• Title/Summary/Keyword: Popularization

Search Result 597, Processing Time 0.031 seconds

X-ray Image Correction Model for Enhanced Foreign Body Detection in Metals (금속 내부의 이물질 검출 향상을 위한 X-ray 영상 보정 모델)

  • Kim, Won
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.10
    • /
    • pp.15-21
    • /
    • 2019
  • X-rays with shorter wavelengths than ultraviolet light have very good penetration power. It is convergence in industrial and medical fields has been used a lot. n particular, in the industrial field, various researches have been conducted on the detection of foregin body inside metal that can occur in the production process of products such as metal using x-ray, a non-destructive inspection device. Detectors are becoming increasingly popular for the popularization of DR (Digital Radiography) photography methods that digitally acquire X-ray video images. However, there are cases where foreign body detection is impossible depending on the sensor noise and sensitivity inside the detector. When producing a metal product, since the defective rate of the produced product may increase due to contamination of the foreign body, accurate detection is necessary. In this paper, we provide a correction model for X-ray images acquired in order to improve the efficiency of defect detection such as foreign body inside metal. When applied to defect detection in the production process of metal products through the proposed model, it is expected that the detection of product defects can be processed accurately and quickly.

Service model development and importance analysis using shared economic service - As a specialization center for mail service (공공서비스의 공유경제 서비스모델 도입 위한 중요요인 분석 -우체국 서비스를 중심으로)

  • Park, Sung Hwan;Leem, Choon Seong
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.5
    • /
    • pp.181-188
    • /
    • 2019
  • People can easily use a shared economic service system based on ICT technology. Most of the shared economic services are provided by private companies, and discussion on public goods is insufficient. If we look at the current shared economic service from the point of view of courier service, $\ddot{U}ber^{\prime}s$ system can be an alternative. The post office courier service uses ICT technology but differs from the service of the shared economy. This study uses Delphi analyzer method and AHP methodology to derive important factors in introducing shared economic system. As a result, socioeconomic characteristics were found to be the most important in the upper tier, and the shared economic platform, sharing of idle resources, popularization of smartphone, and increase of e - commerce were the four important factors in the lower tier. In order to maximize efficiency, which is the essence of the shared economy, the necessity of introduction into the shared economic system and important factors in the introduction of public goods are presented.

A STUDY ON THE PROJECTION METHOD OF THE 「HON-CHON-JEON-DO」 (「혼천전도」의 투영법 고찰)

  • KIM, K.T.;CHO, YONGHAN
    • Publications of The Korean Astronomical Society
    • /
    • v.34 no.1
    • /
    • pp.1-16
    • /
    • 2019
  • "Hon-Chon-Jeon-Do" is a woodcut star map with the size of $79.4cm{\times}127.5cm$, and was widely disseminated as it was made into a set with Kim, Jung Ho's "Yeoji-Jeon-Do". This study confirmed that Yixiang kaocheng xubian ("의상고성속편") star catalogue was used as a source to produce the star map, and the stereographic projection was applied with the projection center being the mid-point (Q) between the celestial and ecliptic north poles. The 'mid-circle' around the Q is arisen between the equator and the ecliptic, and on this circle, the hour angle and the ecliptic longitude of a star can be marked using the same scale. This means that the hour of the day and the season of the year can be read on the same dial of the mid-circle, and the application of this character in the practical use was the key point of the star map production. By observing either transits or positions of the 28 xiu (宿), it is easy to find the corresponding season and time by simply reading the dial on the mid-circle. This is just the function of a portable almanac and thus by disseminating it widely, the convenience of the people would have been promoted. For this reason, it can be stated that "Hon-Chon-Jeon-Do" was a practical astronomical tool which was produced by the western astronomical projection method and was used to find time and season. Choi, Han Ki and Kim, Jung Ho are strong candidates for the makers of this star map. The time of production is estimated to be 1848 ~ 1857, and "Hon-Chon-Jeon-Do" could be regarded as a good contributor to popularization of astronomy in the late Joseon Dynasty.

In-vitro meat: a promising solution for sustainability of meat sector

  • Kumar, Pavan;Sharma, Neelesh;Sharma, Shubham;Mehta, Nitin;Verma, Akhilesh Kumar;Chemmalar, S;Sazili, Awis Qurni
    • Journal of Animal Science and Technology
    • /
    • v.63 no.4
    • /
    • pp.693-724
    • /
    • 2021
  • The in-vitro meat is a novel concept in food biotechnology comprising field of tissue engineering and cellular agriculture. It involves production of edible biomass by in-vitro culture of stem cells harvested from the muscle of live animals by self-organizing or scaffolding methodology. It is considered as efficient, environmental friendly, better ensuring public safety and nutritional security, as well as ethical way of producing meat. Source of stem cells, media ingredients, supply of large size bioreactors, skilled manpower, sanitary requirements, production of products with similar sensory and textural attributes as of conventional meat, consumer acceptance, and proper set up of regulatory framework are challenges faced in commercialization and consumer acceptance of in-vitro meat. To realize any perceivable change in various socio-economic and environmental spheres, the technology should be commercialized and should be cost-effective as conventional meat and widely accepted among consumers. The new challenges of increasing demand of meat with the increasing population could be fulfill by the establishment of in-vitro meat production at large scale and its popularization. The adoption of in-vitro meat production at an industrial scale will lead to self-sufficiency in the developed world.

Quality Diagnosis of Library-Related Open Government Data: Focused on Book Details API of Data for Library (도서관 공공데이터의 품질에 관한 연구: 도서관 정보나루의 도서 상세 조회 API를 중심으로)

  • Yang, Suwan
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.4
    • /
    • pp.181-206
    • /
    • 2020
  • With the popularization of open government data, Library-related open government data is also open and utilized to the public. The purpose of this paper is to diagnose the quality of library-related open government data and propose improvement measures to enhance the quality based on the diagnosis result. As a result of diagnosing the completeness of the data, a number of blanks are identified in the bibliographic elements essential for identifying and searching a book. As a result of diagnosing the accuracy of the data, the bibliographic elements that are not compliant with the data schema have been identified. Based on the result of data quality diagnosis, this study suggested improving the data collection procedure, establishing data set schema, providing details on data collection and data processing, and publishing raw data.

Hacking attack and vulnerabilities in vehicle and smart key RF communication (차량과 스마트키 RF통신에 대한 해킹 공격 및 취약점에 대한 연구)

  • Kim, Seung-woo;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.8
    • /
    • pp.1052-1057
    • /
    • 2020
  • With the development of new ICT technology, smart keys for vehicles are terminals with ICT technology. Therefore, when the vehicle and the smart key communicate with RF, a cyber hacking attack is possible. Cyber-attacks on smart keys can pose a threat to vehicle theft and vehicle control. Therefore, it is necessary to study hacking attacks and vulnerabilities of smart keys for autonomous vehicles. In this paper, we analyze the cyber attack case of RF communication for vehicles and smart keys. In addition, a real RF cyber attack on the smart key is performed, and the vulnerability of radio wave replication in the same frequency band is found. In this paper, we analyze the vulnerability of RF communication between vehicles and smart keys, and propose a countermeasure against cyber security. In the future, plans to strengthen cyber attacks and security through the popularization of autonomous vehicles will become basic data to protect human and vehicle safety.

A Study on The Effects of Cyber-Bullying in Adolescents on SNS Addiction: Focusing on the Moderating Effects of Friendship (청소년의 SNS 중독이 사이버불링에 미치는 영향: 또래애착관계의 조절효과검증)

  • Jun, Ji Hyoung;Kim, Ri Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.499-506
    • /
    • 2021
  • The purpose of this study is to verify the effect of SNS addiction on cyber-bullying among adolescents, considering the adjustment effect of friendship on this relationship. This study involved 811 middle/high school students with a gender distribution of 391 males and 420 females. According to the analysis, the higher the level of SNS addiction, the higher the level of cyber-bullying. A hierarchical regression analysis was conducted to verify the moderating effect of friendship. The result shows that better peer communication and reliance lowers the impact of cyber-bullying from SNS addiction. Based on research results suggesting the popularization of proactive pre-diagnosis programs to solve SNS addiction, practical intervention plans and the limitations of research on SNS addiction and cyber-bullying in youth are suggested.

Strength Development Mechanism of Inorganic Injection Material (무기질계 주입재의 강도발현 메커니즘)

  • Han, yunsu;Lee, Jonghwi;Kang, Hyoungnam;Baeg, Seungin;Chun, Byungsik
    • Journal of the Korean GEO-environmental Society
    • /
    • v.12 no.10
    • /
    • pp.5-12
    • /
    • 2011
  • Recently, NDS(Natural and Durable Stabilizer)method and other similar methods are composed of inorganic accelerating agent and the ultra-super fine cement have been studied as the ground improvement material in Korea. However, in the existing research, the chemical changing process of NDS in the strength development mechanism with the elapsed curing time and the principles of strength development did not give an explanation. For the popularization of the inorganic grout material, it determined that the mechanism verifying of the curing process had to be clearly preceded. Therefore, unconfined compression test, SEM and XRD analysis were performed by the elapsed curing time and were analyzed. In addition, the same trial for SGR method, that is the representative example of the water glass grout material, was selected as comparative target in order to distinguish properties of NDS more clearly. The result of experiment, the strength development mechanism of NDS could be investigated through the close correlation of the unconfined compression strength - SEM - XRD analysis, and excellence of a performance was confirmed.

Analysis of Security Vulnerability on Firewall Logging Mechanism against DDoS Attack (DDoS 공격에 대한 방화벽 로그 기록 취약점 분석)

  • Choun, Jun-Ho;Jang, Kun-Won;Jun, Moon-Seog;Shin, Dong-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.143-148
    • /
    • 2007
  • In the context of mass traffic, firewall system cannot record normal log files against DDoS attack. The loss of log record causes that a firewall system does not know whether a packet is normally filtered or not, and firewall log, which is an essential data for the counter measure of violation accident, cannot be verified as trusted. As a network speed increases, these problems happen more frequently and largely. Accordingly, the method to use simply additional hardware devices is not recommended for the popularization of firewall. This paper is devoted to verify the loss of iptable log that is the mother's womb of most domestic firewall systems and show that the log handling methods for conventional firewall systems are needed to improve.

Robust Estimation of Hand Poses Based on Learning (학습을 이용한 손 자세의 강인한 추정)

  • Kim, Sul-Ho;Jang, Seok-Woo;Kim, Gye-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1528-1534
    • /
    • 2019
  • Recently, due to the popularization of 3D depth cameras, new researches and opportunities have been made in research conducted on RGB images, but estimation of human hand pose is still classified as one of the difficult topics. In this paper, we propose a robust estimation method of human hand pose from various input 3D depth images using a learning algorithm. The proposed approach first generates a skeleton-based hand model and then aligns the generated hand model with three-dimensional point cloud data. Then, using a random forest-based learning algorithm, the hand pose is strongly estimated from the aligned hand model. Experimental results in this paper show that the proposed hierarchical approach makes robust and fast estimation of human hand posture from input depth images captured in various indoor and outdoor environments.