• Title/Summary/Keyword: official method

Search Result 527, Processing Time 0.027 seconds

Evaluation of Nutritional Status among Primary School Children in Uganda: Comparison of Urban and Rural Areas (우간다 초등학생의 영양섭취 실태조사: 도심지역과 농촌지역의 비교)

  • Lee, Ji-Yeon;Park, Hye-Jung;Yu, Min;Hwang, Ha-Yeong;Sung, Jung-Rim;Kim, Hee-Seon
    • Korean Journal of Community Nutrition
    • /
    • v.25 no.2
    • /
    • pp.91-101
    • /
    • 2020
  • Objectives: The aim of this study was to investigate dietary intakes and nutritional status among Uganda primary school children from two selected schools in urban and rural areas. Methods: Data were collected from 350 pupils (6-14 years) in Mpigi district, Uganda. All participants were offered a school lunch meal (usually maize porridge and boiled beans). Dietary survey was conducted in October 2016. Data for dietary intake levels were collected by the 24-hour recall method with trained school staffs. The data were converted into nutrient intakes using the CAN-Pro 5.0 Program and compared with KDRIs to evaluate the nutritional status of the subjects. Diet quality indexes such as nutrient density, nutrient adequacy ratio (NAR), mean adequacy ratio (MAR), and index of nutritional quality (INQ) and a diet diversity index such as diet diversity score (DDS) were calculated to evaluate nutritional status among subjects. Data were analyzed using SPSS statistical programs. Results: Results show that the intakes of most nutrients were significantly different by schools. The nutritional status of micro-nutrients was very low in both schools according to analysis of nutritional indexes such as NARs and INQs. Students from both schools should improve intakes of micro-nutrients related to child growth such as calcium, Vitamin B6, zinc and folate. According to the analysis of dietary diversity, there was difference in dietary patterns by schools presumably due to their locations. Conclusions: This suggests that current meals could not provide adequate nutrients for the subjects and urgent nutrition interventions for school food services are needed to improve their nutritional well-being. New foods supplements based on local cuisine are also needed to ensure dietary diversity and sustainable development plans.

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

A Study on the Shinmoongo System: Issues of the Origin and Changes of Function and Institution (신문고 제도에 대한 몇 가지 쟁점: 기원과 운영, 기능.제도의 변천을 중심으로)

  • Kim, Young-Ju
    • Korean journal of communication and information
    • /
    • v.39
    • /
    • pp.250-283
    • /
    • 2007
  • The Shinmoongo (Shinmoon-drum) system is known as the last means of petition, appeal, and, denunciation during the Chosun dynasty. The purpose of this study is first to examine the system's origin and changes of its function and operation. The study further looks at several issues around the striking gong system, an alternative appealing method, and its background and transition. Introduced by King Taejong, the Shinmoongo was a kind of the press (or communication) system which was intended to deliver various cases of personal appeal, social petition, national denunciation, etc. Since the 2nd year of King Sejong, the system had been changed into the legal system which mainly to settle personal mortifying problem. Originally, the system was institutionalized for the common people who were hard to appeal their mortifying affairs to the supervisory administration. This reporting system to a superior was utilized as an institutional device to remedy abuses from 'complaint to the King near his sedan chair' and 'direct complaint out of order' during the early disordered years of Chosun dynasty. The system was often abused for the devices of private interest by illustrious officials. Meanwhile, it carried out a role of checking power abuses of provincial governors and magistrates. There were many obstacles for the common people and lowly people to turn to the means. The drum was located at the palace of capitol, less accessible for most people at the time. The petition had to be processed through several steps in written forms. The punishment on a false drummer was heavy. It inhibited any appeal concerning the superior under the rigorous caste system. The Shinmoongo system is regarded as a legitimate press system. Also, it is taken as informal or semi-official press system such as 'document to send around', 'document for agitation', 'joint petition', 'striking gong to complain', 'complaint to the King near his sedan chair', 'scream to complain', etc. Connecting together, the tools resulted in the increase of regal power and decrease of divine authority.

  • PDF

Examination of the Current Situations of Security Dogs and it's Development Plans (경호탐지견의 운용실태 및 발전방안)

  • Park, Hyung-Kyu;Kim, Doo-Hyun
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.215-234
    • /
    • 2007
  • Our country security industry 1960's service expense of the beginning U.S. army unit it accomplishes the growth which is quick with start, currently about 2,500 triumph the security enterprises which it goes over are being active. But the majority in these enterprise about lower cotton can a forever characteristic with pressure and the manpower civil official ability insufficient back of faithlessness management and capital power. To sleep with afterwords it presents the security dogs deployment plan for an efficient security together from the research which it sees hereupon and it does. First, it cultivates the domestic mountain progress dog which is a breed which is suitable with the security dogs and the shovel flesh dog back with the security dogs. Specially the Jindo of the breed which is excellent training which is suitable in task of the security dogs it leads and if it uses appropriately, it industrializes our specific the Jindo and protection there is a possibility of getting the effect which falls to also the gist which it rears rightly. It cultivate the second, security dogs and it magnifies training. The security dogs consequently is it will be able to accomplish the task above 2 branches to training method. Namely, after finishing obedience training, it is to be in security activity it will execute guard or detection back special training which is suitable in task and it will be able to commit. Third, it uses the security dogs which is trained rightly in task. The security dogs the adult escorts, facility expense, the explosive and narcotic drug detection, it will be able to use with the other blind man guidance dogs back. The narcotic drug detection dogs which currently is used specially technique intelligence anger, when considering the tendency of the narcotic drug smuggling offense field which becomes diversification that the role very it is important is a possibility of saying at day. It cultivate a fourth, escort relation specialty manpower and it improves the breed of the security dogs. The hazard which cultivate the security dogs use necessary personnel the breed of security dogs, the security dogs training center it opens the security crane relation subject of the college which stands and (university) it improves it establishes and training which is suitable in task it is to do to execute letting in the training map company. Specially, the hazard which improves the breed of security dogs in the progress mind quality which stands against the portion where the breed improvement is demanded as the portion where the internal organs research and investment are necessary sees. The security dogs compares in labor cost and the expense holds few, if it uses the our specific domestic dogs it will be able to use efficiently in the task which is various it solves the multi branch plans for wisly with the security dogs industrial development security of course contemporary history sliced raw fish sees demands compared to being immediacy and the life which is happy business the place where it does it sees it will be able to contribute a lot as.

  • PDF

A Study on the Experience of Physical Therapy Accident in The Physiotherapist (물리치료사에 있어서 물리치료 사고의 경험에 관한 연구)

  • Kim, Jong-Dae
    • Journal of Korean Physical Therapy Science
    • /
    • v.9 no.1
    • /
    • pp.69-80
    • /
    • 2002
  • The objective of research provides the physical therapy of good quality to the patients to search for the problem pant against a physical therapy accident and it simultaneously respects physical therapy company law, the possibility of preparing a system defensive ability in order to be. The data were collected from 2000 October 1 to December 30th, and analyzed by a frequency and a percentage, oneway ANOVA, Scheffe method, $x^2$ official approvals. Conclusion (1) the accident where the patient falls from inside the treatment 'room is many and occasionally' 29.3% (63 people) with was many most. (2) Because of a mistake by a part-time therapist in holiday or a colleague therapist to do, the fracture or bum accident happens 12.5% (27 people), by a assist nurse due to more showed 12.1% (26 people) experience degree in the patient. (3) From physical therapy process breakdown of the medical treatment machinery and tools or it is in malfunction to do and the experience which has a failure to physical therapy is one enemy 68.1% (147 people) was in item. Also it treats and the patient or in the protector it sends an explanation in advance not to be, the experience which it enforces 50% (108 people), of service hour treatment equipment the medical treatment directives broad way of the doctor is accurate in insufficiency and does not enforce the experience is 45.4% (98 people), the patient whom I am treating Hot Pack (electricity has pack inclusion) with to do, the art dealer (over at 1 buffoonery) the experience which it puts on 27.1% (58 people), The patient whom I am treating is the electrotherapy flag (electricity has pack exclusion) with to do, the art dealer (1 degree art dealer over) the experience which it puts on 16.3% (35 people), the experience boat song the patient against a fracture from physical therapy process 9 person (4.2%) was visible an experience degree. (4) With hospital infection to do, from the patient the experience and the therapist which receive a problem proposal were caused by with hospital infection and the answer back regarding the experience which tries to receive a treatment appeared 6% (13 people), 42% (9 people) with each. (5) It listened to the treatment hour patient or the appeal of the protector and especially it does not appear to be being important it was not and and the management which is special it did not take, also the experience where the condition of the patient is deteriorated after that was 10.3% (22 people). (6) The condition or state of the patient does not agree with the medical treatment instruction of the doctor not to be, amendment one experience was 67.5% (145 people). (7) The experience degree of the physical therapy accident which relates with physical therapy recording and a secret maintenance 59.7% (129 people) 'is many and occasionally it is,' it showed an answer back and e it showed a most high accident experience degree. (8) The business overweight of physical therapy company 43.3% (93 people) with was high most from recognition degree of the physical therapy company against a physical therapy accident. (9) Against the question which asks the responsibility subject matter of physical therapy accident the whole answer back volition 42.8% did it is a joint responsibility where the multi person relates. (10) The accident occurs most the hour unit which plentifully in the afternoon 64.3% (133 people) with appeared from the recognition degree against the frequency hour unit of physical therapy accident. (11) Physical therapy it bought and after the various medical treatment accident which relates against the attitude of the, patient side against the physical therapy company it understood and trillion it was many most with 33.3% to be finished. (12) After physical therapy accident the management against the physical therapy company of the hospital authorities concerned above all do not experience 70.6% (149 people), from event right and wrong submission 22.7% (48 people), warning management 2.8% (6 people), the event report requirement and money compensation were each 0.5% (1 person). (13) As the prevention book of physical therapy accident most it is important, the fact which it thinks that, the persons supplement of physical therapy company 58.8% (127 people) with was high most. (14) It related with a physical therapy accident and the medical law 43.5%, civil law 23.9%, was visible the answer back ratio of the criminal law 13.7% from the degree which probably is a relation law.

  • PDF

Plant Hardiness Zone Mapping Based on a Combined Risk Analysis Using Dormancy Depth Index and Low Temperature Extremes - A Case Study with "Campbell Early" Grapevine - (최저기온과 휴면심도 기반의 동해위험도를 활용한 'Campbell Early' 포도의 내동성 지도 제작)

  • Chung, U-Ran;Kim, Soo-Ock;Yun, Jin-I.
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.10 no.4
    • /
    • pp.121-131
    • /
    • 2008
  • This study was conducted to delineate temporal and spatial patterns of potential risk of cold injury by combining the short-term cold hardiness of Campbell Early grapevine and the IPCC projected climate winter season minimum temperature at a landscape scale. Gridded data sets of daily maximum and minimum temperature with a 270m cell spacing ("High Definition Digital Temperature Map", HD-DTM) were prepared for the current climatological normal year (1971-2000) based on observations at the 56 Korea Meteorological Administration (KMA) stations using a geospatial interpolation scheme for correcting land surface effects (e.g., land use, topography, and elevation). The same procedure was applied to the official temperature projection dataset covering South Korea (under the auspices of the IPCC-SRES A2 and A1B scenarios) for 2071-2100. The dormancy depth model was run with the gridded datasets to estimate the geographical pattern of any changes in the short-term cold hardiness of Campbell Early across South Korea for the current and future normal years (1971-2000 and 2071-2100). We combined this result with the projected mean annual minimum temperature for each period to obtain the potential risk of cold injury. Results showed that both the land areas with the normal cold-hardiness (-150 and below for dormancy depth) and those with the sub-threshold temperature for freezing damage ($-15^{\circ}C$ and below) will decrease in 2071-2100, reducing the freezing risk. Although more land area will encounter less risk in the future, the land area with higher risk (>70%) will expand from 14% at the current normal year to 23 (A1B) ${\sim}5%$ (A2) in the future. Our method can be applied to other deciduous fruit trees for delineating geographical shift of cold-hardiness zone under the projected climate change in the future, thereby providing valuable information for adaptation strategy in fruit industry.

An Integrated Model based on Genetic Algorithms for Implementing Cost-Effective Intelligent Intrusion Detection Systems (비용효율적 지능형 침입탐지시스템 구현을 위한 유전자 알고리즘 기반 통합 모형)

  • Lee, Hyeon-Uk;Kim, Ji-Hun;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2012
  • These days, the malicious attacks and hacks on the networked systems are dramatically increasing, and the patterns of them are changing rapidly. Consequently, it becomes more important to appropriately handle these malicious attacks and hacks, and there exist sufficient interests and demand in effective network security systems just like intrusion detection systems. Intrusion detection systems are the network security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. Conventional intrusion detection systems have generally been designed using the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. However, they cannot handle new or unknown patterns of the network attacks, although they perform very well under the normal situation. As a result, recent studies on intrusion detection systems use artificial intelligence techniques, which can proactively respond to the unknown threats. For a long time, researchers have adopted and tested various kinds of artificial intelligence techniques such as artificial neural networks, decision trees, and support vector machines to detect intrusions on the network. However, most of them have just applied these techniques singularly, even though combining the techniques may lead to better detection. With this reason, we propose a new integrated model for intrusion detection. Our model is designed to combine prediction results of four different binary classification models-logistic regression (LOGIT), decision trees (DT), artificial neural networks (ANN), and support vector machines (SVM), which may be complementary to each other. As a tool for finding optimal combining weights, genetic algorithms (GA) are used. Our proposed model is designed to be built in two steps. At the first step, the optimal integration model whose prediction error (i.e. erroneous classification rate) is the least is generated. After that, in the second step, it explores the optimal classification threshold for determining intrusions, which minimizes the total misclassification cost. To calculate the total misclassification cost of intrusion detection system, we need to understand its asymmetric error cost scheme. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, total misclassification cost is more affected by FNE rather than FPE. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 10,000 samples from them by using random sampling method. Also, we compared the results from our model with the results from single techniques to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell R4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on GA outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that the proposed model outperformed all the other comparative models in the total misclassification cost perspective. Consequently, it is expected that our study may contribute to build cost-effective intelligent intrusion detection systems.

A Study on the Costumes of Meritorious Vassals' Portraits in the reign of King Seonjo (선조대(宣祖代) 공신초상(功臣肖像)의 복식 고찰)

  • Lee, Eun-joo;Kim, Mi-gyung
    • Korean Journal of Heritage: History & Science
    • /
    • v.52 no.1
    • /
    • pp.120-147
    • /
    • 2019
  • In this study, we divided the portraits in the reign of King Seonjo into those which were created before and after the Japanese invasion. We then examined various aspect of costumes expressed in the portraits of meritorious vassals. To analyze official uniforms (Heuk-Danryeung), we examined the Samo height; the side wings' type and pattern; the Danryeung pattern; the Mu style; the processing method of lateral lines in Danryeung the rank badge and rank belt, the color of Dabho and Cheolrik, which were undergarment of Danryeung and Heuk-wa. The meritorious vassals' portraits, prior to Imran, were analyzed with a portrait of Han Eung-in, a Gwang-kuk Pyeong-nan meritorious vassals. The Samo was the highest of the Choson dynasties, and the cloud and treasure pattern was identified on the side wings. The Heuk-Danryeung was a dark blue(acheongsaeg) Danryeung of manja-shaped cloud patterns with a large outward wrinkled Mu, and it had a wild goose badge (second rank) and a Sabgeumdae. It did not coincide with the Pumgye(Jaheondaebu) recorded in Gugjo-inmulgo. Reddish Dabho for Dangsang-kwan, green Cheolrik which was undergarment of Danryeung, and Heuk-wa. were identified. After the invasion of Japan, portraits of Hoseong, Seonmu, and Cheong-nan meritorious vassals were analyzed through eighteen portraits, including Lee Hyeon-bok. After the invasion of the Japanese, the height of the Samo's top was much lower and the width of the side wings was wider than before the invasion of Japanese. The Heuk-Danryeung was a dark blue (acheongsaeg) Danryeung of manja-shaped cloud patterns with a stretching backward Mu. Rank badge and rank belts were almost identical with the record, but there were two exceptions (Sin-jab and Kim, Sae-sin). Therefore, it was reaffirmed that the meritorious vassals' portraits were drawn by the Pumgye at the time of appointment. Among the undergarments of Heuk-Danryeung, green Dabho(11), blue Dabho(4), reddish Dabho(3), and blue Cheolrik(10), green Cheolrik(6), reddish Cheolrik(1), and yucheongsaeg Cheolrik(1) were identified, However, it is suggested that the Dabho of Hoseong, Seonmu, and Cheong-nan meritorious vassals should be the reddish Dabho of Dangsang-kwan, which is the same as the previous Imran, and a green Cheolrik.

A study on the management of drawings of Metropolitan Rapid Transit (도시철도 도면 관리에 관한 연구 -서울시 도시철도공사를 중심으로-)

  • Kim, Miyon
    • The Korean Journal of Archival Studies
    • /
    • no.11
    • /
    • pp.181-214
    • /
    • 2005
  • Metropolitan rapid transit system plays an essential role in the public transportation system of any large city, and its managing agency is usually charged with the responsibility of storing and managing the design drawings of the system. The drawings are important and historically valuable documents that must be kept permanently because they contain comprehensive data that is used to manage and maintain the system. However, no study has been performed in Korea on how well agencies are preserving and managing these records. Seoul Metropolitan Rapid Transit Corporation(SMRT) is the managing agency established by the city of Seoul to operate subway lines 5, 6, 7, and 8 more efficiently to serve its citizens. By the Act on Records Management in Public Institutions(ARMPI), SMRT should establish a records center to manage its records. Furthermore, all drawings produced by SMRT and other third party entities should be in compliance with the Act. However, SMRT, as a form of local public corporation, can establish a records center by its own way. Accordingly, the National Archives & Records Service(NARS) has very little control over SMRT. Therefore, the purpose of this study is to research and analyze the present state of storage and management of the drawings of metropolitan rapid transit in SMRT and is to find a desirable method of preservation and management for drawings of metropolitan rapid transit. In the process of the study, it was found that a records center is being considered to manage only general official documents and not to manage the drawings as required by ARMPI. SMRT does not have a records center, and the environment of management on the drawings is very poor. Although there is a plan to develop a new management system for the drawings, it will be non-compliant of ARMPI. What's happening at SMRT does not reflect the state of all other cities' metropolitan rapid transit records management systems, but the state of creation of records center of local public corporation is the almost same state as SMRT. There should be continuous education and many studies conducted in order to manage the drawings of metropolitan rapid transit efficiently by records management system. This study proposes a records center based on both professional records centers and union records centers. Although metropolitan rapid transit is constructed and managed by each local public corporation, the overall characteristics and processes of metropolitan rapid transit projects are similar in nature. In consideration of huge quantity, complexity and specialty of drawings produced and used during construction and operation of metropolitan rapid transit, and overlap of each local public corporation's effort and cost of the storage and management of the drawings, they need to be managed in a professional and united way. As an example of professional records center, there is the National Personnel Records Center(NPRC) in St. Louis, Missouri. NPRC is one of the National Archives and Records Administration's largest operations and a central repository of personnel-related records on former and present federal employees and the military. It provides extensive information to government agencies, military veterans, former federal employees, family members, as well as researchers and historians. As an example of union records center, there is the Chinese Union Dangansil. It was established by several institutions and organizations, so united management of records can be performed and human efforts and facilities can be saved. We should establish a professional and united records center which manages drawings of metropolitan rapid transit and provides service to researchers and the public as well as members of the related institutions. This study can be an impetus to improve interest on management of not only drawings of metropolitan rapid transit but also drawings of various public facilities.

The Study on 'characters made by Empress Wu Zetian' through The Avatamsaka-Sutra in ink on the white paper of the Shilla Period (신라(新羅) 백지묵서(白紙墨書) 화엄경(華嚴經)과 칙천무후자(則天武后字) 고찰(考察))

  • Park, Sang-Kuk
    • Korean Journal of Heritage: History & Science
    • /
    • v.37
    • /
    • pp.445-469
    • /
    • 2004
  • The Avatamsaka Sutra copied in ink on the white paper of Shilla Period is the oldest manuscript in korea. This Avatamsaka Sutra is volume 1-10 and 44-50 of the 80 volume's transcription. According to the postscript, written with 528 letters at the end of the volume 10 and 50, this sutra is made during A.D. 754-755, for six months by the order Master Yon-gi(綠起 法師) who founded Hwaumsa Temple(華嚴寺.) It explains the procedure of the ritual and production method of the sutra-copying, and also shows the 19 participants with their name, address, official title, and etc. When the sutra was founded, volume 1-10 were so congealed that we could not open the volumes. And volume 44-50 was prohibited to take photograph for preservation. According to the recent examination, it proved that this sutra is the treasure for the study of the characters made by Empress Wu Zetian(則天武后.) The characters made by Empress Wu Zetian(A.D. 625-705) are new shape of chinese characters which is different from the traditional characters. After the demise of the Queen, the characters were not used any more officially, but privately some people used the characters for personal tastes and interest. The characters in the sutra includes 512 characters of 13 kinds of Empress We Zetians'. Compared to the Tun-huang version of the sutra, this is far better treasure for the study of Empress We Zetians' characters in terms of the number of the character and the their use of frequency. The Avatamsaka Sutra of Shoso-in(正倉院) in japan copied in A.D. 768 does not use the Empress We Zetians' characters. In this respect, this Shilla Avatamsaka-Sutra is a unique one preserves the original forms of Chinese translation at that time.