• Title/Summary/Keyword: Real-world Examples

Search Result 126, Processing Time 0.032 seconds

Trend and Implication of Primary Care Evaluation in U.S. (미국의 일차의료 평가 동향 및 시사점: 미국의 리얼월드 평가 안내서를 중심으로)

  • Suh, Youshin;Kim, Hee-Sun;Yoo, Bit-Na;Kim, Jin-Hee;Park, Chong Yon
    • The Journal of Health Technology Assessment
    • /
    • v.6 no.2
    • /
    • pp.88-94
    • /
    • 2018
  • This review aims to provide implications for relevant domestic policies and researches from Patient-Centered Medical Home (PCMH), a reinforcement model for primary care and its evaluations in the United States. As chronic diseases became dominant, changes in the health care delivery system in which primary care is central was required. The United States initiated primary care-reinforcing policies based on the PCMH following the increased demand for evidence-based health care policies. The current activities of the United States such as sharing research tools used to evaluate primary care interventions and circulating evaluation findings provide examples to Korea. Systematic evaluations for primary care interventions are required and appropriate methods using various types of data to reflect the real-world settings should be prepared. It is necessary to conduct policy assessment studies of public interests considering regional context. Support for the researches to make and advance from the existing environment must be examined.

Beyond SDLC: Process Modeling and Documentation Using Thinging Machines

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.191-204
    • /
    • 2021
  • The software development life cycle (SDLC) is a procedure used to develop a software system that meets both the customer's needs and real-world requirements. The first phase of the SDLC involves creating a conceptual model that represents the involved domain in reality. In requirements engineering, building such a model is considered a bridge to the design and construction phases. However, this type of model can also serve as a basic model for identifying business processes and how these processes are interconnected to achieve the final result. This paper focuses on process modeling in organizations, per se, beyond its application in the SDLC when an organization needs further documentation to meet its growth needs and address regular changes over time. The resultant process documentation is created alongside the daily operations of the business process. The model provides visualization and documentation of processes to assist in defining work patterns, avoiding redundancy, or even designing new processes. In this paper, a proposed diagrammatic representation models each process using one diagram comprising five actions and two types of relations to build three levels of depiction. These levels consist of a static description, events, and the behavior of the modeled process. The viability of a thinging machine is demonstrated by re-modeling some examples from the literature.

Language Matters: A Systemic Functional Linguistics-Enhanced Machine Learning Framework for Cyberbullying Detection

  • Raghad Altowairgi;Ala Eshamwi;Lobna Hsairi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.192-198
    • /
    • 2023
  • Cyberbullying is a growing problem among adolescents and can have serious psychological and emotional consequences for the victims. In recent years, machine learning techniques have emerged as promising approach for detecting instances of cyberbullying in online communication. This research paper focuses on developing a machine learning models that are able to detect cyberbullying including support vector machines, naïve bayes, and random forests. The study uses a dataset of real-world examples of cyberbullying collected from Twitter and extracts features that represents the ideational metafunction, then evaluates the performance of each algorithm before and after considering the theory of systemic functional linguistics in terms of precision, recall, and F1-score. The result indicates that all three algorithms are effective at detecting cyberbullying with 92% for naïve bayes and an accuracy of 93% for both SVM and random forests. However, the study also highlights the challenges of accurately detecting cyberbullying, particularly given the nuanced and context-dependent nature of online communication. This paper concludes by discussing the implications of these findings for future research and the development of practical tool for cyberbullying prevention and intervention.

ORBITAL CONTRACTION IN METRIC SPACES WITH APPLICATIONS OF FRACTIONAL DERIVATIVES

  • Haitham Qawaqneh;Waseem G. Alshanti;Mamon Abu Hammad;Roshdi Khalil
    • Nonlinear Functional Analysis and Applications
    • /
    • v.29 no.3
    • /
    • pp.649-672
    • /
    • 2024
  • This paper explores the significance and implications of fixed point results related to orbital contraction as a novel form of contraction in various fields. Theoretical developments and theorems provide a solid foundation for understanding and utilizing the properties of orbital contraction, showcasing its efficacy through numerous examples and establishing stability and convergence properties. The application of orbital contraction in control systems proves valuable in designing resilient and robust control strategies, ensuring reliable performance even in the presence of disturbances and uncertainties. In the realm of financial modeling, the application of fixed point results offers valuable insights into market dynamics, enabling accurate price predictions and facilitating informed investment decisions. The practical implications of fixed point results related to orbital contraction are substantiated through empirical evidence, numerical simulations, and real-world data analysis. The ability to identify and leverage fixed points grants stability, convergence, and optimal system performance across diverse applications.

Machine learning-enabled parameterization scheme for aerodynamic shape optimization of wind-sensitive structures: A-proof-of-concept study

  • Shaopeng Li;Brian M. Phillips;Zhaoshuo Jiang
    • Wind and Structures
    • /
    • v.39 no.3
    • /
    • pp.175-190
    • /
    • 2024
  • Aerodynamic shape optimization is very useful for enhancing the performance of wind-sensitive structures. However, shape parameterization, as the first step in the pipeline of aerodynamic shape optimization, still heavily depends on empirical judgment. If not done properly, the resulting small design space may fail to cover many promising shapes, and hence hinder realizing the full potential of aerodynamic shape optimization. To this end, developing a novel shape parameterization scheme that can reflect real-world complexities while being simple enough for the subsequent optimization process is important. This study proposes a machine learning-based scheme that can automatically learn a low-dimensional latent representation of complex aerodynamic shapes for bluff-body wind-sensitive structures. The resulting latent representation (as design variables for aerodynamic shape optimization) is composed of both discrete and continuous variables, which are embedded in a hierarchy structure. In addition to being intuitive and interpretable, the mixed discrete and continuous variables with the hierarchy structure allow stakeholders to narrow the search space selectively based on their interests. As a proof-of-concept study, shape parameterization examples of tall building cross sections are used to demonstrate the promising features of the proposed scheme and guide future investigations on data-driven parameterization for aerodynamic shape optimization of wind-sensitive structures.

A Study on the real motion capture of 3D Game character and classificatory proposal the type, the shapes of 3D character animation (3D 게임캐릭터의 실사 움직임(Real working)과 3D 캐릭터 애니메이션의 종류별, 형태별 모델 분류 제안)

  • Yun, Hwang-Rok;Kyung, Byung-Pyo;Lee, Dong-Lyeor;Shon, Jong-Nam
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.269-272
    • /
    • 2006
  • Game industry is one of the most popular sector in the world cultural industries in the digital era. 2D and 3D Animation with development of computer technology it. Because Animation needs to show real motion image. The computer hardware and software technique quick change it leads and 2D and 3D the animation is the tendency which provides the growth which is infinite. But recently Game graphic design have a trend 3D Game that is absorbed and easy handling. 2D Game Character is changing to 3D Game Character more and more. This thesis have significant the real motion capture of 3D Game Character and the types, the shapes of 3D Game Character animation. First of all this thesis will define about 3D Game Character as well it will be show examples of real motion capture also it will proposal data of real motion capture. Therefore it will be bring the high technology Animation industry with Digital Contents industry. also hope for the growth of Game Character Animation process and 3D Game Character Animation in Game industry as well contents industry.

  • PDF

A Study on Creating and Managing "Makerspaces" in Libraries (도서관 무한창조공간 구축 및 운영모형 제안에 관한 연구)

  • Noh, Younghee
    • Journal of the Korean Society for information Management
    • /
    • v.31 no.1
    • /
    • pp.53-76
    • /
    • 2014
  • Combining makerspaces and library services is an innovative idea that could positively and radically change the library user experience. The Library Makerspace is able to offer users a different view of the world, and give them the opportunity to explore and imagine new possibilities which they can then create. Therefore, this study focused on analyzing real-world makerspace examples to create suggests for utilizing this trend. The roles and concepts of library makerspaces derived through this research are as follows: space for infinite creativity as social communication space, study areas, job searches, self-publishing, idea incubation, collaboration, equipment and utilization, storytelling, expert mentoring and consulting, and so on. The possibilities are endless, and allow for the development and expansion of the library.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

MAGIC: GALILEO and SBAS Services in a Nutshell

  • Zarraoa, N.;Tajdine, A.;Caro, J.;Alcantarilla, I.;Porras, D.
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.1
    • /
    • pp.27-31
    • /
    • 2006
  • GNSS Services and Applications are today in permanent evolution in all the market sectors. This evolution comprises: ${\bullet}$ New constellations and systems, being GALILEO probably the most relevant example, but not the only one, as other regions of the world also dwell into developing their own elements (e.g. the Chinese Beidou system). ${\bullet}$ Modernisation of existing systems, as is the case of GPS and GLONASS ${\bullet}$ New Augmentation services, WAAS, EGNOS, MSAS, GRAS, GAGAN, and many initiatives from other regions of the world ${\bullet}$ Safety of Life services based on the provision of integrity and reliability of the navigation solutions through SBAS and GBAS systems, for aeronautical or maritime applications ${\bullet}$ New Professional applications, based on the unprecedented accuracies and integrity of the positioning and timing solutions of the new navigation systems with examples in science (geodesy, geophysics), Civil engineering (surveying, construction works), Transportation (fleet management, road tolling) and many others. ${\bullet}$ New Mass-market applications based on cheap and simple GNSS receivers providing accurate (meterlevel) solutions for daily personal navigation and information needs. Being on top of this evolving market requires an active participation on the key elements that drive the GNSS development. Early access to the new GNSS signals and services and appropriate testing facilities are critical to be able to reach a good market position in time before the next evolution, and this is usually accessible only to the large system developers as the US, Europe or Japan. Jumping into this league of GNSS developers requires a large investment and a significant development of technology, which may not be at range for all regions of the world. Bearing in mind this situation, MAGIC appears as a concept initiated by a small region within Europe with the purpose of fostering and supporting the development of advanced applications for the new services that can be enabled by the advent of SBAS systems and GALILEO. MAGIC is a low cost platform based on the application of technology developed within the EGNOS project (the SBAS system in Europe), which encompasses the capacity of providing real time EGNOS and, in the near future, GALILEO-like integrity services. MAGIC is designed to be a testing platform for safety of life and liability critical applications, as well as a provider of operational services for the transport or professional sectors in its region of application. This paper will present in detail the MAGIC concept, the status of development of the system within the Madrid region in Spain, the results of the first on-field demonstrations and the immediate plans for deployment and expansion into a complete SBAS+GALILEO regional augmentation system.

  • PDF

Development of a n-path algorithm for providing travel information in general road network (일반가로망에서 교통정보제공을 위한 n-path 알고리듬의 개발)

  • Lim, Yong-Taek
    • Journal of Korean Society of Transportation
    • /
    • v.22 no.4 s.75
    • /
    • pp.135-146
    • /
    • 2004
  • For improving the effectiveness of travel information, some rational paths are needed to provide them to users driving in real road network. To meet it, k-shortest path algorithms have been used in general. Although the k-shortest path algorithm can provide several alternative paths, it has inherent limit of heavy overlapping among derived paths, which nay lead to incorrect travel information to the users. In case of considering the network consisting of several turn prohibitions popularly adopted in real world network, it makes difficult for the traditional network optimization technique to deal with. Banned and penalized turns are not described appropriately for in the standard node/link method of network definition with intersections represented by nodes only. Such problem could be solved by expansion technique adding extra links and nodes to the network for describing turn penalties, but this method could not apply to large networks as well as dynamic case due to its overwhelming additional works. This paper proposes a link-based shortest path algorithm for the travel information in real road network where exists turn prohibitions. It enables to provide efficient alternative paths under consideration of overlaps among paths. The algorithm builds each path based on the degree of overlapping between each path and stops building new path when the degree of overlapping ratio exceeds its criterion. Because proposed algorithm builds the shortest path based on the link-end cost instead or node cost and constructs path between origin and destination by link connection, the network expansion does not require. Thus it is possible to save the time or network modification and of computer running. Some numerical examples are used for test of the model proposed in the paper.