• Title/Summary/Keyword: 환경적 성향

Search Result 489, Processing Time 0.031 seconds

A Fashion Design Recommender Agent System using Collaborative Filtering and Sensibilities related to Textile Design Factors (텍스타일 기반의 협력적 필터링 기술과 디자인 요소에 따른 감성 분석을 이용한 패션 디자인 추천 에이전트 시스템)

  • 정경용;나영주;이정현
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.2
    • /
    • pp.174-188
    • /
    • 2004
  • In the life environment changed with not only the quality and the price of the products but also the material abundance, it is the most crucial factor for the strategy of product sales to investigate consumer's sensibility and preference degree. In this perspective, it is necessary to design and merchandise the products in cope with each consumer's sensibility and needs as well as its functional aspects. In this paper, we propose the Fashion Design Recommender Agent System (FDRAS-pro) for textile design applying collaborative filtering personalization technique as one of the methods of material development centered on consumer's sensibility and preference. For a collaborative filtering system based on textile, Representative-Attribute Neighborhood is adopted to determine the number or neighbors that will be used for preferences estimation. Pearson's Correlation Coefficient is used to calculate similarity weights among users. We build a database founded on the sensibility adjectives to develop textile designs by extracting the representative sensibility adjectives from users' sensibility and preferences about textile designs. FDRAS-pro recommends textile designs to a customer who has a similar propensity about textile. To investigate the sensibility and emotion according to the effect of design factors, fertile designs were analyzed in terms of 9 design factors, such as, motif source, motif-background ratio, motif variation, motif interpretation, motif arrangement, motif articulation, hue contrast, value contrast, chroma contrast. Finally, we plan to conduct empirical applications to verify the adequacy and the validity of our system.

A Qualitative Analysis on Supervisors' Dysfunctional Leadership Behaviors, Antecedents, and Results (상사의 역기능 리더십 행동, 선행요인 그리고 결과에 대한 질적 분석)

  • Im, Chang-Hyun;Lee, Hee-Su
    • Journal of vocational education research
    • /
    • v.30 no.4
    • /
    • pp.1-22
    • /
    • 2011
  • Paradoxically, leadership has not only positive effects but also negative effects. The purpose of this study is to examine supervisors' dysfunctional leadership behaviors, antecedents and results in order to draw HRD implications for protecting organizations and employees from dysfunctional leaders and provide implications for leadership development. A qualitative research method based on semi-organized interviews with 28 employees from S-group was used. The results of this study show that the dysfunctional leadership behaviors were associated with ten behavioral categories: belittling and insulting the subordinates, authoritative and arbitrary behaviors, self-aggrandizement, biased preference for certain personnel, arrogance, micro-managing, inability to change and adapt, discordance between words and actions, over-dependance on supervisor, lack of ethics and values. Dysfunctional leadership behaviors were casually attributed to 'personal traits & experience', 'task characteristics', and 'internal & external environments of the organization'. Finally, the results of supervisor's dysfunctional leadership behaviors on employees and the organizational effects were 'increased turnover rate', 'declining work efficiency', 'collapsing morale', 'retraining innovative thinking', 'passive working culture', 'discouraging organizational vitality', 'discouraging organizational synergy', 'losing loyalty' and 'declining trust on supervisor'.

An Importance-Performance Analysis of Secondary Science Teachers' Adaptive Practice (중등 과학교사의 적응적 실행에 대한 중요도-실행도 분석)

  • Heekyong Kim
    • Journal of The Korean Association For Science Education
    • /
    • v.43 no.3
    • /
    • pp.295-306
    • /
    • 2023
  • In this study, we explored science teachers' perceptions of adaptive practice in terms of importance and practice. For this purpose, an adaptive practice questionnaire was developed targeting secondary science teachers, and the responses of 128 science teachers were analyzed. The results of this study were as follows: First, the science teachers responded that all 17 items regarding adaptive practice were important. In particular, items related to 'addition of examples', 'adjustment of the level/range of concepts', and 'encouragement of student participation' showed high importance and performance levels. Second, the results of the IPA concerning adaptive practice showed that the items needing intensive improvement due to high importance but low performance were 'encouraging students' self-directed learning' and 'monitoring and responding to individual differences'. The science teachers identified a lack of time and uniform curriculum as the reasons for the low level of practice despite the high importance of these items. Third, regarding the IPA of the adaptive practice items, the items located in the fourth area, an excessive area, concerned 'pace control', 'modifying activities', and 'metaphor use'. More specifically, considering that 'metaphor use' was the only item with a higher level of performance than importance, it is necessary to reconsider whether problems are caused by excessive use. Fourth, analyzing the responses regarding the reasons for the difference in importance and performance revealed that the factors related to teachers included teachers' lack of knowledge or ability, and the tendency to implement as planned. As for student factors, an excessive number of students, differences in the levels of students, and a tendency to prefer classes centered on entrance exams were identified. As environmental factors, a uniform curriculum, conditions for experiments, evaluation systems, and external demands were mentioned. Finally, the implications of the results of this study for science education were discussed.

Exploratory Study on Christian Education through Hybrid Education System in Christian Universities (기독교 대학에서의 하이브리드 교육을 통한 기독교교육 가능성 탐색)

  • Bong, Won Young
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.6
    • /
    • pp.513-528
    • /
    • 2014
  • The landscape of Christian higher education is changing. Students once spent most of their time in a traditional classroom with a professor, but now they take online and hybrid courses (face to face and online). Some students complete their entire degree in a fully online program. Nearly every type of college in the United States offers online courses. Online learning has clearly moved from a fad to a fixture, and nowhere is that more apparent than at one of the largest universities in the country. As the demand for online course and programs increase, teachers and administrators in Christian universities and colleges face new challenges. Even though some teachers and administrators still believe online education is inferior to traditional face-to-face learning, we found no statistically significant differences in standard measures of learning outcomes between students in the traditional classes and students in the hybrid-online format classes. In this situation, since online education will develop continuously, Christian universities should utilize it variously through complete understanding and research about it predicting the future of online education style.

A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure (협력대응기반 전역네트워크 보안정보공유 시스템)

  • Kim, Ki-Young;Lee, Sung-Won;Kim, Jong-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.2
    • /
    • pp.60-69
    • /
    • 2013
  • Highlighted by recent security breaches including Google, Western Energy Company, and the Stuxnet infiltration of Iranian nuclear sites, Cyber warfare attacks pose a threat to national and global security. In particular, targeted attacks such as APT exploiting a high degree of stealthiness over a long period, has extended their victims from PCs and enterprise servers to government organizations and critical national infrastructure whereas the existing security measures exhibited limited capabilities in detecting and countermeasuring them. As a solution to fight against such attacks, we designed and implemented a security monitoring system, which shares security information and helps cooperative countermeasure. The proposed security monitoring system collects security event logs from heterogeneous security devices, analyses them, and visualizes the security status using 3D technology. The capability of the proposed system was evaluated and demonstrated throughly by deploying it under real network in a ISP for a week.

A Method of Gameplay Analysis by Petri Net Model Simulation (Petri Net 모델 시뮬레이션을 통한 게임플레이 분석방법)

  • Chang, Heedong
    • Journal of Korea Game Society
    • /
    • v.15 no.5
    • /
    • pp.49-56
    • /
    • 2015
  • As the popularity of casual games, they are increasing the needs to satisfy personal dispositions and the gameplay requirements of the various users in the game development process. These require analysis of action patterns of gameplay of various users in the testing phase of the game development. In this paper, we propose a method to analyze action patterns of gameplay through Petri net model simulation with gameplay metrics data. The proposed method has practical simulation environments because of using gameplay metrics data, and it can analyze diversely like reachability, coverbility, and liveness given by Petri net model analysis. An application example of the proposed method using a Petri net modeling tool GPenSIM v4.0 is given to analyze the patterns of gameplay in game Pacman. The results of simulations is presented. The presented results show that the proposed method can analysis patterns of gameplay diversely.

One-Snapshot Algorithm for Secure Transaction Management in Electronic Stock Trading Systems (전자 주식 매매 시스템에서의 보안 트랜잭션 관리를 위한 단일 스냅샷 알고리즘)

  • 김남규;문송천;손용락
    • Journal of KIISE:Databases
    • /
    • v.30 no.2
    • /
    • pp.209-224
    • /
    • 2003
  • Recent development of electronic commerce enables the use of Electronic Stock Trading Systems(ESTS) to be expanded. In ESTS, information with various sensitivity levels is shared by multiple users with mutually different clearance levels. Therefore, it is necessary to use Multilevel Secure Database Management Systems(MLS/DBMSs) in controlling concurrent execution among multiple transactions. In ESTS, not only analytical OLAP transactions, but also mission critical OLTP transactions are executed concurrently, which causes it difficult to adapt traditional secure transaction management schemes to ESTS environments. In this paper, we propose Secure One Snapshot(SOS) protocol that is devised for Secure Transaction Management in ESTS. By maintaining additional one snapshot as well as working database SOS blocks covert-channel efficiently, enables various real-time transaction management schemes to be adapted with ease, and reduces the length of waiting queue being managed to maintain freshness of data by utilizing the characteristics of less strict correctness criteria. In this paper, we introduce the process of SOS protocol with some examples, and then analyze correctness of devised protocol.

Dynamic Buffer Allocation Scheme for Caching in Realtime Multimedia Systems (실시간 멀티미디어 시스템에서의 캐슁을 위한 동적 버퍼 할당 기법)

  • Kwon, Jin-Baek;Yeom, Heon-Young;Lee, Kyung-Oh
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.4
    • /
    • pp.420-430
    • /
    • 2000
  • Several caching schemes for realtime multimedia systems have been proposed, but they focus only on increasing the hit ratio without providing any means to utilize the saved disk bandwidth due to cache hits. One of the most important metrics in multimedia systems is the number of clients that the systems can service simultaneously guaranteeing Quality of Service(QoS). Preemptive but Safe Interval Caching(PSIC) was proposed as a caching scheme which makes it possible to provide deterministic QoS.. However, it has no ability to adapt to the change of system environments since it has no mechanism to change the cache size. In this paper, we present a new caching scheme, Dynamic Interval Caching(DIC), which maximizes the performance, regardless of the change of system environments, providing hiccup-free service, by managing memory buffers dynamically. And it is demonstrated that DIC allocates buffer cache optimally, by comparing with PSIC through trace-driven simulations.

  • PDF

Estimating Price Elasticity of Residential Water Demand in Korea Using Panel Quatile Model (패널 분위수회귀 모형을 사용한 우리나라 지방 상수도 생활용수 수요의 가격탄력성 추정)

  • Kim, Hyung-Gun
    • Environmental and Resource Economics Review
    • /
    • v.27 no.1
    • /
    • pp.195-214
    • /
    • 2018
  • This study estimates the price elasticity of residential water demand in Korea. For that, annual panel data from the year of 2010 to 2013 for 161 local water services is estimated by using panel quantile model. As a result, the price elasticities of residental water demand in Korea are estimated to be between -0.156 and -0.189 depending on its quantile. In addition, the study finds that the estimated elasticity of residential water demand by traditional conditional mean regression is relatively more influenced by high demand areas because the distribution of residental water demand in Korea is left-skewed.

Implementation of Client Authentication System on Transparency Cache (투명 캐시에서의 사용자 인증 시스템 구현)

  • Kim, Seong-Rak;Gu, Yong-Wan
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.181-188
    • /
    • 2002
  • There are recently a lot of inconvenience because every client should be set to the proxy server on the browser in order to control the access by means of the client authentication in the proxy server. The client authentication technology using the transparency cache in this paper will be transparently used for every user in the internet which option of the authentication function is simply set in the cache server. In addition, the administrator will get the benefit since he can control the traffic of each client and strengthen the security. And also, this system is expected to use in the eCRM deeply rotated to the tendency of the client in the field of the e-commerce like shopping mall in the internet since the administrator can monitor the pattern of the client using the internet. This technique can be applied to the company affiliated research center, the EC website, and the military where it is essential for the tight security even though there are no additional security devices.