• Title/Summary/Keyword: simple k-point

Search Result 1,117, Processing Time 0.036 seconds

Functional Properties of Soy Protein Isolates Prepared from Defatted Soybean Meal (탈지대두박(脫脂大豆粕)에서 추출(抽出)한 분리대두단백(分離大豆蛋白)의 식품학적(食品學的) 성질(性質))

  • Byun, Si-Myung;Kim, Chul-Jin
    • Korean Journal of Food Science and Technology
    • /
    • v.9 no.2
    • /
    • pp.123-130
    • /
    • 1977
  • A laboratory study was made to develop a simple and economic model method for the systematic determination of functional properties of 'Soy Protein Isolates (SPI)' prepared from defatted soybean meal. These are required to evaluate and to predict how SPI may behave in specific systems and such proteins can be used to simulate or replace conventional proteins. Data concerning the effects of pH, salt concentration, temperature, and protein concentration on the functional properties which include solubility, heat denaturation, gel forming capacity, emulsifying capacity, and foaming capacity are presented. The results are as follows: 1) The yield of SPI from defatted soybean meal increased to 83.9 % as the soybean meal was extracted with 0.02 N NaOH. 2) The suitable viscocity of a dope solution for spinning fiber was found to be 60 Poises by using syringe needle (0.3 mm) with 15 % SPI in 0.6 % NaOH. 3) Heat caused thickening and gelation in concentration of 8 % with a temperature threshold of $70^{\circ}C$. At $8{\sim}12\;%$ protein concentration, gel was formed within $10{\sim}30\;min$ at $70{\sim}100\;^{\circ}C$. It was, however, disrupted rapidly at $125\;^{\circ}C$ of overheat treatment. The gel was firm, resilient and self-supporting at protein concentration of 14 % and less susceptible to disruption of overheating. 4) The emulsifying capacity (EC) of SPI was correlated positively to the solubility of protein at ${\mu}=0$. At pH of the isoelectric point of SPI (pH 4.6), EC increased as concentration of sodium chloride increased. Using model system$(mixing\;speed:\;12,000\;r.p.m.,\;oil\;addition\;rate:\;0.9\;ml/sec,\;and\;temperature\;:\;20{\pm}1\;^{\circ}C)$, the maximum EC of SPI was found to be 47.2 ml of oil/100 mg protein, at the condition of pH 8.7 and ${\mu}=0.6$. The milk casein had greater EC than SPI at lower ionic strength while the EC of SPI was the same as milk casein at higher ionic strength. 5) The shaking test was used in determining the foam-ability of proteins. Progressively increasing SPI concentration up to 5 % indicated that the maximum protein concentration for foaming capacity was 2 %. Sucrose reduced foam expansion slightly but enhanced foam stability. The results of comparing milk casein and egg albumin were that foaming properties of SPI were the same as egg albumin, and better than milk casein, particularly in foam stability.

  • PDF

A PLS Path Modeling Approach on the Cause-and-Effect Relationships among BSC Critical Success Factors for IT Organizations (PLS 경로모형을 이용한 IT 조직의 BSC 성공요인간의 인과관계 분석)

  • Lee, Jung-Hoon;Shin, Taek-Soo;Lim, Jong-Ho
    • Asia pacific journal of information systems
    • /
    • v.17 no.4
    • /
    • pp.207-228
    • /
    • 2007
  • Measuring Information Technology(IT) organizations' activities have been limited to mainly measure financial indicators for a long time. However, according to the multifarious functions of Information System, a number of researches have been done for the new trends on measurement methodologies that come with financial measurement as well as new measurement methods. Especially, the researches on IT Balanced Scorecard(BSC), concept from BSC measuring IT activities have been done as well in recent years. BSC provides more advantages than only integration of non-financial measures in a performance measurement system. The core of BSC rests on the cause-and-effect relationships between measures to allow prediction of value chain performance measures to allow prediction of value chain performance measures, communication, and realization of the corporate strategy and incentive controlled actions. More recently, BSC proponents have focused on the need to tie measures together into a causal chain of performance, and to test the validity of these hypothesized effects to guide the development of strategy. Kaplan and Norton[2001] argue that one of the primary benefits of the balanced scorecard is its use in gauging the success of strategy. Norreklit[2000] insist that the cause-and-effect chain is central to the balanced scorecard. The cause-and-effect chain is also central to the IT BSC. However, prior researches on relationship between information system and enterprise strategies as well as connection between various IT performance measurement indicators are not so much studied. Ittner et al.[2003] report that 77% of all surveyed companies with an implemented BSC place no or only little interest on soundly modeled cause-and-effect relationships despite of the importance of cause-and-effect chains as an integral part of BSC. This shortcoming can be explained with one theoretical and one practical reason[Blumenberg and Hinz, 2006]. From a theoretical point of view, causalities within the BSC method and their application are only vaguely described by Kaplan and Norton. From a practical consideration, modeling corporate causalities is a complex task due to tedious data acquisition and following reliability maintenance. However, cause-and effect relationships are an essential part of BSCs because they differentiate performance measurement systems like BSCs from simple key performance indicator(KPI) lists. KPI lists present an ad-hoc collection of measures to managers but do not allow for a comprehensive view on corporate performance. Instead, performance measurement system like BSCs tries to model the relationships of the underlying value chain in cause-and-effect relationships. Therefore, to overcome the deficiencies of causal modeling in IT BSC, sound and robust causal modeling approaches are required in theory as well as in practice for offering a solution. The propose of this study is to suggest critical success factors(CSFs) and KPIs for measuring performance for IT organizations and empirically validate the casual relationships between those CSFs. For this purpose, we define four perspectives of BSC for IT organizations according to Van Grembergen's study[2000] as follows. The Future Orientation perspective represents the human and technology resources needed by IT to deliver its services. The Operational Excellence perspective represents the IT processes employed to develop and deliver the applications. The User Orientation perspective represents the user evaluation of IT. The Business Contribution perspective captures the business value of the IT investments. Each of these perspectives has to be translated into corresponding metrics and measures that assess the current situations. This study suggests 12 CSFs for IT BSC based on the previous IT BSC's studies and COBIT 4.1. These CSFs consist of 51 KPIs. We defines the cause-and-effect relationships among BSC CSFs for IT Organizations as follows. The Future Orientation perspective will have positive effects on the Operational Excellence perspective. Then the Operational Excellence perspective will have positive effects on the User Orientation perspective. Finally, the User Orientation perspective will have positive effects on the Business Contribution perspective. This research tests the validity of these hypothesized casual effects and the sub-hypothesized causal relationships. For the purpose, we used the Partial Least Squares approach to Structural Equation Modeling(or PLS Path Modeling) for analyzing multiple IT BSC CSFs. The PLS path modeling has special abilities that make it more appropriate than other techniques, such as multiple regression and LISREL, when analyzing small sample sizes. Recently the use of PLS path modeling has been gaining interests and use among IS researchers in recent years because of its ability to model latent constructs under conditions of nonormality and with small to medium sample sizes(Chin et al., 2003). The empirical results of our study using PLS path modeling show that the casual effects in IT BSC significantly exist partially in our hypotheses.

Leisure Riding Activation Plan of the Jeju Horse designated industrial zones (말 산업특구 지정에 따른 제주도 레저승마 활성화 방안)

  • Choi, Cheol-Young
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.8
    • /
    • pp.355-363
    • /
    • 2017
  • Jeju-do was designated as the 'first horse industry special zone' in 2014, followed by additional designation of horse industry special zones in Icheon, Yongin of Gyeonggi-do and Gyeongsangbuk-do in 2015. As a result, horses have become no more synonymous with Jeju-do. Jeju-do may see its competitive edge becoming blunt, compared to other local governments, due to its environmental characteristics and accessibility. The Korean proverb, "Send people to Seoul and horses to Jeju-do", has become an old saying that does not match reality. However, Jeju-do, designated as the first horse industry special zone, is expected to play a leading role in cultivation of domestic horse industry and faces a challenge of creating exemplary cases of success in transforming horse industry into the senary (6th) industry. In addition, KRW 114.2 billion is planned to be invested into 35 projects covering 9 sectors, including supply of elite domestic racing horses, expansion of demand basis for horse-riding, cultivation of horse meat industry, etc., by 2017 as envisioned by the horse industry special zone promotion plan. Despite expansion of facilities and demand base for horse-riding, those at the sites point out that government support at policy level has not come home to their hearts and criticism has been mounting that project efficiency remains low. Factors hindering the growth of horse industry, which have come to the fore, include inadequate supply of horse-riding facilities, limitation to expansion of demand for horse-riding, etc., due to excessive regulation. Advancement of horse industry requires wide-ranging deregulation on investment related to horse industry, including horse breeding and horse-riding facility installation, etc. Regulation which is deemed to be the biggest stumbling block to advancement of horse industry is related to the regulation requiring formation of farmland at horse-riding facilities in farming and fishery villages. Along with improvement in such regulations, horse-riding facilities without license should be legalized to promote qualitative growth of horse-riding industry. Moreover, efforts should be made to develop and deploy instructors with horse-riding license in order to develop horse-riding into a full-fledged leisure beyond simple experience auxiliary to tourism, thus ensuring that people can enjoy leisure style horse-riding regularly in safe and healthy manners. It would be necessary to add fresh momentum into efforts to turn Jeju-do into the hub of well-being leisure horse-riding by pooling our wisdom.

Oriental medical historic study of formation and development about theory of Ki Kyung Pal Maek (奇經八脈) (기경팔맥(奇經八脈) 이론(理論)의 형성(形成)과 발전(發展)에 관한 의사학적(醫史學的) 고찰(考察))

  • Lee, Dong Ho
    • Journal of Korean Medical classics
    • /
    • v.10
    • /
    • pp.671-728
    • /
    • 1997
  • By studying from Chun Kuk are(戰國時代) to Chung area(淸代), I could find some conclusion as follows. 1. It was Chun Kuk area(戰國時代) that was shown some signs of forthcoming activity of theory of Ki Kyung Pal Maek(奇經八脈). In that time, Hwang Jae Nae Kyung(黃帝內經) had been written. That book made a important role for foundation of theory of Ki Kyung Pal Maek(奇經八脈), but it hadn't sufficient contents in some parts. 2. The theory of the Ki Kyung Pal Maek (奇經八脈) had been developed in Jin Han area(秦漢時代), Nan Kyung(難經) had been written in the area, Nan Kyung(難經) had been the first book which had referred to name and physiology of Ki Kyung Pal Maek(奇經八脈) and it also had mentioned about course, function, and pathology of that in simple manner. 3. In Yang Jin are and Su Dang area(兩晋 및 隋唐時代), Maek Kyung(脈經) and Hwang Jae Nae Kyung Tae So(黃帝內經太素) had been written Maek Kyung(脈經) had been the first book which had referred to pathology of Ki Kyung Pal Maek(奇經八脈) by Maek Jin(脈診) in detail, and it had affected on such books like Tae Pyung Seoung Hveu bang (太平聖惠方) and Ko Kum Yeu Tong Dae Chon(古今醫統大全). Hwang Jae Nae Kyung Tae So(黃帝內經太素) had mentioned about course, function, and pathology about Ki Kyung Pal Maek(奇經八脈) in most detail at that time, and it also had referred to that of such books like Myung Dang(明堂) and Ku Khoun Kyung(九卷經) which do not exist in present. Because of these point, Hwang jae Nae Kyung Tae So(黃帝內經太素) is evaluated an important book of theory of Ki Kyung Pal Maek(奇經八脈). 4. In Song area(宋代), Seung Jae Chong Rok(聖濟總錄) had been written. Seung Jae Chong Rok(聖濟總錄) first mentioned about meeting between Ki Kyung Pal Maek(奇經八脈) and Sip I Jong Kyung(十二正經), so this book helped development of theory of Ki Kyung Pal Maek(奇經八脈) of Kum Won area(金元時代). 5. In Kum Won area(金元時代), Dong In Su Hyul Chym Ku Do Kyung(銅人腧穴針灸圖經) had been written. Dong In Su Hyul Chym Ku Do Kyung(銅人腧穴針灸圖經) made a important role of theroy of Im Meak(任脈) and Dok Meank(督脈). Sip Sa Kyung Bal Hyui(十四經發揮) was superior to other books which had been referred to theory of Ki Kyung Pal Maek(奇經八脈) at that time. Also Sip Sa Kyung Bal Hyui(十四經發揮) more mentioned about meeting between Ki Kyung Pal Maek(奇經八脈) and Sip I Jong Kyung(十二正經) than that of Seung Jae Chong Rok(聖濟總錄), so this book helped dvelopment of theory of Ki Kyung Pal Maek(奇經八脈). 6. In Myung area(明代), Ki Kyung Pal Maek Ko(奇經八脈考) that had almost accomplished theory of Ki Kyung Pal Maek(奇經八脈) had been written. Ki Kyung Pal Maek Ko(奇經八脈考) was the best book more than any other book that had been mentioned about theory of Ki Kyung Pal Maek(奇經八脈) in three ways as follows. 1) It is Ki Kyung Pal Maek Ko(奇經八脈考) that mentioned about near similar manner of modern course and physiology of Ki Kyung Pal Maek(奇經八脈). 2) Ki Kyung Pal Maek Ko(奇經八脈考) mentioned about pathology and treatment of Ki Kyung Pal Maek(奇經八脈) in detail more than any other book. 3) Ki Kyung Pal Maek Ko(奇經八脈考) emphasized on relationship between Ryun Kong(鍊功) and Ki Kyung Pal Maek(奇經八脈).

  • PDF

A Geographical Study of Therapeutic Spaces after the Disaster of the MV Sewol in a Local Community (세월호 참사 이후 지역 커뮤니티에 형성된 치유의 공간에 대한 지리적 고찰)

  • Park, Sookyung
    • Journal of the Korean Geographical Society
    • /
    • v.52 no.1
    • /
    • pp.25-53
    • /
    • 2017
  • The ultimate goal of this research is to examine the geographical characteristics of therapeutic spaces where have been appeared in Wa-dong and Gojan-dong, Ansan-si after the disaster of the MV Sewol. As looking into the inside, the aim of the therapeutic spaces, which cover each target group (victims) individually, is various and different because the disaster of the MV Sewol generated various direct and indirect victims requiring healing. The therapeutic spaces are estimated at about 10 organizations and are leaded by private agents predominantly. Furthermore, the therapeutic spaces are located near, but are aside from Danwon high school where many students are reported killed and injured in the incident. And the therapeutic spaces provide simple and repetitive diversions, for example, having a meal, knitting and studying, rather than special programs to restore a broken daily life to the original state. On the basis of such a background, the geographical characteristics of the therapeutic spaces related to the disaster of the MV Sewol can be summarized as follows; first, it seems that target groups accept the therapeutic spaces as the concept of place gradually. Even though most of the therapeutic spaces were suggested by third parties at first, target groups are involved in the management and recollection of their own therapeutic spaces as well as the plan for a future direction now; and consider the therapeutic spaces as exclusive properties. Second, the disaster of the MV Sewol have embedded collective trauma to not only direct victims, but extensive groups such as parents, brothers and sisters, relatives, friends and neighbors as noted earlier. Therefore, the therapeutic spaces support comprehensive target groups; but each therapeutic space is not overlapped each other. However, to solve collective trauma in a local community effectively, the therapeutic spaces are networked closely and build a regular cooperative system. Third, a continuous memory is mentioned as an important point to overcome collective trauma, but some phenomena such as fatigue and conflict with neighbors, out-migrants and a faded atmosphere as time passes act as risk factors in Ansan-si. To keep a continuous memory, the therapeutic spaces attempt the recovery of local communities and devise various events, for example, cultural performances; furthermore, are closely connected with external organizations.

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Evaluation of CH4 Flux for Continuous Observation from Intertidal Flat Sediments in the Eoeun-ri, Taean-gun on the Mid-western Coast of Korea (서해안 태안 어은리 갯벌의 연속관측 메탄(CH4) 플럭스 특성 평가)

  • Lee, Jun-Ho;Rho, Kyoung Chan;Woo, Han Jun;Kang, Jeongwon;Jeong, Kap-Sik;Jang, Seok
    • Economic and Environmental Geology
    • /
    • v.48 no.2
    • /
    • pp.147-160
    • /
    • 2015
  • In 2014, on 31 August and 1 September, the emissions of $CH_4$, $CO_2$, and $O_2$ gases were measured six times using the closed chamber method from exposed tidal flat sediments in the same position relative to the low point of the tidal cycle in the Eoeun-ri, Taean-gun, on the Mid-western Coast of Korea. The concentrations of $CH_4$ in the air sample collected in the chamber were measured using gas chromatography with an EG analyzer, model GS-23, within 6 hours of collection, and the other gases were measured in real time using a multi-gas monitor. The gas emission fluxes (source (+), and sink (-)) were calculated from a simple linear regression analysis of the changes in the concentrations over time. In order to see the surrounding parameters (water content, temperature, total organic carbon, average mean size of sediments, and the temperature of the inner chamber) were measured at the study site. On the first day, across three measurements during 5 hours 20 minutes, the observed $CO_2$ flux absorption was -137.00 to $-81.73mg/m^2/hr$, and the $O_2$ absorption, measured simultaneously, was -0.03 to $0.00mg/m^2/hr$. On the second day using an identical number of measurements, the $CO_2$ absorption was -20.43 to $-2.11mg/m^2/hr$, and the $O_2$ absorption -0.18 to $-0.14mg/m^2/hr$. The $CH_4$ absorption before low tide was $-0.02mg/m^2/hr$ (first day, Pearson correlation coefficient using the SPSS statistical analysis is -0.555(n=5, p=0.332, pronounced negative linear relationship)), and $-0.15mg/m^2/hr$ (second day, -0.915(n=5, p=0.030, strong negative linear relationship)) on both measurement days. The emitted flux after low tide on both measurement days reached a minimum of $+0.00mg/m^2/hr$ (+0.713(n=5, p=0.176, linear relationship which can be almost ignored)), and a maximum of $+0.03mg/m^2/hr$ (+0.194(n=5, p=0.754, weak positive linear relationship)) after low tide. However, the absolute values of the $CH_4$ fluxes were analyzed at different times. These results suggest that rate for $CH_4$ fluxes, even the same time and area, were influenced by changes in the tidal cycle characteristics of surface sediments for understanding their correlation with these gas emissions, and surrounding parameters such as physiochemical sediments conditions.

Ensemble of Nested Dichotomies for Activity Recognition Using Accelerometer Data on Smartphone (Ensemble of Nested Dichotomies 기법을 이용한 스마트폰 가속도 센서 데이터 기반의 동작 인지)

  • Ha, Eu Tteum;Kim, Jeongmin;Ryu, Kwang Ryel
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.123-132
    • /
    • 2013
  • As the smartphones are equipped with various sensors such as the accelerometer, GPS, gravity sensor, gyros, ambient light sensor, proximity sensor, and so on, there have been many research works on making use of these sensors to create valuable applications. Human activity recognition is one such application that is motivated by various welfare applications such as the support for the elderly, measurement of calorie consumption, analysis of lifestyles, analysis of exercise patterns, and so on. One of the challenges faced when using the smartphone sensors for activity recognition is that the number of sensors used should be minimized to save the battery power. When the number of sensors used are restricted, it is difficult to realize a highly accurate activity recognizer or a classifier because it is hard to distinguish between subtly different activities relying on only limited information. The difficulty gets especially severe when the number of different activity classes to be distinguished is very large. In this paper, we show that a fairly accurate classifier can be built that can distinguish ten different activities by using only a single sensor data, i.e., the smartphone accelerometer data. The approach that we take to dealing with this ten-class problem is to use the ensemble of nested dichotomy (END) method that transforms a multi-class problem into multiple two-class problems. END builds a committee of binary classifiers in a nested fashion using a binary tree. At the root of the binary tree, the set of all the classes are split into two subsets of classes by using a binary classifier. At a child node of the tree, a subset of classes is again split into two smaller subsets by using another binary classifier. Continuing in this way, we can obtain a binary tree where each leaf node contains a single class. This binary tree can be viewed as a nested dichotomy that can make multi-class predictions. Depending on how a set of classes are split into two subsets at each node, the final tree that we obtain can be different. Since there can be some classes that are correlated, a particular tree may perform better than the others. However, we can hardly identify the best tree without deep domain knowledge. The END method copes with this problem by building multiple dichotomy trees randomly during learning, and then combining the predictions made by each tree during classification. The END method is generally known to perform well even when the base learner is unable to model complex decision boundaries As the base classifier at each node of the dichotomy, we have used another ensemble classifier called the random forest. A random forest is built by repeatedly generating a decision tree each time with a different random subset of features using a bootstrap sample. By combining bagging with random feature subset selection, a random forest enjoys the advantage of having more diverse ensemble members than a simple bagging. As an overall result, our ensemble of nested dichotomy can actually be seen as a committee of committees of decision trees that can deal with a multi-class problem with high accuracy. The ten classes of activities that we distinguish in this paper are 'Sitting', 'Standing', 'Walking', 'Running', 'Walking Uphill', 'Walking Downhill', 'Running Uphill', 'Running Downhill', 'Falling', and 'Hobbling'. The features used for classifying these activities include not only the magnitude of acceleration vector at each time point but also the maximum, the minimum, and the standard deviation of vector magnitude within a time window of the last 2 seconds, etc. For experiments to compare the performance of END with those of other methods, the accelerometer data has been collected at every 0.1 second for 2 minutes for each activity from 5 volunteers. Among these 5,900 ($=5{\times}(60{\times}2-2)/0.1$) data collected for each activity (the data for the first 2 seconds are trashed because they do not have time window data), 4,700 have been used for training and the rest for testing. Although 'Walking Uphill' is often confused with some other similar activities, END has been found to classify all of the ten activities with a fairly high accuracy of 98.4%. On the other hand, the accuracies achieved by a decision tree, a k-nearest neighbor, and a one-versus-rest support vector machine have been observed as 97.6%, 96.5%, and 97.6%, respectively.

Mitral Valvuloplasty using New Mitral Strip (Mitracon^{(R)}$) (새로운 Strip (Mitracon^{(R)}$)을 이용한 승모판막 성형술)

  • Kang, Seong-Sik;Kim, Sang-Pil;Song, Meong-Gum
    • Journal of Chest Surgery
    • /
    • v.41 no.3
    • /
    • pp.320-328
    • /
    • 2008
  • Background: Numerous surgical devices for mitral repair have been used in the past with good results. In this study we describe a simple annuloplasty technique with using a new device ($Mitracon^{(R)}$). The aim of this study was to assess its efficacy and surgical results with using $Mitracon^{(R)}$. Material and Method: From May 2003 to October 2005, 46 patients (21 women and 25 men (mean age of $51.4{\pm}17.8$ years) with mitral regurgitation from various causes were treated with either the $Mitracon^{(R)}$ (the $Mitracon^{(R)}$ group) or the Capentier Edward rigid ring (the CE group). The median follow-up duration was 18.9 months. Result: The mean grade of mitral regurgitation before and immediately after surgery in the $Mitracon^{(R)}$ group and the CE group decreased from $3.2{\pm}0.8$ to $0.6{\pm}0.7$ and $3.4{\pm}0.7$ to $0.3{\pm}0.5$, respectively. There were no significant changes in the ejection fraction either between the two groups or before and immediately after surgery. No deaths were seen in either group. Early postoperative echocardiography of all 46 patients showed only trivial mitral regurgitation or none at all. Echocardiography at a median of 18.9 months also showed no progression in mitral regurgitation. The mean grade of mitral regurgitation in the $Mitracon^{(R)}$ group at this time point decreased from $3.2{\pm}0.8$ to $0.8{\pm}0.7$ (p<0.05). The CE group also showed a similar degree of decrease from $3.4{\pm}0.7$ to $0.3{\pm}0.6$ (p<0.05). The mitral valve area in the $Mitracon^{(R)}$ group at 1 year follow-up was $3.3{\pm}0.9cm^2$. The mitral valve area in the CE group was $2.7{\pm}0.6cm^2$. The mean mitral pressure gradient in the $Mitracon^{(R)}$ group at 1 year follow-up was $3.1{\pm}1.3$ mmHg. The mean pressure gradient in the CE group was $4.5{\pm}2.1$ mmHg, although any statistical significant difference for this between the groups was not reached. Conclusion: The present study showed the described technique to be safe and effective in the intermediate term. Because long term results are unavailable, a more extensive prospective randomized multicenter trial may be warranted to determine whether this procedure should be generally applied for repair of mitral valve disease.

Interpreting Bounded Rationality in Business and Industrial Marketing Contexts: Executive Training Case Studies (집행관배훈안례연구(阐述工商业背景下的有限合理性):집행관배훈안례연구(执行官培训案例研究))

  • Woodside, Arch G.;Lai, Wen-Hsiang;Kim, Kyung-Hoon;Jung, Deuk-Keyo
    • Journal of Global Scholars of Marketing Science
    • /
    • v.19 no.3
    • /
    • pp.49-61
    • /
    • 2009
  • This article provides training exercises for executives into interpreting subroutine maps of executives' thinking in processing business and industrial marketing problems and opportunities. This study builds on premises that Schank proposes about learning and teaching including (1) learning occurs by experiencing and the best instruction offers learners opportunities to distill their knowledge and skills from interactive stories in the form of goal.based scenarios, team projects, and understanding stories from experts. Also, (2) telling does not lead to learning because learning requires action-training environments should emphasize active engagement with stories, cases, and projects. Each training case study includes executive exposure to decision system analysis (DSA). The training case requires the executive to write a "Briefing Report" of a DSA map. Instructions to the executive trainee in writing the briefing report include coverage in the briefing report of (1) details of the essence of the DSA map and (2) a statement of warnings and opportunities that the executive map reader interprets within the DSA map. The length maximum for a briefing report is 500 words-an arbitrary rule that works well in executive training programs. Following this introduction, section two of the article briefly summarizes relevant literature on how humans think within contexts in response to problems and opportunities. Section three illustrates the creation and interpreting of DSA maps using a training exercise in pricing a chemical product to different OEM (original equipment manufacturer) customers. Section four presents a training exercise in pricing decisions by a petroleum manufacturing firm. Section five presents a training exercise in marketing strategies by an office furniture distributer along with buying strategies by business customers. Each of the three training exercises is based on research into information processing and decision making of executives operating in marketing contexts. Section six concludes the article with suggestions for use of this training case and for developing additional training cases for honing executives' decision-making skills. Todd and Gigerenzer propose that humans use simple heuristics because they enable adaptive behavior by exploiting the structure of information in natural decision environments. "Simplicity is a virtue, rather than a curse". Bounded rationality theorists emphasize the centrality of Simon's proposition, "Human rational behavior is shaped by a scissors whose blades are the structure of the task environments and the computational capabilities of the actor". Gigerenzer's view is relevant to Simon's environmental blade and to the environmental structures in the three cases in this article, "The term environment, here, does not refer to a description of the total physical and biological environment, but only to that part important to an organism, given its needs and goals." The present article directs attention to research that combines reports on the structure of task environments with the use of adaptive toolbox heuristics of actors. The DSA mapping approach here concerns the match between strategy and an environment-the development and understanding of ecological rationality theory. Aspiration adaptation theory is central to this approach. Aspiration adaptation theory models decision making as a multi-goal problem without aggregation of the goals into a complete preference order over all decision alternatives. The three case studies in this article permit the learner to apply propositions in aspiration level rules in reaching a decision. Aspiration adaptation takes the form of a sequence of adjustment steps. An adjustment step shifts the current aspiration level to a neighboring point on an aspiration grid by a change in only one goal variable. An upward adjustment step is an increase and a downward adjustment step is a decrease of a goal variable. Creating and using aspiration adaptation levels is integral to bounded rationality theory. The present article increases understanding and expertise of both aspiration adaptation and bounded rationality theories by providing learner experiences and practice in using propositions in both theories. Practice in ranking CTSs and writing TOP gists from DSA maps serves to clarify and deepen Selten's view, "Clearly, aspiration adaptation must enter the picture as an integrated part of the search for a solution." The body of "direct research" by Mintzberg, Gladwin's ethnographic decision tree modeling, and Huff's work on mapping strategic thought are suggestions on where to look for research that considers both the structure of the environment and the computational capabilities of the actors making decisions in these environments. Such research on bounded rationality permits both further development of theory in how and why decisions are made in real life and the development of learning exercises in the use of heuristics occurring in natural environments. The exercises in the present article encourage learning skills and principles of using fast and frugal heuristics in contexts of their intended use. The exercises respond to Schank's wisdom, "In a deep sense, education isn't about knowledge or getting students to know what has happened. It is about getting them to feel what has happened. This is not easy to do. Education, as it is in schools today, is emotionless. This is a huge problem." The three cases and accompanying set of exercise questions adhere to Schank's view, "Processes are best taught by actually engaging in them, which can often mean, for mental processing, active discussion."

  • PDF