• Title/Summary/Keyword: Abstract Data

Search Result 486, Processing Time 0.026 seconds

Analysis of Research Topics in Archival Studies: Focusing on Academic Papers in Archival Science, Library and Information Science, and History from 2002 to 2023 (국내 기록분야 연구주제 분석: 2002~2023년간 기록관리학, 문헌정보학, 역사학 학술논문을 중심으로)

  • SeonWook Kim
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.23 no.4
    • /
    • pp.91-111
    • /
    • 2023
  • This study aims to analyze research topics within the domain of archival studies by examining bibliographic information from academic papers in archival science, library and information science, and history. After collecting 1,173 academic papers, network analysis was performed based on author keyword data, topic modeling was conducted from abstract data, and the analysis results were organized over time. The network analysis results based on author keywords confirmed that the research topic network actively changed according to variations in major laws and policies. Moreover, topic modeling from the abstract showed that the subjects of the entire academic paper were divided into "Records Management," "Archiving," and "National Records Policy." Notably, from 2002 to 2009, "Records Management" and "National Records Policy" were relatively dominant, but it has achieved balanced quantitative growth since 2009, peaking in 2019.

Implementation of a Static Analyzer for Detecting the PHP File Inclusion Vulnerabilities (PHP 파일 삽입 취약성 검사를 위한 정적 분석기의 구현)

  • Ahn, Joon-Seon;Lim, Seong-Chae
    • The KIPS Transactions:PartA
    • /
    • v.18A no.5
    • /
    • pp.193-204
    • /
    • 2011
  • Since web applications are accessed by anonymous users via web, more security risks are imposed on those applications. In particular, because security vulnerabilities caused by insecure source codes cannot be properly handled by the system-level security system such as the intrusion detection system, it is necessary to eliminate such problems in advance. In this paper, to enhance the security of web applications, we develop a static analyzer for detecting the well-known security vulnerability of PHP file inclusion vulnerability. Using a semantic based static analysis, our vulnerability analyzer guarantees the soundness of the vulnerability detection and imposes no runtime overhead, differently from the other approaches such as the penetration test method and the application firewall method. For this end, our analyzer adopts abstract interpretation framework and uses an abstract analysis domain designed for the detection of the target vulnerability in PHP programs. Thus, our analyzer can efficiently analyze complicated data-flow relations in PHP programs caused by extensive usage of string data. The analysis results can be browsed using a JAVA GUI tool and the memory states and variable values at vulnerable program points can also be checked. To show the correctness and practicability of our analyzer, we analyzed the source codes of open PHP applications using the analyzer. Our experimental results show that our analyzer has practical performance in analysis capability and execution time.

A Convergence Study of the Research Trends on Stress Urinary Incontinence using Word Embedding (워드임베딩을 활용한 복압성 요실금 관련 연구 동향에 관한 융합 연구)

  • Kim, Jun-Hee;Ahn, Sun-Hee;Gwak, Gyeong-Tae;Weon, Young-Soo;Yoo, Hwa-Ik
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.8
    • /
    • pp.1-11
    • /
    • 2021
  • The purpose of this study was to analyze the trends and characteristics of 'stress urinary incontinence' research through word frequency analysis, and their relationships were modeled using word embedding. Abstract data of 9,868 papers containing abstracts in PubMed's MEDLINE were extracted using a Python program. Then, through frequency analysis, 10 keywords were selected according to the high frequency. The similarity of words related to keywords was analyzed by Word2Vec machine learning algorithm. The locations and distances of words were visualized using the t-SNE technique, and the groups were classified and analyzed. The number of studies related to stress urinary incontinence has increased rapidly since the 1980s. The keywords used most frequently in the abstract of the paper were 'woman', 'urethra', and 'surgery'. Through Word2Vec modeling, words such as 'female', 'urge', and 'symptom' were among the words that showed the highest relevance to the keywords in the study on stress urinary incontinence. In addition, through the t-SNE technique, keywords and related words could be classified into three groups focusing on symptoms, anatomical characteristics, and surgical interventions of stress urinary incontinence. This study is the first to examine trends in stress urinary incontinence-related studies using the keyword frequency analysis and word embedding of the abstract. The results of this study can be used as a basis for future researchers to select the subject and direction of the research field related to stress urinary incontinence.

A Real Time Traffic Flow Model Based on Deep Learning

  • Zhang, Shuai;Pei, Cai Y.;Liu, Wen Y.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2473-2489
    • /
    • 2022
  • Urban development has brought about the increasing saturation of urban traffic demand, and traffic congestion has become the primary problem in transportation. Roads are in a state of waiting in line or even congestion, which seriously affects people's enthusiasm and efficiency of travel. This paper mainly studies the discrete domain path planning method based on the flow data. Taking the traffic flow data based on the highway network structure as the research object, this paper uses the deep learning theory technology to complete the path weight determination process, optimizes the path planning algorithm, realizes the vehicle path planning application for the expressway, and carries on the deployment operation in the highway company. The path topology is constructed to transform the actual road information into abstract space that the machine can understand. An appropriate data structure is used for storage, and a path topology based on the modeling background of expressway is constructed to realize the mutual mapping between the two. Experiments show that the proposed method can further reduce the interpolation error, and the interpolation error in the case of random missing is smaller than that in the other two missing modes. In order to improve the real-time performance of vehicle path planning, the association features are selected, the path weights are calculated comprehensively, and the traditional path planning algorithm structure is optimized. It is of great significance for the sustainable development of cities.

Cell-Based Wavelet Compression Method for Volume Data (볼륨 데이터를 위한 셀 기반 웨이브릿 압축 기법)

  • Kim, Tae-Yeong;Sin, Yeong-Gil
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.11
    • /
    • pp.1285-1295
    • /
    • 1999
  • 본 논문은 방대한 크기의 볼륨 데이타를 효율적으로 렌더링하기 위한 셀 기반 웨이브릿 압축 방법을 제시한다. 이 방법은 볼륨을 작은 크기의 셀로 나누고, 셀 단위로 웨이브릿 변환을 한 다음 복원 순서에 따른 런-길이(run-length) 인코딩을 수행하여 높은 압축율과 빠른 복원을 제공한다. 또한 최근 복원 정보를 캐쉬 자료 구조에 효율적으로 저장하여 복원 시간을 단축시키고, 에러 임계치의 정규화로 비정규화된 웨이브릿 압축보다 빠른 속도로 정규화된 압축과 같은 고화질의 이미지를 생성하였다. 본 연구의 성능을 평가하기 위하여 {{}} 해상도의 볼륨 데이타를 압축하여 쉬어-? 분해(shear-warp factorization) 알고리즘에 적용한 결과, 손상이 거의 없는 상태로 약 27:1의 압축율이 얻어졌고, 약 3초의 렌더링 시간이 걸렸다.Abstract This paper presents an efficient cell-based wavelet compression method of large volume data. Volume data is divided into individual cell of {{}} voxels, and then wavelet transform is applied to each cell. The transformed cell is run-length encoded according to the reconstruction order resulting in a fairly good compression ratio and fast reconstruction. A cache structure is used to speed up the process of reconstruction and a threshold normalization scheme is presented to produce a higher quality rendered image. We have combined our compression method with shear-warp factorization, which is an accelerated volume rendering algorithm. Experimental results show the space requirement to be about 27:1 and the rendering time to be about 3 seconds for {{}} data sets while preserving the quality of an image as like as using original data.

Design and Implementation of NSM based Security Management System in Smart Grid (스마트그리드 전력망의 NSM 기반 보안관리시스템 설계 및 구현)

  • Chang, Beom Hwan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.107-117
    • /
    • 2013
  • In this paper, we designed the security management system based on IEC 62351-7 in the Smart Grid environment. The scope of IEC 62351-7 focuses on network and system management (NSM) of the information infrastructure as well as end-to-end security through abstract NSM data objects for the power system operational environment. However, it does not exist that security management system based on IEC 62351-7 manages the security of the power system in the Smart Grid environment, because power equipment or SNMP agents providing NSM data do not exist yet. Therefore, we implemented the security management system to manage the information infrastructure as reliably as the power system infrastructure is managed. We expect that this system can perform the security management of IEC 61850 based digital substation and can be a prototype of the security system for the Smart Grid in the future.

Evaluating Modified IKONOS RPC Using Pseudo GCP Data Set and Sequential Solution

  • Bang, Ki-In;Jeong, Soo;Kim, Kyung-Ok
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.82-87
    • /
    • 2002
  • RFM is the sensor model of IKONOS imagery for end-users. IKONOS imagery vendors provide RPC (Rational Polynomial Coefficients), Ration Function Model coefficients for IKONOS, for end-users with imagery. So it is possible that end-users obtain geospatial information in their IKONOS imagery without additional any effort. But there are requirements still fur rigorous 3D positions on RPC user. Provided RPC can not satisfy user and company to generate precision 3D terrain model. In IKONOS imagery, physical sensor modeling is difficult because IKONOS vendors do not provide satellite ephemeris data and abstract sensor modeling requires many GCP well distributed in the whole image as well as other satellite imagery. Therefore RPC modification is better choice. If a few GCP are available, RPC can be modified by method which is introduced in this paper. Study on evaluation modified RPC in IKONOS reports reasonable result. Pseudo GCP generated with vendor's RPC and additional GCP make it possible through sequential solution.

  • PDF

Development of Ultrasound Sector B-Scanner(II)-Digital Scan Converter- (초음파 섹터 B-스캐너의 개발(II)-디지탈 스캔 컨버터-)

  • 김주한;김영모
    • Journal of Biomedical Engineering Research
    • /
    • v.7 no.2
    • /
    • pp.133-138
    • /
    • 1986
  • Abstract In a conventional digital sector scan system in the ultrasound medical imaging, the sampling space is in the polar coordinates while the display space is in the cartesian coordinates, which necessitates a coordinate transformation process resultion process resulting the overall system very complex and bulky. In this paper we propose a new architecture of the Digital-Scan-Converter (DSC) for the ultrasound sector scan system in which sampling space is the same as the display space, so the data are displayed as they are acquired without any interpola- tion process required. To implement the above real time DSC. two frequency synthesizes with very high switching time and a low-pass filter are required. The former determines the precise location of the data points and the latter fills the gap betw- een pixels in the horizontal direction.

  • PDF

Secondary Analysis: Focusing on Qualitative Research (이차분석 : 질적연구를 중심으로)

  • 이명선
    • Journal of Korean Academy of Nursing
    • /
    • v.34 no.1
    • /
    • pp.35-44
    • /
    • 2004
  • Purpose: This article explored issues arising from secondary analysis of qualitative data and analyzed the results of qualitative secondary analysis studies published in English, focusing on the methodological aspects. Method: A total of 29 studies were identified as qualitative secondary analysis studies, retrieving from the CINAHL database from 1982 to 3rd week of April 2003. These studies were analyzed by publication year, research method, and type of approach to secondary analysis. Result: The year that the qualitative secondary analysis study first published was 1992 and the number of the studies using secondary analysis has increased after the middle of 1990s. Grounded theory was the one the most frequently used(n=11, 37.9%) and phenomenological study the second most(n=6, 20.7%). In terms of types of approach, fifteen studies(51.7%) focused on the specific concepts that were not explored in the primary studies. Nine(31.0%) focused on the specific types of participants. Six were aimed to integrate contexts or perspectives to generate more general and abstract analysis of qualitative data. Conclusion: The results of this article will stimulate methodological discussion of qualitative secondary analysis and activate qualitative studies using secondary analysis.

Studies on Thermal Decomposition of Barium Titanyl Oxalate by Factor Analysis of X-Ray Diffraction Patterns

  • Seungwon Kim;Sang Won Choi;Woo Young Huh;Myung-Zoon Czae;Chul Lee
    • Bulletin of the Korean Chemical Society
    • /
    • v.14 no.1
    • /
    • pp.38-42
    • /
    • 1993
  • Factor analysis was applied to study the thermal decomposition of barium titanyl oxalate (BTO) which is used as the precursor of barium titanate. BTO was synthesized in $H_2O$ solvent and calcined at various temperatures. The X-ray diffraction patterns were obtained to make the data matrix of peak intensity vs. 2${\theta}$. Abstract factor analysis and target transformation factor analysis were applied to this data matrix. It has been found that the synthesized BTO consists of the crystals of $BaC_2O_4{\cdot}0.5H_2O\;and\;BaC_2O_4{\cdot}2H_2O$ as well as the amorphous solid of TiO-oxalate. The results also indicate that the BTO was transformed via $BaCO_3\;to\;BaTiO_3\;and\;Ba_2TiO_4$ during the thermal decomposition.