• Title/Summary/Keyword: Internet models

Search Result 1,391, Processing Time 0.024 seconds

The Analysis of Self-Mutilation in Adolescence Based on the Theory of Mentalization: From Sukhvinder in the Novel 'Casual Vacancy'

  • Oh, Mi Ae;Park, Chanmin;Lee, Yeon Jeong;Hong, Minha;Han, Ju Hee;Oh, Soo Hyun;Park, Jun Heon;Bahn, Geon Ho
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.30 no.3
    • /
    • pp.100-108
    • /
    • 2019
  • Objectives: Adolescence involves a number of developmental processes, as well as unique psychological characteristics and behaviors. An increased rate of internet and game addictions, school violence, and suicide may either represent aspects of adolescence or a psychopathological phenomenon. There is an urgent need to develop software programs that can prevent and resolve adolescent behavioral problems. We applied the mentalization theory to interpret and find solutions for problems faced by adolescent characters in literature. Methods: In Joan Rowling's novel "Casual Vacancy," Sukhvinder is a girl with problems representative of those encountered by modern adolescents; she is a victim of bullying and engages in self-mutilation. We targeted her problematic behaviors as representative of a prementalized state. Results: Born into an upper-class English family with Pakistani origins, Sukhvinder, unlike her siblings, fails her parents' expectations. Whenever she faces a psychological crisis, she regresses into the teleological mode (the most primitive pre-mentalization stage) and regains her sense of self by cutting herself. After her friend's suicide, however, she begins to communicate with her parents and moves toward mentalization. Conclusion: By analyzing Sukhvinder's behavior, we assessed patterns of attachment, empathy, and mentalization, and identified corrective approaches for problematic behaviors. We believe that the presented interpretation may serve as a foundation for the development of models for understanding adolescent deviant behaviors.

A Study on Personal Information Protection System for Big Data Utilization in Industrial Sectors (산업 영역에서 빅데이터 개인정보 보호체계에 관한 연구)

  • Kim, Jin Soo;Choi, Bang Ho;Cho, Gi Hwan
    • Smart Media Journal
    • /
    • v.8 no.1
    • /
    • pp.9-18
    • /
    • 2019
  • In the era of the 4th industrial revolution, the big data industry is gathering attention for new business models in the public and private sectors by utilizing various information collected through the internet and mobile. However, although the big data integration and analysis are performed with de-identification techniques, there is still a risk that personal privacy can be exposed. Recently, there are many studies to invent effective methods to maintain the value of data without disclosing personal information. In this paper, a personal information protection system is investigated to boost big data utilization in industrial sectors, such as healthcare and agriculture. The criteria for evaluating the de-identification adequacy of personal information and the protection scope of personal information should be differently applied for each industry. In the field of personal sensitive information-oriented healthcare sector, the minimum value of k-anonymity should be set to 5 or more, which is the average value of other industrial sectors. In agricultural sector, it suggests the inclusion of companion dogs or farmland information as sensitive information. Also, it is desirable to apply the demonstration steps to each region-specific industry.

A Meta-Model for Development Process of IoT Application by Using UML

  • Cho, Eun-Sook;Song, Chee-Yang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.121-128
    • /
    • 2019
  • An Internet of Things(IoT) technology which provides intelligent services by combining context-awareness based intelligences, inter-communication is made of between things and things or between things and person through the network connected with intelligent things is spreading rapidly. Especially as this technology is converged into smart device, mobile, cloud, big data technologies, it is applied into various domains. Therefore, this is different from existing Web or Mobile Application. New types of IoT applications are emerging by adapting IoT into Web or mobile. Because IoT application is not only focused on software but also considering hardware or things aspect, there are limitations existing development process. Existing development processes don't consider analysis and design techniques considering both hardware and things. We propose not only a meta-model for development process which can support IoT application's development but also meta-models for main activities in this paper. Especially we define modeling elements by using UML's extension mechanisms, provide development process, and suggest design techniques how to apply those elements into IoT application's modeling phase. Because there are many types of IoT application's type, we propose an Android and Arduino-based on IoT application as a case study. We expect that proposed technique can be applied into many of various IoT application development and design with a form of flexible and extensible as well as main functionalities or elements are more concretely described. As a result, it brings IoT application's flexibility and the effect of quality improvement.

Attractiveness Valuation of Phenomenal Architectural Aesthetic by Mixing the Fuzzy Logic with Contingent Valuation - Availing the Use Fares of Facility within Nodle Islet Cultural Center as Valuation Scale - (퍼지논리와 가상가치법 혼합을 통한 현상적 건축미의 매력가치 - 노들섬 문화센터 시설이용료를 가치 척도로 -)

  • Lee, Dong-Joo;Ko, Eun-Hyung
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.5
    • /
    • pp.3-10
    • /
    • 2018
  • The purpose of this study is to estimate the attractiveness value according to the preference level on architectural aesthetic. This research starts from the concept that aesthetic is phenomenon and from the viewpoint of 'attraction value' which affects goods. Interactive internet surveys were conducted for 500 citizens of Seoul metropolitan city who are potential users of the Nodle Islet Cultural Center. Based on the scenarios and questionnaires with fuzzy models, we have examined the evaluation of architectural aesthetic and monetary willing-to-payment, and estimated the economic value by preference level of architectural aesthetic through linear regression analysis. The main results of the study are as follows: First, the economic value of the Nodle Islet Cultural Center was estimated at ?15,683.43/person. Residents of Seoul metropolitan city were willing to accept the increase in the above-mentioned amount of the facility fares when their preferred works (average 86.81 points) were constructed. (P <0/05) Second, it is confirmed that the economic value increases dramatically as the preference level of architectural aesthetic increases. Third, it is presumed that the infinite valuation of architectural aesthetic and the problem of free riding coexist in the estimation of economic valuation of architectural aesthetic for public buildings. Fourth, by mixing the fuzzy logic with contingent valuation method, starting point bias and no response biases that happened in contingent valuation could be disappeared. bias elimination must be considered seriously because another bias could be happened in full process of the research. The results of this study will serve as a basis for spreading architectural aesthetic value-oriented research from the vague and obscure aesthetic-centered discussion on the existing architectural aesthetic. In addition, it will be an opportunity to draw institutional application and utilization strategy of architectural aesthetic through architectural aesthetic value research.

Part II. What drives Korean adults to seek orthodontic treatment: Factors contributing to orthodontic treatment decisions

  • Oh, Min-Hee;Park, Ae-Hyun;Kim, MinSoo;Kim, Eun-A;Cho, Jin-Hyoung
    • The korean journal of orthodontics
    • /
    • v.51 no.1
    • /
    • pp.3-14
    • /
    • 2021
  • Objective: This study aimed to identify the perceptions of orthodontic treatment among Korean adults and determine the factors that drive them to seek orthodontic treatment. Methods: A total of 2,321 adults aged 19-64 years were surveyed using an internet research system from a specialized research company. The participants were divided into the following groups based on their experience of and willingness to undergo orthodontic treatment: experience, acceptance, and non-acceptance groups. The characteristics of the participants were compared using analysis of variance with post-hoc analysis. Multinomial logistic regression analysis was performed in all three models with the non-acceptance group as a reference. Results: In terms of demographic characteristics, age, gender, marital status, and education had significant influences on orthodontic treatment decisions in adults in the experience and acceptance groups (p < 0.001). When all the factors were analyzed, age, marital status, past dental treatment experience, regular oral examinations, demand for orthodontic treatment, optimal treatment period, health insurance coverage, information on orthodontic treatments, perceptions regarding orthodontic treatment, and psychosocial impact of dental esthetics significantly influenced orthodontic treatment decisions in adults in the experience and acceptance groups (p < 0.001). Conclusions: These findings suggest that various factors influence orthodontic treatment decisions in adults. Individuals who seek orthodontic treatment were found to undergo more regular dental treatment and oral examination than those who did not. They also had a better perception of orthodontic treatment and more negative values for the psychosocial impact of dental esthetics.

Precision comparison of 3D photogrammetry scans according to the number and resolution of images

  • Park, JaeWook;Kim, YunJung;Kim, Lyoung Hui;Kwon, SoonChul;Lee, SeungHyun
    • International journal of advanced smart convergence
    • /
    • v.10 no.2
    • /
    • pp.108-122
    • /
    • 2021
  • With the development of 3D graphics software and the speed of computer hardware, it is an era that can be realistically expressed not only in movie visual effects but also in console games. In the production of such realistic 3D models, 3D scans are increasingly used because they can obtain hyper-realistic results with relatively little effort. Among the various 3D scanning methods, photogrammetry can be used only with a camera. Therefore, no additional hardware is required, so its demand is rapidly increasing. Most 3D artists shoot as many images as possible with a video camera, etc., and then calculate using all of those images. Therefore, the photogrammetry method is recognized as a task that requires a lot of memory and long hardware operation. However, research on how to obtain precise results with 3D photogrammetry scans is insufficient, and a large number of photos is being utilized, which leads to increased production time and data capacity and decreased productivity. In this study, point cloud data generated according to changes in the number and resolution of photographic images were produced, and an experiment was conducted to compare them with original data. Then, the precision was measured using the average distance value and standard deviation of each vertex of the point cloud. By comparing and analyzing the difference in the precision of the 3D photogrammetry scans according to the number and resolution of images, this paper presents a direction for obtaining the most precise and effective results to 3D artists.

A Study on Security Architecture for Digital Content Dissemination (디지탈 컨텐츠 배포를 위한 보안 체계에 관한 연구)

  • 김대엽;주학수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.147-155
    • /
    • 2003
  • The diffusion of internet infrastructure and a fast increase of Population to use it is becoming a base of the service that can use various information, data and digital contents which were provided through off-line physically and used. Recently, the. techniques for copy deterrence and copyright protection have been important in e-commerce because various contents in digital form can be duplicated easily. The Access Control(AC) technique that only a user having the qualifications can access and use contents normally has been studied. The Conditional Access System(CAS) used in a satellite broadcasting md Digital Right Management System(DRMS) used for contents service are representative models of current commercialized access control. The CAS and DRM can be considered as an access control technique based on the payment based type(PBT). This paper describe the access control method of payment free type(PFT) suggested in [5] which are independent on the payment structure. And then we suggest a new access control method of payment free type which is more efficient than the previous one.

Object detection in financial reporting documents for subsequent recognition

  • Sokerin, Petr;Volkova, Alla;Kushnarev, Kirill
    • International journal of advanced smart convergence
    • /
    • v.10 no.1
    • /
    • pp.1-11
    • /
    • 2021
  • Document page segmentation is an important step in building a quality optical character recognition module. The study examined already existing work on the topic of page segmentation and focused on the development of a segmentation model that has greater functional significance for application in an organization, as well as broad capabilities for managing the quality of the model. The main problems of document segmentation were highlighted, which include a complex background of intersecting objects. As classes for detection, not only classic text, table and figure were selected, but also additional types, such as signature, logo and table without borders (or with partially missing borders). This made it possible to pose a non-trivial task of detecting non-standard document elements. The authors compared existing neural network architectures for object detection based on published research data. The most suitable architecture was RetinaNet. To ensure the possibility of quality control of the model, a method based on neural network modeling using the RetinaNet architecture is proposed. During the study, several models were built, the quality of which was assessed on the test sample using the Mean average Precision metric. The best result among the constructed algorithms was shown by a model that includes four neural networks: the focus of the first neural network on detecting tables and tables without borders, the second - seals and signatures, the third - pictures and logos, and the fourth - text. As a result of the analysis, it was revealed that the approach based on four neural networks showed the best results in accordance with the objectives of the study on the test sample in the context of most classes of detection. The method proposed in the article can be used to recognize other objects. A promising direction in which the analysis can be continued is the segmentation of tables; the areas of the table that differ in function will act as classes: heading, cell with a name, cell with data, empty cell.

Hazelcast Vs. Ignite: Opportunities for Java Programmers

  • Maxim, Bartkov;Tetiana, Katkova;S., Kruglyk Vladyslav;G., Murtaziev Ernest;V., Kotova Olha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.406-412
    • /
    • 2022
  • Storing large amounts of data has always been a big problem from the beginning of computing history. Big Data has made huge advancements in improving business processes by finding the customers' needs using prediction models based on web and social media search. The main purpose of big data stream processing frameworks is to allow programmers to directly query the continuous stream without dealing with the lower-level mechanisms. In other words, programmers write the code to process streams using these runtime libraries (also called Stream Processing Engines). This is achieved by taking large volumes of data and analyzing them using Big Data frameworks. Streaming platforms are an emerging technology that deals with continuous streams of data. There are several streaming platforms of Big Data freely available on the Internet. However, selecting the most appropriate one is not easy for programmers. In this paper, we present a detailed description of two of the state-of-the-art and most popular streaming frameworks: Apache Ignite and Hazelcast. In addition, the performance of these frameworks is compared using selected attributes. Different types of databases are used in common to store the data. To process the data in real-time continuously, data streaming technologies are developed. With the development of today's large-scale distributed applications handling tons of data, these databases are not viable. Consequently, Big Data is introduced to store, process, and analyze data at a fast speed and also to deal with big users and data growth day by day.

Electronic Media and New Configurations of the Content of Modern Educational Practices

  • Skurativskyi, Vadym;Shyrman, Roman;Sharolapova, Nina;Nehreskul, Ihor;Molokanova, Olha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.401-407
    • /
    • 2022
  • Electronic media are an integral part of modern civilization; educational practices are no exception, which should change the content orientations, structures and methodological approaches in accordance with the requirements of the educational market. This makes it relevant to find effective and successful configurations in the process of implementing modern educational practices. The purpose of the research lies in determining the basic principles of electronic media and their place in modern education, identifying the effectiveness of teaching disciplines with application of electronic media, as well as establishing the level of assessment by students of the need to involve different types of electronic media in the educational process and professional practice. The research methodology is complex; the descriptive method and methods of observation, analysis and synthesis have been used in the academic paper. The method of pedagogical experiment has become the principal one; the method of questionnaires and statistical methods have been also used. The hypothesis of the academic paper lies in the fact that the involvement of electronic media in the educational process makes it more effective and requires conceptual changes in educational practices. The result of the research manifests in the identification of new opportunities for the use of electronic media, leading to conceptual shifts in the framework of modern educational policies. In the future, it will be appropriate to consider the theoretical aspects of changing worldview models in education and the use of new media in the educational process, their effectiveness and relevance.