• Title/Summary/Keyword: 수단적

Search Result 5,992, Processing Time 0.037 seconds

Correlation between Dental and Skeletal Maturity in Korean Children (한국 어린이의 골 성숙도와 치아 석회화 단계 간의 상관관계)

  • Kim, Seong Jin;Song, Je Seon;Kim, Ik-Hwan;Kim, Seong-Oh;Choi, Hyung-Jun
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.48 no.3
    • /
    • pp.255-268
    • /
    • 2021
  • The aim of this study was to investigate the relationships between the stages of calcification of various teeth and skeletal maturity stages among Korean subjects. The samples were derived from hand-wrist, panoramic radiographs, and lateral cephalograms of 743 subjects (359 males and 384 females) with ages ranging from 6 to 14 years. Calcification of seven permanent mandibular teeth on the left side were rated according to the system of Demirjian. To evaluate the stage of skeletal maturation, hand-wrist radiographs were analyzed by skeletal maturity indicators (SMI) system of Fishman and lateral cephalograms by cervical vertebral maturation (CVM) method of Baccetti. Statistically significant relationships were found between dental calcification and skeletal maturity stages according to Spearman rank-order correlation coefficients (r = 0.40-0.84, p < 0.001). The second molar showed the highest correlation and central incisor showed the lowest correlation for female and male subjects. For both sexes, canine stage G and second molar stage F were related to SMI 6 and CS 3. Because of the high correlation coefficients, this study suggests that tooth calcification stages from panoramic radiographs might be clinically useful as a maturity indicator of the pubertal growth period in Korean patients.

Boosting the Performance of Python-based Geodynamic Code using the Just-In-Time Compiler (Just-In-Time 컴파일러를 이용한 파이썬 기반 지구동역학 코드 가속화 연구)

  • Park, Sangjin;An, Soojung;So, Byung-Dal
    • Geophysics and Geophysical Exploration
    • /
    • v.24 no.2
    • /
    • pp.35-44
    • /
    • 2021
  • As the execution speed of Python is slower than those of other programming languages (e.g., C, C++, and FORTRAN), Python is not considered to be efficient for writing numerical geodynamic code that requires numerous iterations. Recently, many computational techniques, such as the Just-In-Time (JIT) compiler, have been developed to enhance the calculation speed of Python. Here, we developed two-dimensional (2D) numerical geodynamic code that was optimized for the JIT compiler, based on Python. Our code simulates mantle convection by combining the Particle-In-Cell (PIC) scheme and the finite element method (FEM), which are both commonly used in geodynamic modeling. We benchmarked well-known mantle convection problems to evaluate the reliability of our code, which confirmed that the root mean square velocity and Nusselt number obtained from our numerical modeling were consistent with those of the mantle convection problems. The matrix assembly and PIC processes in our code, when run with the JIT compiler, successfully achieved a speed-up 30× and 258× faster than without the JIT compiler, respectively. Our Python-based FEM-PIC code shows the high potential of Python for geodynamic modeling cases that require complex computations.

Dredging Bottom Sediments of Seoha Weir at the Downstream of Kyongan Stream can be Used as a Feasible Pollutant Load Reduction Option in the Total Pollutant Load Management System of Kwangju City? (경안천 서하보 수저퇴적물 준설이 경기도 광주시 수질오염총량관리에 있어 추가적인 부하량 삭감수단으로써 타당한가?)

  • Yu, Seung-Hoon;Lee, Bum-Yeon;Lee, Kang-Hyun;Park, Shin Jung;Lee, Chang-Hee
    • Journal of Korean Society on Water Environment
    • /
    • v.27 no.1
    • /
    • pp.19-29
    • /
    • 2011
  • In order to assess the influences of bottom sediment on water quality, following measurement were made. (1) Estimations of pollutant loads from the bottom sediment based on mass balance concept, (2) measurements of pollutant concentrations in the sediment to assess the pollution level and influence potential, (3) in situ and laboratory measurements of Sediment Oxygen Demants (SOD) and pollutant load (sediment release) from bottom sediment. Analyses of inflow and outflow loadings using simple mass balance show that there are some variations found according to the pollutants. However, there is no consistent evidence that the sediment can be a source of pollutants. Pollutant concentrations in the sediment range 16~724.8 mg/kg (COD), 1.68 ~12.64 mg/kg (T-P), 5.6~76.8 mg/kg (T-N), 0.32~21.6 mg/kg ($NH_3$-N), 0.092~0.544 mg/kg ($NO_2$-N), 4.8~18.4 mg/kg ($NO_3$-N), and 1.59~11.23 mg/kg ($PO_4$-P). Measured SOD ranges $0.190{\sim}0.802g{\cdot}m^{-2}{\cdot}d^{-1}$ and measured release rate ranges $-1618.42{\sim}10mg/m^2{\cdot}d$(COD), $-12{\sim}16mg/m^2{\cdot}d$(T-P), $-197.37{\sim}140mg/m^2{\cdot}d$(T-N), $0.4{\sim}74.32mg/m^2{\cdot}d$($NH_3$-N), $-2.04{\sim}0.8mg/m^2{\cdot}d$ ($NO_2$-N), $-70{\sim}40mg/m^2{\cdot}d$ ($NO_3$-N), and $-26.11{\sim}28.55mg/m^2{\cdot}d$($PO_4$-P). All study results indicate that bottom sediments in the Seoha weir show only limited effects on the water quality. It implies that sediment dredging is not an effective option or management measure to reduce pollutant loading.

Extending the OMA DRM Framework for Supporting an Active Content (능동형 콘텐츠 지원을 위한 OMA DRM 프레임워크의 확장)

  • Kim, Hoo-Jong;Jung, Eun-Su;Lim, Jae-Bong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.93-106
    • /
    • 2006
  • With the rapid growth of the wireless Internet communication, a new generation of mobile devices have made possible the broad distribution of mobile digital contents, such as image, music, video, games and applications over the wireless Internet. Mobile devices are rapidly becoming the major means to extend communication channels without copy Protection, usage rule controlling and authentication. As a result, mobile digital contents may be illegally altered, copied and distributed among unauthorized mobile devices. In this paper, we take a look at Open Mobile Alliance (OMA) DRM v2.0 in general, its purpose and function. The OMA is uniquely the focal point for development of an open standard for mobile DRM. Next we introduces features for an active content and illustrates the difference between an active content and an inactive content. Enabling fast rendering of an active content, we propose an OMA-based DRM framework. This framework include the following: 1) Extending DCF Header for supporting an selective encryption, 2) Content encryption key management, 3) Rendering API for an active content. Experimental results show that the proposed framework is able to render an active content fast enough to satisfy Quality of Experience. %is framework has been proposed for a mobile device environment, but it is also applicable to other devices, such as portable media players, set-top boxes, or personal computer.

A Study of Key Pre-distribution Scheme in Hierarchical Sensor Networks (계층적 클러스터 센서 네트워크의 키 사전 분배 기법에 대한 연구)

  • Choi, Dong-Min;Shin, Jian;Chung, Il-Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.43-56
    • /
    • 2012
  • Wireless sensor networks consist of numerous small-sized nodes equipped with limited computing power and storage as well as energy-limited disposable batteries. In this networks, nodes are deployed in a large given area and communicate with each other in short distances via wireless links. For energy efficient networks, dynamic clustering protocol is an effective technique to achieve prolonged network lifetime, scalability, and load balancing which are known as important requirements. this technique has a characteristic that sensing data which gathered by many nodes are aggregated by cluster head node. In the case of cluster head node is exposed by attacker, there is no guarantee of safe and stable network. Therefore, for secure communications in such a sensor network, it is important to be able to encrypt the messages transmitted by sensor nodes. Especially, cluster based sensor networks that are designed for energy efficient, strongly recommended suitable key management and authentication methods to guarantee optimal stability. To achieve secured network, we propose a key management scheme which is appropriate for hierarchical sensor networks. Proposed scheme is based on polynomial key pool pre-distribution scheme, and sustain a stable network through key authentication process.

A Study on Detection Technique of Anomaly Signal for Financial Loan Fraud Based on Social Network Analysis (소셜 네트워크 분석 기반의 금융회사 불법대출 이상징후 탐지기법에 관한 연구)

  • Wi, Choong-Ki;Kim, Hyoung-Joong;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.851-868
    • /
    • 2012
  • After the financial crisis in 2008, the financial market still seems to be unstable with expanding the insolvency of the financial companies' real estate project financing loan in the aftermath of the lasted real estate recession. Especially after the illegal actions of people's financial institutions disclosed, while increased the anxiety of economic subjects about financial markets and weighted in the confusion of financial markets, the potential risk for the overall national economy is increasing. Thus as economic recession prolongs, the people's financial institutions having a weak profit structure and financing ability commit illegal acts in a variety of ways in order to conceal insolvent assets. Especially it is hard to find the loans of shareholder and the same borrower sharing credit risk in advance because most of them usually use a third-party's name bank account. Therefore, in order to effectively detect the fraud under other's name, it is necessary to analyze by clustering the borrowers high-related to a particular borrower through an analysis of association between the whole borrowers. In this paper, we introduce Analysis Techniques for detecting financial loan frauds in advance through an analysis of association between the whole borrowers by extending SNA(social network analysis) which is being studied by focused on sociology recently to the forensic accounting field of the financial frauds. Also this technique introduced in this pager will be very useful to regulatory authorities or law enforcement agencies at the field inspection or investigation.

Effect of Hypersonic Missiles on Maritime Strategy: Focus on Securing and Exploiting Sea Control (극초음속 미사일이 해양전략에 미치는 영향: 해양통제의 확보와 행사를 중심으로)

  • Cho, Seongjin
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.241-271
    • /
    • 2020
  • The military technology currently receiving the most attention is the hypersonic missile. hypersonic is faster than the speed of sound or Mach 5+. The vast majority of the ballistic missiles that it inspired achieved hypersonic speeds as they fell from the sky. Rather than speed, today's renewed attention to hypersonic weapons owes to developments that enable controlled flight. These new systems have two sub-varieties: hypersonic glide vehicles and hypersonic cruise missiles. Hypersonic weapons could challenge detection and defense due to their speed, maneuverability, and low altitude of flight. The fundamental question of this study is: 'What effect will the hypersonic missile have on the maritime strategy?' It is quite prudent to analyze and predict the impact of technology in the development stage on strategy in advance. However, strategy is essential because it affect future force construction. hypersonic missiles act as a limiting factor in securing sea control. The high speed and powerful destructive power of the hypersonic missile are not only difficult to intercept, but it also causes massive ship damage at a single shot. As a result, it is analyzed that the Securing sea control will be as difficult as the capacity of sea denial will be improved geographically and qualitatively. In addition, the concept of Fortress Fleet, which was criticized for its passive strategy in the past, could be reborn in a modern era. There are maritime power projection/defence, SLOC attack/defence in exploiting sea control. The effects of hypersonic missiles on exploiting sea control could be seen as both limiting and opportunity factors.

  • PDF

A Study on the Current State of the Library's AI Service and the Service Provision Plan (도서관의 인공지능(AI) 서비스 현황 및 서비스 제공 방안에 관한 연구)

  • Kwak, Woojung;Noh, Younghee
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.1
    • /
    • pp.155-178
    • /
    • 2021
  • In the era of the 4th industrial revolution, public libraries need a strategy for promoting intelligent library services in order to actively respond to changes in the external environment such as artificial intelligence. Therefore, in this study, based on the concept of artificial intelligence and analysis of domestic and foreign artificial intelligence related trends, policies, and cases, we proposed the future direction of introduction and development of artificial intelligence services in the library. Currently, the library operates a reference information service that automatically provides answers through the introduction of artificial intelligence technologies such as deep learning and natural language processing, and develops a big data-based AI book recommendation and automatic book inspection system to increase business utilization and provide customized services for users. Has been provided. In the field of companies and industries, regardless of domestic and overseas, we are developing and servicing technologies based on autonomous driving using artificial intelligence, personal customization, etc., and providing optimal results by self-learning information using deep learning. It is developed in the form of an equation. Accordingly, in the future, libraries will utilize artificial intelligence to recommend personalized books based on the user's usage records, recommend reading and culture programs, and introduce real-time delivery services through transport methods such as autonomous drones and cars in the case of book delivery service. Service development should be promoted.

Comparative Analysis of Biomechanical Behaviors on Lumbar with Titanium and Carbon Fiber Reinforced PEEK Connecting Rods for Fusion Surgery (티타늄과 탄소 섬유 강화 PEEK로 구성된 요추 유합술용 연결봉의 의공학적 영향에 대한 비교 분석)

  • Seo, Hye-Sung;Kang, Hae-Seong;Chun, Houng-Jae
    • Composites Research
    • /
    • v.34 no.3
    • /
    • pp.186-191
    • /
    • 2021
  • The lumbar spinal fusion is a treatment performed to restore the stability of the degenerated lumbar. In this study, the intervertebral discs between two or more segments are removed and a bone graft is inserted to harden the segments. The pedicle screw system is inserted to vertebral bodies to fix two or more segments so that they can be firmly fused. In this study, a total of 7 patient-specific lumbar finite element models were created and pedicle screw systems were installed. The connecting rods made of titanium and CFR-PEEK was inserted to the generated models. Finite element analysis was conducted for four representative spine behaviors and statistical analysis was performed to investigate the biomechanical effects by the material properties of connecting rods. The intradiscal pressure of adjacent segments and the range of motion of the joints of each segment were investigated. In the subjects who used CFR-PEEK instead of Ti for connecting rods, the intradiscal pressure of adjacent segments tend to decrease and the range of motion of each segment tend to increase. However, no statistically significant difference in tendency was observed under all loading conditions.

Development and Validation of Digital Twin for Analysis of Plant Factory Airflow (식물공장 기류해석을 위한 디지털트윈 개발 및 실증)

  • Jeong, Jin-Lip;Won, Bo-Young;Yoo, Ho-Dong;Kim, Tag Gon;Kang, Dae-Hyun;Hong, Kyung-Jin
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.1
    • /
    • pp.29-41
    • /
    • 2022
  • As one of the alternatives to solve the problem of unstable food supply and demand imbalance caused by abnormal climate change, the need for plant factories is increasing. Airflow in plant factory is recognized as one of important factor of plant which influence transpiration and heat transfer. On the other hand, Digital Twin (DT) is getting attention as a means of providing various services that are impossible only with the real system by replicating the real system in the virtual world. This study aimed to develop a digital twin model for airflow prediction that can predict airflow in various situations by applying the concept of digital twin to a plant factory in operation. To this end, first, the mathematical formalism of the digital twin model for airflow analysis in plant factories is presented, and based on this, the information necessary for airflow prediction modeling of a plant factory in operation is specified. Then, the shape of the plant factory is implemented in CAD and the DT model is developed by combining the computational fluid dynamics (CFD) components for airflow behavior analysis. Finally, the DT model for high-accuracy airflow prediction is completed through the validation of the model and the machine learning-based calibration process by comparing the simulation analysis result of the DT model with the actual airflow value collected from the plant factory.