• Title/Summary/Keyword: Acts

Search Result 3,418, Processing Time 0.028 seconds

RNases and their role in Cancer

  • Beeram, Eswari
    • The Korean Journal of Food & Health Convergence
    • /
    • v.5 no.2
    • /
    • pp.27-34
    • /
    • 2019
  • RNases plays a pivotal role in biological system and different RNases are known for their various functions like angiogenesis, immunological response, antiviral, antitumour activity and apoptosis. In which anti tumour activity of RNase is proved to improve genome stability in normal cells up to some extent. RNases like RNase L shows antiviral and antitumour activities against virus infected cells and cancer cells through 2'-5' oligo adenylate pathway and induces RNaseL dependent apoptosis where as RNase A modulates various proliferative pathways like MAP kinase, JNK, TGF-${\beta}$ and activates apoptosis in cancer cells and promotes immunological response through processing of Ags. IRE1 RNase acts as both tumour suppressor gene and oncogene in normal and cancer cells and involved in both antitumour and tumorigenic activities. RNase III upregulates miRNA in cancer cells there by acting via posttranscriptional level and proven to be effective against colorectal adeno carcinoma. In addition to this IRE1 RNase is a double edged sword through RIDD pathway in ER (18). To some of the cancers expressing c-myc IRE1 acts as tumour suppressor where as in cancers where myc is downregulated IRE1 acts as tumour provoking through RIDD pathway (18). Thus RNases play vital role in regulating the genome stability.

An Analysis of Relationship between Unsafe Acts and Human Errors of Workers for Construction Accident Prevention (건설사고 예방을 위한 근로자의 불안전한 행동과 휴먼에러와의 관계 분석)

  • Min, Kwangho;Cha, Yongwoon;Han, Sangwon;Hyun, Changtaek
    • Journal of the Architectural Institute of Korea Structure & Construction
    • /
    • v.35 no.5
    • /
    • pp.161-168
    • /
    • 2019
  • Construction industry is becoming more advanced, but safety accidents are not decreasing and unsafe act (UA) and human errors (HE) are the main causes of safety accidents. Therefore, this study aims to analyze the relationships between unsafe acts and human errors for construction accident prevents. Specifically, the Correlation Analysis is used to quantify 24 combinations of the relationship between the UA and HE. Then, the Kano Model, and Timko Satisfied Coefficient was utilized to find 6 combinations for construction accident prevention plans. As the result of Timko Satisfied Coefficient, an interview was conducted with three safety managers and 6 safety prevention plan is proposed. Through these results, it is expected that the combination of 24 accidents will be basic data of safety management. Especially, the proposed safety prevention plans considering the characteristics of 6 combinations with high correlation can contribute to prevention of safety accidents at the construction site.

Clustering Keywords to Define Cybersecurity: An Analysis of Malaysian and ASEAN Countries' Cyber Laws

  • Joharry, Siti Aeisha;Turiman, Syamimi;Nor, Nor Fariza Mohd
    • Asia Pacific Journal of Corpus Research
    • /
    • v.3 no.2
    • /
    • pp.17-33
    • /
    • 2022
  • While the term is nothing new, 'cybersecurity' still seems to be defined quite loosely and subjectively depending on context. This is problematic especially to legal writers for prosecuting cybercrimes that do not fit a particular clause/act. In fact, what is more difficult is the non-existent single 'cybersecurity law' in Malaysia, rather than the current implementation of 10-related cyber security acts. In this paper, the 10 acts are compiled into a corpus to analyse the language used in these acts via a corpus linguistics approach. A list of frequent words is firstly investigated to see whether the so-called related laws do talk about cybersecurity followed by close inspection of the concordance lines and habitually associated phrases (clusters) to explore use of these words in context. The 'compare 2 wordlist' feature is used to identify similarities or differences between the 10 Malaysian cybersecurity related laws against a corpus of cyber laws from other ASEAN countries. Findings revealed that ASEAN cyber laws refer mostly to three cybersecurity dominant themes identified in the literature: technological solutions, events, and strategies, processes, and methods, whereas Malaysian cybersecurity-related laws revolved around themes like human engagement, and referent objects (of security). Although these so-called cyber related policies and laws in Malaysia are highlighted in the National Cyber Security Agency (NACSA), their practical applications to combat cybercrimes remain uncertain.

Detecting Anomalies, Sabotage, and Malicious Acts in a Cyber-physical System Using Fractal Dimension Based on Higuchi's Algorithm

  • Marwan Albahar
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.69-78
    • /
    • 2023
  • With the global rise of digital data, the uncontrolled quantity of data is susceptible to cyber warfare or cyber attacks. Therefore, it is necessary to improve cyber security systems. This research studies the behavior of malicious acts and uses Higuchi Fractal Dimension (HFD), which is a non-linear mathematical method to examine the intricacy of the behavior of these malicious acts and anomalies within the cyber physical system. The HFD algorithm was tested successfully using synthetic time series network data and validated on real-time network data, producing accurate results. It was found that the highest fractal dimension value was computed from the DoS attack time series data. Furthermore, the difference in the HFD values between the DoS attack data and the normal traffic data was the highest. The malicious network data and the non-malicious network data were successfully classified using the Receiver Operating Characteristics (ROC) method in conjunction with a scaling stationary index that helps to boost the ROC technique in classifying normal and malicious traffic. Hence, the suggested methodology may be utilized to rapidly detect the existence of abnormalities in traffic with the aim of further using other methods of cyber-attack detection.

Implications of Digital Education Policy -Focused on Basic Act for Digital-based Education-

  • Shinhye, Heo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.321-329
    • /
    • 2024
  • This study attempted to obtain implications for digital education policy by reviewing the Framework Acts and Enforcement Decrees related to digital education. To this end, the following were explored. First, the concept and components of digital competency were reviewed. Second, the Framework Acts and Enforcement Decrees related to digital education policy were reviewed using the above concepts. Third, the characteristics and implications of the Framework Acts and Enforcement Decrees for digital education were explored. The results are as follows: Korea's digital education policy tried to reflect the categories that digital competency must cover, even its function and dysfunction role. However, to achieve their purpose, it is necessary to maintain consistency with related laws or policies. We identified that amendments to the Basic Act and related articles are essential to effectively enforce the Digital-Based Distance Education Activation Basic Act. A reevaluation of the correlation between Article 10, emphasizing digital media literacy education, and Article 5 of the enforcement decree is necessary. Revision of the enforcement decree to align with Article 10's objectives is vital to ensure proactive measures for promoting digital literacy and competence as mandated by the Basic Act.

A Study on the Greeting Acts of Chinese Students in Korea: Focused on Workplace Greetings (재한 중국인 유학생의 인사 화행에 대한 고찰: 직장 인사말 중심으로)

  • CUI YONGLIN
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.261-270
    • /
    • 2024
  • This study is to analyze the aspects of speech acts of greetings in the workplace by Chinese students studying in South Korea. While existing studies have mainly focused on specific expressions of 'hardship' and 'greetings', or have been tailored to improve textbooks, this study aims to analyze the realization patterns of greeting actions in the workplace by Chinese students studying in Korea, based on speech act theory. It seeks to identify the differences and similarities between Chinese students in Korea and Koreans. The method of the Discourse Completion Test (DCT) in speech act theory is used for investigation, review, and analysis. Through the analysis results, this study hopes to understand the importance of greeting expressions among Chinese students in Korea and to help develop effective greeting strategies.

The Trend of Internet Related Crimes and their Solution (Internet 관련 범죄(犯罪)의 동향(動向)과 그 대책(對策))

  • Song, Kwang-Soub
    • Korean Security Journal
    • /
    • no.2
    • /
    • pp.99-123
    • /
    • 1999
  • Internet related crimes are a crime which is inter-related with high specialization ${\cdot}$ technicality ${\cdot}$ leakage of information ${\cdot}$ intellectual-offence and deviant behavior. Without the accurate countermeasure, we can't achieve the desired end. So we should find out multilateral and general measure. Always crimes go in advance of the measure, so the counter measures against, computer crime can not be final. Nevertheless, we can't be careless in making the measure, but we should always consider a counter measure. 1995. 12. 29. our country revised criminal law and consolidated direct provisions, especially on the computer-hacking. But, inspite of the revision, especially on the computer-hacking. But, inspite of the revision, we have many problems'. So, first of all, through the positive and empirical study, we should revise criminal law and computer crime related provisions systematically. As the aspects and techniques of internet related crimes are always changing with the development of computer technology, there will be many problems with principle of legality, when we apply the existing abstract provisions to the new crime. We can not be lazy in studying the emerging internet related crimes and taking concrete shape of the provision. And it will be a big help to that desirable to import the foreign provision without consideration of our reality. Without the positive and empirical study on internet related crimes, sometimes important crime will be out of reach of the punishment. Due to these day's development of computer and technology of communication, the personal computers are widely supplied and especially PC communication and exchange of the informations became the most important function. With the advent of internet, new aspects of crimes are appearing. Up to now, the fraud by using the computer or the interference in the execution of duty by the illegal operation of computer was the leading aspects of computer crime, but nowadays with the advent of internet, database crime or network crime like the computer hacking became the important aspects of internet related crimes. These new aspects of internet related crimes are defusing into domains of traditional crimes. Nevertheless to follow and punish the acts on the internet is not technically easy, and as it is emerging international shape, to settle it by international law is not that easy. Harmful acts in the information-oriented society are very diverse in kinds and aspects, and it is difficult to enumerate. The point is that among the new acts in the information-oriented society we should decide which acts are to be punished and which acts are not to be punished. It is needless to say that the criminal law should be the last resort. But owing to the characters of the characteristics of the information-oriented society, when the traditional standards can be applied, the question of what is the basis and how it can be applied in a concrete way is not settled. And if it cannot be applied, how can we make new standard is also an unsettled question.

  • PDF

The Details and Outlook of Three Data Acts Amendment in South Korea: With a Focus on the Changes of Domestic Financial and Data Industry (데이터 3법 개정안의 내용과 전망: 국내 금융 및 데이터 산업계의 변화를 중심으로)

  • Kim, Eun-Chan;Kim, Eun-Young;Lee, Hyo-Chan;Yoo, Byung-Joon
    • Informatization Policy
    • /
    • v.28 no.3
    • /
    • pp.49-72
    • /
    • 2021
  • This study analyzes the major content, significances, and future outlook of Three Data Acts amendment enacted in August 2020 in South Korea, with the focus on their impact on the financial and data industries. It seems that the revision of the Credit Information Act will enable the specification of a business which had previously only been regulated as the business of credit inquiry, and also enable the domestic data industry to activate the MyData industry, data trading and platforms, and specify data pseudonymization and trading procedures. For the rational and efficient implementation of the amendments to the Three Data Acts, the Personal Information Protection Committee must be as transparent and lawful in its activities as possible, and fairness must be guaranteed. Even in the utilization of personal information, the development or complementation of the related data processing technologies is essential, and clear data processing methods and areas must be regulated. Furthermore, the amendments must be supported with guarantees and the systematization of a fair competitive system in the data market, stricter regulations on penalties for illegal acts related to data, establishment and strengthening of the related security systems, and reinforcement of the system of cooperation for data transfer.

The Hero with Two Faces: Heroes as Portrayed in The Jeon-gyeong (두 얼굴을 가진 영웅 - 『전경』의 영웅을 중심으로 -)

  • Lee, Young-jun;Kim, Jin-young
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.32
    • /
    • pp.201-236
    • /
    • 2019
  • Heroes are the subjects who discover hope and provide people with courage and wisdom. At the same time, heroes have been known to renovate individuals and even societies on various dimensions throughout history. In recent times, a new academic field called 'heroism science' has emerged, leading to an era which focuses on their positive social functions and roles as reflected by war heroes from ancient times to ordinary civic heroes. However, attention is rarely paid to the ways in which their heroic acts have sometimes resulted in ethical problems such as the exertion of negative influences or the degradation of morality. Specifically speaking, people affected by the acts of heroes include not only beneficiaries but also specific subjects who could be considered victims. In a broad sense, the results caused by heroic acts could have an influence on harmony and unity in societies, the hero's nation, or even the entirety of the universe, and this is often overlooked. Given these realities, this study aims to understand how heroic acts simultaneously imply a positive side wherein cosmic restoration or reform are practiced and a negative side which carries out the destruction of life or the birth new disorders. In other words, the limitations of heroism is also worth consideration. To conduct this study, research on heroes will be comprehensively studied from various academic perspectives through previous documents on this subject. Western concepts that relate to heroes and heroic acts will be also illustrated. Reflections on Jeungsanist Thought, Korean heroes, and the limitation of heroes in the Former World will also be elucidated. Lastly, this study will discuss an authentic heroic figure that can be held up as an exemplary role model.

The Welfare Systems in Sweden and Korea with a Focus on the Demographic Transition (인구변천 과정에서 본 한국과 스웨덴의 복지 상태 비교)

  • 김성이
    • Korea journal of population studies
    • /
    • v.18 no.2
    • /
    • pp.51-69
    • /
    • 1995
  • The Swedish welfare state has been the model for others to emulate the archetypical example of state intervention. The state interventions are presented in the form of legal acts. These social welfare acts can be classified according to the demographic transition theory. According to the Bogue's theory, the demographic transition in Sweden took place in four stages : the pre-transitional stage before 1810; the early transitional stage from 1810 to 1860; the mid-transitional stage from 1860 to 1930; the late transitional stage from 1930 to now. As we look into the social welfare acts in Sweden, the relief of the poor was the major concern of the early transitional stage, the care of workers was the major concerns of the mid-transitional stage and the care of the families was the major concerns in the late transitional stage. The Korea's transition period can be devided as follows; the pre-transitional stage before 1960; the early transitional stage from 1960 to 1969; the mid-transitional stage from 1970 to 1987; and the late transitional stage from 1987 to now. In Korea, the major concern of the early transitional stage was the care of the officials and the workers; in the mid-transitional stage the care of the aged and the handicapped were the major concerns. And in the late transitional stage the expanding of the welfare clients was the major concern. If we compare the results of both countries, the relief of the poor, the care of the workers and the care of the families will be the major concerns in Korea, because the social welfare acts in Korea are extended to specific groups and not to the whole population. The acts related to these social issues have been arranged in 120 years in Sweden. But Korea had to do the same work in 27 years. So the burden of making those social acts will be four times heavier. If we want to extend the benefits of the social system to the general population, we need to look at the design and approach of the swedish model. The reason why swedish social acts constitute an international model has more to do with the uniqueness of its design and approach. First of all, it is characteristic by its universalism, secondly by its emphasis on social services and thirdly by its productivitism. Also the swedish welfare state supported by a high-tax system called the earnings-related welfare system. In order to achieve an effective welfare state, we Koreans should pay attention to the relief of the poor, the care of the worker and the families. We should also focus on a good system design and prepare appropriate budgets.

  • PDF