• Title/Summary/Keyword: K-space

Search Result 26,710, Processing Time 0.066 seconds

A Study on Jurisdiction under the International Aviation Terrorism Conventions (국제항공테러협약의 관할권 연구)

  • Kim, Han-Taek
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.24 no.1
    • /
    • pp.59-89
    • /
    • 2009
  • The objectives of the 1963 Tokyo Convention cover a variety of subjects, with the intention of providing safety in aircraft, protection of life and property on board, and promoting the security of civil aviation. These objectives will be treated as follows: first, the unification of rules on jurisdiction; second, the question of filling the gap in jurisdiction; third, the scheme of maintaining law and order on board aircraft; fourth, the protection of persons acting in accordance with the Convention; fifth, the protection of the interests of disembarked persons; sixth, the question of hijacking of aircraft; and finally some general remarks on the objectives of the Convention. The Tokyo Convention mainly deals with general crimes such as murder, violence, robbery on board aircraft rather than aviation terrorism. The Article 11 of the Convention deals with hijacking in a simple way. As far as aviation terrorism is concerned 1970 Hague Convention and 1971 Montreal Convention cover the hijacking and sabotage respectively. The Problem of national jurisdiction over the offence and the offender was as tangled at the Hague and Montreal Convention, as under the Tokyo Convention. Under the Tokyo Convention the prime base of jurisdiction is the law of the flag (Article 3), but concurrent jurisdiction is also allowed on grounds of: territorial principle, active nationality and passive personality principle, security of the state, breach of flight rules, and exercise of jurisdiction necessary for the performance of obligations under multilateral agreements (Article 4). No Criminal jurisdiction exercised in accordance with national law is excluded [Article 3(2)]. However, Article 4 of the Hague Convention(hereafter Hague Article 4) and Article 5 of the Montreal Convention(hereafter Montreal Article 5), dealing with jurisdiction have moved a step further, inasmuch as the opening part of both paragraphs 1 and 2 of the Hague Article 4 and the Montreal Article 5 impose an obligation on all contracting states to take measures to establish jurisdiction over the offence (i.e., to ensure that their law is such that their courts will have jurisdiction to try offender in all the circumstances covered by Hague Article 4 and Montreal Article 5). The state of registration and the state where the aircraft lands with the hijacker still on board will have the most interest, and would be in the best position to prosecute him; the paragraphs 1(a) and (b) of the Hague Article 4 and paragraphs 1(b) and (c) of the Montreal Article 5 deal with it, respectively. However, paragraph 1(b) of the Hague Article 4 and paragraph 1(c) of the Montreal Article 5 do not specify if the aircraft is still under the control of the hijacker or if the hijacker has been overpowered by the aircraft commander, or if the offence has at all occurred in the airspace of the state of landing. The language of the paragraph would probably cover all these cases. The weaknesses of Hague Article 4 and Montreal Article 5 are however, patent. The Jurisdictions of the state of registration, the state of landing, the state of the lessee and the state where the offender is present, are concurrent. No priorities have been fixed despite a proposal to this effect in the Legal Committee and the Diplomatic Conference, and despite the fact that it was pointed out that the difficulty in accepting the Tokyo Convention has been the question of multiple jurisdiction, for the reason that it would be too difficult to determine the priorities. Disputes over the exercise of jurisdiction can be endemic, more so when Article 8(4) of the Hague Convention and the Montreal Convention give every state mentioned in Hague Article 4(1) and Montreal Article 5(1) the right to seek extradition of the offender. A solution to the problem should not have been given up only because it was difficult. Hague Article 4(3) and Montreal Article 5(3) provide that they do not exclude any criminal jurisdiction exercised in accordance with national law. Thus the provisions of the two Conventions create additional obligations on the state, and do not exclude those already existing under national laws. Although the two Conventions do not require a state to establish jurisdiction over, for example, hijacking or sabotage committed by its own nationals in a foreign aircraft anywhere in the world, they do not preclude any contracting state from doing so. However, it has be noted that any jurisdiction established merely under the national law would not make the offence an extraditable one under Article 8 of the Hague and Montreal Convention. As far as international aviation terrorism is concerned 1988 Montreal Protocol and 1991 Convention on Marking of Plastic Explosives for the Purpose of Detention are added. The former deals with airport terrorism and the latter plastic explosives. Compared to the other International Terrorism Conventions, the International Aviation Terrorism Conventions do not have clauses of the passive personality principle. If the International Aviation Terrorism Conventions need to be revised in the future, those clauses containing the passive personality principle have to be inserted for the suppression of the international aviation terrorism more effectively. Article 3 of the 1973 Convention on the Prevention and Punishment of Crimes Against Internationally Protected Persons, Including Diplomatic Agents, Article 5 of the 1979 International Convention against the Taking of Hostages and Article 6 of the 1988 Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation would be models that the revised International Aviation Terrorism Conventions could follow in the future.

  • PDF

A Comparative Analysis of Social Commerce and Open Market Using User Reviews in Korean Mobile Commerce (사용자 리뷰를 통한 소셜커머스와 오픈마켓의 이용경험 비교분석)

  • Chae, Seung Hoon;Lim, Jay Ick;Kang, Juyoung
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.4
    • /
    • pp.53-77
    • /
    • 2015
  • Mobile commerce provides a convenient shopping experience in which users can buy products without the constraints of time and space. Mobile commerce has already set off a mega trend in Korea. The market size is estimated at approximately 15 trillion won (KRW) for 2015, thus far. In the Korean market, social commerce and open market are key components. Social commerce has an overwhelming open market in terms of the number of users in the Korean mobile commerce market. From the point of view of the industry, quick market entry, and content curation are considered to be the major success factors, reflecting the rapid growth of social commerce in the market. However, academics' empirical research and analysis to prove the success rate of social commerce is still insufficient. Henceforward, it is to be expected that social commerce and the open market in the Korean mobile commerce will compete intensively. So it is important to conduct an empirical analysis to prove the differences in user experience between social commerce and open market. This paper is an exploratory study that shows a comparative analysis of social commerce and the open market regarding user experience, which is based on the mobile users' reviews. Firstly, this study includes a collection of approximately 10,000 user reviews of social commerce and open market listed Google play. A collection of mobile user reviews were classified into topics, such as perceived usefulness and perceived ease of use through LDA topic modeling. Then, a sentimental analysis and co-occurrence analysis on the topics of perceived usefulness and perceived ease of use was conducted. The study's results demonstrated that social commerce users have a more positive experience in terms of service usefulness and convenience versus open market in the mobile commerce market. Social commerce has provided positive user experiences to mobile users in terms of service areas, like 'delivery,' 'coupon,' and 'discount,' while open market has been faced with user complaints in terms of technical problems and inconveniences like 'login error,' 'view details,' and 'stoppage.' This result has shown that social commerce has a good performance in terms of user service experience, since the aggressive marketing campaign conducted and there have been investments in building logistics infrastructure. However, the open market still has mobile optimization problems, since the open market in mobile commerce still has not resolved user complaints and inconveniences from technical problems. This study presents an exploratory research method used to analyze user experience by utilizing an empirical approach to user reviews. In contrast to previous studies, which conducted surveys to analyze user experience, this study was conducted by using empirical analysis that incorporates user reviews for reflecting users' vivid and actual experiences. Specifically, by using an LDA topic model and TAM this study presents its methodology, which shows an analysis of user reviews that are effective due to the method of dividing user reviews into service areas and technical areas from a new perspective. The methodology of this study has not only proven the differences in user experience between social commerce and open market, but also has provided a deep understanding of user experience in Korean mobile commerce. In addition, the results of this study have important implications on social commerce and open market by proving that user insights can be utilized in establishing competitive and groundbreaking strategies in the market. The limitations and research direction for follow-up studies are as follows. In a follow-up study, it will be required to design a more elaborate technique of the text analysis. This study could not clearly refine the user reviews, even though the ones online have inherent typos and mistakes. This study has proven that the user reviews are an invaluable source to analyze user experience. The methodology of this study can be expected to further expand comparative research of services using user reviews. Even at this moment, users around the world are posting their reviews about service experiences after using the mobile game, commerce, and messenger applications.

A Study on the Observation of Soil Moisture Conditions and its Applied Possibility in Agriculture Using Land Surface Temperature and NDVI from Landsat-8 OLI/TIRS Satellite Image (Landsat-8 OLI/TIRS 위성영상의 지표온도와 식생지수를 이용한 토양의 수분 상태 관측 및 농업분야에의 응용 가능성 연구)

  • Chae, Sung-Ho;Park, Sung-Hwan;Lee, Moung-Jin
    • Korean Journal of Remote Sensing
    • /
    • v.33 no.6_1
    • /
    • pp.931-946
    • /
    • 2017
  • The purpose of this study is to observe and analyze soil moisture conditions with high resolution and to evaluate its application feasibility to agriculture. For this purpose, we used three Landsat-8 OLI (Operational Land Imager)/TIRS (Thermal Infrared Sensor) optical and thermal infrared satellite images taken from May to June 2015, 2016, and 2017, including the rural areas of Jeollabuk-do, where 46% of agricultural areas are located. The soil moisture conditions at each date in the study area can be effectively obtained through the SPI (Standardized Precipitation Index)3 drought index, and each image has near normal, moderately wet, and moderately dry soil moisture conditions. The temperature vegetation dryness index (TVDI) was calculated to observe the soil moisture status from the Landsat-8 OLI/TIRS images with different soil moisture conditions and to compare and analyze the soil moisture conditions obtained from the SPI3 drought index. TVDI is estimated from the relationship between LST (Land Surface Temperature) and NDVI (Normalized Difference Vegetation Index) calculated from Landsat-8 OLI/TIRS satellite images. The maximum/minimum values of LST according to NDVI are extracted from the distribution of pixels in the feature space of LST-NDVI, and the Dry/Wet edges of LST according to NDVI can be determined by linear regression analysis. The TVDI value is obtained by calculating the ratio of the LST value between the two edges. We classified the relative soil moisture conditions from the TVDI values into five stages: very wet, wet, normal, dry, and very dry and compared to the soil moisture conditions obtained from SPI3. Due to the rice-planing season from May to June, 62% of the whole images were classified as wet and very wet due to paddy field areas which are the largest proportions in the image. Also, the pixels classified as normal were analyzed because of the influence of the field area in the image. The TVDI classification results for the whole image roughly corresponded to the SPI3 soil moisture condition, but they did not correspond to the subdivision results which are very dry, wet, and very wet. In addition, after extracting and classifying agricultural areas of paddy field and field, the paddy field area did not correspond to the SPI3 drought index in the very dry, normal and very wet classification results, and the field area did not correspond to the SPI3 drought index in the normal classification. This is considered to be a problem in Dry/Wet edge estimation due to outlier such as extremely dry bare soil and very wet paddy field area, water, cloud and mountain topography effects (shadow). However, in the agricultural area, especially the field area, in May to June, it was possible to effectively observe the soil moisture conditions as a subdivision. It is expected that the application of this method will be possible by observing the temporal and spatial changes of the soil moisture status in the agricultural area using the optical satellite with high spatial resolution and forecasting the agricultural production.

Security and Safety Assessment of the Small-scale Offshore CO2 Storage Demonstration Project in the Pohang Basin (포항분지 해상 중소규모 CO2 지중저장 실증연구 안전성 평가)

  • Kwon, Yi Kyun;Chang, Chandong;Shinn, Youngjae
    • The Journal of Engineering Geology
    • /
    • v.28 no.2
    • /
    • pp.217-246
    • /
    • 2018
  • During the selection and characterization of target formations in the Small-scale Offshore $CO_2$ Storage Demonstration Project in the Pohang Basin, we have carefully investigated the possibility of induced earthquakes and leakage of $CO_2$ during the injection, and have designed the storage processes to minimize these effects. However, people in Pohang city have a great concern on $CO_2$-injection-intrigued seismicity, since they have greatly suffered from the 5.4 magnitude earthquake on Nov. 15, 2017. The research team of the project performed an extensive self-investigation on the safety issues, especially on the possible $CO_2$ leakage from the target formation and induced earthquakes. The target formation is 10 km apart from the epicenter of the Pohang earthquake and the depth is also quite shallow, only 750 to 800 m from the sea bottom. The project performed a pilot injection in the target formation from Jan. 12 to Mar. 12, 2017, which implies that there are no direct correlation of the Pohang earthquake on Nov. 15, 2017. In addition, the $CO_2$ injection of the storage project does not fracture rock formations, instead, the supercritical $CO_2$ fluid replaces formation water in the pore space gradually. The self-investigation results show that there is almost no chance for the injection to induce significant earthquakes unless injection lasts for a very long time to build a very high pore pressure, which can be easily monitored. The amount of injected $CO_2$ in the project was around 100 metric-tonne that is irrelevant to the Pohang earthquake. The investigation result on long-term safety also shows that the induced earthquakes or the reactivation of existing faults can be prevented successfully when the injection pressure is controlled not to demage cap-rock formation nor exceed Coulomb stresses of existing faults. The project has been performing extensive studies on critical stress for fracturing neighboring formations, reactivation stress of existing faults, well-completion processes to minimize possible leakage, transport/leakage monitoring of injected $CO_2$, and operation procedures for ensuring the storage safety. These extensive studies showed that there will be little chance in $CO_2$ leakage that affects human life. In conclusion, the Small-scale Offshore $CO_2$ Storage Demonstration Project in the Pohang Basin would not cause any induced earthquakes nor signifiant $CO_2$ leakage that people can sense. The research team will give every effort to secure the safety of the storage site.

Methods for Integration of Documents using Hierarchical Structure based on the Formal Concept Analysis (FCA 기반 계층적 구조를 이용한 문서 통합 기법)

  • Kim, Tae-Hwan;Jeon, Ho-Cheol;Choi, Joong-Min
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.3
    • /
    • pp.63-77
    • /
    • 2011
  • The World Wide Web is a very large distributed digital information space. From its origins in 1991, the web has grown to encompass diverse information resources as personal home pasges, online digital libraries and virtual museums. Some estimates suggest that the web currently includes over 500 billion pages in the deep web. The ability to search and retrieve information from the web efficiently and effectively is an enabling technology for realizing its full potential. With powerful workstations and parallel processing technology, efficiency is not a bottleneck. In fact, some existing search tools sift through gigabyte.syze precompiled web indexes in a fraction of a second. But retrieval effectiveness is a different matter. Current search tools retrieve too many documents, of which only a small fraction are relevant to the user query. Furthermore, the most relevant documents do not nessarily appear at the top of the query output order. Also, current search tools can not retrieve the documents related with retrieved document from gigantic amount of documents. The most important problem for lots of current searching systems is to increase the quality of search. It means to provide related documents or decrease the number of unrelated documents as low as possible in the results of search. For this problem, CiteSeer proposed the ACI (Autonomous Citation Indexing) of the articles on the World Wide Web. A "citation index" indexes the links between articles that researchers make when they cite other articles. Citation indexes are very useful for a number of purposes, including literature search and analysis of the academic literature. For details of this work, references contained in academic articles are used to give credit to previous work in the literature and provide a link between the "citing" and "cited" articles. A citation index indexes the citations that an article makes, linking the articleswith the cited works. Citation indexes were originally designed mainly for information retrieval. The citation links allow navigating the literature in unique ways. Papers can be located independent of language, and words in thetitle, keywords or document. A citation index allows navigation backward in time (the list of cited articles) and forwardin time (which subsequent articles cite the current article?) But CiteSeer can not indexes the links between articles that researchers doesn't make. Because it indexes the links between articles that only researchers make when they cite other articles. Also, CiteSeer is not easy to scalability. Because CiteSeer can not indexes the links between articles that researchers doesn't make. All these problems make us orient for designing more effective search system. This paper shows a method that extracts subject and predicate per each sentence in documents. A document will be changed into the tabular form that extracted predicate checked value of possible subject and object. We make a hierarchical graph of a document using the table and then integrate graphs of documents. The graph of entire documents calculates the area of document as compared with integrated documents. We mark relation among the documents as compared with the area of documents. Also it proposes a method for structural integration of documents that retrieves documents from the graph. It makes that the user can find information easier. We compared the performance of the proposed approaches with lucene search engine using the formulas for ranking. As a result, the F.measure is about 60% and it is better as about 15%.

Sentiment Analysis of Korean Reviews Using CNN: Focusing on Morpheme Embedding (CNN을 적용한 한국어 상품평 감성분석: 형태소 임베딩을 중심으로)

  • Park, Hyun-jung;Song, Min-chae;Shin, Kyung-shik
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.59-83
    • /
    • 2018
  • With the increasing importance of sentiment analysis to grasp the needs of customers and the public, various types of deep learning models have been actively applied to English texts. In the sentiment analysis of English texts by deep learning, natural language sentences included in training and test datasets are usually converted into sequences of word vectors before being entered into the deep learning models. In this case, word vectors generally refer to vector representations of words obtained through splitting a sentence by space characters. There are several ways to derive word vectors, one of which is Word2Vec used for producing the 300 dimensional Google word vectors from about 100 billion words of Google News data. They have been widely used in the studies of sentiment analysis of reviews from various fields such as restaurants, movies, laptops, cameras, etc. Unlike English, morpheme plays an essential role in sentiment analysis and sentence structure analysis in Korean, which is a typical agglutinative language with developed postpositions and endings. A morpheme can be defined as the smallest meaningful unit of a language, and a word consists of one or more morphemes. For example, for a word '예쁘고', the morphemes are '예쁘(= adjective)' and '고(=connective ending)'. Reflecting the significance of Korean morphemes, it seems reasonable to adopt the morphemes as a basic unit in Korean sentiment analysis. Therefore, in this study, we use 'morpheme vector' as an input to a deep learning model rather than 'word vector' which is mainly used in English text. The morpheme vector refers to a vector representation for the morpheme and can be derived by applying an existent word vector derivation mechanism to the sentences divided into constituent morphemes. By the way, here come some questions as follows. What is the desirable range of POS(Part-Of-Speech) tags when deriving morpheme vectors for improving the classification accuracy of a deep learning model? Is it proper to apply a typical word vector model which primarily relies on the form of words to Korean with a high homonym ratio? Will the text preprocessing such as correcting spelling or spacing errors affect the classification accuracy, especially when drawing morpheme vectors from Korean product reviews with a lot of grammatical mistakes and variations? We seek to find empirical answers to these fundamental issues, which may be encountered first when applying various deep learning models to Korean texts. As a starting point, we summarized these issues as three central research questions as follows. First, which is better effective, to use morpheme vectors from grammatically correct texts of other domain than the analysis target, or to use morpheme vectors from considerably ungrammatical texts of the same domain, as the initial input of a deep learning model? Second, what is an appropriate morpheme vector derivation method for Korean regarding the range of POS tags, homonym, text preprocessing, minimum frequency? Third, can we get a satisfactory level of classification accuracy when applying deep learning to Korean sentiment analysis? As an approach to these research questions, we generate various types of morpheme vectors reflecting the research questions and then compare the classification accuracy through a non-static CNN(Convolutional Neural Network) model taking in the morpheme vectors. As for training and test datasets, Naver Shopping's 17,260 cosmetics product reviews are used. To derive morpheme vectors, we use data from the same domain as the target one and data from other domain; Naver shopping's about 2 million cosmetics product reviews and 520,000 Naver News data arguably corresponding to Google's News data. The six primary sets of morpheme vectors constructed in this study differ in terms of the following three criteria. First, they come from two types of data source; Naver news of high grammatical correctness and Naver shopping's cosmetics product reviews of low grammatical correctness. Second, they are distinguished in the degree of data preprocessing, namely, only splitting sentences or up to additional spelling and spacing corrections after sentence separation. Third, they vary concerning the form of input fed into a word vector model; whether the morphemes themselves are entered into a word vector model or with their POS tags attached. The morpheme vectors further vary depending on the consideration range of POS tags, the minimum frequency of morphemes included, and the random initialization range. All morpheme vectors are derived through CBOW(Continuous Bag-Of-Words) model with the context window 5 and the vector dimension 300. It seems that utilizing the same domain text even with a lower degree of grammatical correctness, performing spelling and spacing corrections as well as sentence splitting, and incorporating morphemes of any POS tags including incomprehensible category lead to the better classification accuracy. The POS tag attachment, which is devised for the high proportion of homonyms in Korean, and the minimum frequency standard for the morpheme to be included seem not to have any definite influence on the classification accuracy.

Shielding for Critical Organs and Radiation Exposure Dose Distribution in Patients with High Energy Radiotherapy (고 에너지 방사선치료에서 환자의 피폭선량 분포와 생식선의 차폐)

  • Chu, Sung-Sil;Suh, Chang-Ok;Kim, Gwi-Eon
    • Journal of Radiation Protection and Research
    • /
    • v.27 no.1
    • /
    • pp.1-10
    • /
    • 2002
  • High energy photon beams from medical linear accelerators produce large scattered radiation by various components of the treatment head, collimator and walls or objects in the treatment room including the patient. These scattered radiation do not provide therapeutic dose and are considered a hazard from the radiation safety perspective. Scattered dose of therapeutic high energy radiation beams are contributed significant unwanted dose to the patient. ICRP take the position that a dose of 500mGy may cause abortion at any stage of pregnancy and that radiation detriment to the fetus includes risk of mental retardation with a possible threshold in the dose response relationship around 100 mGy for the gestational period. The ICRP principle of as low as reasonably achievable (ALARA) was recommended for protection of occupation upon the linear no-threshold dose response hypothesis for cancer induction. We suggest this ALARA principle be applied to the fetus and testicle in therapeutic treatment. Radiation dose outside a photon treatment filed is mostly due to scattered photons. This scattered dose is a function of the distance from the beam edge, treatment geometry, primary photon energy, and depth in the patient. The need for effective shielding of the fetus and testicle is reinforced when young patients ate treated with external beam radiation therapy and then shielding designed to reduce the scattered photon dose to normal organs have to considered. Irradiation was performed in phantom using high energy photon beams produced by a Varian 2100C/D medical linear accelerator (Varian Oncology Systems, Palo Alto, CA) located at the Yonsei Cancer Center. The composite phantom used was comprised of a commercially available anthropomorphic Rando phantom (Phantom Laboratory Inc., Salem, YN) and a rectangular solid polystyrene phantom of dimensions $30cm{\times}30cm{\times}20cm$. the anthropomorphic Rando phantom represents an average man made from tissue equivalent materials that is transected into transverse 36 slices of 2.5cm thickness. Photon dose was measured using a Capintec PR-06C ionization chamber with Capintec 192 electrometer (Capintec Inc., Ramsey, NJ), TLD( VICTOREEN 5000. LiF) and film dosimetry V-Omat, Kodak). In case of fetus, the dosimeter was placed at a depth of loom in this phantom at 100cm source to axis distance and located centrally 15cm from the inferior edge of the $30cm{\times}30cm^2$ x-ray beam irradiating the Rando phantom chest wall. A acryl bridge of size $40cm{\times}40cm^2$ and a clear space of about 20 cm was fabricated and placed on top of the rectangular polystyrene phantom representing the abdomen of the patient. The leaf pot for testicle shielding was made as various shape, sizes, thickness and supporting stand. The scattered photon with and without shielding were measured at the representative position of the fetus and testicle. Measurement of radiation scattered dose outside fields and critical organs, like fetus position and testicle region, from chest or pelvic irradiation by large fie]d of high energy radiation beam was performed using an ionization chamber and film dosimetry. The scattered doses outside field were measured 5 - 10% of maximum doses in fields and exponentially decrease from field margins. The scattered photon dose received the fetus and testicle from thorax field irradiation was measured about 1 mGy/Gy of photon treatment dose. Shielding construction to reduce this scattered dose was investigated using lead sheet and blocks. Lead pot shield for testicle reduced the scatter dose under 10 mGy when photon beam of 60 Gy was irradiated in abdomen region. The scattered photon dose is reduced when the lead shield was used while the no significant reduction of scattered photon dose was observed and 2-3 mm lead sheets refuted the skin dose under 80% and almost electron contamination. The results indicate that it was possible to improve shielding to reduce scattered photon for fetus and testicle when a young patients were treated with a high energy photon beam.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

The Radioprotective Effect and Mechanism of Captopril on Radiation Induced-Heart Damage in Rats (방사선 조사 후 발생한 흰쥐 심장손상에서 Captopril의 방어역할과 기전)

  • Chang Seung-Hee;Lee Kyung-Ja;Koo Heasoo
    • Radiation Oncology Journal
    • /
    • v.22 no.1
    • /
    • pp.40-54
    • /
    • 2004
  • Purpose : Captopril (angiotension converting enzyme inhibitor) is known to have a radioproptective effect in the lungs, intestines and skin, but its effect in the heart is unclear. To investigate the radioprotectlve efiect and mechanism of captopril on the heart, the histopathological changes and immunohistochemical stains were compared with radiation alone, and radiation combined with captopril, in the rats. Materials and Methods : The histopathological changes and immunohistochemical stains ($TNF{\alpha}$, $TGF{\beta}1$, PDGF and FGF2) were examined in the radiation alone and the combined captopril and radiation groups, 2 and 8 weeks after irradiation. Each group consisted of 8 to 10 rats (Sprague-Dawley). Irradiation (12.5 Gy) was given to the left hemithorax in a single fraction. Captopril (50 mg/Kg/d) mixed with water, was given orally and continuously from the first week prior to, up to the 8th week of the experiment. Results : In the radiation alone group, the ventricle at 2 weeks after irradiation showed prominent edema (p=0.082) and fibrin deposit (p=0.018) compared to the control group. At 8 weeks, the edema was decreased and fibrosis increased compared to those at 2 weeks. The histopathological changes of the combined group were similar to those of the control group, due to the reduced radiation toxicity at 2 and 8 weeks. The endocardial fibrin deposit (p=0.047) in the atrium, and the interstitial fibrin deposit (p=0.019) and edema (p=0.042) of the ventricle were reduced significantly in the combined group compared to those in the radiation alone group at 2 weeks. The expressions of $TNF-{\alpha}$, $TGF-{\beta}1$, PDGF and FGF-2 in the radiation alone group were more increased than in the control group, especially in the pericardium and endocardium of the atrium at 2 weeks. At 8 weeks, the pericardial $TNF-{\alpha}$ and $TGF-{\beta}1$ in the radiation alone group continuously increased. The expressions of $TNF-{\alpha}$, $TGF-{\beta}1$ and PDGF were decreased in the combined group at 2 weeks. At 8 weeks, the expressions of $TNF-{\alpha}$ in the atrial and ventricular pericardia were markedly reduced (p=0.049, p=0.009). Conclusion : This study revealed that the early heart damage induced by radiation can be reduced by the addition of captopril in a rat model. The expressions of $TNF-{\alpha}$, $TGF-{\beta}1$ and PDGF were further decreased in the combined compared to the radiation alone group at both 2 and 8 weeks. From these results, it may be concluded that these cytokines probably play roles in the radioprotective mechanism of captopril from the radiation-induced heart toxicity, similarly to in other organs.

Crystal Structures of Full Dehydrated $Ca_{35}Cs_{22}Si_{100}Al_{92}O_{384}$and $Ca_{29}Cs_{34}Si_{100}Al_{92}O_{384}$ ($Ca^{2+}$ 이온과 $Cs^+$ 이온으로 치환되고 탈수된 두개의 제올라이트 X $Ca_{35}Cs_{22}Si_{100}Al_{92}O_{384}$$Ca_{29}Cs_{34}Si_{100}Al_{92}O_{384}$의 결정구조)

  • Jang, Se Bok;Song, Seung Hwan;Kim, Yang
    • Journal of the Korean Chemical Society
    • /
    • v.40 no.6
    • /
    • pp.427-435
    • /
    • 1996
  • The structures of fully dehydrated $Ca^{2+}$- and $Cs^+$-exchanged zeolite X, $Ca_{35}Cs_{22}Si_{100}Al_{92}O_{384}$($Ca_{35}Cs_{22}$-X; a=25.071(1) $\AA)$ and $Ca_{29}Cs_{34}Si_{100}Al_{92}O_{384}$($Ca_{29}Cs_{34}$-X; a=24.949(1) $\AA)$, have been determined by single-crystal X-ray diffraction methods in the cubic space group Fd3 at $21(1)^{\circ}C.$ Their structures were refined to the final error indices $R_1$=0.051 and $R_2$=0.044 with 322 reflections for $Ca_{35}Cs_{22}$-X, and $R_1$=0.058 and $R_2$=0.055 with 260 reflections for $Ca_{29}Cs_{34}$-X; $I>3\sigma(I).$ In both structures, $Ca^{2+}$ and $Cs^+$ ions are located at five different crystallographic sites. In dehydrated $Ca_{35}Cs_{22}$-X, sixteen $Ca^{2+}$ ions fill site I, at the centers of the double 6-rings(Ca-O=2.41(1) $\AA$ and $O-Ca-O=93.4(3)^{\circ}).$ Another nineteen $Ca^{2+}$ ions occupy site II (Ca-O=2.29(1) $\AA$, O-Ca-O=118.7(4)') and ten $Cs^+$ ions occupy site II opposite single six-rings in the supercage; each is $1.95\AA$ from the plane of three oxygens (Cs-O=2.99(1) and $O-Cs-O=82.3(3)^{\circ}).$ About three $Cs^+$ ions are found at site II', 2.27 $\AA$ into sodalite cavity from their three-oxygen plane (Cs-O=3.23(1) $\AA$ and $O-Cs-O=75.2(3)^{\circ}).$ The remaining nine $Cs^+$ ions are statistically distributed over site Ⅲ, a 48-fold equipoint in the supercages on twofold axes (Cs-O=3.25(1) $\AA$ and Cs-O=3.49(1) $\AA).$ In dehydrated $Ca_{29}Cs_{34}$-X, sixteen $Ca^{2+}$ ions fill site I(Ca-O=2.38(1) $\AA$ and $O-Ca-O=94.1(4)^{\circ})$ and thirteen $Ca^{2+}$ ions occupy site II (Ca-O=2.32(2) $\AA$, $O-Ca-O=119.7(6)^{\circ}).$ Another twelve $Cs^+$ ions occupy site II; each is $1.93\AA$ from the plane of three oxygens (Cs-O=3.02(1) and $O-Cs-O=83.1(4)^{\circ})$ and seven $Cs^+$ ions occupy site II'; each is $2.22\AA$ into sodalite cavity from their three-oxygen plane (Cs-O=3.21(2) and $O-Cs-O=77.2(4)^{\circ}).$ The remaining sixteen $Cs^+$ ions are found at III site in the supercage (Cs-O=3.11(1) $\AA$ and Cs-O=3.46(2) $\AA).$ It appears that $Ca^{2+}$ ions prefer sites I and II in that order, and that $Cs^+$ ions occupy the remaining sites, except that they are too large to be stable at site I.

  • PDF