Park, Min-Ah;Hwang, Kyung-A;Lee, Hye-Rim;Yi, Bo-Rim;Choi, Kyung-Chul
Toxicological Research
/
v.27
no.4
/
pp.253-259
/
2011
Transforming growth factor ${\beta}$ (TGF-${\beta}$) is involved in cellular processes including growth, differentiation, apoptosis, migration, and homeostasis. Generally, TGF-${\beta}$ is the inhibitor of cell cycle progression and plays a role in enhancing the antagonistic effects of many growth factors. Unlike the antiproliferative effect of TGF-${\beta}$, E2, an endogeneous estrogen, is stimulating cell proliferation in the estrogen-dependent organs, which are mediated via the estrogen receptors, $ER{\alpha}$ and $ER{\beta}$, and may be considered as a critical risk factor in tumorigenesis of hormone-responsive cancers. Previous researches reported the cross-talk between estrogen/$ER{\alpha}$ and TGF-${\beta}$ pathway. Especially, based on the E2-mediated inhibition of TGF-${\beta}$ signaling, we examined the inhibition effect of 4-tert-octylphenol (OP) and 4-nonylphenol (NP), which are well known xenoestrogens in endocrine disrupting chemicals (EDCs), on TGF-${\beta}$ signaling via semi-quantitative reverse-transcription PCR. The treatment of E2, OP, or NP resulted in the downregulation of TGF-${\beta}$ receptor2 (TGF-${\beta}$ R2) in TGF-${\beta}$ signaling pathway. However, the expression level of TGF-${\beta}1$ and TGF-${\beta}$ receptor1 (TGF-${\beta}$ R1) genes was not altered. On the other hand, E2, OP, or NP upregulated the expression of a cell-cycle regulating gene, c-myc, which is a oncogene and a downstream target gene of TGF-${\beta}$ signaling pathway. As a result of downregulation of TGF-${\beta}$ R2 and the upregulation of c-myc, E2, OP, or NP increased cell proliferation of BG-1 ovarian cancer cells. Taken together, these results suggest that E2 and these two EDCs may mediate cancer cell proliferation by inhibiting TGF-${\beta}$ signaling via the downregulation of TGF-${\beta}$ R2 and the upregulation of c-myc oncogene. In addition, it can be inferred that these EDCs have the possibility of tumorigenesis in estrogen-responsive organs by certainly representing estrogenic effect in inhibiting TGF-${\beta}$ signaling.
Compared to gaeous hydrogen, liquid hydrogen has approximately 1/800 volume, 800 times higher volumetric energy density at the same pressure, and the advantage of lower explosion risk and easier transportation than gaseous hydrogen. However, hydrogen liquefaction requires larger scale facility investment than simple compression storage method. Therefore, the research on energy-saving hydrogen liquefaction processes is highly necessary. In this study, helium/neon (mole ratio 80 : 20) refrigeration cycle was investigated as the main refrigeration process for hydrogen liquefaction. Process simulation for less energy consumption were carried out using PRO/II with PROVISION V10.2 of AVEVA. For hydrogen liquefaction, energy consumption was compared in three cases: Using a helium/neon refrigerant cycle, a SMR+helium/neon refrigerant cycle, and a C3-MR+helium/neon refrigerant cycle. As a result, the total power consumptions of compressors required to liquefy 1 kg of hydrogen are 16.3, 7.03 and 6.64 kWh, respectively. Therefore, it can be deduced that energy usage is greatly reduced in the hydrogen liquefaction process when the pre-cooling is performed using the SMR process or the C3MR process, which have already been commercialized, rather than using only the helium/neon refrigeration cycle for the hydrogen liquefaction process.
Features of geological lineaments generally play an important role at the data interpretation concerned geological processes, mineral exploration or natural hazard risk estimation. However, there are intrinsically discordances between lineaments-related features extracted from surficial geological syrvey and those from satellite imagery;nevertheless, any data set contained those information should not be considred as less meaningful within their own task. For the purpose of effective utilization task of extracted lineaments, the mathematical scheme, based on fuzzy set theory, for practical integration of various types of rasterized data sets is studied. As a real application, the geological map named Homyeong sheet(1:50,000) and the Landset TM imageries covering same area were used, and then lineaments-related data sets such as lineaments on the geological map, lineaments extracted from a false-color image composite satellite, and major drainage pattern were utilized. For data fusion process, fuzzy membership functions of pixel values in each data set were experimentally assigned by percentile, and then fuzzy algebraic sum operator was tested. As a result, integrated lineaments by this well-known operator are regarded as newly-generated reasonable ones. Conclusively, it was thought that the implementation within available GISs, or the stand-alone module for general applications of this simple scheme can be utilized as an effective scheme can be utilized as an effective scheme for further studies for spatial integration task for providing decision-supporting information, or as a kind of spatial reasoning scheme.
This study, combining geophysical and environmental approaches, was undertaken to investigate the causes of secondary salinity in the Goondoola basin, in southwestern Queensland. Airborne radiometric, electromagnetic and ground electromagnetic datasets were acquired, along with data on soils and subsurface materials and groundwater. Relationships established between radiometric, elevation data, and measured material properties allowed us to generate predictive maps of surface materials and recharge potential. Greatest recharge to the groundwater is predicted to occur on the weathered bedrock rises surrounding the basin. Electromagnetic data (airborne, ground, and downhote), used in conjunction with soil and drillhole measurements, were used to quantify regolith salt store and to define the subsurface architecture. Conductivity measurements reflect soil salt distribution. However, deeper in the regolith, where the salt content is relatively constant, the AEM signal is influenced by changes in porosity or material type. This allowed the lateral distribution of bedrock weathering zones to be mapped. Salinisation in this area occurs because of local-andintermediate-scale processes, controlled strongly by regolith architecture. The present surface outbreak is the result of evaporative concentration above shallow saline groundwater, discharging at break of slope. The integration of surficial and subsurface datasets allowed the identification of similar landscape settings that are most at risk of developing salinity with groundwater rise. This information is now being used by local land managers to refine management choices that prevent excess recharge and further salt mobilisation.
As artificial intelligence(AI) technologies, which have made rapid growth recently, began to be applied to the marine environment such as ships, there have been active researches on the application of CNN-based models specialized for digital videos. In E-Navigation service, which is combined with various technologies to detect floating objects of clash risk to reduce human errors and prevent fires inside ships, real-time processing is of huge importance. More functions added, however, mean a need for high-performance processes, which raises prices and poses a cost burden on shipowners. This study thus set out to propose a method capable of processing information at a high rate while maintaining the accuracy by applying Quantization techniques of a deep learning model. First, videos were pre-processed fit for the detection of floating matters in the sea to ensure the efficient transmission of video data to the deep learning entry. Secondly, the quantization technique, one of lightweight techniques for a deep learning model, was applied to reduce the usage rate of memory and increase the processing speed. Finally, the proposed deep learning model to which video pre-processing and quantization were applied was applied to various embedded boards to measure its accuracy and processing speed and test its performance. The proposed method was able to reduce the usage of memory capacity four times and improve the processing speed about four to five times while maintaining the old accuracy of recognition.
Wang, Bohan;Yang, Jin;Tan, Adrian;Tan, Fabian Hadipriono;Parke, Michael
Journal of Construction Engineering and Project Management
/
v.8
no.4
/
pp.1-24
/
2018
In the last decade, the use of Building Information Modeling (BIM) as a new technology has been applied with traditional Computer-aided design implementations in an increasing number of architecture, engineering, and construction projects and applications. Its employment alongside construction management, can be a valuable tool in helping move these activities and projects forward in a more efficient and time-effective manner. The traditional stakeholders, i.e., Owner, A/E and the Contractor are involved in this BIM system that is used in almost every activity of construction projects, such as design, cost estimate and scheduling. This article extracts major features of the application of BIM from perspective of participating BIM components, along with the different phrases, and applies to them a logistic analysis using a fuzzy performance tree, quantifying these phrases to judge the effectiveness of the BIM techniques employed. That is to say, these fuzzy performance trees with fuzzy logic concepts can properly translate the linguistic rating into numeric expressions, and are thus employed in evaluating the influence of BIM applications as a mathematical process. The rotational fuzzy models are used to represent the membership functions of the performance values and their corresponding weights. Illustrations of the use of this fuzzy BIM performance tree are presented in the study for the uninitiated users. The results of these processes are an evaluation of BIM project performance as highly positive. The quantification of the performance ratings for the individual factors is a significant contributor to this assessment, capable of parsing vernacular language into numerical data for a more accurate and precise use in performance analysis. It is hoped that fuzzy performance trees and fuzzy set analysis can be used as a tool for the quality and risk analysis for other construction techniques in the future. Baldwin's rotational models are used to represent the membership functions of the fuzzy sets. Three scenarios are presented using fuzzy MEAN, AND and OR gates from the lowest to intermediate levels of the tree, and fuzzy SUM gate to relate the intermediate level to the top component of the tree, i.e., BIM application final performance. The use of fuzzy MEAN for lower levels and fuzzy SUM gates to reach the top level suggests the most realistic and accurate results. The methodology (fuzzy performance tree) described in this paper is appropriate to implement in today's construction industry when limited objective data is presented and it is heavily relied on experts' subjective judgment.
Korean Journal of Agricultural and Forest Meteorology
/
v.21
no.3
/
pp.187-195
/
2019
The needs for precise diagnostics and farm management-decision aids have increased to reduce the risk of climate change and environmental stress. Crop simulation models have been widely used to search optimal solutions for effective cultural practices. However, limited knowledge on physiological responses to environmental variation would make it challenging to apply crop simulation models to a wide range of studies. Advanced research facilities would help investigation of plant response to the environment. In the present study, the sunlit controlled environment chambers, known as Korean SPAR (Soil-Plant-Atmosphere-Research) system, was developed by renovating existing SPAR system. The Korean SPAR system controls and monitors major environmental variables including atmospheric carbon dioxide concentration, temperature and soil moisture. Furthermore, plants are allowed to grow under natural sunlight. Key physiological and physical data such as canopy photosynthesis and respiration, canopy water and nutrient use over the whole growth period are also collected automatically. As a case study, it was shown that the Korean SPAR system would be useful for collection of data needed for understanding the growth and developmental processes of a crop, e.g., soybean. In addition, we have demonstrated that the canopy photosynthetic data of the Korean SPAR indicate the precise representation of physiological responses to environment variation. As a result, physical and physiological data obtained from the Korean SPAR are expected to be useful for development of an advanced crop simulation model minimizing errors and confounding factors that usually occur in field experiments.
Kim, Heeeun;Shon, Taeshik;Kim, Duwon;Han, Gwangseok;Seong, JiHoon
Journal of Platform Technology
/
v.9
no.3
/
pp.3-17
/
2021
Advanced persistent threat (APT) attacks are attacks aimed at a particular entity as a set of latent and persistent computer hacking processes. These APT attacks are usually carried out through various methods, including spam mail and disguised banner advertising. The same name is also used for files, since most of them are distributed via spam mail disguised as invoices, shipment documents, and purchase orders. In addition, such Infostealer attacks were the most frequently discovered malicious code in the first week of February 2021. CDR is a 'Content Disarm & Reconstruction' technology that can prevent the risk of malware infection by removing potential security threats from files and recombining them into safe files. Gartner, a global IT advisory organization, recommends CDR as a solution to attacks in the form of attachments. There is a program using CDR techniques released as open source is called 'Dangerzone'. The program supports the extension of most document files, but does not support the extension of HWP files that are widely used in Korea. In addition, Gmail blocks malicious URLs first, but it does not block malicious URLs in mail systems such as Naver and Daum, so malicious URLs can be easily distributed. Based on this problem, we developed a 'Dangerzone' program that supports the HWP extension to prevent APT attacks, and a Chrome extension that performs URL checking in Naver and Daum mail and blocking banner ads.
Hypertriglyceridemia is the main risk factor for atherosclerosis. It is reported that triglyceride (TG) induces macrophage cell death, and is involved in the formation of plaques and development of atherosclerosis. We previously reported that TG-induced cell death of macrophages is mediated via pannexin-1 activation, which increases the extracellular ATP and subsequent increase in potassium efflux, thereby activating the caspase-2/caspase-1/apoptotic caspases, including the caspase-8 pathway. Contrarily, some studies have reported that caspase-8 is an upstream molecule of caspase-1 and caspase-2 in several cellular processes. Therefore, this study was undertaken to investigate whether caspase-8 influences its upstream molecules in TG-stimulated macrophage cell death. We first confirmed that caspase-8 induces caspase-3 activation and poly ADP-ribose polymerase (PARP) cleavage in TG-treated macrophages. Next, we determined that the inhibition of caspase-8 results in reduced caspase-1 and -2 activity, which are upstream molecules of caspase-8 in TG-induced cell death of macrophages. We also found that ATP treatment restores the caspase-8 inhibitor-induced caspase-2 activity, thereby implying that caspase-8 affects the upstream molecules responsible for increasing the extracellular ATP levels in TG-induced macrophage cell death. Taken together, these findings indicate that caspase-8 potentiates the TG-induced macrophage cell death by activating its upstream molecules.
Journal of the Korea Academia-Industrial cooperation Society
/
v.22
no.6
/
pp.573-582
/
2021
In this study, a series of processes for evaluating the effective protection against barriers that should be equipped in institutions that perform reliability tests on high-risk ammunition, such as high-explosive ammunition, were introduced. The impact that high-explosive bombs can have on personnel includes damage to the eardrum and lungs caused by explosion overpressure and penetrating wounds that can be received by fragments generated simultaneously with the explosion. Therefore, a high-explosive with COMP B explosives as its contents were set up, and an explosion protection theory investigation to calculate the degree of damage, numerical calculations and simulations were performed to verify the protection power. A numerical calculation revealed the maximum explosion overpressure on the protective wall when the high-explosive exploded and the penetration force of the fragment against a 50 mm-thick protective wall to be 77.74 kPa and 41.34 mm, respectively. In the simulation verification using AUTODYN, the maximum explosion overpressures affecting the firewall and personnel were 56.68 kPa and 18.175 kPa, respectively, and the penetration of fragments was 35.56 mm. This figure is lower than the human damage limit, and it was judged that the protective power of the barrier would be effective.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.