• Title/Summary/Keyword: Web Documents

Search Result 828, Processing Time 0.025 seconds

Personal Information Management Based on the Concept Lattice of Formal Concept Analysis (FCA 개념 망 기반 개인정보관리)

  • Kim, Mi-Hye
    • Journal of Internet Computing and Services
    • /
    • v.6 no.6
    • /
    • pp.163-178
    • /
    • 2005
  • The ultimate objective of Personal Information Management (PIM) is to collect, handle and manage wanted information in a systematic way that enables individuals to search the information more easily and effectively, However, existing personal information management systems are usually based on a traditional hierarchical directory model for storing information, limiting effective organization and retrieval of information as well as providing less support in search by associative interrelationship between objects (documents) and their attributes, To improve these problems, in this paper we propose a personal information management model based on the concept lattice of Formal Concept Analysis (FCA) to easily build and maintain individuals' own information on the Web, The proposed system can overcome the limitations of the traditional hierarchy approach as well as supporting search of other useful information by the inter-relationships between objects and their attributes in the concept lattice of FCA beyond a narrow search.

  • PDF

Current State and Characteristics of Military Survey in Developed Countries: Focused on the Surveys of United States, Australia, and Canada (주요 선진국의 군 건강관련 조사 실태 및 특성: 미국, 호주, 캐나다를 중심으로)

  • Kim, Mi-Sun;Sohn, Minsung;Choi, Mankyu
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.537-549
    • /
    • 2013
  • This study examines implications for the Korean military health survey from literature review on foreign military health surveys. The authors discuss backgrounds, objectives, participants, methods, contents, organizations involved, and cycles of foreign military health surveys from literature review from peer-reviewed journals as well as reports and documents collected from web-sites of governmental organizations. Common and distinguishing characteristics were found from foreign military health surveys. First, the military health surveys have evolved in phases in the direction of reducing health risk factors. Second, the importance of mental health is being emphasized. Third, cooperations and collaborations of governments, universities, and professional agencies are important in order to ensure anonymity and expertise on data collection and analysis. Finally, health surveys are conducted on a regular basis through institutionalization. To monitor and to promote health of military personnel, it is critical for Korea to establish the legal and institutional environment and to recognize the importance as well as the need of military health surveys at the national level.

Design and Implementation of Real-time Audio and Video System Using Red5 and Node.js (Red5와 Node.js를 활용한 실시간 음성 및 영상 시스템의 설계 및 구현)

  • Kim, Hyeock-Jin;Kwark, Woo-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.10
    • /
    • pp.159-168
    • /
    • 2014
  • The Web is a way to share documents and communicate. However, voice and video data can be transmission in real time and currently being developed by the objects and the objects that interact to further develop the Internet. Existing video and audio programs to transmission data to the interface of different types of systems a lot of constraint condition on the cost of the interface, extensibility. In this paper, voice and audio transmission system a different operating system, improve the constraints of the ERP system compatibility and extensibility is a open source based system developed by the research. The program is different types of systems and interface, extensibility with program design and development methodologies, and open source-based system composed This system is good for cost saving and extensibility. Therefore, systems research and development, Extensibility and excellent on the interface, system design and development methodologies, such as real-time video conferencing, HMI, and take advantage of your video available from SNS.

Informatics analysis of consumer reviews for 「Frozen 2」 fashion collaboration products - Semantic networks and sentiment analysis - (「겨울왕국2」의 콜라보레이션 패션제품에 대한 소비자 리뷰 - 의미 네트워크와 감성분석 -)

  • Choi, Yeong-Hyeon;Lee, Kyu-Hye
    • The Research Journal of the Costume Culture
    • /
    • v.28 no.2
    • /
    • pp.265-284
    • /
    • 2020
  • This study aimed to analyze the performance of Disney-collaborated fashion lines based on online consumer reviews. To do so, the researchers employed text mining and network analysis to identify key words in the reviews of these products. Blogs, internet cafes, and web documents provided by Naver, Daum, and YoutTube were selected as subjects for the analysis. The analysis period was limited to one year after for the 2019. Data collection and analysis were conducted using Python 3.7, Textom, and NodeXL. The research terms in question were as follows: 'Disney fashion collaboration' and 'Frozen fashion collaboration'. Preliminary survey results indicated that 'Elsa's dress' was the most frequently mentioned term and that the domestic fashion brand Eland Retail was the most active in selling Disney branded clothing through its own brand. The writers of reviews for Disney-collaborated fashion products were primarily mothers with daughters. Their decision to purchase these products was based upon the following factors; price, size, stability of decoration, shipping, laundry, and retailer. The motives for purchasing the product were the positive response of the consumer's child and the satisfaction of the parents due to the child's response. The problems to be solved included insufficient quantity of supply, delay in delivery, expensive price considering the number of times children's clothes are worn, poor glitter decoration, faded color, contamination from laundry, and undesirable smells immediately after the purchase.

The Status of Agricultural Diseases, Injuries and Accidents among the England, the USA, the France, the Japan, and the Korea (영국, 미국, 프랑스, 일본과 한국의 농업인 업무상 재해 발생 현황에 관한 고찰)

  • Lee, Kyung-Sook;Choi, Jeong-Wha;Baek, Yoon-Jeong;Kim, Kyung-Ran
    • The Korean Journal of Community Living Science
    • /
    • v.18 no.1
    • /
    • pp.189-204
    • /
    • 2007
  • This review was to suey the status of agricultural diseases, injuries and accidents among England, the USA, France, Japan, and Korea. For this purpose, detailed research objectives were to analyze the current national status of agricultural diseases, injuries and accidents in Korea and four foreign countries. To do so, related literature such as books, theses, articles, and web documents were collected and analyzed. The implications for industry and agricultural safety and health, diseases, occupational injuries and accidents of farmers thereby derived were as follows: 1) efforts on unifying administrative systems, 2) special support and management systems focusing on neglected subjects, 3) committees for collecting opinions and suggesting alternative policies on the behalf of various financiers, 4) aligned strategies including vision, goals, and long-term plans about national safety and health projects, 5) development of supporting systems considering the features of agriculture, 6) systematized national surveys about occupational injuries and accidents for basic statistics and national studies, 7) active prevention efforts against occupational injuries and accidents, and 8) specialized funds for the safety and health of farmers.

  • PDF

Feature Generation of Dictionary for Named-Entity Recognition based on Machine Learning (기계학습 기반 개체명 인식을 위한 사전 자질 생성)

  • Kim, Jae-Hoon;Kim, Hyung-Chul;Choi, Yun-Soo
    • Journal of Information Management
    • /
    • v.41 no.2
    • /
    • pp.31-46
    • /
    • 2010
  • Now named-entity recognition(NER) as a part of information extraction has been used in the fields of information retrieval as well as question-answering systems. Unlike words, named-entities(NEs) are generated and changed steadily in documents on the Web, newspapers, and so on. The NE generation causes an unknown word problem and makes many application systems with NER difficult. In order to alleviate this problem, this paper proposes a new feature generation method for machine learning-based NER. In general features in machine learning-based NER are related with words, but entities in named-entity dictionaries are related to phrases. So the entities are not able to be directly used as features of the NER systems. This paper proposes an encoding scheme as a feature generation method which converts phrase entities into features of word units. Futhermore, due to this scheme, entities with semantic information in WordNet can be converted into features of the NER systems. Through our experiments we have shown that the performance is increased by about 6% of F1 score and the errors is reduced by about 38%.

A Study on Surveying Functions of RBI Software (RBI 소프트웨어의 기능에 관한 조사연구)

  • Song J S;Shim S H;No W H;Park J H;Choi S C;Kwon J R;Kim J Y;Yoon K B
    • Journal of the Korean Institute of Gas
    • /
    • v.5 no.4 s.16
    • /
    • pp.56-61
    • /
    • 2001
  • Recently RBI softwares have received widespread interests from various industries. The available RBI softwares have variety of levels of analysis, fields of applications and damage mechanisms considered, which depend on the software developing institutes. In this paper results of a GSP(Group Sponsored Project) entitled 'Study on Surveying Functions of Foreign RBI Softwares' are summarized. A part of the study is explained in detail as a sample case for showing the contents of the project. Based on the demo softwares as well as the open documents and contents obtained in the web pages of the developer critical comparisons of the well-known RBI softwares were made. The required functions of the optimal RBI software is also discussed from the review results of this study.

  • PDF

Hierarchical Automatic Classification of News Articles based on Association Rules (연관규칙을 이용한 뉴스기사의 계층적 자동분류기법)

  • Joo, Kil-Hong;Shin, Eun-Young;Lee, Joo-Il;Lee, Won-Suk
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.6
    • /
    • pp.730-741
    • /
    • 2011
  • With the development of the internet and computer technology, the amount of information through the internet is increasing rapidly and it is managed in document form. For this reason, the research into the method to manage for a large amount of document in an effective way is necessary. The conventional document categorization method used only the keywords of related documents for document classification. However, this paper proposed keyword extraction method of based on association rule. This method extracts a set of related keywords which are involved in document's category and classifies representative keyword by using the classification rule proposed in this paper. In addition, this paper proposed the preprocessing method for efficient keywords creation and predicted the new document's category. We can design the classifier and measure the performance throughout the experiment to increase the profile's classification performance. When predicting the category, substituting all the classification rules one by one is the major reason to decrease the process performance in a profile. Finally, this paper suggested automatically categorizing plan which can be applied to hierarchical category architecture, extended from simple category architecture.

Design and Implementation of Middleware supporting translation of EDI using XML (XML기반의 EDI 문서교환을 위한 미들웨어 설계 및 구현)

  • Choi, Gwang-Mi;Park, Su-Young;Jung, Chai-Yeoung
    • The KIPS Transactions:PartB
    • /
    • v.9B no.6
    • /
    • pp.845-852
    • /
    • 2002
  • Electronic document processing using EDl (Electronic Data Interchange) must exchange documents using VAN (Value Added Network). However. the use of exclusive software needs alteration of a new document and the use of VAN(Value Added Network) demands an exchange of document and high cost for maintenance. Due to these problems, the existing EDI (Electronic Data Interchange) is turning into Web-based EDI (Electronic Data Interchange). This paper suggests techniques that change EDI (Electronic Data Interchange) messages which exist in two relational databases into XML (extensible Markeup Language) using the JDBC bridge. Also this paper proposes a method that recovers schema using converted XML (extensible Markeup Language) file, and a method which inserts an original record into a declared table. This solves the limitation of an original method that have to use sane database management system and also overcomes the problem in certain circumstances where the EDI (Electronic Data Interchange) exchange does not work.

Privacy Data Protection Methods on Smartphone Using A Virtual Disk Platform (스마트폰에서 가상 디스크 플랫폼을 사용한 프라이버시 데이터 보호 방안)

  • Shin, Suk-Jo;Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.560-567
    • /
    • 2013
  • The release of iPhone by Apple in 2009 has changed the life pattern of an individual tremendously. That is, with the emergence of a smart phone, various services including voice/video call, camera, receiving and sending of e-mail, and web browsing have been realized. However, the broader the scope of the use of a smart phone has become, the greater the need for companies to introduce an MDM solution for protecting important documents has become. However the MDM solution may have a problem in that all data such as contacts, pictures, and memos saved in the smart phone can be accessed unlimitedly. For this reason, there is a risk that unwanted violation of privacy may happen to smart phone users. This paper proposed a plan to protect a personal privacy file of smart phone users, which disables access by others except for related smart phone users by enabling a person in charge of security or an MDM manager in a company to have access only to the file which was allowed by smart phone users to be disclosed and by saving non-disclosed files in a virtual disk.