• Title/Summary/Keyword: 사람의 개입

Search Result 203, Processing Time 0.03 seconds

Application of the Rule-Based Image Classification Method to Jeju Island (규칙기반 영상분류 방법의 제주도 지역의 적용)

  • Lee, Jin-A;Lee, Sung-Soon
    • Spatial Information Research
    • /
    • v.21 no.1
    • /
    • pp.63-73
    • /
    • 2013
  • Geographic features are reflected in satellite images, which contain characteristic elements. Information on changes can be obtained through a comparison of images taken at different times. If multi-temporal images can be classified through the use of an unsupervised method, this is likely to improve the accuracy of image classification and contribute to various applications. A rule-based image classification algorithm for automatic processing without human involvement has been developed, but it must be verified that its results are not affected by imperfect elements. In this study, Landsat images of Jeju Island were used to carry out a rule-based image classification. The application results were examined for complex cases, including the presence of clouds in the images, different photographed times, and the type of target area, such as city, mountain, or field. The presence of clouds did not affect calculations, and appropriate classification rules were applied, depending on the different photographed times. The expansion of the urban areas of Jeju and the increase of facilities such as vinyl greenhouses in Seoguipo were identified. Furthermore, space information changes and accurate classifications for Jeju Island were obtained. With the goal of performing high-quality unsupervised classifications, measures to generalize and improve the methods employed were searched for. The findings of this study could be used in time-series analyses of images for various applications, including urban development and environmental change monitoring.

A Study of Authentication Method for Id-Based Encryption Using In M2M Environment (M2M 환경에서 신원기반 암호기법을 활용한 인증기법에 관한 연구)

  • Jin, Byung-Wook;Park, Jae-Pyo;Lee, Keun-Wang;Jun, Mun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1926-1934
    • /
    • 2013
  • M2M (Machine-to-Machine Communication) refers to technologies that allow wired and wireless systems to communicate with other devices with similar capabilities. M2M has special features which consist of low electricity consumption, cheap expenses, WAN, WLAN and others. Therefore, it can communicate via a network. Also, it can handle itself without a person's management. However, it has a wireless-communicate weakness because of the machine-communicate request, and also it is difficult to administrate and control each other. So In this Paper, It suggests the safety protocol between Device, Gateway and Network Domain in M2M environment. Proposed protocol is based on ID-Based encryption's certificate and creates session key between the Access Server and the Core Server in the Network Domain. It uses that session key for sending and receiving data in mutual, and adds key renewal protocol so it will automatically update discern result. a comparative analysis of the existing M2M communication technologies and PKI-based certificate technology is compared with the proposed protocol efficiency and safety.

Common Services Platform for M2M Supporting Security Standards (보안 표준 지원 M2M 공통 서비스 플랫폼)

  • Vakkosov, Sardorjon;Namgung, Jung-Il;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.3
    • /
    • pp.76-88
    • /
    • 2016
  • Machine to Machine (M2M) is a technology that presents communication between two or more devices with or without human intervention. M2M communications can be applied for various use cases such as environmental monitoring, health care, smart metering and etc. In most use cases, M2M utilizes sensor nodes to collect data from the intended environment and the data is transmitted back to M2M application through other devices (gateways, sink nodes). In some use cases, M2M devices are being designed to store and process sensor data for improving the reliability of the service; Gateways and sink nodes are also intended to store and process the gathered data from sensor nodes. This kind of approach is very challenging for both academy and industry. In order to enhance the performance of this approach, in this paper, we propose our Common Service Security Platform (CSSP) for M2M devices and gateways. CSSP platform presents solutions for the devices and gateways by making them operate more accurately and efficiently. Besides, we present a comparative analysis of communication protocols and present their performance in accordance with selected metrics.

Relationship between Suppression Strategy of Emotional Expression and Posttraumatic Growth: Serial Multiple Mediating Effects of Self Disclosure on Traumatic Event and Social Support (정서표현억제전략과 외상후 성장의 관계: 외상사건에 대한 자기개방과 사회적 지지의 순차적 다중매개효과)

  • Sull, Keon-Hye;Kim, Min-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.392-403
    • /
    • 2021
  • The purpose of this study was to examine the effect of emotion regulation strategy on posttraumatic growth and to confirm serial multiple mediating effects of self disclosure on a traumatic experience and social support in relationship between suppression strategy of emotional expression and posttraumatic growth. A survey was conducted for adults over the age of 18. Data of 663 adults (222 men, 441 women) were analyzed. According to analysis by using SPSS Process Macro, the less suppression strategy of emotional expression was used, the higher posttraumatic growth was. Simple mediating effect of self disclosure was confirmed between suppression strategy of emotional expression and posttraumatic growth. Serial multiple mediating effects of self disclosure and social support were shown in relationship between suppression strategy of emotional expression and posttraumatic growth. It means that the more people who use less suppression of emotional expression as their emotion regulation strategy, the more they disclose on their traumatic experience, then, they will receive emotional comfort and support from the people around, finally reaching posttraumatic growth. The importance of self disclosure and social support on posttraumatic growth was verified. Counseling intervention method was suggested for involuntary clients who usually suppress emotional expression, to enhance their posttraumatic growth. Lastly, significance and limitations of this study were suggested for follow-up studies.

Case Analysis of Seismic Velocity Model Building using Deep Neural Networks (심층 신경망을 이용한 탄성파 속도 모델 구축 사례 분석)

  • Jo, Jun Hyeon;Ha, Wansoo
    • Geophysics and Geophysical Exploration
    • /
    • v.24 no.2
    • /
    • pp.53-66
    • /
    • 2021
  • Velocity model building is an essential procedure in seismic data processing. Conventional techniques, such as traveltime tomography or velocity analysis take longer computational time to predict a single velocity model and the quality of the inversion results is highly dependent on human expertise. Full-waveform inversions also depend on an accurate initial model. Recently, deep neural network techniques are gaining widespread acceptance due to an increase in their integration to solving complex and nonlinear problems. This study investigated cases of seismic velocity model building using deep neural network techniques by classifying items according to the neural networks used in each study. We also included cases of generating training synthetic velocity models. Deep neural networks automatically optimize model parameters by training neural networks from large amounts of data. Thus, less human interaction is involved in the quality of the inversion results compared to that of conventional techniques and the computational cost of predicting a single velocity model after training is negligible. Additionally, unlike full-waveform inversions, the initial velocity model is not required. Several studies have demonstrated that deep neural network techniques achieve outstanding performance not only in computational cost but also in inversion results. Based on the research results, we analyzed and discussed the characteristics of deep neural network techniques for building velocity models.

Cultural Implications of Moving into the World - Focusing On section of 『Samkukyousa』 (세상으로 나아가기의 문화적 의미 - 『삼국유사』 <피은>편을 중심으로)

  • Kim, Kyung-Seop;Kim, Jeong-Lae
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.333-339
    • /
    • 2022
  • Finding traces of the numerous contexts that exist in our culture surrounding an old-narrative and leading to it's textualization provides a chance to read the story anew. The 'Pieun(避隱)' section of 'Samgukyusa' contains the stories of people who hide from the world and avoid it, as well as the different types of stories by the compiler, the Buddihist monk, Ilyeon. In other words, the compiler has textualized the story. This study aims to attentively analyze the specific story in the 'Pieun' section and read the insights of the compiler on whether to move into the world or hide from the world. Through this analysis, it is apparent that the episode of 'Pieun' does not only illustrate the characters who wish to escape or hide from the world, but it also enables readers to grasp the intention of Ilyeon who deliberately includes the banquet story which is contrary to the meaning of the title. In the 'Pieun', he emphasizes that the behavior of revealing and hiding oneself to and from the world has significant religious and cultural meanings for an individual. The writer, without distinguishing people who move into the world or hide from it, used the Buddhist Dialectictics method to present a different interpretation.

Gene Chip을 이용한 돼지의 퇴행성 관절염의 활막세포 기작 연구

  • Lee, Jeong-Su;O, Baatartsogt;Im, Hui-Gyeong;Jo, In-Hui;So, Hyeon-Gyeong;;Kim, Eun-Guk;Lee, Jong-Ha;Hwang, Su-Yeong;Choe, Gang-Deok
    • Proceedings of the Korean Society for Food Science of Animal Resources Conference
    • /
    • 2006.05a
    • /
    • pp.128-132
    • /
    • 2006
  • 관절염이 일어나는 정확한 기전은 아직까지 잘 규명되어 있지 않으나 일반적으로 cytokine, chemokine을 비롯한 여러 가지 조절 물질들 사이의 미묘한 균형이 깨어지는 일이 주된 요인으로 추정되고 있다. 사람의 경우 염증이 일어난 관절 조직에서 활막 세포(synovial fibroblast)는 여러 염증성 사이토카인들을 분비하기도 하며 또 한편 이들 cytokine의 target 세포로 이들의 자극에 대하여 정상인의 그것과 다른 증식 및 활성화 반응을 보이는 등, 다양한 측면에서 관절염증의 유발에 기여하는 것으로 보여진다. 따라서 활막세포 활성화 경로를 DNA Microarray chip을 이용하여 세포 및 분자 수준에서 밝혀 이를 차단할 수 있는 자연물질(natural product)를 선별함으로써 항생제나 스테로이드를 사용하지 않고 돼지의 관절염을 효과적으로 치료 또는 예방할 수 있는 방법을 모색하고자 한다. 6.6kg의 암컷 Yorkshire와 수컷 Landrace의 교배잡으로 왼쪽 뒷다리 슬관절에 십자인대를 파열하여 관절염을 유발하고 8주간 성장을 시킨 후 정상 슬관절과 관절염이 유발된 슬관절의 활막세포로부터 total RNA를 추출한 후 affymetrix Gene chip을 제작하여 Geneplex소프트웨어를 이용하여 데이터를 분석하였다. 분석 결과 unknown 유전자 962개를 포함하여 유전자 발현이 증가된 유전자는 총 1,059개 였으며, unknown 유전자 564개를 포함하여 유전자 발현이 증가된 유전자는 총 639개를 얻었다. 이러한 돼지 관절염에서의 활막세포에 의한 유전적 발현 양상으로부터 molecular function, biological process, pathway등을 이용하여 관절염 지표를 작성할 수 있다.분별을 성공적으로 수행하였다.(p<0.05), 맛, 연도, 다즙성 및 전체적인 기호성은 유의한 차이가 없었다.자체를 악하다고 볼 수 없고 더구나 구원을 이 세상에서의 이탈로 볼 수 없다. 진정한 구원이란 원래 하나님이 보시기에 아름다웠던 그 세상으로의 회복을 포함한다. 이런 면에서 하나님 주권 신앙 하에서 구원이란 전 인격적인 구원, 전 우주적인 구원이 된다. 그렇기 때문에 성도는 세상의 삶과 학문, 예술, 정치, 경제, 사회를 포함한 모든 분야를 하나님의 뜻 가운데서 그 원래의 목적에 부합할 수 있도록 회복시키는 일에 적극 참여해야 한다.자체가 이를 주도하기는 사실 어려움이 있다. 그리고 대형유통점이 영업행위를 영업시간제한에서부터 출점제한에 이르기까지 규제하는 건은 심사숙고하여야 한다. 대형유통점이 국가경제 및 지역사회에 미치는 영향이 부정적인가 긍정적인가에 대해 국내외 학계와 업계에서 여전히 많은 논란이 있기 때문이다. 정부와 지자체에 의한 시장개입은 반드시 필요한 경우에 한해 합당한 방법에 의해 이루어져야 한다. 대형유통점에 대한 규제는 지역사회에 미치는 영향을 다면적으로 평가한 결과에 근거하여 이루어져야 할 것이다. 대부분의 지자체는 체계적인 평가시스템과 객관적인 통계 자료를 갖고 있지 못한 실정이다. 향후 가장 시급한 과제는 시장개방 이후 지난 10년간 대형유통점이 지역사회에 미친 영향에 관한 광범위한 통계자료를 수집하고 이를 체계적으로 분석하여 정책방향을 올바르게 설정하는 것이라 할 수 있다.i와 K. pneumoniae가 존재하며 확산 중임을 시사한다. 앞으로 CTX-M형 ESBL의 만연과 변종 CTX-M형 ESBL의 출연을 감시하기 위한 정기적인 연구와 조사가 필요한 것으로 생각한다., A2-1, B1-1, B2-1의 경우, 강우 일수 감소 이전과

  • PDF

A Study on the Blockchain based Frequency Allocation Process for Private 5G (블록체인 기반 5G 특화망 주파수 할당 프로세스 연구)

  • Won-Seok Yoo;Won-Cheol Lee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.1
    • /
    • pp.24-32
    • /
    • 2023
  • The current Private 5G use procedure goes through the step of application examination, use and usage inspection, and can be divided in to application, examination step as a procedure before frequency allocation, and use, usage inspection step as a procedure after frequency allocation. Various types of documents are required to apply for a Private 5G, and due to the document screening process and radio station inspection for using Private 5G frequencies, the procedure for Private 5G applicants to use Private 5G is complicated and takes a considerable amount of time. In this paper, we proposed Frequency Allocation Process for Private 5G using a blockchain platform, which is fast and simplified than the current procedure. Through the use of a blockchain platform and NFT (Non-Fungible Token), reliability and integrity of the data required in the frequency allocation process were secured, and security of frequency usage information was maintained and a reliable Private 5G frequency allocation process was established. Also by applying the RPA system that minimizes human intervention, fairness was secured in the process of allocating Private 5G. Finally, the frequency allocation process of Private 5G based on the Ethereum blockchain was performed though a simulation.

Influences of mental health characteristics and admission experiences on perceived coercion (정신장애 특성과 입원과정의 경험들이 지각된 강요에 미치는 영향)

  • Seo, Mi Kyung;Kim, Seung-Hyun;Rhee, MinKyu;Choi, Yong-Sung;Kim, Sung-Hyun;Lee, Moon-Soo;Lee, Heon-Jeong;Kwon, Young-Joon;Kim, Bong-Jo
    • Korean Journal of Health Psychology
    • /
    • v.16 no.1
    • /
    • pp.1-14
    • /
    • 2011
  • Coercive treatment in mental health has undergone an immense period of philosophical and clinical debate and yet it remains as a highly important issue in which ideology and practice contradict each other. this study focused on the perceived coercion of the persons with mental disorder and analyzed how the characteristics of mental disorder(psychiatric symptoms, psycho-social functions, insight, and the degree of awareness on the need for treatment) and experiences in the process of hospitalization (legal status, coercive measures, and procedural justice) can predict perceived coercion. The participants of this study were 302 patients that has been hospitalized in the psychiatric ward within the period of 4 weeks. 195 participants(64.6%) were male and 106(35.1%) participants were female. MAES, BPRS, GAF, Insight, Legal Status, Coercive Measures, and Need for Treatment were measured. Regression analysis was used to analyze how much perceived coercion can be predicted by characteristics of mental disorder such as the patients' BPRS, GAF, insight, and need for treatment. As a result it showed that among the characteristics of mental disorder insight and awareness of the need for treatment were the main predictors and the characteristics of experiences during hospitalization such as procedural justice, coercive measures, and legal status all displayed significant predictability. As well as implications of results in a practical method of intervention to reduce perceived coercion, the paper discussed issues for limitations and future consideration.

A Study on the Development of Educational Subjects for Nurturing Autonomous Ship Officers Using Delphi Survey (델파이 조사를 활용한 자율운항선 해기사 양성을 위한 교과목 개발에 관한 연구)

  • Son, Jang-Yun;Shin, Yong-John
    • Journal of Korea Port Economic Association
    • /
    • v.39 no.3
    • /
    • pp.33-46
    • /
    • 2023
  • The Autonomous ships are equipped with a function to judge and navigate the sea conditions on their own, so the job of the ship officer who operates it changes. The educational curriculum to nurture ship officer with the ability to operate and manage autonomous ships must also be changed. This study aimed to develop the curriculum for training autonomous ship officer by using the Delphi survey method suitable for predicting the uncertain future. Among the current 61 subjects for training ship officer identified in the Delphi survey, 32 subjects with high importance should be maintained in the training for autonomous ship officer, and subjects with low importance should be abolished or integrated into other subjects. These subjects were collectively referred to as 'general courses'. The expert panel of the Delphi survey suggested 42 items as new subjects, with 18 items of 'high', 14 items of 'middle', and 10 items of 'low'. Through in-depth analysis of these items by experts, 27 subjects were adjusted and three courses were proposed : 1)'Basic course(10 courses)' for developing basic capabilities such as basic theories for understanding advanced technology and information applied to autonomous ships, 2)'Job course(10 courses)' for practical competency directly related to autonomous ship operation, 3)'Intensive course(7 subjects)' for fostering land remote operators of autonomous ships. Since the introduction and spread of autonomous ships will progress rapidly, research to develop and supplement autonomous ship pilot training courses should be continued by reflecting the level of autonomous navigation of autonomous ships.