• Title/Summary/Keyword: 규칙성 효과

Search Result 422, Processing Time 0.025 seconds

Antioxidative Activities of Extracts from Dried Citrus sunki and C. unshiu Peels (진귤 및 온주밀감 진피의 항산화 활성)

  • Hyon, Jae-Seok;Kang, Sung-Myung;Senevirathne, Mahinda;Koh, Won-Joon;Yang, Tai-Suk;Oh, Myung-Cheol;Oh, Chang-Kyung;Jeon, You-Jin;Kim, Soo-Hyun
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.39 no.1
    • /
    • pp.1-7
    • /
    • 2010
  • This study was carried out to investigate total polyphenol contents, total flavonoid contents and antioxidative activities of the methanol extracts from dried Citrus sunki and C. unshiu peels. The dried C. sunki peels displayed higher total polyphenol and flavonoid contents for older dried peels. In contrast, the dried C. unshiu peels displayed higher total polyphenol contents for more recently dried and displayed high total flavonoid contents by order of 2007, 2008 and 2006. DPPH radical scavenging activities of dried C. sunki peels were high by order of 2007 (0.25 mg/mL exception), 2006 and 2008, but C. unshiu peels could not confirm clear regularity. In particular, the dried C. sunki (2008, exception) and C. unshiu peels displayed very high activities of more than 86% in 1.0 mg/mL. Alkyl radical scavenging activities of dried C. sunki peels were higher for older dried peels (2007, 1.0 mg/mL exception), and that of dried C. unshiu peels were higher for more recently dried in below 0.5 mg/mL but were higher for older peels in 1.0 mg/mL. Hydrogen peroxide scavenging activities of dried C. sunki peels were higher for older peels (2007, 2.5 mg/mL exception), on the other hand, dried C. unshiu were higher for more recently dried. In particular, dried C. unshiu peels displayed high activities of more than 85% in 2.5 mg/mL. Hydroxyl radical scavenging activities of dried C. sunki and C. unshiu peels displayed low activities compared to other reactive oxygen species as the range of $49.9\pm2.2\sim63.5\pm0.9$% in 1.0 mg/mL.

Development of Sensor Network Simulator using Machine Instruction-level Discrete-Event Simulation (기계명령어-레벨의 이산-사건 시뮬레이션을 이용한 센서 네트워크 시뮬레이터 개발)

  • Jung Yong-Doc;Kim Bang-Hyun;Kim Tae-Kyu;Kim Jong-Hyun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.769-771
    • /
    • 2005
  • 유비쿼터스 컴퓨팅의 기반 설비인 센서 네트워크는 많은 수의 센서 노드들로 구성되며, 각 센서 노드의 하드웨어는 매우 작은 규모이다. 또한 최소한의 전력 소모를 위하여 센서 노드들은 동적으로 재구성되며, 노드들 간의 통신은 무선 네트워크를 통하여 이루어진다. 센서 네트워크는 구축 목적에 따라 네트워크 토폴로지 및 라우팅 방식이 결정되어야 하고, 이와 더불어 센서 노드의 하드웨어와 소프트웨어도 필요에 따라 다양하게 변경되어야 한다. 따라서 센서 네트워즈가 구현되기 전에 시스템 동작과 성능을 예측할 수 있고 소프트웨어 개발 환경도 제공해주는 시뮬레이터가 사용 가능하다면, 시스템 개발 기간을 크게 단축시킬 수 있을 것이다. 기존의 센서 네트워크 시뮬레이터들은 특별한 응용을 위한 특정 기반의 하드웨어와 운영체제에 국한되어 개발되었기 때문에 다양한 센서 네트워크 환경을 지원하기에는 한계가 있으며, 센서 네트워크 설계상의 주요 요소인 전력 소모량 분석이 포함되지 않았다. 따라서 본 연구에서는 특정한 응용이나 운영체제에 제한을 받지 않으면서 다양하게 센서 네트워크 환경을 설계 및 검증할 수 있고 전력 소모량 추정도 가능한 시뮬레이터를 개발하는 것을 목표로 하였다. 본 연구에서 개발한 시뮬레이터는 기계명령어-레일(machine instruction-level)의 이산-사건 시뮬레이션(discrete-event simulation) 기법을 이용함으로써 실제 센서 노드의 프로그램 실행 및 관련 동작들을 세부적으로 예측하는 데 사용될 수 있도록 하였다. 시뮬레이션의 작업부하(Workload)인 명령어 트레이스(instruction trace)로는 ATmega128L 마이크로컨트롤러용으로 크로스 컴파일된 인텔 헥스-레코드 형식(.hex) 또는 S-레코드 형식(.srec)의 파일을 사용한다.들을 해결하고자 프라이버시보호에 새로운 키 생성 방법을 통한 강력한 프로토콜을 제안 한다.하였으나 사료효율은 증진시켰으며, 후자(사양, 사료)와의 상호작용은 나타나지 않았다. 이상의 결과는 거세비육돈에서 1) androgen과 estrogen은 공히 자발적인 사료섭취와 등지방 침적을 억제하고 IGF-I 분비를 증가시키며, 2) 성선스테로이드호르몬의 이 같은 성장에 미치는 효과의 일부는 IGF-I을 통해 매개될 수도 있을을 시사한다. 약 $70 {\~} 90\%$의 phenoxyethanol이 유상에 존재하였다. 또한, 미생물에 대한 항균력도 phenoxyethanol이 수상에 많이 존재할수록 증가하는 경향을 나타내었다. 따라서, 제형 내 oil tomposition을 변화시킴으로써 phenoxyethanol의 사용량을 줄일 수 있을 뿐만 아니라, 피부 투과를 감소시켜 보다 피부 자극이 적은 저자극 방부시스템 개발이 가능하리라 보여 진다. 첨가하여 제조한 curd yoghurt는 저장성과 관능적인 면에서 우수한 상품적 가치가 인정되는 새로운 기능성 신제품의 개발에 기여할 수 있을 것으로 사료되었다. 여자의 경우 0.8이상이 되어서 심혈관계 질환의 위험 범위에 속하는 수준이었다. 삼두근의 두겹 두께는 남녀 각각 $20.2\pm8.58cm,\;22.2\pm4.40mm$으로 남녀간에 유의한 차이는 없었다. 조사대상자의 식습관 상태는 전체 대상자의 $84.4\%$가 대부분이 하루 세끼 식사를 규칙적으로 하고 있었으며 식사속도는 허겁지겁 빨리 섭취하는 경우가 남자는 $31.0\%$, 여자는 $21.4\%$로 나타났고 이들을 제외한 나머지 사람들은 보통 속도 혹은 충분한 시간을 가지고 식사를 하였

  • PDF

Forward Security Protection Protocol of RFID System using New Key Generation Method (새로운 키 생성 방법을 통한 RFID시스템의 전방위보안성 보호 프로토콜)

  • Cho Jung-Hwan;Cho Jung-Sik;Yeo Sang-Soo;Kim Sung kwon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.19-21
    • /
    • 2005
  • 현대의 산업화 사회에서는 자동인식을 통해서 사람과 사물을 식별하고자 하는 연구들이 진행되고 있다. 그 대표적인 예로 바코드를 이용한 접촉식 판별기술이 있고, 라디오 주파수를 이용한 RFID(Radio Frequency Identification) 기술을 들 수 있다. RFID의 경우는 무선 주파수를 이용하기 때문에 대량의 사물을 동시에 인식 할 수 있다는 장점이 있다. 하지만. 어떠한 상황에서 리더의 요청에 응답을 하는 리더-태그 시스템이기 때문에 사용자의 프라이버시 침해 문제를 야기 할 수 있다. 사용자의 프라이버시 침해문제를 막기 위해서 많은 연구들이 진행되고 있다. 그 중에서, Miyako Ohkubo의 Hash체인을 이용한 프라이버시 보호 기법은 정보유출, 위치추적공격(Location Tracking Attack), 전방위보안성(Forward Security)과 같은 프라이버시 침해문제들로부터 사용자의 프라이버시를 보호 할 수 있는 프로토콜이다. 그러나 Hash함수를 태그에 구현하는 것은 현재까지는 불가능한 상황이다. 또, Martin Feldhofer의 AES(Advanced Encryption Standard)를 사용한 프로토콜은 실제로 태그에 구현 가능하면서 내부구조가 8bit인 AES를 사용함으로써 암호학적인 강도를 높였으나, 프라이버시 침해 문제에서 단점을 드러냈다. 이러한 단점을 보완한 AES기반에서의 개선된 RFID 프라이버시 보호 프로토콜은 실제적으로 태그에 구현 가능한 AES를 이용한 암호화 체인을 통해서 프라이버시 보호에 우수하면서 실제 사용이 가능한 프로토콜을 제안하였다[1]. 그러나, 이 프로토콜은 생성되는 키 값들이 물리적 공격을 통해서 노출이 되었을 때, 이전의 seed값과 키 값들이 노출 되는 단점이 있다. 본 논문에서는 이러한 문제들을 해결하고자 프라이버시보호에 새로운 키 생성 방법을 통한 강력한 프로토콜을 제안 한다.하였으나 사료효율은 증진시켰으며, 후자(사양, 사료)와의 상호작용은 나타나지 않았다. 이상의 결과는 거세비육돈에서 1) androgen과 estrogen은 공히 자발적인 사료섭취와 등지방 침적을 억제하고 IGF-I 분비를 증가시키며, 2) 성선스테로이드호르몬의 이 같은 성장에 미치는 효과의 일부는 IGF-I을 통해 매개될 수도 있을을 시사한다. 약 $70 {\~} 90\%$의 phenoxyethanol이 유상에 존재하였다. 또한, 미생물에 대한 항균력도 phenoxyethanol이 수상에 많이 존재할수록 증가하는 경향을 나타내었다. 따라서, 제형 내 oil tomposition을 변화시킴으로써 phenoxyethanol의 사용량을 줄일 수 있을 뿐만 아니라, 피부 투과를 감소시켜 보다 피부 자극이 적은 저자극 방부시스템 개발이 가능하리라 보여 진다. 첨가하여 제조한 curd yoghurt는 저장성과 관능적인 면에서 우수한 상품적 가치가 인정되는 새로운 기능성 신제품의 개발에 기여할 수 있을 것으로 사료되었다. 여자의 경우 0.8이상이 되어서 심혈관계 질환의 위험 범위에 속하는 수준이었다. 삼두근의 두겹 두께는 남녀 각각 $20.2\pm8.58cm,\;22.2\pm4.40mm$으로 남녀간에 유의한 차이는 없었다. 조사대상자의 식습관 상태는 전체 대상자의 $84.4\%$가 대부분이 하루 세끼 식사를 규칙적으로 하고 있었으며 식사속도는 허겁지겁 빨리 섭취하는 경우가 남자는 $31.0\%$, 여자는 $21.4\%$로 나타났고 이들을 제외한 나머지 사람들은 보통 속도 혹은 충분한 시간을 가지고 식사를 하였다. 평소 식사량은 조금 적게 혹은 적당하게 섭취하는 사람이 대부분이었으며 남자가 여자보다는 배부르게 먹는 경 향이 유의적으로 높았다(p<0.05). 식사는 혼자 하는 경우가 남자

  • PDF

Korean Traditional Fermented Foods - A Potential Resource of Beneficial Microorganisms and Their Applications (한국전통발효식품 - 유익미생물의 잠재적인 자원과 응용)

  • Dharaneedharan, Subramanian;Heo, Moon-Soo
    • Journal of Life Science
    • /
    • v.26 no.4
    • /
    • pp.496-502
    • /
    • 2016
  • This review describes the diversity of Korean fermented foods and their significance as potential sources of probiotic bacteria. Fermented foods consumed in Korea are categorized according to their base material. Fermented foods such as kimchi, meju, doenjang, kangjang, jeotgal, and makgeolli are reported to have significant medicinal properties. These fermented products, which are consumed regularly by local people, are rich sources of beneficial microbes represented by several genera, including Weissella spp., Lactobacillus spp., Leuconostoc spp., Mucor, Penicillium, Scopulariopsis, Aspergillus, Rhodotorula, Candida, Saccharomyces, and Bacillus, as well as lactic acid bacteria. Fermented foods are now taken beyond the boundaries of their use as mere side dishes and are used significantly as a functional as well as medicinal foods. Fermented foods are a rich source of potential natural substances with antioxidant, anticancer, anticholesteric, antiobesitic, and antiaging properties, so that traditional fermented foods used as food supplements can impart health benefits. Publication of scientific studies on the dietary benefits of various fermented foods and growing consciousness about the potential health benefits of traditional fermented food are reflected in the scores of reports currently available in this field. Food microbiologists now have abundant opportunities to explore Korean traditional fermented foods for the isolation of new bacterial strains and to evaluate the potential applications of these strains through microbiological research.

The Study on Casinos & Gaming Industry in South America Based on Market Analysis & Implications (남미 카지노 및 게이밍산업의 이해와 시사점)

  • Lee, Seung-Koo
    • Korean Business Review
    • /
    • v.23 no.2
    • /
    • pp.31-52
    • /
    • 2010
  • The casinos and gaming sector consists of all forms of betting, including commercial, state-run, and charitable operations. The casinos segment comprises gambling in casinos, and includes gaming machine gambling where this occurs on casino premises. The gaming segment covers all other forms of gambling, including national and other lotteries, racing and sports betting, bingo, pachinko, and gaming machines where these are not located on casino premises. All values are stated in terms of gross gaming win. This is the total amount waged by customers minus the total amount paid out to customers as winnings, but before the payment of any applicable taxes, disbursements to charitable or other causes by games established for those purposes, or other expenses. The South American casinos & gaming sector posted strong growth in 2009 and this growth is expected to accelerate during the forecast period. The South American casinos & gaming sector generated total revenues of $9.6 billion in 2009, representing a compound annual growth rate(CAGR) of 15% for the period spanning 2005-2009. In comparison, the Argentinian and Chilian sectors grew with CAGRs of 17% and 21.9% respectively, over the same period, to reach respective values of $2.2 billion and $93.7 million in 2009. The other gaming segment was the sector's most lucrative in 2009, generating total revenues of $7.1billion, equivalent to 74.1% of the sector's overall value. The casino segment contributed revenues of $2.5billion in 2009, equating to 25.9% of the sector's aggregate revenues. The performance of the sector is forecast to accelerate, with an anticipated CAGR of 20.4% for the five year period 2009-2014, which is expected to drive the sector to a value of $24.3 billion by the end of 2014. Comparatively, the Argentinian and Chilian sectors will grow with CAGRs of 10.2% and 7.3% respectively, over the same period, to reach respective values of $3.6 billion and $133.6 million in 2014.

  • PDF

Classification of Multi-temporal SAR Data by Using Data Transform Based Features and Multiple Classifiers (자료변환 기반 특징과 다중 분류자를 이용한 다중시기 SAR자료의 분류)

  • Yoo, Hee Young;Park, No-Wook;Hong, Sukyoung;Lee, Kyungdo;Kim, Yeseul
    • Korean Journal of Remote Sensing
    • /
    • v.31 no.3
    • /
    • pp.205-214
    • /
    • 2015
  • In this study, a novel land-cover classification framework for multi-temporal SAR data is presented that can combine multiple features extracted through data transforms and multiple classifiers. At first, data transforms using principle component analysis (PCA) and 3D wavelet transform are applied to multi-temporal SAR dataset for extracting new features which were different from original dataset. Then, three different classifiers including maximum likelihood classifier (MLC), neural network (NN) and support vector machine (SVM) are applied to three different dataset including data transform based features and original backscattering coefficients, and as a result, the diverse preliminary classification results are generated. These results are combined via a majority voting rule to generate a final classification result. From an experiment with a multi-temporal ENVISAT ASAR dataset, every preliminary classification result showed very different classification accuracy according to the used feature and classifier. The final classification result combining nine preliminary classification results showed the best classification accuracy because each preliminary classification result provided complementary information on land-covers. The improvement of classification accuracy in this study was mainly attributed to the diversity from combining not only different features based on data transforms, but also different classifiers. Therefore, the land-cover classification framework presented in this study would be effectively applied to the classification of multi-temporal SAR data and also be extended to multi-sensor remote sensing data fusion.

Accommodation of Trade Measures for Environment Purposes on the WTO Rules (환경조치의 WTO체제 수용에 관한 연구)

  • Chae, Dae-Seok;Kim, Mie-Jung
    • International Commerce and Information Review
    • /
    • v.13 no.3
    • /
    • pp.433-457
    • /
    • 2011
  • This study attempts to make a constructive contribution to the debate on which WTO rules accommodate trade measures for environmental purposes. Does trade undermine the regulatory efforts of governments. However, the theoretical dimensions are partly addressed on the several key questions. For instances, is economic integration through trade and investment a threat to the environment? to control pollution and resource degradation? Will economic grow driven by trade help us to move towards a sustainable use of the world's environmental resources? The growing world economy has been accompanied by environmental degradation including deforestation, losses in bio-diversity, global warming, air pollution, depletion of the ozone layer, overfishing and so on. The sheer number of us obviously put pressure on natural resources and ecological systems, and this pressure will counting to rise as we grow towards 10 billion in the next century. What is more, there is no indication that consumption per capita is slowing. The perceived costs of acting alone in terms of lost investments and jobs often take the stream out of regulatory initiatives. In the worst case scenario environmental community is fearful that international trade will magnify the effects of poor environmental polices in the world Generally, economic growth drive by trade may speed up the process of environmental degradation unless sufficient environmental safeguards are put in place. Under these circumstances, this paper attempts to make a constructive contribution to the study on which WTO rules accommodate trade measures for environmental purposes.

  • PDF

Design and Analysis of Role-based Security Management Model for Policy-based Security Management in SNMPv3 Network (SNMPv3 통신망의 정책기반 보안관리를 위한 역할기반 보안관리 모델의 설계 및 분석)

  • Ju, Gwang-Ro;Lee, Hyeong-Ho;No, Bong-Nam
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.573-584
    • /
    • 2001
  • Policy-Based Network Management (PBNM) architecture is to meet various needs of network users and to provide effective management facilities in distributed and large scale networks to network managers. In PBNM, network managers perform network management operations by stipulating a set of rules rather than control each network component. On the other hand, providing security services such as authentication, privacy of messages as well as a new flexible and extensible administration framework, SNMPv3 enables network managers to monitor and control the operation of network components more secure way than ever before. Despite of its enhanced security services, SNMPv3 has difficulties in managing distributed, large-scaled network because it does not provide centralized security management facilities. In this paper, we propose a new security model called Role-based Security Management model (RSM) with security management policy to support scalable and centralized security management for SNMP-based networks. Also, the structure and the operation of the security system as well as the efficiency analysis of RSM in terms of security management are also described.

  • PDF

Distributed Table Join for Scalable RDFS Reasoning on Cloud Computing Environment (클라우드 컴퓨팅 환경에서의 대용량 RDFS 추론을 위한 분산 테이블 조인 기법)

  • Lee, Wan-Gon;Kim, Je-Min;Park, Young-Tack
    • Journal of KIISE
    • /
    • v.41 no.9
    • /
    • pp.674-685
    • /
    • 2014
  • The Knowledge service system needs to infer a new knowledge from indicated knowledge to provide its effective service. Most of the Knowledge service system is expressed in terms of ontology. The volume of knowledge information in a real world is getting massive, so effective technique for massive data of ontology is drawing attention. This paper is to provide the method to infer massive data-ontology to the extent of RDFS, based on cloud computing environment, and evaluate its capability. RDFS inference suggested in this paper is focused on both the method applying MapReduce based on RDFS meta table, and the method of single use of cloud computing memory without using MapReduce under distributed file computing environment. Therefore, this paper explains basically the inference system structure of each technique, the meta table set-up according to RDFS inference rule, and the algorithm of inference strategy. In order to evaluate suggested method in this paper, we perform experiment with LUBM set which is formal data to evaluate ontology inference and search speed. In case LUBM6000, the RDFS inference technique based on meta table had required 13.75 minutes(inferring 1,042 triples per second) to conduct total inference, whereas the method applying the cloud computing memory had needed 7.24 minutes(inferring 1,979 triples per second) showing its speed twice faster.

Design and Implementation of a WML Converter and WML Editor for Automatic Generation of Wireless Internet Content (무선 인터넷 컨텐츠의 자동 생성을 위한 WML 변환기와 WML 편집기의 설계 및 구현)

  • Jeon Yun-Ju;Choi Eun-Hye;Jung Hyun-Suk;Cho Hyeyoung;Lee Minsoo;Yong Hwan-Seung
    • The KIPS Transactions:PartD
    • /
    • v.12D no.2 s.98
    • /
    • pp.309-318
    • /
    • 2005
  • In order to present wireless Internet users with previously created HTML contents and applications, it is essential to research and develop the technology to efficiently convert HTML documents into documents and further provide a way to edit the WML documents. This paper describes the design and development of a WML converter and WML editor The WML converter can convert HTML pages in real time into WML documents that are suitable for the WAP environment. The WML editor enables creation and modification of WML documents in a WYSIWYG fashion. These tools enable the previous services based on HTML documents to be easily adapted to the wireless environment. The developed WML converter can be installed on a proxy server to support real time conversion of Web contents. It is superior to other converters in terms of the various image formats it supports and the improvements on the conversion of the link and frame tags. Users can continuously browse via links and also view frames. Automatic dividing of large WML documents into WML cards md user defined conversion rules are also supported. The WML editor is also integrated with the converter and provides an integrated WYSIWYG environment for creating, converting and publishing WML documents.