• Title/Summary/Keyword: 수행적기억

Search Result 443, Processing Time 0.025 seconds

Venerable Kim Ji-jang's Process of Becoming Ksitigarbha Bodhisattva (신라승 김지장(金地藏)의 지장보살화(地藏菩薩化) 과정)

  • An, Yang-gyu
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.38
    • /
    • pp.153-182
    • /
    • 2021
  • The Buddhist monk, Kim Ji-jang (金地藏), a native of Silla, is still revered as Ksitigarbha Bodhisattva in China. In Chinese Buddhism, Kim Ji-jang's becoming Ksitigarbha Bodhisattva is unique in at least two ways. First, it is said that his becoming the bodhisattva originated not in Silla, but in China, a foreign country. Second, it is said that the historical person became regarded as a mythical being, Ksitigarbha Bodhisattva. The process of Kim Ji-jang's becoming Bodhisattva can be divided into three periods. The first period is the period of entering and practicing at Mount Jiuhua in China, and this also includes the period wherein he was first revered as Ksitigarbha Bodhisattva. The second period begins immediately after Kim Ji-jang's death and ends three years later. In this period he became regarded as Ksitigarbha Bodhisattva. The third period spans three years after his death to the present age. His status as Ksitigarbha Bodhisattva carries on at present. There are two main causes for Kim Ji-jang's transformation into the bodhisattva. The first is an internal bodhisattva process. According to Ksitigarbha Bodhisattva's main vow, Kim Ji-jang's practice and edification impressed the public. The second is an external bodhisattva process. The miracles that appeared at the time of his death or the manifestation of the incorruptible relics three years after his death played a decisive role in the process of Kim Ji-jang becoming a bodhisattva. In line with the public's devotion, the Chinese imperial family repaired and supported the temple that enshrined the relics of Kim Ji-jang. Various factors could be analyzed in the process of Kim Ji-jang's becoming Ksitigarbha Bodhisattva, but more than anything else, it was Kim Ji-jang's severe ascetic practices and his virtuous edification of others.

New Trend of Pain Evaluation by Brain Imaging Devices (뇌기능 영상장치를 이용한 통증의 평가)

  • Lee Sung-Jin;Bai Sun-Joon
    • Science of Emotion and Sensibility
    • /
    • v.8 no.4
    • /
    • pp.365-374
    • /
    • 2005
  • Pain has at least two dimensions such as somatosensory qualities and affect and patients are frequently asked to score the intensity of their pain on a numerical pain rating scale. However, the use of a undimensional scale is questionable in view of the belief, overwhelmingly supported by clinical experience as well as by empirical evidence from multidimensional scaling and other sources, that pain has multidimensions such as sensory-discrimitive, motivational-affective and cognitive-evaluative The study of pain has recently received much attention, especially in understanding its neurophysiology by using new brain imaging techniques, such as positron emission tomography(PET) and functional magnetic resonance imaging (fMRI), both of which allow us to visualize brain function in vivo. Also the new brainimaging devices allow us to evaluate the patients pain status and plan To treat patients objectively. Base4 on our findings we presented what are the new brain imaging devices and the results of study by using brain imaging devices.

  • PDF

Does the Gut Microbiota Regulate a Cognitive Function? (장내미생물과 인지기능은 서로 연관되어 있는가?)

  • Choi, Jeonghyun;Jin, Yunho;Kim, Joo-Heon;Hong, Yonggeun
    • Journal of Life Science
    • /
    • v.29 no.6
    • /
    • pp.747-753
    • /
    • 2019
  • Cognitive decline is characterized by reduced long-/short-term memory and attention span, and increased depression and anxiety. Such decline is associated with various degenerative brain disorders, especially Alzheimer's disease (AD) and Parkinson's disease (PD). The increases in elderly populations suffering from cognitive decline create social problems and impose economic burdens, and also pose safety threats; all of these problems have been extensively researched over the past several decades. Possible causes of cognitive decline include metabolic and hormone imbalance, infection, medication abuse, and neuronal changes associated with aging. However, no treatment for cognitive decline is available. In neurodegenerative diseases, changes in the gut microbiota and gut metabolites can alter molecular expression and neurobehavioral symptoms. Changes in the gut microbiota affect memory loss in AD via the downregulation of NMDA receptor expression and increased glutamate levels. Furthermore, the use of probiotics resulted in neurological improvement in an AD model. PD and gut microbiota dysbiosis are linked directly. This interrelationship affected the development of constipation, a secondary symptom in PD. In a PD model, the administration of probiotics prevented neuron death by increasing butyrate levels. Dysfunction of the blood-brain barrier (BBB) has been identified in AD and PD. Increased BBB permeability is also associated with gut microbiota dysbiosis, which led to the destruction of microtubules via systemic inflammation. Notably, metabolites of the gut microbiota may trigger either the development or attenuation of neurodegenerative disease. Here, we discuss the correlation between cognitive decline and the gut microbiota.

An Unproved Optimal Strong-Password Authentication (I-OSPA) Protocol Secure Against Stolen-Verifier Attack and Impersonation Attack (Stolen-Verifier 공격과 Impersonation 공격에 안전한 개선된 OSPA 프로토콜)

  • Kwak, Jin;Oh, Soo-Hyun;Yang, Hyung-Kyu;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.439-446
    • /
    • 2004
  • In the Internet, user authentication is the most important service in secure communications. Although password-based mechanism is the most widely used method of the user authentication in the network, people are used to choose easy-to-remember passwords, and thus suffers from some Innate weaknesses. Therefore, using a memorable password it vulnerable to the dictionary attacks. The techniques used to prevent dictionary attacks bring about a heavy computational workload. In this paper, we describe a recent solution, the Optimal Strong-Password Authentication (OSPA) protocol, and that it is vulnerable to the stolen-verifier attack and an impersonation attack. Then, we propose an Improved Optimal Strong-Password Authentication (I-OSPA) protocol, which is secure against stolen-verifier attack and impersonation attack. Also, since the cryptographic operations are computed by the processor in the smart card, the proposed I-OSPA needs relatively low computational workload and communicational workload for user.

Development of Microprocessor-based Automatic Storage Controller and Temperature Auto-measurement System for Horticultural Crops (마이크로프로쎄서를 이용한 과채류 자동 저장 제어장치의 제작과 온도 자동계측 관리 시스템)

  • Park, Je-Kyun;Chun, Jae-Kun;Lee, Seung-Koo;Kim, Kong-Hwan
    • Korean Journal of Food Science and Technology
    • /
    • v.20 no.6
    • /
    • pp.845-849
    • /
    • 1988
  • A laboratory scale storage facility consisting of a cold room, sample jars and a ventilation device was designed and built. Storaging sample jars (1.7 l) for fruit were fabricated with transparent acryl and provided with a constant air flow. For the supplying of air to sample jars, the air distributing system was built with solenoid valves, an air precooling coil and a pressure equalizing tank. To provide the programmable storaging environment of the facility a microprocessor-based controller was designed and installed. The controller was built with the 8 bit microprocessor (Z-80), EPROM, RAM, programmable peripheral interface(8255 PPI), and A/D converter. Softwares for the auto-temperature measurement and control of the storage system were developed and systemized in ROM. The automated storage system was applied to citrus storage, and the temperature of the storage facilities was successfully acquisited to the computer and controlled.

  • PDF

Brain Activation Associated with Set Size During Random Number Generation (무선열 생성과제에서 반응후보 수에 따른 뇌활성화 양상)

  • Lee, Byeong-Taek;Kim, Cheong-Tag
    • Korean Journal of Cognitive Science
    • /
    • v.19 no.1
    • /
    • pp.57-74
    • /
    • 2008
  • This study aimed to investigate the preferential brain activations involed in the set size during random number generation (RNG). The BNG condition gave more increased activations in the anterior cingulate cortex (ACC), inferior frontal gyrus (IFG), inferior parietal lobule (IPL), and superior temporal gyrus (STG) than the simple counting condition, which was a control rendition. When the activations were compared by the small set size condition versus the large set size condition, broad areas covering tempore-occipital network, ACC, and postcentral gyrus were more highly activated in the small set size condition than in the large set size condition, while responses of areas including medial frontal gyrus, superior parietal lobule, and lingual gyrus were more increased in the large set size condition than in the small set size condition. The capacity hypothesis of working memory fails to explain the results. On the contrary, strategy selection hypothesis seems to explain the current observations properly.

  • PDF

Customized healthcare service platform connecting EMR system (병원 내 EMR 시스템 연동을 통한 맞춤형 헬스케어 서비스 시스템 개발)

  • Gwak, Dae-Hun;Kim, Seok-Il;Yun, Seo-Won;Seong, Kyeong-Hwa;Jung, Joong-Hwa;Koh, Seok-Joo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.690-692
    • /
    • 2018
  • Recently, university hospitals have problems as patient datas grows. And it is difficult that medical staffs check patients living on their prescription. Patients don't often remember their prescription, and don't know how to apply the prescription to their life. To solve these problems, To solve these problems, it is customized healthcare service platform using MQTT push notification. It is provided in form of a web application having good accessibility that. Based on doctor's prescription, the patients take notifications that is the timing of medication, medical appointments, and other prescription informations. The results can be entered into the web application. The healthcare professionals can check that the patients are following their prescription well. In this paper, we provide the above functions via the web application and a RESTful API server platform, and notification function can be efficiently performed by MQTT Broker. So we checked the customized healthcare service can be effectively provide.

  • PDF

NEUROPSYCHOLOGICAL ASSESSMENT OF CHILDREN WITH ATTENTION DEFICIT/HYPERACTIVITY DISORDER (주의력결핍/과잉운동장애 아동의 신경심리학적 평가)

  • Shin, Min-Sup;Park, Suzanne
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.8 no.2
    • /
    • pp.217-231
    • /
    • 1997
  • This paper first reviewed the current neurological theories concerning the etiology of ADHD and secondly, examined results of studies that applied neuropsychological assessment methods in the examination of ADHD children both here in Korea and abroad. ADHD children were found to exhibit characteristic responses indicating deficits in vigilance, sustained attention, distractibility, allocation and regulation of attention in many assessments of attention, in addition to deficits in executive functioning, working and associative memory. Such neuropsychological assessment results suggest that in addition to dysfunction in the frontal lobe and the reticular activation system, dysfunction may exist in other neural pathways involving many areas of the brain. However, because a substantial number of neuropsychological assessment tools being employed in Korea for ADHD children had been developed abroad, a Korean standardization project involving ADHD and normal control children, in addition to other child psychiatric population pools must be conducted in order to obtain appropriate age norms and test validity, and in order to make possible a more accurate and precise comparison and interpretation in the assessment of ADHD children.

  • PDF

Massive Terrain Rendering Method Using RGBA Channel Indexing of Wavelet Coefficients (웨이블릿 압축 계수의 RGBA채널 인덱싱을 이용한 대용량 지형 렌더링 기법)

  • Kim, Tae-Gwon;Lee, Eun-Seok;Shin, Byeong-Seok
    • Journal of Korea Game Society
    • /
    • v.13 no.5
    • /
    • pp.55-62
    • /
    • 2013
  • Since large terrain data can not be loaded on the GPU or CPU memory at once, out-of-core methods which read necessary part from the secondary storage such as a hard disk are commonly used. However, long delay may occur due to limited bandwidth while loading the data from the hard disk to memory. We propose efficient rendering method of large terrain data, which compresses the data with wavelet technique and save its coefficients in RGBA channel of an image us, then decompresses that in rendering stage. Entire process is performed in GPU using Direct Compute. By reducing the amount of data transfer, performing wavelet computations in parallel and doing decompression quickly on the GPU, our method can reduce rendering time effectively.

Design of COS for smart card user authentication using signature (서명을 이용한 스마트카드 사용자 인증을 위한 COS 설계)

  • 송영상;신인철
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.4
    • /
    • pp.103-112
    • /
    • 2004
  • This paper suggests the way to realize smart card security system by using handwritten signature instead of a password which is traditionally used for user authentication. Because of the familiarity of signature we don't need to try to remember the password and signature is difficult to be used by guess or illegal forced situation. The feature data of handwritten signature is large, so we designed COS which is consist of special commands for processing user's handwritten signature data, user authentication, and basic commands based on ISO 7816-3. Also protocol among user, smart card terminal and DB server is designed. In registration process, the feature data of user signature is saved in both a DB server and a smart card. User authentication is processed by comparing the user signature and the saved feature data in a smart card and in a DB server. And the authentication result and hash value of signature data in DB server are transferred to smart card. During this process the authentication between DB server and user is finished. The proposed security system has more higher level of security in user authentication of smart card and it will Provide safer and more convenient security services.