• Title/Summary/Keyword: Big data collection

Search Result 340, Processing Time 0.025 seconds

Complementary Color Scheme Which Appeared in Women's Fashion Collections of New York, Milan, Paris, and London

  • Kwon, Hae-Sook
    • Journal of Fashion Business
    • /
    • v.13 no.6
    • /
    • pp.125-136
    • /
    • 2009
  • The main objective of this research was to understand the characteristics of complementary color scheme through the analysis of contemporary women's fashion color coordination as they appear in the 'Collections'. Data collection of 115 was done through review of 'pr$\hat{e}$t-$\grave{a}$-porter Collections' of four cities; Milan, London, New York, Paris. Statistical analysis of frequency and also qualitative interpretation of characteristics of complementary color harmony characteristics which appeared in four collections were completed. The main findings were as followed; (1) Only 115 complementary color schemes out of 4968 two color combinations appeared. Compared the comparative ratios of appearance frequency between the two color combination and the complementary color harmony, London showed the highest, and followed by New York, and Milan and Paris. (2)The combined color type of 'red+green' was the most frequently appeared, and followed by 'violet+yellow' and 'orange+blue'. For the type of tone harmony, the contrast tone showed the most, and followed by the similarity and identity. According to the type of complementary color combination, the type of tone harmony used differently. Some differences showed in the types of color harmony and tone harmony between collections. (3) The complementary color scheme which shown in four collections harmonized two opposite colors mainly through the strong tone contrast and this could cause tension along with interest in the image. The complementary colors intensified and brought out the attributes each other. More details, high contrast of two complementary colors of yellow and violet created a vibrant look especially when used at higher saturation. Sometimes, however, some tone variations of two hues neutralized the strong effect and sometimes enhanced each other. When they used in similarity tones or identity tones in light colors, the tension was reduced and became softened but still presented nice harmony. In the type of 'red+green' color harmony, the various color combinations were demonstrated, mostly through tone manipulation of green color. The similarity tone harmony, which used the most, could effect a better sense of harmony and present more sophisticated looks. When used in contrast tone harmony, some changes in its own color which have only one color of two the excessive intensity led a good harmony. The 'orange+blue' color harmony was shown the least and used three tone harmony almost the same ratio. In this color harmony, blue amplified its energy and brilliance of orange and seemed to work better when one color was at a lower intensity than the other. In harmony with a similarity and an identity tone, this color harmony produces a stable and calm image. (4) The complementary scheme appeared more frequently in the S/S collections than in A/W collections and showed some differences in the types of color harmony and tone harmony between seasons, however, no big differences between collections.

Evaluation of Mobility and Safety of Operating an Overlap Phase on a Shared-Left-Turn Lane Using a Microscopic Traffic Simulation Model (미시교통시뮬레이션모형을 이용한 공용 좌회전 차로의 중첩현시운영의 이동성과 안전성 평가 연구)

  • Yun, Il-Soo;Han, Eum;Woo, Seok-Cheol;Yoon, Jung-Eun;Park, Sung-Ho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.5
    • /
    • pp.15-26
    • /
    • 2012
  • Government agencies including the national police agency have executed diverse efforts including continuous improvements of traffic facilities and operation methods, education, enforcements in order to improve traffic operation systems; nevertheless there have been continuous criticisms on irrationality in traffic signal and road facility operation. One of the reasons may be the lack of systematic preliminary evaluations on various alternatives. However, there was no appropriate tool to evaluate the mobility and safety of thus alternatives in a systematic way. Therefore, this study proposes the systematic use of microscopic traffic simulation models as a comprehensive evaluation tool. In addition, this study verified the potential of using a microscopic traffic simulation model using the case of operating an overlap phase on a shared-left-turn lane through a systematic way where the evaluation was conducted through data collection, building networks, calibrating microscopic simulation models, producing performance measures, evaluating mobility and safety, and so on. As a result, the operation of overlap phase on a shared-left-turn lane showed no big difference from other operation scenarios such as leading left-turn on exclusive left turn lane in terms of mobility. However the operation of overlap phase on a shared-left-turn lane decreased safety by increasing potential conflicts.

An Analysis of the Status of National Research and Development Projects in Records Management (기록관리 분야 국가연구개발사업 현황 분석)

  • Hoemyeong Jeong;Soonhee Kim
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.23 no.4
    • /
    • pp.137-157
    • /
    • 2023
  • The scale of research and development (R&D) investment is increasing to strengthen national competitiveness through technological innovation, leading to an increased interest in investment efficiency. In records management, the National Archives of Korea has been leading the national research and development project since 2008. Accordingly, this study analyzed R&D projects in records management regarding implementing organization, performance or outcomes, and subjects, targeting 111 National Archives of Korea contract research projects from 2008 to 2022. The analysis showed that small and medium-sized enterprises (SMEs) were the most likely to conduct research, the majority of the research outcomes were academic publications, and there were some discrepancies between the reported performance in research and the actual performance. In terms of research subjects, the most common type of records are paper or print documents, establishing an electronic management system among the National Archives' works. In terms of the frequency of keywords in the records management process and research projects, it was found that research was mainly conducted on "preservation." Meanwhile, only 10 cases, or 9% of the 111 projects, were found to be relevant in terms of utilizing big data and developing intelligent technologies related to digital transformation. Therefore, the effectiveness of the R&D project must be improved through follow-up management of the results even after the research project is completed. In addition, in terms of research topics, it was identified that aside from "preservation," studies focusing on "transfer," "classification," "evaluation," and "collection," as well as research that responds to digital transformation, are needed.

Current Trends for National Bibliography through Analyzing the Status of Representative National Bibliographies (주요국 국가서지 현황조사를 통한 국가서지의 최신 경향 분석)

  • Lee, Mihwa;Lee, Ji-Won
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.1
    • /
    • pp.35-57
    • /
    • 2021
  • This paper is to grasp the current trends of national bibliographies through analyzing representative national bibliographies using literature review, analysis of national bibliographies' web pages and survey. First, in order to conform to the definition of a national bibliography as a record of a national publication, it attempts to include a variety of materials from print to electronic resources, but in reality it cannot contain all the materials, so there are exceptions. It is impossible to create a general selection guide for national bibliography coverage, and a plan that reflects the national characteristics and prepares a valid and comprehensive coverage based on analysis is needed. Second, cooperation with publishers and libraries is being made to efficiently generate national bibliography. For the efficiency of national bibliography generation, changes should be sought such as the standardization and consistency, the collection level metadata description for digital resources, and the creation of national bibliography using linked data. Third, national bibliography is published through the national bibliographic online search system, linked data search, MARC download using PDF, OAI-PMH, SRU, Z39.50, and mass download in RDF/XML format, and is integrated with the online public access catalog or also built separately. Above all, national bibliographies and online public access catalogs need to be built in a way of data reuse through an integrated library system. Fourth, as a differentiated function for national bibliography, various services such as user tagging and national bibliographic statistics are provided along with various browsing functions. In addition, services of analysis of national bibliographic big data, links to electronic publications, and mass download of linked data should be provided, and it is necessary to identify users' needs and provide open services that reflect them in order to develop differentiated services. Through the current trends and considerations of the national bibliographies analyzed in this study, it will be possible to explore changes in national and international national bibliography.

The Pattern Analysis of Financial Distress for Non-audited Firms using Data Mining (데이터마이닝 기법을 활용한 비외감기업의 부실화 유형 분석)

  • Lee, Su Hyun;Park, Jung Min;Lee, Hyoung Yong
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.4
    • /
    • pp.111-131
    • /
    • 2015
  • There are only a handful number of research conducted on pattern analysis of corporate distress as compared with research for bankruptcy prediction. The few that exists mainly focus on audited firms because financial data collection is easier for these firms. But in reality, corporate financial distress is a far more common and critical phenomenon for non-audited firms which are mainly comprised of small and medium sized firms. The purpose of this paper is to classify non-audited firms under distress according to their financial ratio using data mining; Self-Organizing Map (SOM). SOM is a type of artificial neural network that is trained using unsupervised learning to produce a lower dimensional discretized representation of the input space of the training samples, called a map. SOM is different from other artificial neural networks as it applies competitive learning as opposed to error-correction learning such as backpropagation with gradient descent, and in the sense that it uses a neighborhood function to preserve the topological properties of the input space. It is one of the popular and successful clustering algorithm. In this study, we classify types of financial distress firms, specially, non-audited firms. In the empirical test, we collect 10 financial ratios of 100 non-audited firms under distress in 2004 for the previous two years (2002 and 2003). Using these financial ratios and the SOM algorithm, five distinct patterns were distinguished. In pattern 1, financial distress was very serious in almost all financial ratios. 12% of the firms are included in these patterns. In pattern 2, financial distress was weak in almost financial ratios. 14% of the firms are included in pattern 2. In pattern 3, growth ratio was the worst among all patterns. It is speculated that the firms of this pattern may be under distress due to severe competition in their industries. Approximately 30% of the firms fell into this group. In pattern 4, the growth ratio was higher than any other pattern but the cash ratio and profitability ratio were not at the level of the growth ratio. It is concluded that the firms of this pattern were under distress in pursuit of expanding their business. About 25% of the firms were in this pattern. Last, pattern 5 encompassed very solvent firms. Perhaps firms of this pattern were distressed due to a bad short-term strategic decision or due to problems with the enterpriser of the firms. Approximately 18% of the firms were under this pattern. This study has the academic and empirical contribution. In the perspectives of the academic contribution, non-audited companies that tend to be easily bankrupt and have the unstructured or easily manipulated financial data are classified by the data mining technology (Self-Organizing Map) rather than big sized audited firms that have the well prepared and reliable financial data. In the perspectives of the empirical one, even though the financial data of the non-audited firms are conducted to analyze, it is useful for find out the first order symptom of financial distress, which makes us to forecast the prediction of bankruptcy of the firms and to manage the early warning and alert signal. These are the academic and empirical contribution of this study. The limitation of this research is to analyze only 100 corporates due to the difficulty of collecting the financial data of the non-audited firms, which make us to be hard to proceed to the analysis by the category or size difference. Also, non-financial qualitative data is crucial for the analysis of bankruptcy. Thus, the non-financial qualitative factor is taken into account for the next study. This study sheds some light on the non-audited small and medium sized firms' distress prediction in the future.

A Study on the Effect of Cold Application Using a Sponge Bath in Healthy Adults (냉요법 적용방법에 따른 냉요법 효과에 관한 연구-건강한 성인 여성에서 스폰지 목욕방법을 중심으로)

  • Chung, Hyun-Sook;Kang, Kyu-Sook;Hwang, Ae-Ran
    • The Korean Nurse
    • /
    • v.28 no.3
    • /
    • pp.68-82
    • /
    • 1989
  • This study was a quasi-experimental research study to test the characteristics of temperature regulation according to sponge bath methods of cold application. Thirteen volunteers were selected from among nursing college students according to an established criteria using a purposive sampling technique. Four different cold application methods were used: $\circled1$ tepid water sponge bath at $28^{\circ}C$, $\circled2$ 20% alcohol sponge bath at $28^{\circ}C$, $\circled3$ 40% alcohol sponge bath at $28^{\circ}C$ and $\circled4$ tepid water sponge bath at 28$^{\circ}$C plus an ice bag to the head. Changes in rectal temperature, mean skin temperature, mean body temperature, heat content change and thermal discomfort during the cold application were measured at 5 minute intervals over a 120 minute period. The data collection period was from Dec. 20, 1988 to Feb. 3, 1989. The data were analyzed using descriptive statistics, simple regression, ANOVA, Duncan's multiple range test and Pearson correlation coefficient using the SPSS-X Program. The results of the study are summarized as follows. Five general hypothesis were tested. Hypothesis 1 that "Change in heat content will be decreased for each cold application method according to the cold application time" was rejected. (tepid water sponge bath: after 10 minutes of cold application, 20% alcohol sponge bath: after 25 minutes of cold application: 40% alcohol sponge bath: after 45 minutes of cold application, tepid water sponge bath plus an ice bag to the head: after 80 minutes of cold application) Hypothesis 2 that "Thermal discomfort will be changed for each cold application method according to the cold application time" was rejected after 5minutes of cold application. Hypothesis 3 that "Change in heat content will differ among the cold application methods" was accepted except 0~5, 0~10, 0~65, 0~105 and 0~120 minute. This difference showed significance only between sponge bath methods and tepid water sponge bath plus an ice bag to the head. Hypothesis 4 that "Thermal discomfort will differ among the cold application methods" was accepted at 15, 20, 35, 45, 75, 80, 90, 95, 100, 105, 110, 115 and 120 minute of cold application time. This difference showed significance only between sponge bath methods and tepid water sponge bath plus an ice bag to the head. Hypothesis 5 that "The higher the change in heat content, the higher the thermal discomfort during the cold application time" was accepted for between 10~60 and 75 minute of cold application. In conclusion, this study showed that in sponge bath at $28^{\circ}C$, 10~80 minute was a effective cold application time in the view of heat loss through the skin. Concerning the effects of evaporation and thermal discomfort, it was found that there was no difference with regard to the solutions; tepid water sponge bath; 20% alcohol sponge bath or 40% alcohol sponge bath at a $28^{\circ}C$ controlled solution temperature. So it was thought that the type of solution itself did not have a big influence on the heat loss through skin. The combined effect of sponge bath with an ice bag to the head showed a significant difference and also showed a slight increase in thermal discomfort. On the basis of this research it can be concluded that cold application, for example, an ice bag to the head during a tepid water sponge bath is a good method as it increase heat loss through conduction, although fit can also cause a slight increase in thermal discomfort. The correlation between changes in heat content and thermal discomfort were not high. So factors other than change in heat content are considered to have an effect on the cognition of thermal discomfort.

  • PDF

Development of Customer Sentiment Pattern Map for Webtoon Content Recommendation (웹툰 콘텐츠 추천을 위한 소비자 감성 패턴 맵 개발)

  • Lee, Junsik;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.4
    • /
    • pp.67-88
    • /
    • 2019
  • Webtoon is a Korean-style digital comics platform that distributes comics content produced using the characteristic elements of the Internet in a form that can be consumed online. With the recent rapid growth of the webtoon industry and the exponential increase in the supply of webtoon content, the need for effective webtoon content recommendation measures is growing. Webtoons are digital content products that combine pictorial, literary and digital elements. Therefore, webtoons stimulate consumer sentiment by making readers have fun and engaging and empathizing with the situations in which webtoons are produced. In this context, it can be expected that the sentiment that webtoons evoke to consumers will serve as an important criterion for consumers' choice of webtoons. However, there is a lack of research to improve webtoons' recommendation performance by utilizing consumer sentiment. This study is aimed at developing consumer sentiment pattern maps that can support effective recommendations of webtoon content, focusing on consumer sentiments that have not been fully discussed previously. Metadata and consumer sentiments data were collected for 200 works serviced on the Korean webtoon platform 'Naver Webtoon' to conduct this study. 488 sentiment terms were collected for 127 works, excluding those that did not meet the purpose of the analysis. Next, similar or duplicate terms were combined or abstracted in accordance with the bottom-up approach. As a result, we have built webtoons specialized sentiment-index, which are reduced to a total of 63 emotive adjectives. By performing exploratory factor analysis on the constructed sentiment-index, we have derived three important dimensions for classifying webtoon types. The exploratory factor analysis was performed through the Principal Component Analysis (PCA) using varimax factor rotation. The three dimensions were named 'Immersion', 'Touch' and 'Irritant' respectively. Based on this, K-Means clustering was performed and the entire webtoons were classified into four types. Each type was named 'Snack', 'Drama', 'Irritant', and 'Romance'. For each type of webtoon, we wrote webtoon-sentiment 2-Mode network graphs and looked at the characteristics of the sentiment pattern appearing for each type. In addition, through profiling analysis, we were able to derive meaningful strategic implications for each type of webtoon. First, The 'Snack' cluster is a collection of webtoons that are fast-paced and highly entertaining. Many consumers are interested in these webtoons, but they don't rate them well. Also, consumers mostly use simple expressions of sentiment when talking about these webtoons. Webtoons belonging to 'Snack' are expected to appeal to modern people who want to consume content easily and quickly during short travel time, such as commuting time. Secondly, webtoons belonging to 'Drama' are expected to evoke realistic and everyday sentiments rather than exaggerated and light comic ones. When consumers talk about webtoons belonging to a 'Drama' cluster in online, they are found to express a variety of sentiments. It is appropriate to establish an OSMU(One source multi-use) strategy to extend these webtoons to other content such as movies and TV series. Third, the sentiment pattern map of 'Irritant' shows the sentiments that discourage customer interest by stimulating discomfort. Webtoons that evoke these sentiments are hard to get public attention. Artists should pay attention to these sentiments that cause inconvenience to consumers in creating webtoons. Finally, Webtoons belonging to 'Romance' do not evoke a variety of consumer sentiments, but they are interpreted as touching consumers. They are expected to be consumed as 'healing content' targeted at consumers with high levels of stress or mental fatigue in their lives. The results of this study are meaningful in that it identifies the applicability of consumer sentiment in the areas of recommendation and classification of webtoons, and provides guidelines to help members of webtoons' ecosystem better understand consumers and formulate strategies.

Exploring the Temporal Relationship Between Traffic Information Web/Mobile Application Access and Actual Traffic Volume on Expressways (웹/모바일-어플리케이션 접속 지표와 TCS 교통량의 상관관계 연구)

  • RYU, Ingon;LEE, Jaeyoung;CHOI, Keechoo;KIM, Junghwa;AHN, Soonwook
    • Journal of Korean Society of Transportation
    • /
    • v.34 no.1
    • /
    • pp.1-14
    • /
    • 2016
  • In the recent years, the internet has become accessible without limitation of time and location to anyone with smartphones. It resulted in more convenient travel information access both on the pre-trip and en-route phase. The main objective of this study is to conduct a stationary test for traffic information web/mobile application access indexes from TCS (Toll Collection System); and analyzing the relationship between the web/mobile application access indexes and actual traffic volume on expressways, in order to analyze searching behavior of expressway related travel information. The key findings of this study are as follows: first, the results of ADF-test and PP-test confirm that the web/mobile application access indexes by time periods satisfy stationary conditions even without log or differential transformation. Second, the Pearson correlation test showed that there is a strong and positive correlation between the web/mobile application access indexes and expressway entry and exit traffic volume. In contrast, truck entry traffic volume from TCS has no significant correlation with the web/mobile application access indexes. Third, the time gap relationship between time-series variables (i.e., concurrent, leading and lagging) was analyzed by cross-correlation tests. The results indicated that the mobile application access leads web access, and the number of mobile application execution is concurrent with all web access indexes. Lastly, there was no web/mobile application access indexes leading expressway entry traffic volumes on expressways, and the highest correlation was observed between webpage view/visitor/new visitor/repeat visitor/application execution counts and expressway entry volume with a lag of one hour. It is expected that specific individual travel behavior can be predicted such as route conversion time and ratio if the data are subdivided by time periods and areas and utilizing traffic information users' location.

A Study on the Protection of Personal Information in the Medical Service Act (의료법의 개인정보보호에 관한 연구)

  • Sung, Soo-Yeon
    • The Korean Society of Law and Medicine
    • /
    • v.21 no.2
    • /
    • pp.75-103
    • /
    • 2020
  • There is a growing voice that medical information should be shared because it can prepare for genetic diseases or cancer by analyzing and utilizing medical information in big data or artificial intelligence to develop medical technology and improve patient care. The utilization and protection of patients' personal information are the same as two sides of the same coin. Medical institutions or medical personnel should take extra caution in handling personal information with high environmental distinct characteristics and sensitivity, which is different from general information processors. In general, the patient's personal information is processed by medical personnel or medical institutions through the processes of collection, creation, and destruction. Still, the use of terms related to personal information in the Medical Service Act is jumbled, or the scope of application is unclear, so it relies on the interpretation of precedents. For the medical personnel or the founder of the medical institution, in the case of infringement of Article 24(4), it cannot be regarded that it means only medical treatment information among personal information, whether or not it should be treated the same as the personal information under Article 23, because the sensitive information of patients is recorded, saved, and stored in electronic medical records. Although the prohibition of information leakage under Article 19 of the Medical Service Act has a revision; 'secret' that was learned in business was revised to 'information', but only the name was changed, and the benefit and protection of the law is the same as the 'secret' of the criminal law, such that the patient's right to self-determination of personal information is not protected. The Privacy Law and the Local Health Act consider the benefit and protection of the law in 'information learned in business' as the right to self-determination of personal information and stipulate the same penalties for personal information infringement such as leakage, forgery, alteration, and damage. The privacy regulations of the Medical Service Act require that the terms be adjusted uniformly because the jumbled use of terms can confuse information subjects, information processors, and shows certain limitations on the protection of personal information because the contents or scope of the regulations of the Medical Service Law for special corporations and the Privacy Law may cause confusion in interpretation. The patient's personal information is sensitive and must be safely protected in its use and processing. Personal information must be processed in accordance with the protection principle of Privacy Law, and the rights such as privacy, freedom, personal rights, and the right to self-determination of personal information of patients or guardians, the information subject, must be guaranteed.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF