• 제목/요약/키워드: Social Computing

검색결과 486건 처리시간 0.023초

중소건설사를 위한 클라우드 컴퓨팅 기반 EHS 통합관리시스템 프레임워크 개발 (The Framework Development of Cloud Computing-based Integrated EHS Management System for Small and Medium Construction Companies)

  • 서광규
    • 대한안전경영과학회지
    • /
    • 제12권4호
    • /
    • pp.139-143
    • /
    • 2010
  • The small and medium construction companies are facing potential EHS(Environment, Health & Safety) of major accidents to cause casualties or a financial loss and increasing social responsibility. So, they have to voluntarily accomplish the EHS management system rather than passively with regard to EHS regulation. In this study, the framework of integrated EHS management system is developed based on cloud computing, and construction companies are to materialize self-regulation EHS process of construction workplace and to standardize the total EHS business process using the developed system. The proposed system also provides risk analysis, education/control and continuous improvement for EHS tasks and users can easily access the system on the web at a low price through cloud computing service. Eventually, the integrated system contributes to the managerial improvement by minimizing economic and physical loss caused by construction accidents.

A novel route restoring method upon geo-tagged photos

  • Wang, Guannan;Wang, Zhizhong;Zhu, Zhenmin;Wen, Saiping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권5호
    • /
    • pp.1236-1251
    • /
    • 2013
  • Sharing geo-tagged photos has been a hot social activity in the daily life because these photos not only contain geo information but also indicate people's hobbies, intention and mobility patterns. However, the present raw geo-tagged photo routes cannot provide information as enough as complete GPS trajectories due to the defects hidden in them. This paper mainly aims at analyzing the large amounts of geo-tagged photos and proposing a novel travel route restoring method. In our approach we first propose an Interest Measure Ratio to rank the hot spots based on density-based spatial clustering arithmetic. Then we apply the Hidden Semi-Markov model and Mean Value method to demonstrate migration discipline in the hot spots and restore the significant region sequence into complete GPS trajectory. At the end of the paper, a novel experiment method is designed to demonstrate that the approach is feasible in restoring route, and there is a good performance.

워크플로우 소셜 네트워크 근접중심성 분석 알고리즘 (A Closeness Centrality Analysis Algorithm for Workflow-supported Social Networks)

  • 박성주;김광훈
    • 인터넷정보학회논문지
    • /
    • 제14권5호
    • /
    • pp.77-85
    • /
    • 2013
  • 본 논문에서는 워크플로우 소셜 네트워크(WSSN, Workflow-supported Social Network) 근접중심성 분석 알고리즘을 제안한다. 워크플로우모델과 모델의 실행을 기반으로 형성되는 업무수행자들간의 협업 관계를 워크플로우 소셜 네트워크라고 정의하고, 이를 기존의 소셜 네트워크 근접중심성 분석기법을 적용하여 워크플로우 소셜 네트워크의 근접중심성을 분석하는 알고리즘을 설계한다. 특히, 제안한 알고리즘의 적용 사례를 통해 특정 워크플로우모델로부터 해당 워크플로우 소셜 네트워크 근접중심성을 분석함으로써 본 논문에서 제안한 알고리즘의 정확성 및 적합성을 검증한다.

사회적 컴퓨팅의 창조적 사용자 멘탈 모형에 대한 근거이론적 분석 (A grounded theory analysis of creative users' mental model in social computing)

  • 권희정;김진우
    • 한국HCI학회:학술대회논문집
    • /
    • 한국HCI학회 2007년도 학술대회 2부
    • /
    • pp.411-417
    • /
    • 2007
  • 디지털 매체의 사용자들의 사용 모형이 변화하고 있다. RSS, 태그(tag), Ajax, Open API 등 사용자 참여를 향상시키는 Web 2.0 기술을 포함하여 정보 기기 및 인터페이스의 발전은 사용자들의 매체사용에 대한 범위와 역할을 크게 향상시키고 있다. 이제 사용자는 더 이상 정보수용자의 입장이 아닌 정보제공자의 입장에서 매체에 접근하고 있다. 이와 같은 현상은 우리에게 두 가지 중요한 연구문제를 제시한다, 첫째, 사용자들은 기술변화를 어떻게 인지하고 있으며, 어떤 학습의 과정을 거치고 있는가? 혹은 어떤 어려움을 겪고 있는가? 둘째, 변화하는 기술에 따른 사용자들의 요구변화의 양상은 디지털매체를 통한 정보제공을 통하여 수익을 발생시키는 기업의 사용자와의 상호작용을 어떻게 변화하게 하고 있는가? 이와 같은 연구문제를 해결하기 위하여 창조적 사용자의 인지적 모형을 점검하고, 차세대 기술변화에 따른 사회적 컴퓨팅의 진화를 근거이론을 통하여 분석해 보고자 한다.

  • PDF

Profile-based Service Continuity Framework for N-Screen Service

  • Chung, Young-Sik;Paik, Eui-Hyun;Rhee, Woo-Seop
    • International Journal of Contents
    • /
    • 제8권1호
    • /
    • pp.47-54
    • /
    • 2012
  • The dynamic adaptation between various service environments using the application profiles for the service continuity is a key issue of the profile-based service continuity framework (PSCF) for N-screen service using next generation networks. PSCF offers an optimized service framework for providing continuous user services, which are multimedia video streaming, educational broadcasting, game, etc., using the various devices that are not restricted by the service environment of the user. This paper specifies the functional model of PSCF, service scenario and explains the experimental results of the service continuity for N-screen service using PSCF.

Study on the Relationship between Adolescents' Self-esteem and their Sociality -Focusing on the Moderating Effect of Gender -

  • Kim, Kyung-Sook;Lee, Duk-Nam
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권1호
    • /
    • pp.147-153
    • /
    • 2016
  • In this paper, we propose an efficient dynamic workload balancing strategy which improves the performance of high-performance computing system. The key idea of this dynamic workload balancing strategy is to minimize execution time of each job and to maximize the system throughput by effectively using system resource such as CPU, memory. Also, this strategy dynamically allocates job by considering demanded memory size of executing job and workload status of each node. If an overload node occurs due to allocated job, the proposed scheme migrates job, executing in overload nodes, to another free nodes and reduces the waiting time and execution time of job by balancing workload of each node. Through simulation, we show that the proposed dynamic workload balancing strategy based on CPU, memory improves the performance of high-performance computing system compared to previous strategies.

Sentiment Analysis Main Tasks and Applications: A Survey

  • Tedmori, Sara;Awajan, Arafat
    • Journal of Information Processing Systems
    • /
    • 제15권3호
    • /
    • pp.500-519
    • /
    • 2019
  • The blooming of social media has simulated interest in sentiment analysis. Sentiment analysis aims to determine from a specific piece of content the overall attitude of its author in relation to a specific item, product, brand, or service. In sentiment analysis, the focus is on the subjective sentences. Hence, in order to discover and extract the subjective information from a given text, researchers have applied various methods in computational linguistics, natural language processing, and text analysis. The aim of this paper is to provide an in-depth up-to-date study of the sentiment analysis algorithms in order to familiarize with other works done in the subject. The paper focuses on the main tasks and applications of sentiment analysis. State-of-the-art algorithms, methodologies and techniques have been categorized and summarized to facilitate future research in this field.

Towards efficient sharing of encrypted data in cloud-based mobile social network

  • Sun, Xin;Yao, Yiyang;Xia, Yingjie;Liu, Xuejiao;Chen, Jian;Wang, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권4호
    • /
    • pp.1892-1903
    • /
    • 2016
  • Mobile social network is becoming more and more popular with respect to the development and popularity of mobile devices and interpersonal sociality. As the amount of social data increases in a great deal and cloud computing techniques become developed, the architecture of mobile social network is evolved into cloud-based that mobile clients send data to the cloud and make data accessible from clients. The data in the cloud should be stored in a secure fashion to protect user privacy and restrict data sharing defined by users. Ciphertext-policy attribute-based encryption (CP-ABE) is currently considered to be a promising security solution for cloud-based mobile social network to encrypt the sensitive data. However, its ciphertext size and decryption time grow linearly with the attribute numbers in the access structure. In order to reduce the computing overhead held by the mobile devices, in this paper we propose a new Outsourcing decryption and Match-then-decrypt CP-ABE algorithm (OM-CP-ABE) which firstly outsources the computation-intensive bilinear pairing operations to a proxy, and secondly performs the decryption test on the attributes set matching access policy in ciphertexts. The experimental performance assessments show the security strength and efficiency of the proposed solution in terms of computation, communication, and storage. Also, our construction is proven to be replayable choosen-ciphertext attacks (RCCA) secure based on the decisional bilinear Diffie-Hellman (DBDH) assumption in the standard model.

Exploring Working Group's Psychological Subjectivity on Public Smart Work Services in a Cloud-based Social Networking

  • Kim, Ki Youn;Song, In Kuk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권12호
    • /
    • pp.4748-4762
    • /
    • 2020
  • Recently, the COVID 19 pandemic has affected on our daily lives and society in many ways. Specifically, it has brought rapid changes in the working environment from office working to smart telecommuting. In addition, cloud computing technology and services not only provided ubiquitous access, but also led to a sharing of information, internal-external communication channels, telework, and innovative smart work for the business process. As a result, smart work services based on social cloud networking have spread to the public sector. However, existing academic research examining smart work merely remains to focus on the theoretical conceptualization or to deal with merely several examples of private views. Best practices of smart work services based on cloud computing technology in the public field rarely exists. Moreover, many studies have been differently measured the values of smart work for private and public sectors depending on organizational singularities. Therefore, the study aims to define new theoretical implications and to explore future business strategies and policy directions based on a technical working group's personal psychological subjectivity. The research applied Q methodology, and selected five public organizations in Korea, that they have adopted or currently plan to adopt some part of smart work services.