• Title/Summary/Keyword: Current Signature

Search Result 147, Processing Time 0.026 seconds

An Observational Multi-Center Study Protocol for Distribution of Pattern Identification and Clinical Index in Parkinson's Disease (파킨슨병 변증 유형 및 지표 분포에 대한 전향적 다기관 관찰연구 프로토콜)

  • HuiYan Zhao;Ojin Kwon;Bok-Nam Seo;Seong-Uk Park;Horyong Yoo;Jung-Hee Jang
    • The Journal of Internal Korean Medicine
    • /
    • v.45 no.1
    • /
    • pp.1-10
    • /
    • 2024
  • Objectives: This study investigated the pattern identification (PI) and clinical index of Parkinson's disease (PD) for personalized diagnosis and treatment. Methods: This prospective observational multi-center study recruited 100 patients diagnosed with PD from two Korean medicine hospitals. To cluster new subtypes of PD, items on a PI questionnaire (heat and cold, deficiency and excess, visceral PI) were evaluated along with pulse and tongue analysis. Gait analysis was performed and blood and feces molecular signature changes were assessed to explore biomarkers for new subtypes. In addition, unified PD rating scale II and III scores and the European quality of life 5-dimension questionnaire were assessed. Results: The clinical index obtained in this study analyzed the frequency statistics and hierarchical clustering analysis to classify new subtypes based on PI. Moreover, the biomarkers and current status of herbal medicine treatment were analyzed using the new subtypes. The results provide comprehensive data to investigate new subtypes and subtype-based biomarkers for the personalized diagnosis and treatment of PD patients. Ethical approval was obtained from the medical ethics committees of the two Korean medicine hospitals. All amendments to the research protocol were submitted and approved. Conclusions: An objective and standardized diagnostic tool is needed for the personalized treatment of PD by traditional Korean medicine. Therefore, we developed a clinical index as the basis for the PI clinical evaluation of PD. Trial Registration: This trial is registered with the Clinical Research Information Service (CRIS) (KCT0008677)

Comparative Analysis on Digital Currency Models and Electronic Payments (중앙은행의 디지털화폐 발행방식 및 전자지급수단의 비교분석)

  • Yoon, Jae-Ho;Kim, Yong-Min
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.7
    • /
    • pp.63-72
    • /
    • 2022
  • With the advent of cryptocurrencies such as Bitcoin in 2009, the paradigm of money, a means of payment, has been changing significantly. And it has a great impact on our daily lives. Thus central banks have attempted various analyzes on the issuance and impact of digital currencies including electronic payments but a study on which issuance method is suitable is insufficient. In this study, the issuance of digital currency was analyzed compared to the electronic payments which are currently used. As a result, the account-based model did not show any significant differences from the current RTGS(real-time gross settlement systems) and retail payment systems. But the token-based model is expected that it can improve the efficiency of finance and induce technological innovation in the financial field. However, it was analyzed that this model would weaken the intermediary function of financial institutions such as loans due to the characteristics of digital signature technology. In addition, in order to protect consumers against security attacks such as hacking and phishing of CBDCs, legal and institutional supports similar to the current electronic payment method are required, and continuous technology development efforts are also required for the CBDC issuance model to maintain convenience and anonymity equivalent to cash.

A Study on the Trust Mechanism of Online Voting: Based on the Security Technologies and Current Status of Online Voting Systems (온라인투표의 신뢰 메커니즘에 대한 고찰: 온라인투표 보안기술 및 현황 분석을 중심으로)

  • Seonyoung Shim;Sangho Dong
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.47-65
    • /
    • 2023
  • In this paper, we investigate how the online voting system can be a trust-based system from a technical perspective. Under four principles of voting, we finely evaluate the existing belief that offline voting is safer and more reliable than online voting based on procedural processes, technical principles. Many studies have suggested the ideas for implementing online voting system, but they have not attempted to strictly examine the technologies of online voting system from the perspective of voting requirements, and usually verification has been insufficient in terms of practical acceptance. Therefore, this study aims to analyze how the technologies are utilized to meet the demanding requirements of voting based on the technologies proven in the field. In addition to general data encryption, online voting requires more technologies for preventing data manipulation and verifying voting results. Moreover, high degree of confidentiality is required because voting data should not be exposed not only to outsiders but also to managers or the system itself. To this end, the security techniques such as Blind Signature, Bit Delegation and Key Division are used. In the case of blockchain-based voting, Mixnet and Zero-Knowledge Proof are required to ensure anonymity. In this study, the current status of the online voting system is analyzed based on the field system that actually serves. This study will enhance our understanding on online voting security technologies and contribute to build a more trust-based voting mechanism.

Installation and Vegetation Management for Enhanced Authenticity of Jeju Ohyundan (제주 오현단의 진정성 제고를 위한 시설 및 식생관리)

  • Rho, Jae-Hyun;Oh, Hyun-Kyung
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.31 no.3
    • /
    • pp.25-37
    • /
    • 2013
  • The purpose of this study is to draw reasonable management plans to reinforce essence of Ohyundan(五賢壇: Five sprit tablets), a sacred site and monument of Jeju, by investigating and analyzing current status and problems of cultural landscape elements(e.g. architectural structures, installation, letters carved on the rocks, actual vegetation, etc.) while grasping placeness contained in Ohyundan through consideration of its history and transition process of Ohyundan a future being and shrine of Gyulrim Seowon(橘林書院) in Jeju. Results derived from research are summarized as follows. Ohyundan is noted due to its placeness in that it was a place for Gyulrim Seowon, Jeju's one and only Saaek Seowon(賜額書 院) and it was a symbolic space of exile culture in Jeju. As it is inferred from Gyulrim Seowon, which is dangho(堂號: clan name) of Seowon, orchards surrounding all over places are a signature landscape element that shows placeness of the past Ohyundan. Joduseok(俎豆石: altar stone), representing a core installation of Ohyundan and ancestral tablet of five spirits, created a refined place by putting up common stones around altar and founding blocked stones to wall. This refinement and thrift served basic mind of Neo-Confucianism, and led to of Jeju's Jonyang mind(spend-thrift mind). In conclusion, a practice plan is a prerequisite to restore essence of Ohyundan by actively excluding installations not suitable for placeness or overly designed such as Jeju Hyangrodang(a center for the elderly) and numerous monument houses. On the other hand, together with Joduseok, as letters carved on the rocks such as 'Jeungjoo Byukrip(曾朱壁立)' and 'Gwangpoongdae(光風臺)' and Yoocheonseok serve as a signature landscape that well shows mind of five spirits and teaching of Neo-Confucianism, and also a trace from a confucian viewpoint deeply rooted in Jeju, they are judged as a cultural landscape corresponding to the essence of place in Ohyundan which requires proactive preservation and plans for public relations. Together with this, although many different old big trees such as Pinus densiflora , Pinus thunbergii, Quercus variabilis, Celtis sinenis, Zelkova serrata and Rhus succedanea are a landscape element that increases sacred Ohyundan and commemorative value, now required is thorough entity tree management by assigning serial number on them as many of them were dead or removed resulting from transition process of land use. Further, to reinforce quality of site location belonging to Gyulrim Seowon, a prerequsite is to review plans that create Gyulrim at reinstalled site of building and raw land.

Design and Implementation of a Web Application Firewall with Multi-layered Web Filter (다중 계층 웹 필터를 사용하는 웹 애플리케이션 방화벽의 설계 및 구현)

  • Jang, Sung-Min;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.157-167
    • /
    • 2009
  • Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.

Genetic signature of strong recent positive selection at interleukin-32 gene in goat

  • Asif, Akhtar Rasool;Qadri, Sumayyah;Ijaz, Nabeel;Javed, Ruheena;Ansari, Abdur Rahman;Awais, Muhammd;Younus, Muhammad;Riaz, Hasan;Du, Xiaoyong
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.30 no.7
    • /
    • pp.912-919
    • /
    • 2017
  • Objective: Identification of the candidate genes that play key roles in phenotypic variations can provide new information about evolution and positive selection. Interleukin (IL)-32 is involved in many biological processes, however, its role for the immune response against various diseases in mammals is poorly understood. Therefore, the current investigation was performed for the better understanding of the molecular evolution and the positive selection of single nucleotide polymorphisms in IL-32 gene. Methods: By using fixation index ($F_{ST}$) based method, IL-32 (9375) gene was found to be outlier and under significant positive selection with the provisional combined allocation of mean heterozygosity and $F_{ST}$. Using nucleotide sequences of 11 mammalian species from National Center for Biotechnology Information database, the evolutionary selection of IL-32 gene was determined using Maximum likelihood model method, through four models (M1a, M2a, M7, and M8) in Codeml program of phylogenetic analysis by maximum liklihood. Results: IL-32 is detected under positive selection using the $F_{ST}$ simulations method. The phylogenetic tree revealed that goat IL-32 was in close resemblance with sheep IL-32. The coding nucleotide sequences were compared among 11 species and it was found that the goat IL-32 gene shared identity with sheep (96.54%), bison (91.97%), camel (58.39%), cat (56.59%), buffalo (56.50%), human (56.13%), dog (50.97%), horse (54.04%), and rabbit (53.41%) respectively. Conclusion: This study provides evidence for IL-32 gene as under significant positive selection in goat.

A Study of Modified Parallel Feistel Structure of Data Speed-up DES (DES의 데이터 처리속도 향상을 위한 변형된 병렬 Feistel 구조에 관한 연구)

  • Lee, Seon-Keun;kIM, Hyeoung-Kyun;Kim, Hwan-Yong
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.37 no.12
    • /
    • pp.91-97
    • /
    • 2000
  • With the brilliant development of information communication and the rapid spread of internet, current network communication is carrying several up-to-date functions such as electronic commerce, activation of electro currency or electronic signature and will produce more advanced services in the future. Information communication network such as that electronic commerce would demand the more safe and transparent guard of network, and anticipate the more fast performance of network. In this paper, in order to meet the several demands, DES(data encryption standard) with parallel feistel structure, which feistel structure of the basic structure of DES is transformed into in parallel, is proposed. The existing feistel structure can't use pipeline method for the structural problem of DES itself-the propagation of error. therefore, this modified parallel feistel structure could improve largely the performance of DES which had to have the trade-off relation between data processing speed and data security and in addition a method proposed in SEED having adopted the modified parallel feistel structure shows more excellent secure function and/or fast processing ability. The used CAD Tool use Synopsys Ver. 1999. 10 in both of synthesis and simulation.

  • PDF

A Bloom Filter Application of Network Processor for High-Speed Filtering Buffer-Overflow Worm (버퍼 오버플로우 웜 고속 필터링을 위한 네트워크 프로세서의 Bloom Filter 활용)

  • Kim Ik-Kyun;Oh Jin-Tae;Jang Jong-Soo;Sohn Sung-Won;Han Ki-Jun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.93-103
    • /
    • 2006
  • Network solutions for protecting against worm attacks that complement partial end system patch deployment is a pressing problem. In the content-based worm filtering, the challenges focus on the detection accuracy and its performance enhancement problem. We present a worm filter architecture using the bloom filter for deployment at high-speed transit points on the Internet, including firewalls and gateways. Content-based packet filtering at multi-gigabit line rates, in general, is a challenging problem due to the signature explosion problem that curtails performance. We show that for worm malware, in particular, buffer overflow worms which comprise a large segment of recent outbreaks, scalable -- accurate, cut-through, and extensible -- filtering performance is feasible. We demonstrate the efficacy of the design by implementing it on an Intel IXP network processor platform with gigabit interfaces. We benchmark the worm filter network appliance on a suite of current/past worms, showing multi-gigabit line speed filtering prowess with minimal footprint on end-to-end network performance.

Genome-wide analyses of the Jeju, Thoroughbred, and Jeju crossbred horse populations using the high density SNP array

  • Kim, Nam Young;Seong, Ha-Seung;Kim, Dae Cheol;Park, Nam Geon;Yang, Byoung Chul;Son, Jun Kyu;Shin, Sang Min;Woo, Jae Hoon;Shin, Moon Cheol;Yoo, Ji Hyun;Choi, Jung-Woo
    • Genes and Genomics
    • /
    • v.40 no.11
    • /
    • pp.1249-1258
    • /
    • 2018
  • The Jeju horse is an indigenous Korean horse breed that is currently registered with the Food and Agriculture Organization of the United Nations. However, there is severe lack of genomic studies on Jeju horse. This study was conducted to investigate genetic characteristics of horses including Jeju horse, Thoroughbred and Jeju crossbred (Jeju${\times}$Thoroughbred) populations. We compared the genomes of three horse populations using the Equine SNP70 Beadchip array. Short-range Linkage disequilibrium was the highest in Thoroughbred, whereas $r^2$ values were lowest in Jeju horse. Expected heterozygosity was the highest in Jeju crossbred (0.351), followed by the Thoroughbred (0.337) and Jeju horse (0.311). The level of inbreeding was slightly higher in Thoroughbred (-0.009) than in Jeju crossbred (-0.035) and Jeju horse (-0.038). $F_{ST}$ value was the highest between Jeju horse and Thoroughbred (0.113), whereas Jeju crossbred and Thoroughbred showed the lowest value (0.031). The genetic relationship was further assessed by principal component analysis, suggesting that Jeju crossbred is more genetically similar to Thoroughbred than Jeju horse population. Additionally, we detected potential selection signatures, for example, in loci located on LCORL/NCAPG and PROP1 genes that are known to influence body. Genome-wide analyses of the three horse populations showed that all the breeds had somewhat a low level of inbreeding within each population. In the population structure analysis, we found that Jeju crossbred was genetically closer to Thoroughbred than Jeju horse. Furthermore, we identified several signatures of selection which might be associated with traits of interest. To our current knowledge, this study is the first genomic research, analyzing genetic relationships of Jeju horse, Thoroughbred and Jeju crossbred.

CHEMICAL PROPERTIES OF CORES IN DIFFERENT ENVIRONMENTS; THE ORION A, B AND λ ORIONIS CLOUDS

  • Yi, Hee-Weon;Lee, Jeong-Eun;Liu, Tie;Kim, Kee-Tae
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.44 no.1
    • /
    • pp.42.1-42.1
    • /
    • 2019
  • We observed 80 dense cores ($N(H_2)$ > $10^{22}cm^{-2}$) in the Orion molecular cloud complex which contains the Orion A (39 cores), B (26 cores), and ${\lambda}$ Orionis (15 cores) clouds. We investigate the behavior of the different molecular tracers and look for chemical variations of cores in the three clouds in order to systematically investigate the effects of stellar feedback. The most commonly detected molecular lines (with the detection rates higher than 50%) are $N_2H^+$, $HCO^+$, $H^{13}CO^+$, $C_2H$, HCN, and $H_2CO$. The detection rates of dense gas tracers, $N_2H^+$, $HCO^+$, $H^{13}CO^+$, and $C_2H$ show the lowest values in the ${\lambda}$ Orionis cloud. We find differences in the D/H ratio of $H_2CO$ and the $N_2H^+/HCO^+$ abundance ratios among the three clouds. Eight starless cores in the Orion A and B clouds exhibit high deuterium fractionations, larger than 0.10, while in the ${\lambda}$ Orionis cloud, no cores reveal the high ratio. These chemical properties could support that cores in the ${\lambda}$ Orionis cloud are affected by the photo-dissociation and external heating from the nearby H II region. An unexpected trend was found in the $[N_2H^+]/[HCO^+]$ ratio with a higher median value in the ${\lambda}$ Orionis cloud than in the Orion A/B clouds than; typically, the $[N_2H^+]/[HCO^+]$ ratio is lower in higher temperatures and lower column densities. This could be explained by a longer timescale in the prestellar stage in the ${\lambda}$ Orionis cloud, resulting in more abundant nitrogen-bearing molecules. In addition to these chemical differences, the kinematical difference was also found among the three clouds; the blue excess, which is an infall signature found in optically thick line profiles, is 0 in the ${\lambda}$ Orionis cloud while it is 0.11 and 0.16 in the Orion A and B clouds, respectively. This result could be another evidence of the negative feedback of active current star formation to the next generation of star formation.

  • PDF