• Title/Summary/Keyword: 인터넷 이용

Search Result 11,438, Processing Time 0.041 seconds

A Web-based Internet Program for Nutritional Assessment and Diet Prescription by Renal Diseases (웹기반의 신장질환별 영양평가 밑 식사처방 프로그램)

  • 한지숙;김종경;전영수
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.31 no.5
    • /
    • pp.847-885
    • /
    • 2002
  • The purpose of this study was to develop a web-based internet program for nutritional assessment and diet Prescription by renal diseases. Renal diseases were classified by nephrotic syndrome, renal failure, hemodialysis and peritoneal dialysis. The system consisted of five parts according to their functions and contents. The first part is to assess the general health status such as body weight, obesity index, basal metabolic rate and total energy requirement by the input of age, sex, height, weight and degree of activity. The second part was designed to investigate dietary history of patient, that is, to find out his inappropriate dietary habit and give him some suggestions for appropriate dietary behavior by investigating his dietary history. This part also offers the diet and nutrition management by personal status with renal disease, and the information for food selection, snacks, convenience foods, dine-out, behavioral modification, cooking methods, food exchange lists and terms. The third part is evaluating their energy and nutrients intake by comparing with recommended dietary allowance for Koreans or standardized data for patient with renal disease. In this part, it is also analyzing energy and nutrients of food consumed by food group and meals, and evaluating the status of nutrient intake. The fort]1 one, a major part of the system, is implementing the diet and menu planning by using food exchange lists. This Part Provides the patient with menus lists and I day menu suitable to his weight, activity and the status of renal disease. The fifth part is providing information on energy and nutrients of foods and drinks, and top 20 foods classified by nutrients. These results are finally displayed as tabular forms and graphical forms on the computer screen.

Simultaneous Determination of Non-steroidal Anti-inflammatory Drugs and Corticosteroids Added to Foods as Adulterants using LC-ESI-tandem Mass Spectrometry (LC/ESI-MS/MS를 이용한 식품 중 불법적으로 첨가된 비스테로이드성 소염진통제 및 스테로이드 의약품 동시분석)

  • Lee, Yongcheol;Park, Ju-Sung;Kim, Sung-Dan;Yang, Hye-Ran;Kim, Eun-Hee;Yi, Yun-Jung;Cho, Sung-Ja;Jo, Han-Bin;Kim, Jung-Hun;Chae, Young-Zoo
    • Journal of Food Hygiene and Safety
    • /
    • v.28 no.3
    • /
    • pp.247-251
    • /
    • 2013
  • The objective of present study was to develop a simultaneous determination method of 5 medical compounds, including beclomethasone, dexamethasone, prednisolone, ketoprofen, phenylbutazone in foods, using LC-MS/MS. To optimize MS analytical condition of 5 compounds, each parameter was established by MRM mode. The chromatographic separation was achieved on a C18 column successfully, with a mobile phase made up of A (0.1% formic acid) and B (0.1% formic acid in acetonitrile), at a flow rate of 0.3 mL/min for 17 min with a gradient elution. LOD and LOQ of 5 compounds were in the range of 0.40~4.60 ng/mL and 0.81~11.46 ng/mL, respectively. As a result of analyzing the three concentrations of the standard mixture added to blank samples, the results showed that the mean recovery rate of 5 compounds was in the range of 81.52~103.83%, and RSD (%) of Intra- and Inter-day assay were 0.52-10.45. Since relatively fine selectivity, accuracy and reproducibility were shown in this qualified experimental method, it could be utilized efficiently to investigating those 5 compounds to see if it is added to food products illegally.

A Study on Mobile Antenna System Design with Tri-band Operation for Broadband Satellite Communications and DBS Reception (광대역 위성 통신/방송용 삼중 대역 이동형 안테나 시스템 설계에 관한 연구)

  • Eom Soon-Young;Jung Young-Bae;Son Seong-Ho;Yun Jae-Seung;Jeon Soon-Ick
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.17 no.5 s.108
    • /
    • pp.461-475
    • /
    • 2006
  • In this paper, it is described about the tri-band mobile antenna system design to provide broadband multimedia and direct broadcasting services using goo-stationary Koreasat 3, simultaneously operated in Ka/K/Ku band. The radiating part of the antenna system with a fan beam characteristic in the elevation plane is composed of the quasi-offset dual shaped reflector and the tri-band feeder. The tri-band feeder is also composed of the Ka/K dual band feeder with the protruding dielectric rod, the circular polarizer, the ortho-mode transducer and the circular-polarized Ku band feed array. Especially, the Ka/K dual band circular polarizer was realized firstly using the comb-type structure. For fast satellite-tracking on the movement, the Ku band feed array has the structure of the $2{\times}2$ active phased array which can make electrical beams. And, the circular-polarized characteristic in the feed array was improved by $90^{\circ}$ rotating arrangement of four radiating elements polarized circularly by a $90^{\circ}$ hybrid coupler, respectively. Four beam forming channels to make electrical beams at Ku band are divided into the main beam channel and the tracking beam channel in the output, and noise temperature characteristics of each channel were analyzed on the basis of the contributions of internal sub_units. From the fabricated antenna system, the output power at $P_{1dBc}$ of Ka_Tx channel was measured more than 34.1 dBm and the measured noise figures of K/Ku_Rx channels were less than 2.4 dB and 1.5 dB, respectively, over the operating band. The radiation patterns with co- and cross-polarization in the tri-band were measured using a near-field measurement in the anechoic chamber. Especially, Ku radiation patterns were measured after correcting each initial phase of active channels with partial radiation patterns obtained from the independent excitation of each channel. The antenna gains measured in Ka/K/Ku band of the antenna system were more than 39.6 dBi, 37.5 dBi, 29.6 dBi, respectively. And, the antenna system showed good system performances such as Ka_Tx EIRP more than 43.7 dBW and K/Ku_Rx G/T more than 13.2 dB/K and 7.12 dB/K, respectively.

Performance Analysis of Implementation on IoT based Smart Wearable Mine Detection Device

  • Kim, Chi-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.51-57
    • /
    • 2019
  • In this paper, we analyzed the performance of IoT based smart wearable mine detection device. There are various mine detection methods currently used by the military. Still, in the general field, mine detection is performed by visual detection, probe detection, detector detection, and other detection methods. The detection method by the detector is using a GPR sensor on the detector, which is possible to detect metals, but it is difficult to identify non-metals. It is hard to distinguish whether the area where the detection was performed or not. Also, there is a problem that a lot of human resources and time are wasted, and if the user does not move the sensor at a constant speed or moves too fast, it is difficult to detect landmines accurately. Therefore, we studied the smart wearable mine detection device composed of human body antenna, main microprocessor, smart glasses, body-mounted LCD monitor, wireless data transmission, belt type power supply, black box camera, which is to improve the problem of the error of mine detection using unidirectional ultrasonic sensing signal. Based on the results of this study, we will conduct an experiment to confirm the possibility of detecting underground mines based on the Internet of Things (IoT). This paper consists of an introduction, experimental environment composition, simulation analysis, and conclusion. Introduction introduces the research contents such as mines, mine detectors, and research progress. It consists of large anti-personnel mine, M16A1 fragmented anti-mine, M15 and M19 antitank mines, plastic bottles similar to mines and aluminum cans. Simulation analysis is conducted by using MATLAB to analyze the mine detection device implementation performance, generating and transmitting IoT signals, and analyzing each received signal to verify the detection performance of landmines. Then we will measure the performance through the simulation of IoT-based mine detection algorithm so that we will prove the possibility of IoT-based detection landmine.

A Study on The RFID/WSN Integrated system for Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경을 위한 RFID/WSN 통합 관리 시스템에 관한 연구)

  • Park, Yong-Min;Lee, Jun-Hyuk
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.1
    • /
    • pp.31-46
    • /
    • 2012
  • The most critical technology to implement ubiquitous health care is Ubiquitous Sensor Network (USN) technology which makes use of various sensor technologies, processor integration technology, and wireless network technology-Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN)-to easily gather and monitor actual physical environment information from a remote site. With the feature, the USN technology can make the information technology of the existing virtual space expanded to actual environments. However, although the RFID and the WSN have technical similarities and mutual effects, they have been recognized to be studied separately, and sufficient studies have not been conducted on the technical integration of the RFID and the WSN. Therefore, EPCglobal which realized the issue proposed the EPC Sensor Network to efficiently integrate and interoperate the RFID and WSN technologies based on the international standard EPCglobal network. The proposed EPC Sensor Network technology uses the Complex Event Processing method in the middleware to integrate data occurring through the RFID and the WSN in a single environment and to interoperate the events based on the EPCglobal network. However, as the EPC Sensor Network technology continuously performs its operation even in the case that the minimum conditions are not to be met to find complex events in the middleware, its operation cost rises. Moreover, since the technology is based on the EPCglobal network, it can neither perform its operation only for the sake of sensor data, nor connect or interoperate with each information system in which the most important information in the ubiquitous computing environment is saved. Therefore, to address the problems of the existing system, we proposed the design and implementation of USN integration management system. For this, we first proposed an integration system that manages RFID and WSN data based on Session Initiation Protocol (SIP). Secondly, we defined the minimum conditions of the complex events to detect unnecessary complex events in the middleware, and proposed an algorithm that can extract complex events only when the minimum conditions are to be met. To evaluate the performance of the proposed methods we implemented SIP-based integration management system.

Monitoring Country-of-Origin Labels and Indication Contents for Meat on Electronic On-line Trading (전자상거래의 축산물 원산지 표시실태 및 표시규정 모니터링)

  • Nam, Jung-Oak;Nam, Bo-Ra;Park, Jung-Min;Lee, Ra-Mi;Gu, Hyo-Jung;Suh, Hyung-Joo;Chang, Un-Jae;Kim, Jin-Man
    • Food Science of Animal Resources
    • /
    • v.27 no.1
    • /
    • pp.117-121
    • /
    • 2007
  • The number of internet users and the scale of electronic on-line trading are on the increase due to the development of information technology and the internet. The aim of this study was to monitor the accuracy of country-of-origin labels and the indicated contents of meat available by electronic on-line trading by using a structural interview sheet for 100 on-line meat product markets. The result of this investigation showed a 100% level of accuracy for business name and telephone number whereas the company address, meat manufacturer and supplier, and business registration were less reliable. We also investigated the accuracy of site policy, e-mail address, and fax number. The results showed that the accuracy of fax numbers was the lowest. The product name and the kind of meat actually in the product showed a 100% level of conformity, while the price (96.3%), place of origin (93.6%), capacity (90.4%), meat parts (80.9%) and contents of the product (73.4%) showed a relatively low level of conformity. Serious safety issues were exposed by the disturbingly low 20.2% accuracy of indicated expiration dates and 5.3% accuracy of indicated manufacturing dates. To ensure food safety, it is essential to improve consumer understanding and trust regarding food safety through continuous public relations. More education and information are needed to raise consumer awareness of the facts versus myths regarding food safety.

Techniques for Acquisition of Moving Object Location in LBS (위치기반 서비스(LBS)를 위한 이동체 위치획득 기법)

  • Min, Gyeong-Uk;Jo, Dae-Su
    • The KIPS Transactions:PartD
    • /
    • v.10D no.6
    • /
    • pp.885-896
    • /
    • 2003
  • The typws of service using location Information are being various and extending their domain as wireless internet tochnology is developing and its application par is widespread, so it is prospected that LBS(Location-Based Services) will be killer application in wireless internet services. This location information is basic and high value-added information, and this information services make prior GIS(Geographic Information System) to be useful to anybody. The acquisition of this location information from moving object is very important part in LBS. Also the interfacing of acquisition of moving object between MODB and telecommunication network is being very important function in LBS. After this, when LBS are familiar to everybody, we can predict that LBS system load is so heavy for the acquisition of so many subscribers and vehicles. That is to say, LBS platform performance is fallen off because of overhead increment of acquiring moving object between MODB and wireless telecommunication network. So, to make stable of LBS platform, in this MODB system, acquisition of moving object location par as reducing the number of acquisition of unneccessary moving object location. We study problems in acquiring a huge number of moving objects location and design some acquisition model using past moving patternof each object to reduce telecommunication overhead. And after implementation these models, we estimate performance of each model.

Design and Implementation of a Web Application Firewall with Multi-layered Web Filter (다중 계층 웹 필터를 사용하는 웹 애플리케이션 방화벽의 설계 및 구현)

  • Jang, Sung-Min;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.157-167
    • /
    • 2009
  • Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.

A Review on Solution Plans for Preventing Environmental Contamination as the Trend Changes of Cryptocurrency (암호화폐의 트랜드 변화에 따른 환경오염 방지 해결방안에 대한 고찰)

  • Kim, Jeong-hun;Song, Sae-hee;Ko, Lim-hwan;Nam, Hak-hyun;Jang, Jae-hyuck;Jung, Hoi-yun;Choi, Hyuck-jae
    • Journal of Venture Innovation
    • /
    • v.5 no.1
    • /
    • pp.91-106
    • /
    • 2022
  • Cryptocurrency, stood out the sharp cost rising of Bitcoin has been spotlighted by means of the solution for stagflation because it is decentralized with an existing currency differently. Especially getting into 4th industrial revolution, technologies using block chain and internet of things have been used in the many fields, and the power of influence is also widespread. Nevertheless like a remark of Elon Musk of Tesla CEO, the problems of environmental contamination for cryptocurrency have been pointed out continuously and the most representative of them is an enormous electric usage as the use of fossil fuels. Also the amount generated of carbon dioxide result in the acceleration of global warming mainly based on the climate changes of earth if the existing mining method is continued. On the other hand, review researches have been conducted restrictively as the connection with environmental contamination as the mining of cryptocurrency. In this study, it intended to review problems for environmental contamination as the diversification of ecological system of cryptocurrency concretely. Upon investigation existing prior documents on the putting recent data first, the mining of cryptocurrency has affected on the environmental contamination conflicting with carbon neutrality as increasement of the electric usage and electronic wastes. And POS method without the mining process appeared, but it had a demerit collapsing a decentralization and then we met turning point on appearing various environmental-friendly cryptocurrency. Finally the appearance of cryptocurrency using new renewable energy acted on the opportunity of the usage maximization of energy storage apparatus and the birth of national government intervention. Based on these results, we mention clearly that hereafter cryptocurrency will regress if not go abreast the value of currency as well as environmental approach.

Sentiment Analysis of Movie Review Using Integrated CNN-LSTM Mode (CNN-LSTM 조합모델을 이용한 영화리뷰 감성분석)

  • Park, Ho-yeon;Kim, Kyoung-jae
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.4
    • /
    • pp.141-154
    • /
    • 2019
  • Rapid growth of internet technology and social media is progressing. Data mining technology has evolved to enable unstructured document representations in a variety of applications. Sentiment analysis is an important technology that can distinguish poor or high-quality content through text data of products, and it has proliferated during text mining. Sentiment analysis mainly analyzes people's opinions in text data by assigning predefined data categories as positive and negative. This has been studied in various directions in terms of accuracy from simple rule-based to dictionary-based approaches using predefined labels. In fact, sentiment analysis is one of the most active researches in natural language processing and is widely studied in text mining. When real online reviews aren't available for others, it's not only easy to openly collect information, but it also affects your business. In marketing, real-world information from customers is gathered on websites, not surveys. Depending on whether the website's posts are positive or negative, the customer response is reflected in the sales and tries to identify the information. However, many reviews on a website are not always good, and difficult to identify. The earlier studies in this research area used the reviews data of the Amazon.com shopping mal, but the research data used in the recent studies uses the data for stock market trends, blogs, news articles, weather forecasts, IMDB, and facebook etc. However, the lack of accuracy is recognized because sentiment calculations are changed according to the subject, paragraph, sentiment lexicon direction, and sentence strength. This study aims to classify the polarity analysis of sentiment analysis into positive and negative categories and increase the prediction accuracy of the polarity analysis using the pretrained IMDB review data set. First, the text classification algorithm related to sentiment analysis adopts the popular machine learning algorithms such as NB (naive bayes), SVM (support vector machines), XGboost, RF (random forests), and Gradient Boost as comparative models. Second, deep learning has demonstrated discriminative features that can extract complex features of data. Representative algorithms are CNN (convolution neural networks), RNN (recurrent neural networks), LSTM (long-short term memory). CNN can be used similarly to BoW when processing a sentence in vector format, but does not consider sequential data attributes. RNN can handle well in order because it takes into account the time information of the data, but there is a long-term dependency on memory. To solve the problem of long-term dependence, LSTM is used. For the comparison, CNN and LSTM were chosen as simple deep learning models. In addition to classical machine learning algorithms, CNN, LSTM, and the integrated models were analyzed. Although there are many parameters for the algorithms, we examined the relationship between numerical value and precision to find the optimal combination. And, we tried to figure out how the models work well for sentiment analysis and how these models work. This study proposes integrated CNN and LSTM algorithms to extract the positive and negative features of text analysis. The reasons for mixing these two algorithms are as follows. CNN can extract features for the classification automatically by applying convolution layer and massively parallel processing. LSTM is not capable of highly parallel processing. Like faucets, the LSTM has input, output, and forget gates that can be moved and controlled at a desired time. These gates have the advantage of placing memory blocks on hidden nodes. The memory block of the LSTM may not store all the data, but it can solve the CNN's long-term dependency problem. Furthermore, when LSTM is used in CNN's pooling layer, it has an end-to-end structure, so that spatial and temporal features can be designed simultaneously. In combination with CNN-LSTM, 90.33% accuracy was measured. This is slower than CNN, but faster than LSTM. The presented model was more accurate than other models. In addition, each word embedding layer can be improved when training the kernel step by step. CNN-LSTM can improve the weakness of each model, and there is an advantage of improving the learning by layer using the end-to-end structure of LSTM. Based on these reasons, this study tries to enhance the classification accuracy of movie reviews using the integrated CNN-LSTM model.