• Title/Summary/Keyword: Call-to-action

Search Result 65, Processing Time 0.027 seconds

A Study of Reports about Dizziness Reaction - Focus on the China Academic Journal - (명현(瞑眩) 반응에 대한 보고 연구 - China Academic Journal을 중심으로 -)

  • Yoon, Cheol-Ho
    • The Journal of Korean Medicine
    • /
    • v.30 no.5
    • /
    • pp.1-15
    • /
    • 2009
  • Objectives: I carried out this study for research on dizziness (瞑眩) reaction. Methods: I found 14 papers about dizziness reaction from 1994 to 2009 in China Academic Journal (CAJ) website, and synthesized these reports. Results: Dizziness reaction, presupposing that the diagnosis and treatments are correct, is a peculiar reaction which occurs with severe and various symptoms temporarily diverging from regular course. As dizziness reaction disappears, the symptoms of the disease are improved. Though it mostly occurs rapidly and disappears in a short time, it can occur after a long treatment or occur gradually in chronic diseases. As a general rule, the faster dizziness reaction occurs, the more severe the reaction. The faster dizziness reaction disappears, the quicker the recovery from illness. Upon catching a disease, healthy qi(正氣) and the pathogen (邪氣) fight each other. Just at that moment, if the medicine or acupuncture treatment hits the mark of the pathogen (邪氣), healthy qi(正氣) attacks the origin of the disease in full force. Thus, all symptoms disappear at a time and various reactions occur which we can't accurately determine. So, we can call it 'Right action', 'Improving reaction' or 'Adjusting reaction'. Conclusions: It is difficult for us to predict whether a dizziness reaction will occur. Thus, we don't have to seek dizziness reaction blindly, and must distinguish dizziness reaction from side effects or toxic effects. So, we must pay more close attentions to symptom changes.

  • PDF

A Study on the Characteristic of Energy Harvesting Mechanism for Batteryless Wireless Switch (배터리없는 무선 스위치를 위한 에너지 하베스팅 메커니즘의 특성 연구)

  • Choi, Yeon-Suk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.5
    • /
    • pp.3114-3120
    • /
    • 2014
  • Wireless emergency call switch used in industry, the most important thing is the sustainable power supply. This paper describes the development and performance test results of a compact electromagnetic energy harvesting mechanism for batteryless wireless switch. This paper summarizes proposed structure design and magnetic field analysis results of the mechanism to generate an induced electromotive force using 2mm stroke of a single push action. This analysis results show the power output of the proposed mechanism up to VDC $4.5V{\pm}25%$ and it can hold up to 65ms of the power generation with greater than 2.5V.

The Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Korea (금융회사의 고객정보보호에 대한 내부직원의 태도 연구)

  • Jung, Woo-Jin;Shin, Yu-Hyung;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.53-77
    • /
    • 2012
  • Financial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers' personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.

  • PDF

VIDEO TRAFFIC MODELING BASED ON $GEO^Y/G/{\infty}$ INPUT PROCESSES

  • Kang, Sang-Hyuk;Kim, Ba-Ra
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.12 no.3
    • /
    • pp.171-190
    • /
    • 2008
  • With growing applications of wireless video streaming, an efficient video traffic model featuring modern high-compression techniques is more desirable than ever, because the wireless channel bandwidths are ever limited and time-varying. We propose a modeling and analysis method for video traffic by a class of stochastic processes, which we call '$GEO^Y/G/{\infty}$ input processes'. We model video traffic by $GEO^Y/G/{\infty}$ input process with gamma-distributed batch sizes Y and Weibull-like autocorrelation function. Using four real-encoded, full-length video traces including action movies, a drama, and an animation, we evaluate our modeling performance against existing model, transformed-M/G/${\infty}$ input process, which is one of most recently proposed video modeling methods in the literature. Our proposed $GEO^Y/G/{\infty}$ model is observed to consistently provide conservative performance predictions, in terms of packet loss ratio, within acceptable error at various traffic loads of interest in practical multimedia streaming systems, while the existing transformed-M/G/${\infty}$ fails. For real-time implementation of our model, we analyze G/D/1/K queueing systems with $GEO^Y/G/{\infty}$ input process to upper estimate the packet loss probabilities.

  • PDF

Design and Implementation of Framework for Static Execution Flow Trace of Binary Codes (이진 코드의 정적 실행 흐름 추적을 위한 프레임워크 설계 및 구현)

  • Baek, Yeong-Tae;Kim, Ki-Tae;Jun, Sang-Pyo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.6
    • /
    • pp.51-59
    • /
    • 2011
  • In domestic, the binary code analysis technology is insufficient. In general, an executable file that is installed on your computer without the source code into an executable binary files is given only the most dangerous, or because it is unknown if the action is to occur. In this paper, static program analysis at the binary level to perform the design and implementation framework. In this paper, we create a control flow graph. We use the graph of the function call and determine whether dangerous. Through Framework, analysis of binary files is easy.

Video System for Real-time Criminal Activity Detection (실시간 범죄행위 감지를 위한 영상시스템)

  • Shin, Kwang-seong;Shin, Seong-yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.357-358
    • /
    • 2021
  • Although many people watch the scene with multiple surveillance cameras, it is difficult to ensure that immediate action can be taken in the event of a crime. Therefore, there is a need for a "crime behavior detection system" that can analyze images in real time from multiple surveillance cameras installed in elevators, call immediate crime alerts, and track crime scenes and times effectively. In this paper, a study was conducted to detect violent scenes occurring in elevators using Scene Change Detection. For effective detection, an x2-color histogram combining color histogram and histogram was applied.

  • PDF

'Belief' and Epistemic acceptance ('믿음'과 인식적 수용)

  • Lee, Joohan
    • Korean Journal of Logic
    • /
    • v.20 no.2
    • /
    • pp.197-239
    • /
    • 2017
  • The ordinary term 'believe' is polysemous and thus its meaning varies depending on contexts. Little attention, however, has been paid to its context sensitivity in philosophical discussions, and thereby unnecessary problems tend to be brought about in philosophy. This article explores the different meanings of the term 'believe' to serve as a steppingstone to the solving or dissolving of those problems. To begin, it discusses two different mental attitudes 'believe' stands for, i.e., belief as an involuntary mental disposition and pragmatic acceptance as a mental action, and then suggests and explicates another mental action 'believe' referes to, which I call 'epistemic acceptance'. It will be revealed that epistemic acceptance is a secondary mental action which is performed in a context where epistemic reason and non-epistemic reason compete each other. Then, attention is given to several questions concerning epistemic acceptance and answers to them are provided. The issue of whether epistemic acceptance is analyzable and of the relation between epistemic acceptance and judgment will be addressed in the course of answering them. Finally, a brief prospect is put forward that distinction of different mental attitudes 'believe' stands for will bring a new perspective to solve some philosophical problems, especially, with regard to the issue of the nature of epistemic norm.

  • PDF

Intelligent Modelling Techniques Using the Neuro-Fuzzy Logic Control in ATM Traffic Controller (ATM 트랙픽 제어기에서 신경망-퍼지 논리 제어를 이용한 지능형 모델링 기법)

  • 이배호;김광희
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.4B
    • /
    • pp.683-691
    • /
    • 2000
  • In this paper, we proposed the cell multiplexer using Hopfield neural network and the bandwidth predictor using the backpropagation neural network in order to make an accurate call setup decision. The cell multiplexer controls heterogeneous traffic and the bandwidth predictor estimates minimum bandwidth which satisfies traffic's QoS and maximizes throughput in network. Also, a novel connection admission controller decides on connection setup using the predicted bandwidth from bandwidth predictor and available bandwidth in networks. And then, we proposed a fuzzy traffic policer, when traffic sources violate the contract, takes an appropriate action and aim proved traffic shaper, which controls burstness which is one of key characteristics in multimedia traffic. We simulated the proposed controller. Simulation results show that the proposed controller outperforms existing controller.

  • PDF

Interactivity Framework for Analysis of Social Network Sites User's Behavior for Identification of Usability Flaws and Effective User's Experience (소셜 네트워크 사이트의 사용자 행동 분석을 통한 사용성 결점 식별 및 효과적인 사용자 경험을 위한 상호작용성 프레임워크)

  • Abduljalil, Sami;Yoon, Seok-Jin;Kang, Dae-Ki
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.544-546
    • /
    • 2011
  • Due to the explosive growth of online social network users, large numbers of users discover these social network sites are a place where they can be able to spend their spare time, share feelings, ideas freely, and to search for new friends or partners. These web sites give an opportunity for its users to socialize with new people and to keep in touch or reconnect with current or old friends and families across disperse continents via these web sites, which traditionally replace the traditional methods. These social network web sites need careful investigations and findings on the usability for effective interactivity and more usability. However, little research might have previously invested on the usability of these on social network web sites. Therefore, we propose a new framework to study the usability of these social network sites. We namely call our framework "Interactivity". This framework will enable us to assess the usability of the social network sites. It will provide an overview of the user's behavior while interacting in these social network web sites. Measurement of the interactivity will be measured using Camtasia software. This software will entirely capture the interactivity of users including the screen and the movements, which the screen and the motion of the user action will undergo to analysis at the end of our research.

Crowdsourcing Software Development: Task Assignment Using PDDL Artificial Intelligence Planning

  • Tunio, Muhammad Zahid;Luo, Haiyong;Wang, Cong;Zhao, Fang;Shao, Wenhua;Pathan, Zulfiqar Hussain
    • Journal of Information Processing Systems
    • /
    • v.14 no.1
    • /
    • pp.129-139
    • /
    • 2018
  • The crowdsourcing software development (CSD) is growing rapidly in the open call format in a competitive environment. In CSD, tasks are posted on a web-based CSD platform for CSD workers to compete for the task and win rewards. Task searching and assigning are very important aspects of the CSD environment because tasks posted on different platforms are in hundreds. To search and evaluate a thousand submissions on the platform are very difficult and time-consuming process for both the developer and platform. However, there are many other problems that are affecting CSD quality and reliability of CSD workers to assign the task which include the required knowledge, large participation, time complexity and incentive motivations. In order to attract the right person for the right task, the execution of action plans will help the CSD platform as well the CSD worker for the best matching with their tasks. This study formalized the task assignment method by utilizing different situations in a CSD competition-based environment in artificial intelligence (AI) planning. The results from this study suggested that assigning the task has many challenges whenever there are undefined conditions, especially in a competitive environment. Our main focus is to evaluate the AI automated planning to provide the best possible solution to matching the CSD worker with their personality type.