• Title/Summary/Keyword: science register

Search Result 285, Processing Time 0.026 seconds

A Study on the Vitalization Plan of Local Tourism and Corona Blue Alleviation by Using the Electronic Access Register (KI-Pass) System (전자출입명부(KI-Pass) 시스템을 활용한 코로나 블루 해소 및 지방관광 활성화 방안에 대한 연구)

  • Jeong, Ki-hyeok;Han, Wool
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.75-77
    • /
    • 2020
  • 코로나19로 사회적 거리두기가 지속되면서 코로나 블루를 적절히 해소하는 방안 또한 새로운 사회적 무제로 대두되었다. 이에 본 연구는 전자출입명부 시스템을 활용하여 안전하게 지역을 관광할 수 있는 방안을 제시하였다. 구체적으로 QR코드에 기록된 정보를 바탕으로 지역별로 방문한 관광객의 숫자를 공유하여 지역별 방문인구를 파악할 수 있도록 하였다. 이를 통해 관광객은 밀집된 공간을 피하며 방역지침을 준수하면서도, 다양한 지역을 방문하며 코로나 블루를 해소할 수 있을 것이다.

Ultrasonography for Facial Nerve Palsy: A Systematic Review and Meta-Analysis Protocol

  • Seojung Ha;Bo-In Kwon;Joo-Hee Kim
    • Journal of Acupuncture Research
    • /
    • v.41 no.1
    • /
    • pp.63-68
    • /
    • 2024
  • Background: Facial nerve palsy presents a significant healthcare challenge, impacting daily life and social interactions. This systematic review investigates the potential utility of ultrasonography as a diagnostic tool for facial nerve palsy. Methods: Electronic searches will be conducted across various databases, including MEDLINE, EMBASE, CENTRAL (Cochrane Central register of Controlled Trials), CNKI (China National Knowledge Infrastructure), KMBASE (Korean Medical Database), ScienceON, and OASIS (Oriental Medicine Advanced Searching Integrated System), up to February 2024. The primary outcome will focus on ultrasonography-related parameters, such as facial nerve diameter and muscle thickness. Secondary outcomes will encompass clinical measurements, including facial nerve grading scales and electrodiagnostic studies. the risk of bias in individual study will be assessed using the Cochrane Risk of Bias assessment tool, while the grading of recommendations, assessment, development, and evaluations methodology will be utilized to evaluate the overall quality of evidence. Conclusion: This study aims to review existing evidence and evaluate the diagnostic and prognostic value of ultrasonography for peripheral facial nerve palsy.

Area- and Energy-Efficient Ternary D Flip-Flop Design

  • Taeseong Kim;Sunmean Kim
    • Journal of Sensor Science and Technology
    • /
    • v.33 no.3
    • /
    • pp.134-138
    • /
    • 2024
  • In this study, we propose a ternary D flip-flop using tristate ternary inverters for an energy-efficient ternary circuit design of sequential logic. The tristate ternary inverter is designed by adding the functionality of the transmission gate to a standard ternary inverter without an additional transistor. The proposed flip-flop uses 18.18% fewer transistors than conventional flip-flops do. To verify the advancement of the proposed circuit, we conducted an HSPICE simulation with CMOS 28 nm technology and 0.9 V supply voltage. The simulation results demonstrate that the proposed flip-flop is better than the conventional flip-flop in terms of energy efficiency. The power consumption and worst delay are improved by 11.34% and 28.22%, respectively. The power-delay product improved by 36.35%. The above simulation results show that the proposed design can expand the Pareto frontier of a ternary flip-flop in terms of energy consumption. We expect that the proposed ternary flip-flop will contribute to the development of energy-efficient sensor systems, such as ternary successive approximation register analog-to-digital converters.

The Sillok as National Supreme Archives : An archival interpretation (실록(實錄) : 등록(謄錄)의 위계(位階))

  • O, Hang-Nyeong
    • The Korean Journal of Archival Studies
    • /
    • no.3
    • /
    • pp.91-113
    • /
    • 2001
  • History always be re-interpreted as the time flows. 'The Sillok', Which was registered in Memory of World of UNESCO in 1997, is comprehensive documents of the Chosun Dynasty, which had been compiled after kings' death, The Sillok encompasses 473 years of the reign in their 848 volumes(1,893 chapters). It was a history itself and has been main source in studying Korean history. Due to the rise of studies on the Sillok, time has come to explore the nature of the Sillok and to criticize the text, which would be called 'The Sillok-Study'. In this context, this paper examined three concepts that categorize the nature of the Sillok as historical materials ;Is it book or record?; The Sillok in register system in pre-modern society; And the Sillok as the National Archives. Korean historians, including myself, haven't yet examined the question whether the Sillok is the Book or Record in terms of archival science. At first, I regarded it as history book, and with this presupposition, wrote several papers on the characteristics of the Sillok. However, I recognized that the Sillok are close to record rather that history book as I examined the definition of glossary of librarian study, OED (Oxford English Dictionary) and Encyclopedia of Britannica, etc. Definitely, the Sillok was neither compiled and published to be read and sold publicly, nor meant to the works of literature or scholarship. one may say that the court-historians wrote comments on the facts and therefore it was just scholarly work. However, because the court-historians produced their comments on their own businesses, the outcome of 'their scholarly works' were also records conceptually, as were daily court-journalists in Rome. Its publication also had a absolutely different meaning from that of modern society. It was a method to preserve the important national records and distributed each edition of them to plural repositories for its safety and security. How can we explain its book-like shape and the procedure of compilation after a kings' death. The answer is as follows ; In pre-modern society, it was a common record-keeping system in the world to register records materials in order to arrange the materials of different sizes and to store them conveniently. And the lack of scientific preservation or conservation skill also encouraged them to register original records. Actually, the court-historians who participated in the compiling process called themselves "registering officers". On the other hand, similar to social hierarchy, there was a hierarchical system of records, and the Sillok was placed at the top of this hierarchy. In conclusion, the Sillok was a kind of registered records in the middle ages and the supreme records in the records-world. In addition to this we can also conceptualize the Sillok as archives. Through the compiling process, the most important and valuable records were selected to be the parts of Sillok. This process corresponds to the modem records appraisal. In the next step, it was preserved in the Four Archives(史庫) which located at remote site as archives and only accessible by the descendents in the future, who might be the people of the next dynasty. And nobody could access or read the documents at that time except the authorized court-historians who were archivists of the Chosun Dynasty. From this perspective, I conclude that Sillok was the supreme confidential archives in the register system. I work for the Government Archives as a historian and archivist. Whenever I entered the exhibition hall of the Government Archives and Records Service(GARS) and saw the replica of the Archives of Taebeak Mountain built during Chosun period, I always asked to myself a question whether the Sillok can be a symbol of the archival tradition of Korea and the GARS. Now, I can say, 'Yes!' definitely.

Analysis of International Competitiveness of Chinese ginseng in Comparison with Korean ginseng (중국 인삼 산업의 국제 경쟁력 분석)

  • Kwon, Yong-Dae;Choi, Hye-Hwa
    • Korean Journal of Agricultural Science
    • /
    • v.33 no.1
    • /
    • pp.43-56
    • /
    • 2006
  • In this thesis we aim at analyzing international competitive power of Chinese ginseng in comparison with Korean ginseng and searching policy direction for Korea to compete Chinese ginseng industry. We summarized the research results as follows; First, we examine the structural change of ginseng industry of China. Second, we review the theories for international competitiveness and apply the method of analyzing competitiveness to ginseng industry. Third, we compared the international competitive power of the ginseng industry between China and Korea and found that Chinese ginseng, estimated by Revealed Comparative Advantage(RCA) at about 15, still remains high competitiveness in terms of cost and price but lowering price competitiveness recently. Based on the research results, we suggest export promotion strategies of the Korean ginseng as follows; 1) Korean government should enforce trade cooperation with China so as to register Korean root ginseng an importable medicine. 2) Korean ginseng producer should develop various products such as capsules, powders and etc. according to China's consumer purchasing power and taste. 3) Korean ginseng should be sold as an differentiated commodity so that it will contribute to building consumer loyalty to Korean ginseng, makes market share superior to other cheaper ginseng products in China. 4) In order to be effective brand marketing and product advertisement, there should be established reliable networks to process and distribute Korean ginseng products exclusively.

  • PDF

HAN(Home Area Network) in Zigbee Safety Authentication Mechanism for Zigbee Device (홈 네트워크 디바이스에서 ZigBee기반의 안전한 인증 메커니즘)

  • Choi, Ji-Hoon;Kim, Jung-Jae;Jun, Moon-Seog
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.11a
    • /
    • pp.267-271
    • /
    • 2010
  • Zigbee는 단말에 대한 경제성이 뛰어나고 저 전력통신을 이용하기 때문에 수명이 길다. Mesh, Tree, Star 등 다양한 방식의 토플리지 구조를 지원 하며 확장성이 뛰어나 군사적인 용도, 환경 모니터링 시스템 등 많은 분야에 사용되고 있다. 최근 스마트그리드환경을 구축함에 있어 Zigbee는 HAN(Home Area Network)에 표준으로 사용될 예정이며 현재는 Zigbee를 이용한 AMR(Automatic Meter Reading)을 시범 중에 있다. 일반적으로 ZIgbee Network은 ZC(Zigbee Coordinator), ZCH(Zigbee Cluster Head), ZE(Zigbee End Device) 3가지로 구성되며, Zigbee Network에서 발생할 수 있는 취약점은 허가되지 않은 디바이스의 접근, 라우터의 흐름을 조작하는 방법, ZC(Zigbee Coordinator)와 ZE(Zigbee End Device)사이의 키 전송 시 안전하지 않은 채널을 이용하여 전송되는 문제가 발생된다. 본 논문에서는, TCP(Third Party Center)를 이용함으로써, ZE와 ZC간의 키 생성 시 발생하는 취약점을 보완하였다. 또한 인증절차를 강화함으로써 ZE(Zigbee End Device)에서 발생 할 수 있는 취약점을 보완하고자 하였으며 RS(Register Server)를 이용하여 HAN에 존재하는 디바이스에 대하여 실시간 모니터링이 가능하게 하였다.

  • PDF

Construction of Open Resource Registration System in PC Grid Computing Environments (PC 그리드 컴퓨팅 환경에서 오픈 자원 등록 시스템 구축)

  • Yoon, Junweon;Choi, Jangwon;Lee, Pillwoo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.221-225
    • /
    • 2007
  • PC grid computing is a paradigm of distributed computing that are collection the idle resource of numerous PCs to perform large-scale. As this way, created high performance resources use a large-scale computational application, also this paradigm studied new measurement in place of application using super computer. This paper suggests ORRS(Open Resource Registration System) that selects a adequate resource what application client want. This system register descriptions of resource that provide group, such as organization, party, team, PCs idle resource in open archive. Also, this system provide PC grid computing environment which is select suitable resource actively what application client want.

  • PDF

A Proposal on operating ISO-conforming Hangul codes and on a new one-byte Hangul code (국제 표준 틀 안의 한글 부호계 운용 방안 및 한 바이트 한글 부호계 안)

  • Kim, Kyong-Sok;Jeong, Yeon-Jeong;Cho, Chung-Lae
    • Annual Conference on Human and Language Technology
    • /
    • 1994.11a
    • /
    • pp.253-258
    • /
    • 1994
  • 이 글에서 살펴본 바는 다음과 같다. 1) ISO 10646-1 한글 부호계의 운용 방안은, 앞으로 얼마동안은 2,350 완성형 소리마디를 쓸 수도 있겠지만, 길게 보아서는 첫가끝 부호계 238 글자로 통일하는 것이 바람직하다고 본다. 2) ISO 2022 틀을 따르면서 한글을 완벽하계 지원하는 한 바이트 한글 부호계를 개발하여, 국제 등록부 (International Register) 에 등록하여, Escape Sequence을 받아서, ISO 2022 를 따르는 분야에서 쓸 수 있도록 하여야하겠다. 3) ISO 10646-1 을 개정하여 4,516 소리마디를 넣자는 안은, 완성형으로만 한글을 지원하게 되어 바람직하지 않다고 본다. 모아쓰기 글자를 지원하는 세계 추세가 조합방식이므로, 10646-1 을 현재대로 두고, 첫가끝 방식의 238 글자를 쓰는 것이 바람직하다고 본다. 4) 10646-1 을 재대로 지원할 수 있는 세벌식 자판을 정부의 복수 표준으로 채택할 것을 제안한다.

  • PDF

Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.

  • Irshad, Azeem;Sher, Muhammad;Alzahrani, Bander A.;Albeshri, Aiiad;Chaudhry, Shehzad Ashraf;Kumari, Saru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.523-549
    • /
    • 2018
  • The increasing number of subscribers and demand of multiplicity of services has turned Multi-Server Authentication (MSA) into an integral part of remote authentication paradigm. MSA not only offers an efficient mode to register the users by engaging a trusted third party (Registration Centre), but also a cost-effective architecture for service procurement, onwards. Recently, Lu et al.'s scheme demonstrated that Mishra et al.'s scheme is unguarded to perfect forward secrecy compromise, server masquerading, and forgery attacks, and presented a better scheme. However, we discovered that Lu et al.'s scheme is still susceptible to malicious insider attack and non-compliant to perfect forward secrecy. This study presents a critical review on Lu et al.'s scheme and then proposes a secure multi-server authentication scheme. The security properties of contributed work are validated with automated Proverif tool and proved under formal security analysis.

An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture

  • Irshad, Azeem;Ahmad, Hafiz Farooq;Alzahrani, Bander A.;Sher, Muhammad;Chaudhry, Shehzad Ashraf
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5572-5595
    • /
    • 2016
  • Multi-server authentication enables the subscribers to enjoy an assortment of services from various service providers based on a single registration from any registration centre. Previously, a subscriber had to register from each service provider individually to avail respective services relying on single server authentication. In the past, a number of multi-server authentication techniques can be witnessed that employed lightweight and even computationally intensive cryptographic operations. In line with this, Zhu has presented a chaotic map based multi-server authentication scheme recently, which is not only vulnerable to denial-of-service attack, stolen-verifier attack, but also lacks anonymity. This research aims at improving the Zhu's protocol in terms of cost and efficiency. Moreover, the comparative study is presented for the performance of improved model against the existing scheme, and the security of proposed model is formally proved using BAN Logic.