T cells induce immune responses and thereby eliminate infected micro-organisms when peptides from the microbial proteins are bound to HLAs in the host cell surfaces, It is known that the more stable the binding of peptide to HLA is, the stronger the T cell response gets to remove more effectively the source of infection. Accordingly, if peptides (HLA binder) which can be bound stably to a certain HLA are found, those peptieds are utilized to the development of peptide vaccine to prevent infectious diseases or even to cancer. However, HLA is highly polymorphic so that HLA has a large number of alleles with some frequencies even in one population. Therefore, it is very inefficient to find the peptides stably bound to a number of HLAs by testing random possible peptides for all the various alleles frequent in the population. In order to solve this problem, computational methods have recently been developed to predict peptides which are stably bound to a certain HLA. These methods could markedly decrease the number of candidate peptides to be examined by biological experiments. Accordingly, this paper not only introduces a method of machine learning to predict peptides binding to an HLA, but also suggests a new prediction model so called 'knowledge-based genetic algorithm' that has never been tried for HLA binding peptide prediction. Although based on genetic algorithm (GA). it showed more enhanced performance than GA by incorporating expert knowledge in the process of the algorithm. Furthermore, it could extract rules predicting the binding peptide of the HLA alleles common in Koreans.
Cha, Wang Seog;Lim, Byeong Jun;Kim, Jun Su;Lee, Sung Youn;Park, Tae Jun;Jang, Hyun Tae
Journal of the Korea Academia-Industrial cooperation Society
/
v.22
no.4
/
pp.17-24
/
2021
The development of a new sorbent for carbon dioxide depends on several factors, such as fast adsorption/absorption velocity, hydrophobicity, and lower regeneration temperature than commercial sorbent. In this study, aminosilane grafted activated carbon was synthesized to capture CO2. Methyltrimethoxysilane (MTMS) and 3-aminopropyl-triethoxysilane (APTES) were used as the grafting precursor of the amine functional group. The APTES grafting activated carbon showed higher sorption property than MTMS used one. The characteristics of the separation mechanism of carbon dioxide were examined by measuring the adsorption capacity according to temperature and carbon dioxide partial pressure. The absorption capacity of carbon dioxide was similar to amine grafting activated carbon and activated carbon at 25℃, but amine-grafted activated carbon was higher at 75℃. The amine functional group-grafted activated carbon showed higher absorption capacity than activated carbon with a 1% carbon dioxide partial pressure. Aminosilane grafting of activated carbon was chemically absorbed but also showed the characteristics of physical adsorption. The reforming activated carbon with an amine functional group grafted solid absorption/adsorption sorbent would significantly impact the material engineering industry and carbon dioxide adsorption process. The functionalized sorbent is a high-performance composite material. The developed sorbent may have applications in other industrial processes of absorption/adsorption and separation.
Kim, Heeeun;Shon, Taeshik;Kim, Duwon;Han, Gwangseok;Seong, JiHoon
Journal of Platform Technology
/
v.9
no.3
/
pp.3-17
/
2021
Advanced persistent threat (APT) attacks are attacks aimed at a particular entity as a set of latent and persistent computer hacking processes. These APT attacks are usually carried out through various methods, including spam mail and disguised banner advertising. The same name is also used for files, since most of them are distributed via spam mail disguised as invoices, shipment documents, and purchase orders. In addition, such Infostealer attacks were the most frequently discovered malicious code in the first week of February 2021. CDR is a 'Content Disarm & Reconstruction' technology that can prevent the risk of malware infection by removing potential security threats from files and recombining them into safe files. Gartner, a global IT advisory organization, recommends CDR as a solution to attacks in the form of attachments. There is a program using CDR techniques released as open source is called 'Dangerzone'. The program supports the extension of most document files, but does not support the extension of HWP files that are widely used in Korea. In addition, Gmail blocks malicious URLs first, but it does not block malicious URLs in mail systems such as Naver and Daum, so malicious URLs can be easily distributed. Based on this problem, we developed a 'Dangerzone' program that supports the HWP extension to prevent APT attacks, and a Chrome extension that performs URL checking in Naver and Daum mail and blocking banner ads.
Journal of Korean Society of Disaster and Security
/
v.14
no.1
/
pp.23-40
/
2021
In the era of the global coronal 19 pandemic, there is a risk of cross-infection in hospitals at the stage where treatments and vaccines are currently being developed and marketed, so individuals should enhance their acquired immunity and generalize their living systems by the performance of copper ions in the social environment. In order to prevent the spread of infection, the need for anti-bacterial film and its efficacy were analyzed through anti-viral performance tests based on research and development cases of worldwide and immemorial time. he Korea Construction Research Institute (KCL) has received anti-bacterial performance certification and anti-viral test scores from the "National Approval Performance Certification Agency." At the time, NCCP 43326 Human Corona virus (BetaCoV/Korea/KCDC03/2020), which was approved by the Centers for Disease Control and Prevention, was introduced to ensure that the activity rate of infected cells was satisfied in the anti-viral performance test. Anti-proliferation measures for the Corona 19 virus require a quality clinical trial study comparing the experimental group within the glass space where the antiviral copper film is constructed with the comparator of the same condition without copper film.
KIPS Transactions on Computer and Communication Systems
/
v.12
no.9
/
pp.283-290
/
2023
With the recent steady development of IoT technology, it is widely used in medical systems and smart TV watches. 66% of software development is developed through language C, which is vulnerable to memory attacks, and acts as a threat to IoT devices using language C. A stack-smashing overflow attack inserts a value larger than the user-defined buffer size, overwriting the area where the return address is stored, preventing the program from operating normally. IoT devices with low memory capacity are vulnerable to stack smashing overflow attacks. In addition, if the existing vaccine program is applied as it is, the IoT device will not operate normally. In order to defend against stack smashing overflow attacks on IoT devices, we used canaries among several detection methods to set conditions with random values, checksum, and DSLR (random storage locations), respectively. Two canaries were placed within the buffer, one in front of the return address, which is the end of the buffer, and the other was stored in a random location in-buffer. This makes it difficult for an attacker to guess the location of a canary stored in a fixed location by storing the canary in a random location because it is easy for an attacker to predict its location. After executing the detection program, after a stack smashing overflow attack occurs, if each condition is satisfied, the program is terminated. The set conditions were combined to create a number of eight cases and tested. Through this, it was found that it is more efficient to use a detection method using DSLR than a detection method using multiple conditions for IoT devices.
We tried to analyze the HPV prevalence and HPV genotypes of sexually high-risk women living in Busan, the biggest seaport of South Korea. Six hundred sixty women engaging in high-risk occupations participated in this study. The prevalence of HPV infection and HPV genotyping were determined with $MyGene^{(R)}$ HPVDNA chip, which consisted of 16 high-risk HPV genotypes (oncogenic genotypes) and 8 low-risk HPV genotypes. The overall prevalence of HPV infection in this study population was 39.1% (258/660) and the 20's showed the highest prevalence of HPV infection (51.5%). The dominant HPV genotypes including single or multiple HPV-infected women were resulted in HPV-16 (15.9%), -53 (10.2%), -58 (7.7%), -18 (5.2%) in case of high-risk HPV genotype and HPV-70 (10.4%), -6 (4.1%), -11 (2.0%) in case of low-risk HPV genotypes. Remarkably, the proportion of women infected with high-risk HPV genotypes (62.0%) was almost four times higher than those of women infected with low-risk HPV genotypes (14.7%) and high/low-risk HPV genotypes (12.0%). Among the 258 HPV-infected women, single infection was 175, double infection 66, triple infection 12, quadruple infection 4, quintuple infection 1, respectively. Our finding suggests that the introduction and development of effective HPV vaccines should consider the current status of HPV genotypic infection in South Korean women.
Human Papilloma viruses (HPVs) are etiological agents for cervical cancer and are classified into low- and high-risk categories. The aim of this study was to determine the frequency of the HPV genotype in the HPV screening test of Korean women using PCR-direct sequencing. Consensus primers of L1 legion were used for the amplification of HPV DNA and the PCR products (450 bps) obtained were analyzed by automatic sequencing. Sequences were compared with those in GenBank by using the BLAST program. Cervical swab samples of 3,978 women (20-73 years) were tested and the average age was 37.6 years. In this study, 1,174 samples were HPV positive out of 3,978 cervical swab samples screened (29.5%) and 136 samples (11.6%) showed a double infection. A total of 1,310 HPV genotypes were analyzed. The HPV positive rate was the lowest in the 20 years group (69.5%) and most of the samples of the > 60 years group were found HPV positive. Among thirty seven different HPV types identified by sequencing, 21 were HPV high risk types and 16 HPV low risk types were 69.8% (914/1,310) and 26.0% (340/1,310), respectively. In HPV high-risk types, 16 (13.21%), was the most frequently found. HPV 53 (9.62%) and 58 (9.24%) were also frequently found. This group was followed by HPV types 70 (5.50%), 33 (4.73%), 66 (4.20%), 18 (4.05%), 52 (4.05%), 31 (3.97%) and 56 (3.51%) in descending order of frequency. Among HPV low-risk types, 62 (4.20%), 6 (3.59%), 81 (3.59%), 84 (3.51%), and 11 (2.6%) were frequently found. In conclusion, PCR-direct sequencing could be used for quick and reliable typing of known and novel HPVs from clinical specimens. This data could be useful for epidemiological study of HPV and it also allows type-specific follow-up of women who have been treated for cervical intraepithelial neoplasia.
Journal of Korea Entertainment Industry Association
/
v.15
no.4
/
pp.337-347
/
2021
This study is a qualitative study conducted to provide basic data for therapists working in long-term care hospitals to improve their countermeasure strategies for new infectious diseases and improvement of the treatment room infection management system, and to help therapists understand their infection management work. Colaizzi's phenomenological research method was applied as the research method. Telephone interviews were conducted with nine occupational therapists and physical therapists working in nursing hospitals. The contents of the interview were recorded with the consent of the study subjects, and additional confirmation was received by email. The recorded content was analyzed after transcription, and the meaning and nature of the experience coping with COVID-19 were described. The content was organized into 6 themes, 17 main meaning and 49 meaning units. In accordance with the COVID-19 situation, the infection control system has been strengthened by reinforcing infection control education in nursing hospitals, practicing infection control, and supervising infection control outside business hours. It was found that the treatment environment was changed due to the restriction of treatment activities by practicing distancing in the treatment room, adjusting rest and meal times during working hours, and strengthening infection control. In addition, the therapist's role has been expanded and the paradigm of treatment has changed, such as considering the untact intervention, and they have experienced cohort quarantine, pre-tested for COVID-19, vaccinations, and side effects from COVID-19. However, due to the infection work, the therapist's work burden is increased, and the person is experiencing fear, depression, and work stress from the spread of COVID-19. They were also aware of the need for nursing hospital care personnel support, such as guaranteeing rest after vaccination and providing infection control tools and equipment. The results of this study are expected to be used as basic data for human and physical support for the development of infectious disease response strategy programs in nursing hospital treatment rooms and for infection control in nursing hospitals.
Papaya (Carica papaya L.) is one of the crops widely planted in tropical and subtropical areas. The papaya fruit has low calories and are plentiful in vitamins A and C and in minerals. A major problem in papaya production is a plant disease caused by the papaya ringspot virus (PRSV). The first PRSV-resistant GM papaya expressing a PRSV coat protein gene was developed by USA scientists in 1992. The first commercial GM papaya cultivars derived from the event was approved by the US government in 1997. Development of transgenic papayas has been focused on vaccine production and limited agricultural traits, including insect and pathogen resistance, long shelf life, and aluminum and herbicide tolerance. Approximately 17 countries, including the USA and China, produced transgenic papayas and/or commercialized them, which provoked studies on biosafety assessment and development of GM-detection technologies. For the biosafety assessment of potential effects on human health, effects of long-term feeding to model animals have been studied in terms of toxicity and allergenicity. Studies on environmental safety assessment include influence on soil-microbial biodiversity and transfer to soil bacteria of GM selection markers. Many countries, such as Korea, the European Union, and Japan, that have strict regulations for GM crops have serious concerns about unintended introduction of GM cultivars and food commodities using unauthorized GM crops. Transgene- and/or GM event-specific molecular markers and technologies for genomics-based detection of unauthorized GM papaya have been developed and have resulted in the robust detection of GM papayas.
In this paper, we developed DNL(Dynamic Network Loading) model based on Moving cell theory to analyze the dynamic characteristics of traffic flow in congested network. In this paper vehicles entered into link at same interval would construct one cell, and the cells moved according to Cell following rule. In the past researches relating to DNL model a continuous single link is separated into two sections such as running section and queuing section to describe physical queue so that various dynamic states generated in real link are only simplified by running and queuing state. However, the approach has some difficulties in simulating various dynamic flow characteristics. To overcome these problems, we present Moving cell theory which is developed by combining Car following theory and Lagrangian method mainly using for the analysis of air pollutants dispersion. In Moving cell theory platoons are represented by cells and each cell is processed by Cell following theory. This type of simulation model is firstly presented by Cremer et al(1999). However they did not develop merging and diverging model because their model was applied to basic freeway section. Moreover they set the number of vehicles which can be included in one cell in one interval so this formulation cant apply to signalized intersection in urban network. To solve these difficulties we develop new approach using Moving cell theory and simulate traffic flow dynamics continuously by movement and state transition of the cells. The developed model are played on simple network including merging and diverging section and it shows improved abilities to describe flow dynamics comparing past DNL models.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.