Journal of the Korea Institute of Information and Communication Engineering
/
v.11
no.2
/
pp.293-300
/
2007
As the development of the various IP-based services, it is expected that Internet telephony service will gradually replace the traditional PSTN-based telephony service. But there are many issues resolved to spread the Internet telephony service. One of them is to support the emergency services in the Internet telephony. In the case of USA, it has been regulated that 911 services should be supported in the Internet telephony services using VoIP on the similar performance level to PSTN 911 service. According to the regulation, basic VoIP 911 calls should be routed to the general access line of LEA without the location information or the callback number, but the enhanced VoIP 911 calls with the location information and callback number should be routed on the dedicated 911 network and destined to the local 911 distribution center such as PSAP. But, in the current VoIP-based Internet telephony network, the emergency call service has not been handled as one of the special services as well at has a worse performance in comparison to it on PSTN. Moreover, the service has a critical problem that it can not be destined to the nearest PSAP because of the insufficient information about the location information and the call back number. In this paper, we suggest the SIP-based emergency call service mechanism in order to resolve the problems above mentioned. This suggested mechanism is implemented to show its effectiveness and efficiency.
Increasing amount of digital images requires more accurate and faster way of image retrieval. So far, image retrieval method includes content-based retrieval and keyword based retrieval, the former utilizing visual features such as color and brightness and the latter utilizing keywords which describe the image. However, the effectiveness of these methods as to providing the exact images the user wanted has been under question. Hence, many researchers have been working on relevance feedback, a process in which responses from the user are given as a feedback during the retrieval session in order to define user’s need and provide improved result. Yet, the methods which have employed relevance feedback also have drawbacks since several feedbacks are necessary to have appropriate result and the feedback information can not be reused. In this paper, a novel retrieval model has been proposed which annotates an image with a keyword and modifies the confidence level of the keyword in response to the user’s feedback. In the proposed model, not only the images which have received positive feedback but also the other images with the visual features similar to the features used to distinguish the positive image are subjected to confidence modification. This enables modifying large amount of images with only a few feedbacks ultimately leading to faster and more accurate retrieval result. An experiment has been performed to verify the effectiveness of the proposed model and the result has demonstrated rapid increase in recall and precision while receiving the same number of feedbacks.
Journal of the Korean Academy of Child and Adolescent Psychiatry
/
v.12
no.1
/
pp.79-93
/
2001
Objectives:The children with ADHD have some deficits in social skills including the peer relationship. There are several approaches to teaching social skills to children with ADHD, and many are combined in comprehensive programs to maximize treatment effects. We conducted this study to explore the direct effects of social skills training program applied to children with ADHD. Method:Five children and their mothers who were diagnosed to Attention Deficit-Hyperactivity Disorder(ADHD) in Y elementary school survey participated to the study. We performed the 8-session program with the modified the Pfiffner and McBurnett's program(1997), and assessed the social skills, problem behaviors, peer acceptance, parenting behaviors, and parenting stress. Results:Parent's reports were some different from teacher's reports;teacher reported improvement in social skills and peer acceptance, but parent notified decrement in problem behaviors. And also, there were no changes in maternal behaviors, but significant reducing effects in parenting stress. Conclusion:The stimulants are mainstream in treatment of children with ADHD. The social skills training programs are combined in comprehensive treatment programs in children with ADHD to maximize treatment effects.
Journal of the Korea Institute of Information Security & Cryptology
/
v.21
no.5
/
pp.71-82
/
2011
The RFID system provides undeniable advantages so that it is used for various application. However recent RFID system is vulnerable to some attacks as eavesdropping, replay attack, message hijacking, and tag tampering, because the messages are transmitted through the wireless channel and the tags are cheap. Above attacks cause the tag and reader impersonation, denial of service by invalidating tag, and the location tracking concerning bearer of tags, A lot of RFID authentication protocol bas been proposed to solve the vulnerability. Since Weis, Sanna, Rivest, and Engel, proposed the bash-based RFID authentication protocol, many researchers have improved hash-based authentication protocol and recent bash-based authentication protocols provide security and desirable privacy. However, it remains open problem to reduce the tag identification time as long as privacy and security are still guaranteed. Here we propose a new protocol in which the tags generate the message depending on the state of previous communitions between tag and reader. In consequence, our protocol allows a server to identify a tag in a reasonable amount of time while ensuring security and privacy, To be specific, we reduced the time for the server to identify a tag when the last session finished abnormally by at least 50% compared with other bash-based schemes that ensure levels of security and privacy similar to ours.
Mandibular rest position is very essential position because in that position, masticatory muscularture can be reciprocally coordinative and unstrained. So obtaining a good ability to establish and maintain rest position in non-functioning state is mandatory for treatment of patient with craniomandibular disorders. In general, many types of mandibulr movement exercise start from rest position and use the sense of muscle relearning, that is, muscle smoothness and relaxation, throughout the exercise period. In this study, 44 normal subjects for control group and 37 patients with craniomandibular disorders for experimental group participated and they were classified into 3 subgroups, respectively. One method to guide mandibular rest position was used for one subgroup, so theree methods were used for this study, 1)self-guided rest position without any education, 2) guided by Rocabado's tongue rest position, 3) guided through swallowing after Dawson's centric relation. To record electromyographic activity, Bioelectric processor EM2 (Myotronics, U.S.A.) was used. The numbers of sessions from start to stable resting electromyographic level and muscle activities in stable state were recorded and two recordings which were first and second, 3 days after first recording, were done, The data were processed with SPSS/PC+package. The obtained results were as follows : 1. Mean number of sessions in second recording were fewer than those in first recording in both groups. In comparison among 3 subgroups, mean number of sessions of subgroup guided through Dawson's method were fewer than those of other groups though it is not statistically significant. 2. There was a difference of mean number of sessions between control and experimental group in first recording, but in second recording there was no difference in any cases. 3. Mean value of muscle activity were generally not different without regard to group and method if once come to stable resting position level. Mean value of muscle activity of guided subgroups showed a tendency of decreasing in second recording than in first recording. However, in self-guided subgroup there was a inconsistent pattern. 4. The amounts of change in session number from first to second recording in control group were fewer than those in experimental group.
Journal of the Korea Academia-Industrial cooperation Society
/
v.12
no.5
/
pp.2222-2229
/
2011
The purpose of this study was to evaluate the efficacy of basic integrative lecture course of medical college through cyber lecture. This study was also aimed to develop and implement a progressive cyber-teaching method which integrative lecture system is concerned for medical students. In this study, effectiveness of cyber lecture on the student's satisfaction, content difficulty and course management were analyzed by way of anonymous survey at the end of basic neuroscience integrative lecture course. Survey data were also analyzed with statistical tools to find out strength of correlation between students degree of satisfaction to cyber lecture and their individual grade of this course. The majority of students held positive opinions on course management, level of difficulty in each session, utilizing multimedia contents and preferred cyber lecture system to be continued in the future. Many students also suggested intimate integration of multimedia contents shown in cyber lecture to the lab sessions for the maximization of educational effect. In this study, it suggested that cyber lecture could be a useful tool in teaching integrative medical subjects and play more important role in the future integrative medical subjects with the improvement of present problems and limitations.
Instroduction: The purpose of this study was to investigate safety education-related backgrounds and safety behaviors of elementary school children at a local area in Jeonbuk province. Methods: Study subjects were 308 5th and 6th graders from 6 schools located in J City and the data were collected from June 16-27, 2003. Research instrument to test safety behaviors was 4-points summated scale (Cronbach${\alpha}$= .94) composed of 54-items with three sub-categories school life safety (${\alpha}$= .88), traffic safety (${\alpha}$= .86), and daily life safety (${\alpha}$= .84), The data was analyzed by percentage, x2-test, t-test, ANOVA and Duncan test using SPSS/PC 10.0. Results: 1. Safety Education-related Characteristics: Safety education was mostly conducted during extracurricular hour as picnic (37%) and regular class (37.2%); and the instructors of safety education were school nurse (33.2%), classroom teacher (30.9%), and parents (23.4%) in order. About two third (71.0%) of the subjects have had many kinds of school event program such as essay writing, poster drawing, oratorical contest in the course of safety education According to gender, girl students was more favorable about school events as a effective safety education measure (x2=9.188, p= .010); and according to school location, nural school taught more at moming & closing session (x2=7.383, p= .025), by school nurse or classroom teacher (x2=36.574, p= .001), and had more frequent (x2=63.337, p= .001) safety education class. 2. Practice of safety behaviors: Mean scores of safety behaviors was $106.9{\pm}24.92$ out of 162 points. According gender, the scores of girl students (t=-3.296, p= .001) were significant higher than boy students. But there was not any significant difference according to school area According to safety education-related characteristics, the scores of safety behaviors was significantly higher in the group who thought that school event program was more effective on safety education (F=4.024, p= .019), and who were more interested in current safety education class (F= 10.203, p= .001) Conclusions: From the above findings, the authors concluded that school-based safety education was mainly conducted at extra-curricular and regular class, and by school nurse or classroom teacher in elementary school. Even though the mean scores of safety behaviors of elementary school children was in medium level, those. were significant higher in girl students and in rural school children. And extra-curricular activities and school event programs were suggested as more effective strategies for school-based safety education Based on the above findings, safety education class can be recommended in regular curricular basis; and various extracurricular activities and school event programs need to be developed for more effective school-based safety education. In addition, further study on gender-specific factors on safety behaviors and nationwide survey on school-based safety education should be needed.
Park, Il-Soo;Woon, Yu;Chung, Kyung-Won;Lee, Gangwoong;Owen, Jeffrey S.;Kwon, Won-Tae;Yun, Won-Tae
Journal of Korean Society for Atmospheric Environment
/
v.30
no.2
/
pp.188-200
/
2014
The IPCC 5th Assessment Report (Climate Change 2013: The Physical Science Basis) was accepted at the 36th Session of the IPCC on 26 September 2013 in Stockholm, Sweden. It consists of the full scientific and technical assessment undertaken by Working Group I. This comprehensive assessment of the physical aspects of climate change puts a focus on those elements that are relevant to understand past, document current, and project future of climate change. The assessment builds on the IPCC Fourth Assessment Report and the recent Special Report on Managing the Risk of Extreme Events and Disasters to Advance Climate Change Adaptation. The assessment covers the current knowledge of various processes within, and interactions among, climate system components, which determine the sensitivity and response of the system to changes in forcing, and they quantify the link between the changes in atmospheric constituents, and hence radiative forcing, and the consequent detection and attribution of climate change. Projections of changes in all climate system components are based on model simulations forced by a new set of scenarios. The report also provides a comprehensive assessment of past and future sea level change in a dedicated chapter. The primary purpose of this Technical Summary is to provide the link between the complete assessment of the multiple lines of independent evidence presented in the main report and the highly condensed summary prepared as Policy makers Summary. The Technical Summary thus serves as a starting point for those readers who seek the full information on more specific topics covered by this assessment. Warming of the climate system is unequivocal, and since the 1950s, many of the observed changes are unprecedented over decades to millennia. The atmosphere and ocean have warmed, the amounts of snow and ice have diminished, sea level has risen, and the concentrations of greenhouse gases have increased. Total radiative forcing is positive, and has led to an uptake of energy by the climate system. The largest contribution to total radiative forcing is caused by the increase in the atmospheric concentration of $CO_2$ since 1750. Human influence on the climate system is clear. This is evident from the increasing greenhouse gas concentrations in the atmosphere, positive radiative forcing, observed warming, and understanding of the climate system. Continued emissions of greenhouse gases will cause further warming and changes in all components of the climate system. Limiting climate change will require substantial and sustained reductions of greenhouse gas emissions. The in-depth review for past, present and future of climate change is carried out on the basis of the IPCC 5th Assessment Report.
The Journal of Korean Institute of Communications and Information Sciences
/
v.29
no.12C
/
pp.1692-1706
/
2004
Recently, there are rapid development of information and communication and rapid growth of e-business users. Therefore we try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. Wireless e-business adopts credit card WPP protocol and AIP protocol proposed by ASPeCT. WAP, one of the protocol used by WPP has weakness of leaking out information from WG which conned wire and wireless communication. certification chain based AIP protocol requires a lot of computation time and user IDs are known to others. We propose a Micro-Payment protocol based on credit card. Our protocol use the encryption techniques of the public key with ID to ensure the secret of transaction in the step of session key generation. IDs are generated using ECC based Weil Paring. We also use the certification with hidden electronic sign to transmit the payment result. The proposed protocol solves the privacy protection and Non-repudiation p개blem. We solve not only the safety and efficiency problem but also independent of specific wireless platform. The protocol requires the certification organization attent the certification process of payment. Therefore, other domain provide also receive an efficient and safe service.
The purpose of this study is to devise successful strategies for launching of new brands in franchise companies based on cases of 'Gamarogangjung' of Masedarin Inc. The results of case analysis shaw following successful strategies. First, Masedarin Inc. has used its core competence; Masedarin Inc., which managed chicken franchises for many years, launched the new brand, 'Gamarogangjung' based on its differentiated technologies and infrastructure. Second, the brand, 'Gamarogangjung' has used market oriented strategy actively; the brand has reflected customers' needs to its adminstration immediately by understanding and sharing of customers' needs at the corporate level. Third, Masedarin Inc. has differentiated a business model from other companies; by using 'take out' purchasing system instead of 'delivery to doors' or 'purchasing by visiting', the company has saved huge management cost. Fourth, Masedarin Inc. developed a new kind of business which is differentiated from existing chicken franchise brands or take-out restaurants. Fifth, Masedarin Inc. has appealed its sincerity to franchisees; its business information session, which explains about the business openly without exaggeration, has drawn a high rate of franchise agreement. Sixth, Masedarin Inc. changed its way of thinking about conditions of a location for member stores. The company has selected 'A' level locations for their member stores which enables 'quick sales at small profits' while other take-out stores are usually located at 'B' level location. Lastly, Masedarin Inc. has given thorough instructions to the staff of member stores. And immediately after opening of the stores, franchisees were able to operate the stores comfortably because the company educated the staff repeatedly over a long period to make them master skills before the opening of the store.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.