• Title/Summary/Keyword: open via

Search Result 676, Processing Time 0.031 seconds

The Change of a Network Structure in the Regional Business Ecosystem through RIS (지역연고사업(RIS)을 통한 지역 중소기업 생태계의 네트워크 구조변화 연구)

  • Shin, Yong-Wook;Park, Sang Hyeok
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.3
    • /
    • pp.77-84
    • /
    • 2013
  • In this paper, we focus the changing role of universities of University-Industry Collaboration (UIC) for enriching the regional business ecosystem network. For this research, we analyze 'Regional Innovation System(RIS)' - a specific UIC program- which provides a marketing service for firms, especially, SMEs with a specific problem by a group of consultants including CEOs, professors, and heads of regional public or private service providers. Then we have analyzed using network analysis how the business network was changed from RIS. Moreover, we will interview the participants in the important position of the network and investigate the reason for bringing a change in the network structure by using this program. This study illustrates that various types of network are formed between university and SMEs. Furthermore, the networks surrounding SMEs are extended to the other people connected to them. This means that the business network of SMEs had been diversified via the facilitation of university. This study throws new highlights on the new role for the university as a network promoter in addition to the partner as a technology-provider in the regional business ecosystem. Moreover, the network analysis between before-and-after can be used for the evaluation of the effectiveness of the various UIC programs.

  • PDF

Visualized recommender system based on Freebase (Freebase 기반의 추천 시스템 시각화)

  • Hong, Myung-Duk;Ha, Inay;Jo, Geun-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.10
    • /
    • pp.23-37
    • /
    • 2013
  • In this paper, the proposed movie recommender system constructs trust network, which is similar to social network, using user's trust information that users explicitly present. Recommendation on items is performed by using relation degree between users and information of recommended item is provided by a visualization method. We discover the hidden relationships via the constructed trust network. To provide visualized recommendation information, we employ Freebase which is large knowledge base supporting information such as movie, music, and people in structured format. We provide three visualization methods as the followings: i) visualization based on movie posters with the number of movies that user required. ii) visualization on extra information such as director, actor and genre and so on when user selected a movie from recommendation list. iii) visualization based on movie posters that is recommended by neighbors who a user selects from trust network. The proposed system considers user's social relations and provides visualization which can reflect user's requirements. Using the visualization methods, user can reach right decision making on items. Furthermore, the proposed system reflects the user's opinion through recommendation visualization methods and can provide rich information to users through LOD(Linked Open Data) Cloud such as Freebase, LinkedMDB and Wikipedia and so on.

Converting Panax ginseng DNA and chemical fingerprints into two-dimensional barcode

  • Cai, Yong;Li, Peng;Li, Xi-Wen;Zhao, Jing;Chen, Hai;Yang, Qing;Hu, Hao
    • Journal of Ginseng Research
    • /
    • v.41 no.3
    • /
    • pp.339-346
    • /
    • 2017
  • Background: In this study, we investigated how to convert the Panax ginseng DNA sequence code and chemical fingerprints into a two-dimensional code. In order to improve the compression efficiency, GATC2Bytes and digital merger compression algorithms are proposed. Methods: HPLC chemical fingerprint data of 10 groups of P. ginseng from Northeast China and the internal transcribed spacer 2 (ITS2) sequence code as the DNA sequence code were ready for conversion. In order to convert such data into a two-dimensional code, the following six steps were performed: First, the chemical fingerprint characteristic data sets were obtained through the inflection filtering algorithm. Second, precompression processing of such data sets is undertaken. Third, precompression processing was undertaken with the P. ginseng DNA (ITS2) sequence codes. Fourth, the precompressed chemical fingerprint data and the DNA (ITS2) sequence code were combined in accordance with the set data format. Such combined data can be compressed by Zlib, an open source data compression algorithm. Finally, the compressed data generated a two-dimensional code called a quick response code (QR code). Results: Through the abovementioned converting process, it can be found that the number of bytes needed for storing P. ginseng chemical fingerprints and its DNA (ITS2) sequence code can be greatly reduced. After GTCA2Bytes algorithm processing, the ITS2 compression rate reaches 75% and the chemical fingerprint compression rate exceeds 99.65% via filtration and digital merger compression algorithm processing. Therefore, the overall compression ratio even exceeds 99.36%. The capacity of the formed QR code is around 0.5k, which can easily and successfully be read and identified by any smartphone. Conclusion: P. ginseng chemical fingerprints and its DNA (ITS2) sequence code can form a QR code after data processing, and therefore the QR code can be a perfect carrier of the authenticity and quality of P. ginseng information. This study provides a theoretical basis for the development of a quality traceability system of traditional Chinese medicine based on a two-dimensional code.

A Study on Communication Safety and Evaluation Tool in Railway Communication System (열차제어시스템 통신 안정성 및 평가 도구 연구)

  • Kim, Sung-Un;Seo, Sang-Bo;Song, Seung-Mi;Jo, Chan-Hyo;Hwang, Jong-Gyu;Jo, Hyun-Jeong
    • Journal of the Korean Society for Railway
    • /
    • v.11 no.4
    • /
    • pp.349-356
    • /
    • 2008
  • Put Safety-critical systems related to the railway communications are currently undergoing changes. Mechanical and electro-mechanical devices are being replaced by programmable electronics that are often controlled remotely via communication networks. Therefore designers and operators now not only have to contend with component failures and user errors, but also with the possibility that malicious entities are seeking to disrupt the services provided by theirs systems. Recognizing the safety-critical nature of the types of communications required in rail control operations, the communications infrastructure will be required to meet a number of safety requirements such as system faults, user errors and the robustness in the presence of malicious attackers who are willing to take determined action to interfere in the correct operation of a system. This paper discusses the safety strategies employed in the railway communications and proposes a security mechanism for Korean railway communication system. We present the developed communication safety evaluation tool based on the proposed security mechanism and also evaluate its protecting capability against the threats of masquerading, eavesdropping, and unauthorized message manipulation.

A study on the causes of the dislikes of elementary school students regarding Practical Arts classes (초등학교 실과수업 기피요인에 대한 연구)

  • Yu, Nan-Sook
    • Journal of Korean Home Economics Education Association
    • /
    • v.24 no.2
    • /
    • pp.1-15
    • /
    • 2012
  • This study investigated the causes of the dislikes of Practical Arts education of elementary school students. This study was to provide the foundation for the proposition of alternative plans to make more students participate pleasantly and actively in Practical Arts classes. Data were collected via an open-ended survey from 273 elementary school students and through telephone interviews with five elementary school teachers. The data were analyzed inductively by NVivo. After the analysis of the student data, the analysis of the teacher data was conducted according to the variables from the student data. The results of this research were as follows: First, with regard to the causes of the students' dislikes of Practical Arts classes, extrinsic factors such as instruction management, instruction content, teaching facilities and equipment, and teacher characteristics were elicited. Intrinsic factors included complaints about failing to meet students' expectation from Practical Arts, negative perception of Practical Arts, the interest, competency, and fear of the students. Secondly, the students who learned Practical Arts from the Practical Arts specialty teachers gave more answers on instruction management, instruction content, and teacher characteristics than the students who learned Practical Arts from their homeroom teachers did. The students who learned Practical Arts from their homeroom teachers answered that they disliked Practical Arts because of lack of lab facilities and practice than their counterparts did. The analyses of teacher data provided the reasons and contexts of the dislikes of the students such as teaching facilities and equipment, and the anxiety of the students.

  • PDF

Implementation of a Static Analyzer for Detecting the PHP File Inclusion Vulnerabilities (PHP 파일 삽입 취약성 검사를 위한 정적 분석기의 구현)

  • Ahn, Joon-Seon;Lim, Seong-Chae
    • The KIPS Transactions:PartA
    • /
    • v.18A no.5
    • /
    • pp.193-204
    • /
    • 2011
  • Since web applications are accessed by anonymous users via web, more security risks are imposed on those applications. In particular, because security vulnerabilities caused by insecure source codes cannot be properly handled by the system-level security system such as the intrusion detection system, it is necessary to eliminate such problems in advance. In this paper, to enhance the security of web applications, we develop a static analyzer for detecting the well-known security vulnerability of PHP file inclusion vulnerability. Using a semantic based static analysis, our vulnerability analyzer guarantees the soundness of the vulnerability detection and imposes no runtime overhead, differently from the other approaches such as the penetration test method and the application firewall method. For this end, our analyzer adopts abstract interpretation framework and uses an abstract analysis domain designed for the detection of the target vulnerability in PHP programs. Thus, our analyzer can efficiently analyze complicated data-flow relations in PHP programs caused by extensive usage of string data. The analysis results can be browsed using a JAVA GUI tool and the memory states and variable values at vulnerable program points can also be checked. To show the correctness and practicability of our analyzer, we analyzed the source codes of open PHP applications using the analyzer. Our experimental results show that our analyzer has practical performance in analysis capability and execution time.

Evaluation of Effective Dose and Exposure Levels of Radon in Office and Plant Buildings (일부 제조업 사업장의 사무 및 공장동에서의 라돈농도 수준 및 유효선량 평가)

  • Chung, Eun Kyo;Kim, Ki Woong
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.27 no.1
    • /
    • pp.38-45
    • /
    • 2017
  • Objectives: Radon may be second only to smoking as a cause of lung cancer. Radon is a colorless, tasteless radioactive gas that is formed via the radioactive decay of radium. Therefore, radon levels can build up based on the amount of radium contained in construction materials such as phospho-gypsum board or when ventilation rates are low. This study provides our findings from evaluation of radon gas at facilities and offices in an industrial complex. Methods: We evaluated the office rooms and processes of 12 manufacturing factories from May 14, 2014 to September 23, 2014. Short-term data were measured by using real-time monitoring detectors(Model 1030, Sun Nuclear Co., USA) indoors in the office buildings. The radon measurements were recorded at 30-minute intervals over approximately 48 hours. The limit of detection of this instrument is $3.7Bq/m^3$. Also, long-term data were measured by using ${\alpha}-track$ radon detectors(${\alpha}-track$, Rn-tech Co., Korea) in the office and factory buildings. Our detectors were exposed for over 90 days, resulting in a minimum detectable concentration of $7.4Bq/m^3$. Detectors were placed 150-220 cm above the floor. Results: Radon concentrations averaged $20.6{\pm}17.0Bq/m^3$($3.7-115.8Bq/m^3$) in the overall area. The monthly mean concentration of radon by building materials were in the order of gypsum>concrete>cement. Radon concentrations were measured using ${\alpha}-track$ in parallel with direct-reading radon detectors and the two metric methods for radon monitoring were compared. A t-test for the two sampling methods showed that there is no difference between the average radon concentrations(p<0.05). Most of the office buildings did not have central air-conditioning, but several rooms had window- or ceiling-mounted units. Employees could also open windows. The first, second and third floors were used mainly for office work. Conclusions: Radon levels measured during this assessment in the office rooms of buildings and processes in factories were well below the ICRP reference level of $1,000Bq/m^3$ for workplaces and also below the lower USEPA residential guideline of $148Bq/m^3$. The range of indoor annual effective dose due to radon exposure for workers working in the office and factory buildings was 0.01 to 1.45 mSv/yr. Construction materials such as phospho-gypsum board, concrete and cement were the main emission sources for workers' exposure.

Four Novel Synthetic Tryptamine Analogs Induce Head-Twitch Responses and Increase 5-HTR2a in the Prefrontal Cortex in Mice

  • Abiero, Arvie;Ryu, In Soo;Botanas, Chrislean Jun;Custodio, Raly James Perez;Sayson, Leandro Val;Kim, Mikyung;Lee, Hyun Jun;Kim, Hee Jin;Seo, Joung-Wook;Cho, Min Chang;Lee, Kun Won;Yoo, Sung Yeun;Jang, Choon-Gon;Lee, Yong Sup;Cheong, Jae Hoon
    • Biomolecules & Therapeutics
    • /
    • v.28 no.1
    • /
    • pp.83-91
    • /
    • 2020
  • Tryptamines are monoamine alkaloids with hallucinogenic properties and are widely abused worldwide. To hasten the regulations of novel substances and predict their abuse potential, we designed and synthesized four novel synthetic tryptamine analogs: Pyrrolidino tryptamine hydrochloride (PYT HCl), Piperidino tryptamine hydrochloride (PIT HCl), N,N-dibutyl tryptamine hydrochloride (DBT HCl), and 2-Methyl tryptamine hydrochloride (2-MT HCl). Then, we evaluated their rewarding and reinforcing effects using the conditioned place preference (CPP) and self-administration (SA) paradigms. We conducted an open field test (OFT) to determine the effects of the novel compounds on locomotor activity. A head-twitch response (HTR) was also performed to characterize their hallucinogenic properties. Lastly, we examined the effects of the compounds on 5-HTR1a and 5-HTR2a in the prefrontal cortex using a quantitative real-time polymerase chain reaction (qRT-PCR) assay. None of the compounds induced CPP in mice or initiated SA in rats. PYT HCl and PIT HCl reduced the locomotor activity and elevated the 5-HTR1a mRNA levels in mice. Acute and repeated treatment with the novel tryptamines elicited HTR in mice. Furthermore, a drug challenge involving a 7-day abstinence from drug use produced higher HTR than acute and repeated treatments. Both the acute treatment and drug challenge increased the 5-HTR2a mRNA levels. Ketanserin blocked the induced HTR. Taken together, the findings suggest that PYT HCl, PIT HCl, DBT HCl, and 2-MT HCl produce hallucinogenic effects via 5-HTR2a stimulation, but may have low abuse potential.

A Study on security characteristics and vulnerabilities of BAS(Building Automation System) (BAS의 보안 특성 및 취약점에 관한 연구)

  • Choi, Yeon-Suk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.669-676
    • /
    • 2017
  • Recently, due to the importance of information security, security vulnerability analysis and various information protection technologies and security systems are being introduced as a countermeasure against cyber-attacks in new as well as existing buildings, and information security studies on high-rise buildings are also being conducted. However, security system introduction and research are generally performed from the viewpoint of general IT systems and security policies, so there is little consideration of the infrastructure of the building. In particular, the BAS or building infrastructure, is a closed system, unlike typical IT systems, but has unique structural features that accommodate open functions. Insufficient understanding of these system structures and functions when establishing a building security policy makes the information security policies for the BAS vulnerable and increases the likelihood that all of the components of the building will be exposed to malicious cyber-attacks via the BAS. In this paper, we propose an architecture reference model that integrates three different levels of BAS structure (from?) different vendors. The architectures derived from this study and the security characteristics and vulnerabilities at each level will contribute to the establishment of security policies that reflect the characteristics of the BAS and the improvement of the safety management of buildings.

Metabolizable energy requirement for maintenance estimated by regression analysis of body weight gain or metabolizable energy intake in growing pigs

  • Liu, Hu;Chen, Yifan;Li, Zhongchao;Li, Yakui;Lai, Changhua;Piao, Xiangshu;van Milgen, Jaap;Wang, Fenglai
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.32 no.9
    • /
    • pp.1397-1406
    • /
    • 2019
  • Objective: Feed energy required for pigs is first prioritized to meet maintenance costs. Additional energy intake in excess of the energy requirement for maintenance is retained as protein and fat in the body, leading to weight gain. The objective of this study was to estimate the metabolizable energy requirements for maintenance ($ME_m$) by regressing body weight (BW) gain against metabolizable energy intake (MEI) in growing pigs. Methods: Thirty-six growing pigs ($26.3{\pm}1.7kg$) were allotted to 1 of 6 treatments with 6 replicates per treatment in a randomized complete block design. Treatments were 6 feeding levels which were calculated as 50%, 60%, 70%, 80%, 90%, or 100% of the estimated ad libitum MEI ($2,400kJ/kg\;BW^{0.60}\;d$). All pigs were individually housed in metabolism crates for 30 d and weighed every 5 d. Moreover, each pig from each treatment was placed in the open-circuit respiration chambers to measure heat production (HP) and energy retained as protein ($RE_p$) and fat ($RE_f$) every 5 d. Serum biochemical parameters of pigs were analyzed at the end of the experiment. Results: The average daily gain (ADG) and HP as well as the $RE_p$ and $RE_f$ linearly increased with increasing feed intake (p<0.010). ${\beta}$-hydroxybutyrate concentration of serum tended to increase with increasing feed intake (p = 0.080). The regression equations of MEI on ADG were MEI, $kJ/kg\;BW^{0.60}\;d=1.88{\times}ADG$, g/d+782 ($R^2=0.86$) and $ME_m$ was estimated at $782kJ/kg\;BW^{0.60}\;d$. Protein retention of growing pigs would be positive while REf would be negative at this feeding level via regression equations of $RE_p$ and $RE_f$ on MEI. Conclusion: The $ME_m$ was estimated at $782kJ/kg\;BW^{0.60}\;d$ in current experiment. Furthermore, growing pigs will deposit protein and oxidize fat if provided feed at the estimated maintenance level.