• Title/Summary/Keyword: Software Types

Search Result 1,382, Processing Time 0.029 seconds

Current Status of Functional Areas' Space and Suggestion of Their Equipment Requirements for School Foodservices in Gyeonggi Province (경기도지역 학교급식시설의 기능 공간별 면적 현황 및 구비 기기의 적정요건 제안)

  • Chang, Hye-Ja;Son, Hye-Jung;Choi, Gyeong-Gy
    • Korean journal of food and cookery science
    • /
    • v.25 no.4
    • /
    • pp.474-487
    • /
    • 2009
  • The principal objectives of this study were to evaluate the space, equipment, and institution rate by functional area, and to suggest appropriate types, numbers, and equipment capacity by school foodservice size for optimal employee job performance and efficiency. Data were collected and administered by 263 dietitians who attended elementary and middle schools in Gyeonggi Province, and the data were analyzed using SPSS statistical software. Among a total of 72 respondents who provided usable data, 31 (48.6%) respondents were nutrition teachers and 37 (51.4%) were part-time dietitians. The majority of the respondents reported that their foodservices were self-operating types (94.4%), and 8 meals out of 10 meals provided over a 2-week period were served as normal meals, defined as meals consisting of Bab, Kook, Kimchi, and 3 side dishes (73.6%). The mean kitchen space was $186.25\;m^2$ for 500 meals/day, $269.7\;m^2$ for 501 to 1,000 meals/day, $249.1\;m^2$ for 1001 to 1500 meals/day, and $274.87\;m^2$ for 1,500 or more meals/day. The mean space of functional areas was $11.52\;m^2$ for office, $12.63\;m^2$ for storeroom, $9.55\;m^2$ for receiving area, $27.23\;m^2$ for pre-preparation area, $149.9\;m^2$ for cooking area, $18.33\;m^2$ for assembly/service area, $45.50\;m^2$ for dishwashing area, and $17.20\;m^2$ for locker room. Only two pre-preparation and cooking spaces increased significantly with increasing size of school foodservice (p<0.05). Office, cooking area, and locker room were allocated in all foodservices. However, the pre-preparation area (68.7%), receiving area (56.5%), assembly/service area (38.1%), and dishwashing area (37.7%) were lowly installed in the surveyed facilities. Through a focus group meeting discussing the results of this study, appropriate equipment and its dimensions were suggested according to functional areas and foodservice scales. Future studies will be necessary to allocate the appropriate space by functional area with the proposed equipment requirements for optimally efficient decision making in equipment purchasing.

A Study on the Information Divide Research Trends - Comparative Analysis of LIS Fields and Other Social Science Fields - (정보격차 연구 동향 분석 - 문헌정보학분야와 일반사회과학분야와의 비교 -)

  • Lee, Seongsin;Kang, Bora;Lee, Sena
    • Journal of Korean Library and Information Science Society
    • /
    • v.50 no.3
    • /
    • pp.139-166
    • /
    • 2019
  • The purpose of this study is to study digital divide research trends of LIS fields and other social science fields through the analysis of author keyword network of peer-reviewed journal articles using NetMiner4 software. The author keyword was collected from KCI database. The results of the study were as follows: 1) the digital divide studies were focused on information services provision for information disadvantaged group by the public libraries in LIS fields. However, the studies of other social science fields were focused on the unique characteristics of information society and a new phenomenon of digital divide in the smart era, 2) compared with the other social science fields, there were a few researches about the old among the underprivileged, 3)there was little interest in other types of libraries except public libraries in LIS fields, 4)there is a need to study new types of digital divide in the smart era by LIS scholars.

A Study on Improving Performance of the Deep Neural Network Model for Relational Reasoning (관계 추론 심층 신경망 모델의 성능개선 연구)

  • Lee, Hyun-Ok;Lim, Heui-Seok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.12
    • /
    • pp.485-496
    • /
    • 2018
  • So far, the deep learning, a field of artificial intelligence, has achieved remarkable results in solving problems from unstructured data. However, it is difficult to comprehensively judge situations like humans, and did not reach the level of intelligence that deduced their relations and predicted the next situation. Recently, deep neural networks show that artificial intelligence can possess powerful relational reasoning that is core intellectual ability of human being. In this paper, to analyze and observe the performance of Relation Networks (RN) among the neural networks for relational reasoning, two types of RN-based deep neural network models were constructed and compared with the baseline model. One is a visual question answering RN model using Sort-of-CLEVR and the other is a text-based question answering RN model using bAbI task. In order to maximize the performance of the RN-based model, various performance improvement experiments such as hyper parameters tuning have been proposed and performed. The effectiveness of the proposed performance improvement methods has been verified by applying to the visual QA RN model and the text-based QA RN model, and the new domain model using the dialogue-based LL dataset. As a result of the various experiments, it is found that the initial learning rate is a key factor in determining the performance of the model in both types of RN models. We have observed that the optimal initial learning rate setting found by the proposed random search method can improve the performance of the model up to 99.8%.

North Korea's Cyber Attack Patterns and Behaviors : An Analysis Based on Cyber Power and Coercion Theory (북한의 대남 사이버공격 양상과 행태 : 사이버파워와 강압이론을 통한 분석)

  • Yoon, Taeyoung;Woo, Jeongmin
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.117-128
    • /
    • 2018
  • The purpose of this paper is to analyze the behavior of North Korea's cyber attack against South Korea since 2009 based on major international security theories and suggest South Korea's policy option. For this purpose, this paper applied the behavioral domain and characteristics of 'cyber power' and 'coercion dynamics' model, which are attracting attention in international security studies. The types of cyber attacks from North Korea are classified into the following categories: power-based incarceration, leadership attacks and intrusions, military operations interference, and social anxiety and confusion. In terms of types and means of cyber power, North Korean GPS disturbance, the Ministry of Defense server hacking and EMP are hard power with high retaliation and threat and cyber money cashing and ransomware are analyzed by force in the act of persuasion and incentive in the point of robbing or asking for a large amount of money with software pawns. North Korea 's cyber attack has the character of escape from realistic sanctions based on the second nuclear test. It is important for South Korea to clearly recognize that the aggressive cyberpower of North Korea is changing in its methods and capabilities, and to ensure that North Korea's actions result in far greater losses than can be achieved. To do this, it is necessary to strengthen the cyber security and competence to simultaneously attack and defend through institutional supplement and new establishment such as cyber psychological warfare, EMP attack preparation, and enhancement of security expertise against hacking.

  • PDF

A Study on Improving the Data Quality Validation of Underground Facilities(Structure-type) (지하시설물(구조물형) 데이터 품질검증방법 개선방안 연구)

  • Bae, Sang-Keun;Kim, Sang-Min;Yoo, Eun-Jin;Im, Keo-Bae
    • Journal of Cadastre & Land InformatiX
    • /
    • v.51 no.2
    • /
    • pp.5-20
    • /
    • 2021
  • With the available national spatial information that started from the sinkholes that occurred nationwide in 2014 and integrated 15 areas of underground information, the Underground Spatial Integrated Map has been continuously maintained since 2015. However, until recently, as disasters and accidents in underground spaces such as hot water pipes rupture, cable tunnel fires, and ground subsidence continue to occur, there is an increasing demand for quality improvement of underground information. Thus, this paper attempted to prepare a plan to improve the quality of the Underground Spatial Integrated Map data. In particular, among the 15 types of underground information managed through the Underground Spatial Integrated Map, quality validation improvement measures were proposed for underground facility (structure-type) data, which has the highest proportion of new constructions. To improve the current inspection methods that primarily rely on visual inspection, we elaborate on and subdivide the current quality inspection standards. Specifically, we present an approach for software-based automated inspection of databases, including graphics and attribute information, by adding three quality inspection items, namely, quality inspection methods, rules, and flow diagram, solvable error types, to the current four quality inspection items consisting of quality elements, sub-elements, detailed sub-elements, and quality inspection standards.

Design and Validate Usability of New Types of HMD Systems to Improve Work Efficiency in Collaborative Environments (협업 환경에서 작업 효율 향상을 위한 새로운 형태의 HMD 시스템 설계 및 사용성 검증)

  • Jeong-Hoon SHIN;Hee-Ju KWON
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.1
    • /
    • pp.57-68
    • /
    • 2023
  • With the technological development in the era of the 4th Industrial Revolution, technologies using HMD are being applied in various fields. HMD is especially useful in virtual reality fields such as AR/VR, and is very effective in receiving vivid impressions from users located in remote locations. According to these characteristics, the frequency of using HMD is increasing in the field related to collaboration. However, when HMD is applied to collaboration, communication between experts located in remote locations and workers located in the field is not smooth, causing various problems in terms of usability. In this paper, remote experts and workers in the field use HMD to solve various problems arising from collaboration, design/propose new types of HMD structures and functions that enable more efficient collaboration, and verify their usability using SUS evaluation techniques. As a result of the SUS evaluation, the new type of HMD structure and function proposed in this paper was 86.75points, which is believed to have greatly resolved the restrictions on collaboration and inconvenience in use of the existing HMD structure. In the future, when the HMD structure and design proposed in this paper are actually applied, it is expected that the application technology using HMD will expand rapidly.

Big Data Analytics in RNA-sequencing (RNA 시퀀싱 기법으로 생성된 빅데이터 분석)

  • Sung-Hun WOO;Byung Chul JUNG
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.55 no.4
    • /
    • pp.235-243
    • /
    • 2023
  • As next-generation sequencing has been developed and used widely, RNA-sequencing (RNA-seq) has rapidly emerged as the first choice of tools to validate global transcriptome profiling. With the significant advances in RNA-seq, various types of RNA-seq have evolved in conjunction with the progress in bioinformatic tools. On the other hand, it is difficult to interpret the complex data underlying the biological meaning without a general understanding of the types of RNA-seq and bioinformatic approaches. In this regard, this paper discusses the two main sections of RNA-seq. First, two major variants of RNA-seq are described and compared with the standard RNA-seq. This provides insights into which RNA-seq method is most appropriate for their research. Second, the most widely used RNA-seq data analyses are discussed: (1) exploratory data analysis and (2) pathway enrichment analysis. This paper introduces the most widely used exploratory data analysis for RNA-seq, such as principal component analysis, heatmap, and volcano plot, which can provide the overall trends in the dataset. The pathway enrichment analysis section introduces three generations of pathway enrichment analysis and how they generate enriched pathways with the RNA-seq dataset.

Comparison of Factors Influencing Health-Related Quality of Life between middle-aged and Senior-aged Patients with Complex Chronic Diseases: Analysis of the 2018 Korea Health Panel Data (중장년 복합만성질환자의 건강관련 삶의 질 영향요인: 2018년 한국의료패널 자료 분석)

  • Kim, Sang-Mi;Park, Hye-Seon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.235-244
    • /
    • 2024
  • This study is a descriptive exploratory research aimed at identifying factors influencing the health-related quality of life(HRQOL) in middle-aged and senior-aged patients with complex chronic diseases. The study participants were extracted from the Korean Medical Panel annual data. A total of 2,408 patients, with two or more chronic diseases were included. The data were analyzed using STATA 15.0 software through descriptive statistics, t-tests, ANOVA, and multiple linear regression analysis. The research findings indicate that in middle-aged patients, educational level, household income, economic activity, stress, experience of despair, and basic needs satisfaction positively influence health-related quality of life. On the other hand, types of medical insurance, depressive feelings, and suicidal ideation exert a negative impact. In the case of senior-aged patients, positive influences on health-related quality of life were observed for educational level, household income, economic activity, alcohol consumption, stress, experience of despair, and basic needs satisfaction. Conversely, negative influences were noted for marital status, types of medical insurance, depressive feelings, and suicidal ideation. Therefore, in order to enhance the HRQOL for middle-aged and senior-aged patients with complex chronic diseases, tailored policies considering individual and age-specific characteristics should be formulated.

An Implementation of Web-based Instructional Design System for University Instructors (대학교수자용 웹기반 수업설계 시스템)

  • Kan, Jin-Sook;Lee, Ching-Chan
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.3
    • /
    • pp.222-232
    • /
    • 2010
  • The purpose of this investigation was to help university professors for making their systematic design of instruction easily and scientifically. To increase of learner's studying ability, the systemic instructional design is imperative. But most of university professors could not get proper experiences to know develop instructional design system, specially to develop web-based system. This new system made it possible to select the proper instructional methods and the media type suitable for the corresponding data. And also every professor who is involved to know this system, can put informations for the target learners, learning contents and learning objectives, and present the proper media types and the many different conditions in the process of the each instructional design process. Finally, the results of the learner's study will be effective and professors showed their positive opinions for the using of the system.

Analysis on Operation of Anti-Virus Systems with Real-Time Scan and Batch Scan (실시간스캔과 배치스캔을 갖춘 안티바이러스시스템의 운영 분석)

  • Yang, Won Seok;Kim, Tae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.11
    • /
    • pp.861-869
    • /
    • 2013
  • We consider an information system where viruses arrive according to a Poisson process with rate ${\lambda}$. The information system has two types of anti-virus operation policies including 'real-time scan' and 'batch scan.' In the real-time scan policy, a virus is assumed to be scanned immediately after its arrival. Consequently, the real-time scan policy assumes infinite number of anti-viruses. We assume that the time for scanning and curing a virus follows a general distribution. In the batch scan policy, a system manager operates an anti-virus every deterministic time interval and scan and cure all the viruses remaining in the system simultaneously. In this paper we suggest a probability model for the operation of anti-virus software. We derive a condition under which the operating policy is achieved. Some numerical examples with various cost structure are given to illustrate the results.