Bucheon, South Korea
Bucheon, South Korea

Seoul Theological University is an evangelical educational institution founded in 1911 to cultivate Christian workers and leaders on the basis of the traditions and precepts of the Korea Evangelical Holiness Church.The university was established to uphold a higher scholastic standard in conformity with the Wesleyan model of spiritual life so as to apply it to the students in order to cultivate dedicated missionaries who are well balanced with theological knowledge, faith and life experiences. Wikipedia.


Time filter

Source Type

Kim J.Y.,Yonsei University | Lee J.H.,Seoul Theological University | Song H.J.,Yonsei University | Kim D.G.,Yonsei University | Yim Y.S.,Massachusetts Institute of Technology
Health and Social Work | Year: 2017

Women subject to violence by their intimate partners often experience a range of psychosocial problems such as depression, excessive alcohol use, and stressful life events that, in turn, lead to health issues. This study examined psychosocial difficulties and oxidative stress levels in abused and non-abused Korean women and analyzed the relationship between psychosocial outcomes and oxidative stress levels. Markers were determined in 16 women (seven abused, nine non-abused). The two groups of women (abused and non-abused) were compared with respect to scores in depression, alcohol use, life stress events, and oxidative stress biomarkers using the Mann-Whitney U test. Correlations between depression, alcohol use, life stress events, and oxidative stress biomarkers were tested by the Spearman rank correlation coefficient. The abused women had significantly higher levels of oxidative stress markers and significantly lower levels of antioxidants than the non-abused women. Life stress events and oxidative biomarker levels were significantly correlated. These findings have implications for both social services providers and medical personnel when assessing abused women to ensure that they receive the most appropriate service. © 2016 National Association of Social Workers.


PubMed | Chungnam National University and Seoul Theological University
Type: Journal Article | Journal: International journal of impotence research | Year: 2016

Three decades of research have investigated brain processing of visual sexual stimuli with neuroimaging methods. These researchers have found that sexual arousal stimuli elicit activity in a broad neural network of cortical and subcortical brain areas that are known to be associated with cognitive, emotional, motivational and physiological components. However, it is not completely understood how these neural systems integrate and modulated incoming information. Therefore, we identify cerebral areas whose activations were correlated with sexual arousal using event-related functional magnetic resonance imaging and used the dynamic causal modeling method for searching the effective connectivity about the sexual arousal processing network. Thirteen heterosexual males were scanned while they passively viewed alternating short trials of erotic and neutral pictures on a monitor. We created a subset of seven models based on our results and previous studies and selected a dominant connectivity model. Consequently, we suggest a dynamic causal model of the brain processes mediating the cognitive, emotional, motivational and physiological factors of human male sexual arousal. These findings are significant implications for the neuropsychology of male sexuality.


Jung S.-M.,Sungkyunkwan University | Jung J.-K.,Seoul Theological University | Kim T.-K.,Sungkyunkwan University | Chung T.-M.,Sungkyunkwan University
Lecture Notes in Electrical Engineering | Year: 2014

In cloud computing, the computing resources in a different physical location are integrated into various services by a virtualization technology. Cloud computing has currently received significant attention due to its many advantages. However, it has security threats of the traditional IT and also has new security threats caused by the structural features of virtualized environments. In particular, availability attacks are very threatening to cloud computing due to the feature of resource sharing. In this paper, we present the scheme to analyze the workloads by allocation of new virtual machines against availability attacks on system resources. We discuss the additional role of a resource broker to threat detection and apply proper an allocation method. Also, we define some factors and analyze several equations to get a quantitative standard against attacks on system availability. System threats and workloads can be analyzed based on these factors. If some availability attacks are detected, then we can apply a proper allocation method against these attacks by using a proposed scheme. © Springer-Verlag Berlin Heidelberg 2014.


Jung S.-M.,Sungkyunkwan University | Kim T.-K.,Seoul Theological University | Chung T.-M.,Sungkyunkwan University
Lecture Notes in Electrical Engineering | Year: 2013

A wireless sensor network is composed of numerous sensor nodes. There are two kinds of routing protocol for sensor neworks such as a flat-based and a hierarchical-based routing protocol. In a hierarchial-based routing protocol, the role of sensor nodes is different to reduce their energy consumption. In our previous paper, we proposed concentric clustering scheme to reduce the total residual energy of a sensor network. It is one of hierarchical-based routing protocols. There are some simulation result to show that the scheme is better than existing routing protocol. However, their are no consideration of the wireless communication characteristics in this simulation result. We should to apply these characteristics to the scheme to get precise simulation result. In particular, the network letency is important factor in the wireless communication. So, we proposed the approaches to apply network latency by using some equations. We compare a total residual energy between a conecentric clustering scheme with a consideration of network latency and without it. As shown the simulation results, energy consumption from network latency is significant and we should to apply it to get the practical simulation results. © 2013 Springer Science+Business Media.


Jung J.-K.,Sungkyunkwan University | Jung S.-M.,Sungkyunkwan University | Kim T.-K.,Seoul Theological University | Chung T.-M.,Sungkyunkwan University
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2013

Cloud computing is the top issue of IT industry. In addition, the mobile platform has become a major keyword of IT technologies. Thus, we introduce the mobile cloud computing that consist of the union of two concepts. This conflated model can provide a high performance computing in mobile platform. To provide the mobile cloud computing service, it needs various IT technologies. Among these technologies, remote access protocol is one of major issues because it is directly related in a performance of mobile cloud computing. There are two major standard protocols to provide remote access. They are Remote Frame Buffer protocol(RFB protocol) and Remote Desktop Protocol(RDP protocol). RFB protocol relays the view image from a server to a client. It has a simple architecture, but it makes many network traffics structurally. On the other hand, RDP protocol sends the message of a server event to client and the client creates and shows the view image to users. It has smaller traffic than the RFB protocol, but it is only used in Windows platform due to the license problem. The other protocol called SPICE can solve problems from two standard protocols. This protocol has similar architecture to RDP protocol and it is an open-source program. However, SPICE protocol cannot support Android platform now. In this paper, we introduce the way to convert SPICE protocol to support Android platform. However, the modified protocol has some additional delay. Therefore, we also propose the way to enhance the performance of this protocol. It can provide a high performance and be suitable for the mobile cloud. © 2013 Springer-Verlag Berlin Heidelberg.


Kim T.K.,Seoul Theological University | Lim H.J.,Financial Security Agency | Nah J.H.,Electronics and Telecommunications Research Institute
International Journal of Security and its Applications | Year: 2013

In this paper, we proposed the model which can support fraud detection in ICT application service. Fraud detection service monitors and analyzes user activity and behavior at the application level (rather than at the system, database or network level) and watches what transpires inside and across accounts, using any channel available to a user. It also analyzes behavior among related users, accounts or other entities, looking for organized criminal activity, corruption or misuse. This model can be used in e-banking, e-payment, e-government and enterprise remote access, etc. © 2013 SERSC.


Kim T.K.,Seoul Theological University | Nah J.-H.,Electronics and Telecommunications Research Institute
International Journal of Security and its Applications | Year: 2013

In this paper, we proposed the attribute binding based enhanced user authentication. User authentication is a simple process that is used to determine if an identity is real. Age restricted commerce such as lottery, online gaming, wine & spirits, tobacco, social networking, wireless and others are not invulnerable to the risks associated with identity theft and fraud. And, as this dynamic industry continues to grow, only assessing if a customer is of age will no longer be sufficient. Determining a minimum age needs to be combined with gaining a deeper insight into the validity of an identity along with fraud patters to help protect customer privacy, meet compliance and prevent fraud. The suggested model in this paper can be used to protect the child effectively in the internet environments. © 2013 SERSC.


Kim T.K.,Seoul Theological University
International Journal of Applied Engineering Research | Year: 2015

Age verification system in the online environment is used to restrict access to controlled content or as an authentication mechanism. Age verification will be required of ecommerce companies providing adult related content, goods or services. As a society we have established and live by a set of rules designed to keep merchandise and services intended for adults out of the reach of children. Increasing laws and regulations require service providers to provide services based on the age of users. Therefore service provider companies require knowing that the user is above or below an age, or within an age bracket when selling, marketing or distributing age-restricted or age-sensitive products, services or content. However, in the real world, most of service providers have not implemented appropriate age verification models or some have implemented inadequate models. Especially many of the online age verification models are not based on sound privacy principles. In this paper, age verification model which considering user’s privacy is suggested. Also comparisons with other models were performed. The analysis shows that the suggested model can support the user’s privacy and has low risk in online environments. © Research India Publications.


This study aims to examine the beginning and the development of Christian Charities during the 4(th)-6(th) centuries which would eventually result in the birth of the hospital in modern sense in the first half of the 7(th) century. For this purpose, I looked carefully into various primary sources concerning the early Christian institutions for the poor and the sick. Above all, it's proper to note that the first xenodocheion where hospitality was combined with a systematic caring, is concerned with the Trinitarian debate of the 4(th) century. In 356, Eustathios, one of the leaders of homoiousios group, established xenodocheion to care for the sick and the lepers in Sebaste of Armenia, whereas his opponent Aetios, doctor and leader of the heteroousios party, was reckoned to have combined the medical treatment with his clerical activities. Then, Basil of Caesarea, disciple of Eustathios of Sebaste, also founded in 372 a magnificent benevolent complex named 'Basileias' after its founder. I scrupulously analysed several contemporary materials mentioning the charitable institution of Caesarea which was called alternatively katagogia, ptochotropheion, xenodocheion. John Chrysostome also founded several nosokomeia in Constantinople at the end of the 4(th) century and the beginning of the 5(th) century. Apparently, the contemporary sources mention that doctors existed for these Charities, but there is no sufficient proof that these 'Christian Hospitals,' Basileias or nosokomeia of Constantinople were hospitals in modern sense. Imperial constitutions began to mention ptochotropheion, xenodocheion and orphanotropheion since the second half of the 5(th) century and then some Justinian laws evoked nosokomium, brephotrophia, gerontocomia. These laws reveal that 'Christian Hospitals' were well clarified and deeply rooted in Byzantine society already in these periods. And then, new benevolent institutions emerged in the 6(th) century: nosokomeia for a specific class and lochokomeia for maternity. In addition, one of the important functions of Sampson Xenon was, according to Novel 59, to hold a funeral service for the people of Constantinople. Nevertheless, there is no sufficient literary material that could demonstrate the existence of a hospital in modern sense. The first hospital where outpatient service, hospitalization and surgery were confirmed was Sampson Xenon in the first half of the 7th century, figured in the tale of Stephanos of the The Miracles of St. Artemios. Why was the early Byzantine literary so reticent as to write the medical activities in the Christian Charities? It's because Christian innovation didn't rest on the medical treatment but caring for the poor and the sick, depending on the word of Mt. 25.35-36. In this meaning, I'd like to say that the Early Byzantine history of Christian Charities or 'Christian Hospitals' consists of only a footnote of the verse.


Nam S.H.,Seoul Theological University
Korean Journal of Medical History | Year: 2015

This study aims to examine the beginning and the development of Christian Charities during the 4th-6th centuries which would eventually result in the birth of the hospital in modern sense in the first half of the 7th century. For this purpose, I looked carefully into various primary sources concerning the early Christian institutions for the poor and the sick. Above all, it's proper to note that the first xenodocheion where hospitality was combined with a systematic caring, is concerned with the Trinitarian debate of the 4th century. In 356, Eustathios, one of the leaders of homoiousios group, established xenodocheion to care for the sick and the lepers in Sebaste of Armenia, whereas his opponent Aetios, doctor and leader of the heteroousios party, was reckoned to have combined the medical treatment with his clerical activities. Then, Basil of Caesarea, disciple of Eustathios of Sebaste, also founded in 372 a magnificent benevolent complex named 'Basileias' after its founder. I scrupulously analysed several contemporary materials mentioning the charitable institution of Caesarea which was called alternatively katagogia, ptochotropheion, xenodocheion. John Chrysostome also founded several nosokomeia in Constantinople at the end of the 4th century and the beginning of the 5th century. Apparently, the contemporary sources mention that doctors existed for these Charities, but there is no sufficient proof that these 'Christian Hospitals,' Basileias or nosokomeia of Constantinople were hospitals in modern sense. Imperial constitutions began to mention ptochotropheion, xenodocheion and orphanotropheion since the second half of the 5th century and then some Justinian laws evoked nosokomium, brephotrophia, gerontocomia. These laws reveal that 'Christian Hospitals' were well clarified and deeply rooted in Byzantine society already in these periods. And then, new benevolent institutions emerged in the 6th century: nosokomeia for a specific class and lochokomeia for maternity. In addition, one of the important functions of Sampson Xenon was, according to Novel 59, to hold a funeral service for the people of Constantinople. Nevertheless, there is no sufficient literary material that could demonstrate the existence of a hospital in modern sense. The first hospital where outpatient service, hospitalization and surgery were confirmed was Sampson Xenon in the first half of the 7th century, figured in the tale of Stephanos of the The Miracles of St. Artemios. Why was the early Byzantine literary so reticent as to write the medical activities in the Christian Charities? It's because Christian innovation didn't rest on the medical treatment but caring for the poor and the sick, depending on the word of Mt. 25.35-36. In this meaning, I'd like to say that the Early Byzantine history of Christian Charities or 'Christian Hospitals' consists of only a footnote of the verse. © The Korean Society for the History of Medicine.

Loading Seoul Theological University collaborators
Loading Seoul Theological University collaborators