• Title/Summary/Keyword: Personal Performance

Search Result 1,742, Processing Time 0.027 seconds

Standards of Due Diligence and Separation of Responsibilities in the Division of Labor in Medicine (분업적 의료행위에 있어서 주의의무위반 판단기준과 그 제한규칙들)

  • Choi, Hojin
    • The Korean Society of Law and Medicine
    • /
    • v.19 no.2
    • /
    • pp.41-72
    • /
    • 2018
  • In the division of labor (or teamwork) in medicine, the responsibility of medical and nursing staff should be separated or distributed to justify negligent criminal offenses. The present work refers to the standards by which the due diligence and responsibility of the individual persons are to be determined and delimited. In this context, it has been proven that objective theory as a measure of due diligence is appropriate. From a moral point of view, when assessing due diligence, it makes sense to impose greater individual or higher performance demands on the perpetrator, but law and order require that due diligence should result from socially relevant human behavior. To give objective measure of negligence and to provide the highest level of personal responsibility, so that man can not be burdened too much responsibility and it is accordingly with an equality theorem. Afterwards some points are presented, which should be considered in a concrete fact in the determination of the medical negligence. Medical action has specific characteristics such as professionalism, discretionary and exclusive, unbalance of information. These characteristics distinguish medical actions from general negligence. The general level of knowledge, the urgency, working condition and working environment of the medical facility, duration of the professional practice, assessment of the medical activity are crucial in this context. As a standard of delineation of due diligence, I have used the permitted risk and the principle of trust. In the horizontal division of labor, the principle of trust applies. The principle of trust applies in principle in cases of division of labor interaction, when doctors in the same hospital exercise their own specific occupational field or everyone works in another hospital. However, this is not true for every case. In the vertical division of labor, the principle of trust does not apply and the senior physician can not trust the assistant doctors. In this case, the principle of trust is converted into a duty of supervision for assistant doctors by the senior physician. This supervision requirement could be used as a random check.

Increase of Tc-99m RBC SPECT Sensitivity for Small Liver Hemangioma using Ordered Subset Expectation Maximization Technique (Tc-99m RBC SPECT에서 Ordered Subset Expectation Maximization 기법을 이용한 작은 간 혈관종 진단 예민도의 향상)

  • Jeon, Tae-Joo;Bong, Jung-Kyun;Kim, Hee-Joung;Kim, Myung-Jin;Lee, Jong-Doo
    • The Korean Journal of Nuclear Medicine
    • /
    • v.36 no.6
    • /
    • pp.344-356
    • /
    • 2002
  • Purpose: RBC blood pool SPECT has been used to diagnose focal liver lesion such as hemangioma owing to its high specificity. However, low spatial resolution is a major limitation of this modality. Recently, ordered subset expectation maximization (OSEM) has been introduced to obtain tomographic images for clinical application. We compared this new modified iterative reconstruction method, OSEM with conventional filtered back projection (FBP) in imaging of liver hemangioma. Materials and Methods: Sixty four projection data were acquired using dual head gamma camera in 28 lesions of 24 patients with cavernous hemangioma of liver and these raw data were transferred to LINUX based personal computer. After the replacement of header file as interfile, OSEM was performed under various conditions of subsets (1,2,4,8,16, and 32) and iteration numbers (1,2,4,8, and 16) to obtain the best setting for liver imaging. The best condition for imaging in our investigation was considered to be 4 iterations and 16 subsets. After then, all the images were processed by both FBP and OSEM. Three experts reviewed these images without any information. Results: According to blind review of 28 lesions, OSEM images revealed at least same or better image quality than those of FBP in nearly all cases. Although there showed no significant difference in detection of large lesions more than 3 cm, 5 lesions with 1.5 to 3 cm in diameter were detected by OSEM only. However, both techniques failed to depict 4 cases of small lesions less than 1.5 cm. Conclusion: OSEM revealed better contrast and define in depiction of liver hemangioma as well as higher sensitivity in detection of small lesions. Furthermore this reconstruction method dose not require high performance computer system or long reconstruction time, therefore OSEM is supposed to be good method that can be applied to RBC blood pool SPECT for the diagnosis of liver hemangioma.

A Study on Job Satisfaction of Records Managers (기록물관리 전문요원의 직무만족도에 관한 연구)

  • Yoo, Hyeon Gyeong;Kim, Soojung
    • The Korean Journal of Archival Studies
    • /
    • no.47
    • /
    • pp.95-130
    • /
    • 2016
  • The job satisfaction of records managers is of importance because it affects their work performance and retention. The purpose of this study is to investigate records managers' job satisfaction and to identify factors affecting records manager's job satisfaction to find the way to improve their job satisfaction. Specific questions of the study are as follows: 1) What is the job satisfaction of records managers? 2) Are factors affecting job satisfaction different depending on record managers' personal characteristics? 3) What are the most influential factors on job satisfaction? To do that, questionnaires were used to gather data from 60 domestic records managers working in different types of records centers. Data analyses included descriptive statistics, one-way ANOVA, independent t-test, and multiple-regression analysis. Additionally, interviews with 2 record managers were conducted to collect opinions on factors affecting job dissatisfaction and recommendations for improving their job satisfaction. Important findings of the study are as follows: First, the respondents are moderately satisfied with their jobs (3.2 out of 5 points). The level of job satisfaction is different depending on years of career, years of employment, number of personnel the respondent is working with in the records center, and etc. The number of personnel the respondent is working with was found to be the most influential factor. Second, multiple-regression analysis result shows that motivation factors(satisfaction factors) are more influential than hygiene factors (dissatisfaction factors) on the respondents' job satisfaction, which confirms Herzberg's two factor theory. More specifically, 'work ethic,' one of motivator factors, has the greatest influence, followed by 'procedural impartiality', 'communication', 'job characteristic', 'distributive justice', and 'working conditions.' Based on the results, this study suggests several ways to improve record managers' job satisfaction level. First, the awareness of records management should be increased. The respondents indicated that their job dissatisfaction is usually derived from a lack of the awareness of records management. Therefore, every chief of organizations, National Archives of Korea, and records managers themselves should try to raise the awareness of records management. Especially, records managers should make stronger efforts to attract the office's attention. Second, records managers ought to establish their identity as records management profession. Also, they should participate in various activities of the archival community to overcome the limitation of individuals.

The Effect of Influencer's Characteristics and Contnets Quality on Brand Attitude and Purchase Intention: Trust and Self-congruity as a Mediator (소셜미디어 인플루언서의 개인특성과 콘텐츠 특성이 브랜드 태도와 구매의도에 미치는 영향: 신뢰와 자아일치성을 매개로)

  • Lee, Myung Jin;Lee, Sang Won
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.16 no.5
    • /
    • pp.159-175
    • /
    • 2021
  • This study attempted to analyze the relationship between influencer's characteristic factors such as professionalism, authenticity, and interactivity and content quality factors consisting of accuracy, completeness, and diversity on brand attitude and purchase attitude through trust and self-consistency. To reveal the structural relationship between main variables, a survey was conducted on 201 users. An EFA, CFA, and reliability analysis were performed to confirm reliability and validity. And structural equation was conducted to verify hypothesis. The main results are as follows. First, it was found that professionalism and interactivity had a significant positive effect on trust. And, accuracy, completeness, and variety were all found to have a significant positive effect on trust. Second, in the relationship between individual characteristic factors and self-consistency, it was found that professionalism and authenticity had a significant positive effect on self-consistency. In addition, in the relationship between content quality and self-consistency, accuracy, completeness, and diversity were found to have a positive effect on self-consistency along with trust. Third, in the relationship between trust and self-consistency on brand attitude and purchase intention, both trust and self-consistency were found to have a statistically significant positive effect on brand attitude. It was found that only self-consistency and brand attitude had a statistically significant positive effect on purchase intention. These findings showed that when users perceive professionalism and interaction with influencer, trust increases, and professionalism and progress increase self-consistency with influencer. In addition, in the case of content quality, it was found that trust and self-consistency responded positively when perceived content quality through content accuracy, completeness, and diversity. Also, trust and self-consistency increased attitudes toward brands and could influence consumption behavior such as purchase intention. Therefore, for effective marketing performance using influencer's influence in the field of influencer marketing, which has a strong information delivery on products and brands, not only personal characteristics such as professionalism, authenticity, and interactivity, but also quality of content should be considered. The above research results are expected to suggest implications for marketing strategies and practices as one available basic data to exert the expected effect of marketing using influencer.

Case Study on Success and Innovation Activities of Women Entrepreneurs: Focusing on Startups (여성 창업가의 성공과 혁신활동에 대한 사례 연구 : 스타트업을 중심으로)

  • Hong, Jungim;Kim, Sunwoo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.16 no.1
    • /
    • pp.55-69
    • /
    • 2021
  • For the national economic development, the participation of women in the social and economic activities is crucial. The popularization of start-ups, digital transformation, and WEconomy trends have lowered the barriers to opportunities for women to start a business and provide an environment in which women can grow faster. This paper examines the significance and process of success of women entrepreneurs and the characteristics of innovation strategies and achievements by linking the recently changing business environment of a company, factors influencing the success of women entrepreneurship, and innovation activities. To this end, four companies' cases were analyzed in the fields of distribution/service and consumer products/services, which are areas of large investment among female startups. The result shows that women entrepreneurs recognize the meaning of success as creating and continuing to create a 'corporate value through establishing a trust relationship with customers' within the 'balance between personal life and work.' In terms of the business ecosystem, women entrepreneurs strive for 'business activities based on the win-win growth of consumers, producers and sellers' for success, and rather 'focus on the process with a problem-solving approach' rather than achieving performance-oriented goals. Also through excellent power of observation, flexibility, and execution power, women entrepreneurs conduct business by adapting to changing trends. In terms of innovation activities, the innovation strategy of women-led companies puts priority on 'creating the value customers want' and focuses on innovation in the 'customer-centric business model' rather than technological innovation. As such, women-led companies show several differentiated characteristics, which enable them to create corporate value and achieve sustainable growth. The barriers to challenges and opportunities for women to start a business have been lowered, and an ecosystem has been created for female startups to grow. But why are there still so few women entrepreneurs, and the answer to where we need to close these gaps is ultimately a close analysis and investigation of the field. We must present milestones for growth steps through the accumulation of case studies of women startups that have exited. In addition, women can stand as economic agents only when the policy targets are subdivided and specific approaches to child-rearing and childcare for women entrepreneurs must be taken. This paper expects to serve as basic data for follow-up studies and become the basis of research for women entrepreneurs to grow as economic agents.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

Methods for Integration of Documents using Hierarchical Structure based on the Formal Concept Analysis (FCA 기반 계층적 구조를 이용한 문서 통합 기법)

  • Kim, Tae-Hwan;Jeon, Ho-Cheol;Choi, Joong-Min
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.3
    • /
    • pp.63-77
    • /
    • 2011
  • The World Wide Web is a very large distributed digital information space. From its origins in 1991, the web has grown to encompass diverse information resources as personal home pasges, online digital libraries and virtual museums. Some estimates suggest that the web currently includes over 500 billion pages in the deep web. The ability to search and retrieve information from the web efficiently and effectively is an enabling technology for realizing its full potential. With powerful workstations and parallel processing technology, efficiency is not a bottleneck. In fact, some existing search tools sift through gigabyte.syze precompiled web indexes in a fraction of a second. But retrieval effectiveness is a different matter. Current search tools retrieve too many documents, of which only a small fraction are relevant to the user query. Furthermore, the most relevant documents do not nessarily appear at the top of the query output order. Also, current search tools can not retrieve the documents related with retrieved document from gigantic amount of documents. The most important problem for lots of current searching systems is to increase the quality of search. It means to provide related documents or decrease the number of unrelated documents as low as possible in the results of search. For this problem, CiteSeer proposed the ACI (Autonomous Citation Indexing) of the articles on the World Wide Web. A "citation index" indexes the links between articles that researchers make when they cite other articles. Citation indexes are very useful for a number of purposes, including literature search and analysis of the academic literature. For details of this work, references contained in academic articles are used to give credit to previous work in the literature and provide a link between the "citing" and "cited" articles. A citation index indexes the citations that an article makes, linking the articleswith the cited works. Citation indexes were originally designed mainly for information retrieval. The citation links allow navigating the literature in unique ways. Papers can be located independent of language, and words in thetitle, keywords or document. A citation index allows navigation backward in time (the list of cited articles) and forwardin time (which subsequent articles cite the current article?) But CiteSeer can not indexes the links between articles that researchers doesn't make. Because it indexes the links between articles that only researchers make when they cite other articles. Also, CiteSeer is not easy to scalability. Because CiteSeer can not indexes the links between articles that researchers doesn't make. All these problems make us orient for designing more effective search system. This paper shows a method that extracts subject and predicate per each sentence in documents. A document will be changed into the tabular form that extracted predicate checked value of possible subject and object. We make a hierarchical graph of a document using the table and then integrate graphs of documents. The graph of entire documents calculates the area of document as compared with integrated documents. We mark relation among the documents as compared with the area of documents. Also it proposes a method for structural integration of documents that retrieves documents from the graph. It makes that the user can find information easier. We compared the performance of the proposed approaches with lucene search engine using the formulas for ranking. As a result, the F.measure is about 60% and it is better as about 15%.

A Study of the Reactive Movement Synchronization for Analysis of Group Flow (그룹 몰입도 판단을 위한 움직임 동기화 연구)

  • Ryu, Joon Mo;Park, Seung-Bo;Kim, Jae Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.79-94
    • /
    • 2013
  • Recently, the high value added business is steadily growing in the culture and art area. To generated high value from a performance, the satisfaction of audience is necessary. The flow in a critical factor for satisfaction, and it should be induced from audience and measures. To evaluate interest and emotion of audience on contents, producers or investors need a kind of index for the measurement of the flow. But it is neither easy to define the flow quantitatively, nor to collect audience's reaction immediately. The previous studies of the group flow were evaluated by the sum of the average value of each person's reaction. The flow or "good feeling" from each audience was extracted from his face, especially, the change of his (or her) expression and body movement. But it was not easy to handle the large amount of real-time data from each sensor signals. And also it was difficult to set experimental devices, in terms of economic and environmental problems. Because, all participants should have their own personal sensor to check their physical signal. Also each camera should be located in front of their head to catch their looks. Therefore we need more simple system to analyze group flow. This study provides the method for measurement of audiences flow with group synchronization at same time and place. To measure the synchronization, we made real-time processing system using the Differential Image and Group Emotion Analysis (GEA) system. Differential Image was obtained from camera and by the previous frame was subtracted from present frame. So the movement variation on audience's reaction was obtained. And then we developed a program, GEX(Group Emotion Analysis), for flow judgment model. After the measurement of the audience's reaction, the synchronization is divided as Dynamic State Synchronization and Static State Synchronization. The Dynamic State Synchronization accompanies audience's active reaction, while the Static State Synchronization means to movement of audience. The Dynamic State Synchronization can be caused by the audience's surprise action such as scary, creepy or reversal scene. And the Static State Synchronization was triggered by impressed or sad scene. Therefore we showed them several short movies containing various scenes mentioned previously. And these kind of scenes made them sad, clap, and creepy, etc. To check the movement of audience, we defined the critical point, ${\alpha}$and ${\beta}$. Dynamic State Synchronization was meaningful when the movement value was over critical point ${\beta}$, while Static State Synchronization was effective under critical point ${\alpha}$. ${\beta}$ is made by audience' clapping movement of 10 teams in stead of using average number of movement. After checking the reactive movement of audience, the percentage(%) ratio was calculated from the division of "people having reaction" by "total people". Total 37 teams were made in "2012 Seoul DMC Culture Open" and they involved the experiments. First, they followed induction to clap by staff. Second, basic scene for neutralize emotion of audience. Third, flow scene was displayed to audience. Forth, the reversal scene was introduced. And then 24 teams of them were provided with amuse and creepy scenes. And the other 10 teams were exposed with the sad scene. There were clapping and laughing action of audience on the amuse scene with shaking their head or hid with closing eyes. And also the sad or touching scene made them silent. If the results were over about 80%, the group could be judged as the synchronization and the flow were achieved. As a result, the audience showed similar reactions about similar stimulation at same time and place. Once we get an additional normalization and experiment, we can obtain find the flow factor through the synchronization on a much bigger group and this should be useful for planning contents.

A Study on the Usage of Miào(廟) and Gōng(宮) in Zhou Dynasty through the Mentions to Them in the Scripture Sentences of 『Chūn-qiū(春秋)』 - In the Process of Investigating the Existence of Zhou Dynasty's System to Regulate the Number of Zōng-miào(宗廟) 【1/2】 (『춘추』 경문에서의 묘(廟)·궁(宮) 언급을 통한 주대(周代)의 그 쓰임 사례 일고찰 - 주대의 묘수제(廟數制) 실재 여부에 대한 궁구 과정에서 【1/2】-)

  • Seo, Jeong-Hwa
    • The Journal of Korean Philosophical History
    • /
    • no.57
    • /
    • pp.57-90
    • /
    • 2018
  • In this discussion, as a way to verify the existence of the system to regulate Zhou dynasty's $z{\bar{o}}ng-mi{\grave{a}}o$(宗廟) numbers, the discussion was focused on '$mi{\grave{a}}o$ (廟)' and '$g{\bar{o}}ng$(宮)' in the records of "$Ch{\bar{u}}n-qi{\bar{u}}$(春秋)". As for the parts where the contents of scripture sentences were not specific, the context of the case was investigated through the writings in "$Zu{\breve{o}}-zhu{\grave{a}}n$(左傳)" and other materials. In the cases of the usage of the letter, '$mi{\grave{a}}o$(廟 : a ruler's house, a nation's royal court)', in the scripture sentences in "$Ch{\bar{u}}n-qi{\bar{u}}$(春秋)", the followings need to be noticed. In $t{\grave{a}}i-mi{\grave{a}}o$(太廟) of State $L{\check{u}}$(魯), nationwide events and a ruler's political ancestral rite, $d{\grave{i}}$(?) ritual, were performed, and fancy tools for ancestral rites used in those rituals were equipped. As for the $z{\bar{o}}ng-mi{\grave{a}}o$(宗廟) of a ruler of those times, a ritual of royal court, $ch{\acute{a}}o$(朝) rite, was performed. The usage case of the letter, '$g{\bar{o}}ng$(宮 : house)', is as the following. In $g{\bar{o}}ng$(宮) where a ruler's personal family lived was a family ancestral rite for them carried out. The record about the ornate decorating for the $hu{\acute{a}}n-g{\bar{o}}ng$ house(桓宮), which can be said to have been the political base of $s{\bar{a}}n-hu{\acute{a}}n-sh{\grave{i}}$(三桓氏), three politically noble families of State $L{\check{u}}$(魯), is outstanding. The $x{\bar{i}}-g{\bar{o}}ng$ house(西宮) during $X{\bar{i}}-g{\bar{o}}ng$(魯 僖公)'s reign and a $x{\bar{i}}n-g{\bar{o}}ng$ house(新宮 : a newly built house) destroyed by fire at the third year of $Ch{\acute{e}}ng-g{\bar{o}}ng$(魯 成公), are assumed to have been a ruler's another house, such as the $ch{\check{u}}-g{\bar{o}}ng$ house(楚宮) in which $Xi{\bar{a}}ng-g{\bar{o}}ng$(魯 襄公) used to enjoy staying, which is different from the viewpoint that it might be a $m{\acute{i}}-g{\bar{o}}ng$ shrine(?宮 : a house constructed as a shrine for the deceased father or the deceased grand father) that had been formed since Han dynasty. It has been discussed that, regarding the records that the '$w{\check{u}}-g{\bar{o}}ng$ house(武宮) was built' and that the '$y{\acute{a}}ng-g{\bar{o}}ng$ house(煬宮) was built', certain buildings were established with the symbols of '$w{\check{u}}$(武 : martial arts and force of arms)' and '$y{\acute{a}}ng$(煬 : to burn and get rid of everything)', and the events that a lord stood as its lord continued. Therefore, its main goal was not the performance of a dutiful ancestral rite by a ruler of those times for deceased rulers, for instance, $W{\check{u}}-g{\bar{o}}ng$(魯 武公) or $Y{\acute{a}}ng-g{\bar{o}}ng$(魯 煬公), but display of certain political symbolism through the ritual. This symbolism is most obvious with the $hu{\acute{a}}n-g{\bar{o}}ng$ house(桓宮) and the $x{\bar{i}}-g{\bar{o}}ng$ house(僖宮). As a consequence, all $mi{\grave{a}}os$(廟) and $g{\bar{o}}ngs$(宮) in scripture sentences had the functions of a shrine in some part, but it has been verified that they were not the buildings set up as a shrine to follow '$z{\bar{o}}ng-mi{\grave{a}}o$(宗廟)'s number regulation system' of '$ti{\bar{a}}nz{\check{i}}-7-mi{\grave{a}}o$(天子七廟 : an emperor owns seven $mi{\grave{a}}os$(廟))' or '$zh{\bar{u}}h{\acute{o}}u-5-mi{\grave{a}}o$(諸侯五廟 : a lord owns five $mi{\grave{a}}os$(廟))'.

A Deep Learning Based Approach to Recognizing Accompanying Status of Smartphone Users Using Multimodal Data (스마트폰 다종 데이터를 활용한 딥러닝 기반의 사용자 동행 상태 인식)

  • Kim, Kilho;Choi, Sangwoo;Chae, Moon-jung;Park, Heewoong;Lee, Jaehong;Park, Jonghun
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.1
    • /
    • pp.163-177
    • /
    • 2019
  • As smartphones are getting widely used, human activity recognition (HAR) tasks for recognizing personal activities of smartphone users with multimodal data have been actively studied recently. The research area is expanding from the recognition of the simple body movement of an individual user to the recognition of low-level behavior and high-level behavior. However, HAR tasks for recognizing interaction behavior with other people, such as whether the user is accompanying or communicating with someone else, have gotten less attention so far. And previous research for recognizing interaction behavior has usually depended on audio, Bluetooth, and Wi-Fi sensors, which are vulnerable to privacy issues and require much time to collect enough data. Whereas physical sensors including accelerometer, magnetic field and gyroscope sensors are less vulnerable to privacy issues and can collect a large amount of data within a short time. In this paper, a method for detecting accompanying status based on deep learning model by only using multimodal physical sensor data, such as an accelerometer, magnetic field and gyroscope, was proposed. The accompanying status was defined as a redefinition of a part of the user interaction behavior, including whether the user is accompanying with an acquaintance at a close distance and the user is actively communicating with the acquaintance. A framework based on convolutional neural networks (CNN) and long short-term memory (LSTM) recurrent networks for classifying accompanying and conversation was proposed. First, a data preprocessing method which consists of time synchronization of multimodal data from different physical sensors, data normalization and sequence data generation was introduced. We applied the nearest interpolation to synchronize the time of collected data from different sensors. Normalization was performed for each x, y, z axis value of the sensor data, and the sequence data was generated according to the sliding window method. Then, the sequence data became the input for CNN, where feature maps representing local dependencies of the original sequence are extracted. The CNN consisted of 3 convolutional layers and did not have a pooling layer to maintain the temporal information of the sequence data. Next, LSTM recurrent networks received the feature maps, learned long-term dependencies from them and extracted features. The LSTM recurrent networks consisted of two layers, each with 128 cells. Finally, the extracted features were used for classification by softmax classifier. The loss function of the model was cross entropy function and the weights of the model were randomly initialized on a normal distribution with an average of 0 and a standard deviation of 0.1. The model was trained using adaptive moment estimation (ADAM) optimization algorithm and the mini batch size was set to 128. We applied dropout to input values of the LSTM recurrent networks to prevent overfitting. The initial learning rate was set to 0.001, and it decreased exponentially by 0.99 at the end of each epoch training. An Android smartphone application was developed and released to collect data. We collected smartphone data for a total of 18 subjects. Using the data, the model classified accompanying and conversation by 98.74% and 98.83% accuracy each. Both the F1 score and accuracy of the model were higher than the F1 score and accuracy of the majority vote classifier, support vector machine, and deep recurrent neural network. In the future research, we will focus on more rigorous multimodal sensor data synchronization methods that minimize the time stamp differences. In addition, we will further study transfer learning method that enables transfer of trained models tailored to the training data to the evaluation data that follows a different distribution. It is expected that a model capable of exhibiting robust recognition performance against changes in data that is not considered in the model learning stage will be obtained.