• Title/Summary/Keyword: scientists

Search Result 24,335, Processing Time 0.053 seconds

Heojun's Outlook on Nature (허준(許浚)의 자연관(自然觀) - 『동의보감(東醫寶鑑)』을 중심으로 -)

  • Park, Seong-Kue;Kim, Sue Joong;Kim, Nam Il
    • The Journal of Korean Medical History
    • /
    • v.18 no.2
    • /
    • pp.197-227
    • /
    • 2005
  • Heojun was the top scientist on Medicine in the 16th and 17th centuries and wrote the Dongeubogam describing the top-level medical theory and technology. So far, his outlook on nature has been disregarded even though his medicine is still effective. Through this study, I would like to know if his outlook on nature as well as his medicine is still effective. The conclusions are as follows: 1. According to his output, the origin of the universe started from the spinning of One Gi(一氣) which is quite different from Hawking's theory. Hawking assumed that the origin of the universe started from the Big-bang and will end to the Big-crunch. However, the current report on the origin of a star is quite similar to Heojun's theory and we acknowledge that his view on the origin of the universe is still effective. 2. According to his output, the universe repeats expanding and contracting forever while Hawking assumed it will come to the end, the Big-crunch, based on the expanding universe theory. Some scientists assists that Hawking's assumption should have some contradictions. Now, we acknowledge that Heojun's universal cycling theory which corresponds with modern physical theories is still effective, which would lead to a new environmental movement. 3. His view on the structure of the universe is quite different from the output of the current science, which results from his thought that the nature should be reviewed from the point of human's view. His view on the structure will be able to be updated based on the output of the current science. 4. The universe analogy started from the East Asian area as well as the Greek and Roman area in the ancient. The idea has disappeared since the scientific revolution era in the West while the idea has been deepened and abundant in the East and has become one of the major philosophical bases. Heojun emphasized its importance from the beginning of his book. 5. The nation analogy has been popular all times and places. According to his output, governing a country is like controlling one's body. 6. According to Needham's output, the universe analogy and the nation analogy were based on the ancient developed alchemy. And Harper assumed that Taiosm was based on the macrobiotic hygiene which was developed by the ancient developed alchemists. We acknowledge that xian(仙) cult, macrobiotic hygiene, medicine, alchemy and the ancient philosophy started from our ancients. Heojun's output restored our ancient tradition by combining the macrobiotic hygiene and philosophy with medicine. 7. Roughly predicting yearly weather would be unacceptable by the current scientist but Heojun's yearly weather forecast is still used in the clinic and seems effective to prepare from any epidemic disease. 8. 'Day and Night' and Four seasons are the most important factors to the macrobiotic hygiene according to the Dongeubogam. The new environmental movements should be based on the most important factors, otherwise the human beings as well as the environment would fail to survive. 9. Wind, Coldness, Heat, Humidity, Dryness and Fire represents weather. The six weather factors represent one of six phases of a year which is decided by the areal factors. Heojun preferred the six factors generated in the body itself to them from the outside. He thought a human being was a universe and the six factors generated in the body responded to the factors of the outside. 10. According to his output, Heat and Humidity are the most important factors which make a human being ill. 11. Life span, disease, food, and dwelling are dependent upon the geographical feature, according to Heojun's output. In addition, one's appearance and his five viscera and the six entrails depend on the food as well as the geographical feature. 12. Heath is related with the environment and they effects upon each other. If one is weak, he will be deeply effected by the nature. On the other hand, if one is strong, he will effect on the nature. That's why people live together. 13. According to Heojun's work, the society is an important factor comprising the environment. During a peaceful era, the society becomes stable and human beings are stable as well while they will be on fire during a chaotic era. 14. Medicine deals with human beings who live in the nature, so any medical book cannot be excellent unless it has any description on the nature. Heojun's outlook on the nature turned out to be logical and suitable even from the point of the current view and it is still effective as if his clinical knowledge and technology are still effective. Something unsuitable may be substituted with the output of the current science.

  • PDF

A Performance Comparison of the Mobile Agent Model with the Client-Server Model under Security Conditions (보안 서비스를 고려한 이동 에이전트 모델과 클라이언트-서버 모델의 성능 비교)

  • Han, Seung-Wan;Jeong, Ki-Moon;Park, Seung-Bae;Lim, Hyeong-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.286-298
    • /
    • 2002
  • The Remote Procedure Call(RPC) has been traditionally used for Inter Process Communication(IPC) among precesses in distributed computing environment. As distributed applications have been complicated more and more, the Mobile Agent paradigm for IPC is emerged. Because there are some paradigms for IPC, researches to evaluate and compare the performance of each paradigm are issued recently. But the performance models used in the previous research did not reflect real distributed computing environment correctly, because they did not consider the evacuation elements for providing security services. Since real distributed environment is open, it is very vulnerable to a variety of attacks. In order to execute applications securely in distributed computing environment, security services which protect applications and information against the attacks must be considered. In this paper, we evaluate and compare the performance of the Remote Procedure Call with that of the Mobile Agent in IPC paradigms. We examine security services to execute applications securely, and propose new performance models considering those services. We design performance models, which describe information retrieval system through N database services, using Petri Net. We compare the performance of two paradigms by assigning numerical values to parameters and measuring the execution time of two paradigms. In this paper, the comparison of two performance models with security services for secure communication shows the results that the execution time of the Remote Procedure Call performance model is sharply increased because of many communications with the high cryptography mechanism between hosts, and that the execution time of the Mobile Agent model is gradually increased because the Mobile Agent paradigm can reduce the quantity of the communications between hosts.

A Construction of the C_MDR(Component_MetaData Registry) for the Environment of Exchanging the Component (컴포넌트 유통환경을 위한 컴포넌트 메타데이타 레지스트리 구축 : C_MDR)

  • Song, Chee-Yang;Yim, Sung-Bin;Baik, Doo-Kwon;Kim, Chul-Hong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.6
    • /
    • pp.614-629
    • /
    • 2001
  • As the information-intensive society in 21c based on the environment of global internet is promoted, the software is getting more large and complex, and the demand for the software is increasing briskly. So, it becomes an important issue in academic and industrial field to activate reuse by developing and exchanging the standardized component. Currently, the information services as a product type of each company are provided in foreign market place for reusing a commercial component, but the components which are serviced in each market place are different, insufficient and unstandardized. That is, construction for Component Data Registry based on ISO 11179, is not accomplished. Hence, the national government has stepped up the plan for sending out public component at 2001. Therefore, the systems as a tool for sharing and exchange of data, have to support the meta-information of standardized component. In this paper, we will propose the C_MDR system: a tool to register and manage the standardized meta-information, based upon ISO 11179, for the commercialized common component. The purpose of this system is to systemically share and exchange the data in chain of acceleration of reusing the component. So, we will show the platform of specification for the component meta-information, then define the meta-information according to this platform, also represent the meta-information using XML for enhancing the interoperability of information with other system. Moreover, we will show that three-layered expression make modeling to be simple and understandable. The implementation of this system is to construct a prototype system of the component meta-information through the internet on www, this system uses ASP as a development language and RDBMS Oracle for PC. Thus, we may expect the standardization of the exchanged component metadata, and be able to apply to the exchanged reuse tool.

  • PDF

Design and Implementation of Content-based Video Database using an Integrated Video Indexing Method (통합된 비디오 인덱싱 방법을 이용한 내용기반 비디오 데이타베이스의 설계 및 구현)

  • Lee, Tae-Dong;Kim, Min-Koo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.6
    • /
    • pp.661-683
    • /
    • 2001
  • There is a rapid increase in the use of digital video information in recent years, it becomes more important to manage video databases efficiently. The development of high speed data network and digital techniques has emerged new multimedia applications such as internet broadcasting, Video On Demand(VOD) combined with video data processing and computer. Video database should be construct for searching fast, efficient video be extract the accurate feature information of video with more massive and more complex characteristics. Video database are essential differences between video databases and traditional databases. These differences lead to interesting new issues in searching of video, data modeling. So, cause us to consider new generation method of database, efficient retrieval method of video. In this paper, We propose the construction and generation method of the video database based on contents which is able to accumulate the meaningful structure of video and the prior production information. And by the proposed the construction and generation method of the video database implemented the video database which can produce the new contents for the internet broadcasting centralized on the video database. For this production, We proposed the video indexing method which integrates the annotation-based retrieval and the content-based retrieval in order to extract and retrieval the feature information of the video data using the relationship between the meaningful structure and the prior production information on the process of the video parsing and extracting the representative key frame. We can improve the performance of the video contents retrieval, because the integrated video indexing method is using the content-based metadata type represented in the low level of video and the annotation-based metadata type impressed in the high level which is difficult to extract the feature information of the video at he same time.

  • PDF

Bandwidth Reservation and Call Admission Control Mechanisms for Efficient Support of Multimedia Traffic in Mobile Computing Environments (이동 컴퓨팅 환경에서 멀티미디어 트래픽의 효율적 지원을 위한 대역폭 예약 및 호 수락 제어 메커니즘)

  • 최창호;김성조
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.595-612
    • /
    • 2002
  • One of the most important issues in guaranteeing the high degree of QoS on mobile computing is how to reduce hand-off drops caused by lack of available bandwidth in a new cell. Each cell can request bandwidth reservation to its adjacent cells for hand-off calls. This reserved bandwidth can be used only for hand-offs, not for new calls. It is also important to determine how much of bandwidth should be reserved for hand-off calls because reserving too much would increase the probability of a new call being blocked. Therefore, it is essential to develop a new mechanism to provide QoS guarantee on a mobile computing environment by reserving an appropriate amount of bandwidth and call admission control. In this paper. bandwidth reservation and call admission control mechanisms are proposed to guarantee a consistent QoS for multimedia traffics on a mobile computing environment. For an appropriate bandwidth reservation, we propose an adaptive bandwidth reservation mechanism based on an MPP and a 2-tier cell structure. The former is used to predict a next move of the client while the latter to apply our mechanism only to the client with a high hand-off probability. We also propose a call admission control that performs call admission test only on PNC(Predicted Next Cell) of a client and its current cell. In order to minimize a waste of bandwidth caused by an erroneous prediction of client's location, we utilize a common pool and QoS adaptation scheme. In order evaluate the performance of our call admission control mechanism, we measure the metrics such as the blocking probability of new calls, dropping probability of hand-off calls, and bandwidth utilization. The simulation results show that the performance of our mechanism is superior to that of the existing mechanisms such as NR-CAT2, FR-CAT2, and AR-CAT2.

Handover Functional Architecture for Next Generation Wireless Networks (차세대 무선 네트워크를 위한 핸드오버 기능 구조 제안)

  • Baek, Joo-Young;Kim, Dong-Wook;Kim, Hyun-Jin;Choi, Yoon-Hee;Kim, Duk-Jin;Kim, Woo-Jae;Suh, Young-Joo;Kang, Suk-Yang;Kim, Kyung-Suk;Shin, Kyung-Chul
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.268-273
    • /
    • 2006
  • 차세대 무선 네트워크 (4G)는 새로운 무선 접속 기술의 개발과 함께 많은 연구가 필요한 분야이다. 그 중에서 특히 단말의 끊김없는 이동성을 제공해 주기 위한 핸드오버 기술이 가장 중요하다고 할 수 있다. 차세대 무선 네트워크는 새로운 무선 접속 기술과 함께 기존의 무선랜이나 이동통신망 등과 같이 사용될 것으로 예상되며, 네트워크 계층에서의 이동성 지원을 위하여 Mobile IPv6를 사용할 것으로 예상되는 네트워크이다. 이러한 네트워크에서 끊김없는 이동성을 제공해 주기 위해서는 현재까지 연구된 핸드오버 기능 및 구조에 대한 연구와 함께 보다 다양해진 네트워크 환경과 QoS 등을 고려한 종합적인 핸드오버 기능에 대한 연구가 필요하다. 본 논문에서는 차세대 무선 네트워크에서 단말의 끊김없는 핸드오버를 제공해 주기 위하여 필요한 기능들을 도출하고, 이들간의 유기적인 연관관계를 정의하여 다양한 네트워크 환경과 사용자의 우선순위, 어플리케이션의 QoS 요구 조건 등을 고려한 종합적인 핸드오버 기능 구조를 제안하고자 한다. 제안하는 핸드오버 구조는 Monitoring, Triggering, Handover의 세 가지 module로 나뉘어져 있으며, 각각은 필요에 따라 sub-module로 다시 세분화된다. 제안하는 핸드오버 구조의 가장 큰 특징은 핸드오버를 유발시킬 수 있는 여러 가지 요소를 종합적으로 고려하며 이들간의 수평적인 비교가 아닌 다단계 비교를 수행하여 보다 정확한 triggering이 가능하도록 한다. 또한 단말의 QoS 요구 사항을 보장하고 네트워크의 혼잡도(congestion) 및 부하 조절 (load balancing)을 위한 기능을 핸드오버 기능에 추가하여 효율적인 네트워크의 자원 사용이 가능하도록 설계하였다.서버로 분산처리하게 함으로써 성능에 대한 신뢰성을 향상 시킬 수 있는 Load Balancing System을 제안한다.할 때 가장 효과적인 라우팅 프로토콜이라고 할 수 있다.iRNA 상의 의존관계를 분석할 수 있었다.수안보 등 지역에서 나타난다 이러한 이상대 주변에는 대개 온천이 발달되어 있었거나 새로 개발되어 있는 곳이다. 온천에 이용하고 있는 시추공의 자료는 배제하였으나 온천이응으로 직접적으로 영향을 받지 않은 시추공의 자료는 사용하였다 이러한 온천 주변 지역이라 하더라도 실제는 온천의 pumping 으로 인한 대류현상으로 주변 일대의 온도를 올려놓았기 때문에 비교적 높은 지열류량 값을 보인다. 한편 한반도 남동부 일대는 이번 추가된 자료에 의해 새로운 지열류량 분포 변화가 나타났다 강원 북부 오색온천지역 부근에서 높은 지열류량 분포를 보이며 또한 우리나라 대단층 중의 하나인 양산단층과 같은 방향으로 발달한 밀양단층, 모량단층, 동래단층 등 주변부로 NNE-SSW 방향의 지열류량 이상대가 발달한다. 이것으로 볼 때 지열류량은 지질구조와 무관하지 않음을 파악할 수 있다. 특히 이러한 단층대 주변은 지열수의 순환이 깊은 심도까지 가능하므로 이러한 대류현상으로 지표부근까지 높은 지온 전달이 되어 나타나는 것으로 판단된다.의 안정된 방사성표지효율을 보였다. $^{99m}Tc$-transferrin을 이용한 감염영상을 성공적으로 얻을 수 있었으며, $^{67}Ga$-citrate 영상과 비교하여 더 빠른 시간 안에 우수한 영상을 얻을 수 있었다. 그러므로 $^{99m}Tc$-transierrin이 감염 병소의 영상진단에 사용될 수 있을 것으로 기대된다.리를 정량화 하였다. 특히 선

  • PDF

Data Mining Approaches for DDoS Attack Detection (분산 서비스거부 공격 탐지를 위한 데이터 마이닝 기법)

  • Kim, Mi-Hui;Na, Hyun-Jung;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.279-290
    • /
    • 2005
  • Recently, as the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not effectively defend against these attacks, or the defense capability of some mechanisms is only limited to specific DDoS attacks. In this paper, we propose a detection architecture against DDoS attack using data mining technology that can classify the latest types of DDoS attack, and can detect the modification of existing attacks as well as the novel attacks. This architecture consists of a Misuse Detection Module modeling to classify the existing attacks, and an Anomaly Detection Module modeling to detect the novel attacks. And it utilizes the off-line generated models in order to detect the DDoS attack using the real-time traffic. We gathered the NetFlow data generated at an access router of our network in order to model the real network traffic and test it. The NetFlow provides the useful flow-based statistical information without tremendous preprocessing. Also, we mounted the well-known DDoS attack tools to gather the attack traffic. And then, our experimental results show that our approach can provide the outstanding performance against existing attacks, and provide the possibility of detection against the novel attack.

A New Bias Scheduling Method for Improving Both Classification Performance and Precision on the Classification and Regression Problems (분류 및 회귀문제에서의 분류 성능과 정확도를 동시에 향상시키기 위한 새로운 바이어스 스케줄링 방법)

  • Kim Eun-Mi;Park Seong-Mi;Kim Kwang-Hee;Lee Bae-Ho
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.11
    • /
    • pp.1021-1028
    • /
    • 2005
  • The general solution for classification and regression problems can be found by matching and modifying matrices with the information in real world and then these matrices are teaming in neural networks. This paper treats primary space as a real world, and dual space that Primary space matches matrices using kernel. In practical study, there are two kinds of problems, complete system which can get an answer using inverse matrix and ill-posed system or singular system which cannot get an answer directly from inverse of the given matrix. Further more the problems are often given by the latter condition; therefore, it is necessary to find regularization parameter to change ill-posed or singular problems into complete system. This paper compares each performance under both classification and regression problems among GCV, L-Curve, which are well known for getting regularization parameter, and kernel methods. Both GCV and L-Curve have excellent performance to get regularization parameters, and the performances are similar although they show little bit different results from the different condition of problems. However, these methods are two-step solution because both have to calculate the regularization parameters to solve given problems, and then those problems can be applied to other solving methods. Compared with UV and L-Curve, kernel methods are one-step solution which is simultaneously teaming a regularization parameter within the teaming process of pattern weights. This paper also suggests dynamic momentum which is leaning under the limited proportional condition between learning epoch and the performance of given problems to increase performance and precision for regularization. Finally, this paper shows the results that suggested solution can get better or equivalent results compared with GCV and L-Curve through the experiments using Iris data which are used to consider standard data in classification, Gaussian data which are typical data for singular system, and Shaw data which is an one-dimension image restoration problems.

Constructing Geological Cross-sections at Depth and Interpreting Faults Based on Limited Shallow Depth Data Analysis and Core Logging: Southern Section of the Yangsan Fault System, SE Korea (제한된 천부자료와 시추코어분석을 통한 심부지질단면도 작성과 단층 인지법: 한반도 남동부 양산단층대 주변에서의 적용)

  • Kim, Taehyung;Kim, Young-Seog;Lee, Youngmin;Choi, Jin-Hyuck
    • The Journal of Engineering Geology
    • /
    • v.26 no.2
    • /
    • pp.277-290
    • /
    • 2016
  • Deep geological cross-sectional data is generally not common nor easy to construct, because it is expensive and requires a great deal of time. As a result, geological interpretations at depth are limited. Many scientists attempt to construct geological cross-sections at depth using geological surface data and geophysical data. In this paper, we suggest a method for constructing cross-sections from limited geological surface data in a target area. The reason for this study is to construct and interpret geological cros-sections at depth to evaluate heat flow anomaly along the Yangsan fault. The Yangsan Fault passes through the south-eastern part of the Korean Peninsula. The cross-section is constructed from Sangbukmyeon to Unchonmyeon passing perpendicularly through the Yangsan Fault System trending NW-SE direction. The geological cross-section is constructed using the following data: (1) Lithologic distributions and main structural elements. (2) Extensity of sedimentary rock and igneous rock, from field mapping. (3) Fault dimension calculated based on geometry of exposed surface rupture, and (4) Seismic and core logging data. The Yangsan Fault System is composed of the Jain fault, Milyang fault, Moryang fault, Yangsan fault, Dongnae fault, and Ingwang fault which strike NNE-SSW. According to field observation, the western section of the Yangsan fault bounded by igneous rocks and in the eastern section sedimentary rocks are dominant. Using surface fault length we infer that the Yangsan Fault System has developed to a depth of kilometers beneath the surface. According to seismic data, sedimentary rocks that are adjacent to the Yangsan fault are thin and getting thicker towards the east of the section. In this study we also suggest a new method to recognize faults using core loggings. This analysis could be used to estimate fault locations at different scales.

Managing Technological Risk and Risk Conflict : Public Debates on Health Risks of Mobile Phones EMF (기술위험 관리와 위험갈등 : 휴대전화 전자파의 인체유해성 논란)

  • Jung, Byung-Kul
    • Journal of Science and Technology Studies
    • /
    • v.8 no.1
    • /
    • pp.97-129
    • /
    • 2008
  • We are living in the time of high probability of technological risk due to increased rate of technology development and diffusion of new technologies. Resolving uncertainties, the basic attribution of risk, by accumulating knowledge over the risk factors of certain technology is critical to management of technological risk. In many cases of technological risks, high uncertainty of knowledge is commonly mentioned reason for public controversies on risk management. However, the type of technological risk with low social agreement and low uncertainty of knowledge, the main reason for public controversy is absence of social agreement. Public debates on the risks of mobile phones electromagnetic fields(EMF) to human health comes under this category. The knowledge uncertainty on human health effect of mobile phones EMF has been lowered increasingly by accumulating enormous volume of knowledge though scientists have not reached a final conclusion whether it pose a risk to the physical and mental health of the general population or not. In contrast with civil organizations calling for precautionary approach based regulation, the mobile phone industry is cling to the position of no-regulation-needed by arguing no clear evidence to prove health risks of mobile phone EMF has found. In Korea, government set exposure standards based on a measurement called the 'specific absorption rate'(SAR) and require the mobile phone industry to open SAR information to the public by their own decision. From the view of pro-regulation side based on precautionary approach, technology risk managament of mobile phones EMF in Korea is highly limited and formalized one with limited measuring of SAR on head part only and problematic self-regulated opening of information about SAR to the public. As far as the government keeps having priority on protecting interest of mobile phone industry over precautionary regulation of mobile phones EMF, the disagreement between civil organizations and the government will not resolved. The risk of mobile phones EMF to human health have high probability of being underestimated in the rate and damage of risk than objectively estimated ones due to familiarity of mobile phone technology. And this can be the cause of destructive social dispute or devastating disaster. To prevent such disastrous results, technology risk management, which integrating the goals of safety with economic growth in public policy and designing and promoting risk communication, is required.

  • PDF