• Title/Summary/Keyword: Internet data

Search Result 10,076, Processing Time 0.033 seconds

Better Use of Technological Advances in Communication of Information (농업기상정보교환에 있어 첨단기술의 효율적 활용)

  • Elijah Mukhala;Malgorzata, Keinska-Kasprzak
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.6 no.2
    • /
    • pp.85-93
    • /
    • 2004
  • In recent years, technology has advanced so much, especially in the developed world, such that its application in development activities may be lagging behind. The lag between technological advances and its application affects agrometeorological science as well. This paper discusses technological advances that may be better used to communicate agrometeorological information. It is important to bear in mind that technological advances are only channels of communication that may be used to speed up the transference of information from the source to the user. The paper begins with a review of the definitions of 'communication' to put the discussion into context. After reviewing several papers, in simple terms, communication can be defined as the sharing of meaning. The paper also looks at operational communications channels and comes to a conclusion that operational communications channels are pretty much universal irrespective of the development level of a country, although some are more easily accessible in some parts of the world than others. The common communications channels include: newspapers, farming papers, radio, television, fax, email, mobile phones (SMS) and Internet web sites. As part of technological advances, mobile phones are becoming increasingly useful all over the world. In order to make better use of this technology, it is important far those that will use this technology to understand how the technology works, not necessarily in detail, but to be able to operate the technology and obtain the data they need. When it comes to constraints, communication of agrometeorological information requires a substantial amount of resources and it is generally expensive especially when sophisticated models must be operated.

Construction of the Honam Culture Information System(HCIS) using Web GIS (WebGIS를 이용한 호남문화정보시스템(HCIS) 구축)

  • Yang, Hea-Kun;Shin, Hye-Jin
    • Journal of the Korean association of regional geographers
    • /
    • v.12 no.2
    • /
    • pp.291-304
    • /
    • 2006
  • Individual culture information has been the mainstream in studies on culture information so far, and the studies have focused on zones using paper map. As a result, intuitive analysis in map and extremely restricted measuring space analysis are limited in summarizing and utilizing complicated and huge cultural materials systematically and scientifically. Introduction of GIS can be regarded as an indispensable element for solution of this problem as it can analyze temporal-spatial dynamics of culture information as a whole and to construct effective management system for regional culture information. In particular, supply of two-way information rather than one-way information becomes more and more important in the society structure where value is diversified and the culture gets faster owing to high-level information industry like today. Accordingly, this study is considered to be meaningful in that WebGIS-based regional culture information system allows temporal-spatial analysis and spatial analysis for various culture information for the users using internet. Regional culture information system like culture information system in Honam region can not only contribute to comparative study between regions and to creation of new information through analysis of statistics between culture elements but also allow easy and comprehensive approach to regional information.

  • PDF

A Study on Factors that Affect the Selection of Multichannel in the Apparel Retail -Based on the Characteristics of Marketing and Customer- (패션소매유통 멀티채널 채택에 영향을 미치는 요인에 관한 연구 -마케팅 특성과 소비자 특성을 중심으로-)

  • Kim, Ju-Hee;Lee, Jin-Hwa
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.35 no.7
    • /
    • pp.801-815
    • /
    • 2011
  • This study examines the characteristics of marketing and customer that influence the selection of multichannel (preference/frequency of use) in the fashion retail. The subjects of this study are men and women live in Seoul/Gyeonggi province and Busan/Gyeongsangnam-do in their 20s-40s who have shopping experiences in fashion items of more than 2 shopping channels among offline stores, catalogs, and the internet. The survey period was from March to May 2010 and 411 forms were used in this survey. The data were analyzed by a reliability analysis (Cronbach's ${\alpha}$), a factor analysis, t-test and one-way ANOVA. The main results of this study are summarized as follows. First, marketing characteristics, which effect the selection of multichannel (preference/frequency of use), consist of sales promotion, service, price, merchandise, and distribution. Those have a significant influence (***p${\leq}$.001) on choosing multichannel of fashion retail. Price has a significant impact on the preference of multichannel and merchandise affect for frequency of use in multichannel shopping. Second, customer characteristics have a significant influence (***p${\leq}$.001) on the monthly average purchasing amount, shopping hours, shopping frequency, brand knowledge, and price sensitivity. Particularly, monthly average purchasing amount & shopping frequency have meaningful differences in the frequency of using multichannel; in addition, shopping hours were affected by preference & frequency of use. Price sensitivity has a greater influence on the frequency of using multichannel and brand knowledge has a greater effect on multichannel preference. Customer's information searching characteristics have main 3 factors through the use of marketing information, personal information and experience information. Application of experience information is the main factor in preference and frequency of using multichannel shopping. The customer demographic characteristics of age (*p${\leq}$.05, **p${\leq}$.01) and gender (*p${\leq}$.05) show a difference for selecting multichannel. There is no difference for marital status, average household income per month, and job.

Text Filtering using Iterative Boosting Algorithms (반복적 부스팅 학습을 이용한 문서 여과)

  • Hahn, Sang-Youn;Zang, Byoung-Tak
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.4
    • /
    • pp.270-277
    • /
    • 2002
  • Text filtering is a task of deciding whether a document has relevance to a specified topic. As Internet and Web becomes wide-spread and the number of documents delivered by e-mail explosively grows the importance of text filtering increases as well. The aim of this paper is to improve the accuracy of text filtering systems by using machine learning techniques. We apply AdaBoost algorithms to the filtering task. An AdaBoost algorithm generates and combines a series of simple hypotheses. Each of the hypotheses decides the relevance of a document to a topic on the basis of whether or not the document includes a certain word. We begin with an existing AdaBoost algorithm which uses weak hypotheses with their output of 1 or -1. Then we extend the algorithm to use weak hypotheses with real-valued outputs which was proposed recently to improve error reduction rates and final filtering performance. Next, we attempt to achieve further improvement in the AdaBoost's performance by first setting weights randomly according to the continuous Poisson distribution, executing AdaBoost, repeating these steps several times, and then combining all the hypotheses learned. This has the effect of mitigating the ovefitting problem which may occur when learning from a small number of data. Experiments have been performed on the real document collections used in TREC-8, a well-established text retrieval contest. This dataset includes Financial Times articles from 1992 to 1994. The experimental results show that AdaBoost with real-valued hypotheses outperforms AdaBoost with binary-valued hypotheses, and that AdaBoost iterated with random weights further improves filtering accuracy. Comparison results of all the participants of the TREC-8 filtering task are also provided.

Thermal Compression of Copper-to-Copper Direct Bonding by Copper films Electrodeposited at Low Temperature and High Current Density (저온 및 고전류밀도 조건에서 전기도금된 구리 박막 간의 열-압착 직접 접합)

  • Lee, Chae-Rin;Lee, Jin-Hyeon;Park, Gi-Mun;Yu, Bong-Yeong
    • Proceedings of the Korean Institute of Surface Engineering Conference
    • /
    • 2018.06a
    • /
    • pp.102-102
    • /
    • 2018
  • Electronic industry had required the finer size and the higher performance of the device. Therefore, 3-D die stacking technology such as TSV (through silicon via) and micro-bump had been used. Moreover, by the development of the 3-D die stacking technology, 3-D structure such as chip to chip (c2c) and chip to wafer (c2w) had become practicable. These technologies led to the appearance of HBM (high bandwidth memory). HBM was type of the memory, which is composed of several stacked layers of the memory chips. Each memory chips were connected by TSV and micro-bump. Thus, HBM had lower RC delay and higher performance of data processing than the conventional memory. Moreover, due to the development of the IT industry such as, AI (artificial intelligence), IOT (internet of things), and VR (virtual reality), the lower pitch size and the higher density were required to micro-electronics. Particularly, to obtain the fine pitch, some of the method such as copper pillar, nickel diffusion barrier, and tin-silver or tin-silver-copper based bump had been utillized. TCB (thermal compression bonding) and reflow process (thermal aging) were conventional method to bond between tin-silver or tin-silver-copper caps in the temperature range of 200 to 300 degrees. However, because of tin overflow which caused by higher operating temperature than melting point of Tin ($232^{\circ}C$), there would be the danger of bump bridge failure in fine-pitch bonding. Furthermore, regulating the phase of IMC (intermetallic compound) which was located between nickel diffusion barrier and bump, had a lot of problems. For example, an excess of kirkendall void which provides site of brittle fracture occurs at IMC layer after reflow process. The essential solution to reduce the difficulty of bump bonding process is copper to copper direct bonding below $300^{\circ}C$. In this study, in order to improve the problem of bump bonding process, copper to copper direct bonding was performed below $300^{\circ}C$. The driving force of bonding was the self-annealing properties of electrodeposited Cu with high defect density. The self-annealing property originated in high defect density and non-equilibrium grain boundaries at the triple junction. The electrodeposited Cu at high current density and low bath temperature was fabricated by electroplating on copper deposited silicon wafer. The copper-copper bonding experiments was conducted using thermal pressing machine. The condition of investigation such as thermal parameter and pressure parameter were varied to acquire proper bonded specimens. The bonded interface was characterized by SEM (scanning electron microscope) and OM (optical microscope). The density of grain boundary and defects were examined by TEM (transmission electron microscopy).

  • PDF

A Study on Actual Conditions and Patterns of Sexual Harassment in the Korean Adolescents (한국 청소년의 성희롱실태 및 유형에 관한 조사연구)

  • Kim, Young-Hae;Lee, Hwa-Za;Jung, Eun-Soon;Kim, Lee-Soon;Moon, Sun-Hwa;Jung, In-Kyung
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.7 no.2
    • /
    • pp.196-206
    • /
    • 2001
  • The purpose of this study was to identify Korean adolescents' sexual harassment conditions and patterns in schools as well as their psychological reactions when they are under sexual harassments or they committed sexual harassments. The subjects were 475 middle and high schoolers in Pusan and Gyeong Sang Nam-Do. The survey was executed from July 1 through Dec. 31, 2000. The collected data was analyzed by SPSS WIN 8.0 using percentage, mean. The results of this study were as follows: 1. the linguistic sexual harassment such as 'lewd jokes or dirty talks' was the major pattern(35.4%), The body touching such as 'kiss or embracing', 'internet transmission of pornography', 'sexual harassing of body characteristics', touching breast', 'grasping of hands or body touching', 'body touching in secret place', 'urging to sit in touch or on knees', 'exposing of special body areas', and 'showing pornography' followed in a row. 2. The eighteen point three percents of subjects had the experience to commit sexual harassment. The forty four point seven percent of above subjects committed it against their classmates. The first time to commit sexual harassment was their middle school period (38.4%). Their motives to commit it were as under: 'killing time'(48.8%), 'annoying', 'attracting attention from the other sex', 'expressing lovely emotions', 'urging of their friends', 'misunderstanding that the other partners felt good when they experienced sexual harassment, 'showing their strength' etc. their with committing harassments they felt as under ; 'joyful'(61.6%), 'funny,' 'desirous to try again', 'thrilling', 'breaking stress', very pleasant', 'exciting', 'regretful', 'guilty', and 'feeling fear' etc. 3. Twenty four point two percents of the population exposed to sexual harassments. The sexual harassers were almost their classmates (42.7%). And then unknown people', 'boy or girl friends and school staffs' followed in a row. The places where harassments happened were 'inside classroom'(69.8%), 'school bus and subway', 'outside school', etc. The feelings when experienced harassments were 'anger' (51.3%), 'hurting self-respect', 'embarrassing', 'rejection', 'insulting', 'shame', 'fear', 'dislike', 'anxiety', 'melancholy' etc. The reasons not to have consultations after sexual harassments were 'worrying to be well-known'(49.6%), 'believing not helpful enough', 'regarding simple mischief', 'trying to revenge directly', 'understanding their mistakes', 'worrying retaliation' etc.

  • PDF

Study on Jinminso as an Indoor Relief Institution (구한말 민간 빈민구제시설 진민소[賑民所]에 관한 연구)

  • Yang, Okkyung
    • Korean Journal of Social Welfare
    • /
    • v.66 no.4
    • /
    • pp.257-280
    • /
    • 2014
  • This is a study of Jinminso. The purpose of the study is to search and analyze the documents about Jinminso. The data is composed with the first hand historical documents both government documents and civil newspapers which are searched by internet. Based on the documents found, it is safe to say that Jinminso has existed and functioned as an indoor almshouse for the poor. It was established in June 25, 1898 by civil people with donated money in order to reduce the burden of Emperor and to share the love and care for their people with a brotherhood mind. The Jinminso resident were the poor, the sick, the orphans, widows, elderly living alone, and the disabled. They received food, clothes, and shelter. However, Emperor Gojong ordered to shut down Jinminso, and it was closed in Sept. 25, in 1898. The main reason was inappropriate collection of money for the agency operation from the merchants. When Jinminso was closed, all the inmates became homeless. The founders asked to reopen it, and it was accepted but this time was opened as a government agency in 1899. Jinminso imposes great meanings. One, Jinminso was not just an office but a direct service agency housing hundreds of poor people; two, poverty was understood as social problem not just a local district problem; three, rules and regulations were prepared to set up a system of modern age social welfare. The findings provide a clue how the government and society perceived poverty and the poor during the time of late 1800s to early 1900s. The existence of Jinminso will pose many new question.

  • PDF

A self-portrait of the information society: An Arguments on the SNS users' Responsibilities

  • Seo, Ran-Sug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.159-172
    • /
    • 2020
  • Social networking services (SNS) are developing significantly with the Internet and smartphones. It's a friendly social media, but if you think deeply about it, you'll find that it has a variety of faces. It is a communication tool between users, a medium for delivering information, an infrastructure for providing applications, and a community where people with common interests gather. In recent years, business tools, shopping and payment methods are also being swallowed. The influence of the spread of SNS on the real world is also expanding, and the work being dealt with from a sociological perspective is also increasing. Also, if you pay attention to the technical aspects of SNS, it is composed of various technical elements, such as infrastructure that handles large-scale access, user interface that supports comfortable use, and big data analysis to understand people's behavior more deeply. However, I usually use it as usual. However, if you look through SNS, you can see that the situation is surprisingly profound and multifaceted. This study began by looking at the history and current status of SNS and attempted to find its status through comparison with other media. From the point of view of relationship with society, it can be a risk and legal issue when using SNS, such as crimes using bad social media or social media. It is also necessary to comment on the activities on SNS or the guidelines established by the operators. Therefore, various legal issues on SNS will be discussed. Also, as an example of using SNS, I will introduce an example of using SNS in disaster response. From a more technical point of view, you will receive commentary on SNS's network-based technology and SNS's information use, and these articles will help you understand and use SNS safely and help you further utilize or develop SNS.

A Study on Simulation based Manufacturing in Shipyards : Focused on a Long-term Plan Verification (조선소에서의 시뮬레이션 기반 생산에 관한 연구 : 선표 계획 검증을 중심으로)

  • Lee, Dong-Kun;Oh, Dae-Kyun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.20 no.1
    • /
    • pp.86-95
    • /
    • 2014
  • Productivity improvement of a shipbuilding company depends on how efficiently its limited resources are managed and utilized. Recently, research on modeling and simulation (M&S) to support shipyard production management system has been being under study. The production management based on M&S rejects decision making on experience, and it can establish productivity improvement method based on quantitative and specific data. In this paper, M&S is applied to the long-term plan as a part of the production planning in shipyards. To this end, the long-term plan processes and related management systems are analyzed. Based on the analysis, a simulation model and an application system using commercial simulation software are suggested. And basic structure of the suggested system is based on web technology such as Rich Internet Application, web services protocol for compatibility with existing shipyard enterprise systems. Utilizing the results of this study, it is expected that shipyard production planners can settle down work flow, in which one can establishes the production plan, simulates the plan, and analyzes the results, enabling a more reliable production plans.

Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements (IoT 오픈 플랫폼 암호기술 현황 및 보안 요구사항 분석)

  • Choi, Jung-In;Oh, Yoon-Seok;Kim, Do-won;Choi, Eun Young;Seo, Seung-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.7
    • /
    • pp.183-194
    • /
    • 2018
  • With the rapid development of IoT(Internet of Things) technology, various convenient services such as smart home and smart city have been realized. However, IoT devices in unmanned environments are exposed to various security threats including eavesdropping and data forgery, information leakage due to unauthorized access. To build a secure IoT environment, it is necessary to use proper cryptographic technologies to IoT devices. But, it is impossible to apply the technologies applied in the existing IT environment, due to the limited resources of the IoT devices. In this paper, we survey the classification of IoT devices according to the performance and analyze the security requirements for IoT devices. Also we survey and analyze the use of cryptographic technologies in the current status of IoT open standard platform such as AllJoyn, oneM2M, IoTivity. Based on the research of cryptographic usage, we examine whether each platform satisfies security requirements. Each IoT open platform provides cryptographic technology for supporting security services such as confidentiality, integrity, authentication an authorization. However, resource constrained IoT devices such as blood pressure monitoring sensors are difficult to apply existing cryptographic techniques. Thus, it is necessary to study cryptographic technologies for power-limited and resource constrained IoT devices in unattended environments.