• Title/Summary/Keyword: Personal Name Search

Search Result 13, Processing Time 0.028 seconds

Method of Improving Personal Name Search in Academic Information Service

  • Han, Heejun;Lee, Seok-Hyoung
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.2 no.2
    • /
    • pp.17-29
    • /
    • 2012
  • All academic information on the web or elsewhere has its creator, that is, a subject who has created the information. The subject can be an individual, a group, or an institution, and can be a nation depending on the nature of the relevant information. Most information is composed of a title, an author, and contents. An essay which is under the academic information category has metadata including a title, an author, keyword, abstract, data about publication, place of publication, ISSN, and the like. A patent has metadata including the title, an applicant, an inventor, an attorney, IPC, number of application, and claims of the invention. Most web-based academic information services enable users to search the information by processing the meta-information. An important element is to search information by using the author field which corresponds to a personal name. This study suggests a method of efficient indexing and using the adjacent operation result ranking algorithm to which phrase search-based boosting elements are applied, and thus improving the accuracy of the search results of personal names. It also describes a method for providing the results of searching co-authors and related researchers in searching personal names. This method can be effectively applied to providing accurate and additional search results in the academic information services.

THE METHOD FOR SETTING DESTINATION BASED ON IDENTIFIER OF MOVING OBJECT

  • Jang, In-Sung
    • Proceedings of the KSRS Conference
    • /
    • 2008.10a
    • /
    • pp.107-110
    • /
    • 2008
  • In this study, we propose a system for setting a Destination on CNS(Car Navigation System) or PNS(Personal Navigation System). The present Navigation does set the destination by only static method like name search, address search and wire telegraph telephone number search. But, the kind of setting a static destination does not reflect the dynamic moving situation. So we suggest setting the destination of navigation using Identifier of moving terminal. And it includes privacy protection on personal position information

  • PDF

Email Extraction and Utilization for Author Disambiguation (저자 식별을 위한 전자메일의 추출 및 활용)

  • Kang, In-Su
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.261-268
    • /
    • 2008
  • An author of a paper is represented as his/her personal name in a bibliographic record. However, the use of names to indicate authors may deteriorate recall and precision of paper and/or author search, since the same name can be shared by many different individuals and a person can write his/her name in different forms. To solve this problem, it is required to disambiguate same-name author names into different persons. As features for author resolution, previous studies have exploited bibliographic attributes such as co-authors, titles, publication information, etc. This study attempts to apply email addresses of authors to disambiguate author names. For this, we first handle the extraction of email addresses from full-text papers, and then evaluate and analyze the effect of email addresses on author resolution using a large-scale test set.

Personal Name Authority Control in Korean Public Libraries (국내 공공도서관의 인명 전거제어의 현황 및 발전 방향)

  • Shim, Kyung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.40 no.4
    • /
    • pp.221-244
    • /
    • 2006
  • This research analyzes the current status of personal name authority control and its impact on the end user searching against OPACs in public libraries in Korea. Further it also suggests the ways to improve the recall ratio in author search with a minimal modification, system-wise and authority-wise. on the KOLISNET as a stepping stone for other public libraries. Finally, a long-term plan for establishing proper authority work in public libraries including the National Library of Korea is briefly proposed. In order to find out whether authority works are conducted and examine how variant written forms of the same foreign name and variant names of the same person are treated, OPACS of the National Library of Korea, KOLISNET, and ten randomly selected public libraries were searched. Findings indicate that while the National Library of Korea was performing authority control, even incomplete, the rest did not appear to conduct any form or authority control. As a spinoff of the research, it is observed that in many public libraries their bibliographic records and retrieval methods are inaccurate, lacking consistency, and incomplete. In sum. it is strongly recommended that (1) as a start for authority work among public libraries personal name authority control should be conducted to enhance the identifying and collocating functions in OPACs, (2) a shared authority database, for which the National Library of Korea's authority database might be used. should be built for Public libraries.

A Study on Korean Related Identities of the OCLC WorldCat Identities Network (OCLC WorldCat Identities Network의 한국 관련 아이덴티티에 관한 연구)

  • Yoon, Cheong-Ok
    • Journal of Korean Library and Information Science Society
    • /
    • v.46 no.4
    • /
    • pp.451-470
    • /
    • 2015
  • The purpose of this study is to review the processing of Korean related personal identities included in the OCLC WorldCat Identities Network and propose how to improve its errors. With twelve samples of English and Korean personal and subject identities, their related identities and works were examined, and their bibliographic records were retrieved from WorldCat. In searching WorldCat, inconsistencies in default search queries and the processing of identities with a date or a fuller form of name were observed.

Bibliographical Description and Classification Indexing For Revolutionary Historical Archives in China(2) (중국의 혁명역사기록물의 목록기술과 검색분류(2))

  • Lee, Seung-hwi
    • The Korean Journal of Archival Studies
    • /
    • no.5
    • /
    • pp.209-242
    • /
    • 2002
  • Bibliographical Description for Revolutionary Historical Archives is created to describe records at the item level. It defines descriptive elements, punctuations, formats and methods. Descriptive elements are composed of 20 elements, each of which is either mandatory or optional. Mandatory elements are: repositories codes, documents codes, dates, creators, title, classification codes, and subject vocabularies. Abstracts were previously included in card cataloging and are removed in the computerized system. New elements, such as "uncontrolled vocabularies," "name of places," "personal names," "organizational structures" and "meetings," are added to allow keyword search. Considering that subject vocabulary searches are the most important in computerized systems, however, Guidelines for the Subject Indexing for Revolutionary Historical Archives as well as Subject Headings, as a result from the Guidelines, are created. The most extraordinary features in Chinese archival description are said to be the Guidelines for the Classification Indexing for Revolutionary Historical Archives and Materials as well as the Classification Scheme, both of which are created to allow subject search of records content. It is because Chinese practice of records management distinguishes the classification for arrangement from that for retrieval. Chinese archival description is, therefore, composed of bibliographic description rules, subject headings, and the classification scheme for retrieval.

Design of the Web based Mini-PACS (웹(Web)을 기반으로 한 Mini-PACS의 설계)

  • 안종철;신현진;안면환;박복환;김성규;안현수
    • Progress in Medical Physics
    • /
    • v.14 no.1
    • /
    • pp.43-50
    • /
    • 2003
  • PACS mostly has been used in large scaled hospital due to expensive initial cost to set up the system. The network of PACS is independent of the others: network. The user's PC has to be connected physically to the network of PACS as well as the image viewer has to be installed. The web based mini-PACS can store, manage and search inexpensively a large quantity of radiologic image acquired in a hospital. The certificated user can search and diagnose the radiologic image using web browser anywhere Internet connected. The implemented Image viewer is a viewer to diagnose the radiologic image. Which support the DICOM standard and was implemented to use JAVA programming technology. The JAVA program language is cross-platform which makes easier upgrade the system than others. The image filter was added to the viewer so as to diagnose the radiologic image in detail. In order to access to the database, the user activates his web browser to specify the URL of the web based PACS. Thus, The invoked PERL script generates an HTML file, which displays a query form with two fields: Patient name and Patient ID. The user fills out the form and submits his request via the PERL script that enters the search into the relational database to determine the patient who is corresponding to the input criteria. The user selects a patient and obtains a display list of the patient's personal study and images.

  • PDF

A Study on the Health Information Management Practice Program Model for EMR Certification System Education -Focus on Patient Information Management- (EMR 인증제 교육을 위한 보건의료정보관리 실습 프로그램 모델 연구 -환자정보관리 중심-)

  • Choi, Joon-Young
    • Journal of the Health Care and Life Science
    • /
    • v.9 no.1
    • /
    • pp.1-9
    • /
    • 2021
  • In this study, a model in which certification standards were added to the health information management practice program was studied and presented in order to understand the EMR certification standards implemented by the Korea Health and Medical Information Service. In the practice program, the certification standard function for patient information management was added to the health information management education system to practice and understand patient information management that corresponds to the functional standard of the EMR certification system. The EMR certification standard practice program for patient information management is composed of the following certification standards. registration number and personal information management, treatment reservation schedule management, personal information revision history management, identification of people with the same name, integrated management of multiple registration numbers, patient search by identification information, patient search by health care type, surgical procedure consent record and inquiry, record/inquiry of consent form for personal information use, display of life-sustaining medical decision information, registration/inquiry of external medical institution documents, registration and inquiry of external examination results. In this way, by operating and practicing the functions of the health information system according to the certification standards, it is possible to understand and practice the certification standards and details of patient information management in the functional area of the certification standards. In addition, since the function of the EMR certification standard can be checked, it will be possible to improve the management ability of the electronic medical record system of the health information manager in the medical institution.

Threats and countermeasures of malware (악성코드의 위협과 대응책)

  • Lim, Dong Yul
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.13-18
    • /
    • 2015
  • The malware, as hackers generic name of executable code that is created for malicious purposes, depending on the presence or absence of a self-replicating ability infected subjects, and are classified as viruses, worms, such as the Trojan horse. Mainly Web page search and P2P use, such as when you use a shareware, has become penetration is more likely to occur in such a situation. If you receive a malware attack, whether the e-mail is sent it is automatically, or will suffer damage such as reduced system performance, personal information leaks. While introducing the current malware, let us examine the measures and describes the contents related to the malicious code.

  • PDF

The Design and Implementation of Web Agents for vCard Service in Mobile Enviromnent (모바일 환경에서 vCard 서비스를 위한 웹 에이전트의 설계 및 구현)

  • Yun, Se-Mi;Jo, Ik-Seong
    • The KIPS Transactions:PartD
    • /
    • v.9D no.3
    • /
    • pp.477-486
    • /
    • 2002
  • vCard that is the electronic business card automates the exchange of personal information typically found on a traditional business card. vCard information contains not only simple text, but also graphics and multimedia data like pictures, company logos, Web addresses, and so on. This paper describes the design and implementation of Web-based vCard agent system for exchanging vCard, an electronic business card and searching another user's vCard in mobile phone environment. In today's business environment, such as that this information is typically exchanged on business cards. Our web agent system in this paper connect web server which provide vCard service and search, edit vCard information displayed by web browser of mobile phone and exchange vCard with another user through internet. Considering characteristics of wireless devices that have limited storage space, It also saves constructed XML documents that include user's informations in a web server and solves the security problem by exchanging not personal data or XML but encrypted directory name where XML document exits as exchanging vcard.