• Title/Summary/Keyword: publisher

Search Result 172, Processing Time 0.022 seconds

A Study on the Editions and Composition of Uigamjungma ("의감중마(醫鑑重磨)"의 판본 및 구성에 대한 연구)

  • Kwon, Oh-Min;Park, Sang-Young;Han, Chan-Hyun;Ahn, Samuel;Kim, Jin-Hee;Ahn, Sang-Woo
    • Korean Journal of Oriental Medicine
    • /
    • v.16 no.1
    • /
    • pp.1-9
    • /
    • 2010
  • Lee Gyujun put forward Buyang as core medical tenet, which has been one of the prominent medical theories since around the first decade in the 20th century. He wrote two major medical books except for small kinds: Somundaeyo(素問大要) and Uigamjungma(醫鑑重磨). Until recently, studies on that theory have tended to focus on examining Somundaeyo. However, study on Uigamjungma is equally as important and is to be done as that on Somundaeyo. This is because the former is rather clinically oriented as the latter is theoretical so that the two is twins of one medical theory, in other words the other side of a coin. There are four versions of Uigamjungma editions: the first edition in 1922 by wooden block; one with annotation and Korean translation by Park Heesung; one edited and manually transcribed by Lee Wonse(李元世); and Daesung publisher's in 2000. Lee Gyujun revised medical theories, prescription, and herbology extracted not only from Donguibogam(東醫寶鑑) as well known wide, but also from Bangyakhappyeon(方藥合編) and Gyengakjeonse(景岳全書), based on the Buyang Theory(扶陽論).

Efficient Data Publishing Method for Protecting Sensitive Information by Data Inference (데이터 추론에 의한 민감한 정보를 보호하기 위한 효율적인 데이터 출판 방법)

  • Ko, Hye-Kyeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.9
    • /
    • pp.217-222
    • /
    • 2016
  • Recent research on integrated and peer-to-peer databases has produced new methods for handling various types of shared-group and process data. This paper with data publishing, where the publisher needs to specify certain sensitive information that should be protected. The proposed method cannot infer the user's sensitive information is leaked by XML constraints. In addition, the proposed secure framework uses encrypt to prevent the leakage of sensitive information from authorized users. In this framework, each node of sensitive data in an eXtensible Markup Language (XML) document is encrypted separately. All of the encrypted data are moved from their original document, and are bundled with an encrypted structure index. Our experiments show that the proposed framework prevents information being leaked via data inference.

John Irving's Heroes and Their Graces

  • Kim, Ilgu
    • English & American cultural studies
    • /
    • v.9 no.1
    • /
    • pp.91-112
    • /
    • 2009
  • Referring to John Irving's 2001 published fiction The Fourth Hand, the publisher commented, "It seems, at first, to be a comedy, perhaps a satire, almost certainly a sexual farce. Yet, in the end, it is as realistic and emotionally moving as any of Mr. Irving's previous novels." In his early six novels, John Irving shows the world suffused with grief and deception. But his novels finally turn out also as a comic and robust novel. The writer's success in achieving this thick description of the contradictory modern world is largely due to his development of the idea of the flawed hero. Despite loss, sadness and abandonment, Irving's heroes maintain classical heroic traits such as intelligence, tenderness, protectiveness, strength, bravery, sense of humor, independence, attractiveness. In this article, I tried to emphasize these graces potent in Irving's heroes as the most attractive and influential device for the writer's consistent popularity among the general public. The cinematization of his four fictions attest to audience's sympathy toward rewarding vulnerability and truthful exaggeration in the depiction of Irving's heroes. By taking full responsibility for their own fate despite having the flaws, Irving's protagonists still appeal to many readers as heroes resilient in a modern chaotic world without losing their graces.

Integration News MashUp Service by Open API (Open API를 이용한 통합 뉴스 메쉬업 서비스)

  • Kim, Ki-Taek;Choi, Kwang-Sub;Choi, Yun-Jung;Lee, Sang-Mi;Park, Mi-Ra;Min, Jun-Ki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.1071-1074
    • /
    • 2009
  • In a pre-existing online newspaper has inconvenience such that a difference of a newspaper from other newspapers is confirmed on another script window. To solve this inconvenience, we propose a system called Rose News Reader. Since our proposed system classifies the articles with respect to the publishers and domain, a user can compare the articles from diverse publisher and analyze them to obtain correct facts.

  • PDF

A Study on the Improvement of Korean Journal Citation Index Service

  • Kim, Suntae
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.11 no.3
    • /
    • pp.63-79
    • /
    • 2021
  • The KJC and KCI services operated by the National Research Foundation of Korea (NRF) need to refer to the global citation index database to set the service direction that researchers want and develop new functions. Therefore, in this study, the usability of Korea's KJC and KCI web databases was evaluated. In addition, FGI verification was performed for a group of experts on KJC and KCI improvement measures derived by academic information experts. The evaluation committee consisted of the researcher group, the society related group, the publisher (academic information distribution organization) group, and the policy-making organization group. A total of 16 experts performed usability evaluation and service improvement proposals for KJC and KCI services. As a result of usability evaluation of KJC and KCI web database using SUS measurement tool, KJC service was evaluated as 73.44, and KCI service was evaluated as good as 64.38. KJC improvement proposals were evaluated positively with 4 points or more for all improvement items, and KCI improvement proposals were positively evaluated with 3.5 points or more for all improvement items. Overall, KJC and KCI error improvements were evaluated with a score of 4 or more, showing strong affirmations. In the future, it is hoped that the improvement proposals and improvements proposed in this study will be applied to the development of KJC and KCI services, so that more quality services will be used by domestic researchers.

Roland Giguère and Poetic Landscape - La main au feu (롤랑 지게르와 시의 풍경 - 『불 위의 손』을 중심으로)

  • Kim, Yong Hyun
    • Cross-Cultural Studies
    • /
    • v.39
    • /
    • pp.153-176
    • /
    • 2015
  • Poet, painter and publisher, Roland $Gigu{\grave{e}}re$ is one of Quebec's outstanding figures, inspired by both Surrealism and Quebec nationalism. He participated in contemporary artistic movement 'Phases' and influenced collective self-awareness and political ferment, 'Quiet Revolution'. In La Main au feu(1973), his poetry represent a landscape dominated by darkness in contrast with red color of fire from the volcanic crater. The world is immersed in darkness of despair which allude to the Great Darkness of Quebec society. Acts of violence assume many different forms: crows, black rain, dark flow, frenzy of knife blows. Both things and humans are in the state of absence or lack. Life falls into opacity of death. In the background of dark landscape, we discover Miror, a singular character. Similar to chain of mountains and to bare forest, he is a creature that shape the tragic inner world of poet. He is as like as seismograph that record the tremble of being. Finally, in order to fight the darkness of environment, the poet attempt to use the power of fire of volcanoes. The flow of magma become paintings of his dream and the flame of eruption, poetry of cry toward the sky. 'La main au feu' means the will to resist injustice and repression in the world. The tragic reality is replaced by a dream that become second reality out of reach of the force of hostile external circumstances.

PMCN: Combining PDF-modified Similarity and Complex Network in Multi-document Summarization

  • Tu, Yi-Ning;Hsu, Wei-Tse
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.9 no.3
    • /
    • pp.23-41
    • /
    • 2019
  • This study combines the concept of degree centrality in complex network with the Term Frequency $^*$ Proportional Document Frequency ($TF^*PDF$) algorithm; the combined method, called PMCN (PDF-Modified similarity and Complex Network), constructs relationship networks among sentences for writing news summaries. The PMCN method is a multi-document summarization extension of the ideas of Bun and Ishizuka (2002), who first published the $TF^*PDF$ algorithm for detecting hot topics. In their $TF^*PDF$ algorithm, Bun and Ishizuka defined the publisher of a news item as its channel. If the PDF weight of a term is higher than the weights of other terms, then the term is hotter than the other terms. However, this study attempts to develop summaries for news items. Because the $TF^*PDF$ algorithm summarizes daily news, PMCN replaces the concept of "channel" with "the date of the news event", and uses the resulting chronicle ordering for a multi-document summarization algorithm, of which the F-measure scores were 0.042 and 0.051 higher than LexRank for the famous d30001t and d30003t tasks, respectively.

End-to-end MQTT security protocol using elliptic curve cryptography algorithm (타원곡선암호 알고리즘을 이용한 종단간 MQTT 보안 프로토콜)

  • Min, Jung-Hwan;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.1-8
    • /
    • 2019
  • Internet of Things (IoT) is proliferating to provide more intelligent services by interconnecting various Internet devices, and TCP based MQTT is being used as a standard communication protocol of the IoT. Although it is recommended to use TLS/SSL security protocol for TCP with MQTT-based IoT devices, encryption and decryption performance degenerates when applied to low-specification / low-capacity IoT devices. In this paper, we propose an end-to-end message security protocol using elliptic curve cryptosystem, a lightweight encryption algorithm, which improves performance on both sides of the client and server, based on the simulation of TLS/SSL and the proposed protocol.

The Game Selection Model for the Payoff Strategy Optimization of Mobile CrowdSensing Task

  • Zhao, Guosheng;Liu, Dongmei;Wang, Jian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.4
    • /
    • pp.1426-1447
    • /
    • 2021
  • The payoff game between task publishers and users in the mobile crowdsensing environment is a hot topic of research. A optimal payoff selection model based on stochastic evolutionary game is proposed. Firstly, the process of payoff optimization selection is modeled as a task publisher-user stochastic evolutionary game model. Secondly, the low-quality data is identified by the data quality evaluation algorithm, which improves the fitness of perceptual task matching target users, so that task publishers and users can obtain the optimal payoff at the current moment. Finally, by solving the stability strategy and analyzing the stability of the model, the optimal payoff strategy is obtained under different intensity of random interference and different initial state. The simulation results show that, in the aspect of data quality evaluation, compared with BP detection method and SVM detection method, the accuracy of anomaly data detection of the proposed model is improved by 8.1% and 0.5% respectively, and the accuracy of data classification is improved by 59.2% and 32.2% respectively. In the aspect of the optimal payoff strategy selection, it is verified that the proposed model can reasonably select the payoff strategy.

Hybrid Recommendation Algorithm for User Satisfaction-oriented Privacy Model

  • Sun, Yinggang;Zhang, Hongguo;Zhang, Luogang;Ma, Chao;Huang, Hai;Zhan, Dongyang;Qu, Jiaxing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3419-3437
    • /
    • 2022
  • Anonymization technology is an important technology for privacy protection in the process of data release. Usually, before publishing data, the data publisher needs to use anonymization technology to anonymize the original data, and then publish the anonymized data. However, for data publishers who do not have or have less anonymized technical knowledge background, how to configure appropriate parameters for data with different characteristics has become a more difficult problem. In response to this problem, this paper adds a historical configuration scheme resource pool on the basis of the traditional anonymization process, and configuration parameters can be automatically recommended through the historical configuration scheme resource pool. On this basis, a privacy model hybrid recommendation algorithm for user satisfaction is formed. The algorithm includes a forward recommendation process and a reverse recommendation process, which can respectively perform data anonymization processing for users with different anonymization technical knowledge backgrounds. The privacy model hybrid recommendation algorithm for user satisfaction described in this paper is suitable for a wider population, providing a simpler, more efficient and automated solution for data anonymization, reducing data processing time and improving the quality of anonymized data, which enhances data protection capabilities.