• Title/Summary/Keyword: 요소그룹

Search Result 841, Processing Time 0.033 seconds

A Study on the Relationship Between Halitosis and Dentures (불쾌감을 유발하는 구취와 의치장착의 상호관계)

  • Lee, Kyung Hee
    • Science of Emotion and Sensibility
    • /
    • v.19 no.4
    • /
    • pp.127-136
    • /
    • 2016
  • The main purpose of this study was to observe the relationship of denture and halitosis and to investigate the influence with oral health indexes. Also we examined the contribution factors to subjective awareness of halitosis by denture condition. A total sample of 103 elderly people were answered questionnaire and all collected survey data were processed for data analyses. Based on general characteristics, the study of the halitosis showed higher score which is older age, oral health attitude, and living together. The result showed that the use of denture, dental intelligent quotient (dental IQ) and type of denture were significantly correlated with halitosis. These results indicated that halitosis was affected by denture and oral health index. According to these findings, it is necessary to develop and apply the oral health promotion program which is include the management of halitosis especially for elderly person.

The Algorithm of Efficient Core Selection Estimation for the Multicast Delay Variation Problem and Minimum Delay Variation (멀티캐스트 지연변이 문제에 대한 효율적인 코어 선택 추정 알고리즘)

  • Ahn, Youn-Gjin;Kim, Moon-Seong;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.8 no.2
    • /
    • pp.33-41
    • /
    • 2007
  • With the development of the multicast technology, the realtime strategy among the group applications using the multicast routing is getting more important. An essential factor of these real-time application is to optimize the Delay- and delay Variation-Bounded Multicast Tree(DVBMT) problem. This problem is to satisfy the minimum delay variation and the end-to-end delay within an upper bound. The DVBMT problem is known as NP-complete problem. The representative algorithms for the problem are DVMA, DDVCA, and so on. In this paper, we show that the proposed algorithm outperforms any other algorithm. The efficiency of our algorithm is verified through the prerformance evaluation and the enhancement is up to about 9% to 29% in terms of the multicast delay variation. The time complexity of our algorithm is $O(mn^2)$M.

  • PDF

An Analysis of the Affective Effect of Whole Brain Based Cooperative Learning for the Gifted (영재 교육을 위한 전뇌 이론 기반 협동학습의 정의적 효과 분석)

  • Kim, Soon-Hwa;Song, Ki-Sang
    • Journal of Gifted/Talented Education
    • /
    • v.21 no.2
    • /
    • pp.255-268
    • /
    • 2011
  • The 21st century is called as the "Age of knowledge flood", and thus the importance of the ability which can use knowledge creatively is more emphasized. Also, not only individual problem solving but also solving problems through effective communication skills with group members are needed, and therefore, it is requested to train potential gifted learner working together with others to practice cooperation and eventually grown up as a competitive human resource to adapt successfully in future environment. In this paper, to show the effectiveness of cooperative learning in gifted learners, members for cooperative learning group has been selected using whole brain theory from the 42 gifted middle school students who participated in summer gifted learner vacation program. From the analysis of the learners' learning motivation and frequency of interactions whole brain based cooperative learning is effective for enhancing both learning motivation and interactions. Therefore, the whole brain based cooperative learning is an effective pedagogy for enhancing the motivation as well as facilitating interactions within gifted learners.

A Cluster-Header Selecting Method for more Secure and Energy-Efficient in Wireless Sensor Network (무선 센서 네트워크에서 안전하고 에너지 효율적인 클러스터 헤더 선출 기법)

  • Kim, Jin-Mook;Lee, Pung-Ho;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.107-118
    • /
    • 2007
  • Distributed wireless sensor network in various environment have characteristic that is surveillance of environment-element and offering usefully military information but there is shortcoming that have some secure risks. Therefore secure service must be required for this sensor network safety. More safe and effective techniques of node administration are required for safe communication between each node. This paper proposes effective cluster-header and clustering techniques in suitable administration techniques of group-key on sensor network. In this paper, first each node transmit residual electric power and authentication message to BS (Base-Station). BS reflects "Validity Authentication Rate" and residual electric power. And it selects node that is more than these regularity values by cluster header. After BS broadcasts information about cluster header in safety and it transmits making a list of information about cluster member node to cluster header. Also, Every rounds it reflects and accumulates "Validity Authentication Rate" of former round. Finally, BS can select more secure cluster header.

  • PDF

Configuration Management for Multi-Level Security Information Technology Systems (IT 시스템의 다중 수준 보안을 위한 관리 환경 연구)

  • Kim, Jeom-Goo
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.39-48
    • /
    • 2010
  • In a complex, secure IT system environment there will be groups of data that be segregated from one another, yet reside on the same system. Users of the system will have varying degrees of access to specific data. The Configuration Management(CM) of the information architecture, the physical architecture, user privileges and application security policies increases the complexity for operations, maintenance and security staff. This pager describes(current work to merge the capabilities of a network CM toll with those of a Computer Aided System Engineering(CASE) tool. The rigour of Systems Engineering(SE) modelling techniques can be used to deal with the complexities of multi-level information security. The SE logical and physical models of the same system are readily tailorable to document the critical components of both the information architecture and physical architecture that needs to be managed. Linking a user-friendly, physical CM tool with the extended capabilities of a CASE tool provide the basis for improved configuration management of secure IT systems.

Research Capability Enhancement System Based on Prescriptive Analytics (지시적 분석 기반 역량 강화 시스템)

  • Gim, Jangwon;Jung, Hanmin;Jeong, Do-Heon;Song, Sa-Kwang;Hwang, Myunggwon
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.1
    • /
    • pp.46-51
    • /
    • 2015
  • The explosive growth of data and the rapidly changing technical social evolution new analysis paradigm for predicting and reacting the future the past and present ig data. Prescriptive analysis has a fundamental difference because can support specific behaviors and results according to user's goals with defin researchers establish judgments and activities achiev the goals. However research methods not widely implemented and even the terminology, Prescriptive analysis, is still unfamiliar. This paper thus propose an infrastructure in the prescriptive analysis field with key considerations for enhancing capability of researchers through a case study based on InSciTe Advisory developed with scientific big data. InSciTe Advisory system s developed in 2013, and offers a prescriptive analytics report which contains various As-Is analysis results and To-Be analysis results 5W1H methodology. InSciTe Advisory therefore shows possibility strategy aims to reach a target role model group. Through the availability and reliability of the measurement model the evaluation results obtained relative advantage of 118.8% compared to Elsevier SciVal.

SNMP-based Management for Mobile Network Devices (SNMP 기반의 이동형 네트워크 장비 관리 기법)

  • Kwak, Deuk-Whee;Lee, Hyun-Yong;Kim, Jong-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.7B
    • /
    • pp.557-566
    • /
    • 2008
  • Some types of network nodes such as mobile network node, mobile access point, and ad-hoc network node can be relocated frequently and, by the nature of its usage, are deployed over broad area. In this environment, the network topology is changed constantly since even the manager node as well as the managed nodes can leave or join the management network frequently. The many of existing network management technologies are mostly for small sized and homogeneous networks with static topologies and not proper for the mobile network devices. In this paper, employing peer-to-peer (P2P), the secure group communication techniques, and simple network management protocol (SNMP), we propose a highly secure and available management technique that can be used to manage the mobile network nodes through insecure management network such as the Internet. The proposed technique is implemented to show that it is practically usable.

Market Segmentation by Preferable kind of Coffee Type (선호커피유형에 따른 세분시장의 특성)

  • Choi, Seong-Im;Yim, Eun-Soon;Moon, Hye-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.6
    • /
    • pp.475-485
    • /
    • 2012
  • The purpose of this research study was to identify the factors that influence comsumer who make decisions on preferred coffee types. Data was collected for a month from September $12^{th}$ to October $10^{th}$, 2010 from 807 participants who visited a cafe' in Seoul. The Limdep(LIMited DEPendent) 8.0 program was used in analyzing the determinants for preferred types of coffee using the multinomial logit model(MNL) approach. The results revealed that there were four taste preference groups being Espresso, Americano, Cafe' Late, and Cafe' Mocha ; as well as confirming that demographic characteristics influenced the coffee selection attributes, type of packaging, preferred coffee brand, and visit frequencies. This study found seven coffee selection attributes were significant factors in influencing patrons choices for purchasing speciality coffee being age range, profession, packing status, elation, superficial appearance, weight control, and habitual, respectively. The research reflects the coffee selection attributes by the customers' preference and concludes that it would be helpful to make marketing strategy for particular coffee brands.

An Efficient Election Protocol in a Mobile Computing Environment (이동 컴퓨팅 환경에서 효율적인 선출 프로토콜)

  • Park, Sung-Hoon
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.3
    • /
    • pp.289-296
    • /
    • 2001
  • The Election protocol can be used as a building block in many practical problems such as group communication, atomic commit and replicated data management where a protocol coordinator might be useful. The problem has been widely studied in the research community since one reason for this wide interest is that many distributed protocols need an election protocol. However, despite its usefulness, to our knowledge there is no work that has been devoted to this problem in a mobile computing environment. Mobile systems are more prone to failures than conventional distributed system. Solving election in such an environment requires from a set of mobile hosts to choose a mobile host or a fixed host based on the their priority despite failures of both mobile computing and/or fixed hosts. In this paper, we describe a solution to the election problem from mobile computing systems. This solution is based on the Garcia Molina\\`s Bully algorithm.

  • PDF

Study on Changes and Characteristics in the convergence era furniture design (융복합시대의 가구디자인에 나타난 변화와 특성에 관한 연구)

  • Hwang, Sun-Wook
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.437-446
    • /
    • 2016
  • This paper is to research on the characteristics of the recipient furniture design that requires changes reflected in the contemporary socio-cultural factors in the convergence culture, as represented by the digital and IT. The purpose of this study is, as specific methods therefore, to research in both perspectives the design of the after industrial revolution of functionalism and the case of the Memphis group which is expressed the appearance of diverse social atmosphere of the 20th century. Based on this, it will illuminate the appearance of the furniture designs recipient requires changes in universal modern society of values of complex convergence. To reveal that sociocultural factors that accept values of society are important in predicting the future of furniture design is the object of this study. It recognizes that a key element of modern furniture design will be based on a broad and deep study.