• Title/Summary/Keyword: HIDE

Search Result 326, Processing Time 0.027 seconds

A Study of the Experience of Patients with Terminal Cancer Who are in an Independent Hospice Center (호스피스 간호시 말기 암환자의 임종 현상 연구 -독립형 호스피스 센타를 중심으로-)

  • 김분한;탁영란;전미영
    • Journal of Korean Academy of Nursing
    • /
    • v.26 no.3
    • /
    • pp.668-677
    • /
    • 1996
  • This study is a phenomenological study done to promote understanding of the dying process in patients with terminal cancer who were in an independent hospice center. The purpose of study was to explore and understand indepth information on the dying process in order to provide data for holistic hospice care in nursing and to give insights in to practical applications in the nursing care In-depth interviewing was done from may, through November, 1995 with 11 patient with cancer who were being cared for at K Hospice Care Center. Experiences in the dying process were discussed as they expressed feelings about death including (a) feeling of isolation because family members try to hide the diagnosis of cancer. (b) hopelessness, (c) guilt, anger, and hostility, (d) suffering from pain, (e) fear of death. However, subjects did not deny death itself and were developing peace of mind and acceptance of death through religion.

  • PDF

The Study of Stable Child English Education Content Using Augmented Reality Solving the Hide of Marker (마커의 가려짐을 해결하여 증강현실을 이용한 안정적 영어 학습 컨텐츠에 대한 연구)

  • Jeon, Soo-Jin;Kim, Young-Seop
    • Journal of the Semiconductor & Display Technology
    • /
    • v.9 no.4
    • /
    • pp.99-102
    • /
    • 2010
  • In this study, the 3- dimensional (3-D) learning contents are suggested using 'Augmented Reality' instead of existing 2-dimensional (2-D) learning methods. At the present, there are some 2-D learning methods using texts, image, pictures, and videos called e-learning. However, these one-way 2-D methods have some disadvantages such as declining learner's immersion and concentration. Thus, the 3-D learning contents using 'Augmented Reality' are suggested to compensate the disadvantages. According to the development of information technology (IT), the augmented reality has many applications to the era of ubiquitous. However, there are some disadvantages when learners use these contents as following; non-augmenting by partially hiding from makers and declining concentration by patterns of the makers. In this study, the beneficial marker which can solve this non-augmenting phenomenon is suggested.

Frame Loss Concealment for Multi-View Video Sequences Based on Correspondence Matching Algorithm (일치점 정합 알고리즘에 기반한 다시점 비디오의 프레임 오류 은닉 방법)

  • Song, Kwan-Woong;Chung, Tae-Young;Oh, Yun-Je;Kim, Chang-Su
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.255-256
    • /
    • 2007
  • We propose a frame loss concealment algorithm for multi-view video sequences based on correspondence matching, which can hide the effects of frame losses efficiently. To achieve high PSNR performances, we employ a block error concealment scheme to refine the concealed results. Simulation results demonstrate that the proposed algorithm effectively protects the quality of reconstructed videos against transmission errors.

  • PDF

Efficient Utilization of Burst Data Transfers of DMA (직접 메모리 접근 장치에서 버스트 데이터 전송 기능의 효과적인 활용)

  • Lee, Jongwon;Cho, Doosan;Paek, Yunheung
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.8 no.5
    • /
    • pp.255-264
    • /
    • 2013
  • Resolving of memory access latency is one of the most important problems in modern embedded system design. Recently, tons of studies are presented to reduce and hide the access latency. Burst/page data transfer modes are representative hardware techniques for achieving such purpose. The burst data transfer capability offers an average access time reduction of more than 65 percent for an eight-word sequential transfer. However, solution of utilizing such burst data transfer to improve memory performance has not been accomplished at commercial level. Therefore, this paper presents a new technique that provides the maximum utilization of burst transfer for memory accesses with local variables in code by reorganizing variables placement.

A Study and improved Approach of Text Steganography (텍스트 스테가노그래프의 개선된 접근과 연구)

  • Ji, Seon-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.5
    • /
    • pp.51-56
    • /
    • 2014
  • In the digital world of the internet, steganography is introduced to hide the existence of the secret communication by concealing a secret message inside another unsuspicious cover medium. The third parties are unaware that a stego medium is being communicated. There exists a large variety of steganography methods based on texts. In this paper, analyzed the advantages and significant disadvantages of each existing text steganography method and how new approach could be proposed as a solution. The objective of this paper is to propose a method for hiding the secret messages in safer manner from external attacks by encryption rearrangement key.

Invited Speech at ICSS 2007 Generation of Session, Authentication, and Encryption Keys for CDMA2000 1x EV-DO Air Interface Standard

  • Rhee, Man-Young
    • Review of KIISC
    • /
    • v.17 no.2
    • /
    • pp.9-23
    • /
    • 2007
  • The air interface supports a security layer which provides the key exchange protocol, authentication protocol, and encryption protocol. The authentication is performed on the encryption protocol packet. The authentication protocol header or trailer may contain the digital signature that is used to authenticate a portion of the authentication protocol packet that is authenticated. The encryption protocol may add a trailer to hide the actual length of the plaintext of padding to be used by the encryption algorithm. The encryption protocol header may contain variables such as the initialization vector (IV) to be used by the encryption protocol. It is our aim to firstly compute the session key created from the D H key exchange algorithm, and thereof the authenticating key and the encryption key being generated from the session key.

XML Signature Model Design using Signature Value Hide (서명값 은닉을 이용한 XML 전자서명 모델 설계)

  • Ko, Hoon;Kim, Dae-Won;Shin, Yong-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1873-1876
    • /
    • 2003
  • 최근 전자상거래 확산에 따라 전자서명, 키관리 및 인증서비스가 새롭게 부상하고 있으며, 여기에 적용하기 위한 정보보호 기반기술로는 암호화 기술, 인증기술, 전자서명, PKI(Pulbic Key Infrastructure) 및 WPKI(Wireless PKI)등이 있다. 암호화 기술은 합법적 참여자들 간에 메시지 변/복조 규칙에 대한 약속을 정하고, 이 규칙에 따라 송신하려는 메시지를 암호화시켜 전달 혹은 보관하며, 메시지 수신시 또는 접근 권한이 있는 사람이 필요에 따라 이를 복호화 하도록 하는 기술을 말한다. 전자서명은 종래의 종이 문서에 표기하던 수기 서명이나 인장 효과를 전자적 매체내에 저장 또는 전송되는 전자 문서상에 효과적으로 부여하는 전자적 서명 방식이다. e-business 활성화를 위한 정부의 적극적인 참여와 지원을 바탕으로 받은 전자상거래 관련 사업들이 등장하고 있다. 이러한 전자상거래에 사용되는 기반 기술로서 XML(extensible Markup Language)기술이 사용되고 있다. 본 연구에서는 서명값을 XML 문서 안에 포함해서 전송 하는 방법으로 문서의 무결성과 비밀성을 보장하고자 한다.

  • PDF

Security Analysis of Partially Hidden Password Systems Resistant to Shoulder Surfing Attacks

  • Seong, Jin-Taek
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.1
    • /
    • pp.17-26
    • /
    • 2020
  • As more users use mobile devices, shoulder surfing attacks have emerged as an important issue in security. According to research report, in fact, the result showed that about 30% of smartphone users are hit by shoulder surfing attacks. To this end, in this paper, we consider a shoulder surfing attack and propose a partially hidden password system to resistant to its attack. In order to help readers understand, we describe the proposed password system in more detail using one simple example. The core idea behind the proposed system is to place the user's password randomly in the specified grid instead of entering a password directly. As a result, even if an attacker makes a shoulder surfing attack to observe the password, the user can hide the preset password and defend against the attack. We also show how the security of the password system proposed in this paper is improved. In addition, even if there are consecutive shoulder surfing attacks, the security of the proposed password system is robust.

In-Service Mathematics Teacher Training from the Van Hiele Theory Perspective

  • Afonso, M. Candelaria;Camacho, Matias;Socas, Martin M.
    • Research in Mathematical Education
    • /
    • v.13 no.4
    • /
    • pp.349-377
    • /
    • 2009
  • In this work we present a study undertaken with in-service mathematics teachers of primary and secondary school where we describe and analyze the didactical competences needed to implement an innovative design in geometry applying Van Hiele's models. The relationship between such competences and an ideal teacher profile is also studied. Teachers' epistemology is established in terms of didactical competences and we can see that this epistemology is an element that helps us understand the difficulties that teachers face in practice when implementing an innovative curriculum, in this case, geometry based on the Van Hiele theory.

  • PDF