• Title/Summary/Keyword: 연구목적

Search Result 55,539, Processing Time 0.086 seconds

Development of Vivorium, a new indoor horticultural ornamental plants via plant tissue culture techniques (식물조직배양 기술을 이용한 새로운 실내 원예 장식품인 비보리움(Vivorium)의 개발)

  • Hwang, Min Hee;Kim, Do Yeon;Cho, In Sun;Kim, Mi Hyung;Kwon, Hyun Sook;Kim, Jong Bo;Kim, Su Jung;Kim, Sun Hyung
    • Journal of Plant Biotechnology
    • /
    • v.48 no.3
    • /
    • pp.179-185
    • /
    • 2021
  • Indoor gardening includes wall greening, terrariums, and flower arrangements. Among these types of indoor gardens, the terrarium is easy to access for the general public, but in Korea, because of the focus on esthetics, the original purpose of creating terrariums, which was to grow plants sustainably in an enclosed space, has been lost. In addition, miniaturization of plants is required to grow plants in an enclosed space. Since the available plant species suitable for a terrarium are limited, only plants such as succulents, cacti, and moss have been used. In this study, Bronze (X Graptosedum) was used, and these problems were solved using the following three methods: placement and growth of virus-free plants in the terrarium; extending the diversity of plants with minimal size that can be planted in terrariums; and reducing the price of in vitro plants with minimal size by achieving large-scale production. In particular, tissue-cultured succulents were developed into a Vivorium by replacing the tissue culture container and renewing the composition of the plant. This paper suggests a new indoor horticultural field, Vivorium, that can improve the current limitations of terrariums and make them more accessible to the general public. The introduction and popularization of new indoor gardening fields with the increase in single-person households and indoor activities in the Pandemic era can also improve psychological stability among people and in the society.

Recovery Support Service for Neglected Children and Their Families of Origin: Status and Suggestions (방임 및 보호 아동·청소년 원가정 회복지원 시범사업의 현황과 과제)

  • Jeong, Jeeyoung;Anh, Jinkyung;Kim, Eunhye
    • Journal of Family Resource Management and Policy Review
    • /
    • v.25 no.3
    • /
    • pp.87-102
    • /
    • 2021
  • Child abuse and neglect are recently increasing in Korea, and although the government has actively improved the child protection system, the number of abused children and the rate of cases judged as abuse have continuously risen. Given that 75% of child abusers are parents, child abuse and neglect are expected to recur. To prevent such a recurrence, various intervention programs for abused children and their parents are required. The purpose of this study were to design a recovery support service process and investigate the effectiveness of pilot program for families of origin, including neglected(protected) children, to improve the system by which these programs are operated, and formulate policy alternatives that reinforce "family preservation" principles. The pilot program was implemented from June to November 2020 in 4-local healthy family support center. The number of program participants and the frequency of participation in each other differed, because of the difference in number of confirmed coronavirus cases in each region and the requirement for social distancing. Through the program, a community-based service process was developed for neglected(protected) children and their parents, and cooperative networks between related facilities and institutions were established. The study formulated the following recommendations: First, a cooperation system among government departments mandated to provide different services to neglected(protected) children is needed. Second, wider and various channels through which abused children can avail of protective services should be developed within communities. Third, more stable environments for program operation should be cultivated, and cooperative partnerships should be sought for knowledge sharing among relevant government departments. Another necessary measure is for a center to develop its own business model, in which the duplication of services provided by involved organizations is avoided. Finally, clear guidelines, administrative standards, and specific plans for program operation should be arranged. Also regional characteristics are maintained, but services should be standardized.

Christian Education for Human Spirit Transformation (인간 영의 변형을 위한 기독교교육)

  • Woo, Ji Yeon
    • Journal of Christian Education in Korea
    • /
    • v.66
    • /
    • pp.413-437
    • /
    • 2021
  • Humans are created as spiritual beings that can relate to God. However, when a human spirit refuses to transform through confronting God, it experiences a crisis. A spiritual crisis results from disconnecting with God, who is the ultimate foundation, but we humans try to overcome such absence through accomplishments and efforts. In this technological age, the ethics issues of AI (Artificial Intelligence), robots, and cloning are related to anthropology. The development of the mind, heart, and logic cannot suggest a basis for destruction and confusion as much as the development of the world. In fact, education focused on the human mind cannot be considered holistic. Mind, together with thought, will, and belief, plays a crucial role in making choices and leading a human life. So it is actively studied in other domains other than Christian education. However, although the human spirit takes care of some territory of humanity, unlike the mind, it can neither be partial nor fragmentary. Instead, it manages the transformation that influences the core of human life. Therefore, Christian education must clearly concentrate on the spirit rather than on other human elements, intentionally concerning spiritual transformation through encounters with God. In other words, Christian education is the passage connecting a human spirit to God's presence at work, which enables us to understand the human being as a whole. For this, we must put our efforts to increase the chances of encountering God through Christian education. While "Encounter" requires both parties' interaction, "Transformation" stresses God as the main agent and His proactive nature. I also want to emphasize "worship" as the opportunity to communicate and experience God in our daily lives. By examining the preparation and the process of the spiritual transformation of humans, this paper would offer a theological foundation for continued transformation of the human spirit in the faith community, rather than personal experience or conviction.

A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain (사이버 킬체인 기반 사이버 지휘통제체계 방어 및 공격 모델 연구)

  • Lee, Jung-Sik;Cho, Sung-Young;Oh, Heang-Rok;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • Cyber Kill Chain is derived from Kill chain of traditional military terms. Kill chain means "a continuous and cyclical process from detection to destruction of military targets requiring destruction, or dividing it into several distinct actions." The kill chain has evolved the existing operational procedures to effectively deal with time-limited emergency targets that require immediate response due to changes in location and increased risk, such as nuclear weapons and missiles. It began with the military concept of incapacitating the attacker's intended purpose by preventing it from functioning at any one stage of the process of reaching it. Thus the basic concept of the cyber kill chain is that the attack performed by a cyber attacker consists of each stage, and the cyber attacker can achieve the attack goal only when each stage is successfully performed, and from a defense point of view, each stage is detailed. It is believed that if a response procedure is prepared and responded, the chain of attacks is broken, and the attack of the attacker can be neutralized or delayed. Also, from the point of view of an attack, if a specific response procedure is prepared at each stage, the chain of attacks can be successful and the target of the attack can be neutralized. The cyber command and control system is a system that is applied to both defense and attack, and should present defensive countermeasures and offensive countermeasures to neutralize the enemy's kill chain during defense, and each step-by-step procedure to neutralize the enemy when attacking. Therefore, thist paper proposed a cyber kill chain model from the perspective of defense and attack of the cyber command and control system, and also researched and presented the threat classification/analysis/prediction framework of the cyber command and control system from the defense aspect

A Study on the Consciousness of Landscape Planting Practitioner about the Measurement Criteria of the Root Diameter of Landscape Trees in the Landscape Planting Construction, in Korea (우리나라 조경식재공사의 근원직경 측정기준에 대한 조경식재 실무자들의 의식)

  • Han, Yong-Hee;Min, Jong-Il;Kim, Do-Gyun
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.49 no.2
    • /
    • pp.27-40
    • /
    • 2021
  • This study was carried out for the description of the conflicts on the measurement of the root collar diameter of the landscape trees that are currently being produced, distributed, and planted in S. Korea, and for determination of the standard for root collar diameter measurement. The difference in consciousness of appropriate measurement of root collar diameter among different ages of landscape practitioners was statistically significant at p<0.05 level. It seemed to be due to the difference in the amount of field experiences among different age groups. On "the ambiguity of measuring the root collar diameter' of landscape trees", the consciousness was significantly different at p<0.05 level among job positions. On "Improvement of measurement criteria for landscape trees," it was significantly different at p<0.05 level among job types. This was thought to be due to the disagreement between the client and the contractor. On "prevention of topsoil removal" when excavating landscape trees, the consciousness was significantly different at p<0.001 level among different age groups, and different at p<0.01 level among different occupations, and different at p<0.05 level among different working area. The consciousness on "removing top soil when excavating landscape trees and rooting after transplantation" was not significantly different. The consciousness on the conflict caused by "ambiguity in root collar diameter measurement criteria" was high with an average of 3.85 for job type, occupation, jop position, and work experience. It was higher for landscape contractors than public institutions. The higher job positions and more experiences, the more conflicts. The consciousness on the appropriate position of root collar diameter measurement for landscape trees revealed that measuring at above-ground part (66.5%) was prefered to the underground part (33.0%). During the excavation of landscape trees for transplant, topsoil removal up to average depth of -2cm to -4cm was favored by 84.0%, and the purpose of removing topsoil was recognized as 'to increase the size and unit cost' by 59.7%.

Derivation of Green Coverage Ratio Based on Deep Learning Using MAV and UAV Aerial Images (유·무인 항공영상을 이용한 심층학습 기반 녹피율 산정)

  • Han, Seungyeon;Lee, Impyeong
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.6_1
    • /
    • pp.1757-1766
    • /
    • 2021
  • The green coverage ratio is the ratio of the land area to green coverage area, and it is used as a practical urban greening index. The green coverage ratio is calculated based on the land cover map, but low spatial resolution and inconsistent production cycle of land cover map make it difficult to calculate the correct green coverage area and analyze the precise green coverage. Therefore, this study proposes a new method to calculate green coverage area using aerial images and deep neural networks. Green coverage ratio can be quickly calculated using manned aerial images acquired by local governments, but precise analysis is difficult because components of image such as acquisition date, resolution, and sensors cannot be selected and modified. This limitation can be supplemented by using an unmanned aerial vehicle that can mount various sensors and acquire high-resolution images due to low-altitude flight. In this study, we proposed a method to calculate green coverage ratio from manned or unmanned aerial images, and experimentally verified the proposed method. Aerial images enable precise analysis by high resolution and relatively constant cycles, and deep learning can automatically detect green coverage area in aerial images. Local governments acquire manned aerial images for various purposes every year and we can utilize them to calculate green coverage ratio quickly. However, acquired manned aerial images may be difficult to accurately analyze because details such as acquisition date, resolution, and sensors cannot be selected. These limitations can be supplemented by using unmanned aerial vehicles that can mount various sensors and acquire high-resolution images due to low-altitude flight. Accordingly, the green coverage ratio was calculated from the two aerial images, and as a result, it could be calculated with high accuracy from all green types. However, the green coverage ratio calculated from manned aerial images had limitations in complex environments. The unmanned aerial images used to compensate for this were able to calculate a high accuracy of green coverage ratio even in complex environments, and more precise green area detection was possible through additional band images. In the future, it is expected that the rust rate can be calculated effectively by using the newly acquired unmanned aerial imagery supplementary to the existing manned aerial imagery.

Evaluation of Image Quality using SE-EPI and SSH-TSE Techniques in MRDWI (자기공명확산강조영상에서 SE-EPI 와 SSH-TSE 기법을 이용한 영상의 질 평가)

  • Goo, Eun-Hoe
    • Journal of the Korean Society of Radiology
    • /
    • v.15 no.7
    • /
    • pp.991-998
    • /
    • 2021
  • The purpose of this study is to investigate the image quality of the SE-EPI and SSH-TSE technique for MR DWI. Datum were analyzed for 35 PACS transmission datum(Normal part: 12 males, 13 females, Cerebral Infarction: 10(5males and 5females), and average age 68±7.32), randomly selected patients who underwent MRDWI tests. The equipment used was Ingenia CX 3.0T, SSH_TSE and SE-EPI pulse sequence and 32 Ch. head coil were used for data acquisition. Image evaluation was performed on the paired t-test and Wilcoxon tests, and was considered significant when the p value was 0.05 or less. As a result of quantitative analysis of SNR for DWI images, the mean and standard deviation values of 4 parts (WM, GM, BG, Cerebellum) in ADC (s/mm2), Diffusion b=0, 1000 images were higher in SE-EPI techniques(ADC: 120.50 ± 40, b=0: 54.50 ± 35.91, b=1000: 91.61 ± 36.63) than in SSH-TSE techniques(ADC: 99.69 ± 31.10, b=0: 43.52 ± 25.00 , b=1000: 60.74 ± 24.85)(p<0.05). The CNR values for GM-WM, BG-WM sites were also higher in SE-EPI technique (ADC: 116.08 ± 43.30, b=0:27.23 ± 09.10, b=1000: 78.50 ± 16.56) than in SSH-TSE(ADC: 101.08 ± 36.81, b=0: 23.96 ± 07.79 , b=1000: 74.30 ± 14.22). As a visual evaluation of observers, ghost artifact, magnetic susceptibility artifacts and overall image quality for SE-TSE and SSH-TSE all yielded high results from SSH-TSE techniques(ADC:3.6 ± 0.1, 2.8 ± 0.2, b=0: 4.3 ± 0.3, 3.4 ± 0.1 b=1000: 4.3 ± 0.2, 3.5 ± 0.2, p=0.000). In conclusion, the SE-EPI technique obtained an superiority in SNR and CNR measurements using SSH-TSE, SE-EPI. In the qualitative analysis, the SSH-TSE pulse sequence was obtained a high result according to the pulse sequence characteristics.

A Study on the Protection of Personal Information in the Medical Service Act (의료법의 개인정보보호에 관한 연구)

  • Sung, Soo-Yeon
    • The Korean Society of Law and Medicine
    • /
    • v.21 no.2
    • /
    • pp.75-103
    • /
    • 2020
  • There is a growing voice that medical information should be shared because it can prepare for genetic diseases or cancer by analyzing and utilizing medical information in big data or artificial intelligence to develop medical technology and improve patient care. The utilization and protection of patients' personal information are the same as two sides of the same coin. Medical institutions or medical personnel should take extra caution in handling personal information with high environmental distinct characteristics and sensitivity, which is different from general information processors. In general, the patient's personal information is processed by medical personnel or medical institutions through the processes of collection, creation, and destruction. Still, the use of terms related to personal information in the Medical Service Act is jumbled, or the scope of application is unclear, so it relies on the interpretation of precedents. For the medical personnel or the founder of the medical institution, in the case of infringement of Article 24(4), it cannot be regarded that it means only medical treatment information among personal information, whether or not it should be treated the same as the personal information under Article 23, because the sensitive information of patients is recorded, saved, and stored in electronic medical records. Although the prohibition of information leakage under Article 19 of the Medical Service Act has a revision; 'secret' that was learned in business was revised to 'information', but only the name was changed, and the benefit and protection of the law is the same as the 'secret' of the criminal law, such that the patient's right to self-determination of personal information is not protected. The Privacy Law and the Local Health Act consider the benefit and protection of the law in 'information learned in business' as the right to self-determination of personal information and stipulate the same penalties for personal information infringement such as leakage, forgery, alteration, and damage. The privacy regulations of the Medical Service Act require that the terms be adjusted uniformly because the jumbled use of terms can confuse information subjects, information processors, and shows certain limitations on the protection of personal information because the contents or scope of the regulations of the Medical Service Law for special corporations and the Privacy Law may cause confusion in interpretation. The patient's personal information is sensitive and must be safely protected in its use and processing. Personal information must be processed in accordance with the protection principle of Privacy Law, and the rights such as privacy, freedom, personal rights, and the right to self-determination of personal information of patients or guardians, the information subject, must be guaranteed.

Time Adverb 'Cengjing (曾經)' and 'Yijing (已經) Tense and Aspect of the Comparative Analysis of the Characteristics of China and South Korea (시간부사 '증경(曾經)', '이경(已經)' 시상(時相) 자질 중한 대조분석)

  • Han, Keung-Shuk
    • Cross-Cultural Studies
    • /
    • v.42
    • /
    • pp.451-474
    • /
    • 2016
  • Analysis of the syntactic structure of the modern Chinese adverbs for time 'Cengjing (曾經)' and 'Yijing (已經)' was performed to examine the tenses and aspects of the terms. The corresponding Korean words were examined and the terms in both languages were compared. The syntactic structures used in China and South Korea were found to be different. We hope the study of the Chinese language will help Korean students. 'Cengjing (曾經)' specific projects with 'aspect' of, 'Past experience aspect', 'Past continuous aspect', 'Past continuous aspect' in the past tense. [ED: unclear, please reword] These correspond to '_었 (았)_', '_었었_' in the Korean language. 'Yijing (已經)' has 'finished phase' of concrete projects, 'Past experience aspect', 'Past continuous aspect', also has a specific project tense, the 'past tense', 'present tense', 'future tense', and so tense. [ED: unclear, please reword] Adjectives can also be modified with a 'change of status'. These correspond to '_었 (았)_', '_고_', '_었었_', '곧' etc. in Korean. 'Cengjing (曾經)' and the dynamic auxiliary 'Guo (過)' were compared to determine whether they have the aspect and tense features. However, 'Guo (過)' can only modify the predicate verb, so it possesses only aspect characteristics. 'Cengjing (曾經)' modifies the range more widely. 'Yijing (已經)' may be modified by the adverb 'Zai (在)' whereas 'Cengjing (曾經)' may not. Additionally, 'Yijing (已經)' can be modified by predicate adjectives and noun predicates, while 'Cengjing (曾經)' cannot.

The Zhouyi and Artificial Intelligence (『주역』과 인공지능)

  • Bang, In
    • Journal of Korean Philosophical Society
    • /
    • v.145
    • /
    • pp.91-117
    • /
    • 2018
  • This paper aims to clarify the similarities and differences between the Zhouyi and artificial intelligence. The divination of the Zhouyi is rooted in the oldest system of human knowledge, while artificial intelligence stands at the cutting edge of modern scientific revolution. At first sight, there does not appear to be any association that links the one to the another. However, they share the same ground as seen from a semiotic standpoint because both of them depend on the semiotic system as a means of obtaining knowledge. At least four aspects can be pointed out in terms of similarities. First, artificial intelligence and the Zhouyi use artificial language that consists of semiotic signs. Secondly, the principle that enables divination and artificial intelligence lies in imitation and representation. Thirdly, artificial intelligence and the Zhouyi carry out inferences based on mathematical algorithms that adopt the binary system. Fourth, artificial intelligence and the Zhouyi use analogy as a means of obtaining knowledge. However, those similarities do not guarantee that the Zhouyi could arrive at the scientific certainty. Nevertheless, it can give us important insight into the essence of our civilization. The Zhouyi uses intellect in order to get new information about the unknown world. However, it is hard to know what kind of intellect is involved in the process of divination. Likewise, we do not know the fundamental character of artificial intelligence. The intellect hidden in the unknown subject is a mystic and fearful existence to us. Just as the divination of the Zhouyi inspires the sense of reverence toward the supernatural subject, we could not but have fear in front of the invisible subject hidden in artificial intelligence. In the past, traditional philosophy acknowledged the existence of intellect only in conscious beings. Nonetheless, it becomes evident that human civilization ushers into a new epoch. As Ray Kurzweil mentioned, the moment of singularity comes when artificial intelligence surpasses human intelligence. In my viewpoint, the term of singularity can be used for denoting the critical point in which the human species enters into the new phase of civilization. To borrow the term of Shao Yong(邵雍) in the Northern Song Dynasty, the past civilization belongs to the Earlier Heaven(先天), the future civilization belongs to the Later Heaven(後天). Once our civilization passes over the critical point, it is impossible to go back into the past. The opening of the Later Heaven foretold by the religious thinkers in the late period of Joseon Dynasty was a prophecy in its own age, but it is becoming a reality in the present.