• Title/Summary/Keyword: use for information

Search Result 27,363, Processing Time 0.057 seconds

A Study on the Young Adult's Perceptions and Needs towards the Public Library Space (공공도서관 공간에 대한 청소년의 인식 및 요구 분석)

  • Chi, Sun;Chang, Yunkeum
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.28 no.4
    • /
    • pp.461-480
    • /
    • 2017
  • The purpose of this research is to explore young adults (YA)' perceptions, use, and needs of public libraries, as well as to find out how to make effective YA sections within public libraries. Two public libraries with separate YA sections were selected and a total of 126 YA users participated in the survey. The survey showed 86.5% of participants used the YA section and the main reasons for use were reading for leisure, study area use, and seeking information for school assignments. 64.8% of participants agreed that separate YA sections are needed at public libraries. The areas most in need of improvement were expansion of seats of YA section, lack of digital devices, and expansion of group study and meeting spaces. This research highlights for space composition policy as YA's needs, creating a balanced environment for physical facilities, and YA oriented service. As well, a need for improved opening hours, and expansion of multi-use spaces for seats of the YA section.

Design and Implementation of Management Systems for Software License (소프트웨어 라이선스 관리시스템의 설계 및 구현 : K사 사례를 중심으로)

  • Kang, Yong-Sik;Kwon, Sun-Dong;Ko, Mi-Hyun
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.3_spc
    • /
    • pp.315-331
    • /
    • 2013
  • As the business has been highly informatized, many companies has bought the software for their works. There are two types of software license. One is a site license and the other is a user license. This paper is focused on the user license. User license has the number of the right to use software. So, software managers always need to know the number of licenses in use and should limit the number of software license in use. If someone in the company use a software without license, he will be treated as a piracy. In that case, the company should pay for the settlement cost for the exceeding license use. In this paper, we suggest the model how we can limit the installation of the software within the number of licenses by license management system.

An Empirical Study on the Critical Factors for Successful m-Learning Implementation (성공적인 m-Learning 구현을 위한 핵심 요인에 대한 연구)

  • Whang, Jae-Hoon;Kim, Dong-Hyun
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.3
    • /
    • pp.57-80
    • /
    • 2005
  • This study defined the notion of general idea on m-learning as based upon e-Learning and mobile internet related literature review and identified the m-Learning distinctive features. Also, this study has searched for factors that are expected to influence the use intended for m-Learning from self-regulated learning, which is acknowledged to be a useful method for learning accomplishment in education field, in order to measure the relationship between learners' motivation and use intention. Then it has empirically validated the conceptual model based on Davis' TAM (Technology Acceptance Model) As a result, self-efficacy, self-determination, interest, contents quality, time management, help seeking, and Peer study are factors affecting Perceived usefulness. Also self-efficacy, self-determination, interest, contents qualify, time management, and peer study are factors affecting perceived ease of use. Finally both perceived usefulness and perceived ease of use are significant factors affecting use intention.

  • PDF

Design and Implementation of Applet for Multi-Users File Access based on Java Card (자바카드기반 다중 사용자 파일접근에 대한 애플릿 설계 및 구현)

  • Shin, Sang-Jun;Song, Young-Sang;Shin, In-Chul
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1201-1204
    • /
    • 2005
  • Whereas conveniences deriving from the development of information and telecommunication technology increase, information outflow and illegal data use are also rapidly on the rise. Consequently, many studies to prevent illegal information outflow are currently under way, and the use of Smart Card is in steep jump. Recently, Java Card is diffused fast as an alternative to complement the technical problems of the Smart Card. This paper designed and materialized the system for multi-users authentication and file access control by user through designing a Java Card applet that is used for information protection and in various application fields. For allowing a file access competence, each user's file access competence is processed via drawing up the access condition table in the applet. Therefore, illegal correction, exposure and destruction of information, which become the concerns when multi-users have an access, can be prevented. In addition, its application becomes possible in the system requiring multi-users certifications.

  • PDF

A Suggestion for Future Public Libraries (미래의 공공도서관을 위한 제언)

  • Kwak Chul-Wan
    • Journal of Korean Library and Information Science Society
    • /
    • v.35 no.3
    • /
    • pp.65-78
    • /
    • 2004
  • The purpose of this study is to suggest for future public libraries in the knowledge information society. The development of Internet requires to change the role of information service in public libraries, and the change of social circumstance requires the role of public libraries as cultural spaces. For the future public libraries, the suggestions are that public libraries provide an instruction for users in order to got information through Internet. Next, public libraries provide comfortable safe, luxury space in order to create regional culture so that users can get experience high culture, and use the space as cultural living zone.

  • PDF

Transfer Learning based on Adaboost for Feature Selection from Multiple ConvNet Layer Features (다중 신경망 레이어에서 특징점을 선택하기 위한 전이 학습 기반의 AdaBoost 기법)

  • Alikhanov, Jumabek;Ga, Myeong Hyeon;Ko, Seunghyun;Jo, Geun-Sik
    • Annual Conference of KIPS
    • /
    • 2016.04a
    • /
    • pp.633-635
    • /
    • 2016
  • Convolutional Networks (ConvNets) are powerful models that learn hierarchies of visual features, which could also be used to obtain image representations for transfer learning. The basic pipeline for transfer learning is to first train a ConvNet on a large dataset (source task) and then use feed-forward units activation of the trained ConvNet as image representation for smaller datasets (target task). Our key contribution is to demonstrate superior performance of multiple ConvNet layer features over single ConvNet layer features. Combining multiple ConvNet layer features will result in more complex feature space with some features being repetitive. This requires some form of feature selection. We use AdaBoost with single stumps to implicitly select only distinct features that are useful towards classification from concatenated ConvNet features. Experimental results show that using multiple ConvNet layer activation features instead of single ConvNet layer features consistently will produce superior performance. Improvements becomes significant as we increase the distance between source task and the target task.

Efficient K-Anonymization Implementation with Apache Spark

  • Kim, Tae-Su;Kim, Jong Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.17-24
    • /
    • 2018
  • Today, we are living in the era of data and information. With the advent of Internet of Things (IoT), the popularity of social networking sites, and the development of mobile devices, a large amount of data is being produced in diverse areas. The collection of such data generated in various area is called big data. As the importance of big data grows, there has been a growing need to share big data containing information regarding an individual entity. As big data contains sensitive information about individuals, directly releasing it for public use may violate existing privacy requirements. Thus, privacy-preserving data publishing (PPDP) has been actively studied to share big data containing personal information for public use, while preserving the privacy of the individual. K-anonymity, which is the most popular method in the area of PPDP, transforms each record in a table such that at least k records have the same values for the given quasi-identifier attributes, and thus each record is indistinguishable from other records in the same class. As the size of big data continuously getting larger, there is a growing demand for the method which can efficiently anonymize vast amount of dta. Thus, in this paper, we develop an efficient k-anonymity method by using Spark distributed framework. Experimental results show that, through the developed method, significant gains in processing time can be achieved.

An Efficient Comparing and Updating Method of Rights Management Information for Integrated Public Domain Image Search Engine

  • Kim, Il-Hwan;Hong, Deok-Gi;Kim, Jae-Keun;Kim, Young-Mo;Kim, Seok-Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.57-65
    • /
    • 2019
  • In this paper, we propose a Rights Management Information(RMI) expression systems for individual sites are integrated and the performance evaluation is performed to find out an efficient comparing and updating method of RMI through various image feature point search techniques. In addition, we proposed a weighted scoring model for both public domain sites and posts in order to use the most latest RMI based on reliable data. To solve problem that most public domain sites are exposed to copyright infringement by providing inconsistent RMI(Rights Management Information) expression system and non-up-to-date RMI information. The weighted scoring model proposed in this paper makes it possible to use the latest RMI for duplicated images that have been verified through the performance evaluation experiments of SIFT and CNN techniques and to improve the accuracy when applied to search engines. In addition, there is an advantage in providing users with accurate original public domain images and their RMI from the search engine even when some modified public domain images are searched by users.

A Novel Transfer Learning-Based Algorithm for Detecting Violence Images

  • Meng, Yuyan;Yuan, Deyu;Su, Shaofan;Ming, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.1818-1832
    • /
    • 2022
  • Violence in the Internet era poses a new challenge to the current counter-riot work, and according to research and analysis, most of the violent incidents occurring are related to the dissemination of violence images. The use of the popular deep learning neural network to automatically analyze the massive amount of images on the Internet has become one of the important tools in the current counter-violence work. This paper focuses on the use of transfer learning techniques and the introduction of an attention mechanism to the residual network (ResNet) model for the classification and identification of violence images. Firstly, the feature elements of the violence images are identified and a targeted dataset is constructed; secondly, due to the small number of positive samples of violence images, pre-training and attention mechanisms are introduced to suggest improvements to the traditional residual network; finally, the improved model is trained and tested on the constructed dedicated dataset. The research results show that the improved network model can quickly and accurately identify violence images with an average accuracy rate of 92.20%, thus effectively reducing the cost of manual identification and providing decision support for combating rebel organization activities.

Deregulation Necessity for the Invigoration of Drone Utilization in the Geospatial Information Field

  • Heo, Joonghyeok;Park, Joonkyu
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.40 no.4
    • /
    • pp.351-357
    • /
    • 2022
  • In this study, a direction for deregulation that can increase the use of drones in the field of spatial information is presented. Regulations and administrative procedures for drone operation showed similar procedures in Japan, the United States, and Korea, such as reporting flight equipment, driver's license, and prohibition of flying within a specific flight zone. In the United States, policies to encourage the use of commercial drones have been implemented, and Japan has slightly tightened regulations on drone operation to protect the Olympics and important national facilities. As a result of the study, in the area where drone operation is restricted for geospatial data construction, Korea was setting the largest area, and GIS analysis showed that Korea's drone flight restricted area was more than 19.4% of the country's land area. In order to increase the utilization of drones in the construction and utilization of spatial information in the future, it is necessary to reset the drone flight restriction zone and reduce the area of the drone flight restriction zone. In addition, it was found that Korea is the only country that has formal and specific regulations on geospatial information security management. In order to increase the construction of geospatial information using drones, it is necessary to ease GSD (Ground Sample Distance)regulations.