• Title/Summary/Keyword: Research Information Systems

Search Result 12,224, Processing Time 0.044 seconds

A Study on the Topical Associations of Simultaneously Borrowed Books in Public Libraries (공공도서관 동시 대출 도서의 주제 연관성 분석 연구)

  • Woojin Kang;In Yeong Jeong;Jongwook Lee
    • Journal of Korean Library and Information Science Society
    • /
    • v.54 no.3
    • /
    • pp.33-55
    • /
    • 2023
  • There has been research to understand users' information behaviors using book circulation data of public libraries. In this study, we examined the subject areas of books simultaneously borrowed by users of public libraries and aimed to identify the relationships among the subject areas. To accomplish this, we utilized the Korean Decimal Classification codes of 984,790 loaned books in 2019 to transform the lists of concurrently borrowed books, totaling 22,443,699 records, by the same users on the same day, into vectors using the ITEM2VEC technique. Next, we extracted ten highly related classification codes for each classification code, utilizing a total of 522 classification codes to create a network. We identified 15 communities within this network and examined the characteristics of each community. Among the 15 communities, those consisting of two or more main classes allowed us to identify meaningful thematic associations. This study, grounded in users' book usage behaviors, has suggested the topics of books that could be borrowed together. The findings offer valuable insights for library collection development and placement, recommending related subject materials, and revising classification systems.

A Study on Significant Properties for Dataset Type Preservation Format (데이터세트 유형 전자기록의 필수보존속성 연구)

  • Jung-eun Lee;Dongmin Yang
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.34 no.4
    • /
    • pp.259-283
    • /
    • 2023
  • This study acknowledges that prevailing regulation concerning for the long-term preservation of electronic records focus mainly on document types, neglecting the preservation of electronic records from various administrative information systems. With the growing interest in data management in the era of big data, it is imperative to establish clear standards for the long-term preservation of datasets. The choice of preservation format for electronic records is based on the specific standards for each type of electronic record. These standards are formulated according to the significant properties relevant to the electronic record type. This study aims to identify the significant properties of electronic records of each record type, before creating specific preservation format selection criteria for these record types. To achieve this, we reviewed and analyzed R&D studies by the National Archives of Korea and the NARA in the United States. As a result of the research, 9 significant properties were identified for database-type entities, and 7 significant properties were identified for structured data-type entities.

Pipeline defect detection with depth identification using PZT array and time-reversal method

  • Yang Xu;Mingzhang Luo;Guofeng Du
    • Smart Structures and Systems
    • /
    • v.32 no.4
    • /
    • pp.253-266
    • /
    • 2023
  • The time-reversal method is employed to improve the ability of pipeline defect detection, and a new approach of identifying the pipeline defect depth is proposed in this research. When the L(0,2) mode ultrasonic guided wave excited through a lead zirconate titinate (PZT) transduce array propagates along the pipeline with a defect, it will interact with the defect and be partially converted to flexural F(n, m) modes and longitudinal L(0,1) mode. Using a receiving PZT array attached axisymmetrically around the pipeline, the L(0,2) reflection signal as well as the mode conversion signals at the defect are obtained. An appropriate rectangle window is used to intercept the L(0,2) reflection signal and the mode conversion signals from the obtained direct detection signals. The intercepted signals are time reversed and re-excited in the pipeline again, result in the guided wave energy focusing on the pipeline defect, the L(0,2) reflection and the L(0,1) mode conversion signals being enhanced to a higher level, especially for the small defect in the early crack stage. Besides the L(0,2) reflection signal, the L(0,1) mode conversion signal also contains useful pipeline defect information. It is possible to identify the pipeline defect depth by monitoring the variation trend of L(0,2) and L(0,1) reflection coefficients. The finite element method (FEM) simulation and experiment results are given in the paper, the enhancement of pipeline defect reflection signals by time-reversal method is obvious, and the way to identify pipeline defect depth is demonstrated to be effective.

Analysis of Prompt Engineering Methodologies and Research Status to Improve Inference Capability of ChatGPT and Other Large Language Models (ChatGPT 및 거대언어모델의 추론 능력 향상을 위한 프롬프트 엔지니어링 방법론 및 연구 현황 분석)

  • Sangun Park;Juyoung Kang
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.4
    • /
    • pp.287-308
    • /
    • 2023
  • After launching its service in November 2022, ChatGPT has rapidly increased the number of users and is having a significant impact on all aspects of society, bringing a major turning point in the history of artificial intelligence. In particular, the inference ability of large language models such as ChatGPT is improving at a rapid pace through prompt engineering techniques. This reasoning ability can be considered as an important factor for companies that want to adopt artificial intelligence into their workflows or for individuals looking to utilize it. In this paper, we begin with an understanding of in-context learning that enables inference in large language models, explain the concept of prompt engineering, inference with in-context learning, and benchmark data. Moreover, we investigate the prompt engineering techniques that have rapidly improved the inference performance of large language models, and the relationship between the techniques.

The Importance of Time Management in Self-Regulated Learning: Focusing on University Online Courses

  • Jong Man Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.193-200
    • /
    • 2024
  • This study aims to answer the following questions: 'Do university students who are satisfied with their online courses have higher academic achievement?' and 'What are the key self-regulated learning strategy factors that influence satisfaction and academic performance?'. To do this, this study conducted a survey of university students taking online courses and collected a total of 95 questionnaires. Research method used structural equation model. The results of the analysis showed that, First, satisfaction and academic achievement in university online courses were found to be unrelated. Second, the factors affecting satisfaction and academic achievement were found to be different. Time management was analyzed as a significant factor affecting both satisfaction and academic achievement, while interaction was found to affect satisfaction only. These findings can be used as a basis for developing practical policies to prioritize and support self-regulated learning as an effective teaching method in university online courses.

A Study on Data Requirements and Quality Verification for Legal Deposit and Acquisition Tasks of Domestic Electronic Publications (국내 유통 전자출판물의 납본 및 수집을 위한 데이터 요구사항 및 품질 검증 연구)

  • Gyuhwan Kim;Soojung Kim;Daekeun Jeong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.35 no.1
    • /
    • pp.127-148
    • /
    • 2024
  • This study aimed to propose considerations for attributes and their standardization strategies during the data collection process for electronic publications by domestic distributors for the National Library of Korea. The research identified a total of 21 essential and optional attributes based on a survey and a Focused Group Interview (FGI) with the staff responsible for legal deposit and acquisition tasks at the National Library of Korea. Additional attributes were found necessary during the data quality verification process, leading to the specification of essential and optional attributes for various types of materials, including eBooks, audiobooks, webtoons, and web novels. The standardization of attribute values, essential for enhancing the identifiability and management efficiency of electronic publications, included adherence to ISO 8601 rules for dates and times, clear designation of limited-range attribute values such as file format and adult content, and detailed description of information related to titles. Furthermore, the study highlighted the need for establishing standardized metadata requirements and continuous data quality management and monitoring systems.

Evaluation of Water Supply Reliability in Agricultural Reservoirs Using Water Balance Analysis (물수지 기반 농업용 저수지 내한능력 및 이수안전도 평가)

  • Yang, Mi-Hye;Nam, Won-Ho;Shin, Ji-Hyeon;Yoon, Dong-Hyun;Yang, Hee-Chung
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.66 no.5
    • /
    • pp.29-40
    • /
    • 2024
  • Most agricultural reservoirs were built between the 1940s and 1970s. Therefore, it is necessary to evaluate the current water supply safety, considering changes in water capacity, the water management, and environment in relation to the passage of time.. The design frequency of drought, the number of years areservoir needs to be able to withstand a drought phenomenon, foragricultural water resources in Korea is the 10-year drought. As the water supply system and water supply patterns change, it is necessary to establish a concept of water supply reliability, which refers to the stability of water supply. This study evaluated the water supply reliability of agricultural reservoirs based on the designed frequency. The previously designed frequency and water balance analysis were used to calculate and analyze reservoir storage capacity, water supply turnover, water supply amount, water supply potential, water utilization safety, and water supply reliability. As a result, Yongmyeon Reservoir was found to be stable in terms of water supply reliability, whereas Seongho and Yongpung Reservoirs were found to be unstable using all methods. In particular, when converting the water utilization safety and the water supply reliability to the frequency of drought, Seongho and Yongpung Reservoir were in the lowest class, with a frequency of drought less than four years. Thus, we recommend that the consideration of water supply reliability be included in the preparation of adaptive measures and water supply strategies as changes in environmental conditions continue to develop.

Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective (소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점)

  • Chung, Namho;Han, Hee Jeong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF

Research on text mining based malware analysis technology using string information (문자열 정보를 활용한 텍스트 마이닝 기반 악성코드 분석 기술 연구)

  • Ha, Ji-hee;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.45-55
    • /
    • 2020
  • Due to the development of information and communication technology, the number of new / variant malicious codes is increasing rapidly every year, and various types of malicious codes are spreading due to the development of Internet of things and cloud computing technology. In this paper, we propose a malware analysis method based on string information that can be used regardless of operating system environment and represents library call information related to malicious behavior. Attackers can easily create malware using existing code or by using automated authoring tools, and the generated malware operates in a similar way to existing malware. Since most of the strings that can be extracted from malicious code are composed of information closely related to malicious behavior, it is processed by weighting data features using text mining based method to extract them as effective features for malware analysis. Based on the processed data, a model is constructed using various machine learning algorithms to perform experiments on detection of malicious status and classification of malicious groups. Data has been compared and verified against all files used on Windows and Linux operating systems. The accuracy of malicious detection is about 93.5%, the accuracy of group classification is about 90%. The proposed technique has a wide range of applications because it is relatively simple, fast, and operating system independent as a single model because it is not necessary to build a model for each group when classifying malicious groups. In addition, since the string information is extracted through static analysis, it can be processed faster than the analysis method that directly executes the code.

A Study on Geospatial Information Role in Digital Twin (디지털트윈에서 공간정보 역할에 관한 연구)

  • Lee, In-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.268-278
    • /
    • 2021
  • Technologies that are leading the fourth industrial revolution, such as the Internet of Things (IoT), big data, artificial intelligence (AI), and cyber-physical systems (CPS) are developing and generalizing. The demand to improve productivity, economy, safety, etc., is spreading in various industrial fields by applying these technologies. Digital twins are attracting attention as an important technology trend to meet demands and is one of the top 10 tasks of the Korean version of the New Deal. In this study, papers, magazines, reports, and other literature were searched using Google. In order to investigate the contribution or role of geospatial information in the digital twin application, the definition of a digital twin, we investigated technology trends of domestic and foreign companies; the components of digital twins required in manufacturing, plants, and smart cities; and the core techniques for driving a digital twin. In addition, the contributing contents of geospatial information were summarized by searching for a sentence or word linked between geospatial-related keywords (i.e., Geospatial Information, Geospatial data, Location, Map, and Geodata and Digital Twin). As a result of the survey, Geospatial information is not only providing a role as a medium connecting objects, things, people, processes, data, and products, but also providing reliable decision-making support, linkage fusion, location information provision, and frameworks. It was found that it can contribute to maximizing the value of utilization of digital twins.