• Title/Summary/Keyword: 시각화 능력

Search Result 213, Processing Time 0.025 seconds

경제적 세계화와 노인정책

  • Walker, Alan
    • 한국사회복지학회:학술대회논문집
    • /
    • 2002.10b
    • /
    • pp.14-18
    • /
    • 2002
  • 세계화가 사회적 불평등을 심화시키고 있지만 이에 대처하는 개별 국가의 능력은 오히려 약화되고 있으며, 그 결과 노인인구층의 복지여건이 악화되고 있다는 것이 종래의 일반적인 인식이다. 본 논문은 이러한 일반적 인식을 재검토하는데 목적이 있다. 검토작업은 다음 네가지 영역에서 이뤄진다. 첫째, 세계화에 대한 상이한 개념정의와 시각을 검토한다. 여기에는 노령층에 대한 복지급여를 잔여적 급여로 전환시키는데 있어 핵심적 역할을 행하고 있는 주요 국제기구의 활동을 중점 논의한다. 둘째, 세계화가 개별 국가에 미치는 영향이 일률적이라는 시각을 재검토하기 위해 세계화에 대해 서로 다르게 반응한 미국과 유럽방식을 비교한다. 셋째, 세계화가 노령화 정책에 미치는 영향에 대해 논의한다. 넷째, '사회적 삶의질'이란 개념을 통해 노인계층의 복지수준은 경제적 성장보다 사회적 급여에 더 큰 영향을 받게 됨을 보여 주고자 한다.

  • PDF

A study on the teachers' awareness for mathematical gifted education using technology (테크놀로지를 활용한 수학영재교육에 대한 교사들의 인식)

  • Lee, Heon-Soo;Park, Hyung-Bin
    • Journal of the Korean School Mathematics Society
    • /
    • v.14 no.1
    • /
    • pp.101-122
    • /
    • 2011
  • In this paper, we investigated teachers' awareness for the gifted education using technology. We chose teachers who were taking a course(60 hours) in the gifted education at Educational Training Institute in Chonnam National University, and analyzed their awareness for gifted education using technology. We found teachers' awareness as followings. First, teachers think that their ability using technology is contained ability developing and performing program for the gifted education. Second, using technology in the gifted education have an effect on ability of inventively solving problem and extension of thinking power of the gifted. Third, the gifted education using technology is helpful to developing abilities of the gifted, which are intuitional discernment, organizing information, space perception and visualization. Also, that is helpful to developing fluency, flexibility and uniqueness of the gifted in terms of sub-factors of creativity (fluency, flexibility, uniqueness, sophistication).

  • PDF

A Study on the Network Generation Methods for Examining the Intellectual Structure of Knowledge Domains (지적 구조의 규명을 위한 네트워크 형성 방식에 관한 연구)

  • Lee Jae-Yun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.40 no.2
    • /
    • pp.333-355
    • /
    • 2006
  • Network generation methods to visualize bibliometric data for examining the intellectual structure of knowledge domains are investigated in some detail. Among the four methods investigated in this study, pathfinder network algorithm is the most effective method in representing local details as well as global intellectual structure. The nearest neighbor graph, although never used in bibliometic analysis, also has some advantages such as its simplicity and clustering ability. The effect of input data preparation process on resulting intellectual structures are examined, and concluded that unlike MDS map with clusters, the network structure could be changed significantly by the differences in data matrix preparation process. The network generation methods investigated in this paper could be alternatives to conventional multivariate analysis methods and could facilitate our research on examining intellectual structure of knowledge domains.

A study on Typography Expression of the Street Paper. (스트리트 페이퍼의 타이포그라피 표현에 관한 연구)

  • 오정화;정성환;홍찬석
    • Proceedings of the Korea Society of Design Studies Conference
    • /
    • 2000.11a
    • /
    • pp.70-71
    • /
    • 2000
  • 잡지는 산업혁명의 부산물로 산업시대의 산물인 그래픽 디자인의 역사와 함께 발전을 거듭해 왔고 책과 신문의 전통적인 타이포그라피 방식에서 벗어나기 위해 끊임없이 글과 그림들을 새롭게 조합하기 위한 창조의 과정을 거쳐왔다. 잡지는 중요한 시각표현 원리와 기술 재현 능력을 구사해 볼 수 있는 실험실과 같은 것이다. (중략)

  • PDF

Investigation of the Components for Assessing the Ability of Engineering Design (공학설계능력의 평가 요소 구명)

  • Kim Tae-Hoon;Lee So-Yee;Rho Tae-Cheon
    • Journal of Engineering Education Research
    • /
    • v.8 no.3
    • /
    • pp.49-56
    • /
    • 2005
  • The purposes of this study are to select assessment components for the engineering design ability and to verify the validity of the selected assessment components. From the results of the study, the following conclusions were made. $\cdot$ Social Ability : 'Communication' and 'Teamwork' $\cdot$ Procedure Ability : 'Acknowledging and Defining Problems', 'Planning and Maintaining', 'Collecting Information', 'Deriving Ideas' and 'Evaluating Ideas' $\cdot$ Experience : 'Engineering Experience' and 'Science Experience' $\cdot$ Knowledge : 'Engineering Knowledge', 'Science Knowledge' and 'Mathematics Knowledge', 'Visualization Ability': 'Sketching' and 'Drawing' $\cdot$ Reasoning : 'Converging Reasoning' 'Inductive Reasoning' and 'Intuitive Reasoning'

Combining Imitation Learning and Reinforcement Learning for Visual-Language Navigation Agents (시각-언어 이동 에이전트를 위한 모방 학습과 강화 학습의 결합)

  • Oh, Suntaek;Kim, Incheol
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.559-562
    • /
    • 2020
  • 시각-언어 이동 문제는 시각 이해와 언어 이해 능력을 함께 요구하는 복합 지능 문제이다. 본 논문에서는 시각-언어 이동 에이전트를 위한 새로운 학습 모델을 제안한다. 이 모델은 데모 데이터에 기초한 모방 학습과 행동 보상에 기초한 강화 학습을 함께 결합한 복합 학습을 채택하고 있다. 따라서 이 모델은 데모 데이타에 편향될 수 있는 모방 학습의 문제와 상대적으로 낮은 데이터 효율성을 갖는 강화 학습의 문제를 상호 보완적으로 해소할 수 있다. 또한, 제안 모델은 서로 다른 두 학습 간에 발생 가능한 학습 불균형도 고려하여 손실 정규화를 포함하고 있다. 또, 제안 모델에서는 기존 연구들에서 사용되어온 목적지 기반 보상 함수의 문제점을 발견하고, 이를 해결하기 위해 설계된 새로은 최적 경로 기반 보상 함수를 이용한다. 본 논문에서는 Matterport3D 시뮬레이션 환경과 R2R 벤치마크 데이터 집합을 이용한 다양한 실들을 통해, 제안 모델의 높은 성능을 입증하였다.

The Bayesian Framework based on Graphics for the Behavior Profiling (행위 프로파일링을 위한 그래픽 기반의 베이지안 프레임워크)

  • 차병래
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.69-78
    • /
    • 2004
  • The change of attack techniques paradigm was begun by fast extension of the latest Internet and new attack form appearing. But, Most intrusion detection systems detect only known attack type as IDS is doing based on misuse detection, and active correspondence is difficult in new attack. Therefore, to heighten detection rate for new attack pattern, the experiments to apply various techniques of anomaly detection are appearing. In this paper, we propose an behavior profiling method using Bayesian framework based on graphics from audit data and visualize behavior profile to detect/analyze anomaly behavior. We achieve simulation to translate host/network audit data into BF-XML which is behavior profile of semi-structured data type for anomaly detection and to visualize BF-XML as SVG.

Study on security log visualization and security threat detection using RGB Palette (RGB Palette를 이용한 보안 로그 시각화 및 보안 위협 인식)

  • Lee, Dong-Gun;Kim, Huy Kang;Kim, Eunjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.61-73
    • /
    • 2015
  • In order to respond quickly to security threats that are increasing fast and variously, security control personnel needs to understand the threat of a massive amount of logs generated from security devices such as firewalls and IDS. However, due to the limitations of the information processing capability of humans, it takes a lot of time to analyze the vast amount of security logs. As a result, there is problem that the detection and response of security threats are delayed. Visualization technique is an effective way to solve this problem. This paper visualizes the security log using the RGB Palette, offering a quick and effective way to know whether the security threat is occurred. And it was applied empirically in VAST Challenge 2012 dataset.

A Practical Use of UCC for Improving Information Protection Education (정보 보호 교육 향상을 위한 UCC 활용방안)

  • Seo, Min-Sung;Cho, Seong-Je;Kim, Seong-Baeg
    • The Journal of Korean Association of Computer Education
    • /
    • v.12 no.5
    • /
    • pp.1-13
    • /
    • 2009
  • Systematic information protection education is necessary to evoke the importance of information protection to the students and to provide them with alternatives to cope with malicious attacks. However, there have been too little development of the methods of systematic education and teaching materials to allow an effective education of information protection in the classrooms today. In this paper, we developed principle-oriented visual learning materials using UCC (User Created Content) for an effective education of information protection and evaluated the effectiveness of our approach with independent sample t-test method after being used in two classes, a test group and a control group. In particular, using UCCs, which have become the most frequently used contents in the Internet, as visual material for the education of information protection, proved to be effective in promoting the interest of students in classes and highly useful in education.

  • PDF

Analysis on the Effectiveness of Algorithm Visualization System for Structured Programming Language Education (구조적 프로그램밍 언어 교육을 위한 알고리즘 시각화 시스템의 효용성 분석)

  • Oh, Yeon-Jae;Park, Kyoung-Wook;Kim, Eung-Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.1
    • /
    • pp.45-51
    • /
    • 2012
  • Programming is an area that many students have difficulty on because it requires various skills, such as problem analysis, logical thinking, and procedural problem-solving skills. In this paper, a system visualizing algorithm was used to set up algorithmic concepts easily and effectiveness of the system was analyzed through scholastic achievement test and survey after learning through this process. For evaluation, we divided students who take courses on programming language and algorithm in 3 universities into 2 groups with 6 teams in each group. The group that trained this system visualizing algorithm had scored 17.4 points higher in terms of scholastic achievement than the group that did not train such method. Moreover, according to the survey, the group had higher scores in terms of interest level, concentration level, comprehension, effectiveness, and convenience.