• Title/Summary/Keyword: 최면

Search Result 245, Processing Time 0.03 seconds

Fault Section Detection Scheme in Ungrounded Distribution System (비접지 배전계통에서 고장구간 검출 및 복구 알고리즘)

  • Yu, Fei;Choi, Myeon-Song;Lee, Seung-Jae
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.487-488
    • /
    • 2007
  • Fault section detection and service restoration is very important in ungrounded distribution system. Techniques currently used to track down faults are time consuming and cumbersome. A new scheme is developed based on communication technology, and the simulation result shows that the method can satisfy the requirement proposed.

  • PDF

A Improvement Strategy for Bellow Spining Defection Using Six Sigma (6 시그마를 사용한 Bellow Spining 불량 개선 전략)

  • Choi, Myun-Chung;Hong, Jea-Bok;Hwang, In-Keuk
    • Proceedings of the KAIS Fall Conference
    • /
    • 2008.05a
    • /
    • pp.358-360
    • /
    • 2008
  • 이 논문에서는 벨로우 스피닝 불량율 감소하기 위해 6 시그마 방법을 이용하여 전개하면서 Improve 단계에서 일반적으로 많이 사용하는 요인분석에 의한 배치방법을 대신 다꾸지 방법을 통한 실험계획법을 적용함으로 불량을 감소시키는 방법을 사용하였다.

  • PDF

Metamorphosis (<미적 감각자극 생성 시스템> 새로운 출발)

  • Choi, Moon-Chan;Lee, Jun-Haeng;Kim, Hyung-Gi;Paik, Joon-Ki
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02b
    • /
    • pp.468-473
    • /
    • 2006
  • 본 논문은 인간의 마음을 움직이는 감각자극과 그것을 생성해 내는 시스템 구현에 관한 연구이다. 마음을 움직이거나, 어떤 행동을 유발하는 정신작용의 과정에 관여하는 요소들을 밝히고, 그 구조와 효과 등을 알아내는 일이 중요하며, 이러한 연구의 성과물들은 정신작용에 관여하는 요소들을 조작, 변수처리 하여 의도적인 정신작용 감각자극을 만들어 낼 수 있는 시스템 구현을 가능하게 할 수 있다. 인간은 감각자극으로 인지된 정보를 자신의 정신적인 필터를 통해 개념화하게 되는데, 이 시스템은 의식에 직접 관여하거나, 우회하는 감각자극에 대한 것들을 제공 할 수 있도록 인간의 개념화의 과정을 의식하여 시스템의 구조를 구현 했다. 인간의 기억데이터와 비슷하다 할 수 있는 구조적 위치의 소스데이터가 있다. 그리고 이것을 현실의 시공간에서 얻어지는 미적 행위와 자극의 반복을 통해 얻어진 결과로 만들어 내거나, 이러한 미적 결과물을 유저는 커뮤니케이션의 도구로 사용할 수 있다. 이와 같은 것의 시작으로, 우리의 삶 깊숙이 침투해 있는 미디어의 감각자극들을 수동적으로 수용하는 것이 아니라 능동적으로 생산해 내는 것이다. 이런 행위는 자신을 가꾸고 만드는 자기최면적인 도구나, 대상을 갖는 커뮤니케이션의 도구를 만들어내는 연구가 될 수 있다. 자신이 필요로 하는 정신적 바탕을 스스로 만들어가는 도구로써, 자신의 메시지를 대상에게 감동을 통해 전달하는 도구로써, 그 역할을 운운하기에는 시기상조인 감이 있다. 하지만 이 시스템은 이러한 비전을 가지고 개발과 발전을 거듭해 인공감성지능 감각자극 생성과 커뮤니케이션 시스템으로 성장 할 것이다.

  • PDF

Factor Structure on the Korean Version of Tellegen Absorption Scale (한국판 텔레겐몰입척도의 요인구조)

  • Lee, Jun-Seok;Lee, Jang-Han;Kim, Bo-Ra;Sim, Jong-Onn
    • Korean Journal of Psychosomatic Medicine
    • /
    • v.15 no.2
    • /
    • pp.88-92
    • /
    • 2007
  • Objective : Tellegen Absorption Scale(TAS) is an instrument intended to assess hypnotizability and designed to sample absorbing and self-altering experiences, including dissociative experiences. The present study attempted to identify the internal structure of TAS. Methods : One hundred and thirty nine undergraduates completed the Korean version of Tellegen Absorption Scale(TAS-K). Cronbach's alpha was calculated and factor analyses were done. Results : An exploratory principal-components analysis yielded three factors accounting for 31.06% of variance. Factor 1 included dissociative(dissociation-like) experiences, factor 2 tapped imaginative involvements, and factor 3 had to do with perceptual sensitivity. Conclusion : TAS-K may include absorbing and self-altering experiences.

  • PDF

Adorno's critique of the possibility of fascist violence in popular movements (대중운동의 파시즘적인 폭력의 가능성과 그에 대한 아도르노의 비판)

  • Kim, Jin-ae
    • Journal of Korean Philosophical Society
    • /
    • v.144
    • /
    • pp.141-166
    • /
    • 2017
  • Adorno's most important criticism in popular movement is the identity of revolutionary leaders and followers. The identification process has three characteristics. The first characteristic is to create a sense of solidarity within the group by creating an image more real than the antagonist and ensuring the distinction between the enemy and the comrades. Individual entities that resist the mass created by the sense of solidarity disappear, and only the subject identified with the group exists. The second characteristic is to present an optimistic utopia, which makes the public believe that salvation comes from transcendent values. This mass movement also leads to criticism of other groups or people who are deemed off-limits to their own solidarity. The third characteristic is that the public, whose individual subject disappears through the narcissism-based public hypnotic state, is identified with the conductors, and forces other subjects to hypnotize themselves. The purpose of this paper is to examine how Adorno criticizes the fascist violence of mass movements and analyze what this suggests about the task of mass movements.

A Case of Hypnotherapy with Terminal Pediatric Cancer Patient (말기 소아 암 환자의 최면치료 1예)

  • Choi, Hwee-Young;Wang, Soon;Lee, Soo-Yong;Kim, Hoo-Nam
    • Journal of Hospice and Palliative Care
    • /
    • v.3 no.2
    • /
    • pp.152-155
    • /
    • 2000
  • The authors reported a case of terminal pediatric cancer patient. The patient was ten-year-old girl, and she was diagnosed as osteosarcoma with multiple metastasis to lung and bones. She was markedly depressed and had severe bone and chest pain. The patient was treated with hypnotherapy once or twice a week for two months. There was marked improvement in pain control and emotional reactions, and the hospice team could establish good rapport with her. Hypnotherapy would be one of the effective treatment modalities in assisting patients.

  • PDF

Case Reports of Periodontal Treatment Under Hypnoanesthesia (최면마취하의 치주처치 증례보고)

  • Kim, Jong-Eun;Kim, Young-Chul;Lee, Chung-Ho
    • The Journal of the Korean dental association
    • /
    • v.11 no.10
    • /
    • pp.667-670
    • /
    • 1973
  • It has been studied over 500 cases of hypnotic susceptibility test and among them performed 15 cases of periodontal treatment under hypnoanesthesia. Conclusions were obtaines as following ; 1) The patients with chronic periodontal disease were surrendered more easily to the operator than those with acute periodontal disease. 2) bleeding was occurred much more than in drug anesthetic state and less in waking state. 3) The different depth of hypnotic state was needed to the different individual. 4) The post-operative pain did not occurred by the operators suggestion. 5. Those operation brought more rapid healing of wounds.

  • PDF

A Study on Relationship between Sasang Constitutions and Hypnotizability (사상체질(四象體質)과 최면반응성(催眠反應性)에 관(關)한 연구(硏究))

  • Park, Hee-Gwan;Lee, Jong-Hwa;Lee, Nung-Gee;Park, Won-Bong
    • Journal of Sasang Constitutional Medicine
    • /
    • v.9 no.2
    • /
    • pp.175-185
    • /
    • 1997
  • Authors tried to investigate the relationship between sasang constitutions and hypnotizability in this study for the first time. HGSHS-K(Harvard Group Scale of Hypnotic Susceptibility-Korean Version) were administered to 121 male soldiers(21.8 65yr) in the army. And then 63 of them completed QSCC II(Questionnaire for the Sasang Constitution Classification II). The results were as follows ; 1) The mean score of HGSHS-K was 7.39 1.77. 2) There were 32 high hypnotizable subjects(HGSHS-K score 8), and 29 low hypnotizable subjects(HGSHS-K score 7). 3) There were 22 So-Yang, 19 So-Eum, 22 Tae-Eum, no Tae-Yang subjects according to classification of QSCC II 4) There were no statistically significant differences in hypnotizability between So-Yang, So-Eum, and Tae-Eum groups(p=0.549).

  • PDF

Applying Security Algorithms using Authentication Against Cyber Attacks in DAS Communication Network (배전자동화 시스템 통신망에 대한 사이버 공격에 대해 인증의 기법을 이용한 보안 알고리즘 적용방안)

  • Lim, Il-Hyung;Choi, Myeon-Song;Lee, Seung-Jae;Lim, Seong-Il;Lee, Sung-Woo;Ha, Bok-Nam;Hong, Sug-Won
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.3
    • /
    • pp.327-335
    • /
    • 2008
  • As communication is becoming increasingly prevalent and especially communication architecture is more relying on the open standard communication protocols, the security issues become major concerns. In this paper we consider possible cyber attacks in the applications based on the current distribution communication architecture, and then derive the security goals. Next we propose how the security algorithms can be adapted to achieve these security goals. We intend to adapt the most efficient ways of secure message exchange, taking the resource-constrained FRTUs into account Finally we show some experiments to validate the protocols.

A Study on the Effect of Load Variations in a Line to Ground Fault Location Algorithm Using Iterative Method for Distribution Power Systems (반복계산법을 사용한 배전계통 1선지락사고 고장거리 계산 알고리즘에서 부하변동의 영향 고찰)

  • 최면송;이승재;현승호;진보건;이덕수
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.52 no.7
    • /
    • pp.355-362
    • /
    • 2003
  • The fault analysis problem of a distribution network has many difficulties comes from the unbalance of loads or networks and the lacks of load information. The unbalance of loads or networks make the fault location difficult when it use the classical sequence transformation. Moreover the amount of load in the distribution networks fluctuates with time. This paper introduces a recent fault location algorithm using iterative method which handle the unbalance of the problem. But, the fault location errors comes from the load fluctuations still left. For the real application of the new fault location algorithm in distribution networks, this paper studied the effect of the load fluctuations in the algorithm.