• Title/Summary/Keyword: Embedded data

Search Result 2,135, Processing Time 0.034 seconds

SHEAR BOND STRENGTH AND MICROLEAKAGE OF COMPOSITE RESIN ACCORDING TO TREATMENT METHODS OF CONTAMINATED SURFACE AFTER APPLYING A BONDING AGENT (접착제 도포후 오염된 표면의 처리방법에 따른 복합레진의 전단결합강도와 미세누출)

  • Park, Joo-Sik;Lee, Suck-Jong;Moon, Joo-Hoon;Cho, Young-Gon
    • Restorative Dentistry and Endodontics
    • /
    • v.24 no.4
    • /
    • pp.647-656
    • /
    • 1999
  • The purpose of this study was to investigate the shear bond strength and marginal microleakage of composite to enamel and dentin according to different treatment methods when the applied bonding agent was contaminated by artificial saliva. For the shear bond strength test, the buccal and occlusal surfaces of one hundred twenty molar teeth were ground to expose enamel(n=60) and dentin surfaces(n=60). The specimens were randomly assigned into control and 5 experimental groups with 10 samples in each group. In control group, a bonding system(Scotchbond$^{TM}$ Multi-Purpose plus) and a composite resin(Z-100$^{TM}$) was bonded on the specimens according to manufacture's directions. Experimental groups were subdivided into 5 groups. After polymerization of an adhesive, they were contaminated with at artificial saliva on enamel and dentin surfaces: Experimental group 1 ; artificial saliva was dried with compressed air. Experimental group 2 ; artificial saliva was rinsed with air-water spray and dried. Experimental group 3 ; artificial saliva was rinsed, dried and applied an adhesive. Experimental group 4 ; artificial saliva was rinsed, dried, and then etched using phosphoric acid followed by an adhesive. Experimental group 5, artificial saliva was rinsed, dried, and then etched with phosphoric acid followed by consecutive application of both a primer and an adhesive. Composite resin(Z-100$^{TM}$) was bonded on saliva-treated enamel and dentin surfaces. The shear bond strengths were measured by universal testing machine(AGS-1000 4D, Shimaduzu Co. Japan) with a crosshead speed of 5mm/minute under 50kg load cell. Failure modes of fracture sites were examined under stereomicroscope. The data were analyzed by one-way ANOVA and Tukey's test. For the marginal microleakage test, Class V cavities were prepared on the buccal surfaces of sixty molars. The specimens were divided into control and experimental groups. Cavities in experimental group were contaminated with artificial saliva and those surfaces in each experimental groups received the same treatments as for the shear test. Cavities were filled with Z-100. Specimens were immersed in 0.5% basic fuchsin dye for 24 hours and embedded in transparent acrylic resin and sectioned buccolingually with diamond wheel saw. Four sections were obtained from the one specimen. Marginal microleakages of enamel and dentin were scored under streomicroscope and averaged from four sections. The data were analyzed by Kruskal-Wallis test and Fisher's LSD. The results of this study were as follows. 1. The shear bond strength to enamel showed lower value in experimental group 1(13.20${\pm}$2.94MPa) and experimental group 2(13.20${\pm}$2.94MPa) than in control(20.03${\pm}$4.47MPa), experimental group 4(20.96${\pm}$4.25MPa) and experimental group 5(21.25${\pm}$4.48MPa) (p<0.05). 2. The shear bond strength to dentin showed lower value in experimental group 1(9.35${\pm}$4.11MPa) and experimental group 2(9.83${\pm}$4.11MPa) than in control group(17.86${\pm}$4.03MPa), experimental group 4(15.04${\pm}$3.22MPa) and experimental group 5(14.33${\pm}$3.00MPa) (p<0.05). 3. Both on enamel and dentin surfaces, experimental group 1 and 2 showed many adhesive failures, but control and experimental group 3, 4 and 5 showed mixed and cohesive failures. 4. Enamel marginal microleakage was the highest in experimental group 1 and there was a significant difference in comparison with other groups (p<0.05). 5. Dentin marginal microleakages of experimental group 1 and 2 were higher than those of other groups (p<0.05). This result suggests that treatment methods, re-etching with 35% phosphoric acid followed by re-application of adhesive or repeating all adhesive procedures, will produce good effect on both shear bond strength and microleakage of composite to enamel and dentin if the polymerized bonding agent was contaminated by saliva.

  • PDF

Ethnosientific Approach of Health Practice in Korea (한국인의 건강관행에 대한 민속과학적 접근)

  • 김귀분;최연희
    • Journal of Korean Academy of Nursing
    • /
    • v.21 no.3
    • /
    • pp.396-417
    • /
    • 1991
  • In order that nursing care an essential quality of nursing practice be acceptable and satisfying, it is necessary that client's culture be respected and that nursing practice be appropriate to that culture. Since cultural elements are an important influence on health practices and life patterns related to medical treatment, recovery from and prevention of disease, nurses need to have an understanding and knowledge of social and cultural phenomena to aid in the planning of nursing interventions. To understand the health practices surrounding health and illness, the health beliefs and practices of both folk and professional healing systems should be ascertained. Cultural data are required to provide care of high quality to clients and to reduce possible conflict between the client and the nurse. It is nursing's goal to provide clients from various cultures with quality nursing care which is satisfying and valuable. The problem addressed by this study was to identify Korean health practices which would contribute to the planning of professional caring practice with the culture : ultimately this study was intended to make a contribution to the development of the science of nursing. The concrete objectives of this study were ; 1) to identify Korean health practices, 2) to interpret the identitial health practices through traditional cultural thought, and 3) to compare the Korean health practices with those of other cultures. The investigator used the ethnosceintific approach outlined by spradly in a qualitative study. To discover ancestral wisdom and knowledge related to traditional health practeces, the subjects of this study were selected from residents of a small rural mountain village in south west Korea, a place considered to be maintaining and transmitting the traditional culture in a relatively well -preserved state because of being isolated from the modern world. The number of subjects was 18, aged 71 to 89. Research data were collected from January 8 to March 31, 1990. Five categories of health practices were identified : “Manage one's own mind”, “Moderation in all thing”, “Live in accord with nature”, “Live in mutuality with others”, and “Live to the best of one's ability”. Values derived from these ways of thinking from Confucianism, Taoism and Buddhism help fashion a traditional way of life, examplified by the saying “Benifience to all”. Korean thought and philosophy is influenced primerily by Confucianism, Confucian principles of ethics, embedded deeply in the peoples' minds, form the idea that “heaven and human being are intimately united” based on concept that “heaven is, so to speak, reason”. Twoe Gae's theory of existential subjectivity develops the concept of self which is the basis of the spirit of reverence in modern Confucian philosophy. The human md is granted from heaven out of the idea of matter, and what control the mind is the spirit of reverence. Hence the idea of “The primacy of the mind" and provided that one should control one's own mind. The precepts of duty to parents, respect for elders and worship of ancestors, and moderation in all behavior put a restraint on life which directed that one live earnestly according to Nature's laws with their neighbors. Not only Confucianism, but also Buddism and Taoism have had an important effect upon these patterns of ideas. When compared with western culture, Korean health practices tend to be more inclusive, abstract and intuitive while westerner health practices found to be mere concrete, practical and personal. Values and beliefs based and pragmatism and existentialism infuence western civilization, Ethical values may be founded on utilitarianism, which considers what is good for the persons in their circumstances as the basis of conduct and takes a serious view of their practical lives including human aspirations rather than an absolute truth. These philosophical and ethical ideas are foundations for health practices related to active, practical and progressive attitudes. This study should be enable nursing not only to understand clients as reflections of the traditional culture when planning nursing practice, but to dovelop health education corresponding to cultural requiments for the purpose of protection against disease and improvement of health, and thus promote sound health practice. Eventually it is hoped that through these processes quality nursing care as the central idea of the science of nursing will be achieved.

  • PDF

MARGINAL MICROLEAKAGE AND SHEAR BOND STRENGTH OF COMPOSITE RESIN ACCORDING TO TREATMENT METHODS OF ARTIFICIAL SALIVA-CONTAMINATED SURFACE AFTER PRIMING (접착강화제 도포후 인공타액에 오염된 표면의 처리방법에 따른 복합레진의 번연누출과 전단결합강도)

  • Cho, Young-Gon;Ko, Kee-Jong;Lee, Suk-Jong
    • Restorative Dentistry and Endodontics
    • /
    • v.25 no.1
    • /
    • pp.46-55
    • /
    • 2000
  • During bonding procedure of composite resin, the prepared cavity can be contaminated by saliva. In this study, marginal microleakage and shear bond strength of a composite resin to primed enamel and dentin treated with artificial saliva(Taliva$^{(R)}$) were evaluated. For the marginal microleakage test, Class V cavities were prepared in the buccal surfaces of fifty molars. The samples were randomly assigned into 5 groups with 10 samples in each group. Control group was applied with a bonding system (Scotchbond$^{TM}$ Multi-Purpose plus) according to manufacture's directions without saliva contamination. Experimental groups were divided into 4 groups and contaminated with artificial saliva for 30 seconds after priming: Experimental 1 group ; artificial saliva was dried with compressed air only, Experimental 2 group ; artificial saliva was rinsed and dried. Experimental 3 group ; cavities were etched with 35% phosphoric acid for 15 seconds after rinsing and drying artificial saliva. Experimental 4 group ; cavities were etched with 35% phosphoric acid for 15 seconds and primer was reapplied after rinsing and drying artificial saliva. All the cavities were applied a bonding agent and filled with a composite resin (Z-100$^{TM}$). Specimens were immersed in 0.5% basic fuschin dye for 24 hours and embedded in transparent acrylic resin and sectioned buccolingually with diamond wheel saw. Four sections were obtained from one specimen. Degree of marginal leakage was scored under stereomicroscope and their scores were averaged from four sections. The data were analyzed by Kruscal-Wallis test and Fisher's LSD. For the shear bond strength test, the buccal or occlusal surfaces of one hundred molar teeth were ground to expose enamel(n=50) or dentin(n=50) using diamond wheel saw and its surface was smoothed with Lapping and Polishing Machine(South Bay Technology Co., U.S.A.). Samples were divided into 5 groups. Treatment of saliva-contaminated enamel and dentin surfaces was same as the marginal microleakage test and composite resin was bonded via a gelatin capsule. All specimens were stored in distilled water for 48 hours. The shear bond strengths were measured by universal testing machine (AGS-1000 4D, Shimaduzu Co., Japan) with a crosshead speed of 5 mm/minute. Failure mode of fracture sites was examined under stereomicroscope. The data were analyzed by ANOVA and Tukey's studentized range test. The results of this study were as follows : 1. Enamel marginal microleakage showed no significant difference among groups. 2. Dentinal marginal microleakages of control, experimental 2 and 4 groups were lower than those of experimental 1 and 3 groups (p<0.05). 3. The shear bond strength to enamel was the highest value in control group (20.03${\pm}$4.47MPa) and the lowest value in experimental 1 group (13.28${\pm}$6.52MPa). There were significant differences between experimental 1 group and other groups (p<0.05). 4. The shear bond strength to dentin was higher in control group (17.87${\pm}$4.02MPa) and experimental 4 group (16.38${\pm}$3.23MPa) than in other groups, its value was low in experimental 1 group (3.95${\pm}$2.51 MPa) and experimental 2 group (6.72${\pm}$2.26MPa)(p<0.05). 5. Failure mode of fractured site on the enamel showed mostly adhesive failures in experimental 1 and 3 groups. 6. Failure mode of fractured site on the dentin did not show adhesive failures in control group, but showed mostly adhesive failure in experimental groups. As a summary of above results, if the primed tooth surface was contaminated with artificial saliva, primer should be reapplied after re-etching it.

  • PDF

Comparative Study of Cyclioxygenase-2 Expression and HER-2/neu Amplification in Korean and Caucasian Women with Early-Onset Breast Carcinoma (한국인과 백인 젊은 여성 유방암 환자에서 Cyclooxygenase-2 발현과 HER-2/neu 증폭의 비교 연구)

  • Choi, Doo-Ho;Kim, Eun-Seog;Kim, Yong-Ho;Jin, So-Young;Lee, Dong-Wha;Haffty, Bruce G.
    • Radiation Oncology Journal
    • /
    • v.22 no.4
    • /
    • pp.307-315
    • /
    • 2004
  • Purpose: The purpose of this work was to study the differences of cyclooxygenase (COX-2) expression between Korean and Caucasian patients with early-onset breast carcinoma by immunohistochemistry. The test were analyzed to find a correlation between COX-2 and other biomarkers including HER-2/neu amplification, because we previously reported that a significant difference had been found in the expression of HER-2/neu between the two races. Furthermore, we investigated prognostic significance of COX-2 in korean patients. Materials and Methods: Sixty Korean women who were diagnosed breast carcinoma at 45 years old or younger and 60 Caucasian women with breast carcinoma were selected for this study. The median age of both groups was 37 years and tumor sizes were distributed evenly between the two group. Paraffin embedded blocks of primary tumor were processed for immunohistochemical staining of COX-2. The COX-2 expression was evaluated according to the percentage of positive cells and the intensity of staining. And the results were compared with the data of the previous studies to find correlation between COX-2 and other parameters and survival data. Results: Proportion of the COX-2 expression in total patients was $27.6\%$. The percentage of tumors that stained positive for COX-2 in korean and Caucasian women with early-onset breast carcinoma were $37.9\%$ and $20.8\%$, respectively. The difference was statistically not significant(p=0.090). Expression of COX-2 was not associated with several clinicopathologic parameters including HER-2/neu overexpression, but negative estrogen receptor status was correlated with significance (p=0.046). The 5 year disease free survival rate for patients with COX-2 expression was $67.9\%$, compared to $81.9\%$ of the COX-2 negative patients and the result was statistically not significant. Conclusions : A significant difference was not found in the expression of COX-2 between the two groups of patients with early-onset breast carcinoma. And correlation between COX-2 and other parameters was not observed except estrogen receptor negativity. Large scaled further research including radiotherapy factors will be needed to identify COX-2 as a prognostic role in patients with early-onset breast carcinoma.

A Study on the Meaning and Strategy of Keyword Advertising Marketing

  • Park, Nam Goo
    • Journal of Distribution Science
    • /
    • v.8 no.3
    • /
    • pp.49-56
    • /
    • 2010
  • At the initial stage of Internet advertising, banner advertising came into fashion. As the Internet developed into a central part of daily lives and the competition in the on-line advertising market was getting fierce, there was not enough space for banner advertising, which rushed to portal sites only. All these factors was responsible for an upsurge in advertising prices. Consequently, the high-cost and low-efficiency problems with banner advertising were raised, which led to an emergence of keyword advertising as a new type of Internet advertising to replace its predecessor. In the beginning of 2000s, when Internet advertising came to be activated, display advertisement including banner advertising dominated the Net. However, display advertising showed signs of gradual decline, and registered minus growth in the year 2009, whereas keyword advertising showed rapid growth and started to outdo display advertising as of the year 2005. Keyword advertising refers to the advertising technique that exposes relevant advertisements on the top of research sites when one searches for a keyword. Instead of exposing advertisements to unspecified individuals like banner advertising, keyword advertising, or targeted advertising technique, shows advertisements only when customers search for a desired keyword so that only highly prospective customers are given a chance to see them. In this context, it is also referred to as search advertising. It is regarded as more aggressive advertising with a high hit rate than previous advertising in that, instead of the seller discovering customers and running an advertisement for them like TV, radios or banner advertising, it exposes advertisements to visiting customers. Keyword advertising makes it possible for a company to seek publicity on line simply by making use of a single word and to achieve a maximum of efficiency at a minimum cost. The strong point of keyword advertising is that customers are allowed to directly contact the products in question through its more efficient advertising when compared to the advertisements of mass media such as TV and radio, etc. The weak point of keyword advertising is that a company should have its advertisement registered on each and every portal site and finds it hard to exercise substantial supervision over its advertisement, there being a possibility of its advertising expenses exceeding its profits. Keyword advertising severs as the most appropriate methods of advertising for the sales and publicity of small and medium enterprises which are in need of a maximum of advertising effect at a low advertising cost. At present, keyword advertising is divided into CPC advertising and CPM advertising. The former is known as the most efficient technique, which is also referred to as advertising based on the meter rate system; A company is supposed to pay for the number of clicks on a searched keyword which users have searched. This is representatively adopted by Overture, Google's Adwords, Naver's Clickchoice, and Daum's Clicks, etc. CPM advertising is dependent upon the flat rate payment system, making a company pay for its advertisement on the basis of the number of exposure, not on the basis of the number of clicks. This method fixes a price for advertisement on the basis of 1,000-time exposure, and is mainly adopted by Naver's Timechoice, Daum's Speciallink, and Nate's Speedup, etc, At present, the CPC method is most frequently adopted. The weak point of the CPC method is that advertising cost can rise through constant clicks from the same IP. If a company makes good use of strategies for maximizing the strong points of keyword advertising and complementing its weak points, it is highly likely to turn its visitors into prospective customers. Accordingly, an advertiser should make an analysis of customers' behavior and approach them in a variety of ways, trying hard to find out what they want. With this in mind, her or she has to put multiple keywords into use when running for ads. When he or she first runs an ad, he or she should first give priority to which keyword to select. The advertiser should consider how many individuals using a search engine will click the keyword in question and how much money he or she has to pay for the advertisement. As the popular keywords that the users of search engines are frequently using are expensive in terms of a unit cost per click, the advertisers without much money for advertising at the initial phrase should pay attention to detailed keywords suitable to their budget. Detailed keywords are also referred to as peripheral keywords or extension keywords, which can be called a combination of major keywords. Most keywords are in the form of texts. The biggest strong point of text-based advertising is that it looks like search results, causing little antipathy to it. But it fails to attract much attention because of the fact that most keyword advertising is in the form of texts. Image-embedded advertising is easy to notice due to images, but it is exposed on the lower part of a web page and regarded as an advertisement, which leads to a low click through rate. However, its strong point is that its prices are lower than those of text-based advertising. If a company owns a logo or a product that is easy enough for people to recognize, the company is well advised to make good use of image-embedded advertising so as to attract Internet users' attention. Advertisers should make an analysis of their logos and examine customers' responses based on the events of sites in question and the composition of products as a vehicle for monitoring their behavior in detail. Besides, keyword advertising allows them to analyze the advertising effects of exposed keywords through the analysis of logos. The logo analysis refers to a close analysis of the current situation of a site by making an analysis of information about visitors on the basis of the analysis of the number of visitors and page view, and that of cookie values. It is in the log files generated through each Web server that a user's IP, used pages, the time when he or she uses it, and cookie values are stored. The log files contain a huge amount of data. As it is almost impossible to make a direct analysis of these log files, one is supposed to make an analysis of them by using solutions for a log analysis. The generic information that can be extracted from tools for each logo analysis includes the number of viewing the total pages, the number of average page view per day, the number of basic page view, the number of page view per visit, the total number of hits, the number of average hits per day, the number of hits per visit, the number of visits, the number of average visits per day, the net number of visitors, average visitors per day, one-time visitors, visitors who have come more than twice, and average using hours, etc. These sites are deemed to be useful for utilizing data for the analysis of the situation and current status of rival companies as well as benchmarking. As keyword advertising exposes advertisements exclusively on search-result pages, competition among advertisers attempting to preoccupy popular keywords is very fierce. Some portal sites keep on giving priority to the existing advertisers, whereas others provide chances to purchase keywords in question to all the advertisers after the advertising contract is over. If an advertiser tries to rely on keywords sensitive to seasons and timeliness in case of sites providing priority to the established advertisers, he or she may as well make a purchase of a vacant place for advertising lest he or she should miss appropriate timing for advertising. However, Naver doesn't provide priority to the existing advertisers as far as all the keyword advertisements are concerned. In this case, one can preoccupy keywords if he or she enters into a contract after confirming the contract period for advertising. This study is designed to take a look at marketing for keyword advertising and to present effective strategies for keyword advertising marketing. At present, the Korean CPC advertising market is virtually monopolized by Overture. Its strong points are that Overture is based on the CPC charging model and that advertisements are registered on the top of the most representative portal sites in Korea. These advantages serve as the most appropriate medium for small and medium enterprises to use. However, the CPC method of Overture has its weak points, too. That is, the CPC method is not the only perfect advertising model among the search advertisements in the on-line market. So it is absolutely necessary that small and medium enterprises including independent shopping malls should complement the weaknesses of the CPC method and make good use of strategies for maximizing its strengths so as to increase their sales and to create a point of contact with customers.

  • PDF

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

The nanoleakage patterns of experimental hydrophobic adhesives after load cycling (Load cycling에 따른 소수성 실험용 상아질 접착제의 nanoleakage 양상)

  • Sohn, Suh-Jin;Chang, Ju-Hae;Kang, Suk-Ho;Yoo, Hyun-Mi;Cho, Byeong-Hoon;Son, Ho-Hyun
    • Restorative Dentistry and Endodontics
    • /
    • v.33 no.1
    • /
    • pp.9-19
    • /
    • 2008
  • The purpose of this study was: (1) to compare nanoleakage patterns of a conventional 3-step etch and rinse adhesive system and two experimental hydrophobic adhesive systems and (2) to investigate the change of the nanoleakage patterns after load cycling. Two kinds of hydrophobic experimental adhesives, ethanol containing adhesive (EA) and methanol containing adhesive (MA), were prepared. Thirty extracted human molars were embedded in resin blocks and occlusal thirds of the crowns were removed. The polished dentin surfaces were etched with a 35 % phosphoric acid etching gel and rinsed with water. Scotchbond Multi-Purpose (MP), EA and MA were used for bonding procedure. Z-250 composite resin was built-up on the adhesive-treated surfaces. Five teeth of each dentin adhesive group were subjected to mechanical load cycling. The teeth were sectioned into 2 mm thick slabs and then stained with 50 % ammoniacal silver nitrate. Ten specimens for each group were examined under scanning electron microscope in backscattering electron mode. All photographs were analyzed using image analysis software. Three regions of each specimen were used for evaluation of the silver uptake within the hybrid layer. The area of silver deposition was calculated and expressed in gray value. Data were statistically analyzed by two-way ANOVA and post-hoc testing of multiple comparisons was done with the Scheffe's test. Silver particles were observed in all the groups. However, silver particles were more sparsely distributed in the EA group and the MA group than in the MP group (p < .0001). There were no changes in nanoleakage patterns after load cycling.

Effect of Radiation Dose for Radiotherapy on Ovarian Follicle Atresia in Rat (치료 방사선량이 쥐의 난포 퇴축에 미치는 영향)

  • Lee, Won-Jeong;Seon, Jong-Ryul;Yoo, Se-Jong;Ahn, Bong-Seon
    • Journal of Radiation Protection and Research
    • /
    • v.37 no.4
    • /
    • pp.208-212
    • /
    • 2012
  • In previous studies, ovarian follicle in rat has been used a higher radiation dose than that for cancer radiotherapy in clinical practice. The aim of this study was to evaluate the effect of radiation dose used for cancer radiotherapy on ovarian follicle atresia in rat. Mice of 4-week-old female were whole body irradiated with 2 cGy or 2 Gy (Mevatron 67, Siemens, Germany) and sacrificed by cervical dislocation. Ovaries were collected at 24 hours after irradiation to observe the degree of follicular atresia. Ovaries were fixed in neutral formaldehyde solution for 24 hours and embedded with paraffin. Cutted in $5{\mu}m$ thickness with microtome and stained with hematoxylin and eosin (H&E) and TUNEL immunohistochemical stain, and examined histologically under a light microscope. All data were presented as mean ${\pm}SD$, calculating the ratio of normal or atretic follicles to total ovarian follicles. Statistical analysis was performed by the Mann Whitney test using the SPSS ver 19.0. Ratio of atretic to total follicles of 2 Gy group was significantly higher than control or 2 cGy groups (p<0.05). Ratio of normal to total follicles of 2 Gy group was significantly lower than control group in preantral follicle (64.0 vs. 87.7, p=0.027). Ratio of normal to total follicles of 2 cGy group was significantly increased more than control or 2 Gy groups in antral follicle, and there were no significant difference between control and 2 Gy groups (p=0.522). Radiation dose of 2 Gy for cancer radiotherapy have a significant effect on ovarian follicle atresia in rat.

A study on the use of a Business Intelligence system : the role of explanations (비즈니스 인텔리전스 시스템의 활용 방안에 관한 연구: 설명 기능을 중심으로)

  • Kwon, YoungOk
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.155-169
    • /
    • 2014
  • With the rapid advances in technologies, organizations are more likely to depend on information systems in their decision-making processes. Business Intelligence (BI) systems, in particular, have become a mainstay in dealing with complex problems in an organization, partly because a variety of advanced computational methods from statistics, machine learning, and artificial intelligence can be applied to solve business problems such as demand forecasting. In addition to the ability to analyze past and present trends, these predictive analytics capabilities provide huge value to an organization's ability to respond to change in markets, business risks, and customer trends. While the performance effects of BI system use in organization settings have been studied, it has been little discussed on the use of predictive analytics technologies embedded in BI systems for forecasting tasks. Thus, this study aims to find important factors that can help to take advantage of the benefits of advanced technologies of a BI system. More generally, a BI system can be viewed as an advisor, defined as the one that formulates judgments or recommends alternatives and communicates these to the person in the role of the judge, and the information generated by the BI system as advice that a decision maker (judge) can follow. Thus, we refer to the findings from the advice-giving and advice-taking literature, focusing on the role of explanations of the system in users' advice taking. It has been shown that advice discounting could occur when an advisor's reasoning or evidence justifying the advisor's decision is not available. However, the majority of current BI systems merely provide a number, which may influence decision makers in accepting the advice and inferring the quality of advice. We in this study explore the following key factors that can influence users' advice taking within the setting of a BI system: explanations on how the box-office grosses are predicted, types of advisor, i.e., system (data mining technique) or human-based business advice mechanisms such as prediction markets (aggregated human advice) and human advisors (individual human expert advice), users' evaluations of the provided advice, and individual differences in decision-makers. Each subject performs the following four tasks, by going through a series of display screens on the computer. First, given the information of the given movie such as director and genre, the subjects are asked to predict the opening weekend box office of the movie. Second, in light of the information generated by an advisor, the subjects are asked to adjust their original predictions, if they desire to do so. Third, they are asked to evaluate the value of the given information (e.g., perceived usefulness, trust, satisfaction). Lastly, a short survey is conducted to identify individual differences that may affect advice-taking. The results from the experiment show that subjects are more likely to follow system-generated advice than human advice when the advice is provided with an explanation. When the subjects as system users think the information provided by the system is useful, they are also more likely to take the advice. In addition, individual differences affect advice-taking. The subjects with more expertise on advisors or that tend to agree with others adjust their predictions, following the advice. On the other hand, the subjects with more knowledge on movies are less affected by the advice and their final decisions are close to their original predictions. The advances in predictive analytics of a BI system demonstrate a great potential to support increasingly complex business decisions. This study shows how the designs of a BI system can play a role in influencing users' acceptance of the system-generated advice, and the findings provide valuable insights on how to leverage the advanced predictive analytics of the BI system in an organization's forecasting practices.

Production of a hypothetical polyene substance by activating a cryptic fungal PKS-NRPS hybrid gene in Monascus purpureus (홍국Monascus purpureus에서 진균 PKS-NRPS 하이브리드 유전자의 발현 유도를 통한 미지 polyene 화합물의 생성)

  • Suh, Jae-Won;Balakrishnan, Bijinu;Lim, Yoon Ji;Lee, Doh Won;Choi, Jeong Ju;Park, Si-Hyung;Kwon, Hyung-Jin
    • Journal of Applied Biological Chemistry
    • /
    • v.61 no.1
    • /
    • pp.83-91
    • /
    • 2018
  • Advances in bacterial and fungal genome mining uncover a plethora of cryptic secondary metabolite biosynthetic gene clusters. Guided by the genome information, targeted transcriptional derepression could be employed to determine the product of a cryptic gene cluster and to explore its biological role. Monascus spp. are food grade filamentous fungi popular in eastern Asia and several genome data belong to them are now available. We achieved transcription activation of a cryptic fungal polyketide synthase-nonribosomal peptide synthase gene Mpfus1 in Monascus purpureus ${\Delta}MpPKS5$ by inserting Aspergillus gpdA promoter at the upstream of Mpfus1 through double crossover gene replacement. The gene cluster with Mpfus1 show a high similarity to those for the biosynthesis of conjugated polyene derivatives with 2-pyrrolidone ring and the mycotoxin fusarin is the representative member of this group. The ${\Delta}MpPKS5$ is incapable of producing azaphilone pigment, providing an excellent background to identify chromogenic and UV-absorbing compounds. Activation of Mpfus1 resulted in a yellow hue on mycelia and its methanol extract exhibit a maximum absorption at 365 nm. HPLC analysis of the organic extracts indicated the presence of a variety of yellow compounds in the extract. This implies that the product of MpFus1 is metabolically or chemically unstable. LC-MS analysis guided us to predict the MpFus1 product and to propose that the Mpfus1-containing gene cluster encode the biosynthesis of a desmethyl analogue of fusarin. This study showcases the genome mining in Monascus and the possibility to unveil new biological activities embedded in it.