• Title/Summary/Keyword: 對話

Search Result 3,166, Processing Time 0.035 seconds

The effect of Nonviolent Communication(NVC) Program for Community Rehabilitation on Empathy, Interpersonal Relationship, and Social Anhedonia in Patients with Schizophrenia (지역사회 재활 준비를 위한 비폭력대화 프로그램이 조현병 환자의 공감, 대인관계 능력, 사회적 무쾌감증에 미치는 효과)

  • Song, EunJu
    • Journal of Korean Public Health Nursing
    • /
    • v.34 no.1
    • /
    • pp.48-59
    • /
    • 2020
  • Purpose: The purpose of this study was to examine the effect of the Nonviolent Communication (NVC) program on empathy, interpersonal relationship, and social anhedonia of patients with schizophrenia. Methods: This study was a quasi-experimental one using a nonequivalent control group pre-posttest design. The experimental group consisted of 30 members who participated in one of the two hospitals, and the control group consisted of 31 members who participated in the other hospital. These two groups were randomly assigned to one of two mental hospitals in a local area. The experimental group participated in six sessions of the NVC program. Results: As a result, empathy (F=5.29, p=.025) and social anhedonia (F=6.92, p=.011) has showed significant effects. However, interpersonal relationships were not statistically significant (F=0.83, p=.366). Conclusions: This study verified that the NVC program was effective in improving communication skills and the negative symptoms of patients with schizophrenia. Developing a variety of programs and applying interventions will help community rehabilitation and social adjustment for patients with schizophrenia.

The Design and Implementation of Messenger Authentication Protocol to Prevent Smartphone Phishing (스마트폰 피싱에 안전한 메신저 인증 프로토콜 설계 및 구현)

  • Yu, Byung-Seok;Yun, Sung-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.4
    • /
    • pp.9-14
    • /
    • 2011
  • Phishing is an attack to theft an user's identity by masquerading the user or the device. The number of phishing victims are sharply increased due to wide spread use of smart phones and messenger programs. Smart phones can operate various wi-fi based apps besides typical voice call and SMS functions. Generally, the messenger program such as Kakao Talk or Nate On is consisted of client and server functions. Thus, the authentication between the client and the server is essential to communicate securely. In this paper, we propose the messenger authentication protocol safe against smart phone phishing. To protect communications among clients, the proposed method provides message encryption and authentication functions.

A Study on the XML/EDI (XML/EDI에 관한 고찰)

  • 전순환
    • The Journal of Information Technology
    • /
    • v.4 no.1
    • /
    • pp.109-124
    • /
    • 2001
  • Electronic Data Interchange (EDI) has been used for business-to-business communication for almost a quarter of a century. Initial efforts Involved inter-company agreements on how to exchange commercial data, initially as information stored on tape and later as messages sent over dedicated data lines. To avoid having to use different protocols to move data between different companies, various Industry groups identified sets of data that could form the basis of individual agreements. The industry groups also sought to agree the format in which fields in such data sets were interchange so that a company only needed to develop one methodology for decoding information received without resource to human intervention. The XML/EDI specific components are built on top of existing standards for transmitting and processing XML-encoded data. These standards define shared features such as: the standard Internet file storage/naming and data transport mechanisms, file and message transfer formats, the syntax of data coded in XML, the way in which XML files can be validated by an XML parser or document object model generator, the way in which XSL presentation and data evaluation scripts can be associated with parsed objects, the use of rules and data management robots to manage application and repository interfaces.

  • PDF

Autonomous Knowledge Acquisition Methodology using Knowledge Workers' Context Information : Focused on the Acquisition of Dialogue-Based Knowledge for the Next Generation Knowledge Management Systems (지식근로자의 상황정보를 이용한 자율적 지식획득 방법론 : 대화형 지식의 획득을 위한 차세대형 지식경영시스템)

  • Yoo, Keedong
    • Knowledge Management Research
    • /
    • v.9 no.4
    • /
    • pp.65-75
    • /
    • 2008
  • Knowledge workers' workload to register knowledge can cause quality defects in the quality as well as the quantity of knowledge that must be accumulated in a knowledge management system(KMS). To enhance the availability of a KMS by acquiring more quality-guaranteed knowledge, autonomous knowledge acquisition which outdoes the automated acquisition must be initiated. Adopting the capabilities of context-awareness and inference in the field of context-aware computing, this paper intends to autonomously identify and acquire knowledge from knowledge workers' daily lives. Based on knowledge workers' context information, such as location, identification, schedule, etc, a methodology to monitor, sense, and gather knowledge that resides in their ordinary discussions is proposed. Also, a prototype systems of the context-based knowledge acquisition system(CKAS), which autonomously dictates, analyzes, and stores dialogue-based knowledge is introduced to prove the validity of the proposed concepts. This paper's methodology and prototype system can support relieving knowledge workers' burden to manually register knowledge, and hence provide a way to accomplish the goal of knowledge management, efficient and effective management of qualified knowledge.

  • PDF

Interaction between BIM Model and Physical Model During Conceptual Design Stage (설계 초기 단계에서 BIM 모델과 물리적 모델의 상호작용 방안)

  • Yi, Ingeun;Kim, Sung-Ah
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.4
    • /
    • pp.344-350
    • /
    • 2013
  • It is essential to consider geometry in the early design stage for rational design decisions. However, a crucial decision had been taken by conversation, physical model, and gesture rather than BIM mode which can analyze geometry efficiently. This research proposes the framework of interaction between BIM model and physical model for real-time BIM analysis. Through this real-time system framework of two models, architects can adopt BIM data at early design stage to review analysis of BIM model. It should facilitate dynamic design based on rich BIM information from an early stage to a final stage.

건설안전리포트 - 최첨단 통합 자동 안전시스템으로 '안전 철옹성' 구축 -완벽하지 않다면 안전하다고 말할 수 없다 (주)한양 고속국도 60호선 동홍천~양양간 16공구 건설현장

  • Hyeon, Cheon-Il
    • The Safety technology
    • /
    • no.163
    • /
    • pp.12-14
    • /
    • 2011
  • (주)한양의 고속국도 60호선 동홍천~양양간 16공구 현장이 위치해 있는 강원도 양양군 서면 범부리. 이곳은 겨우 39가구가 옹기종기 모여 사는 산골마을로, 높은 산 위에서 마을을 내려다보면 범선모양으로 생겼다하여 '범부리'라는 이름을 붙었다고 한다. 명당으로 꼽는 배산임수의 지형을 갖춘 이곳을 옛 동네어른들은 '큰골'이라 칭할 정도로 높은 애향심을 보였다. 그런 이 범부리에 2015년까지 교량1개, 터널2개, 터널관리동 1개소를 짓는 다는 대규모 토목공사계획이 2008년 발표됐다. 지역민들의 반대가 극심했다. 지역민들은 '범선모양의 마을 동산에 터널을 낸다는 것은 곧 배에 구멍을 뚫어 배를 가라앉게 만드는 행위"라며 공사의 진행을 완강히 저항했다. 현장 임직원들은 공사를 시작도 못하고 지역민들의 마음 돌리기에 매달렸다. 대화와 설득의 과정이 반복됐고, 현장 임직원들은 농기구를 고쳐주는 등 외지인이 아닌 이웃으로 다가가고자 노력했다. 그 결과 지역민들의 마음을 얻을 수 있었고, 어렵사리 공사가 진행됐다. 힘들게 시작한 공사에서 사고가 발생한다면 지역민들의 원성이 다시 커질 터, 김태희 현장소장을 비롯한 모든 현장 임직원은 '완벽하지 않다면 안전하다고 말할 수 없다'는 각오로 안전활동을 펼치기 시작했다. 그로부터 2년 반이 지난 지금, 이곳 현장은 지역을 넘어 전국에서도 손꼽히는 우수한 안전현장으로 우뚝 섰다.

  • PDF

A Study on Countermeasures against Messenger Phishing using ARIT Technique (ARIT 기법을 이용한 메신저 피싱 대응방안에 관한 연구)

  • Cho, Sung Kyu;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.5
    • /
    • pp.223-230
    • /
    • 2013
  • With the rapid development of IT technologies, many people talk to each other in real time on-line using messenger or use the messenger to share files for work. However, using this convenience, phishing crimes occur: e.g. demanding money, and if a criminal uses a bypassing technique like proxy in order to hide the IP address the criminal has used to log on, it is in fact, difficult to find the criminal's real IP address. This paper will propose a plan to measure against messenger phishing that may occur in advance by collecting the IP address with which a user has used in a dual channel mode and the real IP address obtained by ARIT Agent using ARIT technique, going through a separate identification process and deciding whether the user has accessed in a normal method.

A Pattern Matching Method of Large-Size Text Log Data using In-Memory Relational Database System (인메모리 관계형 데이터베이스 시스템을 이용한 대용량 텍스트 로그 데이터의 패턴 매칭 방법)

  • Han, Hyeok;Choi, Jae-Yong;Jin, Sung-Il
    • Annual Conference of KIPS
    • /
    • 2017.04a
    • /
    • pp.837-840
    • /
    • 2017
  • 각종 사이버 범죄가 증가함에 따라 실시간 모니터링을 통한 사전 탐지 기술뿐만 아니라, 사후 원인 분석을 통한 사고 재발 방지 기술의 중요성이 증가하고 있다. 사후 분석은 시스템에서 생산된 다양한 유형의 대용량 로그를 기반으로 분석가가 보안 위협 과정을 규명하는 것으로 이를 지원하는 다양한 상용 및 오픈 소스 SW 존재하나, 대부분 단일 분석가 PC에서 운용되는 파일 기반 SW로 대용량 데이터에 대한 분석 성능 저하, 다수 분석가 간의 데이터 공유 불가, 통계 연관 분석 한계 및 대화형 점진적 내용 분석 불가 등의 문제점을 해결하지 못하고 있다. 이러한 문제점을 해결하기 위하여 고성능 인메모리 관계형 데이터베이스 시스템을 로그 스토리지로 활용하는 대용량 로그 분석 SW 개발하였다. 특히, 기 확보된 공격자 프로파일을 활용하여 공격의 유무를 확인하는 텍스트 패턴 매칭 연산은 전통적인 관계형 데이터베이스 시스템의 FTS(Full-Text Search) 기능 활용이 가능하나, 대용량 전용 색인 생성에 따른 비현실적인 DB 구축 소요 시간과 최소 3배 이상의 DB 용량 증가로 인한 시스템 리소스 추가 요구 등의 단점이 있다. 본 논문에서는 인메모리 관계형 데이터베이스 시스템 기반 효율적인 텍스트 패턴 매칭 연산을 위하여, 고성능의 대용량 로그 DB 적재 방법과 새로운 유형의 패턴 매칭 방법을 제안하였다.

A Design and Implementation of Personal VOD System using Multi-thread (다중 스래드를 이용한 개인용 VOD 시스템의 설계와 구현)

  • Park, Sung-Sik;Lee, Ho-Suk
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.3
    • /
    • pp.299-310
    • /
    • 2000
  • In this paper, we designed and implemented a personal VOD server using multi-thread for the real-time services of video data to the users. The system consists of service manager, disk manager, and network manager. The service manager controls the user admission to the system using the VBR(Variable Bit Rate) characteristics of MPEG (Moving Picture Experts Group) video data. The disk manager provides the functions for VCR-like operations. The disk manager reads blocks from the disk by the size of GOP(Group of Pictures) and buffers the data to the user's thread. The network manager uses TCP/IP for the communication between the server and the client. The communication starts from the client and the VOD server must respond to this request. The implemented personal VOD system shows an acceptable performance.

  • PDF

A Study of Parenting Characteristics of mothers experienced child care teachers ('유아교사'를 경험한 '엄마'의 양육특성에 관한 연구)

  • Park, Ji-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.3
    • /
    • pp.48-56
    • /
    • 2016
  • This study was to establish a framework to provide the necessary caring knowledge in preparental period by analyzing the effects of an experience of being a child-care teacher in a field based on child-care knowledge from university. The data were collected from 5 in-depth interviews for 7 weeks from July to August, 2015. The results showed that mothers who used to be child-care teachers put conversation first in the child rearing process, made a room environment similar to the activity space in a kindergarten, and evaluated themselves as mothers with a burden that their children should be different from the others. This means that they perform child rearing in a positive way by re-creating their experience and knowing the child rearing process.