• Title/Summary/Keyword: Structured Approach

Search Result 592, Processing Time 0.026 seconds

Development of Music Teaching-Learning Program for Secondary Students with Intellectual Disabilities based on Music Therapy Approach (음악치료 접근을 통한 특수학교 음악교육 교수·학습 지도안 개발 - 지적장애 중·고등학교 과정을 중심으로 -)

  • Bae, Ji hye
    • Journal of Music and Human Behavior
    • /
    • v.10 no.1
    • /
    • pp.47-66
    • /
    • 2013
  • This study aimed to develop a music teaching-learning program for secondary students with intellectual disabilities in special education settings based on music therapy approach. Designed lesson plans included three learning domains based on the guidelines from 2008 amendments to the special education music curriculum: Perception, expression, and appreciation. Within the domains, instruction topics and its corresponding contents were re-structured as considered more appropriate and effective for implementing music classes for this population. With consideration of therapeutic goals as well as educational goals, student activities and teacher activities were designed and the activities were presented at three levels depending on students' functional levels. Integrating these instructional components into an actual plan, this study presented yearly (for 20 hours of classes) and monthly lesson plans. The developed lesson plans were reviewed and verified by related professionals including special class teachers and music therapists. As systematic and well-organized lesson plans, the results from this study would provide basic music education resources for students with intellectual disabilities in special education settings. It would also enable the discussion on the music therapy-based teaching-learning program as new methodological and strategic ideas applicable to future special education.

Facilitating Web Service Taxonomy Generation : An Artificial Neural Network based Framework, A Prototype Systems, and Evaluation (인공신경망 기반 웹서비스 분류체계 생성 프레임워크의 실증적 평가)

  • Hwang, You-Sub
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.2
    • /
    • pp.33-54
    • /
    • 2010
  • The World Wide Web is transitioning from being a mere collection of documents that contain useful information toward providing a collection of services that perform useful tasks. The emerging Web service technology has been envisioned as the next technological wave and is expected to play an important role in this recent transformation of the Web. By providing interoperable interface standards for application-to-application communication, Web services can be combined with component based software development to promote application interaction both within and across enterprises. To make Web services for service-oriented computing operational, it is important that Web service repositories not only be well-structured but also provide efficient tools for developers to find reusable Web service components that meet their needs. As the potential of Web services for service-oriented computing is being widely recognized, the demand for effective Web service discovery mechanisms is concomitantly growing. A number of public Web service repositories have been proposed, but the Web service taxonomy generation has not been satisfactorily addressed. Unfortunately, most existing Web service taxonomies are either too rudimentary to be useful or too hard to be maintained. In this paper, we propose a Web service taxonomy generation framework that combines an artificial neural network based clustering techniques with descriptive label generating and leverages the semantics of the XML-based service specification in WSDL documents. We believe that this is one of the first attempts at applying data mining techniques in the Web service discovery domain. We have developed a prototype system based on the proposed framework using an unsupervised artificial neural network and empirically evaluated the proposed approach and tool using real Web service descriptions drawn from operational Web service repositories. We report on some preliminary results demonstrating the efficacy of the proposed approach.

An Approach to Effective Software Architecture Evaluation in Architecture-Based Software Development (아키텍쳐 기반 소프트웨어 개발을 지원하는 효과적인 소프트웨어 아키텍쳐 평가 방법)

  • Choi, Hee-Seok;Yeom, Keun-Hyuk
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.5
    • /
    • pp.295-310
    • /
    • 2002
  • Software architecture representing a common high-level abstraction of a system can be used as a basis for creating mutual understanding among all stakeholders of the system. In determining a software architecture's fitness with respect to its desired qualities as well as in improving a software architecture, software architecture evaluation is importantly performed. However moat of architecture evaluation methods are not still sufficient in that they do not explicitly consider artifacts discussed during architecture evaluation and their processes are net systematic. As a result, we are hard to follow them. To address these problems, this paper presents the method to evaluate systematically a software architecture with respect to its desired qualities. In this approach, the functional and non-functional requirements are separately handled, and software architecture is represented in the 4+1 view model using UML. Through this initial consideration, the important artifacts such as goals, scope, and target of evaluation are clearly determined. Also, the method provides the well defined process to produce the important evaluation artifacts such as sub-designs, design decisions, rationale, qualities from inputs. In addition, it enables us to determine satisfaction of a architecture with respect its desired qualities or improve a architecture through the structured evaluation results.

A Cognitive Developmental Analysis on Children's Understanding of Death (유아의 죽음 개념화에 대한 인지발달적 분석)

  • Yang, Sungeun;Kim, Sang Lim
    • Korean Journal of Child Education & Care
    • /
    • v.18 no.4
    • /
    • pp.213-225
    • /
    • 2018
  • Objective: Research on children's death concepts requires an approach considering social and cultural context. A qualitative method is necessary to explore children's cognitive process of understanding death. Thus, this study, to overcome the limitations of the quantitative approach based on the deductive logic led by adult researchers, adopted a qualitative research method. Methods: The data collection, referring to the theories of Corr and Balk (2010) and Smilansky (1987), used Death Concept Questionnaire. Each structured question was followed by open follow-up questions to explore how children understood each concept of death. Results: The results showed that participant children were still lacking in the acquisition of death sub-concepts. The qualitative result from open interview showed how children can and can not acquire the concepts of death. Conclusion/Implications: The study could be used in future development of death education programs for children. Based on the results of this research, it is necessary to develop programs for children's death education, which would help them coping with death related anxiety and loss experiences.

Concepts of System Function and Modulation-Demodulation based Reconstruction of a 3D Object Coordinates using Active Method (시스템 함수 및 변복조 개념 적용 능동 방식 3차원 물체 좌표 복원)

  • Lee, Deokwoo;Kim, Jisu;Park, Cheolhyeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.530-537
    • /
    • 2019
  • In this paper we propose a novel approach to representation of the 3D reconstruction problem by employing a concept of system function that is defined as the ratio of the output to the input signal. Akin to determination of system function (or system response), this paper determines system function by choosing (or defining) appropriate input and output signals. In other words, the 3D reconstruction using structured circular light patterns is reformulated as determination of system function from input and output signals. This paper introduces two algorithms for the reconstruction. The one defines the input and output signals as projected circular light patterns and the images overlaid with the patterns and captured by camera, respectively. The other one defines input and output signals as 3D coordinates of the object surface and the image captured by camera. The first one leads to the problem as identifying the system function and the second one leads to the problem as estimation of an input signal employing concept of modulation-demodulation theory. This paper substantiate the proposed approach by providing experimental results.

User Perception of Personal Information Security: An Analytic Hierarch Process (AHP) Approach and Cross-Industry Analysis (기업의 개인정보 보호에 대한 사용자 인식 연구: 다차원 접근법(Analytic Hierarch Process)을 활용한 정보보안 속성 평가 및 업종별 비교)

  • Jonghwa Park;Seoungmin Han;Yoonhyuk Jung
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.233-248
    • /
    • 2023
  • The increasing integration of intelligent information technologies within organizational systems has amplified the risk to personal information security. This escalation, in turn, has fueled growing apprehension about an organization's capabilities in safeguarding user data. While Internet users adopt a multifaceted approach in assessing a company's information security, existing research on the multiple dimensions of information security is decidedly sparse. Moreover, there is a conspicuous gap in investigations exploring whether users' evaluations of organizational information security differ across industry types. With an aim to bridge these gaps, our study strives to identify which information security attributes users perceive as most critical and to delve deeper into potential variations in these attributes across different industry sectors. To this end, we conducted a structured survey involving 498 users and utilized the analytic hierarchy process (AHP) to determine the relative significance of various information security attributes. Our results indicate that users place the greatest importance on the technological dimension of information security, followed closely by transparency. In the technological arena, banks and domestic portal providers earned high ratings, while for transparency, banks and governmental agencies stood out. Contrarily, social media providers received the lowest evaluations in both domains. By introducing a multidimensional model of information security attributes and highlighting the relative importance of each in the realm of information security research, this study provides a significant theoretical contribution. Moreover, the practical implications are noteworthy: our findings serve as a foundational resource for Internet service companies to discern the security attributes that demand their attention, thereby facilitating an enhancement of their information security measures.

Evaluation of Web Service Similarity Assessment Methods (웹서비스 유사성 평가 방법들의 실험적 평가)

  • Hwang, You-Sub
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.4
    • /
    • pp.1-22
    • /
    • 2009
  • The World Wide Web is transitioning from being a mere collection of documents that contain useful information toward providing a collection of services that perform useful tasks. The emerging Web service technology has been envisioned as the next technological wave and is expected to play an important role in this recent transformation of the Web. By providing interoperable interface standards for application-to-application communication, Web services can be combined with component based software development to promote application interaction and integration both within and across enterprises. To make Web services for service-oriented computing operational, it is important that Web service repositories not only be well-structured but also provide efficient tools for developers to find reusable Web service components that meet their needs. As the potential of Web services for service-oriented computing is being widely recognized, the demand for effective Web service discovery mechanisms is concomitantly growing. A number of techniques for Web service discovery have been proposed, but the discovery challenge has not been satisfactorily addressed. Unfortunately, most existing solutions are either too rudimentary to be useful or too domain dependent to be generalizable. In this paper, we propose a Web service organizing framework that combines clustering techniques with string matching and leverages the semantics of the XML-based service specification in WSDL documents. We believe that this is one of the first attempts at applying data mining techniques in the Web service discovery domain. Our proposed approach has several appealing features : (1) It minimizes the requirement of prior knowledge from both service consumers and publishers; (2) It avoids exploiting domain dependent ontologies; and (3) It is able to visualize the semantic relationships among Web services. We have developed a prototype system based on the proposed framework using an unsupervised artificial neural network and empirically evaluated the proposed approach and tool using real Web service descriptions drawn from operational Web service registries. We report on some preliminary results demonstrating the efficacy of the proposed approach.

  • PDF

OBSTETRICIAN'S VIEW OF TEENAGE PREGNANCY:PRESENT STATUS, PREVENTION AND PSYCHIATRIC CONSULTATION (산과 의사가 인지한 10대 임신의 현황, 예방, 정신과 자문)

  • Kim, Eun-Young;Kim, Boong-Nyun;Hong, Kang-E;Lee, Young-Sik
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.13 no.1
    • /
    • pp.117-128
    • /
    • 2002
  • Objectives:For the purpose of obtaining the more vivid present status and prevention program of teenage pregnancy, this survey was done by Obstetricians, as study subject, who manage the pregnant teenager in real clinical situation. Methods:Structured survey form about teenage pregnancy was sent to 2,800 obstetricians. That form contained frequency, characteristics, decision making processes, and psychiatric aspects of the teenage pregnancy. 349 obstetricians replied that survey form and we analysed these datas. Results:(1) The trend of teenage pregnancy was mildly increased. (2) The most common cases were unwanted pregnancy by continuing sexual relationship with boyfriends rather than by forced, accidental sexual relationship with multiple partners. (3) The most common reason of labor was loss the time of artificial abotion. (4) Problems of pregnant girls' were conduct behaviors and poor informations about contraception rather than sexual abuse or mental retardation. (5) Most obstetricians percepted the necessity of psychiatric consultation, however psychiatric consultation was rare due to parents refusal and abscense of available psychiatric facility. (6) For the prevention of teenage pregnancy, the most important thing was practical education about contraception. Conclusions:Based on the result of this study, further study using structured interview schedule with pregnant girl is needed for the detecting risk factor of teenage pregnancy and effective systematic approach to pregnant girl.

  • PDF

A Study on the Development of Multimedia CAI in Smoking Prevention for Adolescents (청소년 흡연예방을 위한 멀티미디어 CAI 개발)

  • Lee, Sook-Ja;Park, Tae-Jin;Joung, Young-Il;Cho, Hyun
    • Korean Journal of Health Education and Promotion
    • /
    • v.20 no.2
    • /
    • pp.35-61
    • /
    • 2003
  • Background: The purpose of this study was to develop a structured and individualized smoking prevention program for adolescents by utilizing a multimedia computer-assisted instruction model and to empirically assess its effect. Method: For the purpose of this study, a guide book of smoking prevention program for middle and high school students was developed as the first step. The contents of this book were summarized and developed into an actual multimedia CAI smoking prevention program according to the Gane & Briggs instructional design and Keller's ARCS motivation design models as the second step. At the final step, the short-tenn effects of this program were examined by an experiment. This experiment were made for middle school and high school students and the quasi experimental design was the pretest - intervention - posttest. The measured data was attitude, belief, and knowledge about smoking, interest in the program, and learning motivation. Result: The results of this study were as follows: First, the guide book of a smoking prevention program was developed and the existing literature on adolescent smoking was analyzed to develop the content of the guide book. Then the curriculum was divided into three main domains on tobacco and smoking history, smoking and health, adolescent smoking and each main domain was divided into sub-domains. Second, the contents of the guide book were translated into a multimedia CAI program of smoking prevention througn Powerpoint software according to the instructional design theory. The characteristics of this program were interactive, learner controllable, and structured The program contents consisted of entrance(5.6%), history of tobacco(30%), smoking and health(38.9%), adolescent smoking(22.2%), video(4.7%), and exit(1.6%). Multimedia materials consisted of text(121), sound and music, image(still 84, dynamic 32), and videogram(6). The program took about 40 minutes to complete. Third, the results on analysis of the program effects were as follows: 1) There was significant knowledge increase between the pre-test and post-test with total mean difference 3.44, and the highest increase was in the 1st grade students of high school(p<0.001). 2) There was significant decrease in general belief on smoking between the pre-test and post-test with total mean difference 0.28. In subgroup analysis, the difference was significantly higher in the 1st grade of high school (p<0.001), low income class (p<0.001), and daily smokers (p<0.01). 3) There was no significant difference in attitudes on his personal smoking between the pre-test and post-test. 4) The interest in the program seemed to lower as students got older. The score of motivation toward this prevention program was the highest in the middle school 3rd grade. Among sub-domains of motivation, the confidence score was the highest. Conclusion: To be most effective, the smoking prevention program for adolescents should utilize the most up-to-date and accurate information on smoking, and then instructional material should be developed so that the learners can approach the program with enjoyment. Through this study, a guide book with the most up-to-date information was developed and the multimedia CAI smoking prevention program was also developed based on the guide book. The program showed positive effect on the students' knowledge and belief in smoking.

An Hybrid Clustering Using Meta-Data Scheme in Ubiquitous Sensor Network (유비쿼터스 센서 네트워크에서 메타 데이터 구조를 이용한 하이브리드 클러스터링)

  • Nam, Do-Hyun;Min, Hong-Ki
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.9 no.4
    • /
    • pp.313-320
    • /
    • 2008
  • The dynamic clustering technique has some problems regarding energy consumption. In the cluster configuration aspect the cluster structure must be modified every time the head nodes are re-selected resulting in high energy consumption. Also, there is excessive energy consumption when a cluster head node receives identical data from adjacent cluster sources nodes. This paper proposes a solution to the problems described above from the energy efficiency perspective. The round-robin cluster header(RRCH) technique, which fixes the initially structured cluster and sequentially selects duster head nodes, is suggested for solving the energy consumption problem regarding repetitive cluster construction. Furthermore, the issue of redundant data occurring at the cluster head node is dealt with by broadcasting metadata of the initially received data to prevent reception by a sensor node with identical data. A simulation experiment was performed to verify the validity of the proposed approach. The results of the simulation experiments were compared with the performances of two of the must widely used conventional techniques, the LEACH(Low Energy Adaptive Clustering Hierarchy) and HEED(Hybrid, Energy Efficient Distributed Clustering) algorithms, based on energy consumption, remaining energy for each node and uniform distribution. The evaluation confirmed that in terms of energy consumption, the technique proposed in this paper was 29.3% and 21.2% more efficient than LEACH and HEED, respectively.

  • PDF