• Title/Summary/Keyword: public-key BE

Search Result 1,160, Processing Time 0.027 seconds

Psychosomatic Integrative Care for Psychosocial Distress of Patients With Breast Cancer (유방암 환자의 정신사회적 디스트레스에 대한 정신신체의학적 통합치료)

  • Yang, Chan-Mo;Jang, Seung-Ho;Lee, Hye-Jin;Lee, Sang-Yeol
    • Korean Journal of Psychosomatic Medicine
    • /
    • v.29 no.2
    • /
    • pp.77-85
    • /
    • 2021
  • Breast cancer is the most prevalent oncological disease among women. Various psychosocial distress is common at the diagnosis, treatment, and posttreatment phase of breast cancer. For the treatment of breast cancer, not only medical treatment but also psychosomatic integrative care will be needed. Patients with breast cancer may lead to increased vulnerability to stress, adjustment disorder, anxiety disorder, and depressive disorder, and these psychiatric diseases and conditions are associated with recurrence or exacerbation of breast cancer. Psychosocial treatment of anxiety and depression could increase the quality of life of patients and decrease the recurrence and progression of breast cancer. In this article, we reviewed 5 clinical breast cancer survivorship guidelines focused on psychosomatic integrative care including psychosocial treatment and alternative treatment for psychosocial distress. Because 5 treatment guidelines were using various definitions of evidence, we confirmed evidence of various psychosocial treatments for patients with breast cancer based on the definition of evidence by the US Preventive Service Task Force (USPSTF) guideline. We also reviewed the effect size of psychosocial treatment for anxiety, depression, mood, and quality of life in patients with breast cancer. This article discusses the barrier to the delivery of psychosomatic integrative care and suggests integrative care planning for breast cancer. Multi-disciplinary teams, patient's needs assessment, information technology support, patient and caregiver engagement, planned periodic monitoring of psychosocial distress by a psychosomatic specialist or consultation-liaison psychiatrist are recommended as key features of a psychosomatic integrated care plan.

CCTV and Privacy - Tools for Security or Eyes of Surveillance? - (CCTV와 프라이버시 - 안전을 위한 도구인가, 감시의 눈인가? -)

  • Lee, Yun-bok
    • Journal of Korean Philosophical Society
    • /
    • v.143
    • /
    • pp.215-244
    • /
    • 2017
  • It is said that we live in an age of technology. And indeed, science and technology do play key roles to our life of happiness, but they are equally central in all events that threaten it. Science and technology are the means we often turn to in seeking solutions to our problems, and in turn are often the apparent sources of new problems. Thus it is not surprising that they have two aspects at the same time. CCTV has been presented to us as a technical solution to security problems. With the help of CCTV, we can more effectively prevent, detect, and prosecute crimes. With the help of CCTV, both public and private spaces can be made more secure. But of course, CCTV also has a down side. The down side most prominently anticipated has been loss of privacy and proliferation of surveillance. It is largely this potential problem with CCTV that has been regulated against. It is said that one reason for imposing a limitation on individual privacy is the societal interest in the prevention of crime. Accordingly a balance between the need to prevent crime through the use of CCTV and the duty to respect the privacy interests of individual citizens is in need of redress. In other hand, two theories of socio-political philosophy may have provided useful ways of understanding the role of CCTV in contemporary society. Firstly, neo-Marxist frameworks, for instance, stress the use of CCTV to police existing unequal socioeconomic divisions within society and the dominance of particular forms of order based upon materialist agendas. Secondly, Foucauldian frameworks contend that Foucault's notion of panoptic surveillance underpinning (self) disciplinary society is an appropriate template for understanding CCTV in late-modern society. In order to find a new point of valance between security and privacy in the use of CCTV, the participation of each citizen in the discourse to make the new norm is necessary. And to prevent its political misuse, their surveillance, or check for the potential surveillance-power is required.

Implementation of the Large-scale Data Signature System Using Hash Tree Replication Approach (해시 트리 기반의 대규모 데이터 서명 시스템 구현)

  • Park, Seung Kyu
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.19-31
    • /
    • 2018
  • As the ICT technologies advance, the unprecedently large amount of digital data is created, transferred, stored, and utilized in every industry. With the data scale extension and the applying technologies advancement, the new services emerging from the use of large scale data make our living more convenient and useful. But the cybercrimes such as data forgery and/or change of data generation time are also increasing. For the data security against the cybercrimes, the technology for data integrity and the time verification are necessary. Today, public key based signature technology is the most commonly used. But a lot of costly system resources and the additional infra to manage the certificates and keys for using it make it impractical to use in the large-scale data environment. In this research, a new and far less system resources consuming signature technology for large scale data, based on the Hash Function and Merkle tree, is introduced. An improved method for processing the distributed hash trees is also suggested to mitigate the disruptions by server failures. The prototype system was implemented, and its performance was evaluated. The results show that the technology can be effectively used in a variety of areas like cloud computing, IoT, big data, fin-tech, etc., which produce a large-scale data.

  • PDF

Design and Implementation of Blockchain Network Based on Domain Name System (블록체인 네트워크 기반의 도메인 네임 시스템 설계 및 구현)

  • Heo, Jae-Wook;Kim, Jeong-Ho;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.36-46
    • /
    • 2019
  • The number of hosts connected to the Internet has increased dramatically, introducing the Domain Name System(DNS) in 1984. DNS is now an important key point for all users of the Internet by allowing them to use a convenient character address without memorizing a series of numbers of complex IP address. However, relative to the importance of DNS, there still exist many problems such as the authorization allocation issue, the disputes over public registration, security vulnerability such as DNS cache poisoning, DNS spoofing, man-in-the-middle attack, DNS amplification attack, and the need for many domain names in the age of hyper-connected networks. In this paper, to effectively improve these problems of existing DNS, we proposed a method of implementing DNS using distributed ledger technology, blockchain, and implemented using a Ethereum-based platform. In addition, the qualitative analysis performance comparative evaluation of the existing domain name registration and domain name server was conducted, and conducted security assessments on the proposed system to improve security problem of existing DNS. In conclusion, it was shown that DNS services could be provided high security and high efficiently using blockchain.

A Study on Tradition Discourse in Korean Modern Drama between 1894 and 1910 (근대계몽기 한국연극사의 전통담론 연구 II)

  • Paek, Hyun-Mi
    • (The) Research of the performance art and culture
    • /
    • no.18
    • /
    • pp.347-377
    • /
    • 2009
  • This paper examines the tradition discourses in Korean modern drama of the late 19th and the early 20th. It focuses particularly on how key intellectuals differentiated the definition and interpreted 'Theater-Improvement' while they insisted on improving traditional performance. Tradition discourse focused on how to improve its contents of performances. There were three categories in discussion. First, Confucian intelligent insisted that traditional performance should be discarded, because it led to customs disorder among the public. Second, patriotic and progressive intellectuals led by Sin Chae-Ho(신채호) and Bak Yen-Sik(박은식), preferred the reformed content of traditional Korean performance dealing with historical heroes. in order to stimulate patriotism in the Korean. Third, Lee In-Jik(이인직) who had worked at a popular newspaper company in Japan tried to make 'New Theater' criticizing decayed officials and the stupid nation. He did not concern about the colonialism of Japan. In the late 19th and the early 20th in Korean modern drama history, tradition discourses faced different directions, dependent on their political positions, familiar foreign cultures, and their view on traditional cultures.

Study on Mobile OTP(One Time Password) Mechanism based PKI for Preventing Phishing Attacks and Improving Availability (피싱 방지 및 가용성 개선을 위한 PKI기반의 모바일 OTP(One Time Password) 메커니즘에 관한 연구)

  • Kim, Tha-Hyung;Lee, Jun-Ho;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.15-26
    • /
    • 2011
  • The development of IT technology and information communication networks activated to online financial transactions; the users were able to get a variety of financial services. However, unlike the positive effect that occurred on 7 July 2009 DDoS(Distribute Denial of Service) attacks, such as damaging to the user, which was caused negative effects. Authentication technology(OTP) is used to online financial transaction, which should be reviewed to safety with various points because the unpredictable attacks can bypass the authentication procedure such as phishing sites, which is occurred. Thus, this paper proposes mobile OTP(One Time Password) Mechanism, which is based on PKI to improve the safety of OTP authentication. The proposed Mechanism is operated based on PKI; the secret is transmitted safely through signatures and public key encryption of the user and the authentication server. The users do not input in the web site, but the generated OTP is directly transmitted to the authentication server. Therefore, it is improvement of the availability of the user and the resolved problem is exposed from the citibank phishing site(USA) in 2006.

An Analysis of the Concretizing Process of the Free Semester Policy : Focusing on the Policy Objectives (자유학기제 정책의 구체화 과정 분석 : 정책 목표를 중심으로)

  • Yang, Heejoon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.12
    • /
    • pp.441-453
    • /
    • 2020
  • This study looked at the concretizing process of the Free Semester Policy(as is the FSP). The concretizing process of policy refers to the process in which the major components of policy idea are changing through the agenda setting and policy decision process. To this end, we collected major policy documents related to the FSP from the pledge of the presidential candidate to the implementation plan of the FSP and the oral data of key personnel of the FSP, and analyzed the concretizing process of the policy focusing on the policy objectives. As a result, it was found that the policy objectives of the FSP were presented in a more comprehensive and ambiguous form through the agenda setting and policy decision process. The emphasized direction of policy has also changed over and over. This phenomenon offers several implications for understanding education policy. First, it should be understood that the objectives of education policy presented at a specific point in time are provisional. Second, the change in policy objectives may have occurred in the process of securing the legitimacy of policy promotion. Third, it is necessary to pay more attention to the relationship between policy and politics. In order to properly promote an education policy based on the common sense and needs of the public, a mature education policy discussion culture is required.

Development of Performance Indicators on Private Building Construction Sites using Supervisory Report (감리데이터 기반의 민간 건축현장 성과지표 개발)

  • Sung, Yookyung;Hur, Youn Kyoung;Lee, Seung Woo;Yoo, Wi Sung
    • Korean Journal of Construction Engineering and Management
    • /
    • v.23 no.6
    • /
    • pp.65-75
    • /
    • 2022
  • As performance measurement is important for systematic management, the key indicators for performance measurement have been consistently researched in the construction industry. However, there are only a few cases in which performance measurement is performed because it requires strenuous efforts to collect data for measurement. Unlike the public sector, which has been collecting project data through laws, the private sector has very little data to measure performance. In contrast, supervision work concerns important data necessary for the performance management on building construction sites in accordance with the Building Act. Therefore, in this study, we used the data from supervisory reports to measure the performance of private building projects. First, we derived 6 performance areas and 15 indicators through a few rounds of expert group discussions and 2 surveys. Then, we identified the performance indicators with high feasibility of data collection and computed their degree of significance via the analytic hierarchy process. It is expected that the performance indicators and their computational processes derived in this study can be used to systematically measure the performance and aid the speedy diagnosis of private building construction sites.

A Comparative Study on the Social Awareness of Metaverse in Korea and China: Using Big Data Analysis (한국과 중국의 메타버스에 관한 사회적 인식의 비교연구: 빅데이터 분석의 활용 )

  • Ki-youn Kim
    • Journal of Internet Computing and Services
    • /
    • v.24 no.1
    • /
    • pp.71-86
    • /
    • 2023
  • The purpose of this exploratory study is to compare the differences in public perceptual characteristics of Korean and Chinese societies regarding the metaverse using big data analysis. Due to the environmental impact of the COVID-19 pandemic, technological progress, and the expansion of new consumer bases such as generation Z and Alpha, the world's interest in the metaverse is drawing attention, and related academic studies have been also in full swing from 2021. In particular, Korea and China have emerged as major leading countries in the metaverse industry. It is a timely research question to discover the difference in social awareness using big data accumulated in both countries at a time when the amount of mentions on the metaverse has skyrocketed. The analysis technique identifies the importance of key words by analyzing word frequency, N-gram, and TF-IDF of clean data through text mining analysis, and analyzes the density and centrality of semantic networks to determine the strength of connection between words and their semantic relevance. Python 3.9 Anaconda data science platform 3 and Textom 6 versions were used, and UCINET 6.759 analysis and visualization were performed for semantic network analysis and structural CONCOR analysis. As a result, four blocks, each of which are similar word groups, were driven. These blocks represent different perspectives that reflect the types of social perceptions of the metaverse in both countries. Studies on the metaverse are increasing, but studies on comparative research approaches between countries from a cross-cultural aspect have not yet been conducted. At this point, as a preceding study, this study will be able to provide theoretical grounds and meaningful insights to future studies.

Melatonin Attenuates Mitochondrial Damage in Aristolochic Acid-Induced Acute Kidney Injury

  • Jian Sun;Jinjin Pan;Qinlong Liu;Jizhong Cheng;Qing Tang;Yuke Ji;Ke Cheng;Rui wang;Liang Liu;Dingyou Wang;Na Wu;Xu Zheng;Junxia Li;Xueyan Zhang;Zhilong Zhu;Yanchun Ding;Feng Zheng;Jia Li;Ying Zhang;Yuhui Yuan
    • Biomolecules & Therapeutics
    • /
    • v.31 no.1
    • /
    • pp.97-107
    • /
    • 2023
  • Aristolochic acid (AA), extracted from Aristolochiaceae plants, plays an essential role in traditional herbal medicines and is used for different diseases. However, AA has been found to be nephrotoxic and is known to cause aristolochic acid nephropathy (AAN). AA-induced acute kidney injury (AKI) is a syndrome in AAN with a high morbidity that manifests mitochondrial damage as a key part of its pathological progression. Melatonin primarily serves as a mitochondria-targeted antioxidant. However, its mitochondrial protective role in AA-induced AKI is barely reported. In this study, mice were administrated 2.5 mg/kg AA to induce AKI. Melatonin reduced the increase in Upro and Scr and attenuated the necrosis and atrophy of renal proximal tubules in mice exposed to AA. Melatonin suppressed ROS generation, MDA levels and iNOS expression and increased SOD activities in vivo and in vitro. Intriguingly, the in vivo study revealed that melatonin decreased mitochondrial fragmentation in renal proximal tubular cells and increased ATP levels in kidney tissues in response to AA. In vitro, melatonin restored the mitochondrial membrane potential (MMP) in NRK-52E and HK-2 cells and led to an elevation in ATP levels. Confocal immunofluorescence data showed that puncta containing Mito-tracker and GFP-LC3A/B were reduced, thereby impeding the mitophagy of tubular epithelial cells. Furthermore, melatonin decreased LC3A/B-II expression and increased p62 expression. The apoptosis of tubular epithelial cells induced by AA was decreased. Therefore, our findings revealed that melatonin could prevent AA-induced AKI by attenuating mitochondrial damage, which may provide a potential therapeutic method for renal AA toxicity.