• Title/Summary/Keyword: Daejeon archives

Search Result 12, Processing Time 0.024 seconds

Reestablishing the Roles of the National Archives of Korea and the Branch Archives (국가기록원과 권역별 기록관의 역할 재정립)

  • Song, Jung-Sook
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.17 no.4
    • /
    • pp.155-175
    • /
    • 2017
  • This study explores the present state of the National Archives of Korea (NAK) and the branch archives and proposes development programs to reestablish their roles. With regard to the NAK, I discussed five issues, and for the branch archives, I discussed three. The issues on NAK are as follows: 1) Is NAK the nation's record keeper?; 2) Does NAK promote the establishment of local archives?; 3) Does NAK supervise and oversee the records management of all public institutions?; 4) What is the raison $d^{\prime}{\hat{e}}tre$ and the vision of NAK?; and 5) Does NAK perform a simple administrative service? Meanwhile, the issues on the branch archives are as follows: 1) Is the branch archives a permanent records management institution?; 2) Are the names of the branch archives appropriate?; and 3) Are the branch archives simple document warehouses?

A Study on the Magazine Farmer's Life and the Daily Archives (잡지 『농민생활』과 일상 아카이브 연구)

  • Won, Jong Hun
    • The Korean Journal of Archival Studies
    • /
    • no.68
    • /
    • pp.151-204
    • /
    • 2021
  • Magazines also contain the daily lives of contemporary ordinary people. These characteristics serve as the possibility of daily archives. This study aims to build daily archives by analyzing the contents of the magazine Farmers' Life published in Daejeon for those archival values. To do that, it classified the articles that were published in Farmers' Life for 14 years from 1954 to 1967, it analyzed personal and organizational information, and also it implemented the daily life of farmers and rural society. The conclusion of the analysis on Farmers' Life summarized into following five points. First, the value of Daejeon private archives proved. Second, the personal information of people who were active in various fields of the society identified, and It classified by professional occupations such as politician, professor, agricultural scholar, doctor, and cartoonist, etc. Third, information on the organizations in the agricultural sector was able to collect that of some government organizations, public-private organizations, U.S. aids and 4H organizations. Fourth, certain evidence presented that help to correct the records that recorded wrongly or omitted or in need of speculation in the Christian Magazines, Literature and Art Fields. Fifth, the daily life of rural society and farmers classified into the series and organized into daily archives. This paper presented as a basic database to perceive the rural society and farmers' daily life in the 1950s and 1960s.

Nodular scalp mass as the first presentation of pulmonary large cell neuroendocrine carcinoma: a case report

  • Hong Won Lee;Young Joong Hwang;Sung Gyun Jung;In Pyo Hong
    • Archives of Craniofacial Surgery
    • /
    • v.24 no.5
    • /
    • pp.240-243
    • /
    • 2023
  • Metastasis of lung cancer to the skin is uncommon, presenting in 0.22% to 12% of lung cancer patients, and it is extremely rare for skin metastasis to be the first clinical manifestation of lung cancer. In the few cases where skin metastasis has been reported as the first sign of lung cancer, the patients were typically heavy smokers or had preexisting respiratory diseases and symptoms. This prompted clinicians to consider skin metastasis of a pulmonary malignancy. Large cell neuroendocrine carcinoma (LCNEC) is a rare type of lung cancer that accounts for approximately 3% of lung cancers. LCNEC mainly metastasizes to visceral organs, such as the liver, bone, and brain, and it only shows metastasis to the skin in very rare cases. Herein, we report an unusual case of a metastatic skin lesion as the first sign of primary pulmonary LCNEC, in a 63-year-old woman with no pulmonary symptoms or personal history of smoking or pulmonary disease.

Diagnosis of split fractures of the mandible in adults

  • Taesik Kim;Sung Gyun Jung;In Pyo Hong;Young Joong Hwang
    • Archives of Craniofacial Surgery
    • /
    • v.24 no.4
    • /
    • pp.167-173
    • /
    • 2023
  • Background: Mandibular split fractures, in which the fracture occurs exclusively in the posterior wall, are uncommon. This study aimed to enhance clinicians' understanding of mandibular split fractures and offer insights for future research. Methods: This study included six patients who visited our hospital between January 2020 and June 2023 and were diagnosed with mandibular split fractures. We retrospectively collected data from patients' medical records on their age, sex, symptoms, mechanism, impact site, associated injuries, and treatment method, as well as the location, pattern, and number of fractures observed on computed tomography (CT) and panoramic images. The frequency of split fractures among all mandibular fractures was calculated. Results: The six patients included three men (50%) and three women (50%), ranging in age from 20 to 71 years (mean age, 49.8 years). The split fractures were located in the symphysis in one patient (16.7%), symphysis to parasymphysis in two patients (33.3%), parasymphysis in one patient (16.7%), and parasymphysis to the body in two patients (33.3%). Four patients (66.7%) had condylar head fractures, while two patients (33.3%) had single split fractures. The mechanism of trauma was a slip-down incident in four cases (66.7%), while two cases (33.3%) were caused by motorcycle traffic accidents. Four patients (67%) underwent intermaxillary fixation, while two patients (33%) improved with conservative treatment. Split fractures were diagnosed in all six patients on CT, whereas the fracture line was not clearly visible on panoramic images. Mandibular split fractures accounted for 5.6% of all mandibular fractures. Conclusion: This study provides insights into the clinical characteristics of rare mandibular split fractures and the diagnostic imaging findings. Furthermore, CT scans and three-dimensional image synthesis-instead of panoramic images-may be essential for accurately diagnosing mandibular fractures, including mandibular split fractures, in the future.

A Study on the Acquisition Methods of Private Photographs for The Urban Landscape Documentation Project: Focusing on Daegu Metropolitan City (도시경관 기록화사업을 위한 민간사진기록 수집 활성화 방안: 대구광역시를 중심으로)

  • Shin Jiwon;Choi Sanghee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.21 no.4
    • /
    • pp.163-181
    • /
    • 2021
  • Photographic records capturing the changes of a city are vital parts of local history archives. They were, however, not collected properly for the local history archives even by local governments. Therefore, as a solution for this problem, seven major cities (Seoul, Incheon, Gwangju, Ulsan, Daejeon, Busan, and Daegu) initiated the urban landscape documentation project for archiving the photographic records of each city. This study investigated the current status of the urban landscape documentation project and found that Daegu metropolitan city's project only holds some of the contest photos and a few old photos from the local government. A proper donating process is urgently needed to preserve valuable photographic records of Daegu, and this study aims solutions for the Daegu metropolitan city's urban landscape documentation project to improve the acquisition methods of photographic records. This study suggests the process for photographic records donation from citizens and a metadata set for donated photographs.

A USB DLP Scheme for Preventing Loss of Internal Confidential Files (내부 기밀파일 유출 방지를 위한 USB DLP 기법)

  • Shin, Gyu Jin;Jung, Gu Hyun;Yang, Dong Min;Lee, Bong Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.12
    • /
    • pp.2333-2340
    • /
    • 2017
  • Recently industry is suffering severe losses of important internal information, and most of the leaks result from the insiders. Thus, various technological counter measures are being studied in order to protect private organization information. In this paper, among various internal information leakage path protection mechanisms, we propose a technique for preventing files which are defined as confidential from being copied or moved through USB. The implemented confidential file loss prevention system is composed of both signature insert manager and confidential file detect manager. The signature insert manager allows a system administrator to insert a special pattern specifying a classified confidential file, while the confidential file detect manager protects confidential file leakage when a user attempts to move or copy a confidential file to the USB memory. This results would be contributed to reducing the damage caused by leakage of confidential files outside of the company via USB.

5-Arylidene-2(5H)-Furanone Derivatives: Synthesis and Structure-Activity Relationship for Cytotoxicity

  • Bang, Seong-Cheol;Kim, Yong;Yun, Mi-Young;Ahn, Byung-Zun
    • Archives of Pharmacal Research
    • /
    • v.27 no.5
    • /
    • pp.485-494
    • /
    • 2004
  • Thirty-eight 5-arylidene-2(5H)-furanone derivatives possessing halo-, methoxy-, oxo-, dioxo-, and thiophenyl groups as well as anthraquinone and naphthquinone moieties were synthesized, and their cytotoxicity was evaluated against various cancer cell lines. The introduction of halogen atoms or nitro group at aromatic ring of 5-arylidene-2(5H)-furanone was shown to increase the cytotoxicity with 5-(3-nitrobenzylidene )-2(5H)-furanone (21) being the most potent. Among anthracenyl or naphthalenyl derivatives, (E)-5-[2-(1 ,4-dimethoxy-9, 10-dioxo) anthracenyl]-2(5H)-furanone (34) showed the most potent cytotoxic activity.

Performance Analysis of Detection Algorithms for the Specific Pattern in Packet Payloads (패킷 페이로드 내 특정 패턴 탐지 알고리즘들의 성능 분석에 관한 연구)

  • Jung, Ku-Hyun;Lee, Bong-Hwan;Yang, Dongmin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.794-804
    • /
    • 2018
  • Various applications running in computers exchange information in the form of packets through the network. Most packets are formatted into UDP/IP or TCP/IP standard. Network management administrators of enterprises and organizations should be able to monitor and manage packets transmitted over the network for Internet traffic measurement & monitoring, network security, and so on. The goal of this paper is to analyze the performance of several algorithms which closely examine and analyze payloads in a DPI(Deep Packet Inspection) system. The main procedure of packet payload analysis is to quickly search for a specific pattern in a payload. In this paper, we introduce several algorithms which detect a specific pattern in payloads, analyze the performance of them from three perspectives, and suggest an application method suitable for requirements of a given DPI system.

A Correspondence Training Scenario against Bypassing Information Protection System Attacks (네트워크 정보보호시스템 우회 공격에 대한 대응훈련 시나리오)

  • Hong, Jeong Soo;Yang, Dong Min;Lee, Bong Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.818-828
    • /
    • 2018
  • Nowadays, various security systems are developed and used for protecting information on the network. Although security solutions can prevent some of the security risks, they provide high performance only if used appropriately in accordance with their purposes and functionality. Security solutions commonly used in information protection systems include firewalls, IDS, and IPS. However, despite various information protection systems are introduced, there are always techniques that can threaten the security systems through bypassing them. The purpose of this paper is to develop effective training techniques for responding to the bypass attack techniques in the information security systems and to develop effective techniques that can be applied to the training. In order to implement the test bed we have used GNS3 network simulator, and deployed it on top of virtual operating system using VirtualBox. The proposed correspondence training scenario against bypassing information protection system attacks could be very effectively used to counteract the real attacks.

A study on evaluation framework of environmental formative works in urban space (도시 환경조형물 심의현황에 관한 고찰 - 대도시 건축물 미술장식제도를 중심으로 -)

  • Yoon, Ki-Hwan;Kim, Jin-Seon
    • Archives of design research
    • /
    • v.18 no.2 s.60
    • /
    • pp.315-324
    • /
    • 2005
  • This research aims to investigate evaluation framework of environmental formative works that are regulated by law in urban space, and to suggest the directions of improving the framework for better city environments. The concept of environmental formative works in urban space was identified and social situations and factors including visitors and the cognitive process of urban environments, were analyzed. This research suggests a new method based on the analysis of existing regulations and problems of environmental art or formative works. The public regulations and evaluation methods of the Korean major cities including Seoul, Daejeon, Busan and Gwangju, were examined on environmental formative works. The objective was to suggest an evaluation framework for creating human values of urban culture environment instead of focusing on the matters between the owner of the architecture and the artist of formative works. By identifying socio-cultural value of art decoration related regulations and improving the level of the public formative art evaluation scheme, this study helps addressing the administrative problems and constructing a conceptual framework of evaluation to improve urban culture environment for both human and environment.

  • PDF