• Title/Summary/Keyword: 키워드-기반 시스템

Search Result 517, Processing Time 0.028 seconds

A New Scheme Exploiting the Related Keyword and Big Data Analysis for Predicting Promise Technology in the Field of Satellite·Terrestrial Information Convergence Disaster Response (위성·지상정보 융합 재난 대응 기술 분야 유망기술 도출을 위한 연관 키워드 및 빅데이터 분석 기법)

  • Lee, Hangwon;Kim, Youngok
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.2
    • /
    • pp.418-431
    • /
    • 2022
  • Purpose: We propose a new scheme for predicting promise technology and it improves the conventional scheme that misses important lists of patent because of insufficient search formula, and cannot reflect new trend of technology due to the unreleased period of patents. Method: In this paper, we propose a new search formula exploiting TF and TF-IDF with R programming as well as related keywords, and LDA topic modeling scheme is used for analyzing recently published papers in Satellite·Terrestrial Information Convergence Disaster Response. Result: By comparing both schemes with commercial DB, the proposed scheme can find more important patents, and can reflect new trend of technology, compared to the conventional scheme. Conclusion: The proposed scheme can be used to predict promise technologies in the field of Satellite·Terrestrial Information Convergence Disaster Response.

Spatial Impact Assessment of Heat Wave on River Water Quality using Big Data (빅데이터를 이용한 폭염과 하천수질의 공간적 영향 평가)

  • Lee, Jiwan;Lim, Hyeokjin;Shin, Hyungjin;Kim, Seongjoon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.87-87
    • /
    • 2021
  • 이상기후 현상으로 기후변화가 사회와 경제에 미치는 영향이 뚜렷한 추세로 변화되고 있다. 현재 기후변화에 관련된 연구는 사회 시스템에서 위험관리를 위해 기온과 강수량에 따라 다양한 분야에 미치는 영향에 대한 연구를 중점으로 이뤄지고 있다. 본 연구는 여름철 폭염에 의한 기후변화가 하천수질에 미치는 영향을 평가하기 위한 것으로, 우리나라 기상청 91개의 기상관측소에서 일일온도 33℃ 이상의 이벤트를 대상으로 환경부 수질관측망 918개에 대한 14개의 하천수질인자인 DO, BOD, COD, TOC, DOC, TN, DTN, NH4-N, NO2-N, NO3-N, TP, DTP, PO4-P, Chl-a를 분석하였다. 이를 우리나라 117개 중권역별 하천수질과 폭염강도와 지속시간을 나타내는 폭염 지수를 산정하여 분석하였다. 폭염 관련 뉴스 데이터는 2013년부터 2019년까지 Python 기반 뉴스 크롤러를 이용해 폭염 취약지수(Heat Wave Vulnerability Index, HWVI)를 기준으로 분류하여 키워드를 수집하였으며 HWVI 중 '기후노출' 키워드와 관련된 기사는 총 22,514건으로 69.9%로 수집되었다. 공간적 영향 평가를 위해 Getis-Ord Gi*를 이용하여 폭염지수와 하천수질인자간 핫스팟 분석을 실시하고 폭염관련 빅데이터가 하천수질에 미치는 영향을 평가하였다. 폭염지수는 낙동강유역 하류에 대해 Chl-a, TN, TP 항목에서 높은 밀도를 보였다. 분석대상지역 내 폭염이 발생한 확률과 반경 밖에서 발생할 확률의 우도비를 분석하기 위해 SaTScan을 이용한 공간검색통계분석을 실시하였다. 분석결과 폭염지수와 DO의 공간상관성이 높은 것으로 나타났다.

  • PDF

Design Plan of Secure IoT System based Common Criteria (CC 기반의 안전한 IoT 시스템 설계 방안)

  • Kim, Ju-Hun;Jung, Hyun-Mi;Cho, Han-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.10
    • /
    • pp.61-66
    • /
    • 2017
  • Recently, IoT technology is rapidly developing with the keyword "Anytime, Anywhere, Convenient". In addition, security problems in IoT systems are exploding and the damage is increasing as well. In this paper, we propose a method to develop IoT system safely by using internationally recognized CC evaluation in ICT by identifying the standardization and security technology development status defining IoT system security requirements. For this purpose, IoT system and service security aspects are analyzed. Based on this, it is possible to design the security functional requirements and to demonstrate the rationale of the security objective through the correspondence relation, and it is possible to design the protection profile for the IoT system. This is a sufficient basis for the development methodology to be presented in this paper because it is used as a means of referring to the set of security requirements of administrators, developers, and users.

Protection System Against The Infringement of Information Signals in Fiber Communication System (광섬유 통신 시스템의 정보 신호 침해에 대한 보호 시스템)

  • Ugli, Sobirov Asilzoda Alisher;Umaralievich, Nishonov Ilhomjon;Kim, Daeik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.2
    • /
    • pp.219-228
    • /
    • 2022
  • One of the most pressing and demanding issues today in the conditions of widespread transformation and digitalization of spheres of human activity is information security and ensuring the integrity of data. The main research and development in the field of information security is aimed at improving efficiency and rationalization. One of the main means of data transmission and operation of information complexes are fiber-optic systems. To date, there have been incidents of illegal intrusion and theft of information, passing through this type of communication. Thus, today there is a problem associated with insufficient information security in fiber-optic data transmission systems. One of the most effective tools to counter acts of illegal interference in systems are artificial intelligence and cryptographic algorithms of information protection. It is the symbiosis of these two tools that can qualitatively improve the level of information security in fiber-optic data transmission systems. Thus, the authors of this article pursue the goal associated with the description of an innovative system for protecting information from violations in fiber-optic data transmission systems based on the integration of intelligent cryptographic algorithms.

Design and Implementation of Web-Based Self-directed Learning System for Word Processor Qualifying Exams (워드프로세서 자격증 시험을 위한 웹 기반 자기 주도적 학습 시스템 설계 및 구현)

  • Yang, Yun-Jeong;Kim, Chang-Suk
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.1
    • /
    • pp.43-48
    • /
    • 2006
  • The educational system has been changed owing to Web, which is most actively used on internet and has the characteristics of providing suitable environments for implementing constructivism study theory. WBI(Web Based Instruction), web-mediated teaching form for students at a long distance, has the advantages of possible interact between instructors and learners, offering a great variety of learning materials, and overcome the spatiotemporal restriction. This paper focuces on the construction of learning surroundings where the learner-centered, active learning can be done by design and Implementation of web based instruct system providing a sham examination with an item pool system. The web based Self-directed Learning system for word processor qualifying exams on this paper, can be mentioned as a real item pool that the question is not setting each time by the instructors but can be reused by reference on item pool bank, designed the number of question. It helps the learner Self-directed Learning study with evaluation during the web based instruct process and immediate feedback. It also provides the chance to research some similar using keyword. To sum up, this system can amplify the efficiency of study.

Design and Implementation of Tag Coupling-based Boolean Query Matching System for Ranked Search Result (태그결합을 이용한 불리언 검색에서 순위화된 검색결과를 제공하기 위한 시스템 설계 및 구현)

  • Kim, Yong;Joo, Won-Kyun
    • Journal of the Korean Society for information Management
    • /
    • v.29 no.4
    • /
    • pp.101-121
    • /
    • 2012
  • Since IR systems which adopt only Boolean IR model can not provide ranked search result, users have to conduct time-consuming checking process for huge result sets one by one. This study proposes a method to provide search results ranked by using coupling information between tags instead of index weight information in Boolean IR model. Because document queries are used instead of general user queries in the proposed method, key tags used as queries in a relevant document are extracted. A variety of groups of Boolean queries based on tag couplings are created in the process of extracting queries. Ranked search result can be extracted through the process of matching conducted with differential information among the query groups and tag significance information. To prove the usability of the proposed method, the experiment was conducted to find research trend analysis information on selected research information. Aslo, the service based on the proposed methods was provided to get user feedback for a year. The result showed high user satisfaction.

Investigating the Promotion Methods of Korean Financial Firms' Knowledge Management in the e-Learning Environment Focusing on the Implementation of TopicMap-Based Repository Model (금융기관의 지식 관리 개선 방안 연구 - 토픽맵 개념을 활용한 학습, 지식 및 정보 객체를 연결시키는 통합 리포지토리 설계를 중심으로 -)

  • Kim Hyun-Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.40 no.2
    • /
    • pp.103-123
    • /
    • 2006
  • Assuming that the knowledge creation and retrieval functions could be the most important factors for a successful knowledge management(KM) especially during the promotion stage of KM, this study suggests an e-learning application as one of best methods for producing knowledge and also the integrated knowledge repository model in which learning, knowledge. and information objects can be semantically associated through topic map-based knowledge map. The traditional KM system provides a simple directory-based knowledge map. which can not provide the semantic links between topics or objects. The proposed model can be utilized as a solution to solve the above-mentioned disadvantages of the traditional models. In order to collect the basic data for the proposed model, first, case studies utilizing interviews and surveys were conducted targeting at three Korean insurance companies' knowledge managers(or e-learning managers) and librarians. Second, the related studies and other topic map-based pilot systems were investigated.

Design of Parallel Migration Method of Mobile Agents Using an Object Replication (객체 복제를 통한 이동 에이전트의 병렬 이주 방식 설계)

  • Kim, Kwang-Jong;Lee, Yon-Sik
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.351-360
    • /
    • 2004
  • Most mobile agents are migrated to many mobile agent systems by the sequential node migration method. However. in this case, if some problems such as host's fault or obstacle etc. happened, mobile agent falls infinity walt or orphan states. Therefore, it is difficult to get an expectation effect as use of other distribution technologies because the required time for networking between nodes increases. And so, many researches have been performed to solve this problems. However, most of methods decide node migration based on passive routing table or detour hosts which have some problems. Actually, the researches for reducing the total required time for networking are insufficient yet. In this paper, to reduce the required time for networking of mobile agent we design an active routing table based on the information of implemented objects which are registered in the meta-table of naming agent. And also, for user's keyword, we propose an replication model that replicates many agent object according to the information and number of object references corresponding to meta-table. Replicated objects are migrated to mobile agent systems in parallel and it provides minimized required time for networking.

Design and analysis of monitoring system for illegal overseas direct purchase based on C2C (C2C에 기반으로 해외직구 불법거래에 관한 모니터링 시스템 설계 및 분석)

  • Shin, Yong-Hun;Kim, Jeong-Ho
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.609-615
    • /
    • 2022
  • In this paper, we propose a monitoring system for illegal overseas direct purchase based on C2C transaction between individuals. The Customs Act stipulates that direct purchases from overseas are exempted from taxation only if they are less than a certain amount (US$150, but US$200 in the US) or are recognized as self-used goods. The act of reselling overseas direct purchase items purchased with exemption from taxation online, etc., is a crime of smuggling without a report. Nevertheless, the number of re-sells on online second-hand websites is increasing, and it is becoming a controversial social issue of continuous violation of the Customs Act. Therefore, this study collects unspecified transaction details related to overseas direct purchase, refines the data in a big data method, and designs it as a monitoring system through natural language processing, etc. analyzed. It will be possible to use it to crack down on illegal transactions of overseas direct purchase goods.

The Impacts of AI-enabled Search Services on Local Economy (AI 기반 장소 검색 서비스가 지역 경제에 미치는 영향에 대한 실증 연구)

  • Heejin Joo;Jeongmin Kim;Jeemahn Shin;Keongtae Kim;Gunwoong Lee
    • Information Systems Review
    • /
    • v.23 no.3
    • /
    • pp.77-96
    • /
    • 2021
  • This research investigates the pivotal role of AI-enabled technologies in vitalizing the local economy. Collaborating with a leading search engine company, we examine the direct and indirect of an AI-based location search service on the success of sampled 7,035 local restaurants in Gangnam area in Seoul. We find that increased use of AI-enabled search and recommendation services significantly improved the selections of previously less-discovered or less-popular restaurants by users, and it also enhanced the stores' overall conversion rates. The main research findings have contributions to extant literature in theorizing the value of AI applications in local economy and have managerial implications for search businesses and local stores by recommending strategic use of AI applications in their businesses that are effective in highly competitive markets.