• Title/Summary/Keyword: Folder

Search Result 103, Processing Time 0.025 seconds

A CASE REPORT OF THE EXTERNAL NOSE RECONSTRUCTION USING FOREHEAD FLAP AND AURICULAR COMPOSITE GRAFTS (전두부피판과 이개복합조직이식술을 이용한 외비의 재건 치험례)

  • Park, Bong-Wook;Byun, June-Ho
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.31 no.4
    • /
    • pp.350-355
    • /
    • 2005
  • There are various surgical methods for reconstruction of the nasal defect. Among them, there is some difference in the choosing the proper reconstruction method according to defect size and position. When the defect involved the tip, the columella, and the alar, the local flaps may be preferred, because they can provide sufficient amount of tissue. However, the composite grafts from the ear have been effectively used in reconstructions of smaller sized defects of the columella and ala. We excised total external nose because of squamous cell carcinoma on the nasal tip, columella, and nasal septum. We reconstructed the nasal tip, both alae, and columella with forehead flap. After division of the regional flap, we found partial necrosis of the columella and narrowness of the nostril. So, we used chondrocutaneous auricular composite grafts for reconstruction of the columella and both nostrils. We used the file-folder designed auricular composite graft for reconstruction of columella and the wedge shaped ear helical composite grafts for widening of nostrils. 6 months later, there were no significant problems, except some mismatched dark color in the grafted alar tissues. Here, we report a successful reconstruction of large nasal defect using combined two different reconstructive methods.

Cloud implementation within the company using FTP (FTP를 이용한 회사내 클라우드 구현)

  • Seo, Dong-hyeon;Kim, Mi-Seong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.472-474
    • /
    • 2017
  • Storage of files is important in the information age. In particular, files in the company should be managed more efficiently. In this paper, we connect to FTP Server through Client program to manage files efficiently. The FTP Server builds a database to manage employee information in the company and folder paths for each employee. The Client program can be used after login with the assigned employee number and password. You can check the list of files stored in the FTP server when login is successful and upload, download and delete after selecting specific files. Folders can also be created and deleted for more systematic management of files. For the efficient operation of the company, it is implemented so that it can be divided into a personal drive and a public drive.

  • PDF

A Study on the Development of Educational Program for Digital Personal Archives Preservation: A Case of P University Undergraduate Students (디지털 개인기록 보존을 위한 교육프로그램 개발 - P대학 학부생을 중심으로 -)

  • Kim, Seul-Gi
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.15 no.4
    • /
    • pp.77-98
    • /
    • 2015
  • This study was carried out to develop the educational program which can be used in the university library or archives to their students under an aspect that each individual should preserve own personal archives themselves. Based on precedent studies and foreign cases, a survey study on preservation of digital personal archives for the university students was carried out. The educational program of preservation reflected conditions of the undergraduates attending Pusan national university. The educational program is dealt with a total of seven contents including awareness-raising, creation methods, managements methods, selection of archives, construction of preservation folder, construction of preservation copy, and the management of preservation copy.

A Dynamic Recommendation Agent System for E-Mail Management based on Rule Filtering Component (이메일 관리를 위한 룰 필터링 컴포넌트 기반 능동형 추천 에이전트 시스템)

  • Jeong, Ok-Ran;Cho, Dong-Sub
    • Proceedings of the KIEE Conference
    • /
    • 2004.05a
    • /
    • pp.126-128
    • /
    • 2004
  • As e-mail is becoming increasingly important in every day life activity, mail users spend more and more time organizing and classifying the e-mails they receive into folder. Many existing recommendation systems or text classification are mostly focused on recommending the products for the commercial purposes or web documents. So this study aims to apply these application to e-mail more necessary to users. This paper suggests a dynamic recommendation agent system based on Rule Filtering Component recommending the relevant category to enable users directly to manage the optimum classification when a new e-mail is received as the effective method for E-Mail Management. Moreover we try to improve the accuracy as eliminating the limits of misclassification that can be key in classifying e-mails by category. While the existing Bayesian Learning Algorithm mostly uses the fixed threshold, we prove to improve the satisfaction of users as increasing the accuracy by changing the fixed threshold to the dynamic threshold. We designed main modules by rule filtering component for enhanced scalability and reusability of our system.

  • PDF

An Empirical Study of Security for API in Windows Systems (윈도우즈에서 제공되는 기본 API에 대한 안전성 고찰)

  • Choi, Young-Han;Kim, Hyoung-Chun;Oh, Hyung-Geun;Lee, Do-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.75-82
    • /
    • 2009
  • In this paper, we test for security targeting on APIs of Windows as that is used by many people worldwide. In order to test APIs in DLL fils of Windows OS, we propose Automated Windows API Fuzz Testing(AWAFT) that can execute fuzz testing automatically and implemented the practical tool for AWAFT. AWAFT focuses on buffer overflows and parsing errors of function parameters. Using the tool, we found 177 errors in the system folder of Windows XP SP2. Therefore, AWAFT is useful for security testing of Windows APIs. AWAFT can be applied to libraries of third party software in Windows OS for the security.

Antenna Efficiency Variation by the Influence of Human Body (인체의 영향에 의한 안테나 효율의 변화)

  • Lee, Yong-Joo;Han, Jun-Hee;Yang, Woon-Geun
    • Journal of IKEEE
    • /
    • v.12 no.4
    • /
    • pp.185-195
    • /
    • 2008
  • In this paper, PIFA(Planar Inverted F Antenna) which operates in PCS(Personal Communication System) band is designed and characteristics are investigated. Designed PIFA was installed in three types of handsets, folder, bar, slide, and the performance was evaluated. Head and hand phantom were added to make the most similar environment to real condition of mobile phone use, and influences on antenna performance were analyzed. The simulation results confirm radiation patterns are greatly changed and antenna efficiency is decreased by the effect of human body. Performance variation of the mobile handset antenna was observed as changing the angle between mobile handset and head phantom from $0^{\circ}$ to $2^{\circ},\;4^{\circ}$ to confirm the variation caused by the relative position of mobile handset and head phantom. Directivity was decreased gradually as the antenna goes away from head phantom, and showed the trend of increasing efficiency. But in the case of bar type, where the position of antenna is relatively close to head phantom, that trend didn't show. It was confirmed that the shape of handset has a great effect on the performance.

  • PDF

Study on Windows Event Log-Based Corporate Security Audit and Malware Detection (윈도우 이벤트 로그 기반 기업 보안 감사 및 악성코드 행위 탐지 연구)

  • Kang, Serim;Kim, Soram;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.591-603
    • /
    • 2018
  • Windows Event Log is a format that records system log in Windows operating system and methodically manages information about system operation. An event can be caused by system itself or by user's specific actions, and some event logs can be used for corporate security audits, malware detection and so on. In this paper, we choose actions related to corporate security audit and malware detection (External storage connection, Application install, Shared folder usage, Printer usage, Remote connection/disconnection, File/Registry manipulation, Process creation, DNS query, Windows service, PC startup/shutdown, Log on/off, Power saving mode, Network connection/disconnection, Event log deletion and System time change), which can be detected through event log analysis and classify event IDs that occur in each situation. Also, the existing event log tools only include functions related to the EVTX file parse and it is difficult to track user's behavior when used in a forensic investigation. So we implemented new analysis tool in this study which parses EVTX files and user behaviors.

Sketch-based Graph-Control User Interface Method for Personal Information Management (개인정보관리를 위한 스케치기반 그래프 컨트롤 사용자 인터페이스 기법)

  • Kim, Jung-Jin;Park, Tae-Jin;Jeon, Jae-Woong;Choy, Yoon-Chul
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.7
    • /
    • pp.893-902
    • /
    • 2009
  • Many People are collecting and managing variable information(Image, Graphic, Animation, Text, music files etc.) about personal interests and holding them in common. Most users are using Microsoft Explorer to make a folder and classify many files. but It's difficult to understand the relation of the data instinctively. To resolve this problem, we adopt information visualization method (especially tree-graph control interface). We suggest an interface that all user can drawing a Graph easily and rapidly. So user can see the relations of their data instinctively and control the relation directly with our sketch-based interface.

  • PDF

A Portfolio Assessment and the Case for Practicing Open Education in the Elementary Mathematics Classroom (초등학교 수학 교실에서의 열린 교육 실천을 위한 포오트폴리오 평가와 사례)

  • Kim Doo Hwan
    • Journal of Elementary Mathematics Education in Korea
    • /
    • v.1 no.1
    • /
    • pp.109-121
    • /
    • 1997
  • A lot of educators claim that the open education should be performed in elementary classroom, but it is true that they do not suggest the specific direction of practicing open education in case of mathematics subject. Although a project lesson is recommended, there is little case that suggests the direction of practice and the evaluation method of project lesson. Therefore this study searchs for the possibility of practicing open education in elementary mathematics classroom by reviewing the portfolio assessment and suggesting the specific case of applying the portfolio assessment to project lesson. A portfolio is a folder in which is recording solution process, student's self reflection, and teacher's comment, about topics and problems more than one. Students can see their own varying aspects and recognize their own merits and demerits, sincerities, and potentialities by portfolio assessment. Futheremore, teacher can both grasp the student's cognitive situation and give them the professional advice about the cognitive development. That is, they can perform the instruction underlining the learner's ability and personality, by identifying what Vygotsky calls 'the proximal zone of development' through portfolio assessment. Consequently, portfolio assessment is an alternative evaluation method for integrating process and product of learning, and can be used as an important tool for developing the learner's potential possibility of self-realization.

  • PDF

Cone-beam computed tomography analysis of accessory maxillary ostium and Haller cells: Prevalence and clinical significance

  • Ali, Ibrahim K.;Sansare, Kaustubh;Karjodkar, Freny R.;Vanga, Kavita;Salve, Prashant;Pawar, Ajinkya M.
    • Imaging Science in Dentistry
    • /
    • v.47 no.1
    • /
    • pp.33-37
    • /
    • 2017
  • Purpose: This study aimed to evaluate the prevalence of Haller cells and accessory maxillary ostium (AMO) in cone-beam computed tomography (CBCT) images, and to analyze the relationships among Haller cells, AMO, and maxillary sinusitis. Materials and Methods: Volumetric CBCT scans from 201 patients were retrieved from our institution's Digital Imaging and Communications in Medicine archive folder. Two observers evaluated the presence of Haller cells, AMO, and maxillary sinusitis in the CBCT scans. Results: AMO was observed in 114 patients, of whom 27 (23.7%) had AMO exclusively on the right side, 26 (22.8%) only on the left side, and 61 (53.5%) bilaterally. Haller cells were identified in 73 (36.3%) patients. In 24 (32.9%) they were present exclusively on the right side, in 17 (23.3%) they were only present on the left side, and in 32 (43.8%) they were located bilaterally. Of the 73 (36.3%) patients with Haller cells, maxillary sinusitis was also present in 50 (68.5%). On using chi-square test, a significant association was observed between AMO and maxillary sinusitis in the presence of Haller cells. Conclusion: Our results showed AMO and Haller cells to be associated with maxillary sinusitis. This study provides evidence for the usefulness of CBCT in imaging the bony anatomy of the sinonasal complex with significantly higher precision and a smaller radiation dose.