• Title/Summary/Keyword: Training Support

Search Result 2,236, Processing Time 0.03 seconds

Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors (금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이)

  • Jeong-Ha Lee;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.17-42
    • /
    • 2016
  • Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.

Ensemble of Nested Dichotomies for Activity Recognition Using Accelerometer Data on Smartphone (Ensemble of Nested Dichotomies 기법을 이용한 스마트폰 가속도 센서 데이터 기반의 동작 인지)

  • Ha, Eu Tteum;Kim, Jeongmin;Ryu, Kwang Ryel
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.123-132
    • /
    • 2013
  • As the smartphones are equipped with various sensors such as the accelerometer, GPS, gravity sensor, gyros, ambient light sensor, proximity sensor, and so on, there have been many research works on making use of these sensors to create valuable applications. Human activity recognition is one such application that is motivated by various welfare applications such as the support for the elderly, measurement of calorie consumption, analysis of lifestyles, analysis of exercise patterns, and so on. One of the challenges faced when using the smartphone sensors for activity recognition is that the number of sensors used should be minimized to save the battery power. When the number of sensors used are restricted, it is difficult to realize a highly accurate activity recognizer or a classifier because it is hard to distinguish between subtly different activities relying on only limited information. The difficulty gets especially severe when the number of different activity classes to be distinguished is very large. In this paper, we show that a fairly accurate classifier can be built that can distinguish ten different activities by using only a single sensor data, i.e., the smartphone accelerometer data. The approach that we take to dealing with this ten-class problem is to use the ensemble of nested dichotomy (END) method that transforms a multi-class problem into multiple two-class problems. END builds a committee of binary classifiers in a nested fashion using a binary tree. At the root of the binary tree, the set of all the classes are split into two subsets of classes by using a binary classifier. At a child node of the tree, a subset of classes is again split into two smaller subsets by using another binary classifier. Continuing in this way, we can obtain a binary tree where each leaf node contains a single class. This binary tree can be viewed as a nested dichotomy that can make multi-class predictions. Depending on how a set of classes are split into two subsets at each node, the final tree that we obtain can be different. Since there can be some classes that are correlated, a particular tree may perform better than the others. However, we can hardly identify the best tree without deep domain knowledge. The END method copes with this problem by building multiple dichotomy trees randomly during learning, and then combining the predictions made by each tree during classification. The END method is generally known to perform well even when the base learner is unable to model complex decision boundaries As the base classifier at each node of the dichotomy, we have used another ensemble classifier called the random forest. A random forest is built by repeatedly generating a decision tree each time with a different random subset of features using a bootstrap sample. By combining bagging with random feature subset selection, a random forest enjoys the advantage of having more diverse ensemble members than a simple bagging. As an overall result, our ensemble of nested dichotomy can actually be seen as a committee of committees of decision trees that can deal with a multi-class problem with high accuracy. The ten classes of activities that we distinguish in this paper are 'Sitting', 'Standing', 'Walking', 'Running', 'Walking Uphill', 'Walking Downhill', 'Running Uphill', 'Running Downhill', 'Falling', and 'Hobbling'. The features used for classifying these activities include not only the magnitude of acceleration vector at each time point but also the maximum, the minimum, and the standard deviation of vector magnitude within a time window of the last 2 seconds, etc. For experiments to compare the performance of END with those of other methods, the accelerometer data has been collected at every 0.1 second for 2 minutes for each activity from 5 volunteers. Among these 5,900 ($=5{\times}(60{\times}2-2)/0.1$) data collected for each activity (the data for the first 2 seconds are trashed because they do not have time window data), 4,700 have been used for training and the rest for testing. Although 'Walking Uphill' is often confused with some other similar activities, END has been found to classify all of the ten activities with a fairly high accuracy of 98.4%. On the other hand, the accuracies achieved by a decision tree, a k-nearest neighbor, and a one-versus-rest support vector machine have been observed as 97.6%, 96.5%, and 97.6%, respectively.

A Study on Improvements on Legal Structure on Security of National Research and Development Projects (과학기술 및 학술 연구보고서 서비스 제공을 위한 국가연구개발사업 관련 법령 입법론 -저작권법상 공공저작물의 자유이용 제도와 연계를 중심으로-)

  • Kang, Sun Joon;Won, Yoo Hyung;Choi, San;Kim, Jun Huck;Kim, Seul Ki
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2015.05a
    • /
    • pp.545-570
    • /
    • 2015
  • Korea is among the ten countries with the largest R&D budget and the highest R&D investment-to-GDP ratio, yet the subject of security and protection of R&D results remains relatively unexplored in the country. Countries have implemented in their legal systems measures to properly protect cutting-edge industrial technologies that would adversely affect national security and economy if leaked to other countries. While Korea has a generally stable legal framework as provided in the Regulation on the National R&D Program Management (the "Regulation") and the Act on Industrial Technology Protection, many difficulties follow in practice when determining details on security management and obligations and setting standards in carrying out national R&D projects. This paper proposes to modify and improve security level classification standards in the Regulation. The Regulation provides a dual security level decision-making system for R&D projects: the security level can be determined either by researcher or by the central agency in charge of the project. Unification of such a dual system can avoid unnecessary confusions. To prevent a leakage, it is crucial that research projects be carried out in compliance with their assigned security levels and standards and results be effectively managed. The paper examines from a practitioner's perspective relevant legal provisions on leakage of confidential R&D projects, infringement, injunction, punishment, attempt and conspiracy, dual liability, duty of report to the National Intelligence Service (the "NIS") of security management process and other security issues arising from national R&D projects, and manual drafting in case of a breach. The paper recommends to train security and technological experts such as industrial security experts to properly amend laws on security level classification standards and relevant technological contents. A quarterly policy development committee must also be set up by the NIS in cooperation with relevant organizations. The committee shall provide a project management manual that provides step-by-step guidance for organizations that carry out national R&D projects as a preventive measure against possible leakage. In the short term, the NIS National Industrial Security Center's duties should be expanded to incorporate national R&D projects' security. In the long term, a security task force must be set up to protect, support and manage the projects whose responsibilities should include research, policy development, PR and training of security-related issues. Through these means, a social consensus must be reached on the need for protecting national R&D projects. The most efficient way to implement these measures is to facilitate security training programs and meetings that provide opportunities for communication among industrial security experts and researchers. Furthermore, the Regulation's security provisions must be examined and improved.

  • PDF

Developmental Plans and Research on Private Security in Korea (한국 민간경비 실태 및 발전방안)

  • Kim, Tea-Hwan;Park, Ok-Cheol
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.69-98
    • /
    • 2005
  • The security industry for civilians (Private Security), was first introduced to Korea via the US army's security system in the early 1960's. Shortly after then, official police laws were enforced in 1973, and private security finally started to develop with the passing of the 'service security industry' law in 1976. Korea's Private Security industry grew rapidly in the 1980's with the support of foreign funds and products, and now there are thought to be approximately 2000 private security enterprises currently running in Korea. However, nowadays the majority of these enterprises are experiencing difficulties such as lack of funds, insufficient management, and lack of control over employees, as a result, it seems difficult for some enterprises to avoid the low production output and bankruptcy. As a result of this these enterprises often settle these matters illegally, such as excessive dumping or avoiding problems by hiring inappropriate employees who don't have the right skills or qualifications for the jobs. The main problem with the establishment of this kind of security service is that it is so easy to make inroads into this private service market. All these hindering factors inhibit the market growth and impede qualitative development. Based on these main reasons, I researched this area, and will analyze and criticize the present condition of Korea's private security. I will present a possible development plan for the private security of Korea by referring to cases from the US and Japan. My method of researching was to investigate any related documentary records and articles and to interview people for necessary evidence. The theoretical study, involves investigation books and dissertations which are published from inside and outside of the country, and studying the complete collection of laws and regulations, internet data, various study reports, and the documentary records and the statistical data of many institutions such as the National Police Office, judicial training institute, and the enterprises of private security. Also, in addition, the contents of professionals who are in charge of practical affairs on the spot in order to overcomes the critical points of documentary records when investigating dissertation. I tried to get a firm grasp of the problems and difficulties which people in these work enterprises experience, this I thought would be most effective by interviewing the workers, for example: how they feel in the work places and what are the elements which inpede development? And I also interviewed policemen who are in charge of supervising the private escort enterprises, in an effort to figure out the problems and differences in opinion between domestic private security service and the police. From this investigation and research I will try to pin point the major problems of the private security and present a developmental plan. Firstly-Companies should unify the private police law and private security service law. Secondly-It is essential to introduce the 'specialty certificate' system for the quality improvement of private security service. Thirdly-must open up a new private security market by improving old system. Fourth-must build up the competitive power of the security service enterprises which is based on an efficient management. Fifth-needs special marketing strategy to hold customers Sixth-needs positive research based on theoretical studies. Seventh-needs the consistent and even training according to effective market demand. Eighth-Must maintain interrelationship with the police department. Ninth-must reinforce the system of Korean private security service association. Tenth-must establish private security laboratory. Based on these suggestions there should be improvement of private security service.

  • PDF

A Deep Learning Based Approach to Recognizing Accompanying Status of Smartphone Users Using Multimodal Data (스마트폰 다종 데이터를 활용한 딥러닝 기반의 사용자 동행 상태 인식)

  • Kim, Kilho;Choi, Sangwoo;Chae, Moon-jung;Park, Heewoong;Lee, Jaehong;Park, Jonghun
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.1
    • /
    • pp.163-177
    • /
    • 2019
  • As smartphones are getting widely used, human activity recognition (HAR) tasks for recognizing personal activities of smartphone users with multimodal data have been actively studied recently. The research area is expanding from the recognition of the simple body movement of an individual user to the recognition of low-level behavior and high-level behavior. However, HAR tasks for recognizing interaction behavior with other people, such as whether the user is accompanying or communicating with someone else, have gotten less attention so far. And previous research for recognizing interaction behavior has usually depended on audio, Bluetooth, and Wi-Fi sensors, which are vulnerable to privacy issues and require much time to collect enough data. Whereas physical sensors including accelerometer, magnetic field and gyroscope sensors are less vulnerable to privacy issues and can collect a large amount of data within a short time. In this paper, a method for detecting accompanying status based on deep learning model by only using multimodal physical sensor data, such as an accelerometer, magnetic field and gyroscope, was proposed. The accompanying status was defined as a redefinition of a part of the user interaction behavior, including whether the user is accompanying with an acquaintance at a close distance and the user is actively communicating with the acquaintance. A framework based on convolutional neural networks (CNN) and long short-term memory (LSTM) recurrent networks for classifying accompanying and conversation was proposed. First, a data preprocessing method which consists of time synchronization of multimodal data from different physical sensors, data normalization and sequence data generation was introduced. We applied the nearest interpolation to synchronize the time of collected data from different sensors. Normalization was performed for each x, y, z axis value of the sensor data, and the sequence data was generated according to the sliding window method. Then, the sequence data became the input for CNN, where feature maps representing local dependencies of the original sequence are extracted. The CNN consisted of 3 convolutional layers and did not have a pooling layer to maintain the temporal information of the sequence data. Next, LSTM recurrent networks received the feature maps, learned long-term dependencies from them and extracted features. The LSTM recurrent networks consisted of two layers, each with 128 cells. Finally, the extracted features were used for classification by softmax classifier. The loss function of the model was cross entropy function and the weights of the model were randomly initialized on a normal distribution with an average of 0 and a standard deviation of 0.1. The model was trained using adaptive moment estimation (ADAM) optimization algorithm and the mini batch size was set to 128. We applied dropout to input values of the LSTM recurrent networks to prevent overfitting. The initial learning rate was set to 0.001, and it decreased exponentially by 0.99 at the end of each epoch training. An Android smartphone application was developed and released to collect data. We collected smartphone data for a total of 18 subjects. Using the data, the model classified accompanying and conversation by 98.74% and 98.83% accuracy each. Both the F1 score and accuracy of the model were higher than the F1 score and accuracy of the majority vote classifier, support vector machine, and deep recurrent neural network. In the future research, we will focus on more rigorous multimodal sensor data synchronization methods that minimize the time stamp differences. In addition, we will further study transfer learning method that enables transfer of trained models tailored to the training data to the evaluation data that follows a different distribution. It is expected that a model capable of exhibiting robust recognition performance against changes in data that is not considered in the model learning stage will be obtained.

The Effect of the Quality of Education Service on the Performance of Education Service through Relationship Commitment in Franchise Beauty Academy: Moderating Effect of Trust Level (프랜차이즈 뷰티 아카데미의 교육서비스 품질이 관계 몰입을 통한 교육 서비스 성과에 미치는 영향 연구: 신뢰 수준의 조절효과)

  • Kim, Chang-Bong;Kim, Hee-Su
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.16 no.3
    • /
    • pp.193-211
    • /
    • 2021
  • Recently, interest in Korean Wave craze and K-beauty, led by K-pop, is increasing. In addition, the popularity and influence of the domestic beauty service industry has increased, and the economic and cultural ripple effects have been continuously expanding. The need to professional manpower training in response to the demand for manpower due to the growing development of domestic beauty services is emphasized, and the number of trainees who are actual consumers of beauty academy is increasing. Therefore, the purpose of our study is to examine the importance of quality factors of educational services to achieve educational purposes in the educational services provided by the Beauty Academy and the relationship between relationship commitment and educational service performance. Furthermore, it is to draw the importance of administrative support services, educational programs as well as educational service provision activities. However, the research for professional manpower training according to the provision of beauty services is insufficient compared to the development speed of the beauty industry. Therefore, at the present time when beauty service education is emphasized, our study will examine the relationship between relationship commitment and educational service performance based on the quality of education service by the students of domestic beauty academy. The measurement variables set for our study are program, instructor quality, tuition, external service, service fairness, relationship commitment, trust level, and educational service performance. The variables were analyzed and derived through the survey, and the following contents were derived from the empirical analysis. First, the quality of education service provided by the beauty academy, such as program, external service, service fairness, relationship commitment and trust level, had a significant effect on relationship commitment. Educational services provided by the institute, such as the systematicity and diversity of educational programs, enabled students to have a uniform relationship commitment. The quality of education service itself is to learn the expertise necessary for providing beauty service from the standpoint of the students and play an organic role in the relationship with the institute. Second, the moderating effect of trust level between academies and students was significant in the quality of education service and the relationship commitment. This means that students will feel higher level of service quality through the practical trust relationship of the students about the educational services provided by the institute. Based on the results of the empirical analysis, the implications of our study are to find ways to improve the students' ability and satisfaction represented by the results of educational services. This is because the quality of education services provided by the institute called Beauty Academy will have a great impact on the career choice of educational facilities and students. The characteristics of consistency, convenience, and knowledge orientation of education itself should be considered comprehensively, and a strong market position should be established through image formation through external service factors, which are external environments of academies.Furthermore, in terms of presenting differentiated strategies with competitors, the educational service quality factors play a significant role in the commitment to the relationship with the students, so the role of relationship marketing will be important for the psychological stability experienced by the students by grasping the demand accompanying the behavior of the students in advance.

A Study on Practical Curriculum Development of the Education for Love based on the Understanding of Psychoanalytic 'Desire of Subject' (정신분석학적 '욕망의 주체' 이해에 기초한 사랑의 교육 교육과정 개발)

  • Kim, Sun Ah
    • Journal of Christian Education in Korea
    • /
    • v.68
    • /
    • pp.77-112
    • /
    • 2021
  • This study is based on the research of the first year, which is the National Research Foundation of Korea's R&D subject for middle-grade researchers. In this study, the practical curriculum development of the education for love - an according to the psychoanalytic perspectives of F. Dolto(1908-1988) - is suggested as follows. The first is 'the reconstruction of the directions of curriculum and its specific aims in accordance with such directions.' The reconstruction of the directions of curriculum aims at leading our future generation to live as a subject of desire through the mutual-communication of love. The second is 'the reconstruction of the tasks of curriculum and its specific contents in accordance with such tasks.' The reconstruction of the tasks of curriculum pursuit to help our future generation through the converting the education for love into the paradigm of desire of Agape to live as a subject of desire forming a whole personality and practicing the desire of Agape in daily life. as a source of desire. According to these aims, the reconstruction of directions of curriculum are presented as following: firstly, 'curriculum for the mutual-communication between subjects of love' and secondly, 'curriculum for the subject of desire'. The reconstruction of tasks of curriculum are like these: firstly, 'converting the education for love into the paradigm of desire of Agape', and secondly, 'forming a whole personality through the education for love'. Thus, with respect to two specific aims in accordance with the reconstruction of directions are suggested like these: Firstly, 'constructing a subject as a speaking existence' and secondly, 'realizing the subject as the autonomous source of desire'. In the two specific contents in accordance with the reconstruction of tasks are presented as following: Firstly, 'realizing the truth of the desire of Agape'.' Secondly, 'practicing the desire of Agape in daily life.' The third is 'the reconstruction of curriculum by life cycle' are suggested. They include the fetal life, infants and preschool children life, and childhood life. In further study, it is required to contain adolescent period. It will be useful to help them to recover their self-esteem with the experience of true love, especially, out-of-school young generation overcome negative perspectives and prejudice in the society, and challenges to their dreams and future through proper utilization of the study outcome. The outcome of this study, which presented practical curriculum development of the education for love based on the understanding of psychoanalytic 'desire of subject' can be used as basic teaching materials for our future generations. Furthermore, the results can be used as a resource for educating ministers and lay leaders in the religious world to build capabilities to heal their inner side as well as the society that is tainted with various forms of conflict. These include general conflicts, anger, pleasure and addiction, depression and suicide, violence and murder, etc. The study outcome can contribute to the prevention of antisocial incidents against humanity that have recently been occurring in our free-semester system implemented in all middle schools across the country to be operated effectively. For example, it is possible to provide the study results as lecture and teaching materials for 'character camp' (self-examination and self-esteem improvement training) and 'family healing camp' (solution of a communication gap between family members and love communication training), which help students participate in field trip activities and career exploration activities voluntarily, independently, and creatively. Ultimately, it can visibly present the convergent research performance by providing the study outcome as preliminary data for the development of lecture videos and materials including infant care and preschool education, parental education, family consultation education, and holistic healing education. Support from the religious world, including the central government and local governments, are urgently required in order for such educational possibilities to be fulfilled both in the society and the fields of church education and to be actively linked to follow-up studies.

A Study on the Prediction Model of Stock Price Index Trend based on GA-MSVM that Simultaneously Optimizes Feature and Instance Selection (입력변수 및 학습사례 선정을 동시에 최적화하는 GA-MSVM 기반 주가지수 추세 예측 모형에 관한 연구)

  • Lee, Jong-sik;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.4
    • /
    • pp.147-168
    • /
    • 2017
  • There have been many studies on accurate stock market forecasting in academia for a long time, and now there are also various forecasting models using various techniques. Recently, many attempts have been made to predict the stock index using various machine learning methods including Deep Learning. Although the fundamental analysis and the technical analysis method are used for the analysis of the traditional stock investment transaction, the technical analysis method is more useful for the application of the short-term transaction prediction or statistical and mathematical techniques. Most of the studies that have been conducted using these technical indicators have studied the model of predicting stock prices by binary classification - rising or falling - of stock market fluctuations in the future market (usually next trading day). However, it is also true that this binary classification has many unfavorable aspects in predicting trends, identifying trading signals, or signaling portfolio rebalancing. In this study, we try to predict the stock index by expanding the stock index trend (upward trend, boxed, downward trend) to the multiple classification system in the existing binary index method. In order to solve this multi-classification problem, a technique such as Multinomial Logistic Regression Analysis (MLOGIT), Multiple Discriminant Analysis (MDA) or Artificial Neural Networks (ANN) we propose an optimization model using Genetic Algorithm as a wrapper for improving the performance of this model using Multi-classification Support Vector Machines (MSVM), which has proved to be superior in prediction performance. In particular, the proposed model named GA-MSVM is designed to maximize model performance by optimizing not only the kernel function parameters of MSVM, but also the optimal selection of input variables (feature selection) as well as instance selection. In order to verify the performance of the proposed model, we applied the proposed method to the real data. The results show that the proposed method is more effective than the conventional multivariate SVM, which has been known to show the best prediction performance up to now, as well as existing artificial intelligence / data mining techniques such as MDA, MLOGIT, CBR, and it is confirmed that the prediction performance is better than this. Especially, it has been confirmed that the 'instance selection' plays a very important role in predicting the stock index trend, and it is confirmed that the improvement effect of the model is more important than other factors. To verify the usefulness of GA-MSVM, we applied it to Korea's real KOSPI200 stock index trend forecast. Our research is primarily aimed at predicting trend segments to capture signal acquisition or short-term trend transition points. The experimental data set includes technical indicators such as the price and volatility index (2004 ~ 2017) and macroeconomic data (interest rate, exchange rate, S&P 500, etc.) of KOSPI200 stock index in Korea. Using a variety of statistical methods including one-way ANOVA and stepwise MDA, 15 indicators were selected as candidate independent variables. The dependent variable, trend classification, was classified into three states: 1 (upward trend), 0 (boxed), and -1 (downward trend). 70% of the total data for each class was used for training and the remaining 30% was used for verifying. To verify the performance of the proposed model, several comparative model experiments such as MDA, MLOGIT, CBR, ANN and MSVM were conducted. MSVM has adopted the One-Against-One (OAO) approach, which is known as the most accurate approach among the various MSVM approaches. Although there are some limitations, the final experimental results demonstrate that the proposed model, GA-MSVM, performs at a significantly higher level than all comparative models.

Summative Evaluation of 1993, 1994 Discussion Contest of Scientific Investigation (제 1, 2회 학생 과학 공동탐구 토론대회의 종합적 평가)

  • Kim, Eun-Sook;Yoon, Hye-Gyoung
    • Journal of The Korean Association For Science Education
    • /
    • v.16 no.4
    • /
    • pp.376-388
    • /
    • 1996
  • The first and the second "Discussion Contest of Scientific Investigation" was evaluated in this study. This contest was a part of 'Korean Youth Science Festival' held in 1993 and 1994. The evaluation was based on the data collected from the middle school students of final teams, their teachers, a large number of middle school students and college students who were audience of the final competition. Questionnaires, interviews, reports of final teams, and video tape of final competition were used to collect data. The study focussed on three research questions. The first was about the preparation and the research process of students of final teams. The second was about the format and the proceeding of the Contest. The third was whether participating the Contest was useful experience for the students and the teachers of the final teams. The first area, the preparation and the research process of students, were investigated in three aspects. One was the level of cooperation, participation, support and the role of teachers. The second was the information search and experiment, and the third was the report writing. The students of the final teams from both years, had positive opinion about the cooperation, students' active involvement, and support from family and school. Students considered their teachers to be a guide or a counsellor, showing their level of active participation. On the other hand, the interview of 1993 participants showed that there were times that teachers took strong leading role. Therefore one can conclude that students took active roles most of the time while the room for improvement still exists. To search the information they need during the period of the preparation, student visited various places such as libraries, bookstores, universities, and research institutes. Their search was not limited to reading the books, although the books were primary source of information. Students also learned how to organize the information they found and considered leaning of organizing skill useful and fun. Variety of experiments was an important part of preparation and students had positive opinion about it. Understanding related theory was considered most difficult and important, while designing and building proper equipments was considered difficult but not important. This reflects the students' school experience where the equipments were all set in advance and students were asked to confirm the theories presented in the previous class hours. About the reports recording the research process, students recognize the importance and the necessity of the report but had difficulty in writing it. Their reports showed tendency to list everything they did without clear connection to the problem to be solved. Most of the reports did not record the references and some of them confused report writing with story telling. Therefore most of them need training in writing the reports. It is also desirable to describe the process of student learning when theory or mathematics that are beyond the level of middle school curriculum were used because it is part of their investigation. The second area of evaluation was about the format and the proceeding of the Contest, the problems given to students, and the process of student discussion. The format of the Contests, which consisted of four parts, presentation, refutation, debate and review, received good evaluation from students because it made students think more and gave more difficult time but was meaningful and helped to remember longer time according to students. On the other hand, students said the time given to each part of the contest was too short. The problems given to students were short and open ended to stimulate students' imagination and to offer various possible routes to the solution. This type of problem was very unfamiliar and gave a lot of difficulty to students. Student had positive opinion about the research process they experienced but did not recognize the fact that such a process was possible because of the oneness of the task. The level of the problems was rated as too difficult by teachers and college students but as appropriate by the middle school students in audience and participating students. This suggests that it is possible for student to convert the problems to be challengeable and intellectually satisfactory appropriate for their level of understanding even when the problems were difficult for middle school students. During the process of student discussion, a few problems were observed. Some problems were related to the technics of the discussion, such as inappropriate behavior for the role he/she was taking, mismatching answers to the questions. Some problems were related to thinking. For example, students thinking was off balanced toward deductive reasoning, and reasoning based on experimental data was weak. The last area of evaluation was the effect of the Contest. It was measured through the change of the attitude toward science and science classes, and willingness to attend the next Contest. According to the result of the questionnaire, no meaningful change in attitude was observed. However, through the interview several students were observed to have significant positive change in attitude while no student with negative change was observed. Most of the students participated in Contest said they would participate again or recommend their friend to participate. Most of the teachers agreed that the Contest should continue and they would recommend their colleagues or students to participate. As described above, the "Discussion Contest of Scientific Investigation", which was developed and tried as a new science contest, had positive response from participating students and teachers, and the audience. Two among the list of results especially demonstrated that the goal of the Contest, "active and cooperative science learning experience", was reached. One is the fact that students recognized the experience of cooperation, discussion, information search, variety of experiments to be fun and valuable. The other is the fact that the students recognized the format of the contest consisting of presentation, refutation, discussion and review, required more thinking and was challenging, but was more meaningful. Despite a few problems such as, unfamiliarity with the technics of discussion, weakness in inductive and/or experiment based reasoning, and difficulty in report writing, The Contest demonstrated the possibility of new science learning environment and science contest by offering the chance to challenge open tasks by utilizing student science knowledge and ability to inquire and to discuss rationally and critically with other students.

  • PDF

Suggestion of Urban Regeneration Type Recommendation System Based on Local Characteristics Using Text Mining (텍스트 마이닝을 활용한 지역 특성 기반 도시재생 유형 추천 시스템 제안)

  • Kim, Ikjun;Lee, Junho;Kim, Hyomin;Kang, Juyoung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.149-169
    • /
    • 2020
  • "The Urban Renewal New Deal project", one of the government's major national projects, is about developing underdeveloped areas by investing 50 trillion won in 100 locations on the first year and 500 over the next four years. This project is drawing keen attention from the media and local governments. However, the project model which fails to reflect the original characteristics of the area as it divides project area into five categories: "Our Neighborhood Restoration, Housing Maintenance Support Type, General Neighborhood Type, Central Urban Type, and Economic Base Type," According to keywords for successful urban regeneration in Korea, "resident participation," "regional specialization," "ministerial cooperation" and "public-private cooperation", when local governments propose urban regeneration projects to the government, they can see that it is most important to accurately understand the characteristics of the city and push ahead with the projects in a way that suits the characteristics of the city with the help of local residents and private companies. In addition, considering the gentrification problem, which is one of the side effects of urban regeneration projects, it is important to select and implement urban regeneration types suitable for the characteristics of the area. In order to supplement the limitations of the 'Urban Regeneration New Deal Project' methodology, this study aims to propose a system that recommends urban regeneration types suitable for urban regeneration sites by utilizing various machine learning algorithms, referring to the urban regeneration types of the '2025 Seoul Metropolitan Government Urban Regeneration Strategy Plan' promoted based on regional characteristics. There are four types of urban regeneration in Seoul: "Low-use Low-Level Development, Abandonment, Deteriorated Housing, and Specialization of Historical and Cultural Resources" (Shon and Park, 2017). In order to identify regional characteristics, approximately 100,000 text data were collected for 22 regions where the project was carried out for a total of four types of urban regeneration. Using the collected data, we drew key keywords for each region according to the type of urban regeneration and conducted topic modeling to explore whether there were differences between types. As a result, it was confirmed that a number of topics related to real estate and economy appeared in old residential areas, and in the case of declining and underdeveloped areas, topics reflecting the characteristics of areas where industrial activities were active in the past appeared. In the case of the historical and cultural resource area, since it is an area that contains traces of the past, many keywords related to the government appeared. Therefore, it was possible to confirm political topics and cultural topics resulting from various events. Finally, in the case of low-use and under-developed areas, many topics on real estate and accessibility are emerging, so accessibility is good. It mainly had the characteristics of a region where development is planned or is likely to be developed. Furthermore, a model was implemented that proposes urban regeneration types tailored to regional characteristics for regions other than Seoul. Machine learning technology was used to implement the model, and training data and test data were randomly extracted at an 8:2 ratio and used. In order to compare the performance between various models, the input variables are set in two ways: Count Vector and TF-IDF Vector, and as Classifier, there are 5 types of SVM (Support Vector Machine), Decision Tree, Random Forest, Logistic Regression, and Gradient Boosting. By applying it, performance comparison for a total of 10 models was conducted. The model with the highest performance was the Gradient Boosting method using TF-IDF Vector input data, and the accuracy was 97%. Therefore, the recommendation system proposed in this study is expected to recommend urban regeneration types based on the regional characteristics of new business sites in the process of carrying out urban regeneration projects."