• Title/Summary/Keyword: Gathering

Search Result 1,665, Processing Time 0.025 seconds

Studies on the Improvement of the Fish Gathering Effects of Artificial Fish Reefs in the Coastal Area of Cheju Island -The Effectiveness of Fishery Resources Enhancement of Artificial Fish Reefs- (제주도연안 인공어초의 집어효과 향상에 관한 연구 - 인공어초의 자원조성효과 -)

  • Ahn, Young-Wha;Rho, Hong-Kil;Kim, Suk-Jong;Jeung, Dong-Gun;Kim, Mun-Kwan
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.11 no.1
    • /
    • pp.59-68
    • /
    • 1999
  • The effectiveness of fishery resources enhancement of artificial reef settled in the coast of Cheju Island was determined by using the samples collected by scuaba and caught by the trammel net. The obtained results are summarized as follows; 1. Six types of shellfish were found in the artificial reef area, and the amount of shellfish living in that area was $490{\sim}3,483g/m^2$ according to our research. This shows a high density of shellfish in that area. 2. Ten types of seaweeds were found in the artificial reef area, and the reef living in that area was abundant, with $3,556{\sim}10,550g/m^2$. 3. The amount of a catch of fish in the artificial reef area was 3.5~21.4 times more than in the control area. This result shows the high productivity in that area.

  • PDF

Safeguarding Korean Export Trade through Social Media-Driven Risk Identification and Characterization

  • Sithipolvanichgul, Juthamon;Abrahams, Alan S.;Goldberg, David M.;Zaman, Nohel;Baghersad, Milad;Nasri, Leila;Ractham, Peter
    • Journal of Korea Trade
    • /
    • v.24 no.8
    • /
    • pp.39-62
    • /
    • 2020
  • Purpose - Korean exports account for a vast proportion of Korean GDP, and large volumes of Korean products are sold in the United States. Identifying and characterizing actual and potential product hazards related to Korean products is critical to safeguard Korean export trade, as severe quality issues can impair Korea's reputation and reduce global consumer confidence in Korean products. In this study, we develop country-of-origin-based product risk analysis methods for social media with a specific focus on Korean-labeled products, for the purpose of safeguarding Korean export trade. Design/methodology - We employed two social media datasets containing consumer-generated product reviews. Sentiment analysis is a popular text mining technique used to quantify the type and amount of emotion that is expressed in the text. It is a useful tool for gathering customer opinions regarding products. Findings - We document and discuss the specific potential risks found in Korean-labeled products and explain their implications for safeguarding Korean export trade. Finally, we analyze the false positive matches that arise from the established dictionaries that were used for risk discovery and utilize these classification errors to suggest opportunities for the future refinement of the associated automated text analytic methods. Originality/value - Various studies have used online feedback from social media to analyze product defects. However, none of them links their findings to trade promotion and the protection of a specific country's exports. Therefore, it is important to fill this research gap, which could help to safeguard export trade in Korea.

Meta Learning based Global Relation Extraction trained by Traditional Korean data (전통 문화 데이터를 이용한 메타 러닝 기반 전역 관계 추출)

  • Kim, Kuekyeng;Kim, Gyeongmin;Jo, Jaechoon;Lim, Heuiseok
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.11
    • /
    • pp.23-28
    • /
    • 2018
  • Recent approaches to Relation Extraction methods mostly tend to be limited to mention level relation extractions. These types of methods, while featuring high performances, can only extract relations limited to a single sentence or so. The inability to extract these kinds of data is a terrible amount of information loss. To tackle this problem this paper presents an Augmented External Memory Neural Network model to enable Global Relation Extraction. the proposed model's Global relation extraction is done by first gathering and analyzing the mention level relation extraction by the Augmented External Memory. Additionally the proposed model shows high level of performances in korean due to the fact it can take the often omitted subjects and objectives into consideration.

A Study on Effective Security Control Model Based on Characteristic of Web Service (웹 서비스 특성 기반 효율적인 보안관제 모델 연구)

  • Lee, Jae-heon;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.175-185
    • /
    • 2019
  • The security control is to protect IT system from cyber infringement by deriving valid result values in the process of gathering and analyzing various information. Currently, security control is very effective by using SIEM equipment which enables analysis of systematic and comprehensive viewpoint based on a lot of data, away from analyzing cyber threat information with only fragmentary information. However, It can also be said that cyber attacks are analyzed and coped with the manual work of security personnel. This means that even if there is excellent security equipment, the results will vary depending on the user using. In case of operating a characteristic web service including information provision, This study suggests the basic point of security control through characteristics information analysis, and proposes a model for intensive security control through the type discovery and application which enable a step-wise analysis and an effective filtering. Using this model would effectively detect, analyze and block attacks.

Publication Trends in Smoking-Related Research for Children and Adolescents: An Analysis of Korean Academic Journals (아동과 청소년의 흡연 관련 연구 동향 분석: 학술지 게재 논문을 중심으로)

  • Son, Hyun-Dong
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.2
    • /
    • pp.269-276
    • /
    • 2019
  • The purpose of this study was to investigate the publication trends of children and adolescents' smoking-related researches published in Korean academic journals. Three hundred fifty papers published until 2018 were analyzed by focusing on the publication year, research participants, research themes and research methods. As a result, smoking-related research on children and adolescents increased sharply from 1995 to 2000, and the trend continued. The main research participants were general children and adolescents and the most frequently studied themes were 'Associated Factors,' 'Intervention,' 'Prevalence,' 'Prevention,' 'Characteristics,' 'Law and Policies,' 'Scales,' 'Review and Theories' respectively. The most frequently used research method was the quantitative method. Moreover, the most common data gathering method was using questionnaires, and the number of papers which used panel data was gradually increasing. Future studies were suggested to explore a broader range of themes, and a balanced research approach was also recommended using both qualitative and mixed methods.

Numerical evaluation of gamma radiation monitoring

  • Rezaei, Mohsen;Ashoor, Mansour;Sarkhosh, Leila
    • Nuclear Engineering and Technology
    • /
    • v.51 no.3
    • /
    • pp.807-817
    • /
    • 2019
  • Airborne Gamma Ray Spectrometry (AGRS) with its important applications such as gathering radiation information of ground surface, geochemistry measuring of the abundance of Potassium, Thorium and Uranium in outer earth layer, environmental and nuclear site surveillance has a key role in the field of nuclear science and human life. The Broyden-Fletcher-Goldfarb-Shanno (BFGS), with its advanced numerical unconstrained nonlinear optimization in collaboration with Artificial Neural Networks (ANNs) provides a noteworthy opportunity for modern AGRS. In this study a new AGRS system empowered by ANN-BFGS has been proposed and evaluated on available empirical AGRS data. To that effect different architectures of adaptive ANN-BFGS were implemented for a sort of published experimental AGRS outputs. The selected approach among of various training methods, with its low iteration cost and nondiagonal scaling allocation is a new powerful algorithm for AGRS data due to its inherent stochastic properties. Experiments were performed by different architectures and trainings, the selected scheme achieved the smallest number of epochs, the minimum Mean Square Error (MSE) and the maximum performance in compare with different types of optimization strategies and algorithms. The proposed method is capable to be implemented on a cost effective and minimum electronic equipment to present its real-time process, which will let it to be used on board a light Unmanned Aerial Vehicle (UAV). The advanced adaptation properties and models of neural network, the training of stochastic process and its implementation on DSP outstands an affordable, reliable and low cost AGRS design. The main outcome of the study shows this method increases the quality of curvature information of AGRS data while cost of the algorithm is reduced in each iteration so the proposed ANN-BFGS is a trustworthy appropriate model for Gamma-ray data reconstruction and analysis based on advanced novel artificial intelligence systems.

A Visualization of Movie Reviews based on a Semantic Network Analysis (의미연결망 분석을 활용한 영화 리뷰 시각화)

  • Kim, Seulgi;Kim, Jang Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.1
    • /
    • pp.1-6
    • /
    • 2019
  • This study visualized users reaction about movies based on keywords with high frequency. For this work, we collected data of movie reviews on . A total of six movies were selected, and we conducted the work of data gathering and preprocessing. Semantic network analysis was used to understand the relationship among keywords. Also, NetDraw, packaged with UCINET, was used for data visualization. In this study, we identified the differences in characteristics of review contents regarding each movie. The implication of this study is that we visualized movie reviews made by sentence as keywords and explored whether it is possible to construct the interface to check users' reaction at a glance. We suggest that further studies use more diverse movie reviews, and the number of reviews for each movie is used in similar quantities for research.

Analysis of software quantitative evaluation index using ISO/IEC 25023 (ISO/IEC 25023을 활용한 소프트웨어 정량적 평가지표 분석)

  • Kim, Suwook;Park, Yoohyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.1
    • /
    • pp.7-12
    • /
    • 2019
  • Variety of companies which carry out R&D projects supported by government are proposing quantitative evaluation index business plans. However, Many companies have difficulties in aspects of selecting quantitative evaluation index and in some cases they have troubles to get results from selecting unsuitable evaluation index. First of all, both methods of gathering the data to be analyzed and the products which are tested by the accredited testing institutes classifying by industrial sectors are classified as the quantitative evaluation index selected by the company according to the eight quality characteristics of ISO/IEC 25023 Standard. Secondly, based on the results of the quantitative evaluation indexes classified into eight quality characteristics of the ISO/IEC 25023 standard, the tendency of the quality characteristics of the quantitative evaluation indexes selected mainly by the companies will be understandable. It is hopefully expected that this research will be helpful to select a quantitative evaluation index to evaluate the quality of software products.

The Experience of Long-term Caregiver Education Courses (요양보호사 교육과정 경험에 관한 현상학적 연구)

  • Kim, Seong-hoon;Shin, Ju-hwa;Ha, Jung-mi
    • 한국노년학
    • /
    • v.30 no.1
    • /
    • pp.1-20
    • /
    • 2010
  • This study is for understanding the experiences of students and lecturers in education course for the certification of the long-term caregiver. Samples are 12 students who had completed the course and 7 lecturers. The depth-interview is performed for gathering information and the phenomenological approach is applied to analyse the cases. 33 meanings, 15 themes and 4 theme clusters for students and 25 meanings, 11 themes and 4 theme clusters are found from the cases. Students' experiences are 'vague motivation for enrollment', 'low quality of education,' 'lack of professional skills after the completion of the course,' 'needs for improvement the course' and lecturers' experiences are 'more interests in benefits than study(students' motivation),' 'low quality of education,' 'lack of governmental administration,' 'needs for improvement of the course and the long-term care insurance.' In conclusion, some recommendations are suggested.

IoT and Wireless Sensor Network Monitoring for Campus Security (캠퍼스 보안을 위한 IoT 및 무선 센서 네트워크 모니터링)

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Usman, Muhammad
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.33-41
    • /
    • 2018
  • The idea of the Internet of Things as a platform on the Smart Campus has become increasingly popular. It requires an infrastructure consisting of communication networks, sensor nodes and gateways to connect to the Internet. Each sensor node is responsible for gathering data from the environment. This document outlines a network of wireless sensors on the Internet for the application of Smart Campus monitoring. Wireless sensor network Monitoring have become a complete solution to using a low power implementation and integrated systems. The numerous restrictions however result from the low communication range, the limited computing power, the lack of availability of the network protocol, the lack of programming security and the security failures in the areas of confidentiality, integrity and availability. A new security technique and its functionality for WSNM nodes developed. Development in the research of a secure network and suggestions for avoiding denial of service (DOS) and complexity attacks. These systems if properly implemented can provide an energy efficiency mechanism through pre-allocation and a new key from key management models with a secure routine algorithm.