• Title/Summary/Keyword: Application technique

Search Result 6,159, Processing Time 0.043 seconds

The Effects of Benson's Relaxation Technique on Heart Rate Variability (벤슨의 긴장이완법이 정상 성인의 심박변이도에 미치는 영향)

  • Lee, Jin-Gyu;Lee, Jae-Hyuk;Lee, Je-Kyun;Kim, Ji-Hyouck
    • Journal of Oriental Neuropsychiatry
    • /
    • v.17 no.3
    • /
    • pp.57-65
    • /
    • 2006
  • Objectives: The purpose of this research is to investigate the effects of Benson's Relaxation Technique on autonomic nervous system for normal subjects with Heart Rate Variability(HRV) and find out relationship with anti - stress effects. Methods: First, Benson's Relaxation Technique was applied on 5 normal subjects for three weeks. Then HRV was examined for 15 minutes Benson's Relaxation Technique application. Next, Benson's Relaxation Technique each 8 times was applied on 5 normal subjects for 1 weeks. Then :HRV was examined each 5 minutes before and after Benson's Relaxation Technique application. Results: 1. SDNN, SDSD increased continuously in HRV for three weeks Benson's Relaxation Technique application. 2. Mean HRV, SDNN, SDSD were significant different in HRV between before and after Benson's Relaxation Technique application at fourth week. Conclusion: The results suggest that Benson's Relaxation Technique application have shown anti-stress effects and the more Benson's Relaxation Technique is repeated, the more effective.

  • PDF

Application of hybrid LRR technique to protein crystallization

  • Jin, Mi-Sun;Lee, Jie-Oh
    • BMB Reports
    • /
    • v.41 no.5
    • /
    • pp.353-357
    • /
    • 2008
  • LRR family proteins play important roles in a variety of physiological processes. To facilitate their production and crystallization, we have invented a novel method termed "Hybrid LRR Technique". Using this technique, the first crystal structures of three TLR family proteins could be determined. In this review, design principles and application of the technique to protein crystallization will be summarized. For crystallization of TLRs, hagfish VLR receptors were chosen as the fusion partners and the TLR and the VLR fragments were fused at the conserved LxxLxLxxN motif to minimize local structural incompatibility. TLR-VLR hybridization did not disturb structures and functions of the target TLR proteins. The Hybrid LRR Technique is a general technique that can be applied to structural studies of other LRR proteins. It may also have broader application in biochemical and medical application of LRR proteins by modifying them without compromising their structural integrity.

An Application of Z-transform in Single Storm Analysis (단일 호우 해석을 위한 Z-transform 기법의 적용)

  • Park, Haen-Nim;Cho, Won-Cheol
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2005.05b
    • /
    • pp.583-587
    • /
    • 2005
  • At present, various methods are available to analyze storm runoff data. Among these, application of Z-transform is comparatively simple and new, and the technique can be used to identify rainfall and unit hydrograph from analysis of a single storm runoff. The technique has been developed under the premise that the rainfall-runoff process behaves as a linear system for which the Z-transform of the direct runoff equals the product of the Z-transforms of the transfer function and the rainfall. In the hydrologic literatures, application aspects of this method to the rainfall-runoff process are lacking and some of the results are questionable. Thus, the present study provides the estimation of Z-transform technique by analyzing the application process and the results using hourly runoff data observed at the research basin of International Hydrological Program (IHP), the Pyeongchanggang River basin. This study also provides the backgrounds for the problems that can be included in the application processes of the Z-transform technique.

  • PDF

A Technique for the Use of Web Service in CASE Tool for the Component based Application Development (컴포넌트 기반 애플리케이션 개발 CASE 도구에서의 웹 서비스 활용 방안)

  • Kim Younghee;Kim Juil;Lee Woojin;Chong Kiwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.11a
    • /
    • pp.409-412
    • /
    • 2004
  • The technique and process for the acquisition of components by searching and testing the reusable components using Web Service in the CASE tools for component-based application development are proposed. The technique and process for the notice of components using Web Service in order to reuse developed components are also proposed. As using the technique and process, a repository does not need to construct and the reusability of components will rise because components are easily and efficiently searched using Web Service. Furthermore, it is easy to develop application through the plug-and-play of components which are acquired using Web Service, and errors of application by reused components will be minimized because proper components are acquired after pretesting reusable components in the analysis and the architecture phase.

  • PDF

An Effective Technique for Protecting Application Data using Security Enhanced (SE) Android in Rooted Android Phones (루팅된 안드로이드 폰에서 SEAndroid를 이용한 효과적인 앱 데이터 보호 기법)

  • Jeong, Youn-sik;Cho, Seong-je
    • Journal of KIISE
    • /
    • v.44 no.4
    • /
    • pp.352-362
    • /
    • 2017
  • This paper analyzes security threats in Security Enhanced (SE) Android and proposes a new technique to efficiently protect application data including private information on rooted Android phones. On an unrooted device, application data can be accessed by the application itself according to the access control models. However, on a rooted device, a root-privileged shell can disable part or all of the access control model enforcement procedures. Therefore, a root-privileged shell can directly access sensitive data of other applications, and a malicious application can leak the data of other applications outside the device. To address this problem, the proposed technique allows only some specific processes to access to the data of other applications including private information by modifying the existing SEAndroid Linux Security Module (LSM) Hook function. Also, a new domain type of process is added to the target system to enforce stronger security rules. In addition, the proposed technique separates the directory type of a newly installed application and the directory type of previously installed applications. Experimental results show that the proposed technique can effectively protect the data of each application and incur performance overhead up to or less than 2 seconds.

An Energy Optimization Technique for Latency and Quality Constrained Video Applications (지연 시간 및 화질 제약이 있는 비디오 응용을 위한 에너지 최적화 기법)

  • 임채석;하순회
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.10
    • /
    • pp.543-552
    • /
    • 2004
  • This paper proposes an energy optimization technique for latency and quality constrained video applications. It consists of two key techniques: frame-skipping technique and buffering technique. While buffering increases the slack time utilization at the OS level. frame skipping Increases the slack time itself at the application level, and both enhance the effectiveness of the dynamic voltage scaling technique. We use an H.263 encoder application as a test vehicle to which the proposed technique is applied. Experiments demonstrate that the proposed technique achieves noticeable energy reduction satisfying the given latency and video quality constraints.

A Study on the Application Technique and Integration of Remote Sensing and Geographic Information System (리모트센싱과 GIS의 통합 및 그 적용기법에 관한 연구)

  • 안철호;연상호
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.9 no.1
    • /
    • pp.97-107
    • /
    • 1991
  • This paper was suggested the detailed methods on the integration of Remote Sensing and GIS for various application of two functions at the one system with making the most use of respective merits rather than make use of independent systems. It developed of algorithm about simultaneous overlay of raster and vector data for remote sensing and GIS for these objects. For test application on integration of remote sensing and GIS, it used of remote sensing data of satellite and used to topographic map of the same area for vector data acquisition of GIS application. For the practical application, it proved of effective value of integration of raster and vector data by present of useful technique with multilateral approach method through data conversion about thematic application for major application fields of remote sensing and GIS and it suggested that new application technique for integrated application of remote sensing GIS through synthetic situation analysis.

  • PDF

A Design for Network Security System via Non-security Common Network (일반망과 보안망을 연계한 네트워크 보안체계 설계)

  • Cho, Chang-Bong;Lee, Sang-Guk;Dho, Kyeong-Cheol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.5
    • /
    • pp.609-614
    • /
    • 2009
  • In this paper, we have proposed a design for security network system passing through the non-security network which is commonly used for various networking services. Based on the security requirements which are assumed that the large classified data are bi-transmitted between a server and several terminals remotely located, some application methods of security techniques are suggested such as the network separation technique, the scale-down application technique of certification management system based on the PKI(Public Key Infrastructure), the double encryption application using the crypto-equipment and the asymmetric keys encryption algorithm, unrecoverable data deleting technique and system access control using USB device. It is expected that the application of this design technique for the security network causes to increase the efficiency of the existing network facilities and reduce the cost for developing and maintaining of new and traditional network security systems.

Research on Secure Coding and Weakness for Implementation of Android-based Dynamic Class Loading (안드로이드 동적 클래스 로딩 기법을 이용한 개발단계에서의 보안약점 및 시큐어 코딩 연구)

  • Kim, Hyunjo;Choi, Jin-Young
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.10
    • /
    • pp.1792-1807
    • /
    • 2016
  • Android application is vulnerable to reverse engineering attack. And by this, it is easy to extract significant module from source code and repackage it. To prevent this problem, dynamic class loading technique, which is able to exclude running code from distributed source code and is able to load running code dynamically during runtime can be used. Recently, this technique was adapted on variety of fields and applications like updating pre-loaded android application, preventing from repacking malicious application, etc. Despite the fact that this technique is used on variety of fields and applications, there is fundamental lack on the study of potential weakness or related secure coding. This paper would deal with potential weaknesses during the implementation of dynamic class loading technique with analysing related international/domestic standard of weaknesses and suggest a secure way for the implementation of dynamic class loading technique. Finally, we believe that this technique described here could increase the level of trust by decreasing the weakness related to dynamic class loading technique.