This study was done to determine the relationship between the anxiety levels of hospitalized psychiatric patients and various influencing variables. The purpose of this study was to determine factors that may help hospitalized psychiatric patients to experience lower levels of anxiety in relation to changing situations and provide the basic data for a dynamic approach which is important in the field of modern psychiatric nursing that understands and analyses the meaning of patients behavior. The anxiety may produce stress, which is a common experience among all human beings. Patients may merely feel uncomfortable in the state of mild anxiety, however, the severe state could be an obstacle to treatment and recovery from disease. The anxiety of the psychiatric patient is a factor which greatly influencing the patient's behavior, so his disorderd behavior is an expression of defence or pathologically fixed behavior. According the psychiatric patient's anxiety at the time of admission is the concern of the health team. The nurse's special concern has to do with understanding and supporting the patient and meeting his individual needs by frequent close contact during the entire hospitalization period, compared to other teamembers the nurse's responsibility in this regard is greated. So this study emphasizes the necessity of creating conditions these, but above all the psychiatric nurse should create a therapeutic environment by not only regarding the patient's behavior or symptoms but understanding the meaning of them. The subjects of this study were 57 psychiatric patients selected from the K neuropsychiatric hospital located in Kunsan city. Data were collected twice from the same patients within a 24 hour period after admission and 10 days after admission. (September 18th to November 8th, 1980). The data collected method was through direct interview, and the interview time was 20 minutes for each patient. Data analysis included Item Analysis & Internal Consistency Reliability Tests, Percentages, t-test, analysis of variance and stepwise multiple regression analysis. The findings of this study were as follows. A. Test of Hypothesis a. Hypothesis 1 :“The anxiety level of psychiatric patients within 24 hours after admission will be higher than those of the same patients 10 days after admission,”was accepted. (t = 3. 15 ; p < 0.005) b. Hypothesi 2:“The more the number of admissions the higher the level of anxiety related to two categories”, was accepted. (affective anxiety: F = 5.50, p < 0.005, Somatic anxiety: F = 9.12, p <.
Journal of The Korean Association For Science Education
/
v.36
no.3
/
pp.371-387
/
2016
Learning at the elbow of scientist is a well-known educational approach to improve students' understanding of science and scientific practice. This study, in the perspective of legitimate peripheral participation in a community of practice, explores how students' scientific practice and perception could be shifted through R&E program with the development of participation. Data from participant observation for 18 months and in-depth interviews were analyzed based on constant comparative method to extract common characteristics of students' participation and major shifts in their scientific practices and perceptions. Students' development of participation was categorized into three stages: legitimate, peripheral, and full participation. In the stage of peripheral participation, students perceived themselves as mere students and showed passive engagement. They just followed the directions of researchers and didn't know what they should be doing. But through continuous participation, students showed enhanced engagement like voluntary article reading, role assignments, and establishing norms in a community of practice with the reference of scientists'. In this stage of transitional participation, students also showed a deepened perception on everyday life of scientist and the community of scientist. And finally in the stage of full participation, students showed responsibility and ownership on research and continuous efforts to refine their research. They recognized themselves as beginning scientists. With these findings, this paper highlighted the dynamic processes of students' development of scientific practices and identity through R&E participation. It also suggests implications for research programs for education, especially for students who have already articulated a science-related career but still have only foggy notions about science.
Proceedings of the Korean Institute of Information and Commucation Sciences Conference
/
2018.10a
/
pp.593-596
/
2018
The speed of vehicles has remained a significant factor that influences the severity of accidents and traffic accident rate in many parts of the world including South Korea. This behavior where drivers drive at speeds which exceed a posted safe threshold is known as 'speeding'. Over the past twenty years, the Korean National Police Agency (NPA) has become aware of an increased frequency of drivers who are speeding. Therefore, fixed-type ASE systems [1] have been installed on hazardous road sections of many highways. These system monitor vehicle speeds using a camera. However, the use of ASE systems has changed the behavior of the drivers. Specifically, drivers reduce speed or avoid the route where the cameras are mounted. It is not practical to install cameras at every possible location. Therefore, it is challenging to thoroughly explore the location where speeding occurs. In view of these problems, the author of this paper designed and implemented a prototype visualization system in which point and color are used to show vehicle location and associated over-speed information. All of this information was used to create a comprehensive visualization application to show information about vehicle driving. In this paper, we present an approach detecting vehicles moving at speeds which exceed a threshold and visualizing the points those violations occur on a map. This was done using vehicle trajectory data collected in Daegu city. We propose steps for exploring the data collected from those sensors. The resulting mapping has two layers. The first layer contains the dynamic vehicle trajectory data. The second underlying layer contains the static road networks. This allows comparing the speed of vehicles on roads with the known maximum safe speed of those roads, and presents the results with a visualization tool. We also compared data about people who drive over threshold safe speeds on each road on days and weekends based on vehicle trajectories. Finally, our study suggests improved times and locations where law enforcement should use monitoring with speed cameras, and where they should be stricter with traffic law enforcement. We learned that people will drive over the speed limit at midnight more than 1.9 times as often when compared with rush hour traffic at 8 o'clock in the morning, and 4.5 times as often when compared with traffic at 7 o'clock in the evening. Our study can benefit the government by helping them select better locations for installation of speed cameras. This would ultimately reduce police labor in traffic speed enforcement, and also has the potential to improve traffic safety in Daegu city.
Mobile devices with Android OS and iOS have been emerged as mobile computing devices where various software applications are deployed. Furthermore, they are anticipated to be used not only for traditional personal computing but also for enterprise computing. However, such mobile devices have their intrinsic characteristics such as limited resources and flexible network capabilities, which are not revealed in traditional computers. Hence, there is high demand for methods to develop mobile applications with reflecting their intrinsic characteristics. Since those characteristics belong to non-functional requirements, they should be reflected in architecture design while designing mobile applications. To design architecture, the architecture drivers that are architecture non-functional requirements are decided from mobile application characteristics. Conventional architecture design methods do not consider those characteristics so that the methods cannot be straightforwardly applied to mobile applications. In this paper, to efficiently develop mobile applications reflecting those characteristics, we propose a set of architecture patterns and define a guideline to apply those patterns. First, we define the characteristics of mobile applications distinguished and derive architectural drivers from them. Then, we propose architecture patterns in terms of static and dynamic views and define an architectural guideline to apply the patterns to designing architecture for mobile application. And, we perform case studies to verify the applicability of proposed patterns. Finally, we assess the proposed architecture patterns by proving how the patterns can fulfill identified architecture drivers and by comparing our approach with previous works.
In this paper, we implement an automated composition system of web services using hybrid techniques that merge the benefit of BPEL techniques, with the advantage of OWL-S, BPEL techniques have practical capabilities that fulfil the needs of the business environment such as fault handling and transaction management. However, the main shortcoming of these techniques is the static composition approach, where the service selection and flow management are done a priori and manually. In contrast, OWL-S techniques use ontologies to provide a mechanism to describe the web services functionality in machine-understandable form, making it possible to discover, and integrate web services automatically. This allows for the dynamic integration of compatible web services, possibly discovered at run time, into the composition schema. However, the development of these approaches is still in its infancy and has been largely detached from the BPEL composition effort. In this work, we describe the design of the SemanticBPEL architecture that is a hybrid system of BPEL4WS and OWL-S, and propose algorithms for web service search and integration. In particular, the SemanticBPEL has been implemented based on the open source tools. The proposed system is compared with existing BPEL systems by functional analysis. These comparisions show that our system outperforms existing systems.
Journal of Korean Tunnelling and Underground Space Association
/
v.19
no.2
/
pp.143-159
/
2017
A probabilistic fragility assessment procedure is developed in this paper to predict risks of damage arising from seismic loading to the two-cell RC box tunnel. Especially, the paper focuses on establishing a simplified methodology to derive fragility curves which are an indispensable ingredient of seismic fragility assessment. In consideration of soil-structure interaction (SSI) effect, the ground response acceleration method for buried structure (GRAMBS) is used in the proposed approach to estimate the dynamic response behavior of the structures. In addition, the damage states of tunnels are identified by conducting the pushover analyses and Latin Hypercube sampling (LHS) technique is employed to consider the uncertainties associated with design variables. To illustrate the concepts described, a numerical analysis is conducted and fragility curves are developed for a large set of artificially generated ground motions satisfying a design spectrum. The seismic fragility curves are represented by two-parameter lognormal distribution function and its two parameters, namely the median and log-standard deviation, are estimated using the maximum likelihood estimates (MLE) method.
Park, Kyoung-Hwan;Nam, Kwang-Woo;Rhee, Yang-Won;Lee, Chang-Woo
Journal of the Korea Society of Computer and Information
/
v.16
no.7
/
pp.105-115
/
2011
In Vision-based Intelligent Transportation System(ITS) the segmentation of road region is a very basic functionality. Accordingly, in this paper, we propose a region segmentation method using adaptive pattern extraction technique to segment road regions and sky regions from original images. The proposed method consists of three steps; firstly we perform the initial segmentation using Mean Shift algorithm, the second step is the candidate region selection based on a static-pattern matching technique and the third is the region growing step based on a dynamic-pattern matching technique. The proposed method is able to get more reliable results than the classic region segmentation methods which are based on existing split and merge strategy. The reason for the better results is because we use adaptive patterns extracted from neighboring regions of the current segmented regions to measure the region homogeneity. To evaluate advantages of the proposed method, we compared our method with the classical pattern matching method using static-patterns. In the experiments, the proposed method was proved that the better performance of 8.12% was achieved when we used adaptive patterns instead of static-patterns. We expect that the proposed method can segment road and sky areas in the various road condition in stable, and take an important role in the vision-based ITS applications.
Journal of the Institute of Electronics Engineers of Korea SP
/
v.42
no.4
s.304
/
pp.167-176
/
2005
This paper proposes a new power minimization technique for the frame-based multimedia signal processing. The derivation of the technique is based on the newly proposed microscopic DVS(Dynamic Voltage Scaling) method, where, the operating frequency and the supply voltage levels are dynamically controlled according to the processing requirement for each frame of multimedia data. The multimedia signal processing algorithms are also redesigned and optimized to maximize the power saving efficiency of the microscopic DVS technology. The characterization of the mean/variance distribution of the processing load in the frame-based multimedia signal processing provides the major basis not only for the optimized application of the microscopic DVS technology but also for the optimization of the multimedia algorithms. The power saying efficiency of the proposed DVS approach is experimentally tested with the algorithms of MPEG-2 video decoder and MPEG-2 AAC audio encoder on the ARM9 RISC processor. The experimental results with the diverse MPEG-2 video and audio files show The average power saving efficiencies of 50$\%$ and 30$\%$, respectively. The results also agree very well with those of the analytic derivations.
Journal of the Institute of Electronics Engineers of Korea CI
/
v.48
no.5
/
pp.107-116
/
2011
In this paper, a traffic adaptive sleep based medium access control (TAS-MAC) protocol for wireless sensor networks (WSNs) is proposed. The protocol aims for WSNs which consist of clustered sensor nodes and is based on TDMA-like schema. It is a typical schedule based mechanism which is adopted in previous protocols such as LEACH and Bit-Map Assisted MAC. The proposed MAC, however, considers unexpected long silent period in which sensor nodes have no data input and events do not happen in monitoring environment. With the simple traffic measurement, the TAS-MAC eliminates scheduling phases consuming energy in previous centralized approaches. A frame structure of the protocol includes three periods, investigation (I), transmission (T), and sleep-period (S). Through the I-period, TAS-MAC aggregates current traffic information from each end node and dynamically decide the length of sleep period to avoid energy waste in long silent period. In spite of the energy efficiency of this approach, the delay of data might increase. Thus, we propose an advanced version of TAS-MAC as well, each node in cluster sends one or more data packets to cluster head during the T-period of a frame. Through simulation, the performance in terms of energy consumption and transmission delay is evaluated. By comparing to BMA-MAC, the results indicate the proposed protocol is more energy efficient with tolerable expense in latency, especially in variable traffic situation.
Recently the role of ports has been changed to satisfy flexibly needs of demands in global economy. A new concept for ports is not just a place for international trade but an important nodal point in logistics chain. The changing environment like this trend creates a high degree of uncertainty and leaves port managers confused with the question how to respond effectively to dynamic market. The latest studies provide that the port must have a good hinterland to achieve competitive advantages in a logistics chain. Korean Government announced "The Master Development Plan for Port Logistics Parks in Korea" in 2006. This contains the plan of hinterland construction of Busan New Port to achieve the status of logistics hub in Asian market. Previous studies rely solely on traditional DCF(discounted cash flow) analysis for investment of hinterland. However DCF method does not include irreversibility, uncertainty and the choice of timing for investment project. This thesis introduces a ROPM(real options pricing model) which overcomes the limitations of traditional valuation methods. The option valuations in this study utilize the Black-Scholes model, the binomial model and the MonteCarlo simulation to value investment opportunity of a port hinterland. In this thesis, an attempt is made to modify the NPV criterion by incorporating the real options approach, and its application is demonstrated in a hinterland construction investment plan. This research has conducted an empirical analysis by calculating economic value of the investment for a hinterland of Busan New Port.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.