• Title/Summary/Keyword: precedence

Search Result 383, Processing Time 0.036 seconds

A Preliminaly Study on Nutritional Educatin for Preschool Children. (미취학 아동의 영양교육을 위한 사전연구)

  • 문수재
    • Journal of the Korean Home Economics Association
    • /
    • v.17 no.3
    • /
    • pp.23-34
    • /
    • 1979
  • Adequate intake of nutrients exert a profound influence on the physical and spiritual development of children. Thus, it is important to children and their mothers about nutrition and selection of nutritious foods. In order to underline the importance of nutrition for children, this study investigated and analyzed food habits of children expecially those in preschool ages, to obtain basic data to develop effective educational materials related to nutrition. dietary habits of 61 boys and 44 girls in the average age of six were surveyed through their mothers. Results therefrom are as follows : 1. Only 17 per cent of the mothers questioned replied that they considered the balance of diet in preparing meals, while 58.1% of the mothers gave precedence to the liking of their family . The lower the educational level of a mother , the higher her stress on the food preference of her family. 2. Seventy six of the mothers said they understand the basic food group , but only one mother displayed an accurate knowledge about it. 3. As for between meal eating , 82.9% took fruits, 68.6% milk, 35.2 bread, and 33.3% cookies. 4. Problems with food habits of children were : Unbalanced diet for 43.8% of children ,eating of snacks at irregular intervals for 26.7% and TV impact for 5.7%. 5. Children's food habits are greatly influenced by their parents, In the case of animal liver, 32.1 % of the children surveyed do not like to eat it, while 35.8% have never tasted it . 27.9% of children also do not like to eat cereals. Children's likes and dislikes with regarded to foods were influenced greatly by their parents. Thus, it is urgent to educate mothers about balanced diet and basic food group. Children will have to be taught to understand unfavorable effects of unbalanced diet so that they may correct their unsound food habits. This study also indicated the need for developing new cooking methods for those food items which are very liked by children to be a major cause of their unbalanced dietary habits.

  • PDF

Automated Code Smell Detection and Refactoring using OCL (OCL을 이용한 자동화된 코드스멜 탐지와 리팩토링)

  • Kim, Tae-Woong;Kim, Tae-Gong
    • The KIPS Transactions:PartD
    • /
    • v.15D no.6
    • /
    • pp.825-840
    • /
    • 2008
  • Refactoring is a kind of software modification process that improves system qualities internally but maintains system functions externally. What should be improved on the existing source codes should take precedence over the others in such a modification process using this refactoring. Martin Fowler and Kent Beck proposed a method that identifies code smells for this purpose. Also, some studies on determining what refactoring will be applied to which targets through detecting code smells in codes were presented. However, these studies have a lot of disadvantages that show a lack of precise description for such code smells and detect limited code smells only. In addition, these studies showed other disadvantages that generate ambiguity in behavior preservation due to the fact that a description method of pre-conditions for the behavior preservation is included in a refactoring process or unformalized. Thus, our study represents a precise specification of code smells using OCL and proposes a framework that performs a refactoring process through the automatic detection of code smells using an OCL interpreter. Furthermore, we perform the automatic detection in which the code smells are be specified by using OCL to the java program and verify its applicability and effectivity through applying a refactoring process.

Regression Testing of Software Evolution by AOP (AOP를 이용하여 진화된 프로그램의 회귀테스트 기법)

  • Lee, Mi-Jin;Choi, Eun-Man
    • The KIPS Transactions:PartD
    • /
    • v.15D no.4
    • /
    • pp.495-504
    • /
    • 2008
  • Aspect Oriented Programming(AOP) is a relatively new programming paradigm and has properties that other programming paradigms don't have. This new programming paradigm provides new modularization of software systems by cross-cutting concerns. In this paper, we propose a regression test method for program evolution by AOP. By using JoinPoint, we can catch a pointcut-name which makes it possible to test the incorrect pointcut strength fault and the incorrect aspect precedence fault. Through extending proof rules to aspect, we can recognize failures to establish expected postconditions faults. We can also trace variables using set() and get() pointcut and test failures to preserve state invariant fault. Using control flow graph, we can test incorrect changes in control dependencies faults. In order to show the correctness of our proposed method, channel management system is implemented and tested by using proposed methods.

Study on primary officer military counseling model (초급간부 군 상담모델 개발 연구)

  • Seo, Seon Woo
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.75-83
    • /
    • 2016
  • Soldiers management is the core of military combat power to preserve and accident prevention. But in unforeseen times and places did the unthinkable soldier causes an accident, the inexperienced primary officer were upset, and can often be quite nervous. And various accidents prevention is also win the war, the reason for existence in the military for combat readiness as a precondition for perfection. There are primary officers at the forefront of this critical mission. However, in spite of the lack of time to work for combat readiness, orders from higher units of troops management and that's level giving a lot of pressure to primary officer. So I made the primary officer military counseling model ike this. Using Primary officer counseling model is possible to rapid and efficient counseling advice against the target client soldier. The efficient counseling is must take precedence on understanding on client soldier deeply. Depth understanding someone needs a lot of effort and time. However, to Primary officer, it is true that they have a lack of condition that are enough to give the time and effort. Therefore, effective counseling and accident prevention is possible to use counseling model through choice and concentration activities.

An Effects of Education Expenditures on the Economic Growth (교육비 지출이 성장에 미치는 영향에 관한 연구)

  • Cho, Woo Sung;Choi, Hyuk-Jun
    • International Commerce and Information Review
    • /
    • v.16 no.2
    • /
    • pp.185-198
    • /
    • 2014
  • The purpose of this paper is to examine a causal relationship and interaction among payment of education expenses, economic growth, imports and exports. The results of 'the Granger causality test' suggest that payment of education expenses are affected by imports and exports; and the other factors are not related. In addition, payment of education expenses and the relationship among variables confirmed by IRF show that payment of education expenses has a minus(-) effect on exports at the beginning and then it turns into plus(+) as a certain time passes. On the other hand, it has a minus(-) effect on imports at the beginning, and this gradually changes to zero(0). Lastly, it turns out that it has a plus(+) effect on GDP. It is therefore estimated that the demand for high-quality manpower is expected to grow and new investments for education to rise with increases in imports and exports with initial acceleration. The findings show that government education investment in foreign languages and research manpower must take precedence in order to meet the demand for high-quality manpower.

  • PDF

Analysis of difference in elementary-school students' recognition on CS education according to CS education with application of Education Programing Tool (교육용 프로그래밍 도구 활용의 정보과학교육을 통한 초등학생의 정보과학에 대한 인식 분석)

  • Shim, Jae-Kwoun;Kim, Ja-Mee;Lee, Won-Gyu
    • Journal of The Korean Association of Information Education
    • /
    • v.14 no.3
    • /
    • pp.385-393
    • /
    • 2010
  • Elementary information education is currently provided in accordance with the 2000 ICT educational guidelines. Although the focus of education has shifted from practical use to computer science since 2005, in which way academic education should be led isn't yet clear. The purpose of this study was to examine the impacts of computer science education(CS education) by an education programming tool on school children's awareness of that education. The selected students received education about unplugged, scratch and robot programming, part of the computer science curriculum, in 12 sessions. As a result, there were significant differences between the experimental and control groups in all the variables that included attitude to computer science, interest in that, satisfaction level, self-efficacy and perception of the value of CS education. The findings of the study suggested that in CS education, the improvement of thinking faculty should take precedence over practical use of what's learned, which is expected to heighten the value of that education.

  • PDF

The Status and Suggestions for Big Data Adaptation in the Government and the Public Agency (정부 및 공공기관에서의 빅데이터 활용에 대한 현황 및 실행방안 제안)

  • Byeon, Hyeon-Su
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.13-25
    • /
    • 2017
  • Volume in data storage is growing more than ever before. This phenomenon is caused by the participation of governments and firms as well as general users. As for big data, governments and public agencies are likely to play important roles in applications since they can access and operate personal data for public purposes. In this study, the author examined the status and countermeasure of big data from different countries and drew some common grounds. The suggestions are as follows. First of all, securing manpower and technology have to take precedence. In addition, share and development between the government and the private sector are required. And organizations should come up with long-term strategies along with the development of data loading and analysis. In conclusion, the author propose the recognition of the importance of data management, privacy protection and the expansion of field application possibilities for political usage of big data.

A Study on Risk Assessments and Protection Improvement for Electric Power Infrastructures against High-altitude Electromagnetic Pulse (전력기반시설의 고 고도 핵 전자기파에 대한 위험성 검토 및 방호 개선방안 연구)

  • Chung, Yeon-Choon
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.43-50
    • /
    • 2019
  • In a hyper-connected society, electric power infrastructures and information and communication infrastructures are the core of critical national infrastructures. However, electric power infrastructure is very deadly to high-frequency nuclear electromagnetic pulse (HEMP) threats recently issued by North Korea, so the resilience through rapid recovery after attack is directly related to the survivability of our country. Therefore, electric power infrastructure should take precedence over any other key infrastructure, with preemptive protection measures and fast recovery plans. In this paper, the characteristics of the HEMP threats was examined, and the risks and effective major protection measures of the electric power infrastructures are discussed. In the future, it is expected that it will be able to help establish the direction of enactment and revision of legal schems related to the 'high power EMP infringement prevention' for Korea's electric power infrastructures.

A Parallel Sequence Extraction Algorithm for Generating Assembly BOM (조립 BOM 생성을 위한 병렬순서 추출 알고리듬)

  • Yeo, Myung-Koo;Choi, Hoo-Gon;Kim, Kwang-Soo
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.29 no.1
    • /
    • pp.49-64
    • /
    • 2003
  • Although assembly sequence planning is an essential task in assembly process planning, it is known as one of the most difficult and time consuming jobs because its complexity is increased geometrically when the number of parts in an assembly is increased. The purpose of this study is to develop a more efficient algorithm for generating assembly sequences automatically. By considering subassemblies, a new heuristic method generates a preferred parallel assembly sequence that can be used in robotic assembly systems. A parallel assembly sequence concept provides a new representation scheme for an assembly in which the assembly sequence precedence information is not required. After an user inputs both the directional mating relation information and the mating condition information, an assembly product is divided into subgroups if the product has cut-vertices. Then, a virtual disassembly process is executed to generate alternate parallel assembly sequences with intermediate assembly stability. Through searching parts relations in the virtual disassembly process, stable subassemblies are extracted from translation-free parts along disassembling directions and this extraction continues until no more subassemblies are existed. Also, the arithmetic mean parallelism formula as a preference criterion is adapted to select the best parallel assembly sequence among others. Finally a preferred parallel assembly sequence is converted to an assembly BOM structure. The results from this study can be utilized for developing CAAPP(Computer-Aided Assembly Process Planning) systems as an efficient assembly sequence planning algorithm.

An Empirical Study on the Obstacle Factors of ISMS Certification Using Exploratory Factor Analysis (탐색적 요인 분석을 이용한 기업의 ISMS 인증 시 장애요인에 관한 연구)

  • Park, Kyeong-Tae;Kim, Sehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.951-959
    • /
    • 2014
  • In the past few years, data leakage of information assets has become a prominent issue. According to the National Intelligence Service in South Korea, they found 375 cases of data leakage from 2003 to 2013, especially 49 of cases have been uncovered in 2013 alone. These criminals are increasing as time passes. Thus, it constitutes a reason for establishment and operation of ISMS (Information Security Management System) even for private enterprises. But to be ISMS certified, there are many exposed or unexposed barriers, moreover, sufficient amount of studies has not been conducted on the barriers of ISMS Certification. In this study, we analyse empirically through exploratory factor analysis (EFA) to find the obstacle factors of ISMS Certification. The result shows that there are six obstacle factors in ISMS Certification; Auditing difficulty and period, Consulting firm related, Certification precedence case and consulting qualification, Internal factor, CA reliability and auditing cost, Certification benefit.