• Title/Summary/Keyword: Trace-back

Search Result 153, Processing Time 0.03 seconds

A Study on the Construction Method of Stone-wall Fortresses in the Recently Surveyed Gyeongsang Province (최근 조사된 경상도 지역 석축산성(石築山城)의 축성법 검토)

  • Park, Jong-ik
    • Korean Journal of Heritage: History & Science
    • /
    • v.46 no.4
    • /
    • pp.126-143
    • /
    • 2013
  • Myeonghwalsanseong Fortress and Namsansinseong Fortress in Gyeongju are one of the few that have accurate records of when and who constructed the structures. Based on the monument commemorating the construction of Myeonghwalsanseong Fortress and the construction technique and structure of the fortresses confirmed through excavation survey, it can be induced that Myeonghwalsanseong Fortress was built prior to the 7th century. Meanwhile, Namsansinseong Fortress is believed to have been erected in 679, with the exception of one part of the wall found in the northwestern valley that was built during the first construction period of 591. Referring to the construction method of these fortresses in the royal capital, Gyeongju, various recentlystudied fortresses were reviewed to estimate the construction periods. As a result, Haman Seongsansanseong Fortress, which takes similar form with Myeonghwalsanseong Fortress, is believed to have been built during the mid-6th century based on the construction method and supplementary work method(i.e. Bochuk). Yangdongsanseong Fortress in Gimhae and Singisanseong Fortress, similar in their construction method, are also believed to be from the same period. Meanwhile, Jusanseong Fortress of Goryeong, despite the similar construction technique used, the construction technique used for Bochuk or limited Bochuk imply a time gap. Separately, most of the remaining walls of Namsansinseong Fortress appear to date back to the additional construction period, and Sageunsanseong Fortress in Hamyang and Dadaesanseong Fortress in Geoje that show similar construction method are set for the same period. Such conclusion was drawn from straight layer piling using the refined rectangular stones found in the fortress and the supplementary part remaining thereof. In addition, the study discovered a cross-section triangular water hole at Yangdongsanseong Fortress in Gimhae and Sageunsanseong Fortress in Hamyang and the trace of wooden fences constructed before the construction of stone-wall, reaping outcomes rarely found in this region.

Determination of Thermoluminescence Properties of MgB4O7 Doped with Dy3+, La3+ and Ho3+ for a Light Tracer Application (비화공식 예광탄 응용을 위한 Dy3+, La3+ 그리고 Ho3+이 도핑된 MgB4O7의 열 발광 특성 분석)

  • Park, Jinu;Kim, Nakyung;Choi, Jiwoon;Koh, Jaehyuk;Chin, Hee Sik;Jung, Duck Hyeong;Shin, Byungha
    • Korean Journal of Materials Research
    • /
    • v.32 no.1
    • /
    • pp.9-13
    • /
    • 2022
  • Bullets flying with a light from the back are called "tracers". Tracers are ignited by the combustion gas of the propellant and emit bright light that allows the shooter to visually trace the flight path. Therefore, tracers mark the firing point for allies to assist shooters to hit target quickly and accurately. Conventional tracers are constructed with a mixture of an oxidizing agent, raw metal, and organic fuel. Upon ignition, the inside of the gun can be easily contaminated by the by-products, which can lead to firearm failure during long-term shooting. Moreover, there is a fire risk such as forest fires due to residual flames at impact site. Therefore, it is necessary to develop non-combustion type luminous material; however, this material must still use the heat generated from the propellant, so-called "thermoluminescence (TL)". This study aims to compare the TL emission of Dy3+, La3+ and Ho3+ doped MgB4O7 phosphors prepared by solid state reaction. The crystal structures of samples were determined by X-ray diffraction and matched with the standard pattern of MgB4O7. Luminescence of various doses (200 ~ 15,000 Gy) of gamma irradiated Dy3+, La3+ and Ho3+ (at different concentrations of 5, 10, 15 and 20 %) doped MgB4O7 were recorded using a luminance/color meter. The intensity of TL yellowish (CIE x = 0.401 ~ 0.486, y = 0.410 ~ 0.488) emission became stronger as the temperature increased and the total gamma-ray dose increased.

Petrological Characteristics and Origin of Volcaniclasts within the Massive Tuff Breccia Formation from Dokdo Island, Korea (독도 괴상 응회질 각력암층에서 나타나는 화산암편의 암석학적 특성과 기원)

  • Shim, Sung-Ho;Im, Ji-Hyeon;Jang, Yun-Deuk;Choo, Chang-Oh;Park, Byeong-Jun;Kim, Jung-Hun
    • The Journal of the Petrological Society of Korea
    • /
    • v.19 no.2
    • /
    • pp.141-156
    • /
    • 2010
  • Dokdo Island, Korea, is located in the East Sea belonging to back arc basin. In this study we examined petrology and geochemistry of massive tuffaceous breccia (MTB) from Dongdo (Eastern islet) and Seodo(Western islet), the two largest islands of Dokdo. Field studies and chemical analysis distinguish the MTB in Dongdo and Seodo. The Dongdo MTB (DMTB) is exposed up to 50 m on the ocean cliff and it has dominant basalt and trachybasalt with moderate amount of trachyte and scoria. On the other hand, Seodo MTB (SMTB), which is preserved between trachyte dike and trachyandesite, is composed of roughly equal amounts of basalt, trachybasalt and trachyte. The location of the islets were related to the source vent having in contact with underlying trachyte lava and differential pyroclastic deposits made them different characteristics. According to trace element analysis of trachytic volcanic clasts, the Ba concentration ranges from 66 to 103 ppm and Sr varies from 44 to 56 ppm in DMTB. However, Br and Sr in SMTB correspondingly showed relatively wide ranges: Br 785-1259 ppm and Sr 466-1230 ppm. These differential trends between DMTB and SMTB, along with the difference in P and Ti, indicate that the crystallization of alkali feldspar, feldspathoid, biotite, apatite and titanium took place differently. Nevertheless, DMTB and SMTB are similar in REE patterns and they are correspondingly characterized by high LREE, low HREE and similar $(La/Yb)_N$ values with 23.9-40.2 in DMTB and 27.4-32.9 in SMTB. These patterns suggest that Dongdo and Seodo might be originated from coeval magma suites. Dokdo island shows high concentrations of Ba, K and Rb. These signatures mark a result attributed to the mantle upwelling because the magma derived from the asthenosphere was metasomatized with subduction-related fluids.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Residue Study for Bisphenol A in Agricultural Reservoirs (농업용 저수지에서 Bisphenol A의 잔류실태조사)

  • Cho, Il Kyu;Nam, Hyo Song;Jeon, Yongbae;Park, Jun sung;Na, Tae Wong;Kim, Back Jong;Kan, Eunsung
    • Korean Journal of Environmental Agriculture
    • /
    • v.35 no.4
    • /
    • pp.270-277
    • /
    • 2016
  • BACKGROUND: Significant amount of bisphenol A has been released from the manufacturing process of plastics, epoxy resins, dental material and flame retardants. Bisphenol A has been detected at trace levels in wastewater, surface water, landfill leachate and drinking water. However, the residual survey of bisphenol A has not been performed in agricultural reservoir beside agricultural environment cultivating crops. This study was conducted to monitor the residual bisphenol A in national agricultural reservoirs and understand a level of contamination of bisphenol A in the agricultural environment in Korea. METHODS AND RESULTS: The water and water sediment were collected at agricultural reservoirs in Chungnam, Chungbuk, Kyunggi, Jeonnam, Jeonbuk, Kyungnam and Kyungbuk province. Bisphenol A was analyzed by the LC-MS/MS with triple quad 4500. The recovery of water and water sediment in the agricultural reservoirs showed the level of 95.7~97.2% and 91.5~100.3%, respectively. CONCLUSION: Bisphenol A was detected at the level of $0.05{\mu}g/L{\sim}0.18{\mu}g/L$ and $0.1{\mu}g/kg{\sim}34{\mu}g/kg$ in water and water sediment of the reservoirs, respectively. Based on the results, the residue of bisphenol A will be tried in the crops surrounding these agricultural reservoirs where bisphenol A detected above $10{\mu}g/kg$ of bisphenol A.

Studies on Partition and Extraction Equilibria of Metal-Dithiocarbamate Complexes(II). Metal Complexes of Ammonium Pyrrolidine Dithiocarbamate (Dithiocarbamate 금속착물의 분배 및 추출평형(제2보). Ammonium Pyrrolidine Dithiocarbamate의 금속착물)

  • Lee, Jong-Sun;Choi, Jong-Moon;Choi, Hee-Seon;Kim, Young-Sang
    • Analytical Science and Technology
    • /
    • v.8 no.3
    • /
    • pp.321-334
    • /
    • 1995
  • Basic studies for the effective extraction of ammonium pyrrolidine dithiocarbamate(APDC) complexes of Co(II), Ni(II) and Cu(II) into a solvent have been performed. The maximum distribution ratio was appeared (log D=1.3543) at pH 2.0 and the partition coefficient was 2.489 in the extraction of $4{\times}10^{-5}M$ APDC itself into chloroform. From the UV/visible spectra of metal-chelates in aqueous and organic solutions, the pH to form stable 1:2 metal-ligand complexes were Co(II):5.0, Ni(II):8.0 and Cu(II):8.0, respectively and only 1 minute was enough to be partitioned into the chloroform. Besides, the partition and extraction equilibria of the complexes were investigated by back-extracting $10.0{\mu}g/ml$ metal-chelates from the solvent into an aqueous solution beacuse of their slight solubilities in the aqueous solution. The distribution coefficients and extractabilities were as follows : at pH 6.5~8.5 of the aqueous solution, log D=2.834 : E(%)=99.9% for $Co(PDC)_2$, at pH 11, log D=5.699 E%=100 for $Ni( PDC)_2$, and at pH 6.0, log D=2.025 : E(%)=99.1% for $Cu(PDC)_2$. And the extraction and formation constants were log $K_{ex}=9.671$ : log ${\beta}_2=6.938$ for $Co(PDC)_2$, log $K_{ex}=9.646$ : log ${\beta}_2=7.071$ for $Ni( PDC)_2$, and log $K_{ex}=9.074$ : log ${\beta}_2=7.049$ for $Cu(PDC)_2$, respectively. From these results, an optimum extraction procedure can be constructed for the separative concentration of trace metallic ions, and the quantitative determination of them in advanced materials and environmental samples will be expected without any influence of sample matrixes.

  • PDF

A Page Replacement Scheme Based on Recency and Frequency (최근성과 참조 횟수에 기반한 페이지 교체 기법)

  • Lee, Seung-Hoon;Lee, Jong-Woo;Cho, Seong-Je
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.469-478
    • /
    • 2001
  • In the virtual memory system, page replacement policy exerts a great influence on the performance of demand paging. There are LRU(Least Recently Used) and LFU (Least Frequently Used) as the typical replacement policies. The LRU policy performs effectively in many cases and adapts well to the changing workloads compared to other policies. It however cannot distinguish well between frequently and infrequently referenced pages. The LFU policy requires that the page with the smallest reference count be replaced. Though it considers all the references in the past, it cannot discriminate between references that occurred far back in the past and the more recent ones. Thus, it cannot adapt well to the changing workload. In this paper, we first analyze memory reference patterns of eight applications. The patterns show that the recently referenced pages or the frequently referenced pages are accessed continuously as the case may be. So it is rather hard to optimize page replacement scheme by using just one of the LRU or LFU policy. This paper makes an attempt to combine the advantages of the two policies and proposes a new page replacement policy. In the proposed policy, paging list is divided into two lists (LRU and LFU lists). By keeping the two lists in recency and reference frequency order respectively, we try to restrain the highly referenced pages in the past from being replaced by the LRU policy. Results from trace-driven simulations show that there exists points on the spectrum at which the proposed policy performs better than the previously known policies for the workloads we considered. Especially, we can see that our policy outperforms the existing ones in such applications that have reference patterns of re-accessing the frequently referenced pages in the past after some time.

  • PDF

An Analysis of Epidemiological Investigation Reports Regarding to Pathogenic E. coli Outbreaks in Korea from 2009 to 2010 (최근 2년간(2009-2010) 우리나라 병원성 대장균 식중독 역학조사 보고서 분석)

  • Lee, Jong-Kyung;Park, In-Hee;Yoon, Kisun;Kim, Hyun Jung;Cho, Joon-Il;Lee, Soon-Ho;Hwang, In-Gyun
    • Journal of Food Hygiene and Safety
    • /
    • v.27 no.4
    • /
    • pp.366-374
    • /
    • 2012
  • Recently pathogenic E. coli is one of the main foodborne pathogens resulting in many patients in Korea. To understand the characteristics of pathogenic E. coli outbreaks in Korea, the epidemiological investigation reports of pathogenic E. coli outbreak in 2009 (41 reports) and in 2010 (27 reports) were collected in the web site of the Korea Centers for Disease Control and Prevention, reviewed and analysed in this study. The main places of the pathogenic E. coli outbreaks were food catering service area (64.8%) and restaurants (25.0%). The main type of the pathogens were EPEC (44.7%) and ETEC (34.2%). EAEC and EHEC was responsible for 10.5 and 9.2%, respectively. Eight of 68 outbreak cases were caused by more than 2 types of pathogenic E. coli which implicates the complicated contamination pathways of pathogenic E. coli. The incidence rate of pathogenic E. coli was $33.6{\pm}30.5%$ and the main symptoms were diarrhea, stomach ache, nausea, vomiting, and fever etc. The two identified food sources were identified as frozen hamburger pattie and squid-vegetable mixture. To improve the food source identification by epidemiological investigation, food poisoning notification to the agency should not be delayed, whole food items attributed the outbreak should be collected and detection method of the various pathogenic E. coli in food has to be improved. In conclusion, the characteristics between the EHEC outbreaks in the western countries and the EPEC or ETEC outbreaks in Korea needs to be distinguished to prepare food safety management plan. In addition, the development of the trace back system to find the contamination pathway with the improved detection method in food and systemic and cooperative support by the related agencies are necessary.

The Usage of the Vulgate Bible in the European Catholicism: from the Council of Trent until the Second Council of Vatican (유럽 천주교의 불가타 성경 사용 양상: 트렌토 공의회 이후부터 2차 바티칸 공의회 이전까지)

  • CHO, Hyeon Beom
    • The Critical Review of Religion and Culture
    • /
    • no.32
    • /
    • pp.257-287
    • /
    • 2017
  • It seems to be quite an ambitious endeavor to trace back the translation history of Catholic Vulgate Bible from Latin language to Asian languages since 16th century. I try to bring out the translation(translative) procedure of Latin Bible to the Chinese Version, which is eventually come up (and the latter)to the Korean Version. It has been supported and funded by the National Research Foundation of Korea. This task has a three-year plan. For the first step(operation), I examined and searched the European situation of the Vulgate Bible in the Catholic Church, i.e. the ritual use of Vulgate Bible in the Mass and the religious retreat. The liturgical texts, to begin with, were analysed to disclose how the Vulgate Bible was reflected in them. The Lectionary and the Evangeliary were the typical ones. The structure or the formation system of the Lectionaries for Mass was based on the liturgical year cycle. From this point, the Vulgate Bible was rooted in the religious life of European Catholics after the Council of Trent which had proclaimed the Vulgate to be authentic source of the Revelation, therefore, to be respected as the only authoritative Bible. How did the Catholic Church use the Vulgate Bible out of the context and the boundary (sphere) of liturgy? The Meditation guide books for the purpose of instructing the religious retreat was published and (diffused) circulated among the priests, the religious persons and even the laymen. In those books also were included (found) the citation, the interpretation and the commentaries of the Vulgate Bible. The most of the devotees in Europe read the biblical phrases out of the meditation guide books. There are still remained the unsolved problems of how to understand (for understanding) the actual aspect of the Vulgate Bible in the European Catholic Church. All the Biblical verses were translated into French and included in the meditation guide books published in France. What did the Holy See think the French translation of the Vulgate Bible? Unfortunately, there were not found the Vatican Decrees about the European translation of the Vulgate Bible. The relationship between the Vulgate Bible and the Meditation guide (Those) will be much important for the study of Chinese translation of it. The search for the Decrees and the researches on it and the European and the non-European translations of the Vulgate Bible will be a continuous task for me as well as the other researchers on these subjects in the future.

A Plan to Activate the Archive of Maeul Communities (마을공동체 아카이브 활성화 방안)

  • Sohn, Dong-you;Lee, Kyoung-juhn
    • The Korean Journal of Archival Studies
    • /
    • no.35
    • /
    • pp.161-206
    • /
    • 2013
  • 'Maeul' is a concept connoting a community. As a place where ordinary people's lives are planned and realized, Maeul is the foundation of their daily lives as well as a place where they work, rest and enjoy pastime activities. In Korea, however, most Maeul communities are dismantled while going though the modern period representing colonization and developmental dictatorship. Growth-oriented industrialization and urbanization turned into such adverse effects as individualization, a sense of loss and a sense of alienation. Recently, through innovations from below, Maeuls are restored, and through Maeul communities restored this way, every Maeul and many researchers carry out activities to build a healthy civil society. This study was conducted on such a background. For a healthy restoration of Maeul communities and a sustainable operation of those communities, it is necessary to establish archives where record the trace of Maeul members' daily lives and relations between those members. The archive of Maeul communities is a place that contains each Maeul's local characteristics as well as human relations as well. It is because this place can be space where Maeul members can record their history, communicate with each other and make a better future. The archive of Maeul communities can be made into various different models, which can be operated by reflecting the identity of a community such as main agents and characteristics, objectives and orientation of objects recorded. Rather than when Maeul communities exist as individuals, they can display more important functions and better effect when they form a network. Therefore, it is needed to provide various and creative methodologies different from the existing government-led record management. Not only on the form of archives, but also all over their functions, such as collection, arrangement, classification, evaluation, management and utilization, Maeul and Maeul residents' norms, orientation and realistic conditions should be thoroughly reflected. Starting from a chance to look back at individuals' lives, the archive of Maeul communities will be a new chapter to restore and build a healthy community in our society and overcome social contradictions from below. Moreover, the archive of Maeul communities has a great significance that it will broaden its prospect creatively with a new paradigm, not only mechanically turning the existing public sector-centered record management into a non-governmental sector.