• Title/Summary/Keyword: Web Document

Search Result 759, Processing Time 0.025 seconds

A Study on the Procedure for Constructing Linked Open Data of Records Information by Using Open Source Tool (오픈소스 도구를 이용한 기록정보 링크드 오픈 데이터 구축 절차 연구)

  • Ha, Seung Rok;Yim, Jin Hee;Rieh, Hae-young
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.1
    • /
    • pp.341-371
    • /
    • 2017
  • Recently, the web service environment has changed from document-centered to data-oriented focus, and the Linked Open Data (LOD) exists at the core of the new environment. Specific procedures and methods were examined to build the LOD of records information in accordance with this trend. With the service sustainability of small-scale archive in consideration, an exemplification on LOD building process by utilizing open source software was developed in this paper. To this end, a 5-step service framework for LOD construction was proposed and applied to a collection of diary records from 'Human and Memory Archive'. Proof of Concept (POC) utilizing open source softwares, Protege and Apache Jena Fuseki, was conducted according to the proposed 5 step framework. After establishing the LOD of record information by utilizing the open source software, the connection with external LOD through interlinking and SPARQL search has been successfully performed. In addition, archives' considerations for LOD construction, including improvement on the quality of content information, the role of the archivist, were suggested based on the understanding obtained through the LOD construction process of records information.

A Design and Implementation of Reliability Analyzer for Embedded Software using Markov Chain Model and Unit Testing (내장형 소프트웨어 마르코프 체인 모델과 단위 테스트를 이용한 내장형 소프트웨어 신뢰도 분석 도구의 설계와 구현)

  • Kwak, Dong-Gyu;Yoo, Chae-Woo;Choi, Jae-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.1-10
    • /
    • 2011
  • As requirements of embedded system get complicated, the tool for analyzing the reliability of embedded software is being needed. A probabilistic modeling is used as the way of analyzing the reliability of a software and to apply it to embedded software controlling multiple devices. So, it is necessary to specialize that to embedded software. Also, existing reliability analyzers should measure the transition probability of each condition in different ways and doesn't consider reusing the model once used. In this paper, we suggest a reliability analyzer for embedded software using embedded software Markov chin model and a unit testing tool. Embedded software Markov chain model is model specializing Markov chain model which is used for analyzing reliability to an embedded software. And a unit testing tool has host-target structure which is appropriate to development environment of embedded software. This tool can analyze the reliability more easily than existing tool by automatically measuring the transition probability between units for analyzing reliability from the result of unit testing. It can also directly apply the test result updated by unit testing tool by representing software model as a XML oriented document and has the advantage that many developers can access easily using the web oriented interface and SVN store. In this paper, we show reliability analyzing of a example by so doing show usefulness of reliability analyzer.

A framework of management for preventing illegal distribution of pdf bookscan file (PDF 형식 북스캔 파일 불법 유통 방지를 위한 관리 프레임워크)

  • Lee, Kuk-Heon;Chung, Hyun-Ji;Ryu, Dae-Gull;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.897-907
    • /
    • 2013
  • Since various smart devices are being developed, a growing number of people are reading eBooks instead of paper books. However, people started making eBooks on their own by scanning paper books because there are not enough eBooks provided from market. The term "Bookscan" was made with this reason. The number of bookscan company is increasing because the equipment is too expensive. However, the commercial activity of bookscan company is against copyright law. Also bookscan files are in danger of being illegally distributed on web, because bookscan companies are not protecting copyright. Publication market follows the same procedure with sound market which was collapsed due to copyright problem. Therefore, the technical methods should be prepared for law system against bookscan. The previous ICOP(Illegal Copyrights Obstruction Program) system has been applied to sound and movie files, but not applied to publication. This paper suggests the framework for bookscan file management based on practical mechanism.

Risk of Breast Cancer and Total Malignancies in Rheumatoid Arthritis Patients Undergoing TNF-α Antagonist Therapy: a Meta-analysis of Randomized Control Trials

  • Liu, Yang;Fan, Wei;Chen, Hao;Yu, Ming-Xia
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.8
    • /
    • pp.3403-3410
    • /
    • 2014
  • Context: Interest exits in whether TNF-alpha antagonists increase the risk of breast cancer and total malignancies in patients with rheumatoid arthritis (RA). Objectives: To analyze the risk of malignancies, especially breast cancer, in patients with RA enrolled in randomized control trials (RCTs). Methods: A systematic literature search for RCTs from 1 January 1998 to 1 July 2013 from online databases, such as PubMed, WILEY, EMBASE, ISI web of knowledge and Cochrane Library was conducted. Studies included RCTs that compared the safety of at least one dose of the five TNF-${\alpha}$ antagonists with placebo or methotrexate (MTX) (or TNF-${\alpha}$ antagonists plus MTX vs placebo plus MTX) in RA patients for more than 24 weeks and imported all the references into document management software EndNote${\times}6$. Two independent reviewers selected studies and extracted the data about study design, patients' characteristics and the type, number of all malignancies. Results: 28 RCTs from 34 records with 11,741 patients were analyzed. Of the total, 97 developed at least one malignancy during the double-blind trials, and breast cancer was observed in 17 patients (17.5% of total malignancies). However, there was no statistically significant increased risk observed in either the per protocol (PP) model (OR 0.65, 95%CI [0.22, 1.93]) or the modified intention to treat (mITT) model (OR 0.75, 95%CI [0.25, 2.21]). There were also no significant trend for increased risk of total malignancies on anti-TNF-${\alpha}$ therapy administered at approved doses in either model (OR, 1.06, 95%CI [0.64, 1.75], and OR, 1.30, 95%CI [0.80, 2.14], respectively). As to the two models, modified intention to treat model analysis led to higher estimation than per protocol model analysis. Conclusions: This study did not find a significantly increased risk of breast cancer and total malignancies in adults RA patients treated with TNF-${\alpha}$ antagonists at approved doses. However, it cannot be ignored that more patients developed malignancies with TNF-${\alpha}$ antagonists therapy compared with patients with placebo or MTX, in spite of the lack of statistical significance, so that more strict clinical trials and long-term follow-up are needed, and both mITT and PP analyses should be used in such safety analyses.

35-Year Research History of Cytotoxicity and Cancer: a Quantitative and Qualitative Analysis

  • Farghadani, Reyhaneh;Haerian, Batoul Sadat;Ebrahim, Nader Ale;Muniandy, Sekaran
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.7
    • /
    • pp.3139-3145
    • /
    • 2016
  • Cancer is the leading cause of morbidity and mortality worldwide, characterized by irregular cell growth. Cytotoxicity or killing tumor cells that divide rapidly is the basic function of chemotherapeutic drugs. However, these agents can damage normal dividing cells, leading to adverse effects in the body. In view of great advances in cancer therapy, which are increasingly reported each year, we quantitatively and qualitatively evaluated the papers published between 1981 and December 2015, with a closer look at the highly cited papers (HCPs), for a better understanding of literature related to cytotoxicity in cancer therapy. Online documents in the Web of Science (WOS) database were analyzed based on the publication year, the number of times they were cited, research area, source, language, document type, countries, organization-enhanced and funding agencies. A total of 3,473 publications relevant to the target key words were found in the WOS database over 35 years and 86% of them (n=2,993) were published between 2000-2015. These papers had been cited 54,330 times without self-citation from 1981 to 2015. Of the 3,473 publications, 17 (3,557citations) were the most frequently cited ones between 2005 and 2015. The topmost HCP was about generating a comprehensive preclinical database (CCLE) with 825 (23.2%) citations. One third of the remaining HCPs had focused on drug discovery through improving conventional therapeutic agents such as metformin and ginseng. Another 33% of the HCPs concerned engineered nanoparticles (NPs) such as polyamidoamine (PAMAM) dendritic polymers, PTX/SPIO-loaded PLGAs and cell-derived NPs to increase drug effectiveness and decrease drug toxicity in cancer therapy. The remaining HCPs reported novel factors such as miR-205, Nrf2 and p27 suggesting their interference with development of cancer in targeted cancer therapy. In conclusion, analysis of 35-year publications and HCPs on cytotoxicity in cancer in the present report provides opportunities for a better understanding the extent of topics published and may help future research in this area.

An Effective User-Profile Generation Method based on Identification of Informative Blocks in Web Document (웹 문서의 정보블럭 식별을 통한 효과적인 사용자 프로파일 생성방법)

  • Ryu, Sang-Hyun;Lee, Seung-Hwa;Jung, Min-Chul;Lee, Eun-Seok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10c
    • /
    • pp.253-257
    • /
    • 2007
  • 최근 웹 상에 정보가 폭발적으로 증가함에 따라, 사용자의 취향에 맞는 정보를 선별하여 제공하는 추천 시스템에 대한 연구가 활발히 진행되고 있다. 추천시스템은 사용자의 관심정보를 기술한 사용자 프로파일을 기반으로 동작하기 때문에 정확한 사용자 프로파일의 생성은 매우 중요하다. 사용자의 암시적인 행동정보를 기반으로 취향을 분석하는 대표적인 연구로 사용자가 이용한 웹 문서를 분석하는 방법이 있다. 이는 사용자가 이용하는 웹 문서에 빈번하게 등장하는 단어를 기반으로 사용자의 프로파일을 생성하는 것이다. 그러나 최근 웹 문서는 사용자 취향과 관련 없는 많은 구성요소들(로고, 저작권정보 등)을 포함하고 있다. 따라서 이러한 내용들을 모두 포함하여 웹 문서를 분석한다면 생성되는 프로파일의 정확도는 낮아질 것이다. 따라서 본 논문에서는 사용자 기기에서 사용자의 웹 문서 이용내역을 분석하고, 동일한 사이트로부터 얻어진 문서들에서 반복적으로 등장하는 블록을 제거한 후, 정보블럭을 식별하여 사용자의 관심단어를 추출하는 새로운 프로파일 생성방법을 제안한다. 이를 통해 보다 정확하고 빠른 프로파일 생성이 가능해진다. 본 논문에서는 제안방법의 평가를 위해, 최근 구매활동이 있었던 사용자들이 이용한 웹 문서 데이터를 수집하였으며, TF-IDF 방법과 제안방법을 이용하여 사용자 프로파일을 각각 추출하였다. 그리고 생성된 사용자 프로파일과 구매데이터와의 연관성을 비교하였으며, 보다 정확한 프로파일이 추출되는 결과와 프로파일 분석시간이 단축되는 결과를 통해 제안방법의 유효성을 입증하였다.)으로 높은 점수를 보였으며 내장첨가량에 따른 관능특성에서는 온쌀죽은 내장 $2{\sim}5%$ 첨가, 반쌀죽은 내장 $3{\sim}5%$ 첨가구에서 유의적(p<0.05)으로 높은 점수를 보였으나 쌀가루죽은 내장 $1{\sim}2%$ 첨가구에서 유의적(p<0.05)으로 낮은 점수를 보였다. 이상의 연구 결과를 통해 온쌀은 2%, 반쌀은 3%, 쌀가루는 4%의 내장을 첨가하여 제조한 전복죽이 이화학적, 물성적 및 관능적으로 우수한 것으로 나타났다.n)방법의 결과와 비교하였다.다. 유비스크립트에서는 모바일 코드의 개념을 통해서 앞서 언급한 유비쿼터스 컴퓨팅 환경에서의 문제점을 해결하고자 하였다. 모바일 코드에서는 프로그램 코드가 네트워크를 통해서 컴퓨터를 이동하면서 수행되는 개념인데, 이는 물리적으로 떨어져있으면서 네트워크로 연결되어 있는 다양한 컴퓨팅 장치가 서로 연동하기 위한 모델에 가장 적합하다. 이는 기본적으로 배포(deploy)라는 단계가 필요 없게 되고, 새로운 버전의 프로그램이 작성될지라도 런타임에 코드가 직접 이동하게 되므로 버전 관리의 문제도 해결된다. 게다가 원격 함수를 매번 호출하지 않고 한번 이동된 코드가 원격지에서 모두 수행을 하게 되므로 성능향상에도 도움이 된다. 장소 객체(Place Object)와 원격 스코프(Remote Scope)는 앞서 설명한 특징을 직접적으로 지원하는 언어 요소이다. 장소 객체는 모바일 코드가 이동해서 수행될 계산 환경(computational environment

  • PDF

Sensitivity Identification Method for New Words of Social Media based on Naive Bayes Classification (나이브 베이즈 기반 소셜 미디어 상의 신조어 감성 판별 기법)

  • Kim, Jeong In;Park, Sang Jin;Kim, Hyoung Ju;Choi, Jun Ho;Kim, Han Il;Kim, Pan Koo
    • Smart Media Journal
    • /
    • v.9 no.1
    • /
    • pp.51-59
    • /
    • 2020
  • From PC communication to the development of the internet, a new term has been coined on the social media, and the social media culture has been formed due to the spread of smart phones, and the newly coined word is becoming a culture. With the advent of social networking sites and smart phones serving as a bridge, the number of data has increased in real time. The use of new words can have many advantages, including the use of short sentences to solve the problems of various letter-limited messengers and reduce data. However, new words do not have a dictionary meaning and there are limitations and degradation of algorithms such as data mining. Therefore, in this paper, the opinion of the document is confirmed by collecting data through web crawling and extracting new words contained within the text data and establishing an emotional classification. The progress of the experiment is divided into three categories. First, a word collected by collecting a new word on the social media is subjected to learned of affirmative and negative. Next, to derive and verify emotional values using standard documents, TF-IDF is used to score noun sensibilities to enter the emotional values of the data. As with the new words, the classified emotional values are applied to verify that the emotions are classified in standard language documents. Finally, a combination of the newly coined words and standard emotional values is used to perform a comparative analysis of the technology of the instrument.

Design and Implementation of an HTML Converter Supporting Frame for the Wireless Internet (무선 인터넷을 위한 프레임 지원 HTML 변환기의 설계 및 구현)

  • Han, Jin-Seop;Park, Byung-Joon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.6
    • /
    • pp.1-10
    • /
    • 2005
  • This paper describes the implementation of HTML converter for wireless internet access in wireless application protocol environment. The implemented HTML converter consists of the contents conversion module, the conversion rule set, the WML file generation module, and the frame contents reformatting module. Plain text contents are converted to WML contents through one by one mapping, referring to the converting rule set in the contents converting module. For frame contents, the first frameset sources are parsed and the request messages are reconstructed with all the file names, reconnecting to web server as much as the number of files to receive each documents and append to the first document. Finally, after the process of reformatting in the frame contents reformatting module, frame contents are converted to WML's table contents. For image map contents, the image map related tags are parsed and the names of html documents which are linked to any sites are extracted to be replaced with WML contents data and linked to those contents. The proposed conversion method for frame contents provides a better interface for the users convenience and interactions compared to the existing converters. Conversion of image maps in our converter is one of the features not currently supported by other converters.

Access Control of XML Documents Including Update Operators (갱신 연산을 고려한 XML문서의 접근제어)

  • Lim Chung-Hwan;Park Seog
    • Journal of KIISE:Databases
    • /
    • v.31 no.6
    • /
    • pp.567-584
    • /
    • 2004
  • As XML becomes popular as the way of presenting information on the web, how to secure XML data becomes an important issue. So far study on XML security has focused on security of data communications by using digital sign or encryption technology. But, it now requires not just to communicate secure XML data on communication but also to manage query process to access XML data since XML data becomes more complicated and bigger. We can manage XML data queries by access control technique. Right now current XML data access control only deals with read operation. This approach has no option to process update XML queries. In this paper, we present XML access control model and technique that can support both read and update operations. In this paper, we will propose the operation for XML document update. Also, We will define action type as a new concept to manage authorization information and process update queries. It results in both minimizing access control steps and reducing memory cost. In addition, we can filter queries that have no access rights at the XML data, which it can reduce unnecessary tasks for processing unauthorized query. As a result of the performance evaluation, we show our access control model is proved to be better than other access control model in update query. But it has a little overhead to decide action type in select query.

Real Estate Asset NFT Tokenization and FT Asset Portfolio Management (부동산 유동화 NFT와 FT 분할 거래 시스템 설계 및 구현)

  • Young-Gun Kim;Seong-Whan Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.9
    • /
    • pp.419-430
    • /
    • 2023
  • Currently, NFTs have no dominant application except for the proof of ownership for digital content, and it also have small liquidity problem, which makes their price difficult to predict. Real estate usually has very high barriers to investment due to its high pricing. Real estate can be converted into NFTs and also divided into small value fungible tokens (FTs), and it can increase the the volume of the investor community due to more liquidity and better accessibility. In this document, we implement and design a system that allows ordinary users can invest on high priced real estate utilizing Black Litterman (BL) model-based Portfolio investment interface. To this end, we target a set of real estates pegged as collateral and issue NFT for the collateral using blockchain. We use oracle to get the current real estate information and to monitor varying real estate prices. After tokenizing real estate into NFTs, we divide the NFTs into easily accessible price FTs, thereby, we can lower prices and provide large liquidity with price volatility limited. In addition, we also implemented BL based asset portfolio interface for effective portfolio composition for investing in multiple of real estates with small investments. Using BL model, investors can fix the asset portfolio. We implemented the whole system using Solidity smart contracts on Flask web framework with public data portals as oracle interfaces.