• Title/Summary/Keyword: Analysis Domain

Search Result 5,872, Processing Time 0.031 seconds

Social Tagging-based Recommendation Platform for Patented Technology Transfer (특허의 기술이전 활성화를 위한 소셜 태깅기반 지적재산권 추천플랫폼)

  • Park, Yoon-Joo
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.3
    • /
    • pp.53-77
    • /
    • 2015
  • Korea has witnessed an increasing number of domestic patent applications, but a majority of them are not utilized to their maximum potential but end up becoming obsolete. According to the 2012 National Congress' Inspection of Administration, about 73% of patents possessed by universities and public-funded research institutions failed to lead to creating social values, but remain latent. One of the main problem of this issue is that patent creators such as individual researcher, university, or research institution lack abilities to commercialize their patents into viable businesses with those enterprises that are in need of them. Also, for enterprises side, it is hard to find the appropriate patents by searching keywords on all such occasions. This system proposes a patent recommendation system that can identify and recommend intellectual rights appropriate to users' interested fields among a rapidly accumulating number of patent assets in a more easy and efficient manner. The proposed system extracts core contents and technology sectors from the existing pool of patents, and combines it with secondary social knowledge, which derives from tags information created by users, in order to find the best patents recommended for users. That is to say, in an early stage where there is no accumulated tag information, the recommendation is done by utilizing content characteristics, which are identified through an analysis of key words contained in such parameters as 'Title of Invention' and 'Claim' among the various patent attributes. In order to do this, the suggested system extracts only nouns from patents and assigns a weight to each noun according to the importance of it in all patents by performing TF-IDF analysis. After that, it finds patents which have similar weights with preferred patents by a user. In this paper, this similarity is called a "Domain Similarity". Next, the suggested system extract technology sector's characteristics from patent document by analyzing the international technology classification code (International Patent Classification, IPC). Every patents have more than one IPC, and each user can attach more than one tag to the patents they like. Thus, each user has a set of IPC codes included in tagged patents. The suggested system manages this IPC set to analyze technology preference of each user and find the well-fitted patents for them. In order to do this, the suggeted system calcuates a 'Technology_Similarity' between a set of IPC codes and IPC codes contained in all other patents. After that, when the tag information of multiple users are accumulated, the system expands the recommendations in consideration of other users' social tag information relating to the patent that is tagged by a concerned user. The similarity between tag information of perferred 'patents by user and other patents are called a 'Social Simialrity' in this paper. Lastly, a 'Total Similarity' are calculated by adding these three differenent similarites and patents having the highest 'Total Similarity' are recommended to each user. The suggested system are applied to a total of 1,638 korean patents obtained from the Korea Industrial Property Rights Information Service (KIPRIS) run by the Korea Intellectual Property Office. However, since this original dataset does not include tag information, we create virtual tag information and utilized this to construct the semi-virtual dataset. The proposed recommendation algorithm was implemented with JAVA, a computer programming language, and a prototype graphic user interface was also designed for this study. As the proposed system did not have dependent variables and uses virtual data, it is impossible to verify the recommendation system with a statistical method. Therefore, the study uses a scenario test method to verify the operational feasibility and recommendation effectiveness of the system. The results of this study are expected to improve the possibility of matching promising patents with the best suitable businesses. It is assumed that users' experiential knowledge can be accumulated, managed, and utilized in the As-Is patent system, which currently only manages standardized patent information.

Expression of Yippee-Like 5 (YPEL5) Gene During Activation of Human Peripheral T Lymphocytes by Immobilized Anti-CD3 (인체 말초혈액의 활성화 과정 중 yippee-like 5 (YPEL5) 유전자의 발현 양상)

  • Jun, Do-Youn;Park, Hye-Won;Kim, Young-Ho
    • Journal of Life Science
    • /
    • v.17 no.12
    • /
    • pp.1641-1648
    • /
    • 2007
  • Yippee-like proteins, which have been identified as the homolog of Drosophila yippee protein containing a zinc-finger domain, are known to be highly conserved among eukaryotes. However, their functional roles are still poorly understood. Recently we initiated ordered differential display (ODD)-polymerase chain reaction (PCR) to isolate genes of which expressions are altered following activation of human T cells. On the ODD-PCR image, one PCR-product detected in unstimulated T cells was not detectable at the time when the activated T cells traversed near $G_1/S$ boundary following activation by immobilized anti-CD3. Cloning and nucleotide sequence analysis revealed that the PCR-product was yippee-like 5 (YPEL5) gene, which was known as a human homolog of the Drosophila yippee gene. Northern blot analysis confirmed the amount of ${\sim}2.2$ kb YPEL5 mRNA expression detectable in unstimulated T cells was sustained until 1.5 hr after activation and then rapidly declined to undetectable level by 5 hr. Ectopic expression of YPEL5 gene in human cervix epitheloid carcinoma HeLa cells caused a significant reduction in cell proliferation to the level of 47% of the control. Expression of GFP-YPEL5 fusion protein in HeLa cells showed its nuclear localization. These results demonstrated that the expression level of human YPEL5 mRNA was negatively regulated in the early stage of T cell activation, and suggested that YPEL5 might exert an inhibitory effect on the cell proliferation as a nuclear protein.

A Case Study for the Utilization of Food Safety Health Indicators in Korea: Computation of Composite Indices to Verify Important Indicators and Understand Correlations with Socioeconomic Status (우리나라 식품안전보건지표를 활용한 사례연구: 다양한 통합지수 산출을 통한 주요 지표 확인 및 사회경제적 지위와의 상관성 파악)

  • Choi, Giehae;Byun, Garam;Lee, Jong-Tae
    • Journal of Food Hygiene and Safety
    • /
    • v.30 no.3
    • /
    • pp.227-235
    • /
    • 2015
  • Food-Health indicators have been developed and utilized internationally in the 'Food' domain of environment and health indicators. In Korea, however, Food Safety Health Indicators which are in the introductory stage had been developed separately from Environmental Health Indicators. The aim of the current study is to suggest feasible applications of the domestic Food Safety Health Indicators as a case study. We introduced 3 possible applications which are as follows: 1) production of two types of Integrated Food Safety Health Index; 2) conduction of correlation analysis between the Integrated Food Safety Health Index and Food Safety Health Indicators; 3) conduction of regression analysis to evaluate the relationship between the Integrated Food Safety Health Index and socioeconomic status. As a result, we provided the calculated Integrated Food Safety Health Index I and Integrated Food Safety Health Index II, which represents the regional food safety level in relative and absolute terms, respectively. Integrated Food Safety Health Index I was significantly correlated with the outbreaks of food-borne diseases (caused by Campylobacter jejuni, Bacillus cereus, Salmonella spp. and unknown cause) and incidence of E.coli infections. Integrated Food Safety Health Index II significantly decreased as the proportion of foreigners and women increased, and increased as the population density increased. Utilization of such Integrated Food Safety Health Indicators may be helpful in understanding the overall domestic food safety level and identifying the indicators which must be considered with priorities to enhance the food safety levels regionally and domestically. Furthermore, analyzing the association between Integrated Food Safety Health Index and factors other than food safety could be useful in conducting risk management and identifying susceptible populations. Food Safety Health Indicators can be useful in other applications, and may serve as a supporting material in establishing or modifying policy plans to enhance food safety. Therefore, keen interests by researchers accompanied by further studies on food safety health indicators are needed.

Personal Information Overload and User Resistance in the Big Data Age (빅데이터 시대의 개인정보 과잉이 사용자 저항에 미치는 영향)

  • Lee, Hwansoo;Lim, Dongwon;Zo, Hangjung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.125-139
    • /
    • 2013
  • Big data refers to the data that cannot be processes with conventional contemporary data technologies. As smart devices and social network services produces vast amount of data, big data attracts much attention from researchers. There are strong demands form governments and industries for bib data as it can create new values by drawing business insights from data. Since various new technologies to process big data introduced, academic communities also show much interest to the big data domain. A notable advance related to the big data technology has been in various fields. Big data technology makes it possible to access, collect, and save individual's personal data. These technologies enable the analysis of huge amounts of data with lower cost and less time, which is impossible to achieve with traditional methods. It even detects personal information that people do not want to open. Therefore, people using information technology such as the Internet or online services have some level of privacy concerns, and such feelings can hinder continued use of information systems. For example, SNS offers various benefits, but users are sometimes highly exposed to privacy intrusions because they write too much personal information on it. Even though users post their personal information on the Internet by themselves, the data sometimes is not under control of the users. Once the private data is posed on the Internet, it can be transferred to anywhere by a few clicks, and can be abused to create fake identity. In this way, privacy intrusion happens. This study aims to investigate how perceived personal information overload in SNS affects user's risk perception and information privacy concerns. Also, it examines the relationship between the concerns and user resistance behavior. A survey approach and structural equation modeling method are employed for data collection and analysis. This study contributes meaningful insights for academic researchers and policy makers who are planning to develop guidelines for privacy protection. The study shows that information overload on the social network services can bring the significant increase of users' perceived level of privacy risks. In turn, the perceived privacy risks leads to the increased level of privacy concerns. IF privacy concerns increase, it can affect users to from a negative or resistant attitude toward system use. The resistance attitude may lead users to discontinue the use of social network services. Furthermore, information overload is mediated by perceived risks to affect privacy concerns rather than has direct influence on perceived risk. It implies that resistance to the system use can be diminished by reducing perceived risks of users. Given that users' resistant behavior become salient when they have high privacy concerns, the measures to alleviate users' privacy concerns should be conceived. This study makes academic contribution of integrating traditional information overload theory and user resistance theory to investigate perceived privacy concerns in current IS contexts. There is little big data research which examined the technology with empirical and behavioral approach, as the research topic has just emerged. It also makes practical contributions. Information overload connects to the increased level of perceived privacy risks, and discontinued use of the information system. To keep users from departing the system, organizations should develop a system in which private data is controlled and managed with ease. This study suggests that actions to lower the level of perceived risks and privacy concerns should be taken for information systems continuance.

A Study on Skin Status with Acoustic Measurements of Skin Friction Noise (피부 마찰 소음 측정을 통한 피부 상태 연구)

  • Chang, Yun Hee;Seo, Dae Hoon;Koh, A Rum;Kim, Sun Young;Lim, Jun Man;Han, Jong Seup;Lee, Sang Hwa;Park, Sun Gyoo;Kim, Yang Han
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.42 no.2
    • /
    • pp.103-109
    • /
    • 2016
  • Efficacy of cosmetics has been mainly evaluated by qualitative and quantitative methods based on visual sense, tactile sense and skin structure until now. In this study, we suggested a novel evaluation method for skin status based on sound; measuring and analyzing the rubbing noise generated by applying cosmetics. First, the rubbing noise was measured at a close range by a high-sensitivity microphone in anechoic environment, and the noises were analyzed by 1/3 octave band analysis in frequency-domain. Three conditions, 1) before washing, 2) after washing and 3) after application of cosmetics, were compared. As a result, sound pressure level (SPL) of rubbing noise after washing was larger than that of before washing, and the SPL of rubbing noise after cosmetic application was the smallest. Furthermore, the energy of rubbing noise after application was higher than that of the before and after washing conditions in a low frequency band (lower than 2 kHz region). Conversely, the energy of rubbing noise after application was much lower than the others in a high-frequency band (upper than 2 kHz region). This change of energy distribution was described as a balloon-skin model. High SPL in the low frequency region after the cosmetic applications was due to the increase of "flexibility index", while SPL in the high frequency region significantly decreased because of the attenuation which is related to "softness index". Therefore, we developed two indices based on the spectrum-energy difference for evaluating skin conditions. This proposed method and indices were verified via skin flexibility and roughness measurement using cutometer and primos respectively. These results suggest that acoustic measurement of skin friction noise may be a new skin status evaluation method.

Evaluation of Drainage Improvement Effect Using Geostatistical Analysis in Poorly Drained Sloping Paddy Soil (경사지 배수불량 논에서 배수개선 효과의 지구통계적 기법을 이용한 평가)

  • Jung, Ki-Yuol;Yun, Eul-Soo;Park, Ki-Do;Park, Chang-Young
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.43 no.6
    • /
    • pp.804-811
    • /
    • 2010
  • The lower portion of sloping paddy fields normally contains excessive moisture and the higher water table caused by the inflow of ground water from the upper part of the field resulting in non-uniform water content distribution. Four drainage methods namely Open Ditch, Vinyl Barrier, Pipe Drainage and Tube Bundle for multiple land use were installed within 1-m position from the lower edge of the upper embankment of sloping alluvial paddy fields. Knowledge of the spatial variability of soil water properties is of primary importance for management of agricultural lands. This study was conducted to evaluate the effect of drainage in the soil on spatial variability of soil water content using the geostatistical analysis. The soil water content was collected by a TDR (Time Domain Reflectometry) sensor after the installation of subsurface drainage on regular square grid of 80 m at 20 m paddy field located at Oesan-ri, Buk-myeon, Changwon-si in alluvial slopping paddy fields ($35^{\circ}22^{\prime}$ N, $128^{\circ}35^{\prime}$). In order to obtain the most accurate field information, the sampling grid was divided 3 m by 3 m unit mesh by four drainage types. The results showed that spatial variance of soil water content by subsurface drainage was reduced, though yield of soybean showed the same trends. Value of "sill" of soil water content with semivariogram was 9.7 in Pipe Drainage, 86.2 in Open Ditch, and 66.8 in Vinyl Barrier and 15.7 in Tube Bundle.

Label Embedding for Improving Classification Accuracy UsingAutoEncoderwithSkip-Connections (다중 레이블 분류의 정확도 향상을 위한 스킵 연결 오토인코더 기반 레이블 임베딩 방법론)

  • Kim, Museong;Kim, Namgyu
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.3
    • /
    • pp.175-197
    • /
    • 2021
  • Recently, with the development of deep learning technology, research on unstructured data analysis is being actively conducted, and it is showing remarkable results in various fields such as classification, summary, and generation. Among various text analysis fields, text classification is the most widely used technology in academia and industry. Text classification includes binary class classification with one label among two classes, multi-class classification with one label among several classes, and multi-label classification with multiple labels among several classes. In particular, multi-label classification requires a different training method from binary class classification and multi-class classification because of the characteristic of having multiple labels. In addition, since the number of labels to be predicted increases as the number of labels and classes increases, there is a limitation in that performance improvement is difficult due to an increase in prediction difficulty. To overcome these limitations, (i) compressing the initially given high-dimensional label space into a low-dimensional latent label space, (ii) after performing training to predict the compressed label, (iii) restoring the predicted label to the high-dimensional original label space, research on label embedding is being actively conducted. Typical label embedding techniques include Principal Label Space Transformation (PLST), Multi-Label Classification via Boolean Matrix Decomposition (MLC-BMaD), and Bayesian Multi-Label Compressed Sensing (BML-CS). However, since these techniques consider only the linear relationship between labels or compress the labels by random transformation, it is difficult to understand the non-linear relationship between labels, so there is a limitation in that it is not possible to create a latent label space sufficiently containing the information of the original label. Recently, there have been increasing attempts to improve performance by applying deep learning technology to label embedding. Label embedding using an autoencoder, a deep learning model that is effective for data compression and restoration, is representative. However, the traditional autoencoder-based label embedding has a limitation in that a large amount of information loss occurs when compressing a high-dimensional label space having a myriad of classes into a low-dimensional latent label space. This can be found in the gradient loss problem that occurs in the backpropagation process of learning. To solve this problem, skip connection was devised, and by adding the input of the layer to the output to prevent gradient loss during backpropagation, efficient learning is possible even when the layer is deep. Skip connection is mainly used for image feature extraction in convolutional neural networks, but studies using skip connection in autoencoder or label embedding process are still lacking. Therefore, in this study, we propose an autoencoder-based label embedding methodology in which skip connections are added to each of the encoder and decoder to form a low-dimensional latent label space that reflects the information of the high-dimensional label space well. In addition, the proposed methodology was applied to actual paper keywords to derive the high-dimensional keyword label space and the low-dimensional latent label space. Using this, we conducted an experiment to predict the compressed keyword vector existing in the latent label space from the paper abstract and to evaluate the multi-label classification by restoring the predicted keyword vector back to the original label space. As a result, the accuracy, precision, recall, and F1 score used as performance indicators showed far superior performance in multi-label classification based on the proposed methodology compared to traditional multi-label classification methods. This can be seen that the low-dimensional latent label space derived through the proposed methodology well reflected the information of the high-dimensional label space, which ultimately led to the improvement of the performance of the multi-label classification itself. In addition, the utility of the proposed methodology was identified by comparing the performance of the proposed methodology according to the domain characteristics and the number of dimensions of the latent label space.

Flow and Mixing Behavior at the Tidal Reach of Han River (한강 감조구간에서의 흐름 및 혼합거동)

  • Seo, Il Won;Song, Chang Geun;Lee, Myung Eun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.6B
    • /
    • pp.731-741
    • /
    • 2008
  • Previous studies on the numerical simulation at the tidal reach of Han River tend to restrict downstream boundary as Jeon-ryu station due to difficulties in gaining cross section data and tidal elevation values at Yu-do. But, in this study, geometries beyond the confluence of Gok-reung stream and Im-jin River are constructed based on the numerical sea map; tidal elevation at the downstream boundary, Yu-do is estimated by harmonic analysis of In-cheon tide gage station so that hydrodynamic and diffusion behavior have been analyzed. The domain ranging from Shin-gok submerged weir to Yu-do is selected (which is 36.8 km in length). RMA-2 and RAM4 developed by Il Won Seo (2008) are applied to simulate flow and diffusion behavior, respectively. Numerical results of flow characteristic are compared with the measured data at Jeon-ryu station. Simulation is carried out from June 23 to 25 in 2006 on the ground that hydrologic data is satisfactory and tidal difference is huge during that period. The result shows that reverse flow occurs 5 times according to the tidal elevation at Yu-do and the maximum reverse flow is observed up to Jang-hang IC, which is 32.9 km in length. Also analysis is focused on the process of generation and disappearance of reverse flow, the distribution of water surface elevation and velocity along the maximum velocity line, and the transport of nonconservative pollutant. Pollutant injected from Gul-po stream spreads widely across the river; however, the size of BOD cloud entering from Gok-reung stream is relatively small because water depth at the mid and left side becomes deeper and maximum velocity occurs along the right bank so that transverse mixing is completed quickly. Finally, mixing characteristic of horizontal salinity distribution is obtained by estimating the salinity input with analytical solution of 1D advection-dispersion equation.

A Study on the Social Venture Startup Phenomenon Using the Grounded Theory Approach (근거이론 접근법을 이용한 소셜벤처 창업 현상에 관한 고찰)

  • Seol, Byung Moon;Kim, Young Lag
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.18 no.1
    • /
    • pp.67-83
    • /
    • 2023
  • The social venture start-up phenomenon is found from the perspectives of social enterprise and for-profit enterprise. This study aims to fundamentally explore the start-up phenomenon of social ventures from these two perspectives. Considering the lack of prior research that researched both social and commercial perspectives at the same time, this paper analyzed using grounded theory approach of Strauss & Corbin(1998), an inductive research method that analyzes based on prior research and interview data. In order to collect data for this study, eight corporate representatives currently operating social ventures were interviewed and data and phenomena were analyzed. This progressed to a theoretical saturation where no additional information was derived. The analysis results of this study using the grounded theory approach are as follows. As a result of open coding and axial coding, 147 concepts and 70 subcategories were derived, and 18 categories were derived through the final abstraction process. In the selective coding, 'expansion of social venture entry in the social domain' and 'expansion of social function of for-profit companies' were selected as key categories, and a story line was formed around this. In this study, we saw that it is necessary to conduct academic research and analysis on the competitive factors required for companies that pursue the values of two conflicting relationships, such as social ventures, to survive with competitiveness. In practice, concepts such as collaboration with for-profit companies, value combination, entrepreneurship competency and performance improvement, social value execution competency reinforcement, communication strategy, for-profit enterprise value investment, and entrepreneur management competency were derived. This study explains the social venture phenomenon for social enterprises, commercial enterprises, and entrepreneurs who want to enter the social venture field. It is expected to provide the implications necessary for successful social venture startups.

  • PDF

Study on the Effect of Self-Disclosure Factor on Exposure Behavior of Social Network Service (자기노출 요인이 소셜 네트워크 서비스의 노출행동에 미치는 영향에 관한 연구)

  • Do Soon Kwon;Seong Jun Kim;Jung Eun Kim;Hye In Jeong;Ki Seok Lee
    • Information Systems Review
    • /
    • v.18 no.3
    • /
    • pp.209-233
    • /
    • 2016
  • Internet companies that utilize social network have increased in number. The introduction of diverse social media services facilitated innovative changes in e-business. Social network service (SNS), which is a domain of social media, is a web-based service designed to strengthen human relations in the Internet and build new social relations. The remarkable growth of social network services and the profit generation and perception of this service are the new growth engines of this digital age. Given this development, many global IT companies views SNS as the most powerful form of social media. Thus, they invest efforts to develop business models using SNS.2) This study verifies the impact of privacy exposure in SNS as a result of privacy invasion. This study examines the purpose of using the SNS and user's awareness of the significance of personal information, which are key factors that affect self-disclosure of personal information. This study utilizes theory of reasoned action (TRA) to provide a theoretical platform that describes the specific behavior and emotional response of individuals. This study presents a research model that considers negative attitude (negatude). In this model, self-disclosure in SNS is considered a TRA. TRA is a subjective norm, a behavioral intention, and a key variable of exposure behavior. A survey was conducted on college students at Y university in Seoul to empirically verify the research model. The students have experiences in using SNS. A total of 198 samples were collected. Path analysis was applied to analyze the relations of factors. The results of path analysis show the statistically insignificant impact of privacy invasion on negatude, subjective norm, behavioral intention, and exposure behavior. The impact of unrecognized privacy invasion was also considered insignificant. The impacts of intention to use SNS on negatude, subjective norm, behavioral intention, and exposure behavior was significant. A significant impact was also found for the significance of personal information on subjective norm, behavioral intention, and exposure behavior, whereas the impact on negatude was insignificant. The impact of subjective norm on behavioral intention was significant. Lastly, the impact of behavioral intention on exposure behavior was insignificant. These findings are significant because the study examined the process of self-disclosure by integrating psychological and social factors based on theoretical discussion.