• Title/Summary/Keyword: Traditional Library

Search Result 464, Processing Time 0.023 seconds

A Literature Analysis on Medicinal Use and Research of Cannabis in the Meiji Era of Japan

  • Ahn, Byung-Soo;Kang, Seokhyun;Lee, Kyung Hoon;Kim, Seoyoon;Park, Jin Sung;Seo, Hyung-Sik
    • Journal of Pharmacopuncture
    • /
    • v.23 no.3
    • /
    • pp.142-157
    • /
    • 2020
  • Cannabis is a historical plant which has been used as a medicine in East Asia. These days, there are active debates about using cannabis in clinical field. Collecting and comparing cannabis research articles which had been published in the Opening of Japan to spot the interactions between the traditional medicine of Japan, Rangaku which was established in Edo Period and the European medicine which is transferred after Perry Expedition is academically meaningful. This study searched publications, which were listed on Open-Access databases by Dec. 11th, 2019. We collected research articles which had been published from January 3rd, 1867 to July 30th, 1912 also known as Meiji era and uploaded on OpenAccess databases. Our searching databases were J-stage, CiNii (Scholarly and Academic Information Navigator), Tokyo Metropolitan Library, The National Diet Library, IRDB (Institutional Repositories DataBase) and KAKEN (Grant-in-Aid for Scientific Research Database). Searching keywords were cannabis, hemp and all their Japanese synonyms and available combinations. We selected final 15 studies which met every selection criteria in the 346,393 collected studies. Cannabis was prescribed in Meiji era of Japan to alleviate pain and cure the digestive, respiratory, urinary, and nervous system diseases such as indigestion, asthma, tuberculosis, gonorrhea and its complications, insomnia, and nervous prostration. Cannabis was medically used in Meiji era of Japan and the reporting and sharing of its clinical effect was published on the medical journals like present days. There were already Cannabis regulations in that era, but its medicinal use was more liberated than nowadays. It may be a chance to reconsider the current legal system, which strictly controls the use of Cannabis.

A Bibliographical Analysis on the Folktale Studies in Korea (우리나라 전래동화연구의 서지적 고찰)

  • Yoo, So-Young
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.37 no.2
    • /
    • pp.253-268
    • /
    • 2003
  • A bibliographical analysis on folktale studies in Korea by Soyoung Yoo This study is aimed primarily at taking a view of the scope and depth of folktale studies in Korea and analysing their subjects study and directions. By doing so, the researcher hopes that this can be of help to users of those studies. The researcher collected all the studies in this field since 1945 and analysed them through SAS program. Thus, the researcher found the studies on Korean folktales started in late 1960's and flourished and diversified in the middle of the 1990s. The researcher divided the collected materials into two categories, i.e., the study materials which focused on folktales themselves and studies for the exploration of applications of folktales for other purposes. Former analytical study on folktales study themselves is shown to be composed of events, characters, themes and psychological as well as value analysis. there are some comparative studies with folktales of other countries. Latter studies show that the studies are mostly for language educational purpose. Furthermore, they are for illustration, animation, traditional design, costumes studies and theme parks. There are some other studies.

A Systematic Review and Meta-Analysis of Randomized Controlled Trials on Chuna Manual Therapy for Cervicogenic Headache

  • Lee, Dong-Wha;Kim, Ju-Young;Hong, Min-Ho;Koo, Byung-Soo;Kim, Geun-Woo
    • Journal of Oriental Neuropsychiatry
    • /
    • v.30 no.2
    • /
    • pp.89-105
    • /
    • 2019
  • Objectives: We conducted this study to evaluate the efficacy of Chuna Manual Therapy (CMT) for treatment of cervicogenic headache (CeH) through systematic review and Meta-analysis of randomized controlled trials (RCTs) as a preceding research to further research the effective of Chuna Manual Therapy for patients who suffered from CeH. Methods: We conducted a systematic review and meta-analysis by the Preferred Reporting Items for Systematic Reviews and Meta-Analyses guidelines. We searched the studies from MEDLINE, Elsevier-EMBASE, The Cochrane Library, CAJD, KISS, KMBase, Korean Traditional Knowledge Portal, NDSL, and OASIS. The studies selected only in randomized controlled trials. We selected the chosen studies by the selection and the exclusion criteria, and evaluated the quality of the selected studies using the Jadad score and the Cochran ROB tool. We used the Visual Analogue Scale score (VAS) and Clinical total Effective Rate (CER) for the results and analyzed the results of the included studies using RevMan 5.3 software provided by the Cochran library. Results: We included 20 RCTs, including 1,673 subjects, in the systematic review and meta-analysis. After the intervention, the CMT group showed better results than the pharmacotherapy group, the physiotherapy group, and the combined treatment group. The CMT group showed a good effect on the CER and the VAS but showed a significant heterogeneity compared to the pharmacotherapy group. Conclusions: The CMT as monotherapy might have benefits on Cervicogenic Headache patient. Further well-designed studies need to be conducted.

Thread Embedding Therapy in Rheumatoid Arthritis: A Systematic Review of Animal Studies (매선요법의 류마티스 관절염 동물모델을 활용한 실험연구: 체계적 문헌고찰)

  • Jun, Purumea;Zhao, HuiYan;Kang, Suk-Yun;Han, Chang-Hyun
    • Korean Journal of Acupuncture
    • /
    • v.38 no.3
    • /
    • pp.122-132
    • /
    • 2021
  • Objectives : This systematic review aims to assess the effectiveness of thread embedding therapy on animal model for rheumatoid arthritis. Methods : Search was conducted in the Cochrane library, MEDLINE (PubMed), EMBASE, the Chinese National Knowledge Infrastructure, Wan-Fang Database, Technology Journal Database, the Korean Studies Information Service System, the Oriental Medicine Advanced Searching Integrated System, the Research Information Sharing Service, the National Digital Science Library, the Korean Traditional Knowledge Portal and the Korea Citation Index. Data were extracted concerning animal model, intervention and rheumatoid arthritis indicator by two independent reviewers. Reporting quality was also evaluated by the ARRIVE (Animal Research: Reporting In Vivo Experiments) guidelines 2.0. Results : One thousand thirty six studies were primarily selected. After screening, 10 studies met the inclusion criteria. 1 study was published 2005, 1 study was published 2010, 1 study was published 2012, 1 study was published 2015, 2 studies were published 2016, 3 studies were published 2017, 1 study was published 2018. The most frequently used acupoints were ST36 and BL23, and were used with an average frequency of 11.8 days. All of these thread embedding therapy studies were effective on behavioral, morphological, immunohistological and hematological indicators to treat of rheumatoid arthritis model. Conclusions : These results demonstrated the effectiveness of thread embedding therapy and suggested the putative mechanism. However, considering the small number of included studies, low reporting quality and differences in study design, further studies with rigorous designs and high reporting quality need to be conducted.

Statistical Techniques to Derive Heavy Rain Impact Level Criteria Suitable for Use in Korea (통계적 기법을 활용한 한국형 호우영향도 기준 산정 연구)

  • Lee, Seung Woon;Kim, Byung Sik;Jung, Seung Kwon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.40 no.6
    • /
    • pp.563-569
    • /
    • 2020
  • Presenting the impact of meteorological disasters departs from the traditional weather forecasting approach for meteorological phenomena. It is important to provide impact forecasts so that precautions against disruption and damage can be taken. Countries such as the United States, the U.K., and France already conduct impact forecasting for heavy rain, heavy snow, and cold weather. This study improves and applies forecasts of the impact of heavy rain among various weather phenomena in accordance with domestic conditions. A total of 33 impact factors for heavy rain were constructed per 1 km grids, and four impact levels (minimal, minor, significant, and severe) were calculated using standard normal distribution. Estimated criteria were used as indicators to estimate heavy rain risk impacts for 6 categories (residential, commercial, utility, community, agriculture, and transport) centered on people, facilities, and traffic.

Accuracy of Phishing Websites Detection Algorithms by Using Three Ranking Techniques

  • Mohammed, Badiea Abdulkarem;Al-Mekhlafi, Zeyad Ghaleb
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.272-282
    • /
    • 2022
  • Between 2014 and 2019, the US lost more than 2.1 billion USD to phishing attacks, according to the FBI's Internet Crime Complaint Center, and COVID-19 scam complaints totaled more than 1,200. Phishing attacks reflect these awful effects. Phishing websites (PWs) detection appear in the literature. Previous methods included maintaining a centralized blacklist that is manually updated, but newly created pseudonyms cannot be detected. Several recent studies utilized supervised machine learning (SML) algorithms and schemes to manipulate the PWs detection problem. URL extraction-based algorithms and schemes. These studies demonstrate that some classification algorithms are more effective on different data sets. However, for the phishing site detection problem, no widely known classifier has been developed. This study is aimed at identifying the features and schemes of SML that work best in the face of PWs across all publicly available phishing data sets. The Scikit Learn library has eight widely used classification algorithms configured for assessment on the public phishing datasets. Eight was tested. Later, classification algorithms were used to measure accuracy on three different datasets for statistically significant differences, along with the Welch t-test. Assemblies and neural networks outclass classical algorithms in this study. On three publicly accessible phishing datasets, eight traditional SML algorithms were evaluated, and the results were calculated in terms of classification accuracy and classifier ranking as shown in tables 4 and 8. Eventually, on severely unbalanced datasets, classifiers that obtained higher than 99.0 percent classification accuracy. Finally, the results show that this could also be adapted and outperforms conventional techniques with good precision.

A Countermeasure against a Whitelist-based Access Control Bypass Attack Using Dynamic DLL Injection Scheme (동적 DLL 삽입 기술을 이용한 화이트리스트 기반 접근통제 우회공격 대응 방안 연구)

  • Kim, Dae-Youb
    • Journal of IKEEE
    • /
    • v.26 no.3
    • /
    • pp.380-388
    • /
    • 2022
  • The traditional malware detection technologies collect known malicious programs and analyze their characteristics. Then such a detection technology makes a blacklist based on the analyzed malicious characteristics and checks programs in the user's system based on the blacklist to determine whether each program is malware. However, such an approach can detect known malicious programs, but responding to unknown or variant malware is challenging. In addition, since such detection technologies generally monitor all programs in the system in real-time, there is a disadvantage that they can degrade the system performance. In order to solve such problems, various methods have been proposed to analyze major behaviors of malicious programs and to respond to them. The main characteristic of ransomware is to access and encrypt the user's file. So, a new approach is to produce the whitelist of programs installed in the user's system and allow the only programs listed on the whitelist to access the user's files. However, although it applies such an approach, attackers can still perform malicious behavior by performing a DLL(Dynamic-Link Library) injection attack on a regular program registered on the whitelist. This paper proposes a method to respond effectively to attacks using DLL injection.

A Study on Social Sharing of Scholarly Information Resources: Focusing on Laypeople's Information Needs and Behaviors (학술정보자원의 사회적 공유에 관한 연구 - 일반인의 정보요구와 행위를 중심으로 -)

  • Kim, Chohae;Park, Ji-Hong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.2
    • /
    • pp.57-82
    • /
    • 2022
  • Today, despite the increase in professional knowledge-related information needs of citizens, the expansion of citizen participatory research in academia, and the provision of information services for the professional knowledge, there are still difficulties in access to scholarly information resources by laypeople. Focusing on this problem, this study investigates laypeople's scholarly information needs and behaviors through a questionnaire survey. By examining the search and use behaviors of scholarly information resources, and the perception of the need to support the utilization of them, this study analyzes the degree and pattern of social sharing of scholarly information resources beyond the scholarly community. This study is significant in that it expands the range of users in traditional scholarly communication and emphasizes the need to support them to access and use scholarly information resources.

A Historical Analysis of Records and Archives Management System of Won-Buddhism (원불교 기록관리체제의 성립과 변천)

  • Ha, Jong-Hee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.17 no.2
    • /
    • pp.157-176
    • /
    • 2006
  • This study covers the transition of the records and archives management system of Won-Buddhism. The System can be reviewed in four eras. In the Bulbeopyeonguhoe regulations era(1924$\sim$1948), records and archives were managed in an elementary but more ingenious manner than in any other era. The first phase of the Won-Buddhism regulations era(1948$\sim$1965) was governed by the Won-Buddhism Regulations, though the traditional system of the Bulbeopyeonguhoe regulations era was still widely practiced. During the second phase of the Won-Buddhism regulations era (1965$\sim$1994), the system of "national regulations" was actively introduced into the Won-Buddhism system of managing records and archives. During the third phase of the Won-Buddhism regulations era(1994$\sim$present), the Won-Buddhism Regulations had their own meaning because in that they were the first regulations of Won-Buddhism established for the sole purpose of managing records and archives. This study has significance for understanding the Won-Buddhism system of managing records and archives.

Analysis of Z Generation's Collaborative Information Activities through Challenges: Focusing on Korean College Students (챌린지에 나타난 Z세대의 협업 정보 활동 - 국내 대학생을 중심으로 -)

  • Ji Hei Kang
    • Journal of Korean Library and Information Science Society
    • /
    • v.55 no.1
    • /
    • pp.173-192
    • /
    • 2024
  • Through a survey of college students, this study explained the process and aspects of how Generation Z interacted with information while collaborating on a daily basis. Applying the Radical Change Theory, the study investigated the platforms through which university students engaged in challenges and their information behaviors. University students primarily participated in challenges using platforms such as Instagram and Naver Blog. In terms of changes in information seeking, which is the first type of information seeking in the theory, a wide and diverse range of information behaviors were observed, with the way of searching for information being quite different from when the digital age arrived 10 years ago. Information sources included not only digitalized ones but also traditional sources such as printed materials and personal contacts. The utilization of various media types was prominent, and collaborative efforts were voluntarily undertaken for challenges. In terms of changing perspectives, type 2 of information behavior, the main motivation for acquiring information and securing knowledge led to participation in the challenge. Participants exhibited a sense of community consciousness, including mutual influence awareness, social participation consciousness, and emotional connection.