• Title/Summary/Keyword: information problem

Search Result 18,954, Processing Time 0.046 seconds

Prediction of Correct Answer Rate and Identification of Significant Factors for CSAT English Test Based on Data Mining Techniques (데이터마이닝 기법을 활용한 대학수학능력시험 영어영역 정답률 예측 및 주요 요인 분석)

  • Park, Hee Jin;Jang, Kyoung Ye;Lee, Youn Ho;Kim, Woo Je;Kang, Pil Sung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.11
    • /
    • pp.509-520
    • /
    • 2015
  • College Scholastic Ability Test(CSAT) is a primary test to evaluate the study achievement of high-school students and used by most universities for admission decision in South Korea. Because its level of difficulty is a significant issue to both students and universities, the government makes a huge effort to have a consistent difficulty level every year. However, the actual levels of difficulty have significantly fluctuated, which causes many problems with university admission. In this paper, we build two types of data-driven prediction models to predict correct answer rate and to identify significant factors for CSAT English test through accumulated test data of CSAT, unlike traditional methods depending on experts' judgments. Initially, we derive candidate question-specific factors that can influence the correct answer rate, such as the position, EBS-relation, readability, from the annual CSAT practices and CSAT for 10 years. In addition, we drive context-specific factors by employing topic modeling which identify the underlying topics over the text. Then, the correct answer rate is predicted by multiple linear regression and level of difficulty is predicted by classification tree. The experimental results show that 90% of accuracy can be achieved by the level of difficulty (difficult/easy) classification model, whereas the error rate for correct answer rate is below 16%. Points and problem category are found to be critical to predict the correct answer rate. In addition, the correct answer rate is also influenced by some of the topics discovered by topic modeling. Based on our study, it will be possible to predict the range of expected correct answer rate for both question-level and entire test-level, which will help CSAT examiners to control the level of difficulties.

A Study on the Practice of Performance Assessment in the Elementary School Mathematics - Focussing on Self-assessment and Peer-observation - (초등학교 수학과 수행평가 실천에 관한 연구 - 자기평가.동료평가.관찰평가를 중심으로 -)

  • Kim Song-Ja;Choi Chang-Woo
    • Journal of Elementary Mathematics Education in Korea
    • /
    • v.10 no.1
    • /
    • pp.67-87
    • /
    • 2006
  • This study is to recognize a problem in the practice of performance assessment in elementary school, and to find out some suggestive points for improvement of teaching·learning method in elementary mathematics through assessment by reducing time restriction according to assessment through the practice of self-assessment, peer-assessment and observation, and then by reflecting the results of assessment on teaching learning plan. For that, the questions of study set up are as follows ; 1. How should self-assessment and peer-assessment be applied to in elementary mathematics assessment? 2. How should the time for 'let's play an interesting game' be managed for assessment of elementary mathematics? 3. How should the results of assessment be reflected on the Process of teaching and learning of mathematics? To solve these problems, a researcher of this thesis performed self-assessment, peer-assessment on 40 students of second grade under her charge as a class teacher, and applied observation in the time management process for 'let's play an interesting game' for a semester. self-assessment was made by mathematics journal, self-assessment chart, peer-assessment was by the analysis of conversation record among students in the situations of assessment, and observation was by observation of activity when playing with the results data of play analyzed. the concrete methods of application as follows ; First, mathematics journal was applied $1{\sim}2$ times by each unit with reconstruction into the level of second grade on the basis of the preceding-study models. Second, peer-assessment was applied to the unit-assessment time and the play-activities time by the method of recording·analyzing the contents of conversation among students in the process of assessment. Third, mathematical attitude & dispositions of students making use of the self- assessment table were examined referring to the teaching learning plan. Fourth, the time management for 'let's play an interesting game' was made through the prior recognition of play method and the joyful play-activities by use of the play-plate. Assessment depended on analysis of play-activities results of students making use of an observation form. Fifth, the results of self-assessment, peer-assessment, and observation were analyzed, and then they were made use of as self-observation data, of teacher her/his self, or teaching·learning improvement data. Students' self-assessment datum (mathematics diary, self-assessment sheets, conversation contents in the process of assessment) and observation materials (check lists, Play-activity result materials, conversation contents in the process of play) obtained in the process of application was analyzed as follows ; 1. From the practice of self-assessment in form of mathematics journal, I could obtain not only datum showing how much students was understanding the learning aims by unit time and to any degree they reached but also information about their response to learning datum and favorable type of learning. 2. Assessment by self-assessment chart was useful in planning the mathematics teaching learning process because it helps ascertain mathematical attitude & dispositions of students. 3. Through the application of peer-assessment, students had the opportunity of communicating with other students looking back on his/her explaining process, and teachers could obtain basic materials for assessment of students. 4, In case of time management for 'let's play an interesting game', there was natural extension of play made through time-security by prior looking into the method of play-activity, and then, for a remained time, by making children play a new game. 5, I could easily record the activities of students by use of the observation. form, and make use of it as basic data for descriptive assessment. 6, Each kinds of data obtained from the results of assessment was helpful for securing self-observation materials in the process of teaching learning and for their betterment in mathematics subject. However, because they were in the second grade of elementary school and there was an individual difference, some students could not make use of mathematics diary or self-assessment form properly. In case of these students, assessment data would be obtained through interview or observation. And for effective operation of play, its purpose & method and matters that demand special attention when play-acting should be clearly guided. Also, when applying an effective play in addition to play activities in textbook, to lessons, interesting mathematics lessons could be guided.

  • PDF

Performance Analysis on Collaborative Activities of Multidisciplinary Research in Government Research Institutes (국가 출연연구소의 협업적 융합연구 성과 분석)

  • Cho, Yong-rae;Woo, Chung-won;Choi, Jong-hwa
    • Journal of Korea Technology Innovation Society
    • /
    • v.20 no.4
    • /
    • pp.1089-1121
    • /
    • 2017
  • 'Technological convergence' is the recent innovation trend which facilitates to solve social crux as well as to generate new industries. Korean government research institutes (GRIs) have taken a pivotal role for economic growth which capitalized on technology-oriented strategies. Recently, the policy interests on the transition of their role and mission towards multidisciplinary research organization is increasingly shed lights. This study regards the collaborative activities as one of the key success factors in the multidisciplinary research. In this sense, this study sets research purposes as follows: First, we intend to define a concept and to confine a scope of multidisciplinary research from the view point of R&D purposes and problem-solving process. Second, we categorize the collaboration and the relevant performances which reflect the characteristics of the multidisciplinary research. Third, we analyze the characteristics of collaborative activities and the effects of strength on the research performances. To this end, this study conducted a survey of 104 research project directors, which have experienced at least one of two types of multidisciplinary research projects through National R&D project or NST (National Research Council of Science & Technology) convergence research project. Then, we conducted regression analysis by utilizing the survey results in order to verify the relation between the collaborative activities and the performances. As results of analyses, first, the diversification of collaboration partners was a salient factor in the process of knowledge creation. Second, collective works among the researchers in similar area and domain enhanced mission-oriented technology development projects such as patent creation or technology transfer. Third, we verified that the diversity of created knowledge and the degree of relation continuity between researchers increased in the condition of guaranteeing individual researcher's independence and autonomy as well as sharing various technological capabilities. These results provide the future policy directions related to the methods to measure the collaboration and performance analysis for multidisciplinary research.

Modeling Study of Development of Dying Well Education Program for the Medical Personnel in Korea (의료진 대상 웰 다잉 교육프로그램 개발을 위한 모델링에 관한 연구)

  • Kim, Kwang-Hwan;Kim, Yong-Ha;Ahn, Sang-Yoon;Lee, Chong Hyung;Hwang, Hye-Jeong;Lee, Moo-Sik;Kim, Moon-Joon;Park, Arma;Shim, Moon-Sook;Song, Hyeon-Dong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.10
    • /
    • pp.6234-6241
    • /
    • 2014
  • The purpose of this study was to examine the status of medical staff stress and accommodating manners on the death of patients in a hospital setting for serving the basic information to develop a death education program of medical personnel from April 1 to April 30, 2014. A survey was performed on 353 medical personnel at K university hospital, located in Daejeon metropolitan city. Frequency analysis, chi-square test, and independent t-test were used to analyze the data. The results showed that 'to understand the value of the time and preparedness of a meaningful future' were the most important perspectives on the contents of death education (p<0.05), 'in order to change perceptions and attitudes toward death positively' was the most important reason why they required death education'(p<0.05), 'case-based teaching and problem-based learning' was the most effective way of death education (p<0.05), 'negative or hostile response of a patient's guardian to medical personnel' was the largest stress that medical personnel confront upon witnessing a death'(p<0.05). An understanding of the death of patients by medical personnel and an awareness of the need for death education will help improve the understanding of the patient, their guardian, and medical personnel themselves. The main findings will contribute to the development of a specific death education program on the medical personnel in a hospital setting.

A Dynamic Prefetch Filtering Schemes to Enhance Usefulness Of Cache Memory (캐시 메모리의 유용성을 높이는 동적 선인출 필터링 기법)

  • Chon Young-Suk;Lee Byung-Kwon;Lee Chun-Hee;Kim Suk-Il;Jeon Joong-Nam
    • The KIPS Transactions:PartA
    • /
    • v.13A no.2 s.99
    • /
    • pp.123-136
    • /
    • 2006
  • The prefetching technique is an effective way to reduce the latency caused memory access. However, excessively aggressive prefetch not only leads to cache pollution so as to cancel out the benefits of prefetch but also increase bus traffic leading to overall performance degradation. In this thesis, a prefetch filtering scheme is proposed which dynamically decides whether to commence prefetching by referring a filtering table to reduce the cache pollution due to unnecessary prefetches In this thesis, First, prefetch hashing table 1bitSC filtering scheme(PHT1bSC) has been shown to analyze the lock problem of the conventional scheme, this scheme such as conventional scheme used to be N:1 mapping, but it has the two state to 1bit value of each entries. A complete block address table filtering scheme(CBAT) has been introduced to be used as a reference for the comparative study. A prefetch block address lookup table scheme(PBALT) has been proposed as the main idea of this paper which exhibits the most exact filtering performance. This scheme has a length of the table the same as the PHT1bSC scheme, the contents of each entry have the fields the same as CBAT scheme recently, never referenced data block address has been 1:1 mapping a entry of the filter table. On commonly used prefetch schemes and general benchmarks and multimedia programs simulates change cache parameters. The PBALT scheme compared with no filtering has shown enhanced the greatest 22%, the cache miss ratio has been decreased by 7.9% by virtue of enhanced filtering accuracy compared with conventional PHT2bSC. The MADT of the proposed PBALT scheme has been decreased by 6.1% compared with conventional schemes to reduce the total execution time.

A Study on the construction of physical security system by using security design (보안디자인을 활용한 시설보안시스템 구축 방안)

  • Choi, Sun-Tae
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.129-159
    • /
    • 2011
  • Physical security has always been an extremely important facet within the security arena. A comprehensive security plan consists of three components of physical security, personal security and information security. These elements are interrelated and may exist in varying degrees defending on the type of enterprise or facility being protected. The physical security component of a comprehensive security program is usually composed of policies and procedures, personal, barriers, equipment and records. Human beings kept restless struggle to preserve their and tribal lives. However, humans in prehistoric ages did not learn how to build strong house and how to fortify their residence, so they relied on their protection to the nature and use caves as protection and refuge in cold days. Through the history of man, human has been establishing various protection methods to protect himself and his tribe's life and assets. Physical security methods are set in the base of these security methods. Those caves that primitive men resided was rounded with rock wall except entrance, so safety was guaranteed especially by protection for tribes in all directions. The Great Wall of China that is considered as the longest building in the history was built over one hundred years from about B.C. 400 to prevent the invasion of northern tribes, but this wall enhanced its protection function to small invasions only, and Mongolian army captured the most part of China across this wall by about 1200 A.D. European lords in the Middle Ages built a moat by digging around of castle or reinforced around of the castle by making bascule bridge, and provided these protections to the resident and received agricultural products cultivated. Edwin Holmes of USA in 20 centuries started to provide innovative electric alarm service to the development of the security industry in USA. This is the first of today's electrical security system, and with developments, the security system that combined various electrical security system to the relevant facilities takes charging most parts of today's security market. Like above, humankind established various protection methods to keep life in the beginning and its development continues. Today, modern people installed CCTV to the most facilities all over the country to cope with various social pathological phenomenon and to protect life and assets, so daily life of people are protected and observed. Most of these physical security systems are installed to guarantee our safety but we pay all expenses for these also. Therefore, establishing effective physical security system is very important and urgent problem. On this study, it is suggested methods of establishing effective physical security system by using system integration on the principle of security design about effective security system's effective establishing method of physical security system that is increasing rapidly by needs of modern society.

  • PDF

Analysis and de lege ferenda of the Acts Related with Spread of MERS in Korea in the Year 2015 - Focused on the Controversial Clauses of Medical Service Act and Infectious Disease Control and Prevention Act - (중동호흡기증후군 2015년 사태와 관련된 의료법령의 분석과 입법론 - 「의료법」 및 「감염병의 예방 및 관리에 관한 법률」의 쟁점 조항을 중심으로 -)

  • Kim, Cheonsoo
    • The Korean Society of Law and Medicine
    • /
    • v.16 no.2
    • /
    • pp.197-225
    • /
    • 2015
  • The presentation of this paper was triggered by the spread of MERS in Korea in the year 2015. The analysis of the present acts related with MERS is necessary in order to cope efficiently with any probable spread of such infectious diseases as MERS in future. The acts that should be analyzed in this paper include 'Medical Service Act' and 'Infectious Disease Control And Prevention Act' (hereafter, IDCAPA). At first the classification of the infectious diseases in IDCAPA should be referred to. The Act does not properly classify them because the scope of concept of each group of the infectious diseases overlaps each other. This overlap should be removed. The present system in IDCAPA is not proper for the efficient notification and reporting of the infectious disease patients. This is so in some viewpoints including the persons obligated to make the notification and reporting, the persons to whom they should notify and report such patients, and the process of notification and reporting. The efficient approach to the information related with the infectious disease is necessary for the rapid prevention of its spread. Cohort isolation and quarantine of the infectious patients and exposed contacts are the strongest and most efficient steps for the prevention of spread of the infectious diseases. One of the great problems related with such steps would be the conflict of powers or attributions, the likelihood of which is inevitable under the present system of IDCAPA. The IDCAPA distributed the power or attribution to take the steps to the three governments including the central government, the metropolitan government and the primary local government. The power should be concentrated in the central government, which could afford financially to compensate for the huge amount of damages caused likely by the steps. The power to take the steps would be actually just a useless thing for its holder without such financial capacity. The remedy for the victims by the fault of spreader should be approached to in the sense of national wealth. The general principle of tort law could not supply the victims with the sufficient remedy because the damages would be likely too huge for the wealth of such spreader to cope with. In future another parliamentary inspection could reveal another problems in the administration by the government of the MERS event in the year 2015. Any problem caused by defect in the legal system of the control and prevention of the infectious diseases should be taken into consideration when the legal system would be reformed in future.

  • PDF

Assessment of the Activities of General Physicians in Health Subcenters and a Scheme to Improve the Training Program (보건지소 공중보건 일반의사의 업무수행정도와 수련개선방안)

  • Park, Jung-Han;Chun, Byung-Yeol;Woo, Kuck-Hyeun
    • Journal of Preventive Medicine and Public Health
    • /
    • v.19 no.2 s.20
    • /
    • pp.193-202
    • /
    • 1986
  • The activities of general physicians (GPs) in health subcenters and their competency for clinical skills were assessed to develop a scheme to improve the training program. One hundred-twenty GPs in southern four provinces (Kyungpook, Kyungnam, Chunpook, Chunnam) were randomly selected and 97 were interviewed between January 9 and February 10, 1984. Of the 97 GPs, 86 provided all the information we requested. Average number of patient visits per health subcenter in a day was 30-40 in the demonstration project area for the class II medical insurance whereas it was 3-4 visits in other area. The interviewees were asked to rate their competency in 63 clinical skills. The skills in which over 50% of the interviewees rated themselves competent were only 12 items including IM injection, IV injection, wound dressing, etc. Less than 10% of the interviewees rated themselves competent in such skills as maternal health care, emergency medical care, preventive and promotive health services. Most part of the training program of the NIH for the GPs were not applicable to their field work as the training contents were unrealistic. Clinical training at a local general hospital was of great help in 38.8% and the rest of training was not much helpful as the training was inadequate due to lack of trainer or indifference of the trainer. For more effective training of the GPs, the training program of the NIH should be modified to be more realistic and utilize competent field workers as the instructors. It may be more effective if the training is carried out at several local centers. Ideal length of the clinical training for the GPs is 4 months. A pocketbook should be developed that includes specific skills to master during the clinical training and require the trainer to confirm the achievement. The Ministry of Health and Social Affairs should provide the training hospitals with a training guideline and evaluate the training activities and make sure that the training hospital has specialist for each of the 4 major clinical departments. The Ministry of Health and Social Affairs should provide the GPs with a continuing education to assist the problem solving in the field and motivate them to actively carry out the health program. A province may be divided into several regions and a supervisory committee may be organized with specialists in each region. The committee may hold a meeting for the GPs periodically and respond to the specific questions of the GPs by mail.

  • PDF

Adaptive Lock Escalation in Database Management Systems (데이타베이스 관리 시스템에서의 적응형 로크 상승)

  • Chang, Ji-Woong;Lee, Young-Koo;Whang, Kyu-Young;Yang, Jae-Heon
    • Journal of KIISE:Databases
    • /
    • v.28 no.4
    • /
    • pp.742-757
    • /
    • 2001
  • Since database management systems(DBMSS) have limited lock resources, transactions requesting locks beyond the limit mutt be aborted. In the worst carte, if such transactions are aborted repeatedly, the DBMS can become paralyzed, i.e., transaction execute but cannot commit. Lock escalation is considered a solution to this problem. However, existing lock escalation methods do not provide a complete solution. In this paper, we prognose a new lock escalation method, adaptive lock escalation, that selves most of the problems. First, we propose a general model for lock escalation and present the concept of the unescalatable look, which is the major cause making the transactions to abort. Second, we propose the notions of semi lock escalation, lock blocking, and selective relief as the mechanisms to control the number of unescalatable locks. We then propose the adaptive lock escalation method using these notions. Adaptive lock escalation reduces needless aborts and guarantees that the DBMS is not paralyzed under excessive lock requests. It also allows graceful degradation of performance under those circumstances. Third, through extensive simulation, we show that adaptive lock escalation outperforms existing lock escalation methods. The results show that, compared to the existing methods, adaptive lock escalation reduces the number of aborts and the average response time, and increases the throughput to a great extent. Especially, it is shown that the number of concurrent transactions can be increased more than 16 ~256 fold. The contribution of this paper is significant in that it has formally analysed the role of lock escalation in lock resource management and identified the detailed underlying mechanisms. Existing lock escalation methods rely on users or system administrator to handle the problems of excessive lock requests. In contrast, adaptive lock escalation releases the users of this responsibility by providing graceful degradation and preventing system paralysis through automatic control of unescalatable locks Thus adaptive lock escalation can contribute to developing self-tuning: DBMSS that draw a lot of attention these days.

  • PDF

A Single Index Approach for Time-Series Subsequence Matching that Supports Moving Average Transform of Arbitrary Order (단일 색인을 사용한 임의 계수의 이동평균 변환 지원 시계열 서브시퀀스 매칭)

  • Moon Yang-Sae;Kim Jinho
    • Journal of KIISE:Databases
    • /
    • v.33 no.1
    • /
    • pp.42-55
    • /
    • 2006
  • We propose a single Index approach for subsequence matching that supports moving average transform of arbitrary order in time-series databases. Using the single index approach, we can reduce both storage space overhead and index maintenance overhead. Moving average transform is known to reduce the effect of noise and has been used in many areas such as econometrics since it is useful in finding overall trends. However, the previous research results have a problem of occurring index overhead both in storage space and in update maintenance since tile methods build several indexes to support arbitrary orders. In this paper, we first propose the concept of poly-order moving average transform, which uses a set of order values rather than one order value, by extending the original definition of moving average transform. That is, the poly-order transform makes a set of transformed windows from each original window since it transforms each window not for just one order value but for a set of order values. We then present theorems to formally prove the correctness of the poly-order transform based subsequence matching methods. Moreover, we propose two different subsequence matching methods supporting moving average transform of arbitrary order by applying the poly-order transform to the previous subsequence matching methods. Experimental results show that, for all the cases, the proposed methods improve performance significantly over the sequential scan. For real stock data, the proposed methods improve average performance by 22.4${\~}$33.8 times over the sequential scan. And, when comparing with the cases of building each index for all moving average orders, the proposed methods reduce the storage space required for indexes significantly by sacrificing only a little performance degradation(when we use 7 orders, the methods reduce the space by up to 1/7.0 while the performance degradation is only $9\%{\~}42\%$ on the average). In addition to the superiority in performance, index space, and index maintenance, the proposed methods have an advantage of being generalized to many sorts of other transforms including moving average transform. Therefore, we believe that our work can be widely and practically used in many sort of transform based subsequence matching methods.