• Title/Summary/Keyword: internet use

Search Result 5,983, Processing Time 0.038 seconds

Intelligent VOC Analyzing System Using Opinion Mining (오피니언 마이닝을 이용한 지능형 VOC 분석시스템)

  • Kim, Yoosin;Jeong, Seung Ryul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.113-125
    • /
    • 2013
  • Every company wants to know customer's requirement and makes an effort to meet them. Cause that, communication between customer and company became core competition of business and that important is increasing continuously. There are several strategies to find customer's needs, but VOC (Voice of customer) is one of most powerful communication tools and VOC gathering by several channels as telephone, post, e-mail, website and so on is so meaningful. So, almost company is gathering VOC and operating VOC system. VOC is important not only to business organization but also public organization such as government, education institute, and medical center that should drive up public service quality and customer satisfaction. Accordingly, they make a VOC gathering and analyzing System and then use for making a new product and service, and upgrade. In recent years, innovations in internet and ICT have made diverse channels such as SNS, mobile, website and call-center to collect VOC data. Although a lot of VOC data is collected through diverse channel, the proper utilization is still difficult. It is because the VOC data is made of very emotional contents by voice or text of informal style and the volume of the VOC data are so big. These unstructured big data make a difficult to store and analyze for use by human. So that, the organization need to automatic collecting, storing, classifying and analyzing system for unstructured big VOC data. This study propose an intelligent VOC analyzing system based on opinion mining to classify the unstructured VOC data automatically and determine the polarity as well as the type of VOC. And then, the basis of the VOC opinion analyzing system, called domain-oriented sentiment dictionary is created and corresponding stages are presented in detail. The experiment is conducted with 4,300 VOC data collected from a medical website to measure the effectiveness of the proposed system and utilized them to develop the sensitive data dictionary by determining the special sentiment vocabulary and their polarity value in a medical domain. Through the experiment, it comes out that positive terms such as "칭찬, 친절함, 감사, 무사히, 잘해, 감동, 미소" have high positive opinion value, and negative terms such as "퉁명, 뭡니까, 말하더군요, 무시하는" have strong negative opinion. These terms are in general use and the experiment result seems to be a high probability of opinion polarity. Furthermore, the accuracy of proposed VOC classification model has been compared and the highest classification accuracy of 77.8% is conformed at threshold with -0.50 of opinion classification of VOC. Through the proposed intelligent VOC analyzing system, the real time opinion classification and response priority of VOC can be predicted. Ultimately the positive effectiveness is expected to catch the customer complains at early stage and deal with it quickly with the lower number of staff to operate the VOC system. It can be made available human resource and time of customer service part. Above all, this study is new try to automatic analyzing the unstructured VOC data using opinion mining, and shows that the system could be used as variable to classify the positive or negative polarity of VOC opinion. It is expected to suggest practical framework of the VOC analysis to diverse use and the model can be used as real VOC analyzing system if it is implemented as system. Despite experiment results and expectation, this study has several limits. First of all, the sample data is only collected from a hospital web-site. It means that the sentimental dictionary made by sample data can be lean too much towards on that hospital and web-site. Therefore, next research has to take several channels such as call-center and SNS, and other domain like government, financial company, and education institute.

Maximizing Utilization of Bandwidth using Multiple SSID in Multiple Wireless Routers Environment (다중 무선 공유기 환경에서 Multiple SSID를 이용한 대역폭 이용률 극대화)

  • Kwak, Hu-Keun;Yoon, Young-Hyo;Chung, Kyu-Sik
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.5
    • /
    • pp.384-394
    • /
    • 2008
  • A wireless router is a device which allows several wireless clients to share an internet line using NAT (Network Address Translation). In a school or a small office environment where many clients use multiple wireless routers, a client may select anyone of wireless routers so that most clients can be clustered to a small set of the wireless routers. In such a case, there exists load unbalancing problem between clients and wireless routers. One of its result is that clients using the busiest router get poor service. The other is that the resource utilization of the whole wireless routers becomes very low. In order to resolve the problems, we propose a load sharing scheme to maximize network bandwidth utilization based on multiple SSID. In a time internal, the proposed scheme keeps to show the available bandwidth information of all the possible wireless routers to clients through multiple SSID. A new client can select the most available band with router. This scheme allows to achieve a good load balancing between clients and routers in terms of bandwidth utilization. We implemented the proposed scheme with ASUS WL 500G wireless router and performed experiments. Experimental results show the bandwidth utilization improvement compared to the existing method.

The Study and Conservation of Woven Cigarette Inserts (담배 사은품 실크 인서트(Silk Inserts)에 관한 연구와 보존처리)

  • Lee, Young-Joo
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.30 no.3 s.151
    • /
    • pp.447-457
    • /
    • 2006
  • The purpose of this study is to document and preserve an unidentified textile purchased at a flea market. This study object is important because it is one of the very rare silk insert series from 1930s which were created for commercial use(as inclusion in cigarette packages). The investigation was conducted by researching the limited publications that discuss silk inserts, visiting many sites on the internet that offer such inserts for sale or catering to the collectors of these silk inserts, and especially visiting the collection of silk inserts, named the J.R. Burdick Collection, at the Metropolitan Museum of Art, New York. Several pieces matched the patches used in the study piece. But Buidick's description on time frame(1912-1915) did not indicate the full range of production of silk inserts. After the identification of object, the conservation treatment was carefully done using adhesives. The results of this study can be summarized as follows; 1. The silk inserts of the study object were included as promotions by some company owned by the American Tobacco Company, probably at some time between 1934 and 1939. 2. The initial stage in the conservation treatment was mechanical surface cleaning using a vacuum cleaner. After vacuuming, humidification was conducted to reduce creases in the top of the object. The damaged areas were backed with stabiltax coated with a solution of Elvace 45675 since the fiber of this object was too deteriorated. 3. Adhesive treatments using Elvace showed satisfactory results: flexibility, strength, no damaging effects on the study object, removability without damaging the object.

A Study on Touchless Finger Vein Recognition Robust to the Alignment and Rotation of Finger (손가락 정렬과 회전에 강인한 비 접촉식 손가락 정맥 인식 연구)

  • Park, Kang-Ryoung;Jang, Young-Kyoon;Kang, Byung-Jun
    • The KIPS Transactions:PartB
    • /
    • v.15B no.4
    • /
    • pp.275-284
    • /
    • 2008
  • With increases in recent security requirements, biometric technology such as fingerprints, faces and iris recognitions have been widely used in many applications including door access control, personal authentication for computers, internet banking, automatic teller machines and border-crossing controls. Finger vein recognition uses the unique patterns of finger veins in order to identify individuals at a high level of accuracy. This paper proposes new device and methods for touchless finger vein recognition. This research presents the following five advantages compared to previous works. First, by using a minimal guiding structure for the finger tip, side and the back of finger, we were able to obtain touchless finger vein images without causing much inconvenience to user. Second, by using a hot mirror, which was slanted at the angle of 45 degrees in front of the camera, we were able to reduce the depth of the capturing device. Consequently, it would be possible to use the device in many applications having size limitations such as mobile phones. Third, we used the holistic texture information of the finger veins based on a LBP (Local Binary Pattern) without needing to extract accurate finger vein regions. By using this method, we were able to reduce the effect of non-uniform illumination including shaded and highly saturated areas. Fourth, we enhanced recognition performance by excluding non-finger vein regions. Fifth, when matching the extracted finger vein code with the enrolled one, by using the bit-shift in both the horizontal and vertical directions, we could reduce the authentic variations caused by the translation and rotation of finger. Experimental results showed that the EER (Equal Error Rate) was 0.07423% and the total processing time was 91.4ms.

A Study on Adolescents' Misconceptions about Oral Health Knowledge in Some Areas (일부지역 청소년의 구강건강지식 오개념에 관한 연구)

  • Shim, Jae-Suk;Seong, Jeong-Min;Lee, Mi-Ra;Song, Seol-Kyung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.1
    • /
    • pp.181-189
    • /
    • 2013
  • This study was conducted to provide basic data in establishing a method for helping adolescents form the concept of correct oral health knowledge, by searching for their misconceptions about oral health knowledge and figuring out relevant factors. Results showed that they had appropriate knowledge on a relatively large number of questions regarding the level of oral health knowledge, but they also had misconceptions about the toothbrush grip, how to use medicines for gum diseases, and the project of fluorine concentration adjustment in water. It was shown that the score of oral health knowledge turned out to be 10.78 on average as a whole and the mean difference was within the error range. As for the correlations of misconceptions about oral health knowledge by group, it was noted that there were no differences in gender and education level, but those who completed oral health education had more appropriate concepts than those who did not (p < 0.001). In terms of the paths that they obtained oral health knowledge, the Internet and mass media (35.4%) had the highest rate and school (9.6%) had the lowest rate. With regards to the level of oral health knowledge, school had 10.56, which was the lowest score. In this regard, in order for adolescents to form adequate oral health knowledge, the following should be done. therefore, it would be necessary to activate school oral health education so as for adolescents to exercise adequate oral health behavior and to train many oral health educators so as for them to be provided with more educational opportunities.

A Study on The Security Vulnerability Analysis of Open an Automatic Demand Response System (개방형 자동 수요 반응 시스템 보안 취약성 분석에 관한 연구)

  • Chae, Hyeon-Ho;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.333-339
    • /
    • 2016
  • Technology to optimize and utilize the use and supply of the electric power between consumer and supplier has been on the rise among the smart grid power market network in electric power demand management based on the Internet. Open Automated Demand Response system protocol, which can deliver Demand Response needed in electric power demand management to electricity supplier, system supplier and even the user is openADR 2.0b. This paper used the most credible, cosmopolitanly proliferated EPRI open source and analysed the variety of security vulnerability that developed VEN and VTN system may have. Using the simulator for attacking openADR protocol, the VEN/VTN system that has been implemented as EPRI open source was conducted to attack in a variety of ways. As a result of the analysis, we were able to get the results that the VEN/VTN system has security vulnerabilities to the parameter tampering attacks and service flow falsification attack. In conclusion, if you want to implement the openADR2.0b protocol system in the open or two-way communication environment smart grid network, considering a variety of security vulnerability should be sure to seek security technology and services.

Sleep and Suicidal Risk Factors in Korean High School Students (고등학생 청소년들의 수면과 자살위험요인)

  • Jeong, Ja-Hyun;Jang, Yong-E;Lee, Hae-Woo;Shim, Hyun-Bo;Choi, Jin-Sook
    • Sleep Medicine and Psychophysiology
    • /
    • v.20 no.1
    • /
    • pp.22-30
    • /
    • 2013
  • Objectives: Sleep problems has been consistently reported as a suicidal risk factor in adults and, recently, also in adolescents. In this study, dividing study subjects by the previous suicidal behaviors (suicidal vs non-suicidal), we compared the group differences of suicidal risk factors, and examined the possibility of sleep as a suicidal risk factor. Methods: Study subjects were 561 (271 boys and 290 girls) from a community sample of high school students. Suicidal Risk Behavior Checklist, Center for Epidemiological Study-Depression (CES-D), Symptom Checklist-90-Revision (SCL-90-R) Anxiety and Aggression subscale, Pittsburg Sleep Quality Index (PSQI) were done. Results: Forty six students (8.1%) reported previous actual self-harm behavior as a suicidal attempt, 181 students (32.4%) reported having suicidal thought only. Three hundred thirty four students (59.5%) reported no previous suicidal behavior (thought and attempt, both). Suicidal behavior group showed higher score on risk behaviors such as school violence, substance use and internet addiction. CES-D, SCL-90-R, PSQI showed significant group difference. Logistic regression analysis showed suicidal risk were significantly associated with depression, stress in suicidal risk factors and sleep latency, daytime dysfunction in PSQI. Analysis of variance (ANOVA) shows the most prolonged sleep latency and increased index of all PSQI components except sleep efficiency in suicidal attempt group. Conclusions: Sleep Problems had a strong association with the suicidal risk behavior in adolescents. Sleep problems, especially, prolonged sleep latency, daytime dysfunction might be important markers for suicidal behavior. Screening for sleep problems in adolescents are encouraged for the parents, school teachers, and related medical physicians.

Monitoring of Mythimna separata Adults by Using a Remote-sensing Sex Pheromone Trap (원격감지 성페로몬트랩을 이용한 멸강나방(Mythimna separata) 성충 예찰)

  • Jung, Jin Kyo;Seo, Bo Yoon;Cho, Jum Rae;Kim, Yong
    • Korean journal of applied entomology
    • /
    • v.52 no.4
    • /
    • pp.341-348
    • /
    • 2013
  • We desinged and evaluated a remote-sensing sex pheromone trap for real-time monitoring of Mythimna separata (Lepidoptera: Noctuidae), a migratory insect in Korea. The system consisted of a modified cone-trap with a sex pheromone lure, a sensing module based on light interruption, a signal transmission module based on code division multiple access, a main electronic board for system control, a power supply based on a solar collector, a stainless steel-pole supporting the system, and a signal collection and display system based on an internet web page. The ratio (>92%) of the actual number of insects to the signal number in the remote-sensing trap was improved by sensing only within a limited period at night on the basis of the insect's circadian rhythm, control of signal sensitivity on the basis of sensing software programming, 1-h interval for signal transmission, and adjustment of the signal transmission program. The signal occurrence pattern in the remote-sensing trap was conclusively similar (correlation coefficient, >0.98) to the actual pattern of adult occurrence in the trap. The result indicated that the remote-sensing trap based on the attraction of the sex pheromone lure for M. separata has a promising potential for practical use. Occurrence of M. separata adults was observed several times in 2011 and 2012, and the peaks were sharp.

News Big Data Analysis of 'Tap Water Larvae' Using Topic Modeling Analysis (토픽 모델링을 활용한 '수돗물 유충' 뉴스 빅데이터 분석)

  • Lee, Su Yeon;Kim, Tae-Jong
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.11
    • /
    • pp.28-37
    • /
    • 2020
  • This study was conducted to propose measures to improve crisis response to environmental issues by analyzing the news big data on the 'tap water larvae' situation and identifying related major keywords and topics. To accomplish this, 1,975 cases of 'tap water larvae' reported between July 13 to August 31, 2020 were divided into three periods and analyzed using topical modeling techniques. The analysis output 15 topics for each period. According to the result, the 'tap water larvae' incident, as reported in the media, is divided into the occurrence, diffusion, and rectification stages. The government's response and civilian risk consciousness and reaction could also be seen. Based on the result, the following measures to respond to environment risk is proposed. First, it is necessary to explore the various intertwined context with the 'tap water larvae' incident at its core and develop responsiveness to environmental problems through education which forms integrated views. Second, a role to monitor the environment must be implemented and civilian-participated environmental information must be shared through the application of internet communities. Third, the cultivation and deployment of environmental communicators who provide and communicate fast and accurate environment information is required. This study, as the first in Korea to use the topic modeling analysis method based on big data related to 'tap water larvae', has academic significance in that it has empirically and systematically analyzed environmental issues which appear as unstructured data. It also political significance as it suggests ways to improve environmental education and communication.

Role of Project Owner in OSS Project: Based on Impression Formation and Social Capital Theory (오픈소스 소프트웨어 운영자 역할이 성과에 미치는 영향: 인상형성과 사회적 자본 이론을 중심으로)

  • Lee, Saerom;Baek, Hyunmi;Jahng, Jungjoo
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.2
    • /
    • pp.23-46
    • /
    • 2016
  • With the increasing socio-economic value of an open collaboration over the Internet, it has become significantly important to successfully manage open source software development program. Most of the previous research have focused on various factors that influence the performance of the project, but studies on how the project owners recognized as "leader" affect the outcome of the project are very limited. This research investigates how individual and governance characteristics of an owner influences the performance of project based on impression formation and social capital theory. For a data set, we collect 611 Repositories and the owner's data from the open source development platform Github, and we form knowledge sharing network of an each repository by using social network analysis. We use hierarchical regression analysis, and our results show that a leader, who exposes a lot of one's personal information or who has actively followed and showed interests to communicate with other developers, affects positive impacts on project performance. A leader who has a high centrality in knowledge sharing network also positively affects on project performance. On the other hand, if a leader was highly willing to accept external knowledge or is recognized as an expert in the community with large numbers of followers, the result show negative impacts on project performance. The research may serve as a useful guideline not only for the future open source software projects but also for the effective management of different types of open collaboration.