• Title/Summary/Keyword: Web Tools

Search Result 700, Processing Time 0.024 seconds

Korean Medicine for Carpal Tunnel Syndrome: a Systematic Review of Literature Published in Korea (수근관 증후군의 한의학적 치료에 대한 논문 고찰 -국내 학술지를 중심으로-)

  • Lee, Jong Ho
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.29 no.1
    • /
    • pp.79-84
    • /
    • 2015
  • The aim of this review is to investigate studies of Korean medical treatment of carpal tunnel syndrome published in Korea and the evidence of it's effects in order to suggest a better research method in the future. Four Korean web databases were searched by using key words such as 'carpal', and checked relevant Korean journals. The papers were classified into the field of study, publish date, diagnostic methods, evaluation methods and analysed the study tendency. There are 9 case studies, 4 controlled studies. The paper was published almost every year more than once. Acupucture, pharmacopuncture, acupotomy, warm needle acupuncture, taping, etc. were used as treatment tools. The two most commonly used diagnostic method for carpal tunnel syndrome are Phalen's test and Tinel's sign. The two most commonly used evaluation method are VAS(Visual Analog Scale) and subjective symptoms. Korean medical treatment of carpal tunnel syndrome was effective in all studies. Korean medical treatment of carpal tunnel syndrome was effective in all studies. So it is possible that Korean medical treatment of carpal tunnel syndrome is useful as therapeutic medicine, but there are not sufficient evidence based papers, so there should be further studies.

Research on Key Success Factors of Social Authoring system : Focused on Linux and Wikipedia (리눅스와 위키피디아를 중심으로 분석한 소셜 저작 시스템의 성공요소에 대한 연구)

  • Lee, Seo-Young;Lee, Bong-Gyou
    • Journal of Internet Computing and Services
    • /
    • v.13 no.4
    • /
    • pp.73-82
    • /
    • 2012
  • The worldwide increase of cognitive surplus leads to successful social authoring projects. In this research, social authoring mechanisms used in Linux and Wikipedia projects were analyzed to identify the key success factors. In addition, tools used in the recent successful social media such as Facebook and Ushahidi were evaluated to extract components which may be applied in social authoring systems. Based on these analyses, the improvement factors in the design of social authoring projects were suggested. The social authoring projects are expected to be more successfully achieved by providing the core components proposed in this article.

Deduplication and Exploitability Determination of UAF Vulnerability Samples by Fast Clustering

  • Peng, Jianshan;Zhang, Mi;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4933-4956
    • /
    • 2016
  • Use-After-Free (UAF) is a common lethal form of software vulnerability. By using tools such as Web Browser Fuzzing, a large amount of samples containing UAF vulnerabilities can be generated. To evaluate the threat level of vulnerability or to patch the vulnerabilities, automatic deduplication and exploitability determination should be carried out for these samples. There are some problems existing in current methods, including inadequate pertinence, lack of depth and precision of analysis, high time cost, and low accuracy. In this paper, in terms of key dangling pointer and crash context, we analyze four properties of similar samples of UAF vulnerability, explore the method of extracting and calculate clustering eigenvalues from these samples, perform clustering by fast search and find of density peaks on a large number of vulnerability samples. Samples were divided into different UAF vulnerability categories according to the clustering results, and the exploitability of these UAF vulnerabilities was determined by observing the shape of class cluster. Experimental results showed that the approach was applicable to the deduplication and exploitability determination of a large amount of UAF vulnerability samples, with high accuracy and low performance cost.

Design and Implementation of Multiplex Certification System Using XML Signature For WBI (WBI에서 XML 전자 서명을 이용한 다중 인증 시스템 설계 및 구현)

  • Won, Eom-Ki;Kim, Jung-Jae;Jun, Moon-Seuck
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.3
    • /
    • pp.457-464
    • /
    • 2005
  • Internet becomes absolutely necessary tools due to rapid progress of information technology. Educational correspondence abount an age of information demand is a education focused on a learner and remote education based on information technology. Internal and external standardization working is accelerated and recently XML security studies are activated using XML which is next generation web standard document format. But using these are main contents that users have to pay about Certification service to get CA certificate from 2004 me. This paper propose multiplex Certification remote education agent system using XML digital signature to satisfy security requirement.

  • PDF

A design and implement of web standard e-book content authoring tools platform based on 3D interaction (3차원 상호작용기반 웹 표준 e-book 콘텐츠 저작도구 플랫폼 설계 및 구현)

  • Kim, Tae-Kyeom;Jang, Hyeon-Joong;Hong, Seong-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.985-988
    • /
    • 2015
  • 최근 다양한 ICT기술의 발전으로 인간의 사회, 문화, 교육 등의 많은 분야에 변화가 일어나고 있으며, 많은 기술들이 인간 삶의 영역에 적지 않은 영향을 미치고 있다. 그 중에서도 인터넷 웹 표준 기술의 발전은 e-book 시장과 교육용 콘텐츠의 변화가 많을 것으로 예측하고 있다. 따라서 본 논문에서는 N-Screen 지원과 반응형 웹 기술 지원을 위한 3차원 상호작용기반의 e-book 콘텐츠 저작도구 플랫폼 설계를 연구하였으며, 6가지 영역의 상호작용 콘텐츠 개발이 웹 표준에 의해 저작될 수 있는 저작도구 모형을 연구 개발 하였다. 본 논문에서 제안한 e-book의 저작 형태는 웹 표준 기술 HTML5와 ePub3.0 표준을 기반으로 제작할 수 있도록 콘텐츠 플랫폼을 설계 하였으며, 사용자와의 상호작용, 시뮬레이션 등의 기능을 쉽고 빠르게 제작할 수 있는 사용자 인터페이스를 연구 적용하였다. 향후 본 연구의 결과로 전자책 산업 발전과 교육 분야의 활용 향상을 기대하고 있으며, 지식의 체계를 좀 더 다양하게 제공 할 수 있는 e-book 콘텐츠 연구의 원천이 되기를 기대한다.

Secure Coding guide support tools design for SW individual developers (SW 개인 개발자를 위한 Secure_Coding 가이드 지원 도구 설계)

  • Son, Seung-wan;Kim, Kwang-seok;Choi, Jeong-won;Lee, Gang-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.595-598
    • /
    • 2014
  • The cyber attacks of recent attacks that target zero-day exploit security vulnerabilities before the security patch is released (Zero Day) attack, the web site is without the Lord. These attacks, those that use the vulnerability of security that is built into the software itself is in most cases, cyber attacks that use the vulnerability of the security of the source code, in particular, has a characteristic response that are difficult to security equipment. Therefore, it is necessary to eliminate the security vulnerability from step to implement the software to prevent these attacks. In this paper, we try to design a Secure Coding Guide support tool to eliminate the threat of security from the stage of implementation.

  • PDF

STADIUM: Species-Specific tRNA Adaptive Index Compendium

  • Yoon, Jonghwan;Chung, Yeun-Jun;Lee, Minho
    • Genomics & Informatics
    • /
    • v.16 no.4
    • /
    • pp.28.1-28.6
    • /
    • 2018
  • Due to the increasing interest in synonymous codons, several codon bias-related terms were introduced. As one measure of them, the tRNA adaptation index (tAI) was invented about a decade ago. The tAI is a measure of translational efficiency for a gene and is calculated based on the abundance of intracellular tRNA and the binding strength between a codon and a tRNA. The index has been widely used in various fields of molecular evolution, genetics, and pharmacology. Afterwards, an improved version of the index, named specific tRNA adaptation index (stAI), was developed by adapting tRNA copy numbers in species. Although a subsequently developed webserver (stAIcalc) provided tools that calculated stAI values, it was not available to access pre-calculated values. In addition to about 100 species in stAIcalc, we calculated stAI values for whole coding sequences in 148 species. To enable easy access to this index, we constructed a novel web database, named STADIUM (Species-specific tRNA adaptive index compendium). STADIUM provides not only the stAI value of each gene but also statistics based on pathway-based classification. The database is expected to help researchers who have interests in codon optimality and the role of synonymous codons. STADIUM is freely available at http://stadium.pmrc.re.kr.

Effect of Sports Psychology on Enhancing Consumer Purchase Intention for Retailers of Sports Shops: Literature Content Analysis

  • LEE, Jae-Hyung
    • Journal of Distribution Science
    • /
    • v.19 no.4
    • /
    • pp.5-13
    • /
    • 2021
  • Purpose: The sporting field is one of the most lucrative industries that most producers would want to share and drive-in sales towards its direction. The purpose of the present study is to evaluate how sports psychology has become a useful discipline in enhancing consumer purchase intentions. Research design, data, and methodology: This study employs a qualitative coding method to analyze and interpret the data obtained with a PRISMA declaration for analytical purposes. Using Web QDA (Qualitative Data Analysis) online tools, the current study coded the data obtained. Results: According to the prior studies, marketers should go the extra mile of looking for what sports customers are looking for. They understand that one way to increase the customers' willingness to purchase their products is by looking into the specific things that the customers look for and enjoy in sports. Conclusions: After all, the present study concludes that most marketers need to apply the concepts of sports psychology to understand consumer purchase intentions in particular retail stores. Consumers are likely to be influenced by their peers or groups to make decisions driven towards purchasing given sports apparel and the retail store to purchase a product.

A Study on Crime Prediction to Reduce Crime Rate Based on Artificial Intelligence

  • KIM, Kyoung-Sook;JEONG, Yeong-Hoon
    • Korean Journal of Artificial Intelligence
    • /
    • v.9 no.1
    • /
    • pp.15-20
    • /
    • 2021
  • This paper was conducted to prevent and respond to crimes by predicting crimes based on artificial intelligence. While the quality of life is improving with the recent development of science and technology, various problems such as poverty, unemployment, and crime occur. Among them, in the case of crime problems, the importance of crime prediction increases as they become more intelligent, advanced, and diversified. For all crimes, it is more critical to predict and prevent crimes in advance than to deal with them well after they occur. Therefore, in this paper, we predicted crime types and crime tools using the Multiclass Logistic Regression algorithm and Multiclass Neural Network algorithm of machine learning. Multiclass Logistic Regression algorithm showed higher accuracy, precision, and recall for analysis and prediction than Multiclass Neural Network algorithm. Through these analysis results, it is expected to contribute to a more pleasant and safe life by implementing a crime prediction system that predicts and prevents various crimes. Through further research, this researcher plans to create a model that predicts the probability of a criminal committing a crime again according to the type of offense and deploy it to a web service.

Food Security through Smart Agriculture and the Internet of Things

  • Alotaibi, Sara Jeza
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.33-42
    • /
    • 2022
  • One of the most pressing socioeconomic problems confronting humanity on a worldwide scale is food security, particularly in light of the expanding population and declining land productivity. These causes have increased the number of people in the world who are at risk of starving and have caused the natural ecosystems to degrade at previously unheard-of speeds. Happily, the Internet of Things (IoT) development provides a glimmer of light for those worried about food security through smart agriculture-a development that is particularly relevant to automating food production operations in order to reduce labor expenses. When compared to conventional farming techniques, smart agriculture has the benefit of maximizing resource use through precise chemical input application and regulation of environmental factors like temperature and humidity. Farmers may make data-driven choices about the possibility of insect invasion, natural disasters, anticipated yields, and even prospective market shifts with the use of smart farming tools. The technical foundation of smart agriculture serves as a potential response to worries about food security. It is made up of wireless sensor networks and integrated cloud computing modules inside IoT.