• Title/Summary/Keyword: 거치기술

Search Result 170, Processing Time 0.026 seconds

Convergence Strategy for Promoting the Admissions of Adult Learning in the College of Lifelong Education (대학의 평생교육체제 성인학습자 입시홍보 융합전략)

  • Kim, In Sook
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.2
    • /
    • pp.89-94
    • /
    • 2019
  • The purpose of this study was to empirically analyze the motivation of university lifelong education and the factors that are important in selecting it. In the motivation for participation of adult learners, learning new knowledge and skills in the first place and learning new things in the second place were good, so that they could learn together in the third place. Active school investment in faculty and staff will be needed to increase program diversity and quality through professionalism. Adult learners are getting information from the system they are interacting with, and furthermore, they learn the information from the public relations of university professors. Since they are acquiring paths and information through acquaintances, it is necessary to continuously promote the curriculum to unspecified adult learners. Advertisement should take advantage of various convergence strategies such as hanging banners in the area, publicity of the subway, local newspapers, word of mouth, SNS, and the Internet.

NET Based Software Rapid Application Development(RAD) Process (닷넷 기반의 소프트웨어 RAD 프로세스 -)

  • 노재우;조현훈;류성열
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.311-324
    • /
    • 2004
  • Software development undergoes a number of iterations and each iteration forms its own cycle going through requirement analysis, scheme and design, implementation and finally test and evaluation. In this iterated development process, executable releases are produced, improved and eventually developed to a complete system, going through this particular development cycle. Compared to the conventional process, the advantage of rapid iterative development process lies in reducing risk factors in early stage and responding to changes very flexibly. In addition, highly reusable, the process can improve capabilities of the development team while the project is being carried out. As a result, overall balance in quality is secured. The objective of this paper is the research of rapid development process and its case studies showing how to adapt the rapidly changing customer requirements and to transform those requirements into the project timely and adequately. The proposed process is focused on the common and core activities of NET-based MarMIIII, MSF/CD, XP, Agile, PSP and TSP

  • PDF

Turbidity Monitoring in Saemangum Area using Remote Sensing (RS를 이용한 새만금 지역의 탁수환경 모니터링)

  • Na, Sang-Il;Park, Jong-Hwa;Shin, Hyoung-Sub;Beak, Shin-Chul
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2011.05a
    • /
    • pp.472-472
    • /
    • 2011
  • 탁도는 물의 상대적인 흐림 정도를 나타내는 척도로서 이는 빛이 물을 통과할 때 산란시키는 부유고형물질 때문에 발생한다. 토양침식에 의하여 지표수로 유입된 토사와 광물질은 하천의 수송 및 퇴적 과정을 거치며 이동한다. 이때 하상 퇴적물은 바닥으로부터 먹이를 찾는 유기체에 의해 뒤섞이며 입자들은 일정기간동안 물의 흐름에 의해 부유상태로 남아 있게 되고, 유입되는 영양소와 빛에 의하여 성장하는 조류 또한 탁도를 증가시키는 원인이 된다. 이러한 부유물질의 증가는 수중에 태양복사에너지 전달을 방해하여 수중생태계의 먹이사슬과 저서생물의 서식환경에 많은 영향을 미치고, 수표면 온도 또한 태양으로부터 열을 흡수하는 표면 근처의 부유물질에 의해 증가하여 용존산소의 양에도 영향을 미친다. 따라서 수체내 분포하고 있는 부유물질의 종류와 양 및 공간적 분포 파악은 수질문제와 재난 예방 및 생물의 서식환경 문제를 파악하고 해결하는 데 매우 중요하다. 그러나 부유물질에 부착되어 있는 영양소, 금속, 살충제 등은 물 순환 시스템을 통하여 끊임없이 운반되고 상류유역의 흐름 조건에 따라 시공간적으로 변화하기 때문에 이를 규명하는 것이 매우 어려운 실정이다. 이러한 문제를 해결하기 위하여 광역적인 탁수환경의 분석방법으로 원격탐사(Remote Sensing, 이후 RS) 기법을 이용한 방법이 제안되고 있다. 이미 선진국에서는 광역수계의 수질관리를 위해 RS 기법을 이용하여 신속하고 정확한 수질상태 파악을 시도하고 있으며, 우리나라에서도 KOMPSAT 발사를 계기로 RS 관련 기술이 비약적으로 진화하고 있다. 그러나 RS 데이터를 활용하는데 필수적인 분광학적 특성 규명에 대한 연구는 대부분 식생과 토양에 한정되어 있으며 수체에 대한 연구는 현장조사의 어려움으로 인하여 상당히 제한적인 수준이다. 따라서 본 연구에서는 탁도의 변화에 따른 분광반사 특성을 휴대용 분광복사계를 이용하여 규명하고, 이를 Landsat 위성영상에 적용하여 새만금 유역을 대상으로 완공 직후인 2006년부터 2010년까지의 탁수환경을 모니터링 하였다. 그 결과 새만금 유역 탁수환경을 정성적으로 확인할 수 있었으며, 이를 이용하여 탁수환경 연구에 RS 기법이 효과적임을 제시하고자 한다.

  • PDF

ENF based Detection of Forgery and Falsification of Digital Files due to Quadratic Interpolation (이차 보간에 따른 ENF 기반의 위변조 디지털 파일 탐지 기법)

  • Park, Se Jin;Yoon, Ji Won
    • Journal of KIISE
    • /
    • v.45 no.3
    • /
    • pp.311-320
    • /
    • 2018
  • Recently, the use of digital audio and video as proof in criminal and all kinds of litigation is increasing, and scientific investigation using digital forensic technique is developing. With the development of computing and file editing technologies, anyone can simply manipulate video files, and the number of cases of manipulating digital data is increasing. As a result, the integrity of the evidence and the reliability of the evidence Is required. In this paper, we propose a technique for extracting the Electrical Network Frequency (ENF) through a grid of power grids according to the geographical environment for power supply, and then performing signal processing for peak detection using QIFFT. Through the detection algorithm using the standard deviation, it was confirmed that the video file was falsified with 73% accuracy and the forgery point was found.

Additional Impurity Roles of Nitrogen and Carbon for Ternary compound W-C-N Diffusion Barrier for Cu interconnect (Cu 금속 배선에 적용되는 질소와 탄소를 첨가한 W-C-N 확산방지막의 질소불순물 거동 연구)

  • Kim, Soo-In;Lee, Chang-Woo
    • Journal of the Korean Vacuum Society
    • /
    • v.16 no.5
    • /
    • pp.348-352
    • /
    • 2007
  • In submicron processes, the feature size of ULSI devices is critical, and it is necessary both to reduce the RC time delay for device speed performance and to enable higher current densities without electromigration. In case of contacts between semiconductor and metal in semiconductor devices, it may be very unstable during the thermal annealing process. To prevent these problems, we deposited tungsten carbon nitride (W-C-N) ternary compound thin film as a diffusion barrier for preventing the interdiffusion between metal and semiconductor. The thickness of W-C-N thin film is $1,000{\AA}$ and the process pressure is 7mTorr during the deposition of thin film. In this work we studied the interface effects W-C-N diffusion barrier using the XRD and 4-point probe.

Realtime Facial Expression Recognition from Video Sequences Using Optical Flow and Expression HMM (광류와 표정 HMM에 의한 동영상으로부터의 실시간 얼굴표정 인식)

  • Chun, Jun-Chul;Shin, Gi-Han
    • Journal of Internet Computing and Services
    • /
    • v.10 no.4
    • /
    • pp.55-70
    • /
    • 2009
  • Vision-based Human computer interaction is an emerging field of science and industry to provide natural way to communicate with human and computer. In that sense, inferring the emotional state of the person based on the facial expression recognition is an important issue. In this paper, we present a novel approach to recognize facial expression from a sequence of input images using emotional specific HMM (Hidden Markov Model) and facial motion tracking based on optical flow. Conventionally, in the HMM which consists of basic emotional states, it is considered natural that transitions between emotions are imposed to pass through neutral state. However, in this work we propose an enhanced transition framework model which consists of transitions between each emotional state without passing through neutral state in addition to a traditional transition model. For the localization of facial features from video sequence we exploit template matching and optical flow. The facial feature displacements traced by the optical flow are used for input parameters to HMM for facial expression recognition. From the experiment, we can prove that the proposed framework can effectively recognize the facial expression in real time.

  • PDF

Development of experimental water level measuring device using an Arduino and an ultrasonic sensor (아두이노와 초음파 센서를 이용한 실험용 수위 측정 장치 개발)

  • Yoo, Moonsung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.143-147
    • /
    • 2018
  • Water levels are measured in various fields such as sewage treatment plants, water treatment plants, rivers, dams, factory storages' tanks. Ultrasonic instruments for water level measurement are expensive and are used for industrial field. Rapid advances in electronics have made it possible to build a wide variety of measurement, monitoring and control functions at low cost. This study was started to make ultrasonic level measurement system at low price. The system was constructed with an Arduino, an ultrasonic sensor and a temperature sensor for use in the experiment. The ultrasonic sensor measures the time from the sensor to the liquid surface. The temperature sensor measures the atmospheric temperature and improves the accuracy of the ultrasonic distance measurement by correcting the sound speed. Arduino controls measurements and calculates the water level. All components of the system are assembled into a device holder. Experiments with this system show that the water level measured by the system is very close to the actual value. This system is also inexpensive and easy to install and maintain, making it suitable for laboratory use.

A Development of Application Model on Virtual Simulation for Prevention of Cyberbullying (사이버불링 예방을 위한 가상체험형 시뮬레이션 적용 모형 개발)

  • Gu, Jungmo;Lee, Eunhwa
    • The Journal of Korean Association of Computer Education
    • /
    • v.19 no.1
    • /
    • pp.63-76
    • /
    • 2016
  • The damage of cyber bullying is increasing. A response of code is needed with that of law and education. This study would use the strengths of a virtual simulation as one of the technical solutions. Students learn cyber bullying and prevention of it through each step. The steps in this application model consist of recognition${\rightarrow}$judgement${\rightarrow}$decision${\rightarrow}$behavior. Each detailed step of this model is made of pre-briefing${\rightarrow}$demanding of response${\rightarrow}$participating in response${\rightarrow}$result and feedback${\rightarrow}$growth${\rightarrow}$debriefing. Thus we developed the application model of this virtual simulation and implemented it for education and prevention of cyber bullying. We hope that the model and simulation developed by this study would reduce the damage resulting from cyber bullying.

An Analysis of Inelastic Neutron Scattering by Liquid Methane

  • Chung, Chang-Hyun;Shin, Won-Kee;Kim, Jin-Soo
    • Nuclear Engineering and Technology
    • /
    • v.5 no.4
    • /
    • pp.265-278
    • /
    • 1973
  • The incoherent neutron scattering cross section of molecular liquids is analyzed using a damping function model for correlation functions of molecular translations and rotations. The present approach is different from recent works in that the scattering function is evaluated directly, not through the intermediate scattering function. The damping fuction is determined from a simple relation between its long-wavelength limit and the generalized frequency distribution function, and translation-rotation couplings are assumed to be neglected. A physical model is used for the translational motions of center-of-mass of a molecule, including properly its short-time and long-time behaviors. A simple model for the rotational motions is suggested which relates the damping function to the Fourier transform of the dipole correlation function, or equivalently, the infrared vibrational absorption spectrum. Theoretical absolute scattering intensities are computed for liquid methane and shown to be in satisfactory agreement with both thermal and cold neutron measurements.

  • PDF

A Study on Hierarchical Structure and Blockchain-based Node Authentication Mechanism in MANET (MANET에서 계층적 구조와 블록체인 기반 노드 인증 기법에 관한 연구)

  • Yang, Hwanseok
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.13-19
    • /
    • 2019
  • MANET has many security vulnerabilities because it consists of only mobile nodes using wireless. In particular, it is a very important factor determining network performance that excludes the participation of malicious nodes through accurate reliability measurements and authentication of nodes participating in the network. In this paper, we proposed a technique applied with blockchain technology in order to prevent forgery of authentication information for nodes participating in the network. And, an area-based hierarchical structure was applied to increase the efficiency of authentication for nodes and apply the optimal technique of block generation and exchange protocol. In addition, four data payloads were added to the block header in order to add authentication information for nodes in block. To improve the reliability by applying the blockchain technique to the hop-by-hop data transfer method between mobile nodes, blockchain exchange protocol through transaction creation, block packaging and verification processes were implemented. We performed the comparative experiment with the existing methods to evaluate the performance of the proposed method and confirmed the excellent performance by the experiment results.