• Title/Summary/Keyword: 가는 막대

Search Result 196, Processing Time 0.025 seconds

Study on Pile Cloth Rugs Produced after the Late Joseon Period (조선 말기 이후 첨모직 깔개에 관한 연구)

  • Park, Yoon-Mee;Oh, Joon Suk
    • Korean Journal of Heritage: History & Science
    • /
    • v.51 no.4
    • /
    • pp.84-107
    • /
    • 2018
  • Cheommojik is a pile cloth, a type of textile whose surface is covered with short piles. The term chaedam was used during the late Joseon dynasty to refer to pile cloth rugs, while the terms yoongjeon, dantong and yangtanja were used in the early twentieth century. Various documents, newspaper articles and photographs confirm that pile cloth rugs were used by the general public as well as the royal family from the late Joseon dynasty onward, and that there were domestic manufacturers of such rugs at that time. This study investigated six pile cloth rugs that were produced after the late Joseon dynasty, five of which feature Persian knots made of cut pile, the other being made with the loop pile method. The cut pile rugs are rectangular in shape and measure between 72-98cm by 150-156cm; and they are decorated in the middle with patterns of butterfly, deer, and tiger or the ten longevity symbols, and along the edges with patterns composed of 卍 symbols. The ground warp of all six rugs are made from cotton yarn, while the ground weft is made of cotton yarn on three pieces, wool on one piece and cotton and viscose rayon. The ground weft yarn from four pieces are Z-twist yarn made with two or more S-twist cotton yarn. Four to six colors were used for the pile weft, all being natural colors except for red. Two or more S- or Z-twist yarn were twisted together in the opposite twist for the pile weft, with the thickness determining the number of threads used. Six or more weft threads were used to make the start and end points of the rug; and the ground warp ends were arranged by tying every four of them together. For the left and right edges, three or more threads were wrapped together into a round stick-like form, and the second and third inner ground warps from the edges were stitched on to the wrapped edge. For the loop pile, loops were made in the direction of the warp; the ground warp and the ground weft may have been made with cotton, the pile warp with wool yarn. An analysis of the components of three rugs was conducted to determine which types of animal hair were used for the pile weft. Despite some inconclusive results, it was revealed that goat hair and fat-tailed sheep hair were used, raising the possibility that various kinds of animal fur were used in the production of pile cloth rugs. The six rugs examined in this study are estimated to have been made between the late 1800s and the early 1900s. Although the manufacturer of the rugs cannot be confirmed, we concluded that the rugs were produced in Korea after referring to the documentation of the domestic production of pile cloth rugs during the aforementioned period and the form and placements of the patterns on the rugs.

CELL CULTURE STUDIES OF MAREK'S DISEASE ETIOLOGICAL AGENT (조직배양(組織培養)에 의한 Marek 병(病) 병원체(病原體)의 연구(硏究))

  • Kim, Uh-Ho
    • Korean Journal of Veterinary Research
    • /
    • v.9 no.1
    • /
    • pp.23-62
    • /
    • 1969
  • Throughout the studies the following experimental results were obtained and are summarized: 1. Multiplication of agents in primary cell cultures of both GF classical and CR-64 acute strain of Marek's disease infected chicken kidneys was accompanied by the formation of distinct transformed cell foci. This characteristic nature of cell transformation was passaged regularly by addition of dispersed cell from infected cultures to normal chicken kidney cell cultures, and also transferred was the nature of cell transformation to normal chick-embryo liver and neuroglial cell cultures. No cytopathic changes were noticed in inoculated chick-embryo fibroblast cultures. 2. The same cytopathic effects were noticed in normal kidney cell monolayers after the inoculation of whole blood and huffy coat cells derived from both forms of Marek's disease infected chickens. In these cases, however, the number of transformed cell foci appearing was far less than that of uninoculated monolayers prepared directly from the kidneys of Marek's disease infected chickens. 3. The change in cell culture IS regarded as a specific cell transformation focus induced by an oncogenic virus rather than it plaque in slowly progressing cytopathic effect by non-oncogenic viruses, and it is quite similar to RSV focus in chick-embryo fibroblasts in many respects. 4. The infective agent (cell transformable) were extremely cell-associated and could not be separated in an infective state from cells under the experimental conditions. 5. The focus assay of these agents was valid as shown by the high degree of linear correlation (r=0.97 and 0.99) between the relative infected cell concentration (in inoculum) and the transformed cell foci counted. 6. No differences were observed between the GF classical strain and the CR-64 acute strain of Marek's disease as far as cell culture behavior. 7. Characterization of the isolates by physical and chemical treatments, development of internuclear inclusions in Infected cells, and nucleic acid typing by differential stainings and cytochemical treatments indicated that the natures of these cell transformation agents closely resemble to those described fer the group B herpes viruses. 8. Susceptible chicks inoculated with infected kidney tissue culture cells developed specific lesions of Marek's disease, and in a case of prolonged observation after inoculation (5 weeks) the birds developed clinical symptoms and gross lesions of Marek's disease. Kidney cell cultures prepared from those inoculated birds and sacrificed showed a superior recovery of cell transformation property by formation of distinct foci. 9. Electron microscopic study of infected kidney culture cells (GF agent) by negative staining technique revealed virus particles furnishing the properties of herpes viruses. The particle was measured about $100m{\mu}$ and, so far, no herpes virus envelop has been seen from these preparations. 10. No relationship of both isolates to avian leukosis/sarcoma group viruses and PPLO was observed.

  • PDF

Studies on the Virus in Silkworm Bombyx mori L. -Resistance to Virus Disease- (가잠 Virus에 관한 연구 -저항성에 관한 기초조사-)

  • 박광의;강석권
    • Journal of Sericultural and Entomological Science
    • /
    • v.9
    • /
    • pp.67-87
    • /
    • 1969
  • 1. Objectives and Importance. Many silkworms have been damaged by nuclear polyhedrosis virus diseases thoughout the country every year causing a decease in cocoon production by approximately ten per cent per year. The damage caused by the infections virus has occured in spite of complete disinfection. In this respect, it is well known it is impossible, at the present time, to protect the silkworm from these virus infections through chemical and physical control methods. Therefore, this author has attempted to solve this urgent problem from the view point of heredity and breeding, discovering the different resistances and heritabilities among 120 stains collected from throughout the country, and selecting the ones with highest resistance for the basic materials in the silkworm breeding. 2. Results of work 1) The strains with strong resistance to the nuclear polyhedrosis virus diseases are N$_4$, N$\sub$15/, N$\sub$48/, C$\sub$55/ and Em. the log ED$\sub$50/ values of them vary between 0.799 and 1.611. The susceptible strains are N$\sub$20/, C$\sub$62/, N$\sub$76/, N$\sub$79/ and C$\sub$108/, the log ED$\sub$50/ values of them vary between 5.159 and 7.258. (Reference Table 4) The Japanese strain with a log ED$\sub$50/, value of 3.770 is the strongest, followed by the Chinese strain with a log ED$\sub$50/ value of 3.564. The weakest is the European strain with a log ED$\sub$50/ value of 3.3381. The direction coefficient of the regression equation of the susceptibility varies between 0.1 and 0.6, the uniformness of the resistance of the preserved strains of this country is comparatively low. The hereditary henomena of the resistance of each strain and the conerete method of its application for silkworm breeding main the subjects for later studies. 2) The content of water and ash in silkworm has not been correlated with the capability for resistance to the virus diseases(Reference. Table 8). but it is very significantly correlated with mortality rate (in common reaning). In the case of the silkworms which have just completed the fourth moulting the content of water and ash is not related to the mortality rate. In the case of the silkworms which have just completed the third moulting, however, the water( +0.326) and ash (+0.362) registered a high significance. The ash content in the first ($\div$0.520) and second ($\div$0.386) moults is highly significant but water content in both cases is not significant (Reference Table 7). 3) The No. 205 strain proved to be the best in character among the various F$_1$ hybrids. No. 204 was very good in strength but a little lower in cocoon character than the control. No. 212 was a little low in coccon character and mortality was average, but the cocoon harvest was the best among all the varieties offered for (Reference Table 9). 4), In short, the above mentioned strains which are known to have strong resistance to the virus disease are expected to provide basic data for breeding strong varieties. It is proposed that continued research should be conducted on the characteristics of various strains for a satisfactory preservation of various characteristics.research should be conducted on the characteristics of various strains for a satisfactory preservation of various characteristics.

  • PDF

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

Environmental Interpretation on soil mass movement spot and disaster dangerous site for precautionary measures -in Peong Chang Area- (산사태발생지(山沙汰發生地)와 피해위험지(被害危險地)의 환경학적(環境學的) 해석(解析)과 예방대책(豫防對策) -평창지구(平昌地區)를 중심(中心)으로-)

  • Ma, Sang Kyu
    • Journal of Korean Society of Forest Science
    • /
    • v.45 no.1
    • /
    • pp.11-25
    • /
    • 1979
  • There was much mass movement at many different mountain side of Peong Chang area in Kwangwon province by the influence of heavy rainfall through August/4 5, 1979. This study have done with the fact observed through the field survey and the information of the former researchers. The results are as follows; 1. Heavy rainfall area with more than 200mm per day and more than 60mm per hour as maximum rainfall during past 6 years, are distributed in the western side of the connecting line through Hoeng Seong, Weonju, Yeongdong, Muju, Namweon and Suncheon, and of the southern sea side of KeongsangNam-do. The heavy rain fan reason in the above area seems to be influenced by the mouktam range and moving direction of depression. 2. Peak point of heavy rainfall distribution always happen during the night time and seems to cause directly mass movement and serious damage. 3. Soil mass movement in Peongchang break out from the course sandy loam soil of granite group and the clay soil of lime stone and shale. Earth have moved along the surface of both bedrock or also the hardpan in case of the lime stone area. 4. Infiltration seems to be rapid on the both bedrock soil, the former is by the soil texture and the latter is by the crumb structure, high humus content and dense root system in surface soil. 5. Topographic pattern of mass movement spot is mostly the concave slope at the valley head or at the upper part of middle slope which run-off can easily come together from the surrounding slope. Soil profile of mass movement spot has wet soil in the lime stone area and loose or deep soil in the granite area. 6. Dominant slope degree of the soil mass movement site has steep slope, mostly, more than 25 degree and slope position that start mass movement is mostly in the range of the middle slope line to ridge line. 7. Vegetation status of soil mass movement area are mostly fire field agriculture area, it's abandoned grass land, young plantation made on the fire field poor forest of the erosion control site and non forest land composed mainly grass and shrubs. Very rare earth sliding can be found in the big tree stands but mostly from the thin soil site on the un-weatherd bed rock. 8. Dangerous condition of soil mass movement and land sliding seems to be estimated by the several environmental factors, namely, vegetation cover, slope degree, slope shape and position, bed rock and soil profile characteristics etc. 9. House break down are mostly happen on the following site, namely, colluvial cone and fan, talus, foot area of concave slope and small terrace or colluvial soil between valley and at the small river side Dangerous house from mass movement could be interpreted by the aerial photo with reference of the surrounding site condition of house and village in the mountain area 10. As a counter plan for the prevention of mass movement damage the technics of it's risk diagnosis and the field survey should be done, and the mass movement control of prevention should be started with the goverment support as soon as possible. The precautionary measures of house and village protection from mass movement damage should be made and executed and considered the protecting forest making around the house and village. 11. Dangerous or safety of house and village from mass movement and flood damage will be indentified and informed to the village people of mountain area through the forest extension work. 12. Clear cutting activity on the steep granite site, fire field making on the steep slope, house or village construction on the dangerous site and fuel collection in the eroded forest or the steep forest land should be surely prohibited When making the management plan the mass movement, soil erosion and flood problem will be concidered and also included the prevention method of disaster.

  • PDF

Development of a complex failure prediction system using Hierarchical Attention Network (Hierarchical Attention Network를 이용한 복합 장애 발생 예측 시스템 개발)

  • Park, Youngchan;An, Sangjun;Kim, Mintae;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.4
    • /
    • pp.127-148
    • /
    • 2020
  • The data center is a physical environment facility for accommodating computer systems and related components, and is an essential foundation technology for next-generation core industries such as big data, smart factories, wearables, and smart homes. In particular, with the growth of cloud computing, the proportional expansion of the data center infrastructure is inevitable. Monitoring the health of these data center facilities is a way to maintain and manage the system and prevent failure. If a failure occurs in some elements of the facility, it may affect not only the relevant equipment but also other connected equipment, and may cause enormous damage. In particular, IT facilities are irregular due to interdependence and it is difficult to know the cause. In the previous study predicting failure in data center, failure was predicted by looking at a single server as a single state without assuming that the devices were mixed. Therefore, in this study, data center failures were classified into failures occurring inside the server (Outage A) and failures occurring outside the server (Outage B), and focused on analyzing complex failures occurring within the server. Server external failures include power, cooling, user errors, etc. Since such failures can be prevented in the early stages of data center facility construction, various solutions are being developed. On the other hand, the cause of the failure occurring in the server is difficult to determine, and adequate prevention has not yet been achieved. In particular, this is the reason why server failures do not occur singularly, cause other server failures, or receive something that causes failures from other servers. In other words, while the existing studies assumed that it was a single server that did not affect the servers and analyzed the failure, in this study, the failure occurred on the assumption that it had an effect between servers. In order to define the complex failure situation in the data center, failure history data for each equipment existing in the data center was used. There are four major failures considered in this study: Network Node Down, Server Down, Windows Activation Services Down, and Database Management System Service Down. The failures that occur for each device are sorted in chronological order, and when a failure occurs in a specific equipment, if a failure occurs in a specific equipment within 5 minutes from the time of occurrence, it is defined that the failure occurs simultaneously. After configuring the sequence for the devices that have failed at the same time, 5 devices that frequently occur simultaneously within the configured sequence were selected, and the case where the selected devices failed at the same time was confirmed through visualization. Since the server resource information collected for failure analysis is in units of time series and has flow, we used Long Short-term Memory (LSTM), a deep learning algorithm that can predict the next state through the previous state. In addition, unlike a single server, the Hierarchical Attention Network deep learning model structure was used in consideration of the fact that the level of multiple failures for each server is different. This algorithm is a method of increasing the prediction accuracy by giving weight to the server as the impact on the failure increases. The study began with defining the type of failure and selecting the analysis target. In the first experiment, the same collected data was assumed as a single server state and a multiple server state, and compared and analyzed. The second experiment improved the prediction accuracy in the case of a complex server by optimizing each server threshold. In the first experiment, which assumed each of a single server and multiple servers, in the case of a single server, it was predicted that three of the five servers did not have a failure even though the actual failure occurred. However, assuming multiple servers, all five servers were predicted to have failed. As a result of the experiment, the hypothesis that there is an effect between servers is proven. As a result of this study, it was confirmed that the prediction performance was superior when the multiple servers were assumed than when the single server was assumed. In particular, applying the Hierarchical Attention Network algorithm, assuming that the effects of each server will be different, played a role in improving the analysis effect. In addition, by applying a different threshold for each server, the prediction accuracy could be improved. This study showed that failures that are difficult to determine the cause can be predicted through historical data, and a model that can predict failures occurring in servers in data centers is presented. It is expected that the occurrence of disability can be prevented in advance using the results of this study.