• Title/Summary/Keyword: Saying

Search Result 365, Processing Time 0.032 seconds

Research on Tongmu I Je-ma's medical idea (동무(東武) 이제마(李濟馬)의 의학사상(醫學思想)에 대한 연구(硏究))

  • Baek Sang-Yong
    • Journal of Korean Medical classics
    • /
    • v.13 no.1
    • /
    • pp.117-145
    • /
    • 2000
  • Tongmu I Je-ma(1837-1900) set up Sasang Constitutional Medicine(四象體質醫學), a medical theory that would be original in the Korean medical history through his book ${\ll}$Tang-uisusebowon(東醫壽世保元)${\gg}$. In this book, he writes that he found the clue to his sasang Constitution(四象體質) theory from ${\ll}$Hwangjenaegyong(黃帝內經)${\gg}$. But the main logic that gives shape to the Constitution(體質) theory is $s{\check{o}}ng-ch{\check{o}}ng$ theory(性情論) of Confucian. Therefore, Tongmu(東武)'s Constitution $s{\check{o}}ng-ch{\check{o}}ng$ theory(體質性情論) is fundamentally based on confucian thoughts. Kongmaeng(孔孟) saw $s{\check{o}}ng$(性) as a base for connecting the entire mankind to be united, and $ch{\check{o}}ng$(情) as a individual thing that can exalted differently according to one's state of mind. Chuja(朱子) weakene the human's active volition by dividing $s{\check{o}}ng$ and $ch{\check{o}}ng$ as ibal(理發) and kibal(氣發) and therefore describing mankind to be submitted to Heaven's will. On the other hand Yolgok(栗谷) generalized $s{\check{o}}ng-ch{\check{o}}ng$ in the active mind of man himself by saying that $s{\check{o}}ng$ is when i-ki(理氣) does not act as a bodily function of the mind and $ch{\check{o}}ng$ is when it does. Furthennore he emphasized man's activeness on pursuing good by saying that the division of good and bad does not start from the origin of motion but is divided by the condition of ki(氣) which leads motion. Tongmu, who was influenced by Yulgok linked both $s{\check{o}}ng$and $ch{\check{o}}ng$ through, happiness, anger, sadness, pleasure(喜怒哀樂), and saw $s{\check{o}}ng$ as the ability to recognize good which is in the kijil(氣質) formed from the integration of i-ki, and saw $ch{\check{o}}ng$ as $s{\check{o}}ng$ blurred by man's greed. In addition to this, he says that the direct connection between each person's divergence in $s{\check{o}}ng-ch{\check{o}}ng$ and the condition of Four-organ(四臟) which is ki, not the mind which is i(理) forms sasangch'ejirin(四象體質人). His theory that illness comes from the partiality of $s{\check{o}}ng-ch{\check{o}}ng$ and therefore can prevent this by clarifying the mind and adjusting $s{\check{o}}ng-ch{\check{o}}ng$ through volition, has led Korean oriental medicine to be human based.

  • PDF

Threat Situation Determination System Through AWS-Based Behavior and Object Recognition (AWS 기반 행위와 객체 인식을 통한 위협 상황 판단 시스템)

  • Ye-Young Kim;Su-Hyun Jeong;So-Hyun Park;Young-Ho Park
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.4
    • /
    • pp.189-198
    • /
    • 2023
  • As crimes frequently occur on the street, the spread of CCTV is increasing. However, due to the shortcomings of passively operated CCTV, the need for intelligent CCTV is attracting attention. Due to the heavy system of such intelligent CCTV, high-performance devices are required, which has a problem in that it is expensive to replace the general CCTV. To solve this problem, an intelligent CCTV system that recognizes low-quality images and operates even on devices with low performance is required. Therefore, this paper proposes a Saying CCTV system that can detect threats in real time by using the AWS cloud platform to lighten the system and convert images into text. Based on the data extracted using YOLO v4 and OpenPose, it is implemented to determine the risk object, threat behavior, and threat situation, and calculate the risk using machine learning. Through this, the system can be operated anytime and anywhere as long as the network is connected, and the system can be used even with devices with minimal performance for video shooting and image upload. Furthermore, it is possible to quickly prevent crime by automating meaningful statistics on crime by analyzing the video and using the data stored as text.

Efficient Power and Resource Scheduling for Bluetooth Piconet (블루투스 피코넷에서의 효율적인 전력 및 자원 스케줄링)

  • Park, Sae-Rom;Woo, Sung-Je;Im, Soon-Bin;Lee, Tae-Jin
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.555-562
    • /
    • 2004
  • We consider differentiated bandwidth allocation for a piconet in short-range wireless personal network systems : Bluetooth. Since bandwidth requirements nay vary among applications/services, and/or it may change over time, it is important to decide how to allocate limited resources to various service classes to meet their service requirements. We propose a simple and efficient bandwidth allocation mechanism which meets bandwidth requirements of various service types while saving power consumption by a Power saying mode, i.e., sniff node. We compare our proposed mechanism with a conventional (weighted) round-robin polling scheme and show that it achieves significant improvement of hroughput, delay, and power consumption.

A Study on Tendency of Particles Appearing in Architectural Space Kengo Kuma (쿠마 켄고 건축공간에 나타나는 입자화 경향에 관한 연구)

  • Lim, Taehee
    • Korean Institute of Interior Design Journal
    • /
    • v.23 no.6
    • /
    • pp.14-21
    • /
    • 2014
  • Kengo Kuma is one of the features of the building is 'natural architecture'. He is saying that the construction of the building in which he is seeking is a natural material of construction is only applied to the issue as to whether the material nature, but that the relationship between humans, the environment, natural point of view in his book. Like repeating units are part of the two hundred ninety-four came mainly small ways to create a relationship, or have architectural features make up the sum of his architecture. I present a comprehensive study is reported in terms of that the 'grain' of such a small part of the unit, according to the architecture of Kengo Kuma mainly granulation characteristics of the construction of one of the practical expression studies Kengo Kuma. Is represented as louvers, check pattern, hole, granulation unit such trend, but have become developed in other directions such simple types are combined. Analysis and particle characteristics in terms of the architectural space of Kengo Kuma, serve as the purpose of the present study reveal that each of the features that have a meaning in the construction of any Kengo Kuma.

Implementation of Delivery Information Security System using DRM (DRM을 활용한 택배정보보안시스템 구현 방안)

  • Park, Doo-Jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.846-847
    • /
    • 2012
  • The domestic courier market, large and small companies working in more than 100 leading logistics service market is fully open. Year since 2001 has increased by 10%. 1.3 billion per year in 2011 saying the shipping box, and the market size is about 3 trillion won. Courier in 2012 with the growth of online shopping is expected to develop the industry further. However, these courier industry in appearance, but the consumer's personal growth and exposure, exploiting the fears of crime is high. In this paper, using DRM (Digital Rights Management) delivery method to implement information security system is proposed.

  • PDF

Analysis of Power Saving Factor for a DVS Based Multimedia Processor (DVS 기반 멀티미디어 프로세서의 전력절감율 분석)

  • Kim Byoung-Il;Chang Tae-Gyu
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.1
    • /
    • pp.95-100
    • /
    • 2005
  • This paper proposes a DVS method which effectively reduces the power consumption of multimedia signal processor. Analytic derivations of effective range of its power saving factor are obtained with the assumption of a Gaussian distribution for the frame-based computational burden of the multimedia processor. A closed form equation of the power saving factor is derived in terms of the mean-standard deviation of the distribution. An MPEG-2 video decoder algorithm and AAC encoder algorithm are tested on ARM9 RISC processor for the experimental verification of the power saying of the proposed DVS approach. The experimental results with diverse MPEG-2 video and audio files show 50~30% power saving factor and show good agreement with those of the analytically derived values.

Security Design for Information protection System using BSIMM (BSIMM을 활용한 정보보호시스템 보안 설계 방안)

  • Park, Jung-Sup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1541-1547
    • /
    • 2015
  • In the recent IT industry, security has established itself as the factor to be considered the most in the software development. It goes without saying that security is the critical factor for the development of information security products. In the evaluation of the information security products, the security is assured by the security architecture requirement (ADV_ARC). However, the Absence of the systematic software security architecture process makes it difficult to guarantee the security quality consistently even though they are evaluated based on common criteria. In this paper, we propose a way to ensure a consistent security quality applying the software security framework in BSIMM.

A study on the Teacher's Professionality for the Elementary Gifted Children of Information Science (초등 정보과학영재교육 활성화를 위한 교사의 전문성에 관한 연구)

  • Kim, Gwang-Chan;Lee, Ae-Jung;Lee, Jae-Ho
    • Journal of The Korean Association of Information Education
    • /
    • v.9 no.2
    • /
    • pp.281-298
    • /
    • 2005
  • It is needed to make more efforts to activate the gifted child education in elementary information science regarding selection of the gifted, development of appropriate curriculum, however, as a saying goes that a quality of education is depended on teacher's quality, and outstanding performance of teachers in charge of teaching the gifted is critical to make education for the gifted in elementary information science successful. Considering the significances of teacher variances, the research on the professionality of teacher who is responsible for the elite education in elementary information science should be made, along with a plan to cultivate their competence.

  • PDF

A Walsh-Based Distributed Associative Memory with Genetic Algorithm Maximization of Storage Capacity for Face Recognition

  • Kim, Kyung-A;Oh, Se-Young
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.640-643
    • /
    • 2003
  • A Walsh function based associative memory is capable of storing m patterns in a single pattern storage space with Walsh encoding of each pattern. Furthermore, each stored pattern can be matched against the stored patterns extremely fast using algorithmic parallel processing. As such, this special type of memory is ideal for real-time processing of large scale information. However this incredible efficiency generates large amount of crosstalk between stored patterns that incurs mis-recognition. This crosstalk is a function of the set of different sequencies [number of zero crossings] of the Walsh function associated with each pattern to be stored. This sequency set is thus optimized in this paper to minimize mis-recognition, as well as to maximize memory saying. In this paper, this Walsh memory has been applied to the problem of face recognition, where PCA is applied to dimensionality reduction. The maximum Walsh spectral component and genetic algorithm (GA) are applied to determine the optimal Walsh function set to be associated with the data to be stored. The experimental results indicate that the proposed methods provide a novel and robust technology to achieve an error-free, real-time, and memory-saving recognition of large scale patterns.

  • PDF

The Phonology and Phonetics of the Stress Patterns of English Compounds and Noun Phrases

  • Lee, Joo-Kyeong
    • Speech Sciences
    • /
    • v.14 no.1
    • /
    • pp.21-35
    • /
    • 2007
  • This paper attempts to investigate phonetic substances of the stress patterns of English compounds and noun phrases, showing that the theoretically derived stress structures are not consistent with the accentual patterns in real utterances. Even though it has been long claimed that compounds have the stress pattern [1 3] and that noun phrases, [2 1] as in Chomsky & Halle (1968), their difference has not been yet explored empirically or phonetically. I present a phonetic experiment conducted to see if there is any difference along the tonal contours, mostly focusing on their pitch accent distribution. 36 different compounds and 36 different noun phrases included in carrier sentences were examined, and they were varied in position within a sentence. Results showed that various accentual patterns were produced, and among them, [H* X] predominantly occurs in all three positions in both compounds and noun phrases, whereas the patterns [X H*] and [X X] appear relatively more frequently in final position than in initial and medial position. Furthermore, the pattern [Ac + No], in which the preceding element is pitch-accented with no accent on the following one, is the major stress pattern in both compounds and noun phrases and in all three sentence positions. This suggests that there seems to be no difference in accentual patterns between compounds and noun phrases, which is not consistent with the hypothesis. The results are interpreted as saying that the preceding element alone tends to be prominent with no accent following it both in compounds and noun phrases, and that therefore, theoretically speculated phonological claims are not always phonetically supported.

  • PDF