• Title/Summary/Keyword: V-World

Search Result 507, Processing Time 0.031 seconds

Comparison of Blood Test Results and Symptoms of Patients with COVID-19 Monoinfection and with COVID-19 and Influenza Virus Co-Infection (COVID-19 단일 감염 환자와 COVID-19 및 인플루엔자 바이러스 동시 감염 환자의 혈액 검사 결과 및 증상 비교)

  • Jung, Bo Kyeung;Ham, Seung Keun;Kim, Jae Kyung
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.54 no.2
    • /
    • pp.103-109
    • /
    • 2022
  • In December 2019, the coronavirus disease 2019 (COVID-19) caused by the virus, severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) emerged in China and spread rapidly around the world, infecting millions of people. Cases of COVID-19 infection were observed to lead to viral pneumonia. Thirty-five patients admitted to the Gyeonggi Medical Center, South Korea, between November 2020 to January 2021, were found to have been infected with the influenza virus A and B, which cause symptoms similar to COVID-19. The records of these patients and those of COVID-19 patients who visited the hospital for medical examination were compared. The study patients included thirty patients with COVID-19 and/or influenza, five of those with influenza alone. A group of 121 patients without infection was used as control. Patients with COVID-19 and influenza had significantly higher lactate dehydrogenase levels than the patients with COVID-19 alone. The erythrocyte sedimentation rate (ESR) was higher in patients with COVID-19 alone than in other groups. Significant clinical outliers were observed in the COVID-19 and influenza infection group compared with the COVID-19 alone group. These results are expected to play an important role in the analysis of the hematological data of infected patients and the comparison of simultaneous and single infection data to determine clinical symptoms and other signs. These results may also assist in the development of vaccines and treatments for COVID-19.

The Role of Innovative Activities in Training Students Using Computer Technologies

  • Minenok, Antonina;Donets, Ihor;Telychko, Tetiana;Hud, Hanna;Smoliak, Pavlo;Kurchatova, Angelika;Kuchai, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.105-112
    • /
    • 2022
  • Innovation is considered as an implemented innovation in education - in the content, methods, techniques and forms of educational activity and personality education (methods, technologies), in the content and forms of organizing the management of the educational system, as well as in the organizational structure of educational institutions, in the means of training and education and in approaches to social services in education, distance and multimedia learning, which significantly increases the quality, efficiency and effectiveness of the educational process. The classification of currently known pedagogical technologies that are most often used in practice is shown. The basis of the innovative activity of a modern teacher is the formation of an innovative program-methodical complex in the discipline. Along with programmatic and content provision of disciplines, the use of informational tools and their didactic properties comes first. It combines technical capabilities - computer and video technology with live communication between the lecturer and the audience. In pedagogical innovation, the principles reflecting specific laws and regularities of the implementation of innovative processes are singled out. All principles are elements of a complex system of organization and management of innovative activities in the field of education and training. They closely interact with each other, which enhances the effect of each of them due to the synergistic effect. To improve innovative activities in the training of students, today computer technologies are widely used in pedagogy as a science, as well as directly in the practice of the pedagogical process. They have gained the most popularity in such activities as distance learning, online learning, assistance in the education management system, development of programs and virtual textbooks in various subjects, searching for information on the network for the educational process, computer testing of students' knowledge, creation of electronic libraries, formation of a unified scientific electronic environment, publication of virtual magazines and newspapers on pedagogical topics, teleconferences, expansion of international cooperation in the field of Internet education. The article considers computer technologies as the main building material for the entire society. In the modern world, there is a need to prepare a person for life in a multimedia environment. This process should be started as early as possible, because the child's contact with the media is present almost from the moment of his birth.

Digital Barrier-Free and Psychosocial Support for Students with Disabilities in Distance Learning Environments

  • Kravchenko, Oksana;Koliada, Natalia;Berezivska, Larysa;Dikhtyarenko, Svitlana;Baida, Svitlana;Danylevych, Larysa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.15-24
    • /
    • 2022
  • The article clarifies the conditions for information, digital and educational accessibility for higher education seekers with disabilities in terms of distance learning caused by quarantine restrictions. It is established that such conditions are regulated by international and Ukrainian legal documents (The Standard Rules on the Equalization of Opportunities for Persons with Disabilities, Convention on the Rights of Persons with Disabilities, Sustainable Development Goals, Law of Ukraine "On Education", Law of Ukraine "On Higher Education", Strategy for the Development of Higher Education in Ukraine 2021-2031, Development Strategy areas of innovation for the period up to 2030, Development strategy of the sphere of innovation activity for the period up to 2030). As a part of information barrierlessness, Higher Education Institutions (HEI) should provide access to information in various formats and using technologies, in particular Braille script, large-type printing, audio description (audio descriptive commenting), sign language interpretation, subtitling, a format suitable for reading by screen access programs, formats of simple speech, easy-to-read formats, means of alternative communication. The experience of Pavlo Tychyna Uman State Pedagogical University is described. In particular, special attention is paid to the study of sign language: in view of this, the initiative group implemented the project "Learning to hear and overcome social isolation together" with the financial support of the British Council in Ukraine. Within the framework of digital accessibility, the official website of the Faculty of Social and Psychological Education has been adapted for the visually impaired in accordance with WCAG 2.0 World Standards. In 2021, Pavlo Tychyna Uman State Pedagogical University implemented the project "Cultural, Recreational and Tourist Cherkasy Region: Inclusive Social 3D Map" funded by the Ukrainian Cultural Foundation; a site with available content for online travel in the region to provide barrier-free access to the historical and cultural heritage of Cherkasy region was created. Educational accessibility is achieved by increasing the number of people with special educational needs, receiving education in inclusive groups; activities of the Center for Social and Educational Integration and Inclusive Rehabilitation Social Tourism "Bez barieriv" ("Without barriers"); implementation of a research topic for financing the Ministry of Education and Science of Ukraine: "Social and psychological rehabilitation of children and youth with special educational needs by means of inclusive tourism"; implementation of the project "Social inclusion of distance educational process"; development of information campaigns to popularize the ideas of accessibility, the need for its implementation, ongoing training programs and competitions, etc.

The Philippines Coconut Genomics Initiatives: Updates and Opportunities for Capacity Building and Genomics Research Collaboration

  • Hayde Flandez-Galvez;Darlon V. Lantican;Anand Noel C. Manohar;Maria Luz J. Sison;Roanne R. Gardoce;Barbara L. Caoili;Alma O. Canama-Salinas;Melvin P. Dancel;Romnick A. Latina;Cris Q. Cortaga;Don Serville R. Reynoso;Michelle S. Guerrero;Susan M. Rivera;Ernesto E. Emmanuel;Cristeta Cueto;Consorcia E. Reano;Ramon L. Rivera;Don Emanuel M. Cardona;Edward Cedrick J. Fernandez ;Robert Patrick M. Cabangbang;Maria Salve C. Vasquez;Jomari C. Domingo;Reina Esther S. Caro;Alissa Carol M. Ibarra;Frenzee Kroeizha L. Pammit;Jen Daine L. Nocum;Angelica Kate G. Gumpal;Jesmar Cagayan;Ronilo M. Bajaro;Joseph P. Lagman;Cynthia R. Gulay;Noe Fernandez-Pozo;Susan R. Strickler;Lukas A. Mueller
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2022.10a
    • /
    • pp.30-30
    • /
    • 2022
  • Philippines is the second world supplier of coconut by-products. As its first major genomics project, the Philippine Genome Center program for Agriculture (PGC-Agriculture) took the challenge to sequence and assemble the whole coconut genome. The project aims to provide advance genetics tools for our collaborating coconut researchers while taking the opportunity to initiate local capacity. Combination of different NGS platforms was explored and the Philippine 'Catigan Green Dwarf' (CATD) variety was selected with the breeders to be the crop's reference genome. A high quality genome assembly of CATD was generated and used to characterize important genes of coconut towards the development of resilient and outstanding varieties especially for added high-value traits. The talk will present the significant results of the project as published in various papers including the first report of whole genome sequence of a dwarf coconut variety. Updates will include the challenges hurdled and specific applications such as gene mining for host insect resistance and screening for least damaged coconuts (thus potentially insect resistant varieties). Genome-wide DNA markers as published and genes related to coconut oil qualitative/quantitative traits will also be presented, including initial molecular/biochemical studies that support nutritional and medicinal claims. A web-based genome database is currently built for ease access and wider utility of these genomics tools. Indeed, a major milestone accomplished by the coconut genomics research team, which was facilitated with the all-out government support and strong collaboration among multidisciplinary experts and partnership with advance research institutes.

  • PDF

Truth of Mahāyāna Thought -The Controversy Between The Madhyamaka and The Yogācāra on Sunya and The two truth theories of Nāgārjuna (대승불교의 진리관 -용수(龍樹)의 공(空)과 이체설(二諦說)에 대한 중관학파(中觀學派)와 유지학파(唯識學派)의 논쟁을 중심으로)

  • Yun, Jong-gab
    • Journal of Korean Philosophical Society
    • /
    • v.116
    • /
    • pp.225-256
    • /
    • 2010
  • The two school $M{\bar{a}}dhyamika$ and $Yog{\bar{a}}c{\bar{a}}ra$ act as a representative of $Mah{\bar{a}}y{\bar{a}}na$ Buddhism in India. But the two school disputed with each other insisting ${\acute{s}}{\bar{u}}nyat{\bar{a}}-v{\bar{a}}da$ and $vij{\tilde{n}}aptim{\bar{a}}trav{\bar{a}}da$ separately. To introduce the disputation shortly is as follow. $N{\bar{a}}g{\bar{a}}rjuna$ explained the world and truth by two truth theories(二諦說) which carry out truth of a word and the dimension(spiritual enlightenment) which is absolute(ultimate) to it being lokasaṁvṛtisatya(世俗諦) about the truth which can be expressed verbally, and which is phenomenon-like (everyday) at paramaarthasatya(勝義諦). By the way, lokasaṁvṛtisatya and paramaarthasatya are actually distinction of the recognition which is not an ontological distinction. That is, lokasaṁvṛti(世俗) is paramaartha(勝義) as it is the time of seeing by the eyes of those who have realized. The two truth theories of $N{\bar{a}}g{\bar{a}}rjuna$ was developed logical more precisely by his successors. With an everyday language, the position of Candrakīrti(月稱) that it cannot be expressed as the position of $Bh{\bar{a}}vaviveka$(淸辨) that paramaarthasatya can be expressed logically is opposed to each other, and dissociates by $Sv{\bar{a}}tantrika$(自立論證派) and $P{\bar{a}}rsagika$(歸謬論證派). Confrontation of $Sv{\bar{a}}tantrika$ and $P{\bar{a}}rsagika$ is the dispute about the ability of s which is the highest truth to be proved logically. The $P{\bar{a}}rsaga$ of Candrakirti thinks that people exist truly, and is because it claims not existing in the world where a favorite thing is actually actual. However, $Bh{\bar{a}}vaviveka$ proved Sunyata(空性)을 positively based on the reliance to language and logic. Also the mokṣa of $M{\bar{a}}dhyamika$ is not recovery of original condition of $vij{\tilde{n}}apti$ which is pure in itself as $Yog{\bar{a}}c{\bar{a}}ra$ saying, as well as obtaining a thing which is dravya-sat as $Sarv{\bar{a}}stiv{\bar{a}}din$ saying. The mokṣa of $M{\bar{a}}dhyamika$ means a condition of liberated from karma and pains through extinction of $prapa{\tilde{n}}ca$ and discrimination by realizing the real aspect of all dharma which is said by pratītyasamutpāda, $praj{\tilde{n}}apti$, niḥsvabhāva, ${\acute{s}}{\bar{u}}nya$, $madhyam{\bar{a}}pratipad$.

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

Recent Trends in Compensation for Mental Anguish of Airline Passengers (항공여객의 정신적 손해배상에 관한 최근 동향 - 미국 연방법원 판례를 중심으로 -)

  • Lee, Chang-Jae
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.35 no.1
    • /
    • pp.33-62
    • /
    • 2020
  • The current air transportation industry is facing a lot of changes not only in the quantitative growth of the market, but also in the legal aspects. For many years, the Warsaw Convention has contributed to the uniform discipline of civil carriers' legal liabilities arising from international aviation accident and has fulfilled the duties of legal guardians for the development of the air transport industry. In the process, however, the consumer interests of the air transport industry did not have much protection compared to other industries. In response, the Montreal Convention has effected for protecting the interests of aviation consumers, and there are numerous legal changes around the world to protect aviation consumers like passengers. The mental damages of airline passengers arising from the accident can also be understood as part of the protection of air consumers. Considering that the US Federal Court has dealt with the recognition of mental damages for air passengers since the early 1990s. However, Korean judicial precedent still excludes mental anguishes from the scope of damage compensation. From this point of view, it is considered academically meaningful to analyze the latest case of the US federal court. Recently, the United States Court of Appeal for the Sixth Circuit in Doe v Etihad Airways applied a different interpretation against the traditional opinion: passengers could not recover for mental distress unless that mental distress resulted from a bodily injury sustained in an airplane accident. The background of the court's conclusions can be explained in many ways, among other things, unlike the Warsaw Convention the new international rule, Montreal Convention is recognizing the importance of ensuring protection of the interests of consumers in international carriage by air and the need for equitable compensation based on the principle of restitution.

Constitution of Formal and Informal Meals Consisting of Traditional Local Foods in Busan, Korea (부산지역 전통향토음식을 이용한 정식 및 별미식 식단 구성)

  • Kim, Hyeonsuk;Woo, Minji;Kim, Hyunju;Song, Yeong Ok
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.41 no.10
    • /
    • pp.1467-1474
    • /
    • 2012
  • The purpose of study was to introduce menus consisting of traditional local foods consumed in Busan, Korea. Five different types of formal meal menus with three side dishes and five different types of informal meal menus of which the main dish was not cooked rice were developed. Scores for the menu evaluations of formal and informal meals were higher than 7.9 (mean score of 6 category) on a 9.0 scale, suggesting that the menus were well constituted in terms of 'repeated use of ingredients and cooking methods', 'balance between main and side dishes', 'frequency of usage of local products', 'nutritional balance', 'variety of dishes', and 'popularization'. Nutritional values of menus were compared with those of the KDRI for men aged 30~49 years old. All ten menus reflected a low calorie, high protein, and high fiber diet. Mineral contents (Ca, Fe, Zn, K, and Na) of the above 10 menus were higher than those of the KDRI. On the other hand, vitamin contents slightly differed according to meal type due to limited fresh vegetable usage in the winter season. Vitamin A, B ($B_1$, $B_2$, niacin, $B_6$), C, folic acid, and E contents in the five informal menus were found to be proper or greater than those of the KDRI. However, for the formal meal menus, all vitamin contents except that of vitamin A in menu type I was lower than that of the KDRI. Content of vitamin C in menu type V was approximately 50% of that of the KDRI. The most preferred formal menu was consisted of Ogokbap, Boreumjijimi, Dongchimi, Namul (nine varieties), Gaksaeksanjeok (Shark/Daegu/Gunso), and Gimgui. And that for informal menu was consisted of Honghapjuk, Baechu kimchi, Dongchimi, Miyeokseolchi, Kodari jorim, and Neulgeun hobakjeon. Suggestions for providing more fresh vegetables or fruits for certain types of meals (formal meal type V) were offered. Additionally, pre-preparation of sea products were required to reduce Na contents.

An Integrated Model based on Genetic Algorithms for Implementing Cost-Effective Intelligent Intrusion Detection Systems (비용효율적 지능형 침입탐지시스템 구현을 위한 유전자 알고리즘 기반 통합 모형)

  • Lee, Hyeon-Uk;Kim, Ji-Hun;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2012
  • These days, the malicious attacks and hacks on the networked systems are dramatically increasing, and the patterns of them are changing rapidly. Consequently, it becomes more important to appropriately handle these malicious attacks and hacks, and there exist sufficient interests and demand in effective network security systems just like intrusion detection systems. Intrusion detection systems are the network security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. Conventional intrusion detection systems have generally been designed using the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. However, they cannot handle new or unknown patterns of the network attacks, although they perform very well under the normal situation. As a result, recent studies on intrusion detection systems use artificial intelligence techniques, which can proactively respond to the unknown threats. For a long time, researchers have adopted and tested various kinds of artificial intelligence techniques such as artificial neural networks, decision trees, and support vector machines to detect intrusions on the network. However, most of them have just applied these techniques singularly, even though combining the techniques may lead to better detection. With this reason, we propose a new integrated model for intrusion detection. Our model is designed to combine prediction results of four different binary classification models-logistic regression (LOGIT), decision trees (DT), artificial neural networks (ANN), and support vector machines (SVM), which may be complementary to each other. As a tool for finding optimal combining weights, genetic algorithms (GA) are used. Our proposed model is designed to be built in two steps. At the first step, the optimal integration model whose prediction error (i.e. erroneous classification rate) is the least is generated. After that, in the second step, it explores the optimal classification threshold for determining intrusions, which minimizes the total misclassification cost. To calculate the total misclassification cost of intrusion detection system, we need to understand its asymmetric error cost scheme. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, total misclassification cost is more affected by FNE rather than FPE. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 10,000 samples from them by using random sampling method. Also, we compared the results from our model with the results from single techniques to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell R4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on GA outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that the proposed model outperformed all the other comparative models in the total misclassification cost perspective. Consequently, it is expected that our study may contribute to build cost-effective intelligent intrusion detection systems.

Indian Culture Code and Glocal Cultural Contents (인도의 문화코드와 글로컬문화콘텐츠)

  • Kim, Yunhui;Park, Tchi-Wan
    • Journal of International Area Studies (JIAS)
    • /
    • v.14 no.4
    • /
    • pp.79-106
    • /
    • 2011
  • The cultural contents industries have moved closer to the centre of the economic action in many countries and across much of the world. For this reason, the concern with the development of glocal cultural contents has also been growing. According to Goldman Sock's BRICs report, Indian economy will be the engine of global economy with China. In addition, India will be a new blue chip country for large consumer market of cultual contents. The most important point for the development of glocal cultural contents is a systematic and in-depth analysis of other culture. India is a complex and multicultural country compared with Korea which is a nation-state. Therefore, this paper is intended as an understanding about India appropriately and suggestion for a strategy to enter cultural industry in India. As the purpose of this paper is concerned, we will take a close look at 9 Indian culture codes which can be classified into three main groups: 1) political, social and cultural codes 2) economic codes 3) cultural contents codes. Firstly, political, social and cultural codes are i) consistent democracy and saving common people, ii) authoritarianism which appears an innate respect for authority of India, iii) Collective-individualism which represents collectivist and individualistic tendency, iv) life-religion, v) carpe diem. Secondly, economic culture codes are vi) 1.2billion Indian people's God which represents money and vii) practical purchase which stands for a reasonable choice of buying products. Lastly, viii) Masala movie and ix) happy ending that is the most popular theme of Masala movies are explained in the context of cultural content codes. In conclusion, 3 interesting cases , , will be examined in detail. From what has been discussed above, we suggest oversea expansion strategy based on these case studies. Eventually, what is important is to understand what Indian society is, how Indian society works and what contents Indian prefers.