• Title/Summary/Keyword: 주석자

Search Result 141, Processing Time 0.022 seconds

Process Optimization of ITO Film on PC Substrate Deposited by In-line Sputtering Method for a Resistive-type Touch Panel (인라인 스퍼터링에 의한 저항막 방식 터치패널용 ITO 기판 제조공정 최적화 기술)

  • Ahn, M.H.;Cho, E.S.;Kwon, S.J.
    • Journal of the Korean Vacuum Society
    • /
    • v.18 no.6
    • /
    • pp.440-446
    • /
    • 2009
  • Indium tin oxide(ITO) substrate is one of the key components of the touch panel and its sputtering process is dependent on the characteristics of various touch panel, such as driving type, size of panel, and the intended use. In this study, we optimized the sputtering condition of ITO film on polycarbonate(PC) by using in-line sputtering method for the application to resistive type touch panel. We varied the $O_2$/Ar gas ratio, sputtering power, pressure and moving speed of substrate to deposit ITO films at room temperature with the base vacuum of $1{\times}10^{-6}\;torr$. The sheet resistance and its uniformity, the transmittance, the thickness of the ITO film on PC substrate are investigated and analyzed. The optimized process parameters are as follows : the sheet resistance is $500{\pm}50\;{\Omega}$/□, the uniformity of sheet resistance is lower than 10%, the transmittance is higher than 87 % at 550nm, and the thickness is about 120~250. The optimized deposition conditions by in-line sputtering method can be applied to the actual mass production for the ITO film manufacturing technology.

The Archival Method Study For Female Worker in the 1970s : Focused on (1970년대 여성 노동자 아카이빙 방법론 연구 전시 를 중심으로)

  • Lee, Hye Rin;Park, Ju Seok
    • The Korean Journal of Archival Studies
    • /
    • no.63
    • /
    • pp.145-165
    • /
    • 2020
  • , in collaboration with Mary Kelly, Kay Hunt and Margaret Harrison, tells the story of workers in the 1970s. Since the late 1960s, the world has undergone many political and social changes, and social movements have been active to protect the socially underprivileged, including women, children and workers. This phenomenon led to the diversification of the collection of the general public, the community, and the minority, and the expansion of the artist's political remarks and themes in the art world. , completed in conjunction with these social issues, surveyed and recorded the reality of workers in a factory in London and produced it as a artwork. is a collaborative work of three artists, a record of workers in the 1970s, and a record of the labor situation, factory, and even the history of the region. Therefore, this study examined the methods and features of , which dealt with the lives of women workers in the 1970s, based on social conditions.

A Study on the Safety Improvement of Child Protected Zone (어린이 보호구역의 안전성 향상에 관한 연구)

  • Ju, Seokjun;Jeong, Myeongjin;Kwak, Cheol;Song, Taeseung;Cha, Juhee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.139-147
    • /
    • 2020
  • The number of deaths from child traffic accidents in Korea is currently higher than the average figure of OECD members, and attention needs to be paid to reduce the school zone accident rate. According to the TAAS statistics of the Traffic Accident Analysis System, the number of deaths from traffic accidents in children (under 12 years of age) in Korea has been steadily decreasing recently, but the number of accidents and injuries has been continuously increasing and decreasing. With the number of accidents and injuries of children in Korea continuing to increase and decrease, the number of traffic accidents, deaths, and injuries of children in the school zone (under 12 years of age) has also been on the rise since 2019. Therefore, we were different from the preceding study (Study on Improvement through School Zone Accident Risk Survey, Study on Improvement of Children's Traffic Safety Facilities through Simulation Program). In order to prevent traffic accidents among school zones, which have the highest accident rate among children, a survey was conducted on traffic safety facilities and safety awareness of drivers. After that, we will analyze the problems and present measures for improving traffic safety in the school zone and improving drivers' safety awareness.

Noju Oh Hui-sang's ConfucianismDoctrine and its Characteristics (노주(老洲) 오희상(吳熙常)의 경설(經說)과 그 특징(特徵))

  • Kim, Young-ho
    • The Journal of Korean Philosophical History
    • /
    • no.38
    • /
    • pp.129-162
    • /
    • 2013
  • Noju Oh Hui-sang was a Confucian who was active during the reign of King Sunjo in late Joseon Dynasty and he also was a master of the Sallim faction. Though he is known as an eclectic Neo-Confucian, he had profound knowledge in the study of Confucian classics as well through succeeding the family study handed down by his father Oh Jae-sun and his oldest brother Oh Yun-sang. This thesis hereby examines Noju's Confucianism doctrine and its characteristics. Noju's Confucianism doctrine is characterized significantly with the following aspects. First, its analyses are detailed overall and it annotates chapters and verses mostly related to Neo-Confucian theories on interpretation of the Confucian classics. Second, it conducts in-depth study not only on Chu Hsi's annotation but also on the small commentaries (小注) in Compendium of the Commentaries on Four Chinese Classics (四書集註大全). In terms of Chu Hsi's theory, however, Noju interprets Confucian classics while supplementing shortcomings on Chu Hsi's theory rather than opposing it. For opinions of all philosophers and scholars on small commentaries, it expresses rather critical theories than supporting ones. Third, it quotes many theories not only of Chinese Confucians but also of Korean ones. It mainly introduces theories of Namdang Han Won-jin, including those of Yi Yulgok. Among them, it particularly has frequent quotations from Han Won-jin's Kyoungyigimunrok (經義記聞錄). Fourth, Noju actively acknowledges senior Confucians' theories many times in quoting them but he also daringly points out their errors when a theory is thought not to be appropriate. He indicates errors one by one in theories not only of Uam and Yulgok but even of Mencius. Fifth, it especially discusses Book of Changes (周易) in depth. It tends to criticize Chengzi's I-Chuan (易傳) but accept Chu Hsi's Benyi (本義). It roughly explains Book of Changes in general but seldom directly accounts for trigrams of it other than Qian trigram and it has detailed explanation especially on Xicizhuan (繫辭傳).

Biblical Didactical Implications and Applications of Midrash (미드라쉬의 성서교수학적 함의와 적용)

  • Kim, In Hye;Koh, Won Seok
    • Journal of Christian Education in Korea
    • /
    • v.67
    • /
    • pp.45-75
    • /
    • 2021
  • The purpose of this study is to explore a new paradigm for Bible didactics in the context of the contemporary times and it turns its gaze to the midrash, the old tradition of Hebrew Bible interpretation. In order for the current Bible study to be meaningful and effective in today's situation, it is an effort to connect the Bible and us well, more than educational contents or materials. The word "midrash" itself means "textual interpretation", or "study", derived from the root verb darash, which means "to seek," "to seek with care," "to enquire," "to require" forms of which appear frequently in the Hebrew Bible. Midrash means an exegesis and interpretation of the Hebrew Bible (Torah) as well as a group of works that are the result of specific interpretations of the rabbis. This rabbinical tradition provides specific interpretative guidelines dealing with the Bible. These interpretive guidelines were passed down and formed an attitude of interpreting the Bible that is still relevant today. The rabbinical interpretative guidelines in midrash lead to the discovery of the following biblical didactical meanings. First, the Bible requires an attitude of listening and learning. Second, an attitude of inquiry is needed. Third, an exploration through the empty space is essential. Fourth, it leads us to recognize the importance of mutual respect and communication. Fifth, through the Words that challenge me, the meaning of biblical teaching is discovered. These interpretation guidelines have much in common with Bibliodrama, which applies midrash to the didactic of Bible. Bibliodrama is a dramatic inquiry, where the effect of in-depth inquiry and consideration that midrash aimed at can be expected. In addition, bibliodrama is a process of communal interaction that leads to a new experience and a richer understanding of the Bible through different positions and viewpoints. Exploring the "white fire" of the Bible, we listen to what God says to us, which causes us to change and form an identity. The biblical didactical meaning found in midrash's interpretation guidelines and the biblical didactical application of midrash through the bibliodrama can be presented as a new alternative to Christian education for the past, the present and the future. This will be able to present a new paradigm for biblical didactics with the word of God living and working in the present, not the Bible of the past, which is far from our present life.

Restoration and Scientific Analysis of Casting Bronze Type in Joseon Dynasty (조선왕실 주조 청동활자의 복원과 과학적 분석)

  • Yun, Yong-Hyun;Cho, Nam-Chul;Lee, Seung-Cheol
    • Journal of Conservation Science
    • /
    • v.25 no.2
    • /
    • pp.207-217
    • /
    • 2009
  • After replicating 10 bronze types such as Gyemija, Gyeongjaja, Eulhaeja, etc. before the Imjin war, we studied the change of microstructure from each casting process, method, and alloy ratio by Gyechukja replicated from "Donggukyeojiseungnam". We selected the average of compositions of Eulhaeja in the National Museum of Korea as the standard(Cu 86.7%, Sn: 9.7%, Pb: 2.3%) of bronze types, so we decided on the alloy's composition of Cu 87%, Sn 15%, Pb 8% added to 5% Sn and Pb contents because of evaporating the Sn and the Pb. Before replicating major metal types, we made master-alloy first, melting it again, and then replicated metal types. The composition of the 1'st replicated Gyechukja showed the range of Cu 85.81~87.63%, Sn 9.27~10.51%, Pb 3.05~3.19%. The 2'nd replicated Gyechukja made using the branch metal left after casting the 1st replica. The 2nd replicated Gyechukja showed the composition range of Cu 87.21~88.09%, Sn 9.06~9.36%, Pb 2.80~3.05%. This result decreases a little contents of Sn and Pb as compared with metal types of the 1st replica. However, it's almost the same as the Eulhaeja's average composition ratio in the National Museum of Korea. As a result of observing the microstructure of restored Gyechukja, it showed the dendrite structure of the typical casting structure and the segregation of Pb. There is no big difference of microstructure between the 1st and the 2nd restored metal types, even though the 2nd restored types partially decreases the eutectoid region in comparison with the 1st types. The systematic and scientific restoration experiment of metal types using Joseon period will be showed the casting method and alloy ratio, and this will be of great help to the study of restoration metal types in the future.

  • PDF

The Study on Change of Refractive error and Addition in Progressive Eyeglasses Lens Wearers (누진렌즈안경 착용자의 가입도와 굴절이상 변화에 대한 연구)

  • Joo, Seok-Hee;Shim, Moon-Sik;Shim, Jun-Beom
    • Journal of Korean Ophthalmic Optics Society
    • /
    • v.18 no.4
    • /
    • pp.399-404
    • /
    • 2013
  • Purpose: This study was to analyse the changes of refractive error and addition in progressive eyeglasses lens wearers. Methods: Data of 244 subjects who have been prescribed progressive eyeglasses lenses were used for analysis. The range of age was between 43~69 old years and they visited the optical shop in Gwangju metropolitan city from 2003 to 2013. According to the refractive state and age, The changes of refractive error and addition was analysed respectively. Results: The changes of distance refractive power by refractive error was showed +0.10 D in emmetropia, +0.07 D in myopia, +0.23 D in hyperopia (p=0.000). The change of addition was showed +0.22 D in emmetropia, +0.29 D in myopia, +0.17 D in hyperopia (p=0.000). The changes of distance power and addition by age was +0.08 D distance refractive power, +0.30 D addition in the group of 40~49 old years, +0.17 D distance refractive power, +0.20 D addition in the group of 50~59 old years and +0.15 D distance refractive power, +0.14 D addition in the group of 60~69 old years (p=0.046, p=0.006). Conclusions: The changes of refractive error and addition of progressive eyeglasses lens wearers in all refractive state and age were gradual increase in the direction (+) diopter.

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

Development of Web-Based Assistant System for Protein-Protein Interaction and Function Analysis (웹 기반의 단백질 상호작용 및 기능분석을 위한 보조 시스템 개발)

  • Jung Min-Chul;Park Wan;Kim Ki-Bong
    • Journal of Life Science
    • /
    • v.14 no.6 s.67
    • /
    • pp.997-1002
    • /
    • 2004
  • This paper deals with the WASPIFA (Web-based Assistant System for Protein-protein Interaction and Function Analysis) system that can provide the comprehensive information on Protein-protein interaction and function concerned with function analysis. Different from existing systems for protein function and protein-protein interaction analysis, which provide fragmentary information restricted to specific field, our system furnishes end-user with comprehensive and synthetic information on the input sequence to be analyzed, including function and annotation information, domain information, and interaction relationship information. The synthetic information that our system contains as local databases has been extracted from many resources related to function, annotation, motif and domain by various pre-processing. Employing our system, end-users can evaluate and judge the synthetic results to do protein interaction and function analysis effectively. In addition, the WASPIFA system is equipped with automatic system management and data update function that facilitates system manager to maintain and manage it efficiently.

A Secure and Efficient Method for Detecting Malicious Nodes in MANET (MANET에서 악의적인 노드의 안전하고 효율적인 검출 방안)

  • Lee KangSeok;Choi JongOh;Ji JongBok;Song JooSeok
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.617-622
    • /
    • 2005
  • Lately, the MANET research has focused on providing routing services with security and previous schemes have been proposed for detecting malicious nodes in a MANET. However, they still include some problems which malicious nodes cannot be found when they falsely report other nodes as malicious. Accordingly, we propose a novel and efficient scheme for detecting malicious nodes using report messages and a report table which is consisted of node ID both for suspecting and reporting when the malicious nodes behave normally during the route discovery, but the other hand they drop and modify packets, or falsely report other nodes as malicious during the data transmission. Our proposed scheme is applicable to not only DSR but aiso AODV. And we provide some simulation results of our proposed scheme by comparing general AODV with our proposed scheme. Simulation results show that our Proposed scheme outperforms general AODV in terms of average packet loss ratio and packet delivery ratio.