• Title/Summary/Keyword: convergence approach

Search Result 2,245, Processing Time 0.028 seconds

Reading Fluency and Accuracy for English Language Acquisition in EFL Context. (외국어교육 환경에서 영어습득을 위한 읽기유창성과 정확성에 관한 연구)

  • Shin, Kyu-Cheol
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.3
    • /
    • pp.249-256
    • /
    • 2018
  • This study aims to explore efficient foreign language learning paradigm with a focus on reading fluency and accuracy. From a perspective of language acquisition in the foreign language context, the priority in the L2 learning between accuracy and fluency has been a very important issue. Fluency becomes an important issue due to many researchers' interests in the L1 and L2 classroom. Although both accuracy and fluency are crucial, the paradigm shift from fluency to accuracy is necessary in the foreign language teaching. In this context, as an alternative methodology for L2 learners' fluency, the extensive reading approach is provided. A number of studies have suggested that extensive reading program could lead to improvement of L2 learners' reading rate and is an effective approach to improving general language proficiency.

A Study on the Estimation Process of Material handling Equipment for Offshore Plant Using System Engineering Approach (시스템엔지니어링 기반 해양플랜트 Material handling 장비 수량산출 프로세스에 관한 연구)

  • Han, Seong-Jong;Seo, Young-Kyun;Cho, Mang-Ik;Kim, Hyung-Woo;Park, Chang-soo
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.22 no.6
    • /
    • pp.785-795
    • /
    • 2019
  • This paper is a study on the modeling of the quantity estimation model for offshore plant Material handling equipment in FEED(Front End Engineering Design) verification stage using system engineering approach which is an engineering design methods. The relevant engineering execution procedure is not systemized although the operation method and Material handling equipment selection with weight and space constraints is a key part of the FEED. Using the system engineering process, the stakeholder requirements analysis process, the system requirements analysis, and the final system architecture design were sequentially performed, and the process developed through the functional development diagram and Requirement traceability matrix (RTM) was verified. In addition, based on the established process, we propose a Material handling quantity estimation model and Quantity calculation verification Table that can be applied at the FEED verification stage and we verify the applicability through case studies.

A Comparative Study on the Arms Control Approach Method toward North Korea in between the Past and the Moon Government (과거와 현 문재인 정부의 대북 군비통제 접근방법 비교 연구)

  • Lee, Pyo-Kyu
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.147-156
    • /
    • 2019
  • The purpose of this study is provide appropriate arms control measures between South and North Koreas by comparing and analyzing the former proposals and agreements in the past and the current Moon Government's approach representing the 9.19 military agreement. For this, I established the most appropriate framework for analysis through comparing and analyzing the arms control theories. The policies of the past governments and of the current Moon Jae-in government are analyzed. The most highlighted characteristic was that the arms control policies were projected by not from the military confidence, but political confidence building measures or both concurrently. In conclusion, I suggested the strategies of projecting confidence building measures and arms control or disarmament in the process of projecting the peace settlement. Nonetheless, the most important point is that the policies of arms control and unification should be pushed ahead complementally.

Effects of Cosmetics containing Pycnogenol on the skin of Korean Women in their 40s and 50s - Skin Clinical Approach (피크노제놀을 함유한 화장품이 40~50대 한국 여성의 피부에 미치는 영향 - 피부임상학적 접근)

  • Kim, Kyung-Yun;Ku, Jung-Eun
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.8
    • /
    • pp.309-315
    • /
    • 2021
  • Pycnogenol extracted from pine bark is a component with great antibacterial activity and antioxidant effect. It is applied as a natural anti-inflammatory agent with various medical effects including anti-inflammatory effects, regulation of blood pressure, regulation of the immune system, and inhibition of cancer cell growth. However, research related to cosmetics is limited. Therefore, in this study, the effect of Pycnogenol on the skin was studied through a clinical approach. Changes in skin condition were observed after using cosmetics with Pycnogenol and without Pycnogenol for 6 weeks for 10 clinicians in each group. We observed the effect of pore reduction, wrinkle reduction around eyes, a decrease of the number and angle of loose pores, and reduction of pigmentation. Therefore, cosmetics containing Pycnogenol have the effect of improving skin problems of aging skin.

An Optimization Model for O&M Planning of Floating Offshore Wind Farm using Mixed Integer Linear Programming

  • Sang, Min-Gyu;Lee, Nam-Kyoung;Shin, Yong-Hyuk;Lee, Chulung;Oh, Young-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.255-264
    • /
    • 2021
  • In this paper, we propose operations and maintenance (O&M) planning approach for floating offshore wind farm using the mathematical optimization. To be specific, we present a MILP (Mixed Integer Linear Programming that suggests the composition of vessels, technicians, and maintenance works on a weekly basis. We reflect accessibility to wind turbines based on weather data and loss of power generation using the Jensen wake model to identify downtime cost that vary from time to time. This paper also includes a description of two-stage approach for maintenance planning & detailed scheduling and numeric analysis of the number of vessels and technicians on the O&M cost. Finally, the MILP model could be utilized in order to establish the suitable and effective maintenance planning reflecting domestic situation.

Speed Prediction and Analysis of Nearby Road Causality Using Explainable Deep Graph Neural Network (설명 가능 그래프 심층 인공신경망 기반 속도 예측 및 인근 도로 영향력 분석 기법)

  • Kim, Yoo Jin;Yoon, Young
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.1
    • /
    • pp.51-62
    • /
    • 2022
  • AI-based speed prediction studies have been conducted quite actively. However, while the importance of explainable AI is emerging, the study of interpreting and reasoning the AI-based speed predictions has not been carried out much. Therefore, in this paper, 'Explainable Deep Graph Neural Network (GNN)' is devised to analyze the speed prediction and assess the nearby road influence for reasoning the critical contributions to a given road situation. The model's output was explained by comparing the differences in output before and after masking the input values of the GNN model. Using TOPIS traffic speed data, we applied our GNN models for the major congested roads in Seoul. We verified our approach through a traffic flow simulation by adjusting the most influential nearby roads' speed and observing the congestion's relief on the road of interest accordingly. This is meaningful in that our approach can be applied to the transportation network and traffic flow can be improved by controlling specific nearby roads based on the inference results.

A Study on Pipeline Design Methods for Providing Secure Container Image Registry (안전한 컨테이너 이미지 레지스트리 제공을 위한 파이프라인 설계 방안에 관한 연구)

  • Seong-Jae Ko;Sun-Jib Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.21-26
    • /
    • 2023
  • The development and distribution approach of applications is transitioning from a monolithic architecture to microservices and containerization, a lightweight virtualization technology, is becoming a core IT technology. However, unlike traditional virtual machines based on hypervisors, container technology does not provide concrete security boundaries as it shares the same kernel. According to various preceding studies, there are many security vulnerabilities in most container images that are currently shared. Accordingly, attackers may attempt exploitation by using security vulnerabilities, which may seriously affect the system environment. Therefore, in this study, we propose an efficient automated deployment pipeline design to prevent the distribution of container images with security vulnerabilities, aiming to provide a secure container environment. Through this approach, we can ensure a safe container environment.

Classification of Tabular Data using High-Dimensional Mapping and Deep Learning Network (고차원 매핑기법과 딥러닝 네트워크를 통한 정형데이터의 분류)

  • Kyeong-Taek Kim;Won-Du Chang
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.119-124
    • /
    • 2023
  • Deep learning has recently demonstrated conspicuous efficacy across diverse domains than traditional machine learning techniques, as the most popular approach for pattern recognition. The classification problems for tabular data, however, are remain for the area of traditional machine learning. This paper introduces a novel network module designed to tabular data into high-dimensional tensors. The module is integrated into conventional deep learning networks and subsequently applied to the classification of structured data. The proposed method undergoes training and validation on four datasets, culminating in an average accuracy of 90.22%. Notably, this performance surpasses that of the contemporary deep learning model, TabNet, by 2.55%p. The proposed approach acquires significance by virtue of its capacity to harness diverse network architectures, renowned for their superior performance in the domain of computer vision, for the analysis of tabular data.

Strengthening Enterprise Security through the Adoption of Zero Trust Architecture - A Focus on Micro-segmentation Approach - (제로 트러스트 아키텍처 도입을 통한 기업 보안 강화 방안 - 마이크로 세그먼테이션 접근법 중심으로 -)

  • Seung-Hyun Joo;Jin-Min Kim;Dae-Hyun Kwon;Yong-Tae Shin
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.3-11
    • /
    • 2023
  • Zero Trust, characterized by the principle of "Never Trust, Always Verify," represents a novel security paradigm. The proliferation of remote work and the widespread use of cloud services have led to the establishment of Work From Anywhere (WFA) environments, where access to corporate systems is possible from any location. In such environments, the boundaries between internal and external networks have become increasingly ambiguous, rendering traditional perimeter security models inadequate to address the complex and diverse nature of cyber threats and attacks. This research paper introduces the implementation principles of Zero Trust and focuses on the Micro Segmentation approach, highlighting its relevance in mitigating the limitations of perimeter security. By leveraging the risk management framework provided by the National Institute of Standards and Technology (NIST), this paper proposes a comprehensive procedure for the adoption of Zero Trust. The aim is to empower organizations to enhance their security strategies.

A Conceptual Architecture and its Experimental Validation of CCTV-Video Object Activitization for Tangible Assets of Experts' Visual Knowledge in Smart Factories (고숙련자 공장작업지식 자산화를 위한 CCTV-동영상 객체능동화의 개념적 아키텍처와 실험적 검증)

  • Eun-Bi Cho;Dinh-Lam Pham;Kyung-Hee Sun;Kwanghoon Pio Kim
    • Journal of Internet Computing and Services
    • /
    • v.25 no.2
    • /
    • pp.101-111
    • /
    • 2024
  • In this paper, we propose a concpetual architecture and its implementation approach for contextualizing unstructured CCTV-video frame data into structured XML-video textual data by using the deep-learning neural network models and frameworks. Conclusively, through the conceptual architecture and the implementation approach proposed in this paper, we can eventually realize and implement the so-called sharable working and experiencing knowledge management platforms to be adopted to smart factories in various industries.