• Title/Summary/Keyword: learning need

Search Result 2,490, Processing Time 0.032 seconds

A Hybrid SVM Classifier for Imbalanced Data Sets (불균형 데이터 집합의 분류를 위한 하이브리드 SVM 모델)

  • Lee, Jae Sik;Kwon, Jong Gu
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.2
    • /
    • pp.125-140
    • /
    • 2013
  • We call a data set in which the number of records belonging to a certain class far outnumbers the number of records belonging to the other class, 'imbalanced data set'. Most of the classification techniques perform poorly on imbalanced data sets. When we evaluate the performance of a certain classification technique, we need to measure not only 'accuracy' but also 'sensitivity' and 'specificity'. In a customer churn prediction problem, 'retention' records account for the majority class, and 'churn' records account for the minority class. Sensitivity measures the proportion of actual retentions which are correctly identified as such. Specificity measures the proportion of churns which are correctly identified as such. The poor performance of the classification techniques on imbalanced data sets is due to the low value of specificity. Many previous researches on imbalanced data sets employed 'oversampling' technique where members of the minority class are sampled more than those of the majority class in order to make a relatively balanced data set. When a classification model is constructed using this oversampled balanced data set, specificity can be improved but sensitivity will be decreased. In this research, we developed a hybrid model of support vector machine (SVM), artificial neural network (ANN) and decision tree, that improves specificity while maintaining sensitivity. We named this hybrid model 'hybrid SVM model.' The process of construction and prediction of our hybrid SVM model is as follows. By oversampling from the original imbalanced data set, a balanced data set is prepared. SVM_I model and ANN_I model are constructed using the imbalanced data set, and SVM_B model is constructed using the balanced data set. SVM_I model is superior in sensitivity and SVM_B model is superior in specificity. For a record on which both SVM_I model and SVM_B model make the same prediction, that prediction becomes the final solution. If they make different prediction, the final solution is determined by the discrimination rules obtained by ANN and decision tree. For a record on which SVM_I model and SVM_B model make different predictions, a decision tree model is constructed using ANN_I output value as input and actual retention or churn as target. We obtained the following two discrimination rules: 'IF ANN_I output value <0.285, THEN Final Solution = Retention' and 'IF ANN_I output value ${\geq}0.285$, THEN Final Solution = Churn.' The threshold 0.285 is the value optimized for the data used in this research. The result we present in this research is the structure or framework of our hybrid SVM model, not a specific threshold value such as 0.285. Therefore, the threshold value in the above discrimination rules can be changed to any value depending on the data. In order to evaluate the performance of our hybrid SVM model, we used the 'churn data set' in UCI Machine Learning Repository, that consists of 85% retention customers and 15% churn customers. Accuracy of the hybrid SVM model is 91.08% that is better than that of SVM_I model or SVM_B model. The points worth noticing here are its sensitivity, 95.02%, and specificity, 69.24%. The sensitivity of SVM_I model is 94.65%, and the specificity of SVM_B model is 67.00%. Therefore the hybrid SVM model developed in this research improves the specificity of SVM_B model while maintaining the sensitivity of SVM_I model.

A Study on People Counting in Public Metro Service using Hybrid CNN-LSTM Algorithm (Hybrid CNN-LSTM 알고리즘을 활용한 도시철도 내 피플 카운팅 연구)

  • Choi, Ji-Hye;Kim, Min-Seung;Lee, Chan-Ho;Choi, Jung-Hwan;Lee, Jeong-Hee;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.131-145
    • /
    • 2020
  • In line with the trend of industrial innovation, IoT technology utilized in a variety of fields is emerging as a key element in creation of new business models and the provision of user-friendly services through the combination of big data. The accumulated data from devices with the Internet-of-Things (IoT) is being used in many ways to build a convenience-based smart system as it can provide customized intelligent systems through user environment and pattern analysis. Recently, it has been applied to innovation in the public domain and has been using it for smart city and smart transportation, such as solving traffic and crime problems using CCTV. In particular, it is necessary to comprehensively consider the easiness of securing real-time service data and the stability of security when planning underground services or establishing movement amount control information system to enhance citizens' or commuters' convenience in circumstances with the congestion of public transportation such as subways, urban railways, etc. However, previous studies that utilize image data have limitations in reducing the performance of object detection under private issue and abnormal conditions. The IoT device-based sensor data used in this study is free from private issue because it does not require identification for individuals, and can be effectively utilized to build intelligent public services for unspecified people. Especially, sensor data stored by the IoT device need not be identified to an individual, and can be effectively utilized for constructing intelligent public services for many and unspecified people as data free form private issue. We utilize the IoT-based infrared sensor devices for an intelligent pedestrian tracking system in metro service which many people use on a daily basis and temperature data measured by sensors are therein transmitted in real time. The experimental environment for collecting data detected in real time from sensors was established for the equally-spaced midpoints of 4×4 upper parts in the ceiling of subway entrances where the actual movement amount of passengers is high, and it measured the temperature change for objects entering and leaving the detection spots. The measured data have gone through a preprocessing in which the reference values for 16 different areas are set and the difference values between the temperatures in 16 distinct areas and their reference values per unit of time are calculated. This corresponds to the methodology that maximizes movement within the detection area. In addition, the size of the data was increased by 10 times in order to more sensitively reflect the difference in temperature by area. For example, if the temperature data collected from the sensor at a given time were 28.5℃, the data analysis was conducted by changing the value to 285. As above, the data collected from sensors have the characteristics of time series data and image data with 4×4 resolution. Reflecting the characteristics of the measured, preprocessed data, we finally propose a hybrid algorithm that combines CNN in superior performance for image classification and LSTM, especially suitable for analyzing time series data, as referred to CNN-LSTM (Convolutional Neural Network-Long Short Term Memory). In the study, the CNN-LSTM algorithm is used to predict the number of passing persons in one of 4×4 detection areas. We verified the validation of the proposed model by taking performance comparison with other artificial intelligence algorithms such as Multi-Layer Perceptron (MLP), Long Short Term Memory (LSTM) and RNN-LSTM (Recurrent Neural Network-Long Short Term Memory). As a result of the experiment, proposed CNN-LSTM hybrid model compared to MLP, LSTM and RNN-LSTM has the best predictive performance. By utilizing the proposed devices and models, it is expected various metro services will be provided with no illegal issue about the personal information such as real-time monitoring of public transport facilities and emergency situation response services on the basis of congestion. However, the data have been collected by selecting one side of the entrances as the subject of analysis, and the data collected for a short period of time have been applied to the prediction. There exists the limitation that the verification of application in other environments needs to be carried out. In the future, it is expected that more reliability will be provided for the proposed model if experimental data is sufficiently collected in various environments or if learning data is further configured by measuring data in other sensors.

Development of a Stock Trading System Using M & W Wave Patterns and Genetic Algorithms (M&W 파동 패턴과 유전자 알고리즘을 이용한 주식 매매 시스템 개발)

  • Yang, Hoonseok;Kim, Sunwoong;Choi, Heung Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.1
    • /
    • pp.63-83
    • /
    • 2019
  • Investors prefer to look for trading points based on the graph shown in the chart rather than complex analysis, such as corporate intrinsic value analysis and technical auxiliary index analysis. However, the pattern analysis technique is difficult and computerized less than the needs of users. In recent years, there have been many cases of studying stock price patterns using various machine learning techniques including neural networks in the field of artificial intelligence(AI). In particular, the development of IT technology has made it easier to analyze a huge number of chart data to find patterns that can predict stock prices. Although short-term forecasting power of prices has increased in terms of performance so far, long-term forecasting power is limited and is used in short-term trading rather than long-term investment. Other studies have focused on mechanically and accurately identifying patterns that were not recognized by past technology, but it can be vulnerable in practical areas because it is a separate matter whether the patterns found are suitable for trading. When they find a meaningful pattern, they find a point that matches the pattern. They then measure their performance after n days, assuming that they have bought at that point in time. Since this approach is to calculate virtual revenues, there can be many disparities with reality. The existing research method tries to find a pattern with stock price prediction power, but this study proposes to define the patterns first and to trade when the pattern with high success probability appears. The M & W wave pattern published by Merrill(1980) is simple because we can distinguish it by five turning points. Despite the report that some patterns have price predictability, there were no performance reports used in the actual market. The simplicity of a pattern consisting of five turning points has the advantage of reducing the cost of increasing pattern recognition accuracy. In this study, 16 patterns of up conversion and 16 patterns of down conversion are reclassified into ten groups so that they can be easily implemented by the system. Only one pattern with high success rate per group is selected for trading. Patterns that had a high probability of success in the past are likely to succeed in the future. So we trade when such a pattern occurs. It is a real situation because it is measured assuming that both the buy and sell have been executed. We tested three ways to calculate the turning point. The first method, the minimum change rate zig-zag method, removes price movements below a certain percentage and calculates the vertex. In the second method, high-low line zig-zag, the high price that meets the n-day high price line is calculated at the peak price, and the low price that meets the n-day low price line is calculated at the valley price. In the third method, the swing wave method, the high price in the center higher than n high prices on the left and right is calculated as the peak price. If the central low price is lower than the n low price on the left and right, it is calculated as valley price. The swing wave method was superior to the other methods in the test results. It is interpreted that the transaction after checking the completion of the pattern is more effective than the transaction in the unfinished state of the pattern. Genetic algorithms(GA) were the most suitable solution, although it was virtually impossible to find patterns with high success rates because the number of cases was too large in this simulation. We also performed the simulation using the Walk-forward Analysis(WFA) method, which tests the test section and the application section separately. So we were able to respond appropriately to market changes. In this study, we optimize the stock portfolio because there is a risk of over-optimized if we implement the variable optimality for each individual stock. Therefore, we selected the number of constituent stocks as 20 to increase the effect of diversified investment while avoiding optimization. We tested the KOSPI market by dividing it into six categories. In the results, the portfolio of small cap stock was the most successful and the high vol stock portfolio was the second best. This shows that patterns need to have some price volatility in order for patterns to be shaped, but volatility is not the best.

A Study on the Ideal Leadership whole person of Confucian philosophy (유가(儒家)의 전인적(全人的) 지도자상(指導者像) 고찰(考察))

  • Kim, Kyeong-Mi
    • (The)Study of the Eastern Classic
    • /
    • no.62
    • /
    • pp.145-176
    • /
    • 2016
  • This paper aims to define the leadership of Gunja (君子, translated into prince, gentleman, or ideal man) based on Confucian Classics which offer the general values and norms of individuals' virtue and social virtuous acts. Thus, humanitarianism is regarded as true value, and the values of a virtuous person who properly practices social human relationships are discussed. The real worth of Gunja image is discussed as a true human image of "self-completion and completion of all things" (成己成物) which involves the convergence of truth, good and beauty where there is a sense of harmony and balance, where there is stern self discipline and self cultivation and where win-win values of human relationships are created. Confucian saint (聖人), wise man (賢人), great man (大人), and gentleman (君子) mean social leaders. They practice human morals, enlighten and beautify society with teachings, and are indicated as equipped with mental and material harmony, good character and competence, and economic power and morality. People today pursue their own personal growth according to their material preferences rather than pure intellectual cultural values, and are engrossed in visually beautiful external unlimited competition. In this digital age, we are supposed to demonstrate our individuality, but many people are obsessed with appearance, go on severe diet, and lose their health beauty, and consequently suffer mental stress. This trend fuels obsession with appearance and the sick practice of valuing appearance. As an alternative method to overcome this phenomenon, we need a leader image with the convergence of truth, good and beauty, which is characterized by internal self cultivation, external professionalism, and handsome and solid character. Confucian thoughts consist in practicing the Way of disciplining oneself for governing others (修己治人). Self discipline involves developing personal virtuous ability for cultivating a virtuous character, and governing others involves interacting to work together in society and to have right human relationships. Thus, leaders should impress not only themselves but also others. Self discipline for governing others means cultivating virtue for oneself and leading others. A true leader has self introspection and establishes himself through self discipline so that he can govern others or reach the realm of settling others where people live together. As all things have a value and a virtue, humans endeavor to cultivate character and virtue by learning and studying for securing their professionalism, reliability, character and ability, so as to create their own brand value. Personal character does not come from a high position, wealth and power. Character is a personal virtue, and is cultivated as immaculate and fresh through self discipline. As such, it well matches with a clean and clear spirit. This offers the ideal leader as the Guja image who has an extremely humane character, as well as being equipped with inherent virtues of intellect, benevolence and courage. Self development can foster virtue and self management through self leadership and self discipline. The leader in the relationship area can practice his virtue through virtuous acts, in other words, even think from another person's perspective. Such leader is mentioned as the principle of measuring square in the Great Learning. In our viewpoint, the beauty of character can breed the seed of virtue through intellect, benevolence and courage, the beauty of win-win can realize the right virtue by showing exemplary acts to others through considerateness, and the beauty of harmony can love and care for others like me through the principle of measuring square, thereby realizing the universal principle of virtue and harmony, which is like my mind. As such, the ideal leader, when his virtue and mind of being considerate of others all blending well, can exercise his ability to the full, can live together and coexist with many people, and can grow again into a triumphant relationship.

Measuring the Public Service Quality Using Process Mining: Focusing on N City's Building Licensing Complaint Service (프로세스 마이닝을 이용한 공공서비스의 품질 측정: N시의 건축 인허가 민원 서비스를 중심으로)

  • Lee, Jung Seung
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.4
    • /
    • pp.35-52
    • /
    • 2019
  • As public services are provided in various forms, including e-government, the level of public demand for public service quality is increasing. Although continuous measurement and improvement of the quality of public services is needed to improve the quality of public services, traditional surveys are costly and time-consuming and have limitations. Therefore, there is a need for an analytical technique that can measure the quality of public services quickly and accurately at any time based on the data generated from public services. In this study, we analyzed the quality of public services based on data using process mining techniques for civil licensing services in N city. It is because the N city's building license complaint service can secure data necessary for analysis and can be spread to other institutions through public service quality management. This study conducted process mining on a total of 3678 building license complaint services in N city for two years from January 2014, and identified process maps and departments with high frequency and long processing time. According to the analysis results, there was a case where a department was crowded or relatively few at a certain point in time. In addition, there was a reasonable doubt that the increase in the number of complaints would increase the time required to complete the complaints. According to the analysis results, the time required to complete the complaint was varied from the same day to a year and 146 days. The cumulative frequency of the top four departments of the Sewage Treatment Division, the Waterworks Division, the Urban Design Division, and the Green Growth Division exceeded 50% and the cumulative frequency of the top nine departments exceeded 70%. Higher departments were limited and there was a great deal of unbalanced load among departments. Most complaint services have a variety of different patterns of processes. Research shows that the number of 'complementary' decisions has the greatest impact on the length of a complaint. This is interpreted as a lengthy period until the completion of the entire complaint is required because the 'complement' decision requires a physical period in which the complainant supplements and submits the documents again. In order to solve these problems, it is possible to drastically reduce the overall processing time of the complaints by preparing thoroughly before the filing of the complaints or in the preparation of the complaints, or the 'complementary' decision of other complaints. By clarifying and disclosing the cause and solution of one of the important data in the system, it helps the complainant to prepare in advance and convinces that the documents prepared by the public information will be passed. The transparency of complaints can be sufficiently predictable. Documents prepared by pre-disclosed information are likely to be processed without problems, which not only shortens the processing period but also improves work efficiency by eliminating the need for renegotiation or multiple tasks from the point of view of the processor. The results of this study can be used to find departments with high burdens of civil complaints at certain points of time and to flexibly manage the workforce allocation between departments. In addition, as a result of analyzing the pattern of the departments participating in the consultation by the characteristics of the complaints, it is possible to use it for automation or recommendation when requesting the consultation department. In addition, by using various data generated during the complaint process and using machine learning techniques, the pattern of the complaint process can be found. It can be used for automation / intelligence of civil complaint processing by making this algorithm and applying it to the system. This study is expected to be used to suggest future public service quality improvement through process mining analysis on civil service.

Automatic gasometer reading system using selective optical character recognition (관심 문자열 인식 기술을 이용한 가스계량기 자동 검침 시스템)

  • Lee, Kyohyuk;Kim, Taeyeon;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.1-25
    • /
    • 2020
  • In this paper, we suggest an application system architecture which provides accurate, fast and efficient automatic gasometer reading function. The system captures gasometer image using mobile device camera, transmits the image to a cloud server on top of private LTE network, and analyzes the image to extract character information of device ID and gas usage amount by selective optical character recognition based on deep learning technology. In general, there are many types of character in an image and optical character recognition technology extracts all character information in an image. But some applications need to ignore non-of-interest types of character and only have to focus on some specific types of characters. For an example of the application, automatic gasometer reading system only need to extract device ID and gas usage amount character information from gasometer images to send bill to users. Non-of-interest character strings, such as device type, manufacturer, manufacturing date, specification and etc., are not valuable information to the application. Thus, the application have to analyze point of interest region and specific types of characters to extract valuable information only. We adopted CNN (Convolutional Neural Network) based object detection and CRNN (Convolutional Recurrent Neural Network) technology for selective optical character recognition which only analyze point of interest region for selective character information extraction. We build up 3 neural networks for the application system. The first is a convolutional neural network which detects point of interest region of gas usage amount and device ID information character strings, the second is another convolutional neural network which transforms spatial information of point of interest region to spatial sequential feature vectors, and the third is bi-directional long short term memory network which converts spatial sequential information to character strings using time-series analysis mapping from feature vectors to character strings. In this research, point of interest character strings are device ID and gas usage amount. Device ID consists of 12 arabic character strings and gas usage amount consists of 4 ~ 5 arabic character strings. All system components are implemented in Amazon Web Service Cloud with Intel Zeon E5-2686 v4 CPU and NVidia TESLA V100 GPU. The system architecture adopts master-lave processing structure for efficient and fast parallel processing coping with about 700,000 requests per day. Mobile device captures gasometer image and transmits to master process in AWS cloud. Master process runs on Intel Zeon CPU and pushes reading request from mobile device to an input queue with FIFO (First In First Out) structure. Slave process consists of 3 types of deep neural networks which conduct character recognition process and runs on NVidia GPU module. Slave process is always polling the input queue to get recognition request. If there are some requests from master process in the input queue, slave process converts the image in the input queue to device ID character string, gas usage amount character string and position information of the strings, returns the information to output queue, and switch to idle mode to poll the input queue. Master process gets final information form the output queue and delivers the information to the mobile device. We used total 27,120 gasometer images for training, validation and testing of 3 types of deep neural network. 22,985 images were used for training and validation, 4,135 images were used for testing. We randomly splitted 22,985 images with 8:2 ratio for training and validation respectively for each training epoch. 4,135 test image were categorized into 5 types (Normal, noise, reflex, scale and slant). Normal data is clean image data, noise means image with noise signal, relfex means image with light reflection in gasometer region, scale means images with small object size due to long-distance capturing and slant means images which is not horizontally flat. Final character string recognition accuracies for device ID and gas usage amount of normal data are 0.960 and 0.864 respectively.

Learning from the Licensing and Training Requirements of the USA Private Security Industry : focused on the Private Security Officer Employment Authorization Act & California System (미국의 민간경비 자격 및 교육훈련 제도에 관한 연구 - 민간경비원고용인가법(PSOEAA) 및 캘리포니아 주(州) 제도 중심으로 -)

  • Lee, Seong-Ki;Kim, Hak-Kyong
    • Korean Security Journal
    • /
    • no.33
    • /
    • pp.197-228
    • /
    • 2012
  • The private security industry in Korea has rapidly proliferated. While the industry has grown quickly, though, private security officers have recently been implicated in incidents involving violence, demonstrating an urgent need for systematic reform and regulation of private security practices in Korea. Due to its quasi-public service character, the industry also risks losing the public's favor if it is not quickly disciplined and brought under legitimate government regulation: the industry needs professional standards for conduct and qualification for employment of security officers. This paper shares insights for the reform of the Korean private security industry through a study of the licensing and training requirements for private security businesses in the United States, mainly focusing on the Private Security Officer Employment Authorization Act (hereinafter the PSOEAA) and the California system. According to the PSOEAA, aspiring security officers shall submit to a criminal background check (a check of the applicants' criminal records). Applicants' criminal records should include not only felony convictions but also any other moral turpitude offenses (involving dishonesty, false statement, and information on pending cases). The PSOEAA also allows businesses to do background checks of their employees every twelve months, enabling the employers to make sure that their employees remain qualified for their security jobs during their employment. It also must be mentioned that the state of California, for effective management of its private security sector, has established a professional government authority, the Bureau of Security and Investigative Services, a tacit recognition that the private security industry needs to be thoroughly, professionally, and actively managed by a professional government authority. The American system provides a workable model for the Korean private security industry. First, this paper argues that the Korean private security industry should implement a more strict criminal background check system similar to that required by the PSOEAA. Second, it recommends that an independent professional government authority be established to oversee and enforce regulation of Korea's private security industry. Finally, this article suggests that education and training course be implemented to provide both diverse training as well as specialization and phasing.

  • PDF

An Analysis of the Change of Secondary Earth Science Teachers' Knowledge about the East Sea's Currents through Drawing Schematic Current Maps (해류도 그리기를 통한 중등학교 지구과학 교사들의 동해 해류에 대한 지식의 변화 분석)

  • Park, Kyung-Ae;Park, Ji-Eun;Lee, Ki-Young;Choi, Byoung-Ju;Lee, Sang-Ho;Kim, Young-Taeg;Lee, Eun-Il
    • Journal of the Korean earth science society
    • /
    • v.36 no.3
    • /
    • pp.258-279
    • /
    • 2015
  • The purpose of this study was to analyze the change of secondary earth science teachers' knowledge about the currents of the East Sea through drawing of a schematic map of oceanic currents. For this purpose, thirty two earth science teachers participated in the six-hour long training of learning and practice related to ocean current schematic map. The teacher participants performed drawing of the ocean current schematic map of the East Sea in three different phases, i.e.; pre-, post-, and delayed-post phase. In addition, all the maps conducted by participants were converted to digitalized image data. Detailed analysis were performed to investigate participating teachers' knowledge about the currents of the East Sea. Findings are as follows: First, the teacher participants have background knowledge about the ocean current map, but it reveals an incorrect knowledge about some concepts. Second, after teacher training, teachers' knowledge increased about the East Sea's currents, while a decrease was found in the differences between individual teachers' knowledge. This pattern was more evident in the delayed-post phase of drawing than in the post-phase occurred immediately after training. Third, the teacher participants were strongly aware of the need to improve the ocean current schematic map of the East Sea in science textbook in terms of scientific knowledge. In addition, they showed a high level of satisfaction about teacher training because they perceived that it was meaningful in various aspects; recognizing the importance of content knowledge and conjunction with instructional strategies, the needs of secondary science curriculum, and recognition of the nature of scientific knowledge. The results imply that teachers' subject matter knowledge plays a significant role to make science teaching effective.

Manganese and Iron Interaction: a Mechanism of Manganese-Induced Parkinsonism

  • Zheng, Wei
    • Proceedings of the Korea Environmental Mutagen Society Conference
    • /
    • 2003.10a
    • /
    • pp.34-63
    • /
    • 2003
  • Occupational and environmental exposure to manganese continue to represent a realistic public health problem in both developed and developing countries. Increased utility of MMT as a replacement for lead in gasoline creates a new source of environmental exposure to manganese. It is, therefore, imperative that further attention be directed at molecular neurotoxicology of manganese. A Need for a more complete understanding of manganese functions both in health and disease, and for a better defined role of manganese in iron metabolism is well substantiated. The in-depth studies in this area should provide novel information on the potential public health risk associated with manganese exposure. It will also explore novel mechanism(s) of manganese-induced neurotoxicity from the angle of Mn-Fe interaction at both systemic and cellular levels. More importantly, the result of these studies will offer clues to the etiology of IPD and its associated abnormal iron and energy metabolism. To achieve these goals, however, a number of outstanding questions remain to be resolved. First, one must understand what species of manganese in the biological matrices plays critical role in the induction of neurotoxicity, Mn(II) or Mn(III)? In our own studies with aconitase, Cpx-I, and Cpx-II, manganese was added to the buffers as the divalent salt, i.e., $MnCl_2$. While it is quite reasonable to suggest that the effect on aconitase and/or Cpx-I activites was associated with the divalent species of manganese, the experimental design does not preclude the possibility that a manganese species of higher oxidation state, such as Mn(III), is required for the induction of these effects. The ionic radius of Mn(III) is 65 ppm, which is similar to the ionic size to Fe(III) (65 ppm at the high spin state) in aconitase (Nieboer and Fletcher, 1996; Sneed et al., 1953). Thus it is plausible that the higher oxidation state of manganese optimally fits into the geometric space of aconitase, serving as the active species in this enzymatic reaction. In the current literature, most of the studies on manganese toxicity have used Mn(II) as $MnCl_2$ rather than Mn(III). The obvious advantage of Mn(II) is its good water solubility, which allows effortless preparation in either in vivo or in vitro investigation, whereas almost all of the Mn(III) salt products on the comparison between two valent manganese species nearly infeasible. Thus a more intimate collaboration with physiochemists to develop a better way to study Mn(III) species in biological matrices is pressingly needed. Second, In spite of the special affinity of manganese for mitochondria and its similar chemical properties to iron, there is a sound reason to postulate that manganese may act as an iron surrogate in certain iron-requiring enzymes. It is, therefore, imperative to design the physiochemical studies to determine whether manganese can indeed exchange with iron in proteins, and to understand how manganese interacts with tertiary structure of proteins. The studies on binding properties (such as affinity constant, dissociation parameter, etc.) of manganese and iron to key enzymes associated with iron and energy regulation would add additional information to our knowledge of Mn-Fe neurotoxicity. Third, manganese exposure, either in vivo or in vitro, promotes cellular overload of iron. It is still unclear, however, how exactly manganese interacts with cellular iron regulatory processes and what is the mechanism underlying this cellular iron overload. As discussed above, the binding of IRP-I to TfR mRNA leads to the expression of TfR, thereby increasing cellular iron uptake. The sequence encoding TfR mRNA, in particular IRE fragments, has been well-documented in literature. It is therefore possible to use molecular technique to elaborate whether manganese cytotoxicity influences the mRNA expression of iron regulatory proteins and how manganese exposure alters the binding activity of IPRs to TfR mRNA. Finally, the current manganese investigation has largely focused on the issues ranging from disposition/toxicity study to the characterization of clinical symptoms. Much less has been done regarding the risk assessment of environmenta/occupational exposure. One of the unsolved, pressing puzzles is the lack of reliable biomarker(s) for manganese-induced neurologic lesions in long-term, low-level exposure situation. Lack of such a diagnostic means renders it impossible to assess the human health risk and long-term social impact associated with potentially elevated manganese in environment. The biochemical interaction between manganese and iron, particularly the ensuing subtle changes of certain relevant proteins, provides the opportunity to identify and develop such a specific biomarker for manganese-induced neuronal damage. By learning the molecular mechanism of cytotoxicity, one will be able to find a better way for prediction and treatment of manganese-initiated neurodegenerative diseases.

  • PDF

A study for Developing Performance Assessment Model of Technology Entrepreneurship Education Based on BSC - A Case Study to Graduate School of Entrepreneurial Management - (BSC(Balanced Scorecard) 기반의 기술창업교육 성과평가모형 개발 연구 - 창업대학원 성과평가지표 분석과 개선방안도출을 중심으로 -)

  • Yang, Young Seok
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.2
    • /
    • pp.129-139
    • /
    • 2013
  • This paper is targeted on proposing ameliorating alternative to performance assessment method of GSEM through evaluating the current one, which is initiated by SMBA to induce fair competition among 5 GSEM across the country and accommodate the quality improvement of entrepreneurship education since 2005 after beginning the SMBA support, from the perspective of BSC(Balanced Scorecard) tool. Ultimately, it complements the policy defects of SMBA over GSEM, in particular, in the process of performance assessment and management. This paper carries out two studies as follow. First, throughout reviewing the previous studies relating to BSC applications to non-profit organization, it set out the direction of introducing BSC in assessing performance of GSEM in order to enhance its effectiveness. Second, it evaluate the rationality of performance assessing tools apllied to GSEM by SMBA on the basis of BSC application over non-profit organization, especially in education institution. Research results shows the following implications. First, the current evaluation system over GSEM is just merely assessment itself and not much contributions for the post performance management. Second, The annual evaluation just remains to check up whether the policy goals are met or not. Third, the current evaluation puts much emphasis just on financial inputs and hardware infra, not considering human resources and utilization of government policy and institution. Fourth, the policy goals are unilaterally focused on entrepreneurs. Fifth, the current evaluation systems do not contain any indexes relating to learning and growth perspectives for concerning sustainable and independent growing up. However, lack of empirical testing require this paper to need the further study in the future.

  • PDF