• Title/Summary/Keyword: Role Based Access Control

Search Result 272, Processing Time 0.029 seconds

A plant-based multivitamin, multimineral, and phytonutrient supplementation enhances the DNA repair response to metabolic challenges

  • Yeo, Eunji;Hong, Jina;Kang, Seunghee;Lee, Wonyoung;Kwon, Oran;Park, Eunmi
    • Journal of Nutrition and Health
    • /
    • v.55 no.4
    • /
    • pp.450-461
    • /
    • 2022
  • Purpose: DNA damage and repair responses are induced by metabolic diseases and environmental stress. The balance of DNA repair response and the antioxidant system play a role in modulating the entire body's health. This study uses a high-fat and high-calorie (HFC) drink to examine the new roles of a plant-based multivitamin/mineral supplement with phytonutrients (PMP) for regulating the antioxidant system and cellular DNA repair signaling in the body resulting from metabolic stress. Methods: In a double-blind, randomized, parallel-arm, and placebo-controlled trial, healthy adults received a capsule containing either a PMP supplement (n = 12) or a placebo control (n = 12) for 8 weeks. Fasting blood samples were collected at 0, 1, and 3 hours after consuming a HFC drink (900 kcal). The blood samples were analyzed for the following oxidative stress makers: areas under the curve reactive oxygen species (ROS) levels, plasma malondialdehyde (MDA), erythrocytes MDA, urinary MDA, oxidized low-density lipoprotein, and the glutathione:oxidized glutathione ratio at the time points. We further examined the related protein levels of DNA repair signaling (pCHK1 (Serine 345), p-P53 (Serine 15), and 𝛄H2AX expression) in the plasma of subjects to evaluate the time-dependent effects of a HFC drink. Results: In a previous study, we showed that PMP supplementation for eight weeks reduces the ROS and endogenous DNA damage in human blood plasma. Results of the current study further show that PMP supplementation is significantly correlated with antioxidant defense. Compared to the placebo samples, the blood plasma obtained after PMP supplementation showed enhanced DNA damage response genes such as pCHK1(Serine 345) (a transducer of DNA response) and 𝛄H2AX (a hallmark of DNA damage) during the 8 weeks trial on metabolic challenges. Conclusion: Our results indicate that PMP supplementation for 8 weeks enhances the antioxidant system against oxidative stress and prevents DNA damage signaling in humans.

Image Processing System based on Deep Learning for Safety of Heat Treatment Equipment (열처리 장비의 Safety를 위한 딥러닝 기반 영상처리 시스템)

  • Lee, Jeong-Hoon;Lee, Ro-Woon;Hong, Seung-Taek;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.77-83
    • /
    • 2020
  • The heat treatment facility is in a situation where the scope of application of the remote IOT system is expanding due to the harsh environment caused by high heat and long working hours among the root industries. In this heat treatment process environment, the IOT middleware is required to play a pivotal role in interpreting, managing and controlling data information of IoT devices (sensors, etc.). Until now, the system controlled by the heat treatment remotely was operated with the command of the operator's batch system without overall monitoring of the site situation. However, for the safety and precise control of the heat treatment facility, it is necessary to control various sensors and recognize the surrounding work environment. As a solution to this, the heat treatment safety support system presented in this paper proposes a support system that can detect the access of the work manpower to the heat treatment furnace through thermal image detection and operate safely when ordering work from a remote location. In addition, an OPEN CV-based deterioration analysis system using DNN deep learning network was constructed for faster and more accurate recognition than general fixed hot spot monitoring-based thermal image analysis. Through this, we would like to propose a system that can be used universally in the heat treatment environment and support the safety management specialized in the heat treatment industry.

An Implementation of IMS Based PoC Service Deployment (IMS 기반의 PoC 서비스 전개 구현)

  • Lee, Jae-Oh;Lee, Hong-Kyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4878-4883
    • /
    • 2015
  • The IP Multimedia Subsystem(IMS) is a framework that provides access to the content of Internet and Telecom services anytime and anywhere with guaranteed Quality of Service(QoS) and manageability by separating control functions from bearer and services. The Service Delivery Platform(SDP) provides common interfaces and protocols to deploy existing or new services in an efficient way. Therefore SDP over IMS plays a role of bridge between established network and new IMS network by simplifying the interaction among application services. In order to enrich the multimedia network communication, we try to deploy the Push-to-talk over Cellular(PoC) service which is considered as the outstanding and distinguished half-duplex Voice over IP(VoIP) application service among deployable candidate services over mobile network. In this paper we investigate the advantages of PoC service and PoC architecture firstly, and then focus on the its practical implementation for the prototype to validate the feasibility of its deployment and realization.

Intelligent Character Recognition System for Account Payable by using SVM and RBF Kernel

  • Farooq, Muhammad Umer;Kazi, Abdul Karim;Latif, Mustafa;Alauddin, Shoaib;Kisa-e-Zehra, Kisa-e-Zehra;Baig, Mirza Adnan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.213-221
    • /
    • 2022
  • Intelligent Character Recognition System for Account Payable (ICRS AP) Automation represents the process of capturing text from scanned invoices and extracting the key fields from invoices and storing the captured fields into properly structured document format. ICRS plays a very critical role in invoice data streamlining, we are interested in data like Vendor Name, Purchase Order Number, Due Date, Total Amount, Payee Name, etc. As companies attempt to cut costs and upgrade their processes, accounts payable (A/P) is an example of a paper-intensive procedure. Invoice processing is a possible candidate for digitization. Most of the companies dealing with an enormous number of invoices, these manual invoice matching procedures start to show their limitations. Receiving a paper invoice and matching it to a purchase order (PO) and general ledger (GL) code can be difficult for businesses. Lack of automation leads to more serious company issues such as accruals for financial close, excessive labor costs, and a lack of insight into corporate expenditures. The proposed system offers tighter control on their invoice processing to make a better and more appropriate decision. AP automation solutions provide tighter controls, quicker clearances, smart payments, and real-time access to transactional data, allowing financial managers to make better and wiser decisions for the bottom line of their organizations. An Intelligent Character Recognition System for AP Automation is a process of extricating fields like Vendor Name, Purchase Order Number, Due Date, Total Amount, Payee Name, etc. based on their x-axis and y-axis position coordinates.

Development of e-learning Education Programs for Social Workers in Hospice and Palliative Care (호스피스완화의료 사회복지사 e-learning 교육과정 개발)

  • Shim, Hye-Young;Chang, Yoon-Jung
    • Journal of Hospice and Palliative Care
    • /
    • v.18 no.1
    • /
    • pp.9-15
    • /
    • 2015
  • Education is essential for specialists in charge terminal care of cancer patients. In the second 10-year plan to conquer cancer under the Cancer Control Act, the Korean government announced a plan to train more hospice and palliative care (HPC) specialists based on quantitative HPC expansion. Specifically, the government aims to develop e-learning programs to foster social workers in HPC, following those offered to doctors and nurses. In HPC, social workers have served a vital role in helping patients overcome psychological and social issues. As professionals, they have carried out their responsibilities and played their part in the field to help HPC to take root and be institutionalized in Korea. To date, it has been difficult to obtain practical knowledge and skills for social workers due to the lack of systematic training program. Development of an e-learning program for social workers, as proposed in this study, should strengthen social workers in charge of terminally-ill cancer patients in terms of their identity, expertise, and practical skills in clinical setting and improve their access to education. We also hope the program to be further developed by the government by introducing an education system that offers refresher courses to guarantee social workers' continued expertise through.

A Development of the Unified Object-Oriented Analysis and Design Methodology for Security-Critical Web Applications Based on Object-Relational Database - Forcusing on Oracle11g - (웹 응용 시스템 개발을 위한 보안을 고려한 통합 분석·설계 방법론 개발 - Oracle11g를 중심으로 -)

  • Joo, Kyung-Soo;Woo, Jung-Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.169-177
    • /
    • 2012
  • In the development process of application systems, the most important works are analysis and design. Most of the application systems are implemented on database system. So, database design is important. Also, IT System are confronted with more and more attacks by an increase interconnections between IT systems. Therefore security-related processes belong to a very important process. Security is a complex non-functional requirement that can interaction of many parts in the system. But Security is considered in the final stages of development. Therefore, Their increases the potential for the final product to contain vulnerabilities. Accordingly, Early in development related to security analysis and design process is very important. J2EE gives a solution based on RBAC((Role Based Access Control) for security and object-relational database also has RBAC for security. But there is not a object-oriented analysis and design methodology using RBAC of J2EE and object-relational database for security. In this paper, the unified object-oriented analysis and design methodology is developed for security-critical web application systems based on J2EE and object-relational database. We used UMLsec and RBAC of object-relational database and J2EE for this methodology.

The Influence of Sexual Violence on the Relationship Between Internet Pornography Experience and Self-Control

  • Seo, Gang Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.191-198
    • /
    • 2020
  • In this paper we propose a for high school students who are attending a nationwide city with experience in Internet pornography, we would like to find out the impact of Internet pornography experience and self-regulation on sex crime harmful behavior. For this study, an Internet panel survey was conducted using a purposeful method of significant allocation inference. During the period, 246 copies of the questionnaire were distributed for about a month from May to June 2018 and 210 parts were analyzed except for 36 parts with no experience of pornographic material, and further analysis was conducted on 85 respondents with experience in harmful behavior of sexual violence. To this end, analysis tools used the SPS WIN 20.0 program version. The research results are as follows. First, we could find that Internet pornography has a negative effect on teenagers. This shows the probability of developing sexual violence into behavior as people can experience pornographic material regardless of their will due to the high Internet access. Second, the self-regulation of sexual violence behavior is found to have no direct impact. This is not just the adolescent's will to do so, but it is affected by the external environment. Third, self-regulation has proven its role as a modulator to mitigate negative perceptions of Internet pornography. Based on this, the proposal for limiting current prices was discussed.

Face Detection in Color Images Based on Skin Region Segmentation and Neural Network (피부 영역 분할과 신경 회로망에 기반한 칼라 영상에서 얼굴 검출)

  • Lee, Young-Sook;Kim, Young-Bong
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.1-11
    • /
    • 2006
  • Many research demonstrations and commercial applications have been tried to develop face detection and recognition systems. Human face detection plays an important role in applications such as access control and video surveillance, human computer interface, identity authentication, etc. There are some special problems such as a face connected with background, faces connected via the skin color, and a face divided into several small parts after skin region segmentation in generally. It can be allowed many face detection techniques to solve the first and second problems. However, it is not easy to detect a face divided into several parts of regions for reason of different illumination conditions in the third problem. Therefore, we propose an efficient modified skin segmentation algorithm to solve this problem because the typical region segmentation algorithm can not be used to. Our algorithm detects skin regions over the entire image, and then generates face candidate regions using our skin segmentation algorithm For each face candidate, we implement the procedure of region merging for divided regions in order to make a region using adjacency between homogeneous regions. We utilize various different searching window sizes to detect different size faces and a face detection classifier based on a back-propagation algorithm in order to verify whether the searching window contains a face or not.

  • PDF

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key (마이크로 모빌리티 환경에서 보안 그룹키를 이용한 안전한 멀티캐스트 프로토콜)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.573-586
    • /
    • 2008
  • The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.

Risk Assessment on the Water BOT Business Participation in China : Domestic EPC Contractor's View (해외기업의 중국 수처리 BOT시장 참여 저해 위험요인 분석 : 국내 EPC 건설기업의 관점)

  • Choi, Jae-ho;Li, Shoushuang;Lee, Seungho
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.5D
    • /
    • pp.695-703
    • /
    • 2008
  • China water market has huge potential for increased use of BOT mode and one of the most attractive markets of doing business. However, the current China water BOT market shows that many foreign companies are retreating from the market while Chinese water companies fast growing. From the view no domestic companies have track records in China BOT water market, the research identified twenty market access barriers in terms of construction laws, regulations, BOT-related policy and the recent market situation. These are evaluated based on interview results with 10 professionals direct or indirect having a China water BOT experience. All the factors are found to be highly influential to foreign company's decision on the market participation. Among those, no fixed return policy and low water price, difficulty in water price adjustment and approval, and no government guarantees, all directly related to the project viability and under the control of government, were the most critical factors, implying government's role is the key in increasing the market competition by attracting more foreign participation on the market. In addition, new construction law regulating foreign EPC contractor's construction work, namely Decree 113, and requirement of applying competitive bidding in selecting EPC contractor in a BOT project are also considered signigicant barriers on foreign participation, which contradicts international norm and therefore necessitates an adjustment on current decision process in domestic companies.