• Title/Summary/Keyword: Web-System

Search Result 7,834, Processing Time 0.033 seconds

Effective Performance Analysis of Disease-oriented Translational Research from a Point of View of Biotechnology (생명공학기술적 관점에서 질병중심 중개연구의 효율적 성과분석에 대한 실증연구)

  • Cheon, Su-Hwan;Jung, Sung-Chul;Je, Young-Tae;Kim, Gi-Tae;Kim, Myung-Hwan;Park, Seong-Ho;Jeon, Hye-Kyoung;Kwon, Jun-Young;Kim, Dong-Il;Kim, Dong-Seok;Lee, Kyung-Min;Sun, Kyung
    • KSBB Journal
    • /
    • v.27 no.1
    • /
    • pp.1-8
    • /
    • 2012
  • Recently, translational research (TR) in health technology (HT) has been considered as an emerging alternative research system for the improvement of human health. TR from bench to bedside involves a strong bidirectional relationship between basic science discovery and clinical practice. To support R&D planning and policy in HT effectively, the performance of TR programs was analyzed and evaluated in a R&D project on health and medical technology. TR programs were classified into three parts: unilateral TR, bilateral TR and multilateral TR. Bibliometrics and citation analysis were performed to assess research papers and gather information for the performance analysis of TR programs. In addition, both quantitative and qualitative analysis were successfully carried out using ISI Web of Science, Google Scholar Citations, SCOPUS and Knowledgematrix. In conclusion, the performance analysis of TR programs could significantly improve the efficiency of R&D plans, R&D management and evaluation for a safe and healthy life.

A System of Audio Data Analysis and Masking Personal Information Using Audio Partitioning and Artificial Intelligence API (오디오 데이터 내 개인 신상 정보 검출과 마스킹을 위한 인공지능 API의 활용 및 음성 분할 방법의 연구)

  • Kim, TaeYoung;Hong, Ji Won;Kim, Do Hee;Kim, Hyung-Jong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.895-907
    • /
    • 2020
  • With the recent increasing influence of multimedia content other than the text-based content, services that help to process information in content brings us great convenience. These services' representative features are searching and masking the sensitive data. It is not difficult to find the solutions that provide searching and masking function for text information and image. However, even though we recognize the necessity of the technology for searching and masking a part of the audio data, it is not easy to find the solution because of the difficulty of the technology. In this study, we propose web application that provides searching and masking functions for audio data using audio partitioning method. While we are achieving the research goal, we evaluated several speech to text conversion APIs to choose a proper API for our purpose and developed regular expressions for searching sensitive information. Lastly we evaluated the accuracy of the developed searching and masking feature. The contribution of this work is in design and implementation of searching and masking a sensitive information from the audio data by the various functionality proving experiments.

Periodic Characteristics and Implications of Programs and Policies for Brownfield Management in the U.S.A. (미국 브라운필드 관리 프로그램과 정책의 시기별 특성과 함의)

  • Kim, Eujin Julia;Miller, Patrick
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.43 no.1
    • /
    • pp.96-107
    • /
    • 2015
  • Brownfield sites are beginning to be considered as potentially useful areas for landscape design and planning, with post-industrial areas such as water treatment facilities and military training bases being converted into useful landscapes such as parks and recreation areas. These redevelopments bring broad benefits through revitalizing communities and increasing property values, thus, increasing the demand for comprehensive management and planning policies. This study examines changes in U.S. brownfield policies and programs and, identifies their periodic characteristics over the thirty years since the Superfund program was introduced in 1980. A descriptive and interpretive approach was utilized, focusing specifically on a time sequential analysis of the data gathered from the overview of the Environmental Protection Agency's web-based documents and related literature. The primary changes in and characteristics of programs and policies were analyzed and divided into three periods : environmental protection, remediation and reuse, and comprehensive planning. Four major features were identified: relaxation and readjustment of regulation, diversification of support programs, a mix of top-down and bottom-up approaches, and database system building. The study examines how common brownfield problems such as site identification difficulties and assessment and remediation cost have been dealt with in the regulatory context and has implications for future policies and programs for effective brownfield planning and management in Korea.

A MDA-based Approach to Developing UI Architecture for Mobile Telephony Software (MDA기반 이동 단말 시스템 소프트웨어 개발 기법)

  • Lee Joon-Sang;Chae Heung-Seok
    • The KIPS Transactions:PartD
    • /
    • v.13D no.3 s.106
    • /
    • pp.383-390
    • /
    • 2006
  • Product-line engineering is a dreaming goal in software engineering research. Unfortunately, the current underlying technologies do not seem to be still not much matured enough to make it viable in the industry. Based on our experiences in working on mobile telephony systems over 3 years, now we are in the course of developing an approach to product-line engineering for mobile telephony system software. In this paper, the experiences are shared together with our research motivation and idea. Consequently, we propose an approach to building and maintaining telephony application logics from the perspective of scenes. As a Domain-Specific Language(DSL), Menu Navigation Viewpoint(MNV) DSL is designed to deal with the problem domain of telephony applications. The functional requirements on how a set of telephony application logics are configured can be so various depending on manufacturer, product concept, service carrier, and so on. However, there is a commonality that all of the currently used telephony application logics can be generally described from the point of user's view, with a set of functional features that can be combinatorially synthesized from typical telephony services(i.e. voice/video telephony, CBS/SMS/MMS, address book, data connection, camera/multimedia, web browsing, etc.), and their possible connectivity. MNV DSL description acts as a backbone software architecture based on which the other types of telephony application logics are placed and aligned to work together globally.

Development and Application of Practice-Centered Science Camp Programs (체험중심 과학 캠프 프로그램의 개발 및 적용)

  • Kim, Changman;Cha, Jeongho;Kim, Inwhan;Choi, Junghoon;Hwang, Bookkee
    • Journal of Science Education
    • /
    • v.35 no.1
    • /
    • pp.102-118
    • /
    • 2011
  • In this study the authors developed the practice-centered science camp program which was based on the review of out-of-school scientific activities and the standards of HASA (Hands, Head and Heart At Science Activity) curriculum emphasizing on hands-operated skills. After applying this science camp program we confirmed the validity of the program based on the students' responses at the camp. Using students' reports written during the camp and their essays written on the web-site after camp, we analyzed students' responses into four categories; knowledge, inquiry, hands-operated skills, and scientific attitudes. Also we evaluated the components of the science camp programs and students' perception of science and science-related attitudes using a questionnaire before and after the camp. In terms of contents and activities for the development and application of science camp, our result showed that the science camp program should be complemented to connect real life with high-tech science and include more activities related hands-operated skills and competition activities evoking constructive competitive spirits. In conclusion, we can infer that the agencies which take parts of the national policy enterprise related science education, such as Scientific Education Research Center, must develop and specialize science camp program with more competitive human resource system and economic support. Science educators should give more attention on joining school science education with out-of-school science education, which might have a positive effect on students' attitudes and participation toward science.

  • PDF

A Study on Occurance Possibility of Suicide Bombing using Utilize Unmanned Aircraft in Korea (한국 내 무인항공기를 이용한 자폭테러 발생가능성에 대한 연구)

  • Oh, Seiyouen;Lee, Jaemin;Park, Namkwun
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.2
    • /
    • pp.288-293
    • /
    • 2014
  • The purpose of this study was to provide response plans against acts of suicide bomb using utilize unmanned aircrafts to prevent large losses of lives such as the terrorist attacks of September 11. As the result, First, this research suggests revising the definition and categorization of utilizing unmanned aircrafts and legislating the Anti-terrorism law. Second, it is needed to establish the proper social safety network through terrorism response management integrated system against the terror of related organization. Third, suicide bomb using utilizing unmanned aircrafts can be occurred because it is possible to make bomb and open web site for terrorism without connection with terrorist organization because of universal use of Internet. In response to this, it is needed to make a law which can block the use and open of illegal site and contents. Forth, the increasing number of foreigners and immigrants can make conflicts, and cause the foreigner's anti-korea feeling and the citizen's anti-cultural diffusion. Therefore, it is needed for the citizen to change and improve the awareness of them, and the change of social politics.

Face recognition using PCA and face direction information (PCA와 얼굴방향 정보를 이용한 얼굴인식)

  • Kim, Seung-Jae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.609-616
    • /
    • 2017
  • In this paper, we propose an algorithm to obtain more stable and high recognition rate by using left and right rotation information of input image in order to obtain a stable recognition rate in face recognition. The proposed algorithm uses the facial image as the input information in the web camera environment to reduce the size of the image and normalize the information about the brightness and color to obtain the improved recognition rate. We apply Principal Component Analysis (PCA) to the detected candidate regions to obtain feature vectors and classify faces. Also, In order to reduce the error rate range of the recognition rate, a set of data with the left and right $45^{\circ}$ rotation information is constructed considering the directionality of the input face image, and each feature vector is obtained with PCA. In order to obtain a stable recognition rate with the obtained feature vector, it is after scattered in the eigenspace and the final face is recognized by comparing euclidean distant distances to each feature. The PCA-based feature vector is low-dimensional data, but there is no problem in expressing the face, and the recognition speed can be fast because of the small amount of calculation. The method proposed in this paper can improve the safety and accuracy of recognition and recognition rate faster than other algorithms, and can be used for real-time recognition system.

Study of the Applications of Introduction of Computer Engineering Class using PBL (PBL을 이용한 컴퓨터공학입문 수업의 실제적 적용에 관한 연구)

  • Lee, Keun-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.10
    • /
    • pp.6303-6309
    • /
    • 2014
  • In this thesis, PBL was applied to the subject for improving students' many skills that modern industrial society demands. Our engineering school developed PBL problems for PBL use, applied the problems to classes and confirmed the effectiveness of PBL. The study subjects were 63 freshman students in H University who took the 'Introduce of computer engineering'. We applied 5 PBL problems for 15 weeks. They wrote and submitted a reflective journal when they finished the every given PBL activity. In addition, they completed a class evaluation form after the activity of 5th PBL Problem ended. The study showed that the students experienced the effectiveness of PBL, such as the comprehension of the studied contents, the comprehension of the cooperative learning, authentic experience, creative problem-solving skills, presentation skills, communication ability, self-directed study ability and confidence. Some difficulties in gathering together and spending much time were also encountered. The students realized that the PBL learning activities were important methods because the students could develop into future intelligent engineers that modern industrial society demands through PBL learning activities. The main goal of an engineering school is to produce specialists with creative problem solving ability so that the effects of this study are quite promising for our engineering school.

An Algorithm to Detect P2P Heavy Traffic based on Flow Transport Characteristics (플로우 전달 특성 기반의 P2P 헤비 트래픽 검출 알고리즘)

  • Choi, Byeong-Geol;Lee, Si-Young;Seo, Yeong-Il;Yu, Zhibin;Jun, Jae-Hyun;Kim, Sung-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.317-326
    • /
    • 2010
  • Nowadays, transmission bandwidth for network traffic is increasing and the type is varied such as peer-to-peer (PZP), real-time video, and so on, because distributed computing environment is spread and various network-based applications are developed. However, as PZP traffic occupies much volume among Internet backbone traffics, transmission bandwidth and quality of service(QoS) of other network applications such as web, ftp, and real-time video cannot be guaranteed. In previous research, the port-based technique which checks well-known port number and the Deep Packet Inspection(DPI) technique which checks the payload of packets were suggested for solving the problem of the P2P traffics, however there were difficulties to apply those methods to detection of P2P traffics because P2P applications are not used well-known port number and payload of packets may be encrypted. A proposed algorithm for identifying P2P heavy traffics based on flow transport parameters and behavioral characteristics can solve the problem of the port-based technique and the DPI technique. The focus of this paper is to identify P2P heavy traffic flows rather than all P2P traffics. P2P traffics are consist of two steps i)searching the opposite peer which have some contents ii) downloading the contents from one or more peers. We define P2P flow patterns on these P2P applications' features and then implement the system to classify P2P heavy traffics.

Effective Design Pattern and Enterprise Architecture Design Techniques in EJB Environment (EJB기반의 효율적인 설계 패턴 및 엔터프라이즈 아키텍처 설계 기법)

  • 민현기;김수동
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.11
    • /
    • pp.1025-1036
    • /
    • 2003
  • In industry, it is a current trend that systems are developed by using Enterprise JavaBeans(EJB) technology for reducing the cost and the time. Thus, the architecture of EJB is getting more essential to enhance reusability, extensibility and portability of system. However little has been studied in the realm of the practical software architectures for EJB. The architecture has just bean studied in abstract level, but not in concrete level providing the method to substantiate it using the practical J2EE techniques. Just using the EJB technology doesn't guarantee the reusability of the artifacts because EJB specification provides the characteristics and architecture for only fine grained components as session and entity bean. In this paper, we propose the enterprise software architecture for the systems based on EJB and the concrete techniques for implementing that. Also, design patterns of modeling efficient enterprise architecture are represented. By analyzing both the strengths and the weaknesses of suggested design patterns, EJB design patterns which are suitable for each layer of enterprise architecture will be identified. Through the component which design patterns are applied, the architecture can support the optimized relationship between the components. Five techniques for designing components from fine grained to coarse grained based on EJB technology, and architecture design techniques including transaction and assembling techniques are proposed.