• Title/Summary/Keyword: 삭제 검증

Search Result 156, Processing Time 0.021 seconds

Model Design and Proposal for the Development of a Learning Status Diagnostic Tool at a Christian University (기독교 대학에서의 학습 상황 진단 도구 개발을 위한 모형 설계 및 제안)

  • Lee, Seong Ah;Kwon, Kyoung Man
    • Journal of Christian Education in Korea
    • /
    • v.61
    • /
    • pp.203-232
    • /
    • 2020
  • The purpose of this study was to analyze various factors that influence the academic life of students through a theoretical review. As a result of the analysis, sub-factors were derived to diagnose the factors. From the study's findings, principles and models for developing learning status diagnosis tools were designed. The study first, based upon the competencies of university students, university life, students' low academic achievement, and academic probation studies, confirmed what factors affect student learning and from them derived a set of sub-factors. The setting dimension was divided into psychology, learning, and career factors, while also including a factor of faith for Christian university students. Next, in the draft model, sub-factors were constructed for each factor: faith maturity and faith training in the faith factor, positive thinking, emotion regulation, and self-esteem in the psychology factor, self-directed learning ability, learning motivation, and learning strategies in the learning factor, and career reflection, career exploration, career management, and career barriers in the career factor. By using the Delphi method, the final model of learning status diagnosis was confirmed. As a result, we completed the model comprised of nine sub-factors in four parts. A follow-up study should be conducted that examines learning status diagnosis tools development research.

A Study on the Prediction of Turbidity near the Confluence of Banbyeoncheon by Using the KU-RLMS Model (KU-RLMS 모형을 이용한 반변천 합류부 탁도 예측에 관한 연구)

  • Lim, Ji-Hyun;Lee, Nam-Joo;Lyu, Si-Wan;Yeo, Hong-Koo
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.1214-1218
    • /
    • 2007
  • 댐 하류로 탁수를 선택적으로 배제하기 위해서는 방류 탁수가 하류에 미치는 영향을 정확히 예측할 수 있는 하천 탁도 예측 및 관리시스템 구축이 필요하다. 낙동강과 반변천의 합류부에서의 이차원적인 혼합에 관한 수치해석 결과는 완전혼합을 가정하는 일차원 수질모델링의 초기 입력자료에 사용됨으로써 낙동강 본류 전체구간의 탁도 모의결과의 정확성을 높이는 데 사용될 수 있다. 본 연구는 낙동강의 중상류에 위치한 반변천 합류부에 평면 이차원 비정상 수치모형인 KU-RLMS 모형을 적용하여 탁도 변화 특성을 규명할 목적으로 수행하였다. KU-RLMS 모형은 하천 및 저수지의 국부적인 수리, 수질, 유사이동 해석을 위해 개발된 평면 이차원 비정상 수치모형이다. 직사각형 격자를 사용하는 유한차분법의 단점을 보완하기 위해, 수심적분된 2차원 연속방정식, 운동량방정식, 이송확산방정식을 불규칙한 경계를 현실적으로 모사할 수 있는 직교곡선 좌표계로 변환한 방정식을 사용한다. 이 모형은 흐름, 농도, 지형변화를 조합하여 계산할 수 있는 모형으로서 점착성 및 비점착성 유사의 이동을 모의할 수 있다. 수치모형 적용을 위한 현황분석으로 안동 및 임하 조정지댐의 방류량, 안동 수위관측소의 수위, 법흥교 및 포진교 지점의 탁도 자료를 분석하였다. 이송확산모형의 보정을 위해, 안동대교 지점의 탁도 횡분포 측정 자료를 사용하여 확산계수에 대한 매개변수 추정 및 검증을 수행하였다. 또한, 안동조정지댐과 임하조정지댐의 방류량 및 방류탁도을 고려하여 수치모의조건을 결정하였으며, 각 조건에 대한 탁도 변화 특성을 분석하였다.된 주변국이 될 수밖에 없을 것이다. 21세기 문화산업에서 우리가 판단하게 될 디자인의 가치는 계몽의 원리에 대한 '역사성'과 '현재성'의 변증법에 달려있는 것이며, 새로운 철학, 새로운 문명, 새로운 세계를 열어가는 것이다.r$ (地理志)에는 추현리와 이미 외리를 언급하면서 상주의 자기제작의 위상을 짐작하는 기록이 언급되면서 전국의 상품의 절반을 담당하고 있었음을 알 수 있었다. $\ulcorner$경상도지리지$\lrcorner$(慶尙道地理志)에는 상주가 8곳으로 1/3의 자기 생산을 담당하고 있었다. $\ulcorner$경상도지리지$\lrcorner$(慶尙道地理志)에는 $\ulcorner$세종실록$\lrcorner$(世宗實錄) $\ulcorner$지리지$\lrcorner$(地理志)와 동년대에 동일한 목적으로 찬술되었음을 알 수 있다. $\ulcorner$경상도실록지리지$\lrcorner$(慶尙道實錄地理志)에는 $\ulcorner$세종실록$\lrcorner$(世宗實錄) $\ulcorner$지리지$\lrcorner$(地理志)와의 비교를 해보면 상 중 하품의 통합 9개소가 삭제되어 있고, $\ulcorner$동국여지승람$\lrcorner$(東國與地勝覽) 에서는 자기소와 도기

  • PDF

IT 업체정보검색시스템에서 동의어 처리 기법

  • 강옥선;이현철;조완섭
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2001.05a
    • /
    • pp.105-106
    • /
    • 2001
  • 일반적인 정보 검색은 색인어를 통해 이루어지는데 이런 경우 사용자는 정보를 검색하기 위해 데이터베이스에 저장된 정보들이 가지고 있는 색인어를 정확하게 입력해야 한다. 그러나 일반 사용자가 색인어를 정확하게 입력하기는 어렵고, 특히 찾고자 하는 분야가 전문 분야에서 사용되는 용어일 때는 더욱 그러하다. 이럴 때 시소러스와 같은 지식구조를 이용해서 색인어를 탐색하여 검색의 효율을 높일 수 있다. 최근 들어 정보기술 분야의 연구가 활발함에 따라 정보자로의 생산이 급격히 증가하고 이를 관련 주제 분야의 연구정보로 활용하는 경우가 증가하고 있다. 따라서 IT 분야의 정보를 관리할 수 있는 시스템의 개발이 시급하다. 또한 IT 분야와 같은 전문분야일 때 검색 시스템에서 사용할 용어의 관리에 대한 연구의 필요성이 증가하고 있다. 본 논문에서는 IT분야의 정보를 검색할 수 있는 IT 업체정보검색시스템에서 정보 검색시에 생기는 용어간의 불일치 문제를 해결하고, 각 용어들간의 계층 관계를 나타내어 정보 검색시 검색어의 확장을 도울 수 있는 용어 관리 시스템의 구조를 제안하고 그에 대한 검색 알고리즘을 제시한다. 제안된 구조는 사용자의 검색어에 대한 동의어 관계나 상위어, 하위어 등의 계층 관계를 파악하여 검색의 범위에 추가함으로써 검색 효율을 높일 수 있다. 또한 새로운 용어의 생성이나 삭제와 같은 연산이 발생했을 때 시스템을 동적으로 확장할 수 있도록 구현하였다. 제안된 시스템은 단어간의 계층 구조를 효율적으로 검색하기 위하여 객체-관계형 데이터베이스를 사용하였다. 또한 메모리 상주 DBMS를 사용하여 많은 사용자들이 동시에 접근하는 환경에서도 빠른 검색 성능을 유지할 수 있도록 하였다. 제시된 방법은 정보기술 분야뿐만 아니라 다른 전문용어 분야의 연구로도 그 범위를 확장 할 수 있다.자기자본비용의 조합인 기회자본비용으로 할인함으로써 현재의 기업가치를 구할 수 있기 때문이다. 이처럼 기업이 영업활동이나 투자활동을 통해 현금을 창출하고 소비하는 경향은 해당 비즈니스 모델의 성격을 규정하는 자료도로 이용될 수 있다. 또한 최근 인터넷기업들의 부도가 발생하고 있는데, 기업의 부실원인이 어떤 것이든 사회전체의 생산력의 감소, 실업의 증가, 채권자 및 주주의 부의 감소, 심리적 불안으로 인한 경제활동의 위축, 기업 노하우의 소멸, 대외적 신용도의 하락 등과 같은 사회적·경제적 파급효과는 대단히 크다. 이상과 같은 기업부실의 효과를 고려할 때 부실기업을 미리 예측하는 일종의 조기경보장치를 갖는다는 것은 중요한 일이다. 현금흐름정보를 이용하여 기업의 부실을 예측하면 기업의 부실징후를 파악하는데 그치지 않고 부실의 원인을 파악하고 이에 대한 대응 전략을 수립하며 그 결과를 측정하는데 활용될 수도 있다. 따라서 본 연구에서는 기업의 부도예측 정보 중 현금흐름정보를 통하여 '인터넷기업의 미래 현금흐름측정, 부도예측신호효과, 부실원인파악, 비즈니스 모델의 성격규정 등을 할 수 있는가'를 검증하려고 한다. 협력체계 확립, ${\circled}3$ 전문인력 확보 및 인력구성 조정, 그리고 ${\circled}4$ 방문보건사업의 강화 등이다., 대사(代謝)와 관계(關係)있음을 시사(示唆)해 주고 있다.ble nutrient (TDN) was highest in booting stage (59.7%); however no significant difference was found among other stages. The concentrations of Ca and P were not different among mature stages. Accordi

  • PDF

The effect of cafe mobile apps' service convenience on perceived value and re-use intention (카페 모바일 애플리케이션의 서비스 편의성이 지각된 가치 및 재이용 의도에 미치는 영향)

  • Zhao, Jia;Kim, Yeonggil;Kim, Soowook
    • Journal of Service Research and Studies
    • /
    • v.9 no.2
    • /
    • pp.41-54
    • /
    • 2019
  • The increasing use of mobile applications is a phenomenon that has recently come to be beneficial to people in their private life due to increased income and changes in life style. In particular, analyzing customers' consumer sentiment can be seen as a pursuit form of convenience that enables efficient use of time and effort. In this study, based on previous studies, we examine the causal relation model that influences reuse intention, which is a dependent variable through perceived value as a parameter by measuring the service convenience for cafe mobile application. In order to accomplish purpose of this study, references related to service convenience, perceived value, and reuse intention were reviewed as literature research methods. For the empirical study, the research was carried out through Macro Mill Embrain Co., Ltd. Online research was conducted for one week from October 26 to November 8, 2018. There are 13 items of the collected data were excluded and 324 items suitable for irradiation were used. Study results show that service convenience of cafe mobile application has a positive effect on perceived value and reuse intention. In addition, in the relationship that cafe mobile app's service convenience has a significant (+) influence on reuse intention, perceived value proved to have meaningful results as intermediary roles. Implications of this study are as follows. First of all, this study will be helpful for cafe companies and consumers if utilize the service convenience of cafe mobile application in perceived value and reuse intention in marketing applications. Therefore, theoretically, we propose the development direction of cafe mobile application and present academic data for marketing strategy innovation and competitive advantage in the food service industry that conforms to the fourth industrial revolution era.

An APK Overwrite Scheme for Preventing Modification of Android Applications (안드로이드 앱 변조 방지를 위한 APK 덮어쓰기 기법)

  • Choi, Byungha;Shim, HyungJoon;Lee, ChanHee;Cho, Sangwook;Cho, Seong-Je
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.5
    • /
    • pp.309-316
    • /
    • 2014
  • It is easy to reverse engineer an Android app package file(APK) and get its decompiled source code. Therefore, attackers obtains economic benefits by illegally using the decompiled source code, or modifies an app by inserting malware. To address these problems in Android, we propose an APK overwrite scheme that protects apps against illegal modification of themselves by using a new anti-reverse engineering technique. In this paper, the targets are the apps which have been written by any programmer. For a target app (original app), server system (1) makes a copy of a target app, (2) encrypts the target app, (3) creates a stub app by replacing the DEX (Dalvik Executable) of the copied version with our stub DEX, and then (4) distributes the stub app as well as the encrypted target app to users of smartphones. The users downloads both the encrypted target app and the corresponding stub app. Whenever the stub app is executed on smartphones, the stub app and our launcher app decrypt the encrypted target app, overwrite the stub app with the decrypted target one, and executes the decrypted one. Every time the target app ends its execution, the decrypted app is deleted. To verify the feasibility of the proposed scheme, experimentation with several popular apps are carried out. The results of the experiment demonstrate that our scheme is effective for preventing reverse engineering and tampering of Android apps.

Robust Vision Based Algorithm for Accident Detection of Crossroad (교차로 사고감지를 위한 강건한 비젼기반 알고리즘)

  • Jeong, Sung-Hwan;Lee, Joon-Whoan
    • The KIPS Transactions:PartB
    • /
    • v.18B no.3
    • /
    • pp.117-130
    • /
    • 2011
  • The purpose of this study is to produce a better way to detect crossroad accidents, which involves an efficient method to produce background images in consideration of object movement and preserve/demonstrate the candidate accident region. One of the prior studies proposed an employment of traffic signal interval within crossroad to detect accidents on crossroad, but it may cause a failure to detect unwanted accidents if any object is covered on an accident site. This study adopted inverse perspective mapping to control the scale of object, and proposed different ways such as producing robust background images enough to resist surrounding noise, generating candidate accident regions through information on object movement, and by using edge information to preserve and delete the candidate accident region. In order to measure the performance of proposed algorithm, a variety of traffic images were saved and used for experiment (e.g. recorded images on rush hours via DVR installed on crossroad, different accident images recorded in day and night rainy days, and recorded images including surrounding noise of lighting and shades). As a result, it was found that there were all 20 experiment cases of accident detected and actual effective rate of accident detection amounted to 76.9% on average. In addition, the image processing rate ranged from 10~14 frame/sec depending on the area of detection region. Thus, it is concluded that there will be no problem in real-time image processing.

A Link-Label Based Node-to-Link Optimal Path Algorithm Considering Non Additive Path Cost (비가산성 경로비용을 반영한 링크표지기반 Node-to-Link 최적경로탐색)

  • Lee, Mee Young;Nam, Doohee
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.5
    • /
    • pp.91-99
    • /
    • 2019
  • Existing node-to-node based optimal path searching is built on the assumption that all destination nodes can be arrived at from an origin node. However, the recent appearance of the adaptive path search algorithm has meant that the optimal path solution cannot be derived in node-to-node path search. In order to reflect transportation data at the links in real-time, the necessity of the node-to-link (or link-to-node; NL) problem is being recognized. This research assumes existence of a network with link-label and non-additive path costs as a solution to the node-to-link optimal path problem. At the intersections in which the link-label has a turn penalty, the network retains its shape. Non-additive path cost requires that M-similar paths be enumerated so that the ideal path can be ascertained. In this, the research proposes direction deletion and turn restriction so that regulation of the loop in the link-label entry-link-based network transformation method will ensure that an optimal solution is derived up until the final link. Using this method on a case study shows that the proposed method derives the optimal solution through learning. The research concludes by bringing to light the necessity of verification in large-scale networks.

Rule-base Expert System for Privacy Violation Certainty Estimation (개인정보유출 확신도 도출을 위한 전문가시스템개발)

  • Kim, Jin-Hyung;Lee, Alexander;Kim, Hyung-Jong;Hwang, Jun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.125-135
    • /
    • 2009
  • Logs from various security system can reveal the attack trials for accessing private data without authorization. The logs can be a kind of confidence deriving factors that a certain IP address is involved in the trial. This paper presents a rule-based expert system for derivation of privacy violation confidence using various security systems. Generally, security manager analyzes and synthesizes the log information from various security systems about a certain IP address to find the relevance with privacy violation cases. The security managers' knowledge handling various log information can be transformed into rules for automation of the log analysis and synthesis. Especially, the coverage of log analysis for personal information leakage is not too broad when we compare with the analysis of various intrusion trials. Thus, the number of rules that we should author is relatively small. In this paper, we have derived correlation among logs from IDS, Firewall and Webserver in the view point of privacy protection and implemented a rule-based expert system based on the derived correlation. Consequently, we defined a method for calculating the score which represents the relevance between IP address and privacy violation. The UI(User Interface) expert system has a capability of managing the rule set such as insertion, deletion and update.

Validation of the Korean Version of the Lesbian, Gay, and Bisexual Identity Scale (한국판 동성애자/양성애자 다차원 정체성 척도 타당화)

  • Lee, Sojeong;Kim, Eunha
    • Korean Journal of Culture and Social Issue
    • /
    • v.28 no.2
    • /
    • pp.133-161
    • /
    • 2022
  • The purpose of this study was to translate and validate the Lesbian, Gay, and Bisexual Identity Scale(LGBIS), which is a scale measuring the multidimensional identities of sexual minorities. For this, we conducted an exploratory factor analysis using a sample of 201 LGBs(homosexuals and bisexuals). Identical to the original scale, eight factors were extracted from the translated scale(i.e., concealment motivation, identity uncertainty, internalized homonegativity, difficult process, acceptance concerns, identity superiority, identity centrality, and identity affirmation), but one item was removed. In addition, the reliability coefficients of the eight factors except for concealment Motivation were satisfactory. The Confirmatory factor analysis revealed that the 8-factor model had a good fit to the data. Finally, to verify the criterion validity, correlation among each eight factor and the scales measuring the identity related scale and the psychological-functioning scale were analyzed. In conclusion, the Korean version of the LGBIS consists of 8 factors and 26 items in total. Also it was found to be a valid measure for LGBS in Korea as well.

Searching Determination Factors of Dancesports Athlete Performance (댄스스포츠선수의 경기력 결정요인 탐색)

  • Kim, Young-Mee;Seo, Soo-Jin
    • 한국체육학회지인문사회과학편
    • /
    • v.54 no.3
    • /
    • pp.31-43
    • /
    • 2015
  • The purpose of this study was to find out the dance sports athlete's factor that presents performance problems and performance enhancing for competitions. To achieve purpose of study carried out open-ended question and structural inquiry of succession in the dance sports athlete of 25 people, the open-ended questions data were examined through inductive content analysis procedure, conducted preliminary investigation to 100 people. Preliminary investigation and main survey were verified to the dance sports athlete of 137 people through exploratory factor analysis, and confirmatory factor analysis was conducted. On the basis of the results, the conclusions were drawn as follows; First, hinders factors to athletic performance is discord with partner, condition, contest environment, limit of physical strength, limit of economic strength. Second, the measurement scale of dance sports athlete's performance enhancing to competition with 23 items which are consisted of 7 main factors. The determination factors of dance sports athlete performance were partnership, ability to invest, spiritual factors, training factors, ability of physical factors, the leader, environment of competition.