• Title/Summary/Keyword: internet system

Search Result 11,046, Processing Time 0.042 seconds

Analyzing the Issue Life Cycle by Mapping Inter-Period Issues (기간별 이슈 매핑을 통한 이슈 생명주기 분석 방법론)

  • Lim, Myungsu;Kim, Namgyu
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.25-41
    • /
    • 2014
  • Recently, the number of social media users has increased rapidly because of the prevalence of smart devices. As a result, the amount of real-time data has been increasing exponentially, which, in turn, is generating more interest in using such data to create added value. For instance, several attempts are being made to analyze the relevant search keywords that are frequently used on new portal sites and the words that are regularly mentioned on various social media in order to identify social issues. The technique of "topic analysis" is employed in order to identify topics and themes from a large amount of text documents. As one of the most prevalent applications of topic analysis, the technique of issue tracking investigates changes in the social issues that are identified through topic analysis. Currently, traditional issue tracking is conducted by identifying the main topics of documents that cover an entire period at the same time and analyzing the occurrence of each topic by the period of occurrence. However, this traditional issue tracking approach has two limitations. First, when a new period is included, topic analysis must be repeated for all the documents of the entire period, rather than being conducted only on the new documents of the added period. This creates practical limitations in the form of significant time and cost burdens. Therefore, this traditional approach is difficult to apply in most applications that need to perform an analysis on the additional period. Second, the issue is not only generated and terminated constantly, but also one issue can sometimes be distributed into several issues or multiple issues can be integrated into one single issue. In other words, each issue is characterized by a life cycle that consists of the stages of creation, transition (merging and segmentation), and termination. The existing issue tracking methods do not address the connection and effect relationship between these issues. The purpose of this study is to overcome the two limitations of the existing issue tracking method, one being the limitation regarding the analysis method and the other being the limitation involving the lack of consideration of the changeability of the issues. Let us assume that we perform multiple topic analysis for each multiple period. Then it is essential to map issues of different periods in order to trace trend of issues. However, it is not easy to discover connection between issues of different periods because the issues derived for each period mutually contain heterogeneity. In this study, to overcome these limitations without having to analyze the entire period's documents simultaneously, the analysis can be performed independently for each period. In addition, we performed issue mapping to link the identified issues of each period. An integrated approach on each details period was presented, and the issue flow of the entire integrated period was depicted in this study. Thus, as the entire process of the issue life cycle, including the stages of creation, transition (merging and segmentation), and extinction, is identified and examined systematically, the changeability of the issues was analyzed in this study. The proposed methodology is highly efficient in terms of time and cost, as it sufficiently considered the changeability of the issues. Further, the results of this study can be used to adapt the methodology to a practical situation. By applying the proposed methodology to actual Internet news, the potential practical applications of the proposed methodology are analyzed. Consequently, the proposed methodology was able to extend the period of the analysis and it could follow the course of progress of each issue's life cycle. Further, this methodology can facilitate a clearer understanding of complex social phenomena using topic analysis.

A Real-Time Stock Market Prediction Using Knowledge Accumulation (지식 누적을 이용한 실시간 주식시장 예측)

  • Kim, Jin-Hwa;Hong, Kwang-Hun;Min, Jin-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.109-130
    • /
    • 2011
  • One of the major problems in the area of data mining is the size of the data, as most data set has huge volume these days. Streams of data are normally accumulated into data storages or databases. Transactions in internet, mobile devices and ubiquitous environment produce streams of data continuously. Some data set are just buried un-used inside huge data storage due to its huge size. Some data set is quickly lost as soon as it is created as it is not saved due to many reasons. How to use this large size data and to use data on stream efficiently are challenging questions in the study of data mining. Stream data is a data set that is accumulated to the data storage from a data source continuously. The size of this data set, in many cases, becomes increasingly large over time. To mine information from this massive data, it takes too many resources such as storage, money and time. These unique characteristics of the stream data make it difficult and expensive to store all the stream data sets accumulated over time. Otherwise, if one uses only recent or partial of data to mine information or pattern, there can be losses of valuable information, which can be useful. To avoid these problems, this study suggests a method efficiently accumulates information or patterns in the form of rule set over time. A rule set is mined from a data set in stream and this rule set is accumulated into a master rule set storage, which is also a model for real-time decision making. One of the main advantages of this method is that it takes much smaller storage space compared to the traditional method, which saves the whole data set. Another advantage of using this method is that the accumulated rule set is used as a prediction model. Prompt response to the request from users is possible anytime as the rule set is ready anytime to be used to make decisions. This makes real-time decision making possible, which is the greatest advantage of this method. Based on theories of ensemble approaches, combination of many different models can produce better prediction model in performance. The consolidated rule set actually covers all the data set while the traditional sampling approach only covers part of the whole data set. This study uses a stock market data that has a heterogeneous data set as the characteristic of data varies over time. The indexes in stock market data can fluctuate in different situations whenever there is an event influencing the stock market index. Therefore the variance of the values in each variable is large compared to that of the homogeneous data set. Prediction with heterogeneous data set is naturally much more difficult, compared to that of homogeneous data set as it is more difficult to predict in unpredictable situation. This study tests two general mining approaches and compare prediction performances of these two suggested methods with the method we suggest in this study. The first approach is inducing a rule set from the recent data set to predict new data set. The seocnd one is inducing a rule set from all the data which have been accumulated from the beginning every time one has to predict new data set. We found neither of these two is as good as the method of accumulated rule set in its performance. Furthermore, the study shows experiments with different prediction models. The first approach is building a prediction model only with more important rule sets and the second approach is the method using all the rule sets by assigning weights on the rules based on their performance. The second approach shows better performance compared to the first one. The experiments also show that the suggested method in this study can be an efficient approach for mining information and pattern with stream data. This method has a limitation of bounding its application to stock market data. More dynamic real-time steam data set is desirable for the application of this method. There is also another problem in this study. When the number of rules is increasing over time, it has to manage special rules such as redundant rules or conflicting rules efficiently.

Analysis of Safety Education Contents of 『Field of home life』 in Technology·Home Economics Textbook developed by the revised curriculum in 2009 (2009 개정 기술·가정 교과서 『가정생활영역』의 안전교육 내용 분석)

  • Kim, Nam Eun
    • Journal of Korean Home Economics Education Association
    • /
    • v.29 no.2
    • /
    • pp.23-39
    • /
    • 2017
  • The Purpose of this study is to present the basic data for selecting and improving the safety education contents which help practically middle school students through analysis of contents of safety education in 'field of home life' of 2009 revised middle school textbooks. The subjects of analysis are 12 types of middle school textbooks: in total 24 books written by 12 publishers in terms of the revised curriculum in 2009. The analysis criteria is developed by the researcher referring to preceding studies regarding safety education based on the seventh safety education standard presented by the Ministry of Education (2015). With such analysis criteria, all words related to the contents of the safety education of analysis criteria were extracted from each textbook, such as words directly mentioned as 'safety', words mean as 'psychological safety' and 'happy life', words related to 'attention', 'note', 'stability' etc. Under the analytic frame of safety education contents according to a home economics textbook, content analysis method was used for producing the frequency and percent of those words. The textbook analysis shows that the number of pages regarding safety education is 336.3 pages, as 9.8% in total 3,412 pages of 12 types of technology and home economics textbooks. As following the analysis of each textbook volume of the proportion in the contents related to safety education, 224.9 pages are on the first volume and 111.9 pages are on the second volume. As grades increase from year one to year three, the proportion of safety education in home economics textbooks is decreased. The highest number of safety education contents unit is 'Self-management of youth' which includes three parts of safety education. In the case of a unit for emphasizing practice, experience and practical exercise such as 'Life of youth' and 'Practice of eco-living', safety education content in the area of 'life safety' are mostly contained. Safety accidents related to the most student experienced, Household accidents (1.4%) and experiment or practice accidents (0.3%) are presented in a low figure. The contents of universal housing and school violence are duplicated on first and second volume of text. The most presented safety education content in the 12 types of textbooks are proper sexual attitude, dietary problems, family conflict and food choice. The least common contents are dangerous drugs, family welfare, internet addiction and industrial accident compensation insurance. As this study is to analyze 12 textbooks developed in 2009 revision curriculum, it is necessary to compare it with the textbook written by the revised curriculum in 2015 and to clarify the contents system of safety education and to avoid duplication of contents. In addition, it is necessary to develop and distribute a safety education program that can support textbooks.

Media Discourse on Asian Women's International Marriage: The Korean Case (아시아 여성의 국제결혼에 대한 미디어 담론: 한국 미디어의 재현방식을 통해)

  • Kim, Soo-Jung;Kim, Eun-Yi
    • Korean journal of communication and information
    • /
    • v.43
    • /
    • pp.385-426
    • /
    • 2008
  • This paper focuses on how international marriages among Asians have been represented by the Korean media. Due to globalization, the so-called 'ethnoscape' has changed, and so ethnicity or racial identity within the boundaries of the nation-state changed. The recent diaspora of Asian women into Korea through international marriages has reflected how globalization has proceeded at a regional or local level. This paper attempts to analyze Koreanmedia discourses on the Asian female diaspora. This study analyzes what kind of generic forms TV dramas, other shows(TV reality programs, TV journalistic programs), movie and internet have employed to represent international marriages and how they have portrayed the subjectivities of the Asian female diaspora. This study discuss how this representation has been contested by the 'realities' of their international marriages. By examining how the Korean mainstream media have dealt with the conflicting issues of the Asian female diaspora, this paper intends to look critically at how local discursive practices have substantiated the changing ethnoscape. As a result of the study, this paper can find international marriages among Asians have been represented by Korean media still patriarchal system in male-oriented society. The otherness of Asian women justify the strong work of household affairs, and so justified life is standardized 'a kind of daughter- in-law', 'a complaisant daughter-in-law' in the process of migration. Also the otherness of Asian women standardized 'a victor' or 'a harmer' through international marriage of money that commercialized 'sexuality'. After all Korea media discourse on Asian women's international marriage, the gender issues on it have not been focused on a serious level.

  • PDF

Analysis of the Effects of Radio Traffic Information on Urban Worker's Travel Choice Behavior (교통방송이 제공하는 교통정보가 직장인의 통행행태에 미치는 영향 분석)

  • 윤대식
    • Journal of Korean Society of Transportation
    • /
    • v.20 no.5
    • /
    • pp.33-43
    • /
    • 2002
  • Travel choice behavior is affected by real-time traffic information. Recently, in urban area, real-time traffic information is provided by several instruments such as transportation broadcasting, internet PC network and variable message sign, etc. Furthermore, it has been increasing for urban travelers to use real-time traffic information provided by several instruments. The purpose of this study is to analyze the effects of advanced traveler information on urban worker's travel choice behavior. Among several Advanced Traveler Information System(ATIS) employed in urban area. This study focuses on examining the effects of transportation broadcasting on urban worker's travel choice behavior. This study attempts to examine traveler's mode change behavior in the pre-trip stage and traveler's route change behavior in the on-route stage. For this study, the survey data collected from Daegu City in 2000 is used. For empirical analysis, several nested logit models are estimated, and among them, the best models are reported in this paper. Furthermore, based on the empirical models estimated for this research, important findings and their policy implications are discussed.

The Preventive Measures On Terrorism Against Overseas Korean Businessmen(A view of recent ethnic minority separation movement) (해외근무(海外覲務) 기업체(企業體)에 대(對)한 테러 방지책(防止策) - 최근(最近) 소수민족분리주의운동지역(小數民族分離主義運動地域)을 중심(中心)으로 -)

  • Choi, Yoon-Soo
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.351-370
    • /
    • 1997
  • This study concerns possible measures to prevent separatists' terrorist acts against overseas Korean businessmen. Of late, many Korean enterprises are helping a number of foreign countries develop their economy, by building factories and manning regional offices in those countries. But recent development of terrorism especially against Korean businessmen is alarming. This report discusses the need for Korean enterprises heading overseas to prepare themselves with awareness of terrorism and possible protective measures against it, besides their routine pursuance of profits; and for the government and prospective enterprises to refrain from investing in those countries having active separatist movements. If an investment has become inevitable, a careful survey of the region in conflict should be conducted and self-protective measures should be put in place through security information exchange, emergency coordination and training of personnel, etc. This study will first review the past terrorist incidents involving employees of overseas Korean enterprises, and then will focuss on seeking effective measures on the basis of the reported incidents. In carrying out the study, related literature from both home and abroad have been used along with the preliminary materials reported and known on the Internet from recent incidents. 1. The separatist movements of minority groups Lately, minority separatist groups are increasingly resorting to terrorism to draw international attention with the political aim of gaining extended self rule or independence. 2. The state of terrorism against overseas Korean enterprises and Koreans Korean enterprises are now operating businesses, and having their own personnel stationed, in 85 countries including those in South East Asia and Middle East regions. In Sri Lanka, where a Korean enterprise recently became a target of terrorist bombing, there are 75 business firms from Korea and some 700 Korean employees are stationed as of August 1996. A total of 19 different terrorist incidents have taken place against Koreans abroad since 1990. 3. Terrorism preventive measures Terrorism preventive measures are discussed in two ways: measures by the government and by the enterprises. ${\blacktriangleleft}$ Measures by the government - Possible measures at governmental level can include collection and dissemination of terrorist activity information. Emphasis should be given to the information on North Korean activities in particular. ${\blacktriangleleft}$ Measures by individual enterprises - Organizational security plan must be established by individual enterprises and there should also be an increase of security budget. A reason for reluctant effort toward positive security plan is the perception that the security budget is not immediately linked to an increment of profit gain. Ensuring safety for overseas personnel is a fundamental obligation of an enterprise. Consultation and information exchange on security plan, and an emergency support system at a threat to security must be sought after and implemented. 4. Conclusion Today's terrorism varies widely depending on reasons and causes, and its means has become increasingly informationalized and scientific as well while its method is becoming more clandestine and violent. Terrorist organizations are increasingly aiming at enterprises for acquisition of budgets needed for their activities. Korean enterprises have extended their business realm to foreign countries since 1970, exposing themselves to terrorism. Enterprises and their employees, therefore, should establish their own security measures on the one hand while the government must provide general measures, on the other, for the protection of the life and property of Korean residents abroad from terrorist attacks. In this regard, set-up of a counter terrorist organization that coordinates the efforts of government authorities in various levels in planning and executing counter terrorist measures is desired. Since 1965, when the hostile North Korea began to step up its terrorist activities against South Koreans, there have been 7 different occasions of assassination attempt on South Korean presidents and some 500 cases of various kidnappings and attempted kidnappings. North Korea, nervous over the continued economic growth and social stabilization of South Korea, is now concentrating its efforts in the destruction and deterioration of the national power of South Korea for its earlier realization of reunification by force. The possibility of North Korean terrorism can be divided into external terrorist acts and internal terrorist acts depending on the nationality of the terrorists it uses. The external terrorist acts include those committed directly by North Korean agents in South Korea and abroad and those committed by dissident Koreans, hired Korean residents, or international professionals or independent international terrorists bought or instigated by North Korea. To protect the life and property of Korean enterprises and their employees abroad from the threat of terrorism, the government's administrative support and the organizational efforts of enterprises should necessarily be directed toward the planning of proper security measures and training of employees. Also, proper actions should be taken against possible terrorist acts toward Korean business employees abroad as long as there are ongoing hostilities from minority groups against their governments.

  • PDF

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.

A report on operating a nationwide human milk bank in Korea (전국규모 모유은행 운영보고)

  • Song, Kang-Hoon;Lee, Yoo-Min;Chang, Ji-Young;Park, Eun-Young;Park, Sung-Ae;Cho, Nam-Kyu;Bae, Chong-Woo
    • Clinical and Experimental Pediatrics
    • /
    • v.53 no.4
    • /
    • pp.488-494
    • /
    • 2010
  • Purpose : A human milk bank collects, processes, eliminates, and stores breast milk from donors and provides breast milk to those in need. The authors hereby present the experiences and the objective lessons obtained through operating a nationwide human milk bank over a period of 2 years. Methods : The characteristics of the donors and the recipients and the amounts of breast milk donated, processed, and received at the East-West Neo Medical Center Human Milk Bank were investigated from August 2007 to August 2009. Results : The donor pool consisted of 131 first-time donors and 39 repeat donors who made 341 and 127 donations, respectively. Seventy-nine percent of the donors resided in the Seoul-Kyunggi area, and 60% of the donors were in their 30s. Most information and motivation came from the Internet (66%) or television (14%). A total of 2,736 L of breast milk was collected, and 1,979 L were processed. The cumulative number of recipients was 160 preterm or full-term infants and 21 adults, each group receiving the breast milk 337 and 41 times, respectively. In total, infants received 1,663 L and adults received 179 L. Conclusion : Through the present study, the role and importance of a human milk bank in collecting, pasteurizing, and storing surplus breast milk in through sanitary, medically proven methods and providing this breast milk to recipients could be appreciated and reevaluated. The authors believe that a national support system is necessary to expand this practice to a nationwide scale.

A Study on the animation music video production for the viral marketing purposes A case study of project (바이럴 마케팅용 애니메이션 뮤직비디오 제작 연구 : 월드컵 응원가 <일어나라 대한민국> 사례를 중심으로)

  • Han, Sang-Gyun;Kim, Tak-Hoon;Kim, Yu-Mi
    • Cartoon and Animation Studies
    • /
    • s.22
    • /
    • pp.47-63
    • /
    • 2011
  • Recently, contemporary cultural contents have been shown its diversity changes followed by the birth of new media platforms with consumers' new needs in the global market. Also, developments of Internet and computer system networks are the main contributors of making this changes happened rapidly. This study aims to know that how to usefully use those new media platforms through the great example of stop-motion animation music video by analyzing its production and marketing process. The music video production had been focused to be completed with high quality by adjusting the production process economically in spite of the relatively short period(less than one month)from its crank-up to the deadline. Because the production was planned that main characters lead the whole story, the creative team had been tried to reduce the production hours by commonly use the same mold when they make original clay models by collecting the similarities of characters' appearances. By using CG technic, could overcome the visual monotonous from the similarities which inferred above. Also, the repeated rhythm in the music video, the similar scenes of backgrounds were commonly used by copy of the original scene. At the point of directing, the creative team considered both economical and art aspects for the quality work. In details, they divided the scenes into foreground and background, and removed unnecessary parts to save the production hours and budget but make depth of fields in the scenes. Except the viral marketing purposes, was searching for the methods to compensate the production cost. For this, the characters in the music video dressed the same T-shirts which are world-cup logo on, and those were designed for the sale after released the music video. Even the result of the sales was not enough to satisfied, it was estimated a great attempt to the domestic animation industry.

  • PDF

NIRS Calibration Equation Development and Validation for Total Nitrogen Contents Field Analysis in Fresh Rice Leaves (벼 생엽의 질소함량 현장분석을 위한 NIRS 검량식 개발 및 검증)

  • Song, Young-Eun;Lee, Deok-Ryeol;Cho, Seong-Hyun;Lee, Ki-Kwon;Jeong, Jong-Seong;Gwon, Yeong-Rip;Cho, Kyu Chae
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.58 no.3
    • /
    • pp.301-307
    • /
    • 2013
  • This study was evaluated high end research grade Near Infrared Reflectance Spectrophotometer (NIRS) to field grade multiple Near Infrared Reflectance Spectrophotometer (NIRS) for rapid analysis at fresh rice leaf at sight with 238 samples of fresh rice leaf during year 2012, collected Jeollabuk-do for evaluate accuracy and precision between instruments. Firstly collected and build database high end research grade NIRS using with 400 nm ~ 2500 nm during from year 2003 to year 2009, seven years collected fresh rice leaf database then trim and fit to field grade NIRS with 1200 nm ~ 2400 nm then build and create calibration, transfer calibration with special transfer algorithm. The result between instruments was 0.005% differences, rapidly analysis for chemical constituents, Total nitrogen in fresh rice leaf within 5 minutes at sight and the result equivalent with laboratory data. Nevertheless last during more than 8 years collected samples for build calibration was organic samples that make differentiate by local or yearly bases etc. This strongly suggest population evaluation technique needed and constantly update calibration and maintenance calibration to proper handling database accumulation and spread out by knowledgable control laboratory analysis and reflect calibration update such as powerful control center needed for long lasting usage of fresh rice leaf analysis with NIRS at sight. Especially the agriculture products such as rice will continuously changes that made easily find out the changes and update routinely, if not near future NIRS was worthless due to those changes. Many research related NIRS was shortly study not long term study that made not well using NIRS, so the system needed check simple and instantly using with local language supported signal methods global distance (GD) and neighbour distance (ND) algorithm. Finally the multiple popular field grades instruments should be the same results not only between research grade instruments but also between multiple field grade instruments that needed easily transfer calibration and maintenance between instruments via internet networking techniques.