• Title/Summary/Keyword: 김규

Search Result 581, Processing Time 0.024 seconds

Petrochemistry of the Soyeonpyeong titaniferous iron ore deposits, South Korea (소연평도 함티타늄 자철광상의 암석지구화학적 연구)

  • Kim, Kyu Han;Lee, Jung Eun
    • Economic and Environmental Geology
    • /
    • v.27 no.4
    • /
    • pp.345-361
    • /
    • 1994
  • Lens shaped titanomagnetite ore bodies in the Soyeonpyeong iron mine are embedded in amphibolites, which were intruded into Precambrian metasediments such as garnet-mica schist, marble, mica schist, and quartz schist. Mineral chemistry, K-Ar dating and hydrogen and oxygen stable isotopic analysis for the amphibolites and titanomagnetite ores were conducted to interpret petrogenesis of amphibolite and ore genesis of titanomagnetite iron ore deposits. Amphibolites of igneous origin have unusually high content of $TiO_2$, ranging from 0.94 to 6.39 wt.% with an average value of 4.05 wt.%. REE patterns of the different lithology of the amphibolite show the similar trend with an enrichment of LREE. Amphiboles of amphibolites are consist mainly of calcic amphiboles such as ferro-hornblende, tschermakite, ferroan pargasite, and ferroan pargasitic hornblende. K-Ar ages of hornblende from amphibolite and gneissic amphibolite were determined as $440.04{\pm}6.39Ma$ and $351.03{\pm}5.21Ma$, respectively. This indicates two metamorphic events of Paleozoic age in the Korean peninsula which are correlated with Altin orogeny in China. The titanomagnetite mineralization seems to have occurred before Cambrian age based on occurrence of orebodies and ages of host amphibolites. The Soyeonpyeong iron ores are composed mainly of titanomagnetite, ilmenite, and secondary minerals such as ilmenite and hercynite exsolved in titanomagnetite. The temperature and the oxygen fugacity estimated by the titanomagnetite-ilmenite geothermometer are $500{\sim}600^{\circ}C$ (ave. $550^{\circ}C$) and about $2{\pm}10^{-23}bar$, respectively. Hornblendes from ores and amphibolites which responsible for magnetite ore mineralization, have a relatively homogeneous isotopic composition ranging from +0.8 to +3.9 ‰ in ${\delta}^{18}O$ and from -87.8 to -113.3 ‰ in ${\delta}D$. The calculated oxygen and hydrogen isotopic compositions of the fluids which were in equilibrium with hornblende at $550^{\circ}C$, range from 2.8 to 5.9‰ in ${\delta}^{18}O_{H2O}$ and from -60.41 to -81.31 ‰ in ${\delta}D_{H2O}$. The ${\delta}^{18}O_{H2O}$ value of magnetite ore fluids are in between +6.4 to + 7.9 ‰. All of these values fall in the range of primary magmatic water. A slight oxygen shift means that $^{18}O$-depleted meteoric water be acted with basic fluids during immiscible processes between silicate and titaniferous oxide melt. Mineral chemistry, isotopic compositions, and occurences of amphibolites and orebodies, suggest that the titanomagnetite melt be separated immisciblely from the titaniferous basic magma.

  • PDF

The explanations of the circulative system of the self-guarding energy and demon since Jin and Tang Dynasty can be summarized as follows (진당(晋唐) 이후 인신(人神)의 운행과 침약총신의기(鍼藥叢辰宜忌)에 관한 연구(硏究))

  • Kim, Kyu Man;Kim, Ki Wook;Park, Hyun Kook;Lee, Byung Wook
    • The Journal of Korean Medical History
    • /
    • v.15 no.1
    • /
    • pp.11-24
    • /
    • 2002
  • First, during Jin and Sui dynasty, It is possible that the theory of the contraindications of needling according to whereabouts of the self-guarding energy and demon, affected considerably to the practise of acupuncture and moxibustion, but the detailed situations are unknown. Only, there are some records of the process about circulation of the self-guarding energy and demon by a periodicity of 30 days in the "The prescriptions of Fan-Wang" by Fan-Wang in Jin dynasty and "Hua Tuo Fa" by a nameless person. But the theory differs form the theory of "Huang Di Xia Mo Jing" in some respect. Also, there is the contraindications of needling to abscesses according to whereabouts of the self-guarding energy and demon by every year in the "Liu Juan Zi Gui Yi Fang". but the book has no specific rule in use. Second, during Tang dynasty there were a vasty development on the contraindications of needling according to whereabouts of the self-guarding energy and demon. In the medical works in Tang dynasty, the contents of the contraindications of needling are included in various periodicities and directions such as 12 regions according to the year, 9 regions according to the year, 9 palaces in the body according to the year, whereabouts of the self-guarding energy and demon according the four seasons, every 10 days, every 12 days, every 30 days, and every dozen hours. Also, during Tang dynasty period, the contraindications of needling according to whereabouts of the self-guarding energy and demon were formulated through several adjustments and modifications by many medical scholars. Third, the period between Jin and Tang dynasty, because of historical situations, the documentary data are insufficient in the study of the recommendations and contraindications on the acupuncture, moxibution, and herb medicine according to the specific days and times. And the detailed informations are unknown. Only but once in Tang dynasty the considerable and theoretical adjustments were performed in the "Qian Jin Yao Fang". In Song dynasty, there were also much theoretical fluctuations in the study of the choice of the favorable or the injurious days and times or directions in the acupuncture, moxibustion and the prescription and processing of herbs. Fourth, contraindications on the acupuncture, moxibution, and herb medicine did not include acute and serious disease among the effect province, only include chronic and not serious disease. If the doctors had treated a surgical patients and abscess patients with deeply attached contraindications on the acupuncture, moxibution, and herb medicine, the patients would have became more serious. So the theory was not used for treatment by doctor.

  • PDF

The Influences of Thailand's Import and FDI on Lao PDR's Economic Growth (태국의 수입 및 FDI가 라오스의 경제성장에 미친 영향)

  • Kim, Kyu;Kwon, KiChul
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.1
    • /
    • pp.304-316
    • /
    • 2020
  • Laos is rich in natural resources but lacks the capital to develop them. Partly alleviating the shortage is FDI from neighboring countries, especially Thailand. Not only does this contribute to directly increasing GDP by increasing effective demand, it also has an additional GDP increase effect by expanding Laos' production capacity. Laos' exports mostly consist of mineral resources and electricity. This, too, contributes to an increase in GDP by increasing the effective demand. Thailand accounts for more than 40 percent of Laos' exports. This paper tries to confirm the economic impact on Laos in Thailand through a econometric analysis of Laos' GDP, Laos' exports to Thailand and Thailand's FDI to Laos. It turns out that economic ties with Thailand, including exports to Thailand and Thailand's FDI, play a very important role in Laos' economic growth. Laos recently recorded relatively robust economic growth, but its driving force is weak. That's because Laos' growth engines are very limited and have no resilience to external shocks. Moreover, economic growth has not been linked to an increase in employment because the economy is not diversified and growth in the hydroelectric power sector does not lead to growth in other sectors. Given this, Laos needs to actively take advantage of its geographical proximity to Thailand. It is necessary to create a more active environment for the inflow of FDI in Thailand, to foster resource-based and labor-based manufacturing to take advantage of the Thai market.

Meteorological Impact on Daily Concentration of Pollens in Korea (일별 꽃가루농도에 대한 기상영향)

  • Lee, Hye-Rim;Kim, Kyu-Rang;Choi, Young-Jean;Oh, Jae-Won
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.14 no.3
    • /
    • pp.99-107
    • /
    • 2012
  • There has been increasing number of patients with asthma, rhinitis, and conjunctivitis due to the atmospheric pollution and global warming. In this study, we investigated daily observed number of pollens to establish a standardized method for the impact analysis of the climate changes on the number of daily pollens in Korea. Daily observed allergenic pollens of trees, weeds, and pine were analyzed during the period of 1998 to 2010 (except 2006) in Seoul, Busan, Daegu, Gwangju, Gangneung, and Jeju. They increased in large cities including Seoul during the last 12 years and the long-term trend may continue in the future. Daily concentration or amount of pollens was highly correlated with weather variables. Positive correlation was found between air temperature and the pollens although different relationships existed for different locations. Chill days were utilized to estimate the length of the flowering or pollen period. The pollen period of trees was shorter in the field when the winter temperature was low. This approach may be utilized to determine the quantitative change in length of the pollen season in the future.

Improvement of Air Temperature Analysis by Precise Spatial Data on a Local-scale - A Case Study of Eunpyeong New Town in Seoul - (상세 공간정보를 활용한 국지기온 분석 개선 - 서울 은평구 뉴타운을 사례로 -)

  • Yi, Chae-Yeon;An, Seung-Man;Kim, Kyu-Rang;Choi, Young-Jean;Scherer, Dieter
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.15 no.1
    • /
    • pp.144-158
    • /
    • 2012
  • A higher spatial resolution is preferable to support the accuracy of detailed climate analysis in urban areas. Airborne LiDAR (Light Detection And Ranging) and satellite (KOMPSAT-2, Korea Multi-Purpose Satellite-2) images at 1 to 4 m resolution were utilized to produce digital elevation and building surface models as well as land cover maps at very high(5m) resolution. The Climate Analysis Seoul(CAS) was used to calculate the fractional coverage of land cover classes in built-up areas and thermal capacity of the buildings from their areal volumes. It then produced analyzed maps of local-scale temperature based on the old and new input data. For the verification of the accuracy improvement by the precise input data, the analyzed maps were compared to the surface temperature derived from the ASTER satellite image and to the ground observation at our detailed study region. After the enhancement, the ASTER temperature was highly correlated with the analyzed temperature at building (BS) areas (R=0.76) whereas there observed no correlation with the old input data. The difference of the air temperature deviation was reduced from 1.27 to 0.70K by the enhancement. The enhanced precision of the input data yielded reasonable and more accurate local-scale temperature analysis based on realistic surface models in built-up areas. The improved analysis tools can help urban planners evaluating their design scenarios to be prepared for the urban climate.

The Beacon Frame-Based Node Grouping Algorithm for Improving the Performance between MCT devices in the Home Wireless Network (가정 무선 네트워크 내 MCT 디바이스 간 성능 향상을 위한 Beacon frame 기반 노드 그룹화 알고리즘)

  • Kim, Gyu-Do;Kown, Young-Ho;Rhee, Byung-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.787-790
    • /
    • 2015
  • Recently, M2M (Machine to Machine) communication is possible the development of MTC (Machine Type Communication) devices becomes active. MCT devices in the form of home appliances have a low power consumption, low cost, short-range wireless communication in wireless home network. For purpose, MTC devices based on IEEE 802.15.4/Zigbee are composed in the form of cluster-tree topology, which consists of one PAN (Personal Area Network), one or other router and end of nodes. It happens that transmission delay, packet drop, and lacking data resulted from collision originated by a competition for allocating channels among MTC devices that greatly increased. At last performance of entire network can be degradated. This paper proposes that the beacon frame-based grouping algorithm using multiple channels in a MTC devices in the presence of wireless home network interference. The proposed algorithm decreases the transmission delay, dropped packet and throughput is more increase, so the proposal algorithm is more efficient than the IEEE 802.15.4/ Zigbee standard.

  • PDF

New index for the gifted students(G-Index) with EEG analysis (뇌파검사 자료를 기반으로 한 과학영재 판별 지수(G-Index) 개발과 적용)

  • Kim, Kyung-Hwa;Kim, Kyu-Han;Lee, Sun-Kil;Hur, Myung;Kim, Yong-Jin
    • Journal of Gifted/Talented Education
    • /
    • v.15 no.1
    • /
    • pp.67-84
    • /
    • 2005
  • In this study we investigated the adequacy of tools for distinction gifted students through the comparison these mutual relation on the basis of data, like paper test, the depths interview score, and the rest data((TTCT: Torrance Tests of Creative Thinking, IQ test, FASP: Find A Shape Puzzle, V.T: Visualization Tests and Exp: experimental ability test), and analysis data of EEG test for examining the adequacy of tools for identification gifted students. So, we developed Brain Wave gifted Index(G-Index) for finding another distinction ability as using brain waves data. The standard of index development use gifted brain characteristic in closed-eyes rest state which is judged like that characteristic of distinction between gifted and normal students is the most clear and consistence. That is, the degree of unified pattern between each object and gifted PCA pattern was defined by Pearson method which added spatial mutual index to weight concept. This refer to mean number of spatial PCA pattern. Searching for the possibility of distinction gifted gave distinction effect in 76%. The result of regression analysis on the basis of mutual relation between the rest data is . The probability formula for distinct gifted group is as follow. $$P=\frac 1{1+e^{-[-0.018(TTCT)+0.057(IQ)+1.916(FASP)+0.682(V.T)+0.088(Exp.)+0.034(G-Index)-57.510]}}$$ The result of this calculation showed that probability for distinct in gifted group was very good(95.0%). On the basis of upper result, tools for identification gifted students should be estimated as using many-sided estimation data whatever possible. And following study about development, and operation of tools for distinction suitable to gifted student in science should be progressed.

A study on extraction of optimized API sequence length and combination for efficient malware classification (효율적인 악성코드 분류를 위한 최적의 API 시퀀스 길이 및 조합 도출에 관한 연구)

  • Choi, Ji-Yeon;Kim, HeeSeok;Kim, Kyu-Il;Park, Hark-Soo;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.897-909
    • /
    • 2014
  • With the development of the Internet, the number of cyber threats is continuously increasing and their techniques are also evolving for the purpose of attacking our crucial systems. Since attackers are able to easily make exploit codes, i.e., malware, using dedicated generation tools, the number of malware is rapidly increasing. However, it is not easy to analyze all of malware due to an extremely large number of malware. Because of this, many researchers have proposed the malware classification methods that aim to identify unforeseen malware from the well-known malware. The existing malware classification methods used malicious information obtained from the static and the dynamic malware analysis as the criterion of calculating the similarity between malwares. Also, most of them used API functions and their sequences that are divided into a certain length. Thus, the accuracy of the malware classification heavily depends on the length of divided API sequences. In this paper, we propose an extraction method of optimized API sequence length and combination that can be used for improving the performance of the malware classification.

Website Falsification Detection System Based on Image and Code Analysis for Enhanced Security Monitoring and Response (이미지 및 코드분석을 활용한 보안관제 지향적 웹사이트 위·변조 탐지 시스템)

  • Kim, Kyu-Il;Choi, Sang-Soo;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.871-883
    • /
    • 2014
  • New types of attacks that mainly compromise the public, portal and financial websites for the purpose of economic profit or national confusion are being emerged and evolved. In addition, in case of 'drive by download' attack, if a host just visits the compromised websites, then the host is infected by a malware. Website falsification detection system is one of the most powerful solutions to cope with such cyber threats that try to attack the websites. Many domestic CERTs including NCSC (National Cyber Security Center) that carry out security monitoring and response service deploy it into the target organizations. However, the existing techniques for the website falsification detection system have practical problems in that their time complexity is high and the detection accuracy is not high. In this paper, we propose website falsification detection system based on image and code analysis for improving the performance of the security monitoring and response service in CERTs. The proposed system focuses on improvement of the accuracy as well as the rapidity in detecting falsification of the target websites.

A Study on Collection and Analysis Method of Malicious URLs Based on Darknet Traffic for Advanced Security Monitoring and Response (효율적인 보안관제 수행을 위한 다크넷 트래픽 기반 악성 URL 수집 및 분석방법 연구)

  • Kim, Kyu-Il;Choi, Sang-So;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1185-1195
    • /
    • 2014
  • Domestic and international CERTs are carrying out security monitoring and response services based on security devices for intrusion incident prevention and damage minimization of the organizations. However, the security monitoring and response service has a fatal limitation in that it is unable to detect unknown attacks that are not matched to the predefined signatures. In recent, many approaches have adopted the darknet technique in order to overcome the limitation. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. Thus, all the incoming traffic to the darknet can be regarded as attack activities. In this paper, we present a collection and analysis method of malicious URLs based on darkent traffic for advanced security monitoring and response service. The proposed method prepared 8,192 darknet space and extracted all of URLs from the darknet traffic, and carried out in-depth analysis for the extracted URLs. The analysis results can contribute to the emergence response of large-scale cyber threats and it is able to improve the performance of the security monitoring and response if we apply the malicious URLs into the security devices, DNS sinkhole service, etc.