• Title/Summary/Keyword: $I_2$-convergence

Search Result 951, Processing Time 0.027 seconds

The Relationship of Caregiving Appraisal and Family Function among Senile Dementia Patients' Families using In-home Services for the Long-Term Care Insurance (노인장기요양보험 재가보호서비스를 이용하는 노인성 치매환자 가족의 돌봄평가와 가족기능과의 관계)

  • Lee, Jungeun;Ko, Il Sun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.8
    • /
    • pp.319-330
    • /
    • 2018
  • The aim of this study was to identify the relationship of caregiving appraisal and family function among senile dementia patients' families using in-home services for the Long-Term Care Insurance(LTCI). The participants were 121 family caregivers of senile dementia patients using in-home services for the LTCI. The participants' mean age was $53.80{\pm}10.86years$, all middle-aged women(75.2%). When negative cognition's burden and neutral one's demand in their caregiving appraisal were low and positive cognition's satisfaction and mastery in their caregiving appraisal were high, emotional function in their family function was high. There is a need to develop nursing interventions for strengthening positive cognition's satisfaction and decreasing neutral one's demand in their caregiving appraisal to improve emotional function and communication of senile dementia patients' families.

A Study on the Factors Affecting the reliability of User 's Confidence in Korean Internet professional Bank -Focused on Kakao Bank and K Bank- (국내 인터넷 전문 은행이 사용자의 신뢰감 형성에 끼치는 요인에 관한 연구 -카카오뱅크와 케이뱅크를 중심으로-)

  • Lee, Kaha;Kim, Seung-In
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.1
    • /
    • pp.277-282
    • /
    • 2018
  • This study aims to present a direction for securing continuous growth and confidence, centering on two Internet banking companies that started recently. The banking market has been rewriting the history since the emergence of Internet professional banks. In order to improve the credibility and promote the development of the Internet professional banks, I conducted a questionnaire survey and In Depth Interview. As a result of this survey, the overall reliability is still low, and the factors affecting reliability are: 1.Security problem 2.Discomfort of customer service 3.Errors and unnecessary services. This is a start-up business, so the awareness and reliability can be changed soon. Therefore, it is necessary to continue research on this according to the changing user's perception.

Acquisition of Data of Equipments on Shop Floor Using Interface Between Various Equipments (다양한 생산 설비와의 인터페이스를 고려한 설비정보 수집)

  • Nam, So-Jeong;Lee, Jai-Kyung;Lee, Sung-Woo;Park, Jong-Kweon
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.35 no.2
    • /
    • pp.149-156
    • /
    • 2011
  • There is much information of equipment in shop floor because the manufacturing processes are different as the equipment within the manufacturing process is varied. To provide effective process information to MES and other production systems, the DAS requires an equipment monitoring system that takes into account the characteristics of the equipment on the shop floor. In this study, we proposed some methods for collecting the required information about various equipments on a shop floor. The equipments such as CNC can be interfaced with the DAS by using a PLC-based method and a sensor-based interface board can be used to interface general equipments. The proposed methods can be used to collect information on the shop floor in real-time. Moreover these methods are very adaptive and can be easily modified according to the changes made to the shop floor. The information about a real shop floor acquired by employing these methods is saved in a database and the can be provided to a supervisor and MES so that they are aware of the status of the shop floor.

Analysis of Flood Control Capacity of Agricultural Reservoir Based on SSP Climate Change Scenario (SSP 기후변화 시나리오에 따른 농업용 저수지 홍수조절능력 분석)

  • Kim, Jihye;Kwak, Jihye;Hwang, Soonho;Jun, Sang Min;Lee, Sunghack;Lee, Jae Nam;Kang, Moon Seong
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.63 no.5
    • /
    • pp.49-62
    • /
    • 2021
  • The objective of this study was to evaluate the flood control capacity of the agricultural reservoir based on state-of-the-art climate change scenario - SSP (Shared Socioeconomic Pathways). 18 agricultural reservoirs were selected as the study sites, and future rainfall data based on SSP scenario provided by CMIP6 (Coupled Model Intercomparison Project 6) was applied to analyze the impact of climate change. The frequency analysis module, the rainfall-runoff module, the reservoir operation module, and their linkage system were built and applied to simulate probable rainfall, maximum inflow, maximum outflow, and maximum water level of the reservoirs. And the maximum values were compared with the design values, such as design flood of reservoirs, design flood of direct downstream, and top of dam elevation, respectively. According to whether or not the maximum values exceed each design value, cases were divided into eight categories; I-O-H, I-O, I-H, I, O-H, O, H, X. Probable rainfall (200-yr frequency, 12-h duration) for observed data (1973~2020) was a maximum of 445.2 mm and increased to 619.1~1,359.7 mm in the future (2011~2100). For the present, 61.1% of the reservoirs corresponded to I-O, which means the reservoirs have sufficient capacity to discharge large inflow; however, there is a risk of overflowing downstream due to excessive outflow. For the future, six reservoirs (Idong, Baekgok, Yedang, Tapjung, Naju, Jangsung) were changed from I-O to I-O-H, which means inflow increases beyond the discharge capacity due to climate change, and there is a risk of collapse due to dam overflow.

Productivity Analysis for Industrial Augmented Reality(iAR) Content Development Using an iAR Specialized Engine (산업용 증강현실 전용엔진을 이용한 산업용 증강현실 콘텐츠 개발에 대한 생산성 분석)

  • Kang, Minshik
    • Journal of Industrial Convergence
    • /
    • v.20 no.4
    • /
    • pp.1-6
    • /
    • 2022
  • In recent years, many global manufacturers such as Mercedes-Benz and BMW have been using augmented reality technology to spread it to various fields such as assembly process, after-sales service, sales stores, and consumer manuals. In this study, the application status of innovation in manufacturing using industrial augmented reality was identified, and the possibility of combining existing ERP and augmented reality was analyzed based on this. In addition, it was empirically analyzed that the selection of a dedicated content development engine is the most important factor in development productivity in the development of industrial augmented reality content. The same content developed with Unity3d was redeveloped with Vuforia Studio, and as a result of comparative analysis of development man-hours by field, the development lead time was shortened by 8 times. This study proves productivity by actually developing industrial augmented reality contents, and it is a study with a difference that is difficult to implement in practice.

Countermeasure of Sniffing Attack: Survey (효율적인 Sniffing 공격 대응방안 연구)

  • Hong, Sunghyuck;Seo, Yujeong
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.31-36
    • /
    • 2016
  • Sniffing attack is a passive attack which is reassembling packets to collect personal information, bank accounting number, and other important information. Sniffing attack happens in LAN and uses promiscuous mode which is opening filtering by pass all packets in LAN, attackers could catch any packets in LAN, so they can manipulate packets. They are Switch Jamming, Port mirroring, ARP Redirect, and ICMP Redirect attack. To defend these attacks, I proposed to use SSL packet encryption, reconfiguration of switching environment, DNS, and decoy method for defending all kinds of Sniffing attacks.

Reference Image Update on the Security System for the Moving Object Detection (침입자 검출을 위한 보안 시스템에서의 참고영상 갱신 방안에 관한 연구)

  • 안용학
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.99-108
    • /
    • 2002
  • In this paper, I propose a reference image updating algorithm for Intruder Detection System using a difference image method that can reliably separate moving objects from noisy background in the image sequence received from a camera at the fixed position. The proposed algorithm consists of four process determines threshold value and quantization, segmentation of a moving object area, generation of adaptive temporary image that removes a moving object area, and updates reference image using median filtering. The test results show that the proposed algorithm can generate reference image very effectively in the noisy environment.

  • PDF

Hidden Indicator Based PIN-Entry Method Using Audio Signals

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.2
    • /
    • pp.91-96
    • /
    • 2017
  • PIN-entry interfaces have high risks to leak secret values if the malicious attackers perform shoulder-surfing attacks with advanced monitoring and observation devices. To make the PIN-entry secure, many studies have considered invisible radio channels as a secure medium to deliver private information. However, the methods are also vulnerable if the malicious adversaries find a hint of secret values from user's $na{\ddot{i}}ve$ gestures. In this paper, we revisit the state-of-art radio channel based bimodal PIN-entry method and analyze the information leakage from the previous method by exploiting the sight tracking attacks. The proposed sight tracking attack technique significantly reduces the original password complexities by 93.8% after post-processing. To keep the security level strong, we introduce the advanced bimodal PIN-entry technique. The new technique delivers the secret indicator information through a secure radio channel and the smartphone screen only displays the multiple indicator options without corresponding numbers. Afterwards, the users select the target value by following the circular layout. The method completely hides the password and is secure against the advanced shoulder-surfing attacks.

On Power Splitting under User-Fairness for Correlated Superposition Coding NOMA in 5G System

  • Chung, Kyuhyuk
    • International journal of advanced smart convergence
    • /
    • v.9 no.2
    • /
    • pp.68-75
    • /
    • 2020
  • Non-orthogonal multiple access (NOMA) has gained the significant attention in the fifth generation (5G) mobile communication, which enables the advanced smart convergence of the artificial intelligence (AI), the internet of things (IoT), and many of the state-of-the-art technologies. Recently, correlated superposition coding (SC) has been proposed in NOMA, to achieve the near-perfect successive interference cancellation (SIC) bit-error rate (BER) performance for the stronger channel users, and to mitigate the severe BER performance degradation for the weaker channel users. In the correlated SC NOMA scheme, the stronger channel user BER performance is even better than the perfect SIC BER performance, for some range of the power allocation factor. However, such excessively good BER performance is not good for the user-fairness, i.e., the more power to the weaker channel user and the less power to the stronger channel user, because the excessively good BER performance of the stronger channel user results in the worse BER performance of the weaker channel user. Therefore, in this paper, we propose the power splitting to establish the user-fairness between both users. First, we derive a closed-form expression for the power splitting factor. Then it is shown that in terms of BER performance, the user-fairness is established between the two users. In result, the power splitting scheme could be considered in correlated SC NOMA for the user-fairness.

An Inverse Analysis of Two-Dimensional Heat Conduction Problem Using Regular and Modified Conjugate Gradient Method (표준공액구배법과 수정공액구배법을 이용한 2차원 열전도 문제의 역해석)

  • Choi, Eui-Rak;Kim, Woo-Seung
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.22 no.12
    • /
    • pp.1715-1725
    • /
    • 1998
  • A two-dimensional transient inverse heat conduction problem involving the estimation of the unknown location, ($X^*$, $Y^*$), and timewise varying unknown strength, $G({\tau})$, of a line heat source embedded inside a rectangular bar with insulated boundaries has been solved simultaneously. The regular conjugate gradient method, RCGM and the modified conjugate gradient method, MCGM with adjoint equation, are used alternately to estimate the unknown strength $G({\tau})$ of the source term, while the parameter estimation approach is used to estimate the unknown location ($X^*$, $Y^*$) of the line heat source. The alternate use of the regular and the modified conjugate gradient methods alleviates the convergence difficulties encountered at the initial and final times (i.e ${\tau}=0$ and ${\tau}={\tau}_f$), hence stabilizes the computation and fastens the convergence of the solution. In order to examine the effectiveness of this approach under severe test conditions, the unknown strength $G({\tau})$ is chosen in the form of rectangular, triangular and sinusoidal functions.