• Title/Summary/Keyword: Computing Contents

Search Result 806, Processing Time 0.028 seconds

Cluster Analysis Study based on Content Types of <Heungbu-jeon> versions (<흥부전> 이본의 내용 유형에 따른 군집 분석 연구)

  • Woonho Choi;Dong Gun Kim
    • Journal of Platform Technology
    • /
    • v.11 no.5
    • /
    • pp.23-36
    • /
    • 2023
  • This study aims to analyze the similarities and dissimilarities of various versions of <Heungbu-jeon> at both micro- and macro-levels using contents analysis techniques and the Hamming distance metrics. The 28 versions of <Heungbu-jeon> were segmented into 341 content units, and for each unit, the value of the content type was encoded. The dissimilarities between content types were compared among all versions by the content unit, respectively. The (dis-)similarities based on the content types of the 28 versions were aggregated and transformed into a distance matrix. The matrix was interpreted by multi-dimensional scaling, resulting into the two-dimensional coordinates. By visualizing the results by multi-dimensional scaling analysis, it was confirmed that the versions of <Heungbu-jeon> can be broadly divided into two groups. Hierarchical clustering and phylogenetic analysis were applied to analyze the clusters of the 28 versions, using the same distance matrix. The results showed that there are five clusters based on the micro-level analysis of (dis-)similarities within two major clusters. This study demonstrated the usefulness of applying digital humanities methods to encode the content of classical literary versions and analyze the data using clustering analysis techniques based on the (dis-)similarity of literary content.

  • PDF

A Proposal of Methods for Extracting Temporal Information of History-related Web Document based on Historical Objects Using Machine Learning Techniques (역사객체 기반의 기계학습 기법을 활용한 웹 문서의 시간정보 추출 방안 제안)

  • Lee, Jun;KWON, YongJin
    • Journal of Internet Computing and Services
    • /
    • v.16 no.4
    • /
    • pp.39-50
    • /
    • 2015
  • In information retrieval process through search engine, some users want to retrieve several documents that are corresponding with specific time period situation. For example, if user wants to search a document that contains the situation before 'Japanese invasions of Korea era', he may use the keyword 'Japanese invasions of Korea' by using searching query. Then, search engine gives all of documents about 'Japanese invasions of Korea' disregarding time period in order. It makes user to do an additional work. In addition, a large percentage of cases which is related to historical documents have different time period between generation date of a document and record time of contents. If time period in document contents can be extracted, it may facilitate effective information for retrieval and various applications. Consequently, we pursue a research extracting time period of Joseon era's historical documents by using historic literature for Joseon era in order to deduct the time period corresponding with document content in this paper. We define historical objects based on historic literature that was collected from web and confirm a possibility of extracting time period of web document by machine learning techniques. In addition to the machine learning techniques, we propose and apply the similarity filtering based on the comparison between the historical objects. Finally, we'll evaluate the result of temporal indexing accuracy and improvement.

A study on the policy about regulation improvement for vitalization of technology based startup (벤처·업 활성화를 위한 규제개선 추진방안의 효과성 분석)

  • Sim, Yong-ho;Gil, Wun-gyu;Kim, Seo-kyun
    • Journal of Internet Computing and Services
    • /
    • v.16 no.4
    • /
    • pp.121-130
    • /
    • 2015
  • Technology based start-up is actively encouraged for job creation and economic performance in Korea. The Korean government has implemented a variety of policy for regulatory improvement to vitalize technology based start-up. In order to maximize the effectiveness of the policy for regulatory improvement should be actively reflect the opinions of policy beneficiaries. In this study, The importance of "The progress plan for regulation improvement about vitalization of start-up(25 contents)" published by the government was analyzed using AHP method. The object of study is the beneficiary of the policy(CEO of ICT sector). Analysis showed that the 25 contents were classified into four(1 - expectation of effect, 2 - urgency of system enforcement, 3 - complement of deficiencies, 4 - after careful consideration). This study has a academic significance to quantitative analysis about importance of policy for regulatory improvement. Also, It can be utilized when policy making and practice about technology based start-up.

Convergence Organization Strategies of the Computational Thinking in Informatics Curriculums (정보과 교육과정에서 융합형 컴퓨팅사고력 구성 전략)

  • Shin, Soo-Bum;Kim, Chul;Park, Namje;Kim, Kap-Su;Sung, Young-Hoon;Jeong, Young-Sik
    • Journal of The Korean Association of Information Education
    • /
    • v.20 no.6
    • /
    • pp.607-616
    • /
    • 2016
  • Computational thinking is complexity and independent subject matter being capable to learn concept of computer science and providing methodology of problem solving. Also many experts have said that computational thinking will be grow essential tool in the further developing information society. Thus our country has been trying to introduce it in the K12 informatics subject matter education. Therefore we proposed a introducing method of computational thinking being appropriated of a character of it in the informatics curriculum. To do this, we analyzed character and worthy of it, advanced model cases introducing it into the curriculum. And we proposed that introduced case of it into curriculum is divided 3 cases archiving computational thinking itself, being connected aim of general subject matter with it and computer science education. According to this advanced cases, this study selected permeative style of computational thinking with the informatics subject matted curriculum. This method is divided achievement criterion into contents and means. also we proposed that contents area of informatics subject matter achievement criterion is composed Computing System, Information Life, Software and means area can be filled with subset of computational thinking. This introducing method can make informatics subject matter education settle subject matter helping problem solving through computer system beyond character of technology oriented subject matter.

An Exploratory Study on the Proper Length of Article in Mobile Era (모바일 시대의 기사 길이에 관한 탐색적 연구)

  • Cheong, Yeon Goo;Cheong, Ye Hyun;Guo, YaQi;Lee, Pu Reum
    • Korean journal of communication and information
    • /
    • v.79
    • /
    • pp.140-164
    • /
    • 2016
  • What is an appropriate length of an article in the mobile era producing new tastes of contents combining computing and mobile communication? Is it still valid to have a lengthy article as high level journalism even in the mobile era? Is there any possibility to have a short article combination to give us readability and the amount of information? This study aims to find some answers to these questions. The length of articles were controlled with a field experiment; from an article of 346 syllables(including spaces between syllables) which does not need finger scrolling on a mobile phone to articles of 633, 1033, 1368 syllables(including spaces between syllables) which frequently appear in newspapers and broadcasting news program. All the main themes were same for 4 articles which have different length. Three hundred and eighty four students viewed one of the 4 articles through mobile phone or newspaper. Each participant checked their preference and evaluated quality on the article, were asked to recall contents of the article. In newspaper group, articles with 346 or 1033 syllables were highly evaluated. Mobile group seemed to prefer articles of 346 or 633 syllables. In conclusion, we need to consider various strategies shortening the length of an article into 346 or 633 syllables as a basic format to meet the neEds of mobile era.

  • PDF

Analysis of Impact of Correlation Between Hardware Configuration and Branch Handling Methods Executing General Purpose Applications (범용 응용프로그램 실행 시 하드웨어 구성과 분기 처리 기법에 따른 GPU 성능 분석)

  • Choi, Hong Jun;Kim, Cheol Hong
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.3
    • /
    • pp.9-21
    • /
    • 2013
  • Due to increased computing power and flexibility of GPU, recent GPUs execute general purpose parallel applications as well as graphics applications. Programmers can use GPGPU by using the APIs from GPU vendors. Unfortunately, computational resources of GPU are not fully utilized when executing general purpose applications because of frequent branch instructions. To handle the branch problem, several warp formations have been proposed. Intuitively, we expect that the warp formations providing higher computational resource utilization show higher performance. Contrary to our expectations, according to simulation results, the performance of the warp formation providing better utilization is lower than that of the warp formation providing worse utilization. This is because warp formation providing high utilization causes serious memory bottleneck due to increased memory request. Therefore, warp formation providing high computation utilization cannot guarantee high performance without proper hardware resources. For this reason, we will analyze the correlation between hardware configuration and warp formation. Our simulation results present the guideline to solve the underutilization problem due to branch instructions when designing recent GPU.

Questionnaire Survey on the Proposed Amendments to the Corporate Tax Law in Alignment with the Full Adoption of the International Financial Reporting Standards in Korea (국제회계기준 도입에 따른 법인세법 개정방향 -재정부 발표 개정안에 대한 세무사 대상 설문조사-)

  • Jang, Ji-Kyung
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.10
    • /
    • pp.334-350
    • /
    • 2010
  • This study aims at investigating the possible effects on the tax accounting practices stemming from adopting the IFRS in financial reporting process. It also seeks for policy implications to help alleviate practical conflicts likely to arise from the inconsistencies between the existing tax law and the tax related IFRS provisions. The results of the survey analysis are summarized as follows: firstly, majority opinion is opposed to the fair value based revaluation of property assets as well as the application of immediate recognition of foreign currency translation gains/losses. It favors the existing provision on asset securitization which adopts sales transaction view. Secondly, most of the respondents oppose the proposed amendments which allows dual classification of lease contracts on the ground. Third, functional currency appears acceptable on a conceptual level, even though a deep concern is expressed regarding the practical feasibility of computing taxable income using financial statements translated on the basis of functional currency on a practical viewpoint. Fourth, many respondents support the existing convention of recognizing depreciation expenses for taxation purposes and are in favor of the separation of accounting and tax books on a long-term basis. Fifth, the majority opinion approves the maintenance of existing tax reconciliation system and the recognition of expenses related with the doubtful accounts on reporting basis. Finally, a concern is raised with regard to the added burden of practical job loads needed to comply with the proposed amendments.

A Threat Assessment Algorithm for Multiple Ground Targets (다수의 대지표적을 위한 위협 평가 알고리즘)

  • Yoon, Moonhyung;Park, Junho;Yi, JeongHoon
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.7
    • /
    • pp.590-599
    • /
    • 2018
  • As a basic information to implement the fire plan that dominates multiple targets effectively under the battle environment with limited resources, such a process is mandatory that gives a priority order to a target with the high level of threat by quantitatively computing the threat level of an individual target through the analysis on the target. However, the study has still remained in the initial level on an evaluation algorithm for the threat level of the ground target. Considering this fact, the present paper proposes the evaluation algorithm for the threat by multiple ground targets. The proposed algorithm has a core point to consider the type of target and protected asset to implement the computation of proximity; set the additional value based on the weights indicating the significance of weapon and protected asset; and compute the threat level of a target that considers the characteristics of the target. The evaluation and verification of performances have been implemented through the simulation and visualization of an algorithm proposed in the present paper. From the performance result, as the proposed algorithm has been able to perform effectively the threat assessment according to the weights indicating the significance of weapons and protected assets under diverse environments where weapons and protected assets are located, high utility and effect are expected when applied to an actual ground weapon system.

Performance Evaluation of the GPU Architecture Executing Parallel Applications (병렬 응용프로그램 실행 시 GPU 구조에 따른 성능 분석)

  • Choi, Hong-Jun;Kim, Cheol-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.5
    • /
    • pp.10-21
    • /
    • 2012
  • The role of GPU has evolved from graphics-specific processing to general-purpose processing with the development of unified shader core architecture. Especially, execution methods for general-purpose parallel applications using GPU have been researched intensively, since the parallel hardware architecture can be utilized efficiently when the parallel applications are executed. However, current GPU architecture has limitations in executing general-purpose parallel applications, since the GPU is not specialized for general-purpose computing yet. To improve the GPU performance when general-purpose parallel applications are executed, the GPU architecture should be evolved. In this work, we analyze the GPU performance according to the architecture varying the number of cores and clock frequency. Our simulation results show that the GPU performance improves by up to 125.8% and 16.2% as the number of cores increases and the clock frequency increases, respectively. However, note that the improvement of the GPU performance is saturated even though the number of cores increases and the clock frequency increases continuously, since the data cannot be provided to the GPU due to the limit of memory bandwidth. Consequently, to accomplish high performance effectiveness on GPU, computational resources must be more suitably considered.

Comparative analysis on Social Network Service users access : Based on Twitter, Facebook, KakaoStory (소셜네트워크서비스 사용자 접속요인 비교분석 : 트위터, 페이스북, 카카오스토리를 중심으로)

  • Hong, Sam-Yull;Oh, Jae-Cheol
    • Journal of Internet Computing and Services
    • /
    • v.13 no.6
    • /
    • pp.9-16
    • /
    • 2012
  • Social Network Service (SNS) such as Twitter and Facebook has explosively grown nationwide since iPhone was introduced to Korea in 2009. In addition, KakaoStory has recently opened and joined to the SNS market, and it has grown to one of the most popular SNS in the domestic market in a short period of time. Social Network Service supports not only the formation of relationship between SNS users in common interests but also various activities such as management of personal connections and the sharing of information or contents. These three types of SNS have several common functions of sharing and distributing various contents rooted on the personal relationship formed through SNS. As each SNS user has specific reasons for the use of each service, a survey was conducted targeting those who use all of Twitter, Facebook, and KakaoStory was drawn by the statistical analyses of survey answers on users' reasons for each service. This result of study suggests factors to consider in order to exploit a new SNS or to enhance an existing service and can be used as a standard of which SNS for users to select for their own different purposes. It will also provide the basic data for the trust formation, one of the ethics in the upcoming Social Era.