• Title/Summary/Keyword: Document Reader

Search Result 15, Processing Time 0.02 seconds

A study on Chijongbibang(${\ulcorner}$治腫秘方${\lrcorner}$) (("치종비방(治腫秘方)" 연구;'유방(遺方)'의 성격과 의사학적 가치를 중심으로)

  • Park, Sang-Young;Lee, Sun-A;Kwon, Oh-Min;Ahn, Sang-Woo
    • Korean Journal of Oriental Medicine
    • /
    • v.14 no.1
    • /
    • pp.1-8
    • /
    • 2008
  • This article highlights the part of Chijongjinam that was not examined by previous relevant studies. Findings are summarized as follows. First, king was the main reader of the Yubang that was the raw material of Chijongbibang. This means that Yubang was a kind of document that was reported to the central government. It is likely that the Yubang was written when lm-Eonguk was affiliated to Chijongcheong. Second, lm-Eonguk developed a body of innovative medical techniques based on acupunctural skills that had been learnt from an old Buddhist monk. The newly developed techniques was possible because he combined altogether the medical experiences of his own and a band of veterinary knowledge and techniques that was then disregarded. Third, Chijongbibang indicates that the origin of unique features in Korean medicine can be traced up to before the Japanese Invasion of Korea in 1592, though it is generally accepted that Sauigyeongheombang contained on a full scale unique features of the Korean medicine that was initiated by laypersons and later formed the mainstream of Korean medicine. What should be particularly noted here is that the personal medicine of lm-Eonguk being based on laypersons' medical experiences was employed by central government; the government circulated the medical knowledge and skills for the grass-roots; and eventually the medicine influenced Chinese medicine. And last but not least, lm-Eonguk set the historic occasion of using medicinal materials that can be found on the road and used readily, which is virtually a distinctive case that is unlikely to be found anywhere except Korean medical books.

  • PDF

A Case Study for Migration from SGML Document to XML Documents (SGML 문서를 XML 문서로 변환하는 사례 연구)

  • Cho, Min-Ho;Ryew, Sung-Yul;Park, Si-Hyoung
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.6
    • /
    • pp.653-660
    • /
    • 2001
  • Recently, The range of Internet based information environment is spreading over core business area, as well as simple information provision area. Especially, with spreading WWW technology, markup language based technology is emerging as an important part in Internet based business. But, the data made by SGML can only see by using SGML Browser, so it has some problem in information providing at Internet, and compatibility of data between Data source. So, this study suggests essential architecture and technique for migrating from SGML to XML environment. In our study, we use 600MB SGML data that are selected from 3Tera DataBase of SGML as testing target for migration. We can reduce data displaying time after migration, can do mobile computing which is based on Internet as a result of this study. And the same technique and idea that is used in this study can apply to more large SGML Environment without changing. So, It will be very helpful to the reader who is interesting to migrate from SGML doc to XML doc.

  • PDF

Digital Holographic Security Identification System (디지털 홀로그래픽 보안 인증 시스템)

  • Kim, Jung-Hoi;Kim, Nam;Jeon, Seok-Hee
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.2
    • /
    • pp.89-98
    • /
    • 2004
  • In this paper, we implement a digital holographic security card system that combines digital holographic memory using random phase encoded reference beams with electrical biometrics. Digitally encoded data including a document, a picture of face, and a fingerprint are recorded by multiplexing of holographic memory. A random phase mask encoding reference beams are used as a decoded key to protect illegal counterfeit. As a result, we can achieve a raw BER of 3.6${\times}$10-4 and shift selectivity of 4${\mu}{\textrm}{m}$ using the 2D random phase mask. Also, we develop a recording pattern and image processing which are suitable for a low cost reader without a position sensing photo-detector for real time data extraction and remove danger of fraud from unauthorized person by comparing the reconstructed holographic data with the live fingerprint data.

ASSESSMENT OF CFD CODES USED IN NUCLEAR REACTOR SAFETY SIMULATIONS

  • Smith, Brian L.
    • Nuclear Engineering and Technology
    • /
    • v.42 no.4
    • /
    • pp.339-364
    • /
    • 2010
  • Following a joint OECD/NEA-IAEA-sponsored meeting to define the current role and future perspectives of the application of Computational Fluid Dynamics (CFD) to nuclear reactor safety problems, three Writing Groups were created, under the auspices of the NEA working group WGAMA, to produce state-of-the-art reports on different aspects of the subject. The work of the second group, WG2, was to document the existing assessment databases for CFD simulation in the context of Nuclear Reactor Safety (NRS) analysis, to gain a measure of the degree of quality and trust in CFD as a numerical analysis tool, and to take initiatives to extend the existing databases. The group worked over the period of 2003-2007 and produced a final state-of-the-art report. The present paper summarises the material gathered during the study, illustrating the points with a few highlights. A total of 22 safety issues were identified for which the application of CFD was considered to potentially bring real benefits in terms of better understanding and increased safety. A list of the existing databases was drawn up and synthesised, both from the nuclear area and from other parallel, non-nuclear, industrial activities. The gaps in the technology base were also identified and discussed. In order to initiate new ways of bringing experimentalists and numerical analysts together, an international workshop -- CFD4NRS (the first in a series) -- was organised, a new blind benchmark activity was set up based on turbulent mixing in T-junctions, and a Wiki-type web portal was created to offer online access to the material put together by the group giving the reader the opportunity to update and extend the contents to keep the information source topical and dynamic.

An authentication service application using Context-awareness (상황인식 기법을 이용한 인증 서비스 응용)

  • Lee, Myung-jun;Lee, Tae-sik;Hong, Ho-jung;Hwang, Hyeon-seo;Oh, Young-jun;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.169-172
    • /
    • 2013
  • In this paper, we develop an application service of user authentication system using context awareness technology. The proposed security printer system service is applying 'NFC(Near Field Communication) technology', 'authentication system using communication with server, according to context awareness to application system. Our system extracts several context-awareness elements that happen through the user's printing with server communication. The proposed system property elements contain as print time, number of printing and name of document, etc. based on working memory operation as DB. This proposed system provide with context-awareness weight algorithm and analyzes the service which decides success or failure of user's printing. The develop app service is formed and applied when approved user who gets request. Approved user according to these context awareness tech will be provided with final service after authenticating again for the certain NFC card to reader. This results cab be contributed an authentication service based on context awareness weight algorithm and improved performance of management service in secure service applications.

  • PDF