• Title/Summary/Keyword: full-information

Search Result 3,672, Processing Time 0.028 seconds

Utilizing Machine Learning Algorithms for Recruitment Predictions of IT Graduates in the Saudi Labor Market

  • Munirah Alghamlas;Reham Alabduljabbar
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.113-124
    • /
    • 2024
  • One of the goals of the Saudi Arabia 2030 vision is to ensure full employment of its citizens. Recruitment of graduates depends on the quality of skills that they may have gained during their study. Hence, the quality of education and ensuring that graduates have sufficient knowledge about the in-demand skills of the market are necessary. However, IT graduates are usually not aware of whether they are suitable for recruitment or not. This study builds a prediction model that can be deployed on the web, where users can input variables to generate predictions. Furthermore, it provides data-driven recommendations of the in-demand skills in the Saudi IT labor market to overcome the unemployment problem. Data were collected from two online job portals: LinkedIn and Bayt.com. Three machine learning algorithms, namely, Support Vector Machine, k-Nearest Neighbor, and Naïve Bayes were used to build the model. Furthermore, descriptive and data analysis methods were employed herein to evaluate the existing gap. Results showed that there existed a gap between labor market employers' expectations of Saudi workers and the skills that the workers were equipped with from their educational institutions. Planned collaboration between industry and education providers is required to narrow down this gap.

Design of an Asymmetric-custom-surface Imaging Optical System for Two-dimensional Temperature-field Measurement

  • Guanghai Liu;Ming Gao;Jixiang Zhao;Yang Chen
    • Current Optics and Photonics
    • /
    • v.8 no.5
    • /
    • pp.484-492
    • /
    • 2024
  • In response to the difficulty of synchronously obtaining multiwavelength images for fast two-dimensional (2D) temperature measurement, a multispectral framing imaging optical system is designed, based on the segmented-aperture imaging method and asymmetric surface shape. The system adopts a common-aperture four-channel array structure to synchronously collect multiwavelength temperature-field images. To solve the problem of asymmetric aberration caused by being off-axis, a model of the relationship between incident and outgoing rays is established to calculate the asymmetric custom surface. The designed focal length of the optical system is 80 mm, the F-number is 1:3.8, and the operating wavelength range is 0.48-0.65 ㎛. The system is divided into four channels, corresponding to wavelengths of 0.48, 0.55, 0.58, and 0.65 ㎛ respectively. The modulation transfer function value of a single channel lens is higher than 0.6 in the full field of view at 35 lp/mm. The experimental results show that the asymmetric-custom-surface imaging system can capture clear multiwavelength images of a temperature field. The framing imaging system can capture clear images of multiwavelength temperature fields, with high consistency in images of different wavelengths. The designed optical system can provide reliable multiwavelength image data for 2D temperature-field measurement.

Awareness of Personal Information Protection for Service Users among Small and Mid-Sized Security Companies (중.소민간경비업체의 서비스 이용자 개인정보보호에 관한 인식)

  • Kim, Il Gon;Choi, Kee Nam
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.3-12
    • /
    • 2014
  • The government was fully aware of the gravity of a recent massive leak of personal information of credit card users. Meanwhile, the government just took a light disciplinary action by imposing a fine, but it showed its intention to strengthen the regulations by taking the severest disciplinary action. The tightened regulations against personal information leak will be applied to the private security industry without exception to protect individual people's property and lives if such an incident occurs in that industry that deals with a wide variety of personal information such as CCTV data or privacy information all the time. The purpose of this study was to examine the state of the protection and management of personal information for service users among private security firms in an effort to suggest some reform measures. The findings of the study were as follows: First, administrators or managers who are involved with personal information protection should make a full-fledged effort to gather information. Second, counseling or related programs should be provided for small and mid-sized security firms to guarantee thorough personal information protection. Third, Korea Security Association should improve the educational system related to personal information protection to resolve problems with this education currently provided for managers and employees of these companies.

The Study on the Development and Improvement of the web-based article review system for Korean Academy of Child Health Nursing (대한아동간호학회 웹기반 논문투고관리 연구 및 발전방안)

  • Park Jae-Won;Kang Mu-Yeong;Choi Myung-Seok;Jeong Hee-Seok;Kim Byung-Kyu;Lee Hyun-Jin
    • 아동간호학회:학술대회논문집
    • /
    • 2005.12a
    • /
    • pp.84-90
    • /
    • 2005
  • KISTI(Korea Institute of Science and Technology) has developed ${\ulcorner}KISTI-ACOMS (KIST-Article Contribution Management System){\lrcorner}$ as a part of the national project for the informatization of academic societies, and distributed the system to academic societies for free since 2001. KISTI-ACOMS is a web-based system that automates the full process of academic paper review and journal publication and circulation for academic societies. KISTI have analyzed academic societies' demands for a paper review system for last three years and, after a thorough redesign and implementation, released KISTI-ACOMS 2.0 in september 2005. recently, there are many societies requesting the online paper review system for the informatization of their societies. korean academy of child health Nursing has decided to introduce KISTI-ACOMS 2.0 to meet current trends and KISTI customized KISTI-ACOMS 2.0 to reflect configuration and paper review process of Korean Academy of Child Health Nursing. This Paper investigates the functions of KISTI-ACOMS customized for the korea academy of child health nursing and describes necessary features for the future online paper review system.

  • PDF

A Strategy for Multi-target Paths Coverage by Improving Individual Information Sharing

  • Qian, Zhongsheng;Hong, Dafei;Zhao, Chang;Zhu, Jie;Zhu, Zhanggeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5464-5488
    • /
    • 2019
  • The multi-population genetic algorithm in multi-target paths coverage has become a top choice for many test engineers. Also, information sharing strategy can improve the efficiency of multi-population genetic algorithm to generate multi-target test data; however, there is still space for some improvements in several aspects, which will affect the effectiveness of covering the target path set. Therefore, a multi-target paths coverage strategy is proposed by improving multi-population genetic algorithm based on individual information sharing among populations. It primarily contains three aspects. Firstly, the behavior of the sub-population covering corresponding target path is improved, so that it can continue to try to cover other sub-paths after covering the current target path, so as to take full advantage of population resources; Secondly, the populations initialized are prioritized according to the matching process, so that those sub-populations with better path coverage rate are executed firstly. Thirdly, for difficultly-covered paths, the individual chromosome features which can cover the difficultly-covered paths are extracted by utilizing the data generated, so as to screen those individuals who can cover the difficultly-covered paths. In the experiments, several benchmark programs were employed to verify the accuracy of the method from different aspects and also compare with similar methods. The experimental results show that it takes less time to cover target paths by our approach than the similar ones, and achieves more efficient test case generation process. Finally, a plug-in prototype is given to implement the approach proposed.

A Study on Planning & Implementation of the Multimedia Meta Database and Digital Library's Integrated Information System for the Oceanographic Information Center (해양전문정보센터의 멀티미디어 메타데이터베이스 및 디지털도서관 통합정보시스템 구현에 관한 연구)

  • Han, Jong-Yup;Choi, Young-Jun
    • Journal of the Korean Society for information Management
    • /
    • v.21 no.4 s.54
    • /
    • pp.5-26
    • /
    • 2004
  • A literature analysis for the planning and realization of the multimedia meta database and digital library's integrated information system was carried out to establish the various oceanographic resources in the Oceanographic Information Center, the first in Korea. The study targeted from printed matter, network resources, full-text and to VOD. The focus of the analysis lies in the providing practical integrated information retrieval service for oceanographic resources based on the framework of effective MODS metadata with network resources description. The analyses included oceanographic resources, multimedia information processing, MODS metadata descriptive elements, metadata classification, system organization, and retrieval for planning and implementation of the multimedia meta database system.

Designing Researcher Information Retrieval Interface based on Ontological Analysis (온톨로지 기반의 연구자정보 검색 인터페이스 설계)

  • Seo, Eun-Gyoung;Park, Mi-Hyang
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.2
    • /
    • pp.173-194
    • /
    • 2009
  • Recently, semantic search techniques which are based on information space as consisting of nonambiguous, non-redundant, formal pieces of ontological knowledge have been developed so that users do exploit large knowledge bases. The purpose of the study is to design more user-friendly and smarter retrieval interface based on ontological analysis, which can provide more precise information by reducing semantic ambiguity or more rich linked information based on well-defined relationships. Therefore, this study, first of all, focuses on ontological analysis on researcher information as selecting descriptive elements, defining classes and properties of descriptive elements, and identifying relationships between the properties and their restriction between relationships. Next, the study designs the prototypical retrieval interface based on ontology-based representation, which supports to semantic searching and browsing regarding researchers as a full-fledged domain. On the proposed retrieval interface, users can search various facts for researcher information such as research outputs or the personal information, or carrier history and browse the social connection of the researchers such as researcher group that is lecturing or researching on the same subject or involving in the same intellectual communication.

Current Status of Information Security against Cyber Attacks in Universities and Its Improvement Methods (사이버 공격에 대비한 대학의 정보보안 현황 및 개선 방안)

  • Kang, Young-Sun;Choi, Yeong-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.215-225
    • /
    • 2011
  • This paper suggests several methods of improving information securities of universities through the investigations of the current status of information securities in universities, which is becoming a hot topic in knowledge and information societies. In this paper, universities were randomly selected according to their size, and surveyed through email questionnaire to the persons in charge of security in each university, and 27 universities and 18 colleges were replied. From the survey results we confirmed that the pre-prevention is the most important thing in securing information assets, also in universities, and, in this paper, systematic support must be strengthened to establish a comprehensive security management policy and guidelines for the universities, and the importance of information assets and the necessity of security needs to be shared with the members in the universities. Moreover there must be full administrative and financial support, including recruitment and training of information security professionals and the establishing a separate security division.

A Study on Improvement and Analysis of Beauty Information in KOREA (우리나라 미용 정보화에 대한 분석과 개선에 관한 연구)

  • Park Dae-woo;Kang Nam-soon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.13-25
    • /
    • 2004
  • In this paper, We would research and analysis for actual beauty information condition in Korea on the end of July 2004. We make an investigation into 3 beauty subject that Web service were operated by 100% regular school education. 15.5% Private school in 363 teaching institutions, 8.74% of 767 material dealers, 0.38% of 77,546 beauty salons. There are 12 companies of client management program and 3 hair changing programs. It bring to be few of technical beauty information data and creature value added that lack of full-time lecturer, according1y, KBMC and Ministry of Health & Welfare would constitute beauty information commit that make connection of each 3 beauty subjects and web database for technical beauty information data. As a result of unification and communization for beauty information system. It should be take synergy effect for Korean Beauty.

  • PDF

A Study on the Privacy Literacy Level Measurement for the Proper Exercise of the Right to Informational Self-Determination (올바른 개인정보자기결정권 행사를 위한 프라이버시 리터러시 수준 측정에 관한 연구)

  • Park, Hyang-mi;Yoo, Ji-Yeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.501-522
    • /
    • 2016
  • In the digital era, information is a source of value creation. However, the growing importance of knowledge and information also increases risks and threats. When information is leaked, full recovery is difficult, and additional spreading of risk is high because it is easy to accomplish. Especially personal information is the main target due to its availability. Although individuals normally have to consent to the use of their personal information, they often do not know the use of their information. In such a difficult situation, one must exercise self-determination and privacy. Therefore, the goal of this study is to development a privacy literacy level measurement model for the proper exercise of the right to informational self-determination. It will be presented with the concept of privacy literacy index in order to determine the level of knowledge and understanding and practical application skills for individual. Through the index, we going to enhance the selection ability of information subject, and to promote the judgement and the determination capability for the protection and utilization of personal information.