• Title/Summary/Keyword: Internet+

Search Result 30,143, Processing Time 0.05 seconds

Identifying Bridging Nodes and Their Essentiality in the Protein-Protein Interaction Networks (단백질 상호작용 네트워크에서 연결노드 추출과 그 중요도 측정)

  • Ahn, Myoung-Sang;Ko, Jeong-Hwan;Yoo, Jae-Soo;Cho, Wan-Sup
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.5
    • /
    • pp.1-13
    • /
    • 2007
  • In this research, we found out that bridging nodes have great effect on the robustness of protein-protein interaction networks. Until now, many researchers have focused on node's degree as node's essentiality. Hub nodes in the scale-free network are very essential in the network robustness. Some researchers have tried to relate node's essentiality with node's betweenness centrality. These approaches with betweenness centrality are reasonable but there is a positive relation between node's degree and betweenness centrality value. So, there are no differences between two approaches. We first define a bridging node as the node with low connectivity and high betweenness value, we then verify that such a bridging node is a primary factor in the network robustness. For a biological network database from Internet, we demonstrate that the removal of bridging nodes defragment an entire network severally and the importance of the bridging nodes in the network robustness.

  • PDF

Development and Analyses of Effects of ICT Teaching: Learning Process Plan for 'Designing My Home' unit of Technology.Home Economic in High School (ICT활용 교수.학습 과정안 개발 및 효과 분석: 고등학교 기술.가정 "나의 주거 공간꾸미기" 단원을 중심으로)

  • Park Hyun-Sook;Cho Jae-Soon
    • Journal of Korean Home Economics Education Association
    • /
    • v.18 no.2 s.40
    • /
    • pp.15-27
    • /
    • 2006
  • The purpose of this research was to develop and analyze the effects of ICT based teaching learning process plans for 'Designing My Home' unit of Technology Home Economics subject in High School. The seven housing contents were selected from 8 textbooks and 8 teaching resources at the analyses stage. A specific homepage(ieduhome.cafe.com) was built to utilize the eight ICT teaching learning process plan as well as many other resources at the planning & development stages. The number of 68 highschool students have participated for the application stage during September 4-26, 2003 and the same number have studied the same contents through regular teaching learning plans as a comparison group. Experimental groups have significantly more increased in the knowledge and understanding of the housing contents than have comparison groups. The same results occurred in the interests in Home Economics, Housing, and Internet utilized study. The Design reports were not statistically differed between two groups based on the objective evaluation criteria. The results of this study generally supported previous research and showed that the In teaching learning plans were more effective in various aspects than were the regular plans.

  • PDF

Teacher's Practice of Activity Materials in the Housing Area of Middle School Technology & Home Economics Textbook (중학교 교사의 기술.가정 주생활영역 활동자료 활용실태)

  • Lee, Young-Doo;Cho, Jea-Soon
    • Journal of Korean Home Economics Education Association
    • /
    • v.20 no.4
    • /
    • pp.157-171
    • /
    • 2008
  • The year of 2007 Reformed Curriculum encourages various activity materials in the textbook facilitate students oriented self-help learning. The purpose of this paper is to find out how much the activity materials in housing area of middle school Technology and Home Economics are practiced in the class and why they are used or not used. The data were collected from 253 middle school teachers who had ever taught the housing unit in any of 6 textbooks. The analyses indicated that the most frequent teaching methode was lecture based on the textbook and internet data focused on the figures and contents of the individual textbook. The average rate of practicing the activity materials was differ by textbooks and the characteristics of the materials such as type of materials, feature of non sentence materials, and type of activity. The main two reasons to practice the activity materials were it's adequacy to class goals and application to everyday life. Low interests of students and shortage of time were the two main reasons why not used the materials. Textbook writers should consider these reasons as well as the characteristics of activity materials practiced in the class by the teachers in order to meet the goals of the reformed as well as current curricula.

  • PDF

Research Trends of Home Economics Education Ph. D. Dissertation (가정과교육 관련 박사학위논문 연구동향)

  • Yu, In-Young;Bae, Hyun-Young;Lee, Jong-Hee;Min, Eun-Hye;Choi, Mi-Sun;Cho, Jae-Soon
    • Journal of Korean Home Economics Education Association
    • /
    • v.20 no.4
    • /
    • pp.239-252
    • /
    • 2008
  • Doctoral professionals who majored Home Economics Education are relatively rare and recently have been produced in a limited number of institutions. The purpose of this paper was to analyze the Ph.D. Dissertation majored in Home Economics Education by research subjects and methods. Just twenty dissertations published in domestic universities were selected through internet search to be analyzed in this paper. This research showed five research subject areas of the dissertation such as core concepts and perspectives, curriculum, teaching and learning, teachers empowerment, and others. Each subject had three to five references and time difference in publication. The research subject related to concepts and perspectives was more likely to be studied in an early stage, followed by the subject of curriculum. The research subject became to be varied to teaching and learning and teachers empowerment areas. The research methods were associated with the research subject, as expected. Literature analysis was common in the subject on concepts and perspectives, curriculum, and textbook analysis, while survey was in teachers empowerment. Teaching and learning subject used various research methods together. Numerous dissertation with variety of research subjects and methods would be expected to be followed to develop research on Home Economics Education.

  • PDF

A Methodology for Automatic Multi-Categorization of Single-Categorized Documents (단일 카테고리 문서의 다중 카테고리 자동확장 방법론)

  • Hong, Jin-Sung;Kim, Namgyu;Lee, Sangwon
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.3
    • /
    • pp.77-92
    • /
    • 2014
  • Recently, numerous documents including unstructured data and text have been created due to the rapid increase in the usage of social media and the Internet. Each document is usually provided with a specific category for the convenience of the users. In the past, the categorization was performed manually. However, in the case of manual categorization, not only can the accuracy of the categorization be not guaranteed but the categorization also requires a large amount of time and huge costs. Many studies have been conducted towards the automatic creation of categories to solve the limitations of manual categorization. Unfortunately, most of these methods cannot be applied to categorizing complex documents with multiple topics because the methods work by assuming that one document can be categorized into one category only. In order to overcome this limitation, some studies have attempted to categorize each document into multiple categories. However, they are also limited in that their learning process involves training using a multi-categorized document set. These methods therefore cannot be applied to multi-categorization of most documents unless multi-categorized training sets are provided. To overcome the limitation of the requirement of a multi-categorized training set by traditional multi-categorization algorithms, we propose a new methodology that can extend a category of a single-categorized document to multiple categorizes by analyzing relationships among categories, topics, and documents. First, we attempt to find the relationship between documents and topics by using the result of topic analysis for single-categorized documents. Second, we construct a correspondence table between topics and categories by investigating the relationship between them. Finally, we calculate the matching scores for each document to multiple categories. The results imply that a document can be classified into a certain category if and only if the matching score is higher than the predefined threshold. For example, we can classify a certain document into three categories that have larger matching scores than the predefined threshold. The main contribution of our study is that our methodology can improve the applicability of traditional multi-category classifiers by generating multi-categorized documents from single-categorized documents. Additionally, we propose a module for verifying the accuracy of the proposed methodology. For performance evaluation, we performed intensive experiments with news articles. News articles are clearly categorized based on the theme, whereas the use of vulgar language and slang is smaller than other usual text document. We collected news articles from July 2012 to June 2013. The articles exhibit large variations in terms of the number of types of categories. This is because readers have different levels of interest in each category. Additionally, the result is also attributed to the differences in the frequency of the events in each category. In order to minimize the distortion of the result from the number of articles in different categories, we extracted 3,000 articles equally from each of the eight categories. Therefore, the total number of articles used in our experiments was 24,000. The eight categories were "IT Science," "Economy," "Society," "Life and Culture," "World," "Sports," "Entertainment," and "Politics." By using the news articles that we collected, we calculated the document/category correspondence scores by utilizing topic/category and document/topics correspondence scores. The document/category correspondence score can be said to indicate the degree of correspondence of each document to a certain category. As a result, we could present two additional categories for each of the 23,089 documents. Precision, recall, and F-score were revealed to be 0.605, 0.629, and 0.617 respectively when only the top 1 predicted category was evaluated, whereas they were revealed to be 0.838, 0.290, and 0.431 when the top 1 - 3 predicted categories were considered. It was very interesting to find a large variation between the scores of the eight categories on precision, recall, and F-score.

An Interactive Cooking Video Query Service System with Linked Data (링크드 데이터를 이용한 인터랙티브 요리 비디오 질의 서비스 시스템)

  • Park, Woo-Ri;Oh, Kyeong-Jin;Hong, Myung-Duk;Jo, Geun-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.3
    • /
    • pp.59-76
    • /
    • 2014
  • The revolution of smart media such as smart phone, smart TV and tablets has brought easiness for people to get contents and related information anywhere and anytime. The characteristics of the smart media have changed user behavior for watching the contents from passive attitude into active one. Video is a kind of multimedia resources and widely used to provide information effectively. People not only watch video contents, but also search for related information to specific objects appeared in the contents. However, people have to use extra views or devices to find the information because the existing video contents provide no information through the contents. Therefore, the interaction between user and media is becoming a major concern. The demand for direct interaction and instant information is much increasing. Digital media environment is no longer expected to serve as a one-way information service, which requires user to search manually on the internet finding information they need. To solve the current inconvenience, an interactive service is needed to provide the information exchange function between people and video contents, or between people themselves. Recently, many researchers have recognized the importance of the requirements for interactive services, but only few services provide interactive video within restricted functionality. Only cooking domain is chosen for an interactive cooking video query service in this research. Cooking is receiving lots of people attention continuously. By using smart media devices, user can easily watch a cooking video. One-way information nature of cooking video does not allow to interactively getting more information about the certain contents, although due to the characteristics of videos, cooking videos provide various information such as cooking scenes and explanation for each recipe step. Cooking video indeed attracts academic researches to study and solve several problems related to cooking. However, just few studies focused on interactive services in cooking video and they still not sufficient to provide the interaction with users. In this paper, an interactive cooking video query service system with linked data to provide the interaction functionalities to users. A linked recipe schema is used to handle the linked data. The linked data approach is applied to construct queries in systematic manner when user interacts with cooking videos. We add some classes, data properties, and relations to the linked recipe schema because the current version of the schema is not enough to serve user interaction. A web crawler extracts recipe information from allrecipes.com. All extracted recipe information is transformed into ontology instances by using developed instance generator. To provide a query function, hundreds of questions in cooking video web sites such as BBC food, Foodista, Fine cooking are investigated and analyzed. After the analysis of the investigated questions, we summary the questions into four categories by question generalization. For the question generalization, the questions are clustered in eleven questions. The proposed system provides an environment associating UI (User Interface) and UX (User Experience) that allow user to watch cooking videos while obtaining the necessary additional information using extra information layer. User can use the proposed interactive cooking video system at both PC and mobile environments because responsive web design is applied for the proposed system. In addition, the proposed system enables the interaction between user and video in various smart media devices by employing linked data to provide information matching with the current context. Two methods are used to evaluate the proposed system. First, through a questionnaire-based method, computer system usability is measured by comparing the proposed system with the existing web site. Second, the answer accuracy for user interaction is measured to inspect to-be-offered information. The experimental results show that the proposed system receives a favorable evaluation and provides accurate answers for user interaction.

A Smoothing Data Cleaning based on Adaptive Window Sliding for Intelligent RFID Middleware Systems (지능적인 RFID 미들웨어 시스템을 위한 적응형 윈도우 슬라이딩 기반의 유연한 데이터 정제)

  • Shin, DongCheon;Oh, Dongok;Ryu, SeungWan;Park, Seikwon
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.3
    • /
    • pp.1-18
    • /
    • 2014
  • Over the past years RFID/SN has been an elementary technology in a diversity of applications for the ubiquitous environments, especially for Internet of Things. However, one of obstacles for widespread deployment of RFID technology is the inherent unreliability of the RFID data streams by tag readers. In particular, the problem of false readings such as lost readings and mistaken readings needs to be treated by RFID middleware systems because false readings ultimately degrade the quality of application services due to the dirty data delivered by middleware systems. As a result, for the higher quality of services, an RFID middleware system is responsible for intelligently dealing with false readings for the delivery of clean data to the applications in accordance with the tag reading environment. One of popular techniques used to compensate false readings is a sliding window filter. In a sliding window scheme, it is evident that determining optimal window size intelligently is a nontrivial important task in RFID middleware systems in order to reduce false readings, especially in mobile environments. In this paper, for the purpose of reducing false readings by intelligent window adaption, we propose a new adaptive RFID data cleaning scheme based on window sliding for a single tag. Unlike previous works based on a binomial sampling model, we introduce the weight averaging. Our insight starts from the need to differentiate the past readings and the current readings, since the more recent readings may indicate the more accurate tag transitions. Owing to weight averaging, our scheme is expected to dynamically adapt the window size in an efficient manner even for non-homogeneous reading patterns in mobile environments. In addition, we analyze reading patterns in the window and effects of decreased window so that a more accurate and efficient decision on window adaption can be made. With our scheme, we can expect to obtain the ultimate goal that RFID middleware systems can provide applications with more clean data so that they can ensure high quality of intended services.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

A Study on Commemoration Characteristics of Vietnam War Memorials in the United States of America (미국에 있는 베트남전쟁 메모리얼에 나타난 기념성)

  • Lee, Sang-Seok
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.43 no.1
    • /
    • pp.1-15
    • /
    • 2015
  • The purpose of this study was to analyze the commemoration characteristics of Vietnam War Memorials(VWM) in the United States(VWMUS). Through site survey and internet research, the researcher selected 87 VWMUS except monuments simply with markers, and analyzed 5 analysis items: design concepts, spatial characteristics, landscape details, sculptures, and interpretive texts and symbols. The results are as follows: 1. The analysis revealed that the main concepts of VWMUS were to cherish victims of the Vietnam War(85 sites (97.7%)), show veteran's dedication for country(85 sites(97.7%)), and publicize the contribution of groups by troop, regional, and membership(84 sites(96.6%)). 2. Most VWMUS were located in memorial parks and plazas. 59 memorials(67.8%) were designed to pursue the completion of each memorial assuming the form of symmetry and circles. On the other hand, 12 memorials(13.8%) were typed memorial walls and 11 memorials(12.6%) were formed by spatial sequence including various landscape details and grading. 3. Stone walls were mainly used to cherish victims of the War at 65 memorials(74.7%), and also, Flags like the Stars and Stripes, POW MIA flags, and state flags were hoisted to symbolize memorial's identity at all memorials. Additionally, Benches, monuments, markers, posts and columns, ponds and channels, Helicopters were partially introduced some memorials. 4. Sculptures were used 21 memorials(24.1%) which were smaller in numbers than other War Memorial in the U.S.A., for black stonewall were used for the main element of VWMUS. Except for a few sculptures that aimed to represent the Vietnam War symbolically and narratively, 16 memorials(18.4%) were formed to realistically express the image of wounded soldiers and their hardship in the Vietnam War. 5. KIA, MIA, Veteran's name were written and their images depicted on walls, Also, the symbolic phrase, 'ALL GAVE SOME, SOME GAVE ALL' and 'DUTY, HONOR, COUNTRY' were written on the memorials walls, and the POW MIA symbols were printed on the flags and engraved on walls. 6. In the United States of America, Democratic patriotism was considered a main ideological value in VWMUS by engraving KIA MIA's names on the walls, hoisting flags Stars and Stripes and POW MIA, and writing symbolic phrases 'ALL GAVE SOME, SOME GAVE ALL' and 'DUTY, HONOR, COUNTRY'. On the contrary, in Vietnam, nationalism, patriotism, and socialism were emphasized as main ideologies through raising war victory and resistance to foreign power as well as writing the symbolic phrase 'TO-QUOC-GUI-CONG' meaning 'our country remember your achievement' on memorial towers. Further study will be required to comparatively analyze VWM in order to understand national characteristics in Korea, Australia, U.S.A, and Vietnam.