• Title/Summary/Keyword: COMMENTS

Search Result 985, Processing Time 0.026 seconds

Incorporating Social Relationship discovered from User's Behavior into Collaborative Filtering (사용자 행동 기반의 사회적 관계를 결합한 사용자 협업적 여과 방법)

  • Thay, Setha;Ha, Inay;Jo, Geun-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.2
    • /
    • pp.1-20
    • /
    • 2013
  • Nowadays, social network is a huge communication platform for providing people to connect with one another and to bring users together to share common interests, experiences, and their daily activities. Users spend hours per day in maintaining personal information and interacting with other people via posting, commenting, messaging, games, social events, and applications. Due to the growth of user's distributed information in social network, there is a great potential to utilize the social data to enhance the quality of recommender system. There are some researches focusing on social network analysis that investigate how social network can be used in recommendation domain. Among these researches, we are interested in taking advantages of the interaction between a user and others in social network that can be determined and known as social relationship. Furthermore, mostly user's decisions before purchasing some products depend on suggestion of people who have either the same preferences or closer relationship. For this reason, we believe that user's relationship in social network can provide an effective way to increase the quality in prediction user's interests of recommender system. Therefore, social relationship between users encountered from social network is a common factor to improve the way of predicting user's preferences in the conventional approach. Recommender system is dramatically increasing in popularity and currently being used by many e-commerce sites such as Amazon.com, Last.fm, eBay.com, etc. Collaborative filtering (CF) method is one of the essential and powerful techniques in recommender system for suggesting the appropriate items to user by learning user's preferences. CF method focuses on user data and generates automatic prediction about user's interests by gathering information from users who share similar background and preferences. Specifically, the intension of CF method is to find users who have similar preferences and to suggest target user items that were mostly preferred by those nearest neighbor users. There are two basic units that need to be considered by CF method, the user and the item. Each user needs to provide his rating value on items i.e. movies, products, books, etc to indicate their interests on those items. In addition, CF uses the user-rating matrix to find a group of users who have similar rating with target user. Then, it predicts unknown rating value for items that target user has not rated. Currently, CF has been successfully implemented in both information filtering and e-commerce applications. However, it remains some important challenges such as cold start, data sparsity, and scalability reflected on quality and accuracy of prediction. In order to overcome these challenges, many researchers have proposed various kinds of CF method such as hybrid CF, trust-based CF, social network-based CF, etc. In the purpose of improving the recommendation performance and prediction accuracy of standard CF, in this paper we propose a method which integrates traditional CF technique with social relationship between users discovered from user's behavior in social network i.e. Facebook. We identify user's relationship from behavior of user such as posts and comments interacted with friends in Facebook. We believe that social relationship implicitly inferred from user's behavior can be likely applied to compensate the limitation of conventional approach. Therefore, we extract posts and comments of each user by using Facebook Graph API and calculate feature score among each term to obtain feature vector for computing similarity of user. Then, we combine the result with similarity value computed using traditional CF technique. Finally, our system provides a list of recommended items according to neighbor users who have the biggest total similarity value to the target user. In order to verify and evaluate our proposed method we have performed an experiment on data collected from our Movies Rating System. Prediction accuracy evaluation is conducted to demonstrate how much our algorithm gives the correctness of recommendation to user in terms of MAE. Then, the evaluation of performance is made to show the effectiveness of our method in terms of precision, recall, and F1-measure. Evaluation on coverage is also included in our experiment to see the ability of generating recommendation. The experimental results show that our proposed method outperform and more accurate in suggesting items to users with better performance. The effectiveness of user's behavior in social network particularly shows the significant improvement by up to 6% on recommendation accuracy. Moreover, experiment of recommendation performance shows that incorporating social relationship observed from user's behavior into CF is beneficial and useful to generate recommendation with 7% improvement of performance compared with benchmark methods. Finally, we confirm that interaction between users in social network is able to enhance the accuracy and give better recommendation in conventional approach.

Investigating Dynamic Mutation Process of Issues Using Unstructured Text Analysis (비정형 텍스트 분석을 활용한 이슈의 동적 변이과정 고찰)

  • Lim, Myungsu;Kim, Namgyu
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.1
    • /
    • pp.1-18
    • /
    • 2016
  • Owing to the extensive use of Web media and the development of the IT industry, a large amount of data has been generated, shared, and stored. Nowadays, various types of unstructured data such as image, sound, video, and text are distributed through Web media. Therefore, many attempts have been made in recent years to discover new value through an analysis of these unstructured data. Among these types of unstructured data, text is recognized as the most representative method for users to express and share their opinions on the Web. In this sense, demand for obtaining new insights through text analysis is steadily increasing. Accordingly, text mining is increasingly being used for different purposes in various fields. In particular, issue tracking is being widely studied not only in the academic world but also in industries because it can be used to extract various issues from text such as news, (SocialNetworkServices) to analyze the trends of these issues. Conventionally, issue tracking is used to identify major issues sustained over a long period of time through topic modeling and to analyze the detailed distribution of documents involved in each issue. However, because conventional issue tracking assumes that the content composing each issue does not change throughout the entire tracking period, it cannot represent the dynamic mutation process of detailed issues that can be created, merged, divided, and deleted between these periods. Moreover, because only keywords that appear consistently throughout the entire period can be derived as issue keywords, concrete issue keywords such as "nuclear test" and "separated families" may be concealed by more general issue keywords such as "North Korea" in an analysis over a long period of time. This implies that many meaningful but short-lived issues cannot be discovered by conventional issue tracking. Note that detailed keywords are preferable to general keywords because the former can be clues for providing actionable strategies. To overcome these limitations, we performed an independent analysis on the documents of each detailed period. We generated an issue flow diagram based on the similarity of each issue between two consecutive periods. The issue transition pattern among categories was analyzed by using the category information of each document. In this study, we then applied the proposed methodology to a real case of 53,739 news articles. We derived an issue flow diagram from the articles. We then proposed the following useful application scenarios for the issue flow diagram presented in the experiment section. First, we can identify an issue that actively appears during a certain period and promptly disappears in the next period. Second, the preceding and following issues of a particular issue can be easily discovered from the issue flow diagram. This implies that our methodology can be used to discover the association between inter-period issues. Finally, an interesting pattern of one-way and two-way transitions was discovered by analyzing the transition patterns of issues through category analysis. Thus, we discovered that a pair of mutually similar categories induces two-way transitions. In contrast, one-way transitions can be recognized as an indicator that issues in a certain category tend to be influenced by other issues in another category. For practical application of the proposed methodology, high-quality word and stop word dictionaries need to be constructed. In addition, not only the number of documents but also additional meta-information such as the read counts, written time, and comments of documents should be analyzed. A rigorous performance evaluation or validation of the proposed methodology should be performed in future works.

Current Status and Success Strategies of Crowdfunding for Start-up in Korea (국내 창업분야 크라우드펀딩(Crowdfunding) 현황과 성공전략)

  • Yoo, Younggeul;Jang, Ikhoon;Choe, Youngchan
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.9 no.4
    • /
    • pp.1-12
    • /
    • 2014
  • It is essential factor for business operation to raise funds effectively. However, in Korea, many start-ups and small businesses have difficulties in fund-raising. In recent years, crowdfunding, a new method for funding a project of individuals or organizations by raising monetary contributions from a large number of people, has been growing up simultaneously with diffusion of social media. Crowdfunding is on early stage in Korea, and the majority of projects are focused on cultural or art categories. There is high proportion of projects that have social value in start-up sector. Crowdfunding in Korea has great potential because success rate of it is much higher than its of advanced countries, although market size is much smaller than them. The purpose of this paper is to propose success strategies of crowdfunding for start-up through case study. 5 crowdfunding platforms of Korea and Kickstarter, the platform of United States were investigated. Then we checked the figures related to the operation of the whole Korean projects on start-up. Finally, we made comparison between the cases of success and failure by analyzing 8 project characteristics. The study shows that it were the differences in trustworthiness and activeness of project creator, value of reward and efforts for interactivity that have great effects on success of the project. Whereas there was no significant influence of societal contribution and sponsor engagement. The thesis provides success strategies of crowdfunding for start-up as follows. Firstly, creator of the project should make support base by enthusiastic activites before launching funding project. Secondly, there should be contents that can easily show the process of business development in the project information. Thirdly, there must be appropriate design of rewards for each amounts of support money. Finally, efforts for interactivity, such as frequent updates, response for comments and SNS posting, should be followed after the launch of the project.

  • PDF

A Study on Detection Methodology for Influential Areas in Social Network using Spatial Statistical Analysis Methods (공간통계분석기법을 이용한 소셜 네트워크 유력지역 탐색기법 연구)

  • Lee, Young Min;Park, Woo Jin;Yu, Ki Yun
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.22 no.4
    • /
    • pp.21-30
    • /
    • 2014
  • Lately, new influentials have secured a large number of volunteers on social networks due to vitalization of various social media. There has been considerable research on these influential people in social networks but the research has limitations on location information of Location Based Social Network Service(LBSNS). Therefore, the purpose of this study is to propose a spatial detection methodology and application plan for influentials who make comments about diverse social and cultural issues in LBSNS using spatial statistical analysis methods. Twitter was used to collect analysis object data and 168,040 Twitter messages were collected in Seoul over a month-long period. In addition, 'politics,' 'economy,' and 'IT' were set as categories and hot issue keywords as given categories. Therefore, it was possible to come up with an exposure index for searching influentials in respect to hot issue keywords, and exposure index by administrative units of Seoul was calculated through a spatial joint operation. Moreover, an influential index that considers the spatial dependence of the exposure index was drawn to extract information on the influential areas at the top 5% of the influential index and analyze the spatial distribution characteristics and spatial correlation. The experimental results demonstrated that spatial correlation coefficient was relatively high at more than 0.3 in same categories, and correlation coefficient between politics category and economy category was also more than 0.3. On the other hand, correlation coefficient between politics category and IT category was very low at 0.18, and between economy category and IT category was also very weak at 0.15. This study has a significance for materialization of influentials from spatial information perspective, and can be usefully utilized in the field of gCRM in the future.

Trends and Prospects of N. Korea Military Provocations After the Sinking of ROKS Cheon-an (천안함 폭침 이후 북한의 군사도발 양상과 전망)

  • Kim, Sung-Man
    • Strategy21
    • /
    • s.34
    • /
    • pp.58-92
    • /
    • 2014
  • Even after S. Korea took 5.24 Measure(24 May 2014), N. Korea has not stopped raising provocations such as the shelling of Yeonpyeong Island, electronic and cyber attacks. To make matters worse, the communist country lunched long-range missiles(twice) and conducted 3rd nuclear test, escalating tensions which could possibly lead to an all-out war. Korean Government failed to respond properly. However, escalation into an all-out war was deterred by the CFC immediately carrying out its peacetime duty(CODA). The US made a rapid dispatch of its augmentation forces(Aircraft carrier, nuclear-powered submarine, strategic bomber, F-22) to the Korean Peninsula. In recognition of the importance of the Combined Forces Command, since May 2013 the Park Geun-Hye Administration has been pushing ahead with re-postponement of Wartime Operational Control Transfer(which initially meant the disassembling of the CFC as of 1 December 2015) More recently, there has been a series of unusual indicators from the North. Judging from its inventory of 20 nuclear weapons, 1,000 ballistic missiles and biochemical weapons, it is safe to say that N. Korea has gained at least war deterrence against S. Korea. Normally a nation with nuclear weapons shrink its size of conventional forces, but the North is pursuing the opposite, rather increasing them. In addition, there was a change of war plan by N. Korea in 2010, changing 'Conquering the Korean Peninsula' to 'Negotiation after the seizure of the Greater Seoul Metropolitan Area(GSMA)' and establishing detailed plans for wartime projects. The change reflects the chain reaction in which requests from pro-north groups within the South will lead to the proclamation of war. Kim, Jeong-Un, leader of N. Korean regime, sent threatening messages using words such as 'exercising a nuclear preemptive strike right' and 'burning of Seoul'. Nam, Jae-June, Director of National Intelligence Service, stated that Kim, Jung-Un is throwing big talks, saying communization of the entire Korean Peninsula will come within the time frame of 3 years. Kim, Gwan-Jin, Defense Minister, shared an alarming message that there is a high possibility that the North will raise local provocations or a full-fledged war whenever while putting much emphasis on defense posture. As for the response concept of the Korean Government, it has been decided that 'ROK·US Combined Local Provocation Counter-Measure' will be adopted to act against local provocations from the North. Major provocation types include ▲ violation of the Northern Limit Line(NLL) with mobilization of military ships ▲ artillery provocations on Northwestern Islands ▲ low altitude airborne intrusion ▲ rear infiltration of SOF ▲ local conflicts within the Military Demarcation Line(MDL) ▲ attacking friendly ships by submarines. Counter-measures currently established by the US involves the support from USFK and USFJ. In order to keep the sworn promise, the US is reinforcing both USFK and USFJ. An all-out war situation will be met by 'CFC OPLAN5027' and 'Tailored Expansion Deterrence Forces' with the CFC playing a central role. The US augmentation forces stands at 690,000 troops, some 160 ships, 2,000 aircraft and this comprise 50% of US total forces, which is estimated to be ninefold of Korean forces. The CFC needs to be in center in handling both local provocations and an all-out war situation. However, the combat power of S. Korean conventional forces is approximately around 80% of that of N. Korea, which has been confirmed from comments made by Kim, Gwan-Jin, Defense Minister, during an interpellation session at the National Assembly. This means that S. Korean forces are not much growing. In particular, asymmetric capabilities of the North is posing a serious threat to the South including WMD, cyber warfare forces, SOF, forces targeting 5 Northwestern Islands, sub-surface and amphibious assault forces. The presence of such threats urgently requires immediate complementary efforts. For complementary efforts, the Korean Government should consider ① reinforcement of Korean forces; putting a stoppage to shrinking military, acquisition of adequate defense budget, building a missile defense and military leadership structure validity review, ② implementation of military tasks against the North; disciplinary measures on the sinking of ROKS Cheon-an/shelling of Yeonpyeong Islands, arrangement of inter-Korean military agreements, drawing lessons from studies on the correlation between aid for N. Korea, execution of inter-Korean Summit and provocations from the North, and ③ bolstering the ROK·US alliance; disregarding wartime operational control transfer plan(disassembling of CFC) and creation of a combined division.

Application and Development of Teaching-Learning Plan for 'Sustainable Residence Created with Neighbor' ('이웃과 더불어 만드는 지속가능한 주거생활' 교수.학습 과정안 개발 및 적용)

  • Park, Mi-Ra;Cho, Jae-Soon
    • Journal of Korean Home Economics Education Association
    • /
    • v.22 no.3
    • /
    • pp.1-18
    • /
    • 2010
  • The purpose of this study was to develop a teaching-learning process plan for sustainable residing creating with neighbors and to apply it to the housing section of Technology-Home Economics according to the 2007 Revised Curriculum. Teachinglearning method solving practical problems was used for the teaching-learning process plans of 6-session lessons according to the ADDIE model. In the development stage, 17 activity materials and 15 teaching learning materials (6 reading texts, 6 moving pictures, 2 internet and 1 image materials) were developed. for the 6-session lessons, based on the stages of solving practical problems. The plans applied to the 3 classes of 8, 9, and 10th grade of the H. junior and senior high school in Myun district in Kyungbook during Sept. 1st to 14th, 2009. The results showed that students actively participated when the contents and materials were related to their own experience. The 6-session lessons about sustainable residing creating with neighbors was significantly increased the sense of community between before and after. Each of the 4 stages of the teachinglearning method solving practical problems were highly participated by the students. The satisfaction with the contents and methods of the 6-session lessons were evaluated over medium to somewhat higher levels. The practical activities to solve the community space and programs were got positive comments. Problem solving process and presentation and discussion were needed to learn more. Those results might support that the teachinglearning process plan this research developed. would be appropriate to the lessons for sustainable residing creating with neighbors.

  • PDF

The protective effects of monoclonal antibodies in mice from Naegleyia fowleri infection (마우스에서 Naegleria fowleri감염에 대한 단세포를 항체의 영향)

  • So, Ui-Yeong;Sin, Ho-Jun;Im, Gyeong-Il
    • Parasites, Hosts and Diseases
    • /
    • v.30 no.2
    • /
    • pp.113-124
    • /
    • 1992
  • Protective effects of monoclonal antibodies against n. fowleri were comparatively studied. nALB/c mice were treated with two types of monoclonal antibodies, Nf 2 and Nf 154, before and after the infection with N. fowleri. The mortality and mean survival times were then compared. Also, direct effect of the monoclonal antibodies on the N. fewleri trophozoites in vitro were observed. In vitro protective effects of the monoclonal antibodies were also studied in cells infected with N. fowleri. The observed results are summarized as follows: 1. Among mice pretreated twice before the infection with monoclonal antibody Nf 2 (McAb Nf 2), only 15.8% were killed, and the mean survival time was 17, 7 days. This was not much different from the mice pretreated once, as the mortality and mean survival time were 16.7% and 17 days. Those effects were compatible with monoclonal antibody Nf 154 (McAb Nf 154). The above findings contrast with the mortality and mean survival time of the control mice, which were 22.7% and 14.6 days respectively. 2. Mice which received twice the McAb Nf 2 following N. fowleri infection incurred a 19.4% mortality rate with 13.6 days survival time; 17.9% and 15.8 days with on time administration, in contrast to the 25% and 14.6 days in the control group. 3. Marked agglutination effect of McAb Nf 2 or McAb Nf 154 were observed on n. fowkwi, trophogoites. 4. When N, fowleri trophozoites were treated with McAb Nf 2 or McAb Mf 154 combined with comments, the proliferation rate was more significantly suppressed than in that the control, 5. N. fowleri trophozoites treated with McAb Nf 2 or McAb Nf 154 showed an increased number of swollen mitochondria, disfigured cisternal, lipid droplets, and osmiophilic granules in the cytoplasm. 6. A remarkable protective effect of monoclonal antibodies was noticed in CHO cells infected with N. fowleri. More than 90.6% of the infected CHO cells survived, contrasted with 27% of untreated cells. The overall results in this study suggest that N. fewleri treated with monoclonal antibodies against N. fowleri reduce the mortality and prolong the survivial time of the mice when the antibodies are administered before the infection. The protective effect of the monoclonal antibodies is surmised being caused by agglutination of the trophozoites.

  • PDF

Design of Truck Escape Ramps (자동차 긴급 피난 차선의 계획 설계)

  • 구본충
    • Journal of the Korean Professional Engineers Association
    • /
    • v.28 no.4
    • /
    • pp.54-75
    • /
    • 1995
  • This synthesis has been prepared from a review of literature on Truck Escape Ramps technology and a survey of current practice by state department of transportation. Their locations have been determined usually from a combination of accident experience and en-gineering judgement, but new tools are emerging that can identify needs and sites without waiting for catastrophic accidents to happen. The Grade Severity Rating Systems holds promise in this regard. Design Procedures for truck excape ramps continue to evolve. Gravel arrester beds are clearly the preferred choice across the country Rounded aggregate, uniformly graded in the approximate size range of 13 to 18mm. Tech-nical publications typically have dassified TER types as paved gravity, sandpile, and ar-rester bed ramps. The design speed for vehicle entry into the ramp in critical to the deter-mination of ramp length. An escape ramp should be designed for a minimum entry speed of 130km/hr, a 145km/hr design being preferred. The ramps should be straight and their angle to the roadway align-ment should be as possible. The grade of truck escape ramps show the adjustment of ramp design to local topography, such as the tradeoff of ramp length against earthwork requirements. A width of 9 to 12m would more safety acommodate two or more outof con-trol vehicles. Reguarding comments on the most effective material, most respondents cited their own specification or referred to single graded, rounded pea gravel. The consensus essentially Is that single graded, well -rounded gravel is the most desirable material for use in arrester beds. The arrester beds should be constructed with a minimum aggregate depth of 30cm. Successful ramps have used depths between 30 and 90cm.

  • PDF

A Scalable and Modular Approach to Understanding of Real-time Software: An Architecture-based Software Understanding(ARSU) and the Software Re/reverse-engineering Environment(SRE) (실시간 소프트웨어의 조절적${\cdot}$단위적 이해 방법 : ARSU(Architecture-based Software Understanding)와 SRE(Software Re/reverse-engineering Environment))

  • Lee, Moon-Kun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.3159-3174
    • /
    • 1997
  • This paper reports a research to develop a methodology and a tool for understanding of very large and complex real-time software. The methodology and the tool mostly developed by the author are called the Architecture-based Real-time Software Understanding (ARSU) and the Software Re/reverse-engineering Environment (SRE) respectively. Due to size and complexity, it is commonly very hard to understand the software during reengineering process. However the research facilitates scalable re/reverse-engineering of such real-time software based on the architecture of the software in three-dimensional perspectives: structural, functional, and behavioral views. Firstly, the structural view reveals the overall architecture, specification (outline), and the algorithm (detail) views of the software, based on hierarchically organized parent-chi1d relationship. The basic building block of the architecture is a software Unit (SWU), generated by user-defined criteria. The architecture facilitates navigation of the software in top-down or bottom-up way. It captures the specification and algorithm views at different levels of abstraction. It also shows the functional and the behavioral information at these levels. Secondly, the functional view includes graphs of data/control flow, input/output, definition/use, variable/reference, etc. Each feature of the view contains different kind of functionality of the software. Thirdly, the behavioral view includes state diagrams, interleaved event lists, etc. This view shows the dynamic properties or the software at runtime. Beside these views, there are a number of other documents: capabilities, interfaces, comments, code, etc. One of the most powerful characteristics of this approach is the capability of abstracting and exploding these dimensional information in the architecture through navigation. These capabilities establish the foundation for scalable and modular understanding of the software. This approach allows engineers to extract reusable components from the software during reengineering process.

  • PDF

Analysis of Communication of Dental Hygienist in Oral Hygiene Instruction during Scaling (치과위생사의 스케일링시 구강보건교육의 의사소통분석)

  • Kang, Su-Kyung;Bae, Hyun-Sook;Lim, Soon-Ryun
    • Journal of dental hygiene science
    • /
    • v.14 no.4
    • /
    • pp.546-553
    • /
    • 2014
  • The purpose of this study was to investigate the actual condition of communication of dental hygienist in oral hygiene instruction during scaling. The research was intended for 67 dental hygienists who worked dental hospitals and clinics. Oral hygiene instruction during scaling was audiotaped. Pearson correlation analysis, t-test, one-way ANOVA, and chi-squared test were conducted. The results gained by the research were as follows. An analysis of 67 dental hygienists has found that 63 dental hygienists (94%) educated the patients with dentiform and 65 of them (97%) did rolling method. Thirty-three of them (49.3%) recommended oral care products to the patients. Only 14 of all educators (21%) said simple greetings and educated importance of care of subjects' teeth, side effect of scaling, when they finished all the scaling stage. The average time of oral hygiene education was 161.3 seconds. In detail, the dental hygienists told 155.0 seconds, the patients did 6.3 seconds on average. The percentage of education time without patients' comments and dialogue each other were 35.8% and 37.3% respectively. The conversation frequency according to the education level of dental hygienist showed significant difference (p<0.05). There was a negative correlation between total education time and patients coming for scaling per day and there was a positive correlation between total number of questions and patient talking time. The result of chi-squared test showed that there was significant difference on asking regards depending on setting a limitation of scaling time (p<0.05). The research showed that the dental hygienists seem to educate the patients mechanically, uniformly rather than educate them according to their oral hygiene condition.