• Title/Summary/Keyword: Id3

Search Result 974, Processing Time 0.022 seconds

Iron Status in Female College Students in the Gyeongnam Area (경남 일부지역 여대생의 철 영양상태에 관한 연구)

  • Park, Mi-Young;Kim, Sung-Hee
    • Journal of Nutrition and Health
    • /
    • v.44 no.3
    • /
    • pp.222-230
    • /
    • 2011
  • This study was undertaken to investigate iron status and related factors in female college students residing in Gyeongnam. The subjects were divided into normal (40.8%) and iron deficiency (ID) groups (59.2%) by iron status. Mean height, weight, lean body mass, percent body fat, body mass index, and wrist to hip ratio were not significantly different between the groups, but basic metabolic rate was significantly higher in the normal group than that in the ID group. The levels of hemoglobin, hematocrit, serum ferritin, transferrin saturation, mean corpuscular volume, mean corpuscular hemoglobin, and mean corpuscular hemoglobin concentration were significantly higher in the normal group than those in the ID group. However, total iron binding capacity was significantly lower in the normal group than that in the ID group. Daily intake of protein, heme-Fe, niacin, and vitamin C were significantly higher in the normal group than those in the ID group. The mean intake of protein, Fe, niacin, vitamin $B_{12}$, and vitamin C based on the Korean recommended intake (RI) were significantly higher in the normal group than those in the ID group. The mean intakes of Ca, vitamin $B_{12}$, and folate in both groups were < 75% of the Korean RI. In conclusion, increasing dietary heme-Fe and vitamin C may be helpful for preventing ID anemia in female college students.

Performance of LED-ID System for Home Networking Applicaion (홈 네트워킹을 위한 LED-ID 시스템 성능분석)

  • Choi, Jae-Hyuck;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.169-176
    • /
    • 2010
  • We propose a Z-HBT line coding for a LED-ID system. Z-HBT line coding is defined as follows. First, we apply half bit transition to one bit. Second, we decode encoded bits using difference of bit transition level in one bit duration. As a result, we obtain advantages about synchronization problem and noise effect mitigation at the receiver. We set up outdoor the LED-ID simulation environment. At simulation results, we show 2-3dB gain as compared with existing line coding schemes. The results of the paper can be applied to design and implementation of LED-ID systems for indoor wireless multimedia services.

Implementation of a very small 13.56[MHz] RFID Reader ensuring machine ID recognition in a noise space within 3Cm (3Cm 이내의 잡음 공간 속 기계 ID 인식을 보장하는 초소형 13.56[MHz] RFID Reader의 구현)

  • Park, Seung-Chang;Kim, Dae-Jin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.10 s.352
    • /
    • pp.27-34
    • /
    • 2006
  • This paper has implemented a very small($1.4{\times}2.8[Cm^2]$) 13.56[MHz] RFID reader ensuring machine ID recognition correctly in a noise space of Tag-to-Reader within 3Cm. For operation of the RFID system, at first, this paper has designed the loop antenna of a reader and the fading model of back-scattering on microwave propagation following to 13.56[MHz] RFID Air Interface ISO/IEC specification. Secondly, this paper has proposed the automatically path selected RF switching circuit and the firmware operation relationship by measuring and analyzing the very small RFID RF issues. Finally, as a very small reader main body, this paper has shown the DSP board and software functions made for extraction of $1{\sim}2$ machine ID information and error prevention simultaneously with carrying of 13.56[MHz] RFID signals that the international standard specification ISO/IEC 18000-3 defined.

A Retrospective Study on Canine Epilepsy: Etiological Distribution, Therapeutic Outcome, and Survival Time

  • Park, Seo-Yeon;Jeong, Yoonsoo;Yun, Taesik;Jung, Dong-In;Chang, Dong-Woo;Kang, Ji-Houn;Yang, Mhan-Pyo;Kang, Byeong-Teck
    • Journal of Veterinary Clinics
    • /
    • v.36 no.3
    • /
    • pp.150-154
    • /
    • 2019
  • The purpose of this study was to investigate the etiological distribution, therapeutic outcome, and survival time in canine epilepsy. The medical records of 57 epileptic dogs were reviewed for the evaluation of etiological distribution. Among them, 27 dogs (47%) and 30 dogs (52%) had idiopathic epilepsy (IdE) and structural epilepsy (StE), respectively. Twenty-nine dogs (IdE: 16 dogs, StE: 13 dogs) were evaluated for therapeutic outcome and survival time. The incidence of generalized epileptic seizure (IdE, 56% vs. StE, 44%; P = 0.043) and the median seizure frequency at the time of first presentation (IdE, 2.0/month vs. StE, 13.3/month; P < 0.01) were significantly different between the two groups. Although pre-treatment seizure frequency and duration were not different, the median duration of seizure in the IdE group (0.5 min) was significantly shorter than that in the StE group (3 min) after treatment (P < 0.01). In addition, the median frequency of seizure was relatively lower in the IdE group (0.25/month) compared to the StE group (2.00/month) following antiepileptic therapy (P = 0.053). The median survival time of the IdE group (1.5 years [95% CI, 1.0-2.3 years]) was significantly longer than that of the StE group (0.4 year [95% CI, 0.2-1.3 years]) (P < 0.01). The information on etiological data and intracranial lesions may be useful for predicting treatment response and prognosis in epileptic dogs.

Lightweight RFID Authentication Protocols Based on Hash Function (해쉬함수에 기반한 경량화된 RFID 인증 프로토콜)

  • Ha, Jae-Cheol;Baek, Yi-Roo;Kim, Hwan-Koo;Park, Jea-Hoon;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.61-72
    • /
    • 2009
  • To guarantee security between the tag and back-end server and implementation efficiency in low power tag, we propose two typed mutual authentication protocols in RFID system. One is static-ID authentication scheme which is well suitable in distributed server environments. The other is dynamic-ID scheme which is additively satisfied forward security. In proposed scheme, it does not need any random number generator in tag and requires only one(maximally three) hash operation(s) in tag or server to authenticate each other. Furthermore, we implement the proposed schemes in RFID smart card system and verify its normal operations.

Pattern Analysis of an Evaluation Model on Disaster Management System Using Fuzzy ID3 (퍼지 ID3를 이용한 재난관리시스템 평가모델의 패턴분석)

  • Kim, Hong-Jin;Hwang, Seung-Gook;Park, Young-Man;Park, Kwang-Bak
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.6
    • /
    • pp.826-831
    • /
    • 2008
  • In this paper, an evaluation model of disaster management system which is developed by using GRI G3 version and BCP process for the sustainability management of small and middle enterprises was proposed. The proposed evaluation model can be used to evaluate the disaster management system directly, and to establish the disaster management system as an index. Also, the rules obtained by pattern analysis using fuzzy ID3 for the proposed evaluation model are expected to use the guideline effectively for self evaluation in the small and middle enterprises.

Bioavailability of Aspartic Acid Chelated Iron on Iron-deficient Rats (아스파르트산 킬레이트 철분의 철분 결핍쥐에서의 생물학적 유용성)

  • Park, Myoung-Gyu;Ha, Tae-Yul;Shin, Kwang-Soon
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.40 no.12
    • /
    • pp.1720-1725
    • /
    • 2011
  • Aspartic acid chelated iron (Asp-Fe) was synthesized by a new method using calcium carbonate, aspartic acid, and ferrous sulfate. This study was carried out to investigate the bioavailability of Asp-Fe in iron-deficient rats. We divided the rats into four experimental groups. The first was the normal diet control group, or NC. The second was the no treated control group of iron-deficient (ID) rats, or ID+C. The third was the heme-iron (heme-Fe) treated group of ID rats, ID+heme-Fe. And the fourth was the Asp-Fe treated group of ID rats, or ID+Asp-Fe. There were no differences among any of the experimental groups in diet consumption, change of body weight, or the weight of the livers, kidneys, or spleens. After 7 days of feeding, the iron content in the sera of the ID+Asp-Fe group (175.2 ${\mu}g$/dL) and the ID+heme-Fe group (140.8 ${\mu}g$/dL) were significantly higher than that of the ID-C group (96.1 ${\mu}g$/dL). The total iron binding capacity (TIBC) of the ID+Asp-Fe group (735.4 ${\mu}g$/dL) was significantly normalized compared to the ID+C group (841.9 ${\mu}g$/dL) or ID+heme-Fe group (824.6 ${\mu}g$/dL). The hematocrit level of the ID+Asp-Fe group was increased to normal levels, but there was no statistical difference among ID groups. The absorption ratio of heme-Fe was 21.3% and that of Asp-Fe was 50.2%, which indicates a 2.3 times higher ratio in comparison with heme iron. With the above results we found that Asp-Fe seems to be an efficient form of iron to supply iron deficient rats in order to cure them of anemia. Thus, these findings suggest that aspartic acid chelated iron has the potential to serve as a functional food related to iron metabolism.

RFID Authentication System with ID Synchronization (ID 동기화를 가지는 RFID 인증 시스템)

  • Park Jang-Su;Lee Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.5
    • /
    • pp.615-623
    • /
    • 2006
  • It has been estimated that 'RFID' technology would be playing an important role in the incoming ubiquitous environment. For this reason, many studies on 'RFID' have been conducted and its application has been on the increase in various fields such as finance, medicine, transportation and culture as well as in logistics distribution. However, the communication between Tag and Reader in RFID system has been conducted by wireless communication of radio frequency so that the information on identification could be eavesdropped by the third party maliciously. Such eavesdropped information could be also used as basic information in attacking others; in this regard, it could impair the privacy of its users and the users have avoided using 'RFID.' To solve theses problems, many studies are being performed to different output of tags by renewing ID. However, protocols have been devised without considering an ID Synchronization in the ID renewal process between database and tag in the existing studies. In this regard, this study has suggested a RFID Authentication Protocol while considering the ID Synchronization.

  • PDF

IP Camera Authentication and Key Exchange Protocol Using ID-Based Signature Scheme (ID 기반 서명 기법을 이용한 IP 카메라 인증 및 키 교환 프로토콜)

  • Park, Jin Young;Song, Chi-ho;Kim, Suk-young;Park, Ju-hyun;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.789-801
    • /
    • 2018
  • Currently widely used IP cameras provide the ability to control IP cameras remotely via mobile devices. To do so, the IP camera software is installed on the website specified by the camera manufacturer, and authentication is performed through the password between the IP camera and the mobile device. However, many products currently used do not provide a secure channel between the IP camera and the mobile device, so that all IDs and passwords transmitted between the two parties are exposed. To solve these problems, we propose an authentication and key exchange protocol using ID-based signature scheme. The proposed protocol is characterized in that (1) mutual authentication is performed using ID and password built in IP camera together with ID-based signature, (2) ID and password capable of specifying IP camera are not exposed, (3) provide forward-secrecy using Diffie-Hellman key exchange, and (4) provide security against external attacks as well as an honest-but-curious manufacturer with the master secret key of the ID-based signature.

Optimal Path Finding Considering Smart Card Terminal ID Chain OD - Focused on Seoul Metropolitan Railway Network - (교통카드 단말기ID Chain OD를 반영한 최적경로탐색 - 수도권 철도 네트워크를 중심으로 -)

  • Lee, Mee Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.6
    • /
    • pp.40-53
    • /
    • 2018
  • In smart card data, movement of railway passengers appears in order of smart card terminal ID. The initial terminal ID holds information on the entering station's tag-in railway line, the final terminal ID the exit station tag-out railway line, and the middle terminal ID the transfer station tag subway line. During the past, when the metropolitan city rail consisted of three public corporations (Seoul Metro, Incheon Transit Corporation, and Korail), OD data was expressed in two metrics of initial and final smart card terminal ID. Recently, with the entrance of private corporations like Shinbundang Railroad Corporation, and UI Corporation, inclusion of entering transfer line terminal ID and exiting transfer line terminal ID as part of Chain OD has become standard. Exact route construction using Chain OD has thus become integral as basic data for revenue allocation amongst metropolitan railway transport corporations. Accordingly, path detection in railway networks has evolved to an optimal path detection problem using Chain OD, hence calling for a renewed solution method. This research proposes an optimal path detection method between the initial terminal ID and final terminal ID of Chain OD terminal IDs within the railway network. Here, private line transfer TagIn/Out must be reflected in optimal path detection using Chain OD. To achieve this, three types of link-based optimum path detection methods are applied in order of 1. node-link, 2. link-link, 3. link-node. The method proposed based on additional path costs is shown to satisfy the optimal conditions.