• Title/Summary/Keyword: Real-Time Network

Search Result 4,358, Processing Time 0.034 seconds

Expanded IL-22+ Group 3 Innate Lymphoid Cells and Role of Oxidized LDL-C in the Pathogenesis of Axial Spondyloarthritis with Dyslipidaemia

  • Hong Ki Min;Jeonghyeon Moon;Seon-Yeong Lee;A Ram Lee;Chae Rim Lee;Jennifer Lee;Seung-Ki Kwok;Mi-La Cho;Sung-Hwan Park
    • IMMUNE NETWORK
    • /
    • v.21 no.6
    • /
    • pp.43.1-43.14
    • /
    • 2021
  • Group 3 innate lymphoid cells (ILC3), which express IL-22 and IL-17A, has been introduced as one of pathologic cells in axial spondyloarthritis (axSpA). Dyslipidaemia should be managed in axSpA patients to reduce cardiovascular disease, and dyslipidaemia promotes inflammation. This study aimed to reveal the role of circulating ILC3 in axSpA and the impact of dyslipidaemia on axSpA pathogenesis. AxSpA patients with or without dyslipidaemia and healthy control were recruited. Peripheral blood samples were collected, and flow cytometry analysis of circulating ILC3 and CD4+ T cells was performed. The correlation between Ankylosing Spondylitis Disease Activity Score (ASDAS)-C-reactive protein (CRP) and circulating immune cells was evaluated. The effect of oxidized low-density lipoprotein cholesterol (oxLDL-C) on immune cell differentiation was confirmed. AxSpA human monocytes were cultured with with oxLDL-C, IL-22, or oxLDL-C plus IL-22 to evaluate osteoclastogenesis using tartrate-resistant acid phosphatase (TRAP) staining and real-time quantitative PCR of osteoclast-related gene expression. Total of 34 axSpA patients (13 with dyslipidaemia and 21 without) were included in the analysis. Circulating IL-22+ ILC3 and Th17 were significantly elevated in axSpA patients with dyslipidaemia (p=0.001 and p=0.034, respectively), and circulating IL-22+ ILC3 significantly correlated with ASDAS-CRP (Rho=0.4198 and p=0.0367). Stimulation with oxLDL-C significantly increased IL-22+ ILC3, NKp44- ILC3, and Th17 cells, and these were reversed by CD36 blocking agent. IL-22 and oxLDL-C increased TRAP+ cells and osteoclast-related gene expression. This study suggested potential role of circulating IL-22+ ILC3 as biomarker in axSpA. Furthermore, dyslipidaemia augmented IL-22+ ILC3 differentiation, and oxLDL-C and IL-22 markedly increased osteoclastogenesis of axSpA.

Dietary Diversity during Early Infancy Increases Microbial Diversity and Prevents Egg Allergy in High-Risk Infants

  • Bo Ra Lee;Hye-In Jung;Su Kyung Kim;Mijeong Kwon;Hyunmi Kim;Minyoung Jung;Yechan Kyung;Byung Eui Kim;Suk-Joo Choi;Soo-Young Oh;Sun-Young Baek;Seonwoo Kim;Jaewoong Bae;Kangmo Ahn;Jihyun Kim
    • IMMUNE NETWORK
    • /
    • v.22 no.2
    • /
    • pp.17.1-17.14
    • /
    • 2022
  • We aimed to investigate associations of dietary diversity (DD) with gut microbial diversity and the development of hen's egg allergy (HEA) in infants. We enrolled 68 infants in a high-risk group and 32 infants in a control group based on a family history of allergic diseases. All infants were followed from birth until 12 months of age. We collected infant feeding data, and DD was defined using 3 measures: the World Health Organization definition of minimum DD, food group diversity, and food allergen diversity. Gut microbiome profiles and expression of cytokines were evaluated by bacterial 16S rRNA sequencing and real-time reverse transcriptase-polymerase chain reaction. High DD scores at 3 and 4 months were associated with a lower risk of developing HEA in the high-risk group, but not in the control group. In the high-risk group, high DD scores at 3, 4, and 5 months of age were associated with an increase in Chao1 index at 6 months. We found that the gene expression of IL-4, IL-5, IL-6, and IL-8 were higher among infants who had lower DD scores compared to those who had higher DD scores in high-risk infants. Additionally, high-risk infants with a higher FAD score at 5 months of age showed a reduced gene expression of IL-13. Increasing DD within 6 months of life may increase gut microbial diversity, and thus reduce the development of HEA in infants with a family history of allergic diseases.

Design of Client-Server Model For Effective Processing and Utilization of Bigdata (빅데이터의 효과적인 처리 및 활용을 위한 클라이언트-서버 모델 설계)

  • Park, Dae Seo;Kim, Hwa Jong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.109-122
    • /
    • 2016
  • Recently, big data analysis has developed into a field of interest to individuals and non-experts as well as companies and professionals. Accordingly, it is utilized for marketing and social problem solving by analyzing the data currently opened or collected directly. In Korea, various companies and individuals are challenging big data analysis, but it is difficult from the initial stage of analysis due to limitation of big data disclosure and collection difficulties. Nowadays, the system improvement for big data activation and big data disclosure services are variously carried out in Korea and abroad, and services for opening public data such as domestic government 3.0 (data.go.kr) are mainly implemented. In addition to the efforts made by the government, services that share data held by corporations or individuals are running, but it is difficult to find useful data because of the lack of shared data. In addition, big data traffic problems can occur because it is necessary to download and examine the entire data in order to grasp the attributes and simple information about the shared data. Therefore, We need for a new system for big data processing and utilization. First, big data pre-analysis technology is needed as a way to solve big data sharing problem. Pre-analysis is a concept proposed in this paper in order to solve the problem of sharing big data, and it means to provide users with the results generated by pre-analyzing the data in advance. Through preliminary analysis, it is possible to improve the usability of big data by providing information that can grasp the properties and characteristics of big data when the data user searches for big data. In addition, by sharing the summary data or sample data generated through the pre-analysis, it is possible to solve the security problem that may occur when the original data is disclosed, thereby enabling the big data sharing between the data provider and the data user. Second, it is necessary to quickly generate appropriate preprocessing results according to the level of disclosure or network status of raw data and to provide the results to users through big data distribution processing using spark. Third, in order to solve the problem of big traffic, the system monitors the traffic of the network in real time. When preprocessing the data requested by the user, preprocessing to a size available in the current network and transmitting it to the user is required so that no big traffic occurs. In this paper, we present various data sizes according to the level of disclosure through pre - analysis. This method is expected to show a low traffic volume when compared with the conventional method of sharing only raw data in a large number of systems. In this paper, we describe how to solve problems that occur when big data is released and used, and to help facilitate sharing and analysis. The client-server model uses SPARK for fast analysis and processing of user requests. Server Agent and a Client Agent, each of which is deployed on the Server and Client side. The Server Agent is a necessary agent for the data provider and performs preliminary analysis of big data to generate Data Descriptor with information of Sample Data, Summary Data, and Raw Data. In addition, it performs fast and efficient big data preprocessing through big data distribution processing and continuously monitors network traffic. The Client Agent is an agent placed on the data user side. It can search the big data through the Data Descriptor which is the result of the pre-analysis and can quickly search the data. The desired data can be requested from the server to download the big data according to the level of disclosure. It separates the Server Agent and the client agent when the data provider publishes the data for data to be used by the user. In particular, we focus on the Big Data Sharing, Distributed Big Data Processing, Big Traffic problem, and construct the detailed module of the client - server model and present the design method of each module. The system designed on the basis of the proposed model, the user who acquires the data analyzes the data in the desired direction or preprocesses the new data. By analyzing the newly processed data through the server agent, the data user changes its role as the data provider. The data provider can also obtain useful statistical information from the Data Descriptor of the data it discloses and become a data user to perform new analysis using the sample data. In this way, raw data is processed and processed big data is utilized by the user, thereby forming a natural shared environment. The role of data provider and data user is not distinguished, and provides an ideal shared service that enables everyone to be a provider and a user. The client-server model solves the problem of sharing big data and provides a free sharing environment to securely big data disclosure and provides an ideal shared service to easily find big data.

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

Fast Join Mechanism that considers the switching of the tree in Overlay Multicast (오버레이 멀티캐스팅에서 트리의 스위칭을 고려한 빠른 멤버 가입 방안에 관한 연구)

  • Cho, Sung-Yean;Rho, Kyung-Taeg;Park, Myong-Soon
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.625-634
    • /
    • 2003
  • More than a decade after its initial proposal, deployment of IP Multicast has been limited due to the problem of traffic control in multicast routing, multicast address allocation in global internet, reliable multicast transport techniques etc. Lately, according to increase of multicast application service such as internet broadcast, real time security information service etc., overlay multicast is developed as a new internet multicast technology. In this paper, we describe an overlay multicast protocol and propose fast join mechanism that considers switching of the tree. To find a potential parent, an existing search algorithm descends the tree from the root by one level at a time, and it causes long joining latency. Also, it is try to select the nearest node as a potential parent. However, it can't select the nearest node by the degree limit of the node. As a result, the generated tree has low efficiency. To reduce long joining latency and improve the efficiency of the tree, we propose searching two levels of the tree at a time. This method forwards joining request message to own children node. So, at ordinary times, there is no overhead to keep the tree. But the joining request came, the increasing number of searching messages will reduce a long joining latency. Also searching more nodes will be helpful to construct more efficient trees. In order to evaluate the performance of our fast join mechanism, we measure the metrics such as the search latency and the number of searched node and the number of switching by the number of members and degree limit. The simulation results show that the performance of our mechanism is superior to that of the existing mechanism.

Investigating Dynamic Mutation Process of Issues Using Unstructured Text Analysis (비정형 텍스트 분석을 활용한 이슈의 동적 변이과정 고찰)

  • Lim, Myungsu;Kim, Namgyu
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.1
    • /
    • pp.1-18
    • /
    • 2016
  • Owing to the extensive use of Web media and the development of the IT industry, a large amount of data has been generated, shared, and stored. Nowadays, various types of unstructured data such as image, sound, video, and text are distributed through Web media. Therefore, many attempts have been made in recent years to discover new value through an analysis of these unstructured data. Among these types of unstructured data, text is recognized as the most representative method for users to express and share their opinions on the Web. In this sense, demand for obtaining new insights through text analysis is steadily increasing. Accordingly, text mining is increasingly being used for different purposes in various fields. In particular, issue tracking is being widely studied not only in the academic world but also in industries because it can be used to extract various issues from text such as news, (SocialNetworkServices) to analyze the trends of these issues. Conventionally, issue tracking is used to identify major issues sustained over a long period of time through topic modeling and to analyze the detailed distribution of documents involved in each issue. However, because conventional issue tracking assumes that the content composing each issue does not change throughout the entire tracking period, it cannot represent the dynamic mutation process of detailed issues that can be created, merged, divided, and deleted between these periods. Moreover, because only keywords that appear consistently throughout the entire period can be derived as issue keywords, concrete issue keywords such as "nuclear test" and "separated families" may be concealed by more general issue keywords such as "North Korea" in an analysis over a long period of time. This implies that many meaningful but short-lived issues cannot be discovered by conventional issue tracking. Note that detailed keywords are preferable to general keywords because the former can be clues for providing actionable strategies. To overcome these limitations, we performed an independent analysis on the documents of each detailed period. We generated an issue flow diagram based on the similarity of each issue between two consecutive periods. The issue transition pattern among categories was analyzed by using the category information of each document. In this study, we then applied the proposed methodology to a real case of 53,739 news articles. We derived an issue flow diagram from the articles. We then proposed the following useful application scenarios for the issue flow diagram presented in the experiment section. First, we can identify an issue that actively appears during a certain period and promptly disappears in the next period. Second, the preceding and following issues of a particular issue can be easily discovered from the issue flow diagram. This implies that our methodology can be used to discover the association between inter-period issues. Finally, an interesting pattern of one-way and two-way transitions was discovered by analyzing the transition patterns of issues through category analysis. Thus, we discovered that a pair of mutually similar categories induces two-way transitions. In contrast, one-way transitions can be recognized as an indicator that issues in a certain category tend to be influenced by other issues in another category. For practical application of the proposed methodology, high-quality word and stop word dictionaries need to be constructed. In addition, not only the number of documents but also additional meta-information such as the read counts, written time, and comments of documents should be analyzed. A rigorous performance evaluation or validation of the proposed methodology should be performed in future works.

Analysis of Behavioral Characteristics by Park Types Displayed in 3rd Generation SNS (제3세대 SNS에 표출된 공원 유형별 이용 특성 분석)

  • Kim, Ji-Eun;Park, Chan;Kim, Ah-Yeon;Kim, Ho Gul
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.47 no.2
    • /
    • pp.49-58
    • /
    • 2019
  • There have been studies on the satisfaction, preference, and post occupancy evaluation of urban parks in order to reflect users' preferences and activities, suggesting directions for future park planning and management. Despite using questionnaires that are proven to be affective to get users' opinions directly, there haven been limitations in understanding the latest changes in park use through questionnaires. This study seeks to address the possibility of utilizing the thirdgeneration SNS data, Instagram and Google, to compare behavior patterns and trends in park activities. Instagram keywords and photos representing user's feelings with a specific park name were collected. We also examined reviews, peak time, and popular time zones regarding selected parks through Google. This study tries to analyze users' behaviors, emerging activities, and satisfaction using SNS data. The findings are as follows. People using park near residential areas tend to enjoy programs being operated in indoor facilities and to like to use picnic places. In an adjacent park of commercial areas, eating in the park and extended areas beyond the park boundaries is found to be one of the popular park activities. Programs using open spaces and indoor facilities were active as well. Han River Park as a detached park type offers a popular venue for excercises and scenery appreciation. We also identified companionship characteristics of different park types from texts and photos, and extracted keywords of feelings and reviews about parks posted in $3^{rd}$ generation SNS. SNS data can provide basis to grasp behavioral patterns and satisfaction factors, and changes of park activities in real time. SNS data also can be used to set future directions in park planning and management in accordance with new technologies and policies.

GPR Development for Landmine Detection (지뢰탐지를 위한 GPR 시스템의 개발)

  • Sato, Motoyuki;Fujiwara, Jun;Feng, Xuan;Zhou, Zheng-Shu;Kobayashi, Takao
    • Geophysics and Geophysical Exploration
    • /
    • v.8 no.4
    • /
    • pp.270-279
    • /
    • 2005
  • Under the research project supported by Japanese Ministry of Education, Culture, Sports, Science and Technology (MEXT), we have conducted the development of GPR systems for landmine detection. Until 2005, we have finished development of two prototype GPR systems, namely ALIS (Advanced Landmine Imaging System) and SAR-GPR (Synthetic Aperture Radar-Ground Penetrating Radar). ALIS is a novel landmine detection sensor system combined with a metal detector and GPR. This is a hand-held equipment, which has a sensor position tracking system, and can visualize the sensor output in real time. In order to achieve the sensor tracking system, ALIS needs only one CCD camera attached on the sensor handle. The CCD image is superimposed with the GPR and metal detector signal, and the detection and identification of buried targets is quite easy and reliable. Field evaluation test of ALIS was conducted in December 2004 in Afghanistan, and we demonstrated that it can detect buried antipersonnel landmines, and can also discriminate metal fragments from landmines. SAR-GPR (Synthetic Aperture Radar-Ground Penetrating Radar) is a machine mounted sensor system composed of B GPR and a metal detector. The GPR employs an array antenna for advanced signal processing for better subsurface imaging. SAR-GPR combined with synthetic aperture radar algorithm, can suppress clutter and can image buried objects in strongly inhomogeneous material. SAR-GPR is a stepped frequency radar system, whose RF component is a newly developed compact vector network analyzers. The size of the system is 30cm x 30cm x 30 cm, composed from six Vivaldi antennas and three vector network analyzers. The weight of the system is 17 kg, and it can be mounted on a robotic arm on a small unmanned vehicle. The field test of this system was carried out in March 2005 in Japan.

A Study on the Application of RTLS Technology for the Automation of Spray-Applied Fire Resistive Covering Work (뿜칠내화피복 작업 자동화시스템을 위한 RTLS 기술 적용에 관한 연구)

  • Kim, Kyoon-Tai
    • Journal of the Korea Institute of Building Construction
    • /
    • v.9 no.5
    • /
    • pp.79-86
    • /
    • 2009
  • In a steel structure, spray-applied fire resistive materials are crucial in preventing structural strength from being weakened in the event of a fire. The quality control of such materials, however, is difficult for manual workers, who can frequently be in short supply. These skilled workers are also very likely to be exposed to environmental hazards. Problems with construction work such as this, which are specifically the difficulty of achieving quality control and the dangerous nature of the work itself, can be solved to some degree by the introduction of automated equipment. It is, however, very difficult to automate the work process, from operation to the selection of a location for the equipment, as the environment of a construction site has not yet been structured to accommodate automation. This is a fundamental study on the possibility of the automation of spray-applied fire resistive coating work. In this study, the linkability of the cutting-edge RTLS to an automation system is reviewed, and a scenario for the automation of spray-applied fire resistive coating work and system composition is presented. The system suggested in this study is still in a conceptual stage, and as such, there are many restrictions still to be resolved. Despite this fact, automation is expected to have good effectiveness in terms of preventing fire from spreading by maintaining a certain level of strength at a high temperature when a fire occurs, as it maintains the thickness of the fire-resistive coating at a specified level, and secures the integrity of the coating with the steel structure, thereby enhancing the fire-resistive performance. It also expected that if future research is conducted in this area in relation to a cutting-edge monitoring TRS, such as the ubiquitous sensor network (USN) and/or building information model (BIM), it will contribute to raising the level of construction automation in Korea, reducing costs through the systematic and efficient management of construction resources, shortening construction periods, and implementing more precise construction

The KALION Automated Aerosol Type Classification and Mass Concentration Calculation Algorithm (한반도 에어로졸 라이다 네트워크(KALION)의 에어로졸 유형 구분 및 질량 농도 산출 알고리즘)

  • Yeo, Huidong;Kim, Sang-Woo;Lee, Chulkyu;Kim, Dukhyeon;Kim, Byung-Gon;Kim, Sewon;Nam, Hyoung-Gu;Noh, Young Min;Park, Soojin;Park, Chan Bong;Seo, Kwangsuk;Choi, Jin-Young;Lee, Myong-In;Lee, Eun hye
    • Korean Journal of Remote Sensing
    • /
    • v.32 no.2
    • /
    • pp.119-131
    • /
    • 2016
  • Descriptions are provided of the automated aerosol-type classification and mass concentration calculation algorithm for real-time data processing and aerosol products in Korea Aerosol Lidar Observation Network (KALION, http://www.kalion.kr). The KALION algorithm provides aerosol-cloud classification and three aerosol types (clean continental, dust, and polluted continental/urban pollution aerosols). It also generates vertically resolved distributions of aerosol extinction coefficient and mass concentration. An extinction-to-backscatter ratio (lidar ratio) of 63.31 sr and aerosol mass extinction efficiency of $3.36m^2g^{-1}$ ($1.39m^2g^{-1}$ for dust), determined from co-located sky radiometer and $PM_{10}$ mass concentration measurements in Seoul from June 2006 to December 2015, are deployed in the algorithm. To assess the robustness of the algorithm, we investigate the pollution and dust events in Seoul on 28-30 March, 2015. The aerosol-type identification, especially for dust particles, is agreed with the official Asian dust report by Korean Meteorological Administration. The lidar-derived mass concentrations also well match with $PM_{10}$ mass concentrations. Mean bias difference between $PM_{10}$ and lidar-derived mass concentrations estimated from June 2006 to December 2015 in Seoul is about $3{\mu}g\;m^{-3}$. Lidar ratio and aerosol mass extinction efficiency for each aerosol types will be developed and implemented into the KALION algorithm. More products, such as ice and water-droplet cloud discrimination, cloud base height, and boundary layer height will be produced by the KALION algorithm.