• Title/Summary/Keyword: Space Communication

Search Result 3,293, Processing Time 0.029 seconds

Development and Performance Evaluation of Real-Time Wear Measurement System of TBM Disc Cutter (TBM 디스크 커터 실시간 마모계측 시스템 개발 및 성능검증)

  • Min-Seok Ju;Min-Sung Park;Jung-Joo Kim;Seung Woo Song;Seung Chul Do;Hoyoung Jeong
    • Tunnel and Underground Space
    • /
    • v.34 no.2
    • /
    • pp.154-168
    • /
    • 2024
  • The Tunnel Boring Machine (TBM) disc cutter is subjected to wear and damage during the rock excavation process, and the worn disc cutter should be replaced on time. The manual inspection by workers is generally required to determine the disc cutter replacement. In this case, the workers are exposed to dangerous environments, and the measurements are sometimes inaccurate. In this study, we developed a technology that measures the disc cutter wear in real time. From a series of laboratory tests, a magnetic sensor was selected as the wear sensor, and the real-time disc cutter measurement system was developed integrating wireless communication modules, power supply and data processing board. In addition, the measurement system was verified in actual TBM excavation circumstances. As a result, it was confirmed that the accuracy and stability of the system.

Analysis of Metaverse Technology Trends and Case Studies of Utilization in the Jewelry Industry in the Post-COVID (포스트 코로나의 메타버스 기술 동향과 주얼리 산업의 활용 사례 분석)

  • Hye-Rim Kang
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.675-680
    • /
    • 2024
  • This study aims to examine the trends in Metaverse technology following the Post-COVID era and analyze the use cases in the jewelry industry. With the endemic, the business environment for companies has shifted from online to offline, leading to a reduced public interest in the Metaverse. However, examining the global jewelry brand trends in metaverse technology reveals advancements in AR/VR technologies that enhance realism and evolve the metaverse into a space without the uncanny gap between virtual and reality. The Metaverse exhibits three main characteristics in the Post-COVID era. First, there is a transformation in the business domain, starting with digital twins. Second, it is integrating with various information and communication technologies. Third, setting a direction for Metaverse operation as an omni-channel is being emphasized. Utilizing assets learned during the COVID-19 period and continuing to learn about digital and online technologies is essential for securing market competitiveness. This paper discusses how to enhance the competitiveness of jewelry industry entities based on the trends of Metaverse technology in the Post-COVID era.

Existent, but Non-existent Spaces for Others Focusing on Discourse-spaces of a Korean Movie (2016) (존재하지만 존재 않는 타자들의 공간 영화 <죽여주는 여자>의 담론 공간을 중심으로)

  • Jang, Eun Mi;Han, Hee Jeong
    • Korean journal of communication and information
    • /
    • v.84
    • /
    • pp.99-123
    • /
    • 2017
  • We analyzed the movie (2016/ directed by J-yong E), which is entangled in politics of gender, age, class, or sexuality, naming as "spaces of Others", using the concepts of heterotopia of Foucault. Foucault addressed three types of spaces: the realistic space where we currently live, the unrealistic and non-existent utopia, and heterotopia, which functions antithetically to reality. Thus, Foucault's heterotopia can be considered to indicate "heterogeneous spaces" in reality. The Bacchus Lady revolves a 65-year old prostitute So-Young, sells her body to old men at the parks in downtown of Seoul. Old prostitute on streets are often referred as "Bacchus Ladies", because suggest the popular energy drink a bottle of Bacchus while selling sex. The movie represents some minorities such as transgender, Tina and madam of the club, G-spot, migrant women like Camila and Aindu, and a amputee, Dohoon. Through these people's bodies, the problems such as imperials, nations, ethnics, gender, age, class are entangled in the movie. The politics of these points work and construct heterotopias in four spaces of Others. First, the spaces which ageing and death are intersected. Second, the spaces of So-Young for prostitutes, Third, the spaces of So-Young's mothering: she adopted her baby to American when he was a infant, so she have felt guilty. Fourth, the spaces for So-young's quasi-family with Minho, a Kopian boy who was abandoned by Korean father, Dohoon, who is a poor amputee, and Tina, who is a transgender singer. Fifth, the spaces of speech of So-Young as the subaltern: the subaltern does not have the language to express its own experiences. In order to listen to the words of subaltern, we must do the task of measuring the silence. This cinematic representation of So-young as the subaltern makes her speak about her situation. Finally, the spaces constructed by the movie can be connected 'heterotopia of crisis', 'heterotopia of deviation' and 'heterotopia of fantasy'. The spaces of the movie represents lives of Others, nevertheless, So-Young's Otherness through spaces of heterotopia was transformed to an absolute Other by patriarchal traits of cinematic narrative.

  • PDF

Some Observations on the Intercellular Junctions between the Hepatocytes in Fasting States as Revealed by Freeze Fracture Replica (기아가 간세포막결합장치에 미치는 영향에 관한 Freeze Fracture Replica법에 의한 관찰)

  • Ahn, Tae-Soon;Shin, Young-Chul
    • Applied Microscopy
    • /
    • v.25 no.2
    • /
    • pp.53-64
    • /
    • 1995
  • This study was designed to investigate the morphological alterations of zonula occludens, macula adherences and gap junctions between the hepatocytes in the fasting conditions. Animals (Sprague Dawley, $250{\sim}280g$) were divided into two groups: normal and fasting. The latter were fasted for eight days prior to sampling. Liver tissues were sectioned and replicated after freeze fracturing for the transmission electron microscopy. In the normal rat liver, the interhepatocellular space at the area of some zonula occludens appeared to be widened in thin sections. On the freeze fracture replicas., the zonula occludens appeared as an anastomosing network of $2{\sim}4$ strands or grooves on P or E faces. Free ends and fragments of the strands were observed. In the rat fasted for eight days, the hepatocytes were diminished in size and the organelles were decreased in number and size. The intercellular space was wide at many areas of zonula occludens in thin section. On the freeze fracture replicas, the zonula occludens showed diminution or disappearence of anastomosing network of strands or grooves. Free ends and small fragments of the strands or grooves were frequently encountered. The macula adherens was markedly increased in number in thin sections, although they could not be found on the freeze fracture replicas. The gap junctions were increased in number in thin sections. Small aggregations of the intramembranous particles appeared with larger ones on the freeze fracture replica. The evidences may suggest the followings: (1) The disassembly of zonula occludens in the fasting states is led from the diminished mechanical stress on the luminal surface of bile canaliculus with the impaired secretion of bile components from the hepatocytes. (2) The increase of macula adherens is necessary to maintain the liver parenchyma integrity in the fasting state which leads the hepatocyte to be diminished and finally the intercellular space to be separated. (3) The rise in both number and size of gap junctions is owing to the need of increasing intercellular communication between the hepatocytes during the fasting. (4) The alteration of zonula occludens is easily led by the physiological condition of hepatocytes even in the normal ones.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Site-Specific Art Practices as Intervention in the Era of Globalization: Focused on Two "Dongducheon" Art Projects (지구화 시대 개입으로서의 예술실천과 장소의 문제 : 동두천 작업을 중심으로)

  • Kim, Young-Ok
    • Women's Studies Review
    • /
    • v.27 no.1
    • /
    • pp.73-109
    • /
    • 2010
  • The cultural pluralism on which more and more emphasis is put in the globalized cultural environment, takes local identity as a crucial index for the cultural exchange on the global level, but at the same time it results in transforming individual regions/places into a homogeneous space, as it forces the local identity itself to fit into the standardized global perspective. In this context I focus on two art projects that are related to 'Dongducheon', a town that houses the U. S. Second Infantry Division. These projects attract specific attention due to the fact that Dongducheon is a significant place with very 'thick' cultural identity: it reveals that modernization in Korea took place in intersection of nationalism, patriarchy and gender/sexuality postcolonial (military) culture. With these two Dongducheon related art projects (Donglyung Kim) and (Eunyoung Jeong) as excellent examples of site-specific art practice, this paper asks what it means to keep the historicity of disappearing local space/place in the global era. And how is it possible to 'represent' an extremely gendered/sexualized place like Dongducheon. This should be examined from a postcolonial feminist perspective. Since emancipation from Japanese occupation Dongducheon has been an island or an outside space in the nation-state Korea. This becomes more complicated, as now mostly women from the Philippines or former Soviet countries are working in the nightclubs in Doungducheon. and are feminist activist experiments to make the place with its residents to be seen and heard in proper a way of mourning, recognition and communication. shows the 'new' kijich'on women as those who are daring to be on an 'Odyssey' for a better life as they run everyday life in Dongducheon, working in clubs, doing laundry, bearing children, going to mass; tries to help them to be heard and felt, while it gathers sounds on the street or at mass and shows the doors or narrow alleys which lead to the their rooms. It aims to mourn the dead kijich'on women and to represent the precarious life of the present migrant kijich'on women, as it shows no faces.

ICT Medical Service Provider's Knowledge and level of recognizing how to cope with fire fighting safety (ICT 의료시설 기반에서 종사자의 소방안전 지식과 대처방법 인식수준)

  • Kim, Ja-Sook;Kim, Ja-Ok;Ahn, Young-Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.1
    • /
    • pp.51-60
    • /
    • 2014
  • In this study, ICT medical service provider's level of knowledge fire fighting safety and methods on coping with fires in the regions of Gwangju and Jeonam Province of Korea were investigated to determine the elements affecting such levels and provide basic information on the manuals for educating how to cope with the fire fighting safety in medical facilities. The data were analyzed using SPSS Win 14.0. The scores of level of knowledge fire fighting safety of ICT medical service provider's were 7.06(10 point scale), and the scores of level of recognizing how to cope with fire fighting safety were 6.61(11 point scale). level of recognizing how to cope with fire fighting safety were significantly different according to gender(t=4.12, p<.001), age(${\chi}^2$=17.24, p<.001), length of career(${\chi}^2$=22.76, p<.001), experience with fire fighting safety education(t=6.10, p<.001), level of subjective knowledge on fire fighting safety(${\chi}^2$=53.83, p<.001). In order to enhance the level of understanding of fire fighting safety and methods of coping by the ICT medical service providers it is found that: self-directed learning through avoiding the education just conveying knowledge by lecture tailored learning for individuals fire fighting education focused on experiencing actual work by developing various contents emphasizing cooperative learning deploying patients by classification systems using simulations and a study on the implementation of digital anti-fire monitoring system with multipoint communication protocol, a design and development of the smoke detection system using infra-red laser for fire detection in the wide space, video based fire detection algorithm using gaussian mixture mode developing an education manual for coping with fire fighting safety through multi learning approach at the medical facilities are required.

The Study on The Cyber Communities of Migrant Workers in Korea (한국 이주 노동자의 '사이버 공동체'에 관한 연구)

  • Lee, Jeong Hyang;Kim, Yeong Kyeong
    • Journal of the Korean association of regional geographers
    • /
    • v.19 no.2
    • /
    • pp.324-339
    • /
    • 2013
  • This study aims to investigate the characteristics of cyber communities composed of migrant workers from communities without propinquity in Korea. Its methods are both qualitative and quantitative. It further seeks to discover the relationship between the social capital formed and reproduced within these cyber communities and participants' cultural adaptation to Korean society. The study revealed that ethnic and non-ethnic communities differed in terms of strength of cohesion, space constraints, and links with the outside world. The former showed characteristics of a localized community type. The main motivations for migrant workers' participation in the ethnic cyber community were communication and friendship rather than cooperation and sharing among members. They usually used cyber communication media to communicate with one another. Conversely, the latter showed characteristics of an integrative type. Despite the difficulties in applying for membership and information provided in Korean, a high percentage of migrant workers participated in the community to obtain crucial information. The results did not show a significant correlation between social capital and migrant workers' traits within the cyber community, while a strong correlation emerged among four factors of social capital: faith, norms, networking, and political participation. The study showed that social capital in the cyber community was in direct proportion to an integrative type of cultural adaptation to Korean society. In particular, there was a strong connection between the cultural adaptation exhibited by members of the migrant subculture and their participation in discussions on political issues and human rights, with some migrants even functioning as agents of social change as participants in citizens' movements. The findings suggest that the cyber community facilitates the migrant subculture's communication with and integration into the indigenous Korean culture. Migrant workers' participation in the cyber community is therefore validated as an instrumental practice for members of this subculture to adapt to Korean society.

  • PDF

Design and Implementation of IoT Chatting Service Based on Indoor Location (실내 위치기반 사물인터넷 채팅 서비스 설계 및 구현)

  • Lee, Sunghee;Jeong, Seol Young;Kang, Soon Ju;Lee, Woo Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.10
    • /
    • pp.920-929
    • /
    • 2014
  • Recently, embedded system which demand is explosively increasing in the fields of communication, traffic, medical and industry facilities, expands to cyber physical system (CPS) which monitors and controls the networked embedded systems. In addition, internet of things(IoT) technology using wearable devices such as Google Glass, Samsung Galaxy Gear and Sony Smart Watch are gaining attention. In this situation, Samsung Smart Home and LG Home Chat are released one after another. However, since these services can be available only between smart phones and home appliances, there is a disadvantage that information cannot be passed to other terminals without commercial global messaging server. In this paper, to solve above issues, we propose the structure of an indoor location network based on unit space, which prevents the information of the devices or each individual person from leaking to outside and can selectively communicate to all existent terminals in the network using IoT chatting. Also, it is possible to control general devices and prevent external leakage of private information.

A Study on Omission and Suggestive Expressions in Motion Graphics (모션그래픽에서 생략과 암시적 표현에 관한 연구)

  • Youm, Dong-Cheol
    • Cartoon and Animation Studies
    • /
    • s.15
    • /
    • pp.251-265
    • /
    • 2009
  • Motion Graphics are a great effective vehicle for precise communication between customers in various media and formats. The important thing in the expression of Motion Graphics is to deliver messages clearly. Some current Motion Graphics which are focused on only attracting attention or sensational expressions more than narrative are evaluated lower. This study aims to utilize easy and positive Motion Graphics to deliver messages by applying their utility to production of Motion Graphics, omitting time spent on delivering effective messages and analyzing their suggestive expression methods because of the nature of producing Motion Graphics. This thesis is to study several theoretical backgrounds of omission and implicated expressions mentioned in the similar studies from the view of Motion Graphics, and to search applied examples and functional things using the expression methods in some film title sequence. Excellent Motion Graphics use planned omission and implicated methods rather than to use entire narratives or complicated descriptions. Especially, a film title sequence should focus on symbolic visual expressions. They are necessary to attract the audience's interest. To overcome the limitation of time and space deliver a huge amount of information quickly and powerfully, Motion Graphics should properly use omission of image and time and suggestive expressions through symbols and metaphors. Then they will have a role to level up their current values and discussions.

  • PDF