• Title/Summary/Keyword: 새로운 인간

Search Result 1,681, Processing Time 0.029 seconds

A Study on the Direction of Ubiquitous Space Development through the Analysis on Case Studies (연구 사례 분석을 통한 유비쿼터스 공간 개발 방향에 관한 연구)

  • 홍관선;이혁수
    • Archives of design research
    • /
    • v.16 no.3
    • /
    • pp.391-400
    • /
    • 2003
  • As the change of information and digital technology progresses, ubiquitous space is attracting attention as a new space concept in which the physical and digital spaces are connected to each other. As its meaning in latin itself - 'there exist everywhere at the same time'- implies, however, the ubiquitous space has been mostly discussed in a non-physical aspect, such as in a technological area, rather than its physical intrinsic property until now. Although theories regarding a ubiquitous city have been rarity suggested, in most cases, technological aspects such as the systemization or networking of individual information service have been the focus. However, one of the intentions induced in the concept that scholars including Mark weiser and Sakamura Ken introduced was to place humans in the center of the space in which the technology has been placed instead of humans. For this purpose, the renovation of human interface must be required. As technology develops, the achievement of ubiquitous space may be possible, and efforts to apply this to real space are making an appearance. The examples of the present research are the spaces that have a characteristic of the laboratory separated from life in the city, and the construct scale is in the level of an individual facility; therefore, further studies should functionally and spaciously connect all subjects existing in space and effectively relate this to real world. The present research is intended to demonstrate the investigation on several projects that are currently underway and the developmental direction of new, ubiquitous space.

  • PDF

Investigation of Detected by Recent Various Human Papillomavirus from General Hospital in Seoul Area (최근 서울지역 종합병원에서 다양한 인유두종바이러스의 검출에 대한 실태조사)

  • Lee, Jun-Beom;Park, Chang-Eun
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.48 no.3
    • /
    • pp.247-254
    • /
    • 2016
  • Human papillomavirus (HPV) infection is a necessary precondition of cervical cancer. A change from cytology to molecular HPV testing is, however, challenging. A new HPV DNA chip test for the infection of 22 HPV genotypes were developed in Korea. The purpose of this study was to investigate the prevalence and genotype distribution of HPV infection in the Seoul area. Over the last year, a total of 5,614 samples were tested. Using a chip test, HPV genotypes were detected in 1,596 (28.4%); of which, 679 (42.5%) were considered as high risk and low risk HPV were 152 (9.5%). 831 were single positive samples (n=1596). The most frequently found genotypes in all HPV-single positive samples (n=831) were HPV-16 (16.5%), 58 (15.2%), 52 (8.8%), 51 (7.1%) and 56 (5.9%). Mixed genotypes (n=219) were detected in 2 (n=176, 11.0%), 3 (n=37, 5.9%), and 4 (n=2, 0.1%) positive samples (n=1596). This study demonstrated that epidemical investigated HPV infection in patients of general hospital. These findings could be used to indicate a nationwide distribution of HPV and the adoption of vaccines. It is hoped that additional epidemiological research regarding the outcomes that are important to decision makers will be conducted.

A Study of International Confrontation on the Prevention of Cyber Crime (사이버범죄에 대한 국제적 대응방안)

  • Jeong, Jeong-Ile
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.323-354
    • /
    • 2005
  • As with the vast array of computer technology and its rapid development, along with the entry of the internet as one of the necessities of life, the so-called cyber space has become a vital component of our modern day living. While such cyber space has provided the society with much convenience and utility as to the gathering and acquiring of information, crimes involving cyber space has accordingly increased in both number and form, Nevertheless, the conventional law as existed before the development of the cyber space were unable to meet the demands of this new breed of crime, which inevitably led to the gap in the government ability to punish such criminals, Thus, in response to the rising number of cyber crimes, a large number of nations have either created or is in the process of committing human and financial resources to strengthen the investigative powers relating to cyber crimes and creating a new area of prohibiting such crimes. As a overview of cyber crime, (1)defines the terms, describes features of cyber crime, (2)explains the international prevention necessity of cyber crime, and (3)the necessity of legislating the cyber crime Fundamental Act (4)the recognition of the evidential values on the confiscated electronic records and reviews types of cyber crime including cyberterror. Lastly, emphasizes necessity on international cooperation for prevention of cyber crime as usual.

  • PDF

A Study on the Experience Design Construction and Its Application Model (경험디자인의 구성과 적용 모형에 관한 연구)

  • 윤세균;김태균;채승진
    • Archives of design research
    • /
    • v.16 no.4
    • /
    • pp.289-298
    • /
    • 2003
  • The 21st century could be called the age of Experience Economy associated with the importance to external and internal experience of product users. It needs the understanding of customer's needs in new point of view. In the area of design development, it requires the extensive application of experience from traditional method that was based on the style and usability to more advanced concept. To correspond to these changes, we need to explore new customer's value system for knowledge-information design and systematic approaches to experience system. The purpose of this research is to define the concept of 'experience' newly in the importance side of customer's life, form a clear definition of experience design and present the model of application system. Theoretical frameworks of this research are based on the Empiricism and John Dewey's theory. By applying these frameworks make dear the concept of experience concept and reanalysis the meaning and style in the perspective of design. In this process, we can extract the main factors that inducing the experience, create new application system and model again to the field of design. Application model can creates various experiences through supplying different experience style and factors for customer, make customer realize experience object. Experience designs offer optimal experience to users by making a plan and design experience to user's goal.

  • PDF

How Does Giftedness Coexist with Autistic Spectrum Disorders (ASD)? Understanding the Cognitive Mechanism of Gifted ASD (영재성과 자폐성장애는 어떻게 공존하는가? 자폐성장애 영재의 인지메카니즘에 대한 이해)

  • Song, Kwang-Han
    • Journal of Gifted/Talented Education
    • /
    • v.21 no.3
    • /
    • pp.595-610
    • /
    • 2011
  • It is hard to understand the coexistence of giftedness and disorder in an individual, but the twice-exceptional is widely recognized now. Gifted autistic spectrum disorder is one of its subtypes in which giftedness exists with autistic spectrum disorder (ASD) simultaneously. Like other constructs including giftedness, the nature of gifted ASD has not been understood in a fundamental and wholistic manner. This paper suggests a cognitive mechanism of gifted ASD based on the integrated model of human abilities(Song, 2009; Song & Porath, 2005), which explains how giftedness coexists with ASD and interacts with each other, producing the characteristics of gifted individuals with ASD. According to the suggested mechanism, the excessive growth of mental spaces in the brain may cause ASD. The over-grown mental spaces result in excessively strong short-term sensory memory and better facility of processing, promoting internal cognitive activities on one hand, but relative lack of cognitive activities in the real world space results in ASD symptoms on the other hand. The cognitive structure of gifted ASD students also contributes to the presentation of giftedness in specific domains. This study suggests that gifted individuals with ASD need to be discouraged from fully engaging in domains they are interested in or the most confident of, rather to be encouraged to invest their giftedness to overcome their ASD symptoms. This study also provides new perspectives on theoretical and educational approaches for gifted ASD.

Key Update Protocols in Hierarchical Sensor Networks (계층적 센서 네트워크에서 안전한 통신을 위한 키 갱신 프로토콜)

  • Lee, Joo-Young;Park, So-Young;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.541-548
    • /
    • 2006
  • Sensor network is a network for realizing the ubiquitous computing circumstances, which aggregates data by means of observation or detection deployed at the inaccessible places with the capacities of sensing and communication. To realize this circumstance, data which sensor nodes gathered from sensor networks are delivered to users, in which it is required to encrypt the data for the guarantee of secure communications. Therefore, it is needed to design key management scheme for encoding appropriate to the sensor nodes which feature continual data transfer, limited capacity of computation and storage and battery usage. We propose a key management scheme which is appropriate to sensor networks organizing hierarchical architecture. Because sensor nodes send data to their parent node, we can reduce routing energy. We assume that sensor nodes have different security levels by their levels in hierarchy. Our key management scheme provides different key establishment protocols according to the security levels of the sensor nodes. We reduce the number of sensor nodes which share the same key for encryption so that we reduce the damage by key exposure. Also, we propose key update protocols which take different terms for each level to update established keys efficiently for secure data encoding.

A Study on the Possibility of Assuring 'The Right to be Forgotten' Through the Digital Extinction Technology (디지털 소멸 기술을 통한 잊힐 권리의 보장 가능성 연구)

  • Joo, Moon-ho;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.435-447
    • /
    • 2016
  • As data can be permanently stored and freely distributed, in modern society, the Internet became a world that remembers everything forever. Because of that, there has been increasing the number of accident with never-forgetting data and, as a result, a movement has been emerged to apply a notion of 'oblivion' to internet world. The movement is called 'The right to be forgotten.' However, 'The right to be forgotten' in a higher level which internet users want to be guaranteed is very limited in the juridical approach because of the confliction with the other basic rights and problems. On the other hand, the requests of individuals to guarantee 'The right to be forgotten' has been urged digital extinction technology, such as volatile SNS, Digital Aging System, to be developed. With introduction of oblivion, digital extinction technology with setting expire date on digital information can present a new solution on assuring 'The right to be forgotten.' This research establishes the detail scope of, analyzes the level of assurance of, and, through digital extinction technology with the established scope, suggest the potential assurance of the 'The right to be forgotten'.

An Experimental Research on the Usability of Indirect Control using Finger Gesture Interaction in Three Dimensional Space (3차원 공간에서 손가락 제스쳐 인터랙션을 이용한 간접제어의 사용성에 관한 실험연구)

  • Ham, Kyung Sun;Lee, Dahye;Hong, Hee Jung;Park, Sungjae;Kim, Jinwoo
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.11
    • /
    • pp.519-532
    • /
    • 2014
  • The emerging technologies for the natural computer interaction can give manufacturers new opportunities of product innovation. This paper is the study on a method of human communication about a finger gestures interaction. As technological advance has been so rapid over the last few decades, the utilizing products or services will be soon popular. The purpose of this experiment are as follows; What is the usefulness of gesture interaction? What is the cognitive impact on gesture interaction users. The finger gestures interaction consist of poking, picking and grasping. By measuring each usability in 2D and 3D space, this study shows the effect of finger gestures interaction. The 2D and 3D experimental tool is developed by using LeapMotion technology. As a results, the experiments involved 48 subjects shows that there is no difference in usability between the gestures in 2D space but in 3D space, the meaningful difference has been found. In addition, all gestures express good usability in 2D space rather than 3D space. Especially, there are the attractive interest that using uni-finger is better than multi-fingers.

Recognition of Overlapped Sound and Influence Analysis Based on Wideband Spectrogram and Deep Neural Networks (광역 스펙트로그램과 심층신경망에 기반한 중첩된 소리의 인식과 영향 분석)

  • Kim, Young Eon;Park, Gooman
    • Journal of Broadcast Engineering
    • /
    • v.23 no.3
    • /
    • pp.421-430
    • /
    • 2018
  • Many voice recognition systems use methods such as MFCC, HMM to acknowledge human voice. This recognition method is designed to analyze only a targeted sound which normally appears between a human and a device one. However, the recognition capability is limited when there is a group sound formed with diversity in wider frequency range such as dog barking and indoor sounds. The frequency of overlapped sound resides in a wide range, up to 20KHz, which is higher than a voice. This paper proposes the new recognition method which provides wider frequency range by conjugating the Wideband Sound Spectrogram and the Keras Sequential Model based on DNN. The wideband sound spectrogram is adopted to analyze and verify diverse sounds from wide frequency range as it is designed to extract features and also classify as explained. The KSM is employed for the pattern recognition using extracted features from the WSS to improve sound recognition quality. The experiment verified that the proposed WSS and KSM excellently classified the targeted sound among noisy environment; overlapped sounds such as dog barking and indoor sounds. Furthermore, the paper shows a stage by stage analyzation and comparison of the factors' influences on the recognition and its characteristics according to various levels of noise.

The Development of Neural Network Model to Improve the Reliability of the Demand/Effort Model for Evaluating Highway Safety (도로위험도를 평가하는 요구/노력모형의 신뢰도 향상을 위한 신경망 모형 개발)

  • Jeong, Bong-Jo;Gang, Jae-Su;Jang, Myeong-Sun
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.2
    • /
    • pp.95-105
    • /
    • 2009
  • Traffic accidents on highways are likely to happen when there is an imbalance in the complex relationships among key elements such as road geometries, driver related factors, and mechanical performances. The Demand-Effort Model (DEM), which evaluates highway safety, can be explained by the imbalance, which occurs when the level of demand of the driver's attention to the road environment exceeds that of the response from the driver. This study suggests a new model that improves the reliability of the current DEM through the reinterpretation on the physiological signals with the help of the Neural Network Model (NNM). The data were collected from 149 subjects, who drove a test vehicle on the Yongdong, Honam, and Seohaean Expressways in Korea. Three important results could be drawn from the recursive tests as follows; (1) Only 5 out of 10 parameters on the physiological signals which are currently used were proven to be meaningful through the Normality Test, Cluster Analysis, and Mann-Whitney Analysis. (2) The revised DEM, which internally uses the NNM, showed more reliable results than existing DEM. Group 1, which is based on the new DEM showed 80.0% of accuracy in measuring the level of driver's efforts, however, that of Group 2 based on the current DEM was 74.3%. (3) Field tests on the Honam Expressway showed lower 'type II error' with the new DEM (40.5%) than the old DEM (58.8%). The DEM is designed as a quick and easy way to determine highway safety prior to the minute road safety audit (RSA) by a professional audit team. Then a new DEM, which is based on the NNM, needs to be considered since it showed higher reliability and lower error.