• Title/Summary/Keyword: 네트워크 위험도

Search Result 705, Processing Time 0.024 seconds

Application of Radiofrequency Ablation to Thyroid Cancer: Past, Present, and Future (갑상선암에 대한 고주파 절제 적용의 과거, 현재, 그리고 미래)

  • Ji-hoon Kim
    • Journal of the Korean Society of Radiology
    • /
    • v.84 no.5
    • /
    • pp.999-1008
    • /
    • 2023
  • Thyroid cancer, characterized by high incidence rates, good prognosis, and frequent recurrence, is typically treated surgically. However, since the early 2000s, radiofrequency ablation, which is commonly utilized in liver, lung, and kidney cancers, is being performed for management of primary and recurrent thyroid cancers. Many studies have focused on inoperable cases of low-risk papillary microcarcinoma (≤ 1 cm) and some have investigated its role in larger lesions (up to 4 cm). Overall, these studies have reported positive results. Radiofrequency ablation for recurrent cancer has primarily been performed for locally recurrent cervical cancer, and this therapeutic approach has been attempted for treatment of distant metastases in lungs and bones, with encouraging outcomes. A growing global trend, particularly in South Korea, the United States, and Europe supports radiofrequency ablation for thyroid cancer. However, this therapy is currently not recognized as a treatment option recommended by universally accepted clinical guidelines such as those established by the National Comprehensive Cancer Network. Based on past efforts and future research, radiofrequency ablation is expected to play a key role in thyroid cancer treatment in the near future.

A Study on the Influence of Entrepreneurship and Start-Up Competency on Entrepreneurial Satisfaction: Focusing on the Moderating Effect of Flow Experience (창업가정신, 창업역량이 창업만족도에 미치는 영향에 관한 연구: 플로우(Flow)경험의 조절효과를 중심으로)

  • Lee, Sang Hwa;Ha, Kyu Soo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.10 no.5
    • /
    • pp.137-150
    • /
    • 2015
  • This study investigated the influence of Entrepreneurship, Start-up Competency on Entrepreneurial Satisfaction and the moderating effect of Flow experience. The goal of this investigation is to empirically prove that despite the benefits of educational and financial support, mentoring and consulting which selected applicants received as a part of supporting business for start-up companies provided by national and local government and public organizations, there is a gap between individual entrepreneurs' satisfaction after actual foundation of the company. For the purpose of this investigation, data was collected through a survey with 320 entrepreneurs who were beneficiaries of government's supporting business for start-up companies and have founded their companies less than 5 years ago. For entrepreneurship variables, three factors of innovativeness, proactiveness and risk-taking were reviewed, and also reviewed the three variables network capability, market orientation and marketing capacity as Start-up competency. The collected data was used to perform a multiple regression analysis, and the moderating effect of flow experience was analysed using moderated regression analysis. The result of analysis shows that innovativeness, proactiveness and risk-taking of entrepreneurship positively affected the entrepreneurial satisfaction, and network capability, market orientation and marketing capability also positively affected the entrepreneurial satisfaction. As a result of analysing the moderating effect of flow experience, it appeared that there is a positive moderating effect between entrepreneurship, start-up competency, and the entrepreneurial satisfaction. This result concludes that evaluation items of entrepreneurship and start-up competency as applicant selecting criteria in supporting business for start-up companies, are valid. It is also concluded that start-up supports such as education, funds and consulting are also important, but it is necessary to make changes such as construction of start-up ecosystem and reinforcement of networking support, so that entrepreneurs can have the flow experience themselves in the process after founding a company.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Literature Review on Applying Digital Therapeutic Art Therapy for Adolescent Substance Addiction Treatment (청소년 마약류 중독 치료를 위한 디지털치료제 예술치료 적용을 위한 문헌연구)

  • Jiwon Kim;Daniel H. Byun
    • Trans-
    • /
    • v.16
    • /
    • pp.1-31
    • /
    • 2024
  • The advent of digital media has facilitated easy access for adolescents to environments conducive to the purchase of narcotics. In particular, there's an increasing trend in the purchase and consumption of narcotics mediated through Social Network Services (SNS) and messenger services. Adolescents, sensitive to such environments, are at risk of experiencing neurological and mental health issues due to narcotic addiction, increasing their exposure to criminal activities, hence necessitating national-level management and support. Consequently, the quest for sustainable treatment methods for adolescents exposed to narcotics emerges as a critical challenge. In the context of high relapse rates in narcotic addiction, the necessity for cost-effective and user-friendly treatment programs is emphasized. This study conducts a literature review aimed at utilizing digital platforms to create an environment where adolescents can voluntarily participate, focusing on the development of therapeutic content through art. Specifically, it reviews societal perceptions and treatment statuses of adolescent drug addiction, analyzes the impact of narcotic addiction on adolescent brain activity and cognitive function degradation, and explores approaches for developing digital therapeutics to promote the rehabilitation of the addicted brain through analysis of precedential case studies. Moreover, the study investigates the benefits that the integration of digital therapeutic approaches and art therapy can provide in the treatment process and proposes the possibility of enhancing therapeutic effects through various treatment programs such as drama therapy, music therapy, and art therapy. The application of art therapy methods is anticipated to offer positive effects in terms of tool expansion, diversification of expression, data acquisition, and motivation. Through such approaches, an enhancement in the effectiveness of treatments for adolescent narcotic addiction is anticipated. Overall, this study undertakes foundational research for the development of digital therapeutics and related applications, offering economically viable and sustainable treatment options in consideration of the societal context of adolescent narcotic addiction.

Types of Health Behavior Clusters and Related Factors among Korean Adults (우리나라 성인의 건강행태군집 유형과 관련요인)

  • Moon, Seongmi
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.397-410
    • /
    • 2014
  • This study sought to identify types of health behavior clusters among Korean adults and their related factors. A secondary analysis of 1,441 subjects, aged 19 to 64, in the 2009 Korean National Health and Nutrition Examination Survey (KNHANES IV-3) was conducted. A cluster analysis was used to identify types of clusters related to physical activity, smoking, and alcohol drinking. A complex samples chi square test and multivariate logistic regression were performed to analyze the associations between types of health behavior clusters and sample's characteristics using SPSS WIN 21. Five clusters were identified: health promotion, smoking, alcohol drinking, passive attitude, and risky behavior. The passive attitude cluster had the most subjects, with 47.7% of subjects as members. Socio-demographic factors, hypertension, and depressive symptoms were associated with membership in the alcohol drinking, smoking, passive attitude, or risky behavior cluster rather than the health promotion cluster. The findings of this study suggest that integrated health promotion programs incorporating multiple strategies need to be investigated. In addition, further studies should explore psychosocial factors that affect health behavior clusters, such as stress, self-efficacy, social support, and social networks.

Study on Improvement of Weil Pairing IBE for Secret Document Distribution (기밀문서유통을 위한 Weil Pairing IBE 개선 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.59-71
    • /
    • 2012
  • PKI-based public key scheme is outstanding in terms of authenticity and privacy. Nevertheless its application brings big burden due to the certificate/key management. It is difficult to apply it to limited computing devices in WSN because of its high encryption complexity. The Bilinear Pairing emerged from the original IBE to eliminate the certificate, is a future significant cryptosystem as based on the DDH(Decisional DH) algorithm which is significant in terms of computation and secure enough for authentication, as well as secure and faster. The practical EC Weil Pairing presents that its encryption algorithm is simple and it satisfies IND/NM security constraints against CCA. The Random Oracle Model based IBE PKG is appropriate to the structure of our target system with one secret file server in the operational perspective. Our work proposes modification of the Weil Pairing as proper to the closed network for secret file distribution[2]. First we proposed the improved one computing both encryption and message/user authentication as fast as O(DES) level, in which our scheme satisfies privacy, authenticity and integrity. Secondly as using the public key ID as effective as PKI, our improved IBE variant reduces the key exposure risk.

Dual Clusters of the Metropolitan Region: A Comparative Study on the Spatial Agglomeration, Social Capital Formation, and Institutionalization of Dongdaemun Market and Seoul Venture Valley in Seoul, Korea (서울 신신업집적지 발전의 두 유형: 동대문시장과 서울벤처벨리의 산업집적, 사회적 자본의 형성과 제도화 특성에 대한 비교)

  • 남기범
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.6 no.1
    • /
    • pp.45-60
    • /
    • 2003
  • As the process of economic globalization deepens market uncertainty and severe competition, modern companies are tend to rely on non-market, socio-economic mechanisms such as trust, collaboration, and interdependence, They are being more influenced by cultural economic mechanisms like networks, embeddedness, and placeness rather than explicit cost-reductions. This paper analyzes the characteristics of industrial clusters, the formation of social capital, and the process of institutionalization by comparing two distinctive types of clusters, say Teheran and East-Gate Valleys in Seoul, Korea. The one is mainly consisted of IT industries with increasing vertical integration supported by venture capitals and favorable business infrastructures. The other cluster has long been a traditional CBD frame of Seoul and has transformed to the most dynamic and productive area, characterized by one-stop 'R&D-production-distribution-consumption-after sales services'. The study of the developmental trajectory and key characteristics for these kinds of clusters can give us insight for the cluster theory. This paper firstly reviews the similarities and differences between the social capital in general and that of industrial clusters. It then profiles the growth of the two clusters over the past decade, and compares the current spatial and business structure of the two clusters, focusing on transactions costs, the creation and flow of information, and the local institutions. The paper concludes with some comments about the prospects and perils of the two types industrial clusters of Seoul.

  • PDF

Development of Evaluation Model for Black Spot Improvement Priorities by using Emperical Bayes Method (EB기법을 이용한 사고잦은 곳 개선사업 우선순위 판정기법 개발)

  • Jeong, Seong-Bong;Hwang, Bo-Hui;Seong, Nak-Mun;Lee, Seon-Ha
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.3
    • /
    • pp.81-90
    • /
    • 2009
  • The safety management of a road network comprises four basic inter-related components:identification of sites(black spot) requiring safety investigation, diagnosis of safety problems, selection of feasible treatments for potential treatment candidates, and prioritization of treatments given limited budgets(Persaud, 2001). Identification process of selecting black spot is very important for efficient investigation of sites. In this study, the accident prediction model for EB method was developed by using accident data and geometric conditions of black spots selected from four-leg signalized intersections in In-cheon City for three years (2004-2006). In addition, by comparing the rank nomination technique using EB method to that by using accident counts, we managed to show the problems which the existing method have and the necessity for developing rational prediction model. As a result, in terms of total number of accidents, both the counts predicted by existing non-linear regression model and that by EB method have high good of fitness, but EB method, considering both the accident counts by sites and total number of accident, has better good of fitness than non-linear poison model. According to the result of the comparison of ranks nominated for treatment between two methods, the rank for treatment of almost sites does not change but SeoHae intersection and a few other intersections have significant changes in their rank. This shows that, with the technique proposed in the study, the RTM problem caused by using real accident counts can be overcome.

Basin-Wide Real Time Daily Multi-Reservoir Operation Using K-MOSIM (K-MOSIM을 이용한 유역통합 실시간 일 저수지 운영)

  • Lee, Jin-Hee;Ko, Ick-Hwan
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2006.05a
    • /
    • pp.948-952
    • /
    • 2006
  • 인구의 증가와 경제의 발전으로 인해 한정된 수자원에 대한 수요가 급증하였고 향후 고도의 복지사회 구현과 지방 자치화에 따른 각종 용수 수요에 대한 심각한 물 배분 문제가 대두되고 있다. 특히 심각하게 물 배분 문제가 야기될 때 각 수요지점별로 필요한 용수를 공급하기 위해서 단지 상류에서 하류 단으로 물을 배분한다면 수리권의 공정성 문제가 제기되며 물 관리 원칙의 결여에 따른 곤란한 상황이 발생할 수 있다. 이렇게 갈수 및 가뭄 시와 같이 물 배분 문제가 생길시 에는 우선 하천유역 전체의 가용수량을 파악한 후 각 용수 사용별로 중요성을 감안하여 용수공급 우선순위를 설정하여 전 하천 유역을 통하여 일관된 배분을 실시할 수 있는 수자원 최적화 배분 시스템을 개발 할 필요성이 있다. 이러한 문제를 해결하기 위하여 본 연구에서는 한국수자원공사 수자원연구원과 콜로라도주립대학에서 공동 개발한 유역 네트워크 유량 모델(River Basin Network Flow Model)인 K-MODSIM을 이용하여 유역통합 실시간 일 저수지 운영 모델을 개발하였다. 개발된 유역통합 실시간 일운영 모델은 금강유역에 적용하였으며, 금강유역을 12개의 소유역으로 구분하고, 용담댐과 대청댐을 포함하며, 유역관리는 용수공급, 치수대책, 발전수력 및 하천 유지용수의 공급등의 유역내 수자원 관리 상황을 포함하였다. 이처럼 유역의 매우 자세한 세부사항을 고려함으로서 기존에 개발된 모델이 가지고 있던 단순화의 단점을 보완하고 유역의 특성을 최대한 반영하도록 하였다. 또한 유역통합 실시간 일운영 모델의 장기적인 저수지 운영 문제를 해결하기 위해 암시적 추계학적 동적계획법을 사용하여 도출된 월운영룰을 일운영모델에 적용할 수 있는 방법을 제시 하였다.기능으로 구성되어 있으며, 각 기능을 선택하면 해당 화면으로 GUI가 전환된다. 따라서 다량의 측정자료의 신뢰성을 유지하고 이를 모형의 입력자료로 활용하는 일련의 과정을 시스템화하기 때문에 자료의 이상적 유지 관리가 이루어지며 복잡한 2차원 수질해석 모형을 수월하게 운영할 수 있는 시스템으로 개발하였다.제외하면, 부자측정 방법에 의한 유량산정시 가장 큰 오차원인은 홍수시 측정된 유속측선의 위치와 홍수 전후로 측정된 횡단면상의 위치가 일치하지 않는 점과, 대부분 두 측정 구간의 평균값을 대푯값으로 사용한다는 점이다. 본 연구는 다년간의 유량 측정 및 검증 경험과 자료를 토대로 현장에서 부자를 이용하여 측정된 측정성과를 정확도 높은 유량자료로 산정하는데 있어서의 문제점을 도출하고, 이로 인해 발생하는 오차를 추정하여 그 개선방안을 제시해 보고자한다. 더불어 보다 정확한 유량 산정을 위한 기준과 범주를 제시하고자 한다.리적 특성을 잘 반영하며, 도시지역의 복잡한 배수시스템 해석모형과 지표범람 모형을 통합한 모형 개발로 인해 더욱 정교한 도시지역에서의 홍수 범람 해석을 실시할 수 있을 것으로 판단된다. 본 모형의 개발로 침수상황의 시간별 진행과정을 분석함으로써 도시홍수에 대한 침수위험 지점 파악 및 주민대피지도 구축 등에 활용될 수 있을 것으로 판단된다. 있을 것으로 판단되었다.4일간의 기상변화가 자발성 기흉 발생에 영향을 미친다고 추론할 수 있었다. 향후 본 연구에서 추론된 기상변화와 기흉 발생과의 인과관계를 확인하고 좀 더 구체화하기 위한 연구가 필요할 것이다.게 이루어질 수 있을 것으로 기대된다.는 초과수익률이 상승하지만, 이후로는 감소하므로, 반전거래전략을 활용하는 경우 주식투자기간은 24개월이하의 중단기가 적합함을

  • PDF

A Study on Construction of Optimal Wireless Sensor System for Enhancing Organization Security Level on Industry Convergence Environment (산업융합환경에서 조직의 보안성 향상을 위한 센싱시스템 구축 연구)

  • Na, Onechul;Lee, Hyojik;Sung, Soyoung;Chang, Hangbae
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.4
    • /
    • pp.139-146
    • /
    • 2015
  • WSN has been utilized in various directions from basic infrastructure of environment composition to business models including corporate inventory, production and distribution management. However, as energy organizations' private information, which should be protected safely, has been integrated with ICT such as WSN to be informatization, it is placed at potential risk of leaking out with ease. Accordingly, it is time to need secure sensor node deployment strategies for stable enterprise business. Establishment of fragmentary security enhancement strategies without considering energy organizations' security status has a great effect on energy organizations' business sustainability in the event of a security accident. However, most of the existing security level evaluation models for diagnosing energy organizations' security use technology-centered measurement methods, and there are very insufficient studies on managerial and environmental factors. Therefore, this study would like to diagnose energy organizations' security and to look into how to accordingly establish strategies for planning secure sensor node deployment strategies.