• Title/Summary/Keyword: Web data

Search Result 5,605, Processing Time 0.041 seconds

A Study on the Institutional Improvements in the Operation and Management of Underground Shopping Malls

  • KIM, Gi-Pyoung;SEO, Jung Hwa;LEE, Yong-Kyu;LEE, Geun-Woo;YOO, Chang-Kwon
    • The Journal of Economics, Marketing and Management
    • /
    • v.10 no.1
    • /
    • pp.15-26
    • /
    • 2022
  • Purpose: The purpose of this study is to analyze the method of calculating the usage fee, rent, and lease rights of public goods necessary for the operation and management of the underground shopping mall, and to suggest systematic improvement points for the operation of the underground shopping mall. Data and Methodology: First, ordinances and regulations related to common property were investigated. Second, previous studies were analyzed. A survey was conducted with five questions that conflict with the interests of underground shopping mall merchants among the ordinances and operating systems related to the current underground shopping malls' common property. Results: Underpass merchants wanted monthly payment for the use of common property, and merchant organizations wanted to limit the increase rate with the right to use. They asked for the property value due to donation to be excluded from the loan fee, they wanted to revise the Common Property Act on the transfer of lease rights, and they wanted to revise the loan contract renewal period. Conclusion: There is a need to improve the laws and systems for underground shopping malls, and it will have to be negotiated according to the opinions of the merchants gathered among them, and it will have to be implemented in stages in the long term.

An Evaluation of Academic Institutional Repositories in Ghana

  • Kumah, Mariyama Abdulai;Filson, Christopher Kwame
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.12 no.1
    • /
    • pp.67-83
    • /
    • 2022
  • This study aims to evaluate some academic institutional repositories (IRs) in Ghana. Data were collected using observation and interview methods by examining the various websites of seven (7) selected academic institutional repositories in Ghana. The findings revealed that the University of Ghana, Legon, leads records count of the seven Institutional Repository (IRs) examined. Dspace was the prioritized software for managing and preserving the digital contents of these IRs. Theses, dissertations and research articles were the leading contents deposited on the IRs. The majority of the IRs have incorporated RSS (Rich Site Summary or Really Simple Syndication) feeds on their IRs with few using other Web 2.0 features. English was the only interface language used on all the IRs. From the interview, the findings revealed that most of the faculty members did not use the IR very often and 9(42.9) also indicated that, they have never deposited their materials on the IR. Faculty members again indicated that, inadequate ICT connectivity and infrastructure, unreliable power supply, Copyrights and intellectual rights, financial constrain, inadequate advocacy and training on the importance of IRs to faculty and users were the major challenges of academic libraries in operating IRs in Ghana.

Interactive Map-based Spatio-Temporal Visualization of Typhoon Situation using Web News BigData (웹 뉴스 빅데이터를 이용한 태풍 상황정보의 인터렉티브 지도 기반 시공간 시각화 방안)

  • Lee, Jiae;Kim, Junchul
    • Annual Conference of KIPS
    • /
    • 2020.11a
    • /
    • pp.773-776
    • /
    • 2020
  • 웹 뉴스 기사는 태풍과 같은 재해 발생상황에 대한 신속하고 정확한 정보를 포함하고 있다. 예를 들어, 태풍의 발생시점, 이동·예측경로, 피해·사고 현황 등 유용한 정보를 텍스트, 이미지, 동영상의 형태로 관련 상황정보를 전달한다. 그러나 대부분의 재해재난 관련 뉴스 기사는 특정 시점의 정보만을 웹페이지 형태로 제공하므로, 시계열 측면의 연결성을 지니는 기사들에 대한 정보를 전달하기 어렵다. 또한 시간적 변화에 따라 기사 내용에 포함된 장소, 지역, 건물 등의 지명에 대한 공간적 정보를 지도와 연계하여 정보를 전달하는데 한계가 있어, 시공간적 변화에 따른 특정 재해재난 상황정보에 대한 전체적인 현황파악이 어렵다. 따라서, 본 논문에서는 데이터 시각화 측면에서 이러한 한계를 극복하기 위해, 1) 웹크롤링을 통해 구축된 뉴스 빅데이터를 자연어 처리를 통해 태풍과 관련된 뉴스 기사들을 추출하였고, 2) 시공간적 관련 정보를 지식그래프로 구축하였고, 이를 통해 최근 발생한 태풍 사건들과 관련된 뉴스 정보를 시계열 특성을 고려하여 3) 인터렉티브 지도 기반의 태풍 상황정보를 시각화하는 방안을 연구하였다.

Practical Requirements and Verification Management for Requirements-based Development Process in Space Launch Vehicle Development Project (요구조건 기준의 개발 수행을 위한 우주발사체 개발사업의 실제적인 요구조건-검증 관리 체계)

  • Dong Hyun Cho;Jun Hyouk Jang;Il Sang Yoo
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.19 no.1
    • /
    • pp.56-63
    • /
    • 2023
  • For the success of system development, it is necessary to systematically manage the requirements that are the basis of system development and its verification results. In order to follow the principles of SE(Systems Engineering)-based V&V(Verification&Validation) process, requirements can be managed by securing the requirements and their establishments, design compliances, and verification compliances according to the system development lifecycle. Especially, in a large-complex system research and development project, such as a space launch vehicle development project, many participants establish, verify, and validate numerous requirements together during the project. Therefore, logical and systematic requirements management, including guarantee of data integrity, change history, and traceability, is very important for multiple participants to utilize numerous requirements together without errors. This paper introduces the practical requirements and verification management for the requirements-based development process in the space launch vehicle development project.

A Source Code Cross-site Scripting Vulnerability Detection Method

  • Mu Chen;Lu Chen;Zhipeng Shao;Zaojian Dai;Nige Li;Xingjie Huang;Qian Dang;Xinjian Zhao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1689-1705
    • /
    • 2023
  • To deal with the potential XSS vulnerabilities in the source code of the power communication network, an XSS vulnerability detection method combining the static analysis method with the dynamic testing method is proposed. The static analysis method aims to analyze the structure and content of the source code. We construct a set of feature expressions to match malignant content and set a "variable conversion" method to analyze the data flow of the code that implements interactive functions. The static analysis method explores the vulnerabilities existing in the source code structure and code content. Dynamic testing aims to simulate network attacks to reflect whether there are vulnerabilities in web pages. We construct many attack vectors and implemented the test in the Selenium tool. Due to the combination of the two analysis methods, XSS vulnerability discovery research could be conducted from two aspects: "white-box testing" and "black-box testing". Tests show that this method can effectively detect XSS vulnerabilities in the source code of the power communication network.

The Importance of Ethical Hacking Tools and Techniques in Software Development Life Cycle

  • Syed Zain ul Hassan;Saleem Zubair Ahmad
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.169-175
    • /
    • 2023
  • Ethical hackers are using different tools and techniques to encounter malicious cyber-attacks generated by bad hackers. During the software development process, development teams typically bypass or ignore the security parameters of the software. Whereas, with the advent of online web-based software, security is an essential part of the software development process for implementing secure software. Security features cannot be added as additional at the end of the software deployment process, but they need to be paid attention throughout the SDLC. In that view, this paper presents a new, Ethical Hacking - Software Development Life Cycle (EH-SDLC) introducing ethical hacking processes and phases to be followed during the SDLC. Adopting these techniques in SDLC ensures that consumers find the end-product safe, secure and stable. Having a team of penetration testers as part of the SDLC process will help you avoid incurring unnecessary costs that come up after the data breach. This research work aims to discuss different operating systems and tools in order to facilitate the secure execution of the penetration tests during SDLC. Thus, it helps to improve the confidentiality, integrity, and availability of the software products.

Consumer Research in Omnichannel Retailing: A Systematic Analysis

  • Lu LUO;Yi Peng SHENG
    • Journal of Distribution Science
    • /
    • v.21 no.7
    • /
    • pp.91-104
    • /
    • 2023
  • Purpose: In the past decade, Scholars, think tanks, and policymakers have had rich discussions about omnichannel distribution science. However, despite the growing body of research in this area, there is currently no universally accepted definition of what exactly an "omnichannel consumer" consists of and what the most relevant drivers are. This study aims to synthesize the empirical evidence surrounding omni-channel consumer research and its management. Additionally, we demonstrate how omnichannel consumer research has emerged from different theoretical perspectives and disciplines. Research design, data and methodology: Using the Systematic Literature Review method and searching the CNKI, Web of Science, and Scopus databases for 130 articles, the study analyzed the current state of omnichannel consumer research and categorized and summarized the findings in the literature. Results: This study analyzes the current state of omnichannel consumer research and categorizes the findings in the literature and identifies four research areas: consumer behavior, consumer experience, consumer sentiment dimensions, and consumer segmentation. Conclusions: This literature review offers the first comprehensive and systematic overview of "Chinese omnichannel consumers." It not only highlights the most critical research trends discussed in existing studies, but also outlines the expected direction of future research, which provides the basis for understanding omnichannel consumer research.

Traditional and minimally invasive access cavities in endodontics: a literature review

  • Ioanna Kapetanaki;Fotis Dimopoulos ;Christos Gogos
    • Restorative Dentistry and Endodontics
    • /
    • v.46 no.3
    • /
    • pp.46.1-46.9
    • /
    • 2021
  • The aim of this review was to evaluate the effects of different access cavity designs on endodontic treatment and tooth prognosis. Two independent reviewers conducted an unrestricted search of the relevant literature contained in the following electronic databases: PubMed, Science Direct, Scopus, Web of Science, and OpenGrey. The electronic search was supplemented by a manual search during the same time period. The reference lists of the articles that advanced to second-round screening were hand-searched to identify additional potential articles. Experts were also contacted in an effort to learn about possible unpublished or ongoing studies. The benefits of minimally invasive access (MIA) cavities are not yet fully supported by research data. There is no evidence that this approach can replace the traditional approach of straight-line access cavities. Guided endodontics is a new method for teeth with pulp canal calcification and apical infection, but there have been no cost-benefit investigations or time studies to verify these personal opinions. Although the purpose of MIA cavities is to reflect clinicians' interest in retaining a greater amount of the dental substance, traditional cavities are the safer method for effective instrument operation and the prevention of iatrogenic complications.

A Study of the Using Status and Environment of Domestic e-Books in Academic Libraries of Junior Colleges (전문대학도서관의 국내 전자책 이용 실태 연구)

  • Jung, Jin-Han;Park, Il-Jong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.17 no.2
    • /
    • pp.201-222
    • /
    • 2006
  • The objective of this study is to analyze the actual using status of domestic e-book in the academic library and to help e-book related policy and its vitalization. The web survey of e-book user of A-junior college was conducted to carry out this study. Frequency analysis and descriptive statistics were used for analysing data basically. Also, t-test, ANOVA, non-parametric chi-square, and correlation analysis were used to examine whether there are any significant differences between treatment groups divided by gender, major etc. or not.

A Study on the Utilization of Flood Damage Map with Crowdsourcing Data (크라우드 소싱 데이터를 적용한 홍수 피해지도 활용방안 연구)

  • Lee, Jeongha;Hwang, SeokHwan
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.310-310
    • /
    • 2022
  • 최근 통신의 발달로 인하여 웹(Web)상에는 다양한 데이터들이 실시간으로 생산되고 있으며 해당 내용은 다양한 산업에서 활용되고 있다. 특히 최근에는 재난과 관련 상황에서도 소셜 네트워크 서비스(SNS) 데이터가 활용되기도 하며 기존의 수치 계측 데이터가 아닌 하나의 센서 역할을 하는 개인의 비정형데이터의 업로드가 다양한 재난 모니터링 부분에 활용되고 있는 실정이다. 특히 홍수 등의 자연재해 발생 시 개개인의 업로드 한 웹 데이터에는 시간에 따른 인구의 유동성이나 간단한 위치 정보 등을 포함하여 실제 피해의 정도를 보다 빠르고 다양한 정보로 모니터링이 가능하다. 홍수 발생 시 일반적으로 활용하는 수문 데이터는 피해의 규모가 크게 예측되는 대하천 위주로 관측이 이루어지며 관측지역과 데이터의 양이 한정되어있어 비정형데이터를 함께 활용한 연구가 필요하다. 따라서 본 연구에서는 웹에 있는 비정형 데이터들을 추출해내는 웹 크롤러를 구성하고 해당 프로그램을 활용하여 추출한 데이터들에 대해 강우 사상과 공간적 패턴을 비교 분석하여 크라우드 소싱 데이터를 적용한 홍수 피해지도의 활용방안을 제시하고자 한다.

  • PDF