• Title/Summary/Keyword: Baek seok

Search Result 2,038, Processing Time 0.037 seconds

A Study on Convergence Curriculum Development for Idea Creation (아이디어 창작을 위한 융합 교육 과정 개발에 관한 연구)

  • Jang, Ji-Yeun;Lee, Keun-Ho;Yun, Sung-Hyun
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.571-576
    • /
    • 2014
  • Convergence refers to create a new one by combining the different elements of two or more. Currently convergence has expanded academy, industry and education from the concept of combining heterogeneous inter-technology. The most important key to the convergence in success is to derive ideas for problem solving. However, the idea derivation is done in companies to hire professional people for letting the innovation of corporate planning and new product in most cases. It is hard to get the expected results of convergence's variety. In this research, the creation of the general public for their ideas is main focus on developing a curriculum. Development models are: 1) strengthening the internal capacity for creative thinking, 2) curriculum meets the consumer 3) an understanding of convergence technology 4) creative ideas and planning ability is composed of four concepts. It is expected that convergence man power having the creative idea is trained in case of applying the proposed education model to the convergence education.

A Study on Health Check Solution using Indoor Air Purifier (실내 내장형 공기순환기를 이용한 헬스 체크 솔루션에 관한 연구)

  • Yang, Hee-Tak;Oh, Ji-Su;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.3 no.1
    • /
    • pp.25-31
    • /
    • 2017
  • In the future a future type new city and the latest apartment will be built, and the IoT technology will be constructed and combined in large numbers indoors of ordinary households. An air cleaner that makes people in it comfortable is built in, and the suction port that sucks in the air of the air purifier and the discharge port that discharges it are set up around the room and come out. However, this is impossible to adjust because there is only a central switch on / off. Also, consuming a lot of electricity so that many electricity charges are caused by huge electricity consumption will eventually be a waste of resources. This would like to be adjusted and driven through the fine dust detection device to the room built-in air purifier and that has provided a solution to save electricity. In addition, since it exists in and around the room, you can grasp the position of the person and connect to the home network to enhance the convenience. Also, through analysis of the air, we provide a health-check solution that checks the user's health and adjusts it appropriately.

The Effect of 12 Weeks of Combined Training on Body Composition, Health-Related Physical Fitness, and Bone Mineral Density of Obese and Osteoporotic Intellectual Disabilities-Case study (12주간 복합트레이닝이 비만과 골다공증 지적장애인의 신체조성, 건강체력, 골밀도에 미치는 영향-사례연구)

  • Han, Dong-Ki;Yang, Han-Nah;Seo, Jin-Hee
    • Journal of Digital Convergence
    • /
    • v.16 no.2
    • /
    • pp.375-383
    • /
    • 2018
  • The purpose of this study was to investigate the effect of exercise training on health-related physical fitness and osteoporosis after 12 weeks of combined training for adults with intellectual disabilities diagnosed with obesity and osteoporosis. The subjects conducted a combined training program consisting of aerobic exercise and strength training twice a week for 12 weeks. Body composition and bone mineral density were measured before exercise, 6, 12 weeks, and health-related physical fitness was measured before and after exercise. Body weight and body fat decreased after exercise and bone density increased after exercise compared to before exercise. Muscle strength, muscle endurance and flexibility were improved after exercise compared to before exercise. It was confirmed that the 12 week compound training increased the leg strength and improved the functions such as walking and running, and increased the health-related fitness and increased bone mineral density.

A Scheme for User Authentication using Pupil (눈동자를 이용한 사용자 인증기법)

  • Lee, Jae-Wook;Kang, Bo-Seon;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.325-329
    • /
    • 2016
  • Facial authentication has the limelight because it has less resistance and it is hard to falsify among various biometric identification. The algorithm of facial authentication can bring about huge difference in accuracy and speed by the algorithm construction. Along with face-extracted data by tracing and extracting pupil, the thesis studied algorithm which extracts data to improve error rate and to accurately authenticate face. It detects face by cascade, selects as significant area, divides the facial area into 4 equal parts to save the coordinate of object. Also, to detect pupil from the eye, the binarization is conducted and it detects pupil by Hough conversion. The core coordinate of detected pupil is saved and calculated to conduct facial authentication through data matching. The thesis studied optimized facial authentication algorithm which accurately calculates facial data with pupil trace.

A Study on Countermeasures using Moire Recognition and Vulnerability of Cryptographic Transaction Protocol (암호화폐 거래 프로토콜의 취약점과 무아레 인식을 이용한 대응방안에 관한 연구)

  • Kim, Jin-Woo;Lee, Keun-Ho;Yun, Sunghyun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.1
    • /
    • pp.86-91
    • /
    • 2019
  • Block chains began by recognizing the danger of centralized control of financial systems after the 2008 financial crisis. From the beginning of 2008, blockchain has been developing a lot of attention and technology, starting with a tremendous innovation called cryptographic destruction based on technology, a block chain called Bitcoin. However, the vulnerability has also been discovered over time and the damage has been repeated. But in the fourth industry of the 21st century, many advances and technologies based on them are expected to emerge. Therefore, this paper proposes new analytical transaction protocols for vulnerabilities in cryptographic currency transactions. The proposed transaction protocol is a way to authenticate once again at the end of the transaction and the transaction is concluded with this authentication. It presents countermeasures by adding security elements between users to the transaction process rather than internal security to transaction vulnerabilities.

A Scheme for DID and EMR Integrated System based on Hyperledger Indy (Hyperledger Indy 기반의 DID와 EMR 통합 시스템 기법)

  • Jiyong Yang;Hyosang Eom;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.1
    • /
    • pp.47-52
    • /
    • 2024
  • The efficiency and quality of healthcare services rely heavily on the secure protection and transparent management of individuals' medical information, which is becoming increasingly important in the digital age. To address this issue, we propose a distributed identity management (DID) and electronic medical record (EMR) integration system based on Hyperledger Indy, which aims to ensure the ownership of medical information to individuals and increase the accessibility and utilization of medical information. The system will allow individuals to manage their own medical information and share it transparently when necessary, which will improve the efficiency of healthcare services. In addition, the system will securely protect and transparently manage medical information, increasing the transparency of medical services and strengthening individuals' control over their medical information. Thus, the system will contribute significantly to improving the quality of medical services, protecting individuals' medical information, and improving the efficiency of medical services.