• Title/Summary/Keyword: multiple weights

Search Result 296, Processing Time 0.025 seconds

The Changes of Dietary Reference Intakes for Koreans and Its Application to the New Text Book (한국인 영양섭취기준에 대한 이해 및 새 교과서에의 적용 방안)

  • Kim, Jung-Hyun;Lee, Min-June
    • Journal of Korean Home Economics Education Association
    • /
    • v.20 no.2
    • /
    • pp.75-94
    • /
    • 2008
  • The purposes of this paper are to describe the newly established reference values of nutrient intakes: to apply the changed dietary reference intakes to the new text book based on the revised curriculum: and to contrive substantial contents in the domain of dietary life(foods & nutrition) of new text book. Dietary Reference Intakes for Koreans(KDRIs) is newly established reference values of nutrient intakes that are considered necessary to maintain the health of Koreans at the optimal state and to prevent chronic diseases and overnutrition. Unlike previously used Recommended Dietary Allowances for Koreas(KRDA), which presented a single reference value for intake of each nutrient, multiple values are set at levels for nutrients to reduce risk of chronic diseases and toxicity as well as prevention of nutrient deficiency. The new KDRIs include the Estimated Average Requirement(EAR), Recommended Intake(RI), Adequate Intake(AI), and Tolerable Upper Intake Level(UL). The EAR is the daily nutrient intake estimated to meet the requirement of the half of the apparently healthy individuals in a target group and thus is set at the median of the distribution of requirements. The RI is set at two standard deviations above the EAR. The AI is established for nutrients for which existing body of knowledge are inadequate to establish the EAR and RI. The UL is the highest level of daily nutrient intake which is not likely to cause adverse effects for the human health. Age and gender subgroups are established in consideration of physiological characteristics and developmental stages: infancy, toddler, childhood, adolescence, adulthood and old age. Pregnancy and lactation periods were considered separately and gender is divided after early childhood. Reference heights and weights are from the Korean Agency for Technology and Standards, Ministry of Commerce, Industry and Energy. The practical application of DRIs to the new books based on the revision in the 7th curriculum is to assess the dietary and nutrient intake as well as to plan a meal. It can be utilized to set an appropriate nutrient goal for the diet as usually eaten and to develop a plan that the individual will consume using a nutrient based food guidance system in the new books based on the revision in the 7th curriculum.

  • PDF

Determinants of Mobile Application Use: A Study Focused on the Correlation between Application Categories (모바일 앱 사용에 영향을 미치는 요인에 관한 연구: 앱 카테고리 간 상관관계를 중심으로)

  • Park, Sangkyu;Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.157-176
    • /
    • 2016
  • For a long time, mobile phone had a sole function of communication. Recently however, abrupt innovations in technology allowed extension of the sphere in mobile phone activities. Development of technology enabled realization of almost computer-like environment even on a very small device. Such advancement yielded several forms of new high-tech devices such as smartphone and tablet PC, which quickly proliferated. Simultaneously with the diffusion of the mobile devices, mobile applications for those devices also prospered and soon became deeply penetrated in consumers' daily lives. Numerous mobile applications have been released in app stores yielding trillions of cumulative downloads. However, a big majority of the applications are disregarded from consumers. Even after the applications are purchased, they do not survive long in consumers' mobile devices and are soon abandoned. Nevertheless, it is imperative for both app developers and app-store operators to understand consumer behaviors and to develop marketing strategies aiming to make sustainable business by first increasing sales of mobile applications and by also designing surviving strategy for applications. Therefore, this research analyzes consumers' mobile application usage behavior in a frame of substitution/supplementary of application categories and several explanatory variables. Considering that consumers of mobile devices use multiple apps simultaneously, this research adopts multivariate probit models to explain mobile application usage behavior and to derive correlation between categories of applications for observing substitution/supplementary of application use. The research adopts several explanatory variables including sociodemographic data, user experiences of purchased applications that reflect future purchasing behavior of paid applications as well as consumer attitudes toward marketing efforts, variables representing consumer attitudes toward rating of the app and those representing consumer attitudes toward app-store promotion efforts (i.e., top developer badge and editor's choice badge). Results of this study can be explained in hedonic and utilitarian framework. Consumers who use hedonic applications, such as those of game and entertainment-related, are of young age with low education level. However, consumers who are old and have received higher education level prefer utilitarian application category such as life, information etc. There are disputable arguments over whether the users of SNS are hedonic or utilitarian. In our results, consumers who are younger and those with higher education level prefer using SNS category applications, which is in a middle of utilitarian and hedonic results. Also, applications that are directly related to tangible assets, such as banking, stock and mobile shopping, are only negatively related to experience of purchasing of paid app, meaning that consumers who put weights on tangible assets do not prefer buying paid application. Regarding categories, most correlations among categories are significantly positive. This is because someone who spend more time on mobile devices tends to use more applications. Game and entertainment category shows significant and positive correlation; however, there exists significantly negative correlation between game and information, as well as game and e-commerce categories of applications. Meanwhile, categories of game and SNS as well as game and finance have shown no significant correlations. This result clearly shows that mobile application usage behavior is quite clearly distinguishable - that the purpose of using mobile devices are polarized into utilitarian and hedonic purpose. This research proves several arguments that can only be explained by second-hand real data, not by survey data, and offers behavioral explanations of mobile application usage in consumers' perspectives. This research also shows substitution/supplementary patterns of consumer application usage, which then explain consumers' mobile application usage behaviors. However, this research has limitations in some points. Classification of categories itself is disputable, for classification is diverged among several studies. Therefore, there is a possibility of change in results depending on the classification. Lastly, although the data are collected in an individual application level, we reduce its observation into an individual level. Further research will be done to resolve these limitations.

Significance Analysis of Facility Fires Though Spatial Econometrics Assessment (공간계량분석 방법에 따른 시설물 화재 발생 유의성 분석)

  • Seo, Min Song;Yoo, Hwan Hee
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.38 no.3
    • /
    • pp.281-293
    • /
    • 2020
  • Recently, large and small fires have been happening more often in Korea. Fire is one of the most frequent disasters along with traffic accidents in korean cities, and this frequency is closely related to the land use and the type of facilities. Therefore, in this study, the significance of fires was analyzed by considering land use, facility types, human and social factors and using 10 years of fire data in Jinju city. Based on this, OLS (Ordinary Least Square) regression analysis, SLM (Spatial Lag Model) and SEM (Spatial Error Model) using space weights, were compared and analyzed considering the location of the fire and each factor, then a statistical model with high suitability was presented. As a result, LISA analysis of spatial distribution patterns of fires in Jinju city was conducted, and it was proved that the frequency of fires was high in the order as follow, central commercial area, industrial area and residential area. Multiple regression analysis was performed by integrating demographic, social, and physical variables. Therefore, the three models were compared and analyzed by applying spatial weighting to the derived factors. As a result of the significance test, the spatial error model was analyzed to be the most significant. The facilities that have the highest correlation with fire occurrence were second type neighborhood facilities, followed by detached house, first type neighborhood facilities, number of households, and sales facilities. The results of this study are expected to be used as significant data to identify factors and manage fire safety in urban areas. Also, through the analysis of the standard deviation ellipsoid, the distribution characteristics of each facility in the residential area, industrial area, and central commercial area among the use areas were analyzed. In, the second type neighborhood facility with the highest fire risk was concentrated in the center. The results of these studies are expected to be used as useful data for identifying factors and managing fire safety in urban areas.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

Social Tagging-based Recommendation Platform for Patented Technology Transfer (특허의 기술이전 활성화를 위한 소셜 태깅기반 지적재산권 추천플랫폼)

  • Park, Yoon-Joo
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.3
    • /
    • pp.53-77
    • /
    • 2015
  • Korea has witnessed an increasing number of domestic patent applications, but a majority of them are not utilized to their maximum potential but end up becoming obsolete. According to the 2012 National Congress' Inspection of Administration, about 73% of patents possessed by universities and public-funded research institutions failed to lead to creating social values, but remain latent. One of the main problem of this issue is that patent creators such as individual researcher, university, or research institution lack abilities to commercialize their patents into viable businesses with those enterprises that are in need of them. Also, for enterprises side, it is hard to find the appropriate patents by searching keywords on all such occasions. This system proposes a patent recommendation system that can identify and recommend intellectual rights appropriate to users' interested fields among a rapidly accumulating number of patent assets in a more easy and efficient manner. The proposed system extracts core contents and technology sectors from the existing pool of patents, and combines it with secondary social knowledge, which derives from tags information created by users, in order to find the best patents recommended for users. That is to say, in an early stage where there is no accumulated tag information, the recommendation is done by utilizing content characteristics, which are identified through an analysis of key words contained in such parameters as 'Title of Invention' and 'Claim' among the various patent attributes. In order to do this, the suggested system extracts only nouns from patents and assigns a weight to each noun according to the importance of it in all patents by performing TF-IDF analysis. After that, it finds patents which have similar weights with preferred patents by a user. In this paper, this similarity is called a "Domain Similarity". Next, the suggested system extract technology sector's characteristics from patent document by analyzing the international technology classification code (International Patent Classification, IPC). Every patents have more than one IPC, and each user can attach more than one tag to the patents they like. Thus, each user has a set of IPC codes included in tagged patents. The suggested system manages this IPC set to analyze technology preference of each user and find the well-fitted patents for them. In order to do this, the suggeted system calcuates a 'Technology_Similarity' between a set of IPC codes and IPC codes contained in all other patents. After that, when the tag information of multiple users are accumulated, the system expands the recommendations in consideration of other users' social tag information relating to the patent that is tagged by a concerned user. The similarity between tag information of perferred 'patents by user and other patents are called a 'Social Simialrity' in this paper. Lastly, a 'Total Similarity' are calculated by adding these three differenent similarites and patents having the highest 'Total Similarity' are recommended to each user. The suggested system are applied to a total of 1,638 korean patents obtained from the Korea Industrial Property Rights Information Service (KIPRIS) run by the Korea Intellectual Property Office. However, since this original dataset does not include tag information, we create virtual tag information and utilized this to construct the semi-virtual dataset. The proposed recommendation algorithm was implemented with JAVA, a computer programming language, and a prototype graphic user interface was also designed for this study. As the proposed system did not have dependent variables and uses virtual data, it is impossible to verify the recommendation system with a statistical method. Therefore, the study uses a scenario test method to verify the operational feasibility and recommendation effectiveness of the system. The results of this study are expected to improve the possibility of matching promising patents with the best suitable businesses. It is assumed that users' experiential knowledge can be accumulated, managed, and utilized in the As-Is patent system, which currently only manages standardized patent information.

Roles of the Insulin-like Growth Factor System in the Reproductive Function;Uterine Connection (Insulin-like Growth Factor Systems의 생식기능에서의 역할;자궁편)

  • Lee, Chul-Young
    • Clinical and Experimental Reproductive Medicine
    • /
    • v.23 no.3
    • /
    • pp.247-268
    • /
    • 1996
  • It has been known for a long time that gonadotropins and steroid hormones play a pivotal role in a series of reproductive biological phenomena including the maturation of ovarian follicles and oocytes, ovulation and implantation, maintenance of pregnancy and fetal growth & development, parturition and mammary development and lactation. Recent investigations, however, have elucidated that in addition to these classic hormones, multiple growth factors also are involved in these phenomena. Most growth factors in reproductive organs mediate the actions of gonadotropins and steroid hormones or synergize with them in an autocrine/paracrine manner. The insulin-like growth factor(IGF) system, which is one of the most actively investigated areas lately in the reproductive organs, has been found to have important roles in a wide gamut of reproductive phenomena. In the present communication, published literature pertaining to the intrauterine IGF system will be reviewed preceded by general information of the IGF system. The IGF family comprises of IGF-I & IGF-II ligands, two types of IGF receptors and six classes of IGF-binding proteins(IGFBPs) that are known to date. IGF-I and IGF-II peptides, which are structurally homologous to proinsulin, possess the insulin-like activity including the stimulatory effect of glucose and amino acid transport. Besides, IGFs as mitogens stimulate cell division, and also play a role in cellular differentiation and functions in a variety of cell lines. IGFs are expressed mainly in the liver and messenchymal cells, and act on almost all types of tissues in an autocrine/paracrine as well as endocrine mode. There are two types of IGF receptors. Type I IGF receptors, which are tyrosine kinase receptors having high-affinity for IGF-I and IGF-II, mediate almost all the IGF actions that are described above. Type II IGF receptors or IGF-II/mannose-6-phosphate receptors have two distinct binding sites; the IGF-II binding site exhibits a high affinity only for IGF-II. The principal role of the type II IGF receptor is to destroy IGF-II by targeting the ligand to the lysosome. IGFs in biological fluids are mostly bound to IGFBP. IGFBPs, in general, are IGF storage/carrier proteins or modulators of IGF actions; however, as for distinct roles for individual IGFBPs, only limited information is available. IGFBPs inhibit IGF actions under most in vitro situations, seemingly because affinities of IGFBPs for IGFs are greater than those of IGF receptors. How IGF is released from IGFBP to reach IGF receptors is not known; however, various IGFBP protease activities that are present in blood and interstitial fluids are believed to play an important role in the process of IGF release from the IGFBP. According to latest reports, there is evidence that under certain in vitro circumstances, IGFBP-1, -3, -5 have their own biological activities independent of the IGF. This may add another dimension of complexity of the already complicated IGF system. Messenger ribonucleic acids and proteins of the IGF family members are expressed in the uterine tissue and conceptus of the primates, rodents and farm animals to play important roles in growth and development of the uterus and fetus. Expression of the uterine IGF system is regulated by gonadal hormones and local regulatory substances with temporal and spatial specificities. Locally expressed IGFs and IGFBPs act on the uterine tissue in an autocrine/paracrine manner, or are secreted into the uterine lumen to participate in conceptus growth and development. Conceptus also expresses the IGF system beginning from the peri-implantation period. When an IGF family member is expressed in the conceptus, however, is determined by the presence or absence of maternally inherited mRNAs, genetic programming of the conceptus itself and an interaction with the maternal tissue. The site of IGF action also follows temporal (physiological status) and spatial specificities. These facts that expression of the IGF system is temporally and spatially regulated support indirectly a hypothesis that IGFs play a role in conceptus growth and development. Uterine and conceptus-derived IGFs stimulate cell division and differentiation, glucose and amino acid transport, general protein synthesis and the biosynthesis of mammotropic hormones including placental lactogen and prolactin, and also play a role in steroidogenesis. The suggested role for IGFs in conceptus growth and development has been proven by the result of IGF-I, IGF-II or IGF receptor gene disruption(targeting) of murine embryos by the homologous recombination technique. Mice carrying a null mutation for IGF-I and/or IGF-II or type I IGF receptor undergo delayed prenatal and postnatal growth and development with 30-60% normal weights at birth. Moreover, mice lacking the type I IGF receptor or IGF-I plus IGF-II die soon after birth. Intrauterine IGFBPs generally are believed to sequester IGF ligands within the uterus or to play a role of negative regulators of IGF actions by inhibiting IGF binding to cognate receptors. However, when it is taken into account that IGFBP-1 is expressed and secreted in primate uteri in amounts assessedly far exceeding those of local IGFs and that IGFBP-1 is one of the major secretory proteins of the primate decidua, the possibility that this IGFBP may have its own biological activity independent of IGF cannot be excluded. Evidently, elucidating the exact role of each IGFBP is an essential step into understanding the whole IGF system. As such, further research in this area is awaited with a lot of anticipation and attention.

  • PDF