• Title/Summary/Keyword: Non-formal

Search Result 229, Processing Time 0.033 seconds

Reliability of Education and Occupational Class: A Comparison of Health Survey and Death Certificate Data (면접조사자료와 사망등록자료 간 교육수준 및 직업계층의 신뢰도)

  • Kim, Hye-Ryun;Khang, Young-Ho
    • Journal of Preventive Medicine and Public Health
    • /
    • v.38 no.4
    • /
    • pp.443-448
    • /
    • 2005
  • Objectives : This study was done to evaluate the reliability of education and occupational class between using the health survey and the death certificate data. Methods : The 1998 National Health and Nutrition Examination Survey (NHANES) was conducted on a cross-sectional probability sample of South Korean households, and it contained unique 13-digit personal identification numbers that were linked to the data on mortality from the Korean National Statistical Office. The data from 263 deaths were used to estimate the agreement rates and the Kappa indices of the education and occupational class between using the NHANES data and the death certificate data. Results : The simple and weighted Kappa indices for education were 0.60 (95% CI=0.53-0.68) and 0.73 (95% CI=0.67-0.79) respectively, if the educational level was grouped into five categories: no-formal-education, elementary-school, middle-school, high-school and college or over. The overall agreement rate was 71.9% for these educational groups. The magnitude of reliability, as measured by the overall agreement rates and Kappa indices, tended to increase with a decrease in the educational class. The number of non-educated people with using the death certificate data was smaller than that with using the NHANES data. For the occupational class (manual workers, non-manual workers and others), the Kappa index was 0.40 (95% CI=0.30-0.51), which was relatively lower than that for the educational class. Compared with the NHANES, the number of non-manual workers for the deceased who were aged 30-64 tended to be increased (8 to 12) when using the death certificate data, whereas the number of manual workers tended to be decreased (59 to 41). Conclusions : The socioeconomic inequalities in the mortality rates that were based on the previous unlinked studies in South Korea were not due to a numerator/denominator bias. The mortality rates for the manual workers and the no-education groups might have been underestimated.

Negativity, or the Justice for the Unsayable: Susan Glaspell's Trifles ('말할 수 없는 것들'의 부정성 -수전 글래스펄의 『하찮은 것들』 "말할 수 없는 것에 대해 말할 수는 없다. 그것은 오직 제 스스로 말할 뿐이다.")

  • Noh, Aegyung
    • Journal of English Language & Literature
    • /
    • v.55 no.4
    • /
    • pp.567-596
    • /
    • 2009
  • A staple of feminist literary anthologies which was instrumental in reevaluating the writer Susan Glaspell, Trifles(1916) has received numerous comments from feminist scholars so far. Most of them tend to concentrate on the themes of female solidarity and justice challenging the androcentric system of law and order. Lacking in the plethora of thematic approaches to the play's feminist subject, however, are formal analyses considering the way in which the play's generic form assists in communicating such thematic concerns of feminism. An alternative to the typical scenario at the courtroom whose mistreatment of women must have loomed large to the young Glaspell as she revisited the old trial of a midwestern murderess which she had covered as a journalist for a local newspaper in Iowa, Trifles serves as a corrective to the courtroom dynamics offering a 'dramatic justice' as opposed to a strictly legal procedure. What this article discovers at the heart of this dramatic justice is the celebration of the unsayable, or what Wolfgang Iser termed negativity, of women's experience which has no room for reflection in the legal discourse at the courtroom tyrannized by the sayable and the evident. Examining how the dramatic form of Trifles gives a voice to the unsayable of woman's experience, which can not be properly represented at the courtroom governed by the straightforward and definitive male rhetoric, the article argues that the play is a better form than its fictional adaptation "A Jury of Her Peers"(1917) in that it syntactically suppresses the monopolizing operation of the verbal by giving precedence to the scenic and non-verbal which is constituted of setting, props, gesture and eye contacts. As a theoretical frame of reference with which to examine the modes of the unsayable in the play the article brings the concept of 'negativity,' defined by Iser as textual effects or modes of the unspeakable and unsaid, into the discussion of the taciturnity of the absent heroine and the non-verbal representation of drama.

Inpatient Satisfaction and Dissatisfaction in Relation to Socio-demographics and Utilization Characteristics (입원환자의 사회인구학적 요인 및 의료이용 특성과 환자만족$\cdot$불만족간의 관련성)

  • Cho Sung-Hyun
    • Journal of Korean Academy of Nursing
    • /
    • v.35 no.3
    • /
    • pp.535-545
    • /
    • 2005
  • Purpose: This paper reports a study exploring factors related to patient satisfaction and dissatisfaction with inpatient care. Method: A cross-sectional study design was used, employing data from the National Health and Nutrition Survey conducted in 2001. Socio-demographic factors, utilization, self-rated health status, and disease characteristics were assessed by employing univariate comparisons and multivariate logistic regression analyses. Result: Out of 37,769 respondents, 1,043 aged 20 years and over had been admitted to a hospital or clinic at least once during the past year. About a quarter of the respondents were discharged from tertiary hospitals and $21\%$ from clinics. The majority of patients ($58\%$) were satisfied with inpatient care received, whereas $11\%$ were dissatisfied. Greater satisfaction was found in patients aged 45-64 years and those having formal education, discharge from tertiary hospitals, national health insurance as a payer, medical expenses not being burdensome, good self-rated health status, and neoplasm. Living in non-metropolitan urban areas, shorter length of stay, and musculoskeletal diseases were associated with greater dissatisfaction. Conclusion: Different factors were related to patient satisfaction and dissatisfaction with care. Those factors need to be taken into account when evaluating and comparing satisfaction levels between health care institutions.

A Study on Metamorphic analysis and the expressive system in Contempory Architecture (현대 건축의 메타모포시스적 해석과 표현에 관한 연구)

  • Byun, Dae-Joong
    • Korean Institute of Interior Design Journal
    • /
    • v.20 no.1
    • /
    • pp.14-23
    • /
    • 2011
  • The purpose of this study is to analyse the inclinations and expressions in contemporary architecture. Specially, we call this tendency and architectural movements as architectural metamorphosis. Metamorphosis in architecture present the core of the change of Forms and spirits in a change of outward shape and terrestrial identity. As in Ovid's extended dramatic poem of change and transformation, Metamorphoses, all Souls are deathless, and migrates from one form to another. Like these stories in Metamorphoses, Ovid tells the soul never dies, but leaps one form to anther, and can take any shape. So the architectural form, transformation and deformation in contemporary architecture means architectural sensations and cognitions can even approach the soul of form and shape under the transformation. The expressions and design strategies of metamorphosis in comtemporary architecture reveal continuous and sequential formations of space, linear structure with force and vector, rhythmical wavement and folding surface, lively wiggly flows of volumns and objects, and so on. Such qualities came from the periodical needs; separation of structure and surface, poly-surfacial movement, poly-sensual expression and experience, dematerialization and the dematerialized space, formless of non-formal architecture, digital architecture. Architecture of Metamorphosis is the ways and the needs of our period to overcome the static limits prohibits the liberal thoughts, to find the ways toward the opportunities and diversities and to unlock the imaginaire of the contemporary architecture.

Inventing Computer Desk for Education by Group (단체 교육용 컴퓨터 책상 개발)

  • Kang, Myung-Sun;Lim, Kwang-Soon
    • Journal of the Korea Furniture Society
    • /
    • v.19 no.3
    • /
    • pp.193-202
    • /
    • 2008
  • In order to occupy educational furniture market that grows by the day and to meet demands for alternative product for the current market, this study took business features and productivity of Sinil Furniture Co into consideration, and developed computer desk for education by group, which is new among educational furniture. The scope of the study ranges from data research based on design process into creation of prototype. By improving the condition where, despite that electrically-powered computer desk for anti-theft system is high priced, it sees frequent malfunction, the study suggested low-priced, non- electrically-powered anti-theft system which has more solid structure. Furthermore, in order for the user to be more free and comfortable while studying on it, it differentiates from other products by locating PC main body to the back of the monitor and lowering it below the altitude of monitor to prevent it from interfering with studies. We've made the higher board of the desk in a soft curved-shape in order to lessen the stress from studying. And as space for the monitor's lower mount was decreased, we've put the lower mount below the higher board; so that lacking space can be recovered while functioning as anti-theft system. Moreover, we've covered the PC main body with steel cover so that it would add color and formal luxuriousness to the appearance of the desk. Considering ease of mobility and productivity, knock-down system was introduced.

  • PDF

Enhanced Cloud Service Discovery for Naïve users with Ontology based Representation

  • Viji Rajendran, V;Swamynathan, S
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.38-57
    • /
    • 2016
  • Service discovery is one of the major challenges in cloud computing environment with a large number of service providers and heterogeneous services. Non-uniform naming conventions, varied types and features of services make cloud service discovery a grueling problem. With the proliferation of cloud services, it has been laborious to find services, especially from Internet-based service repositories. To address this issue, services are crawled and clustered according to their similarity. The clustered services are maintained as a catalogue in which the data published on the cloud provider's website are stored in a standard format. As there is no standard specification and a description language for cloud services, new efficient and intelligent mechanisms to discover cloud services are strongly required and desired. This paper also proposes a key-value representation to describe cloud services in a formal way and to facilitate matching between offered services and demand. Since naïve users prefer to have a query in natural language, semantic approaches are used to close the gap between the ambiguous user requirements and the service specifications. Experimental evaluation measured in terms of precision and recall of retrieved services shows that the proposed approach outperforms existing methods.

Reality and Function of Representation (표상의 실재성과 가능성)

  • Hung-YulSo
    • Korean Journal of Cognitive Science
    • /
    • v.2 no.2
    • /
    • pp.205-220
    • /
    • 1990
  • Material substance may exist in two different modes of reality:real as physcal objects that comprise material cause and formal cause, and real as function networks that comprise efficient cause and functional cause.Functional networks are real as a mode of material substance because their efficient cause is energy consuming.Neural functional network, in this sense, are different from neural networks.In the same way, mental functional networks are real, for they are energy consuming and they function as a network.Mental functional networks, in turn, may divide into non-lingustic functional networks and linguistic functional networks.And further distinctions among the different levels of mental functional networks will be specified, and hence their reality confirmed more specifically as the research in cognitive science advances.

Schema- and Data-driven Discovery of SQL Keys

  • Le, Van Bao Tran;Sebastian, Link;Mozhgan, Memari
    • Journal of Computing Science and Engineering
    • /
    • v.6 no.3
    • /
    • pp.193-206
    • /
    • 2012
  • Keys play a fundamental role in all data models. They allow database systems to uniquely identify data items, and therefore, promote efficient data processing in many applications. Due to this, support is required to discover keys. These include keys that are semantically meaningful for the application domain, or are satisfied by a given database. We study the discovery of keys from SQL tables. We investigate the structural and computational properties of Armstrong tables for sets of SQL keys. Inspections of Armstrong tables enable data engineers to consolidate their understanding of semantically meaningful keys, and to communicate this understanding to other stake-holders. The stake-holders may want to make changes to the tables or provide entirely different tables to communicate their views to the data engineers. For such a purpose, we propose data mining algorithms that discover keys from a given SQL table. We combine the key mining algorithms with Armstrong table computations to generate informative Armstrong tables, that is, key-preserving semantic samples of existing SQL tables. Finally, we define formal measures to assess the distance between sets of SQL keys. The measures can be applied to validate the usefulness of Armstrong tables, and to automate the marking and feedback of non-multiple choice questions in database courses.

A Process Management Framework for Design and Manufacturing Activities in a Distributed Environment (분산 환경하의 설계 및 제조활동을 위한 프로세스관리기법 연구)

  • Park, Hwa-Kyu;Kim, Hyun;Oh, Chi-Jae;Jung, Moon-Jung
    • The Journal of Society for e-Business Studies
    • /
    • v.2 no.1
    • /
    • pp.21-37
    • /
    • 1997
  • As the complexity in design and manufacturing activities of distributed virtual enterprises rapidly increases, the issue of process management becomes more critical to shorten the time-to-market, reduce the manufacturing cost and improve the product quality. This paper proposes a unified framework to manage design and manufacturing processes in a distributed environment. We present a methodology which utilizes process flow graphs to depict the hierarchical structure of workflows and process grammars to represent various design processes and design tools. To implement the proposed concept, we develop a process management system which mainly consists of a cockpit and manager programs, and we finally address a preliminary implementation procedure based on the Object Modeling Technique. Since the proposed framework can be a formal approach to the process management by providing formalism, parallelism, reusability, and flexibility, it can be effectively applied to further application domains of distributed virtual enterprises.

  • PDF

Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.

  • Irshad, Azeem;Sher, Muhammad;Alzahrani, Bander A.;Albeshri, Aiiad;Chaudhry, Shehzad Ashraf;Kumari, Saru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.523-549
    • /
    • 2018
  • The increasing number of subscribers and demand of multiplicity of services has turned Multi-Server Authentication (MSA) into an integral part of remote authentication paradigm. MSA not only offers an efficient mode to register the users by engaging a trusted third party (Registration Centre), but also a cost-effective architecture for service procurement, onwards. Recently, Lu et al.'s scheme demonstrated that Mishra et al.'s scheme is unguarded to perfect forward secrecy compromise, server masquerading, and forgery attacks, and presented a better scheme. However, we discovered that Lu et al.'s scheme is still susceptible to malicious insider attack and non-compliant to perfect forward secrecy. This study presents a critical review on Lu et al.'s scheme and then proposes a secure multi-server authentication scheme. The security properties of contributed work are validated with automated Proverif tool and proved under formal security analysis.