• Title/Summary/Keyword: Collection Codes

Search Result 51, Processing Time 0.024 seconds

A Study on the Topical Associations of Simultaneously Borrowed Books in Public Libraries (공공도서관 동시 대출 도서의 주제 연관성 분석 연구)

  • Woojin Kang;In Yeong Jeong;Jongwook Lee
    • Journal of Korean Library and Information Science Society
    • /
    • v.54 no.3
    • /
    • pp.33-55
    • /
    • 2023
  • There has been research to understand users' information behaviors using book circulation data of public libraries. In this study, we examined the subject areas of books simultaneously borrowed by users of public libraries and aimed to identify the relationships among the subject areas. To accomplish this, we utilized the Korean Decimal Classification codes of 984,790 loaned books in 2019 to transform the lists of concurrently borrowed books, totaling 22,443,699 records, by the same users on the same day, into vectors using the ITEM2VEC technique. Next, we extracted ten highly related classification codes for each classification code, utilizing a total of 522 classification codes to create a network. We identified 15 communities within this network and examined the characteristics of each community. Among the 15 communities, those consisting of two or more main classes allowed us to identify meaningful thematic associations. This study, grounded in users' book usage behaviors, has suggested the topics of books that could be borrowed together. The findings offer valuable insights for library collection development and placement, recommending related subject materials, and revising classification systems.

Lightweight Deep Learning Model of Optical Character Recognition for Laundry Management (세탁물 관리를 위한 문자인식 딥러닝 모델 경량화)

  • Im, Seung-Jin;Lee, Sang-Hyeop;Park, Jang-Sik
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.25 no.6_3
    • /
    • pp.1285-1291
    • /
    • 2022
  • In this paper, we propose a low-cost, low-power embedded environment-based deep learning lightweight model for input images to recognize laundry management codes. Laundry franchise companies mainly use barcode recognition-based systems to record laundry consignee information and laundry information for laundry collection management. Conventional laundry collection management systems using barcodes require barcode printing costs, and due to barcode damage and contamination, it is necessary to improve the cost of reprinting the barcode book in its entirety of 1 billion won annually. It is also difficult to do. Recognition performance is improved by applying the VGG model with 7 layers, which is a reduced-transformation of the VGGNet model for number recognition. As a result of the numerical recognition experiment of service parts drawings, the proposed method obtained a significantly improved result over the conventional method with an F1-Score of 0.95.

Design and Implementation of Internet Throats and Vulnerabilities Auto Collector for Cyber Threats Management (사이버위협 관리를 위한 인터넷 위협 및 취약점 정보 수집기 설계 및 구현)

  • Lee, Eun-Young;Paek, Seung-Hyun;Park, In-Sung;Yun, Joo-Beom;Oh, Hung-Geun;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.21-28
    • /
    • 2006
  • Beginning flag security it was limited in Firewall but currently many information security solutions like Anti-virus, IDS, Firewall are come to be many. For efficiently managing different kinds of information security products ESM (Enterprise Security management) are developed and operated. Recently over the integrated security management system, TMS (Threat Management System) is rising in new area of interest. It follows in change of like this information security product and also collection information is being turning out diversification. For managing cyber threats, we have to analysis qualitative information (like vulnerabilities and malware codes, security news) as well as the quantity event logs which are from information security products of past. Information Threats and Vulnerability Auto Collector raises the accuracy of cyber threat judgement and can be utilized to respond the cyber threat which does not occur still by gathering qualitative information as well as quantity information.

  • PDF

The Next Generation Malware Information Collection Architecture for Cybercrime Investigation

  • Cho, Ho-Mook;Bae, Chang-Su;Jang, Jaehoon;Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.123-129
    • /
    • 2020
  • Recently, cybercrime has become increasingly difficult to track by applying new technologies such as virtualization technology and distribution tracking avoidance. etc. Therefore, there is a limit to the technology of tracking distributors based on malicious code information through static and dynamic analysis methods. In addition, in the field of cyber investigation, it is more important to track down malicious code distributors than to analyze malicious codes themselves. Accordingly, in this paper, we propose a next-generation malicious code information collection architecture to efficiently track down malicious code distributors by converging traditional analysis methods and recent information collection methods such as OSINT and Intelligence. The architecture we propose in this paper is based on the differences between the existing malicious code analysis system and the investigation point's analysis system, which relates the necessary elemental technologies from the perspective of cybercrime. Thus, the proposed architecture could be a key approach to tracking distributors in cyber criminal investigations.

Hex Code-based Geological Cross-sections Describing Landscape Dynamics in the Jeju Geomunoreum Lava Tube System

  • Yi, Yun-Jae;Kim, Soo-In;Ahn, Ung-San;Lee, Keun Chul;Lee, Mi-Kyung;Lee, Jung-Sook;Kim, Dae-Shin;Kim, Jong-Shik
    • Korean Journal of Environmental Agriculture
    • /
    • v.41 no.1
    • /
    • pp.65-70
    • /
    • 2022
  • BACKGROUND: The Geomunoreum Lava Tube System (GLTS) is both vast and culturally valuable. The Jeju Volcanic Island and Lava Tubes, which are partly composed of the GLTS, have been declared as a United Nations Educational, Scientific, and Cultural Organization (UNESCO) World Heritage Site. Exploration of the caves is strictly regulated to conserve these vulnerable environments. Photographs provide limited information and do not describe the entire environment comprehensively. Therefore, we created several illustrations of the lava tubes to display their environmental features. METHODS AND RESULTS: We explored six lava caves (upstream and downstream) in the GLTS and photographed their geological features and yellow walls, the colors of which are influenced by microbial mats. We compared the hex codes of the wall colors using the Clip Studio v1.10.5 software and created illustrations that accurately represent the scale and features of the caves. CONCLUSION(S): Upstream and downstream caves of the GLTS differ in scale and volcanic features. We illustrated various characteristics of the caves including lava cave features, vegetation, and microbial mats. We also described the internal and external cave environments.

The Study of Response Model & Mechanism Against Windows Kernel Compromises (Windows 커널 공격기법의 대응 모델 및 메커니즘에 관한 연구)

  • Kim, Jae-Myong;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.1-12
    • /
    • 2006
  • Malicious codes have been widely documented and detected in information security breach occurrences of Microsoft Windows platform. Legacy information security systems are particularly vulnerable to breaches, due to Window kernel-based malicious codes, that penetrate existing protection and remain undetected. To date there has not been enough quality study into and information sharing about Windows kernel and inner code mechanisms, and this is the core reason for the success of these codes into entering systems and remaining undetected. This paper focus on classification and formalization of type target and mechanism of various Windows kernel-based attacks, and will present suggestions for effective response methodologies in the categories of, "Kernel memory protection", "Process & driver protection" and "File system & registry protection". An effective Windows kernel protection system will be presented through the collection and analysis of Windows kernel and inside mechanisms, and through suggestions for the implementation methodologies of unreleased and new Windows kernel protection skill. Results presented in this paper will explain that the suggested system be highly effective and has more accurate for intrusion detection ratios, then the current legacy security systems (i.e., virus vaccines and Windows IPS, etc) intrusion detection ratios. So, It is expected that the suggested system provides a good solution to prevent IT infrastructure from complicated and intelligent Windows kernel attacks.

  • PDF

A Study on the Application of the RFID Technology to Libraries (RFID 기술의 도서관 적용 방안 연구)

  • Lee, Jong-Moon
    • Journal of Korean Library and Information Science Society
    • /
    • v.38 no.1
    • /
    • pp.157-171
    • /
    • 2007
  • In this study, the usefulness of the RFID technology, which has been recommended to be used in libraries, is reviewed by its technical aspect and the successful methods derived from RFID-applied libraries is presented to other libraries. More precisely, it is advised that checking out or returning books and materials, checking a collection of books, identifying misplaced materials, and theft-proofing materials, which have been previously performed using bar codes or the magnetic tapes, should be automated through RFID additionally the method to apply the technology to library's facilities or devices is proposed.

  • PDF

A Study on the Basic Procedure of LCC Analysis for the Urban Transit Vehicle (도시철도 차량에서 LCC 분석의 기본 절차에 관한 연구)

  • Chung, Kwang-Woo;Jeon, Young-Seok;An, Joon-Yong;Kim, Chul-Su;Chung, Jong-Duk
    • Proceedings of the KSR Conference
    • /
    • 2009.05a
    • /
    • pp.643-652
    • /
    • 2009
  • This paper presents brief history and a state-of-the-art survey of Life Cycle Cost (LCC) analysis, in particular LCC analysis in the Urban Transit Vehicle, based on a internationl codes and standards related to LCC analysis. A main objective of the LCC analysis is to quantify the total cost of ownership of a product throughout its full life cycle, which includes research and development, construction, operation and maintenance, and disposal. The predicted LCC is useful information for decision making in purchasing a product, in optimizing design, in scheduling maintenance, or in planning overhaul. This paper presents a LCC procedure consisting of seven steps, which are "Problems definition", "Cost elements definition", "System modeling", "Data collection", "Cost profile development", "Evaluation", and "Verification". Sub-activities to be encompassed in the seven steps procedure are described.

  • PDF

Research Ethics on the Psychological and Clinical Study Targeting Children and Adolescents

  • Seong-Gon KIM
    • Journal of Research and Publication Ethics
    • /
    • v.4 no.1
    • /
    • pp.15-21
    • /
    • 2023
  • Purpose: Psychological and clinical studies targeting children and adolescents have become increasingly important in recent years as researchers strive to understand better the psychological and physiological development of children and teens. The purpose of the study is to explore significant research ethics on the psychological and clinical study targeting children and adolescents. In addition to these ethical considerations, international and national codes of ethics and regulatory bodies guide ethical research practices with children and adolescents. Research design, data, and methodology: The present study used the qualitative textual collection through investigating the past and current literature review. Numerous prior studies have conducted this research design to obtain the right prior studies. Results: Previous Research has indicated there are four research ethics on the psychological and clinical study targeting children and adolescents. (1) Respect for autonomy, (2) Respect for privacy and confidentiality, (3) Respect for vulnerability, (4). Respect for beneficence. Conclusions: In conclusion, research ethics are essential for protecting children and adolescents when conducting psychological and clinical studies. In the future, research should focus on developing innovative methods to ensure the safety of children and adolescents while still allowing them to participate in research.

The engineering merit of the "Effective Period" of bilinear isolation systems

  • Makris, Nicos;Kampas, Georgios
    • Earthquakes and Structures
    • /
    • v.4 no.4
    • /
    • pp.397-428
    • /
    • 2013
  • This paper examines whether the "effective period" of bilinear isolation systems, as defined invariably in most current design codes, expresses in reality the period of vibration that appears in the horizontal axis of the design response spectrum. Starting with the free vibration response, the study proceeds with a comprehensive parametric analysis of the forced vibration response of a wide collection of bilinear isolation systems subjected to pulse and seismic excitations. The study employs Fourier and Wavelet analysis together with a powerful time domain identification method for linear systems known as the Prediction Error Method. When the response history of the bilinear system exhibits a coherent oscillatory trace with a narrow frequency band as in the case of free vibration or forced vibration response from most pulselike excitations, the paper shows that the "effective period" = $T_{eff}$ of the bilinear isolation system is a dependable estimate of its vibration period; nevertheless, the period associated with the second slope of the bilinear system = $T_2$ is an even better approximation regardless the value of the dimensionless strength,$Q/(K_2u_y)=1/{\alpha}-1$, of the system. As the frequency content of the excitation widens and the intensity of the acceleration response history fluctuates more randomly, the paper reveals that the computed vibration period of the systems exhibits appreciably scattering from the computed mean value. This suggests that for several earthquake excitations the mild nonlinearities of the bilinear isolation system dominate the response and the expectation of the design codes to identify a "linear" vibration period has a marginal engineering merit.