• Title/Summary/Keyword: Demonstrate System

Search Result 4,316, Processing Time 0.027 seconds

Accelerated DNA Adduct Formation in the Lung of the Nrf2 Knockout Mouse Exposed to Diesel Exhaust

  • Aoki, Yasunobu;Sato, Hiromi;Nishimura, Noriko;Takahashi, Satoru;Itoh, Ken;Yamamoto, Masayuki
    • Proceedings of the Korea Environmental Mutagen Society Conference
    • /
    • 2002.05a
    • /
    • pp.36-42
    • /
    • 2002
  • Diesel exhaust (DE) has been recognized as a noxious mutagen and/or carcinogen, because its components can form DNA adducts. Mechanisms governing the susceptibility to DE and the efficiency of such DNA adduct formation require clarification. The transcription factor Nrf2 is essential for inducible and/or constitutive expression of a group of detoxification and antioxidant enzymes, and we hypothesized that the nrf2 gene knockout mouse might serve as an excellent model system for analyzing DE toxicity. To address this hypothesis, lungs from nrf2(-/-) and nrf2(+/-) mice were examined for the production of xenobiotic-DNA adducts after exposure to DE (3 $mg/m^{3}$ suspended particulate matter) for 4 weeks. Whereas the relative adduct levels (RAL) were significantly increased in the lungs of both nrf2(+/-) and nrf2(-/-) mice upon exposure to DE, the increase of RAL in the lungs from nrf2(-/-) mice exposed to DE were approximately 2.3-fold higher than that of nrf2(+/-) mite exposed to DE. In contrail, cytochrome P4501Al mRNA levels in the nrf2(-/-)mouse lungs were similar to those in the nrf2(+/-) mouse lungs even after exposure to DE, suggesting that suppressed activity of phase II drug-metabolizing enzymes is important in giving ise to the increased level of DNA adducts in the Nrf2-null mutant mouse subjected to DE. Importantly, severe hyperplasia and accumulation of the oxidative DNA adduct 8-hydroxydeoxyguanosine were observed in the bronchial epidermis of nrf(-/-) mite following DE exposure. These results demonstrate the increased susceptibility of the nrf2 germ line mutant mouse to DE exposure and indicate the nrf2 gene knockout mouse nay represent a valuable model for the assessment of respiratory DE toxicity.

  • PDF

The Studies on the Development of Human Blastocyst Embryos in IVF -ET Program - II. The Development of Human Blastocyst Embryos by co-culture with Cumulus Cells (IVF-ET Program에서 Blastocyst 배아의 발생에 관한 연구 - II. 난구세포 공동배양에 의한 Blastocyst 배아의 발생)

  • Lee, Suk-Won;Yoon, San-Hyun;Yoon, Hye-Gyun;Cho, Hyon-Jin;Heo, Yong-Soo;Yoon, Hye-Jin;Park, Se-Pill;Lee, Won-Don;Lim, Jin-Ho
    • Clinical and Experimental Reproductive Medicine
    • /
    • v.25 no.1
    • /
    • pp.35-41
    • /
    • 1998
  • This study was carried out to investigate the development rates of human embryos co-cultured with cumulus cells to each blastocyst stage. Human zygotes were co-cultured on cumulus cell monolayer in YS medium supplemented with 20% hFF. On day 2, if patient had four or more "good" embryos (regular blastomeres without fragmentation), embryos were further cultured for 72hrs. Blastocysts on day 5 were classified into early blastocyst (ErB), early expanding blastocyst (EEB), middle expanding Blastocyst (MEB), and expanded blastocyst (EdB) on the basis of their morphological aspects of trophectoderm cells and blastocoele. Subsequently, maximum 3 of best blastocysts were transferred in 486 cycles. The results in this study were as follows: Patients who had four or more "good" embryos on day 2 were 498 persons, but patients whose embryos could not be transferred due to failure in development to the blastocyst stage on day 5 were 12 persons (2.4%). The development rate of embryos to the blastocyst stage was 58.2% (2,885/4,957) on day 5, and the rates that developed to the ErB, EEB, MEB, and EdB stage were 15.0% (743/4,957), 14.9% (739/4,957), 14.4% (714/ 4,957), and 13.9% (689/4,957), respectively. Total 1366 blastocysts were transferred in 486 cycles (mean number=2.81). The implantation rate and the ongoing implantation rate obtained by observing the number of G-sac and FHB were 29.9% (409/1,366) and 22.5% (308/1,366), respectively. The clinical pregnancy rate was 51.2% (249/486), and the ongoing pregnancy rate' was 39.1% (190/486). Among women showing ongoing pregnancy, women with singleton were 50% (95/190), women with twin were 37.9% (72/190), and women with triplet were 12.1% (23/190). Although triplet pregnancy rate in this study was high such as 12.1%, because many blastocysts with high viability were produced in our co-culture system using cumulus cells on day 5, we really believe that a multiple pregnancy except twin should not occur by selecting good embryos for maximum two blastocyst transfer. These results demonstrate that autologous cumulus cells may be used for the production of blastocysts with high developmental competence, and the use of autologous cumulus cells to be collected easily, and to be treated conveniently at OPU must be an effective means for obtaining high implantation and pregnancy rate.

  • PDF

A Study on the Economic Value of Knowledge Information Service - Focused on UI / UX Field of IT Service (지식정보서비스의 경제적 가치측정 연구 -IT서비스 분야 UI/UX를 중심으로-)

  • Ahn, Jinho;Lee, Jeungsun;Lee, Pildo
    • Journal of Service Research and Studies
    • /
    • v.9 no.1
    • /
    • pp.87-97
    • /
    • 2019
  • The key to the success of IT services is to ensure user-oriented strategic planning and system design capabilities to accurately read the user's mind. In order to establish a stable UI/UX strategy that provides user-oriented service, estimating the size of the relevant market and predicting the growth potential should be given priority, but there is no research on this. Therefore, this study estimated the relevant market based on the 'SW market size (IDC Worldwide Blackbook.') As a result of estimating the amount and the number of cases, the planning and design area of UI/UX is lower than that of overseas market The results of this study suggest that it is necessary to systemize the establishment of UI/UX strategy that depends on individual competence so far, It is possible to make economic value judgments by standardization and quantification of UI/UX by establishing an opportunity to access the interface. From the technical viewpoint of application of the user's viewpoint on the existing interface, We expect to be able to lead the UX strategy management through the occasion of access to UI/UX. Identify needs and to demonstrate the value of UX strategy applied is significant.

Effectiveness of Edge Selection on Mobile Devices (모바일 장치에서 에지 선택의 효율성)

  • Kang, Seok-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.7
    • /
    • pp.149-156
    • /
    • 2011
  • This paper proposes the effective edge selection algorithm for the rapid processing time and low memory usage of efficient graph-based image segmentation on mobile device. The graph-based image segmentation algorithm is to extract objects from a single image. The objects are consisting of graph edges, which are created by information of each image's pixel. The edge of graph is created by the difference of color intensity between the pixel and neighborhood pixels. The object regions are found by connecting the edges, based on color intensity and threshold value. Therefore, the number of edges decides on the processing time and amount of memory usage of graph-based image segmentation. Comparing to personal computer, the mobile device has many limitations such as processor speed and amount of memory. Additionally, the response time of application is an issue of mobile device programming. The image processing on mobile device should offer the reasonable response time, so that, the image segmentation processing on mobile should provide with the rapid processing time and low memory usage. In this paper, we demonstrate the performance of the effective edge selection algorithm, which effectively controls the edges of graph for the rapid processing time and low memory usage of graph-based image segmentation on mobile device.

Evaluating Monitoring Condition for Forest Carbon Offset Project to Demonstrate CSR in North Korea (대북 사회공헌형 산림탄소상쇄사업 모니터링 여건평가)

  • Joo, Seung-Min;Heo, ManHo;Kim, Jong-Dall;Um, Jung-Sup
    • Spatial Information Research
    • /
    • v.23 no.2
    • /
    • pp.11-20
    • /
    • 2015
  • Abstract Monitoring is the most critical element in implementing "forest carbon offset project" to enhance the visibility of CSR (Corporate Social Responsibility) in North Korea. This study is intended to explore monitoring potential in terms of forest carbon offset project using satellite image for Baekdu mountain of North Korea. The permanent record of standard satellite remote sensing system demonstrated its capability of presenting area-wide visual evidences of monitoring conditions in Mt. Baekdu mountain of North Korea (site suitability, carbon stock by forest biomass growth, carbon emission by forest biomass loss, deforestation and degradation, environmental, social and economic impact specified in the Carbon Sequestration Law). It doesn't seem very difficult to comply with monitoring requirements for "the forest carbon offset project" due to the probative value of satellite data. Therefore, it could be considerable or realistic approach to utilize CSR based forest carbon offset project as a point of reform and open-door in North Korea. It is anticipated that this research output could be used as a valuable reference for Korea-based enterprises to ensure monitoring potentials using satellite image in exploring forest carbon offset project sites in North Korea.

A Bloom Filter Application of Network Processor for High-Speed Filtering Buffer-Overflow Worm (버퍼 오버플로우 웜 고속 필터링을 위한 네트워크 프로세서의 Bloom Filter 활용)

  • Kim Ik-Kyun;Oh Jin-Tae;Jang Jong-Soo;Sohn Sung-Won;Han Ki-Jun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.93-103
    • /
    • 2006
  • Network solutions for protecting against worm attacks that complement partial end system patch deployment is a pressing problem. In the content-based worm filtering, the challenges focus on the detection accuracy and its performance enhancement problem. We present a worm filter architecture using the bloom filter for deployment at high-speed transit points on the Internet, including firewalls and gateways. Content-based packet filtering at multi-gigabit line rates, in general, is a challenging problem due to the signature explosion problem that curtails performance. We show that for worm malware, in particular, buffer overflow worms which comprise a large segment of recent outbreaks, scalable -- accurate, cut-through, and extensible -- filtering performance is feasible. We demonstrate the efficacy of the design by implementing it on an Intel IXP network processor platform with gigabit interfaces. We benchmark the worm filter network appliance on a suite of current/past worms, showing multi-gigabit line speed filtering prowess with minimal footprint on end-to-end network performance.

Alterations of Cerebral Metabolic Activation Following Electro-Acupuncture Stimulation on ST36 and LR3 Acu-Points in Rats (흰쥐의 족삼리 및 태충 전침자극에 따른 뇌대사활성의 변화)

  • Sohn, Young-Joo;Jung, Hyuk-Sang;Ku, Ja-Seung;Won, Ran;Kim, Yong-Suk;Park, Young-Bae;Sohn, Nak-Won
    • Journal of Acupuncture Research
    • /
    • v.19 no.1
    • /
    • pp.159-174
    • /
    • 2002
  • Objective : The meridian theory in oriental medicine explains that each acu-point has a characteristic functional effect. It will be supposed that an acupuncture stimulation on different acu-point evokes different activation on different areas in the central nervous system(CNS) according to the meridian theory. On this supposition, our group tried the semi-quantitative [14C]2-deoxyglucose([14C]2-DG) autoradiography on the acupuncture stimulation to the hindlimb acu-points of Sprague-Dawley rats. Methods : A venous catheter for the intravenous administration of isotope was equipped in the right external jugular vein on 3 days prior to the [14C]2-DG study. On the day of the study, two acupuncture needles were inserted into the ST36(Zusanli) or LR3(Taichong) on the left hindlimb. Electro-acupuncture stimulation (2 Hz, 5 ms, 1~3 mA, 15 minutes) started just before the i.v. injection of [14C]2-DG ($25{\mu}Ci/rat$). The brain and the spinal cord were removed and processed for the [14C] 2-DG autoradiography. Results : The EA stimulation on ST36 reveals over 120% metaboilc activation in Arcuate nucleus, Anterior pretectal nucleus, Dorsal cochlear nucleus, Interposed cerebellar nucleus, and Nucleus of Darkschewitsch. The EA stimulation on LR3 reveals over 120% metaboilc activation in Lateral habenula nucleus, Medial vestibular nucleus, Ventromedial thalamic nucleus, Anteroventral thalamic nucleus, Anterior cingulate cortex, Dentate gyrus, Antero cortical amygdaloid nucleus, Anterior pretectal nucleus, and Dorsal tegmental nucleus compared with the non EA stimulation control group. Conclusion : These results demonstrate that the different acu-points evoke the different activations in brain areas. And with this functional brain mapping study, a new scientific elucidation for the basis of the acupuncture-meridian theory in oriental medicine through differences of activated area in CNS according to the each acupuncture point.

  • PDF

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.

3D Model Retrieval Using Sliced Shape Image (단면 형상 영상을 이용한 3차원 모델 검색)

  • Park, Yu-Sin;Seo, Yung-Ho;Yun, Yong-In;Kwon, Jun-Sik;Choi, Jong-Soo
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.45 no.6
    • /
    • pp.27-37
    • /
    • 2008
  • Applications of 3D data increase with advancement of multimedia technique and contents, and it is necessary to manage and to retrieve for 3D data efficiently. In this paper, we propose a new method using the sliced shape which extracts efficiently a feature description for shape-based retrieval of 3D models. Since the feature descriptor of 3D model should be invariant to translation, rotation and scale for its model, normalization of models requires for 3D model retrieval system. This paper uses principal component analysis(PCA) method in order to normalize all the models. The proposed algorithm finds a direction of each axis by the PCA and creates orthogonal n planes in each axis. These planes are orthogonalized with each axis, and are used to extract sliced shape image. Sliced shape image is the 2D plane created by intersecting at between 3D model and these planes. The proposed feature descriptor is a distribution of Euclidean distances from center point of sliced shape image to its outline. A performed evaluation is used for average of the normalize modified retrieval rank(ANMRR) with a standard evaluation from MPEG-7. In our experimental results, we demonstrate that the proposed method is an efficient 3D model retrieval.

Visible Light Driven ZnFe2Ta2O9 Catalyzed Decomposition of H2S for Solar Hydrogen Production

  • Subramanian, Esakkiappan;Baeg, Jin-Ook;Kale, Bharat B.;Lee, Sang-Mi;Moon, Sang-Jin;Kong, Ki-Jeong
    • Bulletin of the Korean Chemical Society
    • /
    • v.28 no.11
    • /
    • pp.2089-2092
    • /
    • 2007
  • Tantalum-containing metal oxides, well known for their efficiency in water splitting and H2 production, have never been used in visible light driven photodecomposition of H2S and H2 production. The present work is an attempt in this direction and investigates their efficiency. A mixed metal oxide, ZnFe2Ta2O9, with the inclusion of Fe2O3 to impart color, was prepared by the conventional ceramic route in single- and double-calcinations (represented as ZnFe2Ta2O9-SC and ZnFe2Ta2O9-DC respectively). The XRD characterization shows that both have identical patterns and reveals tetragonal structure to a major extent and a minor contribution of orthorhombic crystalline system. The UV-visible diffuse reflection spectra demonstrate the intense, coherent and wide absorption of visible light by both the catalysts, with absorption edge at 650 nm, giving rise to a band gap of 1.9 eV. Between the two catalysts, however, ZnFe2Ta2O9-DC has greater absorption in almost the entire wavelength region, which accounts for its strong brown coloration than ZnFe2Ta2O9-SC when viewed by the naked eye. In photocatalysis, both catalysts decompose H2S under visible light irradiation (λ ≥ 420 nm) and produce solar H2 at a much higher rate than previously reported catalysts. Nevertheless, ZnFe2Ta2O9-DC distinguishes itself from ZnFe2Ta2O9-SC by exhibiting a higher efficiency because of its greater light absorption. Altogether, the tantalum-containing mixed metal oxide proves its efficient catalytic role in H2S decomposition and H2 production process also.