• Title/Summary/Keyword: Object Transfer

Search Result 372, Processing Time 0.028 seconds

Design of e-Learning System for Spectral Analysis of High-Order Pulse (고차원펄스 스펙트럼 분석을 위한 이러닝 시스템의 설계)

  • Oh, Yong-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.8
    • /
    • pp.475-487
    • /
    • 2011
  • In this paper, we present a systematic method to derive spectrum of high-order pulse and a novel design of e-Learning system that deals with deriving the spectrum using concept-based branching method. Spectrum of high-order pulse can be derived using conventional methods including 'Consecutive Differentiations' or 'Convolutions', however, their complexity of calculation should be too high to be used as the order of the pulse increase. We develop a recursive algorithm according to the order of pulse, and then derive the formula of spectrum connected to the order with a newly designed look-up table. Moving along, we design an e-Learning content for studying the procedure of deriving high-order pulse spectrum described above. In this authoring, we use the concept-based object branching method including conventional page or title-type branching in sequential playing. We design all four Content-pages divided into 'Modeling', 'Impulse Response and Transfer Function', 'Parameters' and 'Look-up Table' by these conceptual objects. And modules and sub-modules are constructed hierarchically as conceptual elements from the Content-pages. Students can easily approach to the core concepts of the analysis because of the effects of our new teaching method. We offer step-by-step processes of the e-Learning content through unit-based branching scheme for difficult modules and sub-modules in our system. In addition we can offer repetitive learning processes for necessary block of given learning objects. Moreover, this method of constructing content will be considered as an advanced effectiveness of content itself.

The study of RFID Tag read range test with RFID Emulator (RFID Emulator를 이용한 Tag 인식거리 시험 연구)

  • Joo, Hae-Jong;Kim, Young-Choon;Lee, Eu-Soo;Cho, Moon-Taek
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.10
    • /
    • pp.4536-4542
    • /
    • 2011
  • RFID technology uses communication through the use of radio waves to transfer data between a reader and an electronic tag attached to an object for the purpose of identification and tracking. RFID technology can be applied to the various service areas such as, position determination technology, remote processing management and information exchange between objects by collecting, storing, processing, and tracing their informations from the tag attached to the objects using electronic wave by recognizing the information and environment of those objects. However, to revitalize these various services, it is important to test the RFID tag performance. But There are few instructions which have and hold the RFID emulator technology for organizing the RFID international test environment. Also there are not many manufacturing companies which recognize about the exact RFID test standard and requirements for the International Standards. In this paper, a construction of Tag Performance test environments and test methods are suggested which are required by EPCglobal or ISO/IEC. Details about RFID Tag performance test items proposed by ISO/IEC FDIS 18046-3 are explained, performed RFID Tag performance test through the performing test against each measured item, and draw a result for the RFID Tag performance of International Standards.

Secure biometric information delivery scheme of implantable device using code-division multiplexing method (코드 분할 다중화 방식을 이용한 체내삽입장치의 안전한 생체 정보 전달 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.14 no.3
    • /
    • pp.235-241
    • /
    • 2016
  • Among recent issues emerging in the areas related to the society, health has received the most attention. In this paper, for a patient unable to do self-care because of worsened diseases, a biological information transfer method is proposed by which the disease information can be securely managed, by attaching an implantable device into the body. Our method object of the invention is to prevent a third party from illegally intercepting and interfering with the biological information attached to the insertion device in the body. In the proposed technique to improve the safety of the patient between the hospital and physician by assigning each code to the biometric information of the patient in order to prevent a third party tapping and interfering. In addition, our method is assigned a code necessary for encoding in advance to confirm the biological information between the patient and the hospital (doctor) in a manner dividing the bio-information code. In particular, the proposed technique makes a third party unable to illegally tap or interfere in, by previously generating a code used for encoding so that it can be stored in the database of the hospital, which not only decreased hospital care time to 6.9%, but also increased work efficiency rate up to 12.7%.

Case Study on Meaningful use of Parameter - One Classroom of Third Grade in Middle School - (매개변수개념의 의미충실한 사용에 관한 사례연구 -중학교 3학년 한 교실을 대상으로-)

  • Jee, Young Myong;Yoo, Yun Joo
    • School Mathematics
    • /
    • v.16 no.2
    • /
    • pp.355-386
    • /
    • 2014
  • Algebraic generalization of patterns is based on the capability of grasping a structure inherent in several objects with awareness that this structure applies to general cases and ability to use it to provide an algebraic expression. The purpose of this study is to investigate how students generalize patterns using an algebraic object such as parameters and what are difficulties in geometric-arithmetic pattern tasks related to algebraic generalization and to determine whether the students can use parameters meaningfully through pattern generalization tasks that this researcher designed. During performing tasks of pattern generalization we designed, students differentiated parameters from letter 'n' that is used to denote a variable. Also, the students understood the relations between numbers used in several linear equations and algebraically expressed the generalized relation using a letter that was functions as a parameter. Some difficulties have been identified such that the students could not distinguish parameters from variables and could not transfer from arithmetical procedure to algebra in this process. While trying to resolve these difficulties, generic examples helped the students to meaningfully use parameters in pattern generalization.

  • PDF

Survey of Technical Parameters for Pediatric Chest X-ray Imaging by Using Effective DQE and Dose (유효검출양자효율과 선량을 이용한 소아 흉부 X-선 영상의 기술적인 인자에 관한 조사)

  • Park, Hye-Suk;Kim, Ye-Seul;Kim, Sang-Tae;Park, Ok-Seob;Jeon, Chang-Woo;Kim, Hee-Joung
    • Progress in Medical Physics
    • /
    • v.22 no.4
    • /
    • pp.163-171
    • /
    • 2011
  • The purpose of this study was to investigate the effect of various technical parameters for the dose optimization in pediatric chest radiological examinations by evaluating effective dose and effective detective quantum efficiency (eDQE) including the scatter radiation from the object, the blur caused by the focal spot, geometric magnification and detector characteristics. For the tube voltages ranging from 40 to 90 kVp in 10 kVp increments at the FDD of 100, 110, 120, 150, 180 cm, the eDQE was evaluated at the same effective dose. The results showed that the eDQE was largest at 60 kVp when compares the eDQE at different tube voltage. Especially, the eDQE was considerably higher without the use of an anti-scatter grid on equivalent effective dose. This indicates that the reducing the scatter radiation did not compensate for the loss of absorbed effective photons in the grid. When the grid is not used the eDQE increased with increasing FDD because of the greater effective modulation transfer function (eMTF). However, most of major hospitals in Korea employed a short FDD of 100 cm with an anti-scatter grid for the chest radiological examination of a 15 month old infant. As a result, the entrance surface air kerma (ESAK) values for the hospitals of this survey exceeded the Korean DRL (diagnostic reference level) of $100{\mu}Gy$. Therefore, appropriate technical parameters should be established to perform pediatric chest examinations on children of different ages. The results of this study may serve as a baseline to establish detailed reference level of pediatric dose for different ages.

An Examination into the Illegal Trade of Cultural Properties (문화재(文化財)의 국제적 불법 거래(不法 去來)에 관한 고찰)

  • Cho, Boo-Keun
    • Korean Journal of Heritage: History & Science
    • /
    • v.37
    • /
    • pp.371-405
    • /
    • 2004
  • International circulation of cultural assets involves numerous countries thereby making an approach based on international law essential to resolving this problem. Since the end of the $2^{nd}$ World War, as the value of cultural assets evolved from material value to moral and ethical values, with emphasis on establishing national identities, newly independent nations and former colonial states took issue with ownership of cultural assets which led to the need for international cooperation and statutory provisions for the return of cultural assets. UNESCO's 1954 "Convention for the Protection of Cultural Property in the Event of Armed Conflict" as preparatory measures for the protection of cultural assets, the 1970 "Convention on the Means of Prohibiting and Preventing the Illicit Import and Transfer of Ownership of Cultural Property" to regulate transfer of cultural assets, and the 1995 "Unidroit Convention on Stolen or Illegally Exported Cultural Objects" which required the return of illegally acquired cultural property are examples of international agreements established on illegal transfers of cultural assets. In addition, the UN agency UNESCO established the Division of Cultural Heritage to oversee cultural assets related matters, and the UN since its 1973 resolution 3187, has continued to demonstrate interest in protection of cultural assets. The resolution 3187 affirms the return of cultural assets to the country of origin, advises on preventing illegal transfers of works of art and cultural assets, advises cataloguing cultural assets within the respective countries and, conclusively, recommends becoming a member of UNESCO, composing a forum for international cooperation. Differences in defining cultural assets pose a limitation on international agreements. While the 1954 Convention states that cultural assets are not limited to movable property and includes immovable property, the 1970 Convention's objective of 'Prohibiting and preventing the illicit import, export and transfer of ownership of cultural property' effectively limits the subject to tangible movable cultural property. The 1995 Convention also has tangible movable cultural property as its subject. On this point, the two conventions demonstrate distinction from the 1954 Convention and the 1972 Convention that focuses on immovable cultural property and natural property. The disparity in defining cultural property is due to the object and purpose of the convention and does not reflect an inherent divergence. In the case of Korea, beginning with the 1866 French invasion, 36 years of Japanese colonial rule, military rule and period of economic development caused outflow of numerous cultural assets to foreign countries. Of course, it is neither possible nor necessary to have all of these cultural properties returned, but among those that have significant value in establishing cultural and historical identity or those that have been taken symbolically as a demonstration of occupational rule can cause issues in their return. In these cases, the 1954 Convention and the ratification of the first legislation must be actively considered. In the return of cultural property, if the illicit acquisition is the core issue, it is a simple matter of following the international accords, while if it rises to the level of diplomatic discussions, it will become a political issue. In that case, the country requesting the return must convince the counterpart country. Realizing a response to the earnest need for preventing illicit trading of cultural assets will require extensive national and civic societal efforts in the East Asian area to overcome its current deficiencies. The most effective way to prevent illicit trading of cultural property is rapid circulation of information between Interpol member countries, which will require development of an internet based communication system as well as more effective deployment of legislation to prevent trading of illicitly acquired cultural property, subscription to international conventions and cataloguing collections.

Perception on the Nursing Accident Experience of the Nurses and Its Cause (간호사(看護師)들의 간호사고(看護事故) 경험(經驗)과 사고원인(事故原因)에 관한 지각(知覺))

  • Lee, Soon-Bok;Moon, Heui-Ja
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.1 no.2
    • /
    • pp.246-267
    • /
    • 1995
  • Recently the request of the patients to participate in the medical courses has been expanding due to the elevated sense of right on the people's health, merchandised medical treatment by mass supply, human right declaration of the patients, generalized medical informations by the mass media and the change of human relation between the medical personnels and the patients. Under these phenomena the patients have been in the thought of solving such accidents only by regulation of the laws which they think to be all powerful, Such trends are same in the area of nursing service. Also today the accident by the nurses have been increasing by the area of the nurses having been expanded and their independent roles having been increased. Such nursing accidents are the important subject which the professional occupation of the nurse has been facing but legal protective capability of the nurses has been very weak. Therefore this study has examined the degree of the experience of the nursing accident that happens in the clinical nursing scenes in the general hospital to provide the basic materials for the protection and the counter measures of the nursing accident. The following is the conclusion based by the above examination. 1) The experience degree of the whole nursing accidents has been appeared as 1.90 in average. And the degree according to service area has been 1.77 in the area of supervising management of patients, 1.54 in the area of the same management of patients by head-nurses, 1.84 in the area of doctors' treatment performances, 14 in the enforcement and education areas of the nursing technology, 2.04 in the area of observing patients and judgement and 2.07 in the area of nursing records and maintaining confidentials. Accordingly there has been higher degree of accidental experiences in the independent service areas of the patients than in the dependent ones directed by the doctors. 2) The perception of the nurses showed that the cause of the nursing accident has been due to the heavy work of the nurses with the 60.4% of the response rate, the highest rate. They report the accident to the head nurse first by 2/3 nurses after accident. And the hour of the accident has been frequently happened regardless of service hours with 48.1% in response rate, the highest rate, and the nursing accident happens in the night more than the daytime with the rate of 37.5% at night while 14. 4% daytime. 3) The nurses are in the perception that the patients are responsible for the accident with 48.2% response rate while 43.9% rate in response showed that it has been caused by many people. They are in the perception that 41.7% when the nursing power was lacking, 46.7% lower recognition of actual state about indivitual patient in the section of technical speciality and 35.8% when the patients were not cooperative and 37.8% when the wards were dirty and in disorder. 4) the attitude of the patients after the various nursing accidents has been violent words in 72.7%, violence in 17.4% and 3.9% in attending the court by the sue of the patient's side(18 nurses). 5) The action of the hospital has been : requesting the submission of the story of the accident in 22.8%, the report of the accidents in 14.4%, thus the written statement disposal was most, 4.5% was the transfer to the other departments when the accident was larger or the patients' guardians protested strongly and 0.6% of the dismissals of the nurses. 6) In regard to the responsiblity of the nurse accidents, 78.9% was the highest rate of supplying the nursing manpowers, 48.4% of mutual cooperation of the medical personnels, 37.2% of strengthening the education for the nurses and hospital facilities reformation in 32.7%. 7) The review of relation between the general characters of the object of the study and the degree of experience of nursing accidents showed the significant differences in ages (F=4.04, p=0.000).

  • PDF

Analysis of Production Cost of Walnut Tree Cultivation in Major Cultivating Regions (호두나무 주요 재배지역의 생산비 분석)

  • Kim, Jae-Sung;Lee, Uk
    • Journal of Korean Society of Forest Science
    • /
    • v.99 no.4
    • /
    • pp.611-617
    • /
    • 2010
  • The current studies aim is to analyze the production cost of walnut tree cultivation and its object was targeted at walnut tree cultivating household region 163. The analysis is as follows. Our domestic walnut tree cultivating households averagely have cultivated about 0.7ha, and planting number per ha was averagely 204, and it showed that compared to the standard planting number (100), the plantation was done close planted. The most cultivar cultivated according to regions were Chungbuk region: sangchon 65.7%, Chungnam region: kwangduk 68.6%, Jeonbuk region: sangchon 98.0%, Gyeongbuk region: daeboo 61.2%. The production cost for cultivating walnuts can be classified into the followings; management cost(4436 thousand won/ha) such as manufacturing cost(292 thousand won/ha), intermediate material cost(3682 thousand won/ha), rent(103 thousand won/ha), employment cost(653 thousand won/ha) etc, and self-serviced expenses such as self-laboring cost(5,834 thousand won/ha), land security cost(490 thousand won/ha), fixed capital cost(834 thousand won/ha), circulating capital cost(234 thousand won/ha) etc. 11,820 thousand won were invested for the production cost of walnut and it made 11,586 thousand won/ha(rate of investment 72.3%) profit, and the net income was 4,196 thousand won/ha(net income rate 26.2%), showing high amount of income. The manufactured walnuts were marketed in Nong-hyup 39.8%, wholesalers 20.8%, dealers 19.8% and recently, as the amount of goods marketed directly to consumers themselves have increased, the income has reached up to 18.9%. At the basis of making most of idle soil, walnut tree's cultivated regions are fairly small, and due to the characteristics of sideline management, it has its limits in searching for production policy locally and promotion strategy of industries. Therefore, if the basic database can be established, subjected only to full-time cultivating households, then not only would the differences between the imported walnuts be reinforced, it would also be possible to transfer into the new and improved distribution system. Furthermore, through establishment of the database, it can be anticipated that it would contribute greatly in the increase of the household income.

Neo-Confucian Study of Modern 'Science of gaining knowledge by the study of things[格物致知學] (근대 '격물치지학(格物致知學)[science]'에 대한 유학적 성찰)

  • Park, Jeoung Sim
    • The Journal of Korean Philosophical History
    • /
    • no.43
    • /
    • pp.141-170
    • /
    • 2014
  • Science of gaining knowledge by the study of things[格物致知學]' is the translation of Science in Chosun age. Science of gaining knowledge by the study of things[格物致知學] which is the highest stage of new science is the symbol of the transfer of universal culture to the western modern civilization from old-fashioned confucianism. Modern western culture and the scientific way of thinking make man as a object to scientific research. Thinking method of social Darwinism made man believe to think like them as the modern method. And also such thinking method made man militarism and imperialism are right thinking and research methods. The core to think the science of gaining knowledge by the study of things[格 物致知學] as a violent thinking method is the Confucianism. By this method Park Eun-sik criticize this side of scientific technology as the means of militarism. Till now we pointed to think of the traditional philosophy as the tool of the western modern philosophy about war criminal. Now we rethink of the Confucianism asset as a tool of Korean Modern Culture. Musungmumul[無誠無 物] will offer moral basis to think humanism of the scientific technology of the modern western culture.

A Store Recommendation Procedure in Ubiquitous Market for User Privacy (U-마켓에서의 사용자 정보보호를 위한 매장 추천방법)

  • Kim, Jae-Kyeong;Chae, Kyung-Hee;Gu, Ja-Chul
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.123-145
    • /
    • 2008
  • Recently, as the information communication technology develops, the discussion regarding the ubiquitous environment is occurring in diverse perspectives. Ubiquitous environment is an environment that could transfer data through networks regardless of the physical space, virtual space, time or location. In order to realize the ubiquitous environment, the Pervasive Sensing technology that enables the recognition of users' data without the border between physical and virtual space is required. In addition, the latest and diversified technologies such as Context-Awareness technology are necessary to construct the context around the user by sharing the data accessed through the Pervasive Sensing technology and linkage technology that is to prevent information loss through the wired, wireless networking and database. Especially, Pervasive Sensing technology is taken as an essential technology that enables user oriented services by recognizing the needs of the users even before the users inquire. There are lots of characteristics of ubiquitous environment through the technologies mentioned above such as ubiquity, abundance of data, mutuality, high information density, individualization and customization. Among them, information density directs the accessible amount and quality of the information and it is stored in bulk with ensured quality through Pervasive Sensing technology. Using this, in the companies, the personalized contents(or information) providing became possible for a target customer. Most of all, there are an increasing number of researches with respect to recommender systems that provide what customers need even when the customers do not explicitly ask something for their needs. Recommender systems are well renowned for its affirmative effect that enlarges the selling opportunities and reduces the searching cost of customers since it finds and provides information according to the customers' traits and preference in advance, in a commerce environment. Recommender systems have proved its usability through several methodologies and experiments conducted upon many different fields from the mid-1990s. Most of the researches related with the recommender systems until now take the products or information of internet or mobile context as its object, but there is not enough research concerned with recommending adequate store to customers in a ubiquitous environment. It is possible to track customers' behaviors in a ubiquitous environment, the same way it is implemented in an online market space even when customers are purchasing in an offline marketplace. Unlike existing internet space, in ubiquitous environment, the interest toward the stores is increasing that provides information according to the traffic line of the customers. In other words, the same product can be purchased in several different stores and the preferred store can be different from the customers by personal preference such as traffic line between stores, location, atmosphere, quality, and price. Krulwich(1997) has developed Lifestyle Finder which recommends a product and a store by using the demographical information and purchasing information generated in the internet commerce. Also, Fano(1998) has created a Shopper's Eye which is an information proving system. The information regarding the closest store from the customers' present location is shown when the customer has sent a to-buy list, Sadeh(2003) developed MyCampus that recommends appropriate information and a store in accordance with the schedule saved in a customers' mobile. Moreover, Keegan and O'Hare(2004) came up with EasiShop that provides the suitable tore information including price, after service, and accessibility after analyzing the to-buy list and the current location of customers. However, Krulwich(1997) does not indicate the characteristics of physical space based on the online commerce context and Keegan and O'Hare(2004) only provides information about store related to a product, while Fano(1998) does not fully consider the relationship between the preference toward the stores and the store itself. The most recent research by Sedah(2003), experimented on campus by suggesting recommender systems that reflect situation and preference information besides the characteristics of the physical space. Yet, there is a potential problem since the researches are based on location and preference information of customers which is connected to the invasion of privacy. The primary beginning point of controversy is an invasion of privacy and individual information in a ubiquitous environment according to researches conducted by Al-Muhtadi(2002), Beresford and Stajano(2003), and Ren(2006). Additionally, individuals want to be left anonymous to protect their own personal information, mentioned in Srivastava(2000). Therefore, in this paper, we suggest a methodology to recommend stores in U-market on the basis of ubiquitous environment not using personal information in order to protect individual information and privacy. The main idea behind our suggested methodology is based on Feature Matrices model (FM model, Shahabi and Banaei-Kashani, 2003) that uses clusters of customers' similar transaction data, which is similar to the Collaborative Filtering. However unlike Collaborative Filtering, this methodology overcomes the problems of personal information and privacy since it is not aware of the customer, exactly who they are, The methodology is compared with single trait model(vector model) such as visitor logs, while looking at the actual improvements of the recommendation when the context information is used. It is not easy to find real U-market data, so we experimented with factual data from a real department store with context information. The recommendation procedure of U-market proposed in this paper is divided into four major phases. First phase is collecting and preprocessing data for analysis of shopping patterns of customers. The traits of shopping patterns are expressed as feature matrices of N dimension. On second phase, the similar shopping patterns are grouped into clusters and the representative pattern of each cluster is derived. The distance between shopping patterns is calculated by Projected Pure Euclidean Distance (Shahabi and Banaei-Kashani, 2003). Third phase finds a representative pattern that is similar to a target customer, and at the same time, the shopping information of the customer is traced and saved dynamically. Fourth, the next store is recommended based on the physical distance between stores of representative patterns and the present location of target customer. In this research, we have evaluated the accuracy of recommendation method based on a factual data derived from a department store. There are technological difficulties of tracking on a real-time basis so we extracted purchasing related information and we added on context information on each transaction. As a result, recommendation based on FM model that applies purchasing and context information is more stable and accurate compared to that of vector model. Additionally, we could find more precise recommendation result as more shopping information is accumulated. Realistically, because of the limitation of ubiquitous environment realization, we were not able to reflect on all different kinds of context but more explicit analysis is expected to be attainable in the future after practical system is embodied.