• Title/Summary/Keyword: Computer software

Search Result 8,259, Processing Time 0.056 seconds

Participant Characteristic and Educational Effects for Cyber Agricultural Technology Training Courses (사이버농업기술교육 참가자의 특성과 교육효과)

  • Kang, Dae-Koo
    • Journal of Agricultural Extension & Community Development
    • /
    • v.21 no.1
    • /
    • pp.35-82
    • /
    • 2014
  • It was main objectives to find the learners characteristics and educational effects of cyber agricultural technology courses in RDA. For the research, it was followed by literature reviews and internet based survey methods. In internet based survey, two staged stratified sampling method was adopted from cyber training members database in RDA along with some key word as open course or certificate course, and enrollment years. Instrument was composed through literature reviews about cyber education effects and educational effect factors. And learner characteristics items were added in survey documents. It was sent to sampled persons by e-mail and 316 data was returned via google survey systems. Through the data cleaning, 303 data were analysed by chi-square, t-test and F-test. It's significance level was .05. The results of the research were as followed; First, the respondent was composed of mainly man(77.9%), and monthly income group was mainly 2,000,000 or 3,000,000 won(24%), bachelor degree(48%), fifty or forty age group was shared to 75%, and their job was changed after learning(12.2%). So major respondents' job was not changed. Their major was not mainly agriculture. Learners' learning style were composed of two or more types as concrete-sequential, mixing, abstract-random, so e-learning course should be developed for the students' type. Second, it was attended at 3.2 days a week, 53.53 minutes a class, totally 172.63 minutes a week. They were very eager or generally eager to study, and attended two or more subjects. The cyber education motives was for farming knowledge, personal competency development, job performance enlarging. They selected subjects along with their interest. A subject person couldn't choose more subjects for little time, others, non interesting subject, but more subject persons were for job performance benefits and previous subjects effectiveness. Most learner was finished their subject, but a fourth was not finished for busy (26.7%). And their entrying behavior was not enough to learn e-course and computer or internet using ability was middle level as software using. And they thought RDA cyber course was comfort in non time or space limit, knowledge acquisition, and personal competency development. Cyber learning group was composed of open course only (12.5%), certificate only(25.7%), both(36.3%). Third, satisfaction and academic achievement of e-learning learners were good, and educational service offering for doing job in learning application category was good, but effect of cyber education was not good, especially, agricultural income increasing was not good because major learner group was not farmer, so they couldn't apply their knowledge to farming. And content structure and design, content comprehension, content amount were good. The more learning subject group responded to good in effects, and both open course and certificate course group satisfied more than open course only group. Based on the results, recommendation was offered as cyber course specialization before main course in RDA training system, support staff and faculty enlargement, building blended learning system with local RDA office, introducing cyber tutor system.

ULTRASTRUCTURAL ANALYSIS OF TOOTH PULP AFFERENTS TERMINALS IN THE MEDULLARY DORSAL HORN OF THE RAT (치수유래 구심성 신경섬유의 삼차신경 감각핵군에서의 연접특성)

  • Bae, Yong-Chul;Lee, Eun-Hee;Choy, Min-Ki;Hong, Su-Hyung;Kim, Hyun-Jung;Na, Soon-Hyeun;Kim, Young-Jin
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.28 no.2
    • /
    • pp.219-227
    • /
    • 2001
  • Little is known about processing mechanism of pain sensation of the oral cavity at the 1st synapse of trigeminal sensory nuclei. Serial ultrathin sections of tooth pulp afferent terminals, identified by the transganglionic transport of 1% wheatgerm agglutinin conjugated horseradish peroxidase, were investigated with electron microscope. Quantitative ultrastructural analysis was performed on digitizing tablet connected to Macintoshi personal computer (software; NIH Image 1.60, NIH, Bethesda, MD). Labeled boutons could be classified into two types by the shapes of containing vesicles : S bouton, which contained mainly spherical vesicles (Dia. 45-55 nm) and few large dense cored vesicles (Dia, 80-120nm), and LDCV bouton, which contained spherical vesicles as well as large number of large dense cored vesicles. Most of the parameters on the ultrastructural characteristic and synaptic organization of labeled boutons were similar between S and LDCV boutons, except shapes of containing vesicles. Majority of the labeled boutons showed simple synaptic arrangement. The labeled boutons were frequency presynaptic to dendritic spine, and to a lesser extent, dendritic shaft. They rarely synapsed with soma and adjacent proximal dendrite. A small proportion of labeled boutons made synaptic contacts with presynaptic, pleomorphic vesicles containing endings and synaptic triad. Morphometric parameters of labeled boutons including volume and surface area, total apposed area, mitochondrial volume, active zone area, vesicle number and density showed wide variation and these were not significantly different between S and LDCV boutons. The present study revealed characteristic features on ultrastructure and synaptic connection of pulpal afferents which may involved in transmission of oral pain sensation.

  • PDF

The effect of palatal height on the Korean vowels (구개의 높이가 한국어 모음 발음에 미치는 효과에 관한 연구)

  • Chung, Bo-Yoon;Lim, Young-Jun;Kim, Myung-Joo;Nam, Shin-Eun;Lee, Seung-Pyo;Kwon, Ho-Beom
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.48 no.1
    • /
    • pp.69-74
    • /
    • 2010
  • Purpose: The purpose of this study was to analyze the influence of palatal height on Korean vowels and speech intelligibility in Korean adults and to produce baseline data for future prosthodontic treatment. Material and methods: Forty one healthy Korean men and women who had no problem in pronunciation, hearing, and communication and had no history of airway disease participated in this study. Subjects were classified into H, M, and L groups after clinical determination of palatal height with study casts. Seven Korean vowels were used as sample vowels and subjects'clear speech sounds were recorded using Multispeech software program on computer. The F1 and the F2 of 3 groups were produced and they were compared. In addition, the vowel working spaces of 3 groups by /a/, /i/, and /u/ corner vowels were obtained and their areas were compared. Kruskal-Wallis test and Mann-Whiteny U test were used as statistical methods and P < .05 was considered statistically significant. Results: There were no significant differences in formant frequencies among 3 groups except for the F2 formant frequency between H and L group (P = .003). In the analysis of vowel working space areas of 3 groups, the vowel working spaces of 3 groups were similar in shape and no significant differences of their areas were found. Conclusion: The palatal height did not affect vowel frequencies in most of the vowels and speech intelligibility. The dynamics of tongue activity seems to compensate the morphological difference.

The Effects of Inductive Activities Using GeoGebra on the Proof Abilities and Attitudes of Mathematically Gifted Elementary Students (GeoGebra를 활용한 귀납활동이 초등수학영재의 증명능력 및 증명학습태도에 미치는 영향)

  • Kwon, Yoon Shin;Ryu, Sung Rim
    • Education of Primary School Mathematics
    • /
    • v.16 no.2
    • /
    • pp.123-145
    • /
    • 2013
  • This study was expected to yield the meaningful conclusions from the experimental group who took lessons based on inductive activities using GeoGebra at the beginning of proof learning and the comparison one who took traditional expository lessons based on deductive activities. The purpose of this study is to give some helpful suggestions for teaching proof to mathematically gifted elementary students. To attain the purpose, two research questions are established as follows. 1. Is there a significant difference in proof abilities between the experimental group who took inductive lessons using GeoGebra and comparison one who took traditional expository lessons? 2. Is there a significant difference in proof attitudes between the experimental group who took inductive lessons using GeoGebra and comparison one who took traditional expository lessons? To solve the above two research questions, they were divided into two groups, an experimental group of 10 students and a comparison group of 10 students, considering the results of gift and aptitude test, and the computer literacy among 20 elementary students that took lessons at some education institute for the gifted students located in K province after being selected in the mathematics. Special lesson based on the researcher's own lesson plan was treated to the experimental group while explanation-centered class based on the usual 8th grader's textbook was put into the comparison one. Four kinds of tests were used such as previous proof ability test, previous proof attitude test, subsequent proof ability test, and subsequent proof attitude test. One questionnaire survey was used only for experimental group. In the case of attitude toward proof test, the score of questions was calculated by 5-point Likert scale, and in the case of proof ability test was calculated by proper rating standard. The analysis of materials were performed with t-test using the SPSS V.18 statistical program. The following results have been drawn. First, experimental group who took proof lessons of inductive activities using GeoGebra as precedent activity before proving had better achievement in proof ability than the comparison group who took traditional proof lessons. Second, experimental group who took proof lessons of inductive activities using GeoGebra as precedent activity before proving had better achievement in the belief and attitude toward proof than the comparison group who took traditional proof lessons. Third, the survey about 'the effect of inductive activities using GeoGebra on the proof' shows that 100% of the students said that the activities were helpful for proof learning and that 60% of the reasons were 'because GeoGebra can help verify processes visually'. That means it gives positive effects on proof learning that students research constant character and make proposition by themselves justifying assumption and conclusion by changing figures through the function of estimation and drag in investigative software GeoGebra. In conclusion, this study may provide helpful suggestions in improving geometry education, through leading students to learn positive and active proof, connecting the learning processes such as induction based on activity using GeoGebra, simple deduction from induction(i.e. creating a proposition to distinguish between assumptions and conclusions), and formal deduction(i.e. proving).

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Influence of taper on the screw-in effect of nickel-titanium rotary files in simulated resin root canal (모형 레진근관에서 니켈-티타늄 전동 파일의 경사도가 screw-in effect에 미치는 영향)

  • Sung, Hye-Jin;Ha, Jung-Hong;Kim, Sung-Kyo
    • Restorative Dentistry and Endodontics
    • /
    • v.35 no.5
    • /
    • pp.380-386
    • /
    • 2010
  • Objectives: The introduction of nickel-titanium alloy endodontic instruments has greatly simplified shaping the root canal systems. However, these new instruments have several unexpected disadvantages. One of these is tendency to screw into the canal. In this study, the influence of taper on the screw-in effect of the Ni-Ti rotary instrument were evaluated. Materials and Methods: A total of 20 simulated root canals with an S-shaped curvature in clear resin blocks were divided into two groups. ProFile .02, .04, .06 (Dentsply-Maillefer) and GT rotary files .08, .10, .12 (Dentsply) were used in Profile group, and K3 .04, .06, .08, .10, and .12 (SybronEndo, Glendora) were used in K3 group. Files were used with a single pecking motion at a constant speed of 300 rpm. A special device was made to measure the force of screw-in effect. A dynamometer of the device recorded the screwin force during simulated canal preparation and the recorded data was stored in computer with designed software. The data were subjected to one-way ANOVA and Tukey's multiple range test for post-hoc test. p value of less than 0.05 was regarded significant. Results: The more tapered instruments generated more screw-in forces in Profile group (p < 0.05). In K3 group, 0.08, 0.10. and 0.12 tapered instruments showed more screw-in force than 0.04 tapered one, and 0.08 and 0.12 tapered instruments showed more screw-in force than 0.06 tapered one (p < 0.05). Conclusions: The more tapered instruments seems to produce more screw-in force. To avoid this screw-in force during instrumentation, more attention may be needed when using more tapered instruments.

A COMPARISON OF THE SHAPING ABILITY OF FOUR ROTARY NICKEL-TITANIUM FILES IN SIMULATED ROOT CANALS (엔진구동형 NiTi 파일의 근관성형효과 비교)

  • Kim, Bo-Hye;Choi, Kyoung-Kyu;Park, Sang-Hyuk;Choi, Gi-Woon
    • Restorative Dentistry and Endodontics
    • /
    • v.35 no.2
    • /
    • pp.88-95
    • /
    • 2010
  • The purpose of this study was to compare the root canal shaping ability of 4 rotary NiTi instruments in simulated root canals. For the preparation of thirty two curved root canals, Mtwo instruments using "single length"technique, and Profile, ProTaper Universal, and K3 using crown-down technique (N = 8) were used. All canal samples were prepared by reaching an apical canal size of #30. Pre- and post-instrumentation digital images were recorded and an assessment of canal shape was determined using a computer image analysis program SigmaScan Pro (Systat Software Inc., San Jose, CA, USA). The changes of the dimension of inner walls of canals, (2) the changes of the dimension of outer walls of canals, and (3) the centering ratio were measured at 7 measuring points, and then data were statistically analyzed using one-way ANOVA and Duncan's test. The results were as below; 1. The root canal shaping ability of Profile was significantly faster than that of other rotary NiTi instruments (p < 0.05). 2. The deformation and fracture of all instruments used for this study were not experienced. 3. In the degree of changes of the dimension of inner walls of canals, Profile demonstrated the lowest changes of the dimension of inner walls of canals except at the measuring points of the 1 and 2 mm (p < 0.05). However, the ProTaper Universal showed the highest changes of the dimension of inner walls of canals at all measuring points (p < 0.05). 4. In the degree of changes of the dimension of outer walls of canals, Mtwo demonstrated the lowest changse of the dimension of outer walls of canals except at the measuring point of the 1 mm (p < 0.05). However, Profile exhibited the highest changes of the dimension of outer walls of canals at the measuring points of 3 and 4 mm and ProTaper Universal and K3 showed the largest changes of the dimension of outer walls of canals at the measuring points of 1, 2, 6, and 7 mm (p < 0.05). 5. In degree of centering ratio, Profile demonstrated the least centering ratio comparing with the centering ratio shown by other NiTi instruments at the measuring points of 1, 4, 5, and 6 mm. Results suggest that in the coronal part of canal preparation, active cutting files such as ProTaper Universal may efficiently flare the canal orifice and form a better taper, and in the apical part of the canal, files which have a better centering ability such as Profile may maintain the original canal curvature and reduce the shaping time.

A Hardware Implementation of the Underlying Field Arithmetic Processor based on Optimized Unit Operation Components for Elliptic Curve Cryptosystems (타원곡선을 암호시스템에 사용되는 최적단위 연산항을 기반으로 한 기저체 연산기의 하드웨어 구현)

  • Jo, Seong-Je;Kwon, Yong-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.1
    • /
    • pp.88-95
    • /
    • 2002
  • In recent years, the security of hardware and software systems is one of the most essential factor of our safe network community. As elliptic Curve Cryptosystems proposed by N. Koblitz and V. Miller independently in 1985, require fewer bits for the same security as the existing cryptosystems, for example RSA, there is a net reduction in cost size, and time. In this thesis, we propose an efficient hardware architecture of underlying field arithmetic processor for Elliptic Curve Cryptosystems, and a very useful method for implementing the architecture, especially multiplicative inverse operator over GF$GF (2^m)$ onto FPGA and futhermore VLSI, where the method is based on optimized unit operation components. We optimize the arithmetic processor for speed so that it has a resonable number of gates to implement. The proposed architecture could be applied to any finite field $F_{2m}$. According to the simulation result, though the number of gates are increased by a factor of 8.8, the multiplication speed We optimize the arithmetic processor for speed so that it has a resonable number of gates to implement. The proposed architecture could be applied to any finite field $F_{2m}$. According to the simulation result, though the number of gates are increased by a factor of 8.8, the multiplication speed and inversion speed has been improved 150 times, 480 times respectively compared with the thesis presented by Sarwono Sutikno et al. [7]. The designed underlying arithmetic processor can be also applied for implementing other crypto-processor and various finite field applications.

Real-time CRM Strategy of Big Data and Smart Offering System: KB Kookmin Card Case (KB국민카드의 빅데이터를 활용한 실시간 CRM 전략: 스마트 오퍼링 시스템)

  • Choi, Jaewon;Sohn, Bongjin;Lim, Hyuna
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.1-23
    • /
    • 2019
  • Big data refers to data that is difficult to store, manage, and analyze by existing software. As the lifestyle changes of consumers increase the size and types of needs that consumers desire, they are investing a lot of time and money to understand the needs of consumers. Companies in various industries utilize Big Data to improve their products and services to meet their needs, analyze unstructured data, and respond to real-time responses to products and services. The financial industry operates a decision support system that uses financial data to develop financial products and manage customer risks. The use of big data by financial institutions can effectively create added value of the value chain, and it is possible to develop a more advanced customer relationship management strategy. Financial institutions can utilize the purchase data and unstructured data generated by the credit card, and it becomes possible to confirm and satisfy the customer's desire. CRM has a granular process that can be measured in real time as it grows with information knowledge systems. With the development of information service and CRM, the platform has change and it has become possible to meet consumer needs in various environments. Recently, as the needs of consumers have diversified, more companies are providing systematic marketing services using data mining and advanced CRM (Customer Relationship Management) techniques. KB Kookmin Card, which started as a credit card business in 1980, introduced early stabilization of processes and computer systems, and actively participated in introducing new technologies and systems. In 2011, the bank and credit card companies separated, leading the 'Hye-dam Card' and 'One Card' markets, which were deviated from the existing concept. In 2017, the total use of domestic credit cards and check cards grew by 5.6% year-on-year to 886 trillion won. In 2018, we received a long-term rating of AA + as a result of our credit card evaluation. We confirmed that our credit rating was at the top of the list through effective marketing strategies and services. At present, Kookmin Card emphasizes strategies to meet the individual needs of customers and to maximize the lifetime value of consumers by utilizing payment data of customers. KB Kookmin Card combines internal and external big data and conducts marketing in real time or builds a system for monitoring. KB Kookmin Card has built a marketing system that detects realtime behavior using big data such as visiting the homepage and purchasing history by using the customer card information. It is designed to enable customers to capture action events in real time and execute marketing by utilizing the stores, locations, amounts, usage pattern, etc. of the card transactions. We have created more than 280 different scenarios based on the customer's life cycle and are conducting marketing plans to accommodate various customer groups in real time. We operate a smart offering system, which is a highly efficient marketing management system that detects customers' card usage, customer behavior, and location information in real time, and provides further refinement services by combining with various apps. This study aims to identify the traditional CRM to the current CRM strategy through the process of changing the CRM strategy. Finally, I will confirm the current CRM strategy through KB Kookmin card's big data utilization strategy and marketing activities and propose a marketing plan for KB Kookmin card's future CRM strategy. KB Kookmin Card should invest in securing ICT technology and human resources, which are becoming more sophisticated for the success and continuous growth of smart offering system. It is necessary to establish a strategy for securing profit from a long-term perspective and systematically proceed. Especially, in the current situation where privacy violation and personal information leakage issues are being addressed, efforts should be made to induce customers' recognition of marketing using customer information and to form corporate image emphasizing security.

Performance Optimization of Numerical Ocean Modeling on Cloud Systems (클라우드 시스템에서 해양수치모델 성능 최적화)

  • JUNG, KWANGWOOG;CHO, YANG-KI;TAK, YONG-JIN
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.27 no.3
    • /
    • pp.127-143
    • /
    • 2022
  • Recently, many attempts to run numerical ocean models in cloud computing environments have been tried actively. A cloud computing environment can be an effective means to implement numerical ocean models requiring a large-scale resource or quickly preparing modeling environment for global or large-scale grids. Many commercial and private cloud computing systems provide technologies such as virtualization, high-performance CPUs and instances, ether-net based high-performance-networking, and remote direct memory access for High Performance Computing (HPC). These new features facilitate ocean modeling experimentation on commercial cloud computing systems. Many scientists and engineers expect cloud computing to become mainstream in the near future. Analysis of the performance and features of commercial cloud services for numerical modeling is essential in order to select appropriate systems as this can help to minimize execution time and the amount of resources utilized. The effect of cache memory is large in the processing structure of the ocean numerical model, which processes input/output of data in a multidimensional array structure, and the speed of the network is important due to the communication characteristics through which a large amount of data moves. In this study, the performance of the Regional Ocean Modeling System (ROMS), the High Performance Linpack (HPL) benchmarking software package, and STREAM, the memory benchmark were evaluated and compared on commercial cloud systems to provide information for the transition of other ocean models into cloud computing. Through analysis of actual performance data and configuration settings obtained from virtualization-based commercial clouds, we evaluated the efficiency of the computer resources for the various model grid sizes in the virtualization-based cloud systems. We found that cache hierarchy and capacity are crucial in the performance of ROMS using huge memory. The memory latency time is also important in the performance. Increasing the number of cores to reduce the running time for numerical modeling is more effective with large grid sizes than with small grid sizes. Our analysis results will be helpful as a reference for constructing the best computing system in the cloud to minimize time and cost for numerical ocean modeling.