• Title/Summary/Keyword: New health technology

Search Result 1,277, Processing Time 0.031 seconds

Stable Inheritance of an Integrated Transgene and Its Expression in Phenylethylisothiocyanate-Enriched Transgenic Chinese cabbage (Phenylethylisothiocyanate 함량이 증진된 형질전환 배추에서의 도입유전자의 후대 유전 및 발현 안정성 검정)

  • Park, Ji-Hyun;Kim, Hyoung-Seok;Lee, Gi-Ho;Yu, Jae-Gyung;Park, Young-Doo
    • Horticultural Science & Technology
    • /
    • v.34 no.1
    • /
    • pp.112-121
    • /
    • 2016
  • Development of genetically-modified (GM) crops enables the introduction of new traits to the plant to confer characteristics such as disease resistance, herbicide resistance and human health-promoting bioactivity. Successful commercialization of newly developed GM crops requires stable inheritance of integrated T-DNA and newly introduced traits through the multiple generations. This study was carried out to confirm the stable inheritance of the integrated T-DNA in $T_1$ and $T_2$ transgenic Chinese cabbage (Brassica rapa ssp. pekinensis) that was genetically modified to increase concentrations of phenylethylisothiocyanate (PEITC), which is a potential anti-carcinogenic phytochemical. For this purpose, the IGA 1-3 ($T_1$ generation) and IGA 1-3-5 ($T_2$ generation) lines were selected by PCR and a IGA 1-3 transgenic plant ($T_1$ generation) was analyzed to confirm the T-DNA insertion site in the Chinese cabbage genome by VA-TAIL PCR. The results of this study showed that the introduced T-DNA in IGA 1 line was stably inherited to the next generations without any variations in terms of the structure of the transgenes, and this line also showed the expected transgene function that resulted in increased concentration of PEITC through the multiple generations. Finally, we confirmed the increased QR activity in IGA 1 $T_1$ and $T_2$ transgenic lines, which indicates an enhanced potential anti-carcinogenic bioactivity and its stable inheritance in IGA1 $T_1$ and $T_2$ transgenic lines.

A Study on the Strategy of IoT Industry Development in the 4th Industrial Revolution: Focusing on the direction of business model innovation (4차 산업혁명 시대의 사물인터넷 산업 발전전략에 관한 연구: 기업측면의 비즈니스 모델혁신 방향을 중심으로)

  • Joeng, Min Eui;Yu, Song-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.57-75
    • /
    • 2019
  • In this paper, we conducted a study focusing on the innovation direction of the documentary model on the Internet of Things industry, which is the most actively industrialized among the core technologies of the 4th Industrial Revolution. Policy, economic, social, and technical issues were derived using PEST analysis for global trend analysis. It also presented future prospects for the Internet of Things industry of ICT-related global research institutes such as Gartner and International Data Corporation. Global research institutes predicted that competition in network technologies will be an issue for industrial Internet (IIoST) and IoT (Internet of Things) based on infrastructure and platforms. As a result of the PEST analysis, developed countries are pushing policies to respond to the fourth industrial revolution through cooperation of private (business/ research institutes) led by the government. It was also in the process of expanding related R&D budgets and establishing related policies in South Korea. On the economic side, the growth tax of the related industries (based on the aggregate value of the market) and the performance of the entity were reviewed. The growth of industries related to the fourth industrial revolution in advanced countries overseas was found to be faster than other industries, while in Korea, the growth of the "technical hardware and equipment" and "communication service" sectors was relatively low among industries related to the fourth industrial revolution. On the social side, it is expected to cause enormous ripple effects across society, largely due to changes in technology and industrial structure, changes in employment structure, changes in job volume, etc. On the technical side, changes were taking place in each industry, representing the health and medical sectors and manufacturing sectors, which were rapidly changing as they merged with the technology of the Fourth Industrial Revolution. In this paper, various management methodologies for innovation of existing business model were reviewed to cope with rapidly changing industrial environment due to the fourth industrial revolution. In addition, four criteria were established to select a management model to cope with the new business environment: 'Applicability', 'Agility', 'Diversity' and 'Connectivity'. The expert survey results in an AHP analysis showing that Business Model Canvas is best suited for business model innovation methodology. The results showed very high importance, 42.5 percent in terms of "Applicability", 48.1 percent in terms of "Agility", 47.6 percent in terms of "diversity" and 42.9 percent in terms of "connectivity." Thus, it was selected as a model that could be diversely applied according to the industrial ecology and paradigm shift. Business Model Canvas is a relatively recent management strategy that identifies the value of a business model through a nine-block approach as a methodology for business model innovation. It identifies the value of a business model through nine block approaches and covers the four key areas of business: customer, order, infrastructure, and business feasibility analysis. In the paper, the expansion and application direction of the nine blocks were presented from the perspective of the IoT company (ICT). In conclusion, the discussion of which Business Model Canvas models will be applied in the ICT convergence industry is described. Based on the nine blocks, if appropriate applications are carried out to suit the characteristics of the target company, various applications are possible, such as integration and removal of five blocks, seven blocks and so on, and segmentation of blocks that fit the characteristics. Future research needs to develop customized business innovation methodologies for Internet of Things companies, or those that are performing Internet-based services. In addition, in this study, the Business Model Canvas model was derived from expert opinion as a useful tool for innovation. For the expansion and demonstration of the research, a study on the usability of presenting detailed implementation strategies, such as various model application cases and application models for actual companies, is needed.

A New Approach to Automatic Keyword Generation Using Inverse Vector Space Model (키워드 자동 생성에 대한 새로운 접근법: 역 벡터공간모델을 이용한 키워드 할당 방법)

  • Cho, Won-Chin;Rho, Sang-Kyu;Yun, Ji-Young Agnes;Park, Jin-Soo
    • Asia pacific journal of information systems
    • /
    • v.21 no.1
    • /
    • pp.103-122
    • /
    • 2011
  • Recently, numerous documents have been made available electronically. Internet search engines and digital libraries commonly return query results containing hundreds or even thousands of documents. In this situation, it is virtually impossible for users to examine complete documents to determine whether they might be useful for them. For this reason, some on-line documents are accompanied by a list of keywords specified by the authors in an effort to guide the users by facilitating the filtering process. In this way, a set of keywords is often considered a condensed version of the whole document and therefore plays an important role for document retrieval, Web page retrieval, document clustering, summarization, text mining, and so on. Since many academic journals ask the authors to provide a list of five or six keywords on the first page of an article, keywords are most familiar in the context of journal articles. However, many other types of documents could not benefit from the use of keywords, including Web pages, email messages, news reports, magazine articles, and business papers. Although the potential benefit is large, the implementation itself is the obstacle; manually assigning keywords to all documents is a daunting task, or even impractical in that it is extremely tedious and time-consuming requiring a certain level of domain knowledge. Therefore, it is highly desirable to automate the keyword generation process. There are mainly two approaches to achieving this aim: keyword assignment approach and keyword extraction approach. Both approaches use machine learning methods and require, for training purposes, a set of documents with keywords already attached. In the former approach, there is a given set of vocabulary, and the aim is to match them to the texts. In other words, the keywords assignment approach seeks to select the words from a controlled vocabulary that best describes a document. Although this approach is domain dependent and is not easy to transfer and expand, it can generate implicit keywords that do not appear in a document. On the other hand, in the latter approach, the aim is to extract keywords with respect to their relevance in the text without prior vocabulary. In this approach, automatic keyword generation is treated as a classification task, and keywords are commonly extracted based on supervised learning techniques. Thus, keyword extraction algorithms classify candidate keywords in a document into positive or negative examples. Several systems such as Extractor and Kea were developed using keyword extraction approach. Most indicative words in a document are selected as keywords for that document and as a result, keywords extraction is limited to terms that appear in the document. Therefore, keywords extraction cannot generate implicit keywords that are not included in a document. According to the experiment results of Turney, about 64% to 90% of keywords assigned by the authors can be found in the full text of an article. Inversely, it also means that 10% to 36% of the keywords assigned by the authors do not appear in the article, which cannot be generated through keyword extraction algorithms. Our preliminary experiment result also shows that 37% of keywords assigned by the authors are not included in the full text. This is the reason why we have decided to adopt the keyword assignment approach. In this paper, we propose a new approach for automatic keyword assignment namely IVSM(Inverse Vector Space Model). The model is based on a vector space model. which is a conventional information retrieval model that represents documents and queries by vectors in a multidimensional space. IVSM generates an appropriate keyword set for a specific document by measuring the distance between the document and the keyword sets. The keyword assignment process of IVSM is as follows: (1) calculating the vector length of each keyword set based on each keyword weight; (2) preprocessing and parsing a target document that does not have keywords; (3) calculating the vector length of the target document based on the term frequency; (4) measuring the cosine similarity between each keyword set and the target document; and (5) generating keywords that have high similarity scores. Two keyword generation systems were implemented applying IVSM: IVSM system for Web-based community service and stand-alone IVSM system. Firstly, the IVSM system is implemented in a community service for sharing knowledge and opinions on current trends such as fashion, movies, social problems, and health information. The stand-alone IVSM system is dedicated to generating keywords for academic papers, and, indeed, it has been tested through a number of academic papers including those published by the Korean Association of Shipping and Logistics, the Korea Research Academy of Distribution Information, the Korea Logistics Society, the Korea Logistics Research Association, and the Korea Port Economic Association. We measured the performance of IVSM by the number of matches between the IVSM-generated keywords and the author-assigned keywords. According to our experiment, the precisions of IVSM applied to Web-based community service and academic journals were 0.75 and 0.71, respectively. The performance of both systems is much better than that of baseline systems that generate keywords based on simple probability. Also, IVSM shows comparable performance to Extractor that is a representative system of keyword extraction approach developed by Turney. As electronic documents increase, we expect that IVSM proposed in this paper can be applied to many electronic documents in Web-based community and digital library.

Changes in Cordycepin and Liquiritigenin Content and Inhibitory Effect on NO Production in Fermented Licorice and Dongchunghacho (동충하초균주로 발효한 감초의 주요성분 함량 변화 및 NO 생성 억제 효과)

  • Wang, Ziyu;Li, Mei;Li, Ke;Son, Beung Gu;Kang, Jum Soon;Park, Young Hoon;Lee, Yong Jae;Kim, Sun Tae;Jung, Jae-Chul;Lee, Young Guen;Choi, Young Whan
    • Journal of Life Science
    • /
    • v.27 no.1
    • /
    • pp.57-66
    • /
    • 2017
  • Traditional Korean fermented herbal plants are potential sources of new food that promote health, but they are still produced by yeast, fungi or bacteria fermentation. In the present work, mushroom (Paecilomyces tenuipes and Cordyceps militaris) fungal dongchunghacho were used to fermented Glycyrrhiza uralensis Fischer (licorice) or mixed with pupa. The pupa were tested as solid substrates for the production of corcycepin, liquiritin, and liquiritigenin. The fermented substrates were analyzed the content of cordycepin, liquiritin, liquiritigenin, and glycirrhizin productivity and inhibitory activity of NO. The cordycepin content of 70% EtOH extract from the fermented mixture of licorice and 50% pupa with C. militaris increased maximum at 33 times. Pupa was very excellent for the production of cordycepin. The liquiritin content was decreased in all the assays inoculated with P. tenuipes and C. militaris dongchunghachos. The liquiritigenin content was higher when fermented with P. tenuipes than C. militaris. The addition of pupa significantly reduced the liquiritin content and glycyrrhizin production. As a result, the liquiritigenin content increased in fermented P. tenuipes and C. militaris, and liquiritin and glycyrrhizin decreased. The inhibition of NO production in the different ethanolic extracts fermented with licorice and pupa was also significantly increased and higher than that of a nonfermented extract in higher polar solvent extracts. The contents of cordycepin and biological active compounds were altered in accordance with the concentration of pupa and fungi. This study provides basic data for use in developing dongchunghacho fungi as a functional food resource.

Development of Menu Labeling System (MLS) Using Nutri-API (Nutrition Analysis Application Programming Interface) (영양분석 API를 이용한 메뉴 라벨링 시스템 (MLS) 개발)

  • Hong, Soon-Myung;Cho, Jee-Ye;Park, Yu-Jeong;Kim, Min-Chan;Park, Hye-Kyung;Lee, Eun-Ju;Kim, Jong-Wook;Kwon, Kwang-Il;Kim, Jee-Young
    • Journal of Nutrition and Health
    • /
    • v.43 no.2
    • /
    • pp.197-206
    • /
    • 2010
  • Now a days, people eat outside of the home more and more frequently. Menu labeling can help people make more informed decisions about the foods they eat and help them maintain a healthy diet. This study was conducted to develop menu labeling system using Nutri-API (Nutrition Analysis Application Programming Interface). This system offers convenient user interface and menu labeling information with printout format. This system provide useful functions such as new food/menu nutrients information, retrieval food semantic service, menu plan with subgroup and nutrient analysis informations and print format. This system provide nutritive values with nutrient information and ratio of 3 major energy nutrients. MLS system can analyze nutrients for menu and each subgroup. And MLS system can display nutrient comparisons with DRIs and % Daily Nutrient Values. And also this system provide 6 different menu labeling formate with nutrient information. Therefore it can be used by not only usual people but also dietitians and restaurant managers who take charge of making a menu and experts in the field of food and nutrition. It is expected that Menu Labeling System (MLS) can be useful of menu planning and nutrition education, nutrition counseling and expert meal management.

Proposal on for Response System to International Terrorism (국제 테러리즘의 대응체제 구축방안)

  • Suh, Sang-Yul
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.99-131
    • /
    • 2005
  • Terrorism which became today's common phenomena over the world is one of the most serious threats the world confront. Although International society make and operate outstanding anti-terrorism system, terror would never end without solving fundamental problems. The main body of terrorism converts from nation to organization and from organization to cell, which makes it difficult for us to recognize the main body. Since the target of today's new terrorism is many and unspecified persons, terrorists will never hesitate to use mass destruction weapons such as nuclear, biological, chemical weapons, and also use cyber-technique or cyber-terrorism. So, effective counter-terrorism measures should be performed as follows. First, it must be better for international society should make long-time plan of solving fundamental problems of terrorism other than to operate directly on terror organization and its means. Second, preventive method should be made. The most effective method of eradicating terrorism is prevention. For this, it is necessary to remove environmental elements of terrorism and terrorist bases, and to stop inflow of money and mass destruction weapons to terrorists. Third, integrated anti-terror organization should be organized and operated for continuous counter-terrorism operations. Also international alliance for anti-terrorism should be maintained to share informations and measures. Fourth, concerned department in the government should prepare counter-terrorism plans in their own parts as follows and make efforts to integrate the plans. - Ministry of Government Administration and Home Affairs : conventional terror - Ministry of Health and Welfare : bio-terror - Ministry of Science and Technology : nuclear-terror Especially, they should convert their policy and operation from post-terror actions to pre-terror actions, designate terror as national disaster and organize integrated emergency response organization including civil, government, and military elements. In conclusion, pre-terror activities and remedy of fundamental causes is the best way to prevent terror. Also, strengthening of intelligence activities, international cooperations, and preventive and comprehensive counter-measures must not ignored.

  • PDF

Quality Characteristics of Yakju (Korean Traditional Rice Wine) Added with Bamboo Ethanol Extract (대나무 알코올추출액을 첨가한 약주의 품질특성)

  • Jung, Gi-Tai;Ryu, Jeong;Ju, In-Ok;Noh, Jae-Jong;Kim, Jeong-Man
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.43 no.2
    • /
    • pp.281-286
    • /
    • 2014
  • This study was carried out to develop Yakju, a new kind of Korean traditional rice wine added with bamboo ethanol extract and characterized by containing various health benefits. The wine with bamboo ethanol extract was fermented by adding ginger and pear to improve flavor and quality. Several quality characteristics and physiological functionalities of Yakju were investigated. When bamboo ethanol extract was added to Yakju, the pH level decreased compared to that of the control. However, total acidity and soluble solid levels were higher than those of the control. The alcohol content of Yakju added with bamboo ethanol extract was slightly higher than that of the control. In examining the colors of Yakju containing bamboo ethanol extract, L value was lower than that of the control, whereas b value and brownness were higher. Various organic acids such as citric acid, malic acid, succinic acid, lactic acid, and acetic acid were determined, and the main organic acid among them was lactic acid. Various free sugars such as sorbitol, glucose, and fructose were detected and glucose was the most abundant. Total polyphenol content of Yakju added with bamboo ethanol extract was lower than that of the control. Further, electron-donating ability ranged from 23.8~40.0%, which was higher than that of the control. Nitrite scavenging ability of Yakju added with bamboo ethanol extract ranged from 15.2~36.4%, which was higher than that of the control at pH 6.0. Sensory evaluation of Yakju showed that bamboo ethanol extract+ginger as well as bamboo ethanol extract+ginger+pear treatment significantly increased flavor, taste, and overall acceptance compared to the others.

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.

Demand and Awareness of Dental Hygienists for Academic Credit Bank System According to Different Regions (지역별 치과위생사의 학점은행제에 대한 인식 및 요구)

  • Yang, Seung-Kyeong;Kim, Eun-Hee
    • Journal of dental hygiene science
    • /
    • v.8 no.4
    • /
    • pp.313-322
    • /
    • 2008
  • The purpose of this study was to examine the awareness of dental hygienists in different regions about credit bank system and their needs for that. The subjects in this study were 312 dental hygienists in dental hospitals and clinics in Seoul, Gyeonggi province, metropolitan cities, Gangweon province and Gyeongsang province. After a survey was conducted in 2008, the collected data were analyzed with SPSS 11.5 program. The findings of the study were as follows: 1. In regard to perception of the credit bank system, 68.3 percent of the dental hygienists were cognizant of that. The dental hygienists from most of the geographic areas were aware of it, but all the forty three dental hygienists from Gangweon province who accounted for 13.8 percent didn't know about that. As for media by which they acquired information on that, many of the dental hygienists learned about it from their acquaintances (46.2%), but that was not the case for the dental hygienists from Seoul and Gyeonggi province. 2. As for expectations for the credit bank system, those from Gyeongsang province had the greatest expectations for that in six out of nine items, which included academic or job performance improvement, acquisition of credits, degree or certificates and access to new technology. 3. Concerning educational spending on the credit bank system, 18.9 percent and 8.7 percent from Seoul/Gyeonggi province and Gangweon province spent less than 30 thousand won, and 19.9 percent from the metropolitan cities spent 30 thousand to less than 50 thousand won. 4. As for the importance of the categories of their major in the credit bank system, those from Gangweon province attached the most importance to oral health education ($3.56{\pm}1.259$), and the dental hygienists from the metropolitan cities put the most stress on preventive treatment ($3.64{\pm}1.191$).

  • PDF

A Study on Ecological Characteristics and Changes of Vegetation in Hamyangsangrim (함양상림 식생의 생태적 특성 변화 연구)

  • Kim, Dong-Wook;Lee, Seung-Joo;Lee, Soo-Dong;Kim, Ji-Seok;Han, Bong-Ho
    • Korean Journal of Environment and Ecology
    • /
    • v.26 no.4
    • /
    • pp.537-549
    • /
    • 2012
  • The purpose of this study was to provide data for the basic research to found the effective conservation and management plan for the Hamyangsangrim designated as Natural Monument No. 154 and surround areas by analyzing the ecological characteristics such as landuse and actual vegetation, plant community structure, soil chemical property and also to identify the tendency of the ecosystem changes through comparison with past studies. According to analysis the results, the landuse and actual vegetation of survey site was classified as 8 types which were forest, artificial greenspace, plaza and open-space, bare ground and the pavement, water bodies, facilities, agricultural land and etc.. It was also categorized as 38 types according to detailed characteristic. 15 kinds of forest vegetation community types comprising silva were classified among them. The changes of actual vegetation showed little variation that the Quercus serrata-Carpinus tschonoskii forest was the most widely distributed in 2003(forest area ratio is 48.3%) and 2010(forest area ratio is 48.1%), whereas, the Quercus serrata forest declined a more dramatic from 11.6% to 23.2%. The Quercus serrata-Carpinus tschonoskii forest increased sharply(11.6% ${\rightarrow}$ 23.2%) and also the Quercus serrata-Zelkova serrata forest increased steadily(2.2% ${\rightarrow}$ 7.9%). The agricultural land around forest was transformed into artificial green zone. Moreover, water bodies, bare ground and the pavement of areas have increased. In addition, the urbanized area has decreased because the damaged areas inside forest have been restored to the woodlands. According to the result of typical 6 types vegetation communities change, the middle layer trees grew up to the canopy layer trees and was formed the canopy layer structure. The middle layer trees expanded their forces widely. Also new species appeared. And the shrub individuals also more dramatically increased due to the growth of shrubs. The force of Quercus serrata declined as well. However the force of Carpinus tschonoskii and Zelkova serrata expanded and increased in the forest. It must be the result of the ecological vegetation succession and environmentally soundly health recovery by influence of the projects of forest surrounding environment improvement and limitation of access to forest have managed and maintained since 2003. Those sorts of changes seems to be going to develop continuously. In the future Carpinus tschonoskii and Zelkova serrata will not be only codominant in the canopy layer but also Carpinus Tschonoskii, Zelkova serrata, Meliosma myriantha, Sapium japonicum. Styrax obassia and Acer pseudo-sieboldianum will be codominant in the middle layer. As a result, the forest's codominance species are going to be changed such like that.