• Title/Summary/Keyword: researcher networks

Search Result 54, Processing Time 0.023 seconds

Exploratory Study of Applying Historiography and SPLC for Developing Information Services: A Case Study of LED Domain (연구지원 정보서비스를 위한 히스토리오그래프와 SPLC 활용에 관한 실험적 연구: LED 분야 사례를 중심으로)

  • Yu, So-Young
    • Journal of the Korean Society for information Management
    • /
    • v.30 no.3
    • /
    • pp.273-296
    • /
    • 2013
  • The purpose of this study is to examine the data coverage and citation threshold for analyzing SPLC(Search Path Link Count) as a main path of a historiograph of a certain topic in order to provide 'core' papers of global research trends to a researcher affiliated with a local R&D institution. 5 datasets were constructed by retrieving and collecting 2,318 articles on RGB LED on Web of Science published from 1990-2013 and 20,109 articles which cited these original 2,318. The SPLC analysis was performed on each dataset by increasing the threshold of citation counts, and the changes and resilience of the 28 extraced networks were compared. The results of user feedback on 198 unique core papers from 28 SPLC networks received from LED researchers affiliated with a Korean government-sponsored research institution were also analyzed. As a result, it is found that the nodes in each SPLC network in each dataset were differentiated by the citation counts, while the changes in the structure of SPLC networks were slight after the networks' citation counts were set at 40. Additionally, the user feedback showed that personalized research interest generally matched to the global research trends identified by the SPLC analysis.

Accuracy evaluation of 2D inundation analysis results of simplified SWMM according to sewer network scale (하수관망 규모에 따른 단순화 SWMM에 대한 2차원 침수분석결과의 정확성 평가)

  • Lee, Jung-Hwan;Kang, Seong-gyu;Yuk, Gi-Moon;Moon, Young-Il
    • Journal of Korea Water Resources Association
    • /
    • v.52 no.8
    • /
    • pp.531-543
    • /
    • 2019
  • Constructing a reliable runoff model and reducing model runtime are important in research of real-time urban flood forecasting to reduce the repetitive flood damage. Sewer networks in the major urban basin such as Seoul are vast and complex so that it is not suitable for real-time urban flood forecasting. Therefore, the rainfall-runoff model should be simplified. However, the runoff results due to the simplification of sewer networks can vary depending on the subjectivity and simplification method of the researcher and there is a significant difference especially in 2-D inundation analysis. In this study, the sewer networks in various urban basins with different numbers and distributions of sewer networks were simplified to certain criteria. The accuracy of the simplification model according to the sewer network scale is evaluated by 2-D inundation analysis. The runoff models of Gwanak, Sillim, and Dorimcheon, frequently inundated basins were simplified based on four simplification ranges due to the cumulative drainage area set as a criterion for calculating the simplification range. This study will be expected that the inundation result of simplification models estimated through the analysis can contribute to the construction of a reasonable and accurate runoff model suitable for real-time flood forecasting.

Design and Implementation of Firewall Log Monitoring System Using XML (XML을 이용한 침입차단 로그 모니터링 시스템 설계 및 구현)

  • 김석훈;손우용;송정길
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.9-15
    • /
    • 2004
  • The Internet is aggregate of trustless networks essentially Because the Internet is very difficult to control flowing of information, taking advantage of enough sporadic resource, security problem that can protect internal important stock from the Internet is risen seriously. Recently, virus accident and generation rate about system intrusion that happen become much higher and various than past. On these time, is progressing researcher for invasion cutout to keep away illegal act vigorouslyand do continuous development. In this paper, reporting administrator log information about invader's illegal act depending on XML format form, and I wished to solve problem that happen in administration side developing invasion interception system that can control to remote.

  • PDF

Facebook Users' Behaviour and Motivation for Writing Reviews

  • Jeong, So Hee;Chung, Myoung Sug;Lee, Joo Yeoun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.3
    • /
    • pp.97-116
    • /
    • 2018
  • Individuals depend considerably on gathering information from personal social networks rather than from commercial network channels or the mass media. Most academic journals that have examined this topic concentrate on online users' information-searching behaviours; however, this paper discusses online users' information-providing behaviour in the online community. The aim of this study is to investigate that online users' motivation to write reviews on Facebook and how the motivations affect users' information-providing behaviour. This study focusses on Facebook members' motivations that affect their review-writing behaviour. The fundamental theory for examining this topic is Vogt and Fesenmaier's (1998) 'information need'. This study modifies Vogt and Fesenmaier's (1998) theory for virtual communities through the development of each concept's measurement items, selecting the information need of four variables: functional, hedonic, innovation, and sign need. Among the four variables, sign need is the most important factor for Facebook users in the virtual environment. Through sign need, people indicate their status, personality form, and position, which significantly affects members' review-writing behaviour on Facebook.

Design and Implementation of Firewall Log Message Analysis System based on XML (XML 기반의 침입차단 로그 메시지 분석 시스템 설계 및 구현)

  • 전석훈;김석훈;손우용;이창우;송정길
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.125-130
    • /
    • 2004
  • The Internet is aggregate of trustless networks essentially. Because the Internet is very difficult to control flowing of information, taking advantage of enough sporadic resource, security problem that can protect internal important stock from the Internet is risen seriously. Recently, virus accident and generation rate about system intrusion that happen become much higher and various than past. On these time, is progressing researcher for invasion cutout to keep away illegal act vigorouslyand do continuous development. In this paper, reporting administrator log information about invader's illegal act depending on XML format form, and I wished to solve problem that happen in administration side developing invasion interception system that can control to remote.

  • PDF

Research Publishing by Library and Information Science Scholars in Pakistan: A Bibliometric Analysis

  • Ali, Muhammad Yousuf;Richardson, Joanna
    • Journal of Information Science Theory and Practice
    • /
    • v.4 no.1
    • /
    • pp.6-20
    • /
    • 2016
  • Scholarly communication plays a significant role in the development and dissemination of research outputs in library and information science (LIS). This study presents findings from a survey which examines the key attributes that characterize the publishing by Pakistani LIS scholars, i.e. academics and professionals, in national journals. A pilot-tested, electronic questionnaire was used to collect the data from the target population. 104 respondents (or 69.3% of target) provided feedback on areas such as number of articles published, number of citations, and the nature of any collaboration with other authors. The findings of this survey revealed that, among the various designated regions of Pakistan, the Punjab region was the most highly represented. In articles published in national journals, there was a clear preference among all respondents to collaborate with at least one other author. The citation metrics for LIS articles in national journals were relatively low (30.22%), which aligns with Scimago’s Journal and Country Rankings. The uptake of social scholarly networks mirrors international trends. Respondents were asked to score factors which could impact negatively on their ability to undertake research and/or publish the results. The study recommends that concerned stakeholders work together, as appropriate, to address concerns. In addition, it recommends that further research be undertaken to define patterns of Pakistani co-authorship in the social sciences.

Multiplexing MPEG Video Streams Using Selective Buffering (선택적 버퍼링을 이용한 MPEG 비디오 스트림 다중화 기법)

  • 김명균
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.10A
    • /
    • pp.1554-1559
    • /
    • 2000
  • On ATM networks, MPEG video stream is transferred using CBR or VBR services. But because the MPEG video traffic varies greatly from time to time, it is very difficult to transfer the MPEG steam efficiently without loss of transmission bandwidth. Until now, the study on the traffic analysis and control on a single MPEG video stream has been done by many researchers, but the traffic analysis and control on a multiplexed traffic of multiple MPEG video streams has not been studied by any researcher. This paper proposes a multiplexing method to reduce the PCR and traffic variance of a multiplexed traffic of multiple MPEG video streams. By reducing the PCR of the multiplexed traffic, the multiplexed VBR traffic can be transferred efficiently with less loss of transmission bandwidth.

  • PDF

A study on Korean language processing using TF-IDF (TF-IDF를 활용한 한글 자연어 처리 연구)

  • Lee, Jong-Hwa;Lee, MoonBong;Kim, Jong-Weon
    • The Journal of Information Systems
    • /
    • v.28 no.3
    • /
    • pp.105-121
    • /
    • 2019
  • Purpose One of the reasons for the expansion of information systems in the enterprise is the increased efficiency of data analysis. In particular, the rapidly increasing data types which are complex and unstructured such as video, voice, images, and conversations in and out of social networks. The purpose of this study is the customer needs analysis from customer voices, ie, text data, in the web environment.. Design/methodology/approach As previous study results, the word frequency of the sentence is extracted as a word that interprets the sentence has better affects than frequency analysis. In this study, we applied the TF-IDF method, which extracts important keywords in real sentences, not the TF method, which is a word extraction technique that expresses sentences with simple frequency only, in Korean language research. We visualized the two techniques by cluster analysis and describe the difference. Findings TF technique and TF-IDF technique are applied for Korean natural language processing, the research showed the value from frequency analysis technique to semantic analysis and it is expected to change the technique by Korean language processing researcher.

The Past, Present, and Future of Marketing Research in Asia

  • Chung, Jaihak
    • Asia Marketing Journal
    • /
    • v.17 no.4
    • /
    • pp.1-19
    • /
    • 2016
  • The lack of international research networks in Asia has been a major barrier in bridging scattered Asian academic societies. As a result, most researchers in Asia are not familiar with which journals they can access for their research, nor where they can submit their valuable research manuscripts. Asian Marketing Journal (AMJ) and the International Conference of Asian Marketing Associations (ICAMA), both of which are managed by Asian scholars for Asian scholars, are expected to take on such roles to make a significant contribution to Asian academic societies by encouraging them to study and share research topics that are more relevant and helpful to Asian market studies that come from an Asian researcher's perspective. This study aims to acknowledge and explain the successful settlement of the International Conference of Asian Marketing Associations (ICAMA) and its representative journal, Asia Marketing Journal (AMJ), by discussing how ICAMA and AMJ were created, why they are necessary to Asian researchers, and what goals they hope to achieve. Another, arguably more important objective of this study is to provide Asian researchers with information on what topics Asian academia has been researching since 2000, and guide researchers as to which journals in Asian academia can publish their marketing research papers.

A Coevolution of Artificial-Organism Using Classification Rule And Enhanced Backpropagation Neural Network (분류규칙과 강화 역전파 신경망을 이용한 이종 인공유기체의 공진화)

  • Cho Nam-Deok;Kim Ki-Tae
    • The KIPS Transactions:PartB
    • /
    • v.12B no.3 s.99
    • /
    • pp.349-356
    • /
    • 2005
  • Artificial Organism-used application areas are expanding at a break-neck speed with a view to getting things done in a dynamic and Informal environment. A use of general programming or traditional hi methods as the representation of Artificial Organism behavior knowledge in these areas can cause problems related to frequent modifications and bad response in an unpredictable situation. Strategies aimed at solving these problems in a machine-learning fashion includes Genetic Programming and Evolving Neural Networks. But the learning method of Artificial-Organism is not good yet, and can't represent life in the environment. With this in mind, this research is designed to come up with a new behavior evolution model. The model represents behavior knowledge with Classification Rules and Enhanced Backpropation Neural Networks and discriminate the denomination. To evaluate the model, the researcher applied it to problems with the competition of Artificial-Organism in the Simulator and compared with other system. The survey shows that the model prevails in terms of the speed and Qualify of learning. The model is characterized by the simultaneous learning of classification rules and neural networks represented on chromosomes with the help of Genetic Algorithm and the consolidation of learning ability caused by the hybrid processing of the classification rules and Enhanced Backpropagation Neural Network.