• Title/Summary/Keyword: Information Science Paradigm

Search Result 478, Processing Time 0.029 seconds

The Trend of e-Science Projects for Virtual Screening (Virtual Screening을 위한 e-Science 프로젝트 동향)

  • KIM, Nam Gyu;AHN, Sun Il;LEE, Sehoon;LEE, June H.;HWANG, Soon Wook
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.569-573
    • /
    • 2007
  • e-Science is a new paradigm to increase the research efficiency by applying the state-of-the-art information technology to the classical research methodology. Among the research fields influenced by e-Science, Biology and Bioinformatics are the fields that are using IT very actively. And virtual screening, a procedure for the drug discovery, is one of the bioinformatics applications which requires a large amount of computing resources. In this paper, WISDOM, which is a e-Science project to design a new drug for Malaria and Avian flu, and related projects are introduced and the joint research between KISTI and Chun-nam university planned for the virtual screening research is explained.

  • PDF

The development of the 2020 Dietary Reference Intakes for Korean population: Lessons and challenges (2020 한국인 영양소 섭취기준 제·개정: 교훈과 도전)

  • Kwon, Oran;Kim, Hyesook;Kim, Jeongseon;Hwang, Ji-Yun;Lee, Jounghee;Yoon, Mi Ock
    • Journal of Nutrition and Health
    • /
    • v.54 no.5
    • /
    • pp.425-434
    • /
    • 2021
  • The discovery of the relationship between nutrients and deficiency diseases during the 100 years from the mid-1800s to the mid-1900s was a breakthrough that led to advances in the study of nutrition. The Recommended Dietary Allowances (RDA) were created as a quantitative standard for avoiding diseases caused by nutrient deficiency. In addition, a reductionism paradigm has become generally accepted among nutrition scholars in health and disease, which focused on the properties of individual nutrients, content in foods, cellular levels, and mechanisms of action. The reductionist paradigm worked very well for the prevention and treatment of malnutrition diseases. However, as the incidence of nutrient deficiencies decreased and that of chronic diseases increased, the nutrition goals have been changed to secure safe and adequate nutrient intake and to reduce chronic disease risks. Accordingly, Dietary Reference Intakes (DRIs), a set of nutrient-based reference values, were designed to replace the RDA. The revised Korean DRIs were published for 40 nutrients in 2020. However, there is still room for improvement in the reference intake levels targeted at reducing the risk of chronic disease. The reductionist approach can no longer be practical because chronic diseases are related to the interactions between multi-components in the foods and multi-targets in the body. Therefore, a second innovative leap is needed following the nutrition development breakthrough made over 100 years ago. To this end, the nutrition paradigm must evolve from reductionism to a holism approach. Cutting-edge scientific technologies, such as metabolomics, transcriptomics, microbiomics, and bioinformatics, should also be acceptable in nutrition science based on the knowledge gained from basic nutrition studies.

A Survey on Cyber Physical System Security for IoT: Issues, Challenges, Threats, Solutions

  • Kim, Nam Yong;Rathore, Shailendra;Ryu, Jung Hyun;Park, Jin Ho;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.14 no.6
    • /
    • pp.1361-1384
    • /
    • 2018
  • Recently, Cyber Physical System (CPS) is one of the core technologies for realizing Internet of Things (IoT). The CPS is a new paradigm that seeks to converge the physical and cyber worlds in which we live. However, the CPS suffers from certain CPS issues that could directly threaten our lives, while the CPS environment, including its various layers, is related to on-the-spot threats, making it necessary to study CPS security. Therefore, a survey-based in-depth understanding of the vulnerabilities, threats, and attacks is required of CPS security and privacy for IoT. In this paper, we analyze security issues, threats, and solutions for IoT-CPS, and evaluate the existing researches. The CPS raises a number challenges through current security markets and security issues. The study also addresses the CPS vulnerabilities and attacks and derives challenges. Finally, we recommend solutions for each system of CPS security threats, and discuss ways of resolving potential future issues.

Virtual Prototyping Simulation for a Passenger Vehicle

  • Kwon Son;Park, Kyung-Hyun;Eom, Sung-Sook
    • Journal of Mechanical Science and Technology
    • /
    • v.15 no.4
    • /
    • pp.448-458
    • /
    • 2001
  • The primary goal of virtual prototyping is to eliminate the need for fabricating physical prototypes, and to reduce cost and time for developing new products. A virtual prototyping seeks to create a virtual environment where the development of a new model can be flexible as well as rapid, and experiments can be carried out effectively concerning kinematics, dynamics, and control aspects of the model. This paper addresses the virtual environment used for virtual prototyping of a passenger vehicle. It has been developed using the dVISE environment that provides such useful features as actions, events, sounds, and light features. A vehicle model including features, and behaviors is constructed by employing an object-oriented paradigm and contains detailed information about a real-size vehicle. The human model is also implemented not only for visual and reach evaluations of the developed vehicle model, but also for behavioral visualization during a crash test. For the real time driving simulation, a neural network model is incorporated into the virtual environment. The cases of passing bumps with a vehicle are discussed in order to demonstrate the applicability of a set of developed models.

  • PDF

Equivalence Heuristics for Malleability-Aware Skylines

  • Lofi, Christoph;Balke, Wolf-Tilo;Guntzer, Ulrich
    • Journal of Computing Science and Engineering
    • /
    • v.6 no.3
    • /
    • pp.207-218
    • /
    • 2012
  • In recent years, the skyline query paradigm has been established as a reliable method for database query personalization. While early efficiency problems have been solved by sophisticated algorithms and advanced indexing, new challenges in skyline retrieval effectiveness continuously arise. In particular, the rise of the Semantic Web and linked open data leads to personalization issues where skyline queries cannot be applied easily. We addressed the special challenges presented by linked open data in previous work; and now further extend this work, with a heuristic workflow to boost efficiency. This is necessary; because the new view on linked open data dominance has serious implications for the efficiency of the actual skyline computation, since transitivity of the dominance relationships is no longer granted. Therefore, our contributions in this paper can be summarized as: we present an intuitive skyline query paradigm to deal with linked open data; we provide an effective dominance definition, and establish its theoretical properties; we develop innovative skyline algorithms to deal with the resulting challenges; and we design efficient heuristics for the case of predicate equivalences that may often happen in linked open data. We extensively evaluate our new algorithms with respect to performance, and the enriched skyline semantics.

A Study on the Profitability of Coffee Franchise Firms using ROIC Tree, ROA & ROE (ROIC(영업투하자본율) Tree와 ROA, ROE를 활용한 커피프랜차이즈 기업의 수익성에 관한 연구)

  • Kim, Tae-Ho;Kim, Hak-Seon
    • Culinary science and hospitality research
    • /
    • v.24 no.1
    • /
    • pp.130-139
    • /
    • 2018
  • The purpose of this study was to grasp the profitability of coffee franchise companies using ROIC tree, ROA and ROE. As a result, ROA was using assets efficiently, and some companies are in desperate need to improve their management based on past brand recognition, and a new paradigm management strategy is urgently required. In particular, the franchise company's current cost burden is greater than comparable firms. In ROE, the capital was operating efficiently. Since ROIC is very difficult to classify business related and operating related amounts accurately based on financial statement information, there is a limit to accurate ROIC calculation. Therefore, ROIC is estimated to be 7.6~38.29% as of 2016 based on ROIC calculation. In the case of continuous growth companies, investments are made to improve steady sales, but some companies seem to be unable to escape from past paradigm. In order to continue the growth of the company beyond the accounting profit in the future, the ROIC Tree can be used to measure the subdivided management performance and propose efficiency plan.

Domestic Radio Waves Propagate Management and Control Systems Investigate the System Status (주요선진국 전파관리제도와 국내 전파관리 제도에 대한 조사)

  • Kim, Sung-Hong;Seok, Gyeong-Hyu
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.1-8
    • /
    • 2017
  • There propagate use management paradigm in developed countries is changing as Command & Control ${\Rightarrow}$ Market Based ${\Rightarrow}$ Open Access ${\Rightarrow}$ Manage By Technology & Technical Analysis, that the policy response to environmental changes, such as a variety of new technologies. The emergence of service, the proliferation of propagation users It is to activate the market. However, the basic principles of radio management such that the change of paradigm be used to spread in a range that does not affect the interference, such as the horn is to be observed. Around the world in order to prevent the propagation and utilization Horn interference enacted regulations for managing the radio station, and also discipline.

Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.

  • Irshad, Azeem;Sher, Muhammad;Alzahrani, Bander A.;Albeshri, Aiiad;Chaudhry, Shehzad Ashraf;Kumari, Saru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.523-549
    • /
    • 2018
  • The increasing number of subscribers and demand of multiplicity of services has turned Multi-Server Authentication (MSA) into an integral part of remote authentication paradigm. MSA not only offers an efficient mode to register the users by engaging a trusted third party (Registration Centre), but also a cost-effective architecture for service procurement, onwards. Recently, Lu et al.'s scheme demonstrated that Mishra et al.'s scheme is unguarded to perfect forward secrecy compromise, server masquerading, and forgery attacks, and presented a better scheme. However, we discovered that Lu et al.'s scheme is still susceptible to malicious insider attack and non-compliant to perfect forward secrecy. This study presents a critical review on Lu et al.'s scheme and then proposes a secure multi-server authentication scheme. The security properties of contributed work are validated with automated Proverif tool and proved under formal security analysis.

An Appraoch for Preserving Loaction Privacy using Location Based Services in Mobile Cloud Computing

  • Abbas, Fizza;Hussain, Rasheed;Son, Junggab;Oh, Heekuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.621-624
    • /
    • 2013
  • Mobile Cloud Computing is today's emerging technology. Customers enjoy the services and application from this combination of mobile technology and cloud computing. Beside all these benefits it also increases the concerns regarding privacy of users, while interacting with this new paradigm One of the services is Location based services, but to get their required services user has to give his/her current location to the LBS provider that is violation of location privacy of mobile client. Many approaches are in literature for preserve location privacy but some has computation restriction and some suffer from lack of privacy. In this paper we proposed a novel idea that not only efficient in its protocol but also completely preserves the user's privacy. The result shows that by sharing just service name and a large enough geographic area (e.g. a city) user gets required information from the server by doing little client side processing We perform experiments at client side by developing and testing an android based mobile client application to support our argument.

Unveiling a Website Development for Car Inquiry

  • Loay F. Hussein;Islam Abdalla Mohamed Abass;Anis Ben Aissa;Mishaal Hammoud Al-Ruwaili
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.111-125
    • /
    • 2023
  • Due to the car's central role in modern life, the industry has become more fiercely competitive, with each manufacturer doing everything it can to attract buyers with features like plush interiors, comprehensive warranties, and helpful customer service departments. Customers may not have the luxury of buying a new car, so they will have to buy a used car. Nevertheless, in most cases, the customer (car driver) may be deceived about the vehicle information and history and thus will be confused in making his/her decision to purchase. In addition, after all attempts to obtain vehicle information (plate number, model, year of manufacture, number of maintenance times, accidents, etc.), the customer's many attempts may fail. In general, the government records and verifies the information of all cars, even those that pass through their borders. However, there might still be some trouble in obtaining this information. From this standpoint, we will design a website that makes it easier for car drivers, car companies and governments to carry out all the above-mentioned processes. It will also allow users, whether a driver or a car company, to inquire about all vehicle information through detailed and integrated reports on its condition since its entry into the Kingdom of Saudi Arabia until the present time, in addition to information supported by numbers and statistics to ensure the integrity and reliability of the information. This platform will save the trouble of searching for car information for drivers and car companies. It will also help governments keep track of the information of all cars entering and leaving the Kingdom of Saudi Arabia, which will contribute to facilitating the process of viewing the history of any car that has previously entered the Kingdom's borders.