• Title/Summary/Keyword: new proof

Search Result 435, Processing Time 0.023 seconds

Anti-oxidative and anti-inflammatory effects of Odukhwan and Sasinhwan in RAW264.7 cells (오덕환(五德丸)과 사신환(四神丸)의 항산화 및 항염증 효과)

  • Kim, Tae-Hoon;Cho, Hyun-Jin;Park, Sun-Dong
    • Herbal Formula Science
    • /
    • v.20 no.2
    • /
    • pp.65-82
    • /
    • 2012
  • Objectives : The aim of this study was verification of the anti-oxidative and anti-inflammatory effects of Odukhwan(ODH) and Sasinhwan(SSH) in mouse macrophage, RAW264.7 cells. Methods : To investigate the anti-oxidative effect and scavenging activities of DPPH radical, superoxide anions, nitric oxide and peroxynitrite were measured. Cytotoxic activity of extract of ODH and SSH on RAW264.7 cells was measured using MTS assay. To proof the reductive activity of intracellular oxidation, DCFH-DA assay was performed. The nitric oxide(NO) production was measured and pro-inflammatory cytokines and $PGE_2$ were measured by ELISA kit. The levels of inducible nitric oxide synthase(iNOS), cyclooxygenase-2(COX-2) and nuclear NF-${\kappa}B$ p65 expression were detected by western blot. Results : After those analyses, we bring to a conclusion as follows. Both herbal formulations scavenged DPPH radical and nitric oxide. But ODH had no scavenging activity of superoxide anions and SSH had low scavenging activity in peroxynitrite. And the results indicated that ODH and SSH inhibited the LPS-induced NO, $PGE_2$ production and iNOS, COX-2 expression accompanied by an attenuation of IL-$1{\beta}$ and IL-6 production in RAW264.7 cells. They also have suppression effects of LPS-induced NF-${\kappa}B$ activation. Conclusions : ODH and SSH have anti-oxidative and anti-inflammatory effects and they may be a part of database for development of new anti-oxidative and anti-inflammatory drugs.

A Comparative Study on International Convention and National Legislation Relating to the Liability of the Air Carrier

  • Lee, Kang-Bin
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.40
    • /
    • pp.97-144
    • /
    • 2008
  • The purpose of this paper is to review the text of national legislation relating to the carrier's liability in respect of the carriage of passengers, baggage and cargo by air in major states such as United Kingdom, Germany, France, Canada, Russia and China, and to compare the air carrier's liability under the national legislations of above states with them under the Warsaw System relating to the international carriage by air. Also this paper reviews the text of the draft legislation relating to the carrier's liability in respect of the carriage by air in Korea. The Warsaw Convention for the Unification of Certain Rules Relating to International Carriage was adopted in 1929. In 1999, the ICAO adopted the Montreal Convention for the Unification of Certain Rules for International Carriage by Air vastly modernizing the unification of private air law. The Montreal Convention replaced the instruments of the “Warsaw System”, and came into force on 4 November 2003. The Montreal Convention is not only an international convention. It has also exercised a considerable influence on national legislation. A the Convention, or certain of its principles, with the object of regulating their national air transport. The main feature of the liability regime of the air carrier under the Montreal Convention is the two-tier liability system for death or injury of the passenger with strict liability up to 100,000 SDR and presumptive liability with a reversed burden of proof without any limit above that threshold. The principles of the liability of the air carrier under the Montreal Convention have been adopted into national legislations by the United Kingdom, Germany, France, Canada, Russia and China. Now the Ministry of Justice of Korea is proceeding to make a new national legislation relating to the liability of the air carrier in respect of the carriage by air. The draft legislation of the Part VI the Carriage by Air of the Commercial Code of Korea has adopted the main principles of the liability of the air carrier under the Montreal Convention. In conclusion, the national legislation relating to the liability of the air carrier in Korea will contribute to settle efficiently the dispute on the carrier's liability in respect of the carriage of passengers, baggage and cargo by air.

  • PDF

An Empirical Study on the Competition Factor Electronic Logistics Information and International Logistics Management (국제물류관리와 전자적물류정보의 경쟁요인에 관한 실증연구)

  • Kwak, Hyun
    • International Commerce and Information Review
    • /
    • v.9 no.2
    • /
    • pp.257-283
    • /
    • 2007
  • As Global industrial structure is diversified, multinational corporations accomplished fast internationalization to introduction of new management policy by development of an IT technology. Enterprise' business environment is changing transcending border. To overcome raging waves of change accident and to be secured enterprise's future, the logistics is recognized the third profit source joining in curtailment of sale enlargement, production cost. To seek cost saving or reform in logistics class that is last area of pursuit of profits within ancient city life in the fast lane from these viewpoint, importance of study that integrates and manages international logistics bases supply neck walk is emphasized. Specially, to meet on in terms of competitive power security regarding curtailment of logistics cost is available through link between logistics bases, various consumer's request, merchandise and service logistics management that supply fixed quantity as is reliable in right place at good season was embossed by point game plan of business management, and SCM efficiency anger of mortification international logistics activity importance of study that see at that dominate competitive advantage point bring. This study analyzes interrelation and presents model for integration of international logistics bases supply network with supply network habit at factor and supply chain, and supply network activity in integration of supply chain process and production. Also, it establishes following method of study to achieve study purpose for actual proof analysis for integration sequence of international logistics bases supply network. Specially, immersion of network and supply network, very high interrelation appeared by thing which is with international logistics base supply network integration. The integration of international logistics base supply network means that the enterprises which give trust and sincerity deal with market environment change positively and can decide proceeding of various cooperative work. Also, it means the possibility by necessity of cooperative relation and interdependence to continuous immersion and normative immersion, for the maintain of long business relations.

  • PDF

Reasoning through scheme (도형에 의한 추론 (Schematic Reasoning) : 통시적 사례 연구)

  • Cheong, Kye-Seop
    • Journal for History of Mathematics
    • /
    • v.19 no.4
    • /
    • pp.63-80
    • /
    • 2006
  • Along with natural and algebraic languages, schema is a fundamental component of mathematical language. The principal purpose of this present study is to focus on this point in detail. Schema was already in use during Pythagoras' lifetime for making geometrical inferences. It was no different in the case of Oriental mathematics, where traces have been found from time to time in ancient Chinese documents. In schma an idea is transformed into something conceptual through the use of perceptive images. It's heuristic value lies in that it facilitates problem solution by appealing directly to intuition. Furthermore, introducing schema is very effective from an educational point of view. However we should keep in mind that proof is not replaceable by it. In this study, various schemata will be presented from a diachronic point of view, We will show with emaples from the theory of categories, Feynman's diagram, and argand's plane, that schema is an indispensable tool for constructing new knowledge.

  • PDF

A Study on Personalized Search System Based on Subject Classification (주제분류 기반의 개인화 검색시스템에 관한 연구)

  • Kim, Kwang-Young;Kwak, Seung-Jin
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.45 no.4
    • /
    • pp.77-102
    • /
    • 2011
  • The purpose of this study is to design, implement and evaluate a personalized search system using gathered information on users to provide more accurate search results. For this purpose, a hybrid-based user profile is constructed by using subject classification. In order to evaluate the performance of the proposed system, experts directly measured and evaluated MRR, MAP and usability by using the Korean journal articles of science and technology DB. Its performance was better than the general search system in the area of "Computer Science" and "Library and Information Science". Especially better results were shown when tested on ambiguous keywords. Evaluation through in-depth interviews proved that the proposed personalized search system was more efficient in looking up and obtaining information. In addition, the proposed personalized search system provided a variety of recommendation systems which proved helpful in navigating for new information. High user satisfaction ratings on the proposed personalized search system were another proof of its usefulness. In this study, we were able to prove through expert evaluation that the proposed personalized search system was more efficient in information retrieval.

Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model

  • Xie, Dong;Peng, HaiPeng;Li, Lixiang;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2427-2445
    • /
    • 2016
  • In contrast to traditional "store-and-forward" routing mechanisms, network coding offers an elegant solution for achieving maximum network throughput. The core idea is that intermediate network nodes linearly combine received data packets so that the destination nodes can decode original files from some authenticated packets. Although network coding has many advantages, especially in wireless sensor network and peer-to-peer network, the encoding mechanism of intermediate nodes also results in some additional security issues. For a powerful adversary who can control arbitrary number of malicious network nodes and can eavesdrop on the entire network, cryptographic signature schemes provide undeniable authentication mechanisms for network nodes. However, with the development of quantum technologies, some existing network coding signature schemes based on some traditional number-theoretic primitives vulnerable to quantum cryptanalysis. In this paper we first present an efficient network coding signature scheme in the standard model using lattice theory, which can be viewed as the most promising tool for designing post-quantum cryptographic protocols. In the security proof, we propose a new method for generating a random lattice and the corresponding trapdoor, which may be used in other cryptographic protocols. Our scheme has many advantages, such as supporting multi-source networks, low computational complexity and low communication overhead.

How to Acquire the Evidence Capability of Video Images Taken by Drone (드론으로 촬영한 영상물의 증거능력 확보방안)

  • Kim, Yong-Jin;Song, Jae-Keun;Lee, Gyu-An
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.1
    • /
    • pp.163-168
    • /
    • 2018
  • With the advent of the fourth industrial revolution era, the use of drone has been progressing rapidly in various fields. Now the drones will be used extensively in the area of investigation. Until now the criminal photographs stayed in 2D digital images, it would be possible to reproduce not only 3D images but also make a crime scene with 3D printer. Firstly, the video images taken by the investigation agency using the drones are digital image evidence, and the requirements for securing the evidence capability are not different from the conditions for obtaining the proof of digital evidence. However, when the drones become a new area of scientific investigation, it is essential to systematize the authenticity of the images taken by the drones so that they can be used as evidence. In this paper, I propose a method to secure the evidence capability of digital images taken by drone.

A Security Analysis of Zhao and Gu's Key Exchange Protocol (Zhao와 Gu가 제안한 키 교환 프로토콜의 안전성 분석)

  • Nam, Jung-Hyun;Paik, Ju-Ryon;Lee, Young-Sook;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.9
    • /
    • pp.91-101
    • /
    • 2012
  • Key exchange protocols are essential for building a secure communication channel over an insecure open network. In particular, password-based key exchange protocols are designed to work when user authentication is done via the use of passwords. But, passwords are easy for human beings to remember, but are low entropy and thus are subject to dictionary attacks. Recently, Zhao and Gu proposed a new server-aided protocol for password-based key exchange. Zhao and Gu's protocol was claimed to be provably secure in a formal adversarial model which captures the notion of leakage of ephemeral secret keys. In this paper, we mount a replay attack on Zhao and Gu's protocol and thereby show that unlike the claim of provable security, the protocol is not secure against leakage of ephemeral secret keys. Our result implies that Zhao and Gu's proof of security for the protocol is invalid.

A study on the construction in the Housing of Yuhoedang Kwon Yie Jin - A subject of Daejeon Musudong Andong Kwon's Chongga - (유회당 권이진 주택의 조영에 관한 연구 -대전 무수동 안동권씨 종가를 대상으로-)

  • Lee, Dong-Young
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.13 no.3
    • /
    • pp.125-132
    • /
    • 2011
  • By this time the main tendency of studying traditional residential building was to find out and analyze the regional and spacial peculiarity. But that kind of study has been set limits in terms of including each building into one category and being researched by the viewpoint of an observers rather than a resident. Due to this kind of problem, the outcome of that study didn't obtain good results. This study, which has synthetically not been investigated until now, have put a little more deep interpretation on traditional residential building, by surveying Andong Kwon family's Yuhoedang-Chongga located 299 Musudong Daejon. The purpose of this study is to investigate the characteristic of construction in the architecture of Yuhoedang-Chongga of the Andong Kwon family, and to develop the viewpoint and analytic process of traditional construction. As the first step to study it efficiently, basic architectural investigation on Yuhoedang-Chongga has been carried out with an actual evidence, and the new viewpoint of traditional residential building has been developed by this survey such as collecting, arranging, analyzing and examining this positive proof. For example, from the house-picture book handed down from that family, the condition of then established was compared with the present state of it. And then this article examines the arrangement, floor-plan types, interior, structures and condition of location. The transition-history of this house was searched into, and the development process of this was examined. The related documents was synthetically analyzed, so the characteristics of this construction was grasped.

Development of a New Personal Magnetic Field Exposure Estimation Method for Use in Epidemiological EMF Surveys among Children under 17 Years of Age

  • Yang, Kwang-Ho;Ju, Mun-No;Myung, Sung-Ho;Shin, Koo-Yong;Hwang, Gi-Hyun;Park, June-Ho
    • Journal of Electrical Engineering and Technology
    • /
    • v.7 no.3
    • /
    • pp.376-383
    • /
    • 2012
  • A number of scientific researches are currently being conducted on the potential health hazards of power frequency electric and magnetic field (EMF). There exists a non-objective and psychological belief that they are harmful, although no scientific and objective proof of such exists. This possible health risk from ELF magnetic field (MF) exposure, especially for children under 17 years of age, is currently one of Korea's most highly contested social issues. Therefore, to assess the magnetic field exposure levels of those children in their general living environments, the personal MF exposure levels of 436 subjects were measured for about 6 years using government funding. Using the measured database, estimation formulas were developed to predict personal MF exposure levels. These formulas can serve as valuable tools in estimating 24-hour personal MF exposure levels without directly measuring the exposure. Three types of estimation formulas were developed by applying evolutionary computation methods such as genetic algorithm (GA) and genetic programming (GP). After tuning the database, the final three formulas with the smallest estimation error were selected, where the target estimation error was approximately 0.03 ${\mu}T$. The seven parameters of each of these three formulas are gender (G), age (A), house type (H), house size (HS), distance between the subject's residence and a power line (RD), power line voltage class (KV), and the usage conditions of electric appliances (RULE).