• Title/Summary/Keyword: multiple intelligence theory

Search Result 49, Processing Time 0.029 seconds

An Integrated Methodology of Knowledge-based Rules with Fuzzy Logic for Material Handling Equipment Selection (전문가 지식 및 퍼지 이론을 연계한 물류설비 선정 방안에 관한 연구)

  • Cho Chi-Woon
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.1
    • /
    • pp.57-73
    • /
    • 2006
  • This paper describes a methodology for automating the material handling equipment (MHE) evaluation and selection processes by combining knowledge-based rules and fuzzy multi-criteria decision making approach. The methodology is proposed to solve the MHE selection problems under fuzzy environment. At the primary stage, the most appropriate MHE type among the alternatives for each material flow link is searched. Knowledge-based rules are employed to retrieve the alternatives for each material flow link. To consider and compare the alternatives, multiple design factors are considered. These factors include both quantitative and qualitative measures. The qualitative measures are converted to numerical measures using fuzzy logic. The concept of fuzzy logic is applied to evaluation matrices used for the selection of the most suitable MHE through a fuzzy linguistic approach. Thus, this paper demonstrates the potential applicability of fuzzy theory in the MHE applications and provides a systemic guidance in the decision-making process.

  • PDF

Design of Educational Game for Development of Creativity (창의력 계발을 위한 학습게임의 설계)

  • Ahn, Seong-Hye;Song, Su-Mi
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.9
    • /
    • pp.1-9
    • /
    • 2007
  • Recently, the primary school training courses requires creative human being who is able to solve problem in accordance with rapidly changing society. Accordingly, it needs development of edutainment contents that can develop creativity and heighten educational effect as attracting learner's interest. This paper intends to design educational game which can develop creativity. Method of research is based on the concept of creativity and theory of multiple intelligence. First, I pulled out educational elements of edutainment game which can develop ability to solve synthetic problem and then drew interest elements of edutainment game by combined game with form of cartoon. Secondly, creativity studying area set the 5 learning area of verbal, visual, mathematical, logical and analytic creativity and then, a course of learning was designed to have each 3 details of 5 teaming areas of creativity. Finally, it presented production direction of educational game by combined with 4 elements of the interest that is an avatar, achievement of a mission, a time limit and win a point.

A Design and Implementation of career e-portfolio system to improve career consciousness Maturity of elementary school students (초등학생 진로의식성숙을 위한 커리어 e-포트폴리오 시스템 설계 및 구현)

  • Kim, Jeong-Rang;Choi, Chang-Hun
    • Journal of The Korean Association of Information Education
    • /
    • v.16 no.1
    • /
    • pp.143-150
    • /
    • 2012
  • The choice of occupation has a great deal of influences on achievement of self-realization and living a good life in an individual's life. Especially, it is very significant for Elementary school students because they become to aware of career and develop. However, in the present, the career guidance is mainly concentrated in the solitary work, such as an aptitude test and printed materials. The perspective from the student, therefore, needs systematic and efficient system to accumulate activities and result of their various career guidance for individual career-related information. The system to improve elementary school student's career awareness based on e-portfolio has been developed. The developed system can effectively accumulate students' activities and result of their various career guidance and easily grasp their strengths and weaknesses of intelligence based on theory of multiple intelligences. Teacher also can easily grasp their student's talent through all sorts of graphs provided by the web site for career education.

  • PDF

Pedagogical Conditions for Formation of Design Competence of Qualified Workers with the Use of Information Technologies

  • Slipchyshyn, Lidiia;Honcharuk, Oksana;Anikina, Inessa;Yakymenko, Polina;Breslavska, Hanna;Yakymenko, Svitlana;Opria, Ihor
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.79-88
    • /
    • 2022
  • Modern production requires production staff who have design competence, experience and skills to work in various types of work integrated into professional activities. Possession of digital design methods significantly expands the opportunities for professional activities of qualified workers. The purpose of our study was to study the impact of pedagogical conditions on the formation of design competence of future qualified workers in a group work. We have identified a set of pedagogical conditions that promote the development of professionally oriented artistic and technical creativity of workers in the conditions of curricular and extracurricular activities, which include motivational-target, procedural-semantic, organizational-technological, and subject-oriented. It is shown that the formation of design competence is determined by motivational, informational-active and reflection criteria, which are aimed at motivational-value, cognitive, operational-active, creative, social and emotional components of this competence. The methodology of the research is highlighted, which includes the use of the following methods: determination of the personality's motivational sphere in order to identify strong and weak motives of students activity; multiple intelligence to identify students talents in the direction of practical intelligence, which is important for design competence; determining the level of creative activity to identify manifestations of students creative abilities; identifying the type of students innovative thinking in order to develop motivation for success; factor-criterion model, developed on the basis of a qualimetric approach, which is used to identify the level of design competence formation in accordance with its components. The results of the study showed that the creation of separate pedagogical conditions in the institution of vocational education and training (VET) had a positive impact on the development of design competence, which shows the potential of artistic and technical design in the development of professional creativity of future qualified workers taking into account the environmental approach.

Is Mr. AI more responsible? The effect of anthropomorphism in the moral judgement toward AI's decision making (AI의 의사결정에 대한 도덕판단에서 의인화가 미치는 영향 - 쌍 도덕 이론을 중심으로 -)

  • Yoon-Bin, Choi;Dayk, Jang
    • Korean Journal of Cognitive Science
    • /
    • v.33 no.4
    • /
    • pp.169-203
    • /
    • 2022
  • As artificial intelligence (AI) technology advances, the number of cases in which AI becomes an object or subject of moral judgment is increasing, and this trend is expected to accelerate. Although the area of AI in human society expands, relatively few studies have been conducted on how people perceive and respond to AI. Three studies examined the effect of the anthropomorphism of AI on its responsibility. We predicted that anthropomorphism would increase the responsibility perception, and perceived agency and perceived patiency for AI would mediate this effect. Although the manipulation was not effective, multiple analyses confirmed the indirect effect of perceived patiency. In contrast, the effect of perceived agency of AI was somewhat mixed, which makes the hypothesis partially supported by the overall result. This result shows that for the moral status of artificial agents, perceived patiency is relatively more critical than perceived agency. These results support the organic perspective on the moral status that argues the importance of patiency, and show that patiency is more important than agency in the anthropomorphism related study of AI and robots.

A Study of the Nonlinear Characteristics Improvement for a Electronic Scale using Multiple Regression Analysis (다항식 회귀분석을 이용한 전자저울의 비선형 특성 개선 연구)

  • Chae, Gyoo-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.6
    • /
    • pp.1-6
    • /
    • 2019
  • In this study, the development of a weight estimation model of electronic scale with nonlinear characteristics is presented using polynomial regression analysis. The output voltage of the load cell was measured directly using the reference mass. And a polynomial regression model was obtained using the matrix and curve fitting function of MS Office Excel. The weight was measured in 100g units using a load cell electronic scale measuring up to 5kg and the polynomial regression model was obtained. The error was calculated for simple($1^{st}$), $2^{nd}$ and $3^{rd}$ order polynomial regression. To analyze the suitability of the regression function for each model, the coefficient of determination was presented to indicate the correlation between the estimated mass and the measured data. Using the third order polynomial model proposed here, a very accurate model was obtained with a standard deviation of 10g and the determinant coefficient of 1.0. Based on the theory of multi regression model presented here, it can be used in various statistical researches such as weather forecast, new drug development and economic indicators analysis using logistic regression analysis, which has been widely used in artificial intelligence fields.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

Critical Success Factor of Noble Payment System: Multiple Case Studies (새로운 결제서비스의 성공요인: 다중사례연구)

  • Park, Arum;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.59-87
    • /
    • 2014
  • In MIS field, the researches on payment services are focused on adoption factors of payment service using behavior theories such as TRA(Theory of Reasoned Action), TAM(Technology Acceptance Model), and TPB (Theory of Planned Behavior). The previous researches presented various adoption factors according to types of payment service, nations, culture and so on even though adoption factors of identical payment service were presented differently by researchers. The payment service industry relatively has strong path dependency to the existing payment methods so that the research results on the identical payment service are different due to payment culture of nation. This paper aims to suggest a successful adoption factor of noble payment service regardless of nation's culture and characteristics of payment and prove it. In previous researches, common adoption factors of payment service are convenience, ease of use, security, convenience, speed etc. But real cases prove the fact that adoption factors that the previous researches present are not always critical to success to penetrate a market. For example, PayByPhone, NFC based parking payment service, successfully has penetrated to early market and grown. In contrast, Google Wallet service failed to be adopted to users despite NFC based payment method which provides convenience, security, ease of use. As shown in upper case, there remains an unexplained aspect. Therefore, the present research question emerged from the question: "What is the more essential and fundamental factor that should takes precedence over factors such as provides convenience, security, ease of use for successful penetration to market". With these cases, this paper analyzes four cases predicted on the following hypothesis and demonstrates it. "To successfully penetrate a market and sustainably grow, new payment service should find non-customer of the existing payment service and provide noble payment method so that they can use payment method". We give plausible explanations for the hypothesis using multiple case studies. Diners club, Danal, PayPal, Square were selected as a typical and successful cases in each category of payment service. The discussion on cases is primarily non-customer analysis that noble payment service targets on to find the most crucial factor in the early market, we does not attempt to consider factors for business growth. We clarified three-tier non-customer of the payment method that new payment service targets on and elaborated how new payment service satisfy them. In case of credit card, this payment service target first tier of non-customer who can't pay for because they don't have any cash temporarily but they have regular income. So credit card provides an opportunity which they can do economic activities by delaying the date of payment. In a result of wireless phone payment's case study, this service targets on second of non-customer who can't use online payment because they concern about security or have to take a complex process and learn how to use online payment method. Therefore, wireless phone payment provides very convenient payment method. Especially, it made group of young pay for a little money without a credit card. Case study result of PayPal, online payment service, shows that it targets on second tier of non-customer who reject to use online payment service because of concern about sensitive information leaks such as passwords and credit card details. Accordingly, PayPal service allows users to pay online without a provision of sensitive information. Final Square case result, Mobile POS -based payment service, also shows that it targets on second tier of non-customer who can't individually transact offline because of cash's shortness. Hence, Square provides dongle which function as POS by putting dongle in earphone terminal. As a result, four cases made non-customer their customer so that they could penetrate early market and had been extended their market share. Consequently, all cases supported the hypothesis and it is highly probable according to 'analytic generation' that case study methodology suggests. We present for judging the quality of research designs the following. Construct validity, internal validity, external validity, reliability are common to all social science methods, these have been summarized in numerous textbooks(Yin, 2014). In case study methodology, these also have served as a framework for assessing a large group of case studies (Gibbert, Ruigrok & Wicki, 2008). Construct validity is to identify correct operational measures for the concepts being studied. To satisfy construct validity, we use multiple sources of evidence such as the academic journals, magazine and articles etc. Internal validity is to seek to establish a causal relationship, whereby certain conditions are believed to lead to other conditions, as distinguished from spurious relationships. To satisfy internal validity, we do explanation building through four cases analysis. External validity is to define the domain to which a study's findings can be generalized. To satisfy this, replication logic in multiple case studies is used. Reliability is to demonstrate that the operations of a study -such as the data collection procedures- can be repeated, with the same results. To satisfy this, we use case study protocol. In Korea, the competition among stakeholders over mobile payment industry is intensifying. Not only main three Telecom Companies but also Smartphone companies and service provider like KakaoTalk announced that they would enter into mobile payment industry. Mobile payment industry is getting competitive. But it doesn't still have momentum effect notwithstanding positive presumptions that will grow very fast. Mobile payment services are categorized into various technology based payment service such as IC mobile card and Application payment service of cloud based, NFC, sound wave, BLE(Bluetooth Low Energy), Biometric recognition technology etc. Especially, mobile payment service is discontinuous innovations that users should change their behavior and noble infrastructure should be installed. These require users to learn how to use it and cause infra-installation cost to shopkeepers. Additionally, payment industry has the strong path dependency. In spite of these obstacles, mobile payment service which should provide dramatically improved value as a products and service of discontinuous innovations is focusing on convenience and security, convenience and so on. We suggest the following to success mobile payment service. First, non-customers of the existing payment service need to be identified. Second, needs of them should be taken. Then, noble payment service provides non-customer who can't pay by the previous payment method to payment method. In conclusion, mobile payment service can create new market and will result in extension of payment market.

Improved Social Network Analysis Method in SNS (SNS에서의 개선된 소셜 네트워크 분석 방법)

  • Sohn, Jong-Soo;Cho, Soo-Whan;Kwon, Kyung-Lag;Chung, In-Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.4
    • /
    • pp.117-127
    • /
    • 2012
  • Due to the recent expansion of the Web 2.0 -based services, along with the widespread of smartphones, online social network services are being popularized among users. Online social network services are the online community services which enable users to communicate each other, share information and expand human relationships. In the social network services, each relation between users is represented by a graph consisting of nodes and links. As the users of online social network services are increasing rapidly, the SNS are actively utilized in enterprise marketing, analysis of social phenomenon and so on. Social Network Analysis (SNA) is the systematic way to analyze social relationships among the members of the social network using the network theory. In general social network theory consists of nodes and arcs, and it is often depicted in a social network diagram. In a social network diagram, nodes represent individual actors within the network and arcs represent relationships between the nodes. With SNA, we can measure relationships among the people such as degree of intimacy, intensity of connection and classification of the groups. Ever since Social Networking Services (SNS) have drawn increasing attention from millions of users, numerous researches have made to analyze their user relationships and messages. There are typical representative SNA methods: degree centrality, betweenness centrality and closeness centrality. In the degree of centrality analysis, the shortest path between nodes is not considered. However, it is used as a crucial factor in betweenness centrality, closeness centrality and other SNA methods. In previous researches in SNA, the computation time was not too expensive since the size of social network was small. Unfortunately, most SNA methods require significant time to process relevant data, and it makes difficult to apply the ever increasing SNS data in social network studies. For instance, if the number of nodes in online social network is n, the maximum number of link in social network is n(n-1)/2. It means that it is too expensive to analyze the social network, for example, if the number of nodes is 10,000 the number of links is 49,995,000. Therefore, we propose a heuristic-based method for finding the shortest path among users in the SNS user graph. Through the shortest path finding method, we will show how efficient our proposed approach may be by conducting betweenness centrality analysis and closeness centrality analysis, both of which are widely used in social network studies. Moreover, we devised an enhanced method with addition of best-first-search method and preprocessing step for the reduction of computation time and rapid search of the shortest paths in a huge size of online social network. Best-first-search method finds the shortest path heuristically, which generalizes human experiences. As large number of links is shared by only a few nodes in online social networks, most nods have relatively few connections. As a result, a node with multiple connections functions as a hub node. When searching for a particular node, looking for users with numerous links instead of searching all users indiscriminately has a better chance of finding the desired node more quickly. In this paper, we employ the degree of user node vn as heuristic evaluation function in a graph G = (N, E), where N is a set of vertices, and E is a set of links between two different nodes. As the heuristic evaluation function is used, the worst case could happen when the target node is situated in the bottom of skewed tree. In order to remove such a target node, the preprocessing step is conducted. Next, we find the shortest path between two nodes in social network efficiently and then analyze the social network. For the verification of the proposed method, we crawled 160,000 people from online and then constructed social network. Then we compared with previous methods, which are best-first-search and breath-first-search, in time for searching and analyzing. The suggested method takes 240 seconds to search nodes where breath-first-search based method takes 1,781 seconds (7.4 times faster). Moreover, for social network analysis, the suggested method is 6.8 times and 1.8 times faster than betweenness centrality analysis and closeness centrality analysis, respectively. The proposed method in this paper shows the possibility to analyze a large size of social network with the better performance in time. As a result, our method would improve the efficiency of social network analysis, making it particularly useful in studying social trends or phenomena.