• Title/Summary/Keyword: Abstract Data

Search Result 484, Processing Time 0.025 seconds

Physicochemical Characteristics of $Consomm{\acute{e}}$ Prepared with Different Ratios of Beef and Chicken (쇠고기와 닭고기의 배합비에 따른 $Consomm{\acute{e}}$의 이화학적 특성)

  • Kim, Young-Sik;Jang, Myung-Sook
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.16 no.5
    • /
    • pp.564-572
    • /
    • 2006
  • The application of Consomm prepared with different ingredients of ground beef and ground chicken ingredients to improve the taste preferences and reduce saving the food cost of Consomm was attempted by reviewing fundamental data and its examining the effect on the physicochemical characteristics of treatment. These treatments were prepared with the following different ratios (9:1, 7:3, 5:5, 3:7, 1:9 ; w/w) of ground beef to and ground chicken: 9:1, 7:3, 5:5, 3:7, and 1:9, w/w, respectively. Gelatin contents were increased significantly with by increasing the mixed ratio of ground chicken. The free sugars identified from Consomm were, glucose, fructose, and sucrose. Free sugar contents, increased significantly by with increasing the mixed ratio of ground beef. (Ed- what are the highlighted treatments? You need to explain in this abstract otherwise the reader doesn't know. For simplicity I suggest you don't use such nomenclaturehere in the abstract and simplify with merely the weight ratios. Confirm the changes that I've made) The highest and lowest free sugars werewas shown at A9:1 and 1:9 treatments, respectively whereas the lowest value was shown at I treatment. As many as 20 different kinds of free amino acids were detected infrom the Consomm and the amount of total amino acids waswere increased with by increasing the mixed ratio of ground chicken. The contents of arginine, glutamic acid and alanine contents were high in the free amino acids of Cconsomm prepared with different ingredients. The In the changes of mineral contents in the Consomm prepared with different ingredients, the mineral showed high contents increased according to in the following order of: K, Na, P, Mg, Ca, Fe, and Zn. From the The results of analysis results, in the Relatin contents, free sugars, free amino acids and mineral contents were all increased with by increasing the mixed ratio of ground chicken. The 7:3 treatment showed From above results, it was showed that B treatment prepared with a ratio of 1 ground beef to 3 ground chicken was the bestmost preferred in physicochemical qualities.

  • PDF

An Analysis of the Discriminating Power of Medical Journal Evaluation Criteria (의학학술지 평가지표의 변별력 측정연구)

  • 이춘실
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.14 no.1
    • /
    • pp.199-218
    • /
    • 2003
  • The discriminating power of journal evaluation criteria of Korean medical journals were measured. The study used the data of 76 medical journals, collected in the "Korean Medical Journal Evaluation" process conducted by the Korean Association of Medical Journal Editors (KAMJE) between 1997 and 1999. For each evaluation criterion, the distribution of the individual score vs the total score of a journal received was plotted and their correlations were analyzed. It is found that the evaluation criteria with a high discriminating power are the ones associated with the peer review system and the journal editing. The evaluation criteria with a low discriminating power are the journal frequency and how often a chief editor is changed. Some evaluation criteria such as "Journal holding rates of medical libraries" and "year-end index" need modifications in the evaluation methods. Other evaluation criteria such as "Journal self-citation rate","SCI citation rate" and "SCI impact factor" need to modify the score ranges. It is recommended that the new evaluation criteria such as "citation rate by Korean medical journals" and "Access availability of the journal information through major Korean medical abstract databases" should be added.formation through major Korean medical abstract databases" should be added.dded.

  • PDF

Selection of Auditory Icons in Ship Bridge Alarm Management System Using the Sensibility Evaluation (감성평가를 이용한 선교알람관리시스템의 청각아이콘 평가)

  • Oh, Seungbin;Jang, Jun-Hyuk;Park, Jin Hyoung;Kim, Hongtae
    • Journal of Navigation and Port Research
    • /
    • v.37 no.4
    • /
    • pp.401-407
    • /
    • 2013
  • In parallel with the development of ship equipment, bridge systems have been improved, but marine accidents due to human error have not been reduced. Recently, research in nautical bridge equipment has focused on suitable ergonomic designs in order to reduce these errors due to human factors. In a bridge of a ship, there are numerous auditory signals that deliver important information clearly to the sailors. However, only a few studies have been conducted related to the human recognition of these auditory signals. There are three types of auditory signals: voice alarms, abstract sounds, and auditory icons. This study was conducted in order to design more appropriate auditory icons using a sensibility evaluation method. The auditory icons were rated to have five warning situations (engine failure, fire, steering failure, low power, and collision) using the Semantic Differential Method. It is expected that the results of this study will be used as basic data for auditory displays inside bridges and for integrated bridge alarm systems.

Dynamic Copy Security Protocol In Real-Time Database Systems (실시간 데이터베이스 시스템에서의 동적 복사 보안 프로토콜)

  • Park, Su-Yeon;Lee, Seung-Ryong;Jeong, Byeong-Su;Seung, Hyeon-U
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.8
    • /
    • pp.955-963
    • /
    • 1999
  • 다단계 보안 실시간 데이타베이스 시스템은 데이타베이스의 일관성 유지와 실시간 요구인 마감시간의 만족, 그리고 기밀성을 띤 데이타가 노출될 수 있는 비밀채널(covert-channel)의 방지라는 요구사항을 모두 만족해야 한다. 기존의 SRT-2PL(Secure Real-Time 2 Phase Locking)은 원본과 복사본으로 데이타 객체를 분리시켜 다른 등급간에 불간섭(non-interference)을 유지하여 비밀채널의 방지를 가능하게 하였으나, 복사본이 모든 데이타 객체에 대해 항상 존재하므로 메모리의 낭비가 있을 수 있고, 복사본의 갱신을 위한 갱신 큐의 관리에 따르는 오버헤드와 그에 따른 예측성 결여라는 문제점을 갖고 있다. 이를 개선하기 위하여 본 논문에서는 다단계 보안 실시간 데이타베이스 시스템의 요구사항을 모두 만족하는 동적 복사 프로토콜을 제안한다. 동적 복사 프로토콜은 로킹 기법을 기초로 동작하고, 트랜잭션의 작업에 따라 동적으로 복사본을 생성하고 삭제한다. 모의 실험 결과 제안한 동적 복사 프로토콜은 비밀채널을 방지하고 동적인 복사본의 생성으로 SRT-2PL의 단점인 메모리 낭비를 줄일 수 있으며, 예측성을 높여 마감시간 오류율을 감소시켰다.Abstract Concurrency control of real-time secure database system must satisfy not only logical data consistency but also timing constraints and security requirements associated with transactions. These conflicting natures between timing constraints and security requirements are often resolved by maintaining several versions(or secondary copies) on the same data items. In this paper, we propose a new lock-based concurrency control protocol, Dynamic Copy Security Protocol, ensuring both two conflicting requirements. Our protocol aims for reducing the storage overhead of maintaining secondary copies and minimizing the processing overhead of update history. Main idea of our protocol is to keep a secondary copy only when it is needed to resolve the conflicting read/write operations in real time secure database systems. For doing this, a secondary copy is dynamically created and removed during a transaction's read/write operations according to our protocol. We have also examined the performance characteristics of our protocol through simulation under different workloads while comparing the existing real time security protocol. The results show that our protocol consumed less storage and decreased the missing deadline transactions.

Model Construction of Maternal Identity in Primi-gravida (초임부의 모성 정체성에 관한 모형구축)

  • 김혜원
    • Journal of Korean Academy of Nursing
    • /
    • v.28 no.2
    • /
    • pp.510-518
    • /
    • 1998
  • It was assumed that the maternal identity in primi-gravida is one of the most attribute of the motherhood, that is not biological but cognitive phenomena, appears active process as intelligent human being. The purposes of this study were that the identification the cognitive structure and the influencing factors of the maternal identity in primi-gravida. Theoretical framework in this study, maternal identity in primi-gravida was constructed as a cognitive output, has the cognitive structure of cognitive-perceptual factor, cognitive-behavioral factor, and cognitive-emotional factor. Influencing factors of maternal identity was constructed as a cognitive input, which were pregnancy related perceptions (pregnancy intention, minor discomfort, value of motherhood), interpersonal relationship(relationship with mother, relationship with husband, relationship with social network), preparation to motherhood(maternal knowledge, antenatal self care), and biological factor (gestation period). This study was the descriptive correlational research design, was done from the 3rd January to the 15th March 1996, and the research subjects were selected conviniently 226 the primi-gravida during the gestation period, data collection method was self reported questionnaire cross-sectionally. Descriptive data analysis was done by SAS PC$^{+}$, testing the hypothetical model was done by covariance structural analysis using LISREL 8.03 program. The result of the hypothesis testing, the value of motherhood(y=.650, T=4.26) the maternal knowledge (y=.137, T=2.030), the gestation period( y=.113, T=2.621), showed significant causal effect on the maternal identity in primi-gravida. In conclusion, the maternal identity in primi-gravida had interrelated cognitive structure consist of perceptual, behavioral, and emotional factors. Significant causal factors influencing the maternal identity were value identified. It seems to contribute toward the understanding the characteristics of the maternal identity as a cognitive domains that has been regarded highly abstract concept, so has not been validated empirically.y.

  • PDF

Structure of a Storage System Considering Disk Performance and Placement Policy Considering Video Data Characteristics in VOD Storage Servers (주문형 비디오 저장 서버에서 디스크 성능을 고려한 저장 시스템의 구조와 비디오 데이터의 특성에 따른 배치정책)

  • An, Yu-Jeong;Won, Yu-Heon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.11
    • /
    • pp.1296-1304
    • /
    • 1999
  • 본 논문은 다수의 고객들에게 실시간 재생 서비스를 제공하는 주문형 비디오 서버에서 데이타 검색의 효율을 높이기 위한 저장 시스템의 구조와 그에 따른 배치 정책을 제안한다. 주문형 비디오 저장 서버에서 동시에 보다 많은 고객들에게 그들이 원하는 서비스를 제공하기 위해서는 여러 분야에서의 다양한 정책들이 고려될 수 있으나, 특히 저장 매체들을 어떤 구조로 구성하고 여기에 비디오 객체들을 어떻게 배치할 것인가는 검색 효율과 직접 관계되는 중요한 문제이다. 본 논문에서는 디스크 배열 형태로 구성된 저장 시스템을 디스크 성능을 고려하여 재구성하고, 비디오 객체들을 저장할 때 저장하고자 하는 데이타의 특성들과 저장 구조를 함께 고려하여 검색 효율을 극대화할 수 있는 배치 방법을 제안한다. 마지막으로 제안된 정책의 검색 효율을 검증하기 위해 다양한 실험을 통하여 기존의 배치 정책들과 비교하고 성능을 평가한다.Abstract In this paper, we propose the structure of storage system and a placement policy to provide many clients with real-time playback services efficiently in VOD(video-on-demand) server. Though policies in various areas being considered to provide more clients with services of degree requested by them simultaneously in VOD storage server, it is important how to construct storage media and to place video objects on it for retrieval efficiency. In this paper, we reorganize a large disk array with disks performance and place video objects using the placement policy considering both characteristics of video data and the structure of storage system for maximizing retrieval efficiency. Lastly, we simulate the proposed policy and conventional policies through various environments, compare our policy with others n evaluate the performance of our policy.

Using the SIEM Software vulnerability detection model proposed (SIEM을 이용한 소프트웨어 취약점 탐지 모델 제안)

  • Jeon, In-seok;Han, Keun-hee;Kim, Dong-won;Choi, Jin-yung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.961-974
    • /
    • 2015
  • With the advancement of SIEM from ESM, it allows deep correlated analysis using huge amount of data. By collecting software's vulnerabilities from assessment with certain classification measures (e.g., CWE), it can improve detection rate effectively, and respond to software's vulnerabilities by analyzing big data. In the phase of monitoring and vulnerability diagnosis Process, it not only detects predefined threats, but also vulnerabilities of software in each resources could promptly be applied by sharing CCE, CPE, CVE and CVSS information. This abstract proposes a model for effective detection and response of software vulnerabilities and describes effective outcomes of the model application.

A Prefetch Policy for Large Spatial Data in Distributed Environment (분산환경에서 대용량 공간데이타의 선인출 전략)

  • Park, Dong-Ju;Lee, Seok-Ho;Kim, Hyeong-Ju
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.12
    • /
    • pp.1404-1417
    • /
    • 1999
  • 웹과 같은 분산 환경에서는, 웹 브라우저 상에서 SQL 형식의 공간 질의를 수행시키는 것과 또한 서버로부터 그 질의 결과를 보는 것이 가능하다. 그러나, 격자 이미지(raster image)와 같은 대용량 공간 데이타를 포함하는 질의 결과를 웹 브라우징할 때 발생하는 많은 문제점들 중에서, 사용자 응답 시간의 지연은 매우 중요한 문제이다. 본 논문에서는 사용자의 재요청(callback) 접근 패턴이 공간적 근접성(spatial locality)을 따른다는 가정하에서의, 사용자 응답 시간을 최소화하기 위한 새로운 프리페치(prefetch) 전략에 대해서 서술한다. 본 논문의 프리페치 전략은 다음과 같이 요약될 수 있다. 첫째, 프리페치 알고리즘은 사용자의 접근 패턴을 잘 반영하는 힐버트 곡선(Hilbert-curve) 모델을 바탕으로 한다. 둘째, 프리페치 전송 비용을 줄이기 위해서 사용자의 재요청 시간 간격(think time)을 이용한다. 본 논문에서는, 힐버트 곡선을 이용한 프리페치 전략의 성능 평가를 위해서 다양한 실험을 하였으며, 그 결과로 프리페치를 하지 않는 방식보다 높은 성능 향상이 있음을 보인다.Abstract In distributed environment(e.g., WWW), it would be possible for the users to submit SQL-like spatial queries and to see their query results from the server on the Web browser. However, of many obstacles which result from browsing query results including large spatial data such as raster image, the delay of user response time is very critical. In this paper we present a new prefetch policy which can alleviate user response time on the assumption that user's callback access pattern has spatial locality. Our prefetch policy can be summerized as follows: 1) our prefetch algorithm is based on the Hibert-curve model which well replects user's access pattern, and 2) it utilizes user's callback interval to reduce prefetch network transmission cost. In this paper we conducted diverse experiments to show that our prefetch policy achieves higher performance improvement compared to other non-prefetch methods.

An Efficient Spatiotemporal Index Unifying Temporal and Spatial Dimensions (시간과 공간의 단일화를 통한 효율적 시공간 색인)

  • Sin, Ye-Ho;Kim, Dong-Ho;Ryu, Geun-Ho
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.9
    • /
    • pp.1039-1051
    • /
    • 1999
  • 시공간 데이타베이스는 현실세계의 객체에 대하여 효율적인 공간 관리와 이력 관리를 지원한다. 이러한 시공간 데이타베이스는 시간차원과 공간차원이라는 이질적 데이타 공간을 관리하여야 하는 대단히 복잡한 시스템이다. 따라서 데이타에 대한 효율적 접근 방법에 대한 연구가 필수적이며, 이는 효율적 색인 기법의 개발을 통하여 이룰 수 있다. 그러나 시공간 데이타에 대한 접근방법 연구는 거의 이루어지지 않고 있으며 극소수의 사례들마저도 공간 객체의 이력 개념을 지원하는 것이 아니라 멀티미디어 객체의 상대적 시간만을 지원하고 있다. 따라서 이 논문에서는 공간 데이타의 이력을 표현하는 시공간 데이타에 대하여 효율적으로 색인하기 위한 방안으로서 시간과 공간을 단일화된 색인 영역으로 통합하는 단일화된 시공간 색인 모델을 제시하고, 이를 기존의 R-트리를 기반으로 확장한 색인을 설계 및 구현하였으며, 아울러 다양한 유형의 시공간 연산에 대한 색인의 성능을 평가하였다.Abstract Spatiotemporal databases are able to support an efficient spatial management as well as historical management for an object in the real world. It is very complex to manage these two dimensions why there exists on difference of inborn property of temporal and spatial dimensions. Therefore an efficient access method should be studied, and it can be done by means of development of efficient indexing technology.However, there is a few related work in the research of access methods of spatiotemporal data. Also the previous works do not support the concept of history for spatial object, and only support the relative time among multimedia objects. Therefore, in this paper, we propose a unified Spatiotemporal index model as an efficient index for Spatiotemporal data. And we not only design Spatiotemporal index that has been extended to historical management facility on the basis of conventional R-tree, but also implement it. Finally we have evaluated performance of index for the various kinds of Spatiotemporal operations.

Performance Evaluation of a Multimedia -Based Handoff Method (멀티캐스트에 기초한 핸드오프 방법의 성능 평가)

  • Ha, Eun-Yong;Choe, Yang-Hui;Kim, Jong-Sang
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.8
    • /
    • pp.930-938
    • /
    • 1999
  • 미래의 통합 이동 통신망은 멀티미디어 데이터 서비스를 하기 위해 작은 셀로 망이 구성될 것이다. 셀이 작은 경우, 이동 호스트의 셀간 이동이 상대적으로 증가해서 잦은 핸드오프 처리로 서비스 중단이 빈번히 발생할 수 있을 뿐만 아니라 자원의 낭비도 많아지게 된다. 따라서 이런 문제를 해결하기 위해 이동 호스트의 이동성을 예측해서 멀티캐스트 연결을 구성해서 사전 핸드오프 처리를 하는 SGMH방법을 제안한다. SGMH방법의 성능 평가를 위해 핸드오프 처리과정의 데이터 및 제어 정보의 흐름을 분석하고, 망 종속 인자들을 도입해서 버퍼 오버헤드와 서비스 중단 시간 면에서 기존 핸드오프 방법들과 비교했다. 비교 분석한 결과는 제안한 방법이 기존의 방법보다 기지국에서의 버퍼 오버헤드뿐만 아니라 서비스 중단 시간을 줄일 수 있음을 보였다.Abstract For mobile multimedia data services, future mobile communication networks will consist of small cells. In case of smaller cell size, the number of user movements between cells will increase and more network resources will be consumed for processing frequent handoffs. This processing delay will cause frequent connection service disruptions. To solve these problems, a multicast-based handoff method ,called SGMH(Sub-Group Multicast-based Handoff), is suggested. SGMH method estimates future movements of mobile hosts and setups a dynamic multicast connection tree for procesing handoffs. For performance evaluation, we represent flows of data and control messages as timing diagrams and introduce several network related factors. In terms of buffer overhead and service disruption time we compared the SGMH method to other methods. The results show that SGMH method has better performance in that it can reduce consumption of network resources and minimize service disruption time.