• Title/Summary/Keyword: VE Process

Search Result 185, Processing Time 0.027 seconds

The Effect of Anger Expression Style and Stress on Heart Rate Variablity (분노표현 양식과 스트레스 노출이 심박변이도에 미치는 영향)

  • Kim, Hyun-Do;Lim, Myung-Ho;Kim, Hyun-Woo;Lee, Seok-Bum;Lee, Kyung-Kyu;Kim, Hyun-Joo;Rho, Sang-Cheol;Paik, Ki-Chung
    • Anxiety and mood
    • /
    • v.5 no.1
    • /
    • pp.21-28
    • /
    • 2009
  • Objective : Using patterns of change in heart rate variability (HRV), we investigated the effects of stress exposure and type of anger expression on cardiovascular diseases. Methods : Eighty-nine medical students were evaluated by STAXI-K, BDI, BAI, and measured HRV. According to the scores of anger expression questions in STAXI-K, objects are comparted to three groups. Each group is compared with others on the levels of depression, anxiety and HRV. Additionally objects are divided into two groups of functional anger expression group and dysfunctional anger expression group, and each group also divided into two groups, depending on the exposure of stressful situation or not. Members who took part in the stress exposure groups, they've got a serial arithmetic process for five minutes. We surveyed patterns of HRV in 4 each groups and estimated interactions between existence of stressful situation or type of anger expression and HRV. Results : Irrespective of stress manipulation, the dysfunctional anger expression group showed a marked increase in the LF/HF ratio in comparison to the functional anger expression group. Also, under conditions of stress manipulation, the stress exposure group exhibited a relatively increased level of TP. It can't be discriminated any correlations between stress manipulation and type of anger expression. Conclusion : Both of them, exposure to the stressful situation and type of anger expression, have influence on cardiovascular diseases. By controlling anger and way of express that, it is possible to diminish the incidence of cardiovascular diseases.

  • PDF

The Implementable Functions of the CoreNet of a Multi-Valued Single Neuron Network (단층 코어넷 다단입력 인공신경망회로의 함수에 관한 구현가능 연구)

  • Park, Jong Joon
    • Journal of IKEEE
    • /
    • v.18 no.4
    • /
    • pp.593-602
    • /
    • 2014
  • One of the purposes of an artificial neural netowrk(ANNet) is to implement the largest number of functions as possible with the smallest number of nodes and layers. This paper presents a CoreNet which has a multi-leveled input value and a multi-leveled output value with a 2-layered ANNet, which is the basic structure of an ANNet. I have suggested an equation for calculating the capacity of the CoreNet, which has a p-leveled input and a q-leveled output, as $a_{p,q}={\frac{1}{2}}p(p-1)q^2-{\frac{1}{2}}(p-2)(3p-1)q+(p-1)(p-2)$. I've applied this CoreNet into the simulation model 1(5)-1(6), which has 5 levels of an input and 6 levels of an output with no hidden layers. The simulation result of this model gives, the maximum 219 convergences for the number of implementable functions using the cot(${\sqrt{x}}$) input leveling method. I have also shown that, the 27 functions are implementable by the calculation of weight values(w, ${\theta}$) with the multi-threshold lines in the weight space, which are diverged in the simulation results. Therefore the 246 functions are implementable in the 1(5)-1(6) model, and this coincides with the value from the above eqution $a_{5,6}(=246)$. I also show the implementable function numbering method in the weight space.

Tumor-Derived Transforming Growth Factor-β is Critical for Tumor Progression and Evasion from Immune Surveillance

  • Li, Zheng;Zhang, Li-Juan;Zhang, Hong-Ru;Tian, Gao-Fei;Tian, Jun;Mao, Xiao-Li;Jia, Zheng-Hu;Meng, Zi-Yu;Zhao, Li-Qing;Yin, Zhi-Nan;Wu, Zhen-Zhou
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.13
    • /
    • pp.5181-5186
    • /
    • 2014
  • Tumors have evolved numerous mechanisms by which they can escape from immune surveillance. One of these is to produce immunosuppressive cytokines. Transforming growth factor-${\beta}$(TGF-${\beta}$) is a pleiotropic cytokine with a crucial function in mediating immune suppression, especially in the tumor microenvironment. TGF-${\beta}$ produced by T cells has been demonstrated as an important factor for suppressing antitumor immune responses, but the role of tumor-derived TGF-${\beta}$ in this process is poorly understood. In this study, we demonstrated that knockdown of tumor-derived TGF-${\beta}$ using shRNA resulted in dramatically reduced tumor size, slowing tumor formation, prolonging survival rate of tumor-bearing mice and inhibiting metastasis. We revealed possible underlying mechanisms as reducing the number of myeloid-derived suppressor cells (MDSC) and $CD4^+Foxp3^+$ Treg cells, and consequently enhanced IFN-${\gamma}$ production by CTLs. Knockdown of tumor-derived TGF-${\beta}$ also significantly reduced the conversion of na$\ddot{i}$ve $CD4^+$ T cells into Treg cells in vitro. Finally, we found that knockdown of TGF-${\beta}$ suppressed cell migration, but did not change the proliferation and apoptosis of tumor cells in vitro. In summary, our study provided evidence that tumor-derived TGF-${\beta}$ is a critical factor for tumor progression and evasion of immune surveillance, and blocking tumor-derived TGF-${\beta}$ may serve as a potential therapeutic approach for cancer.

Investigation of the Characteristic Velocity of Geomorphologic Instantaneous Unit Hydrograph (지형형태학적 순간단위도의 특성속도에 대한 고찰)

  • Kim, Sang-Dan;Yu, Cheol-Sang;Yun, Yong-Nam
    • Journal of Korea Water Resources Association
    • /
    • v.33 no.3
    • /
    • pp.315-330
    • /
    • 2000
  • The GIUH (Geomorphologic Instantaneous Unit Hydrograph) is to be applied to the ungauged or insufficiently gauged basins. For tIris purpose, an accurate estimation of the charactenstlc velocity is one very important part, but any proper method for this has not been developed yet. In case that we have enough rainfall and runoff clata, the estimation of the characteristic velocity may be an easy job, but it is out of the purpose of the GIUH. Remindmg that the purpose of GIUH the characterisbc veloclty should be estimated based on the geomorpholog1c analysis and also be snnple for easy apphcation. In tIris research analysis cmd application of the GruH was given to several sub-basins in Wi-stream river basin, Gono, Donggok and Hyoryung. After deriving the characteristic velocity througn a optimizatlOn process with real data, it is compared w1th several velOCIties der1ved from geOlnoI1Jhoclimatic instantaneous unit hydrograph theory and several other concentration time formulae. The estimated charactenstic velocities using Kerby, Kim, KInematic Wave, and Brasby- Williams formulae found to g1ve the appropriate results. Hmvever, as the Kerby, and the Kinematic Wave require user's decision of the IvIanning's n value, the K1m and the Braby-Williams seem to be more applicable and recommended as characteristic velocity formula.

  • PDF

The Utilization of Big Data's Disaster Management in Korea (국내 재난관리 분야의 빅 데이터 활용 정책방안)

  • Shin, Dong-Hee;Kim, Yong-Moon
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.377-392
    • /
    • 2015
  • In today's data-driven society, we've been hearing a great deal about the power of Big Data over the last couple of years. At the same time, it has become the most important issue that the problems is caused by the data collection, management and utilization. Moreover, Big Data has a wide applications ranging from situation awareness, decision-making to the area to enable for the foreseeable future with man-made and analysis of data. It is necessary to process data into meaningful information given that the huge amount of structured and unstructured data being created in the private and the public sector, even in disaster management. This data should be public and private sector at the same time for the appropriate linkage analysis for effective disaster management. In this paper, we conducted a literature review and case study efficient Big Data to derive the revitalization of national disaster management. The study obtained data on the role and responsibility of the public sector and the private sector to leverage Big Data for promotion of national disaster management plan. Both public and private sectors should promote common development challenges related to the openness and sharing of Big Data, technology and expansion of infrastructure, legal and institutional maintenance. The implications of the finding were discussed.

A Causality Analysis of the Prices between Imported Fisheries and Domestic Fisheries in Distribution Channel (수입 수산물과 국내산 수산물의 가격간 유통단계별 인과성 분석 : 명태, 갈치, 조기 냉동품을 대상으로)

  • Cha, Young-Gi;Kim, Ki-Soo
    • The Journal of Fisheries Business Administration
    • /
    • v.40 no.2
    • /
    • pp.105-126
    • /
    • 2009
  • This study applies the cointegration theory to analyse the causality of the prices between imported fisheries and domestic fisheries in distribution channel. We've focused on the prices of import, wholesale and retail about the frozen Alaska pollack, hairtail and croaker which take up high portion and are popular among most of the consumers. In process of analysis, the unit root test was adopted to find the stability of time series data prior to the cointegration test. If the time series data was found as stable one in unit root test, we should analyse the VAR model. If unstable, the cointegratioin test was adopeted to find the long-run equilibrium relationship between the data. When the long-run equilibrium relationship was found among the price of the import, wholesale and retail price, the VECM model was adoped. If not, the differenced VAR model was adopted. The main findings of this study could be summarized as follows ; First, according to the result of the analysis on VAR model, time series data of frozen Alaska pollack was found as stable and has causality relationship and close effect was existing among the import, wholesale and retail price. Second, the data of frozen hairtail was found as an unstable one in unit root test and the result of cointegration test showed the long-run equilibrium relationship at lag 1. From the results of VECM model, we could find that the coefficient of error correction is effective, and the sign is negative(-). It means that the existence of adjustment tendency to long-run equilibrium after a short-run deviation. But the short-run causality of the prices were not found except the price of wholesale. Third, according to the results of differenced VAR model, data from frozen croaker did not have the stability and long-run equilibrium. Moreover, it was found that the import price has a weak causality on the retail price. Because of having difficulties in collecting data, the result of this paper could not explain the relationship among the prices of import, wholesale and retail perfectly. However, it more or less contributed to a long-lasted debate on the direction of causality of price-setting in academic research and provided a useful guide for the policy makers in charge of the price-setting of fisheries products as well.

  • PDF

Research on Changing of Renal Relative Uptake Depending on the Setting of Background ROI in Kidney MAG3 Study of Hydronephrosis Patients (Hydronephrosis 환자의 Kidney MAG3 검사 시 Background ROI 설정에 따른 신장 상대 섭취율 변화에 관한 연구)

  • Noh, Ik Sang;Ahn, Byung Ho;Kim, Soo Yung;Choi, Sung Wook
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.17 no.2
    • /
    • pp.25-30
    • /
    • 2013
  • Purpose: To evaluate kidney function, renal relative uptake is very important and is affected by kidney and the setting of background region of interest (ROI). In particular, in the case of patients with hydronephrosis to the naked eyes, such as size, position and shape etc. can be difficult to identify. So according to ROI to be set by user, the results are many differences. This study assumes the ROI of a constant kidney. According to the change of background ROI by analyzing renal relative uptake affect how the results are intended to study. Materials and Methods: From January 2012 to February 2013, we analyzed 27 patients with hydronephrosis who were examined MAG3 test in nuclear medicine department of Samsung medical center. After patients were received intravenous injection of $^{99m}Tc-MAG3$ 185 MBq (5 mCi) data were obtained. While we reconstructed images of patients, we've changed background ROI in the process of setting up ROI. First, in the process of renal processing, automatic ROI which set automatically and background ROI which needed to set manually were compared. Second, we set the ROI position separated by above, lateral and bottom of kidney. Third, background setting time were compared with 1-2 min and 2-3 min. Results: The relative uptake occurred in 3.7%p of the errors on average in Automatic & Manual ROI study. And comparison of background ROI position study, located in the lower position was more accurate results. Above, lateral, bottom each of the values 74.6%, 67.6% and 62.0% showed respectively. The standard value was 59.9%. finally, split function range test doesn't show significant difference. Conclusion: The study shows that relative uptake of kidney is affected in the background ROI. Therefore, it should be set by considering various dependent factors.

  • PDF

A comparison study of the characteristics of private and public security service of Koryo dynasty and modern security service (고려시대 공적·사적경호의 특성과 현대경호와의 비교연구)

  • Lee, Sung-Jin
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.417-442
    • /
    • 2013
  • This study considers the characteristics of the separation of public and private security service during Koryo dynasty, and compares it with the modern security service. Modern day security service's definition of private and public security service was used to distinguish them. Given the different historical settings, it's difficult to argue that the distinction between public and private service during Koryo dynasty was clear, but it can be said that public security service was centered around palace guard and concerns the activities of protest, and military made for the relationship, and private security service was centered around power of DoBang and includes the activities of malingering, and Byolchogun. During the early days of Koryo, protest, district military and soldiers who stay in the palace were all parts of a palace revolt and this institutional improvement of soldiers who stay in the palace was accomplished during King Seongjong's rule. The tradition of a palace revolt can find its roots in the middle military, and after the unification, a palace revolt was reformed into the king's palace revolt of second and the 6th along the course of establishing the nation's system. All of the changes stem from the reformation for consolidating the royal authority. Gyung Dae Seoung wanted to protect himself and he slept with his army night and days and because of that, group of soldiers was created and it was called DOBANG. Some members were from dobang gyeonryong, The forced were powerful because it was gathered with a warriors with extraordinaire martial arts and competent management. Most of the soldiers followed gyeong dae seung because they believed that he has a strong leadership and loves his people, and had a strong faith in him. However, the general gyeong jang had a belief that politics must be reverted to the previous so the relationships between jungbang wasn't smooth. Because of the economic operational problems, due to fraud committed by the mens under his command failed to maintain integrity and was criticised.The misconception also fed up with the emperor and the deepening relationships between the soldiers, his dobang was dismantled. After he took over the dobang, for his personal safety and to strengthen his position he compensated gyeon dae seong's dobang and developed the organization. In the process of extending the dobang Choi chung heon recruited many talented people to strengthen the military base, and also accepted the advice and expanded the power of Dobang. Choi Chung Heon thus consolidated his political gains by weakening the power of the king's army and adjusting the myth, which could've threatened his regime, and this was called Dobang number 6th. Dobang number six got even more powerful by his son named Choi woo, and after ruling, he expanded into a room, and a substantial reorganization of Dobang was developed. And then the creation of yabyeolcho also showed the effect to prevent the crisis. Although the palace guards who were public security service of Koryo Dynasty was still maintained during the military rule era when the royal authority was incapacitated, it was only maintained to have a symbolic meaning as the actual authority including military power was with Choi, the master of Dobang, private security service group. Likewise, during the rule of Choi, private securty service could reign over public security service, and the noteworthy characteristic of Dobang is that it assisted the private soldier groups to seize the military power by reorganizing and modifying military system. Although both differences and similarities can be found when comparing the guards of Koryo Dynasty with those of contemporary society, they have a similarity in terms of the essence of guards that they guarantee the safety of their clients. As for differences, the royalty of Koryo Dynasty and the pursuit of profit of contemporary society are in contrast, and contemporary guards can be seen as the fulfillment of responsibility and duty by free will, whereas guards of Koryo Dynasty were ruled with military coercion.

  • PDF

A Study on the Realities of Custom-made Clothing Production in Middle-aged Women's Clothing Firms (중년여성복업체(中年女性服業體)의 맞춤복(服) 생산실태(生産實態) 연구(硏究))

  • Park, Yu-Jeong;Sohn, Hee-Soon
    • Journal of Fashion Business
    • /
    • v.6 no.2
    • /
    • pp.1-16
    • /
    • 2002
  • The need for ready-to-wear clothing increases as the problem comes to arise from the fit of custommade clothing due to the characteristics of middle-aged women's somatotype. At this point of time, a study on the realities of production of custom-made clothing in middle-aged women's clothing business firms is of very greatly significance. Therefore, this study was intended to identify the problem and improvements through the survey research of production of custom-made clothing in middle-aged women's clothing business firms and further present the plan for development of custom-made clothing business. The questionnaire was framed based on the contents extracted from the preliminary questionnaire research for the pattern section chief of each business firm. Collected data were statistically processed using the SPSS 10.0 Windows program. As a result, the following findings were obtained: 1. The target age of the middle-aged women's clothing business firms ranged from more than 45 years to less than 50 years of age. Clothing business firms much made inroads into the ready-to-wear clothing market largely in the 1980s and the 1990s. Their active entry into the custom-made clothing market occurred in the 1970s and the 1980s. 2. In terms of the clothing production method of middle-aged women's clothing firms, some private boutique and designer brand clothing firms entered the clothing market with a focus on custom-made clothing in the beginning of its organization and introduced the production method of ready-to-wear clothing in accordance with changes in production methods and consumers' needs and wants. National brand clothing firms manufactured clothing with a focus on ready-to-wear clothing from the beginning of its organization, but at last they manufactured both partial custom-made and whole custom-made as the problem arose from ready-to-wear clothing. Seeing that their clothing production showed the ratio readyto-wear to custom-made clothing of 2.58:1. And it was found that the manufacture of ready-to-wear and custom-made clothing took into consideration the great difference in the pattern, size and design plan. The research of the clothing production process showed that whole custom-made and partial custommade were distinguished according to whether or not the sample was presented. 3. The ready-to-wear pattern of middle-aged women's clothing firms were used with a focus on the 'patternmaker-developed pattern' and company-developed pattern'. Most clothing businesses produced clothing in 4 to 5 basic sizes, which is found to be insufficient to complement the physical characteristics of middle-aged women with many specific somatotypes. In the pattern of custom-made clothing, the 'pattern of ready-to-wear were applied' or the 'customized pattern was developed'. Actual measurements were most used as the size of custom-made, and accordingly it is predicted that the level of satisfaction is higher with the fit of custom-made clothing than that of ready-to-wear. The selling place and the head office showed the similar percent as the place for measuring the size of custom-made clothing. Size measurers were mostly the shop master. And it was found that most clothing business firms had a problem when the measured size was applied to the pattern. Accordingly, it is necessary to provide education on size measurement for shop masters. 4. It was found that in the middle-aged women's clothing firms, the pattern correction of the length of sleeve, jacket and slacks occupied the highest percent. Accordingly, it is necessary to provide for the size system to complement the accurate somatotype characteristics of middle-aged women. 5. In custom-made clothing customer management, most firms engaged in customer somatotype management through size management. They provided customers with commodity information by informing them of the sales and event period and practiced human management for customers by maintaining the get-together and friendly relationship. 6. Middle-aged women's clothing businesses responded that it would be necessary to improve the fit of custom-made clothing and complement their pursuit for individuality as the plan to improve its quality. In consequence, it suggests that middle-aged women's clothing businesses should provide middle-aged women with the clothing of better-suited size and refined design. Middle-aged women's clothing businesses responded that it was the most urgent task to form the custom-made clothing manufacturing team as the plan to expand the custom-made clothing market, which is identified as their emphasis on the systematized production of custom-made clothing.

X-tree Diff: An Efficient Change Detection Algorithm for Tree-structured Data (X-tree Diff: 트리 기반 데이터를 위한 효율적인 변화 탐지 알고리즘)

  • Lee, Suk-Kyoon;Kim, Dong-Ah
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.683-694
    • /
    • 2003
  • We present X-tree Diff, a change detection algorithm for tree-structured data. Our work is motivated by need to monitor massive volume of web documents and detect suspicious changes, called defacement attack on web sites. From this context, our algorithm should be very efficient in speed and use of memory space. X-tree Diff uses a special ordered labeled tree, X-tree, to represent XML/HTML documents. X-tree nodes have a special field, tMD, which stores a 128-bit hash value representing the structure and data of subtrees, so match identical subtrees form the old and new versions. During this process, X-tree Diff uses the Rule of Delaying Ambiguous Matchings, implying that it perform exact matching where a node in the old version has one-to one corrspondence with the corresponding node in the new, by delaying all the others. It drastically reduces the possibility of wrong matchings. X-tree Diff propagates such exact matchings upwards in Step 2, and obtain more matchings downwsards from roots in Step 3. In step 4, nodes to ve inserted or deleted are decided, We aldo show thst X-tree Diff runs on O(n), woere n is the number of noses in X-trees, in worst case as well as in average case, This result is even better than that of BULD Diff algorithm, which is O(n log(n)) in worst case, We experimented X-tree Diff on reat data, which are about 11,000 home pages from about 20 wev sites, instead of synthetic documets manipulated for experimented for ex[erimentation. Currently, X-treeDiff algorithm is being used in a commeercial hacking detection system, called the WIDS(Web-Document Intrusion Detection System), which is to find changes occured in registered websites, and report suspicious changes to users.