• Title/Summary/Keyword: Online platform

Search Result 857, Processing Time 0.022 seconds

A study on detective story authors' style differentiation and style structure based on Text Mining (텍스트 마이닝 기법을 활용한 고전 추리 소설 작가 간 문체적 차이와 문체 구조에 대한 연구)

  • Moon, Seok Hyung;Kang, Juyoung
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.3
    • /
    • pp.89-115
    • /
    • 2019
  • This study was conducted to present the stylistic differences between Arthur Conan Doyle and Agatha Christie, famous as writers of classical mystery novels, through data analysis, and further to present the analytical methodology of the study of style based on text mining. The reason why we chose mystery novels for our research is because the unique devices that exist in classical mystery novels have strong stylistic characteristics, and furthermore, by choosing Arthur Conan Doyle and Agatha Christie, who are also famous to the general reader, as subjects of analysis, so that people who are unfamiliar with the research can be familiar with them. The primary objective of this study is to identify how the differences exist within the text and to interpret the effects of these differences on the reader. Accordingly, in addition to events and characters, which are key elements of mystery novels, the writer's grammatical style of writing was defined in style and attempted to analyze it. Two series and four books were selected by each writer, and the text was divided into sentences to secure data. After measuring and granting the emotional score according to each sentence, the emotions of the page progress were visualized as a graph, and the trend of the event progress in the novel was identified under eight themes by applying Topic modeling according to the page. By organizing co-occurrence matrices and performing network analysis, we were able to visually see changes in relationships between people as events progressed. In addition, the entire sentence was divided into a grammatical system based on a total of six types of writing style to identify differences between writers and between works. This enabled us to identify not only the general grammatical writing style of the author, but also the inherent stylistic characteristics in their unconsciousness, and to interpret the effects of these characteristics on the reader. This series of research processes can help to understand the context of the entire text based on a defined understanding of the style, and furthermore, by integrating previously individually conducted stylistic studies. This prior understanding can also contribute to discovering and clarifying the existence of text in unstructured data, including online text. This could help enable more accurate recognition of emotions and delivery of commands on an interactive artificial intelligence platform that currently converts voice into natural language. In the face of increasing attempts to analyze online texts, including New Media, in many ways and discover social phenomena and managerial values, it is expected to contribute to more meaningful online text analysis and semantic interpretation through the links to these studies. However, the fact that the analysis data used in this study are two or four books by author can be considered as a limitation in that the data analysis was not attempted in sufficient quantities. The application of the writing characteristics applied to the Korean text even though it was an English text also could be limitation. The more diverse stylistic characteristics were limited to six, and the less likely interpretation was also considered as a limitation. In addition, it is also regrettable that the research was conducted by analyzing classical mystery novels rather than text that is commonly used today, and that various classical mystery novel writers were not compared. Subsequent research will attempt to increase the diversity of interpretations by taking into account a wider variety of grammatical systems and stylistic structures and will also be applied to the current frequently used online text analysis to assess the potential for interpretation. It is expected that this will enable the interpretation and definition of the specific structure of the style and that various usability can be considered.

A Study on eDesign Platform for Effective Communication and Information sharing - with an emphasis on process and template (효과적인 커뮤니케이션과 정보공유를 위한 e디자인 플랫폼 구축에 관한 연구 - 프로세스와 템플릿을 중심으로)

  • 윤주현
    • Archives of design research
    • /
    • v.17 no.2
    • /
    • pp.425-436
    • /
    • 2004
  • A new design field called eDesign appears as if eBiz is an online related business in which an industrialized design creates the individual value added facing a digital revolution. The field of eDesign requires a special design process and management methodology regardless of the fact that human sensitivity will be satisfied through a dehumanized computer technique. However, it is the reality of eDesign that has been dependent upon a simple process or project management tool of general design. In this study, we develop an eDesign platform based on an eDesign process and template mainly focused on eBusiness in order to overcome the wrong situation. The template is a kind of document that has a standardization form. We aim to establish a general process through various case projects, store information using a necessary template, and use for the way of visual communication. We propose a standard of eDesign platform that can be widely applied to the field of design, medium and small enterprises focused on IT businesses or design-team through this project performed as an educational-industrial study. It makes it possible to get a detailed process methodology, which can be applied to many small design related companies that don't have their own process yet, and will be a scale for comparing their own process in which the company has a process of opened standard eDesign with it. In addition, it makes possible a systematic control of the own projects within and outside the firm, accumulating information for the firm through the database, and easy communication. Furthermore, it can be applied to check the process of the project as a checklist, and then it will reduce trial and error repeated for every project that has been done.

  • PDF

The Evolution of Korean Social Network Service focusing on the Case of Kakao Talk (한국형 SNS의 진화 : 카카오톡 사례를 중심으로)

  • Jung, Hee-Seog
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.147-154
    • /
    • 2012
  • I made an analysis on the case of Kakao Talk, which is Korean top mobile instant messaging service, to find the growth potential of Korean Social Network Service in the global market. First, I found that unlike the PC messenger services, Kakao Talk is not only unlimited in mobile IM service provider but also has evolving into a social network service firm. Second, attempts with a variety of social services such as photo-based Kakao Story and Marketing Platform for Mobile Game, Kakao Talk successfully landed as a SNS company. Third, with 'Plus Friends' Service, soon-to-be launched Avatar and App Market Service, Kakao Talk is evolving into social media and social platforms. The big success of Kakao Talk in Korean market is expanding and reproducing into Japanese and Southeast Asian markets through the 'Line' serviced by NHN. Line is applying the proven success stories of Kakao Talk to the Japanese and Southeast Asian markets. It means that Kakao and Line, both are mobile IM services, have raised the possibility of success in the global SNS market although online web-based SNS Cyworld has failed in the global market.

P2P-based Group Communication Management Using Smart Mobile Device (스마트 이동 단말을 이용한 P2P 기반 그룹 통신 관리)

  • Chun, Seung-Man;Park, Jong-Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.9
    • /
    • pp.18-26
    • /
    • 2012
  • As the performance of the next-generation broadband wireless networks is dramatically enhanced, various services (i.e., education, video conferencing, online games, etc.) have been provided to users through a smart mobile platform. Since those services are usually provided by using the centralized architecture, it is difficult for a lot of users to provide the scalable communication service with regard to traffic management. To solve these problems, we have proposed an architecture of P2P-based group communication management scheme using smart mobile device. More specifically, we design the group management protocol and algorithm for the group member management and the traffic management. By using these methods, the mobile multimedia streaming service can be provided with scalability. In order to verify the performance of the proposed scheme, we have mathematically analyzed the performance in terms of the average transmission delay and bandwidth utilization.

Online Monitoring System based notifications on Mobile devices with Kinect V2 (키넥트와 모바일 장치 알림 기반 온라인 모니터링 시스템)

  • Niyonsaba, Eric;Jang, Jong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1183-1188
    • /
    • 2016
  • Kinect sensor version 2 is a kind of camera released by Microsoft as a computer vision and a natural user interface for game consoles like Xbox one. It allows acquiring color images, depth images, audio input and skeletal data with a high frame rate. In this paper, using depth image, we present a surveillance system of a certain area within Kinect's field of view. With computer vision library(Emgu CV), if an object is detected in the target area, it is tracked and kinect camera takes RGB image to send it in database server. Therefore, a mobile application on android platform was developed in order to notify the user that Kinect has sensed strange motion in the target region and display the RGB image of the scene. User gets the notification in real-time to react in the best way in the case of valuable things in monitored area or other cases related to a reserved zone.

Augmented Reality based Low Power Consuming Smartphone Control Scheme

  • Chung, Jong-Moon;Ha, Taeyoung;Jo, Sung-Woong;Kyong, Taehyun;Park, So-Yun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.5168-5181
    • /
    • 2017
  • The popularity of augmented reality (AR) applications and games are in high demand. Currently, the best common platform to implement AR services is on a smartphone, as online games, navigators, personal assistants, travel guides are among the most popular applications of smartphones. However, the power consumption of an AR application is extremely high, and therefore, highly adaptable and dynamic low power control schemes must be used. Dynamic voltage and frequency scaling (DVFS) schemes are widely used in smartphones to minimize the energy consumption by controlling the device's operational frequency and voltage. DVFS schemes can sometimes lead to longer response times, which can result in a significant problem for AR applications. In this paper, an AR response time monitor is used to observe the time interval between the AR image input and device's reaction time, in order to enable improved operational frequency and AR application process priority control. Based on the proposed response time monitor and the characteristics of the Linux kernel's completely fair scheduler (CFS) (which is the default scheduler of Android based smartphones), a response time step control (RSC) scheme is proposed which adaptively adjusts the CPU frequency and interactive application's priority. The experimental results show that RSC can reduce the energy consumption up to 10.41% compared to the ondemand governor while reliably satisfying the response time performance limit of interactive applications on a smartphone.

A Study on Mobile Game Security Threats by Analyzing Malicious Behavior of Auto Program of Clash of Clans (클래시 오브 클랜 오토 프로그램의 악성 행위 분석을 통한 모바일 게임 보안 위협에 관한 연구)

  • Heo, Geon Il;Heo, Cheong Il;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1361-1376
    • /
    • 2015
  • Recently, the size of the mobile game market and the number of mobile game users are growing. Also, as the mobile game's life cycle is increasing at the same time, auto program issue reappears which has been appeared in PC online games. Gamers usually tend to ignore warning messages from antivirus programs and even worse they delete antivirus program to execute auto programs. Therefore, mobile game users are easily compromised if the auto program performs malicious behaviors not only for the original features. In this paper, we analyze whether seven auto programs of "clash of clans" which has a lot more users for a long time perform malicious behaviors or not. We forecast the possible security threats in near future and proposed countermeasures based on this analysis. By analyzing auto programs of highly popular mobile game of today, we can acquire the knowledge on auto program's recent trend such as their development platform, operating mode, etc. This analysis will help security analysts predict auto program's evolving trends and block potential threats in advance.

Analysis of the factors related to the infection control practice of 119 emergency medical service providers based on the PRECEDE model (PRECEDE 모형에 기반한 119구급대원의 감염관리 수행 관련 요인 분석)

  • Yang, Yeunsoo;Kimm, Heejin;Jee, Sun Ha;Hong, Seok-Hwan;Han, Sang-Kyun
    • The Korean Journal of Emergency Medical Services
    • /
    • v.24 no.1
    • /
    • pp.7-24
    • /
    • 2020
  • Purpose: Emergency medical service (EMS) personnel are at high risk of spreading infection. In this study, we used the PRECEDE model to identify the knowledge, status, and barriers to infection control among Korean paramedics to provide basic infection control data. Methods: A total of 164 respondents were analyzed for the study. A questionnaire was administered and collected through an online self-response platform. Descriptive analysis, t-test, ANOVA, multiple regression, and logistic regression analyses were performed to determine infection control practices and associated factors using SAS 9.4. To identify the pathways and direct, indirect, total effects based on the PRECEDE model, we used AMOS 26.0. Results: Highly rated self-efficacy (OR 8.82, 95% CI: 3.23-24.09), awareness (OR 6.05, 95% CI: 2.06-17.72), and enabling factors (OR 3.23, 95% CI: 1.18-8.78) led to superior infection control. As a result of the structural model analysis, the highly rated enabling factors and awareness led to superior practice patterns. Conclusion: Practice is related to self-efficacy, awareness, and enabling factors; however, further research is needed to develop strategies for infection control. In particular, institutional arrangements are needed to improve the enabling factors. Improving infection control performance may lead to better infection control and enhanced protection of EMS personnel and patients against infection risks.

A Security Protocol for Swarming Technique in Peer-to-Peer Networks (피어 투 피어 네트워크에서 스워밍 기법을 위한 보안 프로토콜)

  • Lee, Kwan-Seob;Lee, Kwan-Sik;Lee, Jang-Ho;Han, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.9
    • /
    • pp.1955-1964
    • /
    • 2011
  • With fast deployment of high-speed networks and various online services, the demand for massive content distribution is also growing fast. An approach that is increasingly visible in communication research community and in industry domain is peer-to-peer (P2P) networks. The P2P swarming technique enables a content distribution system to achieve higher throughput, avoid server or network overload, and be more resilient to failure and traffic fluctuation. Moreover, as a P2P-based architecture pushed the computing and bandwidth cost toward the network edge, it allows scalability to support a large number of subscribers on a global scale, while imposing little demand for equipment on the content providers. However, the P2P swarming burdens message exchange overheads on the system. In this paper, we propose a new protocol which provides confidentiality, authentication, integrity, and access control to P2P swarming. We implemented a prototype of our protocol on Android smart phone platform. We believe our approach can be straightforwardly adapted to existing commercial P2P content distribution systems with modest modifications to current implementations.

TRED : Twitter based Realtime Event-location Detector (트위터 기반의 실시간 이벤트 지역 탐지 시스템)

  • Yim, Junyeob;Hwang, Byung-Yeon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.8
    • /
    • pp.301-308
    • /
    • 2015
  • SNS is a web-based online platform service supporting the formation of relations between users. SNS users have usually used a desktop or laptop for this purpose so far. However, the number of SNS users is greatly increasing and their access to the web is improving with the spread of smart phones. They share their daily lives with other users through SNSs. We can detect events if we analyze the contents that are left by SNS users, where the individual acts as a sensor. Such analyses have already been attempted by many researchers. In particular, Twitter is used in related spheres in various ways, because it has structural characteristics suitable for detecting events. However, there is a limitation concerning the detection of events and their locations. Thus, we developed a system that can detect the location immediately based on the district mentioned in Twitter. We tested whether the system can function in real time and evaluated its ability to detect events that occurred in reality. We also tried to improve its detection efficiency by removing noise.