• Title/Summary/Keyword: human communication

Search Result 3,214, Processing Time 0.03 seconds

Using CR System at the Department of Radiation Oncology PACS Evaluation (방사선 종양학과에서 CR System을 이용한 PACS 유용성 평가)

  • Hong, Seung-Il;Kim, Young-Jae
    • Journal of the Korean Society of Radiology
    • /
    • v.6 no.2
    • /
    • pp.143-149
    • /
    • 2012
  • Today each hospital is trend that change rapidly by up to date, digitization and introducing newest medical treatment equipment. So, we introduce new CR system and supplement film system's shortcoming and PACS, EMR, RTP system's network that is using in hospital harmoniously and accomplish quality improvement of medical treatment and service elevation about business efficiency enlargement and patient Accordingly, we wish to introduce our case that integrate reflex that happen with radiation oncology here upon to PACS using CR system and estimate the availability. We measured that is Gantry, Collimator Star Shot, Light vs. Radiation, HDR QA(Dwell position accuracy) with Medical LINAC(MEVATRON-MX) Then, PACS was implemented on the digital images on the monitor that can be confirmed through the QA. Also, for cooperation with OCS system that is using from present source and impose code that need in treatment in each treatment, did so that Order that connect to network, input to CR may appear, did so that can solve support data mistake (active Pinacle's case supports DICOM3 file from present source but PACS does not support DICOM3 files.) of Pinacle and PACS that is Planning System and look at Planning premier in PACS. All image and data constructed integration to PACS as can refer and conduct premier in Hospital anywhere using CR system. Use Dosimetry IP in Filmless environment and QA's trial such as Light/Radition field size correspondence, gantry rotation axis' accuracy, collimator rotation axis' accuracy, brachy therapy's Dwell position check is available. Business efficiency by decrease and so on of unnecessary human strength consumption was augmented accordingly with session shortening as that integrate premier that is neted with radiation oncology using CR system to PACS. and for the future patient information security is essential.

A Study of Textured Image Segmentation using Phase Information (페이즈 정보를 이용한 텍스처 영상 분할 연구)

  • Oh, Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.249-256
    • /
    • 2011
  • Finding a new set of features representing textured images is one of the most important studies in textured image analysis. This is because it is impossible to construct a perfect set of features representing every textured image, and it is inevitable to choose some relevant features which are efficient to on-going image processing jobs. This paper intends to find relevant features which are efficient to textured image segmentation. In this regards, this paper presents a different method for the segmentation of textured images based on the Gabor filter. Gabor filter is known to be a very efficient and effective tool which represents human visual system for texture analysis. Filtering a real-valued input image by the Gabor filter results in complex-valued output data defined in the spatial frequency domain. This complex value, as usual, gives the module and the phase. This paper focused its attention on the phase information, rather than the module information. In fact, the module information is considered very useful at region analysis in texture, while the phase information was considered almost of no use. But this paper shows that the phase information can also be fully useful and effective at region analysis in texture, once a good method introduced. We now propose "phase derivated method", which is an efficient and effective way to compute the useful phase information directly from the filtered value. This new method reduces effectively computing burden and widen applicable textured images.

The present situation and trend of China archives science (중국(中國) 당안학(檔案學)와 현황(現況) 및 발전추세(發展趨勢))

  • Feng, Fuj-Ling
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.1 no.1
    • /
    • pp.37-52
    • /
    • 2001
  • 1. establishment and development of China archives science: With the centuries-old history of archives and archives management, early China archives science came into being in 1930s, and the research pushed forward by archives enterprise has made great achievements since then. 1.1 Expanding research fields: Foundation

An Analysis of Efficiency of Security Services : A Comparative Determinants Analysis of Public and Private Security (경호업무 효율성에 관한 연구 : 공공경호와 민간경호의 효율성 영향요인의 비교분석)

  • Park, Moon-Sun
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.67-103
    • /
    • 2009
  • Objectives of this study is develop security services through determinants analysis on the efficiency of security works regarding security and guarding business in Korea because nowadays the modern society like Korea let alone all over the world faces the increase of dangerous factors in every security field of the human societies, and also it is the very present situation that an individual's life even the national security itself can be at the risk without guaranteeing the efficiency of the security services. For this purpose, this study reviewed related documents, surveyed and interviewed security personnels to identify what the potentially influential factors are in both the public and private security organizations regarding the efficiency of present security services and organizations, and what differences are. Also, comparing the public and private security sectors, this study intended to suggest policy agendas how to enhance the efficiency of security services in the future. This study surveyed the 177 agents and former agents of the Presidential Security Service(PSS) for the public security sector, and also surveyed, interviewed, and internet-based polled 821 randomly selected personnels for the private security sector. This research showed that regarding the efficiency of the security services number of independent variables which had positive responses in the public security sector was more than that in the private security sector. Among the 21 questions regarding this issue, there were all of 21 positive responses in the public security sector while there were 18 negative responses in the private security sector. As a result of synthesizing all the answers of the both sides, it is possible to understand that mostly the ratio of the positive response was much higher. In the public security service, statistically significant variables were budget support for events, prior access of information, an integrated teamwork training, organizational atmosphere, morale of organization personnel. However, practical training of the security service and mutual communication showed unexpectedly negative(-) signs. In the private security service, statistically significant variables were budget support for events, integrated teamwork training, socially friendly atmosphere, compensation for the personnels, bullet-proof equipments and vehicles, mood of organization, personnel recruit and disposition, unexpected incidents and basic attitude for security services. In sum, while organizational personnel variables and organizational management variables were significant in the public security service, some organizational management variables and all socio-environment variables were statistically significant at 5% significance level.

  • PDF

Shade comparative analysis of natural tooth measured by visual and spectrophotometric methods (육안과 분광 측정기를 이용한 자연 치아의 색조비교분석)

  • Kim, Bum-Suk;Shin, Soo-Yeon;Lee, Jong-Hyuk
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.46 no.5
    • /
    • pp.443-454
    • /
    • 2008
  • Statement of problem: A clinically successful color match is one of the important factor to get an esthetic dental restoration. Dental shade guides are commonly used to evaluate tooth color in restorative procedure. But numerous reports have indicated that common shade guides do not provide sufficient spectral coverage of the natural tooth colors. To address issues associated with the shade guide, distinct avenues have been pursued objective spectrophotometric / colorimetric assessment. Purpose: This study compared the accuracy of tooth color selection of spectrophotometer with that of human visual determination. Three main factors were investigated, namely, the effect of light, the individual variation and the experience of the observer. Material and methods: At the first experiment, on ten patients, one operator independently selected the best matching shade to the unrestored maxillary central incisor, using a Vita Classical Shade Guide in the morning, at noon and in the afternoon. The same teeth were measured by means of a reflectance spectrophotometer. At the second experiment, on ten patients, ten operators (5 experts, 5 novices) selected and measured by the same method above at noon. At the third experiment, the results of the second experiment were divided into two groups, expert and novice, and analyzed. Results: 1. There was significant difference between visual and spectrophotometric assessment (mean ${\Delta}E$ values) in experiment 1, 2, 3 (P < .05). 2. There was no significant difference between experts and novices group, when comparing with each visual and spectrophotometric assessment (mean ${\Delta}E$ values). Conclusion: Spectrophotometer could be used to analyze the shade of natural tooth objectively. Thereby, this method offers the potential tominimize considerably the need for corrections or even remakesafter intraoral try-in of restoration. Furthermore, to achieve its advantage, both the shade-matching environment and communication between dentist and technician should be optimized with use of visual and instrumental shade-matching systems.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Status of Agrometeorological Information and Dissemination Networks (농업기상 정보 및 배분 네트워크 현황)

  • Jagtap, Shrikant;Li, Chunqiang
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.6 no.2
    • /
    • pp.71-84
    • /
    • 2004
  • There is a growing demand for agrometeorological information that end-users can use and not just interesting information. lo achieve this, each region/community needs to develop and provide localized climate and weather information for growers. Additionally, provide tools to help local users interpret climate forecasts issued by the National Weather Service in the country. Real time information should be provided for farmers, including some basic data. An ideal agrometeorological information system includes several components: an efficient data measuring and collection system; a modern telecommunication system; a standard data management processing and analysis system; and an advanced technological information dissemination system. While it is conventional wisdom that, Internet is and will play a major role in the delivery and dissemination of agrometeorological information, there are large gaps between the "information rich" and the "information poor" countries. Rural communities represent the "last mile of connectivity". For some time to come, TV broadcast, radio, phone, newspaper and fax will be used in many countries for communication. The differences in achieving this among countries arise from the human and financial resources available to implement this information and the methods of information dissemination. These differences must be considered in designing any information dissemination system. Experience shows that easy across to information more tailored to user needs would substantially increase use of climate information. Opportunities remain unexplored for applications of geographical information systems and remote sensing in agro meteorology.e sensing in agro meteorology.

A Study on the Product Design Process in I-Business Environment Focusing on Development of the Internet-based Design Process - (e-비지니스환경에서의 제품디자인 프로세스에 관한 기초연구-인터넷기반의 디자인 프로세스 개발을 중심으로-)

  • 이수봉;이돈희
    • Archives of design research
    • /
    • v.16 no.1
    • /
    • pp.181-198
    • /
    • 2003
  • The purpose of this study is to develop a on-line design tool for effectively coping with e-Business environment, or product design process into a Cyber model for traditional manufacturers which attempts new product development under such environment. It was finally developed as a model named $\ulcorner$Design Vortal Site; e-BVDS) that was based on the structure and style of internet web site. Results of the study can be described as follows ; \circled1 e-Business is based on the Internet. All processes in the context of e-Business require models whose structure and method of use are on-line styles. \circled2 In case that a traditional manufacturing business is converted into e-Business, it is better to first consider Hybrid Model that combines resources and advantages of both such traditional and digital businesses. \circled3 The product design process appropriate for e-Business environment has to have a structure and style that ensure utilization of the process as an Internet web site, active participation by product developers and interactive communication between participants in designing and designers. \circled4 $\ulcorner$e-BDVS) makes possible the use of designers around the wend like in-house designers, overcoming lack in creativity, ideas and human resources traditional business organizations face. However, the operation of $\ulcorner$e-BDVS$\lrcorner$ requires time and budget investments in securing related elements and conditions. \circled5 Cyber designers under $\ulcorner$e-BDVS$\lrcorner$ can easily perform all design projects in cyber space. But they have some limits in playing a role as designers and they have difficulty in getting rewards if such projects completed by them are not finally accepted. \circled6 $\ulcorner$e-BDVS) ensures the rapid use of a wide range of design information and data, reception of a variety of solutions and ideas and effective design development, all of which are not possible through traditional processes. However, this process may not be suitable to be used routine process or tool. \circled7 $\ulcorner$e-BDVS$\lrcorner$ makes it possible for out-sourcing or partners businesses to overcome restrictions in time and space and improve productivity and effectiveness. But such they may have to continue off-line works that can not be treated on-line.

  • PDF

Music Activities for Facilitation of Developmental Domains for Children from Age Three to Six (3-6세 유아의 영역별 발달 촉진을 위한 단계별 음악치료교육 활동 연구)

  • Lee, Su yeon
    • Journal of Music and Human Behavior
    • /
    • v.3 no.1
    • /
    • pp.29-62
    • /
    • 2006
  • The early development of an infant is crucial due to the enormous impact it has throughout an infant's life. Therefore, it is important to understand the development process of an infant and provide a high-quality educational environment so that an infant can progress at an innate pace to learn how to exercise, understand, speak, socialize, and empathize as well as having a balanced growth. When educating an infant, joy is a substantial factor in the formation of trust and development of relationship that makes education efficient. Music can be an effective means to offer a fun atmosphere vto the infant in which it stimulates active participation of the infant and development of a variety of dimensions to the infant's development. Also, the purpose of music therapy education is utilizes to plan for the different age groups' level of understanding of music and allow the infant to have a positive experience and develop properly. The purposes of this study are as following: to examine characteristics according to an infant' developmental steps thoroughly, to suggest interventions using music therapy education to stimulate development of an infant, to prove that infants age 3 to 6 obtain the necessary ability and skill through the effective educational therapy through music, and finally to create a music program for educating infants or music therapy. This study has examined theories of the music approach targeting infants age 3 to 6 and made character observations of infant' Motor, Cognition, Communication, Socialization, and Emotions. With the basis of the above theory, the different levels of development has been divided, specific goals has been set up according to the levels, and various music therapy education for infants have been created. The music therapy education activity has been approved by five professionals who are renown in their specific field. They made comments that the development levels were properly divided in the paper. They also commented that the music program is adequate for achieving the goal of each developmental level and it stimulates the different levels of an infant's development. In conclusion, the study reflects that the approach of music therapy education stimulates the different levels of infant development. Music therapists can utilize this music program to help handicapped children identify characteristics of progress and develop at their own ability.

  • PDF

A Case Study on The Development of Expressive Language of Children with Autism through Singing Activity Focused on Social Context (사회적 상황 중심의 노래활동을 통한 자폐아동의 언어표현 증진에 관한 사례연구)

  • Han, Sung Eun
    • Journal of Music and Human Behavior
    • /
    • v.3 no.1
    • /
    • pp.13-28
    • /
    • 2006
  • Autistic children have difficulties in communication. They tend to have more difficulties in general expression than in understanding sentences. This thesis tested the effect of music activities on children who have difficulties in language expression. As a research method, a group of autistic middle school students was selected who were attending normal schools. Three male students were selected for the test of K-ABC and CARS. Music treatments on the selected students were applied fifteen times, twice a week, for thirty minutes every time. The total treatment process could be divided into two stages. The stage one included the first twelve treatments and the stage two included following three treatments. In the stage one, the selected autistic students learned twenty four musics under real-world-like social circumstances. In the stage two, the students repeatedly learned the twenty four musics. A week before beginning the music treatment, the students were tested by PRES and a test developed by the author of this thesis. And a week after all treatments were completed, the students were tested again with the same test method to check if the students' expressive language ability got improved. The results of the research were as the following: First, the music treatment helped improve the autistic student's ability of expressing themselves such as 'requesting', 'rejecting', 'applying social customs' and 'providing information'. Second, the author of this thesis first had a hypothesis that the tested students might show different levels of achievements according to their intellectual ability or expressive language ability in K-ABC test, PRES and CARS. But it was not true. The student's level of achievement by music activities was proved not to have a significant correlation with their intellectual or expressive language abilities in the tests. Third, it was found that, through pre- and post-test of PRES, the music treatments could improve the receptive language ability as well as the expressive language ability. It saw great effect that musical data that utilize in specially this research investigator according to children's ability, autistic children write lyrics setting in social circumstance that is revealed much routinely and composes. To front, expect that suitable a lot of musics are developed in function and ability of subject person for elevation of expressive language ability.

  • PDF