• Title/Summary/Keyword: problem analysis

Search Result 16,367, Processing Time 0.046 seconds

Leadership Development in Students as Part of Attitude Development

  • Zhou Yongjun;Viktoriia O. Anishchenko;Olena V. Vasylenko;Nataliia V. Iaremenko;Mykhailo V. Fomin
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.79-90
    • /
    • 2023
  • Leadership development corresponds to the focus on the individual's success and competitiveness strategy. This is the optimal direction of the organization of attitude development because it covers two aspects of the student's personality development, professionally-oriented and self-centric. The aim of the study is to identify and compare the leadership level in second-and fourth-year students to see dynamics of development and implementation of the leadership phenomenon in the professional and personal making up of future specialists. Based on the theoretical analysis of the issue, the authors developed an objective and subjective diagnostic model for leadership skills. In this study, data of the objective diagnostic technique are the key. Subjective diagnostic technique for leadership skills provides insights for problem interpretation. At the level of the first group of respondents, the average Leadership Skills Level of the second-year students was quite low and was found within the medium level. The second group of respondents consisting of the fourth-year students showed a slight but effective improvement. The Leadership Skills of this group were found at a sufficient level. Positive dynamics was revealed for all criteria of leadership skills as a result of applying objective diagnostic methods: decreased percentage of students with negative and relatively low markers of Leadership Skills Level and corresponding increase in percentage of applicants with positive markers of Leadership Skills Level. Further research can be organized in the direction of identifying and developing successful universal and professionally-oriented tactics for leadership development in students as part of attitude development.

Ensuring Data Confidentiality and Privacy in the Cloud using Non-Deterministic Cryptographic Scheme

  • John Kwao Dawson;Frimpong Twum;James Benjamin Hayfron Acquah;Yaw Missah
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.49-60
    • /
    • 2023
  • The amount of data generated by electronic systems through e-commerce, social networks, and data computation has risen. However, the security of data has always been a challenge. The problem is not with the quantity of data but how to secure the data by ensuring its confidentiality and privacy. Though there are several research on cloud data security, this study proposes a security scheme with the lowest execution time. The approach employs a non-linear time complexity to achieve data confidentiality and privacy. A symmetric algorithm dubbed the Non-Deterministic Cryptographic Scheme (NCS) is proposed to address the increased execution time of existing cryptographic schemes. NCS has linear time complexity with a low and unpredicted trend of execution times. It achieves confidentiality and privacy of data on the cloud by converting the plaintext into Ciphertext with a small number of iterations thereby decreasing the execution time but with high security. The algorithm is based on Good Prime Numbers, Linear Congruential Generator (LGC), Sliding Window Algorithm (SWA), and XOR gate. For the implementation in C, thirty different execution times were performed and their average was taken. A comparative analysis of the NCS was performed against AES, DES, and RSA algorithms based on key sizes of 128kb, 256kb, and 512kb using the dataset from Kaggle. The results showed the proposed NCS execution times were lower in comparison to AES, which had better execution time than DES with RSA having the longest. Contrary, to existing knowledge that execution time is relative to data size, the results obtained from the experiment indicated otherwise for the proposed NCS algorithm. With data sizes of 128kb, 256kb, and 512kb, the execution times in milliseconds were 38, 711, and 378 respectively. This validates the NCS as a Non-Deterministic Cryptographic Algorithm. The study findings hence are in support of the argument that data size does not determine the execution.

"Where can I buy this?" - Fashion Item Searcher using Instance Segmentation with Mask R-CNN ("이거 어디서 사?" - Mask R-CNN 기반 객체 분할을 활용한 패션 아이템 검색 시스템)

  • Jung, Kyunghee;Choi, Ha nl;Sammy, Y.X.B.;Kim, Hyunsung;Toan, N.D.;Choo, Hyunseung
    • Annual Conference of KIPS
    • /
    • 2022.11a
    • /
    • pp.465-467
    • /
    • 2022
  • Mobile phones have become an essential item nowadays since it provides access to online platform and service fast and easy. Coming to these platforms such as Social Network Service (SNS) for shopping have been a go-to option for many people. However, searching for a specific fashion item in the picture is challenging, where users need to try multiple searches by combining appropriate search keywords. To tackle this problem, we propose a system that could provide immediate access to websites related to fashion items. In the framework, we also propose a deep learning model for an automatic analysis of image contexts using instance segmentation. We use transfer learning by utilizing Deep fashion 2 to maximize our model accuracy. After segmenting all the fashion item objects in the image, the related search information is retrieved when the object is clicked. Furthermore, we successfully deploy our system so that it could be assessable using any web browser. We prove that deep learning could be a promising tool not only for scientific purpose but also applicable to commercial shopping.

A Study on Drift Phenomenon of Trained ML (학습된 머신러닝의 표류 현상에 관한 고찰)

  • Shin, ByeongChun;Cha, YoonSeok;Kim, Chaeyun;Cha, ByungRae
    • Smart Media Journal
    • /
    • v.11 no.7
    • /
    • pp.61-69
    • /
    • 2022
  • In the learned machine learning, the performance of machine learning degrades at the same time as drift occurs in terms of learning models and learning data over time. As a solution to this problem, I would like to propose the concept and evaluation method of ML drift to determine the re-learning period of machine learning. An XAI test and an XAI test of an apple image were performed according to strawberry and clarity. In the case of strawberries, the change in the XAI analysis of ML models according to the clarity value was insignificant, and in the case of XAI of apple image, apples normally classified objects and heat map areas, but in the case of apple flowers and buds, the results were insignificant compared to strawberries and apples. This is expected to be caused by the lack of learning images of apple flowers and buds, and more apple flowers and buds will be studied and tested in the future.

SPDX Document Generation Visual Studio Plug-in development for Invigorating Blockchain based Software Distribution Platform (블록체인 기반의 소프트웨어 유통 플랫폼의 활성화를 위한 SPDX 문서 생성 Visual Studio용 플러그인 개발)

  • Yun, Ho-Yeong;Joe, Yong-Joon;Shin, Dong-Myung
    • Journal of Software Assessment and Valuation
    • /
    • v.13 no.2
    • /
    • pp.9-17
    • /
    • 2017
  • Software compliance is an essential process when Open Source Software is included in software development to avoid such as license violation issue. However, analyzing quite big software which involves many developers requires enormous time and hard difficulty. To resolve these kinds of problem, SPDX formalizes and standardize the metadata about the software package. When the use of SPDX is activated, software package analysis would be simple and could contribute fair Open Source Software distribution. In this paper, we develop blockchain based SPDX distribution platform which fulfills the requirement of SPDX lifecycle to provide SPDX database which does not depend on particular centralized service but serve as distributed ledger and control by user's certification and their purpose. Moreover, to contribute invigoration of blockchain based SPDX distribution platform, we develop SPDX document generation plug-in for integrated development environment such as Visual Studio.

Analysis of Game User's Motivation-Action Structure on Social Network Games (소셜 네트워크 게임 사용자의 동기-행동구조 분석)

  • Kim, Mi-jin;Kim, Yeong-sil
    • Journal of Korea Entertainment Industry Association
    • /
    • v.5 no.2
    • /
    • pp.77-86
    • /
    • 2011
  • This paper is aimed at analyzing the relationship between users' actions in relation to a SNG (Social Network Game), which mainly targets communities, and the motivations that give rise to such selective actions. The subjects of existing researches on game area have rarely dealt with game users but mainly focused on the studies and utilization of game production technologies; and, in cases of studies on games users, their subjects have been hardly more than observations of users' behaviors in relation to the performance to achieve certain goals or themes of a game; for example, upgrading a character's level or obtaining rewards through "defeat". Therefore, it is necessary to analyze the actions of SNS game users from the perspective of behavioral selections caused by various motivations of human beings rather than approaching from the perspective of problem solving methods. In order to accomplish this goal, fist of all, Lazzaro's People Fun model and motivation theory of SNS users will be analyzed. Secondly, relevant materials from 13 SNG cases will be collected. Games' events and the functional actions of users will be classified. Lastly, the primary actions of SNG users will be classified into 8 different types and motivations - action patterns will be analyzed based on the classified materials.

Three-dimensional numerical parametric study of shape effects on multiple tunnel interactions

  • Chen, Li'ang;Pei, Weiwei;Yang, Yihong;Guo, Wanli
    • Geomechanics and Engineering
    • /
    • v.31 no.3
    • /
    • pp.237-248
    • /
    • 2022
  • Nowadays, more and more subway tunnels were planed and constructed underneath the ground of urban cities to relieve the congested traffic. Potential damage may occur in existing tunnel if the new tunnel is constructed too close. So far, previous studies mainly focused on the tunnel-tunnel interactions with circular shape. The difference between circular and horseshoe shaped tunnel in terms of deformation mechanism is not fully investigated. In this study, three-dimensional numerical parametric studies were carried out to explore the effect of different tunnel shapes on the complicated tunnel-tunnel interaction problem. Parameters considered include volume loss, tunnel stiffness and relative density. It is found that the value of volume loss play the most important role in the multi-tunnel interactions. For a typical condition in this study, the maximum invert settlement and gradient along longitudinal direction of horseshoe shaped tunnel was 50% and 96% larger than those in circular case, respectively. This is because of the larger vertical soil displacement underneath existing tunnel. Due to the discontinuous hoop axial stress in horseshoe shaped tunnel, significant shear stress was mobilized around the axillary angles. This resulted in substantial bending moment at the bottom plate and side walls of horseshoe shaped tunnel. Consequently, vertical elongation and horizontal compression in circular existing tunnel were 45% and 33% smaller than those in horseshoe case (at monitored section X/D = 0), which in latter case was mainly attributed to the bending induced deflection. The radial deformation stiffness of circular tunnel is more sensitive to the Young's modulus compared with horseshoe shaped tunnel. This is because of that circular tunnel resisted the radial deformation mainly by its hoop axial stress while horseshoe shaped tunnel do so mainly by its flexural rigidity. In addition, the reduction of soil stiffness beneath the circular tunnel was larger than that in horseshoe shaped tunnel at each level of relative density, indicating that large portion of tunneling effect were undertaken by the ground itself in circular tunnel case.

Cumulative Effects of Trade Liberalization : The Case of Korean Manufacturing (무역자유화의 동태적 누적효과: 한국 제조업)

  • Park, Soonchan
    • Economic Analysis
    • /
    • v.17 no.4
    • /
    • pp.30-51
    • /
    • 2011
  • Since the previous studies on the effects of trade liberalization implicitly assume that trade liberalization affects economic performance only in any point in time, they inevitably are static. Static evaluations fail to account for cumulative dynamic effects of trade liberalization that affect continuously economic performance. This paper tries to fill this gap of the previous studies in this field, estimating cumulative effects of trade liberalization on economic performance by employing an dynamic version of empirical model. One of important empirical issue is controlling bias from endogeneity. To resolve this problem, this paper employes system GMM that uses lagged first-differences as instruments for level equations and lagged levels as instruments for first-differences equations. It improves upon cross-section estimators because it controls for the potential bias induced by the omission of industry-specific effects and the endogeneity of all regressors. This study investigates the effects of trade liberalization in Korean manufacturing for the period from 1988 to 2005 and finds that cumulative dynamic effects of trade liberalization are present and bigger than static effects.

A Scalability based Energy Model for Sustainability of Blockchain Networks (블록체인 네트워크의 지속 가능성을 위한 확장성 기반 에너지 모델)

  • Seung Hyun Jeon;Bokrae Jung
    • Journal of Industrial Convergence
    • /
    • v.21 no.8
    • /
    • pp.51-58
    • /
    • 2023
  • Blockchains have recently struggled to design for the ideal distributed trust networks by solving scalability trilemma. However, local conflicts between some countries lead to imbalance on energy distribution. Besides, blockchain networks (e.g., Bitcoin) currently consume enormous energy for transaction and mining. The existing data volume based trust model evaluated an increasing blockchain size better than Lubin's trust model in scalability trilemma. In this paper, we propose a scalability based energy model to evaluate sustainability for blockchain networks, considering energy consumption for transaction, time duration, and the blockchain size of growing blockchain networks. Through the rigorous numerical analysis, we compare the proposed scalability based energy model with the existing model for the satisfaction and optimal blockchain size. Thus, the scalability based energy model will provide an assessment tool to choose the proper blockchain networks to solve scalability trilemma problem and prove sustainability.

Marketing Feng Shui to Asia: A Case Study

  • Bela Florenthal;Noriko Yagi;Hongjiang Xu
    • Asia Marketing Journal
    • /
    • v.11 no.2
    • /
    • pp.1-20
    • /
    • 2009
  • Feng Shui practice is very popular in East Asia and has been rapidly adopted by the population of the West. As Feng Shui involves knowledge of object placement, it opens opportunities to market Feng Shui knowledge and products. This paper presents an analysis of a successful Feng Shui enterprise, World of Feng Shui (WOFS), that has been established by a well-known Feng Shui expert Lillian Too and her daughter Jennifer Too. The enterprise's marketing strategies and tactics are tied to the theoretical concept of social influence, widely researched in the consumer behavior literature. The three types of social influence (informational, utilitarian, and value-expressive) are examined in relation to WOFS' marketing strategies using secondary data material. The main results indicate that the strategies of WOFS enterprise address all three types of social influence. The articles generated on-and off-line can be mostly associated with the informational influence. The off- line activities such as events, courses/workshops, and TV shows are also informational in nature. The Q & A sections/postings can be considered as representative of the utilitarian influence. They give experts (e.g., Lillian Too) the opportunity to provide individuals with problem-specific recommendations. Mega-mall website provides the value-expressive influence as purchase and consumption of the Feng Shui products is most susceptible to this type of influence. In terms of implications, WOFS enterprise strategies are suitable not only for consumes but also for business executives in Asia and in the West as architects, designers, and homeowners across continents use Feng Shui practices for building placements and decoration of dwellings and workplaces. Feng Shui practice has some limitations such as conflicting opinions of experts and increased complexity when the dimension of time is taken into consideration. Still, Feng Shui as a practice is growing globally adjusting itself to regional and cultural challenges.

  • PDF