• Title/Summary/Keyword: information needs analysis

Search Result 2,542, Processing Time 0.035 seconds

Feature Subset Selection in the Induction Algorithm using Sensitivity Analysis of Neural Networks (신경망의 민감도 분석을 이용한 귀납적 학습기법의 변수 부분집합 선정)

  • 강부식;박상찬
    • Journal of Intelligence and Information Systems
    • /
    • v.7 no.2
    • /
    • pp.51-63
    • /
    • 2001
  • In supervised machine learning, an induction algorithm, which is able to extract rules from data with learning capability, provides a useful tool for data mining. Practical induction algorithms are known to degrade in prediction accuracy and generate complex rules unnecessarily when trained on data containing superfluous features. Thus it needs feature subset selection for better performance of them. In feature subset selection on the induction algorithm, wrapper method is repeatedly run it on the dataset using various feature subsets. But it is impractical to search the whole space exhaustively unless the features are small. This study proposes a heuristic method that uses sensitivity analysis of neural networks to the wrapper method for generating rules with higher possible accuracy. First it gives priority to all features using sensitivity analysis of neural networks. And it uses the wrapper method that searches the ordered feature space. In experiments to three datasets, we show that the suggested method is capable of selecting a feature subset that improves the performance of the induction algorithm within certain iteration.

  • PDF

A Review and Application of Library User Comments Data Analysis Tool: Focused on the LibQUAL+ Survey Comments (도서관 이용자 코멘트 데이터 분석도구 리뷰 및 적용: LibQUAL+ 설문 데이터를 중심으로)

  • Byun, Jeayeon;Shim, Wonsik
    • Journal of the Korean Society for information Management
    • /
    • v.30 no.3
    • /
    • pp.157-181
    • /
    • 2013
  • Using user satisfaction surveys and LibQUAL+ instruments, libraries are increasingly gathering qualitative data such as verbatim user comments as well as quantitative data. Such qualitative data can be utilized as clues in establishing library service strategies: to better understand user issues, to identify areas for service improvement, and to prioritize user needs. For this, it is necessary to analyze user comments data and to apply results to the delivery of service and the library policies. This study is an attempt to investigate ways in which user comments data can be made useful in libraries. It identifies different methods of analyzing user comments data from LibQUAL+ surveys and compares qualitative data analysis software programs and taxonomies. It also presents the results of applying these tools to a subset of actual user comments data gathered from a recent LibQUAL+ survey at a major university library in Korea.

An Analysis of Memory Access Complexity for HEVC Decoder (HEVC 복호화기의 메모리 접근 복잡도 분석)

  • Jo, Song Hyun;Kim, Youngnam;Song, Yong Ho
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.5
    • /
    • pp.114-124
    • /
    • 2014
  • HEVC is a state-of-the-art video coding standard developed by JCT-VC. HEVC provides about 2 times higher subjective coding efficiency than H.264/AVC. One of the main goal of HEVC development is to efficiently coding UHD resolution video so that HEVC is expected to be widely used for coding UHD resolution video. Decoding such high resolution video generates a large number of memory accesses, so a decoding system needs high-bandwidth for memory system and/or internal communication architecture. In order to determine such requirements, this paper presents an analysis of the memory access complexity for HEVC decoder. we first estimate the amount of memory access performed by software HEVC decoder on an embedded system and a desktop computer. Then, we present the memory bandwidth models for HEVC decoder by analyzing the data flow of HEVC decoding tools. Experimental results show the software decoder produce 6.9-40.5 GB/s of DRAM accesses. also, the analysis reveals the hardware decoder requires 2.4 GB/s of DRAM bandwidth.

A Stakeholder Analysis for Understanding Barriers to Resource Sharing (대학도서관의 자원공유의 장벽에 대한 이해관계자 분석)

  • Shim, Won-Sik
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.21 no.2
    • /
    • pp.129-143
    • /
    • 2010
  • There is a recognition that traditional resource sharing methods such as interlibrary lending and document delivery are now inadequate to meet user needs in the increasingly networked environment. The current study identifies barriers to resource sharing and provides analysis of stakeholders engaged in resource sharing. Focused interviews with six professional librarians were also carried out to seek out deeper understanding of perceptions of barriers among librarians. Results show that the size of the library was not necessarily result in active resource sharing. There was a wide gap among librarians in terms of their attitudinal and organizational orientations towards resource sharing. Barriers specifically identified in the study include the narrowly defined notion among librarians of what constitutes research and the untested fear of swamping where there is an imbalance of collections. Overall, while resource sharing is recognized as an integral part of library services, it seriously lacks funding and staff. The study recommends earnest efforts to build librarians' community to invigorate resource sharing among libraries.

Reclassification of the vulnerability group of wartime equipment (군집분석을 이용한 전시장비의 취약성 그룹 재분류)

  • Lee, Hanwoo;Kim, Suhwan;Joo, Kyungsik
    • Journal of the Korean Data and Information Science Society
    • /
    • v.26 no.3
    • /
    • pp.581-592
    • /
    • 2015
  • In the GORRAM, the estimation of resource requirements for wartime equipment is based on the ELCON of the USA. The number of vulnerability groups of ELCON are 22, but unfortunately it is hard to determine how the 22 groups are classified. Thus, in this research we collected 505 types of basic items used in wartime and classified those items into new vulnerability groups using AHP and cluster analysis methods. We selected 11 variables through AHP to classify those items with cluster analysis. Next, we decided the number of vulnerability groups through hierarchical clustering and then we classified 505 types of basic items into the new vulnerability groups through K-means clustering.This paper presents new vulnerability groups of 505 types of basic items fitted to Korean weapon systems. Furthermore, our approach can be applied to a new weapon system which needs to be classified into a vulnerability group. We believe that our approach will provide practitioners in the military with a reliable and rational method for classifying wartime equipment and thus consequentially predict the exact estimation of resource requirements in wartime.

Applicability of Geo-spatial Processing Open Sources to Geographic Object-based Image Analysis (GEOBIA)

  • Lee, Ki-Won;Kang, Sang-Goo
    • Korean Journal of Remote Sensing
    • /
    • v.27 no.3
    • /
    • pp.379-388
    • /
    • 2011
  • At present, GEOBIA (Geographic Object-based Image Analysis), heir of OBIA (Object-based Image Analysis), is regarded as an important methodology by object-oriented paradigm for remote sensing, dealing with geo-objects related to image segmentation and classification in the different view point of pixel-based processing. This also helps to directly link to GIS applications. Thus, GEOBIA software is on the booming. The main theme of this study is to look into the applicability of geo-spatial processing open source to GEOBIA. However, there is no few fully featured open source for GEOBIA which needs complicated schemes and algorithms, till It was carried out to implement a preliminary system for GEOBIA running an integrated and user-oriented environment. This work was performed by using various open sources such as OTB or PostgreSQL/PostGIS. Some points are different from the widely-used proprietary GEOBIA software. In this system, geo-objects are not file-based ones, but tightly linked with GIS layers in spatial database management system. The mean shift algorithm with parameters associated with spatial similarities or homogeneities is used for image segmentation. For classification process in this work, tree-based model of hierarchical network composing parent and child nodes is implemented by attribute join in the semi-automatic mode, unlike traditional image-based classification. Of course, this integrated GEOBIA system is on the progressing stage, and further works are necessary. It is expected that this approach helps to develop and to extend new applications such as urban mapping or change detection linked to GIS data sets using GEOBIA.

Studies on probability extinction of Peregrine falcon species wintering around Jang Hang wetlands in the Han river (겨울철 한강 장항습지에 서식하는 매 멸종확률 예측에 대한 연구)

  • LEE, Sangdon
    • Journal of Wetlands Research
    • /
    • v.18 no.3
    • /
    • pp.282-285
    • /
    • 2016
  • Peregrine falcon (Falco peregrinus) are listed as endangered species and Natural monument #323 in Korea, and this study examined the possibility of extinct of peregrine falcon in Jang Hang wetland near Han river using with the application of Population Viability Analysis (PVA) technique. In Jang Hang wetland areas population was monitored during 1999-2005 averaging 10.8 individuals and PVA analysis was done for the 5 years (2015-2020) using the average population size. Using the initial population was estimated 20% of extinct rate during the time. This estimation was quite low considering water pollution and loss of habitat. Also PVA only used population size lacking in other life history information. Nonetheless falcon population can be in risk of extinction if the current construction of crossovers in the river, cement bank are maintained. Long term information regarding life history needs essential.

A Discriminant Analysis on the User Classification of Mobile Telecommunications Service and HSDPA Service Strategy (다중판별분석을 이용한 이동통신서비스 사용자 분류와 HSDPA 서비스 전략에 관한 연구)

  • Lee, Jun-Yub
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.5
    • /
    • pp.83-92
    • /
    • 2010
  • Along with the advance of industrial technology in mobile telecommunications and diversity in customer needs, today's Korean mobile telecommunication market has rapidly expanded due to stronger competition among businesses as well as increasing the number of subscribers. 3G roll-outs of mobile telecommunications service, so called "HSDPA" has seriously promoted marketing strategies among mobile telecommunication companies which led to move to the next generation customers. Understanding the competitive situation, mobile telecommunications companies are currently focusing on increasing sales per subscriber as well as increasing the number of subscribers as a solution to occupy the leading position in the mobile telecommunications industry in the future. The purpose of this study was to classify the customers in mobile telecommunications service with or without higher tendency of intention to subscribe and use the service using discriminant analysis. Through the discriminant analysis, discriminant function which classifying the critical user has been identified. The result of this study will give useful marketing strategies in competitive HSDPA mobile telecommunications market.

Correspondence Strategy for Big Data's New Customer Value and Creation of Business (빅 데이터의 새로운 고객 가치와 비즈니스 창출을 위한 대응 전략)

  • Koh, Joon-Cheol;Lee, Hae-Uk;Jeong, Jee-Youn;Kim, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.4
    • /
    • pp.229-238
    • /
    • 2012
  • Within last 10 years, internet has become a daily activity, and humankind had to face the Data Deluge, a dramatic increase of digital data (Economist 2012). Due to exponential increase in amount of digital data, large scale data has become a big issue and hence the term 'big data' appeared. There is no official agreement in quantitative and detailed definition of the 'big data', but the meaning is expanding to its value and efficacy. Big data not only has the standardized personal information (internal) like customer information, but also has complex data of external, atypical, social, and real time data. Big data's technology has the concept that covers wide range technology, including 'data achievement, save/manage, analysis, and application'. To define the connected technology of 'big data', there are Big Table, Cassandra, Hadoop, MapReduce, Hbase, and NoSQL, and for the sub-techniques, Text Mining, Opinion Mining, Social Network Analysis, Cluster Analysis are gaining attention. The three features that 'bid data' needs to have is about creating large amounts of individual elements (high-resolution) to variety of high-frequency data. Big data has three defining features of volume, variety, and velocity, which is called the '3V'. There is increase in complexity as the 4th feature, and as all 4features are satisfied, it becomes more suitable to a 'big data'. In this study, we have looked at various reasons why companies need to impose 'big data', ways of application, and advanced cases of domestic and foreign applications. To correspond effectively to 'big data' revolution, paradigm shift in areas of data production, distribution, and consumption is needed, and insight of unfolding and preparing future business by considering the unpredictable market of technology, industry environment, and flow of social demand is desperately needed.

A Study on the Lunch Box Promotion of Convenience Store by Commercial Areas (상권별 편의점 도시락 판매 전략에 관한 연구)

  • Choi, Sung-WooK;Shin, Yong Jae
    • Journal of Digital Convergence
    • /
    • v.17 no.6
    • /
    • pp.77-91
    • /
    • 2019
  • In order to establish a sales strategy for convenience store lunches, this study conducted analysis using association rules based on POS data obtained from convenience stores located in four commercial districts. For this purpose, the data used in the analysis were divided into the time zones from 6:00 am to 8:00 pm, 17:00 pm to 19:00 pm, and the convenience stores according to the commercial areas. As a result of the analysis, it was found that products that were sold together with a lunch box were mainly made of products that could be eaten together with lunch such as milk, beverage, and cotton. However, it was confirmed that there were differences in the types and numbers of the products that were sold together with the lunch boxes of the morning time and the afternoon hours for the other products. These results and approaches are expected to contribute to finding and responding to the needs for goods and services that change as well as convenience stores as well as sociocultural changes.