The purpose of this study was to introduce PBL to dental hygienist education in an effort to raise a question about the inauthentic and inappropriate curriculum. PBL is one of learning methods to enhance the problem-solving ability of learners, and it's attempted to develop a PBL package focusing on dental hygienist roles to lay the foundation for producing competent and expert dental hygienists with a good problem- solving ability. The literature concerned was reviewed from November 2002 through January 2003 to determine whether or not PBL was applicable to dental-hygienist course, and that turned out to be effective for dental hygienist education. And then a PBL package was developed to train students to be knowledgeable and have a knowhow and excellent problem-solving skills. The characteristics of the PBL package could be described as follows: First, that focused on dental hygienist roles to serve the purpose of this study to remedy the current unrealistic and improper curriculum and improve the problem-solving skills of learners. Second, time factor was taken into account. In this four-week course for two credits, there are four classes a week, and it's required to take six or eight weeks to apply the PBL package, which is expected to demotivate students. Therefore, it's planned to conduct more weekly classes to make a proper progress. Third, a wide variety of teaching aids were put to use, and learner would be encouraged to be more interactive and utilize teaching aids properly, and eventually, they could have an opportunity to better express themselves. Fourth, online real-time learner discussion would be attended by this researcher. Learners would have a discussion in real time in the Internet cafe chat room, and different discussion time would be allocated to each team. This researcher would take part in each team's discussion once or more. Fifth, learners would prepare one or more journal(s) about four-hour Internet cafe learning. They have to make it twice a week at least, and it would be a good opportunity for learners to look back on themselves and their teams, and their learning effect would be greater. Specific rules were presented to help them make a successful self-examination. Sixth, there are some spaces in the lower part of objective test sheets to have students describe why they make a particular answer choice. They would be asked to depict the reason of their prior evaluation and lecture assessment especially because their responses would be important for more successful discussion and feedback. Seventh, problem-solving approach was designed to attain learning objectives, stimulate the creative thinking of learners and help them share a more systematic discussion. That would serve as a secondhand guide not to make them digress when they discuss by using information they acquire from a scenario presented in class.
The types of errors corrected by a Korean spelling and grammar checker can be classified into isolated-term spelling errors and context-sensitive spelling errors (CSSE). CSSEs are difficult to detect and to correct, since they are correct words when examined alone. Thus, they can be corrected only by considering the semantic and syntactic relations to their context. CSSEs, which are frequently made even by expert wiriters, significantly affect the reliability of spelling and grammar checkers. An existing Korean spelling and grammar checker developed by P University (KSGC 4.5) adopts hand-made correction rules for correcting CSSEs. The KSGC 4.5 is designed to obtain very high precision, which results in an extremely low recall. Our overall goal of previous works was to improve the recall without considerably lowering the precision, by generalizing CSSE correction rules that mainly depend on linguistic knowledge. A variety of rule-based methods has been proposed in previous works, and the best performance showed 95.19% of average precision and 37.56% of recall. This study thus proposes a statistics based method using a conditional probability model with dynamic window sizes. in order to further improve the recall. The proposed method obtained 97.23% of average precision and 50.50% of recall.
As the recent development of the IT services, there is a urgent need of effective diagnosis system to present appropriate solution for the complicated problems of breakdown control, a cause analysis of breakdown and others. So we propose an intelligent diagnosis system that integrates the case-based reasoning and the artificial neural network to improve the system performance and to achieve optimal diagnosis. The case-based reasoning is a reasoning method that resolves the problems presented in current time through the past cases (experience). And it enables to make efficient reasoning by means of less complicated knowledge acquisition process, especially in the domain where it is difficult to extract formal rules. However, reasoning by using the case-based reasoning alone in diagnosis problem domain causes a problem of suggesting multiple causes on a given symptom. Since the suggested multiple causes of given symptom has the same weight, the unnecessary causes are also examined as well. In order to resolve such problems, the back-propagation learning algorithm of the artificial neural network is used to train the pairs of the causes and associated symptoms and find out the cause with the highest weight for occurrence to make more clarified and reliable diagnosis.
The purpose of this study is to develop the measurement of security needs satisfaction from users of electronic security system, to verify its validity and reliability, and by applying them, to examine the effects between the communities using this system. In 2008, the users of electronic security system in big cities in Seoul(Yong-San, Jong-Lo) and Gyung-Gi Do(Su-Won) for their convenience stores, jewelry shops, communication services, banks, government and public offices, etc. were arranged for a population and 262 of them were used for the final analysis by purposive sampling. This study yields following results. First, the validity of security need satisfaction from users of electronic security system is very high, which means the explanatory adequacy of environmental security need is the highest. Second, the reliability of security need satisfaction from users of electronic security system is very high, in which the reliability value(Cronbach's $\alpha$) of internal consistency is over .765. Third, the security need of electronic security system has the most effects on the group of bank workers. That is, through a close cooperative system between the bank and the service of electronic security system, the more keeping satisfied the environmental, bodily, physical security needs are, the less the in security of this group has. Informational security need has the most effects on convenient store group. It means the service companies of electronic security system offer more services at dawn time and make or supply all sorts of visual information system, which reduces insecurity of the convenient store group.
Currently robots are widely used in schools for educational purpose. With wide spread of robot-based education, it is known that major advantage of robot-based education is to enhance creativity and logical thinking of students. Although robots can be very useful tools for assisting students' study activities, there have not been lots of teaching-learning models for robot-based education.In this paper, a teaching-learning model is presented for robot-based education. The proposed model is designed based on constructivism. The proposed model consists of 6 stages: preparation, design, assembling, demonstration run, evaluation, and application & extension. The proposed model has the following characteristics. First, the proposed model is designed to enhance creativity and logical thinking ability of learners. Learners are supposed to be involved in self-directed activities and required to provide results based on their own ideas. Teachers are supposed to mediate students only if necessary. Second, learners are encouraged to participate in activity via diverse interaction. The interaction in this model includes learner-to-learner interaction, learner-to-teacher interaction, and learner-to-expert interaction. The proposed model encourages learners to solve the problem with cooperating each other. Also, teachers are supposed to guide students if necessary and observe and monitor behavior of students all the time. Third, motivation is provided in the beginning stage of the instruction. Fourth, in the proposed model, both study results and study process are equally important. In the model, study process is reviewed at the final stage.
T cells induce immune responses and thereby eliminate infected micro-organisms when peptides from the microbial proteins are bound to HLAs in the host cell surfaces, It is known that the more stable the binding of peptide to HLA is, the stronger the T cell response gets to remove more effectively the source of infection. Accordingly, if peptides (HLA binder) which can be bound stably to a certain HLA are found, those peptieds are utilized to the development of peptide vaccine to prevent infectious diseases or even to cancer. However, HLA is highly polymorphic so that HLA has a large number of alleles with some frequencies even in one population. Therefore, it is very inefficient to find the peptides stably bound to a number of HLAs by testing random possible peptides for all the various alleles frequent in the population. In order to solve this problem, computational methods have recently been developed to predict peptides which are stably bound to a certain HLA. These methods could markedly decrease the number of candidate peptides to be examined by biological experiments. Accordingly, this paper not only introduces a method of machine learning to predict peptides binding to an HLA, but also suggests a new prediction model so called 'knowledge-based genetic algorithm' that has never been tried for HLA binding peptide prediction. Although based on genetic algorithm (GA). it showed more enhanced performance than GA by incorporating expert knowledge in the process of the algorithm. Furthermore, it could extract rules predicting the binding peptide of the HLA alleles common in Koreans.
Software product line engineering is a method that prepares for the future reuse and supports to seamless reuse in application development process. Commonality and variability play central roles in all product line development processes. Reusable assets will become core assets by explicitly representing C&V. Indeed, the variabilities that art identified at each phase of core assets development have different levels of abstraction. In the past, these variabilities have been handled in an implicit manner and without distinguishing the characteristics of each core assets. In addition, previous approaches have depended on the experience and intuition of a domain expert to recognize commonality and variability. In this paper, we suggest a 2-dimensional analyzing method that analyzes the variabilities of core assets in software product line. In horizontal analysis process, the variation types are analyzed in requirements, architecture, and component that are produced at each phase of development process. In vertical analysis process, variations are analyzed in different abstract levels, in which the region of commonality is identified and the variation points are refined. By this method, the traceability of variations between core assets will be possible and core assets can be reused seamlessly.
Lee, Tae Wha;Ji, Yoon Jung;Jang, Yeon Soo;Do, Hyun Ok;Oh, Kyoung Hwan;Kim, Chang Kyung;Chun, Ja Hye;Shin, Hae Kyung;Cho, Mee Young;Bae, Jung Im
Journal of Korean Clinical Nursing Research
/
v.26
no.1
/
pp.117-130
/
2020
Purpose: This study aimed to develop a bedside nursing shift report protocol and evaluate the effect of the protocol in a tertiary hospital in South Korea. Methods: The bedside nursing handoff protocol with patient engagement was developed based on the literature review and the validation of an expert group. The effect of the protocol on clinical implication was tested in three medical-surgical units in a tertiary hospital. Outcomes were assessed by patient perception, nurse perception, and reporting time. Data collected from June to August in 2018 and analyzed with descriptive statistics and One-way ANOVA using SPSS version 25.0. Results: The bedside nursing shift report protocol with patient engagement consisted of two steps: nurse to nurse report and bedside report with patients. Nurse's perception with patient engagement was significantly increased after applying protocol (F=17.85, p<.001). Patient's perception was significantly improved in the areas of discharge plan (F=7.86, p<.001), health information privacy (F=4.46, p=.012) and identify attending nurse (F=3.19, p=.042). There were no differences in reporting time between the bedside nursing shift report and a traditional shift report (F=0.61, p=.054). Conclusion: Patient perception was significantly increased, while nurse perception was not different after applying this protocol. For the change in the perception of nurses, education may be preceded to improve nurses' competence for the bedside shift report. Furthermore, the support in enough nurse staffing should be needed for encouraging the bedside shift report. The bedside shift report may enhance patient engagement. Therefore it may improve patient safety and health outcome in clinics.
Kim, Min-Kyoung;Lee, Jae-Hon;Gim, Minsook;Kim, Won;Moon, Eunsoo;Seo, Ho-Jun;Koo, Bon-Hoon;Yang, Jong-Chul;Lee, Kang Soo;Lee, Sang-Hyuk;Kim, Chan-Hyung;Yu, Bum-Hee;Suh, Ho-Suk
Anxiety and mood
/
v.14
no.2
/
pp.53-62
/
2018
Objective : The Korean Association of Anxiety Disorders developed Korean guidelines for treatment of panic disorder (PD) 2018. In this paper, we discussed the consensus among psychiatrists, regarding initial and maintenance treatment strategies for pharmacological treatment of PD in Korea. Methods : Based on current treatment guidelines published by the American Psychiatric Association, the National Institute for Clinical Excellence, and the Canadian Psychiatric Association, we developed questionnaires pertinent to initial and maintenance treatment strategies for pharmacological treatment of PD. Seventy-two experts in PD answered questionnaires. We classified expert opinions into three categories, first, second, and third-line treatment strategies, by analyzing the 95% confidence interval. Results : Antidepressants, benzodiazepine anxiolytics, and cognitive-behavioral therapy (CBT) were recommended as treatments of choice (ToC), and first-line strategies for initial treatment of PD. Escitalopram, paroxetine, sertraline, and venlafaxine were preferred from among many anti-panic drugs. Mean starting dose of anti-panic drugs for initial treatment of PD was relatively lower, than that for other psychiatric illnesses such as major depressive disorder. In the case of maintenance treatment of PD, antidepressants and CBT were selected as ToC and first-line strategies. Patients were typically examined every four weeks during treatment, to review effectiveness and side effects of the drug. Pharmacotherapy was generally continued for one year or more. Conclusion : This study provides information about consensus among Korean experts regarding pharmacological treatment strategies for patients with panic disorder.
Nuclear emergency preparedness and response is an essential part to ensure the safety of nuclear power plant (NPP). Key support technologies of nuclear emergency decision-making usually consist of accident diagnosis, source term estimation, accident consequence assessment, and protective action recommendation. Source term estimation is almost the most difficult part among them. For example, bad communication, incomplete information, as well as complicated accident scenario make it hard to determine the reactor status and estimate the source term timely in the Fukushima accident. Subsequently, it leads to the hard decision on how to take appropriate emergency response actions. Hence, this paper aims to develop a method for rapid source term estimation to support nuclear emergency decision making in pressurized water reactor NPP. The method aims to make our knowledge on NPP provide better support nuclear emergency. Firstly, this paper studies how to build a Bayesian network model for the NPP based on professional knowledge and engineering knowledge. This paper presents a method transforming the PRA model (event trees and fault trees) into a corresponding Bayesian network model. To solve the problem that some physical phenomena which are modeled as pivotal events in level 2 PRA, cannot find sensors associated directly with their occurrence, a weighted assignment approach based on expert assessment is proposed in this paper. Secondly, the monitoring data of NPP are provided to the Bayesian network model, the real-time status of pivotal events and initiating events can be determined based on the junction tree algorithm. Thirdly, since PRA knowledge can link the accident sequences to the possible release categories, the proposed method is capable to find the most likely release category for the candidate accidents scenarios, namely the source term. The probabilities of possible accident sequences and the source term are calculated. Finally, the prototype software is checked against several sets of accident scenario data which are generated by the simulator of AP1000-NPP, including large loss of coolant accident, loss of main feedwater, main steam line break, and steam generator tube rupture. The results show that the proposed method for rapid source term estimation under nuclear emergency decision making is promising.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.