• Title/Summary/Keyword: Part List

Search Result 293, Processing Time 0.022 seconds

An Analysis of Information Visualization Problems using User Interface Design Principles (이용자 인터페이스 설계 원칙에 의한 정보시각화 시스템 평가 및 문제점 분석)

  • Lee, Jee-Yeon
    • Journal of Information Management
    • /
    • v.34 no.2
    • /
    • pp.67-88
    • /
    • 2003
  • There have been increased interests in information visualization. Information visualization has been considered as a way to summarize textual data so that the users can access large amount of data more efficiently and effectively. However, many information visualization techniques stem from scientific visualization techniques, which might be difficult for the regular users to understand. More importantly, the system models used by most of the information visualization techniques do not have real world counterpart. For example, most of the users do not represent or process the textual data in terms of fisheye view or a topological map. This means that there is no affordance on the current information visualization systems from the users point of view. In this paper, we analyzed this problem by using the user interface design principles to point out what lacks in the current information visualization systems. More specifically, we have applied Nielson's Heuristic Evaluation technique to review four representative information visualization techniques. The analysis results confirmed our original hypothesis on why the current information visualization systems are not part of the mainstream information systems. Finally, we suggested to invest more efforts in improving the currently prevalent and familiar bullet list type textual information presentation method based on the usability studies and the intelligent content analysis.

Floristic Study of Deokjeongsan Mt. (Ganghwa-gun), Korea (덕정산(강화군)의 관속식물상)

  • Kim, Jung-Hyun;Park, Sung-Ae;Yoon, Chang-Young
    • Korean Journal of Plant Resources
    • /
    • v.31 no.2
    • /
    • pp.149-161
    • /
    • 2018
  • This study was carried out to investigate the flora of Deokjeongsan Mt. (Ganghwa-gun) from March to October 2016. The vascular plants identified during the 8 round field surveys were a to total of 484 taxa: 107 families, 305 genera, 423 species, 8 subspecies, 48 varieties, 4 forms and 1 hybrid. The plant formation of Deokjeongsan Mt. is the deciduous broad-leaved and conifer mixed forest which is the common one in the middle part of Korean peninsula. All most mountain covered with young secondary forest which is mainly composed of Pinus and Quercus. The plant species diversity largest families were Asteraceae (62 taxa, 12.7%), Poaceae (48 taxa, 9.9%), Cyperaceae (27 taxa, 5.6%), Fabaceae (23 taxa, 4.7%), and Lamiaceae (21 taxa, 4.3%). The four taxa of Korean endemic plants such as Clematis brachyura Maxim., Salix koriyanagi Kimura ex Goerz, Carex brevispicula G. H. Nam & G. Y. Chung, and Hemerocallis hakuunensis Nakai were collected. The vascular plants on the red list according to IUCN evaluation basis were found to be five taxa: Near Threatened (NT) species of Senecio argunensis Turcz., Least Concern (LC) species Pseudoraphis ukishiba Nakai, and Not Evaluate (NE) species of Thladiantha dubia Bunge, Cirsium lineare (Thunb.) Sch. Bip., and Scorzonera austriaca ssp. glabra Lipsch. & Krasch. ex Lipsch., respectively. The floristic regional indicator plants found in this area were 26 taxa comprising one taxa of degree V, two taxa of degree IV, four taxa of degree III, eight taxa of degree II, and 11 taxa of degree I. In addition, the alien plants were identified as 46 taxa and the percentage of naturalized index (NI) was 9.5%, and urbanization index (UI) was 14.3%, respectively.

Conservation Methods and Vascular plants of Oriental Thuja Community in Dodong, Daegu (도동 측백나무군락지의 식물상 및 보전방안)

  • Choi, Byoung-Ki;Lim, Jeong-Cheol;Lee, Chang-Woo
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.33 no.3
    • /
    • pp.72-83
    • /
    • 2015
  • A plant diversity, which consists of indigenous plant community with Orientla thuja community (Natural monument no. 1) in Dodong, Daegu, is identified and analyzed as ecological characteristic to consider worth plants and vegetation resource of the region. The vascular plants of Thuja orientalis community were listed as 219 taxa (3.7% of all 4,881 taxa of Korean vascular plants); 67 families, 147 genera, 199 species, 16 varieties, and 4 forms. Vulnerable species (VU) and least concerned species (LC) were recorded based on IUCN standard; Koelretueria paniculata (VU), Thuja orientalis (LC), and Exochorda serratifolia (LC). Although the study site is a non-limestone area, a total of 15 taxa of calciphilous plants were identified; Cheilanthes argentea, Hypodematium glandulosopilosum, Asplenium retamuraria, Thuja orientalis, Spiraea blumei, Smilax sieboldii, etc. A total of 4 taxa endemic plants were identified; Prunus mandshurica for. barbinervis, Lespedeza maximowiczii var. tomentella, Forythia koreana (artificial origin), and Veronica pyrethrina. Among the list, 8 taxa of naturalized plants were identified; Fallopia dentatoalalta, Rumex crispus, Nasturtium officinale, Bidens frondosa, Erigeron annuus etc. Naturalization rate (NR) was 3.6%, of all 219 taxa of vascular plants and urbanization index (UI) was 2.2% of all 321 taxa of naturalized plants. Thuja orientalis occupies a lot of indigenous landscape in this study area which is the southern-limited part of a natural distribution where it can survive. The T. orientalis community, where indigenous plants have formed a characterful species composition based on habitat, has been confirmed as a worth national vegetation resource in an indigeous flora. It has been considered of plans for persistent conservation.

A Study on Plant in Submerged Area of Hoengseong Dam -Centered with Subdivided Area to Select Plants Capable of Transfer- (횡성댐 수몰지역내(水沒地域內)의 식생(植生)에 관(關)한 연구(硏究) -이식대상구역(移植對象區域)을 중심(中心)으로-)

  • Lee, Woo-Cheol;Lee, Ki-Eui;Seo, Ok-Ha;Jo, Hyun-Kil;Baic, Weon-Kee;Kim, Kyoung-Jin
    • Journal of Forest and Environmental Science
    • /
    • v.13 no.1
    • /
    • pp.28-50
    • /
    • 1997
  • This study was carried out in a part of conservative plans recovering natural ecosystem which will be submerged, as Hoengseong dam is being constructed around Hoengseong-Eup and Gabcheon-Myun. The submerged area was divided into 7 small areas to figure out what kinds of species of plants are and will be according to detailed geographic characteristics. In the center of the subdivided areas, Degree of Green Naturality, standing biomass, net 36production per year, and composition of plant species were investigated. The results are as following; 1. The surveyed area was classified into 8 degree by Degree of Green Naturality, and the appeared degree and the rate of occupation were 0(3.1%), 1(5.3%), 2(28.2%), 3(0.1%), 5(0.2%), 7(4.6%), 7(44.7%), and 8(13.8%). 2. Standing biomass was 88,436.3 ton/year and net production per year was 12,960.3 ton/year. 3. The list of vascular plants identified in this study consisted of 86 families, 221 genera, 1 variety, 3 formae and 306 species, totally summiting upto 310 species. 4. The 7 surveyed areas were largely occupied by Pinus community. In addition, there were Quercus mongolica, Quercus dentata, and Quercus acutissima communities.

  • PDF

Analysis of Students' Level of Participation through the Content Analysis of the Unit of Dietary Life from Grade 9 Technology.Home Economics Textbooks (중학교 2학년 기술.가정 교과 내 식생활 단원의 내용 분석을 통한 학생들의 실천도 조사)

  • Kim, Yoon-Sun;Kim, Bok-Ran
    • Journal of Korean Home Economics Education Association
    • /
    • v.25 no.2
    • /
    • pp.65-78
    • /
    • 2013
  • The following experiment was designed to test the students' involvement in the interactive activities and objectives of the relevant chapters in the newly revised curriculum of 2007. The experiment was carried out with the purpose of understanding the level of participation of the Grade 9 students who have successfully completed the Grade 8 "Choice of Food and Diet" and "Table Manners and Dining Etiquette" courses with classified materials such as tables/diagrams/pictures, reading, and activity resources from Technology Home Economics textbooks. The chapters "Choice of Food and Diet" and "Food Preparation and Etiquette" generally emphasize the practical and experiential part of domestic life through using various activity resources; while the tables/diagrams/pictures and reading materials do not provide the students with first-hand experience, they support the students' learning by explaining the basic knowledge required for doing the activities and solving various problems. Within the main training courses, the objectives which the students achieved the highest marks were(in a descending order) "Table Manners and Dining Etiquette" (3.24), "Checking Nutrition Labels, Food Expiration Date, Country of Origin When Buying Food" (3.18), Additionally "Making Food" and "Planning a Healthy, Balanced Diet" hardly met the goals, the result of which shows clear relations to the well achieved objectives from the list of in-class activities that students directly participated in. Therefore, in order to increase the students' interest in the Food and Diet section of Technology Home Economics textbooks, it is recommended to encourage the students to actively engage in the class activities by developing various learning resources and teacher education/pedagogical materials, rather than following the conventional lecture-based teaching methods.

  • PDF

Observation, Experiment, and Analysis of the Ice Spikes Formation (솟는 고드름의 형성과정에 관한 관찰, 실험 및 분석)

  • Yoon, Ma-Byong;Kim, Hee-Soo;Son, Jeong-Ho;Yang, Jeong-Woo
    • Journal of the Korean earth science society
    • /
    • v.30 no.4
    • /
    • pp.454-463
    • /
    • 2009
  • In this study, from January 2006 to February 2009, we observed 107 ice spikes formed in a natural state, and analyzed their environment. We developed an experimental device to reproduce ice spikes in laboratory and successfully made 531 ice spikes. We analyzed the process of the formation and the principle of how those ice spikes grow through videotaped data of the formation in the experiment. In the natural world, when the surface of water and the lower part of a vessel begin to freeze, a vent (breathing hole) develops at the surface where an ice is not frozen; this vent serves as the seed of an ice spike. It is assumed that the volume expansion of ice in the vessel which occurs when water freezes makes the supercooled water go upward through the vent and becomes an ice bar called an ice spike. In the laboratory, however, when distilled water is poured into an ice tray cube and kept in the experimental device for about one and a half hours at a temperature of -12- $-13^{\circ}C$, a thin layer of ice then begins to develop on the surface of the water, the vent is formed, and ice spikes form for about 10-30 minutes. These spikes stop growing when the end becomes clogged. Ice spikes can be described as falling into seven categories of shape, with the apex type topping the list followed by the slant type in the natural state and the vertical type predominating in the laboratory.

A Method for Migrating Object-Oriented Systems into SOA Services (객체지향 시스템에서 SOA서비스로의 전이 기법)

  • Kim, Ji-Won;La, Hyun-Jung;Kim, Soo-Dong
    • The KIPS Transactions:PartD
    • /
    • v.17D no.1
    • /
    • pp.25-40
    • /
    • 2010
  • Service-Oriented Architecture (SOA) is a development paradigm for reusing services as an independent reuse unit. A service delivers a cohesive functionality through its external interface. Since services have unique characteristics which are not typically presented in conventional development approaches, there is a demand for effective approaches to developing services. Most of the current SOA methodologies presenta process where services are designed and developed from the requirements rather than reusing existing assets, which demands high cost and effort. Hence, a desirable approach is to be able to develop services by migrating from their existing legacy systems such as object-oriented system. A difficulty in this migration is that objects in object-oriented systems reveal characteristics which differ considerably from those of services. That is, objects are designed without considering commonalities among several consumers. In this paper, we first define mapping relationships between key artifacts in object-oriented system and those in SOA services. By these relationships and considering commonalities among several applications in a domain, we propose three systematic methods to migrate from object-oriented system to SOA services. Each method consists of a list of input and output artifacts and detailed guidelines which are performed in order. Through these methods, service developers can easily develop services with less effort.

A Study on Generalization of Security Policies for Enterprise Security Management System (통합보안관리시스템을 위한 보안정책 일반화에 관한 연구)

  • Choi, Hyun-H.;Chung, Tai-M.
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.823-830
    • /
    • 2002
  • Enterprise security management system proposed to properly manage heterogeneous security products is the security management infrastructure designed to avoid needless duplications of management tasks and inter-operate those security products effectively. In this paper, we propose the model of generalized security policies. It is designed to help security management build invulnerable security policies that can unify various existing management infrastructures of security policies. Its goal is not only to improve security strength and increase the management efficiency and convenience but also to make it possible to include different security management infrastructures while building security policies. In the generalization process of security policies. we first diagnose the security status of monitored networks by analyzing security goals, requirements, and security-related information that security agents collect. Next, we decide the security mechanisms and objects for security policies, and then evaluate the properness of them on the basis of security goals, requirements and a policy list. With the generalization process, it is possible to integrate heterogeneous security policies and guarantee the integrity of them by avoiding conflicts or duplications among security policies. And further, it provides convenience to manage many security products existing in large networks.

A 4 week Randomized, Double-blind Human Trial to Compare the Efficacy and Safety of Aureobasidium pullulans Cultured Solution and Placebo on Improvement of Immune in Subjects (흑효모배양액 분말의 면역관련 사이토카인에 미치는 영향에 대한 무작위 배정 임상연구)

  • Choi, Hae-Yun;Kim, Jong-Dae;Park, Mee-Yeon
    • Korean Journal of Oriental Medicine
    • /
    • v.15 no.3
    • /
    • pp.83-91
    • /
    • 2009
  • $\beta$-glucan is a fiber-type complex sugar (polysaccharide) derived from the cell wall of baker's yeast, oat and barley fiber, and many medicinal mushrooms, such as maitake. The primary uses of $\beta$-glucan are to enhance the immune system, to lower blood cholesterol levels and to treat tumor. $\beta$-glucan has no systemic toxicity in mice, therefore it needed clinical trail to prove efficacy and safety for human. The subjects total 56 healty volunteers were divided into two groups including taken $\beta$-glucan tablet group and placebo group. Subjects were taken two tablets per oral for 4 weeks. They had agreed to take part in this experiment, and didn't take any other clinical trail products. After 4 weeks blood of subjects were checked. The check list are TNF-$\alpha$, INF-$\gamma$, IL-2, IL-4, total WBC, differential WBC, RBC, hemoglobin, platelet, MCV, MCH, MCHC, HCT, Na, K, Ca, Cl, AST, ALT, ALP, $\gamma$-GTP, total protein, triglyceride, total cholesterol, total bilirubin, albumin, uric acid, creatinine, BUN, pH, protein, glucose, ketone body, blood, bilirubin. We evaluated efficacy by cytokines that compare before and after taking. Collected data were analyzed as two sample t-test, chi-square test and ANOVA using SAS V.9.1.This study results are that in TNF-$\alpha$ of $1^{st}$ efficacy measurement item, all of two groups figure were increased significantly compare to before figure. In IL4 of $2^{nd}$ efficacy measurement item, experimental group figure were decreased significantly but placebo group figure were increased. The conclusions show that based on the above results, $\beta$-glucan has favorable effect to enhance immune system, especially IL4 results showed that it has effect to improve the allergic immune system.

  • PDF

Improvement of Performance for Online Certificate Status Validation (실시간 인증서 상태검증의 성능개선)

  • Jung, Jai-Dong;Oh, Hae-Seok
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.433-440
    • /
    • 2003
  • According as the real economic activities are carried out in the cyber world and the identity problem of a trade counterpart emerges, digital signature has been diffused. Due to the weakness for real-time validation using the validation method of digital signature, Certificate Revocation List, On-line Certificate Status Protocol was introduced. In this case, every transaction workload requested to verify digital signature is concentrated of a validation server node. Currently this method has been utilized on domestic financial transactions, but sooner or later the limitation will be revealed. In this paper, the validation method will be introduced which not only it can guarantee real-time validation but also the requesting node of certificate validation can maintain real-time certificate status information. This method makes the revocation management node update the certificate status information in real-time to the validation node while revoking certificate. The characteristic of this method is that the revocation management node should memorize the validation nodes which a certificate holder uses. If a certificate holder connects a validation node for the first time, the validation node should request its certificate status information to the above revocation management node and the revocation management node memorizes the validation node at the time. After that, the revocation management node inform the revocation information in real-time to all the validation node registered when a request of revocation happens. The benefits of this method are the fact that we can reduce the validation time because the certificate validation can be completed at the validation node and that we can avoid the concentration of requesting certificate status information to a revocation node.