• Title/Summary/Keyword: ITS Service

Search Result 7,303, Processing Time 0.038 seconds

Comparison of Physiological Activities of Radish Bud (Raphanus sativus L.) according to Extraction Solvent and Sprouting Period (추출용매 및 발아시기에 따른 무순 추출물의 생리활성 비교)

  • Han, Jin-Hee;Moon, Hye-Kyung;Chung, Shin-Kyo;Kang, Woo-Won
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.44 no.4
    • /
    • pp.549-556
    • /
    • 2015
  • This study extracted radish bud (Raphanus sativus L.) and investigated its nitrite scavenging activity, superoxide dismutases (SOD)-like activity, tyrosinase inhibition activity, xanthine oxidase inhibition activity, and angiotensin-converting-enzyme (ACE) inhibition activity according to extraction solvent and sprouting period. For nitrite scavenging activity, each extract recorded its highest level of 81.44~89.71% at pH 1.2. Radish bud extracts on sprouting days 4 and 8 showed greater scavenging activities than those on sprouting day 12 at pH 1.2 and pH 4.0. There were differences in scavenging activity according to extraction solvent based on water extract exhibiting improved scavenging activity. Ethanol extract recorded scavenging activity of 16.12% at pH 6.0, which was similar to those of ethanol and methanol radish bud extracts on sprouting day 12. SOD-like activity of radish bud extracts was in the range of 4.57~27.05%. For comparison purposes, SOD-like activity of L-ascorbic acid was 52.15%, which was higher than that of radish bud extracts. Acetone and methanol extracts showed high SOD-like activities on sprouting day 8. SOD-like activity of radish bud extracts on sprouting day 12 significantly decreased to 4.57~15.59%. Radish bud extracts recorded good tyrosinase inhibitory activities on sprouting 8 and 12, whereas methanol extracts recorded the greatest tyrosinase inhibitory activity at 62.65~84.89%. Radish bud extracts recorded xanthine oxidase inhibition activity of 21.26~29.52% on sprouting day 4, and acetone extracts showed the highest level of xanthine oxidase inhibition activity. Xanthine oxidase inhibitory activity tended to decrease with sprouting period compared early on. ACE inhibitory activity was in the range of 12.48~51.78% according to sprouting period and extraction solvent. Ethanol extracts on sprouting day 8 showed the highest ACE inhibitory activity of 51.78%. These results will hopefully contribute to research into the identification of materials and development of products for natural functional foods.

Analysis and Evaluation of Frequent Pattern Mining Technique based on Landmark Window (랜드마크 윈도우 기반의 빈발 패턴 마이닝 기법의 분석 및 성능평가)

  • Pyun, Gwangbum;Yun, Unil
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.101-107
    • /
    • 2014
  • With the development of online service, recent forms of databases have been changed from static database structures to dynamic stream database structures. Previous data mining techniques have been used as tools of decision making such as establishment of marketing strategies and DNA analyses. However, the capability to analyze real-time data more quickly is necessary in the recent interesting areas such as sensor network, robotics, and artificial intelligence. Landmark window-based frequent pattern mining, one of the stream mining approaches, performs mining operations with respect to parts of databases or each transaction of them, instead of all the data. In this paper, we analyze and evaluate the techniques of the well-known landmark window-based frequent pattern mining algorithms, called Lossy counting and hMiner. When Lossy counting mines frequent patterns from a set of new transactions, it performs union operations between the previous and current mining results. hMiner, which is a state-of-the-art algorithm based on the landmark window model, conducts mining operations whenever a new transaction occurs. Since hMiner extracts frequent patterns as soon as a new transaction is entered, we can obtain the latest mining results reflecting real-time information. For this reason, such algorithms are also called online mining approaches. We evaluate and compare the performance of the primitive algorithm, Lossy counting and the latest one, hMiner. As the criteria of our performance analysis, we first consider algorithms' total runtime and average processing time per transaction. In addition, to compare the efficiency of storage structures between them, their maximum memory usage is also evaluated. Lastly, we show how stably the two algorithms conduct their mining works with respect to the databases that feature gradually increasing items. With respect to the evaluation results of mining time and transaction processing, hMiner has higher speed than that of Lossy counting. Since hMiner stores candidate frequent patterns in a hash method, it can directly access candidate frequent patterns. Meanwhile, Lossy counting stores them in a lattice manner; thus, it has to search for multiple nodes in order to access the candidate frequent patterns. On the other hand, hMiner shows worse performance than that of Lossy counting in terms of maximum memory usage. hMiner should have all of the information for candidate frequent patterns to store them to hash's buckets, while Lossy counting stores them, reducing their information by using the lattice method. Since the storage of Lossy counting can share items concurrently included in multiple patterns, its memory usage is more efficient than that of hMiner. However, hMiner presents better efficiency than that of Lossy counting with respect to scalability evaluation due to the following reasons. If the number of items is increased, shared items are decreased in contrast; thereby, Lossy counting's memory efficiency is weakened. Furthermore, if the number of transactions becomes higher, its pruning effect becomes worse. From the experimental results, we can determine that the landmark window-based frequent pattern mining algorithms are suitable for real-time systems although they require a significant amount of memory. Hence, we need to improve their data structures more efficiently in order to utilize them additionally in resource-constrained environments such as WSN(Wireless sensor network).

Analysis on elements of policy changes in character industry (캐릭터산업의 정책변인연구)

  • Han, Chang-Wan
    • Cartoon and Animation Studies
    • /
    • s.33
    • /
    • pp.597-616
    • /
    • 2013
  • Character industry is not only knowledge-based industry chiefly with copyrights but also motive power for creative economy to take a role functionally over the fields of industries because it has industrial characteristic as complement product to promote sale value in manufacturing industry and service industry and increase profit on sales. Since 2003, the national policy related to character has aimed to maximize effect among connected industries, extend its business abroad, enforce copyrights through the improvement of marketing system, develop industrial infrastructure through raising quality of character products. With the result of this policy, the successful cases of connected contents have been crystallized and domestic character industry has stepped up methodically since 2007. It is needed to reset the scales of character industry and industrial stats because there are more know-how of self industry promotion and more related characters through strategy of market departmentalization starting with cartoon, animation, games, novels, movies and musicals. Especially, The Korea government set our target for 'Global Top Five Character Power' since 2009 and has started to carry out to find global star characters, support to establish network among connected industries, diversify promotion channels, and develop licensing business. Particularly, since 2013, There have been prospered the indoor character theme park with time management just like character experimental marketing or Kids cafes using characters, the demand market of digital character focusing on SNS emoticon, and the performance market for character musical consistently. Moreover, The domestic and foreign illegal black markets on off-line have been enlarged, so we need another policy alternative. To prepare for the era of exploding character demand market and diversifying platform, it is needed to set up a solid strategy that is required the elements of policy changes in character industry to vitalize character industry and support new character design and connected contents. the following shows that the elements of policy changes related to the existing policy, the current position of market. Nowadays, the elements of policy changes in domestic character industry are that variety of consumers in the digital character market according to platform diversification, Convergence contents of character goods for the Korean waves, legalization of the illegal black contents market, and controling the tendency of consumers in departmentalized market. This can help find the policy issue entirely deferent with the existing character powers like US, Japan or Europe. In its final analysis, the alternatives are the promotion of models with contract copyrights of domestic and foreign connected contents, the diversification of profit models of platform economy, the additive development of target market related to enlarging the Korean waves, and the strategy of character market for the age-specific tendency according to developing character demand market.

Learning from the Licensing and Training Requirements of the USA Private Security Industry : focused on the Private Security Officer Employment Authorization Act & California System (미국의 민간경비 자격 및 교육훈련 제도에 관한 연구 - 민간경비원고용인가법(PSOEAA) 및 캘리포니아 주(州) 제도 중심으로 -)

  • Lee, Seong-Ki;Kim, Hak-Kyong
    • Korean Security Journal
    • /
    • no.33
    • /
    • pp.197-228
    • /
    • 2012
  • The private security industry in Korea has rapidly proliferated. While the industry has grown quickly, though, private security officers have recently been implicated in incidents involving violence, demonstrating an urgent need for systematic reform and regulation of private security practices in Korea. Due to its quasi-public service character, the industry also risks losing the public's favor if it is not quickly disciplined and brought under legitimate government regulation: the industry needs professional standards for conduct and qualification for employment of security officers. This paper shares insights for the reform of the Korean private security industry through a study of the licensing and training requirements for private security businesses in the United States, mainly focusing on the Private Security Officer Employment Authorization Act (hereinafter the PSOEAA) and the California system. According to the PSOEAA, aspiring security officers shall submit to a criminal background check (a check of the applicants' criminal records). Applicants' criminal records should include not only felony convictions but also any other moral turpitude offenses (involving dishonesty, false statement, and information on pending cases). The PSOEAA also allows businesses to do background checks of their employees every twelve months, enabling the employers to make sure that their employees remain qualified for their security jobs during their employment. It also must be mentioned that the state of California, for effective management of its private security sector, has established a professional government authority, the Bureau of Security and Investigative Services, a tacit recognition that the private security industry needs to be thoroughly, professionally, and actively managed by a professional government authority. The American system provides a workable model for the Korean private security industry. First, this paper argues that the Korean private security industry should implement a more strict criminal background check system similar to that required by the PSOEAA. Second, it recommends that an independent professional government authority be established to oversee and enforce regulation of Korea's private security industry. Finally, this article suggests that education and training course be implemented to provide both diverse training as well as specialization and phasing.

  • PDF

Implementation of An Automatic Authentication System Based on Patient's Situations and Its Performance Evaluation (환자상황 기반의 자동인증시스템 구축 및 성능평가)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.25-34
    • /
    • 2020
  • In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient's situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff's role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.

The Study of Volume Data Aggregation Method According to Lane Usage Ratio (차로이용률을 고려한 지점 교통량 자료의 집락화 방법에 관한 연구)

  • An Kwang-Hun;Baek Seung-Kirl;NamKoong Sung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.4 no.3 s.8
    • /
    • pp.33-43
    • /
    • 2005
  • Traffic condition monitoring system serves as the foundation for all intelligent transportation system operation. Loop detectors and Video Image Processing are the most widely common technology approach to condition monitoring in korea Highways. Lane Usage is defined as the proportion of total link volume served by each lane. In this research, the lane Usage(LU) of two lane link for one day. Interval is 56% : 44%. The LU of three lane link is 39% : 37% : 24%. The LU of four lane link is 25% : 29% : 26% : 21%. These analysis reveal that each lane distributions of link are not same. This research investigates the general concept of lane usage by using collected loop detector data and the investigated that lane distribution is different by traffic lane and lane usage is consistent by time of day.

  • PDF

The impact of anthropogenic factors on changes in discharge and quality of water in the Hadano basin, Japan (인위적인 요인이 하천의 유량과 수질변화에 미친 영향 - 일본 하다노 분지를 사례 로 -)

  • ;Yang, Hea-Kun
    • Journal of the Korean Geographical Society
    • /
    • v.30 no.3
    • /
    • pp.242-254
    • /
    • 1995
  • The Hadano Basin is located at a distance of about 70kms and 60kms from Tokyo and Yokohama and lies in the south-west part of the Kanto region in Japan. The basin area, which correspoends to the catchment of the Kaname River, is about areal size of 60.7$\textrm{km}^2$ and extends about length of 8kms in E-W direction and about width of 5kms in N-S direction (Fig.1). The Hadano basin is filled with thick pile of the alluvum from deposits composed of volcanic materials, mostly came from the Hakone Volcano and overlain by Fuji Volcanic ashes. Fluvial deposits form the good aquifer, therefore water resources of Handano City has been largely depending upon the eroundwater. Urbanization and industrialization of the basin has been rapid in the last thirty years, after activation of "Factory Attraction Policy of Hadano City" in 1956. Growth in population and number of factory due to urbanization changed the land-use pattern of the basin rapidly and increased the water demands. Therefore, Hadano City exploited a new source of water supply, and have introduced the prefectureal waterworks since 1976. On the other hand, the rapid urbanization has brought about the pollution of streams in the basin by domestic sewage and industrial waste water. Diffusion rate of sewerage systems in Hadano City is 38% in 1993. In ordcr to examine the impact of anthropogenic factors on river environments, the author took up the change of land-use and diffusion area of sewerage as parameters, and performed field surveys on water discharge and quality. The survey has been made at upstream and downstream of the main stream regularly per month, to get informati ons about the variation of discharge and water quality aiong the stream and its diurnal fluctuation. Annual variation has been analyzed based the data from Hadano City Office. The results are summarized as follows. 1. Stream discharge has been increasing by urbanization (Fig.3). Water quality (C $l^{-10}$ , N $H^{+}$$_{ 4}$-N, BOD) has been improving gradually after the application of sewerage service, yet water pollution load at the lower station has increased than that at the upper one because of the larger anthropogenic discharge volumes (Fig.4). 2. Corrclation coefficient of discharges between upper and lower was 0.81-0.92. Pollutant loads of the R. Kamame after the confluence with R. Kuzuha grew up by 2.4-3.7 times as compared with its upper reaches, and it increased to 3.7-6.9 times after the confluence with the R. Muro (Fig.5). 3. The changes of water quality along the stream can be divided into two groups (Fig.6a). First: water quality of the R. Kaname and R. Shijuhachisse is becoming worse towards the lower reaches because the water from branches are polluted. Second: water quality are improved in the lower where spring and small branch streams supply clear water, for example R. Mizunashi, R. Muro and R. Kuzuha. 4. Measured discharge at the upper station in the R. Shijuhachisse is 0.153㎥/sec, and about 55% of this is recharged until it reaches to the lower point. The R. Mizunashi has a discharge of 1.155㎥/sec at the upper point, is recharged 0.24㎥/sec until the midstream and groundwater spring 0.2㎥/sec at the lower reaches. R. Kuzuha recharged all the mountain runoff (0.2㎥/sec) at the upper reaches. The R. Muro is supplied by many springs and the estimated discharge of spring was 0.47㎥/sec (Fig.6b). 5. Diurmal variations in discharge and water quality are influenced clearly by domestic and industrial waste waters (Fig.7, 8).ed clearly by domestic and industrial waste waters (Fig.7, 8).

  • PDF

A Study on the Major Country's Domestic Intelligence Operation and Architecture: Focusing on UK, USA, France and Korea (주요 국가의 국내정보 활동 및 조직체계 연구 : 영국·미국·프랑스·우리나라의 국내정보기구를 중심으로)

  • Moon, Kyeong-Hwan
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.153-183
    • /
    • 2014
  • Nowadays, proactive intelligence activities are required because of enhanced nation wide threats of terrorism and complexity of multidimensional factors of national security. South Korea not only need to draw up plans of information sharing among agencies for more effective national intelligence activities, but also have to evaluate the structure of Domestic Intelligence Agency and its right direction of activities. In this vein, this paper conducts comparative studies of structures and range of activities of intelligence Agencies by reviewing U.K, U.S.A, and France cases and suggests a potential model of 'domestic information specified agency' that we can adopt and methods to share information among agencies. The focus of this paper is on the reviewing of necessity of establishing new 'domestic information specified agency' which will mainly conduct anti-terrorism and counterintelligence activities, and its appropriate form. After reviewing the cases of U.K, U.S.A. and France, we conclude that overcoming the people's distrust about an invasion of freedom and rights caused by centralized and integrated independent intelligence agency is a prerequisite. Disputable issues of FBI, DHS, and South Korea's intelligence agency cases suggest that plans for restoring trust have to be considered if a new 'domestic information specified agency' is established in NIS. If it is established under government ministries such as MSPA focusing on implementing anti-terrorism and counterintelligence activities, organizations such as NCTC, NIC, that can carry out information sharing and cooperating with agencies concerned have to be established. Additionally, measures to solve structural problems caused by carrying out law enforcement functions by domestic information specified agency should be considered.

  • PDF

Studies of Eri-Silk Cultring in Korea (한국피마잠사개발에 대한 연구)

  • 최병희;김재두;박창준
    • Journal of Sericultural and Entomological Science
    • /
    • v.9
    • /
    • pp.49-66
    • /
    • 1969
  • Eri-silkworm is known as a tropical insect where as poly-voltine type in that area. It eats caster oil plant leaves which are cultivated as an every year cultivatable seed oil use in this country, even though it grows for many years in tropical countries. That is why, farmers have freedom for its cultivation in any year if they want. Therefore, eri-silkworm rearing service is flexible for its diet procurment as wish of farmer. The eri-cocoon price or economical fluctuation may be reactable for the rearing work not like as mulberry cocoon. Fortunately, it also eats cynthia tree leaves. Standing from such a easy condition, the authors have studied about this problem since 1963 to develope a culturing method of eri-silkworm rearing in this country and the authors brought out the matters to be produced as an industry scale. Here, the authors summarized their works of the results covering with thirty three work tables. The obtained results are as follows.

  • PDF

Effective Customer Risk Management at the Nuclear Medicine Department: Risk Managemont MOT Development Application and Producing Public Relations Film (핵의학과 내에서의 효과적인 고객위험관리: 위험관리 응대 MOT 개발적용 및 홍보동영상 제작)

  • Ham, Jong-Hum;Hwang, Jae-Bong;Kim, Joon-Ho;Lee, Gui-Won
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.13 no.3
    • /
    • pp.110-122
    • /
    • 2009
  • Purpose: Nowadays, A medical institution assesment could get more interest about a quality of medical services from many hospitals that developed the active activities for improving medical services. Also, there is an other additional issue which is the patients risk management. Uijeongbu ST. Mary's hospital Nuclear Medicine department has been changed many work process after PET-CT introduction and renovation of its place since 2008. Therefore, modified structure and the way of existing work process have contained risk factors. The purpose of this study would be the appropriate risk management process while imaging examination process, the removal risk factors and improved activities through the analysis risk factors. Materials and Methods: Nuclear Medicine department new process should analysis through many-sided, Firstly, make and trained risk management manual after then apply an actual work. Result analysis showed the number of risk accident occurrence that comparing the last year and after the improved activities. Secondly, producing risk management public relations film has been showed an applicable patient after then the customer service measurement checked for a hundred patient by questionnaire. Lastly, Risk factors were eliminated through the facilities participation improving activities which could change for the better risk factors. Results: The number of safety accident occurrence(medication error, fall and collision) were checked as zero after the improving activities both PET-CT and gamma camera examination. The results of questionnaire showed as follows; 74% marked as understanding of the test process and 81% checked "satisfaction" after the public relations film showing. The question "Did you consider about the risk factors?", both PET-CT and gamma camera checked as 94% and 89% respectively. Customer risk management could be accomplished effectively through the improving activities at the nuclear medicine department. Conclusions: The study would be an opportunity that spread risk factors were systematically showed and analyzied. Also, It showed the possibility of the minimized safety accident and its feedback, if application of the response manuel that could be a standard of radiology technician's work method to react safety accident. It was the more effective that visual material could be easy to approach as a methodology of risk factors. As far as I have concerned that It could help the safety and convenience through continuous and detailed activities that offer to patients.

  • PDF