• Title/Summary/Keyword: 통신학교

Search Result 909, Processing Time 0.025 seconds

Comparison of Endotracheal Intubation to Transfer - A Study of Simulation Using the SALT - (이송 중 기관내 삽관의 효율성 비교 - SALT를 이용한 시뮬레이션 연구 -)

  • Yun, Seong-Woo;Jung, Jun-Ho;Lee, Hyo-Ju;Choi, Mi-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.300-302
    • /
    • 2022
  • The purpose of this study is to compare the speed, confidence, and ease of endotracheal intubation in a transfer posture by using the SALT(Supraglottic Airway Laryngopharyngeal Tube), and a direct laryngoscope to improve the ability to implement professional airway management. The subject of the study was an experimental study by a randomized crossover design, targeting 28 first-class emergency medical technicians working in J-do fire station, and the SPSS 20.0 version was used for data analysis. The endotracheal intubation by using SALT showed a significant difference in speed compared to endotracheal intubation by using a direct laryngoscope(p<.001), and also showed a significant difference in confidence and ease(p<.001). If it is transfer to endotracheal intubation by direct laryngoscope, or in the case of transfer patients, if SALT is used, safe and rapid intubation will be possible.

  • PDF

A Study on Privacy Violation Vulnerability Through E-Mail Sent to Expired Domains (만료된 도메인의 전자우편을 통한 개인정보 유출에 관한 연구)

  • Kim, DongHyun;Hong, YunSeok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.146-149
    • /
    • 2022
  • With internet development, many peoples use their email to exchange documents, register for web services, and much more. Some individuals/organizations (including educational institutions) use their own domain name for email instead of a domain provided by commercial email services. However, suppose the domain used for custom email expires. In that case, other individuals/organizations can reuse the domain, and the new domain owner can send and receive all emails incoming to the domain. It makes us concerned about Privacy violations. Email that new domain owners can look into also contains sensitive emails like password reset notifications, credit card statements, order history, and more. In this research, we would like to describe the privacy violations caused by the expired domain used for email that did not remove all dependencies of email users and propose a solution.

  • PDF

Behavioral Theory-Based Risk Node Judgment Algorithm for Evaluating the Crime Risk Level in Restrooms (화장실의 범죄위험도 평가를 위한 행동이론 기반 리스크 노드 판정 알고리즘)

  • Shin-Sook Yoon;Jeong-Hwa Song
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1197-1206
    • /
    • 2023
  • To assess the risk level of a public restroom implemented in virtual reality, we sought to evaluate the spatial elements present in the restroom. To provide the theoretical foundation for the evaluation subjects and criteria, we introduced prior research that proposed a checklist to entance the safety of public restroom. To set up evaluation criteria, we analyzed and established based on the theories of Paul J. Brantingham and Patricia L. Brantingham, focusing on the interaction between space and criminals. Ronald V. Clarke's "Routine Activity Theory" was also introduced and incorporated into the evaluation approach. We analyzed based on the correlation between the criminal, user, and spatial elements of the public restroom in terms of the criminal's actions, the spatial relevance to crime, and user exposure during use. Using these criteria, we developed an algorithm to evaluate th spatial elements of public restroom. Based on this, we created an application, demonstrating the feasibility of developing on evaluation tool.

A Study on Establishing Scientific Guard Systems based on TVWS (TVWS 기반 과학화경계시스템 구축방안 연구)

  • Kyuyong Shin;Yuseok Kim;Seungwon Baik
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.81-92
    • /
    • 2023
  • In recent years, the ROK military is promoting Defense Innovation 4.0 with the goal of fostering strong military based on science and technology equipped with artificial intelligence(AI) to prepare for the upcoming population cliff. In particular, at the present time of increased threats of North Korea, the South Korean military is seeking to deal with a decrease in military service resources through the introduction of a Scientific Guard System using advanced technology. TICN which is a core basic communication system to ensure the integrated combat capability of the ROK military is, however, limited to use as a based network for the emerging Scientific Guard System due to the narrow transmission bandwidth with widely spread poor reception area. To deal with this problem, this paper proposes TVWS-based Scientific Guard Systems with TVWS-based wireless network construction technology that has been available for free in Korea since 2017. The TVWS-based Scientific Guard System proposed in this paper, when compared to the existing wired network-based Scientific Guard Systems, has various advantages in terms of minimizing operational gaps, reducing construction costs, and flexibility in installation and operation.

Analysis of Instruction Design Factors for Information Communication Ethics Education of Primary and Secondary Schools by Using Conjoint (컨조인트 분석을 이용한 초·중등학교 정보통신윤리교육 수업 설계 요소 분석)

  • Park, Chan-Jung
    • The Journal of Korean Association of Computer Education
    • /
    • v.10 no.1
    • /
    • pp.9-19
    • /
    • 2007
  • Recently, since the importance of the information communication ethics education for primary and secondary schools has being highlighted, researches and new instructional materials have been published actively. On the other hand, with the advance of e-learning, the various kinds of educational methods which consider the characteristics and the requirement of students are being developed. The educational method for Information Communication Ethics education is no exception. If the practical method for Information Communication Ethics education which considers students' requirements is developed, then a better educational effect can be acquired. In this paper, we decompose instructional design features into 4 components such as goal, model, contents, and media in order to design a better instruction for Information Communication Ethics education. And then, we analyze the relative importance of the instructional design components by using Conjoint method based on our questionnaire result. Finally, we propose an instructional design method for Information Communication Ethics as well as examine the differences among the instructional design components.

  • PDF

Analysis and Suggestions on the Present Levels of ICT Utilization Ability of Preservice Teachers' in College of Education according to ISST (교원정보활용능력기준(ISST)에 따른 사범대 예비 교사의 정보통신기술활용능력 수준 현황 분석 및 개선방안)

  • Jeon Mi-Yeon;Kim Eui-Jeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.837-840
    • /
    • 2006
  • While great efforts are being exerted on the reform of teacher training to provide integrated use of ICT in a teaching-learning process with educational informatization, it is still indicated that a teachers' training school fails to prepare leachers for incorporating information Communication and Technology (ICT) properly into an instructional process. Based on this awareness, this study aims at examining and analyzing the ability level of In utilization training for preservice teachers and thus at providing basic data to perform ICT utilization teaching-learning according to the seventh curriculum in a school. For this purpose, a survey was conducted with preservice teachers (seniors) in a college of education, Kongju National University and the collected data were analyzed using a Statistical Package for the Social Science (SPSS) 12.0 program.

  • PDF

A Study on The Characteristics of U-slot Microstrip Antenna (U-slot형 마이크로스트립 안테나 특성 연구)

  • Yong-Wook Park
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.25-30
    • /
    • 2024
  • The modern society has become full-fledged entry into the information age since spread of Internet. In the information age, internet was developed from the wired access to the wireless Internet access. When a surge in demand for wireless Internet access, efficiency and performance of 2.4GHz band which leads to saturation of the communication was significantly fall. Accordingly, the communication of the 5GHz band came to be interested. In this paper, we studied the design and fabrication of u-slot microstrip patch antenna to be used in wireless communication systems operating at around 5GHz band. To obtain antenna parameters such as patch size, inter patch space, antenna was simulated by HFSS(High Frequency Structure Simulator). From these parameters, u-slot microstrip antenna is fabricated using FR-4 substrate of dielectric constant 4.4. The characteristics of fabricated antenna were analyzed by network analyzer.

Development and Evaluation of UX Design Centered STEAM Career Education Program Utilizing Personas Models (페르소나 모델을 통한 UX 디자인 STEAM 활용 진로교육 프로그램 개발 및 효과분석)

  • Jeon, Jinsoo;Park, Namje
    • Journal of The Korean Association of Information Education
    • /
    • v.19 no.1
    • /
    • pp.77-86
    • /
    • 2015
  • The purpose of this paper is to give the opportunity to explore the career in UX(User Experience) designer and presents how to teach for UX design that is stressed in IT industry recently. We develop the textbook which is for 3 class periods for STEAM career exploration of UX designer for K-3 and K-4 students considering their students' intellectual level, prior knowledge and interests. We will offer this program to K-3 and K-4 students, soon. It will be expected that students can accept the knowledge about UX design and explore the career for UX designer.

Implementation of Electricity Power Management System for Industries based on USN (USN 기반의 산업용 전력관리시스템 구현)

  • Kim, Min-Ho;Lee, Nam-Gil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.103-109
    • /
    • 2012
  • In this paper, We suggest electricity power management system which makes a good efficient and minimize wasteness of electricity power. We made electricity power management system based USN(Ubiquitous Sensor Network) for industries, factories, public offices and so on, with optimized system. Simply, we can measure and control electricity power as we plug it outlets. This system can monitor and control electricity power, organizing network of PLC(Power Line Communication) and TCP/IP with the sensor for electricity power. Through the acquisition data, this proposed system can manage and save the electricity power efficiently and also we can connect this system to server, anytime, anywhere with Android phone.

A Study on the Computer-Aided Use of Information among School Children (초등학생의 컴퓨터를 활용한 정보 이용 실태 분석 -정보통신 윤리교육의 측면에서-)

  • Lee, Kwang-Woo;Kim, Young-Ki
    • 한국정보교육학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.161-171
    • /
    • 2006
  • 본 연구의 목적은 초등학생의 컴퓨터 이용 실태를 분석하여 정보통신 윤리교육에 보다 나은 방향을 제시하기 위해 다음과 같은 연구 문제를 제시하여 연구하였다. 첫째, 초등학생의 컴퓨터 이용 실태는 어떠한가? 둘째, 초등학생의 인터넷 이용과 대화방 사용실태는 어떠한가? 셋째, 초등학생의 불법 복제와 정보통신 윤리 실태는 어떠한가? 위와 같은 연구문제를 해결하기 위해 인천광역시 서구 지역에 있는 초등학교 학생들에게 설문지를 배부하여 응답하도록 하였으며 그 설문자료를 분석한 결과를 요약하면 다음과 같다. 이와 같은 분석 결과를 토대로 결론을 정리하면 다음과 같다. 첫째, 초등학생의 컴퓨터 이용시간 및 컴퓨터를 이용하여 주로 하는 일을 살펴보면 컴퓨터 이용 시간의 적절한 조절 능력과 컴퓨터 활용 능력의 배양이 필요하다. 둘째, 건전한 인터넷 문화를 이룰 수 있도록 지도해야 한다. 셋째, 개인의 인격이 존중되듯이 개인의 사생활도 보호되어야 한다. 넷째, 불건전 사이트에 대한 의식은 대다수의 초등학생들이 부정적인 견해를 견지하고 있다. 따라서 보다 나은 인터넷 서핑을 위해서는 아동들로 하여금 불건전 사이트에 대한 접속을 차단할 수 있는 여러 가지 방법을 모색하고 지도를 통해 불건전 사이트에 접속하지 않도록 하는 교육이 실시되도록 하여야 한다.

  • PDF