• Title/Summary/Keyword: library.

Search Result 16,008, Processing Time 0.038 seconds

Social Determinants of Health of Multicultural Adolescents in South Korea: An Integrated Literature Review (2018~2020) (국내 다문화 청소년의 사회적 건강결정요인: 통합적 문헌고찰(2018~2020))

  • Kim, Youlim;Lee, Hyeonkyeong;Lee, Hyeyeon;Lee, Mikyung;Kim, Sookyung;Kennedy, Diema Konlan
    • Research in Community and Public Health Nursing
    • /
    • v.32 no.4
    • /
    • pp.430-444
    • /
    • 2021
  • Purpose: This study is an integrated literature review to analyze health problems and social determinants of multicultural adolescents in South Korea. Methods: An integrative review was conducted according to Whittemore & Knafl's guideline. An electronic search that included publications from 2018 to 2020 in the PubMed, EMBASE, Cochrane Library, CINAHL, RISS, and KISS databases was conducted. Of a total of 67 records that were identified, 13 finally met full inclusion criteria. Text network analysis was also conducted to identify keywords network trends using NetMiner program. Results: The health problems of multicultural adolescents were classified into mental health (depression, anxiety, suicide and acculturative stress) and health risk behaviors (smoking, risky drinking, smartphone dependence and sexual behavior). As social determinants affecting the health of multicultural adolescents, the biological factors such as gender, age, and visible minority, and the psychological factors such as acculturative stress, self-esteem, family support, and ego-resiliency were identified. The sociocultural factors were identified as family economic status, residential area, parental education level, and parents' country of birth. As a result of text network analysis, a total of 41 words were identified. Conclusion: Based on these results, mental health and health risk behaviors should be considered as interventions for health promotion of multicultural adolescents. Our findings suggest that further research should be conducted to broaden the scope of health determinants to account for the effects of the physical environment and health care system.

Detection of Toluene Hazardous and Noxious Substances (HNS) Based on Hyperspectral Remote Sensing (초분광 원격탐사 기반 위험·유해물질 톨루엔 탐지)

  • Park, Jae-Jin;Park, Kyung-Ae;Foucher, Pierre-Yves;Kim, Tae-Sung;Lee, Moonjin
    • Journal of the Korean earth science society
    • /
    • v.42 no.6
    • /
    • pp.623-631
    • /
    • 2021
  • The increased transport of marine hazardous and noxious substances (HNS) has resulted in frequent HNS spill accidents domestically and internationally. There are about 6,000 species of HNS internationally, and most of them have toxic properties. When an accidental HNS spill occurs, it can destroys the marine ecosystem and can damage life and property due to explosion and fire. Constructing a spectral library of HNS according to wavelength and developing a detection algorithm would help prepare for accidents. In this study, a ground HNS spill experiment was conducted in France. The toluene spectrum was determined through hyperspectral sensor measurements. HNS present in the hyperspectral images were detected by applying the spectral mixture algorithm. Preprocessing principal component analysis (PCA) removed noise and performed dimensional compression. The endmember spectra of toluene and seawater were extracted through the N-FINDR technique. By calculating the abundance fraction of toluene and seawater based on the spectrum, the detection accuracy of HNS in all pixels was presented as a probability. The probability was compared with radiance images at a wavelength of 418.15 nm to select abundance fractions with maximum detection accuracy. The accuracy exceeded 99% at a ratio of approximately 42%. Response to marine spills of HNS are presently impeded by the restricted access to the site because of high risk of exposure to toxic compounds. The present experimental and detection results could help estimate the area of contamination with HNS based on hyperspectral remote sensing.

Reversible data hiding technique applying triple encryption method (삼중 암호화 기법을 적용한 가역 데이터 은닉기법)

  • Jung, Soo-Mok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.1
    • /
    • pp.36-44
    • /
    • 2022
  • Reversible data hiding techniques have been developed to hide confidential data in the image by shifting the histogram of the image. These techniques have a weakness in which the security of hidden confidential data is weak. In this paper, to solve this drawback, we propose a technique of triple encrypting confidential data using pixel value information and hiding it in the cover image. When confidential data is triple encrypted using the proposed technique and hidden in the cover image to generate a stego-image, since encryption based on pixel information is performed three times, the security of confidential data hidden by triple encryption is greatly improved. In the experiment to measure the performance of the proposed technique, even if the triple-encrypted confidential data was extracted from the stego-image, the original confidential data could not be extracted without the encryption keys. And since the image quality of the stego-image is 48.39dB or higher, it was not possible to recognize whether confidential data was hidden in the stego-image, and more than 30,487 bits of confidential data were hidden in the stego-image. The proposed technique can extract the original confidential data from the triple-encrypted confidential data hidden in the stego-image without loss, and can restore the original cover image from the stego-image without distortion. Therefore, the proposed technique can be effectively used in applications such as military, medical, digital library, where security is important and it is necessary to completely restore the original cover image.

Study on security requirements for the web based operation system of a shipping company (웹 기반 해운 선사 운영시스템 보안 요구사항 연구)

  • Chung, Up;Moon, Jongsub
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.49-68
    • /
    • 2022
  • The operation system of a shipping company is still maintaining the mainframe based terminal access environment or the client/server based environment. Nowadays shipping companies that try to migrate it into a web-based environment are increasing. However, in the transition, if the design is processed by the old configuration and knowledge without considering the characteristics of the web-based environment and shipping business, various security vulnerabilities will be revealed at the actual system operation stage, and system maintenance costs to fix them will increase significantly. Therefore, in the transition to a web-based environment, a security design must be carried out from the design stage to ensure system safety and to reduce security-related maintenance costs in the future. This paper examines the characteristics of various threat modeling techniques, selects suitable modeling technique for the operation system of a shipping company, applies data flow diagram and STRIDE threat modeling technique to shipping business, derives possible security threats from each component of the data flow diagram in the attacker's point of view, validates the derived threats by mapping them with attack library items, represents the attack tree having various attack scenarios that attackers can attempt to achieve their final goals, organizes into the checklist that has security check items, associated threats and security requirements, and finally presents 23 security requirements that can respond to threats. Unlike the existing general security requirements, the security requirements presented in this paper reflect the characteristics of shipping business because they are derived by analyzing the actual business of a shipping company and applying threat modeling technique. Therefore, I think that the presented security requirements will be of great help in the security design of shipping companies that are trying to proceed with the transition to a web-based environment in the future.

A Scalable Montgomery Modular Multiplier (확장 가능형 몽고메리 모듈러 곱셈기)

  • Choi, Jun-Baek;Shin, Kyung-Wook
    • Journal of IKEEE
    • /
    • v.25 no.4
    • /
    • pp.625-633
    • /
    • 2021
  • This paper describes a scalable architecture for flexible hardware implementation of Montgomery modular multiplication. Our scalable modular multiplier architecture, which is based on a one-dimensional array of processing elements (PEs), performs word parallel operation and allows us to adjust computational performance and hardware complexity depending on the number of PEs used, NPE. Based on the proposed architecture, we designed a scalable Montgomery modular multiplier (sMM) core supporting eight field sizes defined in SEC2. Synthesized with 180-nm CMOS cell library, our sMM core was implemented with 38,317 gate equivalents (GEs) and 139,390 GEs for NPE=1 and NPE=8, respectively. When operating with a 100 MHz clock, it was evaluated that 256-bit modular multiplications of 0.57 million times/sec for NPE=1 and 3.5 million times/sec for NPE=8 can be computed. Our sMM core has the advantage of enabling an optimized implementation by determining the number of PEs to be used in consideration of computational performance and hardware resources required in application fields, and it can be used as an IP (intellectual property) in scalable hardware design of elliptic curve cryptography (ECC).

Sentiment Analysis of Product Reviews to Identify Deceptive Rating Information in Social Media: A SentiDeceptive Approach

  • Marwat, M. Irfan;Khan, Javed Ali;Alshehri, Dr. Mohammad Dahman;Ali, Muhammad Asghar;Hizbullah;Ali, Haider;Assam, Muhammad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.830-860
    • /
    • 2022
  • [Introduction] Nowadays, many companies are shifting their businesses online due to the growing trend among customers to buy and shop online, as people prefer online purchasing products. [Problem] Users share a vast amount of information about products, making it difficult and challenging for the end-users to make certain decisions. [Motivation] Therefore, we need a mechanism to automatically analyze end-user opinions, thoughts, or feelings in the social media platform about the products that might be useful for the customers to make or change their decisions about buying or purchasing specific products. [Proposed Solution] For this purpose, we proposed an automated SentiDecpective approach, which classifies end-user reviews into negative, positive, and neutral sentiments and identifies deceptive crowd-users rating information in the social media platform to help the user in decision-making. [Methodology] For this purpose, we first collected 11781 end-users comments from the Amazon store and Flipkart web application covering distant products, such as watches, mobile, shoes, clothes, and perfumes. Next, we develop a coding guideline used as a base for the comments annotation process. We then applied the content analysis approach and existing VADER library to annotate the end-user comments in the data set with the identified codes, which results in a labelled data set used as an input to the machine learning classifiers. Finally, we applied the sentiment analysis approach to identify the end-users opinions and overcome the deceptive rating information in the social media platforms by first preprocessing the input data to remove the irrelevant (stop words, special characters, etc.) data from the dataset, employing two standard resampling approaches to balance the data set, i-e, oversampling, and under-sampling, extract different features (TF-IDF and BOW) from the textual data in the data set and then train & test the machine learning algorithms by applying a standard cross-validation approach (KFold and Shuffle Split). [Results/Outcomes] Furthermore, to support our research study, we developed an automated tool that automatically analyzes each customer feedback and displays the collective sentiments of customers about a specific product with the help of a graph, which helps customers to make certain decisions. In a nutshell, our proposed sentiments approach produces good results when identifying the customer sentiments from the online user feedbacks, i-e, obtained an average 94.01% precision, 93.69% recall, and 93.81% F-measure value for classifying positive sentiments.

Trends in Domestic and International Clinical Research of Craniosacral Therapy: Scoping Review (두개천골요법의 국내외 임상 연구 동향: 스코핑 리뷰)

  • Kwak, Min-Jae;Han, Yun-Hee;Geum, Ji-Hye;Park, Shin-Hyeok;Woo, Hyeon-Jun;Ha, Won-Bae;Lee, Jung-Han
    • Journal of Korean Medicine Rehabilitation
    • /
    • v.32 no.3
    • /
    • pp.13-27
    • /
    • 2022
  • Objectives This study investigated the trends in domestic and international clinical research in craniosacral therapy, classified as a type of Chuna manual therapy, and suggested further directions in Korean medicine. Methods This scoping review was performed using the Arksey and O'Malley methodological framework and preferred reporting items as per the preferred reporting items for systematic reviews and meta-analyses extension for scoping reviews checklist. Eight electronic databases (PubMed, EMBASE, Cochrane Library, Koreanstudies Information Service System [KISS], KMBASE, Oriental Medicine Advanced Searching Integrated System [OASIS], Research Information Sharing Service [RISS], ScienceON) were searched to identify articles with the search terms "craniosacral therapy" and "cranial osteopathy" until December 2021. Results Forty-five studies were eligible as per our inclusion criteria. Most research studies (n=44) were conducted in the field of medicine and pharmacy, especially in rehabilitation medicine (n=16). As a result of the study design, randomized controlled trials (n=20) were the most common, and chronic pain (n=9) was the most frequently targeted disease, followed by headache (n=7). Thirty-two studies suggested interventions and 20 studies used Upledger's 10-step protocol. The average duration of craniosacral therapy was 41 min per session, administered 1.4 times per week. Outcome measurements were analyzed and categorized with the examination procedure for the patient. Conclusions This is the first scoping review of craniosacral therapy in Korea, and we believe that our findings could support its utility as Chuna. In the future, more studies should be conducted to establish the evidence of clinical efficacy of craniosacral therapy and develop standard techniques in Korean medicine.

A Comparative Study on Effective One-Group Cross-Sections of ORIGEN and FISPACT to Calculate Nuclide Inventory for Decommissioning Nuclear Power Plant

  • Cha, Gilyong;Kim, Soonyoung;Lee, Minhye;Kim, Minchul;Kim, Hyunmin
    • Journal of Radiation Protection and Research
    • /
    • v.47 no.2
    • /
    • pp.99-106
    • /
    • 2022
  • Background: The radionuclide inventory calculation codes such as ORIGEN and FISPACT collapse neutron reaction libraries with energy spectra and generate an effective one-group cross-section. Since the nuclear cross-section data, energy group (g) structure, and other input details used by the two codes are different, there may be differences in each code's activation inventory calculation results. In this study, the calculation results of neutron-induced activation inventory using ORIGEN and FISPACT were compared and analyzed regarding radioactive waste classification and worker exposure during nuclear decommissioning. Materials and Methods: Two neutron spectra were used to obtain the comparison results: Watt fission spectrum and thermalized energy spectrum. The effective one-group cross-sections were generated for each type of energy group structure provided in ORIGEN and FISPACT. Then, the effective one-group cross-sections were analyzed by focusing on 59Ni, 63Ni, 94Nb, 60Co, 152Eu, and 154Eu, which are the main radionuclides of stainless steel, carbon steel, zircalloy, and concrete for decommissioning nuclear power plant (NPP). Results and Discussion: As a result of the analysis, 154Eu and 59Ni may be overestimated or underestimated depending on the code selection by up to 30%, because the cross-section library used for each code is different. When ORIGEN-44g, -49g, and -238g structures are selected, the differences of the calculation results of effective one-group cross-section according to group structure selection were less than 1% for the six nuclides applied in this study, and when FISPACT-69g, -172g, and -315g were applied, the difference was less than 1%, too. Conclusion: ORIGEN and FISPACT codes can be applied to activation calculations with their own built-in energy group structures for decommissioning NPP. Since the differences in calculation results may occur depending on the selection of codes and energy group structures, it is appropriate to properly select the energy group structure according to the accuracy required in the calculation and the characteristics of the problem.

Full-Endoscopic versus Minimally Invasive Lumbar Interbody Fusion for Lumbar Degenerative Diseases : A Systematic Review and Meta-Analysis

  • Son, Seong;Yoo, Byung Rhae;Lee, Sang Gu;Kim, Woo Kyung;Jung, Jong Myung
    • Journal of Korean Neurosurgical Society
    • /
    • v.65 no.4
    • /
    • pp.539-548
    • /
    • 2022
  • Objective : Although full-endoscopic lumbar interbody fusion (Endo-LIF) has been tried as the latest alternative technique to minimally invasive transforaminal lumbar interobody fusion (MIS-TLIF) since mid-2010, the evidence is still lacking. We compared the clinical outcome and safety of Endo-LIF to MIS-TLIF for lumbar degenerative disease. Methods : We systematically searched electronic databases, including PubMed, EMBASE, and Cochrane Library to find literature comparing Endo-LIF to MIS-TLIF. The results retrieved were last updated on December 11, 2020. The perioperative outcome included the operation time, blood loss, complication, and hospital stay. The clinical outcomes included Visual analog scale (VAS) of low back pain and leg pain and Oswestry disability index (ODI), and the radiological outcome included pseudoarthosis rate with 12-month minimum follow-up. Results : Four retrospective observational studies and one prospective observational study comprising 423 patients (183 Endo-LIF and 241 MIS-TLIF) were included, and the pooled data analysis revealed low heterogeneity between studies in our review. Baseline characteristics including age and sex were not different between the two groups. Operation time was significantly longer in Endo-LIF (mean difference [MD], 23.220 minutes; 95% confidence interval [CI], 10.669-35.771; p=0.001). However, Endo-LIF resulted in less perioperative blood loss (MD, -144.710 mL; 95% CI, 247.941-41.478; p=0.023). Although VAS back pain at final (MD, -0.120; p=0.586), leg pain within 2 weeks (MD, 0.005; p=0.293), VAS leg pain at final (MD, 0.099; p=0.099), ODI at final (MD, 0.141; p=0.093) were not different, VAS back pain within 2 weeks was more favorable in the Endo-LIF (MD, -1.538; 95% CI, -2.044 to -1.032; p<0.001). On the other hand, no statistically significant group difference in complication rate (relative risk [RR], 0.709; p=0.774), hospital stay (MD, -2.399; p=0.151), and pseudoarthrosis rate (RR, 1.284; p=0.736) were found. Conclusion : Relative to MIS-TLIF, immediate outcomes were favorable in Endo-LIF in terms of blood loss and immediate VAS back pain, although complication rate, mid-term clinical outcomes, and fusion rate were not different. However, the challenges for Endo-LIF include longer operation time which means a difficult learning curve and limited surgical indication which means patient selection bias. Larger-scale, well-designed study with long-term follow-up and randomized controlled trials are needed to confirm and update the results of this systematic review.

Analysis of the Regional Disparity and Optimal Location of Living SOC - Focused on Core Living Facilities (생활SOC의 지역 간 격차와 최적입지 분석 - 생활거점시설을 중심으로)

  • Lee, Se Young;Kim, Hyun Joong;Yeo, Kwan Hyun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.40 no.3
    • /
    • pp.159-168
    • /
    • 2022
  • Local governments should try to resolve the inequality of living SOC (Social Overhead Capital) and construct spatial information on the location of living SOCs and optimal locations. This study analyzed the accessibility, equity, and optimal location of the living SOC, considering the research needs related to the living SOC. The target facility is core living facilities(a public library, a park, a culture center, and a public daycare center). The analysis area is Suwon city in Gyeonggi province, and the base year of the analysis is 2020. The study calculated accessibility per population in a microscopic neighborhood living area(200m×200m). The Gini coefficient was used to identify the regional disparity in accessibility among Dong regions. The optimal location was explored with the Maximal Covering Location Problem theory. As a result, spatial accessibility of facilities except for public daycare centers revealed a large gap between regions. Areas with excellent accessibility also showed significant variations in the facilities. The regional disparity in living SOC was the largest in culture centers, followed by parks, public daycare centers, and public libraries. The optimal locations for public libraries, parks, and culture centers are concentrated in the old downtown, while those of public daycare centers are found throughout Suwon city. The results of this study are the crucial contents of spatial planning for SOC supply in local governments. Therefore, follow-up studies will be able to refer to the analysis structure and results of the study.