIS-based integrated interpretation system for Jeju Island hydrogeology'.

A personalized TV service under Open network environment (개방형 환경에서의 개인 맞춤형 TV 서비스)

  • Lye, Ji-Hye;Pyo, Sin-Ji;Im, Jeong-Yeon;Kim, Mun-Churl;Lim, Sun-Hwan;Kim, Sang-Ki
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2006.11a
    • /
    • pp.279-282
    • /
    • 2006
  • IP망을 이용한 IPTV 방송 서비스가 새로운 수익 모델로 인정받고 현재 국내의 KT, SKT 등이 IPTV 시범서비스를 준비하거나 진행 중에 있다 이 IPTV 서비스는 이전의 단방향 방송과는 달리 사용자와의 인터렉션을 중시하는 양방향 방송을 표방하기 때문에 지금까지의 방송과는 다른 혁신적인 방송서비스가 기대된다. 하지만 IPTV 서비스에 있어서 여러 통신사와 방송사가 참여할 수 있을 것으로 보여지는 것과는 달리 실상은 몇몇 거대 통신기업이 자신들의 망을 이용하는 가입자들을 상대로 한정된 사업을 벌이고 있다. 이는 IPTV 서비스를 위한 인프라가 구축되어 있지 않고 방통융합망의 개념을 만족시키기 위해 서비스 개발자가 알아야 할 프로토콜들이 너무나 많기 때문이다. 따라서 본 논문에서는 이러한 상황을 타개할 수 있는 수단을 Open API로 제안한다. 맞춤형 방송을 위한 시나리오를 TV-Anytime의 벤치마킹과 유저 시나리오를 참고하여 재구성하고 이 시나리오로부터 IPTV 방송 서비스를 위한 방통융합망의 기본적이고 강력한 기능들을 Open API 함수로 정의하였다. 여기에서의 방송 서비스는 NDR, EPG, 개인 맞춤형 광고 서비스를 말하며 각 서비스를 위한 서버는 통합망 위에 존재하고 이 서버들이 개방하는 API들은 다른 응용프로그램에 의해 사용되는 것이기 때문에 가장 기본적인 기능을 정의하게 된다. 또한, 제안한 Open API 함수를 이용하여 개인 맞춤형 방송 응용 서비스를 구현함으로써 서비스 검증을 하였다. Open API는 웹서비스를 통해 공개된 기능들로써 게이트웨이를 통해 다른 망에서 사용할 수 있게 된다. Open API 함수의 정의는 함수 이름, 기능, 입 출력 파라메터로 이루어져 있다. 사용자 맞춤 서비스를 위해 전달되는 사용자 상세 정보와 콘텐츠 상세 정보는 TV-Anytime 포럼에서 정의한 메타데이터 스키마를 이용하여 정의하였다.가능하게 한다. 제안된 방법은 프레임 간 모드 결정을 고속화함으로써 스케일러블 비디오 부호화기의 연산량과 복잡도를 최대 57%감소시킨다. 그러나 연산량 감소에 따른 비트율의 증가나 화질의 열화는 최대 1.74% 비트율 증가 및 0.08dB PSNR 감소로 무시할 정도로 작다., 반드시 이에 대한 검증이 필요함을 알 수 있었다. 현지관측에 비해 막대한 비용과 시간을 절약할 수 있는 위성영상해석방법을 이용한 방법은 해양수질파악이 가능할 것으로 판단되며, GIS를 이용하여 다양하고 복잡한 자료를 데이터베이스화함으로써 가시화하고, 이를 기초로 공간분석을 실시함으로써 환경요소별 공간분포에 대한 파악을 통해 수치모형실험을 이용한 각종 환경영향의 평가 및 예측을 위한 기초자료로 이용이 가능할 것으로 사료된다.염총량관리 기본계획 시 구축된 모형 매개변수를 바탕으로 분석을 수행하였다. 일차오차분석을 이용하여 수리매개변수와 수질매개변수의 수질항목별 상대적 기여도를 파악해 본 결과, 수리매개변수는 DO, BOD, 유기질소, 유기인 모든 항목에 일정 정도의 상대적 기여도를 가지고 있는 것을 알 수 있었다. 이로부터 수질 모형의 적용 시 수리 매개변수 또한 수질 매개변수의 추정 시와 같이 보다 세심한 주의를 기울여 추정할 필요가 있을 것으로 판단된다.변화와 기흉 발생과의 인과관계를 확인하고 좀 더 구체화하기 위한 연구가 필요할 것이다.게 이루어질 수 있을 것으로 기대된다.는 초과수익률이 상승하지만, 이후로는 감소하므로, 반전거래전략을 활용하는 경우 주식투자기간은 24개월이하의 중단기가 적합함을 발견하였다. 이상의 행태적 측면과 투자성과측면의 실증결과를 통하여 한국주식시장에 있어서 시장수익률을 평균적으로 초과할 수 있는 거래전략은 존재하므로 이러한 전략을 개발 및 활용할 수 있으며, 특히, 한국주식시장에 적합한 거래전략은 반전거래전략이고, 이 전략의 유용성은 투자자가 설정한 투자기간보다

  • PDF

Planting Method of Buffer Green Space in the Reclaimed Seaside Areas, Rokko Island, Kobe, Japan (일본 고베시(신호시(神戶市)) 로코(육갑(六甲))아일랜드 임해매립지의 완충녹지 식재기법 연구)

  • Han, Bong-Ho;Kim, Jong-Yup;Choi, Jin-Woo;Cho, Yong-Hyeon
    • Korean Journal of Environment and Ecology
    • /
    • v.24 no.2
    • /
    • pp.157-165
    • /
    • 2010
  • This study was carried out to suggest the basic data of planting method for construction of buffer green space based on the land use in case of reclaimed land by analyzing land structure, planting concept, and planting structure in buffer green space, Rokko Island, Kobe, Japan. Rokko Island(total area: 580ha) is divided into port and logistics industry area and urban area by constructing the box type large-scale buffer green space. The land structure of buffer green space were biased mounding type, parallel mounding type, and complex mounding type. The width of buffer green space was 50meters in case of northern area, from 28 to 32meters in case of eastern area, and 37.5meters in case of western area, and the slope of that was from 18 to 25 degrees and the height of that was from 2 to 15meters. There were applied landscape and buffer planting concept on the sea side area of northern buffer green space, on the other hand landscape and shade planting concept on the Inner city side area of that. According to the result of planting structure analysis of northern buffer green space, the main woody species were those of deciduous-evergreen species grow in warm-temperate forest zone such as Quercus glauca, Cinnamomum camphora, Machilus thunbergii, Elaeagnus maritima. The results of maximum number of species and planting density by $100mm^2$ was that 9 species 22 individuals in canopy layer, 9 species 15 individuals in understory layer, 3 species 67 individuals in shrub layer, and 14 species 104 individuals in total. The plant coverage of northern buffer green space based on the ecological planting method was from 69 to 139% in case of canopy layer, from 26 to 38% in case of understory layer, from 6 to 7% in case of shrub layer, and from 101 to 184% in total. Index of plant crown volume of northern buffer green space based on the ecological planting method was from 1.40 to $3.12m^3/m^2$ in case of canopy layer, from 0.43 to $0.55m^3/m^2$ in case of understory layer, $0.06m^3/m^2$ in case of shrub layer, and from 1.89 to $3.73m^3/m^2$ in total.