• Title/Summary/Keyword: data network

Search Result 18,189, Processing Time 0.044 seconds

A Comparative Study of Entrepreneurial Motivation, Entrepreneurship and Entrepreneurial Intention between the Students of Experiential Entrepreneurship Class and Theory Centered Class (체험형 창업강좌와 이론형 창업강좌 학습자간의 창업동기, 기업가정신 및 창업의지 비교 연구)

  • Kim, Yong Tae
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.13 no.4
    • /
    • pp.49-58
    • /
    • 2018
  • In recent years, various studies have been carried out on various types of entrepreneurship and comparative activities according to policy efforts and support such as the activation of a bachelor's degree in the establishment of a university, and attention has been paid to the fact that the participation and the educational effect of the students may be different depending on the type. The purpose of this study is to investigate entrepreneurial motivation, entrepreneurship, and entrepreneurial intention in the case of experiential entrepreneurship class focusing on the theoretical-oriented general entrepreneurship class, And the effect of entrepreneurship on entrepreneurial intention. The data were collected and empirical analysis was conducted to compare the difference between the two groups. The results of this study are as follows: First, out of the motivation factors of entrepreneurs, entrepreneurship education, achievement desire, human network, self - esteem, etc. We can confirm that the motivation of entrepreneurs is recognized more greatly. Second, the entrepreneurship factor was not significantly different from the perception between experiential entrepreneurship lecture and theoretical entrepreneurship learner. Third, experiential entrepreneurship learner perceived more willingness to start business than theoretical entrepreneurship learner. Finally, among the entrepreneurship motivation factors, among the entrepreneurship education, achievement desire and entrepreneurship factor, the risk sensitivity affects the entrepreneurial will. This study suggests that the direction of entrepreneurial education focused on quantitative expansion and the creation of qualitative effects of entrepreneurship education are needed. In the future, it will provide policy implications for revitalizing experiential entrepreneurship education In addition, it can contribute to the diffusion of research on the effect of entrepreneurship education.

Modeling of the Failure Rates and Estimation of the Economical Replacement Time of Water Mains Based on an Individual Pipe Identification Method (개별관로 정의 방법을 이용한 상수관로 파손율 모형화 및 경제적 교체시기의 산정)

  • Park, Su-Wan;Lee, Hyeong-Seok;Bae, Cheol-Ho;Kim, Kyu-Lee
    • Journal of Korea Water Resources Association
    • /
    • v.42 no.7
    • /
    • pp.525-535
    • /
    • 2009
  • In this paper a heuristic method for identifying individual pipes in water pipe networks to determine specific sections of the pipes that need to be replaced due to deterioration. An appropriate minimum pipe length is determined by selecting the pipe length that has the greatest variance of the average cumulative break number slopes among the various pipe lengths used. As a result, the minimum pipe length for the case study water network is determined as 4 m and a total of 39 individual pipe IDs are obtained. The economically optimal replacement times of the individual pipe IDs are estimated by using the threshold break rate of an individual pipe ID and the pipe break trends models for which the General Pipe Break Prediction Model(Park and Loganathan, 2002) that can incorporate the linear, exponential, and in-between of the linear and exponetial failure trends and the ROCOFs based on the modified time scale(Park et al., 2007) are used. The maximum log-likelihoods of the log-linear ROCOF and Weibull ROCOF estimated for the break data of a pipe are compared and the ROCOF that has a greater likelihood is selected for the pipe of interest. The effects of the social costs of a pipe break on the optimal replacement time are also discussed.

On the Variations of Spatial Correlation Structure of Rainfall (강우공간상관구조의 변동 특성)

  • Kim, Kyoung-Jun;Yoo, Chul-Sang
    • Journal of Korea Water Resources Association
    • /
    • v.40 no.12
    • /
    • pp.943-956
    • /
    • 2007
  • Among various statistics, the spatial correlation function, that is "correlogram", is frequently used to evaluate or design the rain gauge network and to model the rainfall field. The spatial correlation structure of rainfall has the significant variation due to many factors. Thus, the variation of spatial correlation structure of rainfall causes serious problems when deciding the spatial correlation function of rainfall within the basin. In this study, the spatial rainfall structure was modeled using bivariate mixed distributions to derive monthly spatial correlograms, based on Gaussian and lognormal distributions. This study derived the correlograms using hourly data of 28 rain gauge stations in the Keum river basin. From the results, we concluded as following; (1) Among three cases (Case A, Case B, Case C) considered, the Case A(+,+) seems to be the most relevant as it is not distorted much by zero measurements. (2) The spatial correlograms based on the lognormal distribution, which is theoretically as well as practically adequate, is better than that based on the Gaussian distribution. (3) The spatial correlation in July exponentially decrease more obviously than those in other months. (4) The spatial correlograms should be derived considering the temporal resolution(hourly, daily, etc) of interest.

The study on the diagnosis and measurement of post-information society by ANP (ANP를 활용한 후기정보사회의 수준진단과 측정에 관한 연구)

  • Song, Young-Jo;Kwak, Jeong-Ho
    • Informatization Policy
    • /
    • v.23 no.2
    • /
    • pp.73-97
    • /
    • 2016
  • Social changes due to ICT like Big Data, IoT, Cloud and Mobile is progressing rapidly. Now, we get out of the old-fashioned frame was measured at the level of the information society through the introduction of PC, Internet speed and Internet subscribers etc and there is a need for a new type of diagnostic information society framework. This study is the study for the framework established to diagnose and measure post-information society. The framework and indicators were chosen in accordance with the technological society coevolution theory and information society-related indicators presented from authoritative international organizations. Empirical results utilizing the indicators and framework developed in this study were as follows: First, the three sectors, six clusters (items), 25 nodes (indicators) that make up the information society showed that all strongly connected. Second, it was diagnosed as information society development (50.34%), technology-based expansion (25.03%) and ICT effect (24.63%) through a network analysis (ANP) for the measurement of importance of the information society. Third, the result of calculating the relative importance of the cluster and nodes showed us (1)social development potential (26.04%), (2)competitiveness (15.9%), (3)ICT literacy (15.5%) (4) (social)capital (24.3 %), (5)ICT acceptance(9.54%), (6)quality of life(8.7%). Consequently, We should take into account the effect of the economy and quality of life beyond ICT infrastructure-centric when we measure the post-information society. By applying the weighting we should performs a comparison between countries and we should diagnose the level of Korea and provide policy implications for the preparation of post-information society.

Development of Win32 API Message Authorization System for Windows based Application Provision Service (윈도우 기반 응용프로그램 제공 서비스를 위한 Win32 API 메시지 인가 시스템의 개발)

  • Kim, Young-Ho;Jung, Mi-Na;Won, Yong-Gwan
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.47-54
    • /
    • 2004
  • The growth of computer resource and network speed has increased requests for the use of remotely located computer systems by connecting through computer networks. This phenomenon has hoisted research activities for application service provision that uses server-based remote computing paradigm. The server-based remote computing paradigm has been developed as the ASP (Application Service Provision) model, which provides remote users through application sharing protocol to application programs. Security requirement such as confidentiality, availability, integrity should be satisfied to provide ASP service using centralized computing system. Existing Telnet or FTP service for a remote computing systems have satisfied security requirement by a simple access control to files and/or data. But windows-based centralized computing system is vulnerable to confidentiality, availability, integrity where many users use the same application program installed in the same computer. In other words, the computing system needs detailed security level for each user different from others, such that only authorized user or group of users can run some specific functional commands for the program. In this paper, we propose windows based centralized computing system that sets security policies for each user for the use of instructions of the application programs, and performs access control to the instructions based on the security policies. The system monitors all user messages which are executed through graphical user interface by the users connecting to the system. Ail Instructions, i.e. messages, for the application program are now passed to authorization process that decides if an Instruction is delivered to the application program based on the pre-defined security polices. This system can be used as security clearance for each user for the shared computing resource as well as shared application programs.

A Dynamic Transaction Routing Algorithm with Primary Copy Authority (주사본 권한을 이용한 동적 트랜잭션 분배 알고리즘)

  • Kim, Ki-Hyung;Cho, Hang-Rae;Nam, Young-Hwan
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1067-1076
    • /
    • 2003
  • Database sharing system (DSS) refers to a system for high performance transaction processing. In DSS, the processing nodes are locally coupled via a high speed network and share a common database at the disk level. Each node has a local memory and a separate copy of operating system. To reduce the number of disk accesses, the node caches database pages in its local memory buffer. In this paper, we propose a dynamic transaction routing algorithm to balance the load of each node in the DSS. The proposed algorithm is novel in the sense that it can support node-specific locality of reference by utilizing the primary copy authority assigned to each node; hence, it can achieve better cache hit ratios and thus fewer disk I/Os. Furthermore, the proposed algorithm avoids a specific node being overloaded by considering the current workload of each node. To evaluate the performance of the proposed algorithm, we develop a simulation model of the DSS, and then analyze the simulation results. The results show that the proposed algorithm outperforms the existing algorithms in the transaction processing rate. Especially the proposed algorithm shows better performance when the number of concurrently executed transactions is high and the data page access patterns of the transactions are not equally distributed.

An Access Control Method Based on a Synthesized Metric from Trust and Risk Factors for Online Social Networks (신뢰도와 위험도로부터 합성된 지표에 기반을 둔 온라인 소셜 네트워크를 위한 접근 제어 방법)

  • Seo, Yang-Jin;Han, Sang-Yong
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.15-26
    • /
    • 2010
  • Social Networks such as 'Facebook' and 'Myspace' are regarded as useful tools for people to share interests and maintain or expand relationships with other people. However, they pose the risk that personal information can be exposed to other people without explicit permission from the information owner. Therefore, we need a solution for this problem. Although existing social network sites allow users to specify the exposing range or users who can access their personal information, this cannot be a practical solution because the information can still be revealed to third parties through the permitted users albeit unintentionally. Usually, people allow the access of unknown person to personal data in online social networks and this implies the possibility of information leakage. We could use an access control method based on trust value, but this has the limitation that it cannot reflect the quantitative risk of information leakage. As a solution to this problem, this paper proposes an access control method based on a synthesized metric from trust and risk factors. Our various experiments show that the risk of information leakage can play an important role in the access control of online social networks.

An Implementation of IEEE 1516.1-2000 Standard with the Hybrid Data Communication Method (하이브리드 데이터 통신 방식을 적용한 IEEE 1516.1-2000 표준의 구현)

  • Shim, Jun-Yong;Wi, Soung-Hyouk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1094-1103
    • /
    • 2012
  • Recently, software industry regarding national defense increases system development of distributed simulation system of M&S based to overcome limit of resource and expense. It is one of key technologies for offering of mutual validation among objects and reuse of objects which are discussed for developing these systems. RTI, implementation of HLA interface specification as software providing these technologies uses Federation Object Model for exchanging information with joined federates in the federation and each federate has a characteristic that is supposed to have identical FOM in the federation. This technology is a software which is to provide the core technology which was suggested by the United state's military M&S standard framework. Simulator, virtual simulation, and inter-connection between military weapons system S/W which executes on network which is M&S's core base technology, and it is a technology which also can be used for various inter-connection between S/W such as game and on-line phone. These days although RTI is used in military war game or tactical training unit field, there is none in Korea. Also, it is used in mobile-game, distribution game, net management, robot field, and other civilian field, but the number of examples are so small and informalized. Through this developing project, we developed the core technique and RTI software and provided performance of COTS level to improve communication algorithms.

A Korean Community-based Question Answering System Using Multiple Machine Learning Methods (다중 기계학습 방법을 이용한 한국어 커뮤니티 기반 질의-응답 시스템)

  • Kwon, Sunjae;Kim, Juae;Kang, Sangwoo;Seo, Jungyun
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1085-1093
    • /
    • 2016
  • Community-based Question Answering system is a system which provides answers for each question from the documents uploaded on web communities. In order to enhance the capacity of question analysis, former methods have developed specific rules suitable for a target region or have applied machine learning to partial processes. However, these methods incur an excessive cost for expanding fields or lead to cases in which system is overfitted for a specific field. This paper proposes a multiple machine learning method which automates the overall process by adapting appropriate machine learning in each procedure for efficient processing of community-based Question Answering system. This system can be divided into question analysis part and answer selection part. The question analysis part consists of the question focus extractor, which analyzes the focused phrases in questions and uses conditional random fields, and the question type classifier, which classifies topics of questions and uses support vector machine. In the answer selection part, the we trains weights that are used by the similarity estimation models through an artificial neural network. Also these are a number of cases in which the results of morphological analysis are not reliable for the data uploaded on web communities. Therefore, we suggest a method that minimizes the impact of morphological analysis by using character features in the stage of question analysis. The proposed system outperforms the former system by showing a Mean Average Precision criteria of 0.765 and R-Precision criteria of 0.872.

Learning-associated Reward and Penalty in Feedback Learning: an fMRI activation study (학습피드백으로서 보상과 처벌 관련 두뇌 활성화 연구)

  • Kim, Jinhee;Kan, Eunjoo
    • Korean Journal of Cognitive Science
    • /
    • v.28 no.1
    • /
    • pp.65-90
    • /
    • 2017
  • Rewards or penalties become informative only when contingent on an immediately preceding response. Our goal was to determine if the brain responds differently to motivational events depending on whether they provide feedback with the contingencies effective for learning. Event-related fMRI data were obtained from 22 volunteers performing a visuomotor categorical task. In learning-condition trials, participants learned by trial and error to make left or right responses to letter cues (16 consonants). Monetary rewards (+500) or penalties (-500) were given as feedback (learning feedback). In random-condition trials, cues (4 vowels) appeared right or left of the display center, and participants were instructed to respond with the appropriate hand. However, rewards or penalties (random feedback) were given randomly (50/50%) regardless of the correctness of response. Feedback-associated BOLD responses were analyzed with ANOVA [trial type (learning vs. random) x feedback type (reward vs. penalty)] using SPM8 (voxel-wise FWE p < .001). The right caudate nucleus and right cerebellum showed activation, whereas the left parahippocampus and other regions as the default mode network showed deactivation, both greater for learning trials than random trials. Activations associated with reward feedback did not differ between the two trial types for any brain region. For penalty, both learning-penalty and random-penalty enhanced activity in the left insular cortex, but not the right. The left insula, however, as well as the left dorsolateral prefrontal cortex and dorsomedial prefrontal cortex/dorsal anterior cingulate cortex, showed much greater responses for learning-penalty than for random-penalty. These findings suggest that learning-penalty plays a critical role in learning, unlike rewards or random-penalty, probably not only due to its evoking of aversive emotional responses, but also because of error-detection processing, either of which might lead to changes in planning or strategy.