• Title/Summary/Keyword: 중복 분석

Search Result 1,453, Processing Time 0.027 seconds

The Analysis of Duplicated Contents and Sequence between Science and Technology·Home Economics Curricular and Textbooks in Middle School about 'Digestion' and 'Energy' (중학교 과학 및 기술·가정 교과의 교육과정과 교과서에 제시된 소화와 에너지 단원의 내용 중복 및 연계성 분석)

  • Sim, Wangseop;Lee, Hyundong;Park, Kyungsuk
    • Journal of Science Education
    • /
    • v.41 no.1
    • /
    • pp.1-15
    • /
    • 2017
  • The purpose of this study was to deduct implications for national curriculum and textbook by analysing the duplicated contents and sequence between science and technology home economics subjects of the 2009 revised middle school curriculum. For duplication analysis, overlapped achievement standards and themes were examined by comparing the science and technology home economics curricular. Next, analysis of duplicated concepts is performed by comparing science and technology home economics textbooks through the concept map. The result of analyses of the achievement standards showed 4 standards related with 'digestion', 'energy' were duplicated. The other results of studying duplicated contents in textbooks suggested overlapped concepts(terms) were existed as following: digestion(22 contents), Energy(9 contents). In science textbook, the duplicated concept is usually described in detail. In contrast, the technology home economics textbook explain the duplicated concept briefly with providing various type of examples and cases. There are differences of using terminology between two subject textbooks. The findings of this study may provide educational insights into teaching of the duplicated contents between science and technology home economics.

Constructing Algorithm of Edge-Disjoint Spanning Trees in Even Interconnection Network Ed (이븐 연결망 Ed의 에지 중복 없는 스패닝 트리를 구성하는 알고리즘)

  • Kim, Jong-Seok;Kim, Sung-Won
    • The KIPS Transactions:PartA
    • /
    • v.17A no.3
    • /
    • pp.113-120
    • /
    • 2010
  • Even networks were introduced as a class of fault-tolerant multiprocessor networks and analyzed so many useful properties and algorithms such as simple routing algorithms, maximal fault tolerance, node disjoint path. Introduced routing algorithms and node disjoint path algorithms are proven to be optimal. However, it has not been introduced to constructing scheme for edge-disjoint spanning trees in even networks. The design of edge-disjoint spanning trees is a useful scheme to analyze for measuring the efficiency of fault tolerant of interconnection network and effective broadcasting. Introduced routing algorithm or node disjoint path algorithm are for the purpose of routing or node disjoint path hence they are not applicable to constitute edge disjoint spanning tree. In this paper, we show a construction algorithm of edge-disjoint spanning trees in even network $E_d$.

Analyzing Coverage and Coverage Overlap of Korean Web Directories (국내 웹 디렉토리들의 커버리지 및 커버리지 중복성 분석)

  • 배희진;이진숙;이준호;박소연
    • Journal of the Korean Society for information Management
    • /
    • v.21 no.1
    • /
    • pp.173-186
    • /
    • 2004
  • This study examines coverage and coverage overlap of the three major Korean web directories, Naver, Yahoo Korea, and Empas. This study also suggests a methodology for collecting and processing web sites provided by these web directories. A method for napping main categories was developed. Each directory provided registered web pages in a slightly different way. Reference links had a significant influence on the coverage of each web directory. The overlap of pages among three directories was quite low, It is expected that this study could contribute to the field of web research by providing insights to how directories provide web pages and suggesting a methodology for the analysis of directory coverage.

A Study on the Performance Improvement with Subband Overlapping Variation for Overlapped Multicarrier DS-CDMA Systems (중복된 멀티캐리어 DS-CDMA 시스템의 서브밴드 중복율 변화에 따른 성능개선에 관한 연구)

  • O, Jeong-Heon;Park, Gwang-Cheol;Kim, Gi-Du
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.9
    • /
    • pp.11-23
    • /
    • 2000
  • Multicarrier DS-CDMA is an effective approach to realize wideband CDMA system in a multipath fading channel. In this paper, we propose a convolutionally-coded overlapped multicarrier DS-CDMA system, and analyze the performance with subband overlapping variation to determine the overlapping percentage showing best performance. Given a total number of subcarriers M*R, we will show that the BER variation is highly dependent on the rolloff factor P of raised-cosine chip wave-shaping filter irrespective of convolutional encoding rate I/M and repetition coding rate 1/R. We also analyze the possibility of reduction in total MUI by considering both variation of a rolloff factor (0 ($\beta$ :1) and variation of subband overlapping factor (0 ( A :2), and show that the proposed system may outperform the multicarrier DS-CDMA system in [1, 12].

  • PDF

System Optimization Technique using Crosscutting Concern (크로스커팅 개념을 이용한 시스템 최적화 기법)

  • Lee, Seunghyung;Yoo, Hyun
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.181-186
    • /
    • 2017
  • The system optimization is a technique that changes the structure of the program in order to extract the duplicated modules without changing the source code, reuse of the extracted module. Structure-oriented development and object-oriented development are efficient at crosscutting concern modular, however can't be modular of crosscutting concept. To apply the crosscutting concept in an existing system, there is a need to a extracting technique for distributed system optimization module within the system. This paper proposes a method for extracting the redundant modules in the completed system. The proposed method extracts elements that overlap over a source code analysis to analyze the data dependency and control dependency. The extracted redundant element is used to program dependency analysis for the system optimization. Duplicated dependency analysis result is converted into a control flow graph, it is possible to produce a minimum crosscutting module. The element extracted by dependency analysis proposes a system optimization method which minimizes the duplicated code within system by setting the crosscutting concern module.

Spark-based Distributed and Parallel DNA Deduplication Method (Spark 기반의 분산 병렬 DNA 중복제거 방법)

  • Moon, Jihye;Lee, Hyeonbyeong;Song, Seokil
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2017.05a
    • /
    • pp.313-314
    • /
    • 2017
  • 이 논문에서는 DNA 분석단계 중 하나인 DNA 리드(Read)에 대한 중복제거 방법을 분산 병렬처리 기법을 적용하여 가속화하는 방법을 제안한다. 기존 제안된 중복제거 기법을 Spark을 기반으로 병렬처리 되도록 하는 접근방법을 취한다. 제안하는 기법은 실험을 통해서 기존 중복제거 기법과 비교하여 성능을 입증한다.

  • PDF

Victimization, Psychological Adaptation, and Delinquency among Adolescents (청소년의 폭력피해경험과 심리적 적응 및 비행문제)

  • Kim, Youngmi
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.1
    • /
    • pp.470-481
    • /
    • 2016
  • The purpose of this study is to identify the actual condition of poly-victimization and examine the difference in the levels of psychological adaptation and delinquency by victimization types among adolescents. A total 6,174 cases from '2013 Adolescent Deviant Behaviors and Policy Issues' of NYPI was used for the analysis. Main findings are that 8.3% of adolescents exposed to more than two types of victimization and 2.1% of them experienced more than three types of victimization. There were significant differences in the levels of psychological adaptation and delinquency by victimization types. Study findings were discussed in terms of implications for research and intervention of adolescent poly-victimization.

Education Content of Department of Dental Hygiene andActual Condition of the Overlapping Analytic Syllabus (치위생과 교육내용 및 교수요목 중복실태 분석)

  • Park, Myung-Suk;Kim, Chang-Hee
    • Journal of dental hygiene science
    • /
    • v.7 no.1
    • /
    • pp.49-54
    • /
    • 2007
  • This research was conducted to provide standardization method for new dental hygiene curriculum by identifying the overlapping of education content of the Department of Dental Hygiene and analytic syllabus. To complement these overlapping education programs, I would like to make some proposals. First, unified course shall be provided by compromising specific terms of overlapping subject, overlapping curriculums for the necessary skills required for job analysis of dental hygienist and overlapping class time. This shall increase the efficiency the class time and required curriculums. Next, proactive and continuos research for standardized approach to the Department of Dental Hygiene education content is necessary and Dental Hygiene academic circle shall build trust.

  • PDF

Evaluation of the Redundancy in Decoy Database Generation for Tandem Mass Analysis (탠덤 질량 분석을 위한 디코이 데이터베이스 생성 방법의 중복성 관점에서의 성능 평가)

  • Li, Honglan;Liu, Duanhui;Lee, Kiwook;Hwang, Kyu-Baek
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.1
    • /
    • pp.56-60
    • /
    • 2016
  • Peptide identification in tandem mass spectrometry is usually done by searching the spectra against target databases consisting of reference protein sequences. To control false discovery rates for high-confidence peptide identification, spectra are also searched against decoy databases constructed by permuting reference protein sequences. In this case, a peptide of the same sequence could be included in both the target and the decoy databases or multiple entries of a same peptide could exist in the decoy database. These phenomena make the protein identification problem complicated. Thus, it is important to minimize the number of such redundant peptides for accurate protein identification. In this regard, we examined two popular methods for decoy database generation: 'pseudo-shuffling' and 'pseudo-reversing'. We experimented with target databases of varying sizes and investigated the effect of the maximum number of missed cleavage sites allowed in a peptide (MC), which is one of the parameters for target and decoy database generation. In our experiments, the level of redundancy in decoy databases was proportional to the target database size and the value of MC, due to the increase in the number of short peptides (7 to 10 AA). Moreover, 'pseudo-reversing' always generated decoy databases with lower levels of redundancy compared to 'pseudo-shuffling'.

Adolescents' Experiences with Traditional and Cyber-bullying Victimization as Risk Factors for Suicide Attempts: The Parent-Child Positive Communication (TSL communication) as a Moderator (청소년의 온라인·오프라인 중복학교폭력피해 경험이 자살 행동에 미치는 영향: 부모-자녀 간 긍정적 의사소통(TSL)의 조절효과 검증)

  • Kim Jaeyop;Choi Yoonhee;Jang Daeyeon
    • Journal of School Social Work
    • /
    • v.45
    • /
    • pp.107-133
    • /
    • 2019
  • Cyber-bullying victimization has been on the rise among adolescents while traditional bullying victimization is still a significant problem. However, less is known regarding the overlap between traditional and cyber-bullying victimization. The first aim of this study is to examine the effect of adolescents' experience of traditional and cyber-bullying on suicidal behavior. The second aim is to verify the moderational effect of parent-child positive communication between each type of school victimization and suicidal behavior. Data came from 2,154 adolescents (14-18 years old) attending 13 schools from nationwide in South Korea. The main findings are as follows: First, the number of the traditional bullying victims was 554 (25.7%), the cyber-bullying victims 17 (0.8%), and the victims who experienced both 123 (5.7%). Second, the degree of suicidal behavior was the highest among the victims who experienced the overlap between traditional and cyber-bullying. Third, parent-child positive communication (TSL) worked as a moderator between the school bullying victimization and suicidal behavior among overlap bullying experienced group. Policy and practice implications were suggested based on these results.