• Title/Summary/Keyword: use for information

Search Result 27,363, Processing Time 0.049 seconds

An Study on the Performance of the Concept-Based Information Retrieval Model Using a Relation of Thesaurus (개념기반 검색을 위한 시소러스 관계의 효과적 활용방안에 관한 연구)

  • 노영희
    • Journal of the Korean Society for information Management
    • /
    • v.17 no.4
    • /
    • pp.47-65
    • /
    • 2000
  • This study aims lo enhance the perfor~nance 01 concept-based information retr~eval through the use of the lraditional thesaurus which, clearly delmes relalions among terms. To achwe lhls, thc study purports to construcl relation-value-based, relalion-bad, and inlegated kumwledge bases tluough the use ol ihc lhcsau~ub. To cornpale and a~alyze retrieval perlor~nance among knowledge bases, two methods weue al~plied. Sequential bnb algorithm is ap~lied to the I-clation-ualue-based and intzgralcd knowledge base while heuristic bnb algorithm is applied to the relal~on-based knowlcdgc base.

  • PDF

The Impact of Social Influence on Information Systems Adoption: An Extension to the Technology Acceptance Model (사회적 영향이 정보 시스템 수용에 미치는 영향: 정보기술수용모형(Technology Acceptance)에서)

  • Yang, Hee-Dong;Choi, In-Young
    • Asia pacific journal of information systems
    • /
    • v.11 no.3
    • /
    • pp.165-184
    • /
    • 2001
  • Despite many numbers of studies in Technology Acceptance Model(TAM), the social influence construct has not been recognized, nor handled clearly. This study includes the social influence construct in TAM and tests the robustness of the model for different information systems contexts: office automation(spreadsheet) and Internet(WWW) usage. Study findings include that 1) social influence has a direct impact on the usage of spreadsheet, but not on Internet(WWW) usage, and 2) social influence has a stronger indirect impact on IS use through perceived ease of use than through perceived usefulness(for both Internet and spreadsheet).

  • PDF

Efficient Channel Assignment Scheme Based on Finite Projective Plane Theory

  • Chen, Chi-Chung;Su, Ing-Jiunn;Liao, Chien-Hsing;Woo, Tai-Kuo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.628-646
    • /
    • 2016
  • This paper proposes a novel channel assignment scheme that is based on finite projective plane (FPP) theory. The proposed scheme involves using a Markov chain model to allocate N channels to N users through intermixed channel group arrangements, particularly when channel resources are idle because of inefficient use. The intermixed FPP-based channel group arrangements successfully related Markov chain modeling to punch through ratio formulations proposed in this study, ensuring fair resource use among users. The simulation results for the proposed FPP scheme clearly revealed that the defined throughput increased, particularly under light traffic load conditions. Nevertheless, if the proposed scheme is combined with successive interference cancellation techniques, considerably higher throughput is predicted, even under heavy traffic load conditions.

A Study on the Effective Use of NEIS using Fuzzy AHP Technique (Fuzzy AHP 기법을 이용한 NEIS의 효과적 활용방안에 관한 연구)

  • Seo, Kwang-Kyu;Kim, Won-Ki
    • Journal of the Korea Safety Management & Science
    • /
    • v.10 no.1
    • /
    • pp.67-73
    • /
    • 2008
  • National Education Information System (NEIS) is an ambitious reform project that can improve the competitiveness and performance of education field and to link administrational work of between schools and their senior administration offices via internet. NEIS is introduced to lighten the teachers' overburden, to standardize the work process and to bring better quality education to each classroom and make it possible for those involved in education to resolve any related educational problem on line. This paper aims to construct a hierarchy model consisting of key factors such as technological and administrative factors for the effective use of NEIS and to evaluate the relative importance among key factors using fuzzy AHP technique included fuzzy concepts. Eventually, the analysis results can be utilized to develop the future improvement strategy of NEIS and to satisfy the users.

Application of Self-Organizing Map and Association Rule Mining for Personalization of Product Recommendations

  • Cho, Yeong-Bin;Cho, Yoon-Ho;Kim, Soung-Hie
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2004.11a
    • /
    • pp.331-339
    • /
    • 2004
  • The preferences of customers change over time. However, existing collaborative filtering (CF) systems are static, since they only incorporate information regarding whether a customer buys a product during a certain period and do not make use of the purchase sequences of customers. Therefore, the quality of the recommendations of the typical CF could be improved through the use of information on such sequences. In this paper, we propose a new methodology for enhancing the quality of CF recommendation that uses customer purchase sequences. The proposed methodology is applied to a large department store in Korea and compared to existing CF techniques. Various experiments using real-world data demonstrate that the proposed methodology provides higher quality recommendations than do typical CF techniques, with better performance, especially with regard to heavy users.

  • PDF

Analysis of Web Site Usability for Interface Improvement Using T-Model Procedure

  • Abdulhak, Sami Abduljalil;Kang, Dae-Ki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.192-194
    • /
    • 2011
  • With the huge tendency of users toward online web sites, many issues regarding the user behavior interacting with these websites are yet still underestimated and not addressed in all aspects from software developers or business organizations. In this paper, we solely focus on the usability analysis of social network websites to enhance and improve the use of these social websites for more effective and motivational interaction. We use T-Model procedure as a mechanism of this research. Subjects with variation of expertise are contributed to the research of this paper. Minor quantitative analysis will be employed to test the hypothetical of this research in the further research. Result and its implications will be discussed profoundly at the end of this research.

  • PDF

Measuring Acceptance Levels of Webcast-Based E-Learning to Improve Remote Learning Quality Using Technology Acceptance Model

  • Satmintareja;Wahyul Amien Syafei;Aton Yulianto
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.1
    • /
    • pp.23-32
    • /
    • 2024
  • This study aims to improve the quality of distance learning by developing webcast-based e-learning media and integrating it into an e-learning platform for functional job training purposes at the National Research and Innovation Agency, Indonesia. This study uses a Technology Acceptance Model (TAM) to assess and predict user perceptions of information systems using webcast platforms as an alternative to conventional applications. The research method was an online survey using Google Forms. Data collected from 136 respondents involved in practical job training were analyzed using structural equation modeling to test the technology acceptance model. The results showed that the proposed model effectively explained the variables associated with the adoption of web-based e-learning during the COVID-19 pandemic in Indonesia for participants engaged in functional job training. These findings suggest that users' perceptions of ease of use, usefulness, benefits, attitudes, intentions, and webcast usage significantly contribute to the acceptance and use of a more effective and efficient webcast-based e-learning platform.

Industrial Waste Database Analysis Using Data Mining Techniques

  • Cho, Kwang-Hyun;Park, Hee-Chang
    • Journal of the Korean Data and Information Science Society
    • /
    • v.17 no.2
    • /
    • pp.455-465
    • /
    • 2006
  • Data mining is the method to find useful information for large amounts of data in database. It is used to find hidden knowledge by massive data, unexpectedly pattern, and relation to new rule. The methods of data mining are decision tree, association rules, clustering, neural network and so on. We analyze industrial waste database using data mining technique. We use k-means algorithm for clustering and C5.0 algorithm for decision tree and Apriori algorithm for association rule. We can use these outputs for environmental preservation and environmental improvement.

  • PDF

A study on synthetical user interface for books and non-book information materials (비도서.도서정보시스템을 위한 통합 이용자 인터페이스 연구)

  • 김태승
    • Journal of the Korean Society for information Management
    • /
    • v.14 no.1
    • /
    • pp.207-222
    • /
    • 1997
  • This study is aimed at design and implementation of data format for non-book materials in the field of library user interface. The ba-sic data elements were complied with KORMARC and some amend-ments with detailed expansions were applied for development of the use of at libraries. The data formats of various types of media such as books, audio materials, image data, pamphlets, posters which stored in art library were designed respectively through the use of Graphical User Interface.

  • PDF

Semantics-aware Obfuscation for Location Privacy

  • Damiani, Maria Luisa;Silvestri, Claudio;Bertino, Elisa
    • Journal of Computing Science and Engineering
    • /
    • v.2 no.2
    • /
    • pp.137-160
    • /
    • 2008
  • The increasing availability of personal location data pushed by the widespread use of location-sensing technologies raises concerns with respect to the safeguard of location privacy. To address such concerns location privacy-preserving techniques are being investigated. An important area of application for such techniques is represented by Location Based Services (LBS). Many privacy-preserving techniques designed for LBS are based on the idea of forwarding to the LBS provider obfuscated locations, namely position information at low spatial resolution, in place of actual users' positions. Obfuscation techniques are generally based on the use of geometric methods. In this paper, we argue that such methods can lead to the disclosure of sensitive location information and thus to privacy leaks. We thus propose a novel method which takes into account the semantic context in which users are located. The original contribution of the paper is the introduction of a comprehensive framework consisting of a semantic-aware obfuscation model, a novel algorithm for the generation of obfuscated spaces for which we report results from an experimental evaluation and reference architecture.