• Title/Summary/Keyword: convergence domain

Search Result 861, Processing Time 0.023 seconds

Analysis of the Differences in Perception about Scientists between Science Class and Convergence Class Applicants in Gifted Science Education Center (과학영재교육원의 과학반과 융합반에 지원한 학생들의 과학자에 대한 인식 차이 분석)

  • Park, Seon-Ok;Lim, Hyo-Sun;Chung, Duk-Ho
    • Journal of Gifted/Talented Education
    • /
    • v.23 no.6
    • /
    • pp.1019-1034
    • /
    • 2013
  • The purpose of this study is to investigate the characteristics of convergence gifted students through the their perception of the differences about scientists between Science class and Convergence class in gifted science education center. Consequently, this article reports that there are differences in the perception about scientists was distinction between applicants of Convergence and Science class. Science class applicants mainly recognized scientists as pure scientists, but Convergence class applicants recognized scientist were including mathematician, artist, architect, etc. Also Convergence class applicants thought that affective domain including 'effort', 'patience', 'interest' was more important that Science class applicants. On the other hand, when they described the scientists, Science class applicants knew their achievements as scientists more specifically than Convergence class. And to conclude, the characteristics were different between Convergence and Science class applicants in gifted science education center. Based on the result of this study, this paper suggests the following: Firstly, conceptual study is urgent about convergence gifted students in their definition and characteristics. Secondly, information regarding the criteria to select student for convergence class in gifted science education center. Finally, when teaching convergence gifted students, attention should be paid to their characteristics such affective domain.

Time- and Frequency-Domain Block LMS Adaptive Digital Filters: Part Ⅰ- Realization Structures (시간영역 및 주파수영역 블럭적응 여파기에 관한 연구 : 제1부- 구현방법)

  • Lee, Jae-Chon;Un, Chong-Kwan
    • The Journal of the Acoustical Society of Korea
    • /
    • v.7 no.4
    • /
    • pp.31-53
    • /
    • 1988
  • In this work we study extensively the structures and performance characteristics of the block least mean-square (BLMS) adaptive digital filters (ADF's) that can be realized efficiently using the fast Fourier transform (FFT). The weights of a BLMS ADF realized using the FFT can be adjusted either in the time domain or in the frequency domain, leading to the time-domain BLMS(TBLMS) algorithm or the frequency-domain BLMS (FBLMS) algorithm, respectively. In Part Ⅰof the paper, we first present new results on the overlap-add realization and the number-theoretic transform realization of the FBLMS ADF's. Then, we study how we can incorporate the concept of different frequency-weighting on the error signals and the self-orthogonalization of weight adjustment in the FBLMS ADF's , and also in the TBLMS ADF's. As a result, we show that the TBLMS ADF can also be made to have the same fast convergence speed as that of the self-orthogonalizing FBLMS ADF. Next, based on the properties of the sectioning operations in weight adjustment, we discuss unconstrained FBLMS algorithms that can reduce two FFT operations both for the overlap-save and overlap-add realizations. Finally, we investigate by computer simulation the effects of different parameter values and different algorithms on the convergence behaviors of the FBLMS and TBLMS ADF's. In Part Ⅱ of the paper, we will analyze the convergence characteristics of the TBLMS and FBLMS ADF's.

  • PDF

A Convergence Study about Effects of Emotional Intelligence Program - Meta analysis (정서지능 향상 프로그램에 대한 융합적 연구 -메타분석의 활용)

  • Kim, Kyung-Hee
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.25-33
    • /
    • 2017
  • The purpose of this study was using a meta-analysis to estimate effect size of emotional intelligence program. Using a statistical method, meta-analysis has advantages that prove intervention's amount and direction. Meta-analysis facilitates comprehensive analysis. Through the data collection, 33studies were selected and 92 effect size were calculated as analysis objects. The overall effect size of emotional intelligence program was 0.839. Depend on subordinate scope, the emotional cognition had the largest effect size. Next were the understanding domain, application domain, the regulation domain and the expression domain. Analysis on age of participant, adult group had the largest effect size. Next were the elementary students group and the adolescent group. Based on the findings, implications for future study were discussed.

A Building Method of Infrastructure Efficiency under Ad Hoc-based on Network Infrastructure for Medical Information System (Ad Hoc 기반 의료정보시스템의 네트워크 보안 효율성구조 Infrastructure 설계방법)

  • Noh, Si-Choon;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.91-98
    • /
    • 2011
  • Medical information system based on ad hoc network designed for general information systems and information networks have different security requirements. Malicious code infiltration and security features are performed on same medical information network architecture along the route. Security domain of medical information systems is the ground of penetration and defense performed over the network architecture and it is also the traffic handling areas separated by a concept of differentiated group. Ad hoc-based medical information systems in the network security domain, set some standards about what should be the methodology of this study. In this paper, medical information system network configuration, the determining factor based on the security domain, the structure selection criteria and blocking positionings are presented according to the traffic route configuration. If you apply this methodology designed to increase security, efficiency can be possible. Health information systems in accordance with the security domain areas requires differentiated protection needs of the security mechanism that is proposed by this study.

A Building Method of Security Vulnerability Measurement Framework under u-Healthcare System Traffic Domain Environment Based on USN (USN기반 u-Healthcare 시스템 트래픽도메인 환경에서의 보안위험도 평가체계 설계방안)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.39-46
    • /
    • 2011
  • Smart environment of health information technology, u-Healthcare architecture, ad-hoc networking and wireless communications environment are major factors that increase vulnerability of u-healthcare information systems. Traffic domain is the concept of network route that identifies the u-Healthcare information systems area as the traffic passing and security technologies application. The criterion of division is an area requiring the application of security technology. u-Healthcare information system domains are derived from the intranet section. the public switched network infrastructure, and networking sectors. Domains of health information systems are separated by domain vulnerability reason. In this study, domain-specific security vulnerability assessment system based on the USN in u-Healthcare system is derived. The model used in this study suggests how to establish more effective measurement USN-based health information network security vulnerability which has been vague until now.

Cloud Model based Efficiency Evaluation of Asset (클라우드 모델 기반의 자산 효율성 평가)

  • Choi, Hanyong
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.229-234
    • /
    • 2019
  • The software market has diversified service needs due to the expansion of the mobile market. To this end, the company intends to produce various apps by extending to the design domain based on the structured architectural assets of the domain market. In this study, we propose an evaluation model that can evaluate the efficiency for servicing assets that reflect the domain characteristics of architecture based on cloud. Based on the characteristics of ISO/IEC 25010 quality model of SQuaRE Series, a software evaluation standard, evaluation model sub-features for evaluating the efficiency of cloud-based asset data were constructed. When the architectural assets were designed as composite assets, they were designed to provide the flexibility of the evaluation model by applying the mandatory and optional evaluation elements of the sub-features that weighted the evaluation items according to the characteristics of the design domain.

A Study on Five Levels of Security Risk Assessment Model Design for Ensuring the u-Healthcare Information System (u-헬스케어시스템의 정보보안 체계 확보를 위한 5단계 보안위험도 평가모델 설계)

  • Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.11-17
    • /
    • 2013
  • All u-Health system has security vulnerabilities. This vulnerability locally(local) or network(network) is on the potential risk. Smart environment of health information technology, Ad-hoc networking, wireless communication environments, u-health are major factor to increase the security vulnerability. u-health care information systems user terminal domain interval, interval public network infrastructure, networking section, the intranet are divided into sections. Health information systems by separating domain specific reason to assess vulnerability vulnerability countermeasure for each domain are different. u-Healthcare System 5 layers of security risk assessment system for domain-specific security vulnerability diagnosis system designed to take the security measures are needed. If you use this proposed model that has been conducted so far vaguely USN-based health information network security vulnerabilities diagnostic measures can be done more systematically provide a model.

Cluster analysis of companies introducing smart factory based on 6-domain smart factory maturity assessment model (6-도메인 스마트팩토리 성숙도 평가 모델 기반 도입기업 군집분석)

  • Jeong, Doorheon;Ahn, Junghyun;Choi, Sanghyun
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.9
    • /
    • pp.219-227
    • /
    • 2020
  • Smart Factory is one of the fastest developing and changing fourth industrial revolution fields. In particular, the degree of introduction and maturity level in the smart factory is an important part. In this paper, a cluster analysis of companies introduced smart factory was performed based on a new maturity assessment model. The 68% of 193 companies surveyed were at the basic level, with only 21% being the middle one. Most SMEs cited lack of funds as the main reason for not entering the middle one. As a result of the cluster analysis, it was found that all clusters had similar patterns but grouped into one of three levels of high, middle, and low depending on maturity level of smart factory operation, and process domain had the highest maturity and data domain was lowest among the 6 domains. Through this, analysis of more specific and quantified maturity levels can be performed using 6-domain smart factory maturity evaluation model.

Case Study of Building a Malicious Domain Detection Model Considering Human Habitual Characteristics: Focusing on LSTM-based Deep Learning Model (인간의 습관적 특성을 고려한 악성 도메인 탐지 모델 구축 사례: LSTM 기반 Deep Learning 모델 중심)

  • Jung Ju Won
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.65-72
    • /
    • 2023
  • This paper proposes a method for detecting malicious domains considering human habitual characteristics by building a Deep Learning model based on LSTM (Long Short-Term Memory). DGA (Domain Generation Algorithm) malicious domains exploit human habitual errors, resulting in severe security threats. The objective is to swiftly and accurately respond to changes in malicious domains and their evasion techniques through typosquatting to minimize security threats. The LSTM-based Deep Learning model automatically analyzes and categorizes generated domains as malicious or benign based on malware-specific features. As a result of evaluating the model's performance based on ROC curve and AUC accuracy, it demonstrated 99.21% superior detection accuracy. Not only can this model detect malicious domains in real-time, but it also holds potential applications across various cyber security domains. This paper proposes and explores a novel approach aimed at safeguarding users and fostering a secure cyber environment against cyber attacks.

Seafarers Walking on an Unstable Platform: Comparisons of Time and Frequency Domain Analyses for Gait Event Detection

  • Youn, Ik-Hyun;Choi, Jungyeon;Youn, Jong-Hoon
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.4
    • /
    • pp.244-249
    • /
    • 2017
  • Wearable sensor-based gait analysis has been widely conducted to analyze various aspects of human ambulation abilities under the free-living condition. However, there have been few research efforts on using wearable sensors to analyze human walking on an unstable surface such as on a ship during a sea voyage. Since the motion of a ship on the unstable sea surface imposes significant differences in walking strategies, investigation is suggested to find better performing wearable sensor-based gait analysis algorithms on this unstable environment. This study aimed to compare two representative gait event algorithms including time domain and frequency domain analyses for detecting heel strike on an unstable platform. As results, although two methods did not miss any heel strike, the frequency domain analysis method perform better when comparing heel strike timing. The finding suggests that the frequency analysis is recommended to efficiently detect gait event in the unstable walking environment.