• Title/Summary/Keyword: Normal context

Search Result 181, Processing Time 0.027 seconds

A Study on the early modernist woman architect, Margarete Schutte-Lihotzky - A Revolution of woman's space or an assignment to the new industrialization? - (초창기 모더니즘 여성 건축가 마가레테 쉬테-리호츠키에 관한 연구 - 여성 공간의 혁명인가 아니면 새로운 기계화로의 편입인가? -)

  • Lee Ran-Pyo
    • Korean Institute of Interior Design Journal
    • /
    • v.14 no.3 s.50
    • /
    • pp.20-27
    • /
    • 2005
  • The built-in kitchen that is seen in every household is one of the achievements of the modernism architecture in early 20th century. Developed on the basis of two axis, one of which is the high industrialization and the other the sceptical assessment on the traditional value-system, the 20th century was launched in the form of the twofold entanglement, through the unfolding of which the cultural code of the modernism could be operated. The Quantification of the psychic that was attempted by H. v. Helmholtz and E. Mach in the pursuit of the reunification of sensation to the normal science was the first thread of that, while the second the break-down of the authoritative ideology and the emancipation of woman labour, which were initiated by the leftist movements. In this situation Margarete Schutte-Lihotzky was the woman architect who has tried to overcome the patriarchism in the household through architectural work by dwelling on that the emancipation of the housewives from the inefficient household labour is directly connected with the accomplishment of human freedom. She applied the modernist functionalism to the designing the kitchen for that purpose and outlined the effective range and operational realm of the rationalization. After all this the future preoccupying endeavor became the decisive moment that gave birth to a aesthetically and functionally good deliberated design of the kitchen in the present. This study is purposed to actualize the architectural ideas of Lihotzky into the present context through the consideration on the Frankfurt Kitchen of her and to grope for the relationship between architecture and feminism on the common horizon of the functionalist architecture and the women's liberation.

A Case study of Knowledge & Information Contents applied Gamification and Alternate Reality Game concepts (게이미피케이션과 대체현실게임 개념을 적용한 지식정보콘텐츠 사례 연구)

  • Shin, Dong-Hee;Kim, Hee-Kyung
    • Journal of Digital Contents Society
    • /
    • v.14 no.2
    • /
    • pp.151-159
    • /
    • 2013
  • Recently, gamification has garnered high attention in various fields outside the traditional game world through the adoption of game techniques. The introduction of gamification creates an alternate reality game. It appears virtually the same as other normal games, but is able to pull down the boundary between reality and imagination. At first, this was utilized by the entertainment industry for movies, advertisements, and drama publicity. We can see examples of gamification extending into the knowledge and information contents field. The purpose of knowledge and information contents is to pursue meaning and utility rather than fun, though the introduction of game methods remains interesting. In-depth examination of the conception of an alternate reality game via gamification will lead to the understanding of progression and quality of alternate reality games in the context of knowledge and information contents. As a result, we can effectively understand not only the immediate uses but also be able to measure the potential for utilization of gamification for various fields.

Recognition of Fire Levels based on Fuzzy Inference System using by FCM (Fuzzy Clustering 기반의 화재 상황 인식 모델)

  • Song, Jae-Won;An, Tae-Ki;Kim, Moon-Hyun;Hong, You-Sik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.1
    • /
    • pp.125-132
    • /
    • 2011
  • Fire monitoring system detects a fire based on the values of various sensors, such as smoke, CO, temperature, or change of temperature. It detects a fire by comparing sensed values with predefined threshold values for each sensor. However, to prevent a fire it is required to predict a situation which has a possibility of fire occurrence. In this work, we propose a fire recognition system using a fuzzy inference method. The rule base is constructed as a combination of fuzzy variables derived from various sensed values. In addition, in order to solve generalization and formalization problems of rule base construction from expert knowledge, we analyze features of fire patterns. The constructed rule base results in an improvement of the recognition accuracy. A fire possibility is predicted as one of 3 levels(normal, caution, danger). The training data of each level is converted to fuzzy rules by FCM(fuzzy C-means clustering) and those rules are used in the inference engine. The performance of the proposed approach is evaluated by using forest fire data from the UCI repository.

Analysis of Inter-Domain Collaborative Routing: Provider Competition for Clients

  • Nicholes, Martin O;Chuah, Chen-Nee;Wu, Shyhtsun Felix;Mukherjee, Biswanath
    • Journal of Communications and Networks
    • /
    • v.13 no.5
    • /
    • pp.499-510
    • /
    • 2011
  • Any server offering a routing service in the Internet would naturally be in competition for clients, and clients may need to utilize service from a specific server in order to achieve a desired result. We study the various properties of this competition, such as the fraction of route requests handled by a routing service provider and the fraction of total revenue obtained. As the routing service providers (i.e., servers or routers in this context) compete, they may alter behavior in order to optimize one of the above properties. For example, a service provider may lower the price charged for its service, in order to increase the number of clients served. Our models are based on servers offering a routing service to clients within representative network topologies based on actual Internet sub-graphs. These models provide, a framework for evaluating competition in the Internet. We monitor key aspects of the service, as several variables are introduced into the models. The first variable is the fraction of client requests that will pay more for a better quality route. The remaining requests are normal client requests that are satisfied by the most economical route. The second variable is the fraction of servers who choose to lower service prices in order to maximize the number of client requests served. As this fraction increases, it is more likely that a server will lower the price. Finally, there are some resource constraints applied to the model, to increase the difficulty in providing a routing solution, i.e., to simulate a realistic scenario. We seek to understand the effect on the overall network, as service providers compete. In simple cases, we show that this competition could have a negative impact on the overall efficiency of a service. We show that the routing variety present in the larger models is unable to mask this tendency and the routing service performance is decreased due to competition.

Fluid Flow and Solute Transport in a Discrete Fracture Network Model with Nonlinear Hydromechanical Effect (비선형 hydromechanic 효과를 고려한 이산 균열망 모형에서의 유체흐름과 오염물질 이송에 관한 수치모의 실험)

  • Jeong, U-Chang
    • Journal of Korea Water Resources Association
    • /
    • v.31 no.3
    • /
    • pp.347-360
    • /
    • 1998
  • Numerical simulations for fluid flow and solute transport in a fracture rock masses are performed by using a transient flow model, which is based on the three-dimensional stochastic and discrete fracture network model (DFN model) and is coupled hydraulic model with mechanical model. In the numerical simulations of the solute transport, we used to the particle following algorithm which is similar to an advective biased random walk. The purpose of this study is to predict the response of the tracer test between two deep bore holes (GPK1 and GPK2) implanted at Soultz sous Foret in France, in the context of the geothermal researches.l The data sets used are obtained from in situcirculating experiments during 1995. As the result of the transport simulation, the mean transit time for the non reactive particles is about 5 days between two bore holes.

  • PDF

A Study on the Recognition and the Preferences for Traditional Korean Food Served at the Middle School Good Service in the Gyeonggi Area (경기 일부 지역 중학생들의 학교 급식으로 제공되는 한국 전통음식의 기호도 및 인식 조사)

  • Kim, Myung-Hee;Choi, Mi-Kyeong;Kim, Mi-Won;Eom, Ah-Young
    • The Korean Journal of Food And Nutrition
    • /
    • v.24 no.1
    • /
    • pp.54-64
    • /
    • 2011
  • The study was conducted to identify the recognition, and the preference for the traditional food provided by secondary school food services in male and female secondary school students in certain areas of Gyeonggi-do. The summarized results are from a survey of 300 students. Forty seven percent of the men and women had BMI indexes within the normal range. In an investigation of satisfaction, and recognition of traditional food, ~81.3% of the total respondents stated that Korean food developed in the context of traditional culture best defined traditional Korean food(p<0.01). In a reason of being concerned about the traditional food, man and woman student who responded "through mass-media" was the most. Concerning the degree of satisfaction with the traditional food provided in school food services, ~67.3% of total respondents responded with "satisfaction", this was double the number of responses indicating "unsatisfaction". In an order of preference of traditional Korean foods provided in school food services, noodles, dumplings, stew, and Jungol rated the highest in preference. Seasoned vegetables, raw vegetables, radishes seasoned with soy, and salted fish were the foods with the lowest preference ratings; the students did not prefer to those foods. Especially, soup(p<0.01), broth(p<0.05), roast(p<0.01), and hard boiled food, and fried food(p<0.05) showed meaningful differences regarding gender preference.

Analysis of Security Vulnerability on Firewall Logging Mechanism against DDoS Attack (DDoS 공격에 대한 방화벽 로그 기록 취약점 분석)

  • Choun, Jun-Ho;Jang, Kun-Won;Jun, Moon-Seog;Shin, Dong-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.143-148
    • /
    • 2007
  • In the context of mass traffic, firewall system cannot record normal log files against DDoS attack. The loss of log record causes that a firewall system does not know whether a packet is normally filtered or not, and firewall log, which is an essential data for the counter measure of violation accident, cannot be verified as trusted. As a network speed increases, these problems happen more frequently and largely. Accordingly, the method to use simply additional hardware devices is not recommended for the popularization of firewall. This paper is devoted to verify the loss of iptable log that is the mother's womb of most domestic firewall systems and show that the log handling methods for conventional firewall systems are needed to improve.

The Effects of Robot's Persuasive Intention and it's Physical Distance with Consumers on Consumers' Evaluation on the Robot and Product Purchase Intention (로봇의 설득의도와 소비자와의 물리적 거리가 소비자의 로봇에 대한 평가와 제품의 구매의도에 미치는 영향)

  • Lee, Doohwang;Ahn, Jungsun;Kim, Hyuksoo
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.3
    • /
    • pp.590-601
    • /
    • 2021
  • The current study explored how robot's persuasive intent and its' physical distance affect consumers' evaluaton on the robot and the product that the robot advertises. This study administered a 2 (level of pursasion intent: low vs. high) × 2 (physical distance: normal vs. close) between-subjects factorial design experiment. The findings revealed that consumers evaluated the robot' expertise and trustworthiness more negatively and reported lower intentions to buy the produce when they perceived robot's persasive intent saliently high. Consumers were also found to show more negative attitude toward the robot and lower intentions to buy the produce when the robot approached to their personal space more closely. The theoretical and practical implications about human-robot interaction in marketing context were discussed.

Regulation of Hepatic Gluconeogenesis by Nuclear Receptor Coactivator 6

  • Oh, Gyun-Sik;Kim, Si-Ryong;Lee, Eun-Sook;Yoon, Jin;Shin, Min-Kyung;Ryu, Hyeon Kyoung;Kim, Dong Seop;Kim, Seung-Whan
    • Molecules and Cells
    • /
    • v.45 no.4
    • /
    • pp.180-192
    • /
    • 2022
  • Nuclear receptor coactivator 6 (NCOA6) is a transcriptional coactivator of nuclear receptors and other transcription factors. A general Ncoa6 knockout mouse was previously shown to be embryonic lethal, but we here generated liver-specific Ncoa6 knockout (Ncoa6 LKO) mice to investigate the metabolic function of NCOA6 in the liver. These Ncoa6 LKO mice exhibited similar blood glucose and insulin levels to wild type but showed improvements in glucose tolerance, insulin sensitivity, and pyruvate tolerance. The decrease in glucose production from pyruvate in these LKO mice was consistent with the abrogation of the fasting-stimulated induction of gluconeogenic genes, phosphoenolpyruvate carboxykinase 1 (Pck1) and glucose-6-phosphatase (G6pc). The forskolin-stimulated inductions of Pck1 and G6pc were also dramatically reduced in primary hepatocytes isolated from Ncoa6 LKO mice, whereas the expression levels of other gluconeogenic gene regulators, including cAMP response element binding protein (Creb), forkhead box protein O1 and peroxisome proliferator-activated receptor γ coactivator 1α, were unaltered in the LKO mouse livers. CREB phosphorylation via fasting or forskolin stimulation was normal in the livers and primary hepatocytes of the LKO mice. Notably, it was observed that CREB interacts with NCOA6. The transcriptional activity of CREB was found to be enhanced by NCOA6 in the context of Pck1 and G6pc promoters. NCOA6-dependent augmentation was abolished in cAMP response element (CRE) mutant promoters of the Pck1 and G6pc genes. Our present results suggest that NCOA6 regulates hepatic gluconeogenesis by modulating glucagon/cAMP-dependent gluconeogenic gene transcription through an interaction with CREB.

Fraud detection support vector machines with a functional predictor: application to defective wafer detection problem (불량 웨이퍼 탐지를 위한 함수형 부정 탐지 지지 벡터기계)

  • Park, Minhyoung;Shin, Seung Jun
    • The Korean Journal of Applied Statistics
    • /
    • v.35 no.5
    • /
    • pp.593-601
    • /
    • 2022
  • We call "fruad" the cases that are not frequently occurring but cause significant losses. Fraud detection is commonly encountered in various applications, including wafer production in the semiconductor industry. It is not trivial to directly extend the standard binary classification methods to the fraud detection context because the misclassification cost is much higher than the normal class. In this article, we propose the functional fraud detection support vector machine (F2DSVM) that extends the fraud detection support vector machine (FDSVM) to handle functional covariates. The proposed method seeks a classifier for a function predictor that achieves optimal performance while achieving the desired sensitivity level. F2DSVM, like the conventional SVM, has piece-wise linear solution paths, allowing us to develop an efficient algorithm to recover entire solution paths, resulting in significantly improved computational efficiency. Finally, we apply the proposed F2DSVM to the defective wafer detection problem and assess its potential applicability.