• Title/Summary/Keyword: vague set

Search Result 57, Processing Time 0.022 seconds

Fuzzy reasoning for assessing bulk tank milk quality (Bulk tank milk의 품질평가를 위한 퍼지기반 추론)

  • Kim Taioun;Jung Daeyou;Jayarao Bhushan M.
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.3
    • /
    • pp.39-57
    • /
    • 2004
  • Many dairy producers periodically receive information about their bulk tank milk with reference to bulk tank somatic cell counts, standard plate counts, and preliminary incubation counts. This information, when collected over a period of time, in combination with bulk tank mastitis culture reports can become a significant knowledge base. Several guidelines have been proposed to interpret farm bulk tank milk bacterial counts. However many of the suggested interpretive criteria lack validation, and provide little insight to the interrelationship between different groups of bacteria found in bulk tank milk. Also the linguistic terms describing bulk tank milk quality or herd management status are rather vague or fuzzy such as excellent, good or unsatisfactory. The objective of this paper was to develop a set of fuzzy descriptors to evaluate bulk tank milk quality and herd's milking practice based on bulk tank milk microbiology test results. Thus, fuzzy logic based reasoning methodologies were developed based on fuzzy inference engine. Input parameters were bulk tank somatic cell counts, standard plate counts, preliminary incubation counts, laboratory pasteurization counts, non agalactiae-Streptococci and Streptococci like organisms, and Staphylococcus aureus. Based on the input data, bulk tank milk quality was classified as excellent, good, milk cooling problem, cleaning problem, environmental mastitis, or mixed with mastitis and cleaning problems. The results from fuzzy reasoning would provide a reference regarding a good management practice for milk producers, dairy health consultants, and veterinarians.

  • PDF

Seeking an Establishment of Structure in the Big-gut, Jaindanoje (자인단오제 큰굿의 구조 정립 모색)

  • Hong, Teahan
    • (The) Research of the performance art and culture
    • /
    • no.19
    • /
    • pp.35-60
    • /
    • 2009
  • I insisted that the structure should be set newly, pointing out problems in a structure of the big gut, Jain dano je in this paper. Although, the big gut is playing now in Jain dano je, the features of gut geo-ri are vague ; that's why gut geo-ri and performances are entangled. Therefore, the gut geori showing strange structures not fitted with korean shamanist custom is playing these days like Pawangbyeolhui and Eoudong geori. The detailed procedure is also awkward. It is mixed with aspects of shaman custom in each region, instead showing features of regions. What's more, it became a dance drama, not gut geo-ri with several shamans dancing in a gut. Overcoming these problems, the big gut will be a cultural asset. Therefore, when considering the structure of korean gut, we will fit the order of gut geo-ri into the system of divine spirits keeping a plot-opening, developing and closing. It should be a gut geori-oriented play with only gut geo-ri things. Gut should be gone forward main shaman-oriented gut, setting up a main shaman who takes charge of each gut geo-ri. We should find out a new shaman who knows gut of Gyeong sang province well, if shaman who now takes charge of it has a problem. The big gut of Jain dano je became a part of intangible cultural assets. The performance is not a subject of curiosity and people's interests any more as it was in a past. It should be a traditional performance of representing our traditional culture. We should reorganize an epochal gut geo-ri after reexamining gut geo-ri which has played so far.

A case Study on the Experiences of College Students Participating in the Career Exploration credit System (퍼포먼스 이론의 관점으로 바라본 대학생들의 찾아가는 교육연극 공연 경험에 관한 사례연구)

  • Shin Min-Ju;Bijou Kwak
    • Journal of the International Relations & Interdisciplinary Education
    • /
    • v.4 no.1
    • /
    • pp.1-18
    • /
    • 2024
  • This study is a qualitative case study on the experience of an on-site, audience-participatory educational play conducted by four college students majoring in theater under the title 'Hooni and Choroki' for 7-year-old kindergarten students about to enter elementary school. The core theme of the play is to help relieve anxiety about school life before entering elementary school and to communicate smoothly with peers. To this end, college students participate in scenario planning, kindergarten recruitment, and 40-minute training at three kindergartens. He even conducted theatrical performances. As a result of the study, the key components of 'another growth in my life', 'improvement of happiness through meeting children', and 'new challenge toward dreams' were derived. The greatest significance of this study is that the audience-participatory educational theater experience allowed college students to practice sharing the results of their learning with someone else, and through this practice of sharing learning, they were able to realize their somewhat vague career paths and dreams. It was an opportunity that allowed me to experience 'improved confidence' and 'a resonance in my heart' so that I could set a direction. We hope that future educational theater with audience participation will be widely implemented in various aspects.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

A Comparative Case Study on the Adaptation Process of Advanced Information Technology: A Grounded Theory Approach for the Appropriation Process (신기술 사용 과정에 관한 비교 사례 연구: 기술 전유 과정의 근거이론적 접근)

  • Choi, Hee-Jae;Lee, Zoon-Ky
    • Asia pacific journal of information systems
    • /
    • v.19 no.3
    • /
    • pp.99-124
    • /
    • 2009
  • Many firms in Korea have adopted and used advanced information technology in an effort to boost efficiency. The process of adapting to the new technology, at the same time, can vary from one firm to another. As such, this research focuses on several relevant factors, especially the roles of social interaction as a key variable that influences the technology adaptation process and the outcomes. Thus far, how a firm goes through the adaptation process to the new technology has not been yet fully explored. Previous studies on changes undergone by a firm or an organization due to information technology have been pursued from various theoretical points of views, evolved from technological and institutional views to an integrated social technology views. The technology adaptation process has been understood to be something that evolves over time and has been regarded as cycles between misalignments and alignments, gradually approaching the stable aligned state. The adaptation process of the new technology was defined as "appropriation" process according to Poole and DeSanctis (1994). They suggested that this process is not automatically determined by the technology design itself. Rather, people actively select how technology structures should be used; accordingly, adoption practices vary. But concepts of the appropriation process in these studies are not accurate while suggested propositions are not clear enough to apply in practice. Furthermore, these studies do not substantially suggest which factors are changed during the appropriation process and what should be done to bring about effective outcomes. Therefore, research objectives of this study lie in finding causes for the difference in ways in which advanced information technology has been used and adopted among organizations. The study also aims to explore how a firm's interaction with social as well as technological factors affects differently in resulting organizational changes. Detail objectives of this study are as follows. First, this paper primarily focuses on the appropriation process of advanced information technology in the long run, and we look into reasons for the diverse types of the usage. Second, this study is to categorize each phases in the appropriation process and make clear what changes occur and how they are evolved during each phase. Third, this study is to suggest the guidelines to determine which strategies are needed in an individual, group and organizational level. For this, a substantially grounded theory that can be applied to organizational practice has been developed from a longitudinal comparative case study. For these objectives, the technology appropriation process was explored based on Structuration Theory by Giddens (1984), Orlikoski and Robey (1991) and Adaptive Structuration Theory by Poole and DeSanctis (1994), which are examples of social technology views on organizational change by technology. Data have been obtained from interviews, observations of medical treatment task, and questionnaires administered to group members who use the technology. Data coding was executed in three steps following the grounded theory approach. First of all, concepts and categories were developed from interviews and observation data in open coding. Next, in axial coding, we related categories to subcategorize along the lines of their properties and dimensions through the paradigm model. Finally, the grounded theory about the appropriation process was developed through the conditional/consequential matrix in selective coding. In this study eight hypotheses about the adaptation process have been clearly articulated. Also, we found that the appropriation process involves through three phases, namely, "direct appropriation," "cooperate with related structures," and "interpret and make judgments." The higher phases of appropriation move, the more users represent various types of instrumental use and attitude. Moreover, the previous structures like "knowledge and experience," "belief that other members know and accept the use of technology," "horizontal communication," and "embodiment of opinion collection process" are evolved to higher degrees in their dimensions of property. Furthermore, users continuously create new spirits and structures, while removing some of the previous ones at the same time. Thus, from longitudinal view, faithful and unfaithful appropriation methods appear recursively, but gradually faithful appropriation takes over the other. In other words, the concept of spirits and structures has been changed in the adaptation process over time for the purpose of alignment between the task and other structures. These findings call for a revised or extended model of structural adaptation in IS (Information Systems) literature now that the vague adaptation process in previous studies has been clarified through the in-depth qualitative study, identifying each phrase with accuracy. In addition, based on these results some guidelines can be set up to help determine which strategies are needed in an individual, group, and organizational level for the purpose of effective technology appropriation. In practice, managers can focus on the changes of spirits and elevation of the structural dimension to achieve effective technology use.

The Introduction of the Concept of "Original Form" to the Heritage Conservation and Management and the Establishment and Development of the Principle of "Maintaining the Original Form" (한국의 문화재 보존·관리에 있어서 원형개념의 유입과 원형유지원칙의 성립, 그리고 발달과정)

  • Lee, Su Jeong
    • Korean Journal of Heritage: History & Science
    • /
    • v.49 no.1
    • /
    • pp.100-119
    • /
    • 2016
  • The concept of "original form" and the principle of "maintaining the original form" take center stage in conservation, management, and promotion of the domestic heritage. Introduced in the 20th century, there were little discussion or deliberation about the concept of "original form" therefore it remains a vague and somewhat abstract notion subject to individual interpretation. Without a specified practical meaning, "maintaining the original form" became the fundamental principle for heritage conservation and management in the 1999 version of the Cultural Heritage Protection Act, engendering difficulties in applying the principle in practice. Conceived as an important first step toward resolving the issues stemming from the indistinct concept of "original form," this paper explores the process through which the concept was introduced to Korea and then established and developed as a legal principle for heritage conservation, management, and promotion. While the examination of the related documents and various cases shows that the development of the concept of "original form" has centered on specific periods and architectural styles, this essay explicates that the notion "original form" is commonly used as a term referring to the form at the earliest possible temporality. It also explains that this view emanates from perceiving heritages not as multivalent objects, but as a material object that exclusively carries aesthetic and, more importantly, historical value, and that comes from the history awareness of the times. This essay suggests that the concept "original form" should be reestablished with full consideration of the diverse values of heritage and diverse forms through which heritage can be expressed. After reviewing the feasibility and practicality of the concept a set of concrete guidelines should be presented for application in practice.

Comparison of Ultrasound Image Quality using Edge Enhancement Mask (경계면 강조 마스크를 이용한 초음파 영상 화질 비교)

  • Jung-Min, Son;Jun-Haeng, Lee
    • Journal of the Korean Society of Radiology
    • /
    • v.17 no.1
    • /
    • pp.157-165
    • /
    • 2023
  • Ultrasound imaging uses sound waves of frequencies to cause physical actions such as reflection, absorption, refraction, and transmission at the edge between different tissues. Improvement is needed because there is a lot of noise due to the characteristics of the data generated from the ultrasound equipment, and it is difficult to grasp the shape of the tissue to be actually observed because the edge is vague. The edge enhancement method is used as a method to solve the case where the edge surface looks clumped due to a decrease in image quality. In this paper, as a method to strengthen the interface, the quality improvement was confirmed by strengthening the interface, which is the high-frequency part, in each image using an unsharpening mask and high boost. The mask filtering used for each image was evaluated by measuring PSNR and SNR. Abdominal, head, heart, liver, kidney, breast, and fetal images were obtained from Philips epiq5g and affiniti70g and Alpinion E-cube 15 ultrasound equipment. The program used to implement the algorithm was implemented with MATLAB R2022a of MathWorks. The unsharpening and high-boost mask array size was set to 3*3, and the laplacian filter, a spatial filter used to create outline-enhanced images, was applied equally to both masks. ImageJ program was used for quantitative evaluation of image quality. As a result of applying the mask filter to various ultrasound images, the subjective image quality showed that the overall contour lines of the image were clearly visible when unsharpening and high-boost mask were applied to the original image. When comparing the quantitative image quality, the image quality of the image to which the unsharpening mask and the high boost mask were applied was evaluated higher than that of the original image. In the portal vein, head, gallbladder, and kidney images, the SNR, PSNR, RMSE and MAE of the image to which the high-boost mask was applied were measured to be high. Conversely, for images of the heart, breast, and fetus, SNR, PSNR, RMSE and MAE values were measured as images with the unsharpening mask applied. It is thought that using the optimal mask according to the image will help to improve the image quality, and the contour information was provided to improve the image quality.