• Title/Summary/Keyword: selection of candidates

Search Result 264, Processing Time 0.023 seconds

Identification and Selection the Mathematically Gifted Child on the Elementary School Level (초등 수학 영재의 판별과 선발)

  • 송상헌
    • Journal of Gifted/Talented Education
    • /
    • v.11 no.2
    • /
    • pp.87-106
    • /
    • 2001
  • Identification and selection the mathematically gifted child must be based on it's definition. So, we have to consider not only IQ or high ability in mathematical problem solving, but also mathematical creativity and mathematical task commitment. Furthermore, we must relate our ideas with the programs to develop each student's hidden potential. This study is focused on the discrimination of the candidates who would like to enter the elementary school level mathematics gifted education program. To fulfill this purpose, I considered the criteria, principles, methods, and tools. Identification is not exactly separate from selection and education. So, it is important to have long-term vision and plan to identify the mathematically gifted students.

  • PDF

DEBRIS DISKS EXPLORED BY AKARI AND IRSF

  • Kiriyama, Y.;Ishihara, D.;Nagayama, T.;Kaneda, H.;Oyabu, S.;Onaka, T.;Fujiwara, H.
    • Publications of The Korean Astronomical Society
    • /
    • v.27 no.4
    • /
    • pp.181-182
    • /
    • 2012
  • Using the AKARI mid-infrared all-sky survey catalogue, we are searching for debris disks which are important objects as an observational clue to on-going planetary system formation. Debris disk candidates are selected through a significant excess of the measured flux over the predicted flux for the stellar photospheric emission at $18{\mu}m$. The fluxes were originally estimated based on the near-infrared spectral energy distributions (SEDs) of central stars constructed from the 2MASS J-, H-, and Ks-band fluxes. However, we found that in many cases the 2MASS photometry has large errors due to saturation in the central part of a star image. Therefore we performed follow-up observations with the IRSF 1.4m near-infrared telescope in South Africa to obtain accurate fluxes in the J-, H-, and Ks-bands. As a result, we have succeeded in improving the SEDs of the central stars. This improvement of the SEDs allows us to make more reliable selection of the candidates.

In Vivo Screening for Biocontrol Agents (BCAs) against Streptomyces scabiei Causing Potato Common Scab

  • Lee, Hyang-Burm;Cho, Jong-Wun;Park, Dong-Jin;Li, Chang-Tian;Ko, Young-Hwan;Song, Jeong-Heub;Koh, Jeong-Sam;Kim, Bum-Joon;Kim, Chang-Jin
    • The Plant Pathology Journal
    • /
    • v.20 no.2
    • /
    • pp.110-114
    • /
    • 2004
  • Through in vitro screening for biocontrol agents (BCAs) against Streptomyces scabiei causing potato (Solanum tuberosum) common scab, 19 streptomycete and 17 fungal isolates with antagonistic activity were selected as BCA candidates. For the selection of BCA candidates which are highly resistant to 10 kinds of antibiotics or pesticides, chemical susceptibility testing was initially performed in vitro. A remarkable degree of variation in susceptibility to antibiotics or pesticides was observed among the isolates tested. Streptomycete A020645 isolate was highly resistant to all the tested chemicals except neomycin up to 5,000 ppm. On the other hand, out of 36 antagonistic microbes subjected to in vivo pot tests using cultivar Daejima, four streptomycete isolates namely, A020645, A010321, A010564, and A020973, showed high antagonistic activity with >60% and 55% control value, respectively, and high chemical resistance to 10 kinds of chemicals. Therefore, these isolates were selected as potential BCAs for the control of potato common scab.

Look-Up Table Based Implementations of SHA-3 Finalists: JH, Keccak and Skein

  • Latif, Kashif;Aziz, Arshad;Mahboob, Athar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2388-2404
    • /
    • 2012
  • Cryptographic hash functions are widely used in many information security applications like digital signatures, message authentication codes (MACs), and other forms of authentication. In response to recent advances in cryptanalysis of commonly used hash algorithms, National Institute of Standards and Technology (NIST) announced a publicly open competition for selection of new standard Secure Hash Algorithm called SHA-3. One important aspect of this competition is evaluation of hardware performances of the candidates. In this work we present efficient hardware implementations of SHA-3 finalists: JH, Keccak and Skein. We propose high speed architectures using Look-Up Table (LUT) resources on FPGAs, to minimize chip area and to reduce critical path lengths. This approach allows us to design data paths of SHA-3 finalists with minimum resources and higher clock frequencies. We implemented and investigated the performance of these candidates on modern and latest FPGA devices from Xilinx. This work serves as performance investigation of leading SHA-3 finalists on most up-to-date FPGAs.

The Infrared Medium-deep Survey. VII. Optimal selection for faint quasars at z ~ 5 and preliminary results

  • Shin, Suhyun;Im, Myungshin;Kim, Yongjung;Hyun, Minhee
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.44 no.1
    • /
    • pp.75.1-75.1
    • /
    • 2019
  • The universe has been ionized in the post-reionization by several photon contributors. The dominant source to produce the hydrogen ionizing photons is not revealed so far. Faint quasars have been expected to generate UV photon budgets required to maintain ionization state of universe. Observational limits, however, hinder to discover them despite their higher number density than bright one. Consequently, the influence of faint quasars on post-reionization are not considered sufficiently. Therefore, a survey to find faint quasars at z ~ 5 is crucial to determine the main ionizing source in the post-reionization era. Deep images from the Hyper Suprime-Cam Subaru Strategic Program (HSC SSP) allow us to search for quasar swith low luminosities in the ELAIS-N1 field. J band information are obtained by the Infrared Medium-deep Survey (IMS) and the UKIRT Infrared Deep Sky Survey (UKIDSS) - Deep ExtragalacticSurvey (DXS). Faint quasar candidates were selected from several multi-band color cut criteria based on simulated quasars on color-color diagram. To choose the reliable candidates with possible Lyman break, we have performed medium-bands observations. Whether a candidate is a quasar or a dwarf star contamination was decided by results from chi-square minimization of quasar/dwarf model fitting. Spectroscopic follow-up observations confirm three quasars at z ~ 5. 100% spectral confirmation success rate implies that the medium-band observations effectively select faint quasars with strong Lyman alpha emission.

  • PDF

KMTNet Supernova Project : Pipeline and Alerting System Development

  • Lee, Jae-Joon;Moon, Dae-Sik;Kim, Sang Chul;Pak, Mina
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.40 no.1
    • /
    • pp.56.2-56.2
    • /
    • 2015
  • The KMTNet Supernovae Project utilizes the large $2^{\circ}{\times}2^{\circ}$ field of view of the three KMTNet telescopes to search and monitor supernovae, especially early ones, and other optical transients. A key component of the project is to build a data pipeline with a descent latency and an early alerting system that can handle the large volume of the data in an efficient and a prompt way, while minimizing false alarms, which casts a significant challenge to the software development. Here we present the current status of their development. The pipeline utilizes a difference image analysis technique to discover candidate transient sources after making correction of image distortion. In the early phase of the program, final selection of transient sources from candidates will mainly rely on multi-filter, multi-epoch and multi-site screening as well as human inspection, and an interactive web-based system is being developed for this purpose. Eventually, machine learning algorithms, based on the training set collected in the early phase, will be used to select true transient sources from candidates.

  • PDF

NEWLY DISCOVERED z ~ 5 QUASARS BASED ON DEEP LEARNING AND BAYESIAN INFORMATION CRITERION

  • Shin, Suhyun;Im, Myungshin;Kim, Yongjung;Jiang, Linhua
    • Journal of The Korean Astronomical Society
    • /
    • v.55 no.4
    • /
    • pp.131-138
    • /
    • 2022
  • We report the discovery of four quasars with M1450 ≳ -25.0 mag at z ~ 5 and supermassive black hole mass measurement for one of the quasars. They were selected as promising high-redshift quasar candidates via deep learning and Bayesian information criterion, which are expected to be effective in discriminating quasars from the late-type stars and high-redshift galaxies. The candidates were observed by the Double Spectrograph on the Palomar 200-inch Hale Telescope. They show clear Lyα breaks at about 7000-8000 Å, indicating they are quasars at 4.7 < z < 5.6. For HSC J233107-001014, we measure the mass of its supermassive black hole (SMBH) using its C IV λ1549 emission line. The SMBH mass and Eddington ratio of the quasar are found to be ~108 M and ~0.6, respectively. This suggests that this quasar possibly harbors a fast growing SMBH near the Eddington limit despite its faintness (LBol < 1046 erg s-1). Our 100% quasar identification rate supports high efficiency of our deep learning and Bayesian information criterion selection method, which can be applied to future surveys to increase high-redshift quasar sample.

Development of a Sizing System of Women's Fitness Wear for the Senior Population in South Korea (한국 노인 여성을 위한 피트니스 압박웨어 치수 개발)

  • Jeon, Eun-Jin;Lee, Won-sup;Park, Jang-Woon;You, Hee-Cheon
    • Fashion & Textile Research Journal
    • /
    • v.20 no.4
    • /
    • pp.464-473
    • /
    • 2018
  • The objective of this study is to develop a sizing system of fitness clothing that can properly accommodate various body sizes of Korean senior women. The sizing system of upper and lower fitness clothing was developed in the present study by selection of key variables, identification of size category candidates, and determination of an optimal sizing system. First, key anthropometric dimensions (stature and bust circumference for upper clothing and stature; waist circumference for lower clothing) were identified by factor analysis on the direct body measurements (n = 272) and 3D whole-body scan data (n = 271) of Korean senior women in Size Korea. Second, sizing system candidates based on the key dimensions of upper and lower clothing were explored using a grid method and an optimization method. Lastly, among the sizing system candidates, optimal sizing systems of upper and lower clothing were selected in terms of accommodation rate. Five size categories (short/small, short/medium, tall/small, tall/medium, and tall/large) were selected as the optimal sizing systems of upper and lower clothing with 89% and 78% of accommodation rate, respectively, for the Korean senior women. The anthropometric characteristics of the representative humans of the optimal size categories would be of use in the design of fitness compressive wear for the better fit and effectiveness of exercise and health of Korean senior women.

A Corpus-based Hybrid Model for Morphological Analysis and Part-of-Speech Tagging (형태소 분석 및 품사 부착을 위한 말뭉치 기반 혼합 모형)

  • Lee, Seung-Wook;Lee, Do-Gil;Rim, Hae-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.11-18
    • /
    • 2008
  • Korean morphological analyzer generally generates multiple candidates, and then selects the most likely one among multiple candidates. As the number of candidates increases, the chance that the correctly analyzed candidate is included in the candidate list also grows. This process, however, increases ambiguity and then deteriorates the performance. In this paper, we propose a new rule-based model that produces one best analysis. The analysis rules are automatically extracted from large amount of Part-of-Speech tagged corpus, and the proposed model does not require any manual construction cost of analysis rules, and has shown high success rate of analysis. Futhermore, the proposed model can reduce the ambiguities and computational complexities in the candidate selection phase because the model produces one analysis when it can successfully analyze the given word. By combining the conventional probability-based model. the model can also improve the performance of analysis when it does not produce a successful analysis.

  • PDF

Semantic Network Analysis of Presidential Debates in 2007 Election in Korea (제17대 대통령 후보 합동 토론 언어네트워크 분석 - 북한 관련 이슈를 중심으로)

  • Park, Sung-Hee
    • Korean journal of communication and information
    • /
    • v.45
    • /
    • pp.220-254
    • /
    • 2009
  • Presidential TV debates serve as an important instrument for the general viewers to evaluate the candidates’ character, to examine their policy, and finally to make an important political decisions to cast ballots. Every words candidates utter in the course of entire election campaign exert influence of a certain significance by delivering their ideas and by creating clashes with their respective opponents. This study focuses on the conceptual venue, coined as ‘stasis’ by ancient rhetoricians, in which the clashes take place, and examines the words selection made by each candidates, the manners in which they form stasis, call for evidence, educate the public, and finally create a legitimate form of political argumentation. The study applied computer based content analysis using KrKwic and UCINET software to analyze semantic networks among the candidates. The results showed three major candidates, namely Lee Myung Bak, Jung Dong Young, and Lee Hoi Chang, displayed separate patterns in their use of language, by selecting the words that are often neglected by their opponents. Apparently, the absence of stasis and the lack of speaking mutual language significantly undermined the effects of debates. Central questions regarding issues of North Korea failed to meet basic requirements, and the respondents failed to engage in effective argumentation process.

  • PDF