• Title/Summary/Keyword: Personal Use

Search Result 2,694, Processing Time 0.036 seconds

Image Reformation with a Personal Computer for Dental Implant Planning (치과 임플란트 계획시 개인용 컴퓨터를 이용한 영상재형성에 관한 연구)

  • Eun-Kyung Kim
    • Journal of Oral Medicine and Pain
    • /
    • v.21 no.2
    • /
    • pp.255-264
    • /
    • 1996
  • This study was performed to demonstrate the method of image reformation for dental implants, using a personal computer with inexpensive softwares and to compare the images reformatted using the above method with those using Dentascan software. CT axial slices of 4 mandibles of 4 volunteers from GE Highspeed Advantage(GE Medical systems, U.S.A.) were used. personal computer used for image reformation was PowerWave 604/120 (Power computing Co, U.S.A. ) and softwares used were Osiris (Univ. Hospital of Geneva, Switzerland) and ImportACLESS Vl.1 (Designed Access Co., U.S.A.) for importing CT images and NIH image 1.58 (NIH, U.S.A.) for image processing. Seven image were selected among the serial reconstructed cross-sectional images produced by Dentascan. Seven resliced cross-sectional images at the same position were obtained at the personal computer. Regression analysis of the measurements of PC group was done against those of DS group. Measurements of the bone height and width at the reformer cross-sectional images using Mac-compatible computer was highly correlated with those using workstation with Dentascan software(height : r2= 0.999, p<0.001, width : r2= 0.993, p <0.001). So, it is considered that we can use a personal computer with inexpensive software for the dental implant planning, instead of the expensive software and workstation.

  • PDF

The Evaluation Criteria of Learning Abilities for Personal Robots and It's Application to a Cleaning Robot (개인용 로봇을 위한 학습능력 평가기준 및 청소로봇에 대한 적용 사례)

  • Kim Yong Jun;Kim Jin-Oh;Yi Keon Young
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.54 no.5
    • /
    • pp.300-306
    • /
    • 2005
  • In this paper we present a guideline to evaluate how easy the use of personal robots is and how good their learning abilities are, based on the analysis of their built-in commands, user interfaces, and intelligences. Recently, we are living with robots that can be able to do lots of roles; cleaning, security, pets and education in real life. They can be classified as home robots, guide robots, service robots, robot pets, and so on. There we, however, no standards to evaluate their abilities, so it is not easy to select an appropriate robot when a user wants to buy it. Thus, we present, as a guideline that can be a standard for the evaluation of the personal robots, the standards by means of analyzing existing personal robots and results of the recent research works. We will, also, demonstrate how to apply the evaluation method to the cleaning robot as an example.

Protection of Consumer Privacy in Electronic Commerce -Focused on On-line Monitoring Survey of Electronic Commerce Firms- (전자상거래에 있어서 소비자 프라이버시 보호에 관한 연구 -인터넷 전자상거래업체의 온라인모니터링조사를 중심으로-)

  • Kim, Hea-Seon;Seo, Min-Kyo;Chun, Cheong-Ghi
    • International Commerce and Information Review
    • /
    • v.6 no.2
    • /
    • pp.219-242
    • /
    • 2004
  • This study is conducted to find out whether companies which use electronic commerce for their business are collecting the least personal information. of consumers that are necessary for providing electronic commerce services to consumers. Investigators visited website of 799 electronic commerce companies, and checked out the personal informations of consumers that were asked when they join the site as a member. The collected data were analyzed with frequency, percentage, and cross-tab analysis using SPSS program. Generally most electronic commerces required more personal information of consumers than necessary for providing their services to consumers. These phenomena are partly due to the fact that regulations regarding consumer privacy in electronic commerce are advisory rather than mandatory at present. Therefore, it is suggested that mandatory regulation which makes companies poot their identification within a certain area of their web page has to enforced for the protection of consumer privacy in electronic commerce. And it would be more efficient if consumers are consistently educated about self protection guideline regarding personal information in using electronic commerce in addition to a mandatory regulation.

  • PDF

The Development of Personal Computer Control System Using Voice Command (음성 명령을 이용한 개인용 컴퓨터 조작 시스템의 구현)

  • Lee, Tae Jun;Kim, Dong Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.101-102
    • /
    • 2018
  • Users who using computer may experience fatigue or sickness on their wrists if they use the keyboard and mouse for a long time. People with physical disabilities will find it difficult to work with the keyboard and mouse. There is a problem in that the substitute product for solving this is limited in function or expensive. In this paper, we development a system for controlling a personal computer with voice commands using the Amazon Echo and Amazon Web Services lambda functions. The implemented system processes the user's voice commands from the Amazon web server and sends them to the personal computer. The personal computer processes the received command and uses it to operate the application program.

  • PDF

The Suggestion for Improvement of the Education System of Private Security Employees (민간경비원 교육과정의 문제점과 개선방안)

  • Ahn, Hwang-Kwon;Kim, Il-Gon
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.13-21
    • /
    • 2012
  • The purpose of this study is to profile actual conditions of personal information protection systems operated in overseas countries and examine major considerations of personal information that security service providers must know in the capacity of privacy information processor, so that it may contribute to preventing potential occurrence of any legal disputes in advance. Particularly, this study further seeks to describe fundamental idea and principle of said Personal Information Protection Act; enhancement of various safety measures (e.g. collection/use of privacy data, processing of sensitive information/personal ID information, and encryption of privacy information); restrictions on installation/operation of video data processing devices; and penal regulations as a means of countermeasure against leakage of personal information, while proposing possible solutions to cope with these matters. Using cases among foreign countries for this study.

The Factors Affecting Dining-out Expenses by Generation X and Generation MZ Based on Tobit Model (토빗분석을 적용한 X세대, MZ세대의 외식지출 영향요인)

  • Min, Ji Eun;Han, Kyung Soo
    • Journal of the Korean Society of Food Culture
    • /
    • v.36 no.3
    • /
    • pp.284-292
    • /
    • 2021
  • The food service industry has grown larger with changes in the economic and socio-cultural environment. In this saturated food service industry, generation X and MZ are the main consumer forces that demand attention. That is because a generation is the main psychographic factor that reflects personal values and lifestyle based on one's life cycle. From such a perspective, a generation in marketing has been used as a variable to predict a market by supplementing demographic factors. Accordingly, this study classified generations into generation X and generation MZ with the use of the 2019 consumer behavior survey for food by Korea Rural Economic Institute (KREI) and then investigated the factors influencing group and personal dining-out expenses. The analysis was carried out applying the Tobit model using SPSS and R. The positively influential variables on generation X's personal dining-out expenditure were male, single person, high income and simple lifestyle, whereas housewives, personal ethical consciousness, behavioral ethical consciousness, and safe dietary life were negatively influential variables. The positively influential variables on generation MZ's personal dining-out expenditures were male, dual-income, high education level, corporate and governmental ethical consciousness, while the number of family members and safe dietary life were negatively influential variables.

The Personal Information Management Practices of the Graduates of the Department of Information Studies at Kuwait University

  • AlRukaibani, Bashaer;Chaudhry, Abdus Sattar
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.9 no.1
    • /
    • pp.19-42
    • /
    • 2019
  • This study examined activities involving the finding, organizing, managing, and re-finding of information by knowledge workers in Kuwait. This research also conducted a review of the tools needed for effective personal information management (PIM) and assessed perceptions about improving PIM through Internet use. Data were collected through semi-structured interviews conducted among 26 graduates of the Department of Information Studies at Kuwait University. These participants are currently employed in different sectors engaged in a variety of information-related activities. This study's findings indicated that participants gathered different types of information from a variety of sources. This information was stored using several devices and services, including desktop computers, shared drives, clouds, bookmarked websites, e-mail correspondence, and favorites lists. Participants organized information in personal folders according to categories such as subject/topic, time, project, document type, and geographical region. Preferred methods for information re-finding included searching by keyword and browsing through folders. Interviewees reported problems of information overload, fragmentation, and anxiety. Most were active in social media via mobile device, while some of them used Siri or Ask Google to retrieve information. Tools used for PIM included calendars, tasks, schedules, e-mail management tools, clouds, and social networking tools. Participants reported that the Internet helped with personal information management practices, but that some privacy issues arose in this context.

The effect of motivation of using instagram on flow of instagram and career preparation behavior of job seekers for cabin crew: inclusion of personal characteristic as a moderator (승무원 준비생의 3세대 SNS 사용동기가 몰입과 진로준비행동에 미치는 영향 연구 : 개인적 특성 조절변수 추가)

  • Ko, Min Hwan
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.26 no.4
    • /
    • pp.76-90
    • /
    • 2018
  • Despite the growing use of SNS and the increasing number of recruitment related to SNS, little research has been conducted between career preparation activities and relationship with SNS. Therefore, this study investigates the relationships among purpose of using instagram, flow of instagram and career preparation behavior using structural equation model, and by investigating the adjustment effect of the personal characteristic among them. To this end an online survey was conducted for students who want to be cabin crew. The results of this study show that motivation of using instagram had a positive and significant effect on flow of instagram, which in turn positively influenced career preparation behavior. Furthermore, it could be confirmed that there was a adjustment moderating effect on personal characteristic between purpose of using instagram and flow of using instagram. The results of this study suggest that the likelihood of recruitment for being cabin crew can be achieved by identifying mutual relationships among motivation of using instagram, flow of instagram, career preparation behavior, and personal characteristics.

Effects of Experimental Attitude and Perceived Privacy Protection on the Satisfaction and Loyalty: A Case of Unmanned Convenience Store (무인편의점 이용객의 실험태도와 개인정보보호가 만족도 및 충성도에 미치는 영향에 관한 연구)

  • Sai Wang;Tae-Woo Roh;Jin-Ho Noh
    • Korea Trade Review
    • /
    • v.46 no.4
    • /
    • pp.17-37
    • /
    • 2021
  • This study aims to examine the effects of experimental attitudes and perceived personal information protection on satisfaction and loyalty for Chinese consumers who use unmanned convenience stores. The important results of this study are as follows. First, consumers' perception of the experimental servicescape of unmanned convenience stores in China has an effect on the consumer's experimental attitude. Consumers' perception of experimental diversity in unmanned convenience stores in China has an effect on the consumer's experimental attitude. Second, consumers' perception of the information quality of unmanned convenience stores in China has an impact on the consumer's personal information protection. Consumers' perception of the service quality of unmanned convenience stores in China has an impact on consumer's personal information protection. Third, consumers' perception of personal information protection in unmanned convenience stores in China has an effect on the consumer's experimental attitude. Fourth, consumers' perception of personal information protection in unmanned convenience stores in China has an effect on consumer satisfaction with experiments. Consumers' perception of the experiment attitude of unmanned convenience stores in China has an effect on the consumer's satisfaction with the experiment.

Application of Data Mining on Simultaneous Activities on the Time Use Survey

  • Nam, Ki-Seong;Kim, Hee-Jea
    • Journal of the Korean Data and Information Science Society
    • /
    • v.14 no.4
    • /
    • pp.737-749
    • /
    • 2003
  • This Paper analyzed simultaneous activities of the time use survey by Korea National Statistical Office to use data mining's association rule. The survey of National Statistical Office in 1999 considered general analysis for main activities like that personal care(eating), employment and study, leisure, travel by purpose. But if we use the association rule, we can found the ratio of simultaneous activities at the same time. And also we can found the probability that another activities practise if we act one particular activity. Using this association rule of data mining we can do more developed and analytical sociological study.

  • PDF