• Title/Summary/Keyword: 흐름 정보

Search Result 3,324, Processing Time 0.03 seconds

Investigation of Factors Affecting the Effects of Online Consumer Reviews (온라인 소비자 리뷰의 효과에 영향을 미치는 요인에 대한 고찰)

  • Lee, Ho Geun;Kwak, Hyun
    • Informatization Policy
    • /
    • v.20 no.3
    • /
    • pp.3-17
    • /
    • 2013
  • As electronic marketplaces grow and a large number of consumers exchange their opinions on products and services on the Internet, many studies have been conducted in the area of online consumer reviews. This paper analyzes the research trend of the online consumer reviews by investigating those studies in an attempt to provide future research directions. Many researchers have focused on the effects of online reviews on consumer behaviors as well as the usefulness of the online reviews. In particular, review contents, characteristics of reviewers/consumers and features of products/services have been identified as influencing factors on the effects of the online consumer reviews. For the review contents, the number and the volume of the contents have increasing effects on the online reviews, while the direction (positive vs. negative) of the contents has resulted in conflicting effects of the review. The reputation and trustfulness of reviewers, consumers' prior knowledge on the products, consumers' product involvement, and types of the products were investigated as these factors influence the effectiveness of the online consumer reviews. Social media (such as Facebook and Twitter) nowadays play an important role to disseminate online reviews among consumers. Thus, it is necessary to study how social media influence the effects of online reviews on consumers. Since some firms abuse the online reviews for their own sakes, we recognize the necessity for empirical studies on the side effects of the online reviews.

  • PDF

Comprehensive Review of Research Publications on Gifted Education in Korea : 2003-2012 (한국 영재교육 연구의 현황 및 성과: 2003-2012)

  • Lee, Sang Hee;Choi, Sun Ill
    • Journal of Gifted/Talented Education
    • /
    • v.25 no.6
    • /
    • pp.881-904
    • /
    • 2015
  • The purpose of this paper is to explore the future direction of research on gifted education through a literature review of dissertations and research reports, as well as an analysis of the trends and milestones achieved related to gifted education. The period from 2003 to 2012, from which the data for this literature review was collected, marks the ten-year period proposed by the Gifted Education Development Comprehensive Plan II and I. Data was collected through a search of the keyword "gifted" on Academic Naver and on Korea Education and Research Information Service (KERIS). Results showed 1,696 articles from 182 academic journals, 138 doctoral dissertations, 1,470 masters' dissertations, and 798 research reports from 75 institutions. For analysis, each article was classified by target of study, kind of giftedness, subject of study, and methods used for the study. Results from this literature review demonstrated that from 2003 to 2012, the articles from the 182 academic journals and the doctoral and masters' dissertations used quantitative research to analyze elementary and middle school students gifted in math and science as well as the curriculum and programs of their study. This paper provides recommendations for future research on gifted education within the country.

Rare Malware Classification Using Memory Augmented Neural Networks (메모리 추가 신경망을 이용한 희소 악성코드 분류)

  • Kang, Min Chul;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.847-857
    • /
    • 2018
  • As the number of malicious code increases steeply, cyber attack victims targeting corporations, public institutions, financial institutions, hospitals are also increasing. Accordingly, academia and security industry are conducting various researches on malicious code detection. In recent years, there have been a lot of researches using machine learning techniques including deep learning. In the case of research using Convolutional Neural Network, ResNet, etc. for classification of malicious code, it can be confirmed that the performance improvement is higher than the existing classification method. However, one of the characteristics of the target attack is that it is custom malicious code that makes it operate only for a specific company, so it is not a form spreading widely to a large number of users. Since there are not many malicious codes of this kind, it is difficult to apply the previously studied machine learning or deep learning techniques. In this paper, we propose a method to classify malicious codes when the amount of samples is insufficient such as targeting type malicious code. As a result of the study, we confirmed that the accuracy of 97% can be achieved even with a small amount of data by applying the Memory Augmented Neural Networks model.

ICFGO : UI Concealing and Dummy Flow Insertion Method for Inter-Procedural Control Flow Graph Obfuscation (ICFGO : Inter-Procedural Control Flow Graph 난독화를 위한 UI 은닉 및 Dummy Flow 삽입 기법)

  • Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.493-501
    • /
    • 2020
  • For the obfuscation of Flow Analysis on the Android operating system, the size of the Flow Graph can be large enough to make analysis difficult. To this end, a library in the form of aar was implemented so that it could be inserted into the application in the form of an external library. The library is designed to have up to five child nodes from the entry point in the dummy code, and for each depth has 2n+1 numbers of methods from 100 to 900 for each node, so it consists of a total of 2,500 entry points. In addition, entry points consist of a total of 150 views in XML, each of which is connected via asynchronous interface. Thus, the process of creating a Inter-procedural Control Flow Graph has a maximum of 14,175E+11 additional cases. As a result of applying this to application, the Inter Procedure Control Flow Analysis too generates an average of 10,931 edges and 3,015 nodes with an average graph size increase of 36.64%. In addition, in the APK analyzing process showed that up to average 76.33MB of overhead, but only 0.88MB of execution overhead in the user's ART environment.

Hilbert Cube for Spatio-Temporal Data Warehouses (시공간 데이타웨어하우스를 위한 힐버트큐브)

  • 최원익;이석호
    • Journal of KIISE:Databases
    • /
    • v.30 no.5
    • /
    • pp.451-463
    • /
    • 2003
  • Recently, there have been various research efforts to develop strategies for accelerating OLAP operations on huge amounts of spatio-temporal data. Most of the work is based on multi-tree structures which consist of a single R-tree variant for spatial dimension and numerous B-trees for temporal dimension. The multi~tree based frameworks, however, are hardly applicable to spatio-temporal OLAP in practice, due mainly to high management cost and low query efficiency. To overcome the limitations of such multi-tree based frameworks, we propose a new approach called Hilbert Cube(H-Cube), which employs fractals in order to impose a total-order on cells. In addition, the H-Cube takes advantage of the traditional Prefix-sum approach to improve Query efficiency significantly. The H-Cube partitions an embedding space into a set of cells which are clustered on disk by Hilbert ordering, and then composes a cube by arranging the grid cells in a chronological order. The H-Cube refines cells adaptively to handle regional data skew, which may change its locations over time. The H-Cube is an adaptive, total-ordered and prefix-summed cube for spatio-temporal data warehouses. Our approach focuses on indexing dynamic point objects in static spatial dimensions. Through the extensive performance studies, we observed that The H-Cube consumed at most 20% of the space required by multi-tree based frameworks, and achieved higher query performance compared with multi-tree structures.

A Study on Design Verification of Radio Measurement System for Interplanetary Space (태양-지구 간 공간 전파 관측 시스템 설계 검증)

  • Jeong, Cheol-Oh;Park, Jae-Woo
    • Journal of Satellite, Information and Communications
    • /
    • v.6 no.2
    • /
    • pp.97-101
    • /
    • 2011
  • Interplanetary space between Sun and Earth is area of flowing very fast solar wind which is contained X ray, flare, corona mass, etc. occurred Sun surface to Earth. This solar wind is affected directly to Earth magnetosphere and ionosphere so that this bring out broadcasting and communication interruptions, satellite operation obstacles and power gird defects and etc..Solar wind flow in interplanetary space is measured as solar wind speed, density and direction by measuring scintillation value to be produced during radio source is passed through solar wind. The wider effective collective areas and the more radio sources, accuracy of solar wind measuring is got higher. Function test was performed using 3 tiles which was manufactured as prototype. Restriction of quantity of tiles, test was performed to confirm whether measured beam pattern is complied with requirement or not. In this paper, it is shown design and their specification of ground interplanetary radio measurement system as well as technical issues and resolutions which were raised during design phase. Also result of function verification test using prototype is suggested. It is confirmed that measured beam pattern was met with requirement.

연구개발의 세계화와 외국인 연구 인력의 활용 전략

  • 임덕순
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 1999.11c
    • /
    • pp.521-543
    • /
    • 1999
  • 최근 과학기술 혁신 활동의 세계화 현상과 함께 한국의 연구개발 활동도 점차 세계화되고 있다. 그러나 한국의 연구개발 활동의 세계화 현상 및 바람직한 방향에 관한 연구는 별로 없다. 세계화에 따라 국내 연구개발 자원의 유출현상도 발생하지만, 해외 연구개발 자원을 활용할 수 있는 기회도 증가한다. 본 논문에서는 연구개발 활동의 세계화에 관한 흐름 및 개념을 제시하고, 국내 외국인 연구 인력의 활용 현황 및 활용성과 영향 요인을 조사하여 외국인 연구인력 활용 방안을 탐색하였다. 외국과의 연구자 교류는 1996년 현재 유입이 약 4,300명, 유출이 약 16,000명으로 유출이 크지만, 많은 규모는 아니다. 국내 활용 외국인 연구자의 경우 1998년에는 주춤하였지만 꾸준한 증가 추세에 있다. 외국인은 비선진국, 특히 러시아 및 중국의 연구자들을 많이 활용되고 있다. 활용 분야는, 기초, 응용, 개발 연구별로 고루 분포되어 있으며, 상대적으로 정보 전자통신, 에너지 및 자원 분야에서 활용을 많이 하고 있었다. 외국인 연구자들이 참가한 프로젝트는 한국에서 기술도입기나 기술성장기에 해당하는 프로젝트들이 거의 대부분이었다. 월평균 급여는 1,500,000원부터 2,300,000원 정도의 범위에 속했다. 활용 기간을 보면 50%이상이 1년 미만이었으며 2년 이상은 약 10%정도 수준으로 단기간 활용을 위주로 하고 있는 편이다. 외국인 연구자 활용의 이유로써는 외국인 연구자가 가지고 있는 과학기술 지식을 흡수하거나 공동으로 신기술 지식을 개발하려는 목적 등이 지원제도 이용 차원이나, 해외 연구 네트워크 구축, 단순한 연구인력 충원 차원 등의 목적보다 많은 것으로 나타났다. 이는 기초과학 수준이 높은 북방권 국가들의 과학자들이 주로 활용되고 있다는 점에서도 잘 알 수 있으며 우리의 과학기술 약점을 보완하는 원천으로써 외국인 연구 인력이 대안이 되고 있음을 시사한다. 본 연구에서는 한국 연구 조직에서 일하는 외국인 연구자들의 동기 및 성과에 영향을 미치는 많은 요인들을 확인할 수 있었다. 상관관계, 분산분석, 회귀분석 등을 통해 활용 성과에 미치는 영향 요인들을 도출하였다. 설문 분석을 통하여 동기 및 성과 사이에는 강한 상관관계가 존재하는 것을 확인할 수 있었으며 이는 전통적인 동기 이론들과 부합한다. 대부분의 변수가 동기 및 성과에 동시에 영향을 미치는 것으로 조사되었으며 그중에서도 조직 협력 문화, 외국인 연구자의 의사소통 및 협력성, 외국인 연구자의 연구 능력 관련 변수들 및 연구 프로젝트의 기술수명주기, 외국인 연구자의 기존 기술지식의 흡수 등이 가장 중요한 변수로 나타났다. 이는 우리가 주로 중국 및 러시아 과학자들을 활용하여 상업화하는 외국인 연구인력 활용 패턴과도 일치하는 결과이다. 즉 우호적인 조직문화를 가지고 있는 연구 조직에서, 이미 과학기술 지식을 많이 가지고 있고 연구 능력도 높은 외국인 과학기술자를, 한국에서 기술이 태동 또는 성장하고 있는 연구 분야에서 활용하는 것이 가장 성과가 좋다는 사실을 확인시켜 주고 있다. 국내에서 최초로 수행된 본 연구는 외국인 연구 인력의 활용 성과가 매우 높으며, 우리의 과학기술혁신시스템을 보완하는 유효한 수단으로써 외국인 연구 인력이 중요한 대안이 될 수 있음을 발견하였다. 외국인 연구 인력을 잘 활용하기 위하여 문제점 및 개선방안을 활용 환경, 연구 인력이 중요한 대안이 될 수 있음을 발견하였다. 외국인 연구 인력을 잘 활용하기 위하여 문제점 및 개선 방안을 활용 환경, 연구 인력관리. 인력 교류사업, 외국인 과학자 지원 창구 등으로 나누어서 정리하였다. 연구시설, 주거시설 등의 하드웨어적 환경에 대한 개선도 중요하지만 연구 인력의 관리 능력 제고, 인력 교류 사업의 개선, 정보 제공 등 소프트웨어적인 활용 능력을 제고하는데 정책적인 관심을 기울이는 것이 중요하다고 판단된다.

  • PDF

Implementation of a Photo-Input Game Interface Using Image Search (이미지 검색을 이용한 사진입력 게임 인터페이스 구현)

  • Lee, Taeho;Han, Jaesun;Park, Heemin
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.10
    • /
    • pp.658-669
    • /
    • 2015
  • The paradigm of game development changes with technological trends. If the system can analyze and determine undefined inputs, users' input choices are not restricted. Therefore, game scenarios can have multifarious flows depending upon the user's input data. In this paper, we propose a method of including an output plan in the game system that is based on the user's input but is not restricted to predefined choices. We have implemented an experimental game on the Android platform by combining network communication and APIs. The game interface works as follows: first, the user's input data is transmitted to the server using HTTP protocol; then, the server carries out an analysis on the input data; and finally, the server returns the decision result to the game device. The game can provide users a scenario that corresponds to the decision results. In this paper, we used an image file for the user's input data format. The server calculates similarities between the user's image file and reference images obtained from the Naver Image Search API and then returns determination results. We have confirmed the value of integrating the game development framework with other computing technologies demonstrating the potential of the proposed methods for application to various future game interfaces.

A Performance Improvement of Linux TCP Networking by Data Structure Reuse (자료 구조 재사용을 이용한 리눅스 TCP 네트워킹 성능 개선)

  • Kim, Seokkoo;Chung, Kyusik
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.8
    • /
    • pp.261-270
    • /
    • 2014
  • As Internet traffic increases recently, much effort has been put on improving the performance of a web server. In addition to hardware side solutions such as replacement by high-end hardware or expansion of the number of servers, there are software side solutions to improve performance. Recent studies on these software side solutions have been actively performed. In this paper, we identify performance degradation problems occurring in a conventional TCP networking reception process and propose a way to solve them. We improve performance by combining three kinds of existing methods for Linux Networking Performance Improvement and two kinds of newly proposed methods in this paper. The three existing methods include 1) an allocation method of a packet flow to a core in a multi-core environment, 2) ITR(Interrupt Throttle Rate) method to control excessive interrupt requests, and 3) sk_buff data structure recycling. The two newly proposed methods are fd data structure recycling and epoll_event data structure recycling. Through experiments in a web server environment, we verify the effect of our two proposed methods and its combination with the three existing methods for performance improvement, respectively. We use three kinds of web servers: a simple web server, Lighttpd generally used in Linux, and Apache. In a simple web server environment, fd data structure recycling and epoll_event data structure recycling bring out performance improvement by about 7 % and 6%, respectively. If they are combined with the three existing methods, performance is improved by up to 40% in total. In a Lighttpd and an Apache web server environment, the combination of five methods brings out performance improvement by up to 36% and 20% in total, respectively.

Design and Analsis of a high speed switching system with two priority (두개의 우선 순위를 가지는 고속 스윗칭 시스템의 설계 및 성능 분석)

  • Hong, Yo-Hun;Choe, Jin-Sik;Jeon, Mun-Seok
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.793-805
    • /
    • 2001
  • In the recent priority system, high-priority packet will be served first and low-priority packet will be served when there isn\`t any high-priority packet in the system. By the way, even high-priority packet can be blocked by HOL (Head of Line) contention in the input queueing System. Therefore, the whole switching performance can be improved by serving low-priority packet even though high-priority packet is blocked. In this paper, we study the performance of preemptive priority in an input queueing switch for high speed switch system. The analysis of this switching system is taken into account of the influence of priority scheduling and the window scheme for head-of-line contention. We derive queue length distribution, delay and maximum throughput for the switching system based on these control schemes. Because of the service dependencies between inputs, an exact analysis of this switching system is intractable. Consequently, we provide an approximate analysis based on some independence assumption and the flow conservation rule. We use an equivalent queueing system to estimate the service capability seen by each input. In case of the preemptive priority policy without considering a window scheme, we extend the approximation technique used by Chen and Guerin [1] to obtain more accurate results. Moreover, we also propose newly a window scheme that is appropriate for the preemptive priority switching system in view of implementation and operation. It can improve the total system throughput and delay performance of low priority packets. We also analyze this window scheme using an equivalent queueing system and compare the performance results with that without the window scheme. Numerical results are compared with simulations.

  • PDF