• Title/Summary/Keyword: 무선 인식

Search Result 981, Processing Time 0.026 seconds

The Discrimination of Innocents Exposed to Crime Details using an Autobiographical Implicit Association Test (범죄 정보 인식에 따른 용의자 변별을 위한 aIAT 활용)

  • Kim, Kiho;Lee, Eun-Ji;Lee, Jang-Han
    • Korean Journal of Forensic Psychology
    • /
    • v.11 no.2
    • /
    • pp.173-190
    • /
    • 2020
  • The purpose of this study is to verify whether it is possible for participants to discriminate between innocent and guilty suspects when they are exposed to criminal information utilizing an autobiographical implicit association test (aIAT). A total of 49 college students were randomly assigned to guilty group, innocent-aware group, or innocent-unaware group. Participants performed an aIAT to detect suspects after performing either mock crime or control task. It was verified that innocent suspect and guilty suspect exposed with crime information could be distinguished through D-score and reaction time, converted to symbolize strength of the association between guilty sentences, innocent sentences, and truth sentences. As a result of the analysis, guilty group showed significantly higher D-score than both innocent-aware group and innocent-unaware group. guilty group also showed faster response time in true-guilty condition than true-innocent condition. This shows that the association of true-guilty conditions is stronger than that of true-innocent conditions. On the other hand, the innocent-aware group showed a faster response time in the true-innocent condition than the true-guilty condition, and innocent-unaware group showed no significant difference between the two conditions. Through this, it was confirmed that innocent suspects exposed to criminal information can be discriminated according to the aIAT pattern, which has a faster reaction rate to the truth and innocence union than the guilty group. This study confirmed that suspects exposed to criminal information can be effectively discriminated using aIAT, and further suggests the usefulness and potential of aIAT in the field of lie detection.

  • PDF

A study on the development of surveillance system for multiple drones in school drone education sites (학내 드론 교육현장의 다중드론 감시시스템 개발에 관한 연구)

  • Jin-Taek Lim;Sung-goo Yoo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.697-702
    • /
    • 2023
  • Recently, with the introduction of drones, a core technology of the 4th industrial revolution, various convergence education using drones is being conducted in school education sites. In particular, drone theory and practice education is being conducted in connection with free semester classes and career exploration. The drone convergence education program has higher learner satisfaction than simple demonstration and practice education, and the learning effect is high due to direct practical experience. However, since practical education is being conducted for a large number of learners, it is impossible to restrict and control the flight of a large number of drones in a limited place. In this paper, we propose a monitoring system that allows the instructor to monitor multiple drones in real time and learners to recognize collisions between drones in advance when multiple drones are operated, focusing on education operated in schools. The communication module used in the experiment was equipped with GPS in Murata LoRa, and the server and client were configured to enable monitoring based on the location data received in real time. The performance of the proposed system was evaluated in an open space, and it was confirmed that the communication signal was good up to a distance of about 120m. In other words, it was confirmed that 25 educational drones can be controlled within a range of 240m and the instructor can monitor them.

IoT-based Smart Tunnel Accident Alert System (사물 인터넷 기반의 스마트 터널 사고 경보 시스템)

  • Ki-Ung Min;Seong-Noh Lee;Yoon-Hwa Choi;Yeon-Taek Hong;Chul-Sun Lee;Yun-Seok Ko
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.4
    • /
    • pp.753-762
    • /
    • 2024
  • Tunnels have limited evacuation areas, and It is difficult for cars coming from behind to recognize the accident situation in front. Since an accident is very likely to lead to a serious secondary accident, a IoT-based smart tunnel accident warning system was studied to prepare for traffic accidents that occur in tunnels. If the measured values from the flame detection sensor, gas detection sensor, and shock detection sensor in the tunnel exceed the standard, it is judged to be an emergency situation and an alert system is designed to operate. The accident information message was designed to be displayed on the LCD and transmitted to drivers inside and outside the tunnel through a Wi-Fi communication network. A performance test system was established and performance evaluation was performed for several accident scenarios. As a result of the test, it was confirmed that the accident alert system can accurately detect accidents based on given reference values, perform alert procedures, and transmit alert messages to smart phones through Wi-Fi wireless communication. And through this, its effectiveness could be confirmed.

An exploratory study on Social Network Services in the context of Web 2.0 period (웹 2.0 시대의 SNS(Social Network Service)에 관한 고찰)

  • Lee, Seok-Yong;Jung, Lee-Sang
    • Management & Information Systems Review
    • /
    • v.29 no.4
    • /
    • pp.143-167
    • /
    • 2010
  • Diverse research topics relating to Social Network Services (SNS) such as, social affective factors in relationships among internet users, social capital value of SNS, comparing attributes why users are intending to participate in SNS, user's lifestyle and their preferences, and the exploratory seeking potential of SNS as a social capital need to be focused on. However, these researches that have been undertaken only consider facts at a particular period of the changing computing environment. In accordance with this indispensability, the integrated view on what technical, social and business characteristics and attributes need to be acknowledged. The purpose of this study is to analyze the evolving attributes and characteristics of SNS from Web 1.0 to Mobile web 2.0 through the Web 2.0 and Mobile 1.0 period. Based on the relevant literature, the attributes that drive the changing technological, social and business aspects of SNS have been developed and analyzed. This exploratory study analyzed major attributes and relationships between SNS and users by changing the paradigms which represented each period. It classified and chronicled each period by representing paradigms and deducted the attributes by considering three aspects such as technological, social and business administration. The major findings of this study are, firstly, the web based computing environment has been changed into the platform attribute for users in the aspect of technology. Users can only read, listen and view information through the web site in the early stages, but now it is possible that users can create, modify and distribute all kinds of information. Secondly, the few knowledge producers of web services have been changed into a collective intelligence by groups of people in the aspect of society. Information authority has been distributed and there is no limit to its spread. Many businesses recognized the potential of the SNS and they are considering how to utilize these advantages toward channel of promotion and marketing. Thirdly, the conventional marketing channel has been changed into oral transmission by using SNS. The market of innovative mobile technology such as smart phones, which provide convenience and access-ability toward customers, has been enlarged. New opportunities to build friendly relationship between business and customers as a new marketing chance have been created. Finally, the role of the consumer has been changed into the leading role of a prosumer. Users can create, modify and distribute information, and are performing the dual role of customer and producer.

  • PDF

Selectively Partial Encryption of Images in Wavelet Domain (웨이블릿 영역에서의 선택적 부분 영상 암호화)

  • ;Dujit Dey
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.648-658
    • /
    • 2003
  • As the usage of image/video contents increase, a security problem for the payed image data or the ones requiring confidentiality is raised. This paper proposed an image encryption methodology to hide the image information. The target data of it is the result from quantization in wavelet domain. This method encrypts only part of the image data rather than the whole data of the original image, in which three types of data selection methodologies were involved. First, by using the fact that the wavelet transform decomposes the original image into frequency sub-bands, only some of the frequency sub-bands were included in encryption to make the resulting image unrecognizable. In the data to represent each pixel, only MSBs were taken for encryption. Finally, pixels to be encrypted in a specific sub-band were selected randomly by using LFSR(Linear Feedback Shift Register). Part of the key for encryption was used for the seed value of LFSR and in selecting the parallel output bits of the LFSR for random selection so that the strength of encryption algorithm increased. The experiments have been performed with the proposed methods implemented in software for about 500 images, from which the result showed that only about 1/1000 amount of data to the original image can obtain the encryption effect not to recognize the original image. Consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. Also, in this paper, several encryption scheme according to the selection of the sub-bands and the number of bits from LFSR outputs for pixel selection have been proposed, and it has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.

Home Economics teachers' stages of concern and levels of use about the Practical Reasoning Instruction (실천적 추론 수업에 대한 가정과 교사의 관심 단계와 실행 수준)

  • Park, Mi-Ok;Chae, Jung-Hyun
    • Journal of Korean Home Economics Education Association
    • /
    • v.24 no.4
    • /
    • pp.133-144
    • /
    • 2012
  • The purpose of this study was to investigate Home Economics(HE) teachers' stages of concern, levels of use, and needs about the practical reasoning instruction focusing on the Concerns Based Adoption Model(CBAM). Questionnaires were administrated to HE teachers who worked for middle or high school in Korea and used HE textbooks according to the revised 2007 HE curriculum through mailing and visiting HE teacher training centers. 350 data collected from the responses were finally analyzed using SPSS 12.0. The results of the study were as follows: First, HE teachers' stages of concern about the Practical Reasoning Instruction(PRI) were demonstrated by the following order: awareness stage 0(97.05%), informational stage 1(87.06%), personal stage 2(86.23%), management stage 3(79.85%), refocusing stage 6(63.22%), consequence stage 4(61.26%), and collaboration stage 5(60.12%). Second, HE teachers' levels of use for PRI were demonstrated by the following order: preparation level 2(30.3%), orientation level 1(18.30%), refinement level 5 (18.30%), mechanical level 3: (16.0%), routine level 4(10.09%), nonuse level 0(4.0%), integration level 6(1.70%), and renewal level 7(0.60%). Third, needs for HE teachers' practical reasoning process were shown as the following order: '(O)Outline and implement a plan for action'(1.89), '(A)Analyze choices and consequences'(1.75), '(N)Note the results of your action(s)'(1.57), '(E)Evaluate information needed to solve the problem'(1.44), '(R)Recognize the problem'(1.39), and '(S)Select the best choices'(1.36).

  • PDF

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

A Study on the actual conditions of the use of them and the moves to strengthen home economics resources for school lifelong education in home economics teachers' view (가정과교사가 인식한 학교 평생교육을 위한 가정과 자원의 활용 실태 및 활성화 방안)

  • Kim, Sung-Hee;Chae, Jung-Hyun
    • Journal of Korean Home Economics Education Association
    • /
    • v.18 no.4 s.42
    • /
    • pp.127-141
    • /
    • 2006
  • The purpose of this study was to investigate the actual conditions of the use of them and the moves to strengthen home economics resources for school lifelong education for parents and local residents. This study conducted a systematic random sampling. Questionnaires were distributed to home economics teachers from 285 middle schools, 123 high schools, and 130 of them were sampled as the subjects of this study. The results of this study were as follows. First, home economics teachers were active participating school lifelong educational program. But according to the result of research on the actual condition, the proportion of taking part in it was low. More than half of home economics teachers who took part in program's lecturer were in charge of computer courses. So they didn't show their ability as expert. Also they were in charge of several works than roll of lecturers. It was mentioned too great a burden. There is little in-service training for meeting specialization for school lifelong education. They wanted to take part of lecturers of program and preferred hours of being over class. More than half of them had intended to obtain a lifelong educator's license. The part of elective courses for obtaining a lifelong educator's license is similar to home economics educational contents. So, they have an advantage of obtaining it. Second, one-fifth of school that gave school life education carried out program of related home economics. Mostly they had mothers of students-oriented programs on artistic and leisure. But this is that home economics teachers mentioned less important teaching at society in the future. They importantly mentioned program on children's education in now and the future. Parents of students and local residents also extremely wanted it. For differentiated school life education, quality of programs is important greatly. Third, the actual condition of practical room relating home economics is only practice to cook mostly. So they are reluctant to be open it because of being responsible for the results from using there. It is necessary to ameliorate there's facilities and to increase there's area. Fourth, home economics teachers want to improve their specialization through in-service training, to develop and diffuse programs of superior quality, and to get extra pay for overtime from the government.

  • PDF

Techniques for Acquisition of Moving Object Location in LBS (위치기반 서비스(LBS)를 위한 이동체 위치획득 기법)

  • Min, Gyeong-Uk;Jo, Dae-Su
    • The KIPS Transactions:PartD
    • /
    • v.10D no.6
    • /
    • pp.885-896
    • /
    • 2003
  • The typws of service using location Information are being various and extending their domain as wireless internet tochnology is developing and its application par is widespread, so it is prospected that LBS(Location-Based Services) will be killer application in wireless internet services. This location information is basic and high value-added information, and this information services make prior GIS(Geographic Information System) to be useful to anybody. The acquisition of this location information from moving object is very important part in LBS. Also the interfacing of acquisition of moving object between MODB and telecommunication network is being very important function in LBS. After this, when LBS are familiar to everybody, we can predict that LBS system load is so heavy for the acquisition of so many subscribers and vehicles. That is to say, LBS platform performance is fallen off because of overhead increment of acquiring moving object between MODB and wireless telecommunication network. So, to make stable of LBS platform, in this MODB system, acquisition of moving object location par as reducing the number of acquisition of unneccessary moving object location. We study problems in acquiring a huge number of moving objects location and design some acquisition model using past moving patternof each object to reduce telecommunication overhead. And after implementation these models, we estimate performance of each model.

An Investigative Study on Middle School Students, Parents and Industrial Institutions for the Establishment of Vocational High Schools in Asan Area (아산지역 특성화고 설치에 대한 중학교 학생, 학부모, 산업체의 요구 조사 연구)

  • Lee, Byung-Wook;Ahn, Jae-Young;Lee, Chan-Ju;Lee, Sang-Hyun
    • 대한공업교육학회지
    • /
    • v.39 no.1
    • /
    • pp.1-22
    • /
    • 2014
  • The purpose of this research are to investigate and analyze requests of middle school students, parents and people in charge of human resources of industrial institutions and to suggest implications which are necessary to establish vocational high schools in Asan area. To achieve them, demands, for the establishment of vocational high schools, requests of desirable department, area, etc. which are recognized by middle school students, parents and people in charge of human resources of industrial institutions in Asan-si were surveyed and analyzed. The subjects of the survey were students and parents who were selected from one third grade class out of each of all the middle schools of Ansan-si. Also, for the people in charge of human resources of industrial institutions, industrial institutions including more than 10 employees were firstly sampled and selected. The number of students analyzed is 484, parents 458, industrial institutions 81, the results are as follows. First, among the third graders, there were 18.5% students who wanted to enter vocational high schools and 72.6% students that replied saying they may enter if vocational schools are established in Asan-si. Among them, 8.8% students replied that they will definitely enter. Second, among the parents, 30.8% wanted their children to enter vocational high schools and 76.9% replied that they may enter if vocational high schools are established in Asan-si. Among them, 8.4% replied that their children will enter certainly. Third, people in charge of human resources of industrial institutions replied that they may recruit 98.8 percent of graduates of vocational high schools in Asan area. Among them, they replied that 17.3% will be recruited certainly. For the replies of recruitment time, there were 49.4% of 'within 1 year', 30.9% of 'within 1~5 years' and for working, there were 60.8% of 'mechanical operators and assembly workers' and 31.6% of 'technicians and functional workers'. Fourth, for the most preferred departments when establishing vocational high schools in Asan-si, middle school students wanted hospitality management, parents were for electricity and electronics, industrial institutions replied with vehicle mechanics. By affiliation, more than the half of respondents wanted industrial affiliation. Fifth, for the most preferred departments when establishing vocational high schools in Asan-si, middle school students and parents preferred Onyang-dong, industrial institutions preferred Dunpo-myeon. Results showed that the most desirable areas were in the vicinity of one's own residential area.