• Title/Summary/Keyword: Address time

Search Result 1,642, Processing Time 0.029 seconds

The Effect of Rain on Traffic Flows in Urban Freeway Basic Segments (기상조건에 따른 도시고속도로 교통류변화 분석)

  • 최정순;손봉수;최재성
    • Journal of Korean Society of Transportation
    • /
    • v.17 no.1
    • /
    • pp.29-39
    • /
    • 1999
  • An earlier study of the effect of rain found that the capacity of freeway systems was reduced, but did not address the effects of rain on the nature of traffic flows. Indeed, the substantial variation due to the intensity of adverse weather conditions is entirely rational so that its effects must be considered in freeway facility design. However, all of the data in Highway Capacity Manual(HCM) have come from ideal conditions. The primary objective of this study is to investigate the effect of rain on urban freeway traffic flows in Seoul. To do so, the relations between three key traffic variables(flow rates, speed, occupancy), their threshold values between congested and uncontested traffic flow regimes, and speed distribution were investigated. The traffic data from Olympic Expressway in Seoul were obtained from Imagine Detection System (Autoscope) with 30 seconds and 1 minute time periods. The slope of the regression line relating flow to occupancy in the uncongested regime decreases when it is raining. In essence, this result indicates that the average service flow rate (it may be interpreted as a capacity of freeway) is reduced as weather conditions deteriorate. The reduction is in the range between 10 and 20%, which agrees with the range proposed by 1994 US HCM. It is noteworthy that the service flow rates of inner lanes are relatively higher than those of other lanes. The average speed is also reduced in rainy day, but the flow-speed relationship and the threshold values of speed and occupancy (these are called critical speed and critical occupancy) are not very sensitive to the weather conditions.

  • PDF

Analysis of Behavioral Characteristics by Park Types Displayed in 3rd Generation SNS (제3세대 SNS에 표출된 공원 유형별 이용 특성 분석)

  • Kim, Ji-Eun;Park, Chan;Kim, Ah-Yeon;Kim, Ho Gul
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.47 no.2
    • /
    • pp.49-58
    • /
    • 2019
  • There have been studies on the satisfaction, preference, and post occupancy evaluation of urban parks in order to reflect users' preferences and activities, suggesting directions for future park planning and management. Despite using questionnaires that are proven to be affective to get users' opinions directly, there haven been limitations in understanding the latest changes in park use through questionnaires. This study seeks to address the possibility of utilizing the thirdgeneration SNS data, Instagram and Google, to compare behavior patterns and trends in park activities. Instagram keywords and photos representing user's feelings with a specific park name were collected. We also examined reviews, peak time, and popular time zones regarding selected parks through Google. This study tries to analyze users' behaviors, emerging activities, and satisfaction using SNS data. The findings are as follows. People using park near residential areas tend to enjoy programs being operated in indoor facilities and to like to use picnic places. In an adjacent park of commercial areas, eating in the park and extended areas beyond the park boundaries is found to be one of the popular park activities. Programs using open spaces and indoor facilities were active as well. Han River Park as a detached park type offers a popular venue for excercises and scenery appreciation. We also identified companionship characteristics of different park types from texts and photos, and extracted keywords of feelings and reviews about parks posted in $3^{rd}$ generation SNS. SNS data can provide basis to grasp behavioral patterns and satisfaction factors, and changes of park activities in real time. SNS data also can be used to set future directions in park planning and management in accordance with new technologies and policies.

Analysis of Interactions in Multiple Genes using IFSA(Independent Feature Subspace Analysis) (IFSA 알고리즘을 이용한 유전자 상호 관계 분석)

  • Kim, Hye-Jin;Choi, Seung-Jin;Bang, Sung-Yang
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.3
    • /
    • pp.157-165
    • /
    • 2006
  • The change of external/internal factors of the cell rquires specific biological functions to maintain life. Such functions encourage particular genes to jnteract/regulate each other in multiple ways. Accordingly, we applied a linear decomposition model IFSA, which derives hidden variables, called the 'expression mode' that corresponds to the functions. To interpret gene interaction/regulation, we used a cross-correlation method given an expression mode. Linear decomposition models such as principal component analysis (PCA) and independent component analysis (ICA) were shown to be useful in analyzing high dimensional DNA microarray data, compared to clustering methods. These methods assume that gene expression is controlled by a linear combination of uncorrelated/indepdendent latent variables. However these methods have some difficulty in grouping similar patterns which are slightly time-delayed or asymmetric since only exactly matched Patterns are considered. In order to overcome this, we employ the (IFSA) method of [1] to locate phase- and shut-invariant features. Membership scoring functions play an important role to classify genes since linear decomposition models basically aim at data reduction not but at grouping data. We address a new function essential to the IFSA method. In this paper we stress that IFSA is useful in grouping functionally-related genes in the presence of time-shift and expression phase variance. Ultimately, we propose a new approach to investigate the multiple interaction information of genes.

Flipped Learning in Socioscientific Issues Instruction: Its Impact on Middle School Students' Key Competencies and Character Development as Citizens (플립러닝 기반 SSI 수업이 중학생의 과학기술 사회 시민으로서의 역량 및 인성 함양에 미치는 효과)

  • Park, Donghwa;Ko, Yeonjoo;Lee, Hyunju
    • Journal of The Korean Association For Science Education
    • /
    • v.38 no.4
    • /
    • pp.467-480
    • /
    • 2018
  • This study aims to investigate how flipped learning-based socioscientific issue instruction (FL-SSI instruction) affected middle school students' key competencies and character development. Traditional classrooms are constrained in terms of time and resources for exploring the issues and making decision on SSI. To address these concerns, we designed and implemented an SSI instruction adopting flipped learning. Seventy-three 8th graders participated in an SSI program on four topics for over 12 class periods. Two questionnaires were used as a main data source to measure students' key competencies and character development before and after the SSI instruction. In addition, student responses and shared experience from focus group interviews after the instruction were collected and analyzed. The results indicate that the students significantly improved their key competencies and experienced character development after the SSI instruction. The students presented statistically significant improvement in the key competencies (i.e., collaboration, information and technology, critical thinking and problem-solving, and communication skills) and in two out of three factors in character and values as global citizens (social and moral compassion, and socio-scientific accountability). Interview data supports the quantitative results indicating that SSI instruction with a flipped learning strategy provided students in-depth and rich learning opportunities. The students responded that watching web-based videos prior to class enabled them to deeply understand the issue and actively engage in discussion and debate once class began. Furthermore, the resulting gains in available class time deriving from a flipped learning approach allowed the students to examine the issue from diverse perspectives.

A Study on processing of medicinal on medical books of before Han(漢)dynasty (한대(漢代) 이전의 의적(醫籍)을 통한 '포제(炮制)'의 연구)

  • Kim, Sung-Cheol;Ha, Hong-Ki;Kim, Ki-Wook
    • Journal of Korean Medical classics
    • /
    • v.24 no.4
    • /
    • pp.157-174
    • /
    • 2011
  • We derived following result by organizing research about processing of medicinal of before Han(漢) dynesty. The human being intake of natural substance for the purpose of treatment was what happened later than the use of natural substance as food. According to the record of by the early years of Shang(商) dynasty, we can assume that we cooked food with water and fire. The reason why there is no appearance of common production that can be included under the name of 'Tang Ye(湯液)' in the medical record discovered from Ma Wang Dui(馬王堆) is because 'Tang Ye' was yet developed. However, as the presentation of format of medicine process, there was gradual formation of medicinal fluid concept. There are quite of records on major details of cloth manufacture like washing and selection, grinding, processing of medicine from the recordings of "Wu Shi Er Bing Fang(五十二病方)", "Yang Sheng Fang(養生方)", "Za Liao Fang(雜療方)" discovered at Ma Wang Dui. It used words like 'Ze(擇)', 'Qu(去)' for the selection and 'Jiu(酒)', 'Zhuo(濯)' for the wash as a process method before cloth manufacture. When filter the processed medicine, it used words like 'Zhuo(捉)', 'Suo(索)', 'Jun(浚)' and used 'Yin Gan(陰乾)', 'Bao(暴)', 'Yang(暘)' for dry. The 'cutting(切削)' that crushes the medicine used different names based on the properties of medicines. The most frequent crush is 'Ye(冶)' and it means the powered medicine after dry. There was thermal process of mild fire(微火) and heating of 'Wen(溫)'. There are many states of medicine seen from the medical record discovered at Ma Wang Dui so they can be said as original medicine. 藥末劑 is relatively commercialized type then. Here, it includes later 湯劑 but there was no name such as 'decoction(湯)' or 'decoction of medical ingredients(湯液)'. Also, 'Fu Ju(㕮咀)' is the transformation of what was 'Fu Qie(父且)' at "Ja Liao Fang" of medical books of Ma Wang Dui with time flow. The original meaning of 'Fu Qie(父且)' is 'Fu Zu(斧俎)' and it means the crushing medicine with axe. The most important thing among the medical books of Han dynasty is "Shen Nong Ben Cao Jing(神農本草經)" and "Shang Han Za Bing Lun(傷寒雜病論)" of Zhang Zhong Jing(張仲景). "Shen Nong Ben Cao Jing" mentioned the dry method of medicine, collection and process production time, cooked and uncooked use of medicine and there are several types of medicine. Other than those, it mentioned 'Seven methods of combining herbs(七情合和)' to address cautions for combining medicines. Therefore, the 'processing of medicinal' in east Han dynasty period entered the theoretical step. However, there is only little recording on cloth manufacture of detailed medicine. From the "Shang Han Za Bing Lun" of Zhang Zhong Jing, the development in the way of 'processing of medicinal' reveled the cloth manufacture for each medicine. This tradition is continued until today and so it presents the development of purpose of 'processing of medicinal' is to greatly present the effect of medicine and to reduce the side-effect.

Self-Tour Service Technology based on a Smartphone (스마트 폰 기반 Self-Tour 서비스 기술 연구)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.4
    • /
    • pp.147-157
    • /
    • 2010
  • With the immergence of the iPhone, the interest in Smartphones is getting higher as services can be provided directly between service providers and consumers without the network operators. As the number of international tourists increase, individual tourists are also increasing. According to the WTO's (World Tourism Organization) prediction, the number of international tourists will be 1.56 billion in 2020,and the average growth rate will be 4.1% a year. Chinese tourists, in particular, are increasing rapidly and about 100 million will travel the world in 2020. In 2009, about 7.8 million foreign tourists visited Korea and the Ministry of Culture, Sports and Tourism is trying to attract 12 million foreign tourists in 2014. A research institute carried out a survey targeting foreign tourists and the survey results showed that they felt uncomfortable with communication (about 55.8%) and directional signs (about 21.4%) when they traveled in Korea. To solve this inconvenience for foreign tourists, multilingual servicesfor traffic signs, tour information, shopping information and so forth should be enhanced. The appearance of the Smartphone comes just in time to provide a new service to address these inconveniences. Smartphones are especially useful because every Smartphone has GPS (Global Positioning System) that can provide users' location to the system, making it possible to provide location-based services. For improvement of tourists' convenience, Seoul Metropolitan Government hasinitiated the u-tour service using Kiosks and Smartphones, and several Province Governments have started the u-tourpia project using RFID (Radio Frequency IDentification) and an exclusive device. Even though the u-tour or u-tourpia service used the Smartphone and RFID, the tourist should know the location of the Kiosks and have previous information. So, this service did not give the solution yet. In this paper, I developed a new convenient service which can provide location based information for the individual tourists using GPS, WiFi, and 3G. The service was tested at Insa-dong in Seoul, and the service can provide tour information around the tourist using a push service without user selection. This self-tour service is designed for providing a travel guide service for foreign travelers from the airport to their destination and information about tourist attractions. The system reduced information traffic by constraining receipt of information to tourist themes and locations within a 20m or 40m radius of the device. In this case, service providers can provide targeted, just-in-time services to special customers by sending desired information. For evaluating the implemented system, the contents of 40 gift shops and traditional restaurants in Insa-dong are stored in the CMS (Content Management System). The service program shows a map displaying the current location of the tourist and displays a circle which shows the range to get the tourist information. If there is information for the tourist within range, the information viewer is activated. If there is only a single resultto display, the information viewer pops up directly, and if there are several results, the viewer shows a list of the contents and the user can choose content manually. As aresult, the proposed system can provide location-based tourist information to tourists without previous knowledge of the area. Currently, the GPS has a margin of error (about 10~20m) and this leads the location and information errors. However, because our Government is planning to provide DGPS (Differential GPS) information by DMB (Digital Multimedia Broadcasting) this error will be reduced to within 1m.

Participation Level in Online Knowledge Sharing: Behavioral Approach on Wikipedia (온라인 지식공유의 참여정도: 위키피디아에 대한 행태적 접근)

  • Park, Hyun Jung;Lee, Hong Joo;Kim, Jong Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.97-121
    • /
    • 2013
  • With the growing importance of knowledge for sustainable competitive advantages and innovation in a volatile environment, many researches on knowledge sharing have been conducted. However, previous researches have mostly relied on the questionnaire survey which has inherent perceptive errors of respondents. The current research has drawn the relationship among primary participant behaviors towards the participation level in knowledge sharing, basically from online user behaviors on Wikipedia, a representative community for online knowledge collaboration. Without users' participation in knowledge sharing, knowledge collaboration for creating knowledge cannot be successful. By the way, the editing patterns of Wikipedia users are diverse, resulting in different revisiting periods for the same number of edits, and thus varying results of shared knowledge. Therefore, we illuminated the participation level of knowledge sharing from two different angles of number of edits and revisiting period. The behavioral dimensions affecting the level of participation in knowledge sharing includes the article talk for public discussion and user talk for private messaging, and community registration, which are observable on Wiki platform. Public discussion is being progressed on article talk pages arranged for exchanging ideas about each article topic. An article talk page is often divided into several sections which mainly address specific type of issues raised during the article development procedure. From the diverse opinions about the relatively trivial things such as what text, link, or images should be added or removed and how they should be restructured to the profound professional insights are shared, negotiated, and improved over the course of discussion. Wikipedia also provides personal user talk pages as a private messaging tool. On these pages, diverse personal messages such as casual greetings, stories about activities on Wikipedia, and ordinary affairs of life are exchanged. If anyone wants to communicate with another person, he or she visits the person's user talk page and leaves a message. Wikipedia articles are assessed according to seven quality grades, of which the featured article level is the highest. The dataset includes participants' behavioral data related with 2,978 articles, which have reached the featured article level, with editing histories of articles, their article talk histories, and user talk histories extracted from user talk pages for each article. The time period for analysis is from the initiation of articles until their promotion to the featured article level. The number of edits represents the total number of participation in the editing of an article, and the revisiting period is the time difference between the first and last edits. At first, the participation levels of each user category classified according to behavioral dimensions have been analyzed and compared. And then, robust regressions have been conducted on the relationships among independent variables reflecting the degree of behavioral characteristics and the dependent variable representing the participation level. Especially, through adopting a motivational theory adequate for online environment in setting up research hypotheses, this work suggests a theoretical framework for the participation level of online knowledge sharing. Consequently, this work reached the following practical behavioral results besides some theoretical implications. First, both public discussion and private messaging positively affect the participation level in knowledge sharing. Second, public discussion exerts greater influence than private messaging on the participation level. Third, a synergy effect of public discussion and private messaging on the number of edits was found, whereas a pretty weak negative interaction effect of them on the revisiting period was observed. Fourth, community registration has a significant impact on the revisiting period, whereas being insignificant on the number of edits. Fifth, when it comes to the relation generated from private messaging, the frequency or depth of relation is shown to be more critical than the scope of relation for the participation level.

Comparison of Anisotropic Analytic Algorithm Plan and Acuros XB Plan for Lung Stereotactic Ablative Radiotherapy Using Flattening Filter-Free Beams (비편평화여과기 빔을 이용한 폐 정위절제방사선치료를 위한 AAA와 Acuros XB 계산 알고리즘의 치료계획 비교)

  • Chung, Jin-Beom;Eom, Keun-Yong;Kim, In-Ah;Kim, Jae-Sung;Lee, Jeong-Woo;Hong, Semie;Kim, Yon-Lae;Park, Byung-Moon;Kang, Sang-Won;Suh, Tae-Suk
    • Progress in Medical Physics
    • /
    • v.25 no.4
    • /
    • pp.210-217
    • /
    • 2014
  • This study investigated the dosimetric effects of different dose calculation algorithm for lung stereotactic ablative radiotherapy (SABR) using flattening filter-free (FFF) beams. A total of 10 patients with lung cancer who were treated with SABR were evaluated. All treatment plans were created using an Acuros XB (AXB) of an Eclipse treatment planning system. An additional plans for comparison of different alagorithm recalcuated with anisotropic analytic algorithm (AAA) algorithm. To address both algorithms, the cumulative dose-volume histogram (DVH) was analyzed for the planning target volume (PTV) and organs at risk (OARs). Technical parameters, such as the computation times and total monitor units (MUs), were also evaluated. A comparison analysis of DVHs from these plans revealed the PTV for AXB estimated a higher maximum dose (5.2%) and lower minimum dose (4.2%) than that of the AAA. The highest dose difference observed 7.06% for the PTV $V_{105%}$. The maximum dose to the lung was also slightly larger in the AXB plans. The percentate volumes of the ipsilateral lung ($V_5$, $V_{10}$, $V_{20}$) receiving 5, 10, and 20 Gy were also larger in AXB plans than for AAA plans. However, these parameters were comparable between both AAA and AXB plans for the contralateral lung. The differences of the maximum dose for the spinal cord and heart were also small. The computation time of AXB plans was 13.7% shorter than that of AAA plans. The average MUs were 3.47% larger for AXB plans than for AAA plans. The results of this study suggest that AXB algorithm can provide advantages such as accurate dose calculations and reduced computation time in lung SABR plan using FFF beams, especially for volumetric modulated arc therapy technique.

A Meta Analysis of Using Structural Equation Model on the Korean MIS Research (국내 MIS 연구에서 구조방정식모형 활용에 관한 메타분석)

  • Kim, Jong-Ki;Jeon, Jin-Hwan
    • Asia pacific journal of information systems
    • /
    • v.19 no.4
    • /
    • pp.47-75
    • /
    • 2009
  • Recently, researches on Management Information Systems (MIS) have laid out theoretical foundation and academic paradigms by introducing diverse theories, themes, and methodologies. Especially, academic paradigms of MIS encourage a user-friendly approach by developing the technologies from the users' perspectives, which reflects the existence of strong causal relationships between information systems and user's behavior. As in other areas in social science the use of structural equation modeling (SEM) has rapidly increased in recent years especially in the MIS area. The SEM technique is important because it provides powerful ways to address key IS research problems. It also has a unique ability to simultaneously examine a series of casual relationships while analyzing multiple independent and dependent variables all at the same time. In spite of providing many benefits to the MIS researchers, there are some potential pitfalls with the analytical technique. The research objective of this study is to provide some guidelines for an appropriate use of SEM based on the assessment of current practice of using SEM in the MIS research. This study focuses on several statistical issues related to the use of SEM in the MIS research. Selected articles are assessed in three parts through the meta analysis. The first part is related to the initial specification of theoretical model of interest. The second is about data screening prior to model estimation and testing. And the last part concerns estimation and testing of theoretical models based on empirical data. This study reviewed the use of SEM in 164 empirical research articles published in four major MIS journals in Korea (APJIS, ISR, JIS and JITAM) from 1991 to 2007. APJIS, ISR, JIS and JITAM accounted for 73, 17, 58, and 16 of the total number of applications, respectively. The number of published applications has been increased over time. LISREL was the most frequently used SEM software among MIS researchers (97 studies (59.15%)), followed by AMOS (45 studies (27.44%)). In the first part, regarding issues related to the initial specification of theoretical model of interest, all of the studies have used cross-sectional data. The studies that use cross-sectional data may be able to better explain their structural model as a set of relationships. Most of SEM studies, meanwhile, have employed. confirmatory-type analysis (146 articles (89%)). For the model specification issue about model formulation, 159 (96.9%) of the studies were the full structural equation model. For only 5 researches, SEM was used for the measurement model with a set of observed variables. The average sample size for all models was 365.41, with some models retaining a sample as small as 50 and as large as 500. The second part of the issue is related to data screening prior to model estimation and testing. Data screening is important for researchers particularly in defining how they deal with missing values. Overall, discussion of data screening was reported in 118 (71.95%) of the studies while there was no study discussing evidence of multivariate normality for the models. On the third part, issues related to the estimation and testing of theoretical models on empirical data, assessing model fit is one of most important issues because it provides adequate statistical power for research models. There were multiple fit indices used in the SEM applications. The test was reported in the most of studies (146 (89%)), whereas normed-test was reported less frequently (65 studies (39.64%)). It is important that normed- of 3 or lower is required for adequate model fit. The most popular model fit indices were GFI (109 (66.46%)), AGFI (84 (51.22%)), NFI (44 (47.56%)), RMR (42 (25.61%)), CFI (59 (35.98%)), RMSEA (62 (37.80)), and NNFI (48 (29.27%)). Regarding the test of construct validity, convergent validity has been examined in 109 studies (66.46%) and discriminant validity in 98 (59.76%). 81 studies (49.39%) have reported the average variance extracted (AVE). However, there was little discussion of direct (47 (28.66%)), indirect, and total effect in the SEM models. Based on these findings, we suggest general guidelines for the use of SEM and propose some recommendations on concerning issues of latent variables models, raw data, sample size, data screening, reporting parameter estimated, model fit statistics, multivariate normality, confirmatory factor analysis, reliabilities and the decomposition of effects.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.