• Title/Summary/Keyword: K-file

Search Result 1,990, Processing Time 0.033 seconds

The Variables Affecting the Internet Overuse of Adolescents - An Analysis by Gender, School Grades and School Systems - (청소년의 인터넷 과다 사용에 영향을 미치는 변인 - 청소년의 성, 학교, 계열별 분석 -)

  • Lee, Kyung-Hwa;Ryu, Kyung-Hee
    • Journal of Korean Home Economics Education Association
    • /
    • v.23 no.2
    • /
    • pp.71-87
    • /
    • 2011
  • In this study, we investigate the individual-, parents-, and family-related variables affecting the internet overuse of adolescents by the gender, school grades and school systems, which is based on surveys of 480 students in the middle and high school, employing multiple regression analysis. Major findings are as follows. 1. In the case of male students, internet use was higher when the students are playing online games more often, when the students are under stress, or when they have lower self control. In the case of female students, internet use was higher when the students are playing online games more often or when the students are visiting pornographic sites more often. 2. In the case of middle school students, internet use was higher when the students play online games more often, when they use file downloads more often, when they have lower self control, or when they have parents who are setting lesser rules on the students' internet use. In the case of high school students, internet use was higher when they play online games more often, when they engage in internet club activities more actively, when they have lower self control, when they use e-mails less frequently, when they have fathers with better internet ability, or when they are under parents' strict control. 3. In the case of academic high school students, internet use was higher when they play online games more often, when they engage in internet club activities more actively, when they visit pornographic sites more often, when they have lower self control, when they have mothers with poor internet ability, when they use e-mails less frequently, or when they have fewer number of close friends. In the cases of vocational high school students, internet use was higher when they play online games more often, when they are under more stress, when they get better grades, when they have fathers with better internet ability, when they are under parents' strict control, or when they have lower self control.

  • PDF

An Empirical Study of SNS Users' Switching Intention Toward Closed SNS (SNS 이용자의 폐쇄형 SNS로의 전환의도에 영향을 미치는 요인에 관한 연구)

  • Park, Hyunsun;Kim, Sanghyun
    • Information Systems Review
    • /
    • v.16 no.3
    • /
    • pp.135-160
    • /
    • 2014
  • Most Social Network Service (SNS) provide online chat, video and file sharing, blogging and others. Because of this advantage, people depend on SNS to communicate with others. However, recently SNS encourage people to reveal too much information broadly so SNS users are concerned about privacy invasion and data spill. They also feel fatigue in process of touching people they don't know while using SNSs. That is the reason why they attempt to switch from opened SNS to Closed SNS. Therefore, the purpose of this study is to empirically investigate and analyze the effect of the factors on the SNS users' switching behavior when using SNS. To accomplish this purpose, this research adopted "Push-Pull-Mooring (PPM)" framework. The PPM is proposed by population geologist, who used it to explain the incentives of demographic migration. Following PPM model, this research empirically examines the three categories of antecedents for SNS switching intention toward closed SNS: push (i.e., weak connection, privacy concern, relative complexity), pull (i.e., enjoyment, belongingness, peer influence), mooring (i.e., SNS fatigue, user resistance) factors. The survey was conducted for 285 users on SNS communities in Korea. The results of this study are as follows; First, wear connection and privacy concern are significantly related to SNS switching intention. Second, enjoyment and belongingness are significantly related to SNS switching intention. Finally, the results show that SNS fatigue has a moderating effect on the links between push factors and SNS switching Intention. Also, user resistance has a moderating effect on the links between pull factors and SNS switching Intention. These findings contribute to the SNS literature both theoretically and practically.

The Measurement of Size of the Pedicle Using 3 Dimensional Reconstruction Image in Idiopathic Scoliosis (특발성 척추측만증 환자에서의 3차원적 재구성을 이용한 척추경의 크기 측정)

  • Heo, Jae-Hee;Ahn, Myun-Hwan
    • Journal of Yeungnam Medical Science
    • /
    • v.21 no.1
    • /
    • pp.40-50
    • /
    • 2004
  • Background: This study was conducted to analyze the height and width of the pedicle of the upper and lower levels on the concave and the convex sides. In addition, we checked for the appropriate pedicle screw size which could be screwed in without complications. Materials and Methods: Taking a simple AP radiography in a standing position, 99 vertebrae on the major curve with the possibility of 3-D reconstruction were analyzed after checking the CT in a supine position of 22 idiopathic scoliosis. We measured Cobb's angle from a simple radiograph, and measured the size of the isthmus by the Inner Space 3-D Editor after 3-D reconstruction with the Inner Space 3-D program in the DICOM file transformed from CT image. We then analyzed the size of pedicles of the upper and lower levels on the concave and the convex sides by measuring the height and width of the pedicle. Results: All pedicles on the concave side were smaller than those on the convex side. Their size increased as the measurement moved from the upper to lower vertebra, except for the upper thoracic vertebra. When the width of the pedicle through 3-D reconstruction was compared with the narrowest width of the pedicle measured by using CT, the width of the pedicles through 3-D reconstruction was statistically smaller (P<0.01). Most of the pedicles were tear-drop or kidney shaped rather than cylindrical. Conclusion: These results suggest that the use of the coronal plane through 3-D reconstruction would be necessary for an accurate measurement of the size of the pedicle. It is important to pay careful attention to the screw size and the screwing method considering the pedicle shape through 3-D reconstruction.

  • PDF

THE CANAL SEALING EFFECT OF WARM LATERAL CONDENSATION OF GUTTA-PERCHA (가온 측방가압 근관충전법의 폐쇄효과)

  • Kim, Yong-Duk;Cho, Kyeu-Zeung
    • Restorative Dentistry and Endodontics
    • /
    • v.19 no.2
    • /
    • pp.429-446
    • /
    • 1994
  • The purpose of this study was to evaluate the sealing effect of warm lateral condensation technique by Endotec spreader, comparing with other canal filling techniques. One hundred and forty extracted human teeth with single canal were instrumented and randomly divided into four groups according to canal filling techniques including lateral condensation with sealer, warm lateral condensation with sealer, warm lateral condensation without sealer, and injection-molded thermoplasticized gutta-percha without sealer. Obturated canals were exposed to 2 % methylene blue solution at $37^{\circ}C$ for 24 hours and measurement of the degree of microleakage was done linearly and volumetrically with stereozoom microscope and UV-spectrophotometer respectively. The results were as follows ; When sealer was used, the canals obturated by warm lateral condensation showed less leakage linearly and volumetrically than the canals obturated by standard lateral condensation with no statistically significant difference. The obturated canals by warm lateral condensation with sealer showed less leakage linearly and volumetrically than the canals obturated by warm lateral condensation without sealer and by injection-molded thermoplasticized gutta-percha without sealer with statistical significance (p<0.05). No statistical difference revealed that the group filled with the use of the Endotec had significantly less leakage than any of the other groups. There was a significant correlation between the linear measurement and volumetric measurement(r=0.4459, p<0.05).

  • PDF

REMOVAL PATTERNS OF SMEAR LAYER ACCORDING TO APPLICATION TEMPERATURE AND TIME OF EDTA (EDTA의 적용 온도와 시간에 따른 도말층의 제거양상)

  • Shin, Jang-Shik;Cho, Yong-Bum
    • Restorative Dentistry and Endodontics
    • /
    • v.27 no.5
    • /
    • pp.535-542
    • /
    • 2002
  • The purpose of this study was to evaluate the effect of EDTA irrigant according to application time and temperature. 31 human mature extracted teeth with a single canal were sectioned with microtome in 3mm thickness and gained 62 samples of root canals. They were distributed randomly into 6 groups of 10 specimens each and control group of 2 specimens. Each specimen was prepared with GT rotary file (Dentsply, Maillefer Co., Swiss) and irrigated with 3 ml sodium hypochlorite every minute. Then smear layer was removed with EDTA solution (PULPDENT$^{\circledR}$, PULPDENT Co., USA.) except two control specimens. Specimens of each group were irrigated with 17% EDTA. The time and temperature of application were as follows : (Table omitted) All specimens were split longitudinally and prepared for examination by scanning electron microscopy. A set of reference micrographs was used to award a debris score as follows: 0 = no smear layer, all tubules clean and open; 1 = no superficial smear layer, tubule openings visible, but some contain debris plug or soft tissue remnants: 2 = moderate smear layer, some tubules open and others closed; 3 = heavy smear layer, most/all tubule openings obscured. Results were evaluated with Kruskal-Wallis test to determine whether there was statistically significant difference among six groups. Pairs of groups were analyzed using the Student-Newman-Keuls Method and Mann-Whitney test. The results were as follows : 1. Control specimens showed heavy smear layer at the canal walls 2. Among the groups applied with EDTA for 2 minutes, group 1 showed the heaviest smear layer, and there was statistically significant difference between group 1 and the other groups(p<0.05). 3. Among the groups applied with EDTA for 5 minutes, group 4 and group 6 showed smear layer but there was no significant difference between them. 4. Among the groups applied with EDTA for the same temperature, group 1 showed heavier smear layer than group 4, and there was statistically significant difference(p<0.05). 5. Among the groups applied with EDTA for the same temperature, group 2 showed heavier smear layer than group 5 and group 3 showed heavier smear layer than group 6. But there was no statistically significant difference among them. From the results above, it could be concluded, EDTA solution is effective in removing of smear layer when it is applied for 5 minutes. If EDTA is applied for 2 minutes, it should be applied above room temperature.

Urban Flood Simulation Considering Buildings Resistance Coefficient Based on GIS: Focused on Samcheok City (건물 저항계수에 따른 GIS기반의 밀집 시가지 침수모의 -삼척시가지를 중심으로-)

  • Ji, Juong-Hwan;Kang, Sang-Hyeok
    • Journal of Korea Water Resources Association
    • /
    • v.43 no.2
    • /
    • pp.211-220
    • /
    • 2010
  • The objective of this paper presents the application of an "integrated urban flood modeling-runoff model, urban flood model and sewer system model-" in a highly urbanized area of Samcheok where is seriously inundated in 2002 and 2003. For this, we demonstrate how couple a 1-D hydrodynamic model of the river, a 2-D hydrodynamic model of the overland (surface) flow, and a sewer network model including each boundary conditions. In order to make data file for the model, topographic information like elevation and share rate of buildings are directly extracted from DEM or topographical source data without data exchange to avoid uncertainty errors. Furthermore, the research is to assess the impacts of Manning n and buildings influences to inundated depth by changing its share ratio from 10 % to 30 % in low-land urban area. As a results, we found out that the urban inundated depth was decreased by Manning n but increased by buildings ratio. The calculated results of inundation was similar with observed one in 2002 and 2003 flooding. Furthermore, the area was also inundated under not riverbank break case in 2002 flooding.

An APK Overwrite Scheme for Preventing Modification of Android Applications (안드로이드 앱 변조 방지를 위한 APK 덮어쓰기 기법)

  • Choi, Byungha;Shim, HyungJoon;Lee, ChanHee;Cho, Sangwook;Cho, Seong-Je
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.5
    • /
    • pp.309-316
    • /
    • 2014
  • It is easy to reverse engineer an Android app package file(APK) and get its decompiled source code. Therefore, attackers obtains economic benefits by illegally using the decompiled source code, or modifies an app by inserting malware. To address these problems in Android, we propose an APK overwrite scheme that protects apps against illegal modification of themselves by using a new anti-reverse engineering technique. In this paper, the targets are the apps which have been written by any programmer. For a target app (original app), server system (1) makes a copy of a target app, (2) encrypts the target app, (3) creates a stub app by replacing the DEX (Dalvik Executable) of the copied version with our stub DEX, and then (4) distributes the stub app as well as the encrypted target app to users of smartphones. The users downloads both the encrypted target app and the corresponding stub app. Whenever the stub app is executed on smartphones, the stub app and our launcher app decrypt the encrypted target app, overwrite the stub app with the decrypted target one, and executes the decrypted one. Every time the target app ends its execution, the decrypted app is deleted. To verify the feasibility of the proposed scheme, experimentation with several popular apps are carried out. The results of the experiment demonstrate that our scheme is effective for preventing reverse engineering and tampering of Android apps.

An Audio Comparison Technique for Verifying Flash Memories Mounted on MP3 Devices (MP3 장치용 플래시 메모리의 오류 검출을 위한 음원 비교 기법)

  • Kim, Kwang-Jung;Park, Chang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.5
    • /
    • pp.41-49
    • /
    • 2010
  • Being popularized the use of portable entertainment/information devices, the demand on flash memory has been also increased radically. In general, flash memory reveals various error patterns by the devices it is mounted, and thus the memory makers are trying to minimize error ratio in the final process through not only the electric test but also the data integrity test under the same condition as real application devices. This process is called an application-level memory test. Though currently various flash memory testing devices have been used in the production lines, most of the works related to memory test depend on the sensual abilities of human testers. In case of testing the flash memory for MP3 devices, the human testers are checking if the memory has some errors by hearing the audio played on the memory testing device. The memory testing process like this has become a bottleneck in the flash memory production line. In this paper, we propose an audio comparison technique to support the efficient flash memory test for MP3 devices. The technique proposed in this paper compares the variance change rate between the source binary file and the decoded analog signal and checks automatically if the memory errors are occurred or not.

A Basic Study on the System of Converting Color Image into Sound (컬러이미지-소리 변환 시스템에 관한 기초연구)

  • Kim, Sung-Ill;Jung, Jin-Seung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.2
    • /
    • pp.251-256
    • /
    • 2010
  • This paper aims for developing the intelligent robot emulating human synesthetic skills which associate a color image with sound, so that we are able to build an application system based on the principle of mutual conversion between color image and sound. As the first step, in this study, we have tried to realize a basic system using the color image to sound conversion. This study describes a new conversion method to convert color image into sound, based on the likelihood in the physical frequency information between light and sound. In addition, we present the method of converting color image into sound using color model conversion as well as histograms in the converted color model. In the basis of the method proposed in this study, we built a basic system using Microsoft Visual C++(ver. 6.0). The simulation results revealed that the hue, saturation and intensity elements of a input color image were converted into F0, harmonic and octave elements of a sound, respectively. The converted sound elements were synthesized to generate a sound source with WAV file format using Csound toolkit.

A Method for Detection of Private Key Compromise (서명용 개인키 노출 탐지 기법)

  • Park, Moon-Chan;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.781-793
    • /
    • 2014
  • A Public Key Infrastructure (PKI) is security standards to manage and use public key cryptosystem. A PKI is used to provide digital signature, authentication, public key encryption functionality on insecure channel, such as E-banking and E-commerce on Internet. A soft-token private key in PKI is leaked easily because it is stored in a file at standardized location. Also it is vulnerable to a brute-force password attack as is protected by password-based encryption. In this paper, we proposed a new method that detects private key compromise and is probabilistically secure against a brute-force password attack though soft-token private key is leaked. The main idea of the proposed method is to use a genuine signature key pair and (n-1) fake signature key pairs to make an attacker difficult to generate a valid signature with probability 1/n even if the attacker found the correct password. The proposed method provides detection and notification functionality when an attacker make an attempt at authentication, and enhances the security of soft-token private key without the additional cost of construction of infrastructure thereby extending the function of the existing PKI and SSL/TLS.