• Title/Summary/Keyword: Communications

Search Result 30,845, Processing Time 0.047 seconds

The Characteristics of a Research Network for Radiation Oncology in Korea (방사선종양학 분야의 연구 네트워크 특성 분석)

  • Choi, Jin-Hyun;Park, Seo-Hyun;Kang, Jin-Oh
    • Radiation Oncology Journal
    • /
    • v.28 no.3
    • /
    • pp.184-191
    • /
    • 2010
  • Purpose: To evaluate the structural characteristics of a scientific network of radiation oncology society. Materials and Methods: A total of 1,512 articles published from 1986 to April 2010 with the terms 'radiation oncology' or 'therapeutic radiology' were obtained in the KoreaMed database. The co-authors were analyzed according to their affiliation, and their relationship was used to build a matrix. With the matrix, centralization indices and the Key Player index were analyzed. We used UCINET 6.0 for the network analysis, Netdraw for determining a sociogram and Key Player 1.44 for the key player analysis. Results: The centralization of the radiation oncology field decreased from 8.29% for the period from 1986~1990 to 1.84% from 2006~2010. However, when the Korean Journal of Medical Physics was excluded, centralization increased from 2.32% for the period from 2001~2005 to 3.80% from 2006~2010. This suggested that the communication in the clinical research field of radiation oncology is decreasing. In a node centralization analysis, Seoul National University was found to be the highest at 7.9%. Seoul National University showed the highest indices in the Outdegree (6.50%) and Indegree (8.54%), in addition to Betweenness (14.94%) and Eigenvector (135.234%). The Key Player analysis indicated that Inha University had the highest index at 0.491, but when the Korean Journal of Medical Physics was excluded, Yonsei University had the highest Key Player index at 0.584. Conclusion: The degree centrality in the network of radiation oncology decreased in the most recent period as more institutions are participating in network. However, the Betweenness centrality is still increasing, suggesting that the communications among research groups (clique) in radiation oncology is warranted.

A Study on the Knowledge and Attitude about Sex in One Commercial Girls' High school in Seoul (서울지역 일 여자 상업고등학교의 성에 대한 지식 및 태도에 관한 연구)

  • Kim, Eun Hee
    • Journal of the Korean Society of School Health
    • /
    • v.4 no.2
    • /
    • pp.100-118
    • /
    • 1991
  • This study was conducted in order to grasp the condition of the student's knowledge and attitude about sex. And to offer the basic materials for sex education of school health service. The objects were comprised of 464 volunteered students who study in commercial girls' high school. The material of this study was the questionaire suited to the purposed of this research which has been made through studying references. All the questionaire written by students. The self reported questionaires were collected immediately without explanation on supervision of school nurse. The data was collected from 28th to 30th of June on 1990. Analysis of the data was done utilizing SPSS for percentage, mean, ANOVA and Pearson Correlation Coefficients. The Results are as follows; 1. General features of the objects of study School grade distribution was similar. Fathers of 41-50 years were the highest(58.3%), mothers of 41-50 years were the highest(64.3%), family of living together were the highest(87.5%), fathers of graduated high school were highest(60.7%), mothers of graduated middle school were the highest(43.0%) and neuclear families were highest(91.5%). 2. The Conditions of Knowledge about sex When 5 Point was given to "Well known" and 1 point was given to "Never known", the total average was 2.97, Especially the mean of Female physiology was shown 3.93, 73.4% of students have known. But the mean of male physiology was shown 2.23, 17.2% of students only. And Family planning item was 3.54, hymen item was 3.38, female genitalia item was 3.35, abortion item was 3.25, Intercourse and pregnancy item was 3.24, Ovulation item was 3.02, Contraception item was 2.97, Veneral disease and masturbation item was 2.82, maintenance of pregnancy item was 2.76, Anatomical differences between male and female item was 2.59, male genitalia item was 2.31, ejaculation item was 2.27. 3. The conditions of attitude about Sex When 5 point was given to "Very affirming" and 1 point was given to "Very deny" the total average was 3.20. Especially the mean of social intercourse between other sex was shown 3.92, 73.4% of students have affirmed. But the mean of psychic response on menstruation was shown 2.24, 8.8% of students only. And baby birth item was 3.72, the fact that I am a woman item was 3.53, marriage item was 3.49. Secondary body change item was 3.38, puberty item was 3.31, delivery and sexual intercourse item was 3.05, pregenancy item was 3.02, psychic condition on menarche item was 2.50. Also present counsellors about sex were teachers in charge (44.9%), friends(21.6%), mothers(20.6%), elder sisters (10.6%), mass-communications (1.5%), fathers (0.4%), school nurses and elder brother(0.2%). In addition to, future counsellors about sex were friends (37.7%), mothers(30.6%), elder sister (18.4%), school nurses (4.6%), mass communication (3.8%), teachers in charge (2.5%), elder brothers (1.4%) and fathers(1.0%). 4. Correlation between the general features and knowledge variables School grade and knowledge condition has relationship to female genitalia(P<0.05), female physiology (P<0.00), male physiology (P<0.05),ovulation (P<0.00), and femily planning (P<0.005). Fathers age and knowledge condition has relationship to male physiology(P<0.05), and abortion (P<0.05). Marrital status and knowledge condition has relationship to female physiology (P<0.01), masturbation (P<0.05). Fathers educational background and knowledge condition has relationship to masturbation (P<0.00). Mothers age and knowledge condition has relationship to family planning (P<0.05). 5. Correlation between the general futures and attituded variables Fathers age and attitude condition has relationship to psychic response on menstruation (P<0.05). Mothers age and attitude condition has relationship to fact that I am a woman (P<0.00). Mothers educational background and attitude condition has relationship to social intercourse between other sex (P<0.05). Type of family and attitude condition has relationship to puberty (P<0.01). 6. Correlation between knowledge condition and attitude condition Those who had more knowledge about sex have more affirmative response (P<0.001).

  • PDF

A Study on the Retransmission Consent and Arbitration for the Retransmission of Terrestrial Broadcasting Signal in Japan (지상파채널의 재전송 동의와 중재 기준에 관한 연구 - 일본의 사례분석을 중심으로)

  • Kim, Kyung-Hwan
    • Korean journal of communication and information
    • /
    • v.48
    • /
    • pp.46-62
    • /
    • 2009
  • The current study attempted to review the standards of retransmisison consent and arbitration for the terrestrial broadcasting signal. The standards are based upon the principles encouraged by the MIAC(Ministry of Internal Affairs and Communications). It has been criticized that the standards of judgement for the retransimission consent and arbitration are ambiguous and arbitrary in Japan. In 2009, MIAC announced five decisions regarding the retransmission of over-the-air. The result of the current study found that the regulations of compulsory over-the-air signal retransmission have been sustained until now. The retransmission policy of the Japan government based upon three principles; localism, proper cause and copyright act. The judgment is dependent on the intrepretation of MIAC's standard about these three principles.

  • PDF

Analysis of the Content and Components of Consumer Competency Presented in Home Economics and Other Subjects of Middle School (중학교 가정교과와 타 교과에 제시된 소비자역량의 내용과 구성요소 분석)

  • Yoon, Sohee;Sohn, Sang-Hee;Lee, Soo-Hee
    • Journal of Korean Home Economics Education Association
    • /
    • v.32 no.3
    • /
    • pp.81-96
    • /
    • 2020
  • This study aims to identify implications for the role of home economics in consumer education in middle schools focusing on building consumer competency. To this end, the content in middle school textbooks of home economics and other subjects, written according to the 2015 revised curriculum, were analyzed. This study examined consumer education content based on the consumer competency measurement index developed by the Korean Consumer Agency, and reviewed different foci presented by subjects. This study also investigated how the knowledge, attitude and practice, which are components of consumer competency, are presented. The major findings of this study can be summarized as follows: First, consumer competency content, presented in textbooks of home economics and other subjects, were comprised of citizenship competency(65.3%), transactional competency(27%), and financial competency(7.7%). Second, in terms of content on the consumer's citizenship competency, little attention was paid to consumer rights, revealing an imbalance between responsibilities and rights. Third, despite its importance, the "utilization of information and communications technology" in transaction competency, and "consumer participation" in citizenship competency are insufficiently covered in the home economics. Fourth, social studies was the subject that most extensively covered the content of consumer competency. In terms of scope, home economics dealt with most of the sub-fields. Fifth, even when the same content of consumer competency was covered, it was presented differently by subject. Sixth, there was a lack of connection between components of consumer competency-knowledge, attitude, and practice, with a disproportionately high emphasis on knowledge. In conclusion, this study concluded that consumer education content of middle school subjects is insufficient to enhance consumer competency.

Factors Influencing the Adoption of Location-Based Smartphone Applications: An Application of the Privacy Calculus Model (스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용)

  • Cha, Hoon S.
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.7-29
    • /
    • 2012
  • Smartphone and its applications (i.e. apps) are increasingly penetrating consumer markets. According to a recent report from Korea Communications Commission, nearly 50% of mobile subscribers in South Korea are smartphone users that accounts for over 25 million people. In particular, the importance of smartphone has risen as a geospatially-aware device that provides various location-based services (LBS) equipped with GPS capability. The popular LBS include map and navigation, traffic and transportation updates, shopping and coupon services, and location-sensitive social network services. Overall, the emerging location-based smartphone apps (LBA) offer significant value by providing greater connectivity, personalization, and information and entertainment in a location-specific context. Conversely, the rapid growth of LBA and their benefits have been accompanied by concerns over the collection and dissemination of individual users' personal information through ongoing tracking of their location, identity, preferences, and social behaviors. The majority of LBA users tend to agree and consent to the LBA provider's terms and privacy policy on use of location data to get the immediate services. This tendency further increases the potential risks of unprotected exposure of personal information and serious invasion and breaches of individual privacy. To address the complex issues surrounding LBA particularly from the user's behavioral perspective, this study applied the privacy calculus model (PCM) to explore the factors that influence the adoption of LBA. According to PCM, consumers are engaged in a dynamic adjustment process in which privacy risks are weighted against benefits of information disclosure. Consistent with the principal notion of PCM, we investigated how individual users make a risk-benefit assessment under which personalized service and locatability act as benefit-side factors and information privacy risks act as a risk-side factor accompanying LBA adoption. In addition, we consider the moderating role of trust on the service providers in the prohibiting effects of privacy risks on user intention to adopt LBA. Further we include perceived ease of use and usefulness as additional constructs to examine whether the technology acceptance model (TAM) can be applied in the context of LBA adoption. The research model with ten (10) hypotheses was tested using data gathered from 98 respondents through a quasi-experimental survey method. During the survey, each participant was asked to navigate the website where the experimental simulation of a LBA allows the participant to purchase time-and-location sensitive discounted tickets for nearby stores. Structural equations modeling using partial least square validated the instrument and the proposed model. The results showed that six (6) out of ten (10) hypotheses were supported. On the subject of the core PCM, H2 (locatability ${\rightarrow}$ intention to use LBA) and H3 (privacy risks ${\rightarrow}$ intention to use LBA) were supported, while H1 (personalization ${\rightarrow}$ intention to use LBA) was not supported. Further, we could not any interaction effects (personalization X privacy risks, H4 & locatability X privacy risks, H5) on the intention to use LBA. In terms of privacy risks and trust, as mentioned above we found the significant negative influence from privacy risks on intention to use (H3), but positive influence from trust, which supported H6 (trust ${\rightarrow}$ intention to use LBA). The moderating effect of trust on the negative relationship between privacy risks and intention to use LBA was tested and confirmed by supporting H7 (privacy risks X trust ${\rightarrow}$ intention to use LBA). The two hypotheses regarding to the TAM, including H8 (perceived ease of use ${\rightarrow}$ perceived usefulness) and H9 (perceived ease of use ${\rightarrow}$ intention to use LBA) were supported; however, H10 (perceived effectiveness ${\rightarrow}$ intention to use LBA) was not supported. Results of this study offer the following key findings and implications. First the application of PCM was found to be a good analysis framework in the context of LBA adoption. Many of the hypotheses in the model were confirmed and the high value of $R^2$ (i.,e., 51%) indicated a good fit of the model. In particular, locatability and privacy risks are found to be the appropriate PCM-based antecedent variables. Second, the existence of moderating effect of trust on service provider suggests that the same marginal change in the level of privacy risks may differentially influence the intention to use LBA. That is, while the privacy risks increasingly become important social issues and will negatively influence the intention to use LBA, it is critical for LBA providers to build consumer trust and confidence to successfully mitigate this negative impact. Lastly, we could not find sufficient evidence that the intention to use LBA is influenced by perceived usefulness, which has been very well supported in most previous TAM research. This may suggest that more future research should examine the validity of applying TAM and further extend or modify it in the context of LBA or other similar smartphone apps.

  • PDF

A Qualitative Study on Facilitating Factors of User-Created Contents: Based on Theories of Folklore (사용자 제작 콘텐츠의 활성화 요인에 대한 정성적 연구: 구비문학 이론을 중심으로)

  • Jung, Seung-Ki;Lee, Ki-Ho;Lee, In-Seong;Kim, Jin-Woo
    • Asia pacific journal of information systems
    • /
    • v.19 no.2
    • /
    • pp.43-72
    • /
    • 2009
  • Recently, user-created content (UCC) have emerged as popular medium of on-line participation among users. The Internet environment has been constantly evolving, attracting active participation and information sharing among common users. This tendency is a significant deviation from the earlier Internet use as an one-way information channel through which users passively received information or contents from contents providers. Thanks to UCCs online users can now more freely generate and exchange contents; therefore, identifying the critical factors that affect content-generating activities has increasingly become an important issue. This paper proposes a set of critical factors for stimulating contents generation and sharing activities by Internet users. These factors were derived from the theories of folklores such as tales and songs. Based on some shared traits of folklores and UCC content, we found four critical elements which should be heeded in constructing UCC contents, which are: context of culture, context of situation, skill of generator, and response of audience. In addition, we selected three major UCC websites: a specialized contents portal, a general internet portal, and an official contents service site, They have different use environments, user interfaces, and service policies, To identify critical factors for generating, sharing and transferring UCC, we traced user activities, interactions and flows of content in the three UCC websites. Moreover, we conducted extensive interviews with users and operators as well as policy makers in each site. Based on qualitative and quantitative analyses of the data, this research identifies nine critical factors that facilitate contents generation and sharing activities among users. In the context of culture, we suggest voluntary community norms, proactive use of copyrights, strong user relationships, and a fair monetary reward system as critical elements in facilitating the process of contents generation and sharing activities. Norms which were established by users themselves regulate user behavior and influence content format. Strong relationships of users stimulate content generation activities by enhancing collaborative content generation. Particularly, users generate contents through collaboration with others, based on their enhanced relationship and specialized skills. They send and receive contents by leaving messages on website or blogs, using instant messenger or SMS. It is an interesting and important phenomenon, because the quality of contents can be constantly improved and revised, depending on the specialized abilities of those engaged in a particular content. In this process, the reward system is an essential driving factor. Yet, monetary reward should be considered only after some fair criterion is established. In terms of the context of the situation, the quality of contents uploading system was proposed to have strong influence on the content generating activities. Among other influential factors on contents generation activities are generators' specialized skills and involvement of the users were proposed. In addition, the audience response, especially effective development of shared interests as well as feedback, was suggested to have significant influence on contents generation activities. Content generators usually reflect the shared interest of others. Shared interest is a distinct characteristic of UCC and observed in all the three websites, in which common interest is formed by the "threads" embedded with content. Through such threads of information and contents users discuss and share ideas while continuously extending and updating shared contents in the process. Evidently, UCC is a new paradigm representing the next generation of the Internet. In order to fully utilize this innovative paradigm, we need to understand how users take advantage of this medium in generating contents, and what affects their content generation activities. Based on these findings, UCC service providers should design their websites as common playground where users freely interact and share their common interests. As such this paper makes an important first step to gaining better understand about this new communication paradigm created by UCC.

A Study on the New Impedance Matching method by using Non-Symmetrical coupled Lines for MIC and MMIC (MIC와 MMIC를 위한 비대칭 결합 선로에 의한 새로운 임피던스 정합 방법에 관한 연구)

  • 강희창;진연강
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.13 no.6
    • /
    • pp.521-528
    • /
    • 1988
  • Into the telecommunications industry, which had been monopolistic, a few advanced countries introduced competition through 70's and 80's. And this trend is going on worldwide. The introduction of competition into the industry is made mainly in the long distance, international and enhanced market. This liberalisation results from the fundamental change of the cost function. Suggesting that the cost comprises of that of the facility sector and that of the operation sector there exists the economies of scale in the facility sector in general. The major ground for the monopolistic industrial structure in the past was the natural monopoly depending on the economies of scale. But the rapid advance of the technology by a large margin. This decrease has resulted in the change of the cost function. That is while there exists the economies of scale in the smaller production scale, the average cost increases beyond a certain scale. This means that the natural monopoly collapsed, and that the competitive structure is more efficient than the monopolistic structure. But, because there exists economies of scale in the smaller scale, the desirable number of players, which could result in efficient industry structure depends on the market size. Such correlation between technological level market size and the degree of regulation is found in the case of U.S.A., Japan and U.K., where deregulation policy of the telecommunications market has already been carried out. In U.S.A., which has the largest market and the highest technological level the degree of regulation is lowest. Also in the order of Japan and U.K. the regulation is severer. Japan and U.K. are likely to liberalize still more, as the technology advances and the market grows. This article is just the beginning of the research, and this hypothesis requires more detailed research.

  • PDF

Multi-task Learning Based Tropical Cyclone Intensity Monitoring and Forecasting through Fusion of Geostationary Satellite Data and Numerical Forecasting Model Output (정지궤도 기상위성 및 수치예보모델 융합을 통한 Multi-task Learning 기반 태풍 강도 실시간 추정 및 예측)

  • Lee, Juhyun;Yoo, Cheolhee;Im, Jungho;Shin, Yeji;Cho, Dongjin
    • Korean Journal of Remote Sensing
    • /
    • v.36 no.5_3
    • /
    • pp.1037-1051
    • /
    • 2020
  • The accurate monitoring and forecasting of the intensity of tropical cyclones (TCs) are able to effectively reduce the overall costs of disaster management. In this study, we proposed a multi-task learning (MTL) based deep learning model for real-time TC intensity estimation and forecasting with the lead time of 6-12 hours following the event, based on the fusion of geostationary satellite images and numerical forecast model output. A total of 142 TCs which developed in the Northwest Pacific from 2011 to 2016 were used in this study. The Communications system, the Ocean and Meteorological Satellite (COMS) Meteorological Imager (MI) data were used to extract the images of typhoons, and the Climate Forecast System version 2 (CFSv2) provided by the National Center of Environmental Prediction (NCEP) was employed to extract air and ocean forecasting data. This study suggested two schemes with different input variables to the MTL models. Scheme 1 used only satellite-based input data while scheme 2 used both satellite images and numerical forecast modeling. As a result of real-time TC intensity estimation, Both schemes exhibited similar performance. For TC intensity forecasting with the lead time of 6 and 12 hours, scheme 2 improved the performance by 13% and 16%, respectively, in terms of the root mean squared error (RMSE) when compared to scheme 1. Relative root mean squared errors(rRMSE) for most intensity levels were lessthan 30%. The lower mean absolute error (MAE) and RMSE were found for the lower intensity levels of TCs. In the test results of the typhoon HALONG in 2014, scheme 1 tended to overestimate the intensity by about 20 kts at the early development stage. Scheme 2 slightly reduced the error, resulting in an overestimation by about 5 kts. The MTL models reduced the computational cost about 300% when compared to the single-tasking model, which suggested the feasibility of the rapid production of TC intensity forecasts.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Selectively Partial Encryption of Images in Wavelet Domain (웨이블릿 영역에서의 선택적 부분 영상 암호화)

  • ;Dujit Dey
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.648-658
    • /
    • 2003
  • As the usage of image/video contents increase, a security problem for the payed image data or the ones requiring confidentiality is raised. This paper proposed an image encryption methodology to hide the image information. The target data of it is the result from quantization in wavelet domain. This method encrypts only part of the image data rather than the whole data of the original image, in which three types of data selection methodologies were involved. First, by using the fact that the wavelet transform decomposes the original image into frequency sub-bands, only some of the frequency sub-bands were included in encryption to make the resulting image unrecognizable. In the data to represent each pixel, only MSBs were taken for encryption. Finally, pixels to be encrypted in a specific sub-band were selected randomly by using LFSR(Linear Feedback Shift Register). Part of the key for encryption was used for the seed value of LFSR and in selecting the parallel output bits of the LFSR for random selection so that the strength of encryption algorithm increased. The experiments have been performed with the proposed methods implemented in software for about 500 images, from which the result showed that only about 1/1000 amount of data to the original image can obtain the encryption effect not to recognize the original image. Consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. Also, in this paper, several encryption scheme according to the selection of the sub-bands and the number of bits from LFSR outputs for pixel selection have been proposed, and it has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.