• Title/Summary/Keyword: number system

Search Result 20,630, Processing Time 0.056 seconds

Computerized Multiple 15-hue tests for Quantifying Color Vision Acuity (색각 능력의 정량적 평가를 위한 전산화된 다중 15-색상 배열 검사법)

  • Ko S.T.;Hong S.C.;Choi M.J.
    • Journal of Biomedical Engineering Research
    • /
    • v.21 no.3 s.61
    • /
    • pp.321-331
    • /
    • 2000
  • Multiple 15-hue tests were designed and implemented on a PC in the study so as to quickly and quantitatively evaluate color vision acuity. Difficulty of the test was control)ed by the value of CDBACC (color difference between adjacent color chips) calculated using a CIELAB formula. The multiple 15-hue tests consist of eight of the hue tests (test 3-10) and three of the basic color (red, green, blue) tests (test 11-13). The 15 colors used for the hue tests were specified by the 15 color coordinates that were located at a constant distance (d = 2. 3. 5. 7, 10, 20, 30. 40) from white reference in the CIE chromaticity coordinate system and were separated by a constant color difference (CDBACC = 0.75, 1.1, 1.8. 2.5. 3.5. 7.5. 11, 14) from the adjacent chips. The color coordinates for the 15 chips for the basic color tests were the same as those of the 15 points spaced equally by a constant color difference (6.87 for the green color test. 7.27 for the red color test, 7.86 for the blue color test) from the white reference along the axis of red, green and blue. Thirty normal subjects who were not color blind were taken to undergo the multiple 15-hue tests. It was observed that most of the subjects correctly arranged color chips for the tests with CDBACC greater than 5, whereas no one correctly answered for those with CDBACC less than 2. Rapid changes in the number of the subjects correctly arranged took place when CDBACC of the tests was between 2 and 4.5. In the basic color tests, unlike the hue tests having similar values of CDBACC, it was seen that the subjects arranged color chips even less correctly. It was found that JNCD (just noticeable color difference) - a measure of color vision acuity was about 3 in average for the subjects. The JNCD was chosen as the value of the CDBACC of the test for which about $50\%$ of the subjects failed to successfully arrange color chips. ERCCA (error rate of color chips arrangement) for the test with CDBACC the same as the JNCD was shown to be about $20\%$. It is expected that the multi 15-hue tests implemented on a PC in the study will be an economical tool to quickly and quantitatively evaluate color vision acuity and, accordingly, the tests can be used for early diagnosis to massive potential patients suffering from diseases (ex. diabetes, glaucoma) which may induce changes in color vision acuity.

  • PDF

Verification of wrinkle improvement effect by animal experiment of suture for skin wrinkle improvement by applying CO2 gas and RF radio frequency (CO2 gas와 RF 고주파를 적용한 피부 주름 개선용 봉합사 동물 실험에 따른 주름 개선 효과 검증)

  • Jeong, Jin-Hyoung;Shin, Un-Seop;Song, Mi-Hui;Lee, Sang-Sik
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.3
    • /
    • pp.226-234
    • /
    • 2020
  • As the average life expectancy of human beings is extended in addition to the entry of the aging society, there is a tendency for the interest in the appearance of men and women in modern society to increase. The most external judgment of human aging is the wrinkles on the facial skin. People are undergoing various procedures to have clean, wrinkled, and resilient healthy skin. Many thread lifting procedures are being implemented because they tend to want simple and effective procedures during the procedure. In this study, in order to improve lifting effect in thread lifting, animal experiments were conducted to confirm the improvement of wrinkles by injecting RF high frequency and CO2 gas into existing PDO suture procedures. The experimental groups consisted of natural aging groups, PDO treatment groups, groups with RF high frequency in PDO procedures, groups with CO2 gas injected into PDO procedures, and groups with CO2 gas and RF injected simultaneously into PDO procedures. The individuals in the natural aging group had an average wrinkle depth of 0.408mm before the procedure, and the average wrinkle depth of the 10th week was 0.68mm. The depth of wrinkles in the PDO treatment group averaged 0.384mm before the procedure, and 0.348mm on the 10th week after the procedure. The average crease depth of pre-procedure objects injected with RF high frequency in PDO was 0.42mm, and the average crease depth for 10 weeks was 0.378mm. The average crease depth of the CO2 gas injected into the PDO was 0.4mm before the procedure, and the average crease depth was reduced to 0.332mm in the 10th week after the procedure. On average, the number of objects injected with CO2 gas and RF high frequency in the PDO procedure decreased to 0.412mm before and 0.338mm in the 10th week after the procedure. The procedure of injecting CO2 gas and RF into the PDO suture showed the highest reduction rate of 17.96%.

Analysis of the Perceptions of Teachers about Effective Application of National Competency Standards Based Vocational Education Curriculum in Technical Specialized High Schools and Meister High Schools (공업계 특성화고·마이스터고에서의 NCS 기반 직업교육과정의 효과적인 적용에 대한 전문교과 교원의 인식 및 요구 분석 연구)

  • Lee, Byung-Wook;Ahn, Jae-Yeong;Kang, Chol-Min
    • 대한공업교육학회지
    • /
    • v.40 no.2
    • /
    • pp.111-129
    • /
    • 2015
  • This study tried to investigate the possibility and expectation effect to organize and operate NCS(national competency standards)-based vocational education curriculum in technical specialized high schools and meister high schools and the perceptions of specialty subject teachers about support plans for effective operation of the NCS-based curriculum. For this, the survey was conducted targeting 286 specialty subject teachers in technical specialized high schools and meister high schools. And the results are as follow: First, the specialty subject teachers in the technical specialized high schools and meister high schools recognized that the positive expectation effect can be obtained through the NCS-based vocational education curriculum and the NCS-based vocational education curriculum should very much be applied to the school curriculum but it is impractical to organize and operate the NCS-based vocational education curriculum as the school curriculum from 2016. Second, the specialty subject teachers in the technical specialized high schools and meister high schools recognized that industrial education needs can be analyzed, industry duties-based educational objectives and contents can be set up, industrial duties-based education can be done, the capability to develop and operate teachers' curriculum can be improved, and the NCS-based curriculum will be effective for industrial and academic cooperation and connection with communities by applying it but the realistic possibility will relatively be low. Third, the specialty subject teachers in the technical specialized high schools and meister high schools recognized that tools for practice should be reorganized and expanded, the number of students targeting practical classes should be reduced by 15 to 20 persons, teachers' field education capability should be strengthened, supply and demand of teachers should be supported, industrial and academic cooperation-based field-centered education should be reinforced, and support of the NCS-based teaching materials to be textbooks should be required in terms of operating schools to operate the NCS-based vocational curriculum effectively. Support of finding jobs and field education which correspond with the NCS-based vocational curriculum should be provided, field instruction by ability of the national competency standards should be supported, field practice education projects about the NCS-based vocational curriculum should be provided and introduction and operation of the industrial employee performance evaluation system should be required in terms of the support plans of relevant organizations.

The Effect of Patent Citation Relationship on Business Performance : A Social Network Analysis Perspective (특허 인용 관계가 기업 성과에 미치는 영향 : 소셜네트워크분석 관점)

  • Park, Jun Hyung;Kwahk, Kee-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.127-139
    • /
    • 2013
  • With an advent of recent knowledge-based society, the interest in intellectual property has increased. Firms have tired to result in productive outcomes through continuous innovative activity. Especially, ICT firms which lead high-tech industry have tried to manage intellectual property more systematically. Firm's interest in the patent has increased in order to manage the innovative activity and Knowledge property. The patent involves not only simple information but also important values as information of technology, management and right. Moreover, as the patent has the detailed contents regarding technology development activity, it is regarded as valuable data. The patent which reflects technology spread and research outcomes and business performances are closely interrelated as the patent is considered as a significant the level of firm's innovation. As the patent information which represents companies' intellectual capital is accumulated continuously, it has become possible to do quantitative analysis. The advantages of patent in the related industry information and it's standardize information can be easily obtained. Through the patent, the flow of knowledge can be determined. The patent information can analyze in various levels from patent to nation. The patent information is used to analyze technical status and the effects on performance. The patent which has a high frequency of citation refers to having high technological values. Analyzing the patent information contains both citation index analysis using the number of citation and network analysis using citation relationship. Network analysis can provide the information on the flows of knowledge and technological changes, and it can show future research direction. Studies using the patent citation analysis vary academically and practically. For the citation index research, studies to analyze influential big patent has been conducted, and for the network analysis research, studies to find out the flows of technology in a certain industry has been conducted. Social network analysis is applied not only in the sociology, but also in a field of management consulting and company's knowledge management. Research of how the company's network position has an impact on business performances has been conducted from various aspects in a field of network analysis. Social network analysis can be based on the visual forms. Network indicators are available through the quantitative analysis. Social network analysis is used when analyzing outcomes in terms of the position of network. Social network analysis focuses largely on centrality and structural holes. Centrality indicates that actors having central positions among other actors have an advantage to exert stronger influence for exchange relationship. Degree centrality, betweenness centrality and closeness centrality are used for centrality analysis. Structural holes refer to an empty place in social structure and are defined as efficiency and constraints. This study stresses and analyzes firms' network in terms of the patent and how network characteristics have an influence on business performances. For the purpose of doing this, seventy-four ICT companies listed in S&P500 are chosen for the sample. UCINET6 is used to analyze the network structural characteristics such as outdegree centrality, betweenness centrality and efficiency. Then, regression analysis test is conducted to find out how these network characteristics are related to business performance. It is found that each network index has significant impacts on net income, i.e. business performance. However, it is found that efficiency is negatively associated with business performance. As the efficiency increases, net income decreases and it has a negative impact on business performances. Furthermore, it is shown that betweenness centrality solely has statistically significance for the multiple regression analysis with three network indexes. The patent citation network analysis shows the flows of knowledge between firms, and it can be expected to contribute to company's management strategies by analyzing company's network structural positions.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

A Protection Management Characteristic and Preservation Plan of World Heritage Mt. Huangshan (세계유산 황산의 보호관리 특성 및 보전방안)

  • Shin, Hyun-Sil
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.36 no.1
    • /
    • pp.120-128
    • /
    • 2018
  • The purpose of this study is to establish basic data for the continuous protection management policy of domestic natural world heritage and mixed world heritage, and to examine the present situation and characteristics of the protection management according to the World Heritage Convention on the World Heritage listed Huangshan. The results of this study are as follows. First, Huangshan began to be protected by the establishment of the Huangshan Construction Committee in 1933, and after the designation of national park in 1982, laws and regulations were established in the central ministries, And various projects related to utilization have been implemented. Secondly, the establishment of the boundary for protection was actively intervened by the central government, such as the reorganization of the boundary of Huangshan through the administrative district plan. In order to protect the ecological and landscape value as well as the cultural factor, And designated a heritage designated area. Third, the protection management of Huangshan was divided into four major stages. The first phase was divided into the period when administrative measures were taken to manage the protection of Huangshan. The second phase was designated as a national park in Huangshan. The third period was the time of the protection-oriented project according to the recommendation of the international organizations after the World Heritage listed. The fourth period was the expansion of the tourism industry for the continuous use of protection of Huangshan city, My preservation business was being implemented. Fourth, Huangshan is managed by the central government and the city government. Huangshan, which is a mixed heritage, is managed jointly by the Ministry of Cultural Heritage Administration and the Ministry of Natural Heritage Administration. The protection and management of Huangshan promoted the efficiency and expertise of the heritage-related work through the establishment of the administrative unit-specific management system, and the local governments were entrusted with the authority to implement the protection management policies that meet local characteristics. Fifth, the preservation area of Huangshan has been destroyed by the development policy centered on the mountain. In addition, according to the operation of accommodation facilities, there are problems such as sewage, garbage disposal, and environmental pollution caused by tourists, and the damage caused by pests and diseases in planted plantations around the area and changes in ecosystem due to the composition of cable cars. Sixth, for the continuous protection of Huangshan, strict regulations on new construction, extension and management of accommodation are required, and it is necessary to install facilities to limit and control the number of visitors.

The Effect of PNF Technique application Using Thera-Band on the Balance and Gait of Females over 65 years old (세라밴드를 이용한 PNF 기법 적용이 65세 이상 여성노인의 균형과 보행에 미치는 영향)

  • Kang, Dal-Won;Kang, Mi-Kyoung;Kang, Eun-Sil;Go, Yu-Ri;Kim, Da-Woon;Kim, Dae-Yong;Kim, Jung-Eun;Kim, Won-Hwang;Kim, Ja-Yeon;Kim, Hwan;Jung, Dae-In;Kim, Myung-Hoon;Kim, Sang-Yup;Lee, Dong-Jin;Kim, Chan-Kyu;Kim, Hyun-Jin
    • Journal of Korean Physical Therapy Science
    • /
    • v.18 no.1
    • /
    • pp.1-10
    • /
    • 2011
  • Purpose: Study on the effect of the use of Proprioceptive Neuromuscular Facilitation(PNF) method by use of the direction and charge regulation which is the advantage of the Thera-band therapy on the walks and balances in old people and comparison with the result after applying the general PNF technique. Method: The study has been performed on 30 females over 65 years old. The study has been done by dividing the object group in 3 patterns, which are number 1, the comparison group of 10, two ones that are applied the PNF technique using Thera-band and third, the ones that are applied only the PNF technique. For the PNF and the Thera-band using PNF, we have divided the group into Combination of Isotonic technique and the Rhythmical stabilization technique according to the patient's acquaintance pattern and applied them to the patient's body. Evaluation was the balancing ability which was calculated by using the BIODEX Balance system / FRT and for the evaluation of walking ability, we have used the speed of walking for 10M / TUG. Result: In the comparison group of 10, the balancing ability and the walking ability did not change much before and after the experiment, which made it possible to compare the group with the other two easily(p>0.05). For the other two groups, we have recognized the enhancement both in the balancing ability and the walking ability, but they did not know much difference between themselves(p<0.05). Conclusion: Though there were not a big difference in the sense of improvement between the Thera-band using PNF and the PNF technique only, we could infer that these two therapy has enhanced much in the walking and balancing ability for people over 65 and through these result we can foresee that not only using the method shown in this study but also by using many advantages of Thera-band, we could diminish the tiredness of healer, enhance the efficiency of exercise in them and also by forming self training program for older people we could help them build the prevention program from falls.

  • PDF

Validation of the Proximity of Clothing to Self Scale for Older Persons (의복의 자아 근접성 척도 검증 - 노년층을 대상으로 -)

  • Lee, Young-A;Sontag, M. Suzanne
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.31 no.6 s.165
    • /
    • pp.848-858
    • /
    • 2007
  • Sontag and Lee (2004) recently developed an objectively measurable instrument, the Proximity of Clothing to Self(PCS) Scale, which measured the psychological closeness of clothing to self. They validated a 4-factor, 24-item PCS Scale for use with adolescents and identified the need for confirmation of the factor structure with other age groups. This paper extends the work of Sontag and Lee by employing the PCS Scale with older persons, age 65 and over, and reports the validation of a 3-factor, 19-item PCS Scale for older persons. A mail survey was sent to a national random sample of 1,700 older Persons by means of a list purchased from a U.S. survey sampling company in late November 2004. Total usuable number of respondents was 250 with an adjusted response rate of 15.6 percent. Three analytical rounds of confirmatory factor analysis(CFA) to test the construct validity of the PCS Scale were conducted by using AMOS 5.0(Analysis of Moment Structures), one of several structural equation modeling(SEM) programs. Completion of three rounds of the CFA resulted in a 3-factor, 19-item PCS Scale with demonstrated construct validity and reliability for older persons. The three PCS dimensions are clothing in relation to 1) self as structure-process(PCS Dimension 1-2-3 combined), 2) self-esteem-evaluative and affective processes(PCS Dimension 4-5 combined), and 3) body image and body cathexis(PCS Dimension 6). The initially hypothesized 6-factor scale(Sontag & Lee, 2004) was not confirmed for adolescents in their study nor with older persons in this study. In addition, the 4-factor solution for the adolescent group did not hold for older persons. It appears that the self-system of older persons is more integrated than may be true for younger individuals. Recommendations for future testing of construct validity of the PCS Scale are made.

Ecoclimatic Map over North-East Asia Using SPOT/VEGETATION 10-day Synthesis Data (SPOT/VEGETATION NDVI 자료를 이용한 동북아시아의 생태기후지도)

  • Park Youn-Young;Han Kyung-Soo
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.8 no.2
    • /
    • pp.86-96
    • /
    • 2006
  • Ecoclimap-1, a new complete surface parameter global database at a 1-km resolution, was previously presented. It is intended to be used to initialize the soil-vegetation- atmosphere transfer schemes in meteorological and climate models. Surface parameters in the Ecoclimap-1 database are provided in the form of a per-class value by an ecoclimatic base map from a simple merging of land cover and climate maps. The principal objective of this ecoclimatic map is to consider intra-class variability of life cycle that the usual land cover map cannot describe. Although the ecoclimatic map considering land cover and climate is used, the intra-class variability was still too high inside some classes. In this study, a new strategy is defined; the idea is to use the information contained in S10 NDVI SPOT/VEGETATION profiles to split a land cover into more homogeneous sub-classes. This utilizes an intra-class unsupervised sub-clustering methodology instead of simple merging. This study was performed to provide a new ecolimatic map over Northeast Asia in the framework of Ecoclimap-2 global database construction for surface parameters. We used the University of Maryland's 1km Global Land Cover Database (UMD) and a climate map to determine the initial number of clusters for intra-class sub-clustering. An unsupervised classification process using six years of NDVI profiles allows the discrimination of different behavior for each land cover class. We checked the spatial coherence of the classes and, if necessary, carried out an aggregation step of the clusters having a similar NDVI time series profile. From the mapping system, 29 ecosystems resulted for the study area. In terms of climate-related studies, this new ecosystem map may be useful as a base map to construct an Ecoclimap-2 database and to improve the surface climatology quality in the climate model.

Selective Word Embedding for Sentence Classification by Considering Information Gain and Word Similarity (문장 분류를 위한 정보 이득 및 유사도에 따른 단어 제거와 선택적 단어 임베딩 방안)

  • Lee, Min Seok;Yang, Seok Woo;Lee, Hong Joo
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.4
    • /
    • pp.105-122
    • /
    • 2019
  • Dimensionality reduction is one of the methods to handle big data in text mining. For dimensionality reduction, we should consider the density of data, which has a significant influence on the performance of sentence classification. It requires lots of computations for data of higher dimensions. Eventually, it can cause lots of computational cost and overfitting in the model. Thus, the dimension reduction process is necessary to improve the performance of the model. Diverse methods have been proposed from only lessening the noise of data like misspelling or informal text to including semantic and syntactic information. On top of it, the expression and selection of the text features have impacts on the performance of the classifier for sentence classification, which is one of the fields of Natural Language Processing. The common goal of dimension reduction is to find latent space that is representative of raw data from observation space. Existing methods utilize various algorithms for dimensionality reduction, such as feature extraction and feature selection. In addition to these algorithms, word embeddings, learning low-dimensional vector space representations of words, that can capture semantic and syntactic information from data are also utilized. For improving performance, recent studies have suggested methods that the word dictionary is modified according to the positive and negative score of pre-defined words. The basic idea of this study is that similar words have similar vector representations. Once the feature selection algorithm selects the words that are not important, we thought the words that are similar to the selected words also have no impacts on sentence classification. This study proposes two ways to achieve more accurate classification that conduct selective word elimination under specific regulations and construct word embedding based on Word2Vec embedding. To select words having low importance from the text, we use information gain algorithm to measure the importance and cosine similarity to search for similar words. First, we eliminate words that have comparatively low information gain values from the raw text and form word embedding. Second, we select words additionally that are similar to the words that have a low level of information gain values and make word embedding. In the end, these filtered text and word embedding apply to the deep learning models; Convolutional Neural Network and Attention-Based Bidirectional LSTM. This study uses customer reviews on Kindle in Amazon.com, IMDB, and Yelp as datasets, and classify each data using the deep learning models. The reviews got more than five helpful votes, and the ratio of helpful votes was over 70% classified as helpful reviews. Also, Yelp only shows the number of helpful votes. We extracted 100,000 reviews which got more than five helpful votes using a random sampling method among 750,000 reviews. The minimal preprocessing was executed to each dataset, such as removing numbers and special characters from text data. To evaluate the proposed methods, we compared the performances of Word2Vec and GloVe word embeddings, which used all the words. We showed that one of the proposed methods is better than the embeddings with all the words. By removing unimportant words, we can get better performance. However, if we removed too many words, it showed that the performance was lowered. For future research, it is required to consider diverse ways of preprocessing and the in-depth analysis for the co-occurrence of words to measure similarity values among words. Also, we only applied the proposed method with Word2Vec. Other embedding methods such as GloVe, fastText, ELMo can be applied with the proposed methods, and it is possible to identify the possible combinations between word embedding methods and elimination methods.