• Title/Summary/Keyword: Tool management

Search Result 4,240, Processing Time 0.028 seconds

The Quality Evaluation of the Biology Contents of Cyber Home Learning System for the 7th Grade Students (중학교 1학년 생물영역의 사이버가정학습 콘텐츠 품질 평가)

  • Jeong, Yun-Young;Jeong, Jin-Su;Kim, Sang-Ho
    • Journal of Science Education
    • /
    • v.33 no.1
    • /
    • pp.87-99
    • /
    • 2009
  • The purpose of this study was to evaluate the quality of biology contents of cyber home learning systems which provided by 16 metropolitan and provincial offices of education. The contents were evaluated by the 9 categories: needs assessment, instruction design, learning contents, teaching & learning strategy, interaction, supporting system, evaluation, ethicality and copy right. The result showed that the contents have advantage in detailed learning goal, useful learning environment, learning activities by level, and various learning parts material, but lack in evaluation method tool for personal learning by level and the latest learning material. Based on this results, it is expected that the barrier of the efficient learning contents should be searched for the complement, as well as the development high-quality educational contents and the management of cyber home learning system.

  • PDF

Automatic Parameter Estimation of Hydrogeologic Field Test around Underground Storage Caverns by using Nonlinear Regression Model (비선형 회귀모형을 이용한 지하저장공동 주변 현장수리지질시험 매개변수의 자동 추정)

  • Chung, Il-Moon;Cho, Won-Cheol;Kim, Nam-Won
    • The Journal of Engineering Geology
    • /
    • v.18 no.4
    • /
    • pp.359-369
    • /
    • 2008
  • For the design and effective management of underground storage caverns, preliminary investigation on the hydrogeologic parameters around caverns and analysis on the groundwater flow must be carried out. The data collection is very imporatnat task for the hydrogeologic design so various hydraulic tests have been performed. When analyzing the injection/fall off test data, existing graphical method to estimate the parameters in Theis' equation is widely used. However this method has some sources of error when estimating parameters by means of human faults. Therefore the method of estimating parameters by means of statistical methods such as regression type is evaluated as a useful tool. In this study, nonlinear regression analysis for the Theis' equation is suggested and applied to the estimation of parameters for the real field interference data around underground storage caverns. Damping parameter which reduce the iteration numbers and inhance the convergence is also introduced.

Notes on Methods for Realization and Analysis for Implementation of Traditional Aesthetic Value (전통 조형정신의 구현체계의 분석 방법과 실현 방안에 관한 고찰)

  • 민경우
    • Archives of design research
    • /
    • v.17 no.3
    • /
    • pp.335-342
    • /
    • 2004
  • Recently there have been various research activities regarding Korean traditional aesthetics. However, those researches were mainly conducted individually, partially, and periodically, which resulted in unsystematic and incomprehensive works. Therefore, it is required to orginze all the precedent research works with more systematic and objective framework. Generally speaking, all the human activities including aesthetic activity have ends, procedure and means. In other words, human being needs three key elements for realizing any thought and those three elements include contents, formal, and practical element. Element of contents is ultimate goal to accomplish as value, concept, and meaning of thought with their aims. Formal element includes methods, principles, norms, procedure, formality and style comprising of thought in order to accomplish the goal. Finally, practical element refers to specific means, tool, media, material and techniques to concretize the contents through form. Almost all of thoughts and meaning which human being tries to express consist of language. Major elements in sentence include 'subject (omissible)' , 'objects (aim)', 'predicate (formality)', 'complement (means)' and they are composed systematically and hierarchically with rules in sentence. The study compared human activity model with language structure and analyzed their implication with design (aesthetics), which made it possible to propose analytic frameworks for traditional aesthetics. In addition, the study also systematically organized the way to realize traditional aesthetic value in the present context based on the methods developed in this study.

  • PDF

Development of MPEG-4 IPMP Authoring Tool (MPEG-4 IPMP 저작 도구 개발)

  • Kim Kwangyong;Hong Jinwoo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2003.11a
    • /
    • pp.75-78
    • /
    • 2003
  • MPEG-4 표준은 저작자가 정지영상, 텍스트, 2D/3D 그래픽스, 오디오, 심지어 임의형의 비디오 등과 같이 다양한 형태의 객체들을 개별적으로 구성하고 이들을 시/공간자적으로 다루기 용이하게 해 준다. 이와 같은 객체 기반 코딩 특성에 의해서 대화형 방송 콘텐츠를 제작하는데 가장 유용한 방식으로 고려할 수 있다. 피러나, 콘텐츠의 제작, 전송, 소비 관전에서 고려해 달 때, 콘텐츠 제작자 또는 저작권자의 보호 및 관리가 필요하게 되었다. 이에 따라 최근에는 OPIMA (Open Platform Initiative for Multimedia Access), SDMI (Secure Digital Music Initiative) and MPEG(Moving Picture Expert Group) OPIMATfMr(Intellectual Property Management & Protection)와 같은 국제 표준 단체들이 콘텐츠 보호 및 관리에 대한 관심을 가지게 되었다. 특히, MPEG의 경우에 MPEG-4 IPMP를 표준화하여 디지털 콘텐츠와 저작권에 대한 보호를 체계적이고 효과적으로 다루는 연구를 가장 활발히 해오고 있다. 이 논문에서 우리는 MPEG-4 콘텐츠 저작자가 MPEG-4 규격에 맞게 보호화 된 객체 기반 방송용 콘텐츠를 쉽고 편리하게 제작학 수 있도록 하기 위한 MPEG씨 콘텐츠 및 저자권 보호를 위한 MPEG-4 IPMP 저작 도구를 제안하고자 한다. 제안한 MPEG-4 콘텐츠 및 저작권 보호 저작 도구는 저작자에게 친근한 사용자 인터페이스를 제공하여 편집 및 수정이 용이한 텍스트 포맷인 IPMP회된 XMT(extensible Mpeg-4 Textual format) 파일을 생성한다. 또한, 콘텐츠 전송 및 저장의 효율성을 위해 이진 포멧인 IPMP화된 MP4 파일을 생성할 수 있다.으로써, 에러 이미지가 가지고 있는 엔트로피에 좀 근접하게 코딩을 할 수 있게 되었다. 이 방법은 실제로 Arithmetic Coder를 이용하는 다른 압축 방법에 그리고 적용할 수 있다. 실험 결과 압축효율은 JPEG-LS보다 약 $5\%$의 압축 성능 개선이 있었으며, CALIC과는 대등한 압축률을 보이며, 부호화/복호화 속도는 CALIC보다 우수한 것으로 나타났다.우 $23.87\%$($18.00\~30.91\%$), 갑폭 $23.99\%$($17.82\~30.48\%$), 체중 $91.51\%$($58.86\~129.14\%$)이였으며 성장율은 사육 온도구간별 차는 없었다.20 km 까지의 지점들(지점 2에서 지점 6)에서 매우 높은 값을 보이며 이는 조석작용으로 해수와 담수가 강제혼합되면서 표층퇴적물이 재부유하기 때문이라고 판단된다. 영양염류는 월별로 다소의 차이는 있으나, 대체적으로 지점 1과 2에서 가장 낮고, 상류로 갈수록 점차 증가하며 지점 7 상류역이 하류역에 비해 높은 농도이다. 월별로는 7월에 규산염, 용존무기태질소 및 암모니아의 농도가 가장 높은 반면에 용존산소포화도는 가장 낮다. 그러나 지점 14 상류역에서는 5월에 측정한 용존무기태질소, 암모니아, 인산염 및 COD 값이 7월보다 다소 높거나 비슷하다. 한편 영양염류와 COD값은 대체적으로 8월에 가장 낮으나 용존산소포화도는 가장 높다.출조건은 $100^{\circ}C$에서 1분간의 고온단시간 추출이 적합하였다. 증가를 나타내었는데, 저장기간에 따른 물성의 변화는 숭어에 비하여 붕장어가 적었다.양식산은 aspartic acid 및 proline이 많았다. 또한 잉어는 천연산이

  • PDF

An Impact Assessment Index for the RFID Privacy (RFID 개인정보 영향평가지수 개발)

  • Han, Pil-Koo;Kang, Byung-Goo
    • Journal of Information Management
    • /
    • v.40 no.1
    • /
    • pp.69-86
    • /
    • 2009
  • The biggest paradigm of the latest telecommunications is ubiquitous computing. It is a technology basis to realize ubiquitous society that would affect social, economical and cultural industries with positive influence. However, there is a simultaneous concern that the approach to ubiquitous society may violate one's privacy. Therefore, the existence of legal and technological regulation would be the biggest obstacle in further RFID technology and industry dissemination. Also, in business side, they must invest with enormous expense and technology if technological method is only approached for the solution. As in the research, 8 RFID applications, application process and inspection items and 85 appraisal list of "An impact assessment for the privacy protection in RFID applications" developed by P. K. Han(2006), will be used as an indicator to measure RFID privacy impact assessment. In addition, it is to develop RFID privacy impact assessment index by applying objective data with survey of applied specialists. This would provide a data with feasibility and reliability to RFID related companies and able to utilize policy making on RFID private data. In addition, it is expected to contribute as an efficiency tool for individual data to build basis of ubiquitous society.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

Set Up and Operation for Medical Radiation Exposure Quality Control System of Health Promotion Center (건강검진센터의 의료방사선 피폭 품질관리 시스템 구축 운영 경험 보고)

  • Kim, Jung-Su;Jung, Hae-Kyoung;Kim, Jung-Min
    • Journal of radiological science and technology
    • /
    • v.39 no.1
    • /
    • pp.13-17
    • /
    • 2016
  • In this study, standard model of medical radiation dosage quality control system will be suggested and the useful of this system in clinical field will be reviewed. Radiation dosage information of modalities are gathered from digital imaging and communications in medicine(DICOM) standard data(such as DICOM dose SR and DICOM header) and stored in database. One CT scan, two digital radiography modalities and two mammography modalities in one health promotion center in Seoul are used to derive clinical data for one month. After 1 months research with 703 CT scans, the study shows CT $357.9mGy{\cdot}cm$ in abdomen and pelvic CT, $572.4mGy{\cdot}cm$ in brain without CT, $55.9mGy{\cdot}cm$ in calcium score/heart CT, screening CT at $54mGy{\cdot}cm$ in chest screening CT(low dose screening CT scan), $284.99mGy{\cdot}cm$ in C-spine CT and $341.85mGy{\cdot}cm$ in L-spine CT as health promotion center reference level of each exam. And with 1955 digital radiography cases, it shows $274.0mGy{\cdot}cm2$ and for mammography 6.09 mGy is shown based on 536 cases. The use of medical radiation shall comply with the principles of justification and optimization. This quality management of medical radiation exposure must be performed in order to follow the principle. And the procedure to reduce the radiation exposure of patients and staff can be achieved through this. The results of this study can be applied as a useful tool to perform the quality control of medical radiation exposure.

Parameter Regionalization of a Tank Model for Simulating Runoffs from Ungauged Watersheds (미계측 유역 유출 모의를 위한 Tank 모형의 매개변수 지역화)

  • Kang, Min Goo;Lee, Joo Heon;Park, Ki Wook
    • Journal of Korea Water Resources Association
    • /
    • v.46 no.5
    • /
    • pp.519-530
    • /
    • 2013
  • To provide a reliable tool for runoff simulations of ungauged watersheds upstream of reservoirs, a daily runoff simulation model, Tank model, is restructured, the parameter regionalization of the model is conducted, and the model's applicability is evaluated. Taking into account the characteristics of runoffs from the watersheds, a three-tank model is employed. The percolation process of the model's third tank is eliminated, considering the water budgets of the watersheds, and its evapotranspiration component is improved, reflecting the conditions of meteorological observation in South Korea. The sensitivity analysis of the model shows that the model's behaviors, varying with a sensitive parameter, ${\alpha}$, are reasonable. The regional parameter estimation equations are determined, using the characteristics and land uses of the watersheds as variables. The model is applied for the runoff simulations of three watersheds and the water stage simulation of one reservoir, and the simulation results are then compared with the observed values, which prove to be in close agreement with the observations. In addition, the results from simulating inflows of twenty-four reservoirs using the model show that the averages of evapotranspiration rate and runoff rate are 42.8% and 56.6%, respectively, which are resonable. Consequently, it is concluded that the model is practically applicable to simulating runoffs from watersheds upstream of reservoirs, and simulated inflow data are useful for watershed management and reservoir planning, design, and operation.

The Effects of Multi-identity on One's Psychological State and the Quality of Contribution in Virtual Communities: A Socio-Psychological Perspective

  • Suh, A-Young;Shin, Kyung-Shik;Lee, Ju-Min
    • Asia pacific journal of information systems
    • /
    • v.20 no.1
    • /
    • pp.57-79
    • /
    • 2010
  • In a virtual community, one can possess multiple identities and pretend to be different by creating self-identity in contrast with his or her actual self. Does false identity undermine the qualitative growth of a virtual community by reducing members' accountability? Or does it stimulate their contributive behaviors by ensuring freedom of speech? It is imperative to understand the effects of multi-identity considering the distinct properties of a virtual community in which people easily change their identities at little or no cost. To answer these questions, we adopted the concept of self-discrepancy from the social psychology theory rooted in the concept of the self and developed a theoretical model to predict quality of contribution of the individual member in virtual communities. Based on the self-discrepancy theory, we first identified two different domains of the self: (1) an "actual self" that consists of attributes that the person believes he or she currently possesses in real life and (2) a "cyber self" that consists of attributes the person believes he or she possesses in a virtual community. Next, we derived an index for two different types of self-discrepancy by using the differences between the actual and the cyber identities: Personal Self-discrepancy and Social Self-discrepancy. Personal Self-discrepancy reflects the degree of discrepancy between actual and cyber identity regarding a person's intelligence, education, and expertise. Social Self-discrepancy reflects the degree of discrepancy between actual and cyber identity regarding a person's morality, sociability, and accordance with social norms. Finally, we linked them with sense of virtual community, perceived privacy rights, and quality of contribution to examine how having a multi-identity influences an individual's psychological state and contributive behaviors in a virtual community. The results of the analysis based on 266 respondents showed that Social Self-discrepancy negatively influenced both the Sense of Virtual Community and Perceived Privacy Rights, while Personal Self-discrepancy negatively influenced only Perceived Privacy Rights, thereby resulting in reduced quality of contribution in virtual communities. Based on the results of this analysis, we can explain the dysfunctions of multi-identity in virtual communities. First, people who pretend to be different by engaging in socially undesirable behaviors under their alternative identities are more likely to suffer lower levels of psychological wellbeing and thus experience lower levels of sense of virtual community than others. Second, people do not perceive a high level of privacy rights reflecting catharsis, recovery, or autonomy, even though they create different selves and engage in socially undesirable behaviors in a virtual community. Third, people who pretend to be different persons in terms of their intelligence, education, or expertise also indirectly debase the quality of contribution by decreasing perceived privacy rights. The results suggest that virtual community managers should pay more attention to the negative influences exercised by multi-identity on the quality of contribution, thereby controlling the need to create alternative identities in virtual communities. We hope that more research will be conducted on this underexplored area of multi-identity and that our theoretical framework will serve as a useful conceptual tool for all endeavors.

A Database of Simple Sequence Repeat (SSR) Marker-Based DNA Profiles of Citrus and Related Cultivars and Germplasm (SSR Marker를 이용한 감귤속 품종 및 유전자원에 대한 DNA Profile Data Base 구축)

  • Hong, Jee-Hwa;Chae, Chi-Won;Choi, Keun-Jin;Kwon, Yong-Sham
    • Horticultural Science & Technology
    • /
    • v.34 no.1
    • /
    • pp.142-153
    • /
    • 2016
  • The present study investigated identification of cultivars through phylogenetic analysis of 108 Citrus varieties and related cultivars using simple sequence repeat (SSR) markers. Two hundred three SSR primer pairs were used to detect polymorphic markers among 8 Citrus cultivars consisting of 4 mandarins, 1 orange, 1 tangor, 1 tangelo, and 1 pumelo. Eighteen SSR primer pairs were reproducible and showed highly polymorphic alleles. These markers were applied to assess genetic variations of the 108 varieties. Each marker detected 5-14 alleles, with an average of 9.28. The polymorphism information content varied from 0.417 to 0.791 with an average of 0.706. Cluster analysis with SSR markers resulted in 13 major groups reflecting cultivar types and pedigree information. Twelve orange cultivars in the $I-1^{st}$ sub-cluster and 23 mandarin cultivars in the $II-1^{st}$ sub-cluster, respectively, were not discriminated using the SSR markers. This could be due to narrow genetic backgrounds originated through bud mutation or nucellars seedlings. The SSR profile database of Citrus cultivars will be useful as a tool for protection of plant breeders' intellectual property rights in addition to assessing genetic diversity in Citrus cultivars and germplasms.