• Title/Summary/Keyword: 이형도

Search Result 7,136, Processing Time 0.034 seconds

The Application of Nature-Based Technologies for Addressing Urban Environmental Problems (도시 환경 문제를 해결하기 위한 자연 기반해법의 적용)

  • Haque, Md Tashdedul;Reyes, Nash Jett DG.;Lee, Jung-min;Guerra, Heidi B.;Jeon, Minsu;Choi, Hyeseon;Kim, Lee-Hyung
    • Journal of Wetlands Research
    • /
    • v.24 no.4
    • /
    • pp.367-376
    • /
    • 2022
  • LID technologies are capable of mitigating the negative impacts of non-point source (NPS) pollution generated in different land uses. Apart from the increase in point and non-point pollutant generation, highly developed and paved areas generally affect microclimate conditions. This study evaluated both the efficiency of Low Impact Development (LID) facilities in treating NPS pollutant loads as well as the unit pollutant loads (UPL) generated in various urban features (such as parking lots and highways). This investigation also looked at how LID technology helped to alleviate Urban Heat Island (UHI) conditions. As compared to the typical unit pollutant loads in South Korea, the unit pollutant loads at Kongju National University were relatively low, because of no classes, limited vehicular transmission, and low anthropogenic activities during vacation. After receiving treatment from the LID facilities, the effluent pollutant loads were significantly decreased. The sedimentation in filtration mechanisms considerably reduced the pollutant fractions in the influent. Additionally, it was shown that LID facilities' mean surface temperatures are up to 7.2℃ lower than the nearby paved environment, demonstrating the LID systems reducing the UHI impact on an urban area.

The Significance of Cancer Stem Cells in Canine Mammary Gland Tumors (개 유선종양 내 종양줄기세포의 중요성)

  • Park, Seo-Young;Baek, Yeong-Bin;Park, Sang-Ik;Lee, Chang-Min;Kim, Sung-Hak
    • Journal of Life Science
    • /
    • v.31 no.2
    • /
    • pp.248-255
    • /
    • 2021
  • Mammary gland tumors are one of the most common cancers in female dogs, and there are various types of cells depending on the tumor type. Complex carcinoma consists of a combination of luminal epithelial and myoepithelial cells with intra-tumoral heterogeneity. However, the origins of these tumor cells and their effects on the malignancies of tumors have not been identified. Recently, it has been reported that cancer stem cells, identified in several types of human tumors, are involved in tumor heterogeneity and may also contribute to malignancies such as tumor recurrence and metastasis. Interestingly, cancer stem cells share several abilities of self-renewal and cell differentiation into multiple types of cancer cells, but they have abnormal genetic mutation and signal transduction pathways to regulate the maintenance of stem cell characters. Moreover, it is known that these cell populations contribute to cell metastasis as well as cell resistance against chemo- and radio-therapeutics that promote tumor recurrence. The existence of cancer stem cells might explain the intra-tumoral heterogeneity and cancer aggressiveness during tumorigenesis in canine mammary gland tumors. This review summarizes the characteristics and types of canine mammary gland tumors, the definition of tumor stem cells, methods of isolation, and clinical significance.

Expression Analysis of OsCPK11 by ND0001 oscpk11 Mutants of Oryza sativa L. under Salt, Cold and Drought Stress Conditions (염분, 저온 및 가뭄 스트레스 조건에서 벼 ND0001 oscpk11 돌연변이체의 OsCPK11 발현 분석)

  • Kim, Hyeon-Mi;Kim, Sung-Ha
    • Journal of Life Science
    • /
    • v.31 no.2
    • /
    • pp.115-125
    • /
    • 2021
  • Calcium-dependent protein kinases (CDPKs) are known to be involved in regulating plant responses to abiotic stresses such as salinity, cold temperature and dehydration,. Although CDPKs constitute a large multigene family consisting of 31 genes in rice, only a few rice CDPKs' functions have been identified. Therefore, in order to elucidate the functions of OsCPK11 in rice, this study was intended to focus on the expression pattern analysis of OsCPK11 in wild type and ND0001 oscpk11 mutant plants under these abiotic stresses. For the salt, cold and drought stress treatment, seedlings were exposed to 200 mM NaCl, 4℃ and 20% PEG 6,000, respectively. RT-PCR and quantitative real-time PCR were performed to determine the expression patterns of OsCPK11 in wild type and ND0001 mutant plants. RT-PCR results showed that OsCPK11 transcripts in the wild type and heterozygous mutant were detected, but not in the homozygous mutant. Real-time PCR results showed that relative expression of OsCPK11 of wild type plants was increased and reached to the highest level at 24 hr, at 6 hr and at 24 hr under salt, cold and drought stress conditions, respectively. Relative expression of OsCPK11 of ND0001 homozygous plant was significantly reduced compared to that of wild type. These results suggested that oscpk11 homozygous mutant knocks out OsCPK11 and OsCPK11 might be involved in salt, cold and drought stress signaling by regulating its gene expression.

Psychological Essentialism and Category Representation (심리적 본질주의와 범주표상)

  • Kim, ShinWoo;Jo, Jun-Hyoung;Li, Hyung-Chul O.
    • Korean Journal of Cognitive Science
    • /
    • v.32 no.2
    • /
    • pp.55-73
    • /
    • 2021
  • Psychological essentialism states that people believe some categories to have hidden and defining essential features which cause other features of the category (Gelman, 2003; Hirschfeld, 1996; Medin & Ortony, 1989). Essentialist belief on categories questions the Roschian argument (Rosch, 1973, 1978) that categories merely consist of clusters of correlated features. Unlike family resemblance categories, essentialized categories are likely to have clear between-category boundaries and high within-category coherence (Gelman, 2003; Prentice & Miller, 2007). Two experiments were conducted to test the effects of essentialist belief on category representation (i.e., between-category boundary, within-category coherence). Participants learned family resemblance and essentialized categories in their assigned conditions and then performed categorization task (Expt. 1) and frequency estimation task of category exemplars (Expt. 2). The results showed, in essentialized categories, both boundary intensification and greater category coherence. Theses results are likely to have arisen due to increased cue and category validity in essentialized categories and suggest that essentialist belief influences macroscopic representation of category structure.

A Study on the Kim Chi-in's Life and Confucianism-Buddhism-Taoism-Unity of Namhak line on Jinan in Junbuk (전북 진안 남학계(南學系) 금치인(金致寅)의 삶과 유불선(儒佛仙) 상합론(相合論) 일고(一攷))

  • Park, Sun-cheul;Lee, Hyung-sung
    • The Journal of Korean Philosophical History
    • /
    • no.32
    • /
    • pp.185-213
    • /
    • 2011
  • This thesis is studing Kim Chi-in's Life and Confucianism-Buddhism-Taoism-Unity of Namhak lind on Jinan in Junbuk. He combined thought of Confucianism-Buddhism-Taoism and drawed up religious doctrine, after spotting internal and external troubles of nation. Kim Chi-in was influenced by Lee Un-gyu's thought of Confucianism-Buddhism-Taoism-Unity. He spoke with emphasis of Tao in doctrine through religious experience. The root of Tao originates in heaven. Although Tao was divided according to Confucianism, Buddhism and Taoism for the human's aspect of thought, it is ultimately the one. In time on explaining the one, he invoked 'eum(陰)', 'yang(陽)', 'che(體)'와 'yong(用)' as concepts of Neo-Confucianism. This ididn't incline to one side of Confucianism, Buddhism and Taoism. While he spoke with emphasis on Confucianism's ethics of 'yang' and 'yong' with Buddhism and Taoism's divine of 'eum' and 'che' as the center, he want to find pivot of thought. He especially seeked Younggamu(詠歌舞) of sing and dancing on training mind and body. This was that he let the people and scholars in retirement demand realization of Tao and aim at real virtue. The study of Kim Chi-in's thought and religion of Confucianism-Buddhism-Taoism-Unity will be an opportunity look around his identity for the traditional native thought and universality.

Anti-inflammatory Activities of Cold Brew Coffee Using Dry Fermentation of Lactobacillus plantarum (건식발효를 이용한 유산균 더치 커피의 항염증 효과)

  • Go, Seok Hyeon;Monmai, Chaiwat;Jang, A Yeong;Lee, Hyungjae;Park, Woo Jung
    • Food Engineering Progress
    • /
    • v.22 no.4
    • /
    • pp.337-343
    • /
    • 2018
  • Coffee is a commonly consumed beverage that contains anti-inflammatory compounds such as caffeine, chlorogenic acid, cafestol, trigonelline, and kahweol. Lactobacillus plantarum is a lactic acid bacterium most frequently used in the fermentation of food products of plant origin. L. plantarum is able to degrade some food phenolic compounds and provide high value-added compounds such as powerful antioxidants or food additives approved as flavouring agents. In this study, we investigated the anti-inflammatory effects of coffee extract fermented by L. plantarum on RAW264.7 macrophages. In lipopolysaccharide-stimulated RAW264.7 cells, these coffee extracts exhibited anti-inflammatory activities through the reduction of nitric oxide (NO) production and inducible NO synthase expression. Fermented coffee extracts significantly decreased the expression of inflammatory cytokines such as tumor necrosis factor ${\alpha}$, interleukin $1{\beta}$, interleukin 6, and interferon ${\gamma}$. Cyclooxygenase-2, which is one of the key biomarkers for inflammation, was significantly suppressed. These results might be helpful for understanding the anti-inflammatory mechanism of fermented coffee extract on immune cells and, moreover, suggest that fermented coffee extract may be a beneficial anti-inflammatory agent.

Message Recovery Fair Blind Multi-Signature Scheme Based on Meta-ElGamal Protocol (Meta-ElGamal 기반 메시지 복원 공정 은닉 다중 서명 기법)

  • 이형우
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.4
    • /
    • pp.23-36
    • /
    • 1999
  • As the blind signature(10) does not reveal any information about the message or its signature it has been used for preventing the information leakage and for providing the anonymity in secure electronic payment systems. Unfortunately this perfect anonymity could be misused by criminals as blind signatures prevent linking the withdrawal of money nd the payment made 표 the same customer. Therefore we should provide publicly verifiable mechanism if it is required for the judge to trace the blackmailed messages. In this paper we propose a modified blind signature scheme which additionally provides the role of message recovery after analyzing the existing meta-ELGamal scheme(12) suggested by Horster. And we suggest a new fair blind multi-signature scheme based on the oblivious transfer protocol with which a judge can publicly verify its fairness and correctness if needed. Proposed scheme can also applicable to the diverse electronic payment applications.

$AB^2$ Semi-systolic Architecture over GF$GF(2^m)$ ($GF(2^m)$상에서 $AB^2$ 연산을 위한 세미시스톨릭 구조)

  • 이형목;전준철;유기영;김현성
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.45-52
    • /
    • 2002
  • In this contributions, we propose a new MSB(most significant bit) algorithm based on AOP(All One Polynomial) and two parallel semi-systolic architectures to computes $AB^2$over finite field $GF(2^m)$. The proposed architectures are based on standard basis and use the property of irreducible AOP(All One Polynomial) which is all coefficients of 1. The proposed parallel semi-systolic architecture(PSM) has the critical path of $D_{AND2^+}D_{XOR2}$ per cell and the latency of m+1. The modified parallel semi-systolic architecture(WPSM) has the critical path of $D_{XOR2}$ per cell and has the same latency with PSM. The proposed two architectures, PSM and MPSM, have a low latency and a small hardware complexity compared to the previous architectures. They can be used as a basic architecture for exponentiation, division, and inversion. Since the proposed architectures have regularity, modularity and concurrency, they are suitable for VLSI implementation. They can be used as a basic architecture for algorithms, such as the Diffie-Hellman key exchange scheme, the Digital Signature Algorithm(DSA), and the ElGamal encryption scheme which are needed exponentiation operation. The application of the algorithms can be used cryptosystem implementation based on elliptic curve.

A Study on Analysis and Development of Education Program in Information Security Major (대학의 정보보호 관련학과 교육과정분석과 모델개발에 관한 연구)

  • 양정모;이옥연;이형우;하재철;유승재;이민섭
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.17-26
    • /
    • 2003
  • Recently, as the internet is widespread rapidly among the public, people can use a variety of useful information services through the internet. Accordingly, the protection of information supplied by computer networks 5 has become a matter of primary concern on the whole world. To accede to the realistic demands, it has been worked out some countermeasures to cultivate the experts in information security by the government and many educational facilities. Already the government authority has carried out the each kinds of concerning projects under the framed a policy, Five-Year Development Plan for Information Security Technology. Also, many domestic universities perceives such an international trend, and so they frame their plans to train for the experts in this field, including to found a department with respect to the information security. They are ready to execute their tangible works, such as establishment of educational goal, development of teaching materials, planning curriculum, construction of laboratories and ensuring instructors. Moreover, such universities lead to their students who want to be information security experts to get the fundamental knowledge to lay the foundation for acquiring the information security technology in their bachelor course. In this note, we survey and analyze the curricula of newly-established or member-extended departments with respect to information security fields of some leading universities in the inside and outside of the country, and in conclusion, we propose the effective model of curriculum and educational goal to train the students for the information security experts.

The Security Analysis of Previous CRT-RSA Scheme on Modified Opcode and Operand Attack (연산자 조작 공격과 피연산자 조작 공격에 대한 기존 CRT-RSA Scheme의 안전성 분석)

  • Hur, Soon-Haeng;Lee, Hyung-Sub;Rhee, Hyun-Seung;Choi, Dong-Hyun;Won, Dong-Ho;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.185-190
    • /
    • 2009
  • As the use of RSA based on chinese remainder theorem(CRT-RSA) is being generalized, the security of CRT-RSA has been important. Since Bellcore researchers introduced the fault attacks on CRT-RSA, various countermeasures have been proposed. In 1999, Shamir firstly proposed a countermeasure using checking procedure. After Shamir's countermeasure was introduced, various countermeasures based on checking procedure have been proposed. However, Shamir's countermeasure was known to be vulnerable to the modified operand attack by Joey et al. in 2001, and the checking procedure was known to be vulnerable to the modified opcode attack by Yen et al. in 2003. Yen et al. proposed a new countermeasure without checking procedure, but their countermeasure was known to be also vulnerable to the modified operand attack by Yen and Kim in 2007. In this paper, we point out that pre, but countermeasures were vulnerable to the modified operand attack or the modified opcode attack.