• Title/Summary/Keyword: Read-through

Search Result 651, Processing Time 0.027 seconds

A Study on the Interior Design of a Dog-Friendly Hotel Using Deepfake DID for Alleviation of Pet loss Syndrome

  • Hwang, Sungi;Ryu, Gihwan
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.248-252
    • /
    • 2022
  • The environment refers to what is surrounded by something during human life. This environment is related to the way humans live, and presents various problems on how to perceive the surrounding environment and how the behaviors that constitute the environment support the elements necessary for human life. Humans have an interest in the supportability of the environment as the interrelationship increases as humans perceive and understand the environment and accept the factors supported by the environment. In space, human movement starts from one space to the next and exchanges stimuli and reactions with the environment until reaching a target point. These human movements start with subjective judgment and during gait movement, the spatial environment surrounding humans becomes a collection of information necessary for humans and gives stimulation. will do. In this process, in particular, humans move along the movement path through movement in space and go through displacement perception and psychological changes, and recognize a series of spatial continuity. An image of thinking is formed[1]. In this process, spatial experience is perceived through the process of filtering by the senses in the real space, and the result of cognition is added through the process of subjective change accompanied by memory and knowledge, resulting in human movement. As such, the spatial search behavior begins with a series of perceptual and cognitive behaviors that arise in the process of human beings trying to read meaning from objects in the environment. Here, cognition includes the psychological process of sorting out and judging what the information is in the process of reading the meaning of the external environment, conditions, and material composition, and perception is the process of accepting information as the first step. It can be said to be the cognitive ability to read the meaning of the environment given to humans. Therefore, if we can grasp the perception of space while moving and human behavior as a response to perception, it will be possible to predict how to grasp it from a human point of view in a space that does not exist. Modern people have the theme of reminiscing dog-friendly hotels for the healing of petloss syndrome, and this thesis attempts to approach the life of companions.

Looking through Others' Eyes: A Double Perspective in Literary and Film Studies

  • Kim, Seong-Kon
    • Journal of English Language & Literature
    • /
    • v.60 no.2
    • /
    • pp.249-267
    • /
    • 2014
  • An outsider's perspective is often illuminating and enlightening, as he or she perceives the world differently from us, and sees things that insiders tend to miss. While an outsider's views are fresh and penetrating, an insider's vision is often banal and myopic. Although outsiders' perspectives may not be quite right at times, they always shed light and provide insight, allowing us to reevaluate the conventional interpretations of our literature and folktales. In order to prevent our own understanding and knowledge from growing stale and narrow-minded, we should endeavor to consider outsiders' opinions and view all things from multiple angles. When reading literary or cultural texts, therefore, we need to read through others' eyes because it provides alternative perspectives. And we should learn to co-exist with others and see things from others' eyes. In his celebrated novel, My Name Is Red, Orhan Pamuk, the Turkish Nobel Laureate, explores the themes of clashes between the East and the West, the young and the old, and conservatism and radicalism. The confrontation between the stubborn defenders of tradition and the self-righteous innovators ultimately results in bigotry, hatred and murder. As Pamuk aptly perceives in his novel, the inevitable outcome of such uncompromising conflict is degradation of humanity and annihilation of human civilization. That is precisely why we need to embrace others who are different from us and learn to look through others' eyes. Sometimes, we fear other voices and different perspectives. As the movie "The Others" suggests, however, there is no reason for us to be afraid of others.

Realization of Readout Circuit Through Integrator to Average MCT Photodetector Signals of Noncontact Chemical Agent Detector (비접촉 화학작용제 검출기의 MCT 광검출기를 위한 적분기 기반의 리드아웃 회로 구현)

  • Park, Jae-Hyoun
    • Journal of Sensor Science and Technology
    • /
    • v.31 no.2
    • /
    • pp.115-119
    • /
    • 2022
  • A readout circuit for a mercury-cadmium-telluride (MCT)-amplified mid-wave infrared (IR) photodetector was realized and applied to noncontact chemical agent detectors based on a quantum cascade laser (QCL). The QCL emitted 250 times for each wavelength in 0.2-㎛ steps from 8 to 12 ㎛ with a frequency of 100 kHz and duty ratio of 10%. Because of the nonconstant QCL emission power during on-duty, averaging the photodetector signals is essential. Averaging can be performed in digital back-end processing through a high-speed analog-to-digital converter (ADC) or in analog front-end processing through an integrator circuit. In addition, it should be considered that the 250 IR data points should be completely transferred to a PC during each wavelength tuning period of the QCL. To average and minimize the IR data, we designed a readout circuit using the analog front-end processing method. The proposed readout circuit consisted of a switched-capacitor integrator, voltage level shifter, relatively low-speed analog-to-digital converter, and micro-control unit. We confirmed that the MCT photodetector signal according to the QCL source can be accurately read and transferred to the PC without omissions.

A Read-In Integrated Circuit for IR Scene Projectors Adopting a Sub-Frame Control Technique for Minimizing the Temperature Loss (온도 손실의 최소화를 위해 Sub-Frame 제어 기법을 적용한 적외선 영상 투사기용 신호입력회로)

  • Shin, Uisub;Cho, Min Ji;Kang, Woo Jin;Jo, Young Min;Lee, Hee Chul
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.8
    • /
    • pp.113-118
    • /
    • 2016
  • In this paper, a read-in integrated circuit (RIIC) for IR scene projectors (IRSPs) adopting a sub-frame control technique is proposed, which minimizes the reduction of the apparent temperature of the IR images projected from IRSPs operating at a frame rate of 30 Hz. The proposed sub-frame control technique significantly reduces the amount of scene data loss on capacitors, which is caused by leakage currents flowing through MOSFET switches during holding periods, by dividing a unit frame into 8 sub-frames and refreshing the same scene data for each sub-frame. A current-drive RIIC was designed for the higher apparent temperature of IR radiated from the emitter, and it receives the scene data as a form of analog voltages from an external DAC. A prototype chip with a $64{\times}32$ RIIC array was fabricated using Magnachip/SKhynix $0.35{\mu}m$ 2-poly 4-metal CMOS process, and the measured maximum output data current is $230.3{\mu}A$. This amount of current ensures the projection of IR images whose maximum apparent temperature is $366.2^{\circ}C$ in the mid-wavelength IR (MWIR) when applied to a prototype emitter having a resistance of $15k{\Omega}$.

Advanced Indoor Location Tracking Using RFID (RFID를 이용한 개선된 실내 위치 추적)

  • Joo, Won-lee;Kim, Hyo-Sun;Jung, Yeong-Ah;Hong, Yeon-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.1
    • /
    • pp.425-430
    • /
    • 2017
  • RFID is a technology that uses radio frequency to read information in tags attached to objects or people. Because it reads the information without contact when tracking the location using tags in a RFID system, there can be errors between the actual position and measured position. In this paper, three methods (the method of radiation pattern, the method of the median value, and the method using both the radiation pattern and median value) are proposed to identify the location of objects or people using the RFID technique. The location identification system based on RFID was constructed and tags were arranged in a square pattern. The real location and experimentally predicted location of an object containing a reader were compared to confirm the error. Instead of the existing papers that obtained the approximately location of a reader by calculating the center of gravity of all tags read by that reader, in this study, the predicted location was obtained by the median value and the radiation pattern. This study validated which method was the most efficient among the three methods proposed in this paper through the data of the read tags. As a result, the method of the median value had the smallest error among those assessed.

Small-Swing Low-Power SRAM Based on Source-Controlled 4T Memory Cell (소스제어 4T 메모리 셀 기반 소신호 구동 저전력 SRAM)

  • Chung, Yeon-Bae;Kim, Jung-Hyun
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.3
    • /
    • pp.7-17
    • /
    • 2010
  • In this paper, an innovative low-power SRAM based on 4-transistor latch cell is described. The memory cells are composed of two cross-coupled inverters without access transistors. The sources of PMOS transistors are connected to bitlines while the sources of NMOS transistors are connected to wordlines. They are accessed by totally new read and write method which results in low operating power dissipation in the nature. Moreover, the design reduces the leakage current in the memory cells. The proposed SRAM has been demonstrated through 16-kbit test chip fabricated in a 0.18-${\mu}m$ CMOS process. It shows 17.5 ns access at 1.8-V supply while consuming dynamic power of $87.6\;{\mu}W/MHz$ (for read cycle) and $70.2\;{\mu}W/MHz$ (for write cycle). Compared with those of the conventional 6-transistor SRAM, it exhibits the power reduction of 30 % (read) and 42 % (write) respectively. Silicon measurement also confirms that the proposed SRAM achieves nearly 64 % reduction in the total standby power dissipation. This novel SRAM might be effective in realizing low-power embedded memory in future mobile applications.

Violence and an Ethical Figure in Harold Pinter's One for the Road (해롤드 핀터의 『길 떠나기 전 한잔』에 나타난 폭력과 윤리적 주체)

  • Lee, Seon Hyeon
    • English & American cultural studies
    • /
    • v.18 no.4
    • /
    • pp.103-137
    • /
    • 2018
  • Harold Pinter's One for the Road(1984) is a play about violence. Nicholas, who appears to be the manager of a place, interrogates Victor, Nicky, and Victor's wife Gila in a room for one day from morning to night. There is no direct physical violence in this play. But hints about the atrocities that took place outside the stage make the audience guess the violence and cruelty. Violence, which is not seen as such, is the central theme of the play. One for the road is worth reading as a resistance to breaking the mirror of global ideology, not as it deals with violent events confined to Turkey. The problem which Pinter had in mind, in particular, is that the United States plays a leading role in producing world-class ideologies, and that Britain is involved in collusion with the United States in cultivating such ideological fantasies, both abroad and at home. This thesis analyzes the contrasting reactions of each character in the play based on this social context. In particular, the conflicting reactions of the characters on the system are the most important conflict in the drama. Nicolas is a manager who moves on the system without seeing the truth. Victor and his family, on the other hand, do not move within the same ideology as Nicholas. This paper will take a look at what their strategies of resistance is and how they are revealed in the work. In fact, Nicholas appears split. Nicholas seemingly reacted decisively to the interpellation of the system. He expresses his belief and respect for the legitimacy of his actions. However, he has repeatedly sought the respect and love of Victor. Nicholas is now swaying. The theme that Nicholas presents consciously by grabbing at his own sway is 'Patriotism.' But this fantasy splits through Victor's silence and death demands. Therefore, the questions to be answered are: So why does Nicolas appear to be torn apart in a system that directs violence? But why is he forced to assimilate into the system? What other figures imply? To answer these questions, this thesis will take Slavoj Zizek's view of ideology. On the other hand, there are previous studies that read the system of violence in One for the road from the Althusser's perspective. Surely, this play explores the role of Ideological State Apparatus. However, from the point of view of Althusser, it is not possible to read Nicholas's division and the point of resistance seen by Victor's family. Pinter does not limit the scope of the ideological system as a closed one that regenerates ideologies, but secures the domain of main body resistance and struggle. On the other hand, there are already several domestic theses that read Pinter's work in Zizek's perspective. But these theses are mainly focused on analysis of Mountain Language. What this thesis would suggest is that there is a potential for an ethical figure of Zizek to be considered in One for the Road.

Identification and Characterization of Polymorphic Microsatellite DNA Markers Using Next-generation Sequencing in Parapristipoma trilineatum (차세대 염기서열 분석법을 사용한 벤자리(Parapristipoma trilineatum)의 microsatellite 마커의 개발 및 유전학적 특성 분석)

  • Chun Mae Dong;Mi-Nan Lee;Jae Koo Noh;Jin Woo Park;Young-Ok Kim;Eun-Mi Kim
    • Journal of Life Science
    • /
    • v.33 no.8
    • /
    • pp.623-631
    • /
    • 2023
  • This study was conducted to develop microsatellite markers in Parapristipoma trilineatum using next-generation sequencing. A total of 402,244,934 reads were generated on the Illumina Hiseq X Ten System, yielding 60,738,985,034 bp of sequences. The de novo assembly resulted in 1,320,995 contigs. A total of 952,326 contigs (0.016%) including 151 microsatellite loci were derived from the 1,320,995 contigs longer than 640 bp. A total of 34 primer sets were designed from the 151 microsatellite loci. As a result, 15 microsatellite loci were chosen and used for assuming population genetic parameters in the wild and farmed populations. The mean number of effective alleles was 12, ranging from 6 to 25. The observed heterozygosity (HO) and the expected heterozygosity (HE) ranged between 0.530 and 0.873, with an average of 0.750, and from 0.647 to 0.895, with an average of 0.793, respectively. According to these results, the developed set of 15 microsatellite markers is expected to be useful for the analysis of genetic characteristics in the population of P. trilineatum in Korea. There are requirements now for further genetic information, fishery resource management, breeding guidelines, support with the selection of breeds and studies on the effects of release, all of which will improve species conservation, and through future research, we aim to offer genetic foundational data with that goal.

Dynamic Copy Security Protocol In Real-Time Database Systems (실시간 데이터베이스 시스템에서의 동적 복사 보안 프로토콜)

  • Park, Su-Yeon;Lee, Seung-Ryong;Jeong, Byeong-Su;Seung, Hyeon-U
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.8
    • /
    • pp.955-963
    • /
    • 1999
  • 다단계 보안 실시간 데이타베이스 시스템은 데이타베이스의 일관성 유지와 실시간 요구인 마감시간의 만족, 그리고 기밀성을 띤 데이타가 노출될 수 있는 비밀채널(covert-channel)의 방지라는 요구사항을 모두 만족해야 한다. 기존의 SRT-2PL(Secure Real-Time 2 Phase Locking)은 원본과 복사본으로 데이타 객체를 분리시켜 다른 등급간에 불간섭(non-interference)을 유지하여 비밀채널의 방지를 가능하게 하였으나, 복사본이 모든 데이타 객체에 대해 항상 존재하므로 메모리의 낭비가 있을 수 있고, 복사본의 갱신을 위한 갱신 큐의 관리에 따르는 오버헤드와 그에 따른 예측성 결여라는 문제점을 갖고 있다. 이를 개선하기 위하여 본 논문에서는 다단계 보안 실시간 데이타베이스 시스템의 요구사항을 모두 만족하는 동적 복사 프로토콜을 제안한다. 동적 복사 프로토콜은 로킹 기법을 기초로 동작하고, 트랜잭션의 작업에 따라 동적으로 복사본을 생성하고 삭제한다. 모의 실험 결과 제안한 동적 복사 프로토콜은 비밀채널을 방지하고 동적인 복사본의 생성으로 SRT-2PL의 단점인 메모리 낭비를 줄일 수 있으며, 예측성을 높여 마감시간 오류율을 감소시켰다.Abstract Concurrency control of real-time secure database system must satisfy not only logical data consistency but also timing constraints and security requirements associated with transactions. These conflicting natures between timing constraints and security requirements are often resolved by maintaining several versions(or secondary copies) on the same data items. In this paper, we propose a new lock-based concurrency control protocol, Dynamic Copy Security Protocol, ensuring both two conflicting requirements. Our protocol aims for reducing the storage overhead of maintaining secondary copies and minimizing the processing overhead of update history. Main idea of our protocol is to keep a secondary copy only when it is needed to resolve the conflicting read/write operations in real time secure database systems. For doing this, a secondary copy is dynamically created and removed during a transaction's read/write operations according to our protocol. We have also examined the performance characteristics of our protocol through simulation under different workloads while comparing the existing real time security protocol. The results show that our protocol consumed less storage and decreased the missing deadline transactions.

The Study of the Effectiveness of Sex Educational Programs in the Middle School Students (청소년의 성교육을 위한 가정통신문 성교육 방법과 성교육 프로그램 적용 방법의 효과 비교)

  • Im, Ji-Hyun;Lee, Hyang-Yeon
    • Journal of East-West Nursing Research
    • /
    • v.13 no.2
    • /
    • pp.118-129
    • /
    • 2007
  • Purpose: The purpose of this study was to examine how effective the existing sex education programs and letter to parents from school were for their know ledge and attitudes towards sex of the middle school students. Methods: Subjects were selected from first grade students in a middle school from May 30 through July 19, 2005. The subjects were divided into three groups of 70 students each, two experiment groups and one control group. The study was conducted by nonequivalent control group non-synchronized design. The information letter from school to parents was made into four editions on double-sided A4 size paper and was handed out to students during weekly meeting. Both the students and their parents were required to read it and the parents were told to sign the papers. The sex education program applied in this study was recomposed based on the programs which were previously made by Sun Hee Park(2004) and Eun Ja Jung(2000). Content provided in the sex education program is identical to the one's in the information letter to parents. Experimental group 1 was required to read the four information letters to parents for two weeks, together with their parents. Group 2 experienced the sex education program four times in two weeks of time. The above two experimental groups and the control group were assessed on their knowledge and attitude towards sex twice, before and after the experiment. Results: There were significant differences in sexual knowledge about sex between the three subject groups and such data supports the first hypothesis. There was significant difference in attitude towards sex between the three subject groups and such data support the second hypothesis. Conclusion: According to the experiment results, both the information letter to parents and programs about sex education were effective for the middle school students. Yet, teaching students with the program format was more successful than handout formats. However, using information letters to parents to educate students does not waste any school hours, so if school nurses can provide the students more papers, the educational effect will be greater.

  • PDF