• Title/Summary/Keyword: Memory Capacity

Search Result 498, Processing Time 0.021 seconds

A Neuroprotective Action of Quercetin and Apigenin through Inhibiting Aggregation of Aβ and Activation of TRKB Signaling in a Cellular Experiment

  • Ya-Jen Chiu;Yu-Shan Teng;Chiung-Mei Chen;Ying-Chieh Sun;Hsiu Mei Hsieh-Li;Kuo-Hsuan Chang;Guey-Jen Lee-Chen
    • Biomolecules & Therapeutics
    • /
    • v.31 no.3
    • /
    • pp.285-297
    • /
    • 2023
  • Alzheimer's disease (AD) is a neurodegenerative disease with progressive memory loss and the cognitive decline. AD is mainly caused by abnormal accumulation of misfolded amyloid β (Aβ), which leads to neurodegeneration via a number of possible mechanisms such as down-regulation of brain-derived neurotrophic factor-tropomyosin-related kinase B (BDNF-TRKB) signaling pathway. 7,8-Dihydroxyflavone (7,8-DHF), a TRKB agonist, has demonstrated potential to enhance BDNF-TRKB pathway in various neurodegenerative diseases. To expand the capacity of flavones as TRKB agonists, two natural flavones quercetin and apigenin, were evaluated. With tryptophan fluorescence quenching assay, we illustrated the direct interaction between quercetin/apigenin and TRKB extracellular domain. Employing Aβ folding reporter SH-SY5Y cells, we showed that quercetin and apigenin reduced Aβ-aggregation, oxidative stress, caspase-1 and acetylcholinesterase activities, as well as improved the neurite outgrowth. Treatments with quercetin and apigenin increased TRKB Tyr516 and Tyr817 and downstream cAMP-response-element binding protein (CREB) Ser133 to activate transcription of BDNF and BCL2 apoptosis regulator (BCL2), as well as reduced the expression of pro-apoptotic BCL2 associated X protein (BAX). Knockdown of TRKB counteracted the improvement of neurite outgrowth by quercetin and apigenin. Our results demonstrate that quercetin and apigenin are to work likely as a direct agonist on TRKB for their neuroprotective action, strengthening the therapeutic potential of quercetin and apigenin in treating AD.

DDoS Defense using Address Prefix-based Priority Service (Address Prefix에 기반한 우선 순위 서비스를 이용한 DDoS 방어)

  • Jin, Jinghe;Lee, Tai-Jin;Nam, Seung-Yeob
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.207-217
    • /
    • 2009
  • We propose a two-stage Distributed Denial of Service (DDoS) defense system, which can protect a given subnet by serving existing flows and new flows with a different priority based on IP history information. Denial of Service (DoS) usually occurs when the resource of a network node or link is limited and the demand of the users for that resource exceeds the capacity. The objective of the proposed defense system is to provide continued service to existing flows even in the presence of DDoS attacks. The proposed scheme can protect existing connections effectively with a smaller memory size by reducing the monitored IP address set through sampling and per-prefix history management. We evaluate the performance of the proposed scheme through simulation.

Analyses of Security into End-to-End Point Healthcare System based on Internet of Things (사물인터넷 기반의 헬스케어 시스템의 종단간 보안성 분석)

  • Kim, Jung Tae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.6
    • /
    • pp.871-880
    • /
    • 2017
  • Recently, service based on internet is inter-connected and integrated with a variety of connection. This kind of internet of things consist of heterogenous devices such as sensor node, devices and end-to end equipment which used in conventional protocols and services. The representative system is healthcare system. From healthcare appliance used by IoT, patient and doctor can utilize healthcare information with safety and high speed management. It is very convenient management to operate mobility. But it induced security and vulnerability issues because it has small memory capacity, low power supply and low computing power. This made impossible to implement security algorithm with embedded engine based on hardware. Nowdays, we can't realize conventional standard algorithm due to these kinds of reasons. From the critical issues, it occurred security and vulnerability issues. Therefore, we analysed and compared with conventional method and proposed techniques. Finally, we evaluated security issues and requirement for end-to-end point healthcare system based on internet of things.

Analyses of Security Issues and Vulnerability for Healthcare System For Under Internet of Things (사물인터넷과 융합한 헬스케어 시스템에서의 보안 이슈 및 취약점 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.699-706
    • /
    • 2023
  • Recently, the 4 generation industry revolution is developed with advanced and combined with a variety of new technologies. Conventional healthcare system is applied with IoT application. It provides many advantages with mobility and swift data transfers to patient and doctor. In despite of these kinds of advantages, it occurred security issues between basic devices and protocols in their applications. Especially, internet of things have restricted and limited resources such as small memory capacity, low capability of computing power, etc. Therefore, we can not utilize conventional mechanism. In this paper, we analyzed attacks and vulnerability in terms of security issues. To analyze security structure, features, demands and requirements, we solve the methods to be reduced security issues.

The Analysis of Efficient Disk Buffer Management Policies to Develop Undesignated Cultural Heritage Management and Real-time Theft Chase (실시간 비지정 문화재 관리 및 도난 추적 시스템 개발을 위한 효율적인 디스크 버퍼 관리 정책 분석)

  • Jun-Hyeong Choi;Sang-Ho Hwang;SeungMan Chun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1299-1306
    • /
    • 2023
  • In this paper, we present a system for undesignated cultural heritage management and real-time theft chase, which uses flash-based large-capacity storage. The proposed system is composed of 3 parts, such as a cultural management device, a flash-based server, and a monitoring service for managing cultural heritages and chasing thefts using IoT technologies. However flash-based storage needs methods to overcome the limited lifespan. Therefore, in this paper, we present a system, which uses the disk buffer in flash-based storage to overcome the disadvantage, and evaluate the system performance in various environments. In our experiments, LRU policy shows the number of direct writes in the flash-based storage by 10.7% on average compared with CLOCK and FCFS.

Effects of Korean red ginseng on T-cell repopulation after autologous hematopoietic stem cell transplantation in childhood cancer patients

  • Kyung Taek Hong;Yeon Jun Kang;Jung Yoon Choi;Young Ju Yun;Il-Moo Chang;Hee Young Shin;Hyoung Jin Kang;Won-Woo Lee
    • Journal of Ginseng Research
    • /
    • v.48 no.1
    • /
    • pp.68-76
    • /
    • 2024
  • Background: Although the survival outcomes of childhood cancer patients have improved, childhood cancer survivors suffer from various degrees of immune dysfunction or delayed immune reconstitution. This study aimed to investigate the effect of Korean Red Ginseng (KRG) on T cell recovery in childhood cancer patients who underwent autologous hematopoietic stem cell transplantation (ASCT) from the perspective of inflammatory and senescent phenotypes. Methods: This was a single-arm exploratory trial. The KRG group (n = 15) received KRG powder from month 1 to month 12 post-ASCT. We compared the results of the KRG group with those of the control group (n = 23). The proportions of T cell populations, senescent phenotypes, and cytokine production profiles were analyzed at 1, 3, 6, and 12 months post-ASCT using peripheral blood samples. Results: All patients in the KRG group completed the treatment without any safety issues and showed a comparable T cell repopulation pattern to that in the control group. In particular, KRG administration influenced the repopulation of CD4+ T cells via T cell expansion and differentiation into effector memory cell re-expressing CD45RA (EMRA) cells. Although the KRG group showed an increase in the number of CD4+ EMRA cells, the expression of senescent and exhausted markers in these cells decreased, and the capacity for senescence-related cytokine production in the senescent CD28- subset was ameliorated. Conclusions: These findings suggest that KRG promotes the repopulation of CD4+ EMRA T cells and regulates phenotypical and functional senescent changes after ASCT in pediatric patients with cancer.

Real-Time Implementation of Active Classification Using Cumulative Processing (누적처리기법을 이용한 능동표적식별 시스템의 실시간 구현)

  • Park, Gyu-Tae;Bae, Eun-Hyon;Lee, Kyun-Kyung
    • The Journal of the Acoustical Society of Korea
    • /
    • v.26 no.2
    • /
    • pp.87-94
    • /
    • 2007
  • In active sonar system, aspect angle and length of a target can be estimated by calculating the cross-correlation between left and right split-beams of a LFM(Linear Frequency Modulated) signal. However, high-resolution performances in bearing and range are required to estimate the information of a remote target. Because a certain higher sampling frequency than the Nyquist sampling frequency is required in this performance, an over-sampling process through interpolation method should be required. However, real-time implementation of split-beam processing with over-sampled split-beam outputs on a COTS(commercial off-the-shelf) DSP platform limits its performance because of given throughput and memory capacity. This paper proposes a cumulative processing algorithm for split-beam processing to solve the problems. The performance of the proposed method was verified through some simulation tests. Also, the proposed method was implemented as a real-time system using an ADSP-TS101.

The Adoption and Diffusion of Semantic Web Technology Innovation: Qualitative Research Approach (시맨틱 웹 기술혁신의 채택과 확산: 질적연구접근법)

  • Joo, Jae-Hun
    • Asia pacific journal of information systems
    • /
    • v.19 no.1
    • /
    • pp.33-62
    • /
    • 2009
  • Internet computing is a disruptive IT innovation. Semantic Web can be considered as an IT innovation because the Semantic Web technology possesses the potential to reduce information overload and enable semantic integration, using capabilities such as semantics and machine-processability. How should organizations adopt the Semantic Web? What factors affect the adoption and diffusion of Semantic Web innovation? Most studies on adoption and diffusion of innovation use empirical analysis as a quantitative research methodology in the post-implementation stage. There is criticism that the positivist requiring theoretical rigor can sacrifice relevance to practice. Rapid advances in technology require studies relevant to practice. In particular, it is realistically impossible to conduct quantitative approach for factors affecting adoption of the Semantic Web because the Semantic Web is in its infancy. However, in an early stage of introduction of the Semantic Web, it is necessary to give a model and some guidelines and for adoption and diffusion of the technology innovation to practitioners and researchers. Thus, the purpose of this study is to present a model of adoption and diffusion of the Semantic Web and to offer propositions as guidelines for successful adoption through a qualitative research method including multiple case studies and in-depth interviews. The researcher conducted interviews with 15 people based on face-to face and 2 interviews by telephone and e-mail to collect data to saturate the categories. Nine interviews including 2 telephone interviews were from nine user organizations adopting the technology innovation and the others were from three supply organizations. Semi-structured interviews were used to collect data. The interviews were recorded on digital voice recorder memory and subsequently transcribed verbatim. 196 pages of transcripts were obtained from about 12 hours interviews. Triangulation of evidence was achieved by examining each organization website and various documents, such as brochures and white papers. The researcher read the transcripts several times and underlined core words, phrases, or sentences. Then, data analysis used the procedure of open coding, in which the researcher forms initial categories of information about the phenomenon being studied by segmenting information. QSR NVivo version 8.0 was used to categorize sentences including similar concepts. 47 categories derived from interview data were grouped into 21 categories from which six factors were named. Five factors affecting adoption of the Semantic Web were identified. The first factor is demand pull including requirements for improving search and integration services of the existing systems and for creating new services. Second, environmental conduciveness, reference models, uncertainty, technology maturity, potential business value, government sponsorship programs, promising prospects for technology demand, complexity and trialability affect the adoption of the Semantic Web from the perspective of technology push. Third, absorptive capacity is an important role of the adoption. Fourth, suppler's competence includes communication with and training for users, and absorptive capacity of supply organization. Fifth, over-expectance which results in the gap between user's expectation level and perceived benefits has a negative impact on the adoption of the Semantic Web. Finally, the factor including critical mass of ontology, budget. visible effects is identified as a determinant affecting routinization and infusion. The researcher suggested a model of adoption and diffusion of the Semantic Web, representing relationships between six factors and adoption/diffusion as dependent variables. Six propositions are derived from the adoption/diffusion model to offer some guidelines to practitioners and a research model to further studies. Proposition 1 : Demand pull has an influence on the adoption of the Semantic Web. Proposition 1-1 : The stronger the degree of requirements for improving existing services, the more successfully the Semantic Web is adopted. Proposition 1-2 : The stronger the degree of requirements for new services, the more successfully the Semantic Web is adopted. Proposition 2 : Technology push has an influence on the adoption of the Semantic Web. Proposition 2-1 : From the perceptive of user organizations, the technology push forces such as environmental conduciveness, reference models, potential business value, and government sponsorship programs have a positive impact on the adoption of the Semantic Web while uncertainty and lower technology maturity have a negative impact on its adoption. Proposition 2-2 : From the perceptive of suppliers, the technology push forces such as environmental conduciveness, reference models, potential business value, government sponsorship programs, and promising prospects for technology demand have a positive impact on the adoption of the Semantic Web while uncertainty, lower technology maturity, complexity and lower trialability have a negative impact on its adoption. Proposition 3 : The absorptive capacities such as organizational formal support systems, officer's or manager's competency analyzing technology characteristics, their passion or willingness, and top management support are positively associated with successful adoption of the Semantic Web innovation from the perceptive of user organizations. Proposition 4 : Supplier's competence has a positive impact on the absorptive capacities of user organizations and technology push forces. Proposition 5 : The greater the gap of expectation between users and suppliers, the later the Semantic Web is adopted. Proposition 6 : The post-adoption activities such as budget allocation, reaching critical mass, and sharing ontology to offer sustainable services are positively associated with successful routinization and infusion of the Semantic Web innovation from the perceptive of user organizations.

EEG based Cognitive Load Measurement for e-learning Application (이러닝 적용을 위한 뇌파기반 인지부하 측정)

  • Kim, Jun;Song, Ki-Sang
    • Korean Journal of Cognitive Science
    • /
    • v.20 no.2
    • /
    • pp.125-154
    • /
    • 2009
  • This paper describes the possibility of human physiological data, especially brain-wave activity, to detect cognitive overload, a phenomenon that may occur while learner uses an e-learning system. If it is found that cognitive overload to be detectable, providing appropriate feedback to learners may be possible. To illustrate the possibility, while engaging in cognitive activities, cognitive load levels were measured by EEG (electroencephalogram) to seek detection of cognitive overload. The task given to learner was a computerized listening and recall test designed to measure working memory capacity, and the test had four progressively increasing degrees of difficulty. Eight male, right-handed, university students were asked to answer 4 sets of tests and each test took from 61 seconds to 198 seconds. A correction ratio was then calculated and EEG results analyzed. The correction ratio of listening and recall tests were 84.5%, 90.6%, 62.5% and 56.3% respectively, and the degree of difficulty had statistical significance. The data highlighted learner cognitive overload on test level of 3 and 4, the higher level tests. Second, the SEF-95% value was greater on test3 and 4 than on tests 1 and 2 indicating that tests 3 and 4 imposed greater cognitive load on participants. Third, the relative power of EEG gamma wave rapidly increased on the 3rd and $4^{th}$ test, and signals from channel F3, F4, C4, F7, and F8 showed statistically significance. These five channels are surrounding the brain's Broca area, and from a brain mapping analysis it was found that F8, right-half of the brain area, was activated relative to the degree of difficulty. Lastly, cross relation analysis showed greater increasing in synchronization at test3 and $4^{th}$ at test1 and 2. From these findings, it is possible to measure brain cognitive load level and cognitive over load via brain activity, which may provide atimely feedback scheme for e-learning systems.

  • PDF

Antioxidant Effect of Chungkukjang Supplementation against Memory Impairment induced by Scopolamine in Mice (Scopolamine으로 유도된 기억 손상 마우스에서 청국장 식이의 항산화 효과)

  • Kong, Hyun-Joo;Lee, Kyung-Eun;Yang, Kyung-Mi
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.26 no.3
    • /
    • pp.237-249
    • /
    • 2016
  • In this study, the antioxidant effect of Chungkukjang supplementation against memory impairment and oxidative stress in scopolamine (2 mg/kg i.p)-injected mice was investigated. The experimental animals were divided into five groups and fed experimental diets for 12 weeks; normal diet group (C), scopolamine + normal diet group (S), scopolamine + 63.0% soybean Chungkukjang supplementation group (SS), scopolamine + 45.0% Yakkong Chungkukjang supplementation group (SY), and scopolamine + 50.0% black foods such as black rice, black sesame seeds, and sea tangle added Yakkong Chungkukjang group (SYB). For the results of food intake, body weight gain, and brain weights, levels of scopolamine-injected groups were lower than the levels of the control group. The reduced brain weight of the scopolamine-injected group (S) was regulated to control level by supplementation of three types Chungkukjang. In the oxidative stress indicator, nitric oxide and malondialdehyde levels in serum of scopolamine-injected mice were higher than those of other groups. However, supplementation of soybeans, Yakkong and black foods added Yakkong Chungkukjang was proven to regulate them. Antioxidant enzyme activities such as superoxide dismutase (SOD) and glutathione-S-transferase (GST) in serum showed no significant differences among the groups. The reduced levels of vitamin A and vitamin E in serum and brain tissue of scopolamine-injected mice were controlled by supplementation of three types of Chungkukjang. Total antioxidant capacity (TAC) of scopolamine-injected group was lower than those of other groups. However, TAC was significantly elevated by Chunggukjang supplementation. Therefore, antioxidative effects of soybeans, Yakkong, and black foods added Yakkong Chungkukjang supplementations against oxidative stress in scopolamine-injected in mice could expected.