RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • 원격 교육 저작 시스템에 아바타 저작 기능의 적용

        박상의,이혜정,정석태 원광대학교 공업기술개발연구소 2003 工業技術開發硏究誌 Vol.23 No.-

        LipSynchro software development kit(SDK) that use in this paper existing two-dimensional stop image doing gear with motion creation engine, speech analysis, realization engine through accent analysis and pronunciation information creation module and lips image and entrain module of voice and create motion of avatar automatically graphicer avatar make can.

      • SCOPUSKCI등재

        A Study on Iconic Animation based on Object Modeling Technique

        Joung, Suck-Tae The Korea Institute of Information and Commucation 2008 Journal of information and communication convergen Vol.6 No.3

        We propose the iconic animation of the software requirement specifications by using the object and dynamic models of the object modeling technique(OMT) methodology. In order to produce the iconic animation, we use "graphical classes" and "icon transformations." In general, the graphical classes are defined for each class of the object diagram. The icon transformations which show the activities of the application are constructed by considering the meaning of the activities and are defined by either basic or compound icons. The icon transformations are added to the state diagrams to generate extended state diagrams. The animation system generates the header files and the code instantiating GUI from the object diagram having graphical classes. The system also generates "event methods" from the extended state diagrams. When the event methods are executed, the behavior of the events is animated by the icon transformations.

      • 공간 파서의 자동 생성 시스템에 대한 구현

        정석태(Suck-Tae Joung),정성태(Sung-Te Jung) 한국정보과학회 2001 한국정보과학회 학술발표논문집 Vol.28 No.2Ⅱ

        본 논문에서는 GUI(Graphical User Interface)를 사용하여 사용자가 상호 작용적으로 도형 언어(visual language)의 문법을 기술함으로서 자동으로 공간 파서를 생성하는 공간 파서 생성기 SPG(Spatial Parser Generator)의 구현에 대하여 논한다. 본 시스템의 장점은 다음과 같다. (1) 사용자가 도형 언어의 문법을 정의하고 실제로 파싱하고 싶은 도형 언어를 입력하는데 사용되는 도형 에디터를 가지고 있다. (2) 사용자가 도형을 이용하여 대략적인 문법을 자동으로 생성한 뒤, 수정하여 최종적인 문법을 정의하도록 한다. (3) 제약 해소기(Constraint solver)를 가지고 있어서 파싱된 도형 언어들이 그 생성 규칙에 쓰여져 있는 제약을 유지한다.

      • SCIESCOPUS

        Rescue endoscopic band ligation of iatrogenic gastric perforations following failed endoclip closure.

        Han, Joung-Ho,Lee, Tae Hoon,Jung, Yunho,Lee, Suck-Ho,Kim, Hyun,Han, Hye-Suk,Chae, Heebok,Park, Seon Mee,Youn, Seijin WJG Press 2013 WORLD JOURNAL OF GASTROENTEROLOGY Vol.19 No.6

        <P>Iatrogenic gastric perforation is one of the most serious complications during therapeutic endoscopy, despite significant advances in endoscopic techniques and devices. This case study evaluated the clinical efficacy and safety of the rescue endoscopic band ligation (EBL) technique in iatrogenic gastric wall perforation following the failure of primary endoclip closure. Five patients were enrolled in this study. These patients underwent emergency endoscopy following the onset of acute gastric wall perforation during endoscopic procedures. The outcome measurements were primary technical success and immediate or delayed procedure-related complications. Successful endoscopic closure using band ligation was reported in all patients, with no complication occurring. We conclude that EBL may be a feasible and safe alternate technique for the management of acute gastric perforation, especially in cases where closure is difficult with endoclips.</P>

      • SCOPUSKCI등재

        Sr<sup>2+</sup> Ion Selective p-tert-Butylthiacalix[4]arene Bearing Two Distal Amide Units

        Kim, Tae-Hyun,Kim, Ha-Suck,Lee, Joung-Hae,Kim, Jong-Seung Korean Chemical Society 2008 Bulletin of the Korean Chemical Society Vol.29 No.3

        A new thiacalix[4]arene diamide (TCAm) has been prepared and its electrochemical property and complexation behavior toward various metal ions have been investigated by voltammetry. p-tert-Butylthiacalix[4]arene diamide (TCAm) exhibited selectivity toward Sr2+ ion over alkali, alkaline earth and transition metal ions while conventional calix[4]arene diamides showed selective binding property with Ca2+ ion. This is probably due to the bigger size of thiacalix[4]arene than those of calix[4]arene.

      • KCI등재

        Research on Data Acquisition Strategy and Its Application in Web Usage Mining

        Cong-Lin Ran(염종림),Suck-Tae Joung(정석태) 한국정보전자통신기술학회 2019 한국정보전자통신기술학회논문지 Vol.12 No.3

        웹 사용 마이닝 (WUM)은 웹 마이닝과 데이터 마이닝 기술의 응용 중의 하나다. 웹 마이닝 기술은 사용자가 웹 사이트에 액세스 할 때 웹 사용자가 생성 한 웹 서버 로그 데이터를 사용하여 사용자의 액세스 패턴을 식별하고 분석하는데 사용된다. 따라서 우선 데이터 마이닝 기술을 적용하여 웹 로그에서 사용자 액세스 패턴을 발견하기 전에 합리적인 방법으로 데이터를 수집해야 한다. 데이터 수집의 중요한 일은 사용자의 웹 사이트 방문 과정에서 사용자의 자세한 클릭 동작을 효율적으로 얻는 것이다. 이 논문은 주로 데이터 수집 전략 및 필드 추출 알고리즘과 같은 웹 사용 마이닝 데이터프로세스의 첫 단계 이전의 데이터 수집 단계에 중점을 둔다. 필드 추출 알고리즘은 로그 파일에서 필드를 분리하는 프로세스를 수행하며 대용량의 사용자 데이터에 대한 실제 응용에도 사용된다. Web Usage Mining (WUM) is one part of Web mining and also the application of data mining technique. Web mining technology is used to identify and analyze user’s access patterns by using web server log data generated by web users when users access web site. So first of all, it is important that the data should be acquired in a reasonable way before applying data mining techniques to discover user access patterns from web log. The main task of data acquisition is to efficiently obtain users" detailed click behavior in the process of users" visiting Web site. This paper mainly focuses on data acquisition stage before the first stage of web usage mining data process with activities like data acquisition strategy and field extraction algorithm. Field extraction algorithm performs the process of separating fields from the single line of the log files, and they are also well used in practical application for a large amount of user data.

      • KCI등재

        User Access Patterns Discovery based on Apriori Algorithm under Web Logs

        Cong-Lin Ran(염종림),Suck-Tae Joung(정석태) 한국정보전자통신기술학회 2019 한국정보전자통신기술학회논문지 Vol.12 No.6

        웹 사용 패턴 발견은 웹 로그 데이터를 사용하는 고급 수단이며 웹 로그 데이터 마이닝에 데이터 마이닝 기술을 적용한 특정 응용이다. 교육 분야에서 데이터 마이닝 (DM)은 데이터 마이닝 기술을 교육 데이터 (대학의 웹 로그, e-러닝, 적응형 하이퍼미디어 및 지능형 튜터링시스템 등)에 적용한다. 따라서 교육 연구 문제를 해결하기 위해 이러한 유형의 데이터를 분석하는 것이 목표이다. 본 논문에서는 대학의 웹 로그 데이터가 데이터 마이닝의 연구 대상으로 사용되어 진다. 데이터베이스 OLAP 기술을 사용하여 웹 로그 데이터가 데이터 마이닝에 사용될 수 있는 데이터 형식으로 사전 처리되고 그 처리 결과가 MSSQL에 저장된다. 동시에 처리 된 웹 로그 레코드를 기반으로 기본 데이터 통계 및 분석이 완료된다. 또한 웹 사용 패턴 마이닝의 Apriori Algorithm 및 구현 프로세스를 소개하고 Python 개발 환경에서 Apriori Algorithm 프로그램을 개발했다. 그런 다음 Apriori Algorithm의 성능을 보이고 웹 사용자 액세스 패턴의 마이닝을 실현했다. 이 연구 결과는 교육 시스템 개발에 패턴을 적용하는데 중요한 이론적 의미를 갖는다. 다음 연구로는 분산 컴퓨팅 환경에서 Apriori Algorithm의 성능 향상을 연구하는 것이다. Web usage pattern discovery is an advanced means by using web log data, and it"s also a specific application of data mining technology in Web log data mining. In education Data Mining (DM) is the application of Data Mining techniques to educational data (such as Web logs of University, e-learning, adaptive hypermedia and intelligent tutoring systems, etc.), and so, its objective is to analyze these types of data in order to resolve educational research issues. In this paper, the Web log data of a university are used as the research object of data mining. With using the database OLAP technology the Web log data are preprocessed into the data format that can be used for data mining, and the processing results are stored into the MSSQL. At the same time the basic data statistics and analysis are completed based on the processed Web log records. In addition, we introduced the Apriori Algorithm of Web usage pattern mining and its implementation process, developed the Apriori Algorithm program in Python development environment, then gave the performance of the Apriori Algorithm and realized the mining of Web user access pattern. The results have important theoretical significance for the application of the patterns in the development of teaching systems. The next research is to explore the improvement of the Apriori Algorithm in the distributed computing environment.

      • SCOPUSKCI등재

        Voltammetric Studies of Diazocalix[4]crown-6 for Metal Ion Sensing

        Dong, Yun-Yan,Kim, Tae-Hyun,Lee, Chang-Seuk,Kim, Hyun-Jung,Lee, Jae-Hong,Lee, Joung-Hae,Kim, Ha-Suck,Kim, Jong-Seung Korean Chemical Society 2010 Bulletin of the Korean Chemical Society Vol.31 No.12

        The complex formation between diazocalix[4]dipropyl (1) and diazocalix[4]crown-6 ether (2) with alkali, alkaline earth and transition metal ions was investigated by voltammetry. Electrochemical properties of compounds 1 and 2 and their selectivity toward metal ions were evaluated in $CH_3CN$ solution by comparison of voltammetric behaviors of two phenols in each compound. Compounds 1 and 2 showed almost same voltammetric behavior which is two irreversible oxidation peaks caused by intramolecular hydrogen bonding between two phenols in 1 and 2. While, however, upon interacting with various metal ions, 1 with two propyl ether groups showed no significant changes in voltammetry, 2 with crown ether group caused significant voltammetric changes upon the addition of $Ba^{2+}$ to 2. Their behavior is closely related to the complex formation by entrapment of metal ion into crown ether cavity, and ion-dipole interaction between metal ion and two phenolic groups in calix[4]crown-6.

      • KCI등재

        Edge Computing-Based Medical Information Platform for Automatic Authentication Using Patient Situations

        Gyu-Sung Ham,Mingoo Kang,Suck-Tae Joung,Su-Chong Joo 한국인터넷정보학회 2023 KSII Transactions on Internet and Information Syst Vol.17 No.4

        Recently, with the development of IoT, AI, and mobile terminals, medical information platforms are expanding. The medical information platform can determine a patient's emergency situation, and medical staff can easily access patient information through a mobile terminal. However, in the existing platform, emergency situation decision is delayed, and faster and stronger authentication is required in emergency situations. Therefore, we propose an edge computing-based medical information platform for automatic authentication using patient situations. We design an edge computing-based medical information platform architecture capable of rapid transmission of biometric data of IoT and quick emergency situation decision, and implement the platform data flow in emergency situations. Relying on this platform, we propose the automatic authentication using patient situations. The automatic authentication protects patient information through patient-centered authentication by using the patient's situation as an authentication factor, and enables quick authentication by automatically proceeding with mobile terminal authentication after user authentication in emergencies without user intervention. We compared the proposed platform with existing platforms to show that it can make quick and stable emergency decisions. In addition, comparing the automatic authentication with existing authentication showed that it is fast and protects medical information centered on patient situations in emergency situations.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼