• Title/Summary/Keyword: system-identification methods

Search Result 937, Processing Time 0.038 seconds

Function of the Korean String Indexing System for the Subject Catalog (주제목록을 위한 한국용어열색인 시스템의 기능)

  • Yoon Kooho
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.15
    • /
    • pp.225-266
    • /
    • 1988
  • Various theories and techniques for the subject catalog have been developed since Charles Ammi Cutter first tried to formulate rules for the construction of subject headings in 1876. However, they do not seem to be appropriate to Korean language because the syntax and semantics of Korean language are different from those of English and other European languages. This study therefore attempts to develop a new Korean subject indexing system, namely Korean String Indexing System(KOSIS), in order to increase the use of subject catalogs. For this purpose, advantages and disadvantages between the classed subject catalog nd the alphabetical subject catalog, which are typical subject ca-alogs in libraries, are investigated, and most of remarkable subject indexing systems, in particular the PRECIS developed by the British National Bibliography, are reviewed and analysed. KOSIS is a string indexing based on purely the syntax and semantics of Korean language, even though considerable principles of PRECIS are applied to it. The outlines of KOSIS are as follows: 1) KOSIS is based on the fundamentals of natural language and an ingenious conjunction of human indexing skills and computer capabilities. 2) KOSIS is. 3 string indexing based on the 'principle of context-dependency.' A string of terms organized accoding to his principle shows remarkable affinity with certain patterns of words in ordinary discourse. From that point onward, natural language rather than classificatory terms become the basic model for indexing schemes. 3) KOSIS uses 24 role operators. One or more operators should be allocated to the index string, which is organized manually by the indexer's intellectual work, in order to establish the most explicit syntactic relationship of index terms. 4) Traditionally, a single -line entry format is used in which a subject heading or index entry is presented as a single sequence of words, consisting of the entry terms, plus, in some cases, an extra qualifying term or phrase. But KOSIS employs a two-line entry format which contains three basic positions for the production of index entries. The 'lead' serves as the user's access point, the 'display' contains those terms which are themselves context dependent on the lead, 'qualifier' sets the lead term into its wider context. 5) Each of the KOSIS entries is co-extensive with the initial subject statement prepared by the indexer, since it displays all the subject specificities. Compound terms are always presented in their natural language order. Inverted headings are not produced in KOSIS. Consequently, the precision ratio of information retrieval can be increased. 6) KOSIS uses 5 relational codes for the system of references among semantically related terms. Semantically related terms are handled by a different set of routines, leading to the production of 'See' and 'See also' references. 7) KOSIS was riginally developed for a classified catalog system which requires a subject index, that is an index -which 'trans-lates' subject index, that is, an index which 'translates' subjects expressed in natural language into the appropriate classification numbers. However, KOSIS can also be us d for a dictionary catalog system. Accordingly, KOSIS strings can be manipulated to produce either appropriate subject indexes for a classified catalog system, or acceptable subject headings for a dictionary catalog system. 8) KOSIS is able to maintain a constistency of index entries and cross references by means of a routine identification of the established index strings and reference system. For this purpose, an individual Subject Indicator Number and Reference Indicator Number is allocated to each new index strings and new index terms, respectively. can produce all the index entries, cross references, and authority cards by means of either manual or mechanical methods. Thus, detailed algorithms for the machine-production of various outputs are provided for the institutions which can use computer facilities.

  • PDF

Perspective on Rapid and Selective Method for Detecting Microbiology in Dairy Industry: A Review (낙농산업에 필요한 미생물 검사방법과 전망: 총설)

  • Chon, Jung-Whan;Kim, Hyun-Sook;Kim, Hong-Seok;Kim, Dong-Hyeon;Song, Kwang-Young;Yim, Jin-Hyuk;Choi, Dasom;Lim, Jong-Soo;Jeong, Dong-Gwan;Kim, Soo-Ki;Seo, Kun-Ho
    • Journal of Dairy Science and Biotechnology
    • /
    • v.33 no.2
    • /
    • pp.119-127
    • /
    • 2015
  • To date, detection of microbial populations in dairy products has been performed using culture media, which is a time-consuming and laborious method. The recently developed chromogenic media could be more rapid and specific than classical culture media. However, the newly developed molecular-based technology can detect microbial populations with greater rapidity and sensitivity than the classical method involving culture media and chromogenic media. This molecular-based technology could provide various options for monitoring the characterization of different states of bacteria and cells. Thus, it could help upgrade the processing system of the dairy industry so as to maintain the safety and quality of dairy foods. Among the various newly developed molecular-based technologies, flow cytometry can potentially be used for monitoring microbiological populations in the dairy industry if official international standards are available for this purpose. When omics technology would have biomarker identification, it could be regarded as the rapid and sensitive analytical methods. Methods based on PCR, which has become a basic technique in microbiological research, can be developed and validated as alternative methods for quantification of dairy microorganisms. This review discusses methods for monitoring microbiological populations in dairy foods and the limitations of these studies, as well as the need for further research on such methods in the dairy industry.

  • PDF

A Study on the Proposal for Training of the Trade Experts to Promote Export of Domestic Companies (내수기업 수출활성화를 위한 무역전문인력 양성 방안에 대한 연구)

  • KANG, Ho-Yeon;JEONG, Yoon Say
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.78
    • /
    • pp.93-117
    • /
    • 2018
  • In all countries of the world, the development of trade is an important factor for the survival of the national economy. Increased export will lead to national economic growth. Export is directly linked to employment, and the industrial structure will be developed in the direction to produce products of comparative advantages. Therefore, every country around the world is trying to promote export regardless of the size of its economy. Accordingly, this paper focused on the promotion of export of domestic companies. It proposed to cultivate trade experts to promote export of domestic companies. The following five methods were proposed to materialize the proposal. First, it is important to foster trade experts to expand and foster the one-person creative companies. In particular, it is important to develop a professional education curriculum. It is necessary to design and conduct a systematic curriculum throughout the process including follow-up after education such as teaching detailed procedures for establishing a trade business, identification of relevant regulations and related organizations, understanding of special features of each exporting country, and details of exporting procedures through specialist training for the individual industries, helping themto keep their network steady so that they can easily get help from consultants. Second, it is necessary to educate traders working in the field to make them trade experts and utilize themin on-the-job training and consulting. To do this, it is necessary to introduce systematic consultant selection process, and to introduce a systemto educate and manage them. It is because, we must select the most appropriate candidates, educate themto be lecturers and consultants, and dispatch themto the field, in order to make the best achievement in export. Nurturing trading professionals utilizing the current trading workers to activate export of domestic companies can be more efficient through cooperation of trading education agencies and related agencies in various industries. Third, it is also proposed to cultivate female trade experts by educating female trade workers whose career has been disrupted. It is to provide career disrupted women with opportunities to work after training them as trade professionals and to give manpower pool to domestic companies that are preparing for export. Fourth, it is also proposed to educate foreign students living in Korea to be trading experts and to utilize them as trading infra. They can be trading professionals who will contribute to the promotion of export. In the short term, they will be provided with opportunities for employment and start-upin the field of trade, and in the mid- to long-term, they may develop a business network between Korea and their own countries. To this end, we need to improve the visa system, expand free trade education opportunities, and support them so that they can establish small but strong enterprises. Fifth, it is proposed to proactively expand trade education to specialized high school students. Considering that most of domestic companies pursuing activation of export are small but strong companies or small and mediumsized companies, they may prefer high school graduates rather than university graduates because of financial limitations. Besides, the specialized high school students may occupy better position in the job market if they are equipped with expertise in trading. This study can be meaningful, in that it is the first research that focuses on cultivating trading experts to contribute to the export activation of domestic companies. However, it also has a limitation that it has failed to reflect the more specific field voices. It is hoped that detailed plans will be derived from the opinions of the employees of domestic companies making efforts to become an export company in the related researches in the future.

  • PDF

APPLICATION OF FUZZY SET THEORY IN SAFEGUARDS

  • Fattah, A.;Nishiwaki, Y.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1051-1054
    • /
    • 1993
  • The International Atomic Energy Agency's Statute in Article III.A.5 allows it“to establish and administer safeguards designed to ensure that special fissionable and other materials, services, equipment, facilities and information made available by the Agency or at its request or under its supervision or control are not used in such a way as to further any military purpose; and to apply safeguards, at the request of the parties, to any bilateral or multilateral arrangement, or at the request of a State, to any of that State's activities in the field of atomic energy”. Safeguards are essentially a technical means of verifying the fulfilment of political obligations undertaken by States and given a legal force in international agreements relating to the peaceful uses of nuclear energy. The main political objectives are: to assure the international community that States are complying with their non-proliferation and other peaceful undertakings; and to deter (a) the diversion of afeguarded nuclear materials to the production of nuclear explosives or for military purposes and (b) the misuse of safeguarded facilities with the aim of producing unsafeguarded nuclear material. It is clear that no international safeguards system can physically prevent diversion. The IAEA safeguards system is basically a verification measure designed to provide assurance in those cases in which diversion has not occurred. Verification is accomplished by two basic means: material accountancy and containment and surveillance measures. Nuclear material accountancy is the fundamental IAEA safeguards mechanism, while containment and surveillance serve as important complementary measures. Material accountancy refers to a collection of measurements and other determinations which enable the State and the Agency to maintain a current picture of the location and movement of nuclear material into and out of material balance areas, i. e. areas where all material entering or leaving is measurab e. A containment measure is one that is designed by taking advantage of structural characteristics, such as containers, tanks or pipes, etc. To establish the physical integrity of an area or item by preventing the undetected movement of nuclear material or equipment. Such measures involve the application of tamper-indicating or surveillance devices. Surveillance refers to both human and instrumental observation aimed at indicating the movement of nuclear material. The verification process consists of three over-lapping elements: (a) Provision by the State of information such as - design information describing nuclear installations; - accounting reports listing nuclear material inventories, receipts and shipments; - documents amplifying and clarifying reports, as applicable; - notification of international transfers of nuclear material. (b) Collection by the IAEA of information through inspection activities such as - verification of design information - examination of records and repo ts - measurement of nuclear material - examination of containment and surveillance measures - follow-up activities in case of unusual findings. (c) Evaluation of the information provided by the State and of that collected by inspectors to determine the completeness, accuracy and validity of the information provided by the State and to resolve any anomalies and discrepancies. To design an effective verification system, one must identify possible ways and means by which nuclear material could be diverted from peaceful uses, including means to conceal such diversions. These theoretical ways and means, which have become known as diversion strategies, are used as one of the basic inputs for the development of safeguards procedures, equipment and instrumentation. For analysis of implementation strategy purposes, it is assumed that non-compliance cannot be excluded a priori and that consequently there is a low but non-zero probability that a diversion could be attempted in all safeguards ituations. An important element of diversion strategies is the identification of various possible diversion paths; the amount, type and location of nuclear material involved, the physical route and conversion of the material that may take place, rate of removal and concealment methods, as appropriate. With regard to the physical route and conversion of nuclear material the following main categories may be considered: - unreported removal of nuclear material from an installation or during transit - unreported introduction of nuclear material into an installation - unreported transfer of nuclear material from one material balance area to another - unreported production of nuclear material, e. g. enrichment of uranium or production of plutonium - undeclared uses of the material within the installation. With respect to the amount of nuclear material that might be diverted in a given time (the diversion rate), the continuum between the following two limiting cases is cons dered: - one significant quantity or more in a short time, often known as abrupt diversion; and - one significant quantity or more per year, for example, by accumulation of smaller amounts each time to add up to a significant quantity over a period of one year, often called protracted diversion. Concealment methods may include: - restriction of access of inspectors - falsification of records, reports and other material balance areas - replacement of nuclear material, e. g. use of dummy objects - falsification of measurements or of their evaluation - interference with IAEA installed equipment.As a result of diversion and its concealment or other actions, anomalies will occur. All reasonable diversion routes, scenarios/strategies and concealment methods have to be taken into account in designing safeguards implementation strategies so as to provide sufficient opportunities for the IAEA to observe such anomalies. The safeguards approach for each facility will make a different use of these procedures, equipment and instrumentation according to the various diversion strategies which could be applicable to that facility and according to the detection and inspection goals which are applied. Postulated pathways sets of scenarios comprise those elements of diversion strategies which might be carried out at a facility or across a State's fuel cycle with declared or undeclared activities. All such factors, however, contain a degree of fuzziness that need a human judgment to make the ultimate conclusion that all material is being used for peaceful purposes. Safeguards has been traditionally based on verification of declared material and facilities using material accountancy as a fundamental measure. The strength of material accountancy is based on the fact that it allows to detect any diversion independent of the diversion route taken. Material accountancy detects a diversion after it actually happened and thus is powerless to physically prevent it and can only deter by the risk of early detection any contemplation by State authorities to carry out a diversion. Recently the IAEA has been faced with new challenges. To deal with these, various measures are being reconsidered to strengthen the safeguards system such as enhanced assessment of the completeness of the State's initial declaration of nuclear material and installations under its jurisdiction enhanced monitoring and analysis of open information and analysis of open information that may indicate inconsistencies with the State's safeguards obligations. Precise information vital for such enhanced assessments and analyses is normally not available or, if available, difficult and expensive collection of information would be necessary. Above all, realistic appraisal of truth needs sound human judgment.

  • PDF

Screening of Antioxidative, Anti-thrombotic and Anti-atherosclerotic Effects of Moutan Root Bark Extracts (Moutan Root Bark가 항산화활성과 LDL 산화 억제 및 항철소판 응접에 미치는 영향)

  • Ban, Chang-Kye;Lee, Min-Ja;Lee, Hye-Sook;Jung, Hyun-Jung;Kim, Hyuck;Kim, Jai-Eun;Park, Sun-Dong;Park, Won-Hwan
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.23 no.1
    • /
    • pp.135-143
    • /
    • 2009
  • There is currently increased interest in the identification of antioxidant compounds that are pharmacologically potent and have low or no side effects. Plants produce significant amounts of antioxidants to prevent the oxidative stress caused by photons and oxygen, therefore they represent a potential source of new compounds with antioxidant activity. Moutan Root Sark (MRS) has been frequently used as analgesic. antispasmodic, anti-inflammatory and remedies for female diseases. In this study. the antioxidant activity of extract from MRS was studied in vitro methods by measuring the antioxidant activity by TEAC, measuring the scavenging effects on reactive oxygen species (ROS) [superoxide anion, hydroxyl radical] and on reactive nitrogen species (RNS) [nitric oxide and peroxynitrite] as well as measuring the inhibitory effect on $Cu^{2+}$ induced human LDL oxidation and the inhibitory effect on collagen induced platelet aggregation. The MRS extracts were found to have a potent scavenging activity, as well as an inhibitory effect on LDL oxidation and on platelet aggregation. In conclusion, the MRS extracts have anti-oxidative and anti-atherosclerotic effects in vitro system, which can be used for developing pharmaceutical drug against oxidative stress and atherosclerosis.

Tautomerism and Alkylation of 5-Amino-2H-1,2,4-thiadiazoline-3-one (5-Amino-2H-1,2,4-thiadiazoline-3-one의 토토머화 현상과 알킬화 반응)

  • Cho, Nam Sook;Park, Young Cheol;Ra, Do Young;Kang, Sungkwon
    • Journal of the Korean Chemical Society
    • /
    • v.39 no.7
    • /
    • pp.564-571
    • /
    • 1995
  • 5-Amino-2H-1,2,4-thiadiazoline-3-one has been prepared from 2-thiobiuret through a oxidative cyclization under basic hydrogen peroxide condition. Lactam-lactim tautomerism of 5-amino-2H-1,2,4-thiadiazoline-3-one has been examined by spectroscopic methods and ab initio molecular orbital calculation. These results were shown that 5-amino-2H-1,2,4-thiadiazoline-3-one exists as lactam form. Reaction conditions for alkylating 5-amino-2H-1,2,4-thiadiazoline-3-one with alkyl halides in the presence of various bases were studied in DMF and $H_2O$-THF two phase system. $Li_2CO_3$ base in DMF method gave best result in this investigation. The alkylation has been taken place at N-2 position. The identification of the product is confirmed by spectral data of IR, $^1H$ NMR and $^13C$ NMR and the comparison of authentic sample, 5-amino-2-methyl-1,2,4-thiadiazolidine-3-one, obtained from the oxidative cyclization of 5-methyl-2-thiobiuret.

  • PDF

Protein target identification of ginsenosides in skeletal muscle tissues: discovery of natural small-molecule activators of muscle-type creatine kinase

  • Chen, Feiyan;Zhu, Kexuan;Chen, Lin;Ouyang, Liufeng;Chen, Cuihua;Gu, Ling;Jiang, Yucui;Wang, Zhongli;Lin, Zixuan;Zhang, Qiang;Shao, Xiao;Dai, Jianguo;Zhao, Yunan
    • Journal of Ginseng Research
    • /
    • v.44 no.3
    • /
    • pp.461-474
    • /
    • 2020
  • Background: Ginseng effectively reduces fatigue in both animal models and clinical trials. However, the mechanism of action is not completely understood, and its molecular targets remain largely unknown. Methods: By screening for proteins that interact with the primary components of ginseng (ginsenosides) in an affinity chromatography assay, we have identified muscle-type creatine kinase (CK-MM) as a potential target in skeletal muscle tissues. Results: Biolayer interferometry analysis showed that ginsenoside metabolites, instead of parent ginsenosides, had direct interaction with recombinant human CK-MM. Subsequently, 20(S)-protopanaxadiol (PPD), which is a ginsenoside metabolite and displayed the strongest interaction with CK-MM in the study, was selected as a representative to confirm direct binding and its biological importance. Biolayer interferometry kinetics analysis and isothermal titration calorimetry assay demonstrated that PPD specifically bound to human CK-MM. Moreover, the mutation of key amino acids predicted by molecular docking decreased the affinity between PPD and CK-MM. The direct binding activated CK-MM activity in vitro and in vivo, which increased the levels of tissue phosphocreatine and strengthened the function of the creatine kinase/phosphocreatine system in skeletal muscle, thus buffering cellular ATP, delaying exercise-induced lactate accumulation, and improving exercise performance in mice. Conclusion: Our results suggest a cellular target and an initiating molecular event by which ginseng reduces fatigue. All these findings indicate PPD as a small molecular activator of CK-MM, which can help in further developing better CK-MM activators based on the dammarane-type triterpenoid structure.

A Study on Security Level-based Authentication for Supporting Multiple Objects in RFID Systems (다중 객체 지원을 위한 RFID 시스템에서 보안 레벨 기반의 인증 기법에 관한 연구)

  • Kim, Ji-Yeon;Jung, Jong-Jin;Jo, Geun-Sik;Lee, Kyoon-Ha
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.1
    • /
    • pp.21-32
    • /
    • 2008
  • RFID systems provide technologies of automatic object identification through wireless communications in invisible ranges and adaptability against various circumstances. These advantages make RFID systems to be applied in various fields of industries and individual life. However, it is difficult to use tags with distinction as tags are increasingly used in life because a tag usually stores only one object identifier in common RFID applications. In addition, RFID systems often make serious violation of privacy caused by various attacks because of their weakness of radio frequency communication. Therefore, information sharing methods among applications are necessary for expansive development of RFID systems. In this paper, we propose efficient RFID scheme. At first, we design a new RFID tag structure which supports many object identifiers of different applications in a tag and allows those applications to access them simultaneously. Secondly, we propose an authentication protocol to support the proposed tag structure. The proposed protocol is designed by considering of robustness against various attacks in low cost RFID systems. Especially, the proposed protocol is focused on efficiency of authentication procedure by considering security levels of applications. In the proposed protocol, each application goes through one of different authentication procedures according to their security levels. Finally, we prove efficiency of th proposed scheme compared with the other schemes through experiments and evaluation.

  • PDF

The Comparison between FSGS and MCNS Using Proteomic Method in Childhood Nephrotic Syndrome; Preliminary Study (단백질체학을 이용하여 국소성 분절성 사구체 경화증과 미세 변화형 신증후군의 비교)

  • Kim, Sung-Do;Cho, Byoung-Soo
    • Childhood Kidney Diseases
    • /
    • v.13 no.2
    • /
    • pp.170-175
    • /
    • 2009
  • Purpose : FSGS do not respond well to any kind of therapy and gradually progress to end-stage renal disease. This study was conducted to investigate the difference of protein expression between MCNS and FSGS as a preliminary study for understanding the pathophysiology of FSGS. Methods : Renal biopsy samples of MCNS and FSGS were obtained, which was diagnosed by one pathologist. They were solubilized with a conventional extraction buffer for protein extraction. The solution was applied on immobilized linear gradient strip gel (pH 4-7) using IPGphor system. Silver staining was carried out according to standard method. Protein identification was done by searching NCBI database using MASCOT Peptide Mass Fingerprint software. Results : The differences in protein expressions between MCNS and FSGS were shown by increased or decreased protein spots. Most prominently expressed spot among several spots in FSGS was isolated and analyzed, one of which was glutathione S-transferase (GST) P1-1, whereas it was not found in MCNS. So GSTP1-1 was considered as the one of the key biomarkers in pathogenesis of FSGS. Conclusion : This result would be helpful in diagnosing FSGS and researching FSGS. Further studies for glutathione S-transferase P1-1 might be necessary to elucidate the mechanisms regarding FSGS.

Reviews in Infrared Spectroscopy and Computational Chemistry to Reveal Rhizospheric Interactions among Organic Acids, Oxyanions and Metal oxides: Fundamental Principles and Spectrum Processing (유기산, 산화음이온 및 금속 산화물 간의 근권 내 상호작용 연구를 위한 계산화학과 적외선 분광학에 관한 총설: 기본적인 원리와 스펙트럼 처리)

  • Han, Junho;Ro, Hee-Myong
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.39 no.7
    • /
    • pp.426-439
    • /
    • 2017
  • This review summarizes advantage and limitation in infrared spectroscopy and computational chemistry to understand rhizospheric interaction among organic acids, oxyanions and metal oxides. Since organic acids and metal oxides determine dynamics of oxyanions in the soil environment, knowledge of fundamental mechanisms is a prerequisite for understanding the interactions at soil-water interface. Attenuated total reflectance-fourier transform infrared spectroscopy (ATR-FTIR) is a powerful tool to measure the interfacial reactions. However, the ATR-FTIR measurements are abstruse, because the optical characteristics for measurements are variable depending on the experimental setup. In addition, spectral overlapping is a primary obstacle to the analysis of the interfacial reaction; thus, it is essential to detect and to deconvolute bands for signal interpretation. In this review, we expained the fundamental principle for spectrum processing, and four band identification methods, such as derivative spectroscopy, two-dimension correlation spectroscopy, multivariate curve resolution, and computational chemistry with example of aqueous phosphate speciation. As a result, spectrum processing and computational chemistry improved interpretation and spectral deconvolution of overlapped spectra in relatively simple systems, but it was still unsatisfactory for the problems in more complexed system like nature. Nevertheless, we believed that our challenge would contribute practically to develop adequate analytical procedure, signal processing and protocols that could help to improve interpretation and to understand the interfacial interactions of oxyanions in natural systems.