• Title/Summary/Keyword: internet use characteristics

Search Result 725, Processing Time 0.028 seconds

A Study on Optimization of Perovskite Solar Cell Light Absorption Layer Thin Film Based on Machine Learning (머신러닝 기반 페로브스카이트 태양전지 광흡수층 박막 최적화를 위한 연구)

  • Ha, Jae-jun;Lee, Jun-hyuk;Oh, Ju-young;Lee, Dong-geun
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.7
    • /
    • pp.55-62
    • /
    • 2022
  • The perovskite solar cell is an active part of research in renewable energy fields such as solar energy, wind, hydroelectric power, marine energy, bioenergy, and hydrogen energy to replace fossil fuels such as oil, coal, and natural gas, which will gradually disappear as power demand increases due to the increase in use of the Internet of Things and Virtual environments due to the 4th industrial revolution. The perovskite solar cell is a solar cell device using an organic-inorganic hybrid material having a perovskite structure, and has advantages of replacing existing silicon solar cells with high efficiency, low cost solutions, and low temperature processes. In order to optimize the light absorption layer thin film predicted by the existing empirical method, reliability must be verified through device characteristics evaluation. However, since it costs a lot to evaluate the characteristics of the light-absorbing layer thin film device, the number of tests is limited. In order to solve this problem, the development and applicability of a clear and valid model using machine learning or artificial intelligence model as an auxiliary means for optimizing the light absorption layer thin film are considered infinite. In this study, to estimate the light absorption layer thin-film optimization of perovskite solar cells, the regression models of the support vector machine's linear kernel, R.B.F kernel, polynomial kernel, and sigmoid kernel were compared to verify the accuracy difference for each kernel function.

Research on Cross-border Practice and Communication of Dance Art in the New Media Environment (뉴미디어 환경에서 무용예술의 크로스오버 실현과 전파에 대한 연구)

  • Zhang, Mengni;Zhang, Yi
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.1
    • /
    • pp.47-57
    • /
    • 2019
  • The end of the 20th century, along with the popularity of new media technology and the rise of new media art, dance as a visual art, and body language art, has the features of more and more rich and changeful. In today's Internet booming new media environment, many different fields, such as film and theater, computer technology, digital art, etc.) with its commonness and characteristics of all kinds of interaction between the creation, produced a new interdisciplinary research with theoretical model. When cross-border interactions between various areas become a hot topic at the same time, the traditional form of dance performances are also seeking new breakthrough. Canada's famous social psychologist McLuhan believes that modern is retrieving lost over a long period of time "overall" feel, return to a feeling of equilibrium. The audience how to have the characteristics of focus on details of visual art back to the "overall" feel worthy of study. At the same time, the new media in today's digital dance teaching in colleges and universities dancing education remains to be perfect and popular, if continue to use the precept of the traditional teaching way blindly, so it is difficult to get from the development of the current domestic dance overall demand. In this paper, the main body is divided into two parts, the first chapter is the study of image device dance performance art, the second chapter is the research of digital dance teaching application system, thus further perspective of media technology to explore dance art crossover practice under the new media environment and mode of transmission.

Psychosocial Characteristics of Infants with Genital Anomalies and Their Caregivers (생식기 기형을 가진 영유아와 모의 심리 사회적 특성)

  • Lee, Ji-Yeon;Chung, Kyong-Mee;Han, Sang-Won;Jo, Sang Hee;Jung, Hyun Jin;Im, Young Jae
    • Korean Journal of Health Psychology
    • /
    • v.16 no.1
    • /
    • pp.169-187
    • /
    • 2011
  • The present study explored psychosocial characteristics of infants with genital anomalies (GA) and their caregivers against normal controls. Participants were female caregivers and infants between the ages of 6to38months diagnosed with hypospadias(HS;n=103) or cryptorchidism (CR;n=49). Normalcontrols(n=131) were recruited and selected via Internet. Caregivers completed measures on parenting stress, coping style, social support, and infant temperament. Within the GAgroups, HScaregivers reported their greatest parental concerns as infant urination/bodily functioning difficulties whereas CRcaregivers reported worries related to surgical anesthesia issues. Both groups reported concern about their children's potential reproductive problems. Per caregiver report, infants with GA had lower ability to self-soothe. HS infants in particular were perceived as exhibiting greater negative emotion. Compared with controls, HS and CRcaregivers overall employed coping strategies more frequently and had lower interpersonal sensitivity and parental distress. However, HScaregivers emerged as experiencing higher stress when compared to the CRgroup. There were no differences in to tal parenting stress and social support scores between groups. Further, CRcaregivers reported lower levels of family discord than controls. Despite temperament-related differences between infants with GA and normal controls, HS and CRcaregivers reported lower parental distress and greater use of coping skills as compared to controls. Clinical implications are discussed.

Metadata extraction using AI and advanced metadata research for web services (AI를 활용한 메타데이터 추출 및 웹서비스용 메타데이터 고도화 연구)

  • Sung Hwan Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.499-503
    • /
    • 2024
  • Broadcasting programs are provided to various media such as Internet replay, OTT, and IPTV services as well as self-broadcasting. In this case, it is very important to provide keywords for search that represent the characteristics of the content well. Broadcasters mainly use the method of manually entering key keywords in the production process and the archive process. This method is insufficient in terms of quantity to secure core metadata, and also reveals limitations in recommending and using content in other media services. This study supports securing a large number of metadata by utilizing closed caption data pre-archived through the DTV closed captioning server developed in EBS. First, core metadata was automatically extracted by applying Google's natural language AI technology. The next step is to propose a method of finding core metadata by reflecting priorities and content characteristics as core research contents. As a technology to obtain differentiated metadata weights, the importance was classified by applying the TF-IDF calculation method. Successful weight data were obtained as a result of the experiment. The string metadata obtained by this study, when combined with future string similarity measurement studies, becomes the basis for securing sophisticated content recommendation metadata from content services provided to other media.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

Design and Implementation of Web Based Instruction Based on Constructivism for Self-Directed Learning Ablity (구성주의 이론에 기반한 자기주도적 웹 기반 교육의 설계와 구현)

  • Kim Gi-Nam;Kim Eui-Jeong;Kim Chang-Suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.855-858
    • /
    • 2006
  • First of all, Developing information technology makes it possible to change a paradigm of all kinds of areas, including an education. Students can choose learning goals and objects themselves and acquire not the accumulation of knowledge but the method of their learning. Moreover, Teachers get to be adviser, and students play a key role in teaming. That is, the subject of leaning is students. Constructivism emphasizes the student-oriented environment of education, which corresponds to the characteristics of hypeimedia. In addition, Internet allows us to make a practical plan for constructivism. Web Based Internet provides us with a proper environment to make constructivism practice md causes an education system to change. Sure Web Based Instruction makes them motivated to learn more, they can gain plenty of information regardless of places or time. Besides, they are able to consult more up-to-date information regarding their learning use hypermedia such as an image, audio, video, and test, and effectively communicate with their instructor through a board, an e-mail, a chatting etc. A school and instructors have been making effort to develop a new model of a teaching method to cope with a new environment change. In this thesis, with 'Design and Implementation of Web Based Instruction Based on Constructivism', providing online learner-oriented and indexed video lesson, learners can get chance of self-oriented learning. In addition, learners doesn't have to cover all contents of a lesson but can choose contents they want to have from a indexed list of a lesson, and they ran search contents they want to have with a 'Keyword Search' on a main page, which can make learners improve learner's achievement.

  • PDF

Mobile Camera-Based Positioning Method by Applying Landmark Corner Extraction (랜드마크 코너 추출을 적용한 모바일 카메라 기반 위치결정 기법)

  • Yoo Jin Lee;Wansang Yoon;Sooahm Rhee
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.6_1
    • /
    • pp.1309-1320
    • /
    • 2023
  • The technological development and popularization of mobile devices have developed so that users can check their location anywhere and use the Internet. However, in the case of indoors, the Internet can be used smoothly, but the global positioning system (GPS) function is difficult to use. There is an increasing need to provide real-time location information in shaded areas where GPS is not received, such as department stores, museums, conference halls, schools, and tunnels, which are indoor public places. Accordingly, research on the recent indoor positioning technology based on light detection and ranging (LiDAR) equipment is increasing to build a landmark database. Focusing on the accessibility of building a landmark database, this study attempted to develop a technique for estimating the user's location by using a single image taken of a landmark based on a mobile device and the landmark database information constructed in advance. First, a landmark database was constructed. In order to estimate the user's location only with the mobile image photographing the landmark, it is essential to detect the landmark from the mobile image, and to acquire the ground coordinates of the points with fixed characteristics from the detected landmark. In the second step, by applying the bag of words (BoW) image search technology, the landmark photographed by the mobile image among the landmark database was searched up to a similar 4th place. In the third step, one of the four candidate landmarks searched through the scale invariant feature transform (SIFT) feature point extraction technique and Homography random sample consensus(RANSAC) was selected, and at this time, filtering was performed once more based on the number of matching points through threshold setting. In the fourth step, the landmark image was projected onto the mobile image through the Homography matrix between the corresponding landmark and the mobile image to detect the area of the landmark and the corner. Finally, the user's location was estimated through the location estimation technique. As a result of analyzing the performance of the technology, the landmark search performance was measured to be about 86%. As a result of comparing the location estimation result with the user's actual ground coordinate, it was confirmed that it had a horizontal location accuracy of about 0.56 m, and it was confirmed that the user's location could be estimated with a mobile image by constructing a landmark database without separate expensive equipment.

Teacher's Practice of Activity Materials in the Housing Area of Middle School Technology & Home Economics Textbook (중학교 교사의 기술.가정 주생활영역 활동자료 활용실태)

  • Lee, Young-Doo;Cho, Jea-Soon
    • Journal of Korean Home Economics Education Association
    • /
    • v.20 no.4
    • /
    • pp.157-171
    • /
    • 2008
  • The year of 2007 Reformed Curriculum encourages various activity materials in the textbook facilitate students oriented self-help learning. The purpose of this paper is to find out how much the activity materials in housing area of middle school Technology and Home Economics are practiced in the class and why they are used or not used. The data were collected from 253 middle school teachers who had ever taught the housing unit in any of 6 textbooks. The analyses indicated that the most frequent teaching methode was lecture based on the textbook and internet data focused on the figures and contents of the individual textbook. The average rate of practicing the activity materials was differ by textbooks and the characteristics of the materials such as type of materials, feature of non sentence materials, and type of activity. The main two reasons to practice the activity materials were it's adequacy to class goals and application to everyday life. Low interests of students and shortage of time were the two main reasons why not used the materials. Textbook writers should consider these reasons as well as the characteristics of activity materials practiced in the class by the teachers in order to meet the goals of the reformed as well as current curricula.

  • PDF

Improving the Accuracy of Document Classification by Learning Heterogeneity (이질성 학습을 통한 문서 분류의 정확성 향상 기법)

  • Wong, William Xiu Shun;Hyun, Yoonjin;Kim, Namgyu
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.3
    • /
    • pp.21-44
    • /
    • 2018
  • In recent years, the rapid development of internet technology and the popularization of smart devices have resulted in massive amounts of text data. Those text data were produced and distributed through various media platforms such as World Wide Web, Internet news feeds, microblog, and social media. However, this enormous amount of easily obtained information is lack of organization. Therefore, this problem has raised the interest of many researchers in order to manage this huge amount of information. Further, this problem also required professionals that are capable of classifying relevant information and hence text classification is introduced. Text classification is a challenging task in modern data analysis, which it needs to assign a text document into one or more predefined categories or classes. In text classification field, there are different kinds of techniques available such as K-Nearest Neighbor, Naïve Bayes Algorithm, Support Vector Machine, Decision Tree, and Artificial Neural Network. However, while dealing with huge amount of text data, model performance and accuracy becomes a challenge. According to the type of words used in the corpus and type of features created for classification, the performance of a text classification model can be varied. Most of the attempts are been made based on proposing a new algorithm or modifying an existing algorithm. This kind of research can be said already reached their certain limitations for further improvements. In this study, aside from proposing a new algorithm or modifying the algorithm, we focus on searching a way to modify the use of data. It is widely known that classifier performance is influenced by the quality of training data upon which this classifier is built. The real world datasets in most of the time contain noise, or in other words noisy data, these can actually affect the decision made by the classifiers built from these data. In this study, we consider that the data from different domains, which is heterogeneous data might have the characteristics of noise which can be utilized in the classification process. In order to build the classifier, machine learning algorithm is performed based on the assumption that the characteristics of training data and target data are the same or very similar to each other. However, in the case of unstructured data such as text, the features are determined according to the vocabularies included in the document. If the viewpoints of the learning data and target data are different, the features may be appearing different between these two data. In this study, we attempt to improve the classification accuracy by strengthening the robustness of the document classifier through artificially injecting the noise into the process of constructing the document classifier. With data coming from various kind of sources, these data are likely formatted differently. These cause difficulties for traditional machine learning algorithms because they are not developed to recognize different type of data representation at one time and to put them together in same generalization. Therefore, in order to utilize heterogeneous data in the learning process of document classifier, we apply semi-supervised learning in our study. However, unlabeled data might have the possibility to degrade the performance of the document classifier. Therefore, we further proposed a method called Rule Selection-Based Ensemble Semi-Supervised Learning Algorithm (RSESLA) to select only the documents that contributing to the accuracy improvement of the classifier. RSESLA creates multiple views by manipulating the features using different types of classification models and different types of heterogeneous data. The most confident classification rules will be selected and applied for the final decision making. In this paper, three different types of real-world data sources were used, which are news, twitter and blogs.

Impact of Health Risk Factors on the Oral Health of Korean Adolescents: Korea Youth Risk Behavior Web-Based Survey, 2013 (우리나라 청소년의 건강위험요인이 구강건강에 미치는 영향)

  • Do, Kyung-Yi
    • Journal of dental hygiene science
    • /
    • v.16 no.3
    • /
    • pp.193-199
    • /
    • 2016
  • The objective of this study was to investigate the relationship between health-risk factors and oral health in Korean adolescents. This cross-sectional study was based on the 9th Korea Youth Risk Behavior Web-Based Survey (2013). The final participation rate in the survey was 96.4%. of a Total of 72,435 adolescents (age, 12~18 years) who had participated in the survey, 66,951 adolescents (33,777 boys and 33,174 girls) were selected for analysis, after excluding those with missing data. The key variables were oral health factors (one or more of the six oral symptoms), general characteristics (five factors), and health-risk factors (five factors). After adjusting for the general characteristics, frequency analysis, ${\chi}^2-test$ using PASW Statistics ver. 18.0, and logistic regression analysis were performed to understand the effects of health risk-factors on the oral symptoms experienced by the study subjects. Subjects who answered 'Yes' for alcohol consumption had a 1.33 times higher risk of experiencing oral symptoms. Further, subjects who smoked were at a 1.2 times higher risk of experiencing oral symptoms. With regard to internet use, the risk of experiencing oral symptoms was 1.25 times higher for subjects who used the internet for 7 hours or more than for those who used it for less than 1 hour. Compared to those subjects who had not experienced violence in school, the odds ratio of subjects who had experienced it 3~4 times was 1.54-fold higher. The study found that health-risk factors were associated with oral symptom experience. Therefore, programs to understand health-risk factors and interventions should be developed for Korean adolescents and provided on a regular basis along with oral health education.