• Title/Summary/Keyword: Target Service

Search Result 1,356, Processing Time 0.026 seconds

Analysis on pre­service mathematics teachers' statistical literacy in lesson plan (수업설계안에 나타난 예비 중등수학교사의 통계적 소양 수준 분석연구)

  • Kim, Do-Eun;Kang, Pyung-Lyun;Lee, Min-Hee
    • East Asian mathematical journal
    • /
    • v.35 no.4
    • /
    • pp.429-449
    • /
    • 2019
  • This study aims to investigate the statistical literacy of pre-service mathematics teachers and to discuss the impact of statistical literacy in lesson plan. For the purpose of this study, we analyzed 13 pre-service mathematics teachers' statistical literacy tests and lesson plans. The results of this analysis are as follows: First, pre-service mathematics teachers did not have a high level of statistical literacy, and it was also observed that there was a big level difference between them. Second, pre-service mathematics teachers' lesson plans showed significant difference in the level of the target grade, the characteristics of the target student, and the contents. Based on this study, we seek to find implications for how it is appropriate to educate teachers in charge of statistical education.

An Ontology Model for Public Service Export Platform (공공 서비스 수출 플랫폼을 위한 온톨로지 모형)

  • Lee, Gang-Won;Park, Sei-Kwon;Ryu, Seung-Wan;Shin, Dong-Cheon
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.149-161
    • /
    • 2014
  • The export of domestic public services to overseas markets contains many potential obstacles, stemming from different export procedures, the target services, and socio-economic environments. In order to alleviate these problems, the business incubation platform as an open business ecosystem can be a powerful instrument to support the decisions taken by participants and stakeholders. In this paper, we propose an ontology model and its implementation processes for the business incubation platform with an open and pervasive architecture to support public service exports. For the conceptual model of platform ontology, export case studies are used for requirements analysis. The conceptual model shows the basic structure, with vocabulary and its meaning, the relationship between ontologies, and key attributes. For the implementation and test of the ontology model, the logical structure is edited using Prot$\acute{e}$g$\acute{e}$ editor. The core engine of the business incubation platform is the simulator module, where the various contexts of export businesses should be captured, defined, and shared with other modules through ontologies. It is well-known that an ontology, with which concepts and their relationships are represented using a shared vocabulary, is an efficient and effective tool for organizing meta-information to develop structural frameworks in a particular domain. The proposed model consists of five ontologies derived from a requirements survey of major stakeholders and their operational scenarios: service, requirements, environment, enterprise, and county. The service ontology contains several components that can find and categorize public services through a case analysis of the public service export. Key attributes of the service ontology are composed of categories including objective, requirements, activity, and service. The objective category, which has sub-attributes including operational body (organization) and user, acts as a reference to search and classify public services. The requirements category relates to the functional needs at a particular phase of system (service) design or operation. Sub-attributes of requirements are user, application, platform, architecture, and social overhead. The activity category represents business processes during the operation and maintenance phase. The activity category also has sub-attributes including facility, software, and project unit. The service category, with sub-attributes such as target, time, and place, acts as a reference to sort and classify the public services. The requirements ontology is derived from the basic and common components of public services and target countries. The key attributes of the requirements ontology are business, technology, and constraints. Business requirements represent the needs of processes and activities for public service export; technology represents the technological requirements for the operation of public services; and constraints represent the business law, regulations, or cultural characteristics of the target country. The environment ontology is derived from case studies of target countries for public service operation. Key attributes of the environment ontology are user, requirements, and activity. A user includes stakeholders in public services, from citizens to operators and managers; the requirements attribute represents the managerial and physical needs during operation; the activity attribute represents business processes in detail. The enterprise ontology is introduced from a previous study, and its attributes are activity, organization, strategy, marketing, and time. The country ontology is derived from the demographic and geopolitical analysis of the target country, and its key attributes are economy, social infrastructure, law, regulation, customs, population, location, and development strategies. The priority list for target services for a certain country and/or the priority list for target countries for a certain public services are generated by a matching algorithm. These lists are used as input seeds to simulate the consortium partners, and government's policies and programs. In the simulation, the environmental differences between Korea and the target country can be customized through a gap analysis and work-flow optimization process. When the process gap between Korea and the target country is too large for a single corporation to cover, a consortium is considered an alternative choice, and various alternatives are derived from the capability index of enterprises. For financial packages, a mix of various foreign aid funds can be simulated during this stage. It is expected that the proposed ontology model and the business incubation platform can be used by various participants in the public service export market. It could be especially beneficial to small and medium businesses that have relatively fewer resources and experience with public service export. We also expect that the open and pervasive service architecture in a digital business ecosystem will help stakeholders find new opportunities through information sharing and collaboration on business processes.

An Enhanced Model on the Selection of Information Protection Security Diagnosis Target Firms (정보보호 안전진단 대상자 선정 기준의 개선 방안 연구)

  • Ahn, Yeon-Shick
    • Journal of Information Technology Services
    • /
    • v.8 no.1
    • /
    • pp.47-58
    • /
    • 2009
  • The information protection security diagnosis institution was applied services since 2004, for the leveling up of public information protection and the establishment of the stability and reliability of information communication. And this security diagnosis was implemented actually on the 142 firms in 2005, the 160 firms in 2006 and the 205 firms in 2007. But this is recognized by the some firms as one of the unnecessary regulations. And there are some difficulties with collecting the subjective and reliable source data for establishing the information protection security diagnosis target. In this research, the enhanced model on the selection of information protection security diagnosis target firms was suggested by the interview with some expert and the analysis for the related actual data. By the model which are introduced from the statistical analysis of the related data and the summary of some expert's suggestions, information protection security diagnosis target can include the information telecommunication service providers taking 5 billion won as sales in a year, and web service providers like as shopping mall site, with the personal records of 2 million subscribers.

Cost-benefit Analysis of Home Visiting Care for Vulnerable Populations with Hypertension (취약계층 고혈압 대상자를 위한 방문건강관리사업의 비용편익분석)

  • Ko, Young;Lee, In-Sook
    • Research in Community and Public Health Nursing
    • /
    • v.22 no.4
    • /
    • pp.438-450
    • /
    • 2011
  • Purpose: This study was to investigate the effect of home visiting care service and to evaluate the effect from the cost-benefit perspective. Methods: Target participants were enrolled in 2007~2008 for home visiting care and provided with a home visiting nursing service for more than 18 months in J Ward of S City. Of 391 participants, 244 who satisfied the inclusion criteria were used in the final analysis. Cost-benefit analysis was done using the net benefit and benefit/cost ratio. Results: After providing the home care nursing service, the blood pressure control rate increased from 50.8% to 75.4%. Of the subjects, 39.8% maintained their blood pressure level within the target range. As a whole, the net benefit of home visiting care per person ranged from 434,964.86 to 447,112.43 won and the benefit/cost ratio ranged from 2.82 to 2.84. Conclusion: Home visiting care for vulnerable populations with hypertension was effective in both maintaining blood pressure and reducing blood pressure to the target range. Therefore these results are especially useful for establishing the value of home visiting services for policy makers as well as for prioritizing vulnerable populations.

A Market Development Strategy for WiBro Service (와이브로 서비스(WiBro service) 상용화를 위한 시장개발전략)

  • Kim, Youngchan;Jee, Kyoung-Yong;Kim, Moon-Koo;Kim, Jiyeon
    • Asia Marketing Journal
    • /
    • v.7 no.2
    • /
    • pp.71-92
    • /
    • 2005
  • Given the rapid changes in consumer tastes, technology, and competition, companies must develop a steady stream of new products and services. To be a successful product or service and explore the available market, the target market consumers need to be fully acknowledged a new product or service's value or benefit. And at the same time, the presented benefit should satisfy the customer's needs and wants. Therefore, a firm must investigate the target consumers' needs and wants before launching the new product or service. In this paper, we suggest the marketing strategy for newly developed WiBro service in telecommunication industry. We focus on consumer-oriented marketing strategy as well as the technology development process. To explore the customer's value scheme, we employ a self-explicated approach for estimating the customer's part-worth of the different target market in the process of market development stage. And we present the marketing strategy for each market development stages as well.

  • PDF

The User Terminal Registration Method in Proximity Using the Virtual ISIM for Providing Service Continuity (가상 ISIM을 통한 서비스 연속성 제공을 위한 근접 단말 등록 방법)

  • Yim, Jong-Choul;Kim, Sang-Ha;Keum, Chang-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.529-540
    • /
    • 2015
  • The NGN should support an ubiquitous environment in which users can use multiple devices. Especially, services should be provided to users in a seamless manner across multiple devices which are dynamically found in users' vicinity. Therefore, supporting service continuity is essential in the NGN. Currently the IMS, which is a session control layer for the NGN, deals with session control procedures in detail for service continuity. However, the IMS provides limited methods how users can find target terminals for transferring the session. The target terminals tend to be located near in user's physical location, and could be shared among different users. For providing better service experience in the NGN, The NGN needs to encompass methods to enable for users to use the dynamically-found terminals in users' vicinity seamlessly. In this paper, we introduce a novel registration method based on virtual ISIM by which the target terminals in user's vicinity can register themselves to the IMS, and also we discuss how service continuity is supported.

Intelligent rehabilitation robotic system for the handicapped and the elderly-KARES (장애인과 노약자를 위한 지능형 재활 로봇 시스템(KARES))

  • 송원경;김종명;윤용산;변증남
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1997.10a
    • /
    • pp.1541-1544
    • /
    • 1997
  • The rehailitation robot, one of the service robot, is the important area in the service automation. In the paper, we describe the overall configuration of KARES(KAIST Rehabilitation Engineering System), which is an intellingent rehabilitaion robotic system designed to assist the independent livelihood of the handicapped and the eldrly. KARES consists of the 6 degree of freedom robot arm mounted on a wheelchair, the controller ofr the arm, sensors to perceive environment, and user interface. Basic desired hobs in KARES are gripping the target object and moving it to the user's face for eating, drinking, or cooperation work wiht the mouth. Currently, the manual operation of the arm is available for gripping to target objects. The autonomous functionality will be ginven for the facilities of the human operator.

  • PDF

Effective Demand Selection Scheme for Satisfying Target Service Level in a Supply Chain (공급망의 목표 서비스 수준 만족을 위한 효과적인 수요선택 방안)

  • Park, Gi-Tae;Kwon, Ick-Hyun
    • Journal of the Korea Safety Management & Science
    • /
    • v.11 no.1
    • /
    • pp.205-211
    • /
    • 2009
  • In reality, distribution planning for a supply chain is established using a certain probabilistic distribution estimated by forecasting. However, in general, the demands used for an actual distribution planning are of deterministic value, a single value for each of periods. Because of this reason the final result of a planning has to be a single value for each period. Unfortunately, it is very difficult to estimate a single value due to the inherent uncertainty in the probabilistic distribution of customer demand. The issue addressed in this paper is the selection of single demand value among of the distributed demand estimations for a period to be used in the distribution planning. This paper proposes an efficient demand selection scheme for minimizing total inventory costs while satisfying target service level under the various experimental conditions.

Estimation of Eyewitness Identification Accuracy by Event-Related Potentials (차량 번호판 목격자의 기억 평가를 위한 사건 관련 전위 연구)

  • Ham, Keunsoo;Pyo, Chuyeon;Jang, Taeik;Yoo, Seong Ho
    • The Korean Journal of Legal Medicine
    • /
    • v.39 no.4
    • /
    • pp.115-119
    • /
    • 2015
  • We investigated event-related potentials (ERPs) to estimate the accuracy of eyewitness memories. Participants watched videos of vehicles being driven dangerously, from an anti-impaired driving initiative. The four-letter license plates of the vehicles were the target stimuli. Random numbers were presented while participants attempted to identify the license plate letters, and electroencephalograms were recorded. There was a significant difference in activity 300-500 milliseconds after stimulus onset, between target stimuli and random numbers. This finding contributes to establishing an eyewitness recognition model where different ERP components may reflect more explicit memory that is dissociable from recollection.

DDoS attacks prevention in cloud computing through Transport Control protocol TCP using Round-Trip-Time RTT

  • Alibrahim, Thikra S;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.276-282
    • /
    • 2022
  • One of the most essential foundations upon which big institutions rely in delivering cloud computing and hosting services, as well as other kinds of multiple digital services, is the security of infrastructures for digital and information services throughout the world. Distributed denial-of-service (DDoS) assaults are one of the most common types of threats to networks and data centers. Denial of service attacks of all types operates on the premise of flooding the target with a massive volume of requests and data until it reaches a size bigger than the target's energy, at which point it collapses or goes out of service. where it takes advantage of a flaw in the Transport Control Protocol's transmitting and receiving (3-way Handshake) (TCP). The current study's major focus is on an architecture that stops DDoS attacks assaults by producing code for DDoS attacks using a cloud controller and calculating Round-Tripe Time (RTT).