• Title/Summary/Keyword: 타인평가

Search Result 199, Processing Time 0.029 seconds

A Study on Effect of the Equity and the Cognitive Performance on the Flow Experience of the Game playing (자아효능감이 게임의 몰입에 미치는 영향)

  • Choi, Dong-Seong;Kim, Jin-Woo
    • Journal of Korea Game Society
    • /
    • v.9 no.3
    • /
    • pp.87-96
    • /
    • 2009
  • According to the Flow Theory, when the perceived level of Challenges of player and his skill are high, he is able to experience the flow state. What does the skill mean in the Flow Theory? This study suggests that the self-efficacy of the actor should be concerned to understand the perceived level of actor's skill in relation to the level of Challenges and his personal characteristics. This study hypothesizes the equity-distribution of extrinsic reward and the positive reputation influence the player's self-efficacy, and his self-efficacy affect the flow experience. This hypothesis is confirmed by the structure equation model test. This result can serve to understand skill related on the flow theory, and what factors players to get flow experience are given by.

  • PDF

User Authentication Mechanism using Smartphone (스마트폰을 이용한 사용자 인증 메커니즘)

  • Jeong, Pil-seong;Cho, Yang-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.301-308
    • /
    • 2017
  • With the popularization of smart phones and the development of the Internet, many people use smart phones to conduct identity verification procedures. smart phones are easier and faster to authenticate than personal desktop computers. However, as Internet hacking technology and malicious code distribution technology rapidly evolve and attack types become more diverse, authentication methods suitable for mobile environment are required. As authentication methods, there are methods such as possessive-based authentication, knowledge-based authentication, biometric-based authentication, pattern-based authentication, and multi-element authentication. In this paper, we propose a user authentication mechanism that uses collected information as authentication factor using smart phone. Using the proposed authentication mechanism, it is possible to use the smart phone information and environment information of the user as a hidden authentication factor, so that the authentication process can be performed without being exposed to others. We implemented the user authentication system using the proposed authentication mechanism and evaluated the effectiveness based on applicability, convenience, and security.

Performance Evaluation of Authentication Protocol for Mobile RFID Privacy (모바일 RFID 프라이버시를 위한 인증 프로토콜 성능 평가)

  • Eom, Tae-Yang;Yi, Jeong-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.6B
    • /
    • pp.618-630
    • /
    • 2011
  • Mobile RFID system, that consists of the existing RFID reader mounted on the mobile devices such as smartphones, is able to provide the users a variety of services and convenience. Although the users can get the information about a certain product anytime anywhere, there is high probability that their privacy may be violated because their belongings with RFID tags can be scanned by other mobile readers at any time. Several RFID authentication schemes have been proposed to deal with these privacy issues. However, since the existing solutions require heavy computation on the tag side, most of them is not applicable to the general low-cost passive tags which do not have any processing unit. In this paper, we propose the efficient authentication scheme for mobile RFID system applicable to the passive tags as well as the active ones by the best use of computing capability of mobile devices. The proposed scheme satisfies the import security issues such as tag protection, untraceability, anti-traffic analysis. We also implement the proposed scheme on top of real smartphone for feasibility and show the experimental results from it.

A Study on Unconsciousness Authentication Technique Using Machine Learning in Online Easy Payment Service (온라인 간편 결제 환경에서 기계학습을 이용한 무자각 인증 기술 연구)

  • Ryu, Gwonsang;Seo, Changho;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1419-1429
    • /
    • 2017
  • Recently, environment based authentication technique had proposed reinforced authentication, which generating statistical model per user after user login history classifies into account takeover or legitimate login. But reinforced authentication is likely to be attacked if user was not attacked in past. To improve this problem in this paper, we propose unconsciousness authentication technique that generates 2-Class user model, which trains user's environmental information and others' one using machine learning algorithms. To evaluate performance of proposed technique, we performed evasion attacks: non-knowledge attacker that does not know any information about user, and sophisticated attacker that only knows one information about user. Experimental results against non-knowledge attacker show that precision and recall of Class 0 were measured as 1.0 and 0.998 respectively, and experimental results against sophisticated attacker show that precision and recall of Class 0 were measured as 0.948 and 0.998 respectively.

Is Arab-Israeli Conflict Terminable?: Analysing Robert Hazo (아랍-이스라엘 분쟁의 종식 가능성 연구: 로버트 하조의 논의 분석)

  • Chun, Kwang Ho
    • International Area Studies Review
    • /
    • v.15 no.2
    • /
    • pp.25-47
    • /
    • 2011
  • The paper will investigate the chances of progress in the peace process in Middle East. Robert Hazo's 1993 article mainly argued the Palestinians and Syrian problems. He saw that these two problems are one of the key issue that current Middle East problem which involves Israel. The key tenants of his argument will be dissected to assess whether this view holds true in the light of developments in the Middle East in the intervening years. The Arab-Israeli struggle remains one of the most intractable in history. In 1993 Robert Hazo concluded that 'the conflict is a terminal struggle'. This paper investigates his analysis in light of progress or lack of in the intervening period and against the contemporary strategic environment. It uses information presented in academic, government, newspaper and world wide web articles to conclude that Hazo's assessment remains valid. While the various talks since 1993 combined with the potential benefits the United States, Israel and Syria could gain from a settlement proffer hope, the issue of 'right of return, borders and Jerusalem are unlikely to be bridged in the near future.

The Effects of Forest Experience Activities on Promoting Children's Community Spirit (숲 체험 활동이 유아의 공동체 의식함양에 미치는 효과)

  • Kang, Young-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.12
    • /
    • pp.494-501
    • /
    • 2020
  • This study is aimed at exploring the effects of forest experience activities on promoting children's community spirit. To achieve this, a pre-post survey was empirically carried out with 40 children at Kindergarten A in the city of Chungnam. The comprehensive findings showed a significant difference between the experimental group, which had forest experience activities, and the control group, which had outdoor activities based on the existing Nuri curriculum. Based on a pre-test for intimacy, emotion, mutual public awareness, and participation consciousness as sub-factors of community spirit, which adopted all the research hypotheses, the results suggest that the forest kindergarten will become an educational place for children. Consequently, personality education using nature in forest kindergartens can become an excellent goal, helping to boost the development of children's sensitivity and emotional stability through awakening the five senses; building up self-awareness, self-reliance, and trust; learning consideration and respect for others; and developing positive attitudes, sociality, potential, imagination, and creativity through forest activities with their peers.

The Effect of Design Thinking Based Artificial Intelligence Education Programs on Middle School Students' Creative Problem Solving Ability

  • Seung-Ju, Hong;Seong-Won, Kim;Youngjun, Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.2
    • /
    • pp.227-234
    • /
    • 2023
  • In this paper, we developed a design thinking-based artificial intelligence education program for middle school students and applied it to verify the impact on creative problem-solving skills. The inspection tool used the Creative Problem Solving Profile Inventory (CPSPI), an inspection tool for measuring creative thinking type ability based on the CPS theory of Hwasun Lee, Jungmin Pyo, Insoo Choe(2014). CPSPI included the steps of evaluating cognitive preferences and cognitive abilities by supplementing the limitations of existing tests, and sharing and persuading one's ideas with others. Before and after applying the design thinking-based artificial intelligence education program, as a result of analyzing the creative problem-solving ability, it increased significantly in all areas. As a result of analyzing the creative problem-solving ability of middle school students, significant results were found in the areas of Problem Detection and Analysis, Idea Generation, Action plan, Execution, Persuasion and Communication. The effect of design thinking was confirmed as a teaching and learning method to improve creative problem-solving ability in artificial intelligence education.

Design and Implementation of Biometrics Security System Using photoplethysmogram (광용적맥파를 이용한 생체인식 보안시스템의 설계 및 구현)

  • Kim, Hyen-Ki
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.4
    • /
    • pp.53-60
    • /
    • 2010
  • Biometrics are methods of recognizing a person based on the physiological or behavioral characteristics of his of her body. They are highly secure with little risk of loss or falsification by others. This paper has designed and implemented a security system of biometrics by precisely measuring heartbeat signals at two fingertips and using a photoplethysmogram, which is applicable to biometrics. A performance evaluation has led to the following result. The security system of biometrics for personal authentication which has been designed and implemented by this study has achieved a recognition rate of 90.5%. The security system of biometrics suggested here has merits of time saving and easy accessibility. The system is touch-based and collects the necessary biometrics information by simply touching the machine with fingers, so anyone can utilize the system without any difficulty.

A Case Study on the Socially-Prescribed Perfectionistic Client: Focused on Fairbairn's Psychological Structure (사회부과적 완벽주의 성향의 내담자 단일사례연구: Fairbairn의 심리구조를 중심으로)

  • Joon Sik Ko;In Sook Ahn
    • Industry Promotion Research
    • /
    • v.8 no.2
    • /
    • pp.109-117
    • /
    • 2023
  • Modern industrial society demands socially-prescribed perfectionism from office workers and causes self-discrepancy. Therefore, the purpose of this study was to propose a counseling strategy that integrates the divided self based on Fairbairn's psychological structure and reduces self-discrepancy by changing interpersonal relation patterns. 14 sessions were conducted once a week from March 2022 to July 2022. T-test was used as a research method to compare the level of self discrepancy by conducting the Self Questionnaire before and after. During the initial stage, the client was in conflict with his boss and showed anger, depression, somatic symptoms such as gastrointestinal disorder, strict judgement on himself and others, and high self-discrepancy. This research showed that the client's libidinal ego and anti-libidinal ego were de-repressed and integrated into his central ego, and his self-discrepancy level was decreased, which was confirmed through the pre-post test. This research, as a case study applying Fairbairn's psychological structure, has a meaning that it confirmed a change in the interpersonal relation patterns of a socially-prescribed perfectionistic client.

Prediction of Variations for Instream Flow with Considerations of Water Rights (수리권을 고려한 하천유지유량 변화 예측연구)

  • Kim, Se Min;Lee, Jin Gyu;Park, Young Ki
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.375-375
    • /
    • 2022
  • 수리권(水利權, Water Right)은 특정인이 하천의 물을 계속적, 배타적으로 사용하는 권리로서, 국내에서는 민법 제231조 "공유하천의 연안에서 농, 공업을 경영하는 자는 이에 이용하기 위하여 타인의 용수를 방해하지 아니하는 범위 내에서 필요한 인수를 할 수 있다." 라는 규정을 통해 공유하천 용수권을 인정하면서, 동법 제234조 "전 3조의 규정은 다른 관습이 있으면 그 관습에 의한다." 라는 조항을 통해 관습에 의한 즉, 관행 수리권을 인정하고 있다. 또한, 하천법 제50조 "생활·공업·농업·환경개선·발전·주운(舟運) 등의 용도로 하천수를 사용하려는 자는 대통령령으로 정하는 바에 따라 환경부장관의 허가를 받아야 한다." 라는 규정을 통해 허가 수리권을 규정하고 있다. 이와 같이 국내의 경우 수리권에 대하여 공용하천 용수권, 관행수리권 및 허가수리권이 혼재되어 있어 지역 간의 물 분쟁이 심화되어 가고 있는 상황에서 수리권의 정립 필요성이 절실해지고 있지만, 제도적 연구와 더불어 이를 뒷받침 해줄 수문학적 연구가 상대적으로 부족한 실정이다. 본 연구는 동진강 유역을 대상으로 수정 3단 TANK 모형을 적용하여 자연하천유량 산정하였고, 수리권 분석모형인 WRAP(Water Rights Analysis Package, WRAP)을 이용하여 수리권 분석을 수행하였다. 또한 섬진강댐의 방류조건 및 유역내 물 이용조건에 따른 시나리오를 구성하여 하천유지유량의 변화를 모의하였다. 시나리오 적용에 따른 대표지점의 조절하천유량을 모의한 결과 시나리오3, 시나리오4, 시나리오5(비관개기기간 동안 용수 추가확보를 통한 증가방류)에서 하천유지유량이 상대적으로 많아지는 것으로 모의되었다. 또한, 시나리오1, 시나리오2(유역내 저수지 방류량을 연중 일정량 공급)방안도 관개기와·비관개기 기간에 대표지점의 하천유지유량 증가에 효과가 있는 것으로 평가되었다. 연구 대상기간의 대부분은 수리권 목표량을 만족하였지만, 갈수년에 해당하는 2017년의 경우에는 용수 확보량이 가장 많은 시나리오5를 적용한 경우에도 수리권 전환량 및 하천유지유량의 부족이 발생하는 것으로 모의되었다. 유역내 수리권 우선순위의 변경을 통한 유량의 변화를 모의하기 위하여 2017년을 대상년도로 모의해본 결과 연구대상지역의 하류에 위치하고 있는 농업용보에서의 수리권을 후순위로 두었을 때, 대표지점에서 가장 많은 양의 유량을 확보하는 것으로 분석되었다.

  • PDF