• Title/Summary/Keyword: many-to-many session

Search Result 185, Processing Time 0.026 seconds

A Study of Call Service Mechanism on SIP for Emergency Communication Services (긴급통신서비스 제공을 위한 SIP에서의 호 서비스 메커니즘에 관한 연구)

  • Lee, Kyu-Chul;Lee, Jong-Hyup
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.2
    • /
    • pp.293-300
    • /
    • 2007
  • As the development of the various IP-based services, it is expected that Internet telephony service will gradually replace the traditional PSTN-based telephony service. But there are many issues resolved to spread the Internet telephony service. One of them is to support the emergency services in the Internet telephony. In the case of USA, it has been regulated that 911 services should be supported in the Internet telephony services using VoIP on the similar performance level to PSTN 911 service. According to the regulation, basic VoIP 911 calls should be routed to the general access line of LEA without the location information or the callback number, but the enhanced VoIP 911 calls with the location information and callback number should be routed on the dedicated 911 network and destined to the local 911 distribution center such as PSAP. But, in the current VoIP-based Internet telephony network, the emergency call service has not been handled as one of the special services as well at has a worse performance in comparison to it on PSTN. Moreover, the service has a critical problem that it can not be destined to the nearest PSAP because of the insufficient information about the location information and the call back number. In this paper, we suggest the SIP-based emergency call service mechanism in order to resolve the problems above mentioned. This suggested mechanism is implemented to show its effectiveness and efficiency.

A Image Retrieval Model Based on Weighted Visual Features Determined by Relevance Feedback (적합성 피드백을 통해 결정된 가중치를 갖는 시각적 특성에 기반을 둔 이미지 검색 모델)

  • Song, Ji-Young;Kim, Woo-Cheol;Kim, Seung-Woo;Park, Sang-Hyun
    • Journal of KIISE:Databases
    • /
    • v.34 no.3
    • /
    • pp.193-205
    • /
    • 2007
  • Increasing amount of digital images requires more accurate and faster way of image retrieval. So far, image retrieval method includes content-based retrieval and keyword based retrieval, the former utilizing visual features such as color and brightness and the latter utilizing keywords which describe the image. However, the effectiveness of these methods as to providing the exact images the user wanted has been under question. Hence, many researchers have been working on relevance feedback, a process in which responses from the user are given as a feedback during the retrieval session in order to define user’s need and provide improved result. Yet, the methods which have employed relevance feedback also have drawbacks since several feedbacks are necessary to have appropriate result and the feedback information can not be reused. In this paper, a novel retrieval model has been proposed which annotates an image with a keyword and modifies the confidence level of the keyword in response to the user’s feedback. In the proposed model, not only the images which have received positive feedback but also the other images with the visual features similar to the features used to distinguish the positive image are subjected to confidence modification. This enables modifying large amount of images with only a few feedbacks ultimately leading to faster and more accurate retrieval result. An experiment has been performed to verify the effectiveness of the proposed model and the result has demonstrated rapid increase in recall and precision while receiving the same number of feedbacks.

THE SOCIAL SKILLS TRAINING IN CHILDREN WITH ATTENTION-DEFICIT HYPERACTIVITY DISORDER(ADHD) (주의력결핍/과다활동장애(ADHD) 아동에서 사회기술훈련)

  • Han, Eun-Sun;Lee, Yang-Hee;Ahn, Dong-Hyun
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.12 no.1
    • /
    • pp.79-93
    • /
    • 2001
  • Objectives:The children with ADHD have some deficits in social skills including the peer relationship. There are several approaches to teaching social skills to children with ADHD, and many are combined in comprehensive programs to maximize treatment effects. We conducted this study to explore the direct effects of social skills training program applied to children with ADHD. Method:Five children and their mothers who were diagnosed to Attention Deficit-Hyperactivity Disorder(ADHD) in Y elementary school survey participated to the study. We performed the 8-session program with the modified the Pfiffner and McBurnett's program(1997), and assessed the social skills, problem behaviors, peer acceptance, parenting behaviors, and parenting stress. Results:Parent's reports were some different from teacher's reports;teacher reported improvement in social skills and peer acceptance, but parent notified decrement in problem behaviors. And also, there were no changes in maternal behaviors, but significant reducing effects in parenting stress. Conclusion:The stimulants are mainstream in treatment of children with ADHD. The social skills training programs are combined in comprehensive treatment programs in children with ADHD to maximize treatment effects.

  • PDF

Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method (서버와 태그 비동기시에도 효율적으로 검색이 가능한 해시기반 RFID 인증 프로토콜)

  • Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.71-82
    • /
    • 2011
  • The RFID system provides undeniable advantages so that it is used for various application. However recent RFID system is vulnerable to some attacks as eavesdropping, replay attack, message hijacking, and tag tampering, because the messages are transmitted through the wireless channel and the tags are cheap. Above attacks cause the tag and reader impersonation, denial of service by invalidating tag, and the location tracking concerning bearer of tags, A lot of RFID authentication protocol bas been proposed to solve the vulnerability. Since Weis, Sanna, Rivest, and Engel, proposed the bash-based RFID authentication protocol, many researchers have improved hash-based authentication protocol and recent bash-based authentication protocols provide security and desirable privacy. However, it remains open problem to reduce the tag identification time as long as privacy and security are still guaranteed. Here we propose a new protocol in which the tags generate the message depending on the state of previous communitions between tag and reader. In consequence, our protocol allows a server to identify a tag in a reasonable amount of time while ensuring security and privacy, To be specific, we reduced the time for the server to identify a tag when the last session finished abnormally by at least 50% compared with other bash-based schemes that ensure levels of security and privacy similar to ours.

An Electromyographic Study on Mandibular Rest Position Induced by Several Methods (하악안정위 유도에 관한 근전도학적 연구)

  • Chang Jung;Kyung-Soo Han;Min Shin
    • Journal of Oral Medicine and Pain
    • /
    • v.18 no.2
    • /
    • pp.121-130
    • /
    • 1993
  • Mandibular rest position is very essential position because in that position, masticatory muscularture can be reciprocally coordinative and unstrained. So obtaining a good ability to establish and maintain rest position in non-functioning state is mandatory for treatment of patient with craniomandibular disorders. In general, many types of mandibulr movement exercise start from rest position and use the sense of muscle relearning, that is, muscle smoothness and relaxation, throughout the exercise period. In this study, 44 normal subjects for control group and 37 patients with craniomandibular disorders for experimental group participated and they were classified into 3 subgroups, respectively. One method to guide mandibular rest position was used for one subgroup, so theree methods were used for this study, 1)self-guided rest position without any education, 2) guided by Rocabado's tongue rest position, 3) guided through swallowing after Dawson's centric relation. To record electromyographic activity, Bioelectric processor EM2 (Myotronics, U.S.A.) was used. The numbers of sessions from start to stable resting electromyographic level and muscle activities in stable state were recorded and two recordings which were first and second, 3 days after first recording, were done, The data were processed with SPSS/PC+package. The obtained results were as follows : 1. Mean number of sessions in second recording were fewer than those in first recording in both groups. In comparison among 3 subgroups, mean number of sessions of subgroup guided through Dawson's method were fewer than those of other groups though it is not statistically significant. 2. There was a difference of mean number of sessions between control and experimental group in first recording, but in second recording there was no difference in any cases. 3. Mean value of muscle activity were generally not different without regard to group and method if once come to stable resting position level. Mean value of muscle activity of guided subgroups showed a tendency of decreasing in second recording than in first recording. However, in self-guided subgroup there was a inconsistent pattern. 4. The amounts of change in session number from first to second recording in control group were fewer than those in experimental group.

  • PDF

Development of Cyber Lecture Contents and Application to the Basic Neuroscience Integrative Lecture for Medical Students (기초의학 통합강의 운영을 위한 가상강의(Cyber Lecture)의 개발 및 적용 -기초신경과학 통합강의의 운용과 설문을 통한 학생들의 의견을 중심으로-)

  • Park, Jeong-Hyun;Park, Kyeong-Han;Lee, Young-Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.5
    • /
    • pp.2222-2229
    • /
    • 2011
  • The purpose of this study was to evaluate the efficacy of basic integrative lecture course of medical college through cyber lecture. This study was also aimed to develop and implement a progressive cyber-teaching method which integrative lecture system is concerned for medical students. In this study, effectiveness of cyber lecture on the student's satisfaction, content difficulty and course management were analyzed by way of anonymous survey at the end of basic neuroscience integrative lecture course. Survey data were also analyzed with statistical tools to find out strength of correlation between students degree of satisfaction to cyber lecture and their individual grade of this course. The majority of students held positive opinions on course management, level of difficulty in each session, utilizing multimedia contents and preferred cyber lecture system to be continued in the future. Many students also suggested intimate integration of multimedia contents shown in cyber lecture to the lab sessions for the maximization of educational effect. In this study, it suggested that cyber lecture could be a useful tool in teaching integrative medical subjects and play more important role in the future integrative medical subjects with the improvement of present problems and limitations.

A Survey on Safety Behaviors among Korean Elementary School Children at a Local City (일 지역 초등학생의 안전행위 조사)

  • Ko, Meoung-Hee;Kim, Kyung-Sook;Lee, Kyoung-Sook;Kang, Hae-Young
    • Journal of the Korean Society of School Health
    • /
    • v.16 no.2
    • /
    • pp.25-34
    • /
    • 2003
  • Instroduction: The purpose of this study was to investigate safety education-related backgrounds and safety behaviors of elementary school children at a local area in Jeonbuk province. Methods: Study subjects were 308 5th and 6th graders from 6 schools located in J City and the data were collected from June 16-27, 2003. Research instrument to test safety behaviors was 4-points summated scale (Cronbach${\alpha}$= .94) composed of 54-items with three sub-categories school life safety (${\alpha}$= .88), traffic safety (${\alpha}$= .86), and daily life safety (${\alpha}$= .84), The data was analyzed by percentage, x2-test, t-test, ANOVA and Duncan test using SPSS/PC 10.0. Results: 1. Safety Education-related Characteristics: Safety education was mostly conducted during extracurricular hour as picnic (37%) and regular class (37.2%); and the instructors of safety education were school nurse (33.2%), classroom teacher (30.9%), and parents (23.4%) in order. About two third (71.0%) of the subjects have had many kinds of school event program such as essay writing, poster drawing, oratorical contest in the course of safety education According to gender, girl students was more favorable about school events as a effective safety education measure (x2=9.188, p= .010); and according to school location, nural school taught more at moming & closing session (x2=7.383, p= .025), by school nurse or classroom teacher (x2=36.574, p= .001), and had more frequent (x2=63.337, p= .001) safety education class. 2. Practice of safety behaviors: Mean scores of safety behaviors was $106.9{\pm}24.92$ out of 162 points. According gender, the scores of girl students (t=-3.296, p= .001) were significant higher than boy students. But there was not any significant difference according to school area According to safety education-related characteristics, the scores of safety behaviors was significantly higher in the group who thought that school event program was more effective on safety education (F=4.024, p= .019), and who were more interested in current safety education class (F= 10.203, p= .001) Conclusions: From the above findings, the authors concluded that school-based safety education was mainly conducted at extra-curricular and regular class, and by school nurse or classroom teacher in elementary school. Even though the mean scores of safety behaviors of elementary school children was in medium level, those. were significant higher in girl students and in rural school children. And extra-curricular activities and school event programs were suggested as more effective strategies for school-based safety education Based on the above findings, safety education class can be recommended in regular curricular basis; and various extracurricular activities and school event programs need to be developed for more effective school-based safety education. In addition, further study on gender-specific factors on safety behaviors and nationwide survey on school-based safety education should be needed.

In-depth Review of IPCC 5th Assessment Report (IPCC 제5차 과학평가보고서 고찰)

  • Park, Il-Soo;Woon, Yu;Chung, Kyung-Won;Lee, Gangwoong;Owen, Jeffrey S.;Kwon, Won-Tae;Yun, Won-Tae
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.30 no.2
    • /
    • pp.188-200
    • /
    • 2014
  • The IPCC 5th Assessment Report (Climate Change 2013: The Physical Science Basis) was accepted at the 36th Session of the IPCC on 26 September 2013 in Stockholm, Sweden. It consists of the full scientific and technical assessment undertaken by Working Group I. This comprehensive assessment of the physical aspects of climate change puts a focus on those elements that are relevant to understand past, document current, and project future of climate change. The assessment builds on the IPCC Fourth Assessment Report and the recent Special Report on Managing the Risk of Extreme Events and Disasters to Advance Climate Change Adaptation. The assessment covers the current knowledge of various processes within, and interactions among, climate system components, which determine the sensitivity and response of the system to changes in forcing, and they quantify the link between the changes in atmospheric constituents, and hence radiative forcing, and the consequent detection and attribution of climate change. Projections of changes in all climate system components are based on model simulations forced by a new set of scenarios. The report also provides a comprehensive assessment of past and future sea level change in a dedicated chapter. The primary purpose of this Technical Summary is to provide the link between the complete assessment of the multiple lines of independent evidence presented in the main report and the highly condensed summary prepared as Policy makers Summary. The Technical Summary thus serves as a starting point for those readers who seek the full information on more specific topics covered by this assessment. Warming of the climate system is unequivocal, and since the 1950s, many of the observed changes are unprecedented over decades to millennia. The atmosphere and ocean have warmed, the amounts of snow and ice have diminished, sea level has risen, and the concentrations of greenhouse gases have increased. Total radiative forcing is positive, and has led to an uptake of energy by the climate system. The largest contribution to total radiative forcing is caused by the increase in the atmospheric concentration of $CO_2$ since 1750. Human influence on the climate system is clear. This is evident from the increasing greenhouse gas concentrations in the atmosphere, positive radiative forcing, observed warming, and understanding of the climate system. Continued emissions of greenhouse gases will cause further warming and changes in all components of the climate system. Limiting climate change will require substantial and sustained reductions of greenhouse gas emissions. The in-depth review for past, present and future of climate change is carried out on the basis of the IPCC 5th Assessment Report.

A Secure Micro-Payment Protocol based on Credit Card in Wireless Internet (무선인터넷에서 신용카드기반의 안전한 소액 지불 프로토콜)

  • Kim Seok mai;Kim Jang Hwan;Lee Chung sei
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12C
    • /
    • pp.1692-1706
    • /
    • 2004
  • Recently, there are rapid development of information and communication and rapid growth of e-business users. Therefore we try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. Wireless e-business adopts credit card WPP protocol and AIP protocol proposed by ASPeCT. WAP, one of the protocol used by WPP has weakness of leaking out information from WG which conned wire and wireless communication. certification chain based AIP protocol requires a lot of computation time and user IDs are known to others. We propose a Micro-Payment protocol based on credit card. Our protocol use the encryption techniques of the public key with ID to ensure the secret of transaction in the step of session key generation. IDs are generated using ECC based Weil Paring. We also use the certification with hidden electronic sign to transmit the payment result. The proposed protocol solves the privacy protection and Non-repudiation p개blem. We solve not only the safety and efficiency problem but also independent of specific wireless platform. The protocol requires the certification organization attent the certification process of payment. Therefore, other domain provide also receive an efficient and safe service.

The Case Study of Successful Strategies for Launching New Brands in Franchise Companies through Core Competence and Paradigm Shift : Based on Cases of'Gamarogangjung'of Masedarin Inc. (프랜차이즈 기업의 핵심역량과 발상의 전환을 통한 신규브랜드 성공전략 사례연구 - (주)마세다린의 가마로 강정 사례를 중심으로 -)

  • Seo, Min-Gyo;Cheong, Tae-Hwan
    • The Korean Journal of Franchise Management
    • /
    • v.3 no.2
    • /
    • pp.55-78
    • /
    • 2012
  • The purpose of this study is to devise successful strategies for launching of new brands in franchise companies based on cases of 'Gamarogangjung' of Masedarin Inc. The results of case analysis shaw following successful strategies. First, Masedarin Inc. has used its core competence; Masedarin Inc., which managed chicken franchises for many years, launched the new brand, 'Gamarogangjung' based on its differentiated technologies and infrastructure. Second, the brand, 'Gamarogangjung' has used market oriented strategy actively; the brand has reflected customers' needs to its adminstration immediately by understanding and sharing of customers' needs at the corporate level. Third, Masedarin Inc. has differentiated a business model from other companies; by using 'take out' purchasing system instead of 'delivery to doors' or 'purchasing by visiting', the company has saved huge management cost. Fourth, Masedarin Inc. developed a new kind of business which is differentiated from existing chicken franchise brands or take-out restaurants. Fifth, Masedarin Inc. has appealed its sincerity to franchisees; its business information session, which explains about the business openly without exaggeration, has drawn a high rate of franchise agreement. Sixth, Masedarin Inc. changed its way of thinking about conditions of a location for member stores. The company has selected 'A' level locations for their member stores which enables 'quick sales at small profits' while other take-out stores are usually located at 'B' level location. Lastly, Masedarin Inc. has given thorough instructions to the staff of member stores. And immediately after opening of the stores, franchisees were able to operate the stores comfortably because the company educated the staff repeatedly over a long period to make them master skills before the opening of the store.