• Title/Summary/Keyword: University System

Search Result 130,097, Processing Time 0.158 seconds

Current Research Trend of Postharvest Technology for Chrysanthemum (국화 수확 후 관리기술의 최근 연구 동향)

  • Kim, Su-Jeong;Lee, Seung-Koo;Kim, Ki-Sun
    • Korean Journal of Plant Resources
    • /
    • v.25 no.1
    • /
    • pp.156-168
    • /
    • 2012
  • Chrysanthemum is a cut flower species that normally lasts for 1 to 2 weeks, in some cases 3-4 weeks. This has been attributed to low ethylene production during senescence. Reduction in cut flower quality has been attributed to the formation of air embolisms that partially or completely blocks the water transport from the vase solution to the rest of the cut flower stem, increasing hydraulic resistance which may cause severe water stress, yellowing, wilting of leaf, and chlorophyll degradation. Standard type chrysanthemum can be harvested when buds were still tightly closed and then fully opened with the simple bud-opening solution. Standard type chrysanthemum can also be harvested when the minimum size of the inflorescence is about 5-6 cm bud which opened into the first flower full-sized flower. While spray varieties can be harvested when 2-4 most mature flowers have opened (40% opening). Cut flowers are sorted by stem length, weight, condition, and so on. Standard chrysanthemum is 80 cm length for standard type and 70cm for spray type. Pre-treatment with a STS, plant regulator such as GA, BA, 1-MCP, chrysal, germicide, and sucrose, significantly improved the vase life and quality of cut flowers. It is well established that vase solutions containing sugar can improve the vase life of cut chrysanthemum. Chrysanthemum is normally packed in standard horizontal fiberboard boxes. Chrysanthemum should normally be stored at $5{\sim}7^{\circ}C$. Precooling resulted in reduction in respiration, decomposition, and transpiration activities as well as decoloration retardation. There was significant difference between "wet" storage in 3 weeks and "dry" storage in 2 weeks. In separate pulsing solution trials, various germicides were tested, as well as PGRs to maintain the green color of leaves and turgidity. Prolonging vase life was attained with the application of optimal solution such as HQS, $AgNO_3$, GA, BA and sucrose. This also retarded senescence in leaves of cut flower stems. Fresh cut chrysanthemum can be transported using a refrigerated van with $5{\sim}7^{\circ}C$. Increasing consumption and usage of cut chrysanthemum of various cultivars would require efficient transport system, and effective information exchange among producer, wholesaler, and consumer.

Studies on the Enzyme from Arthrobacter luteus Accelerating the Lysis of Yeast Cell Walls - I. Effects of Various Factors on the Lysis of Yeast Cell Walls by the Preparation of Crude Zymolyase (Arthrobacter luteus가 생산(生産)하는 효모(酵母) 세포벽(細胞壁) 용해(溶解) 촉진(促進) 효소(酵素)에 관(關)한 연구(硏究) - 제(第) 1 보(報) : Zymolyase 조(粗) 효소(酵素)에 의한 효모(酵母) 세포벽(細胞壁) 용해(溶解)에 미치는 제(諸) 인자(因子)의 영향(影響) -)

  • Oh, Hong-Rock;Shimoda, Tadahisa;Funatsu, Masaru
    • Korean Journal of Food Science and Technology
    • /
    • v.11 no.4
    • /
    • pp.242-248
    • /
    • 1979
  • To detect proper lytic assay conditions of the crude zumolyase from Arthrobacter luteus, effets of the various factors involved in the lytic system of Sacchromyces sake cultured with shaking in the malt extracts medium were investigated. The results are summarized as follows : 1. The susceptibilities of viable cells of S. sake from logarithmic growth phase to the lytic enzmye were much greater than those of the cells in lag and stationary phases. The cells cultured for 18 hr were the most susceptible to the enzyme. 2. Lytic activity of the enzyme toward the viable cells of S. sake was very low. It was, however, enhanced 4 folds of more by the pretreatment of the cells with 0.05 M sodium sulfite. 3. Lytic activity of the enzyme toward commercial baker's yeast cells was negligible, and the effect of sodium sulfite on the lysis of the cells also was nothing but a little. 4. The lyophilized cells of the baker's yeast showed more susceptibility to the lytic enzyme than viable cells of the yeast. No definite effect of sodium sulfite on the lysis of the lyophilized cells, however, was observed either baker's yeast of S. sake. 5. It appeared that the relationship between the reaction rate and the enzyme concentration on the lysis of the yeast cell walls followed enzyme kinetic theory, but one between the reaction rate and concentration of the yeast cells as substrates showed different pattern from that in enzyme kinetic theory. 6. After the preparation of crude zymolyase was kept at $7^[\circ}C$ for 10 days in the 0.05 M phosphate buffer, pH 7.5, the remainning lytic activity was about 80 %.

  • PDF

Method Validation and Quantification of Lutein and Zeaxanthin from Green Leafy Vegetables using the UPLC System (UPLC를 이용한 lutein과 zeaxanthin의 분석법 검증 및 엽채류에서의 정량적 평가)

  • Kim, Suna;Kim, Ji-Sun
    • Korean Journal of Food Science and Technology
    • /
    • v.44 no.6
    • /
    • pp.686-691
    • /
    • 2012
  • The objective of this research is to present method development and validation for the simultaneous determination of lutein and zeaxanthin using ultra performance liquid chromatography (UPLC). Also, rapid quantification was performed on six green leafy vegetables (Allium tuberosum, Aster scaber, Hemerocallis fulva, Pimpinella brachycarpa, Sedum sarmentosum and Spinacia oleracea) that are commonly consumed in Korea. Separation and quantification were successfully achieved with a Waters Acquity BEH C18 ($50{\times}2.1mm$, $1.7{\mu}m$) column by 85% methanol within 5 min. Two compounds showed good linearity ($r^2$ > 0.9968) in $1-150{\mu}g/mL$. Limit of detection (LOD) and quantification (LOQ) for lutein and zeaxanthin were 1.7 and 5.1 g/mL and 2.1 and 6.3 g/mL, respectively. The RSD for intra- and inter-day precision of each compound was less than 10.69%. The recovery of each compound was in the range of 91.75-105.13%. Aster scaber and Spinacia oleracea contained significantly higher amounts of lutein ($4.06{\pm}0.24$ and $3.97{\pm}0.10mg$/100 g of fresh weight), respectively.

Activation of Pro-Apoptotic Multidomain Bcl-2 Family Member Bak and Mitochondria-Dependent Caspase Cascade are Involved in p-Coumaric Acid-Induced Apoptosis in Human Jurkat T Cells (p-Coumaric acid에 의해 유도되는 인체 Jurkat T 세포의 에폽토시스 기전)

  • Lee, Je-Won;Kim, Young-Ho
    • Journal of Life Science
    • /
    • v.21 no.12
    • /
    • pp.1678-1688
    • /
    • 2011
  • The apoptogenic effect of p-coumaric acid, a phenolic acid found in various edible plants, on human acute leukemia Jurkat T cells was investigated. Exposure of Jurkat T cells to p-coumaric acid (50-$150{\mu}M$) caused cytotoxicity and TdT-mediated dUTP nick-end labeling (TUNEL)-positive apoptotic DNA fragmentation along with Bak activation, ${\Delta}{\psi}m$ loss, activation of caspase-9, -3, -7, and -8, and PARP degradation in a dose-dependent manner. However,these apoptotic events were completely abrogated in Jurkat T cells overexpressing Bcl-2.Under these conditions, necrosis was not accompanied. Pretreatment of the cells with the pan-caspase inhibitor (z-VAD-fmk) could prevent p-coumaric acid-induced sub-$G_1$ peak representing apoptotic cells, whereas it failed to block ${\Delta}{\psi}m$ loss, indicating that the activation of caspase cascade was prerequisite for p-coumaric acid-induced apoptosis as a downstream event of ${\Delta}{\psi}m$ loss. FADD- and caspase-8-positive wild-type Jurkat T cell clone A3, FADD-deficient Jurkat T cell clone I2.1, and caspase-8-deficient Jurkat T cell clone I9.2 exhibited similar susceptibilities to the cytotoxicity of p-coumaric acid, excluding an involvement of Fas/FasL system in triggering the apoptosis. The apoptogenic activity of p-coumaric acid is more potent in malignant Jurkat T cells than in normal human peripheral T cells. Together, these results demonstrated that p-coumaric acid-induced apoptogenic activity in Jurkat T cellswas mediated by Bak activation, ${\Delta}{\psi}m$ loss, and subsequent activation of multiple caspases such as caspase-9, -3, -7, and-8, and PARP degradation, which could be regulated by anti-apoptotic protein Bcl-2.

Polymorphisms and Allele Distribution of Novel Indel Markers in Jeju Black Cattle, Hanwoo and Imported Cattle Breeds (제주흑우, 한우 및 수입 소 품종에서 새로운 indel 마커의 다형성과 대립인자 분포)

  • Han, Sang-Hyun;Kim, Jae-Hwan;Cho, In-Cheol;Cho, Sang-Rae;Cho, Won-Mo;Kim, Sang-Geum;Kim, Yoo-Kyung;Kang, Yong-Jun;Park, Yong-Sang;Kim, Young-Hoon;Park, Se-Phil;Kim, Eun-Young;Lee, Sung-Soo;Ko, Moon-Suck
    • Journal of Life Science
    • /
    • v.22 no.12
    • /
    • pp.1644-1650
    • /
    • 2012
  • The aim of this study was to screen the polymorphisms and distribution of each genotype of insertion/ deletion (indel) markers which were found in a preliminary comparative study of bovine genomic sequence databases. Comparative bioinformatic analyses were first performed between the nucleotide sequences of Bovine Genome Project and those of expressed sequence tag (EST) database, and a total of fifty-one species of indel markers were screened. Of these, forty-two indel markers were evaluated, and nine informative indel markers were ultimately selected for population analysis. Nucleotide sequences of each marker were re-sequenced and their polymorphic patterns were typed in six cattle breeds: Holstein, Angus, Charolais, Hereford, and two Korean native cattle breeds (Hanwoo and Jeju Black cattle). Cattle breeds tested in this study showed polymorphic patterns in eight indel markers but not in the Indel-15 marker in Charolais and Holstein. The results of analysis for Jeju Black cattle (JBC) population indicated an observed heterozygosity (Ho) that was highest in HW_G1 (0.600) and the lowest in Indel_29 (0.274). The PIC value was the highest in HW_G4 (0.373) and lowest in Indel_6 (0.305). These polymorphic indel markers will be useful in supplying genetic information for parentage tests and traceability and to develop a molecular breeding system for improvement of animal production in cattle breeds as well as in the JBC population.

Recycling of Acidic Etching Waste Solution Containing Heavy Metals by Nanofiltration (I): Evaluation of Acid Stability of Commercial Nanofiltration Membranes (나노여과에 의한 중금속 함유 산성 폐에칭액의 재생(I): 상용 나노여과 막의 산 안정성 평가)

  • Youm, Kyung-Ho;Shin, Hwa-Sup;Jin, Cheon-Deok
    • Membrane Journal
    • /
    • v.19 no.4
    • /
    • pp.317-323
    • /
    • 2009
  • In this study the nanofiltration (NF) membrane treatment of a nitric acid waste solutions containing $Pb^{+2}$ heavy metal ion discharging from the etching processes of an electronics and semiconductors industry has been studied for the purpose of recycling of nitric acid etching solutions. Three kinds of NF membranes (General Electric Co. Duraslick NF-4040 membrane, Dow Co. Filmtec LP-4040 membrane and Koch Co. SelRO MPS-34 4040 membrane) were tested for their separation efficiency (total rejection) of $Pb^{+2}$ ion and membrane stability in nitric acid solution. NF experiments were carried out with a dead-end membrane filtration laboratory system. The membrane permeate flux was increased with the increasing storage time in nitric acid solution and lowering pH of acid solution because of the enhancing of NF membrane damage by nitric acid. The membrane stability in nitric acid solution was more superior in the order of Filmtec LP-4040 < Duraslick NF-4040 < SelRO MPS-34 4040 membrane. The total rejection of Pb+2 ion was decreased with the increasing storage time in nitric acid solution and lowering the pH of acid solution. The total rejection of $Pb^{+2}$ ion after 4 months NF treatment was decreased from 95% initial value to 20% in the case of Duraslick NF-4040 membrane, from 85% initial value to 65% in the case of SelRO MPS-34 4040 membrane and from 90% initial value to 10% in the case of Filmtec LP-4040 membrane. These results showed that SelRO MPS-34 4040 NF membrane was more suitable for the treatment of an acidic etching waste solutions containing heavy metal ions.

The Operation of Home Economics Education Course in Graduate School of Education and the Graduate Students' Perception (서울소재 교육대학원 가정교육전공 교육과정에 대한 운영실태와 교육대학원생의 인식)

  • Lee, Seon-Jung;Shin, Hye-Won
    • Journal of Korean Home Economics Education Association
    • /
    • v.20 no.4
    • /
    • pp.173-186
    • /
    • 2008
  • This study aimed to examine the operation of the Home Economics education courses in the graduate schools of education, and to find out how graduate students perceive them. Data were collected with the use of handbooks issued by 11 graduate schools of education located in Seoul, and through telephone conversations with the administrative staff. To determine how graduate students majoring in Home Economics perceive their Home Economics courses, a survey was conducted among the graduate students in 10 graduate schools of education, and a total of 131 accomplished questionnaires were used for data analysis. The results of the study are as follows. First, all 11 graduate schools aimed to retrain their teachers, enhance their professionalism, and produce home economics education experts. The Home Economics Education courses come in two strands; a teacher's course and a major course. Most of the schools require a total of 30 credits. All Schools lack professors. Only 3 graduate schools have a home Economics Department in the College of Education. All graduate schools are offering a teacher's course based on a teacher's certification system. In a major course, Home Economics education has the largest number of subjects, with Clothing and Textiles and Food and Nutrition being given greater emphasis, and Consumer Economics, Home Economics Management, Child Care, and Family and Housing Studies being given less emphasis. Second, they mostly regard the graduate school of education as producer of experts, followed by producers of teachers and teacher re-trainers. Those who were majoring in Home Economics Education in college, and the teachers, are more interested in teacher re-training, while the non-teachers and those who were not majoring in Home Economics Education are more interested in producing teachers. They are less satisfied with the operation of the graduate school of education. But they are generally satisfied with the Home Economics Education course. Graduate students registered the lowest satisfaction with a major course, especially experimental subjects. For a teacher's course, the graduate students who are not teachers exhibited higher satisfaction, whereas the teachers showed lower satisfaction. But teachers registered more satisfaction with the practical use of major subjects in the educational field, thinking that their major was a big help in their work at a school. As for what has to be improved with regard to the Home Economics Education course, many cited the necessity of securing a good faculty and expanding the major subjects.

  • PDF

The Effect of Patent Citation Relationship on Business Performance : A Social Network Analysis Perspective (특허 인용 관계가 기업 성과에 미치는 영향 : 소셜네트워크분석 관점)

  • Park, Jun Hyung;Kwahk, Kee-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.127-139
    • /
    • 2013
  • With an advent of recent knowledge-based society, the interest in intellectual property has increased. Firms have tired to result in productive outcomes through continuous innovative activity. Especially, ICT firms which lead high-tech industry have tried to manage intellectual property more systematically. Firm's interest in the patent has increased in order to manage the innovative activity and Knowledge property. The patent involves not only simple information but also important values as information of technology, management and right. Moreover, as the patent has the detailed contents regarding technology development activity, it is regarded as valuable data. The patent which reflects technology spread and research outcomes and business performances are closely interrelated as the patent is considered as a significant the level of firm's innovation. As the patent information which represents companies' intellectual capital is accumulated continuously, it has become possible to do quantitative analysis. The advantages of patent in the related industry information and it's standardize information can be easily obtained. Through the patent, the flow of knowledge can be determined. The patent information can analyze in various levels from patent to nation. The patent information is used to analyze technical status and the effects on performance. The patent which has a high frequency of citation refers to having high technological values. Analyzing the patent information contains both citation index analysis using the number of citation and network analysis using citation relationship. Network analysis can provide the information on the flows of knowledge and technological changes, and it can show future research direction. Studies using the patent citation analysis vary academically and practically. For the citation index research, studies to analyze influential big patent has been conducted, and for the network analysis research, studies to find out the flows of technology in a certain industry has been conducted. Social network analysis is applied not only in the sociology, but also in a field of management consulting and company's knowledge management. Research of how the company's network position has an impact on business performances has been conducted from various aspects in a field of network analysis. Social network analysis can be based on the visual forms. Network indicators are available through the quantitative analysis. Social network analysis is used when analyzing outcomes in terms of the position of network. Social network analysis focuses largely on centrality and structural holes. Centrality indicates that actors having central positions among other actors have an advantage to exert stronger influence for exchange relationship. Degree centrality, betweenness centrality and closeness centrality are used for centrality analysis. Structural holes refer to an empty place in social structure and are defined as efficiency and constraints. This study stresses and analyzes firms' network in terms of the patent and how network characteristics have an influence on business performances. For the purpose of doing this, seventy-four ICT companies listed in S&P500 are chosen for the sample. UCINET6 is used to analyze the network structural characteristics such as outdegree centrality, betweenness centrality and efficiency. Then, regression analysis test is conducted to find out how these network characteristics are related to business performance. It is found that each network index has significant impacts on net income, i.e. business performance. However, it is found that efficiency is negatively associated with business performance. As the efficiency increases, net income decreases and it has a negative impact on business performances. Furthermore, it is shown that betweenness centrality solely has statistically significance for the multiple regression analysis with three network indexes. The patent citation network analysis shows the flows of knowledge between firms, and it can be expected to contribute to company's management strategies by analyzing company's network structural positions.

The Effect of the Context Awareness Value on the Smartphone Adopter' Advertising Attitude (스마트폰광고 이용자의 광고태도에 영향을 미치는 상황인지가치에 관한 연구)

  • Yang, Chang-Gyu;Lee, Eui-Bang;Huang, Yunchu
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.73-91
    • /
    • 2013
  • Advertising market has been facing new challenges due to dramatic change in advertising channels and the advent of innovative media such as mobile devices. Recent research related to mobile devices is mainly focused on the fact that mobile devices could identify users'physical location in real-time, and this sheds light on how location-based technology is utilized to achieve competitive advantage in advertising market. With the introduction of smartphone, the functionality of smartphone has become much more diverse and context awareness is one of the areas that require further study. This work analyses the influence of context awareness value resulted from the transformation of advertising channel in mobile communication market, and our research result reflects recent trend in advertising market environment which is not considered in previous studies. Many constructs has intensively been studied in the context of advertising channel in traditional marketing environment, and entertainment, irritation and information are considered to be the most widely accepted variables that has positive relationship with advertising value. Also, in smartphone advertisement, four main dimensions of context awareness value are recognized: identification, activity, timing and location. In this study, we assume that these four constructs has positive relationship with context awareness value. Finally, we propose that advertising value and context awareness value positively influence smartphone advertising attitude. Partial Least Squares (PLS) structural model is used in our theoretical research model to test proposed hypotheses. A well designed survey is conducted for college students in Korea, and reliability, convergent validity and discriminant validity of constructs and measurement indicators are carefully evaluated and the results show that reliability and validity are confirmed according to predefined statistical criteria. Goodness-of-fit of our research model is also supported. In summary, the results collectively suggest good measurement properties for the proposed research model. The research outcomes are as follows. First, information has positive impact on advertising value while entertainment and irritation have no significant impact. Information, entertainment and irritation together account for 38.8% of advertising value. Second, along with the change in advertising market due to the advent of smartphone, activity, timing and location have positive impact on context awareness value while identification has no significant impact. In addition, identification, activity, location and time together account for 46.3% of context awareness value. Third, advertising value and context awareness value both positively influence smartphone advertising attitude, and these two constructs explain 31.7% of the variability of smartphone advertising attitude. The theoretical implication of our research is as follows. First, the influence of entertainment and irritation is reduced which are known to be crucial factors according to previous studies related to advertising value, while the influence of information is increased. It indicates that smartphone users are not likely interested in entertaining effect of smartphone advertisement, and are insensitive to the inconvenience due to smartphone advertisement. Second, in today' ubiquitous computing environment, it is effective to provide differentiated advertising service by utilizing smartphone users'context awareness values such as identification, activity, timing and location in order to achieve competitive business advantage in advertising market. For practical implications, enterprises should provide valuable and useful information that might attract smartphone users by adopting differentiation strategy as smartphone users are sensitive to the information provided via smartphone. Also enterprises not only provide useful information but also recognize and utilize smarphone users' unique characteristics and behaviors by increasing context awareness values. In summary, our result implies that smartphone advertisement should be optimized by considering the needed information of smartphone users in order to maximize advertisement effect.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.