• Title/Summary/Keyword: Tag-out

Search Result 214, Processing Time 0.022 seconds

Effect of Dietary Oil Containing $\gamma$-Linolenic Acid on the Plasma Lipid Levels and Thrombotic Activity in Rats (감마-리놀렌산을 함유하는 식이지방이 흰쥐의 혈전작용 및 혈액지질 수준에 미치는 영향)

  • ;Zammit, A Victor
    • Journal of Nutrition and Health
    • /
    • v.36 no.9
    • /
    • pp.889-897
    • /
    • 2003
  • This study was carried out to determine the effect of dietary ${\gamma}$-linolenic acid on decreasing the plasma lipid levels and the thrombotic activity in rats. Sprague-Dawley male rats (B.W 120 g) were fed a experimental diet containing 5% lard (46.05% saturated fatty acids) , corn oil (51.36% linoleic acid) , evening primrose oil (EPO,72.80% linoleic acid and 9.16% ${\gamma}$-linolenic acid) or borage oil (BO,40.29% linoleic acid and 24.25% ${\gamma}$-liolenic acid) for 30 days. Although there were no significant differences in the food intake among the groups, the body weight gain of the BO group was significantly lower than that of the other groups. The bleeding time of the BO group was significantly longer than that of the other groups. There were significantly differences in the whole blood clotting time among the groups except for the EPO and corn oil groups, where the whole blood clotting time of the BO group was the highest among the groups, and that of the lard group was the lowest. The plasma triacyglyceride (TAG) , total cholesterol (TC) and low density lipoprotein cholesterol (LDL-C) concentrations were the lowest in the BO group, but highest in the lard group, and there were significant differences among the groups. The plasma HDL-C concentrations were in the following order: BO, EPO, corn oil and lard groups and there were significant differences among the groups. The excretions of fecal neutial steroids and acidic steroids of the BO group were the highest among the groups, and there were significant differences compared to the other groups. The results suggest that dietary EPO and BO containing ${\gamma}$-linolenic acid has an antithrombotic activity, and inhibits the increasing of plasma TAG, TC and LDL-C concentrations compared to lard, which contains saturated fatty acids, or corn oil, which contains linoleic acid.

Development of NFC Mobile Application for Information on Textile Materials (패션소재 정보 전달을 위한 NFC 모바일 어플리케이션 개발)

  • Park, Sohyun;Kim, Jongjun
    • Journal of Fashion Business
    • /
    • v.20 no.1
    • /
    • pp.142-156
    • /
    • 2016
  • Convergence of IT devices and fashion is enabling the industry to take fully different approaches in various areas including product planning, fabric selecting, distributing, and marketing. At the same time, it also transforms the definition of clothing itself. Convergence of IT technologies in the realm of fashion and textiles industries can create a powerful synergy through connection digital devices, such as mobile phone. In this context, this study attempts to suggest how IT technology can be efficiently harnessed through the usage of mobile devices in the planning stage of fashion materials, where the initial production plan of a clothing item is mapped out. This study ultimately aims to enhance the effectiveness of databases on fashion material information by using mobile devices to utilize NFC, an RFID technology having as much revolutionary power as Internet - which can be the convergence between IT and fashion across the software dimensions. To pursue this research, data on fashion material information regarding 200 woven fabric specimens were provided by textile companies. The information includes elements such as its composition, weight, width, yarn, density and sales report. These pieces of information were organized into a database. Drawing on this data, Android-based applications that allow smart phones to read off fabric information from NFC tags were developed for this study using two methods. The system works as follows: 1. NFC tag stickers are attached onto the hangers where 200 fabric samples are hanging. 2. The NFC tag stickers are tagged, or read off from a smart phone that support NFC functions. 3. Upon tagging, the Smart phone swiftly displays all information available on its screen - not only the aforementioned six elements, but also the image of the clothing item from the fabric in its finalized product form, and the video of the model wearing the item - for convenient view. The method harbors immense potential for the fashion industry in general, and will also be useful in those fields inside the industry that harness NFC technology.

Improved RFID Authentication Protocol Providing Mutual Authentication (상호인증을 제공하는 개선된 RFID 인증 프로토콜)

  • Jeon, Seo-Kwan;Eun, Sun-Ki;Oh, Soo-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.113-120
    • /
    • 2010
  • RFID system is the contact-less recognition technology and use for distribution system, environment, transport, security and so on. However, it may create many security relevant problems such as privacy because constraints of RFID communication environment. So several methods of resolving these problems have been proposed. Recently, Shin and Park proposed an efficient RFID authentication protocol with protecting user's privacy using hash function and exclusive-OR.. But Ahn and Bu et al. poia problem that a attacker can to masquerade as malicious reader because their protocol can't providing mutual authentication.nted out weakness of Shin and Park's protocol and proposed more secure and efficient protocol. Unfortunately, Ahn and But's protocol has In this paper, We propose an improved RFID authentication protocol providing mutual authentication. The proposed protocol has advantages that providing mutual authentication between a tag and a reader, secure against replay attack and spoofing attack. Also, it guarantees anonymity of RFID tag and secure against location tracking attack by collusion of malicious readers.

Visual Element Analysis and Guideline of School Web Site Design (학교 웹 사이트의 디자인에 대한 시각적인요소 분석 및 가이드라인)

  • Kwon Kyung-Ran;Kim Young-Bong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.273-279
    • /
    • 2005
  • It is activated a virtual university(digital university) without limitation time and space that the diffusion of internet, the rapid development of information and communicative technologies, web-technology. It is great importance of school-site to support various and qualitative education services, to cut social education spending, to strengthen national competitiveness with breed expert. Many people who are in universities are putting a school-site to the test. So we need study and analysis it to build up a virtual-study-space efficiently on web. This thesis is supposed to help in school-site design to make it reduce errors and save time and efforts. First, it suggests most general design pattern by analysis visual elements using HTML Tag. Second, it suggests a guide-line and a specific of design to use convenience through research on web-design problem and finding out user's favor.

  • PDF

Enzymatic reaction model for the production of symmetrical lipid molecules using the response surface methodology

  • Hong, Joon-Sun;Shin, Jung-Ah;Lee, Ki-Teak
    • Korean Journal of Agricultural Science
    • /
    • v.45 no.2
    • /
    • pp.265-282
    • /
    • 2018
  • The purpose of this research was to produce symmetric (Saturated-Unsaturated-Saturated, SUS) triacylglycerol (TAG) using palm stearin fraction oil (PSFO) and high oleic sunflower oil (HOSO) as substrates to replace cocoa butter. PSFO was blended with HOSO (1 : 2 weight ratio), and $lipozyme^{(R)}$ TLIM (20 weight % of the substrate) was added. Interesterification was carried out in a shaking water bath at $55^{\circ}C$ at 220 rpm for 6 hours. The response surface methodology (RSM) through the central composite face design was employed to observe the optimized SUS-TAG. The independent factors were the reaction temperature ($X_1$: 65, 75 and $85^{\circ}C$), reaction time ($X_2$: 1, 3 and 5 hours) and ratio of TLIM ($X_3$: 10, 15 and 20 weight %). The dependent variables were $Y_1$ = Saturated-Unsaturated-Unsaturated (SUU, area %), $Y_2=SUS$ (area %), $Y_3$ = Saturated-Saturated-Unsaturated (SSU, area %), $Y_4$ = Unsaturated-Unsaturated-Unsaturated (UUU, area %), and $Y_5=sn-2$ unsaturated fatty acid (area %). The optimal conditions from the central composite face design minimized acyl migration while maximizing the presence of unsaturated fatty acid at the sn-2 position (73.43 area %). The optimal conditions were $X_1=65^{\circ}C$, $X_2=1hour$, and $X_3=20weight%$. As a result of the response surface analysis, the lack of fits was found as $Y_1=0.622$, $Y_2=0.438$, $Y_3=0.264$, $Y_4=0.526$, and $Y_5=0.215$, and their $R^2$ were 0.897, 0.944, 0.826, 0.857, and 0.867, respectively.

A Novel Integrative Expression Vector for Sulfolobus Species

  • Choi, Kyoung-Hwa;Hwang, Sungmin;Yoon, Naeun;Cha, Jaeho
    • Journal of Microbiology and Biotechnology
    • /
    • v.24 no.11
    • /
    • pp.1503-1509
    • /
    • 2014
  • With the purpose of facilitating the process of stable strain generation, a shuttle vector for integration of genes via a double recombination event into two ectopic sites on the Sulfolobus acidocaldarius chromosome was constructed. The novel chromosomal integration and expression vector pINEX contains a pyrE gene from S. solfataricus P2 ($pyrE_{sso}$) as an auxotrophic selection marker, a multiple cloning site with histidine tag, the internal sequences of malE and malG for homologous recombination, and the entire region of pGEM-T vector, except for the multiple cloning region, for propagation in E. coli. For stable expression of the target gene, an ${\alpha}$-glucosidase-producing strain of S. acidocaldarius was generated employing this vector. The malA gene (saci_1160) encoding an ${\alpha}$-glucosidase from S. acidocaldarius fused with the glutamate dehydrogenase ($gdhA_{saci}$) promoter and leader sequence was ligated to pINEX to generate pINEX_malA. Using the "pop-in" and "pop-out" method, the malA gene was inserted into the genome of MR31 and correct insertion was verified by colony PCR and sequencing. This strain was grown in YT medium without uracil and purified by His-tag affinity chromatography. The ${\alpha}$-glucosidase activity was confirmed by the hydrolysis of $pNP{\alpha}G$. The pINEX vector should be applicable in delineating gene functions in this organism.

Design of Worker's Safety Management System by Monitoring Work Location and Sensing Danger Zones (위험구역 접근 센싱 및 작업위치 모니터링을 이용한 작업자 안전관리 시스템 설계)

  • Min, So-Yeon;Lee, Kwang-Hyoung;Park, Jeong-Hyo;Lee, Keun-Wang
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.7
    • /
    • pp.3236-3244
    • /
    • 2011
  • Negligent accidents are often caused by risk factors of working environment at most construction sites and construction schedules are delayed as the workers' work location and construction progress are not figured out accurately, and this leads to a lot of loss. In this paper, with the object of solving the problems at construction sites, RFID portable device, active tag and wireless RFID reader to provide the status of workers which is based on location are designed in order to send information about the location of workers and work progress in real time to a personal RFID device. Also an application system to monitor workers' approaching to prevent accidents from vehicles and danger zones and to manage the real time location of workers is designed.

Model Verification of a Safe Security Authentication Protocol Applicable to RFID System (RFID 시스템에 적용시 안전한 보안인증 프로토콜의 모델검증)

  • Bae, WooSik;Jung, SukYong;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.221-227
    • /
    • 2013
  • RFID is an automatic identification technology that can control a range of information via IC chips and radio communication. Also known as electronic tags, smart tags or electronic labels, RFID technology enables embedding the overall process from production to sales in an ultra-small IC chip and tracking down such information using radio frequencies. Currently, RFID-based application and development is in progress in such fields as health care, national defense, logistics and security. RFID structure consists of a reader that reads tag information, a tag that provides information and the database that manages data. Yet, the wireless section between the reader and the tag is vulnerable to security issues. To sort out the vulnerability, studies on security protocols have been conducted actively. However, due to difficulties in implementation, most suggestions are concerned with theorem proving, which is prone to vulnerability found by other investigators later on, ending up in many troubles with applicability in practice. To experimentally test the security of the protocol proposed here, the formal verification tool, CasperFDR was used. To sum up, the proposed protocol was found to be secure against diverse attacks. That is, the proposed protocol meets the safety standard against new types of attacks and ensures security when applied to real tags in the future.

Field Application of RFID for the Cavity Maintenance of Under Pavement (도로하부 공동의 유지관리를 위한 RFID의 현장 적용성 평가)

  • Park, Jeong Jun;Shin, Eun Chul;Kim, In Dae
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.4
    • /
    • pp.459-468
    • /
    • 2019
  • Purpose: The cavity exploration of the lower part of the road is carried out to prevent ground-sinking. However, the detected communities cannot be identified by the cavity location and history information, such as repackaging the pavement. Therefore, the field applicability of RFID systems was evaluated in this study to enable anyone to accurately identify information. Method: During temporary recovery, tag recognition distance and recognition rate were measured according to underground burial materials and telecommunication tubes using RFID systems with electronic tag chips attached to the bottom of the rubber cap. Result: The perceived distance and perceived rate of depth for each position of the electron tag did not significantly affect the depth up to 15cm, but it did have some effect if the depth was 20cm. In addition, water effects from nearby underground facilities and rainfall are relatively small, and the effects of wind will need to be considered during the weather conditions of the road. Conclusion: The RFID tags for field application of the pavement management system store various information such as location and size of cavity, identification date, cause of occurrence, and surrounding underground facilities to maximize cavity management effect with a system that can be computerized and mobile utilization.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF