• Title/Summary/Keyword: Vendors

Search Result 466, Processing Time 0.027 seconds

Study on the Assessment of PAHs Content and Risk Exposure of Convergence Herbal Pills (융합 환제의 PAHs 함량 및 위해성 노출 평가에 대한 연구)

  • Kim, Ga-Yeon;Kim, Hyo-Jin;Lee, Sung Deuk;Lee, Young Ki;Yuk, Young Sam
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.75-84
    • /
    • 2018
  • This study investigated the pollution status of polycyclic aromatic hydrocarbons (PAHs) such as benzopyran, which is a harmful substance, in convergence herbal pills distributed in Seoul. During 2010 ~ 2013, 31 items and 93 samples were collected from the herbal medicines vendors in Seoul, and the samples were extracted, filtered, concentrated, and then spun out with SPE (Sep-pak florisil) and concentrated again and analyzed by liquid chromatography. The results of the analysis showed that the average contents of PAHs were below $10{\mu}g/kg$, and the PAHs were lower than those of daily life exposure, and MOEs was evaluated as safe to a negligible level. In the future, comparative fusion studies on the harmful substances of medicinal pills and food pills are needed.

Update of Head and Neck Cancer Staging in the 8th Edition Cancer Staging Manual of the American Joint Committee on Cancer (두경부암 병기 설정의 최신 변화: AJCC 암 병기설정 매뉴얼8판)

  • Hong, Hyun Jun
    • Korean Journal of Head & Neck Oncology
    • /
    • v.33 no.2
    • /
    • pp.9-15
    • /
    • 2017
  • The recently released the $8^{th}$ edition of the American Joint Committee on Cancer (AJCC) Staging Manual introduces significant modifications from the prior $7^{th}$ edition. In this paper, the contents of the new changes in the decision of cancer of the head and neck is summarized except changes in staging of skin and thyroid cancer. In addition to the 8th edition, 1) Addition of extracapsular involvement in metastatic lymph nodes (N category) 2) Oral cancer T classification change, 3) Staging of the pharyngeal cancer was divided into 3 chapters: high-risk human papilloma virus (HR-HPV) associated oropharyngeal cancer (OPC), non HR-HPV associated OPC and hypopharynx cancer (HPC), and nasopharynx cancer (NPC) 4) Changes in T and N classification in NPC, 5) In the case of cancer of unknown primary, P16-positive case is defined as HR-HPV related OPC, and EBV-positive case is defined as NPC. The process that led to these changes highlights the need to collect high-fidelity cancer registry-level data that can be used to confirm prognostic observations identified in institutional data sets. Clinicians will continue to use the latest information for patient care, including scientific content of the 8th Edition Manual. All newly diagnosed cases through December $31^{st}$ 2017 should be staged with the 7th edition. The time extension will allow all partners to develop and update protocols and guidelines and for software vendors to develop, test, and deploy their products in time for the data collection and implementation of the 8th edition in 2018. The 8th edition strikes a balance between a personalized, complex system and a more general, simpler one that maintains the user-friendliness and worldwide acceptability of the traditional TNM staging paradigm.

Development Integrated Retrieval Methods for OpenAPIs and Mashup Capable Services in u-GIS Environments (u-GIS 환경에서 OpenAPI와 매쉬업 가능 서비스에 대한 통합 검색 기법 개발)

  • Chun, Dong-Suk;Cha, Seung-Jun;Kim, Kyong-Ok;Lee, Kyu-Chul
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.1
    • /
    • pp.25-34
    • /
    • 2009
  • As the trend of the Web is changing toward 'Web 2.0', OpenAPIs, Web 2.0's core technology, are used in many web sites. In the past, services in websites are used in its own, but recently it is possible to use services in other websites by using OpenAPI. In u-GIS many vendors also can provide combined service by using OpenAPI. There are already lots of OpenAPIs and the numer of OpenAPI increases very fast. So it is difficult to find a service that we want to use, and also difficult to find services for mashup. In this paper, we developed retrieval methods for OpenAPIs and mashup capable services based on similarity. First we define the integrated service information model to cover various protocols of OpenAPI, then developed a retrieval methods based on it. By implementing system according these methods by using relational database and JSP, we prove that the system can provide an ranked result sets based on similarity, OpenAPI's integration retrieval results and mashup capable service retrieval results.

  • PDF

The Study of the Distribution and Maintenance System of the KOLAS for Public Libraries (공공도서관 KOLAS 보급 및 유지 보수체계에 대한 연구)

  • Kwak, Chul-Wan;Kwak, Seung-Jin;Kang, Hyun-Woo
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.46 no.3
    • /
    • pp.297-317
    • /
    • 2012
  • The purpose of this study is to identify the problems of the distribution and maintenance of the KOLAS, and provide the developmental direction of the KOLAS. The research methods for this study are both survey and field interview. The results show that first, the National Library of Korea should continue to distribute the KOLAS to public libraries, and second, there are a lot of problems for maintenance of the KOLAS. However, some of the problems of KOLAS could be resolved, but not all of them. Thus, this study proposes the developmental plan of the KOLAS for future. The National Library of Korea should open the KOLAS to open source software for public, so that libraries and vendors may develop new ILS based upon the KOLAS.

An Empirical Study on Mobile Technology Adoption based on the Technology Acceptance Model and Theory of Planned Behavior (기술수용모델(TAM)과 계획된 행동이론(TPB)를 바탕으로 한 모바일 기술수용에 대한 실증적 연구)

  • Lee, Sang-Gun
    • Information Systems Review
    • /
    • v.7 no.2
    • /
    • pp.61-84
    • /
    • 2005
  • Previous studies indicate that information and communication technology (ICT) adoption is affected by innovation influence such as usefulness, ease of use and self-efficacy. Most of these studies, how-ever, bypassed imitation influence such as subjective norms, word-of-mouth, and advertising, specifically, interactive innovation having critical mass in technology acceptance research. Thus, this study focuses to investigate imitation influence in individual adoption of mobile communication technology. The purpose of this study is to empirically examine the causal relationships between initial acceptance and the intention to use in terms of a holistic approach. The results of this study show that there is an imitation influence including word-of-mouth and subjective norms, from the prior adopters to potential adopters, and mass advertising through TV or news-paper commercials in the ICT diffusion process. In addition, this imitation influence also stimulates innovation influence such as perceived usefulness. Finally, this study provides a set of guidelines to mobile communication equipment manufacturers and ICT vendors in developing effective strategies for technology diffusion.

Efficient Software Licensing Management Strategy for Server Consolidation and Virtualization Using the N-Datacenter Case (서버통합 및 가상화를 위한 효율적인 소프트웨어 라이선싱 관리전략에 관한 연구 : N-데이터센터를 중심으로)

  • Choi, Young-Jin;Ra, Jong-Hei;Choi, Kwang-Don
    • Journal of Information Technology Services
    • /
    • v.10 no.4
    • /
    • pp.281-293
    • /
    • 2011
  • Server consolidation and virtualization have become an integral part of IT planning to reduce TCO cost and ensure the high availability for customer, enlarge the flexibility to computing resource in today' enterprise data centers. In spite of having the variety advantages of server consolidation and virtualization, they cause many problems such as the software licensing issues, virtual server sprawl, network complexity issues, hardware start-up costs, and failover costs. In particular, software licensing problem brings about the serious results in operating of data center and also presents a significant challenge to virtualization because many vendors have realized that licensing policies applicable to physical systems are not compatible with virtual machines. So, the IT planers must be considering this problem before they conducts the server consolidation and virtualization. In this paper, we proposed the efficiency strategy of SW licensing for server consolidation and virtualization analyzing the N-Datacenter case in Korea. As a result, we suggest the two strategies as technical and management/contract aspect. First, as the technical aspect, we propose i) the adaptation of suitable licensing for virtualization, ii) differentiation of license according to the characteristics of server, iii) the core distribution of licenses to minimizing. Second, as the management/contract aspect, we suggest following three things. i) The existing license agreement is changed to the right licensing for virtualization. ii) The license agreement is contracts the active focused. iii) When a new contract should be added to virtualization provisions.

Establishment Construction Enterprise Resource Planning(ERP) & Construction Information Sttategy (건설정보화 전략과 ERP구축)

  • Lee Min-Nam;Oh Dong-Hwan
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.164-170
    • /
    • 2003
  • This paper is to evaluate the informational direction, current situations and ERP establishment concerning constructing industry, to present the right directions, implemented cases for implementing constructional ERP, also to suggest the effect, influence, problems and shootings in constructional ERP arena. The constructing industries in korea are facing great turning point because of the huge corruptions currently happened and forcing to open the market in 1997. Attempting to establish Computer Integrated construction system (ERP) by breaking down constructing cost, improving quality, operating rapid and effective construction to enhance productivity, it is hard to achieve the goal with only inter-contractor's establishment. Constructing industries are integrated ones, consisted of many organizations for instance ordering agencies, contractors, subcontractors, material vendors, etc. and use various information formats such as texts, graphics, drawings. I dare suggest that implementation of constructional CALS including EDI/EC, GIS is tile only solution to control the information systematically generated in whole stages from planing, designing, constructing through maintenance, and to supply or switch the information.

  • PDF

Design of DRM System for Secure Contents Transfer in Home Domain (홈 도메인에서 안전한 콘텐츠 전송을 위한 DRM 시스템의 설계)

  • Lee, Chang-Bo;Kim, Jung-Jae;Moon, Ju-Young;Lee, Kyung-Seok;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.221-228
    • /
    • 2007
  • For the usage of the different standard technology among DRM vendors, the DRM technologies in today could not guarantee the interoperability between the digital contents and digital devices. While users have been guaranteed the protection of contents, they have to put up with the limitation and inconvenience. The Superdistribution methods that InterTrust has proposed is the content distribution technology which is possible to use the content only by the user authentication with the license regardless of the acquisition of the DRM contents. However, it need a additional license with re-authentication from DRM server when the original contents need to be moved to other devices from the own device. In this paper, to reduce the inconveniences of re-authentication and re-issue procedures of the license and continually to protect the rights of contents on the offline, we propose the DRM system that creates domain between home devices and enable users to freely transfer contents with the domain.

A Study on the Stock Price Fluctuation of Information Security Companies in Personal Information Leakage (개인정보 유출 사고 시 정보보호 기업의 주가 변동에 관한 연구)

  • Kim, Min-Jeong;Heo, Namgil;Yoo, Jinho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.275-283
    • /
    • 2016
  • Currently Internet and IT infrastructure of Korea has maintained the world's highest levels. But in another aspect, security incident, especially personal information breaches occur frequently. As personal information leakage happened, the companies will be negatively affected. And to prevent this, they have implemented to use a variety of security solutions from information security vendors. Therefore we set up hypotheses that the companies experienced personal information leakage as well as information security companies providing security solutions will be affected by the leakages. So this paper verify hypotheses about the impact of the value of information security companies, through analysing stock price fluctuation of the companies. We found that the stock price of information security companies has increased as personal information leakage happened. And differences according to leakage volumes and types of business are not statistically significant. But there are significant differences according to business classification of information security companies.

Semantics-Preserving Mutation-Based Fuzzing on JavaScript Interpreters (자바스크립트 엔진에 대한 시맨틱 보존적 변이기반 퍼징)

  • Oh, DongHyeon;Choi, JaeSeung;Cha, SangKil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.573-582
    • /
    • 2020
  • Fuzzing is a method of testing software by randomly generating test cases. Since its introduction, a variety of fuzzing techniques have been studied. Among them, mutation-based fuzzing is an efficient method that finds real-world bugs even though it uses a simple approach such as probabilistic bit-flipping and character substitution. However, the interpreter fuzzing has difficulty in applying general mutation techniques because the interpreter requires grammar and semantic correctness input values. In this paper, we present a novel mutation-based fuzzing on JavaScript interpreters with a dynamic data flow analysis. To this end, we implement JMFuzzer that can generate various types of mutated test cases that operate normally without runtime errors in JavaScript interpreter considering syntax and semantics. As a result, we found numerous unknown vulnerabilities in the latest JavaScript interpreters. We reported all of them to the vendors.