• Title/Summary/Keyword: multiple access

Search Result 2,387, Processing Time 0.028 seconds

The Recognition and Utilization of Middle School Technology.Home Economics Teacher's Guidebook (중학교 "기술.가정" 교과 교사용 지도서에 대한 가정 교사의 인식 및 활용)

  • Kang, Eun-Yeong;Shin, Hye-Won
    • Journal of Korean Home Economics Education Association
    • /
    • v.19 no.2
    • /
    • pp.1-12
    • /
    • 2007
  • This study analyzed the recognition and utilization regarding teacher's guidebook for middle school technology-home economics class in the 7th Educational Curriculum. The data were collected via e-mail to teachers teaching home economics in middle schools. These e-mail addresses were acquired from middle school web pages registered on the Educational Board. The 355 data were analyzed using the SPSS program. The results were as follows: First, teachers recognized highly the necessity of teacher's guidebook. However, as the actual guidebook was not adequately helpful, the overall degree of satisfaction was relatively low. Teachers utilizing guidebook had more positive recognition on teacher's guidebook than teachers who did not. And teachers majored in technology education thought teacher's guidebook more helpful compared with teachers majored in home economics education. Second, teachers referenced teacher's guidebook mostly for field practice guidance. Third, teachers who did not utilize teacher's guidebook used other reference materials such as Internet Web sites and audiovisual materials. They were most commonly used for the reason that the contents were ample and easy to access. Fourth, the followings were suggested to improve teacher's guidebook. The provision of learning contents that can be practically used in class, the various samples of teaching-learning method, the specified methods of planning and criteria for performance assessment, the adequate supplementations regarding textbook contents, and the improvement of the outward layout format of the guidebook.

  • PDF

Mammalian Reproduction and Pheromones (포유동물의 생식과 페로몬)

  • Lee, Sung-Ho
    • Development and Reproduction
    • /
    • v.10 no.3
    • /
    • pp.159-168
    • /
    • 2006
  • Rodents and many other mammals have two chemosensory systems that mediate responses to pheromones, the main and accessory olfactory system, MOS and AOS, respectively. The chemosensory neurons associated with the MOS are located in the main olfactory epithelium, while those associated with the AOS are located in the vomeronasal organ(VNO). Pheromonal odorants access the lumen of the VNO via canals in the roof of the mouth, and are largely thought to be nonvolatile. The main pheromone receptor proteins consist of two superfamilies, V1Rs and V2Rs, that are structurally distinct and unrelated to the olfactory receptors expressed in the main olfactory epithelium. These two type of receptors are seven transmembrane domain G-protein coupled proteins(V1R with $G_{{\alpha}i2}$, V2R with $G_{0\;{\alpha}}$). V2Rs are co-expressed with nonclassical MHC Ib genes(M10 and other 8 M1 family proteins). Other important molecular component of VNO neuron is a TrpC2, a cation channel protein of transient receptor potential(TRP) family and thought to have a crucial role in signal transduction. There are four types of pheromones in mammalian chemical communication - primers, signalers, modulators and releasers. Responses to these chemosignals can vary substantially within and between individuals. This variability can stem from the modulating effects of steroid hormones and/or non-steroid factors such as neurotransmitters on olfactory processing. Such modulation frequently augments or facilitates the effects that prevailing social and environmental conditions have on the reproductive axis. The best example is the pregnancy block effect(Bruce effect), caused by testosterone-dependent major urinary proteins(MUPs) in male mouse urine. Intriguingly, mouse GnRH neurons receive pheromone signals from both odor and pheromone relays in the brain and may also receive common odor signals. Though it is quite controversial, recent studies reveal a complex interplay between reproduction and other functions in which GnRH neurons appear to integrate information from multiple sources and modulate a variety of brain functions.

  • PDF

Conditional Generative Adversarial Network based Collaborative Filtering Recommendation System (Conditional Generative Adversarial Network(CGAN) 기반 협업 필터링 추천 시스템)

  • Kang, Soyi;Shin, Kyung-shik
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.3
    • /
    • pp.157-173
    • /
    • 2021
  • With the development of information technology, the amount of available information increases daily. However, having access to so much information makes it difficult for users to easily find the information they seek. Users want a visualized system that reduces information retrieval and learning time, saving them from personally reading and judging all available information. As a result, recommendation systems are an increasingly important technologies that are essential to the business. Collaborative filtering is used in various fields with excellent performance because recommendations are made based on similar user interests and preferences. However, limitations do exist. Sparsity occurs when user-item preference information is insufficient, and is the main limitation of collaborative filtering. The evaluation value of the user item matrix may be distorted by the data depending on the popularity of the product, or there may be new users who have not yet evaluated the value. The lack of historical data to identify consumer preferences is referred to as data sparsity, and various methods have been studied to address these problems. However, most attempts to solve the sparsity problem are not optimal because they can only be applied when additional data such as users' personal information, social networks, or characteristics of items are included. Another problem is that real-world score data are mostly biased to high scores, resulting in severe imbalances. One cause of this imbalance distribution is the purchasing bias, in which only users with high product ratings purchase products, so those with low ratings are less likely to purchase products and thus do not leave negative product reviews. Due to these characteristics, unlike most users' actual preferences, reviews by users who purchase products are more likely to be positive. Therefore, the actual rating data is over-learned in many classes with high incidence due to its biased characteristics, distorting the market. Applying collaborative filtering to these imbalanced data leads to poor recommendation performance due to excessive learning of biased classes. Traditional oversampling techniques to address this problem are likely to cause overfitting because they repeat the same data, which acts as noise in learning, reducing recommendation performance. In addition, pre-processing methods for most existing data imbalance problems are designed and used for binary classes. Binary class imbalance techniques are difficult to apply to multi-class problems because they cannot model multi-class problems, such as objects at cross-class boundaries or objects overlapping multiple classes. To solve this problem, research has been conducted to convert and apply multi-class problems to binary class problems. However, simplification of multi-class problems can cause potential classification errors when combined with the results of classifiers learned from other sub-problems, resulting in loss of important information about relationships beyond the selected items. Therefore, it is necessary to develop more effective methods to address multi-class imbalance problems. We propose a collaborative filtering model using CGAN to generate realistic virtual data to populate the empty user-item matrix. Conditional vector y identify distributions for minority classes and generate data reflecting their characteristics. Collaborative filtering then maximizes the performance of the recommendation system via hyperparameter tuning. This process should improve the accuracy of the model by addressing the sparsity problem of collaborative filtering implementations while mitigating data imbalances arising from real data. Our model has superior recommendation performance over existing oversampling techniques and existing real-world data with data sparsity. SMOTE, Borderline SMOTE, SVM-SMOTE, ADASYN, and GAN were used as comparative models and we demonstrate the highest prediction accuracy on the RMSE and MAE evaluation scales. Through this study, oversampling based on deep learning will be able to further refine the performance of recommendation systems using actual data and be used to build business recommendation systems.

Mapping the Research Landscape of Wastewater Treatment Wetlands: A Bibliometric Analysis and Comprehensive Review (폐수 처리 위한 습지의 연구 환경 매핑: 서지학적 분석 및 종합 검토)

  • C. C. Vispo;N. J. D. G. Reyes;H. S. Choi;M.S. Jeon;L. H. Kim
    • Journal of Wetlands Research
    • /
    • v.25 no.2
    • /
    • pp.145-158
    • /
    • 2023
  • Constructed wetlands (CWs) are effective technologies for urban wastewater management, utilizing natural physico-chemical and biological processes to remove pollutants. This study employed a bibliometric analysis approach to investigate the progress and future research trends in the field of CWs. A comprehensive review of 100 most-recently published and open-access articles was performed to analyze the performance of CWs in treating wastewater. Spain, China, Italy, and the United States were among the most productive countries in terms of the number of published papers. The most frequently used keywords in publications include water quality (n=19), phytoremediation (n=13), stormwater (n=11), and phosphorus (n=11), suggesting that the efficiency of CWs in improving water quality and removal of nutrients were widely investigated. Among the different types of CWs reviewed, hybrid CWs exhibited the highest removal efficiencies for BOD (88.67%) and TSS (95.67%), whereas VSSF, and HSSF systems also showed high TSS removal efficiencies (83.25%, and 78.83% respectively). VSSF wetland displayed the highest COD removal efficiency (71.82%). Generally, physical processes (e.g., sedimentation, filtration, adsorption) and biological mechanisms (i.e., biodegradation) contributed to the high removal efficiency of TSS, BOD, and COD in CW systems. The hybrid CW system demonstrated highest TN removal efficiency (60.78%) by integrating multiple treatment processes, including aerobic and anaerobic conditions, various vegetation types, and different media configurations, which enhanced microbial activity and allowed for comprehensive nitrogen compound removal. The FWS system showed the highest TP removal efficiency (54.50%) due to combined process of settling sediment-bound phosphorus and plant uptake. Phragmites, Cyperus, Iris, and Typha were commonly used in CWs due to their superior phytoremediation capabilities. The study emphasized the potential of CWs as sustainable alternatives for wastewater management, particularly in urban areas.

A Study on the Operation Plan of the Gangwon-do Disaster Management Resources Integrated Management Center (강원도 재난관리자원 통합관리센터 운영방안에 관한 연구)

  • Hang-Il Jo;Sang-Beom Park;Kye-Won Jun
    • Journal of Korean Society of Disaster and Security
    • /
    • v.17 no.1
    • /
    • pp.9-16
    • /
    • 2024
  • In Korea, as disasters become larger and more complex, there is a trend of shifting from a focus on response and recovery to a focus on prevention and preparedness. In order to prevent and prepare for disasters, each local government manages disaster management resources by stockpiling them. However, although disaster management resources are stored in individual warehouses, they are managed by department rather than by warehouse, resulting in insufficient management of disaster management resources due to the heavy workload of those in charge. In order to intensively manage these disaster management resources, an integrated disaster management resource management center is established and managed at the metropolitan/provincial level. In the case of Gangwon-do, the subject of this study, a warehouse is rented and operated as an integrated disaster management resource management center. When leasing an integrated management center, there is the inconvenience of having to move the location every 1 to 2 years, so it is deemed necessary to build a dedicated facility in an available site. To select a location candidate, network analysis was used to measure access to and use of facilities along interconnected routes of networks such as roads and railways. During network analysis, the Location-Allocation method, which was widely used in the past to determine the location of multiple facilities, was applied. As a result, Hoengseong-gun in Gangwon-do was identified as a suitable candidate site. In addition, if the integrated management center uses our country's logistics system to stockpile disaster management resources, local governments can mobilize disaster management resources in 3 days, and it is said that it takes 3 days to return to normal life after a disaster occurs. Each city's disaster management resource stockpile is 3 days' worth per week, and the integrated management center stores 3 times the maximum of the city's 4-day stockpile.

Change Acceptable In-Depth Searching in LOD Cloud for Efficient Knowledge Expansion (효과적인 지식확장을 위한 LOD 클라우드에서의 변화수용적 심층검색)

  • Kim, Kwangmin;Sohn, Yonglak
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.171-193
    • /
    • 2018
  • LOD(Linked Open Data) cloud is a practical implementation of semantic web. We suggested a new method that provides identity links conveniently in LOD cloud. It also allows changes in LOD to be reflected to searching results without any omissions. LOD provides detail descriptions of entities to public in RDF triple form. RDF triple is composed of subject, predicates, and objects and presents detail description for an entity. Links in LOD cloud, named identity links, are realized by asserting entities of different RDF triples to be identical. Currently, the identity link is provided with creating a link triple explicitly in which associates its subject and object with source and target entities. Link triples are appended to LOD. With identity links, a knowledge achieves from an LOD can be expanded with different knowledge from different LODs. The goal of LOD cloud is providing opportunity of knowledge expansion to users. Appending link triples to LOD, however, has serious difficulties in discovering identity links between entities one by one notwithstanding the enormous scale of LOD. Newly added entities cannot be reflected to searching results until identity links heading for them are serialized and published to LOD cloud. Instead of creating enormous identity links, we propose LOD to prepare its own link policy. The link policy specifies a set of target LODs to link and constraints necessary to discover identity links to entities on target LODs. On searching, it becomes possible to access newly added entities and reflect them to searching results without any omissions by referencing the link policies. Link policy specifies a set of predicate pairs for discovering identity between associated entities in source and target LODs. For the link policy specification, we have suggested a set of vocabularies that conform to RDFS and OWL. Identity between entities is evaluated in accordance with a similarity of the source and the target entities' objects which have been associated with the predicates' pair in the link policy. We implemented a system "Change Acceptable In-Depth Searching System(CAIDS)". With CAIDS, user's searching request starts from depth_0 LOD, i.e. surface searching. Referencing the link policies of LODs, CAIDS proceeds in-depth searching, next LODs of next depths. To supplement identity links derived from the link policies, CAIDS uses explicit link triples as well. Following the identity links, CAIDS's in-depth searching progresses. Content of an entity obtained from depth_0 LOD expands with the contents of entities of other LODs which have been discovered to be identical to depth_0 LOD entity. Expanding content of depth_0 LOD entity without user's cognition of such other LODs is the implementation of knowledge expansion. It is the goal of LOD cloud. The more identity links in LOD cloud, the wider content expansions in LOD cloud. We have suggested a new way to create identity links abundantly and supply them to LOD cloud. Experiments on CAIDS performed against DBpedia LODs of Korea, France, Italy, Spain, and Portugal. They present that CAIDS provides appropriate expansion ratio and inclusion ratio as long as degree of similarity between source and target objects is 0.8 ~ 0.9. Expansion ratio, for each depth, depicts the ratio of the entities discovered at the depth to the entities of depth_0 LOD. For each depth, inclusion ratio illustrates the ratio of the entities discovered only with explicit links to the entities discovered only with link policies. In cases of similarity degrees with under 0.8, expansion becomes excessive and thus contents become distorted. Similarity degree of 0.8 ~ 0.9 provides appropriate amount of RDF triples searched as well. Experiments have evaluated confidence degree of contents which have been expanded in accordance with in-depth searching. Confidence degree of content is directly coupled with identity ratio of an entity, which means the degree of identity to the entity of depth_0 LOD. Identity ratio of an entity is obtained by multiplying source LOD's confidence and source entity's identity ratio. By tracing the identity links in advance, LOD's confidence is evaluated in accordance with the amount of identity links incoming to the entities in the LOD. While evaluating the identity ratio, concept of identity agreement, which means that multiple identity links head to a common entity, has been considered. With the identity agreement concept, experimental results present that identity ratio decreases as depth deepens, but rebounds as the depth deepens more. For each entity, as the number of identity links increases, identity ratio rebounds early and reaches at 1 finally. We found out that more than 8 identity links for each entity would lead users to give their confidence to the contents expanded. Link policy based in-depth searching method, we proposed, is expected to contribute to abundant identity links provisions to LOD cloud.

Intelligent Brand Positioning Visualization System Based on Web Search Traffic Information : Focusing on Tablet PC (웹검색 트래픽 정보를 활용한 지능형 브랜드 포지셔닝 시스템 : 태블릿 PC 사례를 중심으로)

  • Jun, Seung-Pyo;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.93-111
    • /
    • 2013
  • As Internet and information technology (IT) continues to develop and evolve, the issue of big data has emerged at the foreground of scholarly and industrial attention. Big data is generally defined as data that exceed the range that can be collected, stored, managed and analyzed by existing conventional information systems and it also refers to the new technologies designed to effectively extract values from such data. With the widespread dissemination of IT systems, continual efforts have been made in various fields of industry such as R&D, manufacturing, and finance to collect and analyze immense quantities of data in order to extract meaningful information and to use this information to solve various problems. Since IT has converged with various industries in many aspects, digital data are now being generated at a remarkably accelerating rate while developments in state-of-the-art technology have led to continual enhancements in system performance. The types of big data that are currently receiving the most attention include information available within companies, such as information on consumer characteristics, information on purchase records, logistics information and log information indicating the usage of products and services by consumers, as well as information accumulated outside companies, such as information on the web search traffic of online users, social network information, and patent information. Among these various types of big data, web searches performed by online users constitute one of the most effective and important sources of information for marketing purposes because consumers search for information on the internet in order to make efficient and rational choices. Recently, Google has provided public access to its information on the web search traffic of online users through a service named Google Trends. Research that uses this web search traffic information to analyze the information search behavior of online users is now receiving much attention in academia and in fields of industry. Studies using web search traffic information can be broadly classified into two fields. The first field consists of empirical demonstrations that show how web search information can be used to forecast social phenomena, the purchasing power of consumers, the outcomes of political elections, etc. The other field focuses on using web search traffic information to observe consumer behavior, identifying the attributes of a product that consumers regard as important or tracking changes on consumers' expectations, for example, but relatively less research has been completed in this field. In particular, to the extent of our knowledge, hardly any studies related to brands have yet attempted to use web search traffic information to analyze the factors that influence consumers' purchasing activities. This study aims to demonstrate that consumers' web search traffic information can be used to derive the relations among brands and the relations between an individual brand and product attributes. When consumers input their search words on the web, they may use a single keyword for the search, but they also often input multiple keywords to seek related information (this is referred to as simultaneous searching). A consumer performs a simultaneous search either to simultaneously compare two product brands to obtain information on their similarities and differences, or to acquire more in-depth information about a specific attribute in a specific brand. Web search traffic information shows that the quantity of simultaneous searches using certain keywords increases when the relation is closer in the consumer's mind and it will be possible to derive the relations between each of the keywords by collecting this relational data and subjecting it to network analysis. Accordingly, this study proposes a method of analyzing how brands are positioned by consumers and what relationships exist between product attributes and an individual brand, using simultaneous search traffic information. It also presents case studies demonstrating the actual application of this method, with a focus on tablets, belonging to innovative product groups.