• Title/Summary/Keyword: Support Features

Search Result 1,568, Processing Time 0.032 seconds

Evaluation of Search Functions of the Standard Records Management Systems (표준 기록관리시스템 검색 기능 평가)

  • Lee, Kyung Nam
    • The Korean Journal of Archival Studies
    • /
    • no.37
    • /
    • pp.273-305
    • /
    • 2013
  • In order to actively use of records and information in current digital record management systems, we have to check whether a system is designed to fully support the user of records and whether the good use of the system is being. This study analyzed the status of the use of the search function of Records Management System(RMS) for public agencies, and evaluated them. In order to investigate the status of the use of the search function, it surveyed records managers of public agencies using the RMS. The result showed that records managers unsatisfied with the usability and the search performance of the RMS. To evaluate the search function, it identified the functional requirement of the system and develops a checklist that can be used for evaluation. Two assessments were conducted. Firstly, as pre-evaluation, it assessed the degree of implementation of the current RMS according to the checklist as an inspection chart using document examination method. Secondly, it assessed the degree of implementation using a survey of records managers of public agencies that use the RMS. Assessment results show the improvement of the basic features that are essential to the system is required. In particular, the search function is required to improve user-friendliness for the user. For the advance of RMS, this study discusses the necessity for improvement of the search functions, the build of continuous maintenance and management system, and the user education.

U.S. Commercial Remote Sensing Regulatory Reform Policy (미국의 상업적 원격탐사활동에 대한 규제개혁 정책)

  • Kwon, Heeseok;Lee, Jinho;Lee, Eunjung
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.2
    • /
    • pp.241-250
    • /
    • 2019
  • The current U.S. remote sensing act was made in 1992 and has been criticized for being outdated and inappropriate in view of the modern technological development. In order to enhance the American competitiveness and leadership in the world, President Trump announced Space Policy Directive (SPD) - 2 on May 24, which is designed to modernize the regulations related to commercial space activities including private remote sensing system operations. It should be noted that the regulatory reform efforts are made within broader terms of the National Security Strategy on Dec. 17, 2017, pursuing the enhancement of national security and economic prosperity as well. A legislative support in Congress has also been added to the Administration's efforts. The proposed regulatory reform on the licensing of commercial remote sensing system operations outlines the features of lessening administrative burden on applicants by simplifying the overall application process and of limiting the operations only when there is an impact upon the national security with clear and convincing evidence. But, due to a different regulatory system of each country, such a movement to expand an individual's freedom to explore and utilize outer space may result in an international dispute or a violation of international obligations, so there should be a merit in paying attention to the U.S. commercial remote sensing regulatory reform, and it is desirable to establish international norms as flexible and appropriate to the level of space technology and space industry.

A Theoretical Study on the Coevolution Strategy of University Innovation Ecosystems (대학 혁신생태계의 공진화 전략에 대한 이론적 고찰)

  • Park, Sang-Kyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.12
    • /
    • pp.268-277
    • /
    • 2020
  • This study emphasizes that the survival strategy of universities should be a co-evolution strategy based on ecological thinking. Therefore, the purpose of the research is to present a theoretical framework for dividing the university innovation ecosystem into four stages and building a co-evolution strategy for each step, as universities play a prominent role in regional innovation ecosystems. Thus, our research method focused on literature research, and the theoretical framework for the university innovation ecosystem used Moore's Enterprise Ecosystem Model (1996). The university's ecological innovation strategy is divided into four stages of development, and a step-by-step co-evolution strategy is presented. Findings are summarized as follows. The pioneering stage involves the creation of values of the university-led innovation ecosystem. The expansion stage focuses on the establishment of critical mass. The authority stage covers maintaining authority and bargaining power. The renewal stage features continuous performance improvement. In particular, this theoretical model of the university-regional innovation ecosystem is meaningful in that it provides a theoretical basis for enhancing the effectiveness of government financial support projects, and for individual universities, it provides a framework for strategies suitable for their ecosystem building process.

A Study on the Method for Managing Hazard Factors to Support Operation of Automated Driving Vehicles on Road Infrastructure (자율주행시스템 운행지원을 위한 도로 인프라 측면의 위험 요소 관리 방안)

  • Kim, Kyuok;Choi, Jung Min;Cho, Sun A
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.2
    • /
    • pp.62-73
    • /
    • 2022
  • As the competition among the autonomous vehicle (AV, here after) developers are getting fierce, Korean government has been supporting developers by deregulating safety standards and providing financial subsidies. Recently, some OEMs announced their plans to market Lv3 and Lv4 automated driving systems. However, these market changes raised concern among public road management sectors for monitoring road conditions and alleviating hazardous conditions for AVs and human drivers. In this regards, the authors proposed a methodology for monitoring road infrastructure to identify hazardous factors for AVs and categorizing the hazards based on their level of impact. To evaluate the degrees of the harm on AVs, the authors suggested a methodology for managing road hazard factors based on vehicle performance features including vehicle body, sensors, and algorithms. Furthermore, they proposed a method providing AVs and road management authorities with potential risk information on road by delivering them on the monitoring map with node and link structure.

Sentiment Analysis of Product Reviews to Identify Deceptive Rating Information in Social Media: A SentiDeceptive Approach

  • Marwat, M. Irfan;Khan, Javed Ali;Alshehri, Dr. Mohammad Dahman;Ali, Muhammad Asghar;Hizbullah;Ali, Haider;Assam, Muhammad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.830-860
    • /
    • 2022
  • [Introduction] Nowadays, many companies are shifting their businesses online due to the growing trend among customers to buy and shop online, as people prefer online purchasing products. [Problem] Users share a vast amount of information about products, making it difficult and challenging for the end-users to make certain decisions. [Motivation] Therefore, we need a mechanism to automatically analyze end-user opinions, thoughts, or feelings in the social media platform about the products that might be useful for the customers to make or change their decisions about buying or purchasing specific products. [Proposed Solution] For this purpose, we proposed an automated SentiDecpective approach, which classifies end-user reviews into negative, positive, and neutral sentiments and identifies deceptive crowd-users rating information in the social media platform to help the user in decision-making. [Methodology] For this purpose, we first collected 11781 end-users comments from the Amazon store and Flipkart web application covering distant products, such as watches, mobile, shoes, clothes, and perfumes. Next, we develop a coding guideline used as a base for the comments annotation process. We then applied the content analysis approach and existing VADER library to annotate the end-user comments in the data set with the identified codes, which results in a labelled data set used as an input to the machine learning classifiers. Finally, we applied the sentiment analysis approach to identify the end-users opinions and overcome the deceptive rating information in the social media platforms by first preprocessing the input data to remove the irrelevant (stop words, special characters, etc.) data from the dataset, employing two standard resampling approaches to balance the data set, i-e, oversampling, and under-sampling, extract different features (TF-IDF and BOW) from the textual data in the data set and then train & test the machine learning algorithms by applying a standard cross-validation approach (KFold and Shuffle Split). [Results/Outcomes] Furthermore, to support our research study, we developed an automated tool that automatically analyzes each customer feedback and displays the collective sentiments of customers about a specific product with the help of a graph, which helps customers to make certain decisions. In a nutshell, our proposed sentiments approach produces good results when identifying the customer sentiments from the online user feedbacks, i-e, obtained an average 94.01% precision, 93.69% recall, and 93.81% F-measure value for classifying positive sentiments.

The Usage of Modern Information Technologies for Conducting Effective Monitoring of Quality in Higher Education

  • Oseredchuk, Olga;Nikolenko, Lyudmyla;Dolynnyi, Serhii;Ordatii, Nataliia;Sytnik, Tetiana;Stratan-Artyshkova, Tatiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.113-120
    • /
    • 2022
  • Information technologies in higher education are the basis for solving the tasks set by monitoring the quality of higher education. The directions of aplying information technologies which are used the most nowadays have been listed. The issues that should be addressed by monitoring the quality of higher education with the use of information technology have been listed. The functional basis for building a monitoring system is the cyclical stages: Observation; Orientation; Decision; Action. The monitoring system's considered cyclicity ensures that the concept of independent functioning of the monitoring system's subsystems is implemented.. It also ensures real-time task execution and information availability for all levels of the system's hierarchy of vertical and horizontal links, with the ability to restrict access. The educational branch uses information and computer technologies to monitor research results, which are realized in: scientific, reference, and educational output; electronic resources; state standards of education; analytical materials; materials for state reports; expert inferences on current issues of education and science; normative legal documents; state and sectoral programs; conference recommendations; informational, bibliographic, abstract, review publications; digests. The quality of Ukrainian scientists' scientific work is measured using a variety of bibliographic markers. The most common is the citation index. In order to carry out high-quality systematization of information and computer monitoring technologies, the classification has been carried out on the basis of certain features: (processual support for implementation by publishing, distributing and using the results of research work). The advantages and disadvantages of using web-based resources and services as information technology tools have been discussed. A set of indicators disclosed in the article evaluates the effectiveness of any means or method of observation and control over the object of monitoring. The use of information technology for monitoring and evaluating higher education is feasible and widespread in Ukrainian education, and it encourages the adoption of e-learning. The functional elements that stand out in the information-analytical monitoring system have been disclosed.

Metagenome-Assembled Genomes of Komagataeibacter from Kombucha Exposed to Mars-Like Conditions Reveal the Secrets in Tolerating Extraterrestrial Stresses

  • Lee, Imchang;Podolich, Olga;Brenig, Bertram;Tiwari, Sandeep;Azevedo, Vasco;de Carvalho, Daniel Santana;Uetanabaro, Ana Paula Trovatti;Goes-Neto, Aristoteles;Alzahrani, Khalid J.;Reva, Oleg;Kozyrovska, Natalia;de Vera, Jean-Pierre;Barh, Debmalya;Kim, Bong-Soo
    • Journal of Microbiology and Biotechnology
    • /
    • v.32 no.8
    • /
    • pp.967-975
    • /
    • 2022
  • Kombucha mutualistic community (KMC) is composed by acetic acid bacteria and yeasts, producing fermented tea with health benefits. As part of the BIOlogy and Mars EXperiment (BIOMEX) project, the effect of Mars-like conditions on the KMC was analyzed. Here, we analyzed metagenome-assembled genomes (MAGs) of the Komagataeibacter, which is a predominant genus in KMC, to understand their roles in the KMC after exposure to Mars-like conditions (outside the International Space Station) based on functional genetic elements. We constructed three MAGs: K. hansenii, K. rhaeticus, and K. oboediens. Our results showed that (i) K. oboediens MAG functionally more complex than K. hansenii, (ii) K. hansenii is a keystone in KMCs with specific functional features to tolerate extreme stress, and (iii) genes related to the PPDK, betaine biosynthesis, polyamines biosynthesis, sulfate-sulfur assimilation pathway as well as type II toxin-antitoxin (TA) system, quorum sensing (QS) system, and cellulose production could play important roles in the resilience of KMC after exposure to Mars-like stress. Our findings show the potential mechanisms through which Komagataeibacter tolerates the extraterrestrial stress and will help to understand minimal microbial composition of KMC for space travelers.

Evaluation of the Geological Heritages in Ulsan Area, Korea (울산 지역 지질유산의 가치평가)

  • Sujin Ha;Yong-Un Chae;Hee-Cheol Kang;Hyoun Soo Lim
    • Journal of the Korean earth science society
    • /
    • v.43 no.6
    • /
    • pp.749-761
    • /
    • 2022
  • As the number of National and UNESCO Global Geoparks has increased, awareness of geological heritage and local government interests have also increased. In this study, data from the geological heritage sites in the Ulsan area were summarized, a practical use plan for geological heritage was prepared based on the assessment results, and the expected effects were also presented. The value for 33 of 112 geological heritage sites identified through literature surveys was evaluated. In terms of the geological heritage types in Ulsan, there were two geological, one geomorphological, and thirty mixed-heritage sites. In the context of the geological heritage of Ulsan, rivers and coastal topography were found to be dominant, and various geomorphological and geological features, such as fossils, folds, faults, shear zones, minerals, and ore deposits are included. Based on the assessment results, there were three, eighteen, nine, and three sites in Classes I, II, III, and IV, respectively. Considering the intrinsic and subsidiary values of geological heritage, the Gangdong Coast, Jujeon Coast, Taehwagang area, Daewangam area, the Daegokri-Cheonjeonri track sites, and Mujechineup are likely to be listed as potential geosites. When the endorsement of the geopark has been promoted alongside these geosites, it can contribute to the sustainable preservation and maintenance of the geosites, satisfy the demand for science education through geo-education, and support the sustainable development of the local economy following the detailed standards for geopark certification in the Natural Parks Act. This is expected to increase the brand value of Ulsan Metropolitan City.

3D Film Image Inspection Based on the Width of Optimized Height of Histogram (히스토그램의 최적 높이의 폭에 기반한 3차원 필름 영상 검사)

  • Jae-Eun Lee;Jong-Nam Kim
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.2
    • /
    • pp.107-114
    • /
    • 2022
  • In order to classify 3D film images as right or wrong, it is necessary to detect the pattern in a 3D film image. However, if the contrast of the pixels in the 3D film image is low, it is not easy to classify as the right and wrong 3D film images because the pattern in the image might not be clear. In this paper, we propose a method of classifying 3D film images as right or wrong by comparing the width at a specific frequency of each histogram after obtaining the histogram. Since, it is classified using the width of the histogram, the analysis process is not complicated. From the experiment, the histograms of right and wrong 3D film images were distinctly different, and the proposed algorithm reflects these features, and showed that all 3D film images were accurately classified at a specific frequency of the histogram. The performance of the proposed algorithm was verified to be the best through the comparison test with the other methods such as image subtraction, otsu thresholding, canny edge detection, morphological geodesic active contour, and support vector machines, and it was shown that excellent classification accuracy could be obtained without detecting the patterns in 3D film images.

AI Security Plan for Public Safety Network App Store (재난안전통신망 앱스토어를 위한 AI 보안 방안 마련)

  • Jung, Jae-eun;Ahn, Jung-hyun;Baik, Nam-kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.458-460
    • /
    • 2021
  • The provision and application of public safety network in Korea is still insufficient for security response to the mobile app of public safety network in the stages of development, initial construction, demonstration, and initial service. The available terminals on the Disaster Safety Network (PS-LTE) are open, Android-based, dedicated terminals that potentially have vulnerabilities that can be used for a variety of mobile malware, requiring preemptive responses similar to FirstNet Certified in U.S and Google's Google Play Protect. In this paper, before listing the application service app on the public safety network mobile app store, we construct a data set for malicious and normal apps, extract features, select the most effective AI model, perform static and dynamic analysis, and analyze Based on the result, if it is not a malicious app, it is suggested to list it in the App Store. As it becomes essential to provide a service that blocks malicious behavior app listing in advance, it is essential to provide authorized authentication to minimize the security blind spot of the public safety network, and to provide certified apps for disaster safety and application service support. The safety of the public safety network can be secured.

  • PDF