• Title/Summary/Keyword: Issue-based research

Search Result 2,062, Processing Time 0.034 seconds

Stress, Social Support and Coping of Adults According to Level of Self-Efficacy (성인의 스트레스, 사회적 지원과 대처: 자기효능감 수준별 분석)

  • Young-Shin Park;Ju-Yeon Son;Ok-Ran Song
    • Korean Journal of Culture and Social Issue
    • /
    • v.23 no.2
    • /
    • pp.295-332
    • /
    • 2017
  • The main purpose of this research is to analyze stress, social support and coping behavior of adults based on their level of self-efficacy. A total of 899 adults (399 male; 500 female), each with a child attending either elementary and secondary school, participated in the study. The inter-rater reliability for the open-ended questionnaire utilized in the study was 93.4%, with a Kappa coefficient of .92. The range of Cronbach α for the variables measured through a quantitative method was .87~.92. The results were as follows: First, the representative responses to the question about their most painful stress experiences were, financial difficulties, child rearing and duties of workplace. The Lower Efficacy group, compared to the Upper Efficacy group, responded much more with financial difficulties related responses. There were significant differences in the level of stress symptoms according to level of self-efficacy. The Lower Efficacy group expressed stronger levels of stress symptoms when compared to the Upper Efficacy group. Second, in terms of social support, the participants responded that they received the most help from their family members, followed by none(self), and friends. When comparing the two efficacy groups, the Upper Efficacy group responded most frequently that they received social support from their family members, whereas the Lower Efficacy group indicated none. There were significant differences in the level of relational conflicts according to the level of self-efficacy. The Upper Efficacy group showed much less conflict in parent-child relations, spousal relations and relations with their boss, compared to the Lower Efficacy group. Third, for the type of social support participants received, the most frequent response was emotional support, followed by none, and advice. Relatively, when comparing the two groups with each other, the Lower Efficacy group responded more frequently with none, whereas for the Upper Efficacy group responded more frequently with advice. There were significant differences in the amount of emotional support received according to level of self-efficacy. The Upper Efficacy group received much more emotional support from their spouses and their bosses compared to the Lower Efficacy group. Fourth, the most frequently adopted coping style to stress was self-regulation, followed by direct problem solving, and nothing(none). The most frequent response for the Upper Efficacy group was direct problem solving, whereas for the Lower Efficacy group was nothing(none). There was a significant difference in coping efficiency to stress according to level of self-efficacy. The Upper Efficacy group coped more efficiently with stress than the Lower Efficacy group.

Factors influencing health and quality of life among allergy and asthma patients: With specific focus on self-efficacy, social support and health management (건강과 삶의 질에 영향을 주는 요인에 대한 분석: 자기효능감, 사회적 지원 및 질병관리를 중심으로)

  • Uichol Kim ;Chun-soo Hong ;Jeung-Gweon Lee ;Young-Shin Park
    • Korean Journal of Culture and Social Issue
    • /
    • v.11 no.2
    • /
    • pp.143-181
    • /
    • 2005
  • This article examines factors that influence health and quality of life. In addition to the symptomatology and physiological functioning, the influence of the psychological functioning and interpersonal relationship on the overall health and quality of life are also investigated. Using a case-study approach, a total of 70 patients suffering from allergy or asthma were interviewed using a semi-structured questionnaire developed by the present authors. It assessed the following six areas: Cause and onset of illness, psychological functioning, health management, trust, social support received and overall health and quality of life. Based on the transactional model (Bandura, 1997; Kim & Park, 2005), the results of the case studies have been integrated and divided into three aspects: (1) Cause and onset of illness that includes physiological and environment factors; (2) mediating influences that includes psychological functioning, health management, interpersonal relationship and social support received; and (3) outcome factor that includes symptomatology, health and quality of life. The psychological functioning includes self-efficacy (self-regulated efficacy, efficacy for enlisting social support, efficacy for managing the environment, and efficacy for overcoming difficulties), positive outlook, life goals, experience of stress, and proxy control. Interpersonal relationship includes trust of family members and the physician. Health management includes receiving proper health assessment, following the advice and prescription given by the physicians, control of the environment and maintaining a healthy lifestyle. The results indicate that physiological, psychological, relational and environment factors interact with each other and affect individual's overall health and quality of life. Self-efficacy, social support received from family members, trust of physicians, and the health care system are key factors promoting healthy lifestyle and quality of life. The results indicate the need for further interdisciplinary, indigenous and cultural psychological research.

DEVELOPMENT OF STATEWIDE TRUCK TRAFFIC FORECASTING METHOD BY USING LIMITED O-D SURVEY DATA (한정된 O-D조사자료를 이용한 주 전체의 트럭교통예측방법 개발)

  • 박만배
    • Proceedings of the KOR-KST Conference
    • /
    • 1995.02a
    • /
    • pp.101-113
    • /
    • 1995
  • The objective of this research is to test the feasibility of developing a statewide truck traffic forecasting methodology for Wisconsin by using Origin-Destination surveys, traffic counts, classification counts, and other data that are routinely collected by the Wisconsin Department of Transportation (WisDOT). Development of a feasible model will permit estimation of future truck traffic for every major link in the network. This will provide the basis for improved estimation of future pavement deterioration. Pavement damage rises exponentially as axle weight increases, and trucks are responsible for most of the traffic-induced damage to pavement. Consequently, forecasts of truck traffic are critical to pavement management systems. The pavement Management Decision Supporting System (PMDSS) prepared by WisDOT in May 1990 combines pavement inventory and performance data with a knowledge base consisting of rules for evaluation, problem identification and rehabilitation recommendation. Without a r.easonable truck traffic forecasting methodology, PMDSS is not able to project pavement performance trends in order to make assessment and recommendations in the future years. However, none of WisDOT's existing forecasting methodologies has been designed specifically for predicting truck movements on a statewide highway network. For this research, the Origin-Destination survey data avaiiable from WisDOT, including two stateline areas, one county, and five cities, are analyzed and the zone-to'||'&'||'not;zone truck trip tables are developed. The resulting Origin-Destination Trip Length Frequency (00 TLF) distributions by trip type are applied to the Gravity Model (GM) for comparison with comparable TLFs from the GM. The gravity model is calibrated to obtain friction factor curves for the three trip types, Internal-Internal (I-I), Internal-External (I-E), and External-External (E-E). ~oth "macro-scale" calibration and "micro-scale" calibration are performed. The comparison of the statewide GM TLF with the 00 TLF for the macro-scale calibration does not provide suitable results because the available 00 survey data do not represent an unbiased sample of statewide truck trips. For the "micro-scale" calibration, "partial" GM trip tables that correspond to the 00 survey trip tables are extracted from the full statewide GM trip table. These "partial" GM trip tables are then merged and a partial GM TLF is created. The GM friction factor curves are adjusted until the partial GM TLF matches the 00 TLF. Three friction factor curves, one for each trip type, resulting from the micro-scale calibration produce a reasonable GM truck trip model. A key methodological issue for GM. calibration involves the use of multiple friction factor curves versus a single friction factor curve for each trip type in order to estimate truck trips with reasonable accuracy. A single friction factor curve for each of the three trip types was found to reproduce the 00 TLFs from the calibration data base. Given the very limited trip generation data available for this research, additional refinement of the gravity model using multiple mction factor curves for each trip type was not warranted. In the traditional urban transportation planning studies, the zonal trip productions and attractions and region-wide OD TLFs are available. However, for this research, the information available for the development .of the GM model is limited to Ground Counts (GC) and a limited set ofOD TLFs. The GM is calibrated using the limited OD data, but the OD data are not adequate to obtain good estimates of truck trip productions and attractions .. Consequently, zonal productions and attractions are estimated using zonal population as a first approximation. Then, Selected Link based (SELINK) analyses are used to adjust the productions and attractions and possibly recalibrate the GM. The SELINK adjustment process involves identifying the origins and destinations of all truck trips that are assigned to a specified "selected link" as the result of a standard traffic assignment. A link adjustment factor is computed as the ratio of the actual volume for the link (ground count) to the total assigned volume. This link adjustment factor is then applied to all of the origin and destination zones of the trips using that "selected link". Selected link based analyses are conducted by using both 16 selected links and 32 selected links. The result of SELINK analysis by u~ing 32 selected links provides the least %RMSE in the screenline volume analysis. In addition, the stability of the GM truck estimating model is preserved by using 32 selected links with three SELINK adjustments, that is, the GM remains calibrated despite substantial changes in the input productions and attractions. The coverage of zones provided by 32 selected links is satisfactory. Increasing the number of repetitions beyond four is not reasonable because the stability of GM model in reproducing the OD TLF reaches its limits. The total volume of truck traffic captured by 32 selected links is 107% of total trip productions. But more importantly, ~ELINK adjustment factors for all of the zones can be computed. Evaluation of the travel demand model resulting from the SELINK adjustments is conducted by using screenline volume analysis, functional class and route specific volume analysis, area specific volume analysis, production and attraction analysis, and Vehicle Miles of Travel (VMT) analysis. Screenline volume analysis by using four screenlines with 28 check points are used for evaluation of the adequacy of the overall model. The total trucks crossing the screenlines are compared to the ground count totals. L V/GC ratios of 0.958 by using 32 selected links and 1.001 by using 16 selected links are obtained. The %RM:SE for the four screenlines is inversely proportional to the average ground count totals by screenline .. The magnitude of %RM:SE for the four screenlines resulting from the fourth and last GM run by using 32 and 16 selected links is 22% and 31 % respectively. These results are similar to the overall %RMSE achieved for the 32 and 16 selected links themselves of 19% and 33% respectively. This implies that the SELINICanalysis results are reasonable for all sections of the state.Functional class and route specific volume analysis is possible by using the available 154 classification count check points. The truck traffic crossing the Interstate highways (ISH) with 37 check points, the US highways (USH) with 50 check points, and the State highways (STH) with 67 check points is compared to the actual ground count totals. The magnitude of the overall link volume to ground count ratio by route does not provide any specific pattern of over or underestimate. However, the %R11SE for the ISH shows the least value while that for the STH shows the largest value. This pattern is consistent with the screenline analysis and the overall relationship between %RMSE and ground count volume groups. Area specific volume analysis provides another broad statewide measure of the performance of the overall model. The truck traffic in the North area with 26 check points, the West area with 36 check points, the East area with 29 check points, and the South area with 64 check points are compared to the actual ground count totals. The four areas show similar results. No specific patterns in the L V/GC ratio by area are found. In addition, the %RMSE is computed for each of the four areas. The %RMSEs for the North, West, East, and South areas are 92%, 49%, 27%, and 35% respectively, whereas, the average ground counts are 481, 1383, 1532, and 3154 respectively. As for the screenline and volume range analyses, the %RMSE is inversely related to average link volume. 'The SELINK adjustments of productions and attractions resulted in a very substantial reduction in the total in-state zonal productions and attractions. The initial in-state zonal trip generation model can now be revised with a new trip production's trip rate (total adjusted productions/total population) and a new trip attraction's trip rate. Revised zonal production and attraction adjustment factors can then be developed that only reflect the impact of the SELINK adjustments that cause mcreases or , decreases from the revised zonal estimate of productions and attractions. Analysis of the revised production adjustment factors is conducted by plotting the factors on the state map. The east area of the state including the counties of Brown, Outagamie, Shawano, Wmnebago, Fond du Lac, Marathon shows comparatively large values of the revised adjustment factors. Overall, both small and large values of the revised adjustment factors are scattered around Wisconsin. This suggests that more independent variables beyond just 226; population are needed for the development of the heavy truck trip generation model. More independent variables including zonal employment data (office employees and manufacturing employees) by industry type, zonal private trucks 226; owned and zonal income data which are not available currently should be considered. A plot of frequency distribution of the in-state zones as a function of the revised production and attraction adjustment factors shows the overall " adjustment resulting from the SELINK analysis process. Overall, the revised SELINK adjustments show that the productions for many zones are reduced by, a factor of 0.5 to 0.8 while the productions for ~ relatively few zones are increased by factors from 1.1 to 4 with most of the factors in the 3.0 range. No obvious explanation for the frequency distribution could be found. The revised SELINK adjustments overall appear to be reasonable. The heavy truck VMT analysis is conducted by comparing the 1990 heavy truck VMT that is forecasted by the GM truck forecasting model, 2.975 billions, with the WisDOT computed data. This gives an estimate that is 18.3% less than the WisDOT computation of 3.642 billions of VMT. The WisDOT estimates are based on the sampling the link volumes for USH, 8TH, and CTH. This implies potential error in sampling the average link volume. The WisDOT estimate of heavy truck VMT cannot be tabulated by the three trip types, I-I, I-E ('||'&'||'pound;-I), and E-E. In contrast, the GM forecasting model shows that the proportion ofE-E VMT out of total VMT is 21.24%. In addition, tabulation of heavy truck VMT by route functional class shows that the proportion of truck traffic traversing the freeways and expressways is 76.5%. Only 14.1% of total freeway truck traffic is I-I trips, while 80% of total collector truck traffic is I-I trips. This implies that freeways are traversed mainly by I-E and E-E truck traffic while collectors are used mainly by I-I truck traffic. Other tabulations such as average heavy truck speed by trip type, average travel distance by trip type and the VMT distribution by trip type, route functional class and travel speed are useful information for highway planners to understand the characteristics of statewide heavy truck trip patternS. Heavy truck volumes for the target year 2010 are forecasted by using the GM truck forecasting model. Four scenarios are used. Fo~ better forecasting, ground count- based segment adjustment factors are developed and applied. ISH 90 '||'&'||' 94 and USH 41 are used as example routes. The forecasting results by using the ground count-based segment adjustment factors are satisfactory for long range planning purposes, but additional ground counts would be useful for USH 41. Sensitivity analysis provides estimates of the impacts of the alternative growth rates including information about changes in the trip types using key routes. The network'||'&'||'not;based GMcan easily model scenarios with different rates of growth in rural versus . . urban areas, small versus large cities, and in-state zones versus external stations. cities, and in-state zones versus external stations.

  • PDF

Structural Adjustment of Domestic Firms in the Era of Market Liberalization (시장개방(市場開放)과 국내기업(國內企業)의 구조조정(構造調整))

  • Seong, So-mi
    • KDI Journal of Economic Policy
    • /
    • v.13 no.4
    • /
    • pp.91-116
    • /
    • 1991
  • Market liberalization progressing simultaneously with high and rapidly rising domestic wages has created an adverse business environment for domestic firms. Korean firms are losing their international competitiveness in comparison to firms from LDC(Less Developed Countries) in low-tech industries. In high-tech industries, domestic firms without government protection (which is impossible due to the liberalization policy and the current international status of the Korean economy) are in a disadvantaged position relative to firms from advanced countries. This paper examines the division of roles between the private sector and the government in order to achieve a successful structural adjustment, which has become the impending industrial policy issue caused by high domestic wages, on the one hand, and the opening of domestic markets, on the other. The micro foundation of the economy-wide structural adjustment is actually the restructuring of business portfolios at the firm level. The firm-level business restructuring means that firms in low-value-added businesses or with declining market niches establish new major businesses in higher value-added segments or growing market niches. The adjustment of the business structure at the firm level can only be accomplished by accumulating firm-specific managerial assets necessary to establish a new business structure. This can be done through learning-by-doing in the whole system of management, including research and development, manufacturing, and marketing. Therefore, the voluntary cooperation among the people in the company is essential for making the cost of the learning process lower than that at the competing companies. Hence, firms that attempt to restructure their major businesses need to induce corporate-wide participation through innovations in organization and management, encourage innovative corporate culture, and maintain cooperative labor unions. Policy discussions on structural adjustments usually regard firms as a black box behind a few macro variables. But in reality, firm activities are not flows of materials but relationships among human resources. The growth potential of companies are embodied in the human resources of the firm; the balance of interest among stockholders, managers, and workers of the company' brings the accumulation of the company's core competencies. Therefore, policymakers and economists shoud change their old concept of the firm as a technological black box which produces a marketable commodities. Firms should be regarded as coalitions of interest groups such as stockholders, managers, and workers. Consequently the discussion on the structural adjustment both at the macroeconomic level and the firm level should be based on this new paradigm of understanding firms. The government's role in reducing the cost of structural adjustment and supporting should the creation of new industries emphasize the following: First, government must promote the competition in domestic markets by revising laws related to antitrust policy, bankruptcy, and the promotion of small and medium-sized companies. General consensus on the limitations of government intervention and the merit of deregulation should be sought among policymakers and people in the business world. In the age of internationalization, nation-specific competitive advantages cannot be exclusively in favor of domestic firms. The international competitiveness of a domestic firm derives from the firm-specific core competencies which can be accumulated by internal investment and organization of the firm. Second, government must build up a solid infrastructure of production factors including capital, technology, manpower, and information. Structural adjustment often entails bankruptcies and partial waste of resources. However, it is desirable for the government not to try to sustain marginal businesses, but to support the diversification or restructuring of businesses by assisting in factor creation. Institutional support for venture businesses needs to be improved, especially in the financing system since many investment projects in venture businesses are highly risky, even though they are very promising. The proportion of low-value added production processes and declining industries should be reduced by promoting foreign direct investment and factory automation. Moreover, one cannot over-emphasize the importance of future-oriented labor policies to be based on the new paradigm of understanding firm activities. The old laws and instititutions related to labor unions need to be reformed. Third, government must improve the regimes related to money, banking, and the tax system to change business practices dependent on government protection or undesirable in view of the evolution of the Korean economy as a whole. To prevent rational business decisions from contradicting to the interest of the economy as a whole, government should influence the business environment, not the business itself.

  • PDF

Pareto Ratio and Inequality Level of Knowledge Sharing in Virtual Knowledge Collaboration: Analysis of Behaviors on Wikipedia (지식 공유의 파레토 비율 및 불평등 정도와 가상 지식 협업: 위키피디아 행위 데이터 분석)

  • Park, Hyun-Jung;Shin, Kyung-Shik
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.3
    • /
    • pp.19-43
    • /
    • 2014
  • The Pareto principle, also known as the 80-20 rule, states that roughly 80% of the effects come from 20% of the causes for many events including natural phenomena. It has been recognized as a golden rule in business with a wide application of such discovery like 20 percent of customers resulting in 80 percent of total sales. On the other hand, the Long Tail theory, pointing out that "the trivial many" produces more value than "the vital few," has gained popularity in recent times with a tremendous reduction of distribution and inventory costs through the development of ICT(Information and Communication Technology). This study started with a view to illuminating how these two primary business paradigms-Pareto principle and Long Tail theory-relates to the success of virtual knowledge collaboration. The importance of virtual knowledge collaboration is soaring in this era of globalization and virtualization transcending geographical and temporal constraints. Many previous studies on knowledge sharing have focused on the factors to affect knowledge sharing, seeking to boost individual knowledge sharing and resolve the social dilemma caused from the fact that rational individuals are likely to rather consume than contribute knowledge. Knowledge collaboration can be defined as the creation of knowledge by not only sharing knowledge, but also by transforming and integrating such knowledge. In this perspective of knowledge collaboration, the relative distribution of knowledge sharing among participants can count as much as the absolute amounts of individual knowledge sharing. In particular, whether the more contribution of the upper 20 percent of participants in knowledge sharing will enhance the efficiency of overall knowledge collaboration is an issue of interest. This study deals with the effect of this sort of knowledge sharing distribution on the efficiency of knowledge collaboration and is extended to reflect the work characteristics. All analyses were conducted based on actual data instead of self-reported questionnaire surveys. More specifically, we analyzed the collaborative behaviors of editors of 2,978 English Wikipedia featured articles, which are the best quality grade of articles in English Wikipedia. We adopted Pareto ratio, the ratio of the number of knowledge contribution of the upper 20 percent of participants to the total number of knowledge contribution made by the total participants of an article group, to examine the effect of Pareto principle. In addition, Gini coefficient, which represents the inequality of income among a group of people, was applied to reveal the effect of inequality of knowledge contribution. Hypotheses were set up based on the assumption that the higher ratio of knowledge contribution by more highly motivated participants will lead to the higher collaboration efficiency, but if the ratio gets too high, the collaboration efficiency will be exacerbated because overall informational diversity is threatened and knowledge contribution of less motivated participants is intimidated. Cox regression models were formulated for each of the focal variables-Pareto ratio and Gini coefficient-with seven control variables such as the number of editors involved in an article, the average time length between successive edits of an article, the number of sections a featured article has, etc. The dependent variable of the Cox models is the time spent from article initiation to promotion to the featured article level, indicating the efficiency of knowledge collaboration. To examine whether the effects of the focal variables vary depending on the characteristics of a group task, we classified 2,978 featured articles into two categories: Academic and Non-academic. Academic articles refer to at least one paper published at an SCI, SSCI, A&HCI, or SCIE journal. We assumed that academic articles are more complex, entail more information processing and problem solving, and thus require more skill variety and expertise. The analysis results indicate the followings; First, Pareto ratio and inequality of knowledge sharing relates in a curvilinear fashion to the collaboration efficiency in an online community, promoting it to an optimal point and undermining it thereafter. Second, the curvilinear effect of Pareto ratio and inequality of knowledge sharing on the collaboration efficiency is more sensitive with a more academic task in an online community.

A Study on the Establishment of Comparison System between the Statement of Military Reports and Related Laws (군(軍) 보고서 등장 문장과 관련 법령 간 비교 시스템 구축 방안 연구)

  • Jung, Jiin;Kim, Mintae;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.109-125
    • /
    • 2020
  • The Ministry of National Defense is pushing for the Defense Acquisition Program to build strong defense capabilities, and it spends more than 10 trillion won annually on defense improvement. As the Defense Acquisition Program is directly related to the security of the nation as well as the lives and property of the people, it must be carried out very transparently and efficiently by experts. However, the excessive diversification of laws and regulations related to the Defense Acquisition Program has made it challenging for many working-level officials to carry out the Defense Acquisition Program smoothly. It is even known that many people realize that there are related regulations that they were unaware of until they push ahead with their work. In addition, the statutory statements related to the Defense Acquisition Program have the tendency to cause serious issues even if only a single expression is wrong within the sentence. Despite this, efforts to establish a sentence comparison system to correct this issue in real time have been minimal. Therefore, this paper tries to propose a "Comparison System between the Statement of Military Reports and Related Laws" implementation plan that uses the Siamese Network-based artificial neural network, a model in the field of natural language processing (NLP), to observe the similarity between sentences that are likely to appear in the Defense Acquisition Program related documents and those from related statutory provisions to determine and classify the risk of illegality and to make users aware of the consequences. Various artificial neural network models (Bi-LSTM, Self-Attention, D_Bi-LSTM) were studied using 3,442 pairs of "Original Sentence"(described in actual statutes) and "Edited Sentence"(edited sentences derived from "Original Sentence"). Among many Defense Acquisition Program related statutes, DEFENSE ACQUISITION PROGRAM ACT, ENFORCEMENT RULE OF THE DEFENSE ACQUISITION PROGRAM ACT, and ENFORCEMENT DECREE OF THE DEFENSE ACQUISITION PROGRAM ACT were selected. Furthermore, "Original Sentence" has the 83 provisions that actually appear in the Act. "Original Sentence" has the main 83 clauses most accessible to working-level officials in their work. "Edited Sentence" is comprised of 30 to 50 similar sentences that are likely to appear modified in the county report for each clause("Original Sentence"). During the creation of the edited sentences, the original sentences were modified using 12 certain rules, and these sentences were produced in proportion to the number of such rules, as it was the case for the original sentences. After conducting 1 : 1 sentence similarity performance evaluation experiments, it was possible to classify each "Edited Sentence" as legal or illegal with considerable accuracy. In addition, the "Edited Sentence" dataset used to train the neural network models contains a variety of actual statutory statements("Original Sentence"), which are characterized by the 12 rules. On the other hand, the models are not able to effectively classify other sentences, which appear in actual military reports, when only the "Original Sentence" and "Edited Sentence" dataset have been fed to them. The dataset is not ample enough for the model to recognize other incoming new sentences. Hence, the performance of the model was reassessed by writing an additional 120 new sentences that have better resemblance to those in the actual military report and still have association with the original sentences. Thereafter, we were able to check that the models' performances surpassed a certain level even when they were trained merely with "Original Sentence" and "Edited Sentence" data. If sufficient model learning is achieved through the improvement and expansion of the full set of learning data with the addition of the actual report appearance sentences, the models will be able to better classify other sentences coming from military reports as legal or illegal. Based on the experimental results, this study confirms the possibility and value of building "Real-Time Automated Comparison System Between Military Documents and Related Laws". The research conducted in this experiment can verify which specific clause, of several that appear in related law clause is most similar to the sentence that appears in the Defense Acquisition Program-related military reports. This helps determine whether the contents in the military report sentences are at the risk of illegality when they are compared with those in the law clauses.

Animal Infectious Diseases Prevention through Big Data and Deep Learning (빅데이터와 딥러닝을 활용한 동물 감염병 확산 차단)

  • Kim, Sung Hyun;Choi, Joon Ki;Kim, Jae Seok;Jang, Ah Reum;Lee, Jae Ho;Cha, Kyung Jin;Lee, Sang Won
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.4
    • /
    • pp.137-154
    • /
    • 2018
  • Animal infectious diseases, such as avian influenza and foot and mouth disease, occur almost every year and cause huge economic and social damage to the country. In order to prevent this, the anti-quarantine authorities have tried various human and material endeavors, but the infectious diseases have continued to occur. Avian influenza is known to be developed in 1878 and it rose as a national issue due to its high lethality. Food and mouth disease is considered as most critical animal infectious disease internationally. In a nation where this disease has not been spread, food and mouth disease is recognized as economic disease or political disease because it restricts international trade by making it complex to import processed and non-processed live stock, and also quarantine is costly. In a society where whole nation is connected by zone of life, there is no way to prevent the spread of infectious disease fully. Hence, there is a need to be aware of occurrence of the disease and to take action before it is distributed. Epidemiological investigation on definite diagnosis target is implemented and measures are taken to prevent the spread of disease according to the investigation results, simultaneously with the confirmation of both human infectious disease and animal infectious disease. The foundation of epidemiological investigation is figuring out to where one has been, and whom he or she has met. In a data perspective, this can be defined as an action taken to predict the cause of disease outbreak, outbreak location, and future infection, by collecting and analyzing geographic data and relation data. Recently, an attempt has been made to develop a prediction model of infectious disease by using Big Data and deep learning technology, but there is no active research on model building studies and case reports. KT and the Ministry of Science and ICT have been carrying out big data projects since 2014 as part of national R &D projects to analyze and predict the route of livestock related vehicles. To prevent animal infectious diseases, the researchers first developed a prediction model based on a regression analysis using vehicle movement data. After that, more accurate prediction model was constructed using machine learning algorithms such as Logistic Regression, Lasso, Support Vector Machine and Random Forest. In particular, the prediction model for 2017 added the risk of diffusion to the facilities, and the performance of the model was improved by considering the hyper-parameters of the modeling in various ways. Confusion Matrix and ROC Curve show that the model constructed in 2017 is superior to the machine learning model. The difference between the2016 model and the 2017 model is that visiting information on facilities such as feed factory and slaughter house, and information on bird livestock, which was limited to chicken and duck but now expanded to goose and quail, has been used for analysis in the later model. In addition, an explanation of the results was added to help the authorities in making decisions and to establish a basis for persuading stakeholders in 2017. This study reports an animal infectious disease prevention system which is constructed on the basis of hazardous vehicle movement, farm and environment Big Data. The significance of this study is that it describes the evolution process of the prediction model using Big Data which is used in the field and the model is expected to be more complete if the form of viruses is put into consideration. This will contribute to data utilization and analysis model development in related field. In addition, we expect that the system constructed in this study will provide more preventive and effective prevention.

Intelligent Brand Positioning Visualization System Based on Web Search Traffic Information : Focusing on Tablet PC (웹검색 트래픽 정보를 활용한 지능형 브랜드 포지셔닝 시스템 : 태블릿 PC 사례를 중심으로)

  • Jun, Seung-Pyo;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.93-111
    • /
    • 2013
  • As Internet and information technology (IT) continues to develop and evolve, the issue of big data has emerged at the foreground of scholarly and industrial attention. Big data is generally defined as data that exceed the range that can be collected, stored, managed and analyzed by existing conventional information systems and it also refers to the new technologies designed to effectively extract values from such data. With the widespread dissemination of IT systems, continual efforts have been made in various fields of industry such as R&D, manufacturing, and finance to collect and analyze immense quantities of data in order to extract meaningful information and to use this information to solve various problems. Since IT has converged with various industries in many aspects, digital data are now being generated at a remarkably accelerating rate while developments in state-of-the-art technology have led to continual enhancements in system performance. The types of big data that are currently receiving the most attention include information available within companies, such as information on consumer characteristics, information on purchase records, logistics information and log information indicating the usage of products and services by consumers, as well as information accumulated outside companies, such as information on the web search traffic of online users, social network information, and patent information. Among these various types of big data, web searches performed by online users constitute one of the most effective and important sources of information for marketing purposes because consumers search for information on the internet in order to make efficient and rational choices. Recently, Google has provided public access to its information on the web search traffic of online users through a service named Google Trends. Research that uses this web search traffic information to analyze the information search behavior of online users is now receiving much attention in academia and in fields of industry. Studies using web search traffic information can be broadly classified into two fields. The first field consists of empirical demonstrations that show how web search information can be used to forecast social phenomena, the purchasing power of consumers, the outcomes of political elections, etc. The other field focuses on using web search traffic information to observe consumer behavior, identifying the attributes of a product that consumers regard as important or tracking changes on consumers' expectations, for example, but relatively less research has been completed in this field. In particular, to the extent of our knowledge, hardly any studies related to brands have yet attempted to use web search traffic information to analyze the factors that influence consumers' purchasing activities. This study aims to demonstrate that consumers' web search traffic information can be used to derive the relations among brands and the relations between an individual brand and product attributes. When consumers input their search words on the web, they may use a single keyword for the search, but they also often input multiple keywords to seek related information (this is referred to as simultaneous searching). A consumer performs a simultaneous search either to simultaneously compare two product brands to obtain information on their similarities and differences, or to acquire more in-depth information about a specific attribute in a specific brand. Web search traffic information shows that the quantity of simultaneous searches using certain keywords increases when the relation is closer in the consumer's mind and it will be possible to derive the relations between each of the keywords by collecting this relational data and subjecting it to network analysis. Accordingly, this study proposes a method of analyzing how brands are positioned by consumers and what relationships exist between product attributes and an individual brand, using simultaneous search traffic information. It also presents case studies demonstrating the actual application of this method, with a focus on tablets, belonging to innovative product groups.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

A Study on the Costume Style of Civil Servants' Stone Images Erected at Tombs of the Kings for Yi-dynasty (조선왕조(朝鮮王朝) 왕릉(王陵) 문인석상(文人石像)의 복식형태(服飾形態)에 관한 연구)

  • Kwon, Yong-Ok
    • Journal of the Korean Society of Costume
    • /
    • v.4
    • /
    • pp.87-114
    • /
    • 1981
  • A costume reveals the social characteristics of the era in which it is worn, thus we can say that the history of change of the costume is the history of change of the living culture of the era. Since the Three States era, the costume structure of this country had been affected by the costume system of the China's historical dynasties in the form of the grant therefrom because of geographical conditions, which affection was conspicuous for the bureaucrat class, particularly including but not limited to the Kings' familities. Such a grant of the costume for the bureaucrat class (i.e., official uniform) was first given by the Dang-dynasty at the age of Queen Jinduck, the 28th of the Shilla-dynasty. Since then, the costume for the bureaucrats had consecutively been affected as the ages had gone from the unified Shilla, to the Koryo and to the Yi-dynasty. As the full costumes officially used by government officials (generally called "Baek Gwan") in the Yidynasty, there existed Jo-bok, Gong-bok and Sang-bok. Of such official costumes, Gong-bok was worn at the time of conducting official affairs of the dynasty, making a respectful visit for the expression of thanks or meeting diplomatic missions of foreign countries. It appears no study was made yet with regard to the Gong-bok while the studies on the Jo-bok and the Sangbok were made. Therefore, this article is, by rendering a study and research on the styles of costumes of civil servants' stone images erected at the Kings' tombs of the Yi-dynasty, to help the persons concerned understand the Gong-bok, one of the official costume for Baek Kwan of that age and further purports to specifically identify the styles and changes of the Gong-bok, worn by Baek Gwan during the Yi-dynasty, consisting of the Bok-doo (a hat, four angled and two storied with flat top), Po (gown), Dae (belt), and Hol (small and thin plate which was officially held by the government officials in hand, showing the courtesy to and writing brief memorandums before the King) and Hwa (shoes). For that purpose, I investigated by actually visiting the tombs of the Kings of the Yi-dynasty including the Geonwon-neung, the tomb of the first King Tae-jo and the You-neung, the tomb of the 27th King Soon-jong as well as the tombs of the lawful wives and concubines of various Kings, totalling 29 tombs and made reference to relevant books and records. Pursuant. to this study, of the 29 Kings' tombs the costume styles of civil servants' stone images erected at the 26 Kings' tombs are those of Gong-bok for Baek-gwan of the Yi-dynasty wearing Bok-doo as a hat and Ban-ryeong or Dan-ryenog Po as a gown with Dae, holding Hol in hand and wearing shoes. Other than those of the 26 tombs, the costume styles of the Ryu-neung, the tomb of the Moon-jo who was the first son of 23rd King Soon-jo and given the King's title after he died and of the You-neung, the tomb of the 27th King Soon-jong are those of Jobok with Yang-gwan (a sort of hat having stripes erected, which is different from the Bok-doo), and that of the Hong-neung, the tomb of the 26th King Go-jong shows an exceptional one wearing Yang-gwan and Ban-ryeong Po ; these costume styles other than Gongbok remain as the subject for further study. Gong-bok which is the costume style of civil servants' stone images of most of the Kings' tombs had not been changed in its basic structure for about 500 years of the Yi-dynasty and Koryo categorized by the class of officials pursuant to the color of Po and materials of Dae and Hol. Summary of this costume style follows: (1) Gwan-mo (hat). The Gwan-mo style of civil servants' stone images of the 26 Kings' tombs, other than Ryu-neung, Hong-neung and You-neung which have Yang-gwan, out of the 29 Kings' tombs of the Yi-dynasty reveals the Bok-doo with four angled top, having fore-part and back-part divided. Back part of the Bok-doo is double the fore-part in height. The expression of the Gak (wings of the Bokdoo) varies: the Gyo-gak Bok-doo in that the Gaks, roundly arisen to the direction of the top, are clossed each other (tombs of the Kings Tae-jong), the downward style Jeon-gak Bok-doo in that soft Gaks are hanged on the shoulders (tombs of the Kings Joong-jong and Seong-jong) and another types of Jeon-gak Bok-doo having Gaks which arearisen steeply or roundly to the direction of top and the end of which are treated in a rounded or straight line form. At the lower edge one protrusive line distinctly reveals. Exceptionally, there reveals 11 Yang-gwan (gwan having 11 stripes erected) at the Ryu-neung of the King Moon-jo, 9 Yang-gwan at the Hong-neung of the King Go-jong and 11 Yang-gwan at the You-neung of the King Soon-jong; noting that the Yang-gwan of Baek Kwan, granted by the Myeong-dynasty of the China during the Yi-dynasty, was in the shape of 5 Yang-gwan for the first Poom (class) based on the principle of "Yideung Chaegang" (gradual degrading for secondary level), the above-mentioned Yang-gwans are very contrary to the principle and I do not touch such issue in this study, leaving for further study. (2) Po (gown). (a) Git (collar). Collar style of Po was the Ban-ryeong (round collar) having small neck-line in the early stage and was changed to the Dan-ryeong (round collar having deep neck-line) in the middle of the: dynasty. In the Dan-ryeong style of the middle era (shown at the tomb of the King Young-jo); a, thin line such as bias is shown around the internal side edge and the width of collar became wide a little. It is particularly noted that the Ryu-neung established in the middle stage and the You-neung in the later stage show civil servants in Jo-bok with the the Jikryeong (straight collar) Po and in case of the Hong-neung, the Hong-neung, the tomb of the King Go-jong, civil servants, although they wear Yang-gwan, are in the Ban-ryeong Po with Hoo-soo (back embroidery) and Dae and wear shoes as used in the Jo-bok style. As I could not make clear the theoretical basis of why the civil servants' costume styles revealed, at these tombs of the Kings are different from those of other tombs, I left this issue for further study. It is also noted that all the civil servants' stone images show the shape of triangled collar which is revealed over the Godae-git of Po. This triangled collar, I believe, would be the collar of the Cheomri which was worn in the middle of the Po and the underwear, (b) Sleeve. The sleeve was in the Gwan-soo (wide sleeve) style. having the width of over 100 centimeter from the early stage to the later stage arid in the Doo-ri sleeve style having the edge slightly rounded and we can recognize that it was the long sleeve in view of block fold shaped protrusive line, expressed on the arms. At the age of the King Young-jo, the sleeve-end became slightly narrow and as a result, the lower line of the sleeve were shaped curved. We can see another shape of narrow sleeve inside the wide sleeve-end, which should be the sleeve of the Cheom-ri worn under the Gong-bok. (c) Moo. The Moo revealed on the Po of civil servants' stone images at the age of the King Sook-jong' coming to the middle era. Initially the top of the Moo was expressed flat but the Moo was gradually changed to the triangled shape with the acute top. In certain cases, top or lower part of the Moo are not reveald because of wear and tear. (d) Yeomim. Yeomim (folding) of the Po was first expressed on civil servants' stone images of the Won-neung, the tomb of the King Young-jo and we can seemore delicate expression of the Yeomim and Goreum (stripe folding and fixing the lapel of the Po) at the tomb of the Jeongseong-wanghoo, the wife of the King Young-jo, At the age of the King Soon-jo, we can see the shape of Goreum similar to a string rather than the Goreum and the upper part of the Goreum which fixes Yeomim was expressed on the right sleeve. (3) Dae. Dae fixed on the Po was placed half of the length of Po from the shoulders in the early stage. Thereafter, at the age of the King Hyeon-jong it was shown on the slightly upper part. placed around one third of the length of Po. With regard to the design of Dae, all the civil servants' stone images of the Kings' tombs other than those of the Geonwon-neung of the King Tae-jo show single or double protrusive line expressed at the edge of Dae and in the middle of such lines, cloud pattern, dangcho (a grass) pattern, chrysanthemum pattern or other various types of flowery patterns were designed. Remaining portion of the waist Dae was hanged up on the back, which was initially expressed as directed from the left to the right but thereafter expressed. without orderly fashion,. to the direction of the left from the right and vice versa, Dae was in the shape of Yaja Dae. In this regard, an issue of when or where such a disorderly fashion of the direction of the remaining portion of waist Dae was originated is also presented to be clarified. In case of the Ryuneung, Hong-neung and You-neung which have civil servants' stone images wearing exceptional costume (Jo-bok), waist Dae of the Ryu-neung and Hong-neung are designed in the mixture of dual cranes pattern, cosecutive beaded pattern and chrvsenthemum pattern and that of You-neung is designed in cloud pattern. (4) Hol. Although materials of the Hol held in hand of civil servants' stone images are not identifiable, those should be the ivory Hol as all the Baek Gwan's erected as stone images should be high class officials. In the styles, no significant changes were found, however the Hol's expressed on civil servants' stone images of the Yi-dynasty were shaped in round top and angled bottom or round top and bottom. Parcicularly, at the age of the King Young-jo the Hol was expressed in the peculiar type with four angles all cut off. (5) Hwa (shoes). As the shoes expressed on civil servants' stone images are covered with the lower edges of the Po, the styles thereof are not exactly identifiable. However, reading the statement "black leather shoes for the first class (1 Poom) to ninth class (9 Poom)," recorded in the Gyeongkook Daejon, we can believe that the shoes were worn. As the age went on, the front tips of the shoes were soared and particularly, at the Hong-neung of the King Go-jong the shoes were obviously expressed with modern sense as the country were civilized.

  • PDF