• Title/Summary/Keyword: Damage recognition

Search Result 281, Processing Time 0.022 seconds

A Study on the Methodology of Excavated-Costumes - With a Focus on the Cases of Excavated Costumes from the Grave of Nor Su-ham(1516~1573)'s Family - (출토복식 보수방법에 관한 고찰 - 경주노씨 수함(1516~1573)공(公) 일가(一家) 출토복식 사례를 중심으로 -)

  • Chung, Young-Ran;Song, Mi-Kyung
    • Journal of the Korean Society of Costume
    • /
    • v.63 no.7
    • /
    • pp.65-78
    • /
    • 2013
  • This study aims to suggest the methodology for conservation of excavated costumes especially repair and restoration process. Early excavated costumes had not attracted attention from the field of academia and the public. So not many scholars, organization and society participated in the excavations but as its value has gotten more recognition, there has been a reversal in trend. And so many organizations have taken part in it. Excavating includes conservation processes such as washing, repair and restoring, and then it is published by reports or books after the process is complete. However the method of conservation has varied depending on the institution. In particular, repair and restore methods do not include anything specific details, and often times, only has descriptions of the before and after state, and so a more unified method needs to be suggested and shared. This study defined 'Conservation', 'Repair' and 'Restoration' and then applied it to the short history of Korean excavated-costumes. Then it suggested ways to repair and restore excavated-costumes in terms of construction, textile, and damage by the unpublished cases of excavated-costumes of Noh Su-ham(1516~1573)'s Family. It was also referred to repair and restoration process such as shaping correction, dyeing, supporting, sewing and after treatment by texts and pictures. Other contents such as a list of relics and its details, will be published through a report or a book. The whole process of conservation was in progress based on the ethical guidelines of conservation, 'Minimum intervention' and 'Reversibility'.

Alternative Dispute Resolution for TV Format Disputes (TV포맷 분쟁에 대한 대체적 분쟁해결 방안)

  • Lee, Jae-Kyoung
    • Journal of Arbitration Studies
    • /
    • v.26 no.2
    • /
    • pp.27-44
    • /
    • 2016
  • The use of program formats has slowly but surely developed into an important component of the television industry. This article examines the surprising gap between the constantly growing, multi-billion-dollar trade of program formats and their unclear and contradictory legal treatment. From both the social and commercial standpoints, television formats are valuable creations. Understanding the two products, the paper and program stages, of a television format and their respective markets, is fundamental to discussions of its legal protection. Interestingly, under current law, the less-developed stages of the process (program ideas and paper formats) are awarded more protection than the aired program format, which accumulates higher levels of investment, creativity, and expression. Internal industry mechanisms, such as vertical integration, damage to reputation, and industry institutions, exist in both markets and are still able to control and influence members' behavior to some extent. However, while the influence of internal industry mechanisms is still strong in the paper format market, in the program format market, which continues to grow, such mechanisms have weakened, amplifying the importance of a clear legal system. The absence of protection will certainly not completely eliminate the production of new program formats. However, these factors do not add up to a case against protection. The changes in the program format market in the last two decades support the theory that the overall effect of providing legal protection for TV formats would promote beneficial competition and encourage more original creations. The underlying question for television formats should not be whether to protect but rather how.

Houttuynia cordata Improves Cognitive Deficits in Cholinergic Dysfunction Alzheimer's Disease-Like Models

  • Huh, Eugene;Kim, Hyo Geun;Park, Hanbyeol;Kang, Min Seo;Lee, Bongyong;Oh, Myung Sook
    • Biomolecules & Therapeutics
    • /
    • v.22 no.3
    • /
    • pp.176-183
    • /
    • 2014
  • Cognitive impairment is a result of dementia of diverse causes, such as cholinergic dysfunction and Alzheimer's disease (AD). Houttuynia cordata Thunb. (Saururaceae) has long been used as a traditional herbal medicine. It has biological activities including protective effects against amyloid beta ($A{\beta}$) toxicity, via regulation of calcium homeostasis, in rat hippocampal cells. To extend previous reports, we investigated the effects of water extracts of H. cordata herb (HCW) on tauopathies, also involving calcium influx. We then confirmed the effects of HCW in improving memory impairment and neuronal damage in mice with Ab-induced neurotoxicity. We also investigated the effects of HCW against scopolamine-induced cholinergic dysfunction in mice. In primary neuronal cells, HCW inhibited the phosphorylation of tau by regulating p25/p35 expression in $A{\beta}$-induced neurotoxicity. In mice with $A{\beta}$-induced neurotoxicity, HCW improved cognitive impairment, as assessed with behavioral tasks, such as novel object recognition, Y-maze, and passive avoidance tasks. HCW also inhibited the degeneration of neurons in the CA3 region of the hippocampus in Ab-induced neurotoxicity. Moreover, HCW, which had an $IC_{50}$ value of $79.7{\mu}g/ml$ for acetylcholinesterase inhibition, ameliorated scopolamine-induced cognitive impairment significantly in Y-maze and passive avoidance tasks. These results indicate that HCW improved cognitive impairment, due to cholinergic dysfunction, with inhibitory effects against tauopathies and cholinergic antagonists, suggesting that HCW may be an interesting candidate to investigate for the treatment of AD.

Design and Implementation of Unmanned Surface Vehicle JEROS for Jellyfish Removal (해파리 퇴치용 자율 수상 로봇의 설계 및 구현)

  • Kim, Donghoon;Shin, Jae-Uk;Kim, Hyongjin;Kim, Hanguen;Lee, Donghwa;Lee, Seung-Mok;Myung, Hyun
    • The Journal of Korea Robotics Society
    • /
    • v.8 no.1
    • /
    • pp.51-57
    • /
    • 2013
  • Recently, the number of jellyfish has been rapidly grown because of the global warming, the increase of marine structures, pollution, and etc. The increased jellyfish is a threat to the marine ecosystem and induces a huge damage to fishery industries, seaside power plants, and beach industries. To overcome this problem, a manual jellyfish dissecting device and pump system for jellyfish removal have been developed by researchers. However, the systems need too many human operators and their benefit to cost is not so good. Thus, in this paper, the design, implementation, and experiments of autonomous jellyfish removal robot system, named JEROS, have been presented. The JEROS consists of an unmanned surface vehicle (USV), a device for jellyfish removal, an electrical control system, an autonomous navigation system, and a vision-based jellyfish detection system. The USV was designed as a twin hull-type ship, and a jellyfish removal device consists of a net for gathering jellyfish and a blades-equipped propeller for dissecting jellyfish. The autonomous navigation system starts by generating an efficient path for jellyfish removal when the location of jellyfish is received from a remote server or recognized by a vision system. The location of JEROS is estimated by IMU (Inertial Measurement Unit) and GPS, and jellyfish is eliminated while tracking the path. The performance of the vision-based jellyfish recognition, navigation, and jellyfish removal was demonstrated through field tests in the Masan and Jindong harbors in the southern coast of Korea.

The Rights of Patients as Consumers (환자의 소비자로서 권리)

  • Kwon, Yong Jin;Son, Sang Sik;Lim, Young Deok
    • Health Policy and Management
    • /
    • v.22 no.3
    • /
    • pp.315-346
    • /
    • 2012
  • The legal relationship between patient and physician is legally equal relationship. But, in times past, patients be compelled to sign an unequal contract, substantially. Because of the imbalance between supply and demand in the health care market. Today, the law of supply and demand in the health care market is running well. And as the cognition of citizens' rights grows, the relationship between patient and physician can also get a lot of changes. Patients have the right to know the information about medical care, and to decide whether or not to get treatment including invasions against their own bodies. In other words, Doctors have an obligation to explain to their patients. If doctors did not provide patients sufficient explanation or information, it violates the right of patients. This is a tort, or a breach of contract. To improve the remedy for violation of patient's right, patient is able to be protected by status as consumer. If patient is a kind of consumer in terms of medical consumption, he/she as consumer can enjoy supplementally the consumer's right. The patient as a consumer can exercise now a consumer's right as a constitutional right. In addition, with respect to consumer's rights, Framework Act on Consumers was enacted. This Act is based on constitutional provisions of Article 124 and the Act can be seen as a law that embodies consumer right because the provision of the constitutional law delegates specific contents. In the health care field, patients need to win recognition the statue of the consumer to hold the sovereignty of the consumer. In particular, if patients are consumers, they may be able to make good use of the quickly and efficiently collective dispute resolution and association lawsuit to rescue their damage, the Alternative Dispute Resolution(ADR) of Framework Act on Consumers.

A Study on Security Measure of Step-Wise Project (단계별 프로젝트 보안 방안에 대한 연구)

  • Shin, Seong-Yoon;Jang, Dai-Hyun;Kim, Hyeong-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.11
    • /
    • pp.2459-2464
    • /
    • 2012
  • Many companies has led to the damage case being leaked to personal information by taking cyber attack. Also, planned hacking cases continues to increase for the purpose of acquiring monetary gain or causing social disruption induction, etc. Approximately 75% of the Web site attacks exploit the vulnerability of the application. Major security issue is to strengthen the S/W development security according to the legal basis. The members of the project team is the fact that the lack of recognition of application development security. In addition, passive response and security validation/testing, etc. throughout the SDLC to the entire area is insufficient. Therefore, rework due to the belated discovery of a defect has occurs. In this paper, we examine the case of the project step-by-step security activities by performing IT services companies. And, through this, we present security measures that can be applied to the step-wise real-world projects.

The framework to develop main criteria for a DDoS correspondence (DDoS 대응 지표 프레임워크 개발)

  • Lee, Yeon-Ho;Kim, Beom-Jae;Lee, Nam-Yong;Kim, Jong-Bae
    • Journal of Digital Contents Society
    • /
    • v.11 no.1
    • /
    • pp.79-89
    • /
    • 2010
  • The government and companies build a DDoS correspondence system hastily to protect assets from cyber threats. It has become more and more intelligent and advanced such as DDoS attack. However, when outbreaks of the social incidents such as 7.7 DDoS attack(2009.7.7) or cases of the direct damage occurred, information security systems(ISS) only become the issue in the short term. As usual, sustained investment about ISS is a negative recognition. Since the characteristic of ISS is hard to recognize the effectiveness of them before incidents occurs. Also, results of incidents occurred classify attack and detection. Detailed and objective measurement criterion to measure effectiveness and efficiency of ISS is not existed. Recently, it is progress that evaluation and certification about for the information security management system(ISMS). Since these works propose only a general guideline, it is difficult to utilize as a result of ISMS improvement for organization. Therefore, this paper proposes a framework to develop main criteria by a correspondence strategy and process. It is able to detailed and objective measurements.

Noise Reduction Algorithm using Average Estimator Least Mean Square Filter of Frame Basis (프레임 단위의 AELMS를 이용한 잡음 제거 알고리즘)

  • Ahn, Chan-Shik;Choi, Ki-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.7
    • /
    • pp.135-140
    • /
    • 2013
  • Noise estimation and detection algorithm to adapt quickly to changing noise environment using the LMS Filter. However, the LMS Filter for noise estimation for a certain period of time and need time to adapt. If the signal changes occur, have the disadvantage of being more adaptive time-consuming. Therefore, noise removal method is proposed to a frame basis AELMS Filter to compensate. In this paper, we split the input signal on a frame basis in noisy environments. Remove the LMS Filter by configuring noise predictions using the mean and variance. Noise, even if the environment changes fast adaptation time to remove the noise. Remove noise and environmental noise and speech input signal is mixed to maintain the unique characteristics of the voice is a way to reduce the damage of voice information. Noise removal method using a frame basis AELMS Filter To evaluate the performance of the noise removal. Experimental results, the attenuation obtained by removing the noise of the changing environment was improved by an average of 6.8dB.

Occurrence and damages of Contarinia maculipennis Felt (Diptera: Cecidomyiidae) on Dendrobium phalaenopsis (Asparagales: Orcbidaceae) (서양란에서 양란혹피리(Contarinia maculipennis) 발생 및 피해)

  • Kang, Taek-Jun;Lee, Heung-Sik;Oh, Si-Heon;Cho, Myoung-Rae;Kim, Hyeong-Hwan;Jung, Jae-A
    • Korean journal of applied entomology
    • /
    • v.49 no.4
    • /
    • pp.371-374
    • /
    • 2010
  • The blossom midge, Contarinia maculipennis Felt (Diptera: Cecidomyiidae) originated in Southeast Asia and is present in Japan, the continental USA, and Hawaii. Recently, C. maculipennis was intercepted in Japan, USA and the Netherlands by using orchid flowers imported from Southeast Asian countries. This pest is designated as a quarantine pest in Korea because of its potential damages to vegetables and ornamental plants. In Korea, similar symptoms of damage, which mighty be caused by C. maculipennis, have been investigated in western orchids, especially on Dendrobium phalaenopsis, from Mid-2000s. Official recognition was given to C. maculipennis in 2007, followed by an investigation on the occurrences of C. maculipennis and its damages, mainly on D. phalaenopsis, in 2008~2009. We emphasize caution concerning the possibilities that C. maculipennis could infest flower buds of orchids and carry out management strategies for this pest in the future.

Review on improving measurement of cyber terror management system

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.6
    • /
    • pp.89-96
    • /
    • 2016
  • Damage and attack size of cyber terror is growing to the national size. Not only targeting at a certain companies or individuals but number of cyber terror targeting government bodies or unspecific people is increasing. This is because compared to traditional weapon, input cost is very cheap but ripple effect and shock are much stronger, affecting not only certain groups but also each individuals. 'Anti-terror measurement for protection of nation and public safety' passed last month is one of the renowned measurement passed regardless of objection from opposition party. The opposition party went against this through filibuster for 192 hours but this finally passed National Congress due to lack of oppositions. Korean government is taking post actions after passage of anti-terror measurement. Legislation of enforcement ordinance and regulations is due by 6th of next month. This regulation will be executed from June 4th after legislation. Whenever there is any security issues such as hacking of Korea Hydro and Nuclear Power and National Intelligence Service happens, lot of attention is made to those hackers. However, social recognition or management of those hackers need lot more improvement. Especially, as market of internet of things is increasing, there is an increased anxiety on information security. But as we only rely on security solutions, this problems are keep happening. Therefore, active investment on nurturing hackers who play the role of 'spear and shield' shall be made. Government should put more efforts to allow white hackers to show their abilities. We should have a policy for supporting high-quality programs such as BoB. To make information protection industry into future growth engine, it is necessary to nurture professionals for information protection and white hackers through special programs. Politicians should make related regulations as soon as possible to remove factors that prevent swift management of cyber attack due to lack of legislation. Government should pay lot more financial investment to nurturing professional manpower than now. Protecting life and asset of nation is responsibility and duty of our government. We all should recognize that controlling cyber attack is a part of national defense.