• Title/Summary/Keyword: 개인추적

Search Result 387, Processing Time 0.03 seconds

Neurobehavioral Change on the Lead Exposure Workers (연 폭로근로자의 신경행동학적 변화)

  • Park, In-Geun;Lee, Duk-Hee;Lee, Yong-Hwan;Kim, Jin-Ha;Jang, She-Han
    • Journal of Preventive Medicine and Public Health
    • /
    • v.28 no.1 s.49
    • /
    • pp.175-185
    • /
    • 1995
  • To evaluate the neurobehavioral effects of blood lead, we performed NCTB (Neurobehavioral Core Test Battery) on 59 men who were exposed to lead occupationally. Performance on the tests was studied in relation to three ranges of blood lead $(low,\;0. Workers with high and medium blood lead concentrations showed poorer performances on digit span backward, digit symbol and Benton Visual Retention. After adjustment for age and education, high and medium group showed significantly impaired performance on Benton visual retention and slightly impaired performance on digit span backward. But it showed no different performance on tests between high and medium blood lead group.

  • PDF

Impacts and Tasks of Teacher Education Programs Revealed by Preservice Teachers: Students' Intact Beliefs (예비교사들을 통해 알아본 교사양성 프로그램의 효과 및 과제: 학생들의 변하지 않는 신념들)

  • Kwak, Young-Sun
    • Journal of the Korean earth science society
    • /
    • v.23 no.4
    • /
    • pp.309-323
    • /
    • 2002
  • This qualitative study investigated preservice teachers' understandings of the ontology and epistemology underlying constructivist notions of learning through four in-depth interviews. Of the sixteen participants in a larger study, five significantly changed ontological and epistemological beliefs and eleven did not. This study focused on these eleven teachers who have hardly changed their philosophical beliefs throughout the teacher education program. Ten teachers who consistently maintained the scientific realist beliefs were presented as a composite case (Young's case). Among the eleven teachers, there was one outlier who had consistently maintained an idealist and relativist epistemological position from the beginning of the study and was subjected to another case analysis (Ben's case). These cases corroborated the assertion that each individual's deeply entrenched ontological and epistemological beliefs are very hard to change. For researchers, this study offers insights into the reasons that preservice teachers give for non-changes in their thinking about learning to teach. The study also examines preservice teachers' perceived constraints in implementing their ideal pedagogies and the influence of the teacher education program on their pedagogical beliefs changes. The benefits and influences of the M.Ed. program's theoretical coursework and the field experiences on these teachers' learning-to-teach experiences are addressed with rich data. The implications for teacher educators as well as for the instructional practices of preservice teacher education programs are discussed. This research emphasize necessity of the field-based teacher education program and the need of empowering experienced school teachers as teacher educators in teacher preparation and professional development.

An Automatic Access Registration System using Beacon and Deep Learning Technology (비콘과 딥러닝 기술을 활용한 전자출입명부 자동등록시스템)

  • Huh, Ji-Won;Ohm, Seong-Yong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.807-812
    • /
    • 2020
  • In order to prevent the national wide spread of the COVID-19 virus, the government enforces to use an electronic access registration system for public facilities to effectively track and manage the spread. Initially, there was a lot of hassle to write a directory, but recently a system for creating an electronic access list using QR codes, what is called KI-Pass, is mainly used. However, the procedure for generating a QR code is somewhat cumbersome. In this paper, we propose a new electronic access registration system that does not require QR code. This system effectively controls the suspicious visitor by using a mask wearing discriminator which has been implemented using deep learning technology, and a non-contact thermometer package. In addition, by linking the beacon, a short-range wireless communication technology, and the visitor's smartphone application, basic information of the facility visitor is automatically registered to KDCA through the server. On the other hand, the user access information registered in the server is encrypted and stored, and is automatically destroyed after up to 4 weeks. This system is expected to be very effective in preventing the spread of other new infectious diseases as well as responding to the coronavirus which is recording a high spread worldwide.

Secure and Efficient Protocol for Vehicular Communication with Privacy Preservation (프라이버시를 보호하며 안전하고 효율적인 차량간 통신 프로토콜)

  • Kim, In-Hwan;Choi, Hyoung-Kee;Kim, Jung-Yoon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.6
    • /
    • pp.420-430
    • /
    • 2010
  • Due to increasing demand for improving road safety and optimizing road traffic, Vehicular Ad-Hoc Networks (VANET) have been subject to extensive attentions from all aspects of commercial industry and academic community. Security and user privacy are fundamental issues for all possible promising applications in VANET. Most of the existing security proposals for secure VANET concentrate authentication with privacy preservation in vehicle-to-vehicle (V2V) and vehicle-to-roadside infrastructure (V2I) communications and require huge storage and network capacity for management of revocation list. Motivated by the fact, we propose a new scheme with security and privacy preservation which combines V2V and V2I communication. With our proposed scheme, the communication and computational delay for authentication and overhead for management of revocation list can be significantly reduced due to mutual authentication between a vehicle and a Roadside Unit (RSU) requires only two messages, and the RSU issues the anonymous certificate for the vehicle on behalf of the Trust Authority (TA). We demonstrate that the proposed protocol cannot only guarantee the requirements of security and privacy but can also provide efficiency of authentication and management of revocation list.

Exploring Science Teacher Agency at the Age of the New Normal after the COVID-19 Pandemic: The Case of Second Year of Distance Learning Practice (코로나 뉴노멀 시대의 과학교사 행위주체성 탐색 -COVID-19에 따른 원격 수업 2년 차 실행 사례를 중심으로-)

  • Lee, Hyekeoung;Kim, Heui-Baik
    • Journal of The Korean Association For Science Education
    • /
    • v.41 no.5
    • /
    • pp.415-428
    • /
    • 2021
  • The COVID-19 pandemic has changed everything, even education. Last year when distance learning was introduced, science teachers faced many challenges to overcome. However, teachers adapted quickly, and in this year, it became the 'new normal'. In this situation, teachers are likely to habitually repeat past practices, but the context of the second year of distance learning is changing constantly, and teachers are asked to interpret the problem occurring in a situation and to adjust their practice for solving the problem with their teacher agency. In this study, we explore the emergence of science teacher agency and factors shaping teacher agency in the second year of distance learning and we focus on teachers' agentic practice that did not follow their past practice without reflection. For this purpose, we mainly analyze the semi-constructed interview of three science teachers. In the first year of distance learning, two teachers maintained their practice, not much different to face-to-face learning. However, one teacher reflected upon herself and started to recognize and solve her problems. Reflection for her practice can support this process. Another teacher changed her practice due to external suggestions, but it evolved her practice to fit the situation better, and her experience of last year helped her to adapt to the change. The other teacher who modified her practice to persist her professional purpose last year was consistently practicing in the second year and collaboration and autonomy can support her. This study shows the teachers' dynamic change of agency and the emergence for the relational interaction between teacher and context.

Analysis of the Engagement Effects of DIRCM against a Man Portable Air Defense System (휴대용대공유도탄에 대응하는 지향성적외선방해장비의 교전효과 분석)

  • Jeong, Chunsik
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.139-147
    • /
    • 2019
  • A MANPADS(Man Portable Air Defense System), which tracks infrared energy, is light enough for individuals to carry and can against to a variety of aircraft, making it widely deployed around the world, posing a major threat to aircraft. A flare has been developed as an IRCM(Infrared Countermeasures) that protects the life of friendly aircraft and combatants by deceiving such guided missiles. However, DIRCM, which can overcome the problems of existing IRCM, is being developed mainly in some developed countries, and the need for it has been increasing gradually. This paper modeled first generation IR seeker of AM modulation method, the second generation IR seeker of FM modulation method, and the third generation IR seeker of pulse modulation method among various MANPADS, and modeled the scattering light phenomenon in the seeker when laser beams are investigated in DIRCM. Using this, jamming simulations were performed in various engagement environments of the MANPADS and aircraft equipped with DIRCM, and the miss distance of the guided missiles and aircraft were analyzed. Simulation results show that DIRCM, which irradiates a modulated laser beam with one jamming code, deceives both first, second and third generation MANPADS at 1km and 2km of engagement distance. In particular, the survival rate of aircraft equipped with DIRCM increased when the distance of engagement increased from 1km to 2km, and the survival rate was at least 99% at 2km of engagement distance.

Leibniz and ginseng (라이프니츠와 인삼)

  • Sul, Heasim
    • Journal of Ginseng Culture
    • /
    • v.1
    • /
    • pp.28-42
    • /
    • 2019
  • What is unknown about Leibniz (Gottfried Wilhelm Leibniz, 1646~1716), a great philosopher and mathematician, is that he inquired about ginseng. Why Leibniz, one of the leading figures of the Enlightenment, became interested in ginseng? This paper excavates Leibniz's references on ginseng in his vast amount of correspondences and traces the path of his personal life and cultural context where the question about ginseng arose. From the sixteenth century, Europe saw a notable growth of medical botany, due to the rediscovery of such Greek-texts as Materia Medica and the introduction of a variety of new plants from the New World. In the same context, ginseng, the renowned panacea of the Old World began to appear in a number of European travelogues. As an important part of mercantilistic projects, major scientific academies in Europe embarked on the researches of valuable foreign plants including ginseng. Leibniz visited such scientific academies as the Royal Society in London and $Acad{\acute{e}}mie$ royale des sciences in Paris, and envisioned to establish such scientific society in Germany. When Leibniz visited Rome, he began to form a close relationship with Jesuit missionaries. That opportunity amplified his intellectual curiosity about China and China's famous medicine, ginseng. He inquired about the properties of ginseng to Grimaldi and Bouvet who were the main figures in Jesuit China mission. This article demonstrates ginseng, the unnoticed subject in the Enlightenment, could be an important clue that interweaves the academic landscape, the interactions among the intellectuals, and the mercantilistic expansion of Europe in the late 17th century.

The Life and Art Collection Activities of Modern Korean Painter and Calligrapher Yi Byeong-jik (근대의 서화가 송은(松隱) 이병직(李秉直)의 생애와 수장활동)

  • Kim, Sang-Yeob
    • (The)Study of the Eastern Classic
    • /
    • no.41
    • /
    • pp.477-516
    • /
    • 2010
  • The Korean art history academia has lately been carrying out active research on the Korean art market and art collectors. This area of research is significant in that it attempts to overcome the limitations of previous research trends focused on tracing back and analyzing preeminent masters, their schools and their influence, and approach new subject matters such as art and society, circulation and consumption of art works, which were unapproachable with previous research methods. This paper examines the life, artwork and art collection activities of Songeun(松隱) Yi Byeong-jik(李秉直: 1896-1973), an outstanding painter, calligrapher and art collector during the Japanese colonial period. The primary purpose of this paper is to advance the research project the author has recently initiated on modern Korean art collectors by reconstructing parts of this major art collector's individual lifestyle and to generally identify the art collection activities and the art works that he kept. Yi Byeong-jik, one of the preeminent art collectors during the colonial period, disposed his voluminous collection through two auctions in 1937 and 1941, and then held another auction two weeks before the onset of the Korean War on June 25, 1950 to sell off the remaining works. It seems that the reason why Yi had auctioned off his collections was for the purpose of investing in education. The tale that Yi safely kept 'Sam-guk-yu-sa(三國遺事),' which is considered a national treasure, even through the time of turbulence is evidence of his exemplary behavior as a model art collector. He may be one of the best examples of what an art collector should be in terms of giving back to the society and preserving things of beauty and value. However, one factor that limited and defined Yi's life was that he was a eunuch. This aspect of his life could be pointed out as the biggest factor that stopped him from becoming a mainstream participant in the art world despite his influence as a great painter, calligrapher, significant art collector, and discerning connoisseur.

A Study on Cell-Broadcasting Based Security Authentication System and Business Models (셀 브로드캐스팅 보안 인증시스템 및 비즈니스 모델에 관한 연구)

  • Choi, Jeong-Moon;Lee, Jungwoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.325-333
    • /
    • 2021
  • With the rapidly changing era of the fourth industrial revolution, the utilization of IT technology is increasing. In addition, the demand for security authentication is increasing as shared services or IoT technologies are being developed as new business models. Security authentication is becoming increasingly important for all intelligent devices such as self-driving cars. However, most location-based security authentication technologies are being developed mainly with technologies that utilize server proximity or satellite location tracking, which limits the scope of their physical use. Location-based security authentication technology has recently been developed as a complementary replacement technology. In this study, we introduce location-based security authentication technology using cell broadcasting technology, which has a wider range of applications and is more convenient and business-friendly than existing location-based security authentication technologies. We also introduced application cases and business models related to this. In addition to the current status of technology development, we analyzed current changes in business models being employed. Based on our analysis results, this study draws the implication that technology diversification is necessary to improve the performance of innovative technologies. It is meaningful that it has found and studied advanced technologies other than existing location authentication methods and systems.

Real-Time GPU Task Monitoring and Node List Management Techniques for Container Deployment in a Cluster-Based Container Environment (클러스터 기반 컨테이너 환경에서 실시간 GPU 작업 모니터링 및 컨테이너 배치를 위한 노드 리스트 관리기법)

  • Jihun, Kang;Joon-Min, Gil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.11
    • /
    • pp.381-394
    • /
    • 2022
  • Recently, due to the personalization and customization of data, Internet-based services have increased requirements for real-time processing, such as real-time AI inference and data analysis, which must be handled immediately according to the user's situation or requirement. Real-time tasks have a set deadline from the start of each task to the return of the results, and the guarantee of the deadline is directly linked to the quality of the services. However, traditional container systems are limited in operating real-time tasks because they do not provide the ability to allocate and manage deadlines for tasks executed in containers. In addition, tasks such as AI inference and data analysis basically utilize graphical processing units (GPU), which typically have performance impacts on each other because performance isolation is not provided between containers. And the resource usage of the node alone cannot determine the deadline guarantee rate of each container or whether to deploy a new real-time container. In this paper, we propose a monitoring technique for tracking and managing the execution status of deadlines and real-time GPU tasks in containers to support real-time processing of GPU tasks running on containers, and a node list management technique for container placement on appropriate nodes to ensure deadlines. Furthermore, we demonstrate from experiments that the proposed technique has a very small impact on the system.