• Title/Summary/Keyword: Context Acquisition

Search Result 136, Processing Time 0.036 seconds

An Analysis of Fields and Scientific Literacy Content Elements of Scientific Reports in a Popular Portal Site in Korea (국내 포탈사이트 과학 기사 분야와 과학적 소양 내용 요소 분석)

  • Lee, Myeong-Je
    • Journal of Korean Elementary Science Education
    • /
    • v.34 no.3
    • /
    • pp.338-345
    • /
    • 2015
  • The purpose of this study is to analyze science fields and content elements of the science reports in a web portal site of Republic of Korea in view of scientific literacy. The main results of the analysis on the 679 reports sampled in a year are as follows. First, 506 reports in 46 fields were identified. Reports about technology and earth science occupies 16% respectively, and life science occupies 13%, medical science 4%, chemistry, company, others 3% and physics 1%. Almost reports show technology as associate field. Second, the frequency rate of reports including scientific literacy content elements is 52%. Reports related to 'physics' and 'chemistry' as dominant fields show relatively high rate in scientific literacy elements. The element, 'social context' is included in about 96% of the reports. Both 'data and statistics' and 'application' show relatively low rate and large gaps according to dominant fields. A few concluding remarks and proposals follow from these results. First, as almost science reports show the nature of integrated science, scientific literacy acquisition through science reports in internet requires the integrated scientific view. Especially most science reports includes the contents related to technology or medical science, so the point of view in the science-technological literacy is required. Second, the scientific literacy content elements in reports show various rates according to dominant fields. Therefore, science reports need to complement the deficient content elements to carry out the role of science reports as scientific literacy sources.

Analysis of Trend Survey on Overseas e-Learning Quality Assurance (해외 이러닝 품질관리 동향 조사 분석)

  • Kim, Ja-Mee;Kim, Chang-Soo;Lee, Won-Gyu
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.449-458
    • /
    • 2010
  • The e-Learning quality assurance is a part of responsibility for education in latest information age, and should be understood as a basic direction for qualitative enhancement rather than quantifiable expansion. In such a context, this study sought to survey latest trends of e-Learning quality assurance activities deployed around overseas countries, so that it could give possible implications on how to plan and perform e-Learning quality assurance in Korea. So, this study focused on surveying actual conditions, coverage, target and useful indices of e-Learning quality assurance activities deployed by 9 institutions across 5 countries, and characterizing those activities across 5 countries. As a result, this study could find out its implications such as acquisition of various resources available for e-Learning, nationwide consolidation of e-Learning quality assurance activities, development of specialists in e-Learning quality assurance, and choice and focus for e-Learning quality assurance system. In other words, it was found that e-Learning quality assurance should be approached from nationwide standpoint in the interest of better educational quality, rather than from viewpoint of task.

Current status of simulation training in plastic surgery residency programs: A review

  • Thomson, Jennifer E.;Poudrier, Grace;Stranix, John T.;Motosko, Catherine C.;Hazen, Alexes
    • Archives of Plastic Surgery
    • /
    • v.45 no.5
    • /
    • pp.395-402
    • /
    • 2018
  • Increased emphasis on competency-based learning modules and widespread departure from traditional models of Halstedian apprenticeship have made surgical simulation an increasingly appealing component of medical education. Surgical simulators are available in numerous modalities, including virtual, synthetic, animal, and non-living models. The ideal surgical simulator would facilitate the acquisition and refinement of surgical skills prior to clinical application, by mimicking the size, color, texture, recoil, and environment of the operating room. Simulation training has proven helpful for advancing specific surgical skills and techniques, aiding in early and late resident learning curves. In this review, the current applications and potential benefits of incorporating simulation-based surgical training into residency curriculum are explored in depth, specifically in the context of plastic surgery. Despite the prevalence of simulation-based training models, there is a paucity of research on integration into resident programs. Current curriculums emphasize the ability to identify anatomical landmarks and procedural steps through virtual simulation. Although transfer of these skills to the operating room is promising, careful attention must be paid to mastery versus memorization. In the authors' opinions, curriculums should involve step-wise employment of diverse models in different stages of training to assess milestones. To date, the simulation of tactile experience that is reminiscent of real-time clinical scenarios remains challenging, and a sophisticated model has yet to be established.

A Development of DCS Binding Delay Analysis System based on PC/Ethernet and Realtime Database

  • Gwak, Kwi-Yil;Lee, Sung-Woo;Lim, Yong-Hun;Lee, Beom-Seok;Hyun, Duck-Hwa
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1571-1576
    • /
    • 2005
  • DCS has many processing components and various communication elements. And its communication delay characteristic is affected diverse operating situation and context. Especially, binding signal which traversed from one control-node to another control-node undergo all sort of delay conditions. So its delay value has large deviation with the lapse of time, and the measurement of delay statistics during long time is very difficult by using general oscilloscope or other normal instruments. This thesis introduces the design and implementation of PC-based BDAS(Binding Delay Analysis System) System developed to overcomes these hardships. The system has signal-generator, IO-card, data-acquisition module, delay-calculation and analyzer module, those are implemented on industrial standard PC/Ethernet hardware and Windows/Linux platforms. This system can detect accurate whole-system-wide delay time including io, control processing and network delay, in the resolution of msec unit, and can analyze each channel's delay-historic data which is maintained by realtime database. So, this system has strong points of open system architecture, for example, user-friendly environment, low cost, high compatibility, simplicity of maintenance and high extension ability. Of all things, the measuring capability of long-time delay-statistics obtained through historic-DB make the system more valuable and useful, which function is essential to analyze accurate delay performance of DCS system. Using this system, the verification of delay performance of DCS for nuclear power plants is succeeded in KNICS(Korea Nuclear Instrumentation & Control System) projects

  • PDF

Building Guanxi and Networks of Korean Foreign Direct Investment Firms in China (대중국 한국 투자기업의 꽌시 형성과 네트워크)

  • Choe, Ja-Yeong;Lee, Sung-Cheol
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.15 no.2
    • /
    • pp.228-239
    • /
    • 2012
  • Guanxi could be regarded as communities based on blood, regionalism, school ties centering on individual person. It has been used as a means of personal interests security and acquisition. What is more, it has formed a mode of socio-economic order, which is an inter-obligation relations based on mutual benefits. In practice, it is necessary to understand and accept guanxi in China, as it is a key factor to understand consumer patterns, inter-firm relations and extra-firm relations between firm and government. In this context, the main aim of the reserach is to identify the impact of guanxi on the business activities of Korean foreign direct investment firms in China by investigating their networks based on guanxi.

  • PDF

A Study on the Research Methodologies of Geographic Information System and Utility of Case Study Method (국가GIS 연구를 위한 사례연구방법론의 탐색)

  • Kim, Tae-Jin
    • Spatial Information Research
    • /
    • v.16 no.1
    • /
    • pp.145-155
    • /
    • 2008
  • Case study has been criticized far its lack of generalization to the larger population and lack of sampling controls. Some of shortcomings of case study methods may be overcome, by using logically consistent, rigorous, and systematic approaches. Especially, Case study method has been suggested as appropriate for researching a range of GIS implementation, utilization, and diffusion issues. This paper provides examples of how the substance of its requirements may be met in the context of GIS case study. For the successful implementation of GIS, this study suggest that the case study method in GIS appropriate to the study of casual relations in and explication of complex GIS acquisition and adoption process.

  • PDF

Productivity vs. Quality of Software Development : An Empirical Study of the ISBSG Release 8 (ISBSG 8을 이용한 소프트웨어 개발의 생산성과 품질에 관한 실험적 연구)

  • Koo, Chul-Mo;Park, Dong-Jin
    • Journal of Digital Convergence
    • /
    • v.8 no.1
    • /
    • pp.93-107
    • /
    • 2010
  • Performance of software development is measured by two major criteria - roductivity and quality. Although the criteria is empirically tested in software engineering research, they often present with a limited way under consideration of a few factors or contexts for developers to focus on the either productivity facets or quality facets. Analyzing data on software development performance collected over a 13-year period from 20 countries, we investigated how major software development factors - development type, development platform, development technique, language type, DBMS, methodology, methodology acquisition, CASE,, summary of work effort, resource level, max team size, affect the performance of software development. The results suggest that productivity and quality of software development are affected by different factors and context: function points, line of code, extreme defects, major defects, or minor defects. This research provides the empirical evidence that the two performance criteria require for software developer to have careful attention to find the optimal balance between the two performance criteria.

  • PDF

An Analysis of Recognitions of Elementary School Students on Useful Classes among School Sport Clubs for Program Development using the IPA Method (IPA매트릭스를 이용한 초등학생의 학교스포츠클럽 유익한 수업 인식을 위한 프로그램 개발 분석)

  • MUN, Sun-Ho;KIM, Nam-Young;KWON, Il-Kwon
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.27 no.4
    • /
    • pp.1147-1159
    • /
    • 2015
  • The purpose of this study was to verify the analysis of level of importance and satisfaction in recognitions of elementary school students on useful classes among school sport clubs using Importance-Performance analysis. In order to achieve this objective, samples were taken by using convenience sampling method among non-probability sampling methods, and 384 data were used as the final valid samples for this study except 16 data with missing items or insincere responses. The results of frequency analysis, exploratory factor analysis, independent samples t-test, IPA analysis by using SPSS 20.0 were as follows. First, Iquadrant included education contents of enhance ability to ingenuity, teaching method of provides option, teaching method of encourage participation activity, education contents of the aspect of fun, evaluation of motor function and emotion, education contents of explains key contents easily, and education contents of understanding overall context. II quadrant included education environment of good sport facility, class environment of fair opportunity for activity, class atmosphere of arouses interest, and class atmosphere of autonomous and voluntary. III quadrant included diverse teaching method and instructor's demonstration, class atmosphere of systematic learning, evaluation of fairness, objectivity, and credibility, and an atmosphere that can exercise. IV quadrant included education contents of enable acquisition of knowledge and degree of improvement into consideration, and class atmosphere of trust and respect between instructor and student.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

Normal data based rotating machine anomaly detection using CNN with self-labeling

  • Bae, Jaewoong;Jung, Wonho;Park, Yong-Hwa
    • Smart Structures and Systems
    • /
    • v.29 no.6
    • /
    • pp.757-766
    • /
    • 2022
  • To train deep learning algorithms, a sufficient number of data are required. However, in most engineering systems, the acquisition of fault data is difficult or sometimes not feasible, while normal data are secured. The dearth of data is one of the major challenges to developing deep learning models, and fault diagnosis in particular cannot be made in the absence of fault data. With this context, this paper proposes an anomaly detection methodology for rotating machines using only normal data with self-labeling. Since only normal data are used for anomaly detection, a self-labeling method is used to generate a new labeled dataset. The overall procedure includes the following three steps: (1) transformation of normal data to self-labeled data based on a pretext task, (2) training the convolutional neural networks (CNN), and (3) anomaly detection using defined anomaly score based on the softmax output of the trained CNN. The softmax value of the abnormal sample shows different behavior from the normal softmax values. To verify the proposed method, four case studies were conducted, on the Case Western Reserve University (CWRU) bearing dataset, IEEE PHM 2012 data challenge dataset, PHMAP 2021 data challenge dataset, and laboratory bearing testbed; and the results were compared to those of existing machine learning and deep learning methods. The results showed that the proposed algorithm could detect faults in the bearing testbed and compressor with over 99.7% accuracy. In particular, it was possible to detect not only bearing faults but also structural faults such as unbalance and belt looseness with very high accuracy. Compared with the existing GAN, the autoencoder-based anomaly detection algorithm, the proposed method showed high anomaly detection performance.