• Title/Summary/Keyword: Topic network

Search Result 621, Processing Time 0.032 seconds

User Information Needs Analysis based on Search Terms Log of the Presidential Archives Portal (대통령기록포털 검색어 로그 분석 기반 이용자 정보요구 분석)

  • Suhyeon Lee;Hyo-Jung Oh
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.24 no.3
    • /
    • pp.23-44
    • /
    • 2024
  • In recent years, there has been a significant increase in the importance of curation services that analyze user information requests to provide tailored information within extensive information resources. This study aims to identify user information needs by analyzing search term logs from the Presidential Archives Portal to enhance the utilization value of presidential records, which possess high historical significance. In addition, by evaluating the portal's search performance, this study seeks to determine whether the Presidential Archives Portal is providing archival information services that meet users' information needs and to suggest areas for improvement through digital record curation services. To achieve these objectives, topic analysis and word network analysis were conducted based on search term logs spanning the past eight years. The search quality of the Presidential Archives Portal was evaluated from an accuracy perspective, focusing on areas with high user demand, and recommendations were drawn based on the results of the analysis. As a preliminary study for digital record curation of presidential records, this study is significant because it identifies specific user information needs and quantifies the search quality of archival portal sites to improve user satisfaction.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

Investigating Dynamic Mutation Process of Issues Using Unstructured Text Analysis (비정형 텍스트 분석을 활용한 이슈의 동적 변이과정 고찰)

  • Lim, Myungsu;Kim, Namgyu
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.1
    • /
    • pp.1-18
    • /
    • 2016
  • Owing to the extensive use of Web media and the development of the IT industry, a large amount of data has been generated, shared, and stored. Nowadays, various types of unstructured data such as image, sound, video, and text are distributed through Web media. Therefore, many attempts have been made in recent years to discover new value through an analysis of these unstructured data. Among these types of unstructured data, text is recognized as the most representative method for users to express and share their opinions on the Web. In this sense, demand for obtaining new insights through text analysis is steadily increasing. Accordingly, text mining is increasingly being used for different purposes in various fields. In particular, issue tracking is being widely studied not only in the academic world but also in industries because it can be used to extract various issues from text such as news, (SocialNetworkServices) to analyze the trends of these issues. Conventionally, issue tracking is used to identify major issues sustained over a long period of time through topic modeling and to analyze the detailed distribution of documents involved in each issue. However, because conventional issue tracking assumes that the content composing each issue does not change throughout the entire tracking period, it cannot represent the dynamic mutation process of detailed issues that can be created, merged, divided, and deleted between these periods. Moreover, because only keywords that appear consistently throughout the entire period can be derived as issue keywords, concrete issue keywords such as "nuclear test" and "separated families" may be concealed by more general issue keywords such as "North Korea" in an analysis over a long period of time. This implies that many meaningful but short-lived issues cannot be discovered by conventional issue tracking. Note that detailed keywords are preferable to general keywords because the former can be clues for providing actionable strategies. To overcome these limitations, we performed an independent analysis on the documents of each detailed period. We generated an issue flow diagram based on the similarity of each issue between two consecutive periods. The issue transition pattern among categories was analyzed by using the category information of each document. In this study, we then applied the proposed methodology to a real case of 53,739 news articles. We derived an issue flow diagram from the articles. We then proposed the following useful application scenarios for the issue flow diagram presented in the experiment section. First, we can identify an issue that actively appears during a certain period and promptly disappears in the next period. Second, the preceding and following issues of a particular issue can be easily discovered from the issue flow diagram. This implies that our methodology can be used to discover the association between inter-period issues. Finally, an interesting pattern of one-way and two-way transitions was discovered by analyzing the transition patterns of issues through category analysis. Thus, we discovered that a pair of mutually similar categories induces two-way transitions. In contrast, one-way transitions can be recognized as an indicator that issues in a certain category tend to be influenced by other issues in another category. For practical application of the proposed methodology, high-quality word and stop word dictionaries need to be constructed. In addition, not only the number of documents but also additional meta-information such as the read counts, written time, and comments of documents should be analyzed. A rigorous performance evaluation or validation of the proposed methodology should be performed in future works.

Analysis on Dynamics of Korea Startup Ecosystems Based on Topic Modeling (토픽 모델링을 활용한 한국의 창업생태계 트렌드 변화 분석)

  • Heeyoung Son;Myungjong Lee;Youngjo Byun
    • Knowledge Management Research
    • /
    • v.23 no.4
    • /
    • pp.315-338
    • /
    • 2022
  • In 1986, Korea established legal systems to support small and medium-sized start-ups, which becomes the main pillars of national development. The legal systems have stimulated start-up ecosystems to have more than 1 million new start-up companies founded every year during the past 30 years. To analyze the trend of Korea's start-up ecosystem, in this study, we collected 1.18 million news articles from 1991 to 2020. Then, we extracted news articles that have the keywords "start-up", "venture", and "start-up". We employed network analysis and topic modeling to analyze collected news articles. Our analysis can contribute to analyzing the government policy direction shown in the history of start-up support policy. Specifically, our analysis identifies the dynamic characteristics of government influenced by external environmental factors (e.g., society, economy, and culture). The results of our analysis suggest that the start-up ecosystems in Korea have changed and developed mainly by the government policies for corporation governance, industrial development planning, deregulation, and economic prosperity plan. Our frequency keyword analysis contributes to understanding entrepreneurial productivity attributed to activities among the networked components in industrial ecosystems. Our analyses and results provide practitioners and researchers with practical and academic implications that can help to establish dedicated support policies through forecast tasks of the economic environment surrounding the start-ups. Korean entrepreneurial productivity has been empowered by growing numbers of large companies in the mobile phone industry. The spectrum of large companies incorporates content startups, platform providers, online shopping malls, and youth-oriented start-ups. In addition, economic situational factors contribute to the growth of Korean entrepreneurial productivity the economic, which are related to the global expansions of the mobile industry, and government efforts to foster start-ups. Our research is methodologically implicative. We employ natural language processes for 30 years of media articles, which enables more rigorous analysis compared to the existing studies which only observe changes in government and policy based on a qualitative manner.

Methodology for Issue-related R&D Keywords Packaging Using Text Mining (텍스트 마이닝 기반의 이슈 관련 R&D 키워드 패키징 방법론)

  • Hyun, Yoonjin;Shun, William Wong Xiu;Kim, Namgyu
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.57-66
    • /
    • 2015
  • Considerable research efforts are being directed towards analyzing unstructured data such as text files and log files using commercial and noncommercial analytical tools. In particular, researchers are trying to extract meaningful knowledge through text mining in not only business but also many other areas such as politics, economics, and cultural studies. For instance, several studies have examined national pending issues by analyzing large volumes of text on various social issues. However, it is difficult to provide successful information services that can identify R&D documents on specific national pending issues. While users may specify certain keywords relating to national pending issues, they usually fail to retrieve appropriate R&D information primarily due to discrepancies between these terms and the corresponding terms actually used in the R&D documents. Thus, we need an intermediate logic to overcome these discrepancies, also to identify and package appropriate R&D information on specific national pending issues. To address this requirement, three methodologies are proposed in this study-a hybrid methodology for extracting and integrating keywords pertaining to national pending issues, a methodology for packaging R&D information that corresponds to national pending issues, and a methodology for constructing an associative issue network based on relevant R&D information. Data analysis techniques such as text mining, social network analysis, and association rules mining are utilized for establishing these methodologies. As the experiment result, the keyword enhancement rate by the proposed integration methodology reveals to be about 42.8%. For the second objective, three key analyses were conducted and a number of association rules between national pending issue keywords and R&D keywords were derived. The experiment regarding to the third objective, which is issue clustering based on R&D keywords is still in progress and expected to give tangible results in the future.

Personal Information Overload and User Resistance in the Big Data Age (빅데이터 시대의 개인정보 과잉이 사용자 저항에 미치는 영향)

  • Lee, Hwansoo;Lim, Dongwon;Zo, Hangjung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.125-139
    • /
    • 2013
  • Big data refers to the data that cannot be processes with conventional contemporary data technologies. As smart devices and social network services produces vast amount of data, big data attracts much attention from researchers. There are strong demands form governments and industries for bib data as it can create new values by drawing business insights from data. Since various new technologies to process big data introduced, academic communities also show much interest to the big data domain. A notable advance related to the big data technology has been in various fields. Big data technology makes it possible to access, collect, and save individual's personal data. These technologies enable the analysis of huge amounts of data with lower cost and less time, which is impossible to achieve with traditional methods. It even detects personal information that people do not want to open. Therefore, people using information technology such as the Internet or online services have some level of privacy concerns, and such feelings can hinder continued use of information systems. For example, SNS offers various benefits, but users are sometimes highly exposed to privacy intrusions because they write too much personal information on it. Even though users post their personal information on the Internet by themselves, the data sometimes is not under control of the users. Once the private data is posed on the Internet, it can be transferred to anywhere by a few clicks, and can be abused to create fake identity. In this way, privacy intrusion happens. This study aims to investigate how perceived personal information overload in SNS affects user's risk perception and information privacy concerns. Also, it examines the relationship between the concerns and user resistance behavior. A survey approach and structural equation modeling method are employed for data collection and analysis. This study contributes meaningful insights for academic researchers and policy makers who are planning to develop guidelines for privacy protection. The study shows that information overload on the social network services can bring the significant increase of users' perceived level of privacy risks. In turn, the perceived privacy risks leads to the increased level of privacy concerns. IF privacy concerns increase, it can affect users to from a negative or resistant attitude toward system use. The resistance attitude may lead users to discontinue the use of social network services. Furthermore, information overload is mediated by perceived risks to affect privacy concerns rather than has direct influence on perceived risk. It implies that resistance to the system use can be diminished by reducing perceived risks of users. Given that users' resistant behavior become salient when they have high privacy concerns, the measures to alleviate users' privacy concerns should be conceived. This study makes academic contribution of integrating traditional information overload theory and user resistance theory to investigate perceived privacy concerns in current IS contexts. There is little big data research which examined the technology with empirical and behavioral approach, as the research topic has just emerged. It also makes practical contributions. Information overload connects to the increased level of perceived privacy risks, and discontinued use of the information system. To keep users from departing the system, organizations should develop a system in which private data is controlled and managed with ease. This study suggests that actions to lower the level of perceived risks and privacy concerns should be taken for information systems continuance.

Understanding and Use of Emergency Medical Service System by Health Educator (보건교사의 응급의료체계 인식과 활용 실태)

  • Choi, Uk-Jin
    • The Korean Journal of Emergency Medical Services
    • /
    • v.12 no.2
    • /
    • pp.59-69
    • /
    • 2008
  • Purpose : This study aims to provide basic data to establish an effective emergency medical service system by analyzing health educator' understanding and use of emergency medical service system at schools. Method : 93 questionnaires from 200 elementary, middle and high school nurses in the city D were collected from May 26 to July 7, 2008 and ${\chi}^2$ analysis and frequency analysis were carried out with SPSS win PC 14.0. Results : 1. As for emergency contact points, 3(3.30%) answers 'they do not have any knowledge', 40(43.96%) said 'they have some idea' and 48(52.75%) said 'they do know about it'. Among 24 respondents who have less than five years of working experience, 2(8.33%), 16(66.67%) and 6(25.00%) answered 'have no knowledge', 'a little knowledge' and 'clear knowledge on it' respectively. As for 9 who have 6-10 years of career, 1(12.50%), 4(50.00%) and 3(37.50%) answered 'have no knowledge', 'a little knowledge' and 'clear knowledge on it' respectively. Among 32 respondents who have 11~20 years, there were no respondents with no knowledge on the given question, and 9(29.03%) said they have some understanding and 22(70.97%) answered they have clear understanding on the topic. From this result, it can be said that there is statistically meaningful differences among different working year groups with ${\chi}^2=16.583$ and p= .010. 2. As for 119 emergency contact in the given district, 24(29.63%), 30(37.04%) and 27 (33.33%) answered 'do not know', 'know' and 'know very well' respectively. As for the question to ask whether they know Emergency Medical Information Center 1339, 66(70.97%) answered 'Yes' and 27(29.03%) answered 'No'. When it comes to emergency contact numbers and list of hospitals, 59(63.44%) said 'they have some list', 20(21.51%) answered 'they have well established contact network' and 14(15.05%) said 'they have none'. 3. As for the use of 119 service at the time of emergency at schools, 59(63.44%), said 'Yes' and 12(12.90%) answered 'No'. Among those who said 'yes', 29(31.18%), 24(25.81%) and 5(5.38%) answered they have used the service 1-2, 3-5 and 6-10 times respectively. Conclusion : In order to ensure health educator to effectively deal with emergency situations at schools, there should be special activities to enhance health educator' understanding on 119 and Emergency Medical Information Center 1339 and at the same time, a system should be established to connect schools, 119 in a given district, hospitals and Emergency Medical Information Center 1339.

  • PDF

Recent Studies of the Effects of Herbal Medicines on Angiogenesis (한약물을 이용한 혈관신생 촉진에 대한 최근의 연구동향)

  • Lee, Song-shil;Kang, Jung-won;Back, Yong-hyeon;Choi, Do-young;Park, Dong-seok;Kim, Deog-yoon;Kim, Kang-il;Park, Sang-do;Yang, Ha-ru;Ji, Mi-young;Lee, Jae-dong
    • Journal of Acupuncture Research
    • /
    • v.21 no.3
    • /
    • pp.283-302
    • /
    • 2004
  • Background : Angiogenesis is the proliferation of a network of blood vessels emanating from pre-existing vessels, supplying nutrients and oxygen and removing waste products. Angiogenesis occurs in a variety of normal physiologic and pathologic conditions and is regulated by a balance of stimulatory and inhibitory angiogenic factors. Excessive angiogenesis should be suppressed. However, if blood supply is insufficient, it should be encouraged. Hyul-Mek(血脈) or Hyul-Rark(血絡), known as blood vessels in western medicine, is deeply related to Chung-Ki-Hyul(精 氣 血). The goal of this study is to review the effects of herbal medicines on angiogenesis that is involved in wound healing and enhancement of blood supply. Methods : We conducted a systematic and comprehensive literature search for the identification, retrieval, and bibliographic management of independent studies to locate information on the topic. A computerized search of the published literature of Korea(KISS, RISS), China(CNKI), Japan(Kampo medicine, etc), and western countries(MEDLINE) was performed, and further supplemented with manual searches of print sources(1999 to 2003). Results : The herbal medicines with angiogenic activity were mainly found among herbs that carry replenish Shin-Cheng(補腎益精), foster Eum and improve the circulation of blood(養陰活血), or warm and circulate Kyung-Rark(溫經通絡). In particular, herbs with improve the circulation of blood and clear blood(活血化瘀) activity contain a significant amount of tannin, saponin, and pyrazine. Conclusion : Replenish Ki-Hyul(補氣血) and circulate Kyung-Rark(通經絡) could contribute to the induction of angiogenesis because various growth factors and proliferation, differentiation, and migration of vascular endothelial cells are involved in angiogenic activity.

  • PDF

Real-Time Traffic Information and Road Sign Recognitions of Circumstance on Expressway for Vehicles in C-ITS Environments (C-ITS 환경에서 차량의 고속도로 주행 시 주변 환경 인지를 위한 실시간 교통정보 및 안내 표지판 인식)

  • Im, Changjae;Kim, Daewon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.1
    • /
    • pp.55-69
    • /
    • 2017
  • Recently, the IoT (Internet of Things) environment is being developed rapidly through network which is linked to intellectual objects. Through the IoT, it is possible for human to intercommunicate with objects and objects to objects. Also, the IoT provides artificial intelligent service mixed with knowledge of situational awareness. One of the industries based on the IoT is a car industry. Nowadays, a self-driving vehicle which is not only fuel-efficient, smooth for traffic, but also puts top priority on eventual safety for humans became the most important conversation topic. Since several years ago, a research on the recognition of the surrounding environment for self-driving vehicles using sensors, lidar, camera, and radar techniques has been progressed actively. Currently, based on the WAVE (Wireless Access in Vehicular Environment), the research is being boosted by forming networking between vehicles, vehicle and infrastructures. In this paper, a research on the recognition of a traffic signs on highway was processed as a part of the awareness of the surrounding environment for self-driving vehicles. Through the traffic signs which have features of fixed standard and installation location, we provided a learning theory and a corresponding results of experiment about the way that a vehicle is aware of traffic signs and additional informations on it.

Design and Implementation of a Power-Saving Management System using Intelligent Scheduler based on RFID/USN Technology (RFID/USN 기술 기반의 지능형 스케줄러를 이용한 절전관리 시스템 설계 및 구현)

  • Jeong, Kyu-Seuck;Choi, Sung-Chul;Jeong, Woo-Jeong;Kim, Tae-Ho;Kim, Jong-Heon;Seo, Dong-Min;Park, Yong-Hun;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.64-76
    • /
    • 2009
  • Recently, the ubiquitous environment and the practical technology associated with it become more popular topic along with the rapid development of wireless technologies. The necessity of the automated system based on the ubiquitous environment has been increasing when the concept of the ubiquitous is integrated into the fields of existing IT. Also, the necessity of formulating a power-saving plan on large buildings and public institutions is gathering strength because of a raise in exchange rates and high oil prices. In this paper, to efficiently manage the power consumption of the electronic machine such as electric lights, electric heaters, and air conditioners in a building, power-saving manage- ment system using RFID/USN technologies is proposed. Proposed system controls the electric machine and monitor it's condition by RFID and collects the real time information about the surrounding and the power consumption of the electric machine by USN. Especially, proposed system analyzes the real time information and supports the intelligent scheduler with the best power-saving. Finally, this paper shows the difference between proposed system and existing system and establishes thereality of our system through experiments in variety environments.