http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
서비스 이용자의 지각된 위험이 AI추천시스템 이용의도에 미치는 영향
서상윤 ( Seo¸ Sangyun ) 경희대학교 경영연구원 2021 의료경영학연구 Vol.15 No.4
This study examines the intention to use, and the willingness to pay for an AI treatment recommendation system according to the disease severity and risk attitude of medical service users. To test the effects of disease severity and risk attitude on the medical service users’ intention to use AI treatment recommendation system, we compared the users’ intention and willingness to pay for the treatment on the assumption that they had mild disease such as a cold or severe disease such as a cancer. We also measured their risk-taking attitudes and categorized them into high-and low-risk-taking groups. Based on the results, respondents had a higher intention to use and willingness to pay for the AI treatment recommendation system for severe diseases than for mild ones. Furthermore, respondents with high risk-taking attitudes were more willing to use the AI treatment recommendation system than those with low risk-taking attitudes. The risk-taking attitude moderated the effect of disease severity on the intention to use and willingness to pay, as in the case of severe disease , the respondents had a strong intention to use it regardless of their risk-taking attitude, while in the case of mild diseases, the intention differed between the low and the high risk-taking groups.
Sangyun Kim,Heui Jae Pahk 한국광학회 2018 Current Optics and Photonics Vol.2 No.2
In semiconductor manufacturing, critical dimensions indicate the features of patterns formed by the semiconductor process. The purpose of measuring critical dimensions is to confirm whether patterns are made as intended. The deposition process for an organic light emitting diode (OLED) forms a luminous organic layer on the thin-film transistor electrode. The position of this organic layer greatly affects the luminescent performance of an OLED. Thus, a system for measuring the position of the organic layer from outside of the vacuum chamber in real-time is desired for monitoring the deposition process. Typically, imaging from large stand-off distances results in low spatial resolution because of diffraction blur, and it is difficult to attain an adequate industrial-level measurement. The proposed method offers a new superresolution single-image using a conversion formula between two different optical systems obtained by a deep learning technique. This formula converts an image measured at long distance and with low-resolution optics into one image as if it were measured with high-resolution optics. The performance of this method is evaluated with various samples in terms of spatial resolution and measurement performance.
Vulnerability Case Analysis of Wireless Moving Vehicle
Sangyun Oh,Jinkeun Hong 한국융합학회 2018 한국융합학회논문지 Vol.9 No.8
최근 드론 관련 산업이 활성화되면서 드론에 대한 대중들의 관심이 폭발적으로 증가하였고, 드론을 활용하는 사례 가 많이 늘어나고 있다. 군사용 드론의 경우 보안문제는 항공기나 순항미사일의 방어시스템 수준으로 보안이 철저하지만 상용 소형 저가형 드론들은 여전히 보안이 취약하거나 보안을 고려하지 않은 상태에서 출시되고 활용되는 경우가 많다. 이로 인하여 공격자가 쉽게 드론의 루트 권한을 얻고 내부 파일에 접근하거나 fake 패킷을 보내는 등의 드론 탈취 공격이 가능하다. 그런데 이 드론의 탈취 문제는 또 다른 위험한 공격으로 이어질 수 있다. 이런 측면에서 본 논문에서는 특정 드론의 통신과정에서 공격 사례를 중심으로 분석함으로써 상용 드론에 내재된 취약점을 확인하였다. 본 논문에서는 취약점 을 스캐닝 공격, 중간자 공격, 인증 철회공격, 패킷 중지 명령 공격, 패킷 재전송 공격, 신호 조작 및 디 컴파일 공격 관점에 서 접근하여 분석하고 실험하였다. 본 연구는 드론 공격과 취약점을 분석하는데 참고할 수 있는 유용한 연구로 사료된다. As the industry related to drones has been activated, the public interest in drones has increased explosively, and many cases of drone-using are increasing. In the case of military drones, the security problem is the level of defense of the aircraft or cruise missiles, but commercial small and low cost drones are often released and utilized without security count-measure. This makes it possible for an attacker to easily gain access to the root of the drones, access internal files, or send fake packets. However, this droning problem can lead to another dangerous attack. In this regard, this paper has identified the vulnerabilities inherent in the commercial drones by analyzing the attack cases in the communication process of the specific drones. In this paper, we analyze and test the vulnerability in terms of scanning attack, meson attack, authentication revocation attack, packet stop command attack, packet retransmission attack, signal manipulation and de-compile attack. This study is useful for the analysis of drones attack and vulnerability.
Resonant X-ray Scattering Study of Anisotropic Charge Distribution of Gd Ions in GdB4
Sangyun Hwang,Byeong-Gwan Cho,Tae-Young Koo,Sungdae Ji,Beongki Cho,Ki Bong Lee 한국물리학회 2020 THE JOURNAL OF THE KOREAN PHYSICAL SOCIETY Vol.76 No.6
Temperature dependence of anisotropic tensor susceptibility (ATS) scattering intensities of GdB4 were measured near L-edges of Gd to investigate how spin ordering affects ATS. ATS scattering intensities for L2- and L3-edges show different temperature dependence below TN. At L3-edge the intensities reflect spin order parameter while intensities at L2-edge do not show noticeable change. The difference is explained in terms of spin-orbit coupling and isotropic distribution of spin-polarized 5d states of Gd ions. Above TN ATS scattering intensities demonstrate that thermal motions enhance charge distribution anisotorpy of Gd 5d states in paramagnetic phase.
Extended Siamese Convolutional Neural Networks for Discriminative Feature Learning
Sangyun Lee,홍성준 한국지능시스템학회 2022 INTERNATIONAL JOURNAL of FUZZY LOGIC and INTELLIGE Vol.22 No.4
Siamese convolutional neural networks (SCNNs) has been considered as among the bestdeep learning architectures for visual object verification. However, these models involvethe drawback that each branch extracts features independently without considering the otherbranch, which sometimes lead to unsatisfactory performance. In this study, we propose a newarchitecture called an extended SCNN (ESCNN) that addresses this limitation by learningboth independent and relative features for a pair of images. ESCNNs also have a featureaugmentation architecture that exploits the multi-level features of the underlying SCNN. Theresults of feature visualization showed that the proposed ESCNN can encode relative anddiscriminative information for the two input images at multi-level scales. Finally, we appliedan ESCNN model to a person verification problem, and the experimental results indicate thatthe ESCNN achived an accuracy of 97.7%, which outperformed an SCNN model with 91.4%accuracy. The results of ablation studies also showed that a small version of the ESCNNperformed 5.6% better than an SCNN model.
Validation of an Acoustic Finite Element Model of an Automobile Passenger Compartment
Sangyun Lee(이상윤),Joohyung Lee(이주형),Kwangseo Park(박광서),Youngho Kim(김영호) 한국자동차공학회 2010 한국자동차공학회 부문종합 학술대회 Vol.2010 No.5
An acoustic finite-element model of an automobile passenger compartment that represents the more complicated vehicle interior acoustic characteristics is developed and experimentally assessed using loudspeaker excitation. The acoustic finite-element model represents the passenger compartment cavity, trunk compartment cavity, front and rear seats, parcel shelf, door volumes, and IP (Instrument Panel) volume. The model accounts for the coupling between the compartment cavity and trunk cavity through the rear seat and parcel shelf, and the coupling between the compartment cavity and the door and IP panel volumes. Modal analysis tests of a vehicle were conducted using loudspeaker excitation to identify the compartment cavity modes and sound pressure response at a large number of interior locations. Comparisons of the predicted versus measured mode frequencies, mode shapes, and sound pressure response at the occupant ear locations are made to assess the accuracy of the model to 400 Hz.