• Title/Summary/Keyword: Measure theory

Search Result 989, Processing Time 0.023 seconds

Influence of Reward and Nursing Professional Pride on Nursing Intention in Patient with Emerging Infectious Disease (보상과 간호 전문직 자부심이 신종감염병 환자 간호의도에 미치는 영향)

  • Hwang, So Hee;Park, Hyojung;Youn, Jung Hee
    • Journal of Korean Clinical Nursing Research
    • /
    • v.29 no.2
    • /
    • pp.175-185
    • /
    • 2023
  • Purpose: The purpose of this study was to investigate the influence of nurses on the nursing intentions in patients with emerging infectious diseases. Methods: Data were collected from 201 nurses with over one year of clinical experience in a general hospital located in Seoul, South Korea. A structured self-report questionnaire was utilized to measure belief factors, core factors, rewards, and nursing professional pride, as well as nursing intentions in patients with emerging infectious diseases. Results: The results revealed that nurses' intentions to provide care for patients with emerging infectious diseases were significantly influenced by perceived behavioral control (β=.26, p<.001), clinical experience (β=-.14, p=.008), behavioral beliefs (β=.31, p=.010), feeling of vocation (β=.29, p=.012) and attitudes toward behaviors (β=.08, p=.034). Conclusion: Enhancing nurses' intentions to provide care for patients with emerging infectious diseases requires the implementation of systemic and educational strategies aimed at strengthening their confidence and beliefs.

Assessing Safety Requirements Based on KANO Model (KANO 모형 기반 안전요구사항 평가)

  • Sejung Lee;Seongrok Chang;Yongyoon Suh
    • Journal of the Korea Safety Management & Science
    • /
    • v.25 no.3
    • /
    • pp.9-15
    • /
    • 2023
  • As the first step of risk management, risk identification is inevitable to understand the degree of work safety. However, the safety requirements can be divided in necessary factors and additional factors. Thus, we propose a safety requirements assessment model using Kano model derived from Herzberg's two-factor theory, classifying safety requirements into ideal elements and must-be elements. The Kano model is usually applied to evaluate customer satisfaction divided into three major requirements in the fields of product development and marketing: attractive, must-be, and one-dimensional requirements. Among them, attractive requirement and must-be requirement are matched with ideal element and must-be element for safety requirement classification, respectively. The ideal element is defined as preventive safety elements to make systems more safe and the must-be element is referred to as fatal elements to be essentially eliminated in systems. Also, coefficients of safety measurement and safety prevention are developed to classify different class of safety requirements. The positioning map is finally visualized in terms of both coefficients to compare the different features. Consequently, the proposed model enables safety managers to make a decision between safety measurement and prevention.

A Study on the Fuzzy Evaluation Algorithm for Large Scale Hierarchical MADM Problem -Centering on the Identification of Fuzzy Measure- (대규모 다계층 MADM 문제의 퍼지평가 알고리즘에 관한 연구 - 퍼지측도의 동정을 중심으로 -)

  • Lim, B.T.;Yang, W.;Lee, C.Y.
    • Journal of Korean Port Research
    • /
    • v.12 no.1
    • /
    • pp.9-17
    • /
    • 1998
  • The evaluation structure of complex problems is composed of multi-attributes and hierarchy. A many studies were existed on this problems, but that based on the assumption that the evaluation elements were independent. The actual evaluation problems have the complexity, ambiguity and interlinkage among the elements. In this situation, the fuzzy evaluation process is very effective in settling the complex problems. For evaluation of large scale hierarchical MADM problem, the fuzzy evaluation algorithm is developed in this paper, and that is centering on the identification of fuzzy measures. In this study, we newly identified the weight and interaction among the evaluation attributes. The results of this study are as follows: we can identified the hierarchical structure of the evaluation problem which is composed of the evaluation structure, function and hierarchy; we improved the existed weighting method which could be accomplished by normalizing process, considering the uncertainty and new weight integrating method which come from Dempster-Shafer theory. And we take into account the interaction properties among more than 3 evaluation attributes, which can be compared with the existed studies in which only 2 evaluation attributes taked into account.

  • PDF

eSports Fan Identity Consumer and Live Game Watching Behavior: Professional Player Fan Identity Perspective

  • Jialing Zhang;C. Michael Hall;Myung Ja Kim
    • Journal of Smart Tourism
    • /
    • v.3 no.1
    • /
    • pp.9-21
    • /
    • 2023
  • This study investigated whether the Point of attachment (POA) theory can be used to measure the consumption intention on go and watch offline eSports games. The admiration for players, social interaction, and on-site consumption requirements for viewing offline eSports competitions are prioritized. In addition, eSports fans in various regions may have distinct consumption concepts and consumption patterns. Thus, this study surveyed China (n = 156) and South Korea (n = 127) eSports fans who subjectively perceive themselves to be fans of eSports player(s) and who have observed at least one offline eSports game. The results demonstrate that player attraction and socialization have positive and significant effects on offline consumption factors. There is no correlation between previous consumption behavior and satisfaction, but dining shows a significant positive effect on satisfaction. Moreover, there is a strong relationship between satisfaction and future attendance intention. In addition, effect of eSports fan attachment on future visit intentions are measured and there is no correlation between the two variables. The front end of the path in the new model's varied between Chinese and Korean supporters. Finally, theoretical and practical implications of this study are discussed.

MODELING MEASURES OF RISK CORRELATION FOR QUANTITATIVE FLOAT MANAGEMENT OF CONSTRUCTION PROJECTS

  • Richard C. Jr. Thompson;Gunnar Lucko
    • International conference on construction engineering and project management
    • /
    • 2013.01a
    • /
    • pp.459-466
    • /
    • 2013
  • Risk exists in all construction projects and resides among the collection of subcontractors and their array of individual activities. Wherever risk resides, the interrelation of participants to one another becomes paramount for the way in which risk is measured. Inherent risk becomes recognizable and quantifiable within network schedules in the form of consuming float - the flexibility to absorb delays. Allocating, owning, valuing, and expending such float in network schedules has been debated since the inception of the critical path method itself. This research investigates the foundational element of a three-part approach that examines how float can be traded as a commodity, a concept whose promise remains unfulfilled for lack of a holistic approach. The Capital Asset Pricing Model (CAPM) of financial portfolio theory, which describes the relationship between risk and expected return of individual stocks, is explored as an analogy to quantify the inherent risk of the participants in construction projects. The inherent relationship between them and their impact on overall schedule performance, defined as schedule risk -the likelihood of failing to meet schedule plans and the effect of such failure, is matched with the use of CAPM's beta component - the risk correlation measure of an individual stock to that of the entire market - to determine parallels with respect to the inner workings and risks represented by each entity or activity within a schedule. This correlation is the initial theoretical extension that is required to identify where risk resides within construction projects, allocate and commoditize it, and achieve actual tradability.

  • PDF

Detecting the Baryon Acoustic Oscillations in the N-point Spatial Statistics of SDSS Galaxies

  • Hwang, Se Yeon;Kim, Sumi;Sabiu, Cristiano G.;Park, In Kyu
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.46 no.2
    • /
    • pp.72.3-73
    • /
    • 2021
  • Baryon Acoustic Oscillations (BAO) are caused by acoustic density waves in the early universe and act as a standard ruler in the clustering pattern of galaxies in the late Universe. Measuring the BAO feature in the 2-point correlation function of a sample of galaxies allows us to estimate cosmological distances to the galaxies mean redshift, , which is important for testing and constraining the cosmology model. The BAO feature is also expected to appear in the higher order statistics. In this work we measure the generalized spatial N-point point correlation functions up to 4th order. We made measurements of the 2, 3, and 4-point correlation functions in the SDSS-III DR12 CMASS data, comprising of 777,202 galaxies. The errors and covariances matrices were estimated from 500 mock catalogues. We created a theoretical model for these statistics by measuring the N-point functions in halo catalogues produced by the approximate Lagrangian perturbation theory based simulation code, PINOCCHIO. We created simulations using initial conditions with and without the BAO feature. We find that the BAO is detected to high significance up to the 4-point correlation function.

  • PDF

Soft-Decision Based Quantization of the Multimedia Signal Considering the Outliers in Rate-Allocation and Distortion (이상 비트율 할당과 신호왜곡 문제점을 고려한 멀티미디어 신호의 연판정 양자화 방법)

  • Lim, Jong-Wook;Noh, Myung-Hoon;Kim, Moo-Young
    • The Journal of the Acoustical Society of Korea
    • /
    • v.29 no.4
    • /
    • pp.286-293
    • /
    • 2010
  • There are two major conventional quantization algorithms: resolution-constrained quantization (RCQ) and entropy-constrained quantization (ECQ). Although RCQ works well for fixed transmission-rate, it produces the distortion outliers since the cell sizes are different. Compared with RCQ, ECQ has the constraints on the cell size but it produces the rate outliers. We propose the cell-size constrained vector quantization (CCVQ) that improves the generalized Lloyd algorithm (GLA). The CCVQ algorithm is able to make a soft-decision between RCQ and ECQ by using the flexible penalty measure according to the cell size. Although the proposed method increases the small amount of overall mean-distortion, it can reduce the distortion outliers.

Corporate Social Responsibility and Financial Performance From Chinese Consumers Perspective: Application of Value Engineering Theory

  • Yuan, Xina;Lin, Xiaoqing;Ding, Meixia;Xu, Lei
    • Journal of East Asia Management
    • /
    • v.5 no.1
    • /
    • pp.1-31
    • /
    • 2024
  • Based on the perspective of consumers and the method of value engineering, this paper uses "CSR expectation deviate level" to measure corporate social responsibility, and discusses the influence of corporate social responsibility on financial performance and its action path. This paper collected the questionnaire survey data of 878 consumers and the panel data of 98 listed companies from 2009 to 2012. The empirical results show that: (1) Consumers pay more attention to products and services, charity, environmental protection and their responsibilities to employees, and less attention to their responsibilities to shareholders or creditors and partners; (2) Corporate social responsibility is negatively correlated with financial performance, and corporate marketing ability plays a moderating role in it. That is, the smaller the gap between the level of corporate social responsibility fulfilled by enterprises and consumers' expectations, the better the financial performance of enterprises, which also reminds enterprises that they need to rationally allocate corporate social responsibility resources and constantly cultivate their own marketing capabilities, so as to better meet the level of corporate social responsibility expected by consumers. The value engineering method quantifies consumers' value perception of corporate social responsibility, which has a certain practical guiding role. Of course, there are some limitations in this paper, and future research can further explore the potential impact mechanism.

Exploring geometric and kinematic correspondences between gear-based crank mechanism and standard reciprocating crankshaft engines: An analytical study

  • Amir Sakhraoui;Fayza Ayari;Maroua Saggar;Rachid Nasri
    • Structural Engineering and Mechanics
    • /
    • v.90 no.1
    • /
    • pp.97-106
    • /
    • 2024
  • This paper presents a significant contribution to aided design by conducting an analytical examination of geometric links with the aim of establishing criteria for assessing an analogy measure of the extrinsic geometric and kinematic characteristics of the Variable Compression Ratio (VCR) engine with a Geared Mechanism (GBCM) in comparison to the existing Fixed Compression Ratio (FCR) engine with a Standard-Reciprocating Crankshaft configuration. Employing a mechanical approach grounded in projective computational methods, a parametric study has been conducted to analyze the kinematic behavior and geometric transformations of the moving links. The findings indicate that in order to ensure equivalent extrinsic behavior and maintain consistent input-output performance between both engine types, precise adjustments of intrinsic geometric parameters are necessary. Specifically, for a VCR configuration compared to an FCR configuration, regardless of compression ratio and gearwheel radius, for the same crankshaft ratios and stroke lengths, it is imperative to halve lengths of connecting rods, and crank radius. These insights underscore the importance of meticulous parameter adjustment in achieving comparable performance across different engine configurations, offering valuable implications for design optimization.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.