International Journal of Fuzzy Logic and Intelligent Systems
/
v.7
no.4
/
pp.228-235
/
2007
The main purpose of this paper is to manage the container property effectively at the container yard by applying the RTLS technology to the field of port logistics. Yet, many kinds of noises happen to be inputted with the distance value(between the reader and the tag) which is to be inputted into the location identification algorithm, which makes the distance value jumped due to the system noise of the ultrasonic sensor module and the measurement noise. The Kalman Filter is widely used to prevent this jump occurrence; the noises are eliminated by using the EKF(Extended Kalman Filter) while considering that the distance information of the ultrasonic sensor is non-linear. Also, the 3D RTLS system at the port container yard suggested in this research is designed not to be interrupted for its ultrasonic transmission by positioning the antenna at the front of each sector of the container where the active tags are installed. We positioned the readers, which function as antennas for location identification, to four places randomly in the absolute coordinate and let the positions of the active tags identified by using the distance data delivered from the active tags. For the location identification algorithm used in this paper, the triangulation measurement that is most used in general is applied and newly reorganized to calculate the position of the container. In the first experiment, we dealt with the error resulting in the angle and the distance of the ultrasonic sensor module, which is the most important in the hardware performance; in the second, we evaluated the performance of the location identification algorithm, which is the most important in the software performance, and tested the noise cancellation effects for the EKF. According to the experiment result, the ultrasonic sensor showed an average of 3 to 5cm error up to $45^{\circ}$ in case of $60^{\circ}$ or more, non-reliable linear distances were obtained. In addition, the evaluation of the algorithm performance showed an average of $4^{\circ}{\sim}5^{\circ}$ error due to the error of the linear distance-this error is negligible for most container location identifications. Lastly, the experiment results of noise cancellation and jump preservation by using the EKF showed that noises were removed in the distance information which was entered from the input of the ultrasonic sensor and as a result, only signal was extracted; thus, jumps were able to be removed and the exact distance information between the ultrasonic sensors could be obtained.
Jeong, Mi-Jin;Kim, So-Young;Kim, Yoo-Jin;Lee, Eun-Tag;Choo, Sung-Tae;Kim, Han-Hyuk;Kim, Mi Ryeo
The Korea Journal of Herbology
/
v.33
no.2
/
pp.53-58
/
2018
Objectives : Plantaginis asiaticae Folium (PA) has been widely used in Korean medicine for treatment of liver disease, stomach troubles and inflammation. We investigated the effect of PA on lipid accumulation in 3T3-L1 according to extraction conditions. Methods : The MTT assay was employed to evaluate the cytotoxicity of PA extracted by different solvents (water, 50% ethanol, and 95% ethanol) on 3T3-L1 preadipocytes. Oil red O staining was used to identify intracellular lipid accumulation in 3T3-L1. 3T3-L1 adipocytes were treated with PA at concentration ranging in 0.1, 0.2 and $0.4mg/m{\ell}$. PA was extracted by different extraction conditions such as extraction solvents, extraction time, and extraction temperature. In addition, UPLC analysis was used for determination of candidates of active ingredients in PA. Results : 3T3-L1 preadipocytes were treated with PA extracted by different solvents (water, 50% ethanol, and 95% ethanol) and there was no cytotoxicity. Oil red O staining was employed to identify the effect of PA on lipid accumulation in 3T3-L1. In the present study, PA water extraction at $70^{\circ}C$ for 6 hours decreased greatly in lipid accumulation. The range of concentrations was 0.1, 0.2 and $0.4mg/m{\ell}$. Concentration at $0.2mg/m{\ell}$ was the most effective one among them. Candidates of active ingredients in PA were shown plantamajoside and acteoside through UPLC. Conclusions : These results suggest that the effect of PA water extraction at $70^{\circ}C$ on lipid accumulation in 3T3-L1 is superior to other extraction conditions. We suppose that plantamajoside and acteoside may be candidates of active ingredients in PA.
Journal of the Korean BIBLIA Society for library and Information Science
/
v.24
no.2
/
pp.269-288
/
2013
The development of IT (information technology) has brought about many types of new services, and the traditional sectors such as libraries and information management fields have actively applied new technology to improve the quality of their services. Many of these newly developed services are described under the term 'Web 2.0', in the sense they are next-generation forms of services, and this coinage is duplicated in the term 'Library 2.0', specifically referring to the library services equipped with Web 2.0 technology. Active acceptance of advanced IT to library services is very important to enhance the value and role of library in this rapidly changing information environment. So far, libraries in Korea and abroad have already been putting a lot of efforts and resources to develop and provide technically advanced services. Despite these efforts, it is found that some of these new services have failed to attract users' attention and interest, resulting in the low rates of usage. This study, therefore, reviews current state of the "Folksonomy" based services provided in Korean college libraries as a type of Library 2.0 services, and assess their usage rates. The result of this evaluation is then used to develop a guideline to improve and mobilize the use of such services.
Quan Cheng-Hao;Mo Hee-Sook;Choi Gil-Young;Pyo Cheol-Sig;Chae Jong-Suk
The Journal of Korean Institute of Communications and Information Sciences
/
v.31
no.6B
/
pp.561-571
/
2006
RFID technology, as one contact-less identification technology with using electronic tag, is the field where its multiple researches have been studied. Especially, in the field of supply chain management, when it is necessary to identify a lot of objects by real-time, performance of anti-collision algorithm for multiple tag identification has an effect on performance of entire system. GEN2 is global, open, interoperability protocol for UHF RFID system, the active researches and developments are processed about it. In this paper, we introduce an anti-collision algorithm based on Slotted-ALOHA for GEN2 protocol, focus on estimating number of tags and setting number of slots and review the previous works. We propose new scheme that can estimate number of tags efficiently, and define system efficiency newly when it's used in setting number of slots. We also present result of compare and analysis with previous scheme through simulation. The proposed scheme of estimating number of tags is easy to implement, number of tags which is less than 4 times of number of slots can estimate tags efficiently, we also proved that identification efficiency based on weighted-slot distinguished with definition of previous slot efficiency can improve system efficiency.
RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.
Park, Jong-Uk;Jo, Jae-Hyung;Kim, Young-Ji;Chung, So-Sun;Lee, Jin-Ho;Lee, Hyune-Hwan
Journal of Microbiology and Biotechnology
/
v.18
no.4
/
pp.639-647
/
2008
The heat-inducible expression vectors for Corynebacterium glutamicum and C. ammoniagenes were constructed by using the ${\lambda}O_L1$ and the cryptic promoters, CJ1 and CJ4 that express genes constitutively in C. ammoniagenes. Although the promoters were isolated from C. ammoniagenes, CJ1 and CJ4 were also active in C. glutamicum. To construct vectors, the $O_L1$ from the ${\lambda}P_L$ promoter was isolated and fused to the CJ1 and CJ4 promoters by recombinant PCR. The resulting artificial promoters, CJ1O and CJ4O, which have one ${\lambda}O_L1$, and CJ1OX2, which has two successive ${\lambda}O_L1$, were fused to the green fluorescent protein (GFP) gene followed by subcloning into pCES208. The expression of GFP in the corynebacteria harboring the vectors was regulated successfully by the temperature-sensitive cI857 repressor. Among them, C. ammoniagenes harboring plasmid pCJ1OX2G containing GFP fused to CJ1OX2 showed more GFP than the other ones and the expression was tightly regulated by the repressor. To construct the generally applicable expression vector using the plasmid pCJ1OX2G, the His-tag, enterokinase (EK) moiety, and the MCS were inserted in front of the GFP gene. Using the vector, the expression of pyrR from C. glutamicum was tried by temperature shift-up. The results indicated that the constructed vectors (pCeHEMG) can be successfully used in the expression and regulation of foreign genes in corynebacteria.
As the revision of Building Code including applying crime prevention design to buildings passed recently and target hardening ought to be evidence-based, we studied the Modus Operandi (MO) and intrusion tools of domestic burglary to earn basic data for improvement of crime prevention hardware in the future. To be specific, we reviewed related academic literature and police official statistics of domestic burglary critically and interviewed detectives in charge of burglary to specify and categorize MO and tools. We can derive some implications from research findings, including improvement of the statistical system for the MO of burglary, active sharing of the MO of burglary among the criminal justice agencies and related industries and experts. Also, crime prevention advice and education for the local residents focused on MO of burglary can be recommended. Based on this research, to enhance the level of community safety significantly, performance tests of crime prevention hardware such as security doors and windows etc. and the study on related certification system should be vitalized.
The gene encoding a putative aspartate aminotransferase in Xanthomonas oryzae pv. oryzae (Xoo) was cloned using PCR technique. The gene was ligated with pET-21(a) vector containing His6 tag and expressed in E. coli BL21(DE3). Affinity purification of the recombinant aspartate aminotransferase with Ni-NTA resin resulted in one band by SDS-PAGE analysis. The purified enzyme showed a molecular weight of 43 kDa, as expected. The enzyme was the most active toward L-aspartate as an amino donor, indicating that the purified enzyme is one of aspartate aminotrans-ferases exist in Xoo. Optimal activity of the enzyme was observed at around pH 7.5 and stability was much higher at alkaline pH rather than acidic pH values. The enzyme was considerably activated by the presence of manganese ion, showing about 157% of control activity at 1.0 mM.
There are some critical drawbacks in the use of biomarkers for a global assessment of the toxicological impacts many chemicals and environmental pollutants have, primarily due to an individual biomarker's specificity for an explicit chemical or toxicant. In other words, the biomarker-based assessment methodology used to analyze toxicological effects lacks a high-throughput capability. Therefore, eco-toxicogenomics, or the study of toxicogenomics with organisms present within a given environmental locale, has recently been introduced with the advent of the so-called "-omics" era, which began with the creation of microarray technologies. Fish are comparable with humans in their toxicological responses and thus data from toxicogenomic studies performed with fish could be applied, with appropriate tools and implementation protocols, to the evaluation of environments where human or animal health is of concern. At present, there have been very active research streams for developing expression sequence tag (EST) databases (DBs) for zebra fish and rainbow trout. Even though few reports involve toxicogenomic studies with fish, a few groups have successfully fabricated and used cDNA microarrays or oligo DNA chips when studying the toxicological impacts of hypoxia or some toxicants with fish. Furthermore, it is strongly believed that this technology can also be implemented with non-model fish. With the standardization of DNA microarray technologies and ample progress in bioinformatics and proteomic technologies, data obtained from DNA microarray technologies offer not only multiple biomarker assays or an analysis of gene expression profiles, but also a means of elucidating gene networking, gene-gene relations, chemical-gene interactions, and chemical-chemical relationships. Accordingly, the ultimate target of eco-toxicogenomics should be to predict and map the pathways of stress propagation within an organism and to analyze stress networking.
The human genome contains approximately 13 orphan cytochrome P450 (P450, CYP) genes, of which the apparent function or substrate has not been identified. However, they seem to possess their own biological relevance in some tissues or developmental stages. Here, we characterized the heterologously expressed CYP2W1, an orphan P450 enzyme. The recombinant CYP2W1 protein containing a $6{\times}$(His)-tag at Nterminus has been expressed in Escherichia coli and purified. Expression level of CYP2W1 holoenzyme was around 500 nmol P450 holoenzyme per liter culture medium. The reduced CO difference spectrum of CYP2W1 showed a maximum absorption at 449 nm. CYP2W1 indicated the significant induction to bioactivate Trp-P-1, MeIQ, and IQ in E. coli DJ701 tester strain. However, the bioactivation of B[$\alpha$]P, and NNK by CYP2W1 was relatively low. The model structure of CYP2W1 suggested the characteristic P450 folds with the lengths and orientations of the individual secondary elements. The F-G loop is situated on the distal side of heme to accommodate the flexibility of active site of CYP2W1. These studies can provide useful information for the finding of its biological roles and structure-function relationships of an orphan CYP2W1 enzyme.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.