• Title/Summary/Keyword: Web data

Search Result 5,605, Processing Time 0.039 seconds

A study on the Tendencies of Oriental Pediatrics by Researching Academic Journal of Oriental Medicine in Modern Korea (from 1910 to 1960) (한의학술잡지(韓醫學術雜誌)를 중심으로 살펴본 근세(近世) 한방소아과(韓方小兒科)의 학술적(學術的) 경향(傾向)(1910년(年)부터 1960년(年)까지))

  • Seo, Young-Min;Kim, Jang-Hyun
    • The Journal of Dong Guk Oriental Medicine
    • /
    • v.10
    • /
    • pp.62-76
    • /
    • 2008
  • Object: Oriental pediatrics at the Late-Joseon had constantly developed positively, independently, originally, but depressed since Japanese imperialism because the western medicine flowed into Korea and Japanese imperialism carried out the oriental medical obliterating policy. As a effort of oriental medical group that coped with the obliterating of policy of Japanese imperialism, there were publication of oriental medical academic journal and it is important data that we comprehended the tendencies of oriental pediatrics in modern korea. Method: We studied academic journals on oriental medicine in Knowledge of Oriental Medicine Web Service and selected 31 volumes of nine academic journals out of 80 volumes of twelve academic journals, which is contained pediatrics contents. Result & Conclusion: Research into these journals has derived the conclusion that the oriental pediatrics academic trend at the time were transformed into new state which brought the interaction and balanced the merit of oriental-western medicine.

  • PDF

An Auto-blogging System based Context Model for Micro-blogging Service (마이크로 블로깅 서비스를 지원하기 위한 컨텍스트 모델 기반 자동 블로깅 시스템)

  • Park, Jae-Min;Lee, Sang-Yong
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.341-346
    • /
    • 2012
  • Social network service is service that enables the human network to be built up on web. It is important to record users' information simply and establish the network with people based on the information to provide with the social network service effectively. But it is very troublesome work for the user to input his or her own information on the mobile environment. In this paper we suggested a system which classifies users' behavior using context and creates blogging sentences automatically after inferring the destination. For this, users' behavior is classified and the destination is inferred with the sequence matching method using Naive Bayes classification. Then sentences which are suitable for situation is created by arranging the processed context using the structure of 5W1H. The system was evaluated satisfaction degree by comparing the created sentences based on actually collected data with users' intension and got accuracy rate of 88.73%.

The Effects of User Involvement on Internet Ad Preference Based on Presentation Type and Content

  • Joo Hoo Kim
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.4
    • /
    • pp.33-51
    • /
    • 2003
  • The primary objectives of this study were, using data from Internet users in Korea, to determine users' preference of banner ad through two ad properties; ad presentation type (text vs. image) and ad content (product information vs. prize information) by incorporating the level of involvement into research design. Using within-group experimental design by means of subjects' web-based participation in the study, the study result showed that image-based banner ad was significantly preferred to text-based banner ad. It was found that the level of ad involvement had a significant impact on the preference of banner ads. Also it was found that image-based banner ad had a greater effect on ad preference than text-based banner ad in low involvement situation only, Finally, image-based banner ad was consistently preferred to text-based banner ad regardless of involvement level when the banner ad was product oriented. The study findings suggest that adoption decisions regarding banner ad presentation type and banner ad content should be based on the knowledge of both the level of consumer's ad involvement and the interactive effects between ad presentation and ad content.

  • PDF

A Study about problem and a correspondence strategy along a beauty culture-Ubiquitous implementation (미용 부분의 유비쿼터스 구현에 따른 문제점과 대응전략에 관한 연구)

  • Lim Jin-Sook;Kang Jang-Mook
    • Journal of Digital Contents Society
    • /
    • v.5 no.3
    • /
    • pp.163-170
    • /
    • 2004
  • Ubiquitous is an agriculture revolution, the Industrial Revolution, the fourth revolution to equal an information revolution are Ubiquitous. Historic agriculture was revolutionary, but the Industrial Revolution was a revolution of the physics space that was a base of a mankind civilization, and the informatization revolution that Cyber Space saw a prime while world wide web service was expended was a revolution of cyber space. Be charmed with this, and, as for the Ubiquitous revolution, it is achieved a physics space and an intelligent union of cyber space in the space where an off-line space was integrated with compunction on-line. It is combined with a life space naturally, and Ubiquitous technology. Also, I presented the plan that derivation tried a problem about Ubiquitous, and can solve an each problem. Specially, infringement about personal privacy very has a lot of possession to occur in the world that radio communication between all appliances is possible. It is Ubiquitous by becoming the data which is useful to thorough preparation about the Ubiquitous world to come with presenting policy a little technical solution plan about this to the future Republic of Korea. many company has been cracked by crackers information security and everyday new computer virus come out.

  • PDF

The Base of Understanding for Interdisciplinary Studies on Cyber Crimes - Centering on Regulations in Criminal Law - (사이버범죄의 학제간 연구를 위한 이해의 기초 - 형법상 규제를 중심으로 -)

  • Lim, Byoung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.237-242
    • /
    • 2008
  • This study aims to provide theoretical base in criminal law for engineers in the viewpoint of jurists to encourage interdisciplinary studies on cyber crimes. Apart from seriousness of discussion on torrent cyber crimes, a good effect of the internet networks such as sharing of information has bee emphasized while the evil influence of its side effect has been neglected. Therefore, this study suggests that we need to consider reinforcement of cyber ethics, and legal mind of IT technicians, strict security by managers, active efforts to develop legitimate contents by managers of web hardware and P2P, and reinforcement of punishments against crimes by internet users. And this study approaches new norms on computer and cyber crimes in interpretational sense of criminal law, and provides the theoretical base of the criminal law focusing on traditional theories, assumptions, and precedents involved in regulations against computer virus distribution.

  • PDF

Application of BIM-based PMIS Considering Construction Life-Cycle (건설 생애주기를 고려한 BIM 기반의 PMIS 활용)

  • Moon, Sung-Woo;Kwon, Ki-Nam;Kim, Sang-Do;Jung, Joon-Ho
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2008.11a
    • /
    • pp.654-657
    • /
    • 2008
  • Recently, construction projects have become bigger and complicated and the construction business scale has enlarged. Therefore a project cost size is increasing. The historical data can be easily saved by advanced technologies of IT industries. Utilizing those make us to be able to manage construction project more effectively. These days, PMIS (Project Management Information System) has supplied widely at construction companies for integrating cooperation system of Web environment. and it is being used. However the most PMIS is limited at construction phase. Actually it isn't applied to a construction project Life-Cycle(planning, design, construction and maintenance). To control manage a construction project Life-Cycle effectively, BPMS (BIM-based PMIS Modeling) should be considered. This paper suggests the ways for applying BPMS.

  • PDF

Social Motivational Factors Influencing the Intention to Use of Blog (블로그 사용의도에 영향을 미치는 사회 동기적 요인)

  • Hong, Seok-In;Choi, Hee-Jae;Lee, Zoon-Ky
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.122-137
    • /
    • 2010
  • Blogs are a new type of media that have recently become popular on the World Wide Web and have influence throughout society. The purpose of this study is to examine social motivations influencing intention of blog usage. Based on Technology Acceptance Model and Motivation Theory, this study considered perceived usefulness, perceived ease of use, reputation, reciprocity, enjoyment of helping, social identity as the determinants of influencing the intention to use of blog. The suggested model was empirically evaluated using online survey data collection from 342 users of popular blog site in Korea (NAVER Blog, Cyworld minihompy, Daum Blog, and Yahoo Blog). The results revealed that perceived usefulness, perceived ease of use, reciprocity, and social identity affect directly the intention of blog usage. Furthermore, social identity has moderate effect via reciprocity and enjoyment of helping on blog usage. This study contributes to a theoretical understanding of the factors as social motivation that affects the usage of blogs. Also, the results of this study provide blog service providers useful strategic insights and service guidelines to enhance user's intention of blogs practically.

Survey of Korean Medicine Military Doctors for Establishing Clinical Evidence of Korean Medicine Treatment in Military Medical Service (군진 한의학 근거 기반 구축을 위한 한의군의관 진료 현황 및 인식 조사 연구)

  • Kwon, O-Jin;Kim, Eun-Jung;Eom, Yu-Sik;Park, Sang-Min;Kim, Dongsu;Park, Hyo-Ju;Kim, Joo-Hee
    • The Journal of Korean Medicine
    • /
    • v.38 no.3
    • /
    • pp.73-85
    • /
    • 2017
  • Objectives: The purpose of this study was to investigate the status of Korean medicine treatment, and to analyze problems and demands to provide basic data on Korean medicine in military medical services. Methods: This survey was completed by 30 volunteer Korean medicine military doctors on service via a web-based questionnaire system. The questionnaire was developed through in-depth interviews with Korean medicine military doctors and consisted of general information on the subject, overall characteristics of the medical environment, current status of Korean medicine care in each workplace, problems and needs, and related clinical evidence and education. Results: Korean medicine military doctors administered acupuncture treatment most frequently in clinical practice. The most common complaints were related to musculoskeletal diseases, which accounted for 86.5% of all diseases, including those of the respiratory, digestive, and nervous systems. Most of the problems in Korean medicine care were pointed out as being due to a lack of awareness of Korean medicine in the military. Many doctors were aware that it is necessary to establish clinical evidence for Korean medicine in the military, and were also positive about the possibility of performing clinical research in the military, but the experience of actual participation in clinical research or related education was uncommon. Conclusions: Korean medicine military treatment differs from private medical care due to the specificity of each workplace and the military medical system. In the future, it will be necessary to establish an appropriate Korean medicine treatment model in the military suitable for these characteristics and strategic plans for clinical evidence.

An Automatic Summarization of Call-For-Paper Documents Using a 2-Phase hidden Markov Model (2단계 은닉 마코프 모델을 이용한 논문 모집 공고의 자동 요약)

  • Kim, Jeong-Hyun;Park, Seong-Bae;Lee, Sang-Jo;Park, Se-Young
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.2
    • /
    • pp.243-250
    • /
    • 2008
  • This paper proposes a system which extracts necessary information from call-for-paper (CFP) documents using a hidden Markov model (HMM). Even though a CFP does not follow a strict form, there is, in general, a relatively-fixed sequence of information within most CFPs. Therefore, a hiden Markov model is adopted to analyze CFPs which has an advantage of processing consecutive data. However, when CFPs are intuitively modeled with a hidden Markov model, a problem arises that the boundaries of the information are not recognized accurately. In order to solve this problem, this paper proposes a two-phrase hidden Markov model. In the first step, the P-HMM (Phrase hidden Markov model) which models a document with phrases recognizes CFP documents locally. Then, the D-HMM (Document hidden Markov model) grasps the overall structure and information flow of the document. The experiments over 400 CFP documents grathered on Web result in 0.49 of F-score. This performance implies 0.15 of F-measure improvement over the HMM which is intuitively modeled.

Forgery Protection System and 2D Bar-code inserted Watermark (워터마크가 삽입된 이차원 바코드와 위.변조 방지 시스템)

  • Lee, Sang-Kyung;Ko, Kwang-Enu;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.6
    • /
    • pp.825-830
    • /
    • 2010
  • Generally, the copy protection mark and 2D bar-code techniques are widely used for forgery protection in printed public documents. But, it is hard to discriminate truth from the copy documents by using exisiting methods, because of that existing 2D-barcode is separated from the copy protection mark and it can be only recognized by specified optical barcord scanner. Therefor, in this paper, we proposed the forgery protection tehchnique for discriminating truth from the copy document by using watermark inserted 2D-barcord, which can be accurately distinguished not only by naked eye, but also by scanner. The copy protection mark consists of deformed patterns that are caused by the lowpass filter characteristic of digital I/O device. From these, we verified the performance of the proposed techniques by applying the histogram analysis based on the original, copy, and scanned copy image of the printed documents. Also, we suggested 2D-barcord confirmation system which can be accessed through the online server by using certification key data which is detected by web-camera, cell phone camera.