• Title/Summary/Keyword: Private framework

Search Result 302, Processing Time 0.027 seconds

Curriculum Mining Analysis Using Clustering-Based Process Mining (군집화 기반 프로세스 마이닝을 이용한 커리큘럼 마이닝 분석)

  • Joo, Woo-Min;Choi, Jin Young
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.45-55
    • /
    • 2015
  • In this paper, we consider curriculum mining as an application of process mining in the domain of education. The basic objective of the curriculum mining is to construct a registration pattern model by using logs of registration data. However, subject registration patterns of students are very unstructured and complicated, called a spaghetti model, because it has a lot of different cases and high diversity of behaviors. In general, it is typically difficult to develop and analyze registration patterns. In the literature, there was an effort to handle this issue by using clustering based on the features of students and behaviors. However, it is not easy to obtain them in general since they are private and qualitative. Therefore, in this paper, we propose a new framework of curriculum mining applying K-means clustering based on subject attributes to solve the problems caused by unstructured process model obtained. Specifically, we divide subject's attribute data into two parts : categorical and numerical data. Categorical attribute has subject name, class classification, and research field, while numerical attribute has ABEEK goal and semester information. In case of categorical attribute, we suggest a method to quantify them by using binarization. The number of clusters used for K-means clustering, we applied Elbow method using R-squared value representing the variance ratio that can be explained by the number of clusters. The performance of the suggested method was verified by using a log of student registration data from an 'A university' in terms of the simplicity and fitness, which are the typical performance measure of obtained process model in process mining.

Comparative Study of Hospital Architecture Design Guidelines and Frameworks for the Patient Safety - Focused on the US and UK (환자안전을 위한 병원건축 설계지침과 디자인 기본구조 비교조사 - 미국과 영국을 중심으로)

  • Kim, Youngaee;Lee, Hyunjin;Song, Sanghoon
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.27 no.3
    • /
    • pp.27-37
    • /
    • 2021
  • Purpose: The purpose of this study is to compare the changes in hospital accreditation evaluations, the changes in hospital building design guidelines, and the development of design indicators for reducing medical accidents in the state-of-the-art healthcare providers. Methods: The changes and tools were carefully investigated and compared that had been taken place and used in the building certification standards, design guidelines, and patient safety design standards to reduce accidents in the United States and the United Kingdom. Results: First, medical accidents are recognized as multiple defense layers rather than personal ones, and a public reporting and learning system is created, reporting the accidents in question publicly and suggesting ways to improve them based on the data at a time. Second, for the accreditation institute that secures the service quality of medical institutions, detailed standards for patient safety are continuously updated with focus on clinical trials. The United States is in charge of the private sector, but on the other hand the United Kingdom is in charge of the public sector. Third, the design guidelines are provided as web-based tools that complement various guidelines for patient safety, and are improved and developed as well. Fourth, detailed approaches are continuously developed and provided to secure patient safety and reduce medical accidents through appropriate research, evidence-based design and strict evaluations. Implications: When medical institutions make efforts to strength patient safety methods through valid design standards, accidents are expected to decrease, whereby hospital finances are also to be improved. A higher level of medical quality service will sure be secured through comprehensive certification evaluation.

Evaluating Records and Their Descriptive Elements in the Records Management of Korea on the Basis of the Characteristics of a Record and Recordkeeping Metadata Standards (기록의 속성과 메타데이터 표준을 통해 본 한국의 기록·기록기술)

  • Kim, Ik-han
    • The Korean Journal of Archival Studies
    • /
    • no.10
    • /
    • pp.3-26
    • /
    • 2004
  • ISO 15489:2001 addresses the principles and requirements with which organizations, both public and private, should comply on the management of their records to ensure that adequate records are created, captured and managed. The standard defines the characteristics that a record should have through records management system as follows: authenticity, reliability, integrity, and usability. Authenticity means that records can be proven to be what it purports to be, to have been created or sent by the person purported to have created or sent it, and to have been created or sent at the time purported. Reliability means that the contents of the records can be trusted as a full and accurate representation of the transactions, activities or facts to which they attest and can be depended upon in the course of subsequent transactions or activities. Integrity refers to ensuring that a record is complete and unaltered. Usability means that records can be located, retrieved, presented and interpreted. In order to have these characteristics, a record should be persistently linked to the metadata necessary to document a transaction. Metadata is "data describing context, content and structure of records and their management through time." Metadata ensure the creation and maintenance of authentic, reliable and usable records and the protection of the integrity of those records. It could be implemented by creating and capturing records management metadata in systems that create and manage records. There have been some projects and standard initiatives to identify a core set of records management metadata. Included are the Australian Recordkeeping Metadata Standard and the British Metadata Standard which is part of the Requirements for Electronic Records Management System. Recently ISO/TS 23081-1 is published to implement metadata requirements within the framework of ISO 15489. Public records management system in Korea is ruled by the Act on the Management of Archives by Public Agencies and Administrative Records Management Regulation. This article evaluates records and their descriptive elements captured and maintained by the records management system in Korea on the basis of the international metadata standards.

Evaluation of marginal adaptation in three-unit frameworks fabricated with conventional and powder-free digital impression techniques

  • Kocaagaoglu, Hasan;Albayrak, Haydar;Sahin, Sezgi Cinel;Gurbulak, Aysegul Guleryuz
    • The Journal of Advanced Prosthodontics
    • /
    • v.11 no.5
    • /
    • pp.262-270
    • /
    • 2019
  • PURPOSE. The purpose of this in vitro study was to evaluate the marginal misfits of three-unit frameworks fabricated with conventional and digital impressions techniques. MATERIALS AND METHODS. Thirty brass canine and second premolar abutment preparations were fabricated by using a computer numerical control machine and were randomly divided into 3 groups (n=10) as follows: conventional impression group (Group Ci), Cerec Omnicam (Group Cdi), and 3shape TRIOS-3 (Group Tdi) digital impression groups. The laser-sintered metal frameworks were designed and fabricated with conventional and digital impressions. The marginal adaptation was assessed with a stereomicroscope at ${\times}30$ magnification. The data were analyzed with 1-way analysis of variances (ANOVAs) and the independent simple t tests. RESULTS. A statistically significant difference was found between the frameworks fabricated by conventional methods and those fabricated by digital impression methods. Multiple comparison results revealed that the frameworks in Group Ci (average, $98.8{\pm}16.43{\mu}m$; canine, $93.59{\pm}16.82{\mu}m$; premolar, $104.10{\pm}15.02{\mu}m$) had larger marginal misfit values than those in Group Cdi (average, $63.78{\pm}14.05{\mu}m$; canine, $62.73{\pm}13.71{\mu}m$; premolar, $64.84{\pm}15.06{\mu}m$) and Group Tdi (average, $65.14{\pm}18.05{\mu}m$; canine, $70.64{\pm}19.02{\mu}m$; premolar, $59.64{\pm}16.10{\mu}m$) (P=.000 for average; P=.001 for canine; P<.001 for premolar). No statistical difference was found between the marginal misfits of canine and premolar abutment teeth within the same groups (P>.05). CONCLUSION. The three-unit frameworks fabricated with digital impression techniques showed better marginal fit compared to conventional impression techniques. All marginal misfit values were clinically acceptable.

A Study on the Influencing Factors on Social Media Use Intensity and Fatigue, and the Moderating Effect of Process Incentive Expectations (소셜 미디어 사용 강도 및 피로감에 미치는 영향 요인과 성과기대의 조절 효과 연구)

  • Park, Kiho
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.215-227
    • /
    • 2021
  • This study empirically studied the factors affecting the intensity of use of mobile social media and fatigue. Theories for the research framework were based on the theory of planned behavior, the theory of private information protection, the theory of flow, and the theory of process incentives. As a result of data analysis, it was found that self-efficacy, user habits, and flow experience positively influence the intensity of mobile social media use. This study assumed that personal information protection issues negatively affect the intensity of mobile social media use, but have little influence on the use intensity. The intensity of media use had a positive effect on media fatigue. In other words, when the intensity of using mobile social media increased, the feeling of fatigue increased. The expected process incentives variable did not show a moderating effect between media use intensity and social media fatigue. The findings will have implications for social media-related companies and organizations that want to use social media tools for business and public services.

A Study on the Master Plan of a Religious Community Complexes Applying the Types of the Urban Street Patterns. (도시가로패턴의 유형을 응용한 신앙공동체마을의 배치계획에 관한 연구)

  • Park, Chang Geun
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.7
    • /
    • pp.63-72
    • /
    • 2019
  • The purpose of this study is to apply the types of urban street pattern and the shape of streets to the master plan of a religious community complexes. The street pattern is a framework of urban structure and to understand the urban structure is helpful to understand the nature of urban streets. By analysing the precedent researches, the types of street patterns are classified as a serial pattern, a branching pattern, a grid pattern and a web pattern. The street patterns are hierarchically composed and classified as a differential development and sequential development. There are boundaries and gates where the street space is differentiated to the more private level. The urban streets continue to the architectural streets such as arcades, deck streets, corridors, lobbies and halls. The purposes and results of the master plan of this religious community complexes are as follows. 1) The school area, housing area and service area are properly separated and connected. They are separated by the building masses and connected by the street space in between. 2) The street pattern of this complexes is a serial pattern where the streets are the center of each functional building groups. The entry square is divided by the symbolic building. The one branch is school street and the other is living street. These streets are combined again to the festival street. 3) The architectural streets are organically related to the urban streets. 4) Each street spaces are of adequate form according to its properties as a place. 5) There are boundaries or gates such as a gab between buildings, posts, arches and deck streets according to the relationship between streets.

How Well Are WHO's Global Age-friendly Cities Guidelines Reflected in Saeromaji Plan 2015? (WHO의 고령친화도시모델가이드 충족도 분석: 제2차 저출산·고령사회기본계획을 중심으로)

  • Chung, Soondool;Auh, Erica Yoonkyung
    • 한국노년학
    • /
    • v.32 no.3
    • /
    • pp.913-926
    • /
    • 2012
  • The purpose of this study is to review Saeromaji Plan 2015 (the Second Basic Plan for the Low Fertility and Aging Society) with the framework of WHO's (2007) guidelines for building age-friendly cities and to provide suggestions for improvements in planning for the aging society. The contents of the Plan pertaining to the aging society sections were reviewed by two independent researchers to examine the extent to which the Plan fulfilled 169 checklists across 8 themes proposed by WHO. The results indicate that all 8 themes were partially reflected in the Plan. Suggested improvements for planning for the aging society include taking an inclusive approach to bring generations together, providing more options for older adults, and including more active involvement of the private sector in planning.

Designing Reliable P2P Transmission Mechanism Against MITM Attack (MITM 공격에 안전한 P2P 신뢰전송 메커니즘의 설계)

  • Kim, Sang-Choon;Kwon, Hyeonk-Chan;Nah, Jae-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.103-109
    • /
    • 2008
  • Many Internet application provide the PKI(public key infrastructure)-based service to provide authentication and message integrity. Several researchers proposed PKI-based p2p network framework. However, in the real world, the use of PKI is not suitable for peer to peer network, because the peer-to-peer network is an open and dynamic network. Moreover, currently there is no nation-to-nation interoperable certificate. In this paper, we designed reliable p2p file sharing application without public key infrastructure. To do this we propose reliable public key distribution mechanism to distribute public key safely without PKI infrastructure for two-tier super-peer architecture. In our system, each peer generates and distributes its public/private key pairs, and the public key is securely distributed without PKI. The proposed mechanism is safe against MITM attack. This mechanism can be applied various P2P applications such as file sharing, IPTV, distributed resource sharing and so on

Analysis of the Global Data Law & Policy and its Implications: Focusing on the cases of the United States, the United Kingdom, and the European Union (국내외 데이터법·정책 분석 및 시사점: 미국, 영국, EU의 사례를 중심으로)

  • Yoon, Sang-Pil;Kwon, Hun-Yeong
    • Informatization Policy
    • /
    • v.28 no.2
    • /
    • pp.98-113
    • /
    • 2021
  • This study presents implications of the Global Data Law & Policy by comparing national data strategies, data regulations and policies, and governance in South Korea, the United States, the United Kingdom, and the European Union. According to the result of the comparative analysis, the biggest difference is in data governance, in other words, the management and coordination of policies at the pan-government level and data ethics. Therefore, this study proposes the establishment of a presidential special committee on data policy or the creation of a 'National Digital Innovation Office' at the Presidential Secretariat as a national CDO for the governance of data policies. Furthermore, this paper suggests a) to enact 'the Framework Act on the Development of Data Industry' that can regulate data practices in the private sector, b) to institutionalize the data-centric security and data protection, c) to settle the public ethics and personnel management based on data expertise and professional ethics, including explainability and responsibility, and d) the education and training systems.

Overcoming Cybercrime in Ukraine (Cyberterrorism)

  • Pravdiuk, Andrey;Gerasymenko, Larysa;Tykhonova, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.181-186
    • /
    • 2021
  • Ensuring national security in cyberspace is becoming an increasingly important issue, given the growing number of cybercrimes due to adaptation to new security and protection technologies. The purpose of this article is to study the features of counteracting, preventing, and detecting crimes in the virtual space of Ukraine on the example of cases and analysis of the State Center for Cyber Defense and Countering Cyber Threats CERT-UA and the Cyber Police Department of the National Police of Ukraine. The research methodology is based on the method of analysis and study of cases of crime detection in the virtual environment of the State Center for Cyber Defense and Countering Cyber Threats CERT-UA and the Cyber Police Department of the National Police of Ukraine. The results show that the consistent development of the legal framework in 2016-2020 and the development of a cyber-defense strategy for 2021-2025 had a positive impact on the institution-building and detection of cybercrime in Ukraine. Establishing cooperation with developed countries (USA) has helped to combat cybercrime by facilitating investigations by US law enforcement agencies. This means that international experience is effective for developing countries as a way to quickly understand the threats and risks of cybercrime. In Ukraine, the main number of incidents concerns the distribution of malicious software in the public sector. In the private sector, cyber police are largely confronted with the misappropriation of citizens' income through Internet technology. The practical value of this study is to systematize the experience of overcoming cybercrime on the example of cases of crime detection in a virtual environment.