• Title/Summary/Keyword: Plain Text

Search Result 95, Processing Time 0.019 seconds

Treatment Example of Bursitis Caused by Stroke (타박(打撲)에 의한 활액낭종(滑液囊腫)의 치험례(治驗例))

  • Lee, Soo-Kyeung;Lee, Yong-Yang;Kim, Young-Hwan;Park, Won-Hwan
    • The Journal of the Society of Korean Medicine Diagnostics
    • /
    • v.14 no.1
    • /
    • pp.79-95
    • /
    • 2010
  • Background and Purpose : By preventing diseases caused by exogenous evil, disorder of internal organs, and seven modes of emotions and adapting to mother nature when the mind is unsettled, and keeping the body and mind relaxed diseases can be avoided, but there can be unpredicted situations caused accidentally by stroke. Currently the general prescription is regulating the flow of vital energy including drugs eliminating blood stasis. Even though the stroke is resulted from diseases caused by exogenous evil, by observing the patient's physical appearance, essence of life, vital energy, and mental faculties which are believed to be the functions of the heart to clear the upper body and invigorate the functions of the spleen and stomach and purge with drugs of warm nature is a closer approach than simply prescribing vital energy regulating drugs with eliminating blood stasis to the main purpose of treatment. Methods : 1) The subject of the study are 2 cases of patients who have visited the private hospital of the person who is announcing the results of the study. These patients have been given a diagnosis of edema or cystoma caused by bursitis in the knee joint through perception or medical examination and were waiting for operational application. 2) Sources related to stroke from Dong Eui Bo Gwam(東醫寶鑑) were used as the general standard of Korean Traditional Medicine, and to promote the understanding the original text and the translation has been given. 3) By observing the whole body such as the patient's usual physical appearance, essence of life, vital energy, and mental faculties which are believed to be the functions of the heart, or partly using the "Yin is even and well while Yang is firm" theory of "Plain Questions" as the background to present the results of the clinical study. Results and Conclusion : Generally the prescriptions from the first volume of Dong Eui Bo Gwam(東醫寶鑑) are mostly drugs eliminating stagnated blood including extravasated blood and the blood moving sluggishly in circulation or congested in a viscus, alleviating pain, invigorating blood circulation. Also prescriptions for bone fracture or fracture of bones and sinews are mostly to eradicate blood stasis with drastic drugs or coaptation drugs added to drugs eliminating stagnated blood including extravasated blood and the blood moving sluggishly in circulation or congested in a viscus, alleviating pain, invigorating vital energy, possessing warm properties for the Xue system.

Studies of the possibility of external threats of the automotive ECU through simulation test environment (자동차용 ECU의 CAN 메시지를 통한 자동차 공격 방법 연구)

  • Lee, Hye-Ryun;Kim, Kyoung-Jin;Jung, Gi-Hyun;Choi, Kyung-Hee;Park, Seung-Kyu;Kwon, Do-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.39-49
    • /
    • 2013
  • In this paper, security mechanism of internal network(CAN) of vehicle is a very incomplete state and the possibility of external threats as a way to build a test environment that you can easily buy from the market by the vehicle's ECU(Electric Control Unit) to verify and obtain a CAN message. Then, by applying it to ECU of the real car to try to attack is proposed. A recent study, Anyone can see plain-text status of the CAN message in the vehicle. so that in order to verify the information is vulnerable to attack from outside, analyze the data in a vehicle has had a successful attack, but attack to reverse engineering in the stationary state and buying a car should attempt has disadvantages that spatial, financial, and time costs occurs. Found through the car's ECU CAN message is applied to a real car for Potential threats outside of the car to perform an experiment to verify and equipped with a wireless network environment, the experimental results, proposed method through in the car to make sure the attack is possible. As a result, reduce the costs incurred in previous studies and in the information absence state of the car, potential of vehicle's ECU attack looks.

Frame security method in physical layer using OFB over Gigabit Ethernet Network (기가비트 이더넷 망에서 OFB 방식을 이용한 물리 계층 프레임 보안 기법)

  • Im, Sung-yeal
    • Journal of Internet Computing and Services
    • /
    • v.22 no.5
    • /
    • pp.17-26
    • /
    • 2021
  • This paper is about a physical layer frame security technique using OFB-style encryption/decryption with AES algorithms on Gigabit Ethernet network. We propose a data security technique at the physical layer that performs OFB-style encryption/decryption with AES algorithm with strong security strength when sending and receiving data over Gigabit Ethernet network. Generally, when operating Gigabit Ethernet network, there is no security features, but data security is required, additional devices that apply this technique can be installed to perform security functions. In the case of data transmission over Gigabit Ethernet network, the Ethernet frames conform to IEEE 802.3 specification, which includes several fields to ensure proper reception of data at the receiving node in addition to the data field. When encrypting, only the data field should be encrypted and transmitted in real time. In this paper, we show that only the data field of the IEEE802.3 frame is encrypted and transmitted on the sending node, and only the data field is decrypted to show the plain text on the receiving node, which shows that the encryption/decryption is carried out correctly. Therefore, additional installation of devices that apply this technique can increase the reliability of the system when security for data is required in Ethernet network operating without security features.

A Study on Analysis of Research Data Repository in Humanities and Social Sciences (re3data를 기반으로 한 인문사회 RDR 연구)

  • Cho, Jane;Park, Jong-Do
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.30 no.2
    • /
    • pp.69-87
    • /
    • 2019
  • As the discussions on sharing research data prevail by the chance of the inauguration of the International Open Data Charter, research support organizations in the United States, the United Kingdom, and Japan are encouraging researchers to deposit their findings in a credible repository. Humanities and social sciences field, in which research data sharing culture and storage infrastructure are immature compared to life science and natural science, also needs to establish and operate a reliable storage infrastructure to guarantee the continuous access and utilization of data. This study analyzed the overall operational status of 305 subject repositories registered in re3data for the humanities and social sciences and clustered them according to the operational level using 5 indicators. As a result, 70% of the population were identified as universal clusters, and 20% of the excellent cluster was found to have the largest number of linguistic fields and the German-operated. In addition, this study confirmed through correspondence analysis that there is a relation between the sub-theme fields of humanities and social sciences and the types of data to be archived. The history and art domians are related to images, and social studies are related to statistical data. Linguistics has also been analyzed to be related to audio, plain text, and code.

Escape from Binary Opposition -Analysis of Performative Method in - (이항대립(二項對立)으로부터의 탈주 -<오목어>에서의 매체 수행 방식 분석-)

  • Suh, Yong-Chu
    • Cartoon and Animation Studies
    • /
    • s.41
    • /
    • pp.511-531
    • /
    • 2015
  • The underlying impetus of the birth of animated film is attraction about a moving image. And the animation image occurs from the process of performative relationship between an animator and apparatus. Therefore, analysing the method how the moving image is constructed will be the focal starting point to deal with an animated film as a text. In this context, that conveys the theme in more sensuous way will be examined in a dimension of the material, technique and image-making method. KIM Jin-man's is a Stop Motion Animated Film with Noodlescreen about a journey of a fish that wishes to go outside of the water. KIM created original and friendly images out of plain thin noodle which is a common ingredient in Korea, and dealt with the ontological introspection based of the concept of Nondualism. Nondualism based on the interconnected and cyclical eastern philosophy which is different from the western dualistic theory points to the idea that the universe and all its multiplicity are ultimately expressions or appearances of one essential reality. This paper focuses on KIM's recent work and sees how Nondualism is applied throughout the animated film by analysing the performative method of mediums, technique, and structure. First of all, the form of Noodlescreen will be reviewed in Chapter Two. Pinscreen Animation which was invented by Alexander Alexeieff and Claire Parker will be also compared with Noodlescreen in the aesthetic viewpoint here. In Chapter Three, it will be analysed how the description of the image of binary opposition itself provides expanded sense and rich metaphor. Lastly, the format of Mise-en-abyme going constantly towards outer space will be dealt how it exposes the cinematic illusion and spatiality in Chapter Four. Throughout the whole chapters, it will reviewed how the concept of Nondualism relates the images of and deactivate the boundary of binary opposition in terms of both the story development and the visualization method. By this methodology, it will be confirmed that image of animated film not only explains the narrative but also activates the perception about the theme and provides integrated sensory experiences in the independent and expanded dimension.