• Title/Summary/Keyword: most powerful

Search Result 1,256, Processing Time 0.033 seconds

Toward High-Resolution Cryo-Electron Microscopy: Technical Review on Microcrystal-Electron Diffraction

  • Lee, Sangmin;Chung, Jeong Min;Jung, Hyun Suk
    • Applied Microscopy
    • /
    • v.47 no.4
    • /
    • pp.223-225
    • /
    • 2017
  • Cryo-electron microscopy (cryo-EM) is arguably the most powerful tool used in structural biology. It is an important analytical technique that is used for gaining insight into the functional and molecular mechanisms of biomolecules involved in several physiological processes. Cryo-EM can be separated into the following three groups according to the analytical purposes and the features of the biological samples: cryo-electron tomography (cryo-ET), cryo-single-particle reconstruction, and cryo-electron crystallography. Cryo-tomography is a unique EM technique that is used to study intact biomolecular complexes within their original environments; it can provide mechanistic insights that are challenging for other EM-methods. However, the resolution of reconstructed three-dimensional (3D) models generated by cryo-ET is relatively low, while single-particle reconstruction can reproduce biomolecular structures having near-atomic resolution without the need for crystallization unless the samples are large (>200 kDa) and highly symmetrical. Cryo-electron crystallography is subdivided into the following two categories according to the types of samples: one category that deals with two-dimensional (2D) crystalline arrays and the other category that uses 3D crystals. These two categories of electron-crystallographic techniques use different diffraction data obtained from still diffraction and continuous-rotation diffraction. In this paper, we review crystal-based cryo-EM techniques and focus on the recently developed 3D electron-crystallographic technique called microcrystal-electron diffraction.

An Aanalysis of Predictive Factors of Medical Service Overuse for Inpatients Applied Out-of-Pocket Maximum in Long-Term Care Hospitals in South Korea (본인부담상한제 적용 요양병원 환자의 의료이용가수요 예측요인 분석)

  • Lim, Seungji;Shin, Hannah
    • Health Policy and Management
    • /
    • v.30 no.1
    • /
    • pp.72-81
    • /
    • 2020
  • Background: The out-of-pocket maximum is one of the distinctive healthcare systems which sets a ceiling on co-payment in order to reduce the burden of households from the unpredictable medical expenditure. However, this leads to an increase in the demand for healthcare services especially in long-term care hospitals (LTCHs) in Korea. Methods: This study analyzed the influence factor of medical service overuse of 165,592 inpatients in LTCHs which out-of-pocket maximum is applied, by utilizing data from the National Health Insurance Service (2016). Based on Anderson Model, the medical service overuse, as a dependent variable, was defined as long-stay admission more than 180 days at the LTCHs. Independent variable was comprised of predisposing factors (gender, age), enabling factors (income level, types of out-of-pocket maximum) and need factors (illness level, patient use of tertiary hospital). Results: The most powerful factor of medical service overuse in LTCHs was availability of pre-payment for the out-of-maximum (odds ratio [OR], 191.66; p<0.001). This tendency was found in high income level status (p<0.001). Furthermore, mild inpatients (OR, 1.50; p<0.001) which had no experience with the tertiary hospitals (OR, 2.06; p<0.001) were more relevant to the medical service overuse in LTCHs, compared to the severe inpatients. Conclusion: It is suggested that a separate standard of out-of pocket maximum with regards to LTCHs is required to secure the beneficial functions of long-term hospitals and prevent unnecessary financial leakage to achieve sustainable and financially sound National Health Insurance.

Influence of Sleep Quality, Depression and Fatigue on Job stress of Geriatric Hospital Workers (노인요양병원 근무자의 수면의 질, 우울, 피로가 직무스트레스에 미치는 영향)

  • Hwang, Eun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.8
    • /
    • pp.5413-5421
    • /
    • 2015
  • The aim of this study was to identify the influences of sleep quality, depression and fatigue on job stress of geriatric hospital workers. The subjects were 175 workers from 6 geriatric hospitals. Data were collected on March, 2015 using a structured questionnaire. The data were analyzed by using SPSS/WIN 21.0 program. The job stress was negatively correlated with sleep quality(r=-.364, p<.001), positively correlated with depression(r=.376, p<.001) and fatigue(r=.646, p<.001). The multiple regression analysis revealed that the most powerful predictor of job stress was fatigue(${\beta}=.581$, p<.001). These results indicate that fatigue affect job stress of the geriatric hospital workers. Therefore, it is necessary to prepare tailored fatigue management program and working conditions that can reduce job stress.

MWCNT, silver nanoparticles, CuBTC를 사용한 염소 이온 센서 합성

  • Gwak, Byeong-Gwan;Park, Su-Bin;Yu, Bong-Yeong
    • Proceedings of the Korean Institute of Surface Engineering Conference
    • /
    • 2018.06a
    • /
    • pp.101-101
    • /
    • 2018
  • Quantitative measurement of chloride ion concentration has an important role in various fields of electrochemistry, medical science, biology, metallurgy, architecture, etc. Among them, its importance of architecture is ever-growing due to unexpected degradations of building structure. These situations are caused by corrosion of reinforced concrete (RC) structure of buildings. And chloride ions are the most powerful factors of RC structure corrosion. Therefore, precise inspection of chloride ion concentration must be required to increase the accuracy of durability monitoring. Multi-walled Carbon nanotubes (MWCNTs) have high chemical resistivity, large surface area and superior electrical property. Thus, it is suitable for the channels of electrical signals made by the sensor. Silver nanoparticles were added to giving the sensing property. CuBTC, one of the metal organic frameworks (MOFs), was employed as a material to improve the sensing property because of its hydrophilicity and high surface area to volume ratio. In this study, sensing element was synthesized by various chemical reaction procedures. At first, MWCNTs were functionalized with a mixture of sulfuric acid and nitric acid because of enhancement of solubility in solution and surface activation. And functionalized MWCNTs, silver nanoparticles, and CuBTC were synthesized on PTFE membrane, one by one. Electroless deposition process was performed to deposit the silver nanoparticles. CuBTC was produced by room temperature synthesis. Surface morphology and composition analysis were characterized by scanning electron microscope (SEM), energy dispersive X-ray spectroscopy (EDS), respectively. X-ray photoelectron spectroscopy (XPS) was also performed to confirm the existence of sensing materials. The electrical properties of sensor were measured by semiconductor analyzer. The chloride ion sensing characteristics were confirmed with the variation of the resistance at 1 V.

  • PDF

The Effect of Vietnamese Mothers' Perception of the Korean Wave on Purchase Intention of Korean Brand Children's Wear (베트남 주부의 한류지각이 한국 브랜드 아동복 구매의도에 미치는 영향)

  • Hong, Keum Hee;Son, Sue-Min
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.38 no.5
    • /
    • pp.627-637
    • /
    • 2014
  • This study explored the product attributes Vietnamese mothers consider for the purchase of children's wear, the differences of product attributes between groups with different levels of conspicuous consumption, and the extent to which the Korean wave affects the purchasing behavior of children's wear brands. The results are as follows. First, the product attribute that Vietnamese mothers consider most when purchasing children's clothes is the comfort in physical activities. Fabric type and quality, sizing and fit, durability, color, child suitability, design, cutting and construction, price, fashionability, and maintenance and laundering are the other attributes (respectively) that influence the purchase of children's wear. Second, the high conspicuous consumption group considers brand, maintenance and laundering, durability, the reactions of others, and fashionability significantly more than the low conspicuous consumption group. Third, the purchase intention of Korean children's wear brands is affected by the perception of the Korean wave than the influence of the reference group or the tendency of conspicuous consumption. The results show that low prices and practicality were important considerations for children's clothing purchases by Vietnamese mothers; however, brand name and fashionability were more powerful predictors for the high conspicuous consumption group. Those with a high perception of the Korean wave also had a higher intention of Korean children's wear brand, which is indicative of the halo effect of the Korean wave. Thus, Korean children's wear brands that plan to enter the Vietnamese market should make active use of the Korean wave.

Effect of Engine Friction on Vehicle Fuel Economy during Warm-up (웜업시 엔진 마찰이 차량 모드 연비에 미치는 영향)

  • Lim, Gun-Byoung;Wi, Hyo-Seong;Park, Jin-Il;Lee, Jong-Hwa;Park, Kyoung-Seok
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.16 no.6
    • /
    • pp.109-114
    • /
    • 2008
  • An improvement of vehicle fuel economy is one of the most important topic in automotive engineering. Lots of engineers make efforts to achieve 1% of fuel economy improvement. Engine friction is an important factor influencing vehicle fuel economy. This paper focuses on effect of engine friction on vehicle fuel economy during warm-up. A computer simulation is one of the powerful tools in automotive engineering field. Recently Simulation is attempting to virtual experiment not using expensive instruments. It is possible to presuppose fuel economy by changing the characteristic of accessories using CRUISE(vehicle simulation software). In this paper, fuel consumption at each part of the vehicle is analyzed by both of experiment and simulation. The results of fuel economy analysis on experiment substitute for Cruise to calculate fuel economy. The simulation data such as engine speed, brake torque, shift pattern, vehicle speed, fuel consumption level is well correlated to experiment data. In this paper, the change of warm-up time, faster or slower, through simulation is performed. As a result of the fast warm-up, fuel economy is improved up to 1.7%.

Sub Oriented Histograms of Local Binary Patterns for Smoke Detection and Texture Classification

  • Yuan, Feiniu;Shi, Jinting;Xia, Xue;Yang, Yong;Fang, Yuming;Wang, Rui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1807-1823
    • /
    • 2016
  • Local Binary Pattern (LBP) and its variants have powerful discriminative capabilities but most of them just consider each LBP code independently. In this paper, we propose sub oriented histograms of LBP for smoke detection and image classification. We first extract LBP codes from an image, compute the gradient of LBP codes, and then calculate sub oriented histograms to capture spatial relations of LBP codes. Since an LBP code is just a label without any numerical meaning, we use Hamming distance to estimate the gradient of LBP codes instead of Euclidean distance. We propose to use two coordinates systems to compute two orientations, which are quantized into discrete bins. For each pair of the two discrete orientations, we generate a sub LBP code map from the original LBP code map, and compute sub oriented histograms for all sub LBP code maps. Finally, all the sub oriented histograms are concatenated together to form a robust feature vector, which is input into SVM for training and classifying. Experiments show that our approach not only has better performance than existing methods in smoke detection, but also has good performance in texture classification.

Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model

  • Xie, Dong;Peng, HaiPeng;Li, Lixiang;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2427-2445
    • /
    • 2016
  • In contrast to traditional "store-and-forward" routing mechanisms, network coding offers an elegant solution for achieving maximum network throughput. The core idea is that intermediate network nodes linearly combine received data packets so that the destination nodes can decode original files from some authenticated packets. Although network coding has many advantages, especially in wireless sensor network and peer-to-peer network, the encoding mechanism of intermediate nodes also results in some additional security issues. For a powerful adversary who can control arbitrary number of malicious network nodes and can eavesdrop on the entire network, cryptographic signature schemes provide undeniable authentication mechanisms for network nodes. However, with the development of quantum technologies, some existing network coding signature schemes based on some traditional number-theoretic primitives vulnerable to quantum cryptanalysis. In this paper we first present an efficient network coding signature scheme in the standard model using lattice theory, which can be viewed as the most promising tool for designing post-quantum cryptographic protocols. In the security proof, we propose a new method for generating a random lattice and the corresponding trapdoor, which may be used in other cryptographic protocols. Our scheme has many advantages, such as supporting multi-source networks, low computational complexity and low communication overhead.

Knowledge Management and Major Player in Government-supported Research Institute (정부출연연구소의 지식경영과 그 주체)

  • Kang, Dae-Shin;Oh, Kun-Taek
    • Journal of Information Management
    • /
    • v.31 no.2
    • /
    • pp.1-10
    • /
    • 2000
  • Many experts predict that 21st century will be knowledge-based society. That is, knowledge beside labor, capital will be recognised as important assets and powerful competitiveness. The main aim of government-supported research institute is to evolve R&D activities and to diffuse them. And all process including R&D activities can be called to knowledge life cycle. This paper reviews understanding of KM and information professional's role in research information center. Sometimes, CEOs misunderstand that only building of knowledge management system is sucess of knowledge management initiatives but the most important factors of its success are human and culture of knowledge sharing, not H/W systems. Information professionals must be consultant, analyst, content manager, planner and marketer, knowledge manager to practice knowledge management initiatives successfully.

  • PDF

Method Decoder for Low-Cost RFID Tags

  • Juels, Ari
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.47-52
    • /
    • 2008
  • A radio-frequency identification(RFID) tag is a small, inexpensive microchip that emits an identifier in response to a query from a nearby reader. The price of these tags promises to drop to the range of $0.05 per unit in the next several years, offering a viable and powerful replacement for barcodes. The challenge in providing security for low-cost RFID tags is that they are computationally weak devices, unable to perform even basic symmetric-key cryptographic operations. Security researchers often therefore assume that good privacy protection in RFID tags is unattainable. In this paper, we explore a notion of minimalist cryptography suitable for RFID tags. We consider the type of security obtainable in RFID devices with a small amount of rewritable memory, but very limited computing capability. Our aim is to show that standard cryptography is not necessary as a starting point for improving security of very weak RFID devices. Our contribution is threefold: 1. We propose a new formal security model for authentication and privacy in RFID tags. This model takes into account the natural computational limitations and the likely attack scenarios for RFID tags in real-world settings. It represents a useful divergence from standard cryptographic security modeling, and thus a new view of practical formalization of minimal security requirements for low-cost RFID-tag security. 2. We describe protocol that provably achieves the properties of authentication and privacy in RFID tags in our proposed model, and in a good practical sense. Our proposed protocol involves no computationally intensive cryptographic operations, and relatively little storage. 3. Of particular practical interest, we describe some reduced-functionality variants of our protocol. We show, for instance, how static pseudonyms may considerably enhance security against eavesdropping in low-cost RFID tags. Our most basic static-pseudonym proposals require virtually no increase in existing RFID tag resources.

  • PDF