• Title/Summary/Keyword: Author Identification

Search Result 127, Processing Time 0.021 seconds

Proteins in the Postsynaptic Density of the Central Nervous System

  • Moon, Il-Soo
    • Journal of Life Science
    • /
    • v.9 no.2
    • /
    • pp.34-39
    • /
    • 1999
  • The postsynaptic density (PSD) is a cytoskeletal specialization that is involved in the regulation of synaptic signal transduction. Mainly due to the hydrophobic nature of the PSD proteins, characterization of this intriguing structure at the molecular level has been very intractable until early 1990s. However, recent development in protein microchemistry and molecular cloning techniques allowed identification and characterization of the PSD proteins. As expected, cytoskeletal proteins constitute major components of the PSD. Other major PSD proteins have been identified by protein sequencing, and their genes were used to fish out associating proteins by yeast two-hybrid system expanding our knowledge on the molecular structure of the PSD significantly. In this review, I summarize proteins that are so far identified focusing on the glutamatergic synapses.

Co-author Network Analysis of Research Institutes in the Computer Field Based on the Journal Articles Published in Korea (한국 학술지 기반 컴퓨터분야 연구기관 공저 네트워크 분석)

  • Kim, Byungkyu;You, Beon-Jong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.117-122
    • /
    • 2021
  • In order to reveal the co-research relationship with key research institutes in the computer field in Korea, which have high competitiveness in the ICT field, this paper analyzes the co-author network of research institutes based on the papers of Korean journals. For this study, 15 computer journals published in Korea were selected and collected for the past 5 years. In addition, authors, affiliated institutions, and country information were extracted from the papers, and experimental data were produced using institutional identification data and SNA analysis techniques. Through this, statistical analysis was performed on researchers, research institutes, and countries, and the centrality of research institutes was measured through co-authored network analysis and visualized as a map. The results of the research that analyzed the co-author relationship based on the papers in computer science journals published in Korea are as follows. First, the status of co-author relations among researchers was statistically analyzed in detail. The number of authors, the number of co-authors, and statistics by co-authoring countries, as well as the ratio of co-authored research by institution and the ratio of co-authored by country were revealed. The co-authoring status of papers in English journals was analyzed separately to compare and analyze characteristics. Second, the centrality of each individual was measured through the co-authored network analysis of the identified researchers, institutions and countries affiliated with the institution, and the frequency of connection between data by level was identified. In addition, the co-authorization network between research institutes was visualized and presented as a map so that the overall view of the co-authoring network was presented, and the connection frequency between the institutes was checked. It is possible to recommend a research partner based on the co-authoring behavior of Korean computer researchers and the co-authoring relationship between major research institutes. For this, additional research is needed to analyze the subject areas of each institution.

  • PDF

A Case Report of Chronic Fatigue Syndrome treated by Jisilchija-tang based on Shanghanlun Provisions (『상한론(傷寒論)』 변병진단체계(辨病診斷體系)에 근거하여 지실치자탕(枳實梔子湯) 투여 후 호전된 만성피로증후군 1례)

  • Ryu, Hee-Chang;Rho, Yeong-Beom
    • 대한상한금궤의학회지
    • /
    • v.9 no.1
    • /
    • pp.115-123
    • /
    • 2017
  • Objective : The purpose of this paper is to report the improvement of patient with Chronic Fatigue Syndrome(CFS) treated by herb medication based on Shanghanlun disease pattern identification diagnostic system. Methods : According to 'Disease Pattern Identification Diagnostic System based on Shanghanlun Provisions', the patient was diagnosed with Eumyangyeokchahunobok-byung, number 393 provision, and took Jisilchija-tang herb medication for 75days. The changing symptom of chronic fatigue syndrome was estimated by QOL-CFS(Chalder Fatigue Scale) and VAS(Visual Analogue Scale). Results : The QOL-CFS changed 21 to 8 and VAS changed 10 to 1. Conclusions : It is existing theory that Eumyangyeokchahunobok-byung is caused by 'having too much sex relation'. But the author diagnosed Eumyangyeokchahunobok-byung as 'Symptoms worsen when awaken at night, and sleep at day caused by poor sleep pattern' according to the palaeography about shanghanlun, and got a good results.

Redescription and Multivariate Analysis of Genus Phintella (Araneae, Salticidae) from Korea (한국산 Phintella속(거미목, 깡충거미과)의 재기재와 다변량분석)

  • Bo-Keun Seo
    • Animal Systematics, Evolution and Diversity
    • /
    • v.11 no.2
    • /
    • pp.183-197
    • /
    • 1995
  • Description and identifications of 6 species belonging to genus Phintella from Korea are in insufficient and inaccurate situation. In the present paper, redescriptions illustrations and identification key are provided for 7 species of genus Phintella including P. popovi newly recorded in Korean spider fauna, and Ocius munitus described by Wesolowska (1981s) was synonymized to P.cavaleriei. For the author's identiication and pairing to be valid multivariate analysis was performed with 13 RVCs below STD 0.05 to 134 individuals. The result of discriminant analysis carried out with 13 RVCs of 134 individuals was not satisfactory, but cluster analysis performed with mean ratio values of 14 OTUs to 13 RVCs showed the same result with author's pairing except P.abnormis , which has larger dissimilarity than the pairs of the others. So pairing of 7 species was possible as a whole because one species only failed in pairing , even though this is imperful result. This method to be helpful to pairing test and identification if it were to improve.

  • PDF

CONTROL THEORY OF WALSH FUNCTIONS-A SURVEY (WALSH함수와 제어이론)

  • Ahn, Doo-Soo;Lee, Myung-Kyu;Lee, Hae-Ki;Lee, Seung
    • Proceedings of the KIEE Conference
    • /
    • 1991.07a
    • /
    • pp.657-665
    • /
    • 1991
  • Although orthogonal function is introduced in control theory in early 1970's, it is not perfect. Since the concept of integral operator by Chen and Hsiao in mid 1970's, orthogonal function (for example Walsh, Block-pulse, Haar, Laguerre, Legendre, Chebychev etc) has been widely applied In system's analysis and identification, model reduction, state estimation, optimal control, signal processing, image processing, EEG, and ECG etc. The reason why Walsh Functions introduces in control theory is that as integral of Walsh function is also developed in Walsh orthogonal function, if we transfer give system into integral equation and introduce Walsh function. We can know that system's characteristic by algebraical expression. This approach is based on least square error and that result is expressed as computer calculation and partly continuous constant value which is easy to apply. Such a Walsh function has been actively studied in USA, TAIWAN, INDO, CHINA, EUROPE etc and in domestic, author has studied it for 10 years since it was is introduced in 1982. This paper is consider the that author has studied for 10 years and Walsh function's efficiency.

  • PDF

The Impact of Underdog Positioning on Consumer Preference in Korea: Focusing on Local Service Providers

  • Bang-Wool Han
    • Journal of Korea Trade
    • /
    • v.26 no.5
    • /
    • pp.76-87
    • /
    • 2022
  • Purpose - Small independent brands from local companies often use underdog positioning to compete with established global brands. However, whether the effectiveness of underdog positioning of local businesses in the service sector remains insufficient. The purpose of this paper is to investigate the underdog effect on the preference of Korean consumers for individual service providers positioned as underdogs. Design/methodology - The author examines the research question of this study using a one-way ANOVA in three different positioning (underdog vs. top dog vs. control) between-subjects design, with a group of Korean participants. Findings - The experimental study shows that support for independent local (vs. global) service providers positioned as underdogs is straightforward. Using the lens of consumer identification with underdog biographies, this study found that consumers prefer small local service providers with passion and determination regardless of their disadvantages. Originality/value - To the best of the author's knowledge, this is the first study to examine the effectiveness of underdog positioning in the context of individual service providers. As it competes with global service companies for domestic consumer preference in Korea, the findings have great implications for ensuring the sustainability of small local service providers.

Isolation of Vibrio vulnificus Serotype Strains for Vaccine Preparation (Vibrio vulnificus 백신제조원의 혈청형균주 분리)

  • Ju, Jin-Wo
    • The Journal of the Korean Society for Microbiology
    • /
    • v.22 no.4
    • /
    • pp.393-402
    • /
    • 1987
  • The halophilic bacterium Vibrio vulnificus, previously called lactose-positive(L+) Vibrio and Beneckea vulnifica, causes acute, fulminating wound infections and septicemia in humans. Septicemia is very serious infection with a fatality rate of about 50%. Most patients with primary septicemia due to V. vulnificus have preexisting liver disease. V. vulnificus also cause severe wound infections usually after trauma and exposure to marine animals or the marine environment. The mortality rate is not nearly as high as in primary septicemia caused by this organism. In most cases human disease results from ingestion of contaminated seafood or from infection of a wound, frequently of seawater or crab origin. The author made an attempt to isolation of the V vulnificus from seawater, seamud, fish, shellfish, and algae on the southern sea of Korea from January to September in 1987, using for the purpose of vaccine preparation. The author investigated for bacteriological identification, hemolysis and determination of serotypes of isolated V. vulnificus strains. Eighty-five strains(5.9%) out of 1450 specimens collected of V. vulnificus were isolated. The distribution of the 85 isolates were as follows: 21 strains from seawater, 11 strains from seamud, 28 strains from fish, 19 strains from shellfish, and 6 strains from algae, respectively. All 85 isolates were positive reaction on human blood agar. The distribution of serotypes of V. vulnificus isolates were O1 to O8: 13 strains of O1, 6 strains of O2, 11 strains of O3, 9 strains of O4, 10 strains of O5, 7 strains of O6, 15 strains of O7, and 10 strains of O8, respectively. Eighty-one strains showed agglutination with O antisera, but 4 strains failed to show agglutination. In this study, the author suspected that serotypes of V. vulnificus isolates distributed also in the seaside of Korea as well as in most seaside of the world, and new serotypes were in existence in the seaside of Korea except reported up to now.

  • PDF

Identification of Intellectual Structure of Science and Technology in North Korea using by Author Co-citation Analysis (저자 동시인용 분석을 이용한 북한 과학기술의 지적 구조 규명에 관한 연구)

  • Noh, Kyungran;Choi, Hyunkyoo
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.31 no.4
    • /
    • pp.169-190
    • /
    • 2020
  • The purpose of this paper is to analyze academic papers published by North Korean scientists, to uncover major areas of research in North Korean science and technology, and to uncover the intellectual structures that underlie these science and technology. Through quantitative analysis, it is to find out who the main research actors are, what research areas are being dealt with, which research areas last a long time, which areas have been discontinued, and which research areas are receiving new attention. In order to detect major research areas and intellectual bases in North Korean science and technology, North Korean scientists' articles were collected from WoS (SCIE). CiteSpace, a scientific quantitative analysis tool, was used to identify major research areas based on author simultaneous citation analysis. The main research areas in North Korea are found to be material properties, vibration analysis, incline matrice, sodium cointercalation, and external magnetic field.

Authorship Attribution Framework Using Survival Network Concept : Semantic Features and Tolerances (서바이벌 네트워크 개념을 이용한 저자 식별 프레임워크: 의미론적 특징과 특징 허용 범위)

  • Hwang, Cheol-Hun;Shin, Gun-Yoon;Kim, Dong-Wook;Han, Myung-Mook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1013-1021
    • /
    • 2020
  • Malware Authorship Attribution is a research field for identifying malware by comparing the author characteristics of unknown malware with the characteristics of known malware authors. The authorship attribution method using binaries has the advantage that it is easy to collect and analyze targeted malicious codes, but the scope of using features is limited compared to the method using source code. This limitation has the disadvantage that accuracy decreases for a large number of authors. This study proposes a method of 'Defining semantic features from binaries' and 'Defining allowable ranges for redundant features using the concept of survival network' to complement the limitations in the identification of binary authors. The proposed method defines Opcode-based graph features from binary information, and defines the allowable range for selecting unique features for each author using the concept of a survival network. Through this, it was possible to define the feature definition and feature selection method for each author as a single technology, and through the experiment, it was confirmed that it was possible to derive the same level of accuracy as the source code-based analysis with an improvement of 5.0% accuracy compared to the previous study.

The attacker group feature extraction framework : Authorship Clustering based on Genetic Algorithm for Malware Authorship Group Identification (공격자 그룹 특징 추출 프레임워크 : 악성코드 저자 그룹 식별을 위한 유전 알고리즘 기반 저자 클러스터링)

  • Shin, Gun-Yoon;Kim, Dong-Wook;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.1-8
    • /
    • 2020
  • Recently, the number of APT(Advanced Persistent Threats) attack using malware has been increasing, and research is underway to prevent and detect them. While it is important to detect and block attacks before they occur, it is also important to make an effective response through an accurate analysis for attack case and attack type, these respond which can be determined by analyzing the attack group of such attacks. Therefore, this paper propose a framework based on genetic algorithm for analyzing malware and understanding attacker group's features. The framework uses decompiler and disassembler to extract related code in collected malware, and analyzes information related to author through code analysis. Malware has unique characteristics that only it has, which can be said to be features that can identify the author or attacker groups of that malware. So, we select specific features only having attack group among the various features extracted from binary and source code through the authorship clustering method, and apply genetic algorithm to accurate clustering to infer specific features. Also, we find features which based on characteristics each group of malware authors has that can express each group, and create profiles to verify that the group of authors is correctly clustered. In this paper, we do experiment about author classification using genetic algorithm and finding specific features to express author characteristic. In experiment result, we identified an author classification accuracy of 86% and selected features to be used for authorship analysis among the information extracted through genetic algorithm.