• Title/Summary/Keyword: Stored form

Search Result 369, Processing Time 0.033 seconds

Compilation of records and Management of those materials, in the latter half period of the Joseon dynasty (조선후기 기록물 편찬과 관리)

  • Shin, Byung Ju
    • The Korean Journal of Archival Studies
    • /
    • no.17
    • /
    • pp.39-84
    • /
    • 2008
  • In this article, how the records were compiled, stored and managed during the latter half period of the Joseon dynasty is examined. In details, the compilation of and and Euigwe, the establishment of 'history chambers(史庫)' and the Wae-Gyujanggak facility, and the creation of records such as 'Shillok Hyeongji-an', are all investigated. Examination of all these details revealed that in the latter half period of the Joseon dynasty, it was the royal family which actively led the task of meticulously compiling records and also storing & managing those established materials with great integrity and passion. The intention behind creating all these records containing everything the kings said and done over centuries must have been determination to enhance the openness and integrity of politics in general, while also emphasizing the importance of such values inside the government. In order to establish a tradition preserving records not only for a limited time period but also for eternity, 'history chambers' were founded in rocky mountain areas, and additional chambers(Wae-Sago) were created as well, in areas deemed strategically safe in military terms such as the Ganghwa-do island. Officials put in charge by the king himself of historical documenting reported to the history chambers on a regular basis and checked the status of the materials in custody, and the whole checking process was documented into a form called 'Shillok Hyeongji-an'. And for long-term preservation of materials, officials sent by the king regularly took all the materials outside, and conducted a series of 'desiccating procedures', under strong sunlight('Poswae'). Thanks to the efforts of our ancestors who did their best to preserve all the records, and tried everything to manage them with great caution, we can examine and experience all these centuries-old materials, mostly intact. It is imperative that we inherit not only the magnificent culture of creating and preserving records, but also the spirit which compelled our ancestors to do so.

A Study of Relationship Derivation Technique using object extraction Technique (개체추출기법을 이용한 관계성 도출기법)

  • Kim, Jong-hee;Lee, Eun-seok;Kim, Jeong-su;Park, Jong-kook;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.309-311
    • /
    • 2014
  • Despite increasing demands for big data application based on the analysis of scattered unstructured data, few relevant studies have been reported. Accordingly, the present study suggests a technique enabling a sentence-based semantic analysis by extracting objects from collected web information and automatically analyzing the relationships between such objects with collective intelligence and language processing technology. To be specific, collected information is stored in DBMS in a structured form, and then morpheme and feature information is analyzed. Obtained morphemes are classified into objects of interest, marginal objects and objects of non-interest. Then, with an inter-object attribute recognition technique, the relationships between objects are analyzed in terms of the degree, scope and nature of such relationships. As a result, the analysis of relevance between the information was based on certain keywords and used an inter-object relationship extraction technique that can determine positivity and negativity. Also, the present study suggested a method to design a system fit for real-time large-capacity processing and applicable to high value-added services.

  • PDF

Improved Security for Fuzzy Fingerprint Vault Using Secret Sharing over a Security Token and a Server (비밀분산 기법을 이용한 보안토큰 기반 지문 퍼지볼트의 보안성 향상 방법)

  • Choi, Han-Na;Lee, Sung-Ju;Moon, Dae-Sung;Choi, Woo-Yong;Chung, Yong-Wha;Pan, Sung-Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.63-70
    • /
    • 2009
  • Recently, in the security token based authentication system, there is an increasing trend of using fingerprint for the token holder verification, instead of passwords. However, the security of the fingerprint data is particularly important as the possible compromise of the data will be permanent. In this paper, we propose an approach for secure fingerprint verification by distributing both the secret and the computation based on the fuzzy vault(a cryptographic construct which has been proposed for crypto-biometric systems). That is, a user fingerprint template which is applied to the fuzzy vault is divided into two parts, and each part is stored into a security token and a server, respectively. At distributing the fingerprint template, we consider both the security level and the verification accuracy. Then, the geometric hashing technique is applied to solve the fingerprint alignment problem, and this computation is also distributed over the combination of the security token and the server in the form of the challenge-response. Finally, the polynomial can be reconstructed from the accumulated real points from both the security token and the server. Based on the experimental results, we confirm that our proposed approach can perform the fuzzy vault-based fingerprint verification more securely on a combination of a security token and a server without significant degradation of the verification accuracy.

Privacy Preserving Keyword Search with Access Control based on DTLS (프라이버시를 보호하는 접근제어가 가능한 키워드 검색 기법)

  • Noh, Geon-Tae;Chun, Ji-Young;Jeong, Ik-Rae;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.35-44
    • /
    • 2009
  • To protect sensitive personal information, data will be stored in encrypted form. However in order to retrieve these encrypted data without decryption, there need efficient search methods to enable the retrieval of the encrypted data. Until now, a number of searchable encryption schemes have been proposed but these schemes are not suitable when dynamic users who have the permission to access the data share the encrypted data. Since, in previous searchable encryption schemes, only specific user who is the data owner in symmetric key settings or has the secret key corresponding to the public key for the encrypted data in asymmetric key settings can access to the encrypted data. To solve this problem, Stephen S. Yau et al. firstly proposed the controlled privacy preserving keyword search scheme which can control the search capabilities of users according to access policies of the data provider. However, this scheme has the problem that the privacy of the data retrievers can be breached. In this paper, we firstly analyze the weakness of Stephen S. Yau et al.'s scheme and propose privacy preserving keyword search with access control. Our proposed scheme preserves the privacy of data retrievers.

Web viewer for sharing of prosthesis design between laboratory and clinic: Case report (웹뷰어를 이용한 기공실과 진료실 측 간의 보철물 설계 형태의 공유: 증례 보고)

  • Jang, Sung Won;Lee, Ho Jin;Kim, So-Yeun;Lee, Du-Hyeong
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.60 no.3
    • /
    • pp.276-282
    • /
    • 2022
  • Close communication between clinicians and dental technicians is an important factor in providing successful prostheses. The exchange of opinions with laboratories has mainly been in the form of written prescriptions and a photos, but it has been reported that information transmission may be limited. Currently, as digital technology-based prosthesis fabrication is common, 3D image objects can be stored on the web and can be easily viewed through a mobile web browser. In this article, we introduce cases where the design of the prosthesis was improved by designing the prosthesis using CAD software and reviewing the prosthesis designed with the clinical side through a web viewer. Through this protocol, it was possible to improve the occlusal surface and crown contour, the opposing teeth condition, the size of the gingival embrasure, and the shape of pontic. The process of sharing, discussing, and modifying the prosthesis design with the clinician and technician through a web viewer contributes to reflecting the diversity of oral conditions and individualized needs, thereby helping to make functional and esthetic prostheses.

Design of Knowledge-based Spatial Querying System Using Labeled Property Graph and GraphQL (속성 그래프 및 GraphQL을 활용한 지식기반 공간 쿼리 시스템 설계)

  • Jang, Hanme;Kim, Dong Hyeon;Yu, Kiyun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.40 no.5
    • /
    • pp.429-437
    • /
    • 2022
  • Recently, the demand for a QA (Question Answering) system for human-machine communication has increased. Among the QA systems, a closed domain QA system that can handle spatial-related questions is called GeoQA. In this study, a new type of graph database, LPG (Labeled Property Graph) was used to overcome the limitations of the RDF (Resource Description Framework) based database, which was mainly used in the GeoQA field. In addition, GraphQL (Graph Query Language), an API-type query language, is introduced to address the fact that the LPG query language is not standardized and the GeoQA system may depend on specific products. In this study, database was built so that answers could be retrieved when spatial-related questions were entered. Each data was obtained from the national spatial information portal and local data open service. The spatial relationships between each spatial objects were calculated in advance and stored in edge form. The user's questions were first converted to GraphQL through FOL (First Order Logic) format and delivered to the database through the GraphQL server. The LPG used in the experiment is Neo4j, the graph database that currently has the highest market share, and some of the built-in functions and QGIS were used for spatial calculations. As a result of building the system, it was confirmed that the user's question could be transformed, processed through the Apollo GraphQL server, and an appropriate answer could be obtained from the database.

Gingival pigmentation treatment using Er;YSGG laser (Er;YSGG 레이저를 이용한 치은 색소침착 제거 증례보고)

  • Kim, Hyunjong
    • Journal of the Korean Academy of Esthetic Dentistry
    • /
    • v.30 no.2
    • /
    • pp.53-58
    • /
    • 2021
  • The attractiveness of the gingiva is determined by its color, shape, and the shape and location of the boundary between the teeth and the gingival tissue. The standards beauty, balance, and health of the gingiva are all different, but the general public would agree that a coral pink gingiva is more beautiful than black or brown gingiva. Hence, one would be able to smile more confidently in public if he or she receives a gingival pigmentation removal surgery that changes the color of black or brown gums to a beautiful pink color with relative simplicity. The color of one's gingiva varies from pale pink to deep bluish purple, depending on many health components. The most prominent among these include the vascular supply, epithelial thickness, the degree of keratinization, and the presence of pigment in the epithelium. Melanin, carotene, reduced hemoglobulin, and oxyhemoglobulin are the main pigments contributing to the normal color of the oral mucosa. The health of one's gingival tissue are essential for an attractive smile. Excessive melanin deposits in the basal and early basal layers of the epithelium stored in the form of melanosomes frequently cause pigmentation. Although there are many different procedures to remove this pigmentation, the it was removed using the Er;YSGG laser. It is my wish that, through this case study, many people

Analysis of activated colloidal crud in advanced and modular reactor under pump coastdown with kinetic corrosion

  • Khurram Mehboob;Yahya A. Al-Zahrani
    • Nuclear Engineering and Technology
    • /
    • v.54 no.12
    • /
    • pp.4571-4584
    • /
    • 2022
  • The analysis of rapid flow transients in Reactor Coolant Pumps (RCP) is essential for a reactor safety study. An accurate and precise analysis of the RCP coastdown is necessary for the reactor design. The coastdown of RCP affects the coolant temperature and the colloidal crud in the primary coolant. A realistic and kinetic model has been used to investigate the behavior of activated colloidal crud in the primary coolant and steam generator that solves the pump speed analytically. The analytic solution of the non-dimensional flow rate has been determined by the energy ratio β. The kinetic energy of the coolant fluid and the kinetic energy stored in the rotating parts of a pump are two essential parameters in the form of β. Under normal operation, the pump's speed and moment of inertia are constant. However, in a coastdown situation, kinetic damping in the interval has been implemented. A dynamic model ACCP-SMART has been developed for System Integrated Modular and Advanced Reactor (SMART) to investigate the corrosion due to activated colloidal crud. The Fickian diffusion model has been implemented as the reference corrosion model for the constituent component of the primary loop of the SMART reactor. The activated colloidal crud activity in the primary coolant and steam generator of the SMART reactor has been studied for different equilibrium corrosion rates, linear increase in corrosion rate, and dynamic RCP coastdown situation energy ratio b. The coolant specific activity of SMART reactor equilibrium corrosion (4.0 mg s-1) has been found 9.63×10-3 µCi cm-3, 3.53×10-3 µC cm-3, 2.39×10-2 µC cm-3, 8.10×10-3 µC cm-3, 6.77× 10-3 µC cm-3, 4.95×10-4 µC cm-3, 1.19×10-3 µC cm-3, and 7.87×10-4 µC cm-3 for 24Na, 54Mn, 56Mn, 59Fe, 58Co, 60Co, 99Mo, and 51Cr which are 14.95%, 5.48%, 37.08%, 12.57%, 10.51%, 0.77%, 18.50%, and 0.12% respectively. For linear and exponential coastdown with a constant corrosion rate, the total coolant and steam generator activity approaches a higher saturation value than the normal values. The coolant and steam generator activity changes considerably with kinetic corrosion rate, equilibrium corrosion, growth of corrosion rate (ΔC/Δt), and RCP coastdown situations. The effect of the RCP coastdown on the specific activity of the steam generators is smeared by linearly rising corrosion rates, equilibrium corrosion, and rapid coasting down of the RCP. However, the time taken to reach the saturation activity is also influenced by the slope of corrosion rate, coastdown situation, equilibrium corrosion rate, and energy ratio β.

Automatic Electronic Medical Record Generation System using Speech Recognition and Natural Language Processing Deep Learning (음성인식과 자연어 처리 딥러닝을 통한 전자의무기록자동 생성 시스템)

  • Hyeon-kon Son;Gi-hwan Ryu
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.731-736
    • /
    • 2023
  • Recently, the medical field has been applying mandatory Electronic Medical Records (EMRs) and Electronic Health Records (EHRs) systems that computerize and manage medical records, and distributing them throughout the entire medical industry to utilize patients' past medical records for additional medical procedures. However, the conversations between medical professionals and patients that occur during general medical consultations and counseling sessions are not separately recorded or stored, so additional important patient information cannot be efficiently utilized. Therefore, we propose an electronic medical record system that uses speech recognition and natural language processing deep learning to store conversations between medical professionals and patients in text form, automatically extracts and summarizes important medical consultation information, and generates electronic medical records. The system acquires text information through the recognition process of medical professionals and patients' medical consultation content. The acquired text is then divided into multiple sentences, and the importance of multiple keywords included in the generated sentences is calculated. Based on the calculated importance, the system ranks multiple sentences and summarizes them to create the final electronic medical record data. The proposed system's performance is verified to be excellent through quantitative analysis.

Development of Smartphone Application for Cognitive Behavioral Therapy-Based Case Management in Patients with Schizophrenia (조현병 환자의 인지행동치료 기반 사례관리를 위한 스마트폰 애플리케이션 개발)

  • Kim, Sung-Wan;Lee, Ga-Young;Yu, Hye-Young;Park, Ji-Hyun;Lee, Yong-Sung;Kim, Ju-Wan;Park, Cheol;Lee, Ju-Yeon;Lee, Yo-Han;Kim, Jae-Min;Yoon, Jin-Sang
    • Korean Journal of Schizophrenia Research
    • /
    • v.19 no.1
    • /
    • pp.10-16
    • /
    • 2016
  • Objectives : This article aims to describe the development of smartphone application for the case management of patients with schizophrenia. Methods : Gwangju Bukgu-Community Mental Health Center developed and launched a smartphone application (HYM) for cognitive-behavioral case management and symptom monitoring. The development of the application involved psychiatrists, nurses, social workers, psychologists, and software technicians from a software development company (Goosl Corp.). Results : The HYM application for clients includes six main modules including Thought record, Symptom record, Daily life record, Official notices, Communication, and Scales. The key module is the 'Thought Record' for self-directed cognitive-behavioral treatment (CBT). When the client writes and sends the self-CBT sheet to the case manager, the latter receives a notification and can provide feedback in real time. 'Communication' and 'Official notices' are useful for promoting communication between case managers and clients with schizophrenia. Ratings in 'Symptom record', 'Daily life record', and 'Scales' modules are stored in graphic or table form representing changes in them and shared with case managers. Conclusion : The interactive function of this application is the key characteristics that distinguishes it from other mobile self-treatment tools. This smartphone application may contribute to the development of a youth- and customer-friendly case management system for individuals with early psychosis.