• Title/Summary/Keyword: Collaborative Work

Search Result 390, Processing Time 0.026 seconds

The Archival Method Study For Female Worker in the 1970s : Focused on (1970년대 여성 노동자 아카이빙 방법론 연구 전시 를 중심으로)

  • Lee, Hye Rin;Park, Ju Seok
    • The Korean Journal of Archival Studies
    • /
    • no.63
    • /
    • pp.145-165
    • /
    • 2020
  • , in collaboration with Mary Kelly, Kay Hunt and Margaret Harrison, tells the story of workers in the 1970s. Since the late 1960s, the world has undergone many political and social changes, and social movements have been active to protect the socially underprivileged, including women, children and workers. This phenomenon led to the diversification of the collection of the general public, the community, and the minority, and the expansion of the artist's political remarks and themes in the art world. , completed in conjunction with these social issues, surveyed and recorded the reality of workers in a factory in London and produced it as a artwork. is a collaborative work of three artists, a record of workers in the 1970s, and a record of the labor situation, factory, and even the history of the region. Therefore, this study examined the methods and features of , which dealt with the lives of women workers in the 1970s, based on social conditions.

A Fault-Detection Agent for Distance Education on Home Network Environment (홈 네트워크 환경에서 원격 교육을 위한 결함 감지 에이전트)

  • Kim, Hak-Joon;Ko, Eung-Nam
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.3
    • /
    • pp.313-318
    • /
    • 2007
  • This paper explains the design and implementation of the FDA(Fault Detection Agent). FDA is a system that is suitable for detecting software error for multimedia distance education based on home network environment. This system consists of an ED, and ES. ED is an agent that detects an error by hooking techniques for multimedia distance education based on home network environment. ES is an agent that is an error sharing system for multimedia distance education based on home network environment. From the perspective of multimedia collaborative environment, an error application becomes another interactive presentation error is shared with participants engaged in a cooperative work. Performance analysis is done by Comparison of Hooking with Snatching Method.

  • PDF

What is the Role of Co-coordinator?: From Internship's Experience

  • Onishi, Mai;Morimoto, Emi;Kamada, Mahito
    • Journal of Engineering Education Research
    • /
    • v.15 no.5
    • /
    • pp.42-46
    • /
    • 2012
  • Graduate Students in engineering at The University of Tokushima can take part in an educational program which is offered long-term internship opportunities (at a company or the government). Onishi, one of authors, took part in this educational program. She is studying environmental conservation at the university and is interested in environmental conservation activities led by residents. Striking a balance between environmental conservation and human economic activities is seen as important to society. However, the continuing in environmental conservation activities is difficult. Therefore, collaborative activities attract attention as a way of the continuing in environmental conservation activities. A person called "co-coordinator" is a key to make many people to participate in the sustainable collaboration activities. The main role of co-coordinator is connecting people who are interested in environmental conservation activities. The purpose of joining in environmental conservation activities is different from person to person depending on where they belong to or where they live. Onishi took part in the educational program to learn the techniques of adjusting the differing interests. She did her internship at environmental consulting company in Kamikatsu town, Tokushima prefecture. She participated in several environmental conservation activities and work experience as a coordinator. Through this experience, she learned not only the technique but also the difficulty of the work. This paper reports the results obtained from her experience.

Sketch Annotation Input Technique by using Sketch Box in Collaborative Environments (협업 환경에서 스케치 상자를 이용한 스케치 주석 입력 기법)

  • Sin, Eun-Joo;Choy, Yoon-Chul;Lim, Soon-Bum
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.6
    • /
    • pp.450-453
    • /
    • 2009
  • The sketch technique is being researched as the method of expressing intentions in 3D virtual space for cooperative work. The annotation which is necessary in 3D virtual space 1) not only enables the quick, easy and intuitive delivery of contents" but 2) must enable the input of sketch even on diverse and complicated surfaces and 3) must be expressed to recognize this in various angles in case of having the significance of 3D. Even if the sketch technique settles the precondition of 1), if 2) and 3) are not considered, the annotation is unable to deliver the contents accurately to the participant of cooperative work. Accordingly, a sketch annotation technique which enables the input of annotation even on complicated surfaces and also considers the contents of 3D is proposed using sketch-box technique.

Behaviour of steel joints under fire loading

  • da Silva, Luis Simoes;Santiago, Aldina;Real, Paulo Vila;Moore, David
    • Steel and Composite Structures
    • /
    • v.5 no.6
    • /
    • pp.485-513
    • /
    • 2005
  • This paper presents a state-of-the-art on the behaviour of steel joints under fire loading and some recent developments in this field, currently being carried out by the authors. Firstly, a review of the experimental research work on steel joints is presented, subdivided into isolated member tests, sub-structure tests and tests on complete building structures. Special emphasis is placed on the seventh Cardington test, carried out by the authors within a collaborative research project led by the Czech Technical University in Prague. Secondly, a brief review of various temperature distributions within a joint is presented, followed by a discussion of the behaviour of isolated joints at elevated temperature, focussing on failure modes and analytical procedures for predicting the moment-rotation behaviour of joints at elevated temperature. Finally, a description of the coupled behaviour of joints as part of complete structures is presented, describing previous work and investigations on real fire (including heating and cooling phases) currently being carried out by the authors.

A Web Based Error Manager for Societal Security Service (웹 기반 사회 안전 서비스를 위한 오류 관리기)

  • Ko, Eung-Nam;Hong, Sung-Ryong
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.87-91
    • /
    • 2014
  • This paper suggested a web based error manager for societal security service. This is a system that is suitable for detecting, sharing and recovering software error based on multimedia CSCW(Computer Supportes Cooperated Work). With error sharing system, a group cooperating users can share error applications. Our a web based error manager for societal security service enables user to share error objects through interaction awareness. This method has a file sharing, a window copy, a window overlay, or a window sharing. We implemented the web based error manager for societal security service so that the users participated in collaborative work may refer shared error objects as the same view to others.

Preliminary Modelling of Plasco Tower Collapse

  • Yarlagadda, Tejeswar;Hajiloo, Hamzeh;Jiang, Liming;Green, Mark;Usmani, Asif
    • International Journal of High-Rise Buildings
    • /
    • v.7 no.4
    • /
    • pp.397-408
    • /
    • 2018
  • In a recent tragic fire incident, the Plasco Tower collapsed after an intense outburst of fire lasting for three and a half hours and claiming the lives of 16 firefighters and 6 civilians. This paper will present continuing collaborative work between Hong Kong Polytechnic University and Queen's University in Canada to model the progressive collapse of the tower. The fire started at the 10th floor and was observed to have travelled along the floor horizontally and through the staircase and windows vertically. Plasco Tower was steel structure and all the steel sections were fabricated by welding standard European channel or angle profiles and no fire protection was applied. Four internal columns carried the loads transferred by the primary beams, and box columns were constructed along the perimeter of the building as a braced tube for resisting seismic loading. OpenSees fibre-based sections and displacement-based beam-column elements are used to model the frames, while shell elements are used for the reinforced concrete floor slabs. The thermal properties and elevated temperature mechanical properties are as recommended in the Eurocodes. The results in this preliminarily analysis are based on rough estimations of the structure's configuration. The ongoing work looks at modeling the Plasco Tower based on the most accurate findings from reviewing many photographs and collected data.

A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks

  • Ren, Huimin;Kim, Suhyun;Seo, Daehee;Lee, Imyeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1687-1707
    • /
    • 2022
  • With the development of multiuser online meetings, more group-oriented technologies and applications for instance collaborative work are becoming increasingly important. Authenticated Group Key Agreement (AGKA) schemes provide a shared group key for users with after their identities are confirmed to guarantee the confidentiality and integrity of group communications. On the basis of the Public Key Cryptography (PKC) system used, AGKA can be classified as Public Key Infrastructure-based, Identity-based, and Certificateless. Because the latter type can solve the certificate management overhead and the key escrow problems of the first two types, Certificateless-AGKA (CL-AGKA) protocols have become a popular area of research. However, most CL-AGKA protocols are vulnerable to Public Key Replacement Attacks (PKRA) due to the lack of public key authentication. In the present work, we present a CL-AGKA scheme that can resist PKRA in order to solve impersonation attacks caused by those attacks. Beyond security, improving scheme efficiency is another direction for AGKA research. To reduce the communication and computation cost, we present a scheme with only one round of information interaction and construct a CL-AGKA scheme replacing the bilinear pairing with elliptic curve cryptography. Therefore, our scheme has good applicability to communication environments with limited bandwidth and computing capabilities.

Identifying Learner Behaviors, Conflicting and Facilitating Factors in an Online Learning Community

  • CHOI, Hyungshin;KANG, Myunghee
    • Educational Technology International
    • /
    • v.11 no.2
    • /
    • pp.43-75
    • /
    • 2010
  • The purpose of this study is to identify patterns of learner behaviors, conflicting and facilitating factors during collaborative work in an online learning community(OLC). This study further seeks to investigate the difference of learner behaviors between high- and low-performing groups, and conflicting and facilitating factors. The online postings from four groups(19 students) in the spring semester(study 1) and six groups(24 students) in the fall semester(study 2) were analyzed. A coding scheme was generated based on constant comparison using the qualitative data analysis tool, NVivo. The analysis identified 7 categories of learner behaviors in both studies. Among the seven categories, information seeking and co-construction were most frequently observed in both studies. One evident difference between the high- and low-performing groups was that the high-performing groups revealed more incidents of learner behaviors in both studies. In addition, six categories of conflicting factors and five categories of facilitating factors were emerged in both studies. The inefficiency of work category was one of the most frequently observed categories in both studies. Interestingly, the high-performing groups showed more incidents of conflicting factors than the low-performing groups. This study revealed two different types of conflicting factors and there is a need for different moderating strategies depending on its type. Based on the results of the study, effective design strategies for an OLC to facilitate active learning were suggested.

Possibilities of reinforcement learning for nuclear power plants: Evidence on current applications and beyond

  • Aicheng Gong;Yangkun Chen;Junjie Zhang;Xiu Li
    • Nuclear Engineering and Technology
    • /
    • v.56 no.6
    • /
    • pp.1959-1974
    • /
    • 2024
  • Nuclear energy plays a crucial role in energy supply in the 21st century, and more and more Nuclear Power Plants (NPPs) will be in operation to contribute to the development of human society. However, as a typical complex system engineering, the operation and development of NPPs require efficient and stable control methods to ensure the safety and efficiency of nuclear power generation. Reinforcement learning (RL) aims at learning optimal control policies via maximizing discounted long-term rewards. The reward-oriented learning paradigm has witnessed remarkable success in many complex systems, such as wind power systems, electric power systems, coal fire power plants, robotics, etc. In this work, we try to present a systematic review of the applications of RL on these complex systems, from which we believe NPPs can borrow experience and insights. We then conduct a block-by-block investigation on the application scenarios of specific tasks in NPPs and carried out algorithmic research for different situations such as power startup, collaborative control, and emergency handling. Moreover, we discuss the possibilities of further application of RL methods on NPPs and detail the challenges when applying RL methods on NPPs. We hope this work can boost the realization of intelligent NPPs, and contribute to more and more research on how to better integrate RL algorithms into NPPs.