• Title/Summary/Keyword: Web application analysis

Search Result 605, Processing Time 0.025 seconds

Strategies on Text Screen Design Of The Electronic Textbook For Focused Attention Using Automatic Text Scroll (자동 스크롤 가능을 이용한 주의력 집중을 위한 웹기반 전자교과서 텍스트 화면 설계전략)

  • Kwon, Hyunggyu
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.4
    • /
    • pp.134-145
    • /
    • 2002
  • The purpose of this study is to present the functional and technical solutions for text learning of web-based textbook in which each letter has its own focal point. The solutions help learners not to lose the main focus when eye moves to the next letter or line. The text screen of the electronic textbook automatically scrolls the text to up and down or left and right directions which are preassigned by learner. It doesn't need the operation of mouse or keyboard. And learner can change scroll speed and types anytime during scrolling. Automatic text scroll function is a solution for controlling data and screen to reflect the personal favor and ability. It contains the content structure of the text(characteristics, categorizations etc.), the appearance of the text(density, size, font etc.), scroll options(scroll, speed etc.), program control type(ram resident program etc.), and the application of the screen design principles(legibility etc.). To resolve these functional problems, technical 8 phases are provided, which are environment setting, scroll option setting, copy, data analysis, scroll coding, centered focus coding, left and right focus coding, implementation. The learner can focus on text without dispersion because the text focal points stay in the fixed area of screen. 1bey read the text following their preferences for fonts, sizes, line spacing and so on.

  • PDF

A Study on Development of Network Management Systems base on Component (컴포넌트 기반의 망관리 시스템 개발에 관한 연구)

  • Kim, Haeng-Kon;Kim, Ji-Young
    • The KIPS Transactions:PartD
    • /
    • v.11D no.4
    • /
    • pp.937-950
    • /
    • 2004
  • With growing population of internet and web applications, distributed environment is considered to be the standard architecture of application. A network management systems(NMS) is necessary to control and monitor the complex network resources for providing and sharing the heft quality service. We recognize the NMS as a standard infrastructure for supporting efficient networking and a separate commercial applications. We believe every resource including software, hardware and environment for the network management should be separated from special protocols, vendors and applications. Therefore, We need a standard network management system that is efficient and consistent because of the heterogeous network features. In regards to software development, software reuse through assembling and extending the reusable elements such as patterns and components assures to realize the best productivity and quality The component based development(CBD) methodology that can assemble black box though well defined interfaces makes it possible to develop easer and quicker applications and is proved as the best software development solution involved in construction, selection and assembly of components. In this thesis, we describe the architecture for the network management and identify, define and design the components through analysis and design in the network management domain and Identified components mapped to the component architecture. We also specify the component development and design and implement the component for developing the network management. Implemented components apply to the component repository system that register, retrieve and understand the components. We analyze, design and implement the entire network management system based on configuration, connection, performance and fault management through the pre-developed components.

Experiment and Simulation for Evaluation of Jena Storage Plug-in Considering Hierarchical Structure (계층 구조를 고려한 Jena Plug-in 저장소의 평가를 위한 실험 및 시뮬레이션)

  • Shin, Hee-Young;Jeong, Dong-Won;Baik, Doo-Kwon
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.2
    • /
    • pp.31-47
    • /
    • 2008
  • As OWL(Web Ontology Language) has been selected as a standard ontology description language by W3C, many ontologies have been building and developing in OWL. The lena developed by HP as an Application Programming Interface(API) provides various APIs to develop inference engines as well as storages, and it is widely used for system development. However, the storage model of Jena2 stores most owl documents not acceptable into a single table and it shows low processing performance for a large ontology data set. Most of all, Jena2 storage model does not consider hierarchical structures of classes and properties. In addition, it shows low query processing performance using the hierarchical structure because of many join operations. To solve these issues, this paper proposes an OWL ontology relational database model. The proposed model semantically classifies and stores information such as classes, properties, and instances. It improves the query processing performance by managing hierarchical information in a separate table. This paper also describes the implementation and evaluation results. This paper also shows the experiment and evaluation result and the comparative analysis on both results. The experiment and evaluation show our proposal provides a prominent performance as against Jena2.

  • PDF

A Study on the Effective Method to Producing Data for The ROKA Live Fire Training Range Safety (한국군 실 사격 훈련간 효율적인 안전지대 데이터 구축 방안 연구)

  • Lee, June-Sik;Choi, Bong-Wan;Oh, Hyun-Seung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.3
    • /
    • pp.64-77
    • /
    • 2015
  • An effective method for produce munitions effectiveness data is to calculate weapon effectiveness indices in the US military's Joint Munitions Effectiveness Manuals (JMEM) and take advantage of the damage evaluation model (GFSM) and weapon Effectiveness Evaluation Model (Matrix Evaluator). However, a study about the Range Safety that can be applied in the live firing exercises is very insufficient in the case of ROK military. The Range Safety program is an element of the US Army Safety Program, and is the program responsible for developing policies and guidance to ensure the safe operation of live-fire ranges. The methodology of Weapon Danger Zone (WDZ) program is based on a combination of weapon modeling/simulation data and actual impact data. Also, each WDZ incorporates a probability distribution function which provides the information necessary to perform a quantitative risk assessment to evaluate the relative risk of an identified profile. A study of method to establish for K-Range Safety data is to develop manuals (pamphlet) will be a standard to ensure the effective and safe fire training at the ROK military education and training and environmental conditions. For example, WDZs are generated with the WDZ tool as part of the RMTK (Range Managers Tool Kit) package. The WDZ tool is a Geographic Information System-based application that is available to operational planners and range safety manager of Army and Marine Corps in both desktop and web-based versions. K-Range Safety Program based on US data is reflected in the Korean terrain by operating environments and training doctrine etc, and the range safety data are made. Thus, verification process on modified variables data is required. K-Range Safety rather than being produced by a single program, is an package safety activities and measures through weapon danger zone tool, SRP (The Sustainable Range Program), manuals, doctrine, terrain, climate, military defence M&S, weapon system development/operational test evaluation and analysis to continuously improving range safety zone. Distribution of this K-range safety pamphlet is available to Army users in electronic media only and is intended for the standing army and army reserve. Also publication and distribution to authorized users for marine corps commands are indicated in the table of allowances for publications. Therefore, this study proposes an efficient K-Range Safety Manual producing to calculate the danger zones that can be applied to the ROK military's live fire training by introducing of US Army weapons danger zone program and Range Safety Manual

A System of Audio Data Analysis and Masking Personal Information Using Audio Partitioning and Artificial Intelligence API (오디오 데이터 내 개인 신상 정보 검출과 마스킹을 위한 인공지능 API의 활용 및 음성 분할 방법의 연구)

  • Kim, TaeYoung;Hong, Ji Won;Kim, Do Hee;Kim, Hyung-Jong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.895-907
    • /
    • 2020
  • With the recent increasing influence of multimedia content other than the text-based content, services that help to process information in content brings us great convenience. These services' representative features are searching and masking the sensitive data. It is not difficult to find the solutions that provide searching and masking function for text information and image. However, even though we recognize the necessity of the technology for searching and masking a part of the audio data, it is not easy to find the solution because of the difficulty of the technology. In this study, we propose web application that provides searching and masking functions for audio data using audio partitioning method. While we are achieving the research goal, we evaluated several speech to text conversion APIs to choose a proper API for our purpose and developed regular expressions for searching sensitive information. Lastly we evaluated the accuracy of the developed searching and masking feature. The contribution of this work is in design and implementation of searching and masking a sensitive information from the audio data by the various functionality proving experiments.

Design and Performance Evaluation of Software On-Demand Streaming System Providing Virtual Software Execution Environment (가상 소프트웨어 실행 환경을 제공하는 주문형 소프트웨어 스트리밍 시스템 설계 및 성능평가)

  • Kim Young-Man;Park Hong-Jae;Han Wang-Won;Choi Wan;Heo Seong-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.501-510
    • /
    • 2006
  • Software streaming allows the execution of stream-enabled software on desktop or portable computing devices like PC, PDA, laptop, cellular phone, etc., even while the transmission/streaming from the server may still be in progress. In this paper, we present an efficient streaming system called Software On-Demand(SOD) streaming system to transmit stream-enabled applications in addition to automatic installation of program registry, environment variables, configuration files, and related components. In particular, we design and implement a SOD system in Linux to provide the user with the instant look-and-click software execution environment such that software download and installation are internally proceeded in a completely user-transparent way. Therefore, the SOD system relieves the user from the tricky, failure-prone installation business. In addition, the software developer now obtains a new, powerful means to advertise and propagate their software products since the user can use software packages via user-friendly UI window or web browser by look-and-click interactive operation. In the paper, we also make a couple of SOD streaming experiments using a spectrum of popular softwares. Based on the analysis of the experiment results, we also propose two performance improvement schemes.

Predicting the Performance of Recommender Systems through Social Network Analysis and Artificial Neural Network (사회연결망분석과 인공신경망을 이용한 추천시스템 성능 예측)

  • Cho, Yoon-Ho;Kim, In-Hwan
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.4
    • /
    • pp.159-172
    • /
    • 2010
  • The recommender system is one of the possible solutions to assist customers in finding the items they would like to purchase. To date, a variety of recommendation techniques have been developed. One of the most successful recommendation techniques is Collaborative Filtering (CF) that has been used in a number of different applications such as recommending Web pages, movies, music, articles and products. CF identifies customers whose tastes are similar to those of a given customer, and recommends items those customers have liked in the past. Numerous CF algorithms have been developed to increase the performance of recommender systems. Broadly, there are memory-based CF algorithms, model-based CF algorithms, and hybrid CF algorithms which combine CF with content-based techniques or other recommender systems. While many researchers have focused their efforts in improving CF performance, the theoretical justification of CF algorithms is lacking. That is, we do not know many things about how CF is done. Furthermore, the relative performances of CF algorithms are known to be domain and data dependent. It is very time-consuming and expensive to implement and launce a CF recommender system, and also the system unsuited for the given domain provides customers with poor quality recommendations that make them easily annoyed. Therefore, predicting the performances of CF algorithms in advance is practically important and needed. In this study, we propose an efficient approach to predict the performance of CF. Social Network Analysis (SNA) and Artificial Neural Network (ANN) are applied to develop our prediction model. CF can be modeled as a social network in which customers are nodes and purchase relationships between customers are links. SNA facilitates an exploration of the topological properties of the network structure that are implicit in data for CF recommendations. An ANN model is developed through an analysis of network topology, such as network density, inclusiveness, clustering coefficient, network centralization, and Krackhardt's efficiency. While network density, expressed as a proportion of the maximum possible number of links, captures the density of the whole network, the clustering coefficient captures the degree to which the overall network contains localized pockets of dense connectivity. Inclusiveness refers to the number of nodes which are included within the various connected parts of the social network. Centralization reflects the extent to which connections are concentrated in a small number of nodes rather than distributed equally among all nodes. Krackhardt's efficiency characterizes how dense the social network is beyond that barely needed to keep the social group even indirectly connected to one another. We use these social network measures as input variables of the ANN model. As an output variable, we use the recommendation accuracy measured by F1-measure. In order to evaluate the effectiveness of the ANN model, sales transaction data from H department store, one of the well-known department stores in Korea, was used. Total 396 experimental samples were gathered, and we used 40%, 40%, and 20% of them, for training, test, and validation, respectively. The 5-fold cross validation was also conducted to enhance the reliability of our experiments. The input variable measuring process consists of following three steps; analysis of customer similarities, construction of a social network, and analysis of social network patterns. We used Net Miner 3 and UCINET 6.0 for SNA, and Clementine 11.1 for ANN modeling. The experiments reported that the ANN model has 92.61% estimated accuracy and 0.0049 RMSE. Thus, we can know that our prediction model helps decide whether CF is useful for a given application with certain data characteristics.

Application of Terrestrial LiDAR for Reconstructing 3D Images of Fault Trench Sites and Web-based Visualization Platform for Large Point Clouds (지상 라이다를 활용한 트렌치 단층 단면 3차원 영상 생성과 웹 기반 대용량 점군 자료 가시화 플랫폼 활용 사례)

  • Lee, Byung Woo;Kim, Seung-Sep
    • Economic and Environmental Geology
    • /
    • v.54 no.2
    • /
    • pp.177-186
    • /
    • 2021
  • For disaster management and mitigation of earthquakes in Korea Peninsula, active fault investigation has been conducted for the past 5 years. In particular, investigation of sediment-covered active faults integrates geomorphological analysis on airborne LiDAR data, surface geological survey, and geophysical exploration, and unearths subsurface active faults by trench survey. However, the fault traces revealed by trench surveys are only available for investigation during a limited time and restored to the previous condition. Thus, the geological data describing the fault trench sites remain as the qualitative data in terms of research articles and reports. To extend the limitations due to temporal nature of geological studies, we utilized a terrestrial LiDAR to produce 3D point clouds for the fault trench sites and restored them in a digital space. The terrestrial LiDAR scanning was conducted at two trench sites located near the Yangsan Fault and acquired amplitude and reflectance from the surveyed area as well as color information by combining photogrammetry with the LiDAR system. The scanned data were merged to form the 3D point clouds having the average geometric error of 0.003 m, which exhibited the sufficient accuracy to restore the details of the surveyed trench sites. However, we found more post-processing on the scanned data would be necessary because the amplitudes and reflectances of the point clouds varied depending on the scan positions and the colors of the trench surfaces were captured differently depending on the light exposures available at the time. Such point clouds are pretty large in size and visualized through a limited set of softwares, which limits data sharing among researchers. As an alternative, we suggested Potree, an open-source web-based platform, to visualize the point clouds of the trench sites. In this study, as a result, we identified that terrestrial LiDAR data can be practical to increase reproducibility of geological field studies and easily accessible by researchers and students in Earth Sciences.

Features of Korean Webtoons through the Statistical Analysis (웹툰 통계 분석을 통한 한국 웹툰의 특징)

  • Yoon, Ki-Heon;Jung, Kiu-Ha;Choi, In-Soo;Choi, Hae-Sol
    • Cartoon and Animation Studies
    • /
    • s.38
    • /
    • pp.177-194
    • /
    • 2015
  • This study that had been conducted two months by a research team of Pusan National University at the request of Korea Manwha Contents Agency in Dec. 2013 is about the statistical analysis on 'Korean Webtoon DB and its Flow Report' which resulted from the complete survey of Korean webtoons which had been published with payment in official media from early 2000 to 2013. Webtoon which means the cartoons published on web has become a typical type of Korean cartoons and has developed into a main industry since 2000s when traditional published cartoons had declined and social environments had changed. Today, it represents cultural contents in Korea. This study collected the webtoons officially published in media with payment, among Korean webtoons having been published from the early 2000s to Jan. Based on the collected data, it analyzed the general characteristics of webtoons, including cartoonists, the number of cartoons, distribution chart of each media, genre, and publication cycle. According to the data analysis and statistics, a great deal of Korean webtoons are still published in main portal websites, but their platform is being diversified and a webtoon's publication cycle tends to be shortened. In terms of genre, traditional popular genres, such as drama, comic, fantasy, and action, are still popular, and the genres of history, sports, and food are on the rise along with a social trend. Regarding webtoon application, such events as relay webtoon and brand webtoon, and a new type of webtoon featuring PPL commercialism appear. Such phenomena can realize the common profits of cartoonists, media, and ordering bodies, and are various trials to test the possibility of webtoons. In addition, what needs to pay attention on in the expansion of webtoons is increasing webtoons for adults. The study subjects are the webtoons published with payment, excluding free webtoons. However, this study failed to collect the webtoons published on the online websites already closed, and the lost information on cartoonists and their lost webtoons, and it is necessary to conduct a complete survey on all webtoons including free ones. Despite the limitations, this study is meaningful in the points that it categorized and analyzed Korean webtoons accoridng to official media, webtoons, cartoonists, and genres and that it provided a fundamental material to understand the current conditions of webtoons. It is expected that this study will be able to contribute to activating more research on webtoons and producing more supplementary data which will be used for the Korean cartoon industry and academia.

Social Network Analysis for the Effective Adoption of Recommender Systems (추천시스템의 효과적 도입을 위한 소셜네트워크 분석)

  • Park, Jong-Hak;Cho, Yoon-Ho
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.305-316
    • /
    • 2011
  • Recommender system is the system which, by using automated information filtering technology, recommends products or services to the customers who are likely to be interested in. Those systems are widely used in many different Web retailers such as Amazon.com, Netfix.com, and CDNow.com. Various recommender systems have been developed. Among them, Collaborative Filtering (CF) has been known as the most successful and commonly used approach. CF identifies customers whose tastes are similar to those of a given customer, and recommends items those customers have liked in the past. Numerous CF algorithms have been developed to increase the performance of recommender systems. However, the relative performances of CF algorithms are known to be domain and data dependent. It is very time-consuming and expensive to implement and launce a CF recommender system, and also the system unsuited for the given domain provides customers with poor quality recommendations that make them easily annoyed. Therefore, predicting in advance whether the performance of CF recommender system is acceptable or not is practically important and needed. In this study, we propose a decision making guideline which helps decide whether CF is adoptable for a given application with certain transaction data characteristics. Several previous studies reported that sparsity, gray sheep, cold-start, coverage, and serendipity could affect the performance of CF, but the theoretical and empirical justification of such factors is lacking. Recently there are many studies paying attention to Social Network Analysis (SNA) as a method to analyze social relationships among people. SNA is a method to measure and visualize the linkage structure and status focusing on interaction among objects within communication group. CF analyzes the similarity among previous ratings or purchases of each customer, finds the relationships among the customers who have similarities, and then uses the relationships for recommendations. Thus CF can be modeled as a social network in which customers are nodes and purchase relationships between customers are links. Under the assumption that SNA could facilitate an exploration of the topological properties of the network structure that are implicit in transaction data for CF recommendations, we focus on density, clustering coefficient, and centralization which are ones of the most commonly used measures to capture topological properties of the social network structure. While network density, expressed as a proportion of the maximum possible number of links, captures the density of the whole network, the clustering coefficient captures the degree to which the overall network contains localized pockets of dense connectivity. Centralization reflects the extent to which connections are concentrated in a small number of nodes rather than distributed equally among all nodes. We explore how these SNA measures affect the performance of CF performance and how they interact to each other. Our experiments used sales transaction data from H department store, one of the well?known department stores in Korea. Total 396 data set were sampled to construct various types of social networks. The dependant variable measuring process consists of three steps; analysis of customer similarities, construction of a social network, and analysis of social network patterns. We used UCINET 6.0 for SNA. The experiments conducted the 3-way ANOVA which employs three SNA measures as dependant variables, and the recommendation accuracy measured by F1-measure as an independent variable. The experiments report that 1) each of three SNA measures affects the recommendation accuracy, 2) the density's effect to the performance overrides those of clustering coefficient and centralization (i.e., CF adoption is not a good decision if the density is low), and 3) however though the density is low, the performance of CF is comparatively good when the clustering coefficient is low. We expect that these experiment results help firms decide whether CF recommender system is adoptable for their business domain with certain transaction data characteristics.