• Title/Summary/Keyword: End-user

Search Result 1,226, Processing Time 0.022 seconds

Performance Evaluation of Re-ranking and Query Expansion for Citation Metrics: Based on Citation Index Databases (인용 지표를 이용한 재순위화 및 질의 확장의 성능 평가 - 인용색인 데이터베이스를 기반으로 -)

  • HyeKyung Lee;Yong-Gu lee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.57 no.3
    • /
    • pp.249-277
    • /
    • 2023
  • The purpose of this study is to explore the potential contribution of citation metrics to improving the search performance of citation index databases. To this end, the study generated ten queries in the field of library and information science and conducted experiments based on the relevance assessment using 3,467 documents retrieved from the Web of Science and 60,734 documents published in 85 SSCI journals in the field of library and information science from 2000 to 2021. The experiments included re-ranking of the top 100 search results using citation metrics and search methods, query expansion experiments using vector space model retrieval systems, and the construction of a citation-based re-ranking system. The results are as follows: 1) Re-ranking using citation metrics differed from Web of Science's performance, acting as independent metrics. 2) Combining query term frequencies and citation counts positively affected performance. 3) Query expansion generally improved performance compared to the vector space model baseline. 4) User-based query expansion outperformed system-based. 5) Combining citation counts with suitability documents affected ranking within top suitability documents.

Literature Review of Commercial Discrete-Event Simulation Packages (상용 이산사건 시뮬레이터 패키지들에 대한 선행연구 분석)

  • Jihyeon Park;Gysun Hwang
    • Journal of the Korea Society for Simulation
    • /
    • v.32 no.1
    • /
    • pp.1-11
    • /
    • 2023
  • Smart factory environments and digital twin environments are established, and today's factories accumulate vast amounts of production data and are managed in real time as visualized results suitable for user convenience. Production simulation techniques are in the spotlight as a way to prevent delays in delivery and predict factory volatility in situations where production schedule planning becomes difficult due to the diversification of production products. With the development of the digital twin environment, new packages are developed and functions of existing packages are updated, making it difficult for users to make decisions on which packages to use to develop simulations. Therefore, in this study, the concept of Discrete Event Simulation (DES) performed based on discrete events is defined, and the characteristics of various simulation packages were compared and analyzed. To this end, studies that solved real problems using discrete event simulation software for 10 years were analyzed, and three types of software used by the majority were identified. In addition, each package was classified by simulation technique, type of industry, subject of simulation, country of use, etc., and analysis results on the characteristics and usage of DES software were provided. The results of this study provide a basis for selection to companies and users who have difficulty in selecting discrete event simulation package in the future, and it is judged that they will be used as basic data.

A study on the economic performance measurement model of industrial safety design (산업안전디자인의 경제적 성과측정 모델 연구)

  • Jinho, Ahn
    • Journal of Service Research and Studies
    • /
    • v.13 no.1
    • /
    • pp.176-185
    • /
    • 2023
  • This study is a study to develop a model to measure the economic performance when introducing industrial safety design, which is emerging as a necessity for industrial accident prevention measures due to the increase in the industrial site nursing accident rate and the enforcement of the Serious Accident Punishment Act. To this end, studies on the concept of industrial safety management and industrial safety design and economic performance measurement in the field of industrial safety were conducted in terms of theoretical background. Based on the theoretical background, opinions on drafts of related indicators were collected through user opinion surveys, and focus group interviews and Delphi techniques were conducted with experts, and research was conducted to advance the model. In order to secure objectivity, the causal relationship between the introduction of industrial safety design, cost reduction effect, and sales increase effect was tested through regression analysis. After going through these steps, two models of economic performance measurement of industrial safety design were finally developed: a model based on the first-stage disaster loss cost reduction effect and a second-stage sales increase effect. In order to be applied to actual industrial sites, it should be able to be presented as a standard for the degree of service level agreement of industrial safety design beyond a simple checklist.

A Study on the Introduction of Library Services Based on Blockchain (블록체인 기반의 도서관 서비스 도입 및 활용방안에 관한 연구)

  • Ro, Ji-Yoon;Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.371-401
    • /
    • 2022
  • If the blockchain means storing information in a distributed environment that cannot be forged or altered, it is mentioned that this is similar to what librarians collect, preserve, and share authoritative information. In this way, this study examined blockchain technology as a way to collect and provide reliable information, increase work efficiency inside and outside the library, and strengthen cooperative networks. This study attempted to propose various ways to utilize blockchain technology in book relations based on literature surveys and case studies in other fields. To this end, this study first analyzed the field and cases of blockchain application to confirm the possibility and value of blockchain application in the library field, and proposed 12 ways to utilize it based on this. The utilization model was proposed by dividing it into operation and service sectors. In the operation sector, it is a digital identity-based user record storage and authentication function, transparent management and traceable monitoring function, voting-based personnel and recruitment system, blockchain governance-based network efficiency function, and blockchain-based next-generation device management and information integration function. The service sector includes improved book purchase and sharing efficiency due to simplification of intermediaries, digital content copyright protection and management functions, customized service provision based on customer behavior analysis, blockchain-based online learning platforms, sharing platforms, and P2P-based reliable information sharing platforms.

A Study on the Effect of Non-Face-to-Face Service on Relieving Library Anxiety (비대면 서비스가 도서관 불안해소에 미치는 영향에 관한 연구: K대학도서관 이용자를 중심으로)

  • Lee, Kyunghwa;Noh, Younghee
    • Journal of the Korean Society for information Management
    • /
    • v.39 no.1
    • /
    • pp.17-44
    • /
    • 2022
  • The purpose of this study was to present a plan on the effect of non-face-to-face services on library anxiety facilities by analyzing the library anxiety factors of university library users. To this end, we look at the cases of university library user service response activities in response to the COVID-19 crisis and select 40 schools with the highest number of library visitors per student from among domestic four-year university libraries with 5,000 or more and less than 10,000 students. Methods of information service and program cases were analyzed, and K-LAS was reconstructed and surveyed for current students using the K university library, and frequency analysis, descriptive statistical analysis, exploratory factor analysis, and reliability analysis, correlation analysis, and multiple regression analysis were applied to analyze the library anxiety factors of users. Identify the relationship between 5 library anxiety factors and non-face-to-face service activation factors, such as physical/environmental factors of the library, data search selection factors, digital information system factors, librarian (staff) factors, and psychological/emotional factors, and activate non-face-to-face services. The influence of these factors on library anxiety factors was examined, and as a result, it was found that non-face-to-face service activation factors had the greatest influence on library digital information system anxiety factors. Based on the analysis results, it was attempted to derive a plan to relieve users' library anxiety by activating non-face-to-face services.

A Study on the Visualization of Data in Virtual Space utilizing Realistic Exhibition Contents - Focusing on the application of the Tamed Cloud clustering algorithm in 70mK project (전시콘텐츠에 구현된 가상공간 내 데이터 시각화 연구 - 70mK의 Tamed Cloud 군집형 알고리즘 적용을 중심으로)

  • Sungmin Kang;Daniel H. Byun
    • Trans-
    • /
    • v.15
    • /
    • pp.1-24
    • /
    • 2023
  • This study examines the application of data visualization technology using a clustered data algorithm called 'Tamed Cloud' to virtual spaces and seeks the possibility of implementing it in various types of realistic exhibition contents. To this end, we first attempt to classify virtual reality (VR) exhibition contents starting with COVID-19, and summarize technologies applied. Also, various realistic exhibition contents provide visitors with an opportunity to appreciate the artworks through online and virtual exhibitions. In this trend, virtual reality and augmented reality (AR) technologies have been introduced, allowing visitors to enjoy the artwork more immersively, and the possibility of realistic exhibition content with interaction between the artwork and the user is also being demonstrated. Based on this background, this study examines the history of exhibition contents by dividing them before and after the advent of virtual reality technology, and examines how the clustered algorithm technology called Tamed Cloud was applied to virtual space and implemented as a realistic exhibition content in <70mK> project. By synthesizing all of this, we propose a convergence method of data visualization, virtual reality, and realistic content, and propose it as a new alternative to realistic exhibition content in virtual space.

A Study on Management and Improvement of P University Libraries with Viewpoint of Five Laws of Library Science: Focused on the first law and the fifth law (도서관학 5법칙으로 본 P대학도서관 운영과 개선방안)

  • Sun-Gu Jeon;Yong-Jae Lee
    • Journal of Korean Library and Information Science Society
    • /
    • v.54 no.3
    • /
    • pp.57-80
    • /
    • 2023
  • The purpose of this study is to examine the current status of university library operation through the five laws of library science and suggest ways to improve it. To this end, the operation status of four national and public university libraries was analyzed with the scope of the study as the Busan area. Furthermore, for an in-depth investigation, the P University library in Busan was examined as a case. The operation status of national and public university libraries in the Busan region was analyzed by dividing them into the categories of university library collection materials, facilities, staff, material purchase costs, and users from 2018 to 2022. In particular, there was a decrease in users and a shortage of librarians due to COVID-19. In the case study, the operation status of P University library was investigated focusing on the first and fifth laws of Ranganathan's five laws of library science. In the first law, the study was conducted on the aspects of access to and use of the collection, library location, usage time and book lending, and staff. In the fifth law, the investigation was divided into service improvement aspects according to changes in digital technology of P University library and library environment improvement aspects according to changes in user characteristics. As a result of the study, 'establishment of library space composition strategy', 'establishment of blue ocean strategy', and 'expansion of recruitment and deployment of librarians' were suggested as improvement plans.

A Study on DID-based Vehicle Component Data Collection Model for EV Life Cycle Assessment (전기차 전과정평가를 위한 DID 기반 차량부품 데이터수집 모델 연구)

  • Jun-Woo Kwon;Soojin Lee;Jane Kim;Seung-Hyun Seo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.10
    • /
    • pp.309-318
    • /
    • 2023
  • Recently, each country has been moving to introduce an LCA (Life Cycle Assessment) to regulate greenhouse gas emissions. The LCA is a mean of measuring and evaluating greenhouse gas emissions generated over the entire life cycle of a vehicle. Reliable data for each electric vehicle component is needed to increase the reliability of the LCA results. To this end, studies on life cycle evaluation models using blockchain technology have been conducted. However, in the existing model, key product information is exposed to other participants. And each time parts data information is updated, it must be recorded in the blockchain ledger in the form of a transaction, which is inefficient. In this paper, we proposed a DID(Decentralized Identity)-based data collection model for LCA to collect vehicle component data and verify its validity effectively. The proposed model increases the reliability of the LCA by ensuring the validity and integrity of the collected data and verifying the source of the data. The proposed model guarantees the validity and integrity of collected data. As only user authentication information is shared on the blockchain ledger, the model prevents indiscriminate exposure of data and efficiently verifies and updates the source of data.

Efficient Stack Smashing Attack Detection Method Using DSLR (DSLR을 이용한 효율적인 스택스매싱 공격탐지 방법)

  • Do Yeong Hwang;Dong-Young Yoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.9
    • /
    • pp.283-290
    • /
    • 2023
  • With the recent steady development of IoT technology, it is widely used in medical systems and smart TV watches. 66% of software development is developed through language C, which is vulnerable to memory attacks, and acts as a threat to IoT devices using language C. A stack-smashing overflow attack inserts a value larger than the user-defined buffer size, overwriting the area where the return address is stored, preventing the program from operating normally. IoT devices with low memory capacity are vulnerable to stack smashing overflow attacks. In addition, if the existing vaccine program is applied as it is, the IoT device will not operate normally. In order to defend against stack smashing overflow attacks on IoT devices, we used canaries among several detection methods to set conditions with random values, checksum, and DSLR (random storage locations), respectively. Two canaries were placed within the buffer, one in front of the return address, which is the end of the buffer, and the other was stored in a random location in-buffer. This makes it difficult for an attacker to guess the location of a canary stored in a fixed location by storing the canary in a random location because it is easy for an attacker to predict its location. After executing the detection program, after a stack smashing overflow attack occurs, if each condition is satisfied, the program is terminated. The set conditions were combined to create a number of eight cases and tested. Through this, it was found that it is more efficient to use a detection method using DSLR than a detection method using multiple conditions for IoT devices.

A Study on the Relationship between Smart Work Adoption Factors, User Innovation Resistance, and Turnover Intention: Focused on the Moderating Effect of Organizational Control (스마트워크 도입 요인과 사용자 혁신저항 및 이직의도 간의 관계에 대한 연구: 조직통제 조절효과를 중심으로)

  • Young Kwak;Minsoo Shin
    • Information Systems Review
    • /
    • v.23 no.4
    • /
    • pp.23-43
    • /
    • 2021
  • Due to the recent transition to a non-face-to-face society, many organizations are quickly adapting to foster a smart work environment. The introduction of smart work does not simply end with incorporating ICT systems or solutions into business models since fundamental factors such as forms of employment and work styles need to be in line with the progression of technological advances. However, previous studies regarding smart work focus on improvements in productivity and efficiency from a technology acceptance perspective. Therefore, there is a lack of discussion on innovation resistance from employees and management control when ICT systems are introduced into the workplace. This study empirically analyzes the moderating effects of the organizational control method for employees and innovation resistance within a smart work environment. Additionally, this study aims to identify the structural characteristics that employees resist from an innovation resistance perspective when organizational innovation occurs. The empirical analysis of this study suggests that when smart work such as ICT technology is introduced into the workplace the level of innovation resistance decreases when there is a high level of relative advantage and self-efficacy, whereas the level of innovation resistance increases when there is a high level of use complexity. Moreover, this study revealed that the level of innovation resistance increases when the employees' behaviors were controlled. The results of this study intend to contribute to improving business management by suggesting factors worth considering when incorporating smart work into work places through a thorough case analysis.