• Title/Summary/Keyword: Recognize-into

Search Result 1,121, Processing Time 0.042 seconds

Experiences and Problems of Sexual and Reproductive Health among Lesbian, Gay, Bisexual, Transgender, Queer or Questioning, and Intersex (LGBTQI) People in Korea (한국 성소수자의 성⋅생식건강의 경험)

  • Lee, Yunjung;Kim, Ju Hee
    • Journal of East-West Nursing Research
    • /
    • v.27 no.2
    • /
    • pp.195-204
    • /
    • 2021
  • Purpose: The purpose of this study was to understand the experiences and problems of sexual and reproductive health among Korean lesbian, gay, bisexual, transgender, queer or questioning, and intersex (LGBTQI) people. Methods: Phenomenological methodology was employed in this study, which comprised 14 LGBTQ participants. Data were collected using individual in-depth interviews from May to June, 2021, and were analyzed using Colaizzi's method. Results: Four categories-comprising nine theme clusters-emerged from the data, as follows: 1) hard-to-recognize gender identity, 2) blind spots in the healthcare system, 3) empathy and support in the community, and 4) new challenges to protect my precious self. Conclusion: This study provides valuable and detailed insights into the meaning of sex and reproductive health among Korean LGBTQI people. This finding could be utilized to develop effective questions for understanding not only sexual and reproductive health but also overall health problems of LGBTQI people.

Identifying Mobile Owner based on Authorship Attribution using WhatsApp Conversation

  • Almezaini, Badr Mohammd;Khan, Muhammad Asif
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.317-323
    • /
    • 2021
  • Social media is increasingly becoming a part of our daily life for communicating each other. There are various tools and applications for communication and therefore, identity theft is a common issue among users of such application. A new style of identity theft occurs when cybercriminals break into WhatsApp account, pretend as real friends and demand money or blackmail emotionally. In order to prevent from such issues, data mining can be used for text classification (TC) in analysis authorship attribution (AA) to recognize original sender of the message. Arabic is one of the most spoken languages around the world with different variants. In this research, we built a machine learning model for mining and analyzing the Arabic messages to identify the author of the messages in Saudi dialect. Many points would be addressed regarding authorship attribution mining and analysis: collect Arabic messages in the Saudi dialect, filtration of the messages' tokens. The classification would use a cross-validation technique and different machine-learning algorithms (Naïve Baye, Support Vector Machine). Results of average accuracy for Naïve Baye and Support Vector Machine have been presented and suggestions for future work have been presented.

A Study of Aleksandr Vampilov's Play and Film (알렉산드르 밤필로프 희곡의 영상화 연구 《9월의 휴가》를 중심으로)

  • Ahn, Byong Yong
    • Cross-Cultural Studies
    • /
    • v.29
    • /
    • pp.7-24
    • /
    • 2012
  • "Duck Hunting" is the most psychological play with unique structure written by Aleksandr Vampilov. The play describes protagonist hero's furious behavior with psychological instability, therefore, this play tends to be recognized as serious and complicated one. After the death of Vampilov, "Duck Hunting" was reproduced as a film, titled as "Vacation in September." This study is designed to shed light on the play's psychological-dramatic factors by focusing on the structure of narrative and spatial-temporal objet. Also, this study compared the screenshots of the play with their textual meanings, then concentrated on main character's psychological features. By focusing on protagonist hero's mind, this study tries to look into the features of the play and its meanings for modern period. The film's plot is a kind of story telling structure based on main character's memory. The short stories of main character represents that Jilov(main character's name)'s losing his own life. The audience can acknowledge that Jilov's life as a duck hunter who is cynical, ideological, lazy, and self-interest oriented person. This play provokes the audience to compare their life to Jilov's one because such comparison helps the audience recognize their lives as surplus style of life with nihilism. Jilov as a character represents one of Soviet's generation with the feeling of great loss in 1960s.

A Study on Measures Enhancing Pilots' Aeronautical Decision Making(ADM) Competence to Prevent Bird Strike Incidents (항공기 조류충돌 예방을 위한 조종사 비행중 결심 역량 증진방안 연구)

  • Lee, Jang Ryong;Huh, Gang
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.27 no.2
    • /
    • pp.16-25
    • /
    • 2019
  • While various efforts are being made to ensure aviation safety, air accident rate induced by pilot human factors is still high worldwide. In particular, among pilot human factors, it would be the most important issue for pilots to anticipate and recognize flight environmental factors beyond their control and to make a positive decision making(ADM). In the Republic of Korea Air Force(ROKAF), there were many dizzying experiences induced by bird strike incidents and developed into dangerous moments such as damage to the aircraft and pilots' increased mental stress. It is a matter of serious concern in terms of safety management and human factors to dismiss bird strike incidents as inevitable misfortune due to environmental factors. In 2018, the ROKAF Aviation Safety Agency(ASA) conducted an experimental study to enhance pilots' ADM competence that can anticipate and avoid a bird strike. As the way of the study, 'Bird Strike Preventing Information' had been written and distributed every week by the ASA to flight units in the ROKAF during the period of the study. Through enhanced pilots' perceptual ADM competence, there was a noticeable number of reduction in bird strike incident compared to previous years of the experimental study.

Enhancement of Object Detection using Haze Removal Approach in Single Image (단일 영상에서 안개 제거 방법을 이용한 객체 검출 알고리즘 개선)

  • Ahn, Hyochang;Lee, Yong-Hwan
    • Journal of the Semiconductor & Display Technology
    • /
    • v.17 no.2
    • /
    • pp.76-80
    • /
    • 2018
  • In recent years, with the development of automobile technology, smart system technology that assists safe driving has been developed. A camera is installed on the front and rear of the vehicle as well as on the left and right sides to detect and warn of collision risks and hazards. Beyond the technology of simple black-box recording via cameras, we are developing intelligent systems that combine various computer vision technologies. However, most related studies have been developed to optimize performance in laboratory-like environments that do not take environmental factors such as weather into account. In this paper, we propose a method to detect object by restoring visibility in image with degraded image due to weather factors such as fog. First, the image quality degradation such as fog is detected in a single image, and the image quality is improved by restoring using an intermediate value filter. Then, we used an adaptive feature extraction method that removes unnecessary elements such as noise from the improved image and uses it to recognize objects with only the necessary features. In the proposed method, it is shown that more feature points are extracted than the feature points of the region of interest in the improved image.

Nursing Students' Experience of Sexual Harassment During Clinical Practicum: A Phenomenological Approach

  • Kim, Mijong;Kim, Taeim;Tilley, Donna Scott;Kapusta, Ann;Allen, Denise;Cho, Ho Soon Michelle
    • Women's Health Nursing
    • /
    • v.24 no.4
    • /
    • pp.379-391
    • /
    • 2018
  • Purpose: To describe nursing students' experience of sexual harassment during clinical practicum. Methods: An interpretive phenomenological qualitative approach was used to understand contextual experiences of participants. Individual in-depth interviews were conducted to collect data from thirteen nursing students who experienced sexual harassment during clinical practice in general hospitals at D metropolitan city. All interviews were recorded and transcribed into Korean and English. Transcripts were analyzed using the data analysis method described by Diekelmann, Allen, and Tanner. Results: The following 12 themes emerged from the data: 'unprepared to respond', 'lack of education', 'unsure about when behavior crosses the line', 'power differential for nursing students', 'balancing self-preservation with obligations to patients', 'shame', 'feeling responsible for not being able to prevent the harassment', 'impact on patient care', 'fear of what might have happened', 'fear of repercussions', 'long term impact', and 'peer support'. Conclusion: Participants in this study described feeling an obligation to care for their patients. However, they seemed to be unable to balance this while feeling vulnerable to sexual harassment with strong negative feelings. Helping students recognize and effectively deal with sexual harassment is a critical element to assure quality learning for participants and maintain quality of care during clinical practice.

The Method of Abandoned Object Recognition based on Neural Networks (신경망 기반의 유기된 물체 인식 방법)

  • Ryu, Dong-Gyun;Lee, Jae-Heung
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.1131-1139
    • /
    • 2018
  • This paper proposes a method of recognition abandoned objects using convolutional neural networks. The method first detects an area for an abandoned object in image and, if there is a detected area, applies convolutional neural networks to that area to recognize which object is represented. Experiments were conducted through an application system that detects illegal trash dumping. The experiments result showed the area of abandoned object was detected efficiently. The detected areas enter the input of convolutional neural networks and are classified into whether it is a trash or not. To do this, I trained convolutional neural networks with my own trash dataset and open database. As a training result, I achieved high accuracy for the test set not included in the training set.

Rhyme of Truce, Training Program for moral psychology in Cyberspace

  • Cho, JeongHee;Lim, Chan
    • International journal of advanced smart convergence
    • /
    • v.8 no.1
    • /
    • pp.176-183
    • /
    • 2019
  • Rhyme of Truce is an educational program that helps you develop the ability to cope with cyber violence rightly. we aim to produce educational contents that will last a long time in the memory of specially children. By combining the room escape game and Leap motion / VR, the program reflects the user's motion and action in real time. The Keyboard Worrier comes into contact with the user and causes violence, and the user who is attacked by the monster see several negative messages written in red and hears abuses sound. Users enter the virtual space decorated as the cyber world. They can experience cyber-violence indirectly but vividly, and if language violence, which has been overlooked and recognized only as "letters", is executed offline, it will directly wonder if cyber-violence should also be regarded as a means of violence. Users have the opportunity to cope with violence autonomously. When a user is attacked by an in-game monster, there are two ways to choose from. First, fighting against with a keyboard (which is a symbol of language violence) just like a monster. Second, report the abuser to cyber bureau police. Both methods make them to escape the room, but when they get out of the room and return to the home and read the message through the monitor, users can recognize which action was right for.

Radar Signal Pattern Recognition Using PRI Status Matrix and Statistics (PRI 상태행렬과 통계값을 이용한 레이더 PRI 신호패턴 인식)

  • Lee, Chang-ho;Sung, Tae-kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.775-778
    • /
    • 2016
  • In this paper, we propose a new method to automatically recognize PRI modulation type of radar signal at ES(Electronic Support) in electronic singal environment. The propose method stores pattern of PRI(Pulse Repetition Interval) of radar signal and uses statistic data, which firstly classifies into 2 classes. Then the proposed method recognizes each PRI signal using statistic characteristic of PRI. We apply various 5 kinds of PRI signal such as constant PRI, jitter PRI, D&S(dwell & switch) PRI, stagger PRI, sliding PRI, etc. The result shows the proposed method correctly identifies various PRI signals.

  • PDF

Roles of ginsenosides in inflammasome activation

  • Yi, Young-Su
    • Journal of Ginseng Research
    • /
    • v.43 no.2
    • /
    • pp.172-178
    • /
    • 2019
  • Inflammation is an innate immune response that protects the body from pathogens, toxins, and other dangers and is initiated by recognizing pathogen-associated molecular patterns or danger-associated molecular patterns by pattern-recognition receptors expressing on or in immune cells. Intracellular pattern-recognition receptors, including nucleotide-binding oligomerization domain-like receptors (NLRs), absent in melanoma 2, and cysteine aspartate-specific protease (caspase)-4/5/11 recognize various pathogen-associated molecular patterns and danger-associated molecular patterns and assemble protein complexes called "inflammasomes." These complexes induce inflammatory responses by activating a downstream effector, caspase-1, leading to gasdermin D-mediated pyroptosis and the secretion of proinflammatory cytokines, such as interleukin $(IL)-1{\beta}$ and IL-18. Ginsenosides are natural steroid glycosides and triterpene saponins found exclusively in the plant genus Panax. Various ginsenosides have been identified, and their abilities to regulate inflammatory responses have been evaluated. These studies have suggested a link between ginsenosides and inflammasome activation in inflammatory responses. Some types of ginsenosides, including Rh1, Rg3, Rb1, compound K, chikusetsu saponin IVa, Rg5, and Rg1, have been clearly demonstrated to inhibit inflammatory responses by suppressing the activation of various inflammasomes, including the NLRP3, NLRP1, and absent in melanoma 2 inflammasomes. Ginsenosides have also been shown to inhibit caspase-1 and to decrease the expression of $IL-1{\beta}$ and IL-18. Given this body of evidence, the functional relationship between ginsenosides and inflammasome activation provides new insight into the understanding of the molecular mechanisms of ginsenoside-mediated antiinflammatory actions. This relationship also has applications regarding the development of antiinflammatory remedies by ginsenoside-mediated targeting of inflammasomes, which could be used to prevent and treat inflammatory diseases.