• Title/Summary/Keyword: concealing

Search Result 88, Processing Time 0.024 seconds

Nursing Sudents' Experiences of Online Psychiatric Nursing Practice in COVID-19 : A Parse Research Method Study (COVID-19 상황에서 간호대학생의 정신건강간호학 온라인 실습 경험: Parse 연구방법 적용)

  • Gyun-Young Kang;Jinju Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.1127-1134
    • /
    • 2023
  • This study is a qualitative study to uncover the meaning and structure of nursing students' online psychiatric nursing practice experience by applying Parse's research method. The subjects of the study were 9 fourth-year nursing students at K University who took psychiatric nursing practice online in the COVID-19 situation. Data collection was conducted from March 7, 2022 to May 27, 2022. As a result of the study, the core concepts of nursing students' online practice experience in psychiatric nursing in the COVID-19 situation were: 'Recognizing the importance of understanding oneself and others', 'Preparing for communication to build therapeutic relationships', and 'A perspective on the future through exploration of the meaning of nursing'. Structural transposition was presented as 'Empathy for self and others', 'Mindset for interpersonal human relationship', 'Exploring the essence of nursing and self-realization'. Conceptual integration appeared as 'Valuing', 'Revealing-Concealing', 'Revealing-Concealing'. In conclusion, nursing students' online practice experience in mental health nursing in the COVID-19 situation was an experience of growing and transcending as future nurses by recognizing the importance of human understanding and communication for the therapeutic relationship that is the purpose of mental nursing. This study will serve as basic data for efficient clinical practice operations in various unpredictable situations, such as future pandemics.

Characteristics on the military look in modern fashion - focused on the post-2000 era - (현대패션에 나타난 밀리터리 룩의 특성 - 2000년 이후를 중심으로 -)

  • Kim, Sun-Young
    • Journal of the Korean Home Economics Association
    • /
    • v.44 no.9
    • /
    • pp.41-50
    • /
    • 2006
  • This study examines the characteristics of the military look in modern fashion. The materials for the study are mainly precedent studies and related literature, although fashion portfolios and magazines, domestic and international, are used for the exploratory study. The results of the study are as follows. First, the military look for women dismantles the sexual symbolism endowed with the clothes by expressing a neutral charm out of dichotomy image between genders. The neutral expression of the military look, different from the military look of the 20th century, provides a chance to feature a new image by pursuing more individual freedom than human itself. Second, the military-look emphasizes feminine sensual charm through exposing, concealing, or decorating with ornaments which are transformed from the elements of the military clothes, This is different from the past military look that expressed masculine rigidity through simplifying the details and emphasizing the male body silhouette. Third, the military look produces a deconstruction image instead of just showing its intrinsic thoughts or symbolic message through combining design elements or symbolic details of the military look with other images, transforming and exaggerating the shapes, or mixing the time point of views reinterpreting the present or the future image.

Lossless Deformation of Brain Images for Concealing Identification (신원 은닉을 위한 두뇌 영상의 무손실 변경)

  • Lee, Hyo-Jong;Yu, Du Ruo
    • The KIPS Transactions:PartB
    • /
    • v.18B no.6
    • /
    • pp.385-388
    • /
    • 2011
  • Patients' privacy protection is a heated issue in medical business, as medical information in digital format transmit everywhere through networks without any limitation. A current protection method for brain images is to deface from the brain image for patient's privacy. However, the defacing process often removes important brain voxels so that the defaced brain image is damaged for medical analysis. An ad-hoc method is proposed to conceal patient's identification by adding cylindrical mask, while the brain keep all important brain voxels. The proposed lossless deformation of brain image is verified not to loose any important voxels. Futhermore, the masked brain image is proved not to be recognized by others.

Packet Loss Concealment Algorithm Based on Robust Voice Classification in Noise Environment (잡음환경에 강인한 음성분류기반의 패킷손실 은닉 알고리즘)

  • Kim, Hyoung-Gook;Ryu, Sang-Hyeon
    • The Journal of the Acoustical Society of Korea
    • /
    • v.33 no.1
    • /
    • pp.75-80
    • /
    • 2014
  • The quality of real-time Voice over Internet Protocol (VoIP) network is affected by network impariments such as delays, jitters, and packet loss. This paper proposes a packet loss concealment algorithm based on voice classification for enhancing VoIP speech quality. In the proposed method, arriving packets are classified by an adaptive thresholding approach based on the analysis of multiple features of short signal segments. The excellent classification results are used in the packet loss concealment. Additionally, linear prediction-based packet loss concealment delivers high voice quality by alleviating the metallic artifacts due to concealing consecutive packet loss or recovering lost packet.

Implant-supported overdenture manufactured using CAD/CAM techniques to achieve horizontal path insertion between the primary and secondary structure: A clinical case report

  • Agustin-Panadero, Ruben;Penarrocha-Oltra, David;Gomar-Vercher, Sonia;Ferreiroa, Alberto;Penarrocha-Diago, Miguel
    • The Journal of Advanced Prosthodontics
    • /
    • v.7 no.3
    • /
    • pp.264-270
    • /
    • 2015
  • This report describes the case of an edentulous patient with an atrophic maxilla and severe class III malocclusion. Prosthetic rehabilitation was performed using CAD/CAM techniques for manufacturing an implant-supported overdenture with horizontal insertion. A vestibulo-lingual insertion overdenture is a precision prosthesis with a fixation system affording a good fit between the primary and secondary structure. Both structures exhibit passive horizontal adjustment. This treatment option requires the same number of implants as implant-supported fixed dentures. The horizontal assembly system prevents the prosthesis from loosening or moving in response to axial and non-axial forces. The technique was used to rehabilitate a patient presenting an atrophic upper maxilla, with the insertion of 8 implants. No complications were reported at follow-up 3, 6 and 12 months after fitting of the prosthesis. This system offers solutions to the clinical and laboratory complications associated with hybrid prostheses, concealing emergence of the chimneys and improving implant-prosthesis hygiene.

UN-Substituted Video Steganography

  • Maria, Khulood Abu;Alia, Mohammad A.;Alsarayreh, Maher A.;Maria, Eman Abu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.382-403
    • /
    • 2020
  • Steganography is the art of concealing the existence of a secret data in a non-secret digital carrier called cover media. While the image of steganography methods is extensively researched, studies on other cover files remain limited. Videos are promising research items for steganography primitives. This study presents an improved approach to video steganography. The improvement is achieved by allowing senders and receivers exchanging secret data without embedding the hidden data in the cover file as in traditional steganography methods. The method is based mainly on searching for exact matches between the secret text and the video frames RGB channel pixel values. Accordingly, a random key-dependent data is generated, and Elliptic Curve Public Key Cryptography is used. The proposed method has an unlimited embedding capacity. The results show that the improved method is secure against traditional steganography attacks since the cover file has no embedded data. Compared to other existing Steganography video systems, the proposed system shows that the method proposed is unlimited in its embedding capacity, system invisibility, and robustness. The system achieves high precision for data recovery in the receiver. The performance of the proposed method is found to be acceptable across different sizes of video files.

Typology of Dress in Contemporary Fashion

  • Yim, Eunhyuk;Istook, Cynthia
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.41 no.1
    • /
    • pp.98-115
    • /
    • 2017
  • This study categorizes the formative aspects of dress and their implications according to the extent of revealing or concealing corporeality based on body perceptions. By considering the notion of dress as bodily practice to be a theoretical and methodological framework, this study combines a literature survey and case analysis to analyze and classify the forms of women's dress since the 1920s when contemporary fashion took hold. As examined in this study, the typology of dress was categorized as body-consciousness, deformation, transformation, and formlessness. Body-consciousness that is achieved through tailoring, bias cutting, and stretchy fabric displays corporeality focusing on the structure and function of the body as an internalized corset. Deformations in dress are categorized into two different subcategories. One is the expansion or reduction of bodily features based on the vertical or horizontal grids of the body, which visualizes the anachronistic restraint of the body through an innerwear as outerwear strategy. The other is exaggerations of the bodily features irrelevant to the grid, which break from the limitations and constraints of the body as well as traditional notions of the body. Transformations of the body refer to as follows. First, the deconstruction and restructuring of the body that deconstruct the stereotypes in garment construction. Second, the abstraction of the body that emphasizes the geometrical and architectural shapes. Third, transformable designs which pursue the expansion and multiplicity of function. Formlessness in dress denies the perception of three-dimensionality of the body through the planarization of the body.

A Study on the Characteristics of the Interior Space of Philips Exeter Academy Library by Louis I. Kahn (필립스 엑시터 아카데미 도서관의 내부공간 특성에 관한 연구)

  • Chung Tae-Yong;Kim Nak-Jung
    • Korean Institute of Interior Design Journal
    • /
    • v.14 no.5 s.52
    • /
    • pp.89-97
    • /
    • 2005
  • The purpose of this study is to analyze the interior characteristics of Philips Exeter Academy library by Louis I. Kahn. Kahn's main thoughts of 'what it wants to be ' and 'how it was done' play a important role in this research because these statements act as a clue to understand this library. 'What it wants to be' means the essence and existence of architecture and 'how it was done' shows the tectonic of architecture and construction process to enhance its presence. Most of his works inform that Kahn had consistently applied his thoughts into design process. The thoughts of the essence of library leads Kahn to configurate 3 layers of interior space. The emphasis of tectonic expression is also the characteristics of interior in that structure is the logical part of whole building system rather than concealing object for the exterior of buildings. In Exeter library, interior characteristics are summarized as 3 layers of interior configuration, the order in dynamics, the visualization of construction process, and the relationship between structure and space.

A Study on the Spatial Configuration and its Characteristics of Yale Center for British Art (예일 영국미술센터의 공간구성 방식과 그 특성에 관한 연구)

  • Kim, Nak-Jung;Chung, Tae-Yong
    • Korean Institute of Interior Design Journal
    • /
    • v.17 no.1
    • /
    • pp.69-76
    • /
    • 2008
  • The purpose of this study is to analyze the interior characteristics of the Yale center for British art by Louis I. Kahn. As his last realized project, the Yale center for British art shows Kahn's latter architectural thoughts about exterior/interior, space/structure and theory/practice. Kahn arranged unit space(room) around two interior courts and laminated them vertically. This spatial configuration is the result of solving the urban context which needed the continuity of street and complicated program including art museum, retail shop, studio and library. Although Kahn adpted severe formal configuration, he added changes to spatial relation. The visualization of architectural system is realized by revealing the relation of the unit space and structure. And this emphasized the presence of the center. The emphasis of tectonic expression is also the characteristics of interior in that structure is the logical part of whole building system rather than concealing object for the exterior of buildings. In the Yale center for British art, interior characteristics are summarized as spatial configuration based on the relation between unit space and two courts, the visualization of structural order, and the relationship between structure and light.

Concealing Communication Paths in Wireless Sensor Networks (무선 센서 네트워크에서의 통신 경로 은닉)

  • Tscha, Yeong-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.12
    • /
    • pp.1353-1358
    • /
    • 2014
  • Tremendous amount of dummy packets are generally generated for faking over a wireless sensor network so as to keep the location privacy of nodes on the communication paths against the global eavesdropping. In this paper, a scoped-flooding protocol is designed for transferring data between each source and mobile sink(aka, basestation) where, the only nodes within the scope are allowed to issue dummy packets at every idle time so that the location privacy of the nodes on the paths is kept and the amount of dummy packets is reduced to the extend of the flooding scope. The size of the flooding diameter can be taken into consideration of the privacy level and the communication cost. We design a detailed specification of the protocol and verify several properties.