• Title/Summary/Keyword: 삭제방법

Search Result 636, Processing Time 0.036 seconds

Study of endodontic working length of Korean posterior teeth (한국인의 구치부 근관작업장에 관한 연구)

  • Kim, Jeong-Yeob;Lee, Sang-Hoon;Lee, Gwang-Hee;Park, Sang-Hyuk
    • Restorative Dentistry and Endodontics
    • /
    • v.35 no.6
    • /
    • pp.429-435
    • /
    • 2010
  • Objectives: The aim of this study was to investigate average working lengths of Korean posterior teeth and evaluate validity of endodontic file length. Materials and Methods: The endodontic working length of the posterior teeth of 670 Korean patients were measured than each mean value and standard deviation were investigated than the frequency deviation and standard deviation per each length were calculated. Results: Among the canals of premolar, 66.5% of canal length was marked under 20 mm by endodontic working length and 95.4% could be measured under 22 mm and Among the canals of molars, 95.5% of canal length was marked under 20 mm endodontic working length. Conclusions: With the result of measurement of endodontic working length of premolars of Korean, it suggested that 23 mm endodontic file is more proper than the 21 mm and 25 mm file on the market.

A Link-Label Based Node-to-Link Optimal Path Algorithm Considering Non Additive Path Cost (비가산성 경로비용을 반영한 링크표지기반 Node-to-Link 최적경로탐색)

  • Lee, Mee Young;Nam, Doohee
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.5
    • /
    • pp.91-99
    • /
    • 2019
  • Existing node-to-node based optimal path searching is built on the assumption that all destination nodes can be arrived at from an origin node. However, the recent appearance of the adaptive path search algorithm has meant that the optimal path solution cannot be derived in node-to-node path search. In order to reflect transportation data at the links in real-time, the necessity of the node-to-link (or link-to-node; NL) problem is being recognized. This research assumes existence of a network with link-label and non-additive path costs as a solution to the node-to-link optimal path problem. At the intersections in which the link-label has a turn penalty, the network retains its shape. Non-additive path cost requires that M-similar paths be enumerated so that the ideal path can be ascertained. In this, the research proposes direction deletion and turn restriction so that regulation of the loop in the link-label entry-link-based network transformation method will ensure that an optimal solution is derived up until the final link. Using this method on a case study shows that the proposed method derives the optimal solution through learning. The research concludes by bringing to light the necessity of verification in large-scale networks.

Analysing the Use of Test Tools in Science-Related Affective Domain and its Improvements (과학 관련 정의적 영역 검사 도구 활용 및 개선 내용 분석)

  • Chung, Sue-Im;Shin, Donghee
    • Journal of The Korean Association For Science Education
    • /
    • v.39 no.2
    • /
    • pp.263-277
    • /
    • 2019
  • This study analyzed the current use of science-related test tools in affective area in Korean academic journals for the last 30 years since 1989 and the cases of modification of the original tools related to the tools. This provides practical information on the development and improvement of test tools in the future and offers the basis for developing valid test tools. The study was conducted in two stages. We analyzed the status of 88 domestic science education researches dealing with testing tools related affective characteristics and 57 domestic and foreign resource tools referenced by them. After that, we compared the characteristics of the five cases in which the original tool was revised and the concrete item correction examples. The results were analyzed as follows: topics that have emerged continuously or that have recently begun to appear in domestic research, the research situations according to their purpose and measurement methods used by the tool, and use state of original tools. The background and key points of revision were analyzed for the five tools, TOSRA, SAI, PISA items, STEBI-A/B, SMQ, whose revision process were disclosed. In addition, the changes of the items were analyzed by comparing the four test items with the questions before and after the revision. As a result of item analysis, item improvement was proceeding in the direction of enhancing readability, clarifying meaning, and changing items according to change of sub constructs. The implications of this study are as follows: notes on interpreting the results obtained from the tool with multiple mixed constructs, the possibility of the testing tool that broadens the horizon of the research, error recognition in the subjective self-report, and notes when applying test tools from other disciplines to science.

Arts-based research as a valid method for mathematics education research: Fiction writing applied to an activity of designing educative curriculum materials (교육적 지도서 개발 사례에 적용한 소설적 글쓰기 기법으로 살펴 본 예술기반 연구의 수학교육연구 활용 가능성 논의)

  • Suh, Heejoo
    • The Mathematical Education
    • /
    • v.61 no.4
    • /
    • pp.539-557
    • /
    • 2022
  • A research field develops by experiencing several turns of paradigms. Mathematics education research have experienced those turns as well. Still, the dominant perspective is that mathematics education research should be scientific and objective. In this article, I suggest that this need not to be the prime rule to follow and that the mathematics education field will fertile by discussing extraordinary cases which may seem controversal to be recognized as valid research work. To this end, I first briefly describe the necessity of open discussions among researchers for a field to develop. Then, I introduce fiction writing, a resesarch method derived from arts-based research, as an extraordinary case for open discussions. The benefit of Arts-based research is on that it takes an holistic approach to how we know by embracing emotion and emphathy as means for knowing. Because of this trait, arts-based research holds a powerful potential for influencing a wide range of people, both inside and outside of the resesarch field. Following this, I present a fiction about a prospective teacher who participated in an activity for designing educative curriculum materials. By doing so, I sought to provoke discussions among mathematics education researchers about what to include as a valid research work, possible standards for reviewing arts-based resesarch.

Trademark Protection In The Fashion Industry with ICT Issues (패션산업의 상표권 보호 및 ICT 쟁점 - Louboutin 사건, Levi 사건에 대한 분석을 중심으로 -)

  • Lee, Jae-Kyoung
    • Journal of Legislation Research
    • /
    • no.44
    • /
    • pp.185-209
    • /
    • 2013
  • With the broader range of information and communications technology, of which fashion is a foundational medium, to analyze fashion as an information technology in order to better understand the industry's desire for intellectual property protection, popular resistance to such protection, and the most efficacious balance between them in terms of creative expression. It is, therefore to be focused on cultural and historical reasons for the limited degree of intellectual property protection extended in the past to certain categories of human creativity, including fashion design. So, the question of why some tension still exists between creators and consumers of fashion, how information theory can contribute to an explanation for that tension, and what role law can play in its resolution with Louboutin case and Levi case. Consumers and designers alike are better served by promotion of fair competition, lower litigation costs, and the inventive synergy of the fashion industry. Louboutin shows the comfortable, respectful limits of trademark law, while Levi illustrates the dangerous, overreaching deference that a few circuits have granted to famous marks. The Supreme Court could clarify the standard for dilution claims, requiring that a junior mark be "identical or nearly identical" or even "significantly similar" to a senior mark. Courts should need a deference in making dilution determinations and can choose to make this factor quite subjective with the highest degree of similarity.

A Preliminary Study on Family Function Components Affecting Individual Health and Disease: A Delphi Study (개인의 건강과 질병에 영향을 미치는 가족기능 구성요소에 관한 사전연구: 델파이 연구)

  • Kim, Ah-Ram;Jeong, Seong-Woo;Jeong, Jiin;Kim, Jung-Ran
    • Therapeutic Science for Rehabilitation
    • /
    • v.10 no.3
    • /
    • pp.83-96
    • /
    • 2021
  • Objective : This study aimed to determine Korea-type family function factors that affect individual growth and social activities, and examine check the appropriate contents and domestic culture components based on the McMaster model, a family function evaluation tool, through the Delphi technique. Methods : The Delphi technique was applied to 12 expert panels in fields related to family function. The period lasted 9 weeks, from May to June 2020. The Delphi survey was conducted twice. In the first survey, the domestic culture and appropriate contents of the McMaster model were selected and localized, and expert' opinions about the components were collected using closed and open-ended questions. In the second survey, the fitness and importance of the components were investigated. Results : As a result of the first Delphi investigation, 18 items were deleted from the 53 items presented. After adding 11 items and excluding any overlapping items, a total of 40 items were selected. Subsequently, sentences that were difficult to understand were revised to familiar vocabulary. A second survey was constructed, with an example sentence. In the second Delphi investigation, 33 items were selected. The average content validity ratio for the final selected component was 0.76, and the stability was 0.28. Conclusion : Family function and the factors influencing domestic family function identified though this study can be used to conduct family function evaluations and interventions in clinical sites or relevant research studies.

Redactable Blockchain Based Authority Alteration and Accessn Control System (수정 가능한 블록체인 기반 권한 변경 및 접근 제어시스템)

  • Lee, Yeon Joo;Choi, Jae Hyun;Noh, Geontae;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.513-525
    • /
    • 2022
  • The immutability of blockchain is core elements of security of blockchain and guarantee data integrity. However, the characteristic that the data recoreded once in the blockchain cannot be modified has place for abuse by a specific user. In fact improper contents that is inappropriate to be recorded on the blockchain, such as harmful data and user personal data, is exposed on Bitcoin. As a way to manage improper content existing in the blockchain, there is a redactable blockchain using chameleon hash proposed for the first time by Ateniese. The redactable blockchain meet the right to be forgotten of GDPR by allowing data modification and deletion. Recently, Research on personal data management is being conducted in a redactable blockchain. Research by Jia et al. proposed a model that enables users to manage their personal data in the redactable blockchain. However, semi trusted regulators, which are blockchain participation nodes, have powerful authority in the blockchain, such as modification rights and deprivation of transaction rights for all blocks, which may cause side effects. In this paper, to weaken the authority of regulators in Y. Jia et al., we propose a method of authority subject altering and authority sharing, and propose a redactable blockchain-based authority change and access control system model based on applicable scenarios.

Static Identification of Firmware Linux Kernel Version by using Symbol Table (심볼 테이블을 이용한 펌웨어 리눅스 커널 버전 정적 식별 기법)

  • Kim, Kwang-jun;Cho, Yeo-jeong;Kim, Yun-jeong;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.67-75
    • /
    • 2022
  • When acquiring a product having an OS, it is very important to identify the exact kernel version of the OS. This is because the product's administrator needs to keep checking whether a new vulnerability is found in the kernel version. Also, if there is an acquisition requirement for exclusion or inclusion of a specific kernel version, the kernel identification becomes critical to the acquisition decision. In the case of the Linux kernel used in various equipment, sometimes it becomes difficult to pinpoint the device's exact version. The reason is that many manufacturers often modify the kernel to produce their own firmware optimized for their device. Furthermore, if a kernel patch is applied to the modified kernel, it will be very different from its base kernel. Therefore, it is hard to identify the Linux kernel accurately by simple methods such as a specific file existence test. In this paper, we propose a static method to classify a specific kernel version by analyzing function names stored in the symbol table. In an experiment with 100 Linux devices, we correctly identified the Linux kernel version with 99% accuracy.

A Study On Artifacts Analysis In Portable Software (무 설치 프로그램에서의 사용자 행위 아티팩트 분석)

  • Taeyeong Heo;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.2
    • /
    • pp.39-53
    • /
    • 2023
  • Non-installation program (hereinafter referred to as "portable program") is a program that can be used without an installation process, unlike general software. Since there is no separate installation process, portable programs have high mobility and are used in various ways. For example, when initial setup of multiple PCs is required, a portable program can be stored on one USB drive to perform initial setup. Alternatively, when a problem occurs with the PC and it is difficult to boot normally, Windows PE can be configured on the USB drive and portable programs can be stored for PC recovery. And the portable program does not directly affect PC settings, such as changing registry values, and does not leave a trace. This means that the portable program has high security. If a portable program is deleted after using it, it is difficult to analyze behavior in a general way. If a user used a portable program for malicious behavior, analysis in a general way has limitations in collecting evidence. Therefore, portable programs must have a new way of behavioral analysis that is different from ordinary installation software. In this paper, after installing the Windows 10 operating system on a virtual machine, we proceed with the scenario with a portable program of Opera and Notepad++. And we analyze this in various ways such as file analysis of the operating system and memory forensics, collect information such as program execution time and frequency, and conduct specific behavioral analysis of user.

  • PDF

Preprocessing Technique for Malicious Comments Detection Considering the Form of Comments Used in the Online Community (온라인 커뮤니티에서 사용되는 댓글의 형태를 고려한 악플 탐지를 위한 전처리 기법)

  • Kim Hae Soo;Kim Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.103-110
    • /
    • 2023
  • With the spread of the Internet, anonymous communities emerged along with the activation of communities for communication between people, and many users are doing harm to others, such as posting aggressive posts and leaving comments using anonymity. In the past, administrators directly checked posts and comments, then deleted and blocked them, but as the number of community users increased, they reached a level that managers could not continue to monitor. Initially, word filtering techniques were used to prevent malicious writing from being posted in a form that could not post or comment if a specific word was included, but they avoided filtering in a bypassed form, such as using similar words. As a way to solve this problem, deep learning was used to monitor posts posted by users in real-time, but recently, the community uses words that can only be understood by the community or from a human perspective, not from a general Korean word. There are various types and forms of characters, making it difficult to learn everything in the artificial intelligence model. Therefore, in this paper, we proposes a preprocessing technique in which each character of a sentence is imaged using a CNN model that learns the consonants, vowel and spacing images of Korean word and converts characters that can only be understood from a human perspective into characters predicted by the CNN model. As a result of the experiment, it was confirmed that the performance of the LSTM, BiLSTM and CNN-BiLSTM models increased by 3.2%, 3.3%, and 4.88%, respectively, through the proposed preprocessing technique.