• Title/Summary/Keyword: Web data

Search Result 5,605, Processing Time 0.037 seconds

A Study on Residents' Participation and the Characteristics of Cohousing in USA (미국 코하우징의 특성 및 주민참여 현황)

  • Cho, Jeong-Hyun;Choi, Jung-Shin
    • Journal of the Korean housing association
    • /
    • v.22 no.2
    • /
    • pp.11-20
    • /
    • 2011
  • Since the cohousing idea, originated in Northern Europe, was introduced in the U.S. by architects Kathryn McCamant and Charles Durrett in the early 1980s, there are recently the largest number of cohousing communities and rapidly expanded in the U.S. So, it is necessary to appreciate the cohousing communities developed in U.S. In this study, we investigated the physical characteristics of cohousing and the methods of its residents' participation by means of a case study on cohousing communities in U.S. and suggested the future direction of the cohousing community. Also, this work could be exploited when the cohousing is introduced to Korea. At first, the general status and characteristics of U.S cohousing was explored using diverse sources such as literature, paper and Web site. And then, the direct visit survey was used to obtain the more exact and specific data about physical aspects and residents' participation in each community. We found that cohousing communities were mostly located in the urban and Rural area, which was founded in the 1990s, and new communities continue to be created in the U.S. Typically, the number of households is from 20 to 30 in one community. The land is generally owned by the community itself and its size is within 10 acres. Communities usually serve optional group meals in the common house at least two or five times a week. Each member's income is separated and the community members should take care of their common properties. The leader of community does not exist and most communities don't have the organization of community members. All cohousing communities use consensus as the basis for group decision-making.

Implementation of the knowledge management system to effectively utilize human and intellectual resources of the universities (대학의 인적.지적 자원의 효과적 활용을 위한 지식 관리 시스템 구현)

  • 최재원;박진규
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.473-476
    • /
    • 2002
  • In this paper by realizing the knowledge base on the web, for example, the information of the technology and human resources of the universities, which is the mecca of the knowledge management, technology information in various segment, education information, visible anti invisible knowledge information like technical advice, etc, and scholaristic knowledge like basic science technologies, economic theories which are verified by experts of the field, and pragmatic knowledge like technical patent, software, data base, also, hands on experience and knowledge like field technology, customer service, front line management. All those related information provides easy access to anyone who need of. This system is also designed for the utilization of the study, company activities, and professionals of the basic science technology which enables not only professor to exchange the research results but also, general public, companies, students can effectively share and exchange the information.

  • PDF

Analysis on Vowel and Consonant Sounds of Patent's Speech with Velopharyngeal Insufficiency (VPI) and Simulated Speech (구개인두부전증 환자와 모의 음성의 모음과 자음 분석)

  • Sung, Mee Young;Kim, Heejin;Kwon, Tack-Kyun;Sung, Myung-Whun;Kim, Wooil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1740-1748
    • /
    • 2014
  • This paper focuses on listening test and acoustic analysis of patients' speech with velopharyngeal insufficiency (VPI) and normal speakers' simulation speech. In this research, a set consisting of 50-words, vowels and single syllables is determined for speech database construction. A web-based listening evaluation system is developed for a convenient/automated evaluation procedure. The analysis results show the trend of incorrect recognition for VPI speech and the one for simulation speech are similar. Such similarity is also confirmed by comparing the formant locations of vowel and spectrum of consonant sounds. These results show that the simulation method for VPI speech is effective at generating the speech signals similar to actual VPI patient's speech. It is expected that the simulation speech data can be effectively employed for our future work such as acoustic model adaptation.

Educational Voice Storybook Application using Mobile NFC (모바일 NFC를 이용한 교육용 음성동화책 어플리케이션)

  • Jo, Seung-Geun;Kim, Tae Yong;Jang, Won-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.541-544
    • /
    • 2015
  • Through the data communication services in the mobile field in the past of a voice call center (SMS, E-Mail, web surfing, etc.), it has evolved as a "service of smartphone-based" life convenience. According to the latest world book publishing market statistics, the while increasing the proportion of e-books, the proportion of this paper are commercially being reduced. Paper this many e-books in the development of, but active communication in this paper By fusing an NFC-based mobile environment that provides a function to complement the disadvantage of electronic books has, it can give to meet the matters required in more diverse applications. Therefore, in this paper, in order to design and implement an NFC-based mobile phonic fairy book application of, and the efficiency and maintenance of the development through a way to save on rather than storing the information of the management target device server We have implemented a NFC-based mobile education phonic fairy book application that takes into account.

  • PDF

Design of a Wi-Fi Remote Ordering System Using the BYOD Environment (BYOD 환경을 활용한 WiFi 원격주문 시스템 설계)

  • Suk, Myung-gun;Jang, Seok-woo;Kim, Chang-jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.759-762
    • /
    • 2015
  • As a result of the popularization of smart devices, smart phones or the tablets have become necessities in modern society. In this current of the times, the bring-your-own-device environment, in which personally owned smart devices are utilized in life, is attracting attention. In this context, this paper designed a Wi-Fi remote ordering system focused on the BYOD environment. If the Wi-Fi remote ordering system based on the BYOD environment is popularized, positive effects can be expected such as the enhancement of efficiency and the increase of customer benefits. As a typical example, real-time customer requests via smart devices enable the provision of fast services. This paper designed a mobile app for customers' remote ordering and web pages on which member stores can inquire details of orders, manage a menu, and register statistical data on sales. If the Wi-Fi remote ordering system designed by this paper is widely distributed internationally, it is expected that the system will be used usefully by many people.

  • PDF

Development library for Implementing mobile services environment (모바일 서비스 환경구현을 위한 라이브러리 개발)

  • Kwon, Doowy;Park, Geunghong;Park, Su-hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.252-253
    • /
    • 2013
  • Many businesses, government offices, educational institutions, according to the characteristics of each business and information system is used. However, prevalence of smart phones and a wide range of mobile devices with services, which requires users with mobility, according to the latest mobile services and in many places, and is under development. Interworking between existing systems and mobile systems to be set aside for the development cost and time, a waste of human resources is getting worse. Also, in many places to provide mobile services to existing systems need to fix the problem is coming. In this paper, to solve the problem of interworking between existing systems and mobile systems for the data transfer and processing of existing server, web services server, and mobile systems has been developed between the library.

  • PDF

CyberClass Avatar System using Task-Level Behavior Description Language (작업 수준의 행위 표현 언어를 이용한 사이버강의용 아바타 시스템)

  • Kim, Jung-Hee;Lim, Soon-Bum
    • The KIPS Transactions:PartB
    • /
    • v.11B no.5
    • /
    • pp.597-602
    • /
    • 2004
  • In spite of recent increase in the use of avatar systems in Web and Virtual Reality, there has not been a service that allows users to control directly the avatar behaviors. In addition, the conventional behavior control languages required a lot of complicated information for controlling the behaviors, so that users had difficulty using them. To apply written languages to a different task domain, moreover, it was necessary to modify or rewrite the languages. In this paper, for the avatar behavior control more simply define, “Task-Level Behavior Description Language,” which allows description the avatar behaviors in each task domain and “Motion Representation Language,” which enables writing detailed data for motion control. The system, developed in this paper, “included an Interpreter,” which automatically creates the Motion Representation Language, allowing users to easily control the avatar behaviors simply with the Behavior Description Language. The system was also applied to cyber classes, and the Task-level Behavior Description Language was compared with conventional languages to see how it was more effective in behavior description.

TK-Indexing : An Indexing Method for SNS Data Based on NoSQL (TK-Indexing : NoSQL 기반 SNS 데이터 색인 기법)

  • Shim, Hyung-Nam;Kim, Jeong-Dong;Seol, Kwang-Soo;Baik, Doo-Kwon
    • The KIPS Transactions:PartD
    • /
    • v.19D no.4
    • /
    • pp.271-280
    • /
    • 2012
  • Currently, contents generated by SNS services are increasing exponentially, as the number of SNS users increase. The SNS is commonly used to post personal status and individual interests. Also, the SNS is applied in socialization, entertainment, product marketing, news sharing, and single person journalism. As SNS services became available on smart phones, the users of SNS services can generate and spread the social issues and controversies faster than the traditional media. The existing indexing methods for web contents have limitation in terms of real-time indexing for SNS contents, as they usually focus on diversity and accuracy of indexing. To overcome this problem, there are real-time indexing techniques based on RDBMSs. However, these techniques suffer from complex indexing procedures and reduced indexing targets. In this regard, we introduce the TK-Indexing method to improve the previous indexing techniques. Our method indexes the generation time of SNS contents and keywords by way of NoSQL to indexing SNS contents in real-time.

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud

  • Song, Eun-Ha;Kim, Hyun-Woo;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.347-358
    • /
    • 2012
  • Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is exposed to a lot of risks and the security of its spaces where data is stored is vulnerable. Accordingly, in order to reduce threat factors to security, the TCG proposed a highly reliable platform based on a semiconductor-chip, the TPM. However, there have been no technologies up to date that enables a real-time visual monitoring of the security status of a PC that is operated based on the TPM. And the TPB has provided the function in a visual method to monitor system status and resources only for the system behavior of a single host. Therefore, this paper will propose a m-TMS (Mobile Trusted Monitoring System) that monitors the trusted state of a computing environment in which a TPM chip-based TPB is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. The m-TMS is provided to users so that system resources of CPU, RAM, and process, which are the monitoring objects in a computer system, may be monitored. Moreover, converting and detouring single entities like a PC or target addresses, which are attack pattern methods that pose a threat to the computer system security, are combined. The branch instruction trace function is monitored using a BiT Profiling tool through which processes attacked or those suspected of being attacked may be traced, thereby enabling users to actively respond.

Unspecified Event Detection System Based on Contextual Location Name on Twitter (트위터에서 문맥상 지역명을 기반으로 한 불특정 이벤트 탐지 시스템)

  • Oh, Pyeonghwa;Yim, Junyeob;Yoon, Jinyoung;Hwang, Byung-Yeon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.9
    • /
    • pp.341-348
    • /
    • 2014
  • The advance in web accessibility with dissemination of smart phones gives rise to rapid increment of users on social network platforms. Many research projects are in progress to detect events using Twitter because it has a powerful influence on the dissemination of information with its open networks, and it is the representative service which generates more than 500 million Tweets a day in average; however, existing studies to detect events has been used TFIDF algorithm without any consideration of the various conditions of tweets. In addition, some of them detected predefined events. In this paper, we propose the RTFIDF VT algorithm which is a modified algorithm of TFIDF by reflecting features of Twitter. We also verified the optimal section of TF and DF for detecting events through the experiment. Finally, we suggest a system that extracts result-sets of places and related keywords at the given specific time using the RTFIDF VT algorithm and validated section of TF and DF.