• Title/Summary/Keyword: 헤드

Search Result 3,464, Processing Time 0.032 seconds

A Study on the Shielding of Orbit by 3D Printed Filament in Brain CT (Brain CT검사 시 3D프린터 필라멘트에 따른 수정체 차폐 연구)

  • Choi, Woo Jeon;Kim, Dong Hyun
    • Journal of the Korean Society of Radiology
    • /
    • v.15 no.2
    • /
    • pp.101-108
    • /
    • 2021
  • The CT can accurately present the anatomical structure of an organ in the human body, and the resolution of the image is excellent. On Brain CT examination, the radiation sensitivity of the orbit is high and it is subject to many exposure effects. To reduce exposure dose of lens, this study compares change of exposure dose and shielding rate about non-shielding and shielding in a way of using two shielding materials, bismuth and tungsten. In this study, we used bismuth and tungsten filament as shielding materials made by 3D printing to measure the exposure dose according to the materials thickness and each of slices. To compare each shielding rate, 1 mm to 5 mm of two materials was measured with the head phantom fixed and the Magicmax universal dosimeter placed on the eye when the shielding material is not placed, and the shielding material is placed on it. In the 1 mm thick filament, the bismuth filament showed 26.8% and the tungsten filament showed 43.1% shielding rate. Therefore, tungsten presents much greater shielding effect than bismuth.

The process of estimating user response to training stimuli of joint attention using a robot (로봇활용 공동 주의 훈련자극에 대한 사용자 반응상태를 추정하는 프로세스)

  • Kim, Da-Young;Yun, Sang-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1427-1434
    • /
    • 2021
  • In this paper, we propose a psychological state estimation process that computes children's attention and tension in response to training stimuli. Joint attention was adopted as the training stimulus required for behavioral intervention, and the Discrete trial training (DTT) technique was applied as the training protocol. Three types of training stimulation contents are composed to check the user's attention and tension level and provided mounted on a character-shaped tabletop robot. Then, the gaze response to the user's training stimulus is estimated with the vision-based head pose recognition and geometrical calculation model, and the nervous system response is analyzed using the PPG and GSR bio-signals using heart rate variability(HRV) and histogram techniques. Through experiments using robots, it was confirmed that the psychological response of users to training contents on joint attention could be quantified.

A collaborative Serious Game for fire disaster evacuation drill in Metaverse (재난 탈출 협동 훈련 기능성 게임의 메타버스 플랫폼 구현)

  • Lee, Sangho;Ha, Gyutae;Kim, Hongseok;Kim, Shiho
    • Journal of Platform Technology
    • /
    • v.9 no.3
    • /
    • pp.70-77
    • /
    • 2021
  • The purpose of Serious games in immersive Metaverse platform to provide users both fun and intriguing learning experiences. We proposes a serious game for self-trainable fire evacuation drill with collaboration among avatars synchronized with multiple trainees and optionally with real-time supervising placed at different remote physical locations. The proposed system architecture is composed of wearable motion sensors and a Head Mounted Display to synchronize each user's intended motions to her/his avatar activities in a cyberspace in Metaverse environment. The proposed system provides immersive as well as inexpensive environments for easy-to-use user interface for cyber experience-based fire evacuation training system. The proposed configuration of the user-avatar interface, the collaborative learning environment, and the evaluation system on the VR serious game are expected to be applied to other serious games. The game was implemented only for the predefined fire scenario for buildings, but the platform can extend its configuration for various disaster situations that may happen to the public.

Velocity and Distance Estimation-based Sensing Data Collection Interval Control Technique for Vehicle Data-Processing Overhead Reduction (차량의 데이터 처리 오버헤드를 줄이기 위한 이동 속도와 거리 추정 기반의 센싱 데이터 수집 주기 제어 기법)

  • Kwon, Jisu;Park, Daejin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.12
    • /
    • pp.1697-1703
    • /
    • 2020
  • Sensor nodes that directly collect data from the surrounding environment have many constraints, such as power supply and memory size, thus efficient use of resources is required. In this paper, in a sensor node that receives location data of a vehicle on a lane, the data reception period is changed by the target's speed estimated by the Kalman filter and distance weight. For a slower speed of the vehicle, the longer data reception interval of the sensor node can reduce the processing time performed in the entire sensor network. The proposed method was verified through a traffic simulator implemented as MATLAB, and the results achieved that the processing time was reduced in the entire sensor network using the proposed method compared to the baseline method that receives all data from the vehicle.

Development of Evaluation Scheme for Usability of AR/VR Contents (AR/VR 콘텐츠의 사용성 평가 체계 개발)

  • Han, Sumin;Jeong, Hanil;Lee, Hoijun;Lee, Jaeyoung
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.3
    • /
    • pp.236-249
    • /
    • 2021
  • Due to the spread of AR/VR headset, AR/VR contents market gains huge interests. However, various obstacles such as discomfort that restricts usability and absence of standard to evaluate usability block the growth of AR/VR contents industry. To overcome these problems, this study tries to develop an evaluation scheme for the usability of R/VR contents and a prototype system. The proposed evaluation system divides usability related items into safety and convenience items and performs evaluation by item through automatic and experience evaluation by system and experts/experience teams according to characteristics, and comprehensively evaluates the usability of AR/VR content. In this study, a detailed process fo usability evaluation and the prototype system are developed to verify the evaluation scheme. Developed scheme is expected to help the AR/VR content industry overcome the usability issues, and develop high-quality AR/VR content.

Performance Analysis of Deep Learning Based Transmit Power Control Using SINR Information Feedback in NOMA Systems (NOMA 시스템에서 SINR 정보 피드백을 이용한 딥러닝 기반 송신 전력 제어의 성능 분석)

  • Kim, Donghyeon;Lee, In-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.5
    • /
    • pp.685-690
    • /
    • 2021
  • In this paper, we propose a deep learning-based transmit power control scheme to maximize the sum-rates while satisfying the minimum data-rate in downlink non-orthogonal multiple access (NOMA) systems. In downlink NOMA, we consider the co-channel interference that occurs from a base station other than the cell where the user is located, and the user feeds back the signal-to-interference plus noise power ratio (SINR) information instead of channel state information to reduce system feedback overhead. Therefore, the base station controls transmit power using only SINR information. The use of implicit SINR information has the advantage of decreasing the information dimension, but has disadvantage of reducing the data-rate. In this paper, we resolve this problem with deep learning-based training methods and show that the performance of training can be improved if the dimension of deep learning inputs is effectively reduced. Through simulation, we verify that the proposed deep learning-based power control scheme improves the sum-rate while satisfying the minimum data-rate.

The Design and Implementation of Module supporting Trusted Channel in Secure Operating System Environment (보안운영체제 환경에서의 신뢰채널 지원을 위한 모듈의 설계 및 구현)

  • 유준석;임재덕;나재훈;손승원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.3-12
    • /
    • 2004
  • Secure operating system is a special operating system that integrates some security functions(i.e. access control, user authentication, audit-trail and etc.) with normal operating system in order to protect system from various attacks. But it doesn't consider my security of network traffic. To guarantee the security of the whole system, network traffic must be protected by a certain way and IPsec is a representative technology for network security. However, it requires administrator's carefulness in managing security policies and the key management mechanism is very heavy as well as complicated. Moreover, it doesn't have a suitable framework for delivery of security information for access control mechanism. So we propose a simple trusted channel mechanism for secure communication between secure operating systems. It provides confidentiality md authentication for network traffic and ability to deliver security information. It is implemented at the kernellevel of IP layer and the simplicity of the mechanism can minimize the overhead of trusted channel processing.

An AAA Mechanism using ID-based Ticket offer Anonymity (익명성을 지원하는 ID기반 티켓을 이용한 AAA 메커니즘)

  • Moon, Jong-Sik;Paek, Chang-Hyun;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.87-98
    • /
    • 2007
  • AAA protocol is an information protection technology which systematically provides authentication, authorization and accounting function not only in the existing wire network but also in the rapidly developing wireless network, various services and protocol. Nowadays, standardization of the various application services is in progress with the purpose of AAA standardization fer the mobile user in the wireless network. And various researches are being conducted fur using AAA in the roaming service and mobile IPv6 network between heterogeneous networks. In this paper uses OTP and ID-based ticket for user authentication in the mobile device under the ubiquitous environment, and service is seamlessly provided even though the mobile device moves from the home network to the foreign network. In addition, with the ticket renewed from the foreign network, the overhead of the home authentication server can be reduced, and provides anonymity of service through the anonymity ID.

Privilege Management Technique for Unreliable Network Environments based on Tree Structure (신뢰도가 낮은 네트워크 환경을 위한 트리 구조 기반의 권한 관리 기법)

  • Yang, Soo-Mi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.83-91
    • /
    • 2008
  • IISO/IEC 9594-8 defines the public key framework and attribute certificate framework. Attribute certificate framework deals with privilege management infrastructure(PMI). In PMI, for privilege management using attribute certificates, role assignment certificates and role specification certificates are used to assign and specify privileges independently. Role specification certificates includes privilege specifications and the details far privilege management of network environments. Privilege management of unreliable network environment tries to enhance the reliability and efficiency of privilege information transmission forwarding over unreliable routes in the presence of potentially faulty nodes and edges. Each node forms a role specification tree based on role specification relationship data collected from the network. In this paper privilege management cost with the role specification certificates tree structure is evaluated trying to reduce the overhead incurred by role creation and modification of privileges. The multicasting of packets are used for scalability. We establish management cost model taking into account the packet loss and node reliability which continuously join and leave for network. We present quantitative results which demonstrate the effectiveness of the proposed privilege management scheme.

User Transparent File Encryption Mechanisms at Kernel Level (사용자 투명성을 갖는 커널 수준의 파일 암호화 메카니즘)

  • Kim Jae-Hwan;Park Tae-Kyou;Cho Gi-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.3-16
    • /
    • 2006
  • Encipherment in existing OS(Operating Systems) has typically used the techniques which encrypt and decrypt entirely a secret file at the application level with keys chosen by user In this mechanism it causes much overhead on the performance. However when a security-classified user-process writes a secret file, our proposed mechanism encrypts and stores automatically and efficiently the file by providing transparency to the user at the kernel level of Linux. Also when the user modifies the encrypted secret file, this mechanism decrypts partially the file and encrypts partially the file for restoring. When user reads only the part of the encrypted file, this mechanism decrypts automatically and partially the file. Therefore our proposed mechanism provides user much faster enciphering speed than that of the existing techniques at the application level.