• Title/Summary/Keyword: 행위 유사도

Search Result 311, Processing Time 0.03 seconds

Design and Implementation of Science Experiment Models for Artificial Chemistry Laboratory (과학실험에서의 모델 설계 및 구현)

  • 변영태
    • Korean Journal of Cognitive Science
    • /
    • v.10 no.1
    • /
    • pp.57-66
    • /
    • 1999
  • We believe that science experiments in a laboratory are essential for science education. Scientific experiments begin with situations set by selecting and locating tools and reagents. and by proper experimental behavior, and thereafter situations are changed by natural laws and intermediate experimental behavior. While scientists and students do experiments, they build a cognitive model internally, do causal reasoning on the model to derive system behavior, and then learn scientific truth. We suggest not only a representation method for a 2-dimentional model and for ontological entities necessary in causal reasoning, but also an inferencing method to derive behavior. Chemistry experiments are chosen for the implementation. For the ontological entities, we consider experimental tools, reagents and their heirarchical structures, physics and chemistry natural laws, and functional abstraction knowledge. In order to show the usefulness of our methods, we have developed a program, called ACUArtificial Chemistry Laboratory), which provides an experiment environment where students can do non-predetermined experiments, and shows experiment려 system behavior similar to what happens in the same situation in a real world and descriptions about why it happens.

  • PDF

A Convergence Study on Comparison of the Difference in the Blue-Light Transmittance by Goggles and Dental Curing Light Unit Tips (청색광이 광중합기용 팁과 보안경에 따라 투과되는 투과율 차이 비교의 융합적 연구)

  • Lee, Sook-Jeong
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.177-181
    • /
    • 2019
  • The purpose of this study was to investigate the degree of blocking of blue light of the tips and goggles of the curing light during the dental treatment using the blue light of the light curing. The light curing tips and goggles were placed on a UV-Vis spectrometer and the results of light transmission were analyzed. Comparative analysis. As a result, all four types of light curing tips used in the analysis showed excellent blue light blocking effect. In the case of safety goggles, red-type goggles showed blue light transmittance similar to those of light curing than yellow-type goggles. As a result, it is recommended that the attachment of the light curing with high degree of blue light blocking and the wearing of safety glasses are necessary to protect the eyes. This behavior is thought to reduce persistent irritation and fatigue in the eyes.

An Exploratory Two-dimensional Approach to Port Selection Behavior (항만선택행위에 대한 탐색적 이차원적 접근)

  • Park, Byung In
    • Journal of Korea Port Economic Association
    • /
    • v.33 no.4
    • /
    • pp.37-58
    • /
    • 2017
  • The implicit assumption of port selection studies based on survey and respondents' perceptions is that the preference of the port selection attributes is proportional to the selection behavior. Further, the straight lines of the port selection attributes could also have non-linear properties. This study confirms nonlinear characteristics of selection attributes by using Kano model. The findings of this study showed that several properties of carriers were evaluated as nonlinear characteristics, such as the intermodal links and network accessibility, and size of port and terminal. Hence, port service providers such as port authorities and terminal operating companiesl, should construct a port operation strategy that reflects the non-linear port selection characteristics of shipping companies. Since this study aimed at exploring the forms of port selection characteristics, long-term additional verification studies on ports and stakeholders at domestics and abroad were needed. The Kano model and importance-selection analysis method used for analysis and strategy establishment also need to be improved to capture evident characteristics and to present strategic guidelines.

A design of Customized Community Service System based on user-behavior analysis on social network (소셜 네트워크 사용자 행위의 속성 분석을 통한 맞춤형 커뮤니티 서비스 시스템 설계)

  • Shin, Eun-se;Kim, Myung-june;Han, So-ra;Oh, Eun-ji;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.190-192
    • /
    • 2012
  • 최근 소셜 네트워크 서비스는 언제 어디서나 정보를 누구라도 손쉽게 전달하고 볼 수 있는 수단으로 각광받고 있다. 소셜 네트워크 서비스의 주요한 특징은 사람과 사람, 사람과 정보, 정보와 정보 간의 관계 네트워크로서, 사용자가 능동적으로 참여한다는 것이다. 하지만 범람하는 수많은 정보들 속에서 사용자가 직접 정보를 검색 및 분류해야 하는 과정은 사람과 정보간의 관계 네트워크 측면에서 소셜의 의미를 충족하지 못한다. 이러한 기존의 정보 활용법은 사용자의 선호도에 따른 맞춤형 정보의 수용과 공유를 제시하지 못하고 있다. 본 연구에서 설계된 사용자 맞춤형 서비스 시스템은 사용자의 상황인식 속성정보와 이에 따른 선호도를 평가하는 알고리즘을 기반으로 하여 보다 효율적인 커뮤니티 공간이 제공될 수 있는 맞춤형 커뮤니티 서비스 시스템을 설계 제안한다. 제안된 시스템에서는 소셜 네트워크 서비스에서 사용자가 텍스트를 읽거나 작성하는 행위를 바탕으로 사용자의 관심사를 제공된 알고리즘으로 분석하여 사용자의 선호도에 따른 정보를 분류하고, 사용자의 인적정보로부터 선별한 유사 사용자들을 통해 신뢰성이 높은 정보를 우선적으로 선출한다. 따라서 사용자의 속성과 선호도를 고려한 상황인식 정보를 제공함으로써 사용자가 직접 정보를 검색 및 분류하는 과정을 단축하고 정보의 신뢰성을 향상할 수 있는 방법을 제시한다. 이러한 상황인식 기반의 맞춤형 커뮤니티 서비스 시스템은 실시간으로 많은 정보가 공유되는 서비스에서 다양하게 적용되어 인터넷 신문, 타겟 마케팅 광고 등의 응용분야에서 다양한 정보제공 서비스 시스템으로 적용될 수 있을 것으로 본다.

  • PDF

The Effect of Self-efficacy Promotion Exercise Program for the Elderly Hypertensives (자기효능증진 운동프로그램이 고혈압 노인에게 미치는 영향)

  • Kim, Yu Jeong;Kim, Su Mi
    • Journal of Digital Convergence
    • /
    • v.12 no.11
    • /
    • pp.487-497
    • /
    • 2014
  • This study was to examine the effect of the Self-efficacy Promotion Exercise Program to the elderly hypertensive with Stage 1. This research was the quasi-experimental study. The Self-efficacy Promotion Exercise Program combined to Aerobic exercise which is incrementally at a level of 40~60% HRmax and the source of the Self-efficacy Promotion Exercise. This research was carried out to experimental(33 patients) and control(32 patients), 60 minutes per day, 3 times a week for 12 weeks. The Self-efficacy Promotion Program was effect on enhancing the general(p<.001) and exercise self-efficacy(p<.001), the self-care behaviors(p<.001) and decreasing the systolic blood pressure(p<.001) to the elderly hypertensives. The 12 weeks Self-efficacy Promotion Exercise Program will be considering to useful for various care settings to the elderly hypertensives.

A Review on Research Related Smartphone in Korea (우리나라의 스마트폰 관련 연구에 대한 문헌적 고찰)

  • Nam, Soo-tai;Kim, Do-goan;Jin, Chan-yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.219-222
    • /
    • 2013
  • Recently, rapid innovation of Smartphone is changing the paradigm of our daily life. With the launch of Apple iPhone, there is an explosion of interest in Smartphone itself as well as Internet-based services using Smartphone are being revitalized. Smartphone users, opinion experts more than 99 percent of the economically active population is using, it has reached the saturation past the early stages of formation. Smartphone is equipped with a general purpose OS possible the implementation of high performance environment similar level as a personal computer. Also, it is a mobile communication terminal scalable which can be removed or installed various applications. New information technology like Smartphone gives us a very important and interesting research issue that is to find and prove the factors influencing the purchase intention. At this point, study identifying on the influence factors to the behavioral intention of Smartphone is very important. This study was targeted a total of 99 research papers that are setting up the related Smartphone in among the research papers published in domestic academic journals since 2008. Empirical research related behavioral intention using was summarized on the papers 76.

  • PDF

A Study on the Necessity of Limitation for Legal Liability in Marine Accidents (해양사고에 있어서 책임귀속의 제한 필요성에 관한 연구)

  • Ji, Sang-Won
    • Journal of Navigation and Port Research
    • /
    • v.34 no.3
    • /
    • pp.251-255
    • /
    • 2010
  • A marine accident is caused various legal liability such as compensation for damages on civil law, responsibility on the Criminal Code and administrative sanctions. The results occurred by any acts is not connected directly to the legal responsibility. As a prior condition for these legal liabilities, it is required the causation between the act caused and the occurrence of the effect. It is very difficult to find out the cause in marine accidents, because of trouble of a proof security, the place occurred, time difference between accident and investigation point of time etc.. However, finding out the correct cause is an element important to prevent similar accident and to determine the liability reverted. The logical concept of the causation is not limited, but there is early necessity to limit it in the liability reverted. Therefore, this study aims to suggest reasonable standard to determine liability reverted in marine accidents.

A Study on Cybersecurity Policy in the Context of International Security (국제협력을 통한 사이버안보 강화방안 연구)

  • Kim, So Jeong;Park, Sangdon
    • Convergence Security Journal
    • /
    • v.13 no.6
    • /
    • pp.51-59
    • /
    • 2013
  • Cyberspace, based on the dramatic development of information and communications technology, has brought enormous benefits to mankind. However, concerns over cyber terrorism and cyber attack are becoming serious. It is time to expand the global dialogue on international security issues in cyberspace. It is imperative to have a common understanding that cyberspace, the infrastructure for prosperity, should not be utilized as a space to create conflicts among states, and that all states agree to build confidence and peace in cyberspace. For this purpose, there are 3 tracks of international cooperations: 1)international cooperation such as UN and Conference on Cyberspace, 2)regional cooperations such as ARF and OSCE. 3)bilateral cooperations such US-Russia Cybersecurity Agreement, US-China presidential level dialogue. This paper will analyze the 1st track of international cooperations of UN and Conference on Cyberspace. With this, Korean government can prepare the forthcoming GGE activities and make our own strategy to deal with the global norms of good behaviour in cyberspace.

A Comparative Study on the Foreign Corrupt Practices Act (FCPA) and Article 21.6 of the KORUS FTA (미국 해외부패방지법(FCPA)과 한미 FTA 제 21.6 조 비교연구)

  • Bae, Sungho
    • International Commerce and Information Review
    • /
    • v.15 no.1
    • /
    • pp.287-307
    • /
    • 2013
  • Numerous discussions on the KORUS FTA has been centered around issues on trade in goods, services, or dispute settlement mechanisms. On the other hand, little attention has been given to Chpater 21 of the KORUS FTA on transparency, especially Article 21.6 which states about anti-corruption. Article 21.6 and the Foreign Corrupt Practices Act shares the common purpose to prevent corruptive business practice, and they show similarities in many aspects. The FCPA enforcement has dramatically increased over the past ten years by the U.S. Department of Justice and Securities Exchange Commission stretching its jurisdiction to foreign nationals and companies. Korean business professionals and corporations are exposed to both Article 21.6 and the FCPA on corruption issues. Thus, it is imperative to understand Article 21.6 to be equipped with anti-corruption compliance programs. This paper examines the FCPA and Article 21.6 through comparative analysis and proposes appropriate measures for Korea to take.

  • PDF

A Study on Cloud Computing for Detecting Cyber Attacks (사이버공격 탐지를 위한 클라우드 컴퓨팅 활용방안에 관한 연구)

  • Lee, Jun-Won;Cho, Jae-Ik;Lee, Seok-Jun;Won, Dong-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.816-822
    • /
    • 2013
  • In modern networks, data rate is getting faster and transferred data is extremely increased. At this point, the malicious codes are evolving to various types very fast, and the frequency of occurring new malicious code is very short. So, it is hard to collect/analyze data using general networks with the techniques like traditional intrusion detection or anormaly detection. In this paper, we collect and analyze the data more effectively with cloud environment than general simple networks. Also we analyze the malicious code which is similar to real network's malware, using botnet server/client includes DNS Spoofing attack.