• Title/Summary/Keyword: Researcher network

Search Result 201, Processing Time 0.027 seconds

A Study on Methods of Documentary Research on Educational Facilities - Focused on the Utilization of the ERIC - (교육시설(敎育施設)에 관한 문헌연구(文獻硏究) 방법(方法) - 미국 ERIC 자료 활용방법을 중심으로 -)

  • Park, Jae-Youn
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.1 no.1
    • /
    • pp.33-40
    • /
    • 1994
  • This study was taken to increase efficiency in reviewing documents of school facilities from the network of ERIV(Educational Resources and Information Center, USA). Outline of the ERIC network, and the structure, role, function of the ERIC thesaurus are introduced. A thesaurus have developed for information retrieval purpose provides the filing labels which permit information to be stored by one person and retrieved by another. As an information system grows, its thesaurus is systematically built and refined to the point where it represents, in a very special sense, the vocabulary of subject field. The Thesaurus of ERIC Descriptors represents such a vocabulary for the field education. An understanding of its origins, its function and its limitations, is just as important to the teacher, the student of education or the educational researcher as it is for the indexer or custodian of the information pool it represents. If the Thesaurus is understood and used in an appropriate way, it can give all educators not only insight into the ERIC system but also an increased awareness of the language of their field. A great many terms are necessary to describe the many aspects of education, and the task of relating them in even an approximately consistent way is an enormous one. The undertaking should be managed by people who not only know what they are talking about but who also should be able to predict what people in their field are lilely to be talking about in the near future. It should also enlist people who are willing to pay term to another within the system. To engage a large number of these two kinds of people over a long period of time is very likely to cost a great deal of money. There is very little proprietary value in producing such a list of terms, for it can very easily be copied, adapted, updated, etc. Thus, because of its high cost and low proprietary value, it becomes a task likely to be funded only by a government. A government has many ways of spending its money. However, after the decision has been made to spend money to produce an authority list, one must decide how this authority is to be delegated. The history of the development of the ERIC Thesaurus is the history of how this authority was delegated. Scientific research has thrived on efforts to define terms as precisely as possible. It is difficult to say with certainty, however, that solutions to social problems have thrived on a simple diet of scientific research. Contemporary crises demand new and imaginative ways of conceiving problems and talking about them. If this Thesaurus or any other scheme for normalizing or controlling language inhibits in the slightest measure the creative use of language, it is against it use. Only if the principles and details of the Thesaurus are misunderstood can it be used as a constraint on language in a negative sense. Students of education of every kind should see the The-saurus as an opportunity to become increasingly self-conscious about their language and thus about their assumptions and their approaches to educational problems.

  • PDF

Youtube and K Pop fan's Tribute Activity (유튜브와 케이팝 팬의 트리뷰트 활동)

  • Noh, Kwang Woo
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.6
    • /
    • pp.24-32
    • /
    • 2015
  • The global success of PSY's Gangnam Style was mediated through combination of YouTube and SNS. PSY's success led into some communication scholars' consideration of new international circulation of Korean pop culture (Korean Trend 2.0). In terms of global circulation of pop culture, it is noticeable how users appropriate YouTube channel beyond mere watching music videos and mere international circulation of Korean pop culture. The mode of fan's activity and appropriation contributes to the expansion of the width and amplification of the volume of Korean popular culture as well. The circulation of pop culture was considered in the level of exchange of tangible commodities such as CD, DVD, and so on until the adoption of digital media and Internet. YouTube has brought new mode in which the international circulation of pop culture is mediated without exchange of tangible commodities but was amplified with the diffusion of network. This study grasps how the mode of users' appropriation contributes to international circulation of pop culture through case studies of some K-pop music videos and international K-pop fans' tribute activities. In terms of theoretical perspective, fandom studies will be examined. In terms of research method, the researcher adopts netnography, a participatory observation on network, to find the feature of fandom and its contribution to the international circulation of pop cultures.

Development of Prediction Model for Prevalence of Metabolic Syndrome Using Data Mining: Korea National Health and Nutrition Examination Study (국민건강영양조사를 활용한 대사증후군 유병 예측모형 개발을 위한 융복합 연구: 데이터마이닝을 활용하여)

  • Kim, Han-Kyoul;Choi, Keun-Ho;Lim, Sung-Won;Rhee, Hyun-Sill
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.325-332
    • /
    • 2016
  • The purpose of this study is to investigate the attributes influencing the prevalence of metabolic syndrome and develop the prediction model for metabolic syndrome over 40-aged people from Korea Health and Nutrition Examination Study 2012. The researcher chose the attributes for prediction model through literature review. Also, we used the decision tree, logistic regression, artificial neural network of data mining algorithm through Weka 3.6. As results, social economic status factors of input attributes were ranked higher than health-related factors. Additionally, prediction model using decision tree algorithm showed finally the highest accuracy. This study suggests that, first of all, prevention and management of metabolic syndrome will be approached by aspect of social economic status and health-related factors. Also, decision tree algorithms known from other research are useful in the field of public health due to their usefulness of interpretation.

Analyses of Studies on Swallowing Rehabilitation Program for Stroke patients in Korea (뇌졸중 환자 대상의 연하재활프로그램에 대한 국내 연구 논문 분석)

  • Kwak, Hye-Weon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.11
    • /
    • pp.7394-7402
    • /
    • 2015
  • The purpose of this study was to investigate the status of studies on swallowing rehabilitation interventions for stroke patients that had been conducted in the past 5 years (2010-2014) in Korea and to examine their findings. A literature search was conducted through RISS, National Assembly Library, and KISS, and 12 papers were analyzed. Four articles were from nursing science, and 8 from other disciplines. Qualitative evaluation of the articles was conducted by using an evaluation framework that was designed by the researcher, which took into account the checklist presented by the Scottish Intercollegiate Guideline Network (2013). In the results of the qualitative evaluation on the papers, 4 studies scored 7 out of 10 points, 6 studies scored between 5 and 6 points, and 2 studies scored 4 points. Intervention sessions were conducted for 25 minutes, on average, each at a frequency of 4.1 sessions per week, for a total of 33.7 sessions. This study found that direct swallowing training and comprehensive intervention of respiratory and oral, including pharyngeal were effective in relieving difficulties in swallowing. In the future, such findings are expected to be used in nursing interventions for establishment of the basis for evidence-based nursing practice.

Personal Information Detection by Using Na$\ddot{i}$ve Bayes Methodology (Na$\ddot{i}$ve Bayes 방법론을 이용한 개인정보 분류)

  • Kim, Nam-Won;Park, Jin-Soo
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.91-107
    • /
    • 2012
  • As the Internet becomes more popular, many people use it to communicate. With the increasing number of personal homepages, blogs, and social network services, people often expose their personal information online. Although the necessity of those services cannot be denied, we should be concerned about the negative aspects such as personal information leakage. Because it is impossible to review all of the past records posted by all of the people, an automatic personal information detection method is strongly required. This study proposes a method to detect or classify online documents that contain personal information by analyzing features that are common to personal information related documents and learning that information based on the Na$\ddot{i}$ve Bayes algorithm. To select the document classification algorithm, the Na$\ddot{i}$ve Bayes classification algorithm was compared with the Vector Space classification algorithm. The result showed that Na$\ddot{i}$ve Bayes reveals more excellent precision, recall, F-measure, and accuracy than Vector Space does. However, the measurement level of the Na$\ddot{i}$ve Bayes classification algorithm is still insufficient to apply to the real world. Lewis, a learning algorithm researcher, states that it is important to improve the quality of category features while applying learning algorithms to some specific domain. He proposes a way to incrementally add features that are dependent on related documents and in a step-wise manner. In another experiment, the algorithm learns the additional dependent features thereby reducing the noise of the features. As a result, the latter experiment shows better performance in terms of measurement than the former experiment does.

A Comparative Study of IT Outsourcing Research in Korea and China on Author Bibliographic Coupling Analysis (저자서지결합분석을 통한 한중 IT 아웃소싱 연구 비교)

  • Hyoung Jin Min;Sung Sik Park;Yuchen Jin
    • Information Systems Review
    • /
    • v.22 no.4
    • /
    • pp.1-20
    • /
    • 2020
  • This study uses the bibliometric analysis and author bibliographic coupling analysis (ABCA) to analyse the study of IT outsourcing in Korea and China by 2017 and determine the subject areas of the researcher and the intellectual structure which lays the foundation for future researchers in IT outsourcing area. For this study, through the National Digital Science Library (NDSL) of Korea and China Academic Journal network publishing Database (CAJD) of China, it collected the connected documents and found out authors whose work had been published more than twice. ABCA is utilized to visualize the author map which could find out the researchers and areas in meaningful way. The result show that the study of IT outsourcing in Korea came out earlier and developed further than that of China. The study in Korea has already come to the mature period. By contrast, China remains at somewhere between developing period and bottleneck period. The distribution of papers are still in the dispersed state. The author map shows a hot subject area in Korean researchers IT outsourcing strategy is and in chinese scholars IT outsourcing management.

Construction of Event Networks from Large News Data Using Text Mining Techniques (텍스트 마이닝 기법을 적용한 뉴스 데이터에서의 사건 네트워크 구축)

  • Lee, Minchul;Kim, Hea-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.1
    • /
    • pp.183-203
    • /
    • 2018
  • News articles are the most suitable medium for examining the events occurring at home and abroad. Especially, as the development of information and communication technology has brought various kinds of online news media, the news about the events occurring in society has increased greatly. So automatically summarizing key events from massive amounts of news data will help users to look at many of the events at a glance. In addition, if we build and provide an event network based on the relevance of events, it will be able to greatly help the reader in understanding the current events. In this study, we propose a method for extracting event networks from large news text data. To this end, we first collected Korean political and social articles from March 2016 to March 2017, and integrated the synonyms by leaving only meaningful words through preprocessing using NPMI and Word2Vec. Latent Dirichlet allocation (LDA) topic modeling was used to calculate the subject distribution by date and to find the peak of the subject distribution and to detect the event. A total of 32 topics were extracted from the topic modeling, and the point of occurrence of the event was deduced by looking at the point at which each subject distribution surged. As a result, a total of 85 events were detected, but the final 16 events were filtered and presented using the Gaussian smoothing technique. We also calculated the relevance score between events detected to construct the event network. Using the cosine coefficient between the co-occurred events, we calculated the relevance between the events and connected the events to construct the event network. Finally, we set up the event network by setting each event to each vertex and the relevance score between events to the vertices connecting the vertices. The event network constructed in our methods helped us to sort out major events in the political and social fields in Korea that occurred in the last one year in chronological order and at the same time identify which events are related to certain events. Our approach differs from existing event detection methods in that LDA topic modeling makes it possible to easily analyze large amounts of data and to identify the relevance of events that were difficult to detect in existing event detection. We applied various text mining techniques and Word2vec technique in the text preprocessing to improve the accuracy of the extraction of proper nouns and synthetic nouns, which have been difficult in analyzing existing Korean texts, can be found. In this study, the detection and network configuration techniques of the event have the following advantages in practical application. First, LDA topic modeling, which is unsupervised learning, can easily analyze subject and topic words and distribution from huge amount of data. Also, by using the date information of the collected news articles, it is possible to express the distribution by topic in a time series. Second, we can find out the connection of events in the form of present and summarized form by calculating relevance score and constructing event network by using simultaneous occurrence of topics that are difficult to grasp in existing event detection. It can be seen from the fact that the inter-event relevance-based event network proposed in this study was actually constructed in order of occurrence time. It is also possible to identify what happened as a starting point for a series of events through the event network. The limitation of this study is that the characteristics of LDA topic modeling have different results according to the initial parameters and the number of subjects, and the subject and event name of the analysis result should be given by the subjective judgment of the researcher. Also, since each topic is assumed to be exclusive and independent, it does not take into account the relevance between themes. Subsequent studies need to calculate the relevance between events that are not covered in this study or those that belong to the same subject.

Three-Dimensional Limit Equilibrium Stability Analysis of Spile-Reinforced Shallow Tunnel

    • Geotechnical Engineering
    • /
    • v.13 no.3
    • /
    • pp.101-122
    • /
    • 1997
  • A spiting reinforcement system is composed of a series of radially installed reinforcing spites along the perimeter of the tunnel opening ahead of excavation. The reinforcing spill network is extended into the in-situ soil mass both radially and longitudinally The sailing reinforcement system has been successfully used for the construction of underground openings to reinforce weak rock formations on several occasions. The application of this spiting reinforcement system is currently extended to soft ground tunneling in limited occasions because of lack of reliable analysis and design methods. A method of threetimensional limit equilibrium stability analysis of the smile-reinforced shallow tunnel in soft ground is presented. The shape of the potential failure wedge for the case of smile-reinforced shallow tunnel is assumed on the basis of the results of three dimensional finite element analyses. A criterion to differentiate the spill-reinforced shallow tunnel from the smile-reinforced deep tunnel is also formulated, where the tunnel depth, soil type, geometry of the tunnel and reinforcing spites, together with soil arching effects, are considered. To examine the suitability of the proposed method of threedimensional stability analysis in practice, overall stability of the spill-reinforced shallow tunnel at facing is evaluated, and the predicted safety factors are compared with results from twotimensional analyses. Using the proposed method of threetimensional limit equilibrium stability analysis of the smile-reinforced shallow tunnel in soft ground, a parametric study is also made to investigate the effects of various design parameters such as tunnel depth, smile length and wadial spill spacing. With slight modifications the analytical method of threeiimensional stability analysis proposed may also be extended for the analysis and design of steel pipe reinforced multi -step grouting technique frequently used as a supplementary reinforcing method in soft ground tunnel construction.

  • PDF

Activation plan of social safety network of the aged living alone - Focused on the aged using wireless paging system in Gwangyang-si - (독거노인의 사회안전망에 대한 활성화 방안 - 광양시 무선페이징시스템 대상자 중심으로 -)

  • Lee, Jae-Min
    • The Korean Journal of Emergency Medical Services
    • /
    • v.13 no.3
    • /
    • pp.41-58
    • /
    • 2009
  • Objective : The purpose of this study is to identify actual operations and issues of wireless paging system operation for the aged living alone as the end users of wireless paging system primarily in Gwangyang city, and thereby to explore possible advanced and integrated ways to promote social safety network for the aged. Methods : The survey tool used in this study was a structured questionnaire form consisting of question items. The researcher hereof conducted this survey by means of direct visit and interview during two seasons, i.e. from February to August, 2008 and from December 2008 to March 2009, respectively. Results : 1) For general demographic characteristics, it was found that 90.9% of all respondents were women and 61.2% of all respondents were at age 75 to 84. for health conditions, it was found that more than 90% of all respondents often took medicines due to their unhealthy body, and most of respondents suffered from musculoskeletal diseases 79.3% and circulatory diseases 61.6%. for walking capacity, it was found that 45.5% of all respondents used walking aids, and disable respondents (11.5% of all respondents) were represented primarily by those with physical disability (52.6% of disable respondents). for actual use of medical institutions, it was found 47.3% of all respondents relied on local clinics, since they preferred neighborhood hospitals or clinics they can trust for medical care. for social activities and supports, it was found that 43.6% respondents had 'needs for assistance at times' and 33.9% respondents have 'no need for assistance'. And it was found that the major difficulties in living alone at old age were represented primarily by health problems 37.8% and economic difficulties 33.5%. 2) For characteristics related to wireless paging system, it was found that 90.3% respondents used wireless paging system recommended by firemen, and 28.5% respondents used this system. and it was found that 59.6% respondents used this system once, and 85.2% respondents used it because of acute or chronic diseases. more than 90% respondents thought that they knew about wireless paging system and considered themselves safe, but 83.6% respondents didn't attach a remote control on their upper clothes, and even 49.1% respondents turned off the power of wireless paging system due to their concern about electricity bill and noise. 3) It was found that 83.6% respondents felt it necessary to use wireless paging system, and wireless paging users felt more satisfied with using the system than non-users, and 50.7% showed high satisfaction at certain psychological benefits like 'confidence in coping with critical situations' and 'a sense of relief'. In addition, it was found that some respondents who answered that 'they didn't turn off the paging system as they knew how it works' and those who answered that they knew 'how to use it' showed relatively high satisfaction. And some respondents who kept it well and felt it necessary also showed high satisfaction. 4) It was found that the level of satisfaction our respondents felt with using wireless paging system varied significantly availability($x^{2}$ = 12.759, p = .002), psychological advantages($x^{2}$ = 12.174, p = .002), knowledge about how to use system($x^{2}$ = 7.021, p = .016), power on/off($x^{2}$ = 13.221, p = .001), level of knowledge about system($x^{2}$ = 21.002, p = .000), maintenance($x^{2}$ = 9.871, p = .007) and level of necessity($x^{2}$ = 34.939, p = .000) on the statistical basis.

  • PDF

A Study of Adaptation Process relating to Abused Children in Long-term Foster Care (피학대아동의 위탁가정 적응과정에 관한 연구)

  • Chang, Yoon-Young;Park, Tai-Young
    • Korean Journal of Social Welfare
    • /
    • v.58 no.1
    • /
    • pp.425-456
    • /
    • 2006
  • This study investigated the adaptation process of abused children in long-term foster care and the stages of adaptation process. Also, this study aimed to find the factors influencing the adaptation of abused children in long-term foster care and to examine the relationships between the adaptation process in long-term foster care and the recovery of aftereffect of the abused children. The researchers tried to find the factors influencing the possibilities about the return of their biological parents' home. The researchers used a purposeful sampling and interviewed three abused children and three parents in long-term foster care and two social workers. This study utilized grounded theory approach of Strauss and Corbin(1990) to analyze the interviewed data. Specifically, the researchers applied open coding, axial coding and selective coding from grounded theory approach to analyze the data. On the other hand, the researchers used Miles and Huberman(1994)'s time-ordered matrix and time-ordered network to investigate the categories influencing the adaptation process of abused children in long-term foster care. This study used interviewees, literatures, newspapers, and internet resources relating to abused children for triangulation of data. The researcher interviewed from October 15, 2004 to January 31, 2005. The total sessions of each person were consisted of two sessions for each person and the interview time of each session was one or two hours.

  • PDF