Today, the emergence of cyberspace and advancement of globalization caused not only the transformation of our productive and conventional life but also the revolutionary transition of use of destructive violence such as crime and warfare. This transition of environmental condition connects various security threats which separatedly existed in individual, local, national, and global levels in the past, and transformed the mechanical sum of all levels of security threats into the organic sum of multi-dimensional security threats. This article proposes that the sum of multi-dimensional security threats is caused by the interconnectivity of various different levels of security threats and the integrated interdisciplinary perspective is essential to properly understand the fundamental existence of today's security problem and the reality of fear that we face today. The holistic security, the concept proposed here, is to suggest the mode of networked response to multi-dimensional security threats. The holistic security is suggested to overcome the conventional divisional approach based on the principle of "division of labor" and bureaucratic principles, which means more concretely that national security and criminal justice are divided and intelligence, military, police, prosecution, fire-fighting, private security, and etc. are strictly separated into its own expertise and turf. Also, this article introduces integrated security approaches tried by international organization and major countries overseas with the respect of the holistic security. The author have spent some substantial experience of participant observation, meetings, seminar, conference, and expert interviews regarding the issues discussed in the article in various countries including the United States, Russia, Austria, Germany, Canada, Mexico, Israel, and Uzbekistan for the last ten years. Intelligence and information on various levels of security threats and security approaches introduced in this paper is obtained from such opportunities.
Ryu, Ji Chul;Mun, Yuri;Moon, Jongpil;Kim, Ik Jae;Ok, Yong Sik;Jang, Won Seok;Kang, Hyunwoo;Lim, Kyoung Jae
Journal of Environmental Policy
/
v.10
no.1
/
pp.49-70
/
2011
The numerous efforts have been made in understanding generation and transportation mechanism of nonpoint source pollutants from agricultural areas. Also, the water quality degradation has been exacerbated over the years in many parts of Korea as well as other countries. Nonpoint source pollutants are transported into waterbodies with direct runoff and baseflow. It has been generally thought that groundwater quality is not that severe compared with surface water quality. However its impacts on groundwater in the vicinity of stream quality is not negligible in agricultural areas. The SWAT model has been widely used in hydrology and water quality studies worldwide because of its flexibilities and accuracies. The spatial property of each HRU, which is the basic computational element, is not presented. Thus, the SWAT HRU mapping module was developed in this study and was applied to the study watershed to evaluate recharge rate and $NO_3-N$ loads in groundwater. The $NO_3-N$ loads in groundwater on agricultural fields were higher than on forests because of commercial fertilizers and manure applied in agricultural fields. The $NO_3-N$ loads were different among various crops because of differences in crop nutrient uptake, amount of fertilizer applied, soil properties in the field. As shown in this study, the SWAT HRU mapping module can be efficiently used to evaluate the pollutant contribution via baseflow in agricultural watershed.
In excavated bronze artifacts, corrosion products of various shapes and colors are observed due to multiple corrosion factors coexisting in the burial environment, and these corrosion products can constitute important data not only in terms of long-term corrosion-related information, but also in connection with preservation of artifacts. As such, scientific analysis is being carried out on the corrosion layer and corrosion products of bronze artifacts, and the corrosion mechanism and the characteristics of corrosion products elucidated, which is essential for interpreting the exposed burial environment and its association with corrosion factors inside the burial environment. In this study, after classifying excavated bronze artifacts according to alloy ratio and fabrication technique, comprehensive analysis of the surface of corrosion artifacts, corrosion layer, and corrosion products was carried out to investigate the corrosion mechanism, formation process of the corrosion layer, and characteristics of corrosion products. The study designated two groups according to alloy ratio and fabrication technique. In Group 1, which involved a Cu-Sn-Pb alloy and had no heat treatment, the surface was rough and external corrosion layers were formed on a part, or both sides, of the inside and the outside, and the surface was observed as being green or blue. α+δ phase selection corrosion was found in the metal and some were found to be concentrated in an empty space with a purity of 95 percent or more after α+δ phase corrosion. The Cu-Sn alloy and heat-treated Group 2 formed a smooth surface with no external corrosion layer, and a dark yellow surface was observed. In addition, no external corrosion layer was observed, unlike Group 1, and α corrosion was found inside the metal. In conclusion, it can be seen that the bronze artifacts excavated from the same site differ in various aspects, including the formation of the corrosion layer, the shape and color of the corrosion products, and the metal ion migration path, depending on the alloy ratio and fabrication technique. They also exhibited different corrosion characteristics in the same material, which means that different forms of corrosion can occur depending on the exposure environment in the burial setting. Therefore, even bronze artifacts excavated from the same site will have different corrosion characteristics depending on alloy ratio, fabrication technique, and exposure environment. The study shows one aspect of corrosion characteristics in specific areas and objects; further study of corrosion mechanisms in accordance with burial conditions will be required through analysis of the corrosive layer and corrosive product characteristics of bronze artifacts from various regions.
Journal of the Korean Society for Marine Environment & Energy
/
v.18
no.2
/
pp.94-101
/
2015
To mitigate the greenhouse gas emission, many carbon capture and storage projects are underway all over the world. In Korea, many studies focus on the storage of $CO_2$ in the offshore sediment. Assurance of safety is one of the most important issues in the geological storage of $CO_2$. Especially, the assessment of possibility of leakage and amount of leaked $CO_2$ is very crucial to analyze the safety of marine geological storage of $CO_2$. In this study, the leakage of injected $CO_2$ through fault was numerically studied. TOUGH2-MP ECO2N was used to simulate the subsurface behavior of injected $CO_2$. The storage site was 150 m thick saline aquifer located 825 m under the continental shelf. It was assumed that $CO_2$ leak was happened through the fault located 1,000 m away from the injection well. The injected $CO_2$ could migrate through the aquifer by both pressure difference driven by injection and buoyancy force. The enough pressure differences made it possible the $CO_2$ to migrate to the bottom of the fault. The $CO_2$ could be leaked to seabed through the fault due to the buoyancy force. Prior to leakage of the injected $CO_2$, the formation water leaked to seabed. When $CO_2$ reached the seabed, leakage of formation water stopped but the same amount of sea water starts to flow into the underground as the amount of leaked $CO_2$. To analyze the effect of injection rate on the leakage behavior, the injection rate of $CO_2$ was varied as 0.5, 0.75, and $1MtCO_2/year$. The starting times of leakage at 1, 0.75 and $0.5MtCO_2/year$ injection rates are 11.3, 15.6 and 23.2 years after the injection, respectively. The leakage of $CO_2$ to the seabed continued for a period time after the end of $CO_2$ injection. The ratios of total leaked $CO_2$ to total injected $CO_2$ at 1, 0.75 and $0.5MtCO_2/year$ injection rates are 19.5%, 11.5% and 2.8%, respectively.
Purpose: We investigated the statistical methods to compose the functional brain map of human working memory and the principal factors that have an effect on the methods for localization. Materials and Methods: Repeated PET scans with successive four tasks, which consist of one control and three different activation tasks, were performed on six right-handed normal volunteers for 2 minutes after bolus injections of 925 MBq $H_2^{15}O$ at the intervals of 30 minutes. Image data were analyzed using SPM96 (Statistical Parametric Mapping) implemented with Matlab (Mathworks Inc., U.S.A.). Images from the same subject were spatially registered and were normalized using linear and nonlinear transformation methods. Significant difference between control and each activation state was estimated at every voxel based on the general linear model. Differences of global counts were removed using analysis of covariance (ANCOVA) with global activity as covariate. Using the mean and variance for each condition which was adjusted using ANCOVA, t-statistics was performed on every voxel To interpret the results more easily, t-values were transformed to the standard Gaussian distribution (Z-score). Results: All the subjects carried out the activation and control tests successfully. Average rate of correct answers was 95%. The numbers of activated blobs were 4 for verbal memory I, 9 for verbal memory II, 9 for visual memory, and 6 for conjunctive activation of these three tasks. The verbal working memory activates predominantly left-sided structures, and the visual memory activates the right hemisphere. Conclusion: We conclude that rCBF PET imaging and statistical parametric mapping method were useful in the localization of the brain regions for verbal and visual working memory.
Purpose: To localize and compare the neural basis of verbal and visual human working memory, we performed functional activation study using $H_2^{15}O$ PET. Materials and Methods: Repeated $H_2^{15}O$ PET scans with one control and three different activation tasks were performed on six right-handed normal volunteers. Each activation task was composed of 13 match-ing trials. On each trial, four targets, a fixation dot and a probe were presented sequentially and subject's task was to press a response button to indicate whether or not the probe was one of the previous targets. Short meaningful Korean words, simple drawings and monochromic pictures of human faces were used as matching objects for verbal or visual memory. All the images were spatially normalized and the differences between control and activation states were statistically analyzed using SPM96. Results: Statistical analysis of verbal memory activation with short words showed activation in the left Broca's area, promoter cortex, cerebellum and right cingulate gyrus. In verbal memory with simple drawings, activation was shown in the larger regions including where activated with short words and left superior temporal cortex, basal ganglia, thalamus, prefrontal cortex, anterior portion of right superior temporal gyrus and right infero-lateral frontal cortex. On the other hand, the visual memory task activated predominantly right-sided structures, especially inferior frontal cortex, supplementary motor cortex and superior parietal cortex. Conclusion: The results are consistent with the hypothesis of the laterality and dissociation of the verbal and visual working memory from the invasive electrophysiological studies and emphasize the pivotal role of frontal cortex and cingulate gyrus in working memory system.
Objective: The 3-dimensional reconstruction method with resolution recovery modeling has advantages of high spatial resolution and contrast because of its precise modeling of spatial blurring according to the distance from detector plane. The aim of this study was to evaluate one of the resolution recovery reconstruction methods (Astonish, Philips Medical), compare it to other iterative reconstructions, and verify its clinical usefulness. Materials and Methods: NEMA IEC PET body phantom and Flanges Jaszczak ECT phantom (Data Spectrum Corp., USA) studies were performed using Skylight SPECT (Philips) system under four different conditions; short or long (2 times of short) radius, and half or full (40 kcts/frame) acquisition counts. Astonish reconstruction method was compared with two other iterative reconstructions; MLEM and 3D-OSEM which vendor supplied. For quantitative analysis, the contrast ratios obtained from IEC phantom test were compared. Reconstruction parameters were determined by optimization study using graph of contrast ratio versus background variability. The qualitative comparison was performed with Jaszczak ECT phantom and human myocardial data. Results: The overall contrast ratio was higher with Astonish than the others. For the largest hot sphere of 37 mm diameter, Astonish showed about 27.1% and 17.4% higher contrast ratio than MLEM and 3D-OSEM, in short radius study. For long radius, Astonish showed about 40.5% and 32.6% higher contrast ratio than MLEM and 3D-OSEM. The effect of acquired counts was insignificant. In the qualitative studies with Jaszczak phantom and human myocardial data, Astonish showed the best image quality. Conclusion: In this study, we have found out that Astonish can provide more reliable clinical results by better image quality compared to other iterative reconstruction methods. Although further clinical studies are required, Astonish would be used in clinics with confidence for enhancement of images.
Inflammatory bowel disease is an immune disorder associated with chronic mucosal inflammation and severe ulceration in the gastrointestinal tract. Antibodies against proinflammatory cytokines, including TNF${\alpha}$, are currently used as promising therapeutic agents against the disease. Stabilization of the transcript is a crucial post-transcriptional process in the expression of proinflammatory cytokines. In the present study, we assessed the expression and histological distribution of the HuR protein, an important transcript stabilizer, in tissues from experimental animals and patients with Crohn's disease. The total and cytosolic levels of the HuR protein were enhanced in the intestinal epithelia from dextran sodium sulfate (DSS)-treated mice compared to those in control tissues from normal mice. Moreover, the expression of HuR was very high only in the mucosal and glandular epithelium, and the relative localization of the protein was sequestered in the lower parts of the villus during the DSS insult. The expression of HuR was significantly higher in mucosal lesions than in normal-looking areas. Consistent with the data from the animal model, the expression of HuR was confined to the mucosal and glandular epithelium. These results suggest that HuR may contribute to the post-transcriptional regulation of proinflammatory genes during early mucosal insults. More mechanistic investigations are warranted to determine the potential use of HuR as a predictive biomarker or a promising target against IBD.
Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
/
v.38
no.4
/
pp.363-373
/
2020
During last decades numerous studies generating orthoimage have been carried out. Traditional methods require exterior orientation parameters of aerial images and precise 3D object modeling data and DTM (Digital Terrain Model) to detect and recover occlusion areas. Furthermore, it is challenging task to automate the complicated process. In this paper, we proposed a new concept of true orthoimage generation using DL (Deep Learning). DL is rapidly used in wide range of fields. In particular, GAN (Generative Adversarial Network) is one of the DL models for various tasks in imaging processing and computer vision. The generator tries to produce results similar to the real images, while discriminator judges fake and real images until the results are satisfied. Such mutually adversarial mechanism improves quality of the results. Experiments were performed using GAN-based Pix2Pix model by utilizing IR (Infrared) orthoimages, intensity from LiDAR data provided by the German Society for Photogrammetry, Remote Sensing and Geoinformation (DGPF) through the ISPRS (International Society for Photogrammetry and Remote Sensing). Two approaches were implemented: (1) One-step training with intensity data and high resolution orthoimages, (2) Recursive training with intensity data and color-coded low resolution intensity images for progressive enhancement of the results. Two methods provided similar quality based on FID (Fréchet Inception Distance) measures. However, if quality of the input data is close to the target image, better results could be obtained by increasing epoch. This paper is an early experimental study for feasibility of DL-based true orthoimage generation and further improvement would be necessary.
The characteristics of the mineralization and geology in the northern Mt. Taebaek mining district are found to be similar with those reported from Nevada district where the Carlin-type gold deposit occurs characteristically as repeated metallic ore deposits in space and time. Though two spots of hs and several spots of Sb anomalies were recognized in the Yeongweol area, they have no relationship with any metalliferous mineralization. On the other hand, two spots of As anomaly in the Jeongseon area have shown to be related with metalliferous ore deposits (mainly Ag-Au), and they are closely associated with Sb anomaly. Some elements of altered limestones in the study such as Au, Ag, As, Sb, Cu, Pb, Zn, and Mo area are closely associated together, and are more enriched in the Jeongseon area than in the Yeongweol area. In particular, Sb and As which may reflect the occurrence of the Carlin-type gold deposit are highly enriched. However, the base metals such af Zn and Pb are highly variable according to samples. The patterns of the enrichment factor for Sb and As, as well as those for Ag and Au, are very similar with those reported from the Carlin-type gold deposits in Nevada. These similarities in elemental distribution may imply that hydrothermal ore mineralization in the study areas was possibly originated from a fluid with the characteristics of the Carlin-type gold mineralization found in Nevada, China, and Indonesia. However, the pattern of base metals and Mo are different. This may result from different chemistry and/or mineralogy of host rock in the study areas.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.