• Title/Summary/Keyword: Problem Space

Search Result 3,975, Processing Time 0.028 seconds

The Development of Education Model for CA-RP(Cognitive Apprenticeship-Based Research Paper) to Improve the Research Capabilities for Majors Students of Radiological Technology (방사선 전공학생의 연구역량 증진을 위한 인지적 도제기반 논문작성 교육 모형 개발)

  • Park, Hoon-Hee;Chung, Hyun-Suk;Lee, Yun-Hee;Kim, Hyun-Soo;Kang, Byung-Sam;Son, Jin-Hyun;Min, Jung-Hwan;Lyu, Kwang-Yeul
    • Journal of radiological science and technology
    • /
    • v.36 no.2
    • /
    • pp.99-110
    • /
    • 2013
  • In the medical field, the necessity of education growth for the professional Radiation Technologists has been emphasized to become experts on radiation and the radiation field is important of the society. Also, in hospitals and companies, important on thesis is getting higher in order to active and cope with rapidly changing internal and external environment and a more in-depth expert training, the necessity of new teaching and learning model that can cope with changes in a more proactive has become. Thesis writing classes brought limits to the in-depth learning as to start a semester and rely on only specific programs besides, inevitable on passive participation. In addition, it does not have a variety opportunity to present, an actual opportunity that can be written and discussed does not provide much caused by instructor-led classes. As well as, it has had a direct impact on the quality of the thesis, furthermore, having the opportunity to participate in various conferences showed the limitations. In order to solve these problems, in this study, writing thesis has organized training operations as a consistent gradual deepening of learning, at the same time, the operational idea was proposed based on the connectivity integrated operating and effective training program & instructional tool for improving the ability to perform the written actual thesis. The development of teaching and learning model consisted of 4 system modeling, scaffolding, articulation, exploration. Depending on the nature of the course, consisting team following the personal interest and the topic allow for connection subject, based on this, promote research capacity through a step-by-step evaluation and feedback and, fundamentally strengthen problem-solving skills through the journal studies, help not only solving the real-time problem by taking wiki-space but also efficient use of time, increase the quality of the thesis by activating cooperation through mentoring, as a result, it was to promote a positive partnership with the academic. Support system in three stages planning subject, progress & writing, writing thesis & presentation and based on cognitive apprenticeship. The ongoing Coaching and Reflection of professor and expert was applied in order to maintain these activities smoothly. The results of this study will introduce actively, voluntarily and substantially join to learners, by doing so, culture the enhancement of creativity, originality and the ability to co-work and by enhance the expertise of based-knowledge, it is considered to be help to improve the comprehensive ability.

A New Item Recommendation Procedure Using Preference Boundary

  • Kim, Hyea-Kyeong;Jang, Moon-Kyoung;Kim, Jae-Kyeong;Cho, Yoon-Ho
    • Asia pacific journal of information systems
    • /
    • v.20 no.1
    • /
    • pp.81-99
    • /
    • 2010
  • Lately, in consumers' markets the number of new items is rapidly increasing at an overwhelming rate while consumers have limited access to information about those new products in making a sensible, well-informed purchase. Therefore, item providers and customers need a system which recommends right items to right customers. Also, whenever new items are released, for instance, the recommender system specializing in new items can help item providers locate and identify potential customers. Currently, new items are being added to an existing system without being specially noted to consumers, making it difficult for consumers to identify and evaluate new products introduced in the markets. Most of previous approaches for recommender systems have to rely on the usage history of customers. For new items, this content-based (CB) approach is simply not available for the system to recommend those new items to potential consumers. Although collaborative filtering (CF) approach is not directly applicable to solve the new item problem, it would be a good idea to use the basic principle of CF which identifies similar customers, i,e. neighbors, and recommend items to those customers who have liked the similar items in the past. This research aims to suggest a hybrid recommendation procedure based on the preference boundary of target customer. We suggest the hybrid recommendation procedure using the preference boundary in the feature space for recommending new items only. The basic principle is that if a new item belongs within the preference boundary of a target customer, then it is evaluated to be preferred by the customer. Customers' preferences and characteristics of items including new items are represented in a feature space, and the scope or boundary of the target customer's preference is extended to those of neighbors'. The new item recommendation procedure consists of three steps. The first step is analyzing the profile of items, which are represented as k-dimensional feature values. The second step is to determine the representative point of the target customer's preference boundary, the centroid, based on a personal information set. To determine the centroid of preference boundary of a target customer, three algorithms are developed in this research: one is using the centroid of a target customer only (TC), the other is using centroid of a (dummy) big target customer that is composed of a target customer and his/her neighbors (BC), and another is using centroids of a target customer and his/her neighbors (NC). The third step is to determine the range of the preference boundary, the radius. The suggested algorithm Is using the average distance (AD) between the centroid and all purchased items. We test whether the CF-based approach to determine the centroid of the preference boundary improves the recommendation quality or not. For this purpose, we develop two hybrid algorithms, BC and NC, which use neighbors when deciding centroid of the preference boundary. To test the validity of hybrid algorithms, BC and NC, we developed CB-algorithm, TC, which uses target customers only. We measured effectiveness scores of suggested algorithms and compared them through a series of experiments with a set of real mobile image transaction data. We spilt the period between 1st June 2004 and 31st July and the period between 1st August and 31st August 2004 as a training set and a test set, respectively. The training set Is used to make the preference boundary, and the test set is used to evaluate the performance of the suggested hybrid recommendation procedure. The main aim of this research Is to compare the hybrid recommendation algorithm with the CB algorithm. To evaluate the performance of each algorithm, we compare the purchased new item list in test period with the recommended item list which is recommended by suggested algorithms. So we employ the evaluation metric to hit the ratio for evaluating our algorithms. The hit ratio is defined as the ratio of the hit set size to the recommended set size. The hit set size means the number of success of recommendations in our experiment, and the test set size means the number of purchased items during the test period. Experimental test result shows the hit ratio of BC and NC is bigger than that of TC. This means using neighbors Is more effective to recommend new items. That is hybrid algorithm using CF is more effective when recommending to consumers new items than the algorithm using only CB. The reason of the smaller hit ratio of BC than that of NC is that BC is defined as a dummy or virtual customer who purchased all items of target customers' and neighbors'. That is centroid of BC often shifts from that of TC, so it tends to reflect skewed characters of target customer. So the recommendation algorithm using NC shows the best hit ratio, because NC has sufficient information about target customers and their neighbors without damaging the information about the target customers.

Jeju Shinyang Fishing Port Remodeling Plan Utilizing Marine Tourism Resources (해양관광자원을 활용한 제주 신양항 리모델링 계획)

  • Kim, Yelim;Sung, Jong-Sang
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.44 no.2
    • /
    • pp.52-69
    • /
    • 2016
  • The fishing port was once the foothold of production as well as the stronghold of communities but with the declining of the fishing industry, ports became abandoned space. Jeju Special Self-Governing Province has continued its effort to vitalize marine tourism since 2010. Shinyang Port in particular is designated as a Prearranged Marina Port Development Zone, and planning for the Jeju Ocean Marina City project is underway. Nevertheless, fishing port remodeling projects implemented on Jeju so far have focused only on civil engineering such as renovating old facilities. In addition, most Marina Port Development Projects have been irrelevant to local communities. Leading projects by the local government mostly suffer from a lack of funding, which results in the renovation of old facilities and improper maintenance, while private sector investment projects do not lead to benefit sharing with the community. Shinyang Port, also renovated in 2008, ended up with outer breakwater extension construction that neither solved the fundamental problem of the site nor gave benefits to residents. To arrange a way to solve problems for civil engineering focused development project, improper maintenance, and benefit sharing with community, first, this study proposes a development plan that connects with the outlying areas near the ports. The plan reflects existing topography, Jeju traditional stonewalls, narrow paths on the master plan and programs by reading the regional context. In this way, this paper suggests a space development plan reflecting the local landscape and characteristic factors. Second, it satisfies various needs by using existing and new Marine Tourism Resources. Third, it examines sustainable operation and management measures through residents' participation. The proposal is significant in two key ways: it is a fresh attempt at connecting the fishing port with its outlying areas from a landscape perspective; and it considers environmental, social, economic issues, and suggests participation for local communities. Thus, the model can be used in future fishing-port remodeling plans for revitalizing unused space, including invaluable traditional landscapes, and for boosting the marine-leisure industry.

Legal status of Priave Transaction Regarding the Geostationary Satellite Orbit (지구정지궤도의 사적 거래의 국제법상 지위에 관한 연구)

  • Shin, Hong Kyun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.2
    • /
    • pp.239-272
    • /
    • 2014
  • The rights and obligations of the Member States of ITU in the domain of international frequency management of the spectrum/orbit resource are incorporated in the Constitution and Convention of the ITU and in the Radio Regulations that complement them. These instruments contain the main principles and lay down the specific regulations governing the major elements such as rights and obligations of member administrations in obtaining access to the spectrum/orbit resource, as well as international recognition of these rights by recording frequency assignments and, as appropriate, any associated orbits, including the geostationary-satellite orbits used or intended to be used in the Master International Frequency Register (MIFR) Coordination is a further step in the process leading up to notification of the frequency assignments for recording in the MIFR. This procedure is a formal regulatory obligation both for an administration seeking to assign a frequency in its network and for an administration whose existing or planned services may be affected by that assignment. Regulatory problem lies in allowing administrations to fulfill their "bringing into use" duty for preserving his filing simply putting any satellites, whatever nationlity or technical specification may be, into filed orbit. This sort of regulatory lack may result in the emergence of the secondary market for satellite orbit. Within satellite orbit secondary market, the object of transaction may be the satellite itself, or the regulatory rights in rem, or the orbit registered in the MIFR. Recent case of selling the Koreasat belongs to the typical example of orbit transaction between private companies, the legality of which remains doubtedly controversial from the perspective of international space law as well as international transaction law. It must be noted, however, that the fact is the Koreasat 3 and its filed orbit is for sale.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

A Spatio-Temporal Clustering Technique for the Moving Object Path Search (이동 객체 경로 탐색을 위한 시공간 클러스터링 기법)

  • Lee, Ki-Young;Kang, Hong-Koo;Yun, Jae-Kwan;Han, Ki-Joon
    • Journal of Korea Spatial Information System Society
    • /
    • v.7 no.3 s.15
    • /
    • pp.67-81
    • /
    • 2005
  • Recently, the interest and research on the development of new application services such as the Location Based Service and Telemetics providing the emergency service, neighbor information search, and route search according to the development of the Geographic Information System have been increasing. User's search in the spatio-temporal database which is used in the field of Location Based Service or Telemetics usually fixes the current time on the time axis and queries the spatial and aspatial attributes. Thus, if the range of query on the time axis is extensive, it is difficult to efficiently deal with the search operation. For solving this problem, the snapshot, a method to summarize the location data of moving objects, was introduced. However, if the range to store data is wide, more space for storing data is required. And, the snapshot is created even for unnecessary space that is not frequently used for search. Thus, non storage space and memory are generally used in the snapshot method. Therefore, in this paper, we suggests the Hash-based Spatio-Temporal Clustering Algorithm(H-STCA) that extends the two-dimensional spatial hash algorithm used for the spatial clustering in the past to the three-dimensional spatial hash algorithm for overcoming the disadvantages of the snapshot method. And, this paper also suggests the knowledge extraction algorithm to extract the knowledge for the path search of moving objects from the past location data based on the suggested H-STCA algorithm. Moreover, as the results of the performance evaluation, the snapshot clustering method using H-STCA, in the search time, storage structure construction time, optimal path search time, related to the huge amount of moving object data demonstrated the higher performance than the spatio-temporal index methods and the original snapshot method. Especially, for the snapshot clustering method using H-STCA, the more the number of moving objects was increased, the more the performance was improved, as compared to the existing spatio-temporal index methods and the original snapshot method.

  • PDF

Fatigue fracture of different dental implant system under cyclic loading (반복하중에 따른 수종 임플란트의 피로파절에 관한 연구)

  • Park, Won-Ju;Cho, In-Ho
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.47 no.4
    • /
    • pp.424-434
    • /
    • 2009
  • Statement of problem: Problems such as loosening and fractures of retained screws and fracture of implant fixture have been frequently reported in implant prosthesis. Purpose: Implant has weak mechanical properties against lateral loading compared to vertical occlusal loading, and therefore, stress analysis of implant fixture depending on its material and geometric features is needed. Material and methods: Total 28 of external hexed implants were divided into 7 of 4 groups; Group A (3i, FULL $OSSEOTITE^{(R)}$Implant), Group B (Nobelbiocare, $Br{\aa}nemark$ $System^{(R)}$Mk III Groovy RP), Group C (Neobiotec, $SinusQuick^{TM}$ EB), Group D (Osstem, US-II). The type III gold alloy prostheses were fabricated using adequate UCLA gold abutments. Fixture, abutment screw, and abutment were connected and cross-sectioned vertically. Hardness test was conducted using MXT-$\alpha$. For fatigue fracture test, with MTS 810, the specimens were loaded to the extent of 60-600 N until fracture occurred. The fracture pattern of abutment screw and fixture was observed under scanning electron microscope. A comparative study of stress distribution and fracture area of abutment screw and fixture was carried out through finite element analysis Results: 1. In Vicker's hardness test of abutment screw, the highest value was measured in group A and lowest value was measured in group D. 2. In all implant groups, implant fixture fractures occurred mainly at the 3-4th fixture thread valley where tensile stress was concentrated. When the fatigue life was compared, significant difference was found between the group A, B, C and D (P<.05). 3. The fracture patterns of group B and group D showed complex failure type, a fracture behavior including transverse and longitudinal failure patterns in both fixture and abutment screw. In Group A and C, however, the transverse failure of fixture was only observed. 4. The finite element analysis infers that a fatigue crack started at the fixture surface. Conclusion: The maximum tensile stress was found in the implant fixture at the level of cortical bone. The fatigue fracture occurred when the dead space of implant fixture coincides with jig surface where the maximum tensile stress was generated. To increase implant durability, prevention of surrounding bone resorption is important. However, if the bone resorption progresses to the level of dead space, the frequency of implant fracture would increase. Thus, proper management is needed.

Seeking a Way for the Connection of Curriculum of Infants and Children Based on the Area of Inquiry in Daily Life -Centered on the Early Learning Standards in America- (미국의 조기학습기준의 분석으로 살펴본 시사점을 통하여 자연탐구영역의 영아와 유아의 교육과정의 연계 방향 모색)

  • Kim, Eun Jung;Yoo, Yung Eui;Shin, Eun Soo
    • Korean Journal of Childcare and Education
    • /
    • v.10 no.6
    • /
    • pp.223-241
    • /
    • 2014
  • The objective of this study was to plan a direction for the connection of the area of inquiry in daily life between infants and young children in Korea based on the analysis of the early learning standards for infants aged 0~2, and young children aged 3~4/5 in 17 different states in America. The problem of the study is as follows: What is the content area of cognitive development, science and mathematics of early learning standards regarding age? The data used in this study was collected from a total of 17 states in America in which 12 states classify infants and young children as aged 0~2 and 3~4/5 respectively and 5 states do not classify the age groups. The results obtained from the analysis of the given issues are as follows. First, in the case of the five states that showed the group aged 0~4/5, the contents related to the area of inquiry in daily life of the early learning standards were included in the mathematics and science and a part of these contents were also included in cognitive developments. In the case of the 12 states that classified the groups aged 0~2 and 3~4/5 respectively, the group aged 0~2 included cognitive developments and the group aged 3~4/5 includes mathematics and science. Second, the contents related to the area of inquiry in daily life of the early learning standards in the five states that showed the single group aged 0~4/5 include the contents in order of scientific idea, biology, physics, and the earth and space. In the 12 states that classify different age groups. Third, in the case of the states that separate age groups, the group aged 0~2 include the contents of number and operation, geometry and space while the group aged 3~4/5 include the contents of number and operations, geometry and space, and measurement. The implications of this study was that it is necessary to take into account the linking between development and characteristics of the subjects.

A Study on the Design and Development of Interactive Non-Face-to-Face Real-Time Classes using EduTech : A Case Study of Christian Education Class (에듀테크를 활용한 상호작용적 비대면 실시간 수업 설계 및 개발 연구 : 기독교교육과 수업 사례를 중심으로)

  • Nam, Sunwoo
    • Journal of Christian Education in Korea
    • /
    • v.66
    • /
    • pp.343-382
    • /
    • 2021
  • This study is a case study in which the interactive non-face-to-face classes using Edutech were applied to the Department of Christian Education. The subjects were 20 students from the Christian education department of A University located in the metropolitan area. The course was 'Instructional Methods and Educational Technology' in the first semester of 2020. In theory, I studied non-face-to-face classes and interaction, and edutech and interaction. Afterward, it designed and developed interactive non-face-to-face classes using edutech. The interactive non-face-to-face classes using edutech were developed as a process of applying Flipped-PBL based interactive edutech. In addition, Edutech was selected for active interaction according to the Flipped-PBL process to be carried out in a non-face-to-face situation. In particular, in the process of developing the problem of PBL, it was built around the situation of the church. As a result of applying the class, first, learners showed high satisfaction and interest in the class. Second, positive transference appeared in the space of learning and the space of living. Third, interactive non-face-to-face classes using Edutech have generated active interaction. In particular, interactive edutech and learning methods have become the main factors enabling active interaction. Through this, learners have improved learning efficiency, immersion, and satisfaction. Also, as an alternative to face-to-face classes, I was able to experience online classes. In other words, the satisfaction and interest of learning, and the transference of learning space, were also possible through active interactions generated through learning methods using interactive Edutech used in class. Furthermore, disabilities in the online communication(Internet) environment and learners' unfamiliarity with the online environment have been found as factors that hinder learning satisfaction and interaction. During learning, obstacles to the online communication environment hinder the utilization of interactive Edutech, preventing active interactions from occurring. This results in diminishing satisfaction and interest in learning. Therefore, we find that designing interactive non-face-to-face classes using Edutech requires sufficient learner learning and checking of the online communication(Internet) environment in advance for Edutech and learning methods. In response, this study confirmed the possibility by applying interactive non-face-to-face classes using Edutech to Christian education classes as an alternative method of education that allows active interaction and consistent transference of learning and life. Although it is a case study with limited duration and limitations of the number of people, I would like to present the possibility as an alternative Christian education method of an era where the direction of online classes should be presented as an alternative to a face-to-face class.

The influence of fitness and type of luting agents on bonding strength of fiber-reinforced composite resin posts (섬유강화 복합레진 포스트의 결합강도에 대한 포스트 공간 적합도 및 접착 시멘트의 영향)

  • Kkot-Byeol Bae;Hye-Yoon Jung;Yun-Chan Hwang;Won-Mann Oh;In-Nam Hwang
    • Journal of Dental Rehabilitation and Applied Science
    • /
    • v.39 no.4
    • /
    • pp.187-194
    • /
    • 2023
  • Purpose: A mismatched size in the post and post space is a common problem during post-fixation. Since this discordance affects the bonding strength of the fiber-reinforced composite resin post (FRC Post), a corresponding luting agent is required. The aim of this study was to evaluate the bonding strength of the FRC post according to the fitness of the fiber post and the type of luting agent. Materials and Methods: Thirty mandibular premolar were endodontic-treated and assigned to two groups according to their prepared post space: Fitting (F) and Mismatching (M). These groups were further classified into three subgroups according to their luting agent: RelyX Unicem (ReX), Luxacore dual (Lux), and Duolink (Duo). A push-out test was performed to measure the push-out bond strengths. The fractured surfaces of each cross-section were then examined, and the fracture modes were classified. Results: In the ReX and Duo subgroups, the F group had a higher mean bond strength; however, the Lux subgroup had no significant difference between the F and M groups. In the analysis of the failure modes, the ReX subgroup had only adhesive failures between the cement and dentin. Conclusion: The result of this study showed that the bond strength of an FRC post was influenced by the type of luting agent and the mismatch between the diameter of the prepared post space and that of the post.