• 제목/요약/키워드: e-document

Search Result 557, Processing Time 0.039 seconds

MyNews : Personalized XML Document Transcoding Technique for Mobile Device Users (MyNews : 모바일 환경에서 사용자 관심사를 고려한 XML 문서 트랜스코딩)

  • Song Teuk-Seob;Lee Jin-Sang;Lee Kyong-Ho;Sohn Won-Sung;Ko Seung-Kyu;Choy Yoon-Chul;Lim Soon-Bum
    • The KIPS Transactions:PartB
    • /
    • v.12B no.2 s.98
    • /
    • pp.181-190
    • /
    • 2005
  • Developing wireless internet service and mobile devices, mechanisms for web service across are various. However, the existing web infrastructure and content were designed for desktop computers and arc not well-suited for other types of accesses, e.g. PDA or mobile Phone that have less processing power and memory, small screens, limited input facilities, or network bandwidth etc. Thus, there is a growing need for transcoding techniques that provide that ability to browse the web through mobile devices. However, previous researches on existing web contents transcoding are service provider centric, which does not accurately reflect the user's continuously changing interest. In this paper, we presents a transcoding technique involved in making existing news contents based on XML available via customized wireless service, mobile phone.

Identifying Predictors of Compulsive Hoarding Tendencies in Young Adult Consumers

  • Lee, Seahee;Kim, K.P. Johnson;Lee, Soojung
    • Journal of Fashion Business
    • /
    • v.19 no.3
    • /
    • pp.43-58
    • /
    • 2015
  • Compulsive hoarding becomes a problem when the spaces hoarded items are stored in become unusable due to clutter, health, or safety issues. Our research purpose was to document relationships between two non-normative consumer behaviors (compulsive hoarding, compulsive buying tendency) and two shopping-related variables: hedonic shopping motives and emotional attachment to possessions with everyday consumers. As hedonic shopping motives have been related to compulsive buying, we predicted these motives (e.g., adventure, gratification, role, value, social, and idea) are related to compulsive buying. We also examined the relationship between compulsive buying and compulsive hoarding tendency and whether emotional attachment to possessions moderated this relationship. Participants were 280 undergraduate and graduate students attending a Midwestern university in the U.S. Regression analysis revealed the enhancing emotion motive (a combined motive of adventure and gratification) positively influenced compulsive buying whereas the value motive negatively influenced compulsive buying. All other hedonic shopping motives were non-significant. Participants who tended to buy compulsively were likely to hoard compulsively. This relationship, however, was moderated by participants' emotional attachment to possessions. Participants with high emotional attachment to possessions showed a higher level of hoarding behavior than those with low emotional attachment to possessions. However, the increase in hoarding tendency among participants with low emotional attachment to possessions was larger between those who were low in compulsive buying and those who were high in compulsive buying than the increase between these two groups among participants with high emotional attachment to possessions.

Design of Formalized message exchanging method using XMDR (XMDR을 이용한 정형화된 메시지 교환 기법 설계)

  • Hwang, Chi-Gon;Jung, Kye-Dong;Choi, Young-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1087-1094
    • /
    • 2008
  • Recently, XML has been widely used as a standard for a data exchange, and there has emerged the tendency that the size of XML document becomes larger. The data transfer can cause problems due to the increase in traffic, especially when a massive data such as Data Warehouse is being collected and analyzed. Therefore, an XMDR wrapper can solve this problem since it analyzes the tree structures of XML Schema, regenerates XML Schema using the analyzed tree structures, and sends it to each station with an XMDR Query. XML documents which are returned as an outcome encode XML tags according to XML Schema, and send standardized messages. As the formalized XML documents decrease network traffic and comprise XML class information, they are efficient for extraction, conversion, and alignment of data. In addition, they are efficient for the conversion process through XSLT, too, as they have standardized forms. In this paper we profuse a method in which XML Schema and XMDR_Query sent to each station are generated through XMDR(extended Meta-Data Registry) and the generation of products and XML conversion occur in each station wrapper.

Optimal design for the reinforced concrete circular isolated footings

  • Lopez-Chavarria, Sandra;Luevanos-Rojas, Arnulfo;Medina-Elizondo, Manuel;Sandoval-Rivas, Ricardo;Velazquez-Santillan, Francisco
    • Advances in Computational Design
    • /
    • v.4 no.3
    • /
    • pp.273-294
    • /
    • 2019
  • In this paper is presented the minimum cost (optimal design) for reinforced concrete circular isolated footings based on an analytic model. This model considers a load and two moments in directions of the X and Y axes, and the pressure has a variation linear, these are the effects that act on the footing. The minimum cost (optimal design) and the Maple program are shown in Flowcharts. Two numerical experiments are shown to obtain the minimum cost design of the two materials that are used for a circular footing supporting an axial load and moments in two directions in accordance to the code of the ACI (American Concrete Institute), and it is compared against the current design (uniform pressure). Also, the same examples are developed through the normal procedure to verify the minimum cost (optimal design) presented in this document, i.e., the equations of moment, bending shear and punching shear are used to check the thickness, and after, the steel areas of the footing are obtained, and it is compared against the current design (uniform pressure). Results section show that the optimal design is more accurate and more economical than to any other model. Therefore, it is concluded that the optimized design model presented in this paper should be used to obtain the minimum cost design for the circular isolated footings.

Symbol recognition using vectorial signature matching for building mechanical drawings

  • Cho, Chi Yon;Liu, Xuesong;Akinci, Burcu
    • Advances in Computational Design
    • /
    • v.4 no.2
    • /
    • pp.155-177
    • /
    • 2019
  • Operation and Maintenance (O&M) phase is the main contributor to the total lifecycle cost of a building. Previous studies have described that Building Information Models (BIM), if available with detailed asset information and their properties, can enable rapid troubleshooting and execution of O&M tasks by providing the required information of the facility. Despite the potential benefits, there is still rarely BIM with Mechanical, Electrical and Plumbing (MEP) assets and properties that are available for O&M. BIM is usually not in possession for existing buildings and generating BIM manually is a time-consuming process. Hence, there is a need for an automated approach that can reconstruct the MEP systems in BIM. Previous studies investigated automatic reconstruction of BIM using architectural drawings, structural drawings, or the combination with photos. But most of the previous studies are limited to reconstruct the architectural and structural components. Note that mechanical components in the building typically require more frequent maintenance than architectural or structural components. However, the building mechanical drawings are relatively more complex due to various type of symbols that are used to represent the mechanical systems. In order to address this challenge, this paper proposed a symbol recognition framework that can automatically recognize the different type of symbols in the building mechanical drawings. This study applied vector-based computer vision techniques to recognize the symbols and their properties (e.g., location, type, etc.) in two vector-based input documents: 2D drawings and the symbol description document. The framework not only enables recognizing and locating the mechanical component of interest for BIM reconstruction purpose but opens the possibility of merging the updated information into the current BIM in the future reducing the time of repeated manual creation of BIM after every renovation project.

A Study on Key Protection Method based on WhiteBox Cipher in Block Chain Environment (블록체인 환경에서 화이트박스 암호기반 키 보호 기법에 관한 연구)

  • Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.10
    • /
    • pp.9-15
    • /
    • 2019
  • Recently, in the field of next-generation e-commerce and finance, interest in blockchain-based technologies such as Bitcoin and Ethereum is great. Although the security of blockchain technology is known to be secure, hacking incidents / accidents related to cryptocurrencies are being issued. The main causes were vulnerabilities in the external environment, such as taking over login sessions on cryptocurrency wallets, exposing private keys due to malware infection, and using simple passwords. However, private key management recommends general methods such as utilizing a dedicated application or local backup and physical archiving through document printing. In this paper, we propose a white box password-based private key protection scheme. As a result of safety and performance analysis, we strengthened the security against vulnerability of private key exposure and proved the processing efficiency of existing protocol.

An Approach to Detect Spam E-mail with Abnormal Character Composition (비정상 문자 조합으로 구성된 스팸 메일의 탐지 방법)

  • Lee, Ho-Sub;Cho, Jae-Ik;Jung, Man-Hyun;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.129-137
    • /
    • 2008
  • As the use of the internet increases, the distribution of spam mail has also vastly increased. The email's main use was for the exchange of information, however, currently it is being more frequently used for advertisement and malware distribution. This is a serious problem because it consumes a large amount of the limited internet resources. Furthermore, an extensive amount of computer, network and human resources are consumed to prevent it. As a result much research is being done to prevent and filter spam. Currently, research is being done on readable sentences which do not use proper grammar. This type of spam can not be classified by previous vocabulary analysis or document classification methods. This paper proposes a method to filter spam by using the subject of the mail and N-GRAM for indexing and Bayesian, SVM algorithms for classification.

Exploring the contents of personal information protection education in the pre-director education

  • Choi, Dea-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.177-182
    • /
    • 2021
  • This study was carried out for the purpose of selecting and structuring educational content for personal information protection education in supplementary education for childcare workers. Prior research and literature data were collected and analyzed to select educational content, and a preliminary survey was conducted for 125 applicants for education. Based on the surveyed data, the educational content was structured through focus group interview. In the focus group interview analysis, the person in charge of personal information of the institution and those who have completed education participated. Group interviews and individual interviews through e-mail, etc. were conducted, and the final contents were selected after reviewing the appropriateness of the derived opinions by two educational experts. It was found that the direction of the search for personal information protection education contents should be added to the contents of practical work in each stage of information management and practice such as document writing.

Analysis on the Trend of The Journal of Information Systems Using TLS Mining (TLS 마이닝을 이용한 '정보시스템연구' 동향 분석)

  • Yun, Ji Hye;Oh, Chang Gyu;Lee, Jong Hwa
    • The Journal of Information Systems
    • /
    • v.31 no.1
    • /
    • pp.289-304
    • /
    • 2022
  • Purpose The development of the network and mobile industries has induced companies to invest in information systems, leading a new industrial revolution. The Journal of Information Systems, which developed the information system field into a theoretical and practical study in the 1990s, retains a 30-year history of information systems. This study aims to identify academic values and research trends of JIS by analyzing the trends. Design/methodology/approach This study aims to analyze the trend of JIS by compounding various methods, named as TLS mining analysis. TLS mining analysis consists of a series of analysis including Term Frequency-Inverse Document Frequency (TF-IDF) weight model, Latent Dirichlet Allocation (LDA) topic modeling, and a text mining with Semantic Network Analysis. Firstly, keywords are extracted from the research data using the TF-IDF weight model, and after that, topic modeling is performed using the Latent Dirichlet Allocation (LDA) algorithm to identify issue keywords. Findings The current study used the summery service of the published research paper provided by Korea Citation Index to analyze JIS. 714 papers that were published from 2002 to 2012 were divided into two periods: 2002-2011 and 2012-2021. In the first period (2002-2011), the research trend in the information system field had focused on E-business strategies as most of the companies adopted online business models. In the second period (2012-2021), data-based information technology and new industrial revolution technologies such as artificial intelligence, SNS, and mobile had been the main research issues in the information system field. In addition, keywords for improving the JIS citation index were presented.

BIM-based Lift Planning Workflow for On-site Assembly in Modular Construction Projects

  • Hu, Songbo;Fang, Yihai;Moehler, Robert
    • International conference on construction engineering and project management
    • /
    • 2020.12a
    • /
    • pp.63-74
    • /
    • 2020
  • The assembly of modular construction requires a series of thoroughly-considered decisions for crane lifting including the crane model selection, crane location planning, and lift path planning. Traditionally, this decision-making process is empirical and time-consuming, requiring significant human inputs. Recently, research efforts have been dedicated to improving lift planning practices by leveraging cutting-edge technologies such as automated data acquisition, Building Information Modelling (BIM) and computational algorithms. It has been demonstrated that these technologies have advanced lift planning to some degree. However, the advancements tend to be fragmented and isolated. There are two hurdles prevented a systematic improvement of lift planning practices. First, the lack of formalized lift planning workflow, outlining the procedure and necessary information. Secondly, there is also an absence of a shared information environment, enabling storages, updates and the distribution of information to stakeholders in a timely manner. Thus, this paper aims to overcome the hurdles. The study starts with a literature review in combination with document analysis, enabling the initial workflow and information flow. These were contextualised through a series of interviews with Australian practitioners in the crane-related industry, and systematically analysed and schematically validated through an expert panel. Findings included formalized workflow and corresponding information exchanges in a traditional lift planning practice via a Business Process Model and Notation (BPMN). The traditional practice is thus reviewed to identify opportunities for further enhancements. Finally, a BIM-based lift planning workflow is proposed, which integrates the scattered technologies (e.g. BIM and computational algorithms) with the aim of supporting lift planning automation. The resulting framework is setting out procedures that need to be developed and the potential obstacles towards automated lift planning are identified.

  • PDF