• Title/Summary/Keyword: 로그 데이터

Search Result 893, Processing Time 0.03 seconds

A Case Study on Knowledge Management System of Research Institute in Daedeok Science Park (대덕연구단지 연구기관의 지식관리 시스템에 관한 사례연구)

  • Shin, Dong-Min
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.22 no.1
    • /
    • pp.301-331
    • /
    • 2011
  • This study aims at investigating ways to enhance the efficiency of knowledge management systems in research institutes. This study analyzes the current state of knowledge management systems, changes in users' perception, and the use of knowledge management systems in Daedeok Science Park, and suggests improvement measures. This study reviews previous studies and employs a survey for case studies. This study also conducts log data analysis of knowledge management systems to investigate the current state of system use. The questionnaire asks about the interest in knowledge management, evaluation and rewards of knowledge contribution, quality of knowledge, and the level of utility. This study tests hypothesis and analyzes the frequencies. This study finds that the interest and use of knowledge management system have been remarkably dropped, and also reveals that maintaining reward systems and diverse rewarding systems are required.

Context-based Social Network Configuration Method between Users (컨텍스트 기반 사용자 간 소셜 네트워크 구성 방법)

  • Han, Jong-Hyun;Woo, Woon-Tack
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.11-14
    • /
    • 2009
  • In this paper, we propose the method configuring social networks among users based on users' context and profile. Recently, many researchers are concerned about social networks related with collaborative systems. In case of the existing researches, however, it is difficult to configure social networks dynamically because they are based on static data types, such as log and profile of users. The proposed method uses not only user profiles but also context reflecting users' behavior dynamically. It computes the similarity among users' behavior contexts using hierarchical structure of context domain knowledge model. And it calculates relationships between contexts by given weight factors of category of context model. In order to verify usefulness of the method, we conduct an experiment on configuring social network according to change of user context. We expect that it makes dynamic analysis of relationship of users possible.

  • PDF

Application of LLR on Cooperative Communications for Wireless Relay Networks (무선 중계 네트워크의 협력 통신 방법에 대한 LLR 적용 연구)

  • Khuong Ho Van;Kong Hyung-Yun;Lee Dong-Un
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.601-606
    • /
    • 2006
  • Decode-and-forward cooperative communications protocol (DFP) allows single-antenna users in wireless medium to obtain the powerful benefits of multi-antenna systems without physical antenna arrays. For this protocol, so far the relays have used SNR to evaluate the reliability of the received signal before deciding whether to forward the decoded data so as to prevent their unsuccessful detection. However, SNR only characterizes the long-term statistic of Gaussian noise and thus leading to inaccurate assesment. Therefore, we propose using log-likelihood ratio (LLR) which accounts for the instantaneous noise in the received signal as an alternative to SNR. A variety of simulation results reveal the significant superiority of the SNR-based DFP to the SNR-based DFP regardless of threshold level and relay position under the flat Rayleigh fading channel plus AWGN (Additive White Gaussian Noise).

A Digit Serial Multiplier Over GF(2m)Based on the MSD-first Algorithm (GF(2m)상의 MSD 우선 알고리즘 기반 디지트-시리얼 곱셈기)

  • Kim, Chang-Hoon;Kim, Soon-Cheol
    • The KIPS Transactions:PartA
    • /
    • v.15A no.3
    • /
    • pp.161-166
    • /
    • 2008
  • In this paper, an efficient digit-serial systolic array is proposed for multiplication in finite field GF($2^m$) using the polynomial basis representation. The proposed systolic array is based on the most significant digit first (MSD-first) multiplication algorithm and produces multiplication results at a rate of one every "m/D" clock cycles, where D is the selected digit size. Since the inner structure of the proposed multiplier is tree-type, critical path increases logarithmically proportional to D. Therefore, the computation delay of the proposed architecture is significantly less than previously proposed digit-serial systolic multipliers whose critical path increases proportional to D. Furthermore, since the new architecture has the features of a high regularity, modularity, and unidirectional data flow, it is well suited to VLSI implementation.

Partial Rollback in Object-Oriented Database Management Systems (객체지향 데이터베이스 관리 시스템에서의 부분 철회)

  • Kim, Won-Young;Lee, Young-Koo;Whang, Kyu-Young
    • Journal of KIISE:Databases
    • /
    • v.27 no.4
    • /
    • pp.549-561
    • /
    • 2000
  • In database management systems(DBMSs), partial rollback is a useful facility that cancels part of the executed operations upon user's requests without a total rollback. Many relational DBMSs(RDBMSs) provide this facility, However, object-orientccd DBMSs (OODBMSs) cannot utilize the previous recovery scl18lne of partial rollback usccd in (RDBMSs) since, unlike RDBMSs, they use a dual buffer consisting of an object buffer and a page buffer. Therefore, a new recovery scheme is required that rolls back the data efficiently in the dual buffer. We propose four partial rollback schemes in OODBMSs that use a dual buffer. We classify the proposed schemes into the single buffer based partial rollback scheme and the dual buffer based partial rollback scheme according to the number of buffers used for partial rollback processing. We further classify them into Uthe page buffer based partial rollback scheme, 2)the object buffccr based partial rollback scheme, 3)the dual buffer based partial rollback scheme using soft log, and 4)the dual buffer based partial rollback scheme using shadows. We evaluate the performance by mathematical analysis and experiments. The results show that the dual buffer based partial rollback scheme using shadows provides the best performance.

  • PDF

A Usage Pattern Analysis of the Academic Database Using Social Network Analysis in K University Library (사회 네트워크 분석에 기반한 도서관 학술DB 이용 패턴 연구: K대학도서관 학술DB 이용 사례)

  • Choi, Il-Young;Lee, Yong-Sung;Kim, Jae-Kyeong
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.1
    • /
    • pp.25-40
    • /
    • 2010
  • The purpose of this study is to analyze the usage pattern between each academic database through social network analysis, and to support the academic database for users's needs. For this purpose, we have extracted log data to construct the academic database networks in the proxy server of K university library and have analyzed the usage pattern among each research area and among each social position. Our results indicate that the specialized academic database for the research area has more cohesion than the generalized academic database in the full-time professors' network and the doctoral students' network, and the density, degree centrality and degree centralization of the full-time professors' network and the doctoral students' network are higher than those of the other social position networks.

Interactions between AI Speaker and Children : A Field Study on the Success/Failure Cases by Types of Interactions (인공지능 스피커와 아동들의 상호작용 :유형별 성공/실패 사례 도출을 위한 현장 연구)

  • Hong, Junglim;Choi, Boreum
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.7
    • /
    • pp.19-29
    • /
    • 2020
  • As the AI speaker market is growing rapidly in recent years, the competition for the preoccupation of children who are the main users and the future prospective customers of the related companies is very intense. However, there is a lack of empirical research on how children interact with AI speakers. Therefore, this research examines the interactions between children and AI speakers, primarily through field studies, to extract what functions they use and what features they have. For this purpose, 799 conversations were collected and analyzed using the log data of the AI speaker recorded in real time. As a result, children were more likely to use children's songs, fairy tales, emotional conversations, and personification compared to adults. In addition, content analysis by specific types resulted in success/failure cases of interaction between children and AI speakers and proposed improvements by failure type. This study is meaningful in that it identifies children's AI speaker preferences, content, and major conversation patterns, and provides guidelines for developing services that meet children's eye level.

Play Motive Augmentation Research Method through Quest Understanding of MMORPG and Pluralistic Understanding of a Player (MMORPG의 퀘스트 이해와 플레이어의 다원주의적 이해를 통한 플레이 동기 증강 방안 모색)

  • Park, Yong-Hyun;Kyung, Byung-Pyo;Lee, Dong-Lyeor
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.10
    • /
    • pp.122-129
    • /
    • 2009
  • MMORPG Quest plays a strong role of motivation through compensation related with Avatar such as items and experience points rather than a role of story transfer. This situation finally made MMORPG become a difficult game that players should study the compensation of Quest for growth of a character, so it causes fixation of the user class. As a solving method of the fixation of the users, the possibility of Quest capable of strengthening play motive of various users through clarification of motivation structure of the Quest play and pluralistic understanding about players was investigated. This is a direct response to the user within the game system or how to use the player log information. The pluralistic understanding method of players will have values as a tool that can guarantee the objectivity and actual production of the data collected utilizing.

Construction of an Hybrid Firewall for School Networks and Implementation of a Graphical Interface for Access Control Rules (학교망을 위한 혼합방화벽 구축 및 접근제어 규칙을 위한 그래픽 인터페이스 구현)

  • Park, Chan-Jung
    • The Journal of Korean Association of Computer Education
    • /
    • v.3 no.2
    • /
    • pp.67-75
    • /
    • 2000
  • Due to the advantages of Internet, many teachers use Internet as an educational tool and due to the computerized works in schools, the usages of the Internet increase. However, because of the openness of the Internet, the sensitive data of an organization are exposed to outsiders and the Internet-based working has some problems such as the corruptions of instructional data or on-line assessment results. The need for protecting a school network from outsiders increases but the school networks with firewalls rarely exist. In this paper, in order to solve the security problem of a school network, we construct a hybrid firewall for school networks. In addition, we implement a graphical user interface for teachers to set up the access control rules of a hybrid firewall easily. The interface also provides the facilities such as log analysis, a real-time monitor for network traffics, and the statistic on traffics.

  • PDF

Hardware Design of Arccosine Function for Mobile Vector Graphics Processor (모바일 벡터 그래픽 프로세서용 역코사인 함수의 하드웨어 설계)

  • Choi, Byeong-Yoon;Lee, Jong-Hyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.4
    • /
    • pp.727-736
    • /
    • 2009
  • In this paper, the $arccos(cos^{-1})$ arithmetic unit for mobile graphics accelerator is designed. The mobile vector graphics applications need tight area, execution time, power dissipation, and accuracy constraints compared to desktop PC applications. The designed processor adopts 2nd-order polynomial approximation scheme based on IEEE floating point data format to satisfy speed and accuracy conditions and reduces area via hardware sharing structure. The arccosine processor consists of 15,280 gates and its estimated operating frequency is about 125Mhz at operating condition of $0.35{\mu}m$ CMOS technology. Because the processor can execute arccosine function within 7 clock cycles, it has about 17 MOPS(million arccos operations per second) execution rate and can be applicable to mobile OpenVG processor. And because of its flexible architecture, it can be applicable to the various transcendental functions such as exponential, trigonometric and logarithmic functions via replacement of ROM and minor hardware modification.