• Title/Summary/Keyword: online-order

Search Result 1,704, Processing Time 0.029 seconds

A Light Weighted Robust Korean Morphological Analyzer for Korean-to-English Mobile Translator (한영 모바일 번역기를 위한 강건하고 경량화된 한국어 형태소 분석기)

  • Yuh, Sang-Hwa
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.2
    • /
    • pp.191-199
    • /
    • 2009
  • In this paper we present a light weighted robust Korean morphological analyzer for mobile devices such as mobile phones, smart phones, and PDA phones. Such mobile devices are not suitable for natural language interfaces for their low CPU performance and memory restriction. In order to overcome the difficulties we propose 1) an online analysis by using Key Event Handler mechanism, 2) and a robust analysis of the Korean sentences with spacing errors without its correction pre-processing. We adapt the proposed Korean analyzer to a Korean-English mobile translator, which shows 5.8% memory usage reduction and 19.0% enhancement of average response time.

A Study on the Practicality of 3D Virtual Wedding Dress -Focusing on Wedding Dress for Small Wedding- (3D 버추얼 웨딩드레스의 실물대용 가능성 연구 -스몰웨딩용 웨딩드레스를 중심으로-)

  • Yuan, Xinyi;Bae, Soojeong
    • Journal of Fashion Business
    • /
    • v.26 no.1
    • /
    • pp.53-67
    • /
    • 2022
  • The purpose of this study was to compare the appearance similarity between a 3D virtual wedding dress, and a model wearing real dress, and production efficiency, and the possibility of achieving similar results with 3D digital technology. Five wedding dresses for small weddings under the theme of 'Dream Series', were designed and produced in virtual and real dresses to quantitatively compare and analyze the appearance similarity and production efficiency. Experts compared the appearance similarity on the silhouettes, colors, materials, and details, and production efficiency was compared with time and cost. Based on our results, 3D virtual images of four out of the five dresses were similar to the real images. Our efficiency evaluation results showed that the manufacturing time was 45.4% shorter, and the manufacturing cost was 46.1% less than the existing method. This indicated that the wedding dress manufacturing process using 3D virtual software was time and cost saving competitive. Our results also confirmed that 3D virtual software technology has the potential to increase the efficiency of designing and production, and therefore an increase in competitiveness and sales of wedding dresses. Furthermore, 3D technology allows consumers to select and order wedding dresses online through 3D virtual software. This is a great advantage, and it highlights the significance of this research study.

A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks

  • Ren, Huimin;Kim, Suhyun;Seo, Daehee;Lee, Imyeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1687-1707
    • /
    • 2022
  • With the development of multiuser online meetings, more group-oriented technologies and applications for instance collaborative work are becoming increasingly important. Authenticated Group Key Agreement (AGKA) schemes provide a shared group key for users with after their identities are confirmed to guarantee the confidentiality and integrity of group communications. On the basis of the Public Key Cryptography (PKC) system used, AGKA can be classified as Public Key Infrastructure-based, Identity-based, and Certificateless. Because the latter type can solve the certificate management overhead and the key escrow problems of the first two types, Certificateless-AGKA (CL-AGKA) protocols have become a popular area of research. However, most CL-AGKA protocols are vulnerable to Public Key Replacement Attacks (PKRA) due to the lack of public key authentication. In the present work, we present a CL-AGKA scheme that can resist PKRA in order to solve impersonation attacks caused by those attacks. Beyond security, improving scheme efficiency is another direction for AGKA research. To reduce the communication and computation cost, we present a scheme with only one round of information interaction and construct a CL-AGKA scheme replacing the bilinear pairing with elliptic curve cryptography. Therefore, our scheme has good applicability to communication environments with limited bandwidth and computing capabilities.

Male Nurses' Experiences of Workplace Gender Discrimination (남자간호사의 직장 내 성차별 경험)

  • Chang, Hyoung Eun;Woo, Chung Hee
    • Korean Journal of Occupational Health Nursing
    • /
    • v.31 no.2
    • /
    • pp.43-56
    • /
    • 2022
  • Purpose: This study was conducted to explore male nurses' experiences of gender discrimination at the workplace using qualitative research methods. Methods: Participants responded to a survey using an online link, and were asked to describe their overall experiences by responding to the question "Please freely describe your experiences of workplace gender discrimination". The qualitative data collected from 118 participants were analyzed using Krippendorff's technique. Data collection was caried out from June 11, 2019, to August 3, 2020. Results: Eleven themes and 24 subthemes were extracted from a total of 277 meaningful statements. Male nurses' experiences of workplace gender discrimination, reasons of gender discrimination, and improvement strategies were presented through the key themes. Conclusion: Male nurses experienced workplace gender discrimination from patients, colleagues, and institutions. Furthermore, strategies to improve gender stereotypes and to emphasize the strengths of male nurses are necessary in order to increase the number of male nurses in the female-dominant nursing field and to reduce job turnover. These strategies will help expand the social role of nurses as professionals and improve the work environment and benefits for all nurses.

The Importance of Ethical Hacking Tools and Techniques in Software Development Life Cycle

  • Syed Zain ul Hassan;Saleem Zubair Ahmad
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.169-175
    • /
    • 2023
  • Ethical hackers are using different tools and techniques to encounter malicious cyber-attacks generated by bad hackers. During the software development process, development teams typically bypass or ignore the security parameters of the software. Whereas, with the advent of online web-based software, security is an essential part of the software development process for implementing secure software. Security features cannot be added as additional at the end of the software deployment process, but they need to be paid attention throughout the SDLC. In that view, this paper presents a new, Ethical Hacking - Software Development Life Cycle (EH-SDLC) introducing ethical hacking processes and phases to be followed during the SDLC. Adopting these techniques in SDLC ensures that consumers find the end-product safe, secure and stable. Having a team of penetration testers as part of the SDLC process will help you avoid incurring unnecessary costs that come up after the data breach. This research work aims to discuss different operating systems and tools in order to facilitate the secure execution of the penetration tests during SDLC. Thus, it helps to improve the confidentiality, integrity, and availability of the software products.

Analysis and Improvement of the Chrysanthemum Festivals for the Revitalization of Regional Economy

  • Song, Jong-Eun;Park, Jin-Sil;Choi, Kyoung-Ok
    • Journal of People, Plants, and Environment
    • /
    • v.22 no.2
    • /
    • pp.181-197
    • /
    • 2019
  • This study is to analyze the current state, trend, and preference of the three chrysanthemum festivals representing South Korea that are hosted by local governments, and it is to be used as the basic data for preparing effective plans for the chrysanthemum festivals. The study was conducted from April 20, 2013 to November 25, 2017, and literature review, online search, interviews with persons in charge, field survey, and questionnaire survey were performed. As a result of the field survey, all three festivals had their space structures divided, themes decided and space images depicted based on chrysanthemum sculptures. The landmarks of the city, cultural assets, or great figures were selected to the main theme of the major chrysanthemum sculptures. The sculptures were decorated realistically for users to easily recognize the image. The main chrysanthemum sculptures tended to be introduced repeatedly. As results of the current state of visit and preference, it was found that the number of visitors has increased every year, along with revisits. The satisfaction and the preference for the festival were evaluated positively, and the chrysanthemum festival has become a local festival representing autumn, and a resource for vitalization of the regional economy. However, as a result of the survey, insufficient parking space and resting place, change of image of the sculptures, experience programs, and food shall be improved in order to increase the users satisfaction.

A Study on the Development of a MOOC Design Model

  • LEE, Gayoung;KEUM, Sunyoung;KIM, Myungsun;CHOI, Yoomi;RHA, Ilju
    • Educational Technology International
    • /
    • v.17 no.1
    • /
    • pp.1-37
    • /
    • 2016
  • The purpose of this study was to develop a MOOC design model that would improve the current practice of MOOC development in Korea by specifying easy-to-use course development procedures and guiding strategies. Following Richey and Klein (2007)'s conceptual model development procedure, the first step was to perform critical review of relevant literature and observe typical MOOC development processes. As a result, the initial model was developed. The second step was to conduct the expert review with five educational technology and MOOC researchers to secure the internal validity of the model. Based on the experts' suggestions, the model was revised and once again reviewed by the same experts. This process resulted in the development of the 2nd version of model. The third step was to carry out external validation research in order to test the effectiveness, efficiency, and usability of the model. A basic model may be confirmed or corrected based on examination of its results. Consequently, the model was elaborated as the final model. In the final model, 6 procedural phases and 9 specific steps were included. The six procedural phases are: Analysis (1st Iteration), Design, Development (Course Development), Implementation, Evaluation, and Analysis (2nd Iteration), a slight variation of ADDIE model. The specific steps include: 1) Goal Setting, 2) Environment Analysis, 3) Content Design, 4) Style Design, 5) Course Development, 6) Implementation Plan, 7) Course Implementation, 8) Summative Evaluation, and 9) Need Reflection. The study concluded with suggestions for further research and application of the MOOC design model.

Affective-discursive Practices in Southeast Asia: Appropriating emotive roles in the case of a Filipina domestic helper in Hong Kong who fell to her death while cleaning windows

  • Aguirre, Alwin C.
    • SUVANNABHUMI
    • /
    • v.9 no.1
    • /
    • pp.53-84
    • /
    • 2017
  • The paper demonstrates the potential contribution of integrating discursive and affective analytic regimes in framing the study of Southeast Asia. I examine the "emotional possibilities" available to migrants with particular focus on the experience of Filipino domestic helpers in Hong Kong thrown into relief in 2016 by news of maids falling to their deaths while cleaning windows of their employers' above-ground apartments. First, I situate the study in recent calls for Critical Discourse Studies and Migration Studies to transcend foundational methodologies in their respective fields in order to apprehend formerly disregarded aspects of the human condition, including affect and emotion. I then briefly present the debate in the affective turn in social analysis, which has to do with rethinking the attachment of affect and discourse. My own inquiry is premised on the assertion that emotion is multidimensional. I specifically explore the usefulness of taking emotion as "affective-discursive practice" by focusing on an analysis of the appropriation of the victim role by foreign domestic helper employer groups that could be seen in pertinent news reports of selected online Hong Kong newspapers. In the end, I also emphasize the necessity of reflexivity in projects that take affect as central object of inquiry.

  • PDF

The factors influencing the nursing practice readiness of new graduate nurses (신규간호사의 간호실무준비도에 영향을 미치는 요인)

  • Kim, Mi Young
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.29 no.4
    • /
    • pp.395-404
    • /
    • 2023
  • Purpose: The purpose of this study was to identify the factors influencing the nursing practice readiness of newly graduated nurses. Methods: The participants were 120 new nurses with 1 to 12 months of work experience at two tertiary hospitals in Seoul and Gyeonggi Province. The data were collected through an online questionnaire from February 6 to April 30, 2023. The collected data were analyzed using the IBM SPSS 25 program, and the independent t-test, Mann-Whitney U-test, ANOVA, Pearson's correlation coefficient, and a multiple regression analysis were performed. Results: The participants' nursing practice readiness was found to be positively correlated with their confidence in core nursing skill performance, satisfaction with clinical practice, satisfaction concerning simulation education, satisfaction regarding preceptorship, length of preceptorship and length of current unit placement. The regression analysis showed that the significant variables affecting nursing practice readiness were confidence in core nursing skill performance and satisfaction with clinical practice, and the explanatory power of the variables on nursing practice readiness was 36.0%. Conclusion: In order for newly graduated nurses to achieve nursing practice readiness, it is necessary to develop a nursing education program that can improve their confidence in core nursing skills performance and satisfaction with clinical practice in the nursing college curriculum and further research on the factors affecting nursing practice readiness is needed.

Development of Bioinformatics Capacity in Support of the KOICA-UPLB-IRRI Agricultural Genomics Research Center

  • Ramil P. Mauleon;Lord Hendrix Barboza;Frances Nikki Borja;Dmytro Chebotarov;Jeffrey Detras;Venice Juanillas;Riza Pasco;Kenneth L. McNally
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2022.10a
    • /
    • pp.34-34
    • /
    • 2022
  • Capacity building for bioinformatics could be achieved with the systematic training of research staff and higher degree students in the current best practices for analysis of data from 'omic-type experiments. It is anticipated that the KOICA-University of the Philippines Los Baños - International Rice Research Insitute Agricultural Genomics Research Center activities will focus on the use of next generation sequencing technology for genome sequencing and annotation, genome variant discovery for use in GWAS and QTL mapping, and transcriptome analysis of organisms important to agriculture and food security. Such activities require that researchers have high levels of knowledge and skills in bioinformatics in order to gain insights from the results of the experiments performed. In this talk the bioinformatic tools/solutions and online training materials already available will be presented, as well the upcoming resources under development in support of the project.

  • PDF