• Title/Summary/Keyword: Cell Phone

Search Result 310, Processing Time 0.024 seconds

The effects of SNS use and the individual differences on the social connectedness (개인 성향에 따른 SNS 이용과 사회적 연결 효과)

  • Lee, Youngwon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.3
    • /
    • pp.215-227
    • /
    • 2019
  • This study empirically explores the effects of SNS use and the individual differences as the self-esteem on the social connectedness. The study results show that the higher self-esteem, the more use the Instagram and the Kakao Talk, which implies that the individual who has the more pro-social propensity uses the more diverse SNS. In contrast, the twitter shows the opposite pattern compared to the Instagram and Kakao Talk in terms of the SNS use according to the degree of the self-esteem. It also shows that women use the more SNS and the cell phone compared to the men do, whereas men use the more Internet than women do. The study results show that the more SNS use and the higher self-esteem, the higher social connectedness. Among the diverse SNS, only the Instagram shows the statistically positive effect on the social connectedness, which implies that the more the Instagram use, the more active in off-line social meetings.

Possible Effects of Radiofrequency Electromagnetic Field Exposure on Central Nerve System

  • Kim, Ju Hwan;Lee, Jin-Koo;Kim, Hyung-Gun;Kim, Kyu-Bong;Kim, Hak Rim
    • Biomolecules & Therapeutics
    • /
    • v.27 no.3
    • /
    • pp.265-275
    • /
    • 2019
  • Technological advances of mankind, through the development of electrical and communication technologies, have resulted in the exposure to artificial electromagnetic fields (EMF). Technological growth is expected to continue; as such, the amount of EMF exposure will continue to increase steadily. In particular, the use-time of smart phones, that have become a necessity for modern people, is steadily increasing. Social concerns and interest in the impact on the cranial nervous system are increased when considering the area where the mobile phone is used. However, before discussing possible effects of radiofrequency-electromagnetic field (RF-EMF) on the human body, several factors must be investigated about the influence of EMFs at the level of research using in vitro or animal models. Scientific studies on the mechanism of biological effects are also required. It has been found that RF-EMF can induce changes in central nervous system nerve cells, including neuronal cell apoptosis, changes in the function of the nerve myelin and ion channels; furthermore, RF-EMF act as a stress source in living creatures. The possible biological effects of RF-EMF exposure have not yet been proven, and there are insufficient data on biological hazards to provide a clear answer to possible health risks. Therefore, it is necessary to study the biological response to RF-EMF in consideration of the comprehensive exposure with regard to the use of various devices by individuals. In this review, we summarize the possible biological effects of RF-EMF exposure.

A Study on Relationship between Media Environment and Adolescent Cyber-Delinquency : Focused on X-rated Media Commitment (매체환경과 청소년 사이버비행과의 관계에 대한 연구 : 성인매체몰입을 중심으로)

  • Lee, Chang-Moon;Moon, Jin-Young;Park, Ju-Won
    • Journal of Digital Convergence
    • /
    • v.17 no.4
    • /
    • pp.365-379
    • /
    • 2019
  • The purpose of this study is to investigate what factors affect cyber-delinquency after examining the previous research focusing on the general strain theory and the delinquency opportunity theory in the existing studies. And as adolescents move from middle school to high school, this study is intended to analyze what factors affect cyber-delinquency from a longitudinal perspective using KCYPS(Korea Child and Youth Panel Survey) elementary 4th grade fourth and seventh data. The adolescence cyber-delinquency probability of occurrence were analyzed through the panel logit fixed-effect model using STATA. And then the cyber-delinquency frequency of adolescents were analyzed through the panel tobit random-effect model. As a result of analyzing the factors affecting cyber-delinquency frequency, Adult media commitment, computer use time, and cell phone dependency increased cyber-delinquency frequency. On the other hand, among the parenting attitudes, the attitude of supervising attentively and adolescents' age-increasing decreased cyber-delinquency frequency.

Strawberry disease diagnosis service using EfficientNet (EfficientNet 활용한 딸기 병해 진단 서비스)

  • Lee, Chang Jun;Kim, Jin Seong;Park, Jun;Kim, Jun Yeong;Park, Sung Wook;Jung, Se Hoon;Sim, Chun Bo
    • Smart Media Journal
    • /
    • v.11 no.5
    • /
    • pp.26-37
    • /
    • 2022
  • In this paper, images are automatically acquired to control the initial disease of strawberries among facility cultivation crops, and disease analysis is performed using the EfficientNet model to inform farmers of disease status, and disease diagnosis service is proposed by experts. It is possible to obtain an image of the strawberry growth stage and quickly receive expert feedback after transmitting the disease diagnosis analysis results to farmers applications using the learned EfficientNet model. As a data set, farmers who are actually operating facility cultivation were recruited and images were acquired using the system, and the problem of lack of data was solved by using the draft image taken with a cell phone. Experimental results show that the accuracy of EfficientNet B0 to B7 is similar, so we adopt B0 with the fastest inference speed. For performance improvement, Fine-tuning was performed using a pre-trained model with ImageNet, and rapid performance improvement was confirmed from 100 Epoch. The proposed service is expected to increase production by quickly detecting initial diseases.

The Trends and Prospects of Mobile Forensics Using Linear Regression

  • Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.10
    • /
    • pp.115-121
    • /
    • 2022
  • In this paper, we analyze trends in the use of mobile forensic technology, focusing on cases where mobile forensics are used, and we predict the development of future mobile forensics technology using linear regression used in future prediction models. For the current status and outlook analysis, we extracted a total of 8 variables by analyzing 1,397 domestic and foreign mobile forensics-related cases and newspaper articles. We analyzed the prospects for each variable using the year of occurrence as an independent variable, seven variables such as text (text message usage information), communication information (cell phone communication information), Internet usage information, messenger usage information, stored files, GPS, and others as dependent variables. As a result of the analysis, among various aspects of the use of mobile devices, the use of Internet usage information, messenger usage information, and data stored in mobile devices is expected to increase. Therefore, it is expected that continuous research on technologies that can effectively extract and analyze characteristic information of mobile devices such as file systems, the Internet, and messengers will be needed As mobile devices increase performance and utilization in the future and security technology.

KCYP data analysis using Bayesian multivariate linear model (베이지안 다변량 선형 모형을 이용한 청소년 패널 데이터 분석)

  • Insun, Lee;Keunbaik, Lee
    • The Korean Journal of Applied Statistics
    • /
    • v.35 no.6
    • /
    • pp.703-724
    • /
    • 2022
  • Although longitudinal studies mainly produce multivariate longitudinal data, most of existing statistical models analyze univariate longitudinal data and there is a limitation to explain complex correlations properly. Therefore, this paper describes various methods of modeling the covariance matrix to explain the complex correlations. Among them, modified Cholesky decomposition, modified Cholesky block decomposition, and hypersphere decomposition are reviewed. In this paper, we review these methods and analyze Korean children and youth panel (KCYP) data are analyzed using the Bayesian method. The KCYP data are multivariate longitudinal data that have response variables: School adaptation, academic achievement, and dependence on mobile phones. Assuming that the correlation structure and the innovation standard deviation structure are different, several models are compared. For the most suitable model, all explanatory variables are significant for school adaptation, and academic achievement and only household income appears as insignificant variables when cell phone dependence is a response variable.

A Distribution Key Management Protocol for improving Security of Inner Attack in WiMAX Environment (WiMAX 환경에서 내부 공격의 안전성을 향상시킨 분산 키 관리 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.1
    • /
    • pp.107-115
    • /
    • 2009
  • The cryptological key which is used in WiMAX environment is used at regular intervals by mobile nodes (laptop computer, PDA, cell-phone) which is in the range of base station coverage. But it is very weak at local attack like man-in-the-middle when the mobile node is off the range of base station or enters into the range to communicate with base station because the communication section is activated wirelessly. This paper proposes a distribution key building protocol which can reuse security key used by nodes to reduce cryptological security attack danger and communication overhead which occurs when mobile node tries to communicate with base station. The proposed distribution key establishing protocol can reduce overhead which occurs between base station and mobile node through key reusing which occurs during the communication process and also, makes security better than IEEE 802.16 standard by creating shared key which is required for inter-certification through the random number which node itself creates.

Mobile Ultra-Broadband, Super Internet-of-Things and Artificial Intelligence for 6G Visions

  • Hamza Ali Alshawabkeh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.235-245
    • /
    • 2023
  • Smart applications based on the Network of Everything also known as Internet of Everything (IoE) are increasing popularity as network connectivity requires rise further. As a result, there will be a greater need for developing 6G technologies for wireless communications in order to overcome the primary limitations of visible 5G networks. Furthermore, implementing neural networks into 6G will bring remedies for the most complex optimizing networks challenges. Future 6G mobile phone networks must handle huge applications that require data and an increasing amount of users. With a ten-year time skyline from thought to the real world, it is presently time for pondering what 6th era (6G) remote correspondence will be just before 5G application. In this article, we talk about 6G dreams to clear the street for the headway of 6G and then some. We start with the conversation of imaginative 5G organizations and afterward underline the need of exploring 6G. Treating proceeding and impending remote organization improvement in a serious way, we expect 6G to contain three critical components: cell phones super broadband, very The Web of Things (or IoT and falsely clever (artificial intelligence). The 6G project is currently in its early phases, and people everywhere must envision and come up with its conceptualization, realization, implementation, and use cases. To that aim, this article presents an environment for Presented Distributed Artificial Intelligence as-a-Services (DAIaaS) supplying in IoE and 6G applications. The case histories and the DAIaaS architecture have been evaluated in terms of from end to end latency and bandwidth consumption, use of energy, and cost savings, with suggestion to improve efficiency.

Characteristics of User's Behavior across Generations for space planing in General Hospital (종합병원 환경계획을 위한 세대별 종합병원 이용행태 특성분석)

  • Park, Hey Kyung;Oh, Ji Young
    • Korea Science and Art Forum
    • /
    • v.28
    • /
    • pp.105-116
    • /
    • 2017
  • This study is a basic research to suggest user-centered general hospital environmental design guidelines, which aims to analyze user's behavior characteristics across generation in general hospital. For this purpose, this study constructed an analysis tool through the literature review with regard to generation and behavior characteristics in general hospital. Besides, an online survey regarding user's behavior in general hospital was conducted targeting from 20s to 60s, 300 persons for each group, total 1,500 persons for about 3 weeks since September 1, 2016. The results of this study are as follows: (1) Based on the generation, there were significant differences in relevant categories of their visiting frequency, visiting purpose, visiting hour, transportation, companion, behavior during the wait and selection of a general hospital. (2) In all generation, they responded that they have visited once or twice per year. People in 20s and 30s responded that their visit for the hospital is to receive specific treatment, while other people in 40s, 50s and 60s visit the hospital majorly for routine check-ups. Therefore, it is imperative for a health check-up center to design an environmental plan that reflects the characteristics of elders in 40s, 50s and 60s. (3) People in 40s, 50s and 60s usually visit a general hospital in the mornings of weekdays, while generations in 20s and 30s responded that they mostly visit the hospital in the mornings of weekend. (4) When they visit a general hospital, people in their 20s are usually using public transportations, while people in their 30s to 60s are using their own vehicle. (5) People in their 20s majorly visited 'lobby'. In older generations, they tend to visit 'outpatient clinic'. Therefore, it is necessary to build an outpatient clinic environment that considers the elderly. (6) Patients majorly responded that they are using their cell phone, while waiting for their clinic call. In elder generations, they responded that they are more likely watching TVs, reading books/magazines or doing nothing. Therefore, it is essential to provide cell-phone related services and environmental supports. Visually attractive media can be utilized for this purpose.

Composition of Foreground and Background Images using Optical Flow and Weighted Border Blending (옵티컬 플로우와 가중치 경계 블렌딩을 이용한 전경 및 배경 이미지의 합성)

  • Gebreyohannes, Dawit;Choi, Jung-Ju
    • Journal of the Korea Computer Graphics Society
    • /
    • v.20 no.3
    • /
    • pp.1-8
    • /
    • 2014
  • We propose a method to compose a foreground object into a background image, where the foreground object is a part (or a region) of an image taken by a front-facing camera and the background image is a whole image taken by a back-facing camera in a smart phone at the same time. Recent high-end cell-phones have two cameras and provide users with preview video before taking photos. We extract the foreground object that is moving along with the front-facing camera using the optical flow during the preview. We compose the extracted foreground object into a background image using a simple image composition technique. For better-looking result in the composed image, we apply a border smoothing technique using a weighted-border mask to blend transparency from background to foreground. Since constructing and grouping pixel-level dense optical flow are quite slow even in high-end cell-phones, we compute a mask to extract the foreground object in low-resolution image, which reduces the computational cost greatly. Experimental result shows the effectiveness of our extraction and composition techniques, with much less computational time in extracting the foreground object and better composition quality compared with Poisson image editing technique which is widely used in image composition. The proposed method can improve limitedly the color bleeding artifacts observed in Poisson image editing using weighted-border blending.