• Title/Summary/Keyword: Performance Issues

Search Result 2,811, Processing Time 0.028 seconds

North Korea's Overseas Transfer Dance - Focusing on Japan and China - (북한춤의 해외전파 : 일본과 중국을 중심으로)

  • Kim, Chae-Won
    • (The) Research of the performance art and culture
    • /
    • no.22
    • /
    • pp.185-221
    • /
    • 2011
  • This study overseas compatriots in the North during the propagation and development of dance patterns and was going to be based, people living outside of the dance culture as a group of overseas Koreans, especially dance culture of Koreans in Japan, China are interested in and thought about the necessity of the study. Issues discussed in the literature of research results, autonomous community of Koreans in Japan ethnic Koreans and Chinese dance culture dance Choi Seung-hee starting point common was, two ethnic groups, directly or indirectly from the Choi Seung-hee learn to dance or have received specialized training to work, compiled by Choi Seung-hee Korea on the basis of basic dance training was learning the dance. In addition, specialized training and dance training institutions in the North Koreans in Japan Social Dance Group for the system, such as dance training in a separate place where talented people through the exhaust, to act in a professional troupes have maintained a system. In contrast, Chinese ethnic Koreans in Yanbian Autonomous University and Central University for Nationalities in the dance departments are stationed there, the transfer from the Joseon dance dance by educating gifted talents have been dispose, South Korea and similar aspects of the dance education system can be seen. Dance work based training and the tendency of Koreans in Japan in terms of social practice and dance in the North of basic training as basic training and specialized training, and work to represent the North korea's famous dance folk dance performances have been transmitted intact. In China, however, ethnic Koreans Choi Seung-hee compiled by borough basis and the work of the North korean dance training or specialized training received directly from her, she founded the dance student of Choi Seung-hee developed basic techniques of Chinese ethnic dance and ethnic Koreans in China, while receiving only Sewonaga dance training system as a deal on exchanges with the North Korean dance dancing free dance culture for creation peppered ethnic Koreans in China was formed. When passed down to the time, Koreans in Japan since the 1960s, society began to visit Pyongyang in the 1970s, subjected to a direct transfer, and education and through the 1990s, the North Koreans in Japan by inviting dancers and dance directly to basic training by getting education bukhanchum As can be seen in the spectacular aspects will have to reproduce. However, ethnic Koreans in China in the 1950s in districts in Beijing, Pyongyang and received direct guidance from Choi Seung-hee, Dancers from the North after Pyongyang rather than direct guidance on the occasion of his visit to China Dance Troupe was affected. On the other hand Korean dance since the 1990s, starting with Ethnic Koreans in China only began to absorb a different dance culture has been created. The same nation, yet living in the region and to configure the ethnic groups, the configuration of the system and political system, according to the North Dancing transfer process and the development pattern similar, but each of the identities to ensure their own traits with a dance culture, the formation and develop the arrival of You can find out. In other words, Koreans in Japan and Federation of Koreans in Japan under the control of social forces of the dance culture by Acculturation variation of dance culture, dance culture of the borough ethnic Koreans in China Acculturation by the voluntary and free borrowers were able to gauge the changes in development.

A Study on the Variable Factors for Brain Perfusion SPECT(Diamox) Scan (Brain Perfusion SPECT(Diamox) 검사의 수행결과에 영향을 주는 요인)

  • Lee, Jin-Hyeong;Kim, Sang-Eon;Park, Hyeon-Soo;Park, Yeoung-Jae;Lee, In-Won
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.15 no.2
    • /
    • pp.99-103
    • /
    • 2011
  • Purpose: Head movement during brain perfusion SPECT (Diamox) scan is a one of important issues which decreases image quality. It also causes repeated scans. This study was designed to evaluate variable factors causing scan failures. Materials and Methods: 676 patients (359 men, 317 women, age average $54.5{\pm}18.4$) for brain perfusion SPECT (Diamox) scan from March, 2010 to Feb. 2011 were used as a subject. Age data and the kind of disease(Moyamoya disease (MMD), None moyamoya disease (NMMD), Cerebral infarction (CI)), test performance outcome (success,failure) were collected. The head movement factors(gender, disease, age, head fixation device) were evaluated by chi-square test and logistic regression analysis Results: The result showed that men had higher scan failure rate than women. Seniors in seventies(men 3.4%, women 1.5%) showed the most highest failure rate. Using head fixation device increased scan success rate up to 94.4~97.7%. The scan success rate is dependent upon gender, head fixation device by chi-square test(${\chi}^2$=3.8 (df=1, p<0.05), ${\chi}^2$=10.4 (df=1, p<0.001)) Gender, disease(CI), head fixation device showed very effective result in logistic regression analysis.(Wald=3.3 (p<0.07), Wald=3.7 (p<0.05), Wald=9.3 (p<0.05) Conclusion: It is demonstrated that gender, disease, using head fixation device is statistically very useful factors. Especially, head fixation device is a main key minimizing repeated scan.

  • PDF

Accuracy evaluation of microwave water surface current meter for measurement angles in middle flow condition (전자파표면유속계의 측정 각도에 따른 평수기 유속 측정 정확도 분석)

  • Son, Geunsoo;Kim, Dongsu;Kim, Kyungdong;Kim, Jongmin
    • Journal of Korea Water Resources Association
    • /
    • v.53 no.1
    • /
    • pp.15-27
    • /
    • 2020
  • Streamflow discharge as a fundamental riverine quantity plays a crucial role in water resources management, thereby requiring accurate in-situ measurement. Recent advances in instrumentations for the streamflow discharge measurement has complemented or substituted classical devices and methods. Among various potential methods, surface current meter using microwave has increasingly begun to be applied not only for flood but also normal flow discharge measurement, remotely and safely enabling practitioners to measure flow velocity postulating indirect contact. With minimized field preparedness, this method facilitated and eased flood discharge measurement in the difficult in-situ conditions such as extreme flood in active ways emitting 24.125 GHz microwave without relying on natural lights. In South Korea, a rectangular shaped instrument named with Microwave Water Surface Current Meter (MWSCM) has been developed and commercially released around 2010, in which domestic agencies charging on streamflow observation shed lights on this approach regarding it as a potential substitute. Considering this brand-new device highlighted for efficient flow measurement, however, there has been few noticeable efforts in systematic and comprehensive evaluation of its performance in various measurement and riverine conditions that lead to lack in imminent and widely spreading usages in practices. This study attempted to evaluate the MWSCM in terms of instrumen's monitoring configuration particularly regarding tilt and yaw angle. In the middle of pointing the measurement spot in a given cross-section, the observation campaign inevitably poses accuracy issues related with different tilt and yaw angles of the instrument, which can be a conventionally major source of errors for this type of instrument. Focusing on the perspective of instrument configuration, the instrument was tested in a controlled outdoor river channel located in KICT River Experiment Center with a fixed flow condition of around 1 m/s flow speed with steady flow supply, 6 m of channel width, and less than 1 m of shallow flow depth, where the detailed velocity measurements with SonTek micro-ADV was used for validation. As results, less than 15 degree in tilting angle generated much higher deviation, and higher yawing angle proportionally increased coefficient of variance. Yaw angles affected accuracy in terms of measurement area.

Types of business model in the 4th industrial revolution (4차 산업혁명시대의 비즈니스 모델 유형)

  • Jung, Sang-hee;Chung, Byoung-gyu
    • Journal of Venture Innovation
    • /
    • v.1 no.1
    • /
    • pp.1-14
    • /
    • 2018
  • The 4th Industrial Revolution is making a big change for our company like the tsunami. The CPS system, which is represented by the digital age, is based on the data accumulated in the physical domain and is making business that was not imagined in the past through digital technology. As a result, the business model of the 4th Industrial Revolution era is different from the previous one. In this study, we analyze the trends and the issues of business innovation theory research. Then, the business innovation model of the digital age was compared with the previous period. Based on this, we have searched for a business model suitable for the 4th Industrial Revolution era. The existing business models have many difficulties to explain the model of the digital era. Even though more empirical research should be supported, Michael Porter's diamond model is most suitable for four cases of business models by applying them. Type A sharing outcome with customer is a model that pay differently according to the basis of customer performance. Type B Value Chain Digitalization model provides products and services to customers with faster and lower cost by digitalizing products, services and SCM. Type C Digital Platform is the model that brings the biggest ripple effect. It is a model that can secure profitability by creating new market by creating the sharing economy based on digital platform. Finally, Type D Sharing Resources is a model for building a competitive advantage model by collaborating with partners in related industries. This is the most effective way to complement each other's core competencies and their core competencies. Even though numerous Unicorn companies have differentiated digital competitiveness with many digital technologies in their respective industries in the 4th Industrial Revolution era, there is a limit to the number of pieces to be listed. In future research, it is necessary to identify the business model of the digital age through more specific empirical analysis. In addition, since digital business models may be different in each industry, it is also necessary to conduct comparative analysis between industries

Science Teachers' Diagnoses of Cooperative Learning in the Field (과학교사들이 진단한 과학과 협동학습의 실태)

  • Kwak, Young-Sun
    • Journal of the Korean earth science society
    • /
    • v.22 no.5
    • /
    • pp.360-376
    • /
    • 2001
  • This qualitative research investigated in-service science teachers' perceptions about cooperative learning and their perceived barriers in implementing cooperative learning in their classrooms. The underlying premise for cooperative learning is founded in constructivist epistemology. Cooperative learning (CL) is presented as an alternative frame to the current educational system which emphasizes content memorization and individual student performance through competition. An in-depth interview was conducted with 18 in-service science teachers who enrolled in the first-class teacher certification program during 2001 summer vacation. These secondary school teachers's interview data were analyzed and categorized into three areas: teachers' definition of cooperative learning, issues with implementing cooperative learning in classrooms, and teachers' and students' responses towards cooperative learning. Each of these areas are further subdivided into 10 themes: teachers' perceived meaning of cooperative learning, the importance of talk in learning, when to use cooperative learning, how to end a cooperative class, how to group students for cooperative learning, obstacles to implementing cooperative learning, students' reactions to cooperative learning, teachers' reasons for choosing (not choosing) student-centered approaches to learning/teaching, characteristics of teachers who use cooperative learning methods, and teachers' reasons for resisting cooperative learning. Detailed descriptions of the teachers' responses and discussion on each category are provided. For the development and implementation of CL in more classrooms, there should be changes and supports in the following five areas: (1) teachers have to examine their pedagogical beliefs toward constructivist perspectives, (2) teacher (re)education programs have to provide teachers with cooperative learning opportunities in methods courses, (3) students' understanding of their changed roles (4) supports in light of curriculum materials and instructional resources, (5) supports in terms of facilities and administrators. It's important to remember that cooperative learning is not a panacea for all instructional problems. It's only one way of teaching and learning, useful for specific kinds of teaching goals and especially relevant for classrooms with a wide mix of student academic skills. Suggestions for further research are also provided.

  • PDF

Korean parents' perceptions of the challenges and needs on school re-entry during or after childhood and adolescent cancer: a multi-institutional survey by Korean Society of Pediatric Hematology and Oncology

  • Lee, Jun Ah;Lee, Jae Min;Park, Hyeon Jin;Park, Meerim;Park, Byung Kiu;Ju, Hee Young;Kim, Ji Yoon;Park, Sang Kyu;Lee, Young Ho;Shim, Ye Jee;Kim, Heung Sik;Park, Kyung Duk;Lim, Yeon-Jung;Chueh, Hee Won;Park, Ji Kyoung;Kim, Soon Ki;Choi, Hyoung Soo;Ahn, Hyo Seop;Hah, Jeong Ok;Kang, Hyoung Jin;Shin, Hee Young;Lee, Mee Jeong
    • Clinical and Experimental Pediatrics
    • /
    • v.63 no.4
    • /
    • pp.141-145
    • /
    • 2020
  • Background: For children and adolescents with cancer, going back to school is a key milestone in returning to "normal life." Purpose: To identify the support vital for a successful transition, we evaluated the parents' needs and the challenges they face when their children return to school. Methods: This multi-institutional study was conducted by the Korean Society of Pediatric Hematology and Oncology. The written survey comprised 24 questions and was completed by 210 parents without an interviewer. Results: Most parents (165 of 206) reported that their children experienced difficulties with physical status (n=60), peer relationships (n=30), academic performance (n=27), emotional/behavioral issues (n=11), and relationships with teachers (n=4) on reentering school. Parents wanted to be kept informed about and remain involved in their children's school lives and reported good parent-teacher communication (88 of 209, 42.1%). Parents reported that 83.1% and 44.9% of teachers and peers, respectively, displayed an adequate understanding of their children's condition. Most parents (197 of 208) answered that a special program is necessary to facilitate return to school after cancer therapy that offers emotional support (n=85), facilitates social adaptation (n=61), and provides tutoring to accelerate catch up (n=56), and continued health care by hospital outreach and school personnel (n=50). Conclusion: In addition to scholastic aptitude-oriented programs, emotional and psychosocial support is necessary for a successful return to school. Pediatric oncologists should actively improve oncology practices to better integrate individualized school plans and educate peers and teachers to improve health literacy to aid them in understanding the needs of children with cancer.

Optimization of Support Vector Machines for Financial Forecasting (재무예측을 위한 Support Vector Machine의 최적화)

  • Kim, Kyoung-Jae;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.241-254
    • /
    • 2011
  • Financial time-series forecasting is one of the most important issues because it is essential for the risk management of financial institutions. Therefore, researchers have tried to forecast financial time-series using various data mining techniques such as regression, artificial neural networks, decision trees, k-nearest neighbor etc. Recently, support vector machines (SVMs) are popularly applied to this research area because they have advantages that they don't require huge training data and have low possibility of overfitting. However, a user must determine several design factors by heuristics in order to use SVM. For example, the selection of appropriate kernel function and its parameters and proper feature subset selection are major design factors of SVM. Other than these factors, the proper selection of instance subset may also improve the forecasting performance of SVM by eliminating irrelevant and distorting training instances. Nonetheless, there have been few studies that have applied instance selection to SVM, especially in the domain of stock market prediction. Instance selection tries to choose proper instance subsets from original training data. It may be considered as a method of knowledge refinement and it maintains the instance-base. This study proposes the novel instance selection algorithm for SVMs. The proposed technique in this study uses genetic algorithm (GA) to optimize instance selection process with parameter optimization simultaneously. We call the model as ISVM (SVM with Instance selection) in this study. Experiments on stock market data are implemented using ISVM. In this study, the GA searches for optimal or near-optimal values of kernel parameters and relevant instances for SVMs. This study needs two sets of parameters in chromosomes in GA setting : The codes for kernel parameters and for instance selection. For the controlling parameters of the GA search, the population size is set at 50 organisms and the value of the crossover rate is set at 0.7 while the mutation rate is 0.1. As the stopping condition, 50 generations are permitted. The application data used in this study consists of technical indicators and the direction of change in the daily Korea stock price index (KOSPI). The total number of samples is 2218 trading days. We separate the whole data into three subsets as training, test, hold-out data set. The number of data in each subset is 1056, 581, 581 respectively. This study compares ISVM to several comparative models including logistic regression (logit), backpropagation neural networks (ANN), nearest neighbor (1-NN), conventional SVM (SVM) and SVM with the optimized parameters (PSVM). In especial, PSVM uses optimized kernel parameters by the genetic algorithm. The experimental results show that ISVM outperforms 1-NN by 15.32%, ANN by 6.89%, Logit and SVM by 5.34%, and PSVM by 4.82% for the holdout data. For ISVM, only 556 data from 1056 original training data are used to produce the result. In addition, the two-sample test for proportions is used to examine whether ISVM significantly outperforms other comparative models. The results indicate that ISVM outperforms ANN and 1-NN at the 1% statistical significance level. In addition, ISVM performs better than Logit, SVM and PSVM at the 5% statistical significance level.

The Construction Direction of the ROK NAVY for the Protection of Marine Sovereignty (국가의 해양주권 수호를 위한 한국해군의 전력건설 방향)

  • Shin, In-Kyun
    • Strategy21
    • /
    • s.30
    • /
    • pp.99-142
    • /
    • 2012
  • Withe increased North Korea's security threats, the South Korean navy has been faced with deteriorating security environment. While North Korea has increased asymmetric forces in the maritime and underwater with the development of nuclear weapons, and China and Japan have made a large investment in the buildup of naval forces, the power of the Pacific fleet of the US, a key ally is expected to be weakened. The biggest threat comes from China's intervention in case of full-scale war with North Korea, but low-density conflict issues are also serious problems. North Korea has violated the Armistice Agreement 2,660 times since the end of Korean War, among which the number of marine provocations reaches 1,430 times, and the tension over the NLL issue has been intensifying. With tension mounting between Korea and Japan over the Dokdo issue and conflict escalating with China over Ieo do Islet, the US Navy has confronted situation where it cannot fully concentrate on the security of the Korean peninsula, which leads to need for strengthening of South Korea's naval forces. Let's look at naval forces of neighboring countries. North Korea is threatening South Korean navy with its increased asymmetric forces, including submarines. China has achieved the remarkable development of naval forces since the promotion of 3-step plan to strengthen naval power from 1989, and it now retains highly modernized naval forces. Japan makes an investment in the construction of stat of the art warship every year. Since Japan's warship boasts of its advanced performance, Japan's Maritime Self Defense Force is evaluated the second most powerful behind the US Navy on the assumption that submarine power is not included in the naval forces. In this situation, naval power construction of South Korean navy should be done in phases, focusing on the followings; First, military strength to repel the energy warship quickly without any damage in case of battle with North Korea needs to be secured. Second, it is necessary to develop abilities to discourage the use of nuclear weapons of North Korea and attack its nuclear facilities in case of emergency. Third, construction of military power to suppress armed provocations from China and Japan is required. Based on the above naval power construction methods, the direction of power construction is suggested as follows. The sea fleet needs to build up its war potential to defeat the naval forces of North Korea quickly and participate in anti-submarine operations in response to North Korea's provocations. The task fleet should be composed of 3 task flotilla and retain the power to support the sea fleet and suppress the occurrence of maritime disputes with neighboring countries. In addition, it is necessary to expand submarine power, a high value power asset in preparation for establishment of submarine headquarters in 2015, develop anti-submarine helicopter and load SLAM-ER missile onto P-3C patrol aircraft. In case of maine corps, division class military force should be able to conduct landing operations. It takes more than 10 years to construct a new warship. Accordingly, it is necessary to establish plans for naval power construction carefully in consideration of reality and future. For the naval forces to safeguard maritime sovereignty and contribute to national security, the acquisition of a huge budget and buildup of military power is required. In this regard, enhancement of naval power can be achieved only through national, political and military understanding and agreement. It is necessary to let the nation know that modern naval forces with improved weapon system can serve as comprehensive armed forces to secure the command of the sea, perform defense of territory and territorial sky and attack the enemy's strategic facilities and budget inputted in the naval forces is the essential source for early end of the war and minimization of damage to the people. If the naval power construction is not realized, we can be faced with a national disgrace of usurpation of national sovereignty of 100 years ago. Accordingly, the strengthening of naval forces must be realized.

  • PDF

Timing Driven Analytic Placement for FPGAs (타이밍 구동 FPGA 분석적 배치)

  • Kim, Kyosun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.7
    • /
    • pp.21-28
    • /
    • 2017
  • Practical models for FPGA architectures which include performance- and/or density-enhancing components such as carry chains, wide function multiplexers, and memory/multiplier blocks are being applied to academic FPGA placement tools which used to rely on simple imaginary models. Previously the techniques such as pre-packing and multi-layer density analysis are proposed to remedy issues related to such practical models, and the wire length is effectively minimized during initial analytic placement. Since timing should be optimized rather than wire length, most previous work takes into account the timing constraints. However, instead of the initial analytic placement, the timing-driven techniques are mostly applied to subsequent steps such as placement legalization and iterative improvement. This paper incorporates the timing driven techniques, which check if the placement meets the timing constraints given in the standard SDC format, and minimize the detected violations, with the existing analytic placer which implements pre-packing and multi-layer density analysis. First of all, a static timing analyzer has been used to check the timing of the wire-length minimized placement results. In order to minimize the detected violations, a function to minimize the largest arrival time at end points is added to the objective function of the analytic placer. Since each clock has a different period, the function is proposed to be evaluated for each clock, and added to the objective function. Since this function can unnecessarily reduce the unviolated paths, a new function which calculates and minimizes the largest negative slack at end points is also proposed, and compared. Since the existing legalization which is non-timing driven is used before the timing analysis, any improvement on timing is entirely due to the functions added to the objective function. The experiments on twelve industrial examples show that the minimum arrival time function improves the worst negative slack by 15% on average whereas the minimum worst negative slack function improves the negative slacks by additional 6% on average.

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.