Cyberspace permits us to more beyond traditional face-to-face, mail and telephone surveys, yet still to examine basic issues regarding the quality of data collection: sampling, questionnaire design, survey distribution, means of response, and database creation. This article address each of these issues by contrasting and comparing traditional survey methods(Paper-and-Pencil) with Internet or Personal Computer networks-mediated (Screen-and-Keyboard) survey methods also introduces researchers to this revolutionary and innovative tool and outlines a variety of practical methods for using the Internet or Personal Computer Networks. The revolution in telecommunications technology has fostered the rapid growth of the Internet all over the world. The Internet is a massive global network and comprising many national and international networks of interconnected computers. The Internet or Personal Computer Networks could be the comprehensive interactive tool that will facilitate the development of the skills. The Internet or Personal Computer Networks provides a virtual frontier to expand our access to information and to increase our knowledge and understanding of public opinion, political behavior, social trends and lifestyles through survey research. Comparable to other technological advancements, the Internet or Personal Computer Networks presents opportunities that will impact significantly on the process and quality of survey research now and in the twenty-first century. There are trade-offs between traditional and the Internet or Personal Computer Networks survey. The Internet or Personal Computer Networks is an important channel for obtaining information for target participants. The cost savings in time, efforts, and material were substantial. The use of the Internet or Personal Computer Networks survey tool will increase the quality of research environment. There are several limitations to the Internet or Personal Computer Network survey approach. It requires the researcher to be familiar with Internet navigation and E-mail, it is essential for this process. The use of Listserv and Newsgroup result in a biased sample of the population of corporate trainers. However, it is this group that participates in technology and is in the fore front of shaping the new organizations of interest, and therefore it consists of appropriate participants. If this survey method becomes popular and is too frequently used, potential respondents may become as annoyed with E-mail as the sometimes are with mail survey and junk mail. Being a member of the Listserv of Newsgroup may moderate that reaction. There is a need to determine efficient, effective ways for the researcher to strip identifiers from E-mail, so that respondents remain anonymous, while simultaneously blocking a respondent from responding to a particular survey instrument more than once. The optimum process would be on that is initiated by the researcher : simple, fast and inexpensive to administer and has credibility with respondents. This would protect the legitimacy of the sample and anonymity. Creating attractive Internet or Personal Computer Networks survey formats that build on the strengths of standardized structures but also capitalize on the dynamic and interactive capability of the medium. Without such innovations in survey design, it is difficult to imagine why potential survey respondents would use their time to answer questions. More must be done to create diverse and exciting ways of building an credibility between respondents and researchers on the Internet or Personal Computer Networks. We believe that the future of much exciting research is based in the Electronic survey research. The ability to communicate across distance, time, and national boundaries offers great possibilities for studying the ways in which technology and technological discourse are shaped. used, and disseminated ; the many recent doctoral dissertations that treat some aspect of electronic survey research testify to the increase focus on the Internet or Personal Computer Networks. Thus, scholars should begin a serious conversation about the methodological issues of conducting research In cyberspace. Of all the disciplines, Internet or Personal Computer Networks, emphasis on the relationship between technology and human communication, should take the lead in considering research in the cyberspace.
Sequential pattern mining aims to discover interesting sequential patterns in a sequence database, and it is one of the essential data mining tasks widely used in various application fields such as Web access pattern analysis, customer purchase pattern analysis, and DNA sequence analysis. In general sequential pattern mining, only the generation order of data element in a sequence is considered, so that it can easily find simple sequential patterns, but has a limit to find more interesting sequential patterns being widely used in real world applications. One of the essential research topics to compensate the limit is a topic of weighted sequential pattern mining. In weighted sequential pattern mining, not only the generation order of data element but also its weight is considered to get more interesting sequential patterns. In recent, data has been increasingly taking the form of continuous data streams rather than finite stored data sets in various application fields, the database research community has begun focusing its attention on processing over data streams. The data stream is a massive unbounded sequence of data elements continuously generated at a rapid rate. In data stream processing, each data element should be examined at most once to analyze the data stream, and the memory usage for data stream analysis should be restricted finitely although new data elements are continuously generated in a data stream. Moreover, newly generated data elements should be processed as fast as possible to produce the up-to-date analysis result of a data stream, so that it can be instantly utilized upon request. To satisfy these requirements, data stream processing sacrifices the correctness of its analysis result by allowing some error. Considering the changes in the form of data generated in real world application fields, many researches have been actively performed to find various kinds of knowledge embedded in data streams. They mainly focus on efficient mining of frequent itemsets and sequential patterns over data streams, which have been proven to be useful in conventional data mining for a finite data set. In addition, mining algorithms have also been proposed to efficiently reflect the changes of data streams over time into their mining results. However, they have been targeting on finding naively interesting patterns such as frequent patterns and simple sequential patterns, which are found intuitively, taking no interest in mining novel interesting patterns that express the characteristics of target data streams better. Therefore, it can be a valuable research topic in the field of mining data streams to define novel interesting patterns and develop a mining method finding the novel patterns, which will be effectively used to analyze recent data streams. This paper proposes a gap-based weighting approach for a sequential pattern and amining method of weighted sequential patterns over sequence data streams via the weighting approach. A gap-based weight of a sequential pattern can be computed from the gaps of data elements in the sequential pattern without any pre-defined weight information. That is, in the approach, the gaps of data elements in each sequential pattern as well as their generation orders are used to get the weight of the sequential pattern, therefore it can help to get more interesting and useful sequential patterns. Recently most of computer application fields generate data as a form of data streams rather than a finite data set. Considering the change of data, the proposed method is mainly focus on sequence data streams.
Archives provide users with easier and more convenient access to and use of archival data through their Internet websites. Now, archival websites function not only as a tool of information provision or marketing, or as a gateway of Internet-based materials, but also as cyber space for all services of archives, providing users with information and knowledge and direct accessibility to the services in the archives. At present, Korean archives are proceeding with establishing websites or upgrading existing websites, and the use rates and reliability of web services by users are becoming higher. However, although there have been various studies for the evaluation of general websites, few are found with regard to the evaluation of archival websites. It is necessary for archival websites that provide information service to users of every stripe to make more efforts and have more interest in user-centered convenience, right to know, and information provision-centered service. Accordingly, needless to say, it is necessary to study evaluation criteria of websites so that high quality archival websites can be established. With this background, this study establishes evaluation criteria for archival websites, which are appropriate to their objectives and functions and directly evaluates archives, presenting ways to establish and redevelop archival websites. More detailed purposes are as follows: First, analyzes existing theories of evaluation through reviews on previous literature and elicits evaluation criteria for websites, which are appropriate to archives; Second, based on the elicited evaluation criteria for archival websites, examines the current state of domestic archival websites through analytic evaluation; and Third, presents ways to improve archival websites that may be helpful in establishing or improving them in the future. The expectancy effects of this study are as follows: First, it will be helpful when one wishes to identify the current state of archival websites and to improve or redevelop existing websites, or to develop online service through website; Second, it will function as a checklist when a developer who is to establish an archival website wishes to develop evaluation criteria; and Third, it may be used as an inspection tool when an archives contracts out the establishment of its website.
Surveys and studies on cultural assets using LiDAR measurement are already active overseas. Recently, awareness of the advantages and availability of LiDAR measurement has increased in Korea, and cases of using it for surveys of cultural assets are gradually increasing. However, it is usually restricted to surveys of mountain fortresses and is not actively used for surveys of ancient tombs yet. Therefore, this study intends to emphasize the need to secure fundamental data from LiDAR measurement for the era from the Three Kingdoms to Unified Silla in which recovery, maintenance, etc., in addition to the actual surveys, are unfulfilled due to the sites being mainly distributed in mountainous areas. For this, LiDAR measurement was executed for the area of Jangsan Ancient Tombs and Chunghyo-dong Ancient Tombs in Seoak-dong, Gyeongju, to review the distribution and geographical conditions of ancient tombs. As a result, in the Jangsan Ancient Tombs, in which a precision archaeological (measurement) survey was already executed, detailed geographic information and distribution conditions could be additionally identified, which could not be known only with the layout indicated by the topographic map of the existing report. Also, in the Chunghyo-dong Ancient Tombs, in which an additional survey was not conducted after 10 tombs were found during the Japanese colonial period, the location of the ancient tombs initially excavated was accurately identified, and the status and additional information was acquired, such as on the conditions of ancient tombs not surveyed. Such information may also be used as fundamental data for the preservation and maintenance of future ancient tombs in addition to the survey and study of the ancient tombs themselves. LiDAR measurement is most effective for identifying the condition of ancient tombs in mountainous areas where observation is difficult or access is limited due to the forest zone. It may be executed before on-site surveys, such as archaeological surveys, to secure data with high availability as prior surveys or pre-surveys. Therefore, it is necessary to secure fundamental data from LiDAR measurement in future surveys of ancient tombs and to establish a survey and maintenance/utilization plan based on this. To establish survey/study and preservation/maintenance measures for ancient tombs located in mountainous areas, a precision archaeological survey is currently executed to draw up a distribution chart of ancient tombs. If LiDAR measurement data is secured before this and used, a more effective and accurate distribution chart can be drawn up, and the actual conditions can be identified. Also, most omissions or errors in information can be prevented in on-site surveys of large regions. Therefore, it is necessary to accumulate fundamental data by actively using LiDAR measurement in future surveys of ancient tombs.
Main-Memory DataBase(MMDB) system where all the data reside on the main memory shows tremendous performance boost since it does not need any disk access during the transaction processing. Since MMDB still needs disk logging for transaction commit, it has become another bottleneck for the transaction throughput and the commit protocol should be examined carefully. There have been several attempts to reduce the logging overhead. The pre-commit and group commit are two well known techniques which do not require additional hardware. However, there has not been any research to analyze their effect on MMDB system. In this paper, we identify the possibility of deadlock resulting from the group commit and propose the disk group commit protocol which can be readily deployed. Using extensive simulation, we have shown that the group commit is effective on improving the MMDB transaction performance and the proposed disk group commit almost always outperform carefully tuned group commit. Also, we note that the pre-commit does not have any effect when used alone but shows some improvement if used in conjunction with the group commit.
This study examines the current alcohol use situation among adolescents and provides information relevant to development of adequate prevention programs for adolescent alcohol use in Korea. In this study, we used focus group research method and analyzed the outcome with constant comparison method. We classified 4 major categories of adolescent alcohol use situation such as the factors on enhancing alcohol use, the factors on delaying alcohol use, the occasions significantly related to alcohol use and the first alcohol use experience of adolescent. And we found out 16 minor categories and 93 concepts under the major categories. The results from the study revealed that the factors on enhancing alcohol use were associated with adolescents' psychological reasons, their positive perceptions on alcohol, family factors, peer influences, teacher's influences and social and cultural aspects on alcohol in general. The factors on delaying alcohol use were associated with health conditions, their negative perceptions on alcohol, parental monitoring, economic reasons and their limited access to purchase alcohol. The occasions significantly related to adolescent alcohol use were family events, school events and peer gatherings. In addition, the first adolescent alcohol use experience was strongly associated with the peer influences and significant adults' offer of alcohol. Findings suggest recommendations for prevention and intervention programs for adolescent alcohol use in Korea.
This paper aims to analyze the rise and decline of Seattle Community Network(briefly SCN), an electronic community network based upon Seattle, U.S. from the perspective of 'social shaping of technology' theory rather than that of technological determinism That is, this paper focuses on the social processes of the evolution of SCN. And this paper considers SCN as one important element of the 'network society', a concept manufactured by Manuel Castells. SCN was built successfully over 10 years ago by some progressive local activists and volunteers. The main purpose of building SCN at that time was said to make local community stronger with the help of advanced information technology. This can be understood that the founders of SCN tried to shape the direction of network society development based on civil society's values including public access and commitment to democracy rather than those of private companies. After some years of successful working, however, SCN started to decline. The expansion of internet services and the booming of dot.com companies in the late 90's were the main factors that made SCN decline. In conclusion, it can be said that the socia-economic factors rather than technological factors gave birth to the rise and decline of SCN.
Recently, malicious video classification and filtering techniques are of practical interest as ones can easily access to malicious multimedia contents through the Internet, IPTV, online social network, and etc. Considerable research efforts have been made to developing malicious video classification and filtering systems. However, the malicious video classification and filtering is not still being from mature in terms of reliable classification/filtering performance. In particular, the most of conventional approaches have been limited to using only the spatial features (such as a ratio of skin regions and bag of visual words) for the purpose of malicious image classification. Hence, previous approaches have been restricted to achieving acceptable classification and filtering performance. In order to overcome the aforementioned limitation, we propose new malicious video classification framework that takes advantage of using both the spatial and temporal features that are readily extracted from a sequence of video frames. In particular, we develop the effective temporal features based on the motion periodicity feature and temporal correlation. In addition, to exploit the best data fusion approach aiming to combine the spatial and temporal features, the representative data fusion approaches are applied to the proposed framework. To demonstrate the effectiveness of our method, we collect 200 sexual intercourse videos and 200 non-sexual intercourse videos. Experimental results show that the proposed method increases 3.75% (from 92.25% to 96%) for classification of sexual intercourse video in terms of accuracy. Further, based on our experimental results, feature-level fusion approach (for fusing spatial and temporal features) is found to achieve the best classification accuracy.
The evaluation of public transit service quality is more complicated than evaluating other aspects of transportation service. Although various measures of effectiveness [MOEs] for transit service have been studied and applied, a more comprehensive and accurate MOE is still required. In the past, either data from user surveys or the experience of bus agency administrators and/or engineers used to measure the quality of service. However, recently, with reliable and accurate real time data from BMS(Bus Management System) and BIS(Bus Information System), more reliable and accurate MOEs are available. This study develops a service evaluation model from users' perspectives, which is based on user' cost models that consider passenger access time, riding time, waiting time, and discomfort due to in-vehicle overcrowding, violation of traffic laws, and accident rate. For validating proposed model, data from the BMS and transit-fare cards (T-Money Card) for Seoul's No. 472 main bus line were used. Models developed in this study provided reliable results.
KSCE Journal of Civil and Environmental Engineering Research
/
v.33
no.1
/
pp.363-375
/
2013
Today, a shortage of the skilled operator has been intensified gradually and the necessity of an earthwork in extreme environment operators are difficult to access is increasing for the purpose of resource development and new living space creation. For this reason, an effort to develop an unmanned excavation robot for fully automated earthwork system is continuing globally. In Korea, a research consortium called 'Intelligent Excavation System' has been formed since 2006 as a part of Construction Technology Innovation Program of Ministry of Land, Transport and Maritime Affairs of Korea. Among detailed technologies of the Task Planning System is one of the core technologies of IES, this paper explains research and development process of the Local Area Design Module, which provides informatization unit to create automated excavators' work command information at operation level such as location, range, target, and sequence for excavation work. Designing of Local Area should be considered various influential factors such as excavator's specification, working mechanism, heuristics, and structural stability to create work plan guaranteed safety and effectiveness. For this research, conceptual and detail design of the Local Area is performed for analyzing design element and variable, and quantization method of design specification corresponding with heuristics and structural safety is generated. Finally, module is developed through constructed algorithm and developed module is verified.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.