• Title/Summary/Keyword: Cyber world

Search Result 372, Processing Time 0.024 seconds

A Study on the 'Re-appearance of Picturing ' in the On-Line Community (온라인 커뮤니티에서의 픽처링 재현에 관한 연구)

  • Son, Keum-Sun;Yoon, Jun-Sung
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02b
    • /
    • pp.737-742
    • /
    • 2007
  • The concept of 'Picturing' is beyond the 'Illusion' of traditional art in the Digital Media era. It is a 'Suffering' of the 'Re-appearance' that is masquerade the 'Actual' as a 'Digital Apparition.' This study aims to concern the point of view on the above subject; the 'Picturing' through the analysis of communication problems in the digital era. To begin with, need to define the concept of 'Picturing' and how it is expected to have a role through the accessibility of medium use, intervention by body and images. Also, I suggest a new approach to 'Picturing' as a new mutual communication method. Body, Digital media, and Image. These three principles of 'Picturing' create huge benefits to our world/nature whether we want it or not. It seems to become more and more of powerful self-replicating organism. We have to be aware what sort of images are surrounding us and how transmitting it to where in/on our body via newest sophisticated media we use. 'Picturing' is an invasion of ordinary, no longer exists pleasure for body, no longer speaks intension of its next destination. It strongly self-grows and also controls us in the name of Digital media era. However, 'Picturing' is a mode of re-imaging activity and also suggestion of re-appearance practice.

  • PDF

Anti-Proliferative Activity of OD78 Is Mediated through Cell Cycle Progression by Upregulation p27kip1 in Rat Aortic Vascular Smooth Muscle Cells

  • Tudev, Munkhtsetseg;Lim, Yong;Park, Eun-Seok;Kim, Won-Sik;Lim, Il-Ho;Kwak, Jae-Hwan;Jung, Jae-Kyung;Hong, Jin-Tae;Yoo, Hwan-Soo;Lee, Mi-Yea;Pyo, Myoung-Yun;Yun, Yeo-Pyo
    • Biomolecules & Therapeutics
    • /
    • v.19 no.2
    • /
    • pp.187-194
    • /
    • 2011
  • Atherosclerosis and post-angiography restenosis are associated with intimal thickening and concomitant vascular smooth muscle cell (VSMC) proliferation. Obovatol, a major biphenolic component isolated from the Magnolia obovata leaf, is known to have anti-inflammatory and anti-tumor activities. The goal of the present study was to enhance the inhibitory effects of obovatol to improve its potential as a preventive or therapeutic agent in atherosclerosis and restenosis. Platelet-derived growth factor (PDGF)-BB-induced proliferation of rat aortic smooth muscle cells (RASMCs) was examined in the presence or absence of a newly synthesized obovatol derivative, OD78. The observed anti-proliferative effect of OD78 was further investigated by cell counting and [$^3H$]-thymidine incorporation assays. Treatment with 1-4 ${\mu}M$ OD78 dose-dependently inhibited the proliferation and DNA synthesis of 25 ng/ml PDGF-BB-stimulated RASMCs. Accordingly, OD78 blocked PDGF-BB-induced progression from the $G_0/G_1$ to S phase of the cell cycle in synchronized cells. OD78 decreased the expression levels of CDK4, cyclin E, and cyclin D1 proteins, as well as the phosphorylation of retinoblastoma protein and proliferating cell nuclear antigen; however, it did not change the CDK2 expression level. In addition, OD78 inhibited downregulation of the cyclin-dependent kinase inhibitor (CKI) $p27^{kip1}$. However, OD78 did not affect the CKI $p21^{cip1}$ or phosphorylation of early PDGF signaling pathway. These results suggest that OD78 may inhibit PDGF-BB-induced RASMC proliferation by perturbing cell cycle progression, potentially through $p27^{kip1}$ pathway activation. Consequently, OD78 may be developed as a potential anti-proliferative agent for the treatment of atherosclerosis and angioplasty restenosis.

A Study on Development of GenBank-based Prototype System for Linking Heterogeneous Content (GenBank를 활용한 이종의 콘텐트 연계 프로토타입 시스템 개발 연구)

  • Ahn, Bu-Young;Shin, Young-Ju;Kim, Dea-Hwan
    • Journal of Information Management
    • /
    • v.40 no.4
    • /
    • pp.109-133
    • /
    • 2009
  • Among biological information, GenBank, provided by the National Center for Biotechnology Information (NCBI)of the United States, is a representative database on genetic information and is the most widely used by researchers around the world. Korea Institute of Science and Technology Information (KISTI) visits NCBI on a regular basis and downloads the latest version of GenBank to reorganize the information gathered there into a database. This database is provided for Korean researchers of science and technology through the Bio-KRISTAL search engine, developed by KISTI. This study aims to design a service model that links information on papers, patents, and biodiversity and other contents of NDSL, an integrated service on scientific and technological information run by KISTI, with GenBank's reference and organism fields and to develop a prototype system. For this purpose, this paper explores the possibility of a linkage and convergence service between heterogeneous content by: (a) collecting GenBank data from NCBI's FTP site; (b) dividing GenBank text files into basic and reference genetic information and restructuring them into a database; (c) extracting article and patent information from the GenBank reference fields to generate new tables; and (d) leveraging data mapping technology to implement a prototype system where GenBank and NDSL data are interlinked and provided.

Changes of Technologies of the Self by Personal Blog (개인 블로그를 통한 자기기술(自己技術)의 변화)

  • Kim, Jong-Deok;Cho, Na-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.8
    • /
    • pp.128-146
    • /
    • 2008
  • Cyworld has created a new social phenomenon that relationship between people and communities could be built by committing to digital writing. It has altered the way of people's writing attitudes from self-confessed to self-describing and self-broadcasting ways in which one regards oneself as the center of the cyber world. The purpose of this paper is to identify the shift in one's writing attitudes and how he/she develops technologies of the self in the Cyworld space. Quantitative and qualitative methods support the result; The analysis of 100 Cyworld users' mini-homepages show how the visual images in Cyworld affects their way of digital writing and the analysis of the change of writing habit due to sharing data how virtual 'family' that has been created by Cyworld. I categorize the characteristics of digital writing into three; 1)Visualization of technologies of the self 2)Networked technologies of the self 3)Sharing secretes. The aim of writing in Cyworld is not to keep the secrete but to share and, eventually, texts are circulated in the networked society where one is participated(Cyworld family). Therefore, the usage of images plays a significant role in Cyworld communities because the opened secretes are usually prepared to be presented on the basis of trustworthy toward other members.

The Emerging security initiatives and forecasting future social and natural environment changes (신흥안보 창발과 미래 사회 및 자연환경 변화예측)

  • Jung, Min-Sub;NamKung, Seung-Pil;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.2
    • /
    • pp.327-331
    • /
    • 2020
  • In that this study is a subject and character of risk, emerging security covers non-military areas in addition to traditional military security: environmental security, human security, resource security, and cyber security. The rise of these risks is not only changing the phenomenon of the new expansion of security areas, but also the expansion of the number and scope of security entities and the aspect of security world politics. These risks are transnational security issues at the global level in terms of their nature and extent of the damage, as well as multi-layered ones that affect local and personal security issues at the regional and national levels. In addition to national actors, non-state actors such as international organizations, multinational corporations, and global civil society, and furthermore, technology and social systems themselves are causing risks. Therefore, to solve the new security problem, it is necessary to establish a middle-level and complex governance mechanism that is sought at the regional and global levels beyond the fragmented dimension of the occurrence of new security issues that have been overlooked in the existing frame of perception, and to predict and find ways to respond to new security paradigms that have been identified in a broader sense.

Design of Adaptive Security Framework based on Carousel for Cognitive Radio Network (인지무선네트워크를 위한 회전자 기반 적응형 보안프레임워크 설계)

  • Kim, Hyunsung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.5
    • /
    • pp.165-172
    • /
    • 2013
  • Convergence is increasingly prevalent in the IT world which generally refers to the combination of two or more different technologies in a single device. Especially, the spectrum scarcity is becoming a big issue because there are exponential growth of broadcasting and communication systems in the spectrum demand. Cognitive radio (CR) is a convergence technology that is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum opportunistically. However, the very process of convergence is likely to expose significant security issues due to the merging of what have been separate services and technologies and also as a result of the introduction of new technologies. The main purpose of this research is focused on devising an adaptive security framework based on carousel for CR networks as a distinct telecommunication convergence application, which are still at the stage of being developed and standardized with the lack of security concerns. The framework uses a secure credential, named as carousel, initialized with the location related information from objects position, which is used to design security mechanisms for supporting privacy and various securities based on it. The proposed adaptive security framework could be used as a security building block for the CR network standards and various convergence applications.

A Study on the Explosion Hazardous Area in the Secondary Leakage of Vapor Phase Materials Based on the Test Results and the Leak Rate According to SEMI S6 in the Semiconductor Industry (반도체 산업의 SEMI S6에 따른 실험결과 및 누출률을 기준으로 한 증기 상 물질의 2차 누출 시 폭발위험장소에 관한 연구)

  • Kim, Sang Ryung;Lim, Keun Young;Yang, Won Baek;Rhim, Jong Guk
    • Journal of the Korean Institute of Gas
    • /
    • v.24 no.2
    • /
    • pp.15-21
    • /
    • 2020
  • Currently, in KS C IEC 60079-10-1, the leakage hole radius of secondary leakage is expressed as a recommendation. Underestimation of leak hole size can lead to underestimation of the calculated values for leak rates, and conservative calculations of leak hole sizes, which are considered for safety reasons, can be overestimated, resulting in an overestimated risk range. This too should be avoided. Therefore, a careful and balanced approach is necessary when estimating the size of leaking holes.Based on this logic, this study examines the stability by grasping the concentration inside the gas box when leaking dangerous substances as a result of experiments based on SEMI S6, an international safety standard applied in the semiconductor industry and The scope of explosion hazardous area was determined by applying the formula of KS C IEC 60079-10-1 according to SEMI F15 leak rate criteria and SEMI S6 leak rate criteria. Based on this, we will examine whether the exhaust performance needs to be improved as an alternative to FAB facilities that are difficult to apply to explosion hazards such as semiconductor industry.

The Effects of Child Care Teachers' Job Stress and Work Environment on their Performance of Roles: Focusing on the Regulating Effects of Ego Resilience (보육교사의 직무스트레스, 직무환경이 역할수행에 미치는 영향 : 자아탄력성의 조절효과)

  • Jang, Sung Ye;Lee, Ju Yeon
    • Korean Journal of Child Education & Care
    • /
    • v.18 no.1
    • /
    • pp.1-25
    • /
    • 2018
  • The purpose of this study is to examine if ego resilience has regulating effects in correlation between child care teachers' job stress and work environment and their performance of roles with child care teachers working in Seoul and Incheon. PASW 20.0 was employed to conduct frequency, percentage, and reliability analysis. For each of the study questions, correlation analysis, multiple regression analysis, and stepwise regression analysis were done. The findings of this study are as follows; First, job stress perceived by child care teachers is found to have negative effects on their performance of roles. Second, work environment perceived by child care teachers such as relationship with the director, relationship with fellow teachers, welfare environment, support for teacher expertise, and factors related to operation or decision making are found to influence their performance of roles. Lastly, in correlation between work environment perceived by child care teachers and their performance of roles, ego resilience has regulating effects, and so does it in correlation between job stress and their performance of roles.

A Study on the Effect of Ethical Management on Organizational Transparency and Performance in Long-Term Care Institutes: With a Focus on the Mediation Effect of Organizational Culture (노인장기요양기관의 윤리경영이 조직투명성 및 경영성과에 미치는 영향 연구: 조직문화의 매개효과를 중심으로)

  • Nam, Hee Soo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.12 no.4
    • /
    • pp.201-215
    • /
    • 2017
  • The purpose of this study is to define the relationship between ethical management, organizational culture, and management performance in long-term care institutes for the elderly while identifying the level of ethical management, organizational culture, and management performance of caregivers and the impact and mediation of the relationships between them based on the hypothesis. The results show that caregivers in the Gyeonggi region scored 2.929 out of 5 in ethical management, 3.393 in organizational culture, 2.925 in organizational transparency and 3.185 in management performance. The levels of ethical management, organizational culture and management performance in caregivers are lower than those of welfare workers, social workers, and nursing assistants. This is due to their relatively low level of education, wages and working environment. This study determined that there is a significant relationship between variables in terms of correlation between ethical management, management performance, organization transparency, and organizational culture. Second, the authors adopted hypotheses that ethical management has a statistical effect on organizational transparency, management performance, and organization culture. Third, the authors concluded that organizational culture has a direct impact on organization transparency and there is a significant mediation effect between ethical management, organizational transparency, and management performance. Based on these results, we propose the following: First, ethical leadership at the core of ethical management. Second, awareness in organizational transparency. Third, balanced management performance. Fourth, a flexible organizational culture that can respond to ethical management environment must be established.

  • PDF

Improvement of Performance for Online Certificate Status Validation (실시간 인증서 상태검증의 성능개선)

  • Jung, Jai-Dong;Oh, Hae-Seok
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.433-440
    • /
    • 2003
  • According as the real economic activities are carried out in the cyber world and the identity problem of a trade counterpart emerges, digital signature has been diffused. Due to the weakness for real-time validation using the validation method of digital signature, Certificate Revocation List, On-line Certificate Status Protocol was introduced. In this case, every transaction workload requested to verify digital signature is concentrated of a validation server node. Currently this method has been utilized on domestic financial transactions, but sooner or later the limitation will be revealed. In this paper, the validation method will be introduced which not only it can guarantee real-time validation but also the requesting node of certificate validation can maintain real-time certificate status information. This method makes the revocation management node update the certificate status information in real-time to the validation node while revoking certificate. The characteristic of this method is that the revocation management node should memorize the validation nodes which a certificate holder uses. If a certificate holder connects a validation node for the first time, the validation node should request its certificate status information to the above revocation management node and the revocation management node memorizes the validation node at the time. After that, the revocation management node inform the revocation information in real-time to all the validation node registered when a request of revocation happens. The benefits of this method are the fact that we can reduce the validation time because the certificate validation can be completed at the validation node and that we can avoid the concentration of requesting certificate status information to a revocation node.