• Title/Summary/Keyword: PROTECTION AND MANAGEMENT

Search Result 3,029, Processing Time 0.041 seconds

Experimental Studies on the Skin Barrier Improvement and Anti-inflammatory Activity based on a Bibliometric Network Map

  • Eunsoo Sohn;Sung Hyeok Kim;Chang Woo Ha;Sohee Jang;Jung Hun Choi;Hyo Yeon Son;Cheol-Joo Chae;Hyun Jung Koo;Eun-Hwa Sohn
    • Proceedings of the Plant Resources Society of Korea Conference
    • /
    • 2023.04a
    • /
    • pp.40-40
    • /
    • 2023
  • Atopic dermatitis is a chronic inflammatory skin diseases caused by skin barrier dysfunction. Allium victoralis var. Platyphyllum (AVP) is a perennial plant used as vegetable and herbal medicine. The purpose of this study was to suggest that AVP is a new cosmetic material by examining the effects of AVP on the skin barrier and inflammatory response. A bibliometric network analysis was performed through keyword co-occurrence analysis by extracting author keyword from 69 articles retrieved from SCOPUS. We noted the anti-inflammatory activity shown by the results of clustering and mapping from network visualization analysis using VOSviewer software tool. HPLC-UV analysis showed that AVP contains 0.12 ± 0.02 mg/g of chlorogenic acid and 0.10 ± 0.01 mg/g of gallic acid. AVP at 100 ㎍/mL was shown to increase the mRNA levels of filaggrin and involucrin related to skin barrier function by 1.50-fold and 1.43-fold, respectively. In the scratch assay, AVP at concentrations of 100 ㎍/mL and 200 ㎍/mL significantly increased the cell migration rate and narrowed the scratch area. In addition, AVP suppressed the increase of inflammation-related factors COX-2 and NO and decreased the release of β-hexosaminidase. This study suggests that AVP can be developed as a functional cosmetic material for atopy management through skin barrier protection effects, anti-inflammatory and anti-itch effects.

  • PDF

Transcriptome Analysis Reveals the Putative Polyketide Synthase Gene Involved in Hispidin Biosynthesis in Sanghuangporus sanghuang

  • Jiansheng Wei;Liangyan Liu;Xiaolong Yuan;Dong Wang;Xinyue Wang;Wei Bi;Yan Yang;Yi Wang
    • Mycobiology
    • /
    • v.51 no.5
    • /
    • pp.360-371
    • /
    • 2023
  • Hispidin is an important styrylpyrone produced by Sanghuangporus sanghuang. To analyze hispidin biosynthesis in S. sanghuang, the transcriptomes of hispidin-producing and non-producing S. sanghuang were determined by Illumina sequencing. Five PKSs were identified using genome annotation. Comparative analysis with the reference transcriptome showed that two PKSs (ShPKS3 and ShPKS4) had low expression levels in four types of media. The gene expression pattern of only ShPKS1 was consistent with the yield variation of hispidin. The combined analyses of gene expression with qPCR and hispidin detection by liquid chromatography-mass spectrometry coupled with ion-trap and time-of-flight technologies (LCMS-IT-TOF) showed that ShPKS1 was involved in hispidin biosynthesis in S. sanghuang. ShPKS1 is a partially reducing PKS gene with extra AMP and ACP domains before the KS domain. The domain architecture of ShPKS1 was AMP-ACP-KS-AT-DH-KR-ACP-ACP. Phylogenetic analysis shows that ShPKS1 and other PKS genes from Hymenochaetaceae form a unique monophyletic clade closely related to the clade containing Agaricales hispidin synthase. Taken together, our data indicate that ShPKS1 is a novel PKS of S. sanghuang involved in hispidin biosynthesis.

A Study on the Image/Video Data Processing Methods for Edge Computing-Based Object Detection Service (에지 컴퓨팅 기반 객체탐지 서비스를 위한 이미지/동영상 데이터 처리 기법에 관한 연구)

  • Jang Shin Won;Yong-Geun Hong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.11
    • /
    • pp.319-328
    • /
    • 2023
  • Unlike cloud computing, edge computing technology analyzes and judges data close to devices and users, providing advantages such as real-time service, sensitive data protection, and reduced network traffic. EdgeX Foundry, a representative open source of edge computing platforms, is an open source-based edge middleware platform that provides services between various devices and IT systems in the real world. EdgeX Foundry provides a service for handling camera devices, along with a service for handling existing sensed data, which only supports simple streaming and camera device management and does not store or process image data obtained from the device inside EdgeX. This paper presents a technique that can store and process image data inside EdgeX by applying some of the services provided by EdgeX Foundry. Based on the proposed technique, a service pipeline for object detection services used core in the field of autonomous driving was created for experiments and performance evaluation, and then compared and analyzed with existing methods.

Suggestion of Safety Vest Prototype according to Work Type for Construction Workers (건설 작업자의 공종별 안전조끼 프로토타입 제안)

  • Lee, Jeong-Hoon;Lee, Jae-Yong
    • Journal of the Korea Institute of Building Construction
    • /
    • v.23 no.6
    • /
    • pp.863-873
    • /
    • 2023
  • This research explores the efficacy of safety vest colors at construction sites to enhance worker safety. Utilizing the Munsell color system and the Korean Standard Color Analysis program(KSCA), the study developed a prototype safety vest tailored to specific types of construction work. A safety vest with a color contrasting the site's environment significantly improves worker visibility and intuitiveness in identification, potentially reducing safety incidents. The study determined the optimal color specifications(hue, value, chroma) for safety vests in various construction roles, such as 10GY, 8, 8 for rebar placement, 8.75B, 7, 8 for Euroform, 3.75B, 2, 4 for Gangform, and 6.25BG, 5, 10 for steel erection. Feedback from construction experts on these prototypes, particularly regarding the safety vests for rebar placement and steel framework, was overwhelmingly positive(90% approval). Consequently, the proposed safety vest color scheme is deemed highly effective.

A study on Cloud Security based on Network Virtualization (네트워크 가상화 기반 클라우드 보안 구성에 관한 연구)

  • Sang-Beom Hong;Sung-Cheol Kim;Mi-Hwa Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.21-27
    • /
    • 2023
  • In the cloud computing environment, servers and applications can be set up within minutes, and recovery in case of fail ures has also become easier. Particularly, using virtual servers in the cloud is not only convenient but also cost-effective compared to the traditional approach of setting up physical servers just for temporary services. However, most of the und erlying networks and security systems that serve as the foundation for such servers and applications are primarily hardwa re-based, posing challenges when it comes to implementing cloud virtualization. Even within the cloud, there is a growing need for virtualization-based security and protection measures for elements like networks and security infrastructure. This paper discusses research on enhancing the security of cloud networks using network virtualization technology. I configured a secure network by leveraging virtualization technology, creating virtual servers and networks to provide various security benefits. Link virtualization and router virtualization were implemented to enhance security, utilizing the capabilities of virt ualization technology. The application of virtual firewall functionality to the configured network allowed for the isolation of the network. It is expected that based on these results, there will be a contribution towards overcoming security vulnerabil ities in the virtualized environment and proposing a management strategy for establishing a secure network.

Analysis of the Security Requirements of the Chatbot Service Implementation Model (챗봇서비스 구현 모델의 보안요구사항 분석)

  • Kyu-min Cho;Jae-il Lee;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.167-176
    • /
    • 2024
  • Chatbot services are used in various fields in connection with AI services. Security research on AI is also in its infancy, but research on practical security in the service implementation stage using it is more insufficient. This paper analyzes the security requirements for chatbot services linked to AI services. First, the paper analyzes the recently published papers and articles on AI security. A general implementation model is established by investigating chatbot services provided in the market. The implementation model includes five components including a chatbot management system and an AI engine Based on the established model, the protection assets and threats specialized in Chatbot services are summarized. Threats are organized around threats specialized in chatbot services through a survey of chatbot service managers in operation. Ten major threats were drawn. It derived the necessary security areas to cope with the organized threats and analyzed the necessary security requirements for each area. This will be used as a security evaluation criterion in the process of reviewing and improving the security level of chatbot service.

Improvement and evaluation of flood control safety utilizing a flood risk map - Yeong-Seomjin River Basin - (홍수위험지도를 활용한 치수안전도 방법 개선 및 평가 - 영·섬진강 유역중심으로 -)

  • Eo, Gyu;Lee, Sung Hyun;Lim In Gyu;Lee, Gyu Won;Kim, Ji Sung
    • Journal of Korea Water Resources Association
    • /
    • v.57 no.1
    • /
    • pp.21-33
    • /
    • 2024
  • Recently, the patterns of climate change-induced disasters have become more diverse and extensive. To develop an effective flood control plan, Korea has incorporated the concept of Potential Flood Damage (PFD) into the Long-Term Comprehensive Water Resources Plan to assess flood risk. However, concerns regarding the PFD have prompted numerous studies. Previous research primarily focused on modifying and augmenting the PFD index or introducing new indices. This study aims to enhance the existing flood control safety evaluation method by utilizing a flood risk map that incorporates risk indices, specifically focusing on the Yeong-Seomjin river basin. The study introduces three main evaluation approaches: risk and potential analysis, PFD and flood management level analysis, and flood control safety evaluation. The proposed improved evaluation method is expected to be instrumental in evaluating various flood control safety measures and formulating flood control plans.

An Investigation of the Relationship Between Corporate Logo and ESG Evaluation (기업로고와 ESG 평가의 관계에 대한 고찰)

  • Yujin Lee;Daeil Nam
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.19 no.2
    • /
    • pp.125-139
    • /
    • 2024
  • The corporate logo symbolizes the company's value, goals and vision as a visual symbol representing the company. It serves as a communication tool for companies by conveying different messages depending on design and color. As demands for ESG management have recently increased, companies have begun to implicitly demonstrate values such as environmental protection and corporate transparency through logos. Companies use logos as a strategy to visually emphasize the value they pursue and project the desired image as a signal. In this process, stakeholders who see the logo experience cognitive bias. Therefore, this study seeks to find out that ESG value can be indirectly communicated by the design of corporate logos, which can also affect a company's ESG evaluation. In addition, this study will examine the moderate effect that logos expect to encounter a greater bias effect as the companies actively include ESG-related issues in corporate disclosure data. This study conducted an analysis of 617 KOSPI-listed companies using ESG evaluation data from 2020 to 2022. The analysis confirmed the significant relation of the type of logo and ESG disclosure on ESG evaluation but found partially moderate effect of ESG disclosure.

  • PDF

Estimation of VOC Evaporative Emissions from Liquid Cargo Loading and Unloading at Ports (항만에서의 액체화물 선적 및 하역에 따른 VOCs 증발 배출량 산정에 관한 연구)

  • Jun-Hyun Lim;Pil-Su Kim;Yong-Hee Han;Jeong Kim;Sang-Jin Choi
    • Journal of Environmental Health Sciences
    • /
    • v.50 no.3
    • /
    • pp.169-180
    • /
    • 2024
  • Background: CAPSS missing evaporate emissions of volatile organic compounds (VOCs) from liquid cargo loading and unloading at ports. It needs to be supplemented to improve air quality management and allow more effective policy formulation. Objectives: In this study, the VOC emissions from the loading and unloading of liquid cargo at ports, which are not included in CAPSS, were estimated. The results of this study were compared and analyzed with the emission levels as described by CAPSS, confirming the need for managing VOC emissions from the loading and unloading of liquid cargo. Methods: Methodology provided by the U.S. Environmental Protection Agency (EPA) was applied to estimate the VOC emissions from the loading and unloading of liquid cargo at ports. The types of liquid cargo loaded at unloaded at ports are diverse, but for this study emissions were estimated for 37 VOCs designated by the Ministry of Environment. Results: The estimated results for VOC emissions from liquid cargo loading and unloading at domestic ports was 112,079 tons/yr, which was confirmed to be 11% of the known CAPSS emissions. The highest emissions were found from the loading and unloading of naptha, and the port with the highest emissions was Ulsan Port. Conclusions: The results of the estimated VOC emissions from liquid cargo loading and unloading at ports confirmed the high emission levels. To protect the health of port workers and nearby residents, it is essential to manage the emission sources and undertake continuous research.

Analysis of University Cafeteria Safety Based on Pathfinder Simulation

  • Zechen Zhang;Jaewook Lee;Hasung Kong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.209-217
    • /
    • 2024
  • Recent years have seen a notable increase in fire incidents in university cafeterias, yet the social attention to these occurrences remains limited. Despite quick responses to these incidents preventing loss of life, the need for large-scale evacuation in such high foot traffic areas can cause significant disruptions, economic losses, and panic among students. The potential for stampedes and unpredictable damage during inadequate evacuations underscores the importance of fire safety and evacuation research in these settings. Previous studies have explored evacuation models in various university environments, emphasizing the influence of environmental conditions, personal characteristics, and behavioral patterns on evacuation efficiency. However, research specifically focusing on university cafeterias is scarce. This paper addresses this gap by employing Pathfinder software to analyze fire spread and evacuation safety in a university cafeteria. Pathfinder, an advanced emergency evacuation assessment system, offers realistic 3D simulations, crucial for intuitive and scientific evacuation analysis. The studied cafeteria, encompassing three floors and various functional areas, often exceeds a capacity of 1500 people, primarily students, during peak times. The study includes constructing a model of the cafeteria in Pathfinder and analyzing evacuation scenarios under different fire outbreak conditions on each floor. The paper sets standard safe evacuation criteria (ASET > RSET) and formulates three distinct evacuation scenarios, considering different fire outbreak locations and initial evacuation times on each floor. The simulation results reveal the impact of the fire's location and the evacuation preparation time on the overall evacuation process, highlighting that fires on higher floors or longer evacuation preparation times tend to reduce overall evacuation time.In conclusion, the study emphasizes a multifaceted approach to improve evacuation safety and efficiency in educational settings. Recommendations include expanding staircase widths, optimizing evacuation routes, conducting regular drills, strengthening command during evacuations, and upgrading emergency facilities. The use of information and communication technology for managing emergencies is also suggested. These measures collectively form a comprehensive framework for ensuring safety in educational institutions during fire emergencies.