Purpose: This study was to investigate the functional improvement in peripheral vision following eccentric viewing training. Methods: 14 subjects with normal vision took a part with their right eye, peripheral retinal which is $20^{\circ}$ lateral area from the fovea was examined for contrast sensitivity(CS). Eccentric viewing training was performed for 21days with an hour image viewing and examination was repeated. Results: The critical durations for 0.7 cpd were increased 2.67(467 ms) for pre-eccentric viewing training to 2.79(616 ms) for post-eccentric viewing training (p>0.05). The critical durations for 3.0 cpd were also increased 2.53(341 ms) for pre-eccentric viewing training to 3.04(1102 ms) for post-eccentric viewing training (p>0.05). Conclusions: It is recommended to use higher spatial frequency with higher CS for eccentric viewing training and to train more frequently for a short time. Moreover, the study on Korean standardizing of the visual rehabilitation for low vision based on the etiology is sorely required.
Currently commercially available phantom can reproduce and evaluate only a static situation, the study is incomplete research on phantom and system which is can confirmed functional situation in the kidney by time through dynamic phantom and blood flow velocity, various difference according to the amount of radioactive. Therefore, through this study, it has produced the dynamic kidney phantom to reproduce images through the dynamic flow of the kidney, it desires to evaluate the usefulness of nuclear medicine imaging. The production of the kidney phantom was fabricated based on the normal adult kidney, in order to reproduce the dynamic situation based on the fabricated kidney phantom, in this study it was applied the volume pump that can adjust the speed of blood flow, so it can be integrated continuously radioactive isotopes in the kidney by using 99mTc-pertechnate. Used the radioactive isotope was supplied through the two pump. It was confirmed the changes according to the infusion rate, radioactive isotopes and the different injection speeds on the left and right, analysis of the acquired images was done by drawn five times ROI in order to check the reproducibility of each on the front and rear of the kidney and bladder. Depending on the speed of injection, radioisotope was a lot of integrated and emissions up when adjusting the pressure of the pump as 30 stroke, it was the least integrated and emissions up when adjusting as 40 stroke. The integration of the left & right kidney was not reached in the amount of the highest when adjusting as 10 stroke. In the changes according to the amount of the radioactive isotope, 0.6 mCi(22.2 MBq), 0.8 mCi (29.6 MBq)was showed up similar tendency but, in the result of the injection 0.8 mCi, it was showed up counts close to double of 0.6 mCi. In the result of the differently injection speed of the left & right kidney, as a result of different conditions that injection speed was 20 stroke through left kidney phantom, the injection speed was 30 stroke through right kidney phantom, it was enough difference in the resulting image can be easily distinguished with the naked eye. Through this study, the results showed that the dynamic kidney phantom system is able to similarly reproduce renogram in the actual clinical. Especially, the depicted over time for the flow to be excreted through the kidney into the bladder was adequately reproduce, it is expected to be utilized as basic data to check the quality of the dynamic images. In addition, it is considered to help in the field of functional imaging and quality control.
This study was focused on digital restoration and surface depth modeling applying the three-dimensional laser scanning system of the Haeundae Stone Inscription. Firstly, the three-dimensional digital restoration carried out acquiring of point cloud using wide range and precision scanner, thereafter registering, merging, filtering, polygon mesh and surveyed map drawing. In particular, stroke of letters, inscribed depth and definition appearing the precision scanning polygon was outstanding compared with ones of the wide range polygon. The surface depth modeling completed through separation from polygon, establishment of datum axis, selection of datum point, contour mapping and polygon merging. Also, relative inscribed depth (5~17mm) and outline by the depth modeling was well-defined compared with photograph and polygon image of the inscription stone. The digital restoration technology merging wide range and precision scanning restored the total and detailed shape of the Stone Inscription quickly and accurately. In addition, the surface depth modeling visibly showed unclear parts from naked eye and photograph. In the future, various deteriorations and surrounding environment change of the Stone Inscription will be numerically analyze by periodic monitoring.
Journal of the Society of Cosmetic Scientists of Korea
/
v.34
no.2
/
pp.129-135
/
2008
In this study, the potential anti-aging properties of Prunella vulgaris extract were investigated. According to our results, Prunella vulgaris extract increased collagen synthesis(74.7% at 250 ${\mu}g/mL$) and decreased on MMP-1 synthesis(90.2% at 200 ${\mu}g/mL$) and elastase activity(43.7% at 2.0%). Furthermore, it also showed free radical scavenging activity(76.9% at 2.0%) and reduced $H_2O_2$-induced cytoxicity(49.9% at 2.0%). A double-blind clinical study to investigate the effect of Prunella vulgaris extract on the skin's surface was conducted with 22 healthy volunteers, aged 34 to 48 years. The volunteers applied a cream formula with 4.0% of Prunella vulgaris extract, or placebo cream, on each crow's feet twice a day for 12 weeks. Skin wrinkles were evaluated with the naked eye and instrumental image analysis of silicone replicas, followed by statistical analysis. Twelve weeks after application of cream formula with 4.0% of Prunella vulgaris extract, we found significant improvement of facial wrinkle. Moreover, silicone replica analysis confirmed notable improvement in average of R2 and R3 at 12 weeks(p<0.05). These results demonstrate that Prunella vulgaris provides a remarkable and significant tensor and anti-wrinkle effect on the skin, which could be of great use in anti-aging skin care products.
Journal of the Institute of Electronics Engineers of Korea SP
/
v.42
no.4
s.304
/
pp.79-86
/
2005
In this paper, we propose a new LINF(Linear Independent Non-negative Factorization) algorithm for real-time face recognition systea This system greatly consists of the two parts: 1) face extraction part; 2) face recognition part. In the face extraction Part we applied subtraction image, the detection of eye and mouth region , and normalization method, and then in the face recognition Part we used LINF in extracted face candidate region images. The existing recognition system using only PCA(Principal Component Analysis) showed low recognition rates, and it was hard in the recognition system using only LDA(Linear Discriminants Analysis) to apply LDA directly when the training set is small. To overcome these shortcomings, we reduced dimension as the matrix that had non-negative value to be different from former eigenfaces and then applied LDA to the matrix in the proposed system We have experimented using self-organized DAIJFace database and ORL database offered by AT(')T laboratory in Cambridge, U.K. to evaluate the performance of the proposed system. The experimental results showed that the proposed method outperformed PCA, LDA, ICA(Independent Component Analysis) and PLMA(PCA-based LDA mixture algorithm) method within the framework of recognition accuracy.
Recently, the sonnet and the shijo, each representing French and Korean formal poetries, are tend to be read with the eyes only, as were more accustomed to written literature. But even after almost three millennia of written literature and increased use of digitalized poems, poetry retains its appeal to the ear as well as to the eye. To read a poem only by eyes might be wrong because it is designed to be read aloud by mouth and understood by ear, and will decrease the aesthetic sense otherwise. It is essential to find the right way to recite a poem in this dramatically changed society, and is especially important when many shijos are changing into digitalized forms to adapt the new wave of our society. The sonnet and the shijo emphasize the importance of the harmony of sounds and rhythms with certain structure, and have their own prosodies. The emotions of the speaker in poems are expressed with words. When they are pronounced. each phoneme has its own phonemic characteristics. When comparing the The Broken Bell(Baudelaire) and Chopoong ga (Jong Seo Kim) in terms of prosody and phonetics. the speakers emotions are closely related with the phonetic structure of each word. In The Broken Bell, the phonetic value of rhymes, repeated phonemes, concentration of front and back vowels. rhythms of onesyllable words shape the overall image of this poem describing the productivity of bells as appose to the sterility of the soul. Chopoong ga also shows the determined and strong will of the speaker by frequent glottalized sounds. distribution and concentration of certain vowels. and frequent use of plosives. As you see in these examples, phones, beats, and rhythms are not the mere transmitter of meaning but possess their expressive values of their own and should be the first to be considered when reciting a poem.
Deep neural networks (DNNs) provide excellent performance for image, speech, and pattern recognition. However, DNNs sometimes misrecognize certain adversarial examples. An adversarial example is a sample that adds optimized noise to the original data, which makes the DNN erroneously misclassified, although there is nothing wrong with the human eye. Therefore studies on defense against adversarial example attacks are required. In this paper, we have experimentally analyzed the success rate of detection for adversarial examples by adjusting various parameters. The performance of the ensemble defense method was analyzed using fast gradient sign method, DeepFool method, Carlini & Wanger method, which are adversarial example attack methods. Moreover, we used MNIST as experimental data and Tensorflow as a machine learning library. As an experimental method, we carried out performance analysis based on three adversarial example attack methods, threshold, number of models, and random noise. As a result, when there were 7 models and a threshold of 1, the detection rate for adversarial example is 98.3%, and the accuracy of 99.2% of the original sample is maintained.
Since the opening of Joseon in 1876, the photographic records of the late Joseon Dynasty and the period of the Korean Empire exist more than expected, considering the technological level and the social situations at that time. Photographs related to Korea can be distributed in various forms, such as illustrations of books printed to introduce Korea to Western society, plates of graphic journalism like newspapers or magazines, vintage prints, photo-postcards, stereo-photographs, card-type photographs, and lantern slides. There are still a great deal left in various archives of the Europe, America, Japan and Korea. According to related researchers, Korean-related photographs taken between 1863 and 1910, since Koreans were first photographed, were at least 3,000 to 4,000 cuts and the photo postcards issued was 25,000. It is said that most of them exist. This paper categorizes two ways of producing and distributing photographic records related to Korea, which were early modern times. The subjects of the photographs are clearly Korea or Koreans, but most of the producers of these photographs were Westerners and Japanese, who were imperial servants of imperialism. In the case of photography, there is a great possibility of distortion of the facts depending on the needs or perspectives of the producers. In order to correct the distortion, not only the contents of the photograph but also the intention of the producer, the production and the communication status should be grasped. This is because the problem of reading photograph records accurately and fairly in an age where there is no real experience is the cornerstone for understanding modern Korea correctly and broadly studying the Modern History of Korea.
Paul Auster's The Locked Room, the third novel of The New York Trilogy, has been examined by many critics in terms of anti-detective fiction or postmodernism. However, this paper focuses upon how the author adopts and utilizes some key elements of the traditional detective novel and its literary tradition. Mystery storytelling is one of Auster's literary strategies and the theme of the double is another. For his novel Auster explores the theme of the double as in Poe's "William Wilson." In The Locked Room, the narrator "I" is described as a shadow of his childhood friend Fanshawe. After Fanshawe's disappearance "I" becomes a literary agent for his friend, and becomes a husband of his friend's wife and a father of his friend's child. Searching for information to write a biography of his friend, he realizes that his friend has always been living inside his skull condemned to a mystical solitude. When Fanshawe appears in the narrator's mind as an image of the door of a locked room, the locked room is also a metaphor for the closed consciousness of the narrator. In his strategy of mystery storytelling, Auster employs the quest of detective fiction as well as the irony of Oedipus the King, where the criminal pursued by the king turns out to be himself. The Locked Room starts with the mystery of Fanshawe's disappearance, and as the novel develops, the narrator pursues numerous clues about his biographical subject like a private eye. Ironically, however, he finds that the ghost of Fanshawe has always been with him and that this is inevitable. As the narrator resolves to quit his life as a double, he contrives to name a strange man Fanshawe as if he tries to turn his biographical subject into a fictional character in the same way Fanshawe has controlled the narrator like a character in Fanshawe's novel. Beaten by the fictional Fanshawe and recovering from a near-death experience, the narrator prepares for his final showdown with Fanshawe. The transcendence of his existence as a double is epitomized by his act to tear off the red notebook handed to him by Fanshawe, which confusingly delivers a message that a life is doomed to be a failure. The narrator's act to cut off Fanshawe's influence bespeaks his breaking out of his locked consciousness and a new start for his life with his own identity.
Oh, Youngon;Bui, An Ngoc;Choi, Kyoungah;Lee, Impyeong
Korean Journal of Remote Sensing
/
v.38
no.6_1
/
pp.1479-1488
/
2022
Accidents in which oil spills occur intermittently in the ocean due to ship collisions and sinkings. In order to prepare prompt countermeasures when such an accident occurs, it is necessary to accurately identify the current status of spilled oil. To this end, the Coast Guard patrols the target area with a fixed-wing airplane or helicopter and checks it with the naked eye or video, but it was difficult to determine the area contaminated by the spilled oil and its exact location on the map. Accordingly, this study develops a technology for direct ortho-rectification by automatically geo-referencing aerial images collected by the Coast Guard without individual ground reference points to identify the current status of spilled oil. First, meta information required for georeferencing is extracted from a visualized screen of sensor information such as video by optical character recognition (OCR). Based on the extracted information, the external orientation parameters of the image are determined. Images are individually orthorectified using the determined the external orientation parameters. The accuracy of individual orthoimages generated through this method was evaluated to be about tens of meters up to 100 m. The accuracy level was reasonably acceptable considering the inherent errors of the position and attitude sensors, the inaccuracies in the internal orientation parameters such as camera focal length, without using no ground control points. It is judged to be an appropriate level for identifying the current status of spilled oil contaminated areas in the sea. In the future, if real-time transmission of images captured during flight becomes possible, individual orthoimages can be generated in real time through the proposed individual orthorectification technology. Based on this, it can be effectively used to quickly identify the current status of spilled oil contamination and establish countermeasures.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.