• Title/Summary/Keyword: Two-way search System

Search Result 67, Processing Time 0.033 seconds

Why A Multimedia Approach to English Education\ulcorner

  • Keem, Sung-uk
    • Proceedings of the KSPS conference
    • /
    • 1997.07a
    • /
    • pp.176-178
    • /
    • 1997
  • To make a long story short I made up my mind to experiment with a multimedia approach to my classroom presentations two years ago because my ways of giving instructions bored the pants off me as well as my students. My favorite ways used to be sometimes referred to as classical or traditional ones, heavily dependent on the three elements: teacher's mouth, books, and chalk. Some call it the 'MBC method'. To top it off, I tried audio-visuals such as tape recorders, cassette players, VTR, pictures, and you name it, that could help improve my teaching method. And yet I have been unhappy about the results by a trial and error approach. I was determined to look for a better way that would ensure my satisfaction in the first place. What really turned me on was a multimedia CD ROM title, ELLIS (English Language Learning Instructional Systems) developed by Dr. Frank Otto. This is an integrated system of learning English based on advanced computer technology. Inspired by the utility and potential of such a multimedia system for regular classroom or lab instructions, I designed a simple but practical multimedia language learning laboratory in 1994 for the first time in Korea(perhaps for the first time in the world). It was high time that the conventional type of language laboratory(audio-passive) at Hahnnam be replaced because of wear and tear. Prior to this development, in 1991, I put a first CALL(Computer Assisted Language Learning) laboratory equipped with 35 personal computers(286), where students were encouraged to practise English typing, word processing and study English grammar, English vocabulary, and English composition. The first multimedia language learning laboratory was composed of 1) a multimedia personal computer(486DX2 then, now 586), 2) VGA multipliers that enable simultaneous viewing of the screen at control of the instructor, 3) an amplifIer, 4) loud speakers, 5)student monitors, 6) student tables to seat three students(a monitor for two students is more realistic, though), 7) student chairs, 8) an instructor table, and 9) cables. It was augmented later with an Internet hookup. The beauty of this type of multimedia language learning laboratory is the economy of furnishing and maintaining it. There is no need of darkening the facilities, which is a must when an LCD/beam projector is preferred in the laboratory. It is headset free, which proved to make students exasperated when worn more than- twenty minutes. In the previous semester I taught three different subjects: Freshman English Lab, English Phonetics, and Listening Comprehension Intermediate. I used CD ROM titles like ELLIS, Master Pronunciation, English Tripple Play Plus, English Arcade, Living Books, Q-Steps, English Discoveries, Compton's Encyclopedia. On the other hand, I managed to put all teaching materials into PowerPoint, where letters, photo, graphic, animation, audio, and video files are orderly stored in terms of slides. It takes time for me to prepare my teaching materials via PowerPoint, but it is a wonderful tool for the sake of presentations. And it is worth trying as long as I can entertain my students in such a way. Once everything is put into the computer, I feel relaxed and a bit excited watching my students enjoy my presentations. It appears to be great fun for students because they have never experienced this type of instruction. This is how I freed myself from having to manipulate a cassette tape player, VTR, and write on the board. The student monitors in front of them seem to help them concentrate on what they see, combined with what they hear. All I have to do is to simply click a mouse to give presentations and explanations, when necessary. I use a remote mouse, which prevents me from sitting at the instructor table. Instead, I can walk around in the room and enjoy freer interactions with students. Using this instrument, I can also have my students participate in the presentation. In particular, I invite my students to manipulate the computer using the remote mouse from the student's seat not from the instructor's seat. Every student appears to be fascinated with my multimedia approach to English teaching because of its unique nature as a new teaching tool as we face the 21st century. They all agree that the multimedia way is an interesting and fascinating way of learning to satisfy their needs. Above all, it helps lighten their drudgery in the classroom. They feel other subjects taught by other teachers should be treated in the same fashion. A multimedia approach to education is impossible without the advent of hi-tech computers, of which multi functions are integrated into a unified system, i.e., a personal computer. If you have computer-phobia, make quick friends with it; the sooner, the better. It can be a wonderful assistant to you. It is the Internet that I pay close attention to in conjunction with the multimedia approach to English education. Via e-mail system, I encourage my students to write to me in English. I encourage them to enjoy chatting with people all over the world. I also encourage them to visit the sites where they offer study courses in English conversation, vocabulary, idiomatic expressions, reading, and writing. I help them search any subject they want to via World Wide Web. Some day in the near future it will be the hub of learning for everybody. It will eventually free students from books, teachers, libraries, classrooms, and boredom. I will keep exploring better ways to give satisfying instructions to my students who deserve my entertainment.

  • PDF

Effect of different chlorhexidine application times on microtensile bond strength to dentin in Class I cavities

  • Kang, Hyun-Jung;Moon, Ho-Jin;Shin, Dong-Hoon
    • Restorative Dentistry and Endodontics
    • /
    • v.37 no.1
    • /
    • pp.9-15
    • /
    • 2012
  • Objectives: This study evaluated the effect of 2% chlorhexidine digluconate (CHX) with different application times on microtensile bonds strength (MTBS) to dentin in class I cavities and intended to search for ideal application time for a simplified bonding protocol. Materials and Methods: Flat dentinal surfaces with class I cavities ($4mm{\times}4mm{\times}2mm$) in 40 molar teeth were bonded with etch-and-rinse adhesive system, Adper Single Bond 2 (3M ESPE) after: (1) etching only as a control group; (2) etching + CHX 5 sec + rinsing; (3) etching + CHX 15 sec + rinsing; (4) etching + CHX 30 sec + rinsing; and (5) etching + CHX 60 sec + rinsing. Resin composite was builtup with Z-250 (3M ESPE) using a bulk method and polymerized for 40 sec. For each condition, half of the specimens were immediately submitted to MTBS test and the rest of them were assigned to thermocycling of 10,000 cycles between $5^{\circ}C$ and $55^{\circ}C$ before testing. The data were analyzed using two-way ANOVA, at a significance level of 95%. Results: There was no significant difference in bond strength between CHX pretreated group and control group at the immediate testing period. After thermocycling, all groups showed reduced bond strength irrespective of the CHX use. However, groups treated with CHX maintained significantly higher MTBS than control group (p < 0.05). In addition, CHX application time did not have any significant influence on the bond strength among groups treated with CHX. Conclusion: Application of 2% CHX for a short time period (5 sec) after etching with 37% phosphoric acid may be sufficient to preserve dentin bond strength.

A Review on Advanced Methodologies to Identify the Breast Cancer Classification using the Deep Learning Techniques

  • Bandaru, Satish Babu;Babu, G. Rama Mohan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.420-426
    • /
    • 2022
  • Breast cancer is among the cancers that may be healed as the disease diagnosed at early times before it is distributed through all the areas of the body. The Automatic Analysis of Diagnostic Tests (AAT) is an automated assistance for physicians that can deliver reliable findings to analyze the critically endangered diseases. Deep learning, a family of machine learning methods, has grown at an astonishing pace in recent years. It is used to search and render diagnoses in fields from banking to medicine to machine learning. We attempt to create a deep learning algorithm that can reliably diagnose the breast cancer in the mammogram. We want the algorithm to identify it as cancer, or this image is not cancer, allowing use of a full testing dataset of either strong clinical annotations in training data or the cancer status only, in which a few images of either cancers or noncancer were annotated. Even with this technique, the photographs would be annotated with the condition; an optional portion of the annotated image will then act as the mark. The final stage of the suggested system doesn't need any based labels to be accessible during model training. Furthermore, the results of the review process suggest that deep learning approaches have surpassed the extent of the level of state-of-of-the-the-the-art in tumor identification, feature extraction, and classification. in these three ways, the paper explains why learning algorithms were applied: train the network from scratch, transplanting certain deep learning concepts and constraints into a network, and (another way) reducing the amount of parameters in the trained nets, are two functions that help expand the scope of the networks. Researchers in economically developing countries have applied deep learning imaging devices to cancer detection; on the other hand, cancer chances have gone through the roof in Africa. Convolutional Neural Network (CNN) is a sort of deep learning that can aid you with a variety of other activities, such as speech recognition, image recognition, and classification. To accomplish this goal in this article, we will use CNN to categorize and identify breast cancer photographs from the available databases from the US Centers for Disease Control and Prevention.

Search for Viable Alternative for the Korean Occupational Welfare System at the Crossroad (전환점에 서있는 한국기업복지제도의 한 대안으로서 근로자협조프로그램의 적용성에 관한 연구)

  • Kim, Ui-Myong
    • Korean Journal of Social Welfare
    • /
    • v.36
    • /
    • pp.71-99
    • /
    • 1998
  • There is a general consensus that fate of the differentiated welfare state had fallen into the brink of demise during the 1970s while the integrated welfare state model has emerged instead. Indications are all that such trend spotlights occupational welfare which has been relatively neglected, especially, in the field of social welfare. Nevertheless, the occupational welfare system in Korea faced crisis due to two major incidents. One is the IMP crisis which necessitates massive scale of restructuring of the general fabric of the Korean business and industry. There is little doubt that the economic crisis will surely cut down occupational welfare expenditure substantially. The other is a report released by the Korean Labor Research Institute which argus that there is no correlation between the Korean occupational welfare system and labor productivity. Thorough investigation of the Korean occupational welfare system suggests that current system is so outdated that it doesn't meet needs of the industrial workforce which, in turn, fails to enhance workers productivity. Consequently, a need for new paradigm and system arises and employee assistance program(EAP) emerges as a viable alternative. EAP is thoroughly delianeated of it's definition, motivations, functions, ingredients, historical background as well as cost-effectiveness. But major tasks center around an investigation and an analysis of it's applicability. In-depth analysis was carried out on the issue of it's indispensable natures and stumbling blocks on the way to lay it's root in the Korean industrial environment. It seems harder than the herculean task. However, EAP is not simply an alternative but is rather a pressing imperative for the present occupational welfare system in Korea which stands at the crossroad.

  • PDF

Improved Social Network Analysis Method in SNS (SNS에서의 개선된 소셜 네트워크 분석 방법)

  • Sohn, Jong-Soo;Cho, Soo-Whan;Kwon, Kyung-Lag;Chung, In-Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.4
    • /
    • pp.117-127
    • /
    • 2012
  • Due to the recent expansion of the Web 2.0 -based services, along with the widespread of smartphones, online social network services are being popularized among users. Online social network services are the online community services which enable users to communicate each other, share information and expand human relationships. In the social network services, each relation between users is represented by a graph consisting of nodes and links. As the users of online social network services are increasing rapidly, the SNS are actively utilized in enterprise marketing, analysis of social phenomenon and so on. Social Network Analysis (SNA) is the systematic way to analyze social relationships among the members of the social network using the network theory. In general social network theory consists of nodes and arcs, and it is often depicted in a social network diagram. In a social network diagram, nodes represent individual actors within the network and arcs represent relationships between the nodes. With SNA, we can measure relationships among the people such as degree of intimacy, intensity of connection and classification of the groups. Ever since Social Networking Services (SNS) have drawn increasing attention from millions of users, numerous researches have made to analyze their user relationships and messages. There are typical representative SNA methods: degree centrality, betweenness centrality and closeness centrality. In the degree of centrality analysis, the shortest path between nodes is not considered. However, it is used as a crucial factor in betweenness centrality, closeness centrality and other SNA methods. In previous researches in SNA, the computation time was not too expensive since the size of social network was small. Unfortunately, most SNA methods require significant time to process relevant data, and it makes difficult to apply the ever increasing SNS data in social network studies. For instance, if the number of nodes in online social network is n, the maximum number of link in social network is n(n-1)/2. It means that it is too expensive to analyze the social network, for example, if the number of nodes is 10,000 the number of links is 49,995,000. Therefore, we propose a heuristic-based method for finding the shortest path among users in the SNS user graph. Through the shortest path finding method, we will show how efficient our proposed approach may be by conducting betweenness centrality analysis and closeness centrality analysis, both of which are widely used in social network studies. Moreover, we devised an enhanced method with addition of best-first-search method and preprocessing step for the reduction of computation time and rapid search of the shortest paths in a huge size of online social network. Best-first-search method finds the shortest path heuristically, which generalizes human experiences. As large number of links is shared by only a few nodes in online social networks, most nods have relatively few connections. As a result, a node with multiple connections functions as a hub node. When searching for a particular node, looking for users with numerous links instead of searching all users indiscriminately has a better chance of finding the desired node more quickly. In this paper, we employ the degree of user node vn as heuristic evaluation function in a graph G = (N, E), where N is a set of vertices, and E is a set of links between two different nodes. As the heuristic evaluation function is used, the worst case could happen when the target node is situated in the bottom of skewed tree. In order to remove such a target node, the preprocessing step is conducted. Next, we find the shortest path between two nodes in social network efficiently and then analyze the social network. For the verification of the proposed method, we crawled 160,000 people from online and then constructed social network. Then we compared with previous methods, which are best-first-search and breath-first-search, in time for searching and analyzing. The suggested method takes 240 seconds to search nodes where breath-first-search based method takes 1,781 seconds (7.4 times faster). Moreover, for social network analysis, the suggested method is 6.8 times and 1.8 times faster than betweenness centrality analysis and closeness centrality analysis, respectively. The proposed method in this paper shows the possibility to analyze a large size of social network with the better performance in time. As a result, our method would improve the efficiency of social network analysis, making it particularly useful in studying social trends or phenomena.

Efficient and Privacy-Preserving Near-Duplicate Detection in Cloud Computing (클라우드 환경에서 검색 효율성 개선과 프라이버시를 보장하는 유사 중복 검출 기법)

  • Hahn, Changhee;Shin, Hyung June;Hur, Junbeom
    • Journal of KIISE
    • /
    • v.44 no.10
    • /
    • pp.1112-1123
    • /
    • 2017
  • As content providers further offload content-centric services to the cloud, data retrieval over the cloud typically results in many redundant items because there is a prevalent near-duplication of content on the Internet. Simply fetching all data from the cloud severely degrades efficiency in terms of resource utilization and bandwidth, and data can be encrypted by multiple content providers under different keys to preserve privacy. Thus, locating near-duplicate data in a privacy-preserving way is highly dependent on the ability to deduplicate redundant search results and returns best matches without decrypting data. To this end, we propose an efficient near-duplicate detection scheme for encrypted data in the cloud. Our scheme has the following benefits. First, a single query is enough to locate near-duplicate data even if they are encrypted under different keys of multiple content providers. Second, storage, computation and communication costs are alleviated compared to existing schemes, while achieving the same level of search accuracy. Third, scalability is significantly improved as a result of a novel and efficient two-round detection to locate near-duplicate candidates over large quantities of data in the cloud. An experimental analysis with real-world data demonstrates the applicability of the proposed scheme to a practical cloud system. Last, the proposed scheme is an average of 70.6% faster than an existing scheme.

A Study for Factors Influencing the Usage Increase and Decrease of Mobile Data Service: Based on The Two Factor Theory (모바일 데이터 서비스 사용량 증감에 영향을 미치는 요인들에 관한 연구: 이요인 이론(Two Factor Theory)을 바탕으로)

  • Lee, Sang-Hoon;Kim, Il-Kyung;Lee, Ho-Geun;Park, Hyun-Jee
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.97-122
    • /
    • 2007
  • Conventional networking and telecommunications infrastructure characterized by wires, fixed location, and inflexibility is giving way to mobile technologies. Numerous research reports point to the ultimate domination of wireless communication. With the increasing prevalence of advanced cell-phones, various mobile data services (hereafter MDS) are gaining popularity. Although cellular networks were originally introduced for voice communications, statistics indicate that data services are replacing the matured voice service as the growth engine for telecom service providers. For example, SK Telecom, the Korea's largest mobile service provider, reported that 25.6% of revenue and 28.5% of profit came from MDS in 2006 and the share is growing. Statistics also indicate that, in 2006, the average revenue per user (ARPU) for voice didn't change but MDS grew seven percents from the previous year, further highlighting its growth potential. MDS is defined "as an assortment of digital data services that can be accessed using a mobile device over a wide geographic area." A variety of MDS have been deployed, with a few reaching the status of killer applications. Many of them need to access the Internet through the cellular-phone infrastructure. In the past, when the cellular network didn't have acceptable bandwidth for data services, SMS (short messaging service) dominated MDS. Now, Internet-ready, next-generation cell-phones are driving rich digital data services into the fabric of everyday life, These include news on various topics, Internet search, mapping and location-based information, mobile banking and gaming, downloading (i.e., screen savers), multimedia streaming, and various communication services (i.e., email, short messaging, messenger, and chaffing). The huge economic stake MDS has on its stakeholders warrants focused research to understand associated dynamics behind its adoption. Lyytinen and Yoo(2002) pointed out the limitation of traditional adoption models in explaining the rapid diffusion of innovations such as P2P or mobile services. Also, despite the increasing popularity of MDS, unexpected drop in its usage is observed among some people. Intrigued by these observations, an exploratory study was conducted to examine decision factors of MDS usage. Data analysis revealed that the increase and decrease of MDS use was influenced by different forces. The findings of the exploratory study triggered our confirmatory research effort to validate the uni-directionality of studied factors in affecting MDS usage. This differs from extant studies of IS/IT adoption that are largely grounded on the assumption of bi-directionality of explanatory variables in determining the level of dependent variables (i.e., user satisfaction, service usage). The research goal is, therefore, to examine if increase and decrease in the usage of MDS are explained by two separate groups of variables pertaining to information quality and system quality. For this, we investigate following research questions: (1) Does the information quality of MDS increase service usage?; (2) Does the system quality of MDS decrease service usage?; and (3) Does user motivation for subscribing MDS moderate the effect information and system quality have on service usage? The research questions and subsequent analysis are grounded on the two factor theory pioneered by Hertzberg et al(1959). To answer the research questions, in the first, an exploratory study based on 378 survey responses was conducted to learn about important decision factors of MDS usage. It revealed discrepancy between the influencing forces of usage increase and those of usage decrease. Based on the findings from the exploratory study and the two-factor theory, we postulated information quality as the motivator and system quality as the de-motivator (or hygiene) of MDS. Then, a confirmative study was undertaken on their respective role in encouraging and discouraging the usage of mobile data service.

Planning for Intra-Block Remarshaling to Enhance the Efficiency of Loading Operations in an Automated Container Terminal (자동화 컨테이너 터미널의 적하 작업 효율 향상을 위한 블록 내 재정돈 계획 수립 방안)

  • Park, Ki-Yeok;Park, Tae-Jin;Kim, Min-Jung;Ryu, Kwang-Ryel
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.4
    • /
    • pp.31-46
    • /
    • 2008
  • A stacking yard of a container terminal is a space for temporarily storing the containers that are carried in or imported until they are carried out or exported. If the containers are stacked in an inappropriate way, the efficiency of operation at the time of loading decreases significantly due to the rehandlings. The remarshaling is the task of rearranging containers during the idle time of transfer crane for the effective loading operations. This paper proposes a method of planning for remarshaling in a yard block of an automated container terminal. Our method conducts a search in two stages. In the first stage, the target stacking configuration is determined in such a way that the throughput of loading is maximized. In the second stage, the crane schedule is determined so that the remarshaling task can be completed as fast as possible in moving the containers from the source configuration to the target configuration. Simulation experiments have been conducted to compare the efficiency of loading operations before and after remarshaling. The results show that our remarshaling plan is really effective in increasing the efficiency of loading operation.

  • PDF

The Effects of Use Patterns and Service Quality on Performance and Use Satisfaction on Library Information System (도서관의 이용패턴과 서비스품질이 정보화성과지각 및 만족에 미치는 영향)

  • Jung, Hyung-Shik;Yeoum, Seoung-Yeoub
    • Journal of Global Scholars of Marketing Science
    • /
    • v.18 no.4
    • /
    • pp.217-244
    • /
    • 2008
  • Consumers' overall satisfaction on a specific library use is inferred to be primarily accrued from their performance perception and use satisfaction on the library information service system as recent information technology is being rapidly improved and more libraries are being equipped with advanced information technologies. However, prior research has been conducted only on general library service quality and visitors' satisfaction, leaving the important aspects of visitors' library use and information performance perception. Thus, the objectives of this research are to examine the effect of library use patterns such as general visit for book reading and more professional information search, coupled with service quality, on the library users' performance perception on the information system that in turn, affects library use satisfaction on the same information system. More specifically, this study examines whether library visitors perceive differenltly the information system performance according to their library use patterns such that professional library users may have less positive on information system service due to their higher expectation or more positive perception on it due to variety of information uses and positive judgment on advanced information system. Next, three dimensions of service quality, consisting of interaction, outcome, and physical evidence quality in visitors' library use situations, are hypothesized to affect performance perception on library information system. Thirdly, the performance perception on library information system is hypothesized to influence the system use satisfaction while these two constructs are to affect visitors' overall satisfaction. we develop the following research model in accordance with the above theoretical reasoning. All variables used in this study(General Use Patterns, Professional Use Patterns, Interaction Quality, Outcome Quality, Physical Evidence Quality, Information Performance Perception, Information Use Satisfaction, Overall Satisfaction) were defined operationally based on the underlying prior studies. A survey was conducted with prepared questionnaires to about 400 visitors of a specific university library. Among them, 353 proper questionnaires were finally used for the analyses. Two-step approach was used to test the hypotheses. First, confirmatory factor analysis was conducted to guarantee the validity and reliability of variables. The results showed that all variables had not only convergent and discriminant validity, but also reliability. Then, research model was examined with a structural equation using LISREL 8.30 version. The fitness of the research model was found to be within the acceptable level. The findings of this study are as follows. The professional library use pattern was found to affect the users' performance perception on the library information system while the general library use pattern was not. Second, three dimensions of service quality (interaction, outcome, physical evidence) were found to influence the information system performance respectively while none of them was not to information use satisfaction. Third, library users' performance perception on the information system operation was found to affect the information system use satisfaction, both of which also influence users' overall satisfaction of the library. The findings of this study suggest that contemporary libraries strengthen their advanced information system operation in a way of user orientation and more importantly maximize their visitors' utilization of information system, accompanying proper material and various program development. This study conceptualized the new constructs of library users' performance perception on the information system and information use satisfaction which could better explain library users' overall satisfaction. Thus, furture study related with library service could utilize the constructs of information system performance and satisfaction as well as the variety of library use patterns in the users' viewpoints.

  • PDF

The System of Contents and the Meaning of confucius' philosophy in 「Yu Shu;虞書」 of 『The Book of Documents; 書經』 (『서경(書經)』 「우서(虞書)」의 내용체계와 유학사상적 의미)

  • Ko, Dae-hyuk
    • (The)Study of the Eastern Classic
    • /
    • no.57
    • /
    • pp.137-168
    • /
    • 2014
  • The purpose of this study is to search for the main content system and Confucian meaning of "Yu Shu;虞書" of "The Book of Documents; 書經". This research covers two things: first, the form of The Book of Documents and the main content system of "Yu Shu". The Book of Documents consists of 4 main dynasties' Shu in ancient chinese history; "Yu Shu" 5 chapters, "Xia Shu; 夏書" 4 chapters, "Shang Shu; 商書" 17 chapters, and "Zhou Shu; 周書" 32 chapters, for a total 58 chapters. This book is organized in the form of six formalities(六體) or ten examples(十例). Second, the Confucian value of The Book of Documents and philosophical meaning of Yu Shu. Yu Shu shows a benign rule(仁政), confucianism ideal politic, as an historic example of a benevolent administration. By this research, we recognize that the tradition of abdication in the confucian society and the way of selecting people are theoretical foundation of politics based on people, rule by virtue and, by extension, a dynastic revolution. In addition, governing a country and rule the world that is treated in Yu Shu are a theory of leadership and moral training as a background of "Da Xue"(大學; Great Learning). Furthermore, Xiao(孝;filial piety) emphasized on this book is the main virtue of leaders and core value of practical action among the human relation. by extension, we recognize that the "Yu Shu" is the origin of "Xiao Jing; 孝經".