• Title/Summary/Keyword: Detection Mechanism

Search Result 850, Processing Time 0.136 seconds

Different mechanism of visual attention in anxious and non-anxious population (부정자극 지각에 관련된 불안인과 정상인의 공간주의 비교연구)

  • Choi, Moon-Gee;Koo, Min-Mo;Park, Kun-Woo;Nam, Ki-Chun
    • Korean Journal of Cognitive Science
    • /
    • v.20 no.1
    • /
    • pp.51-77
    • /
    • 2009
  • Using a modified Posner's cue-target paradigm, we investigated whether negative cues attract more attention than neutral cues in anxious people. Previous studies used commonly an unbalanced proportion of valid and invalid trials(75% vs. 25% respectively). But in the present study, an equivalent proportion of valid and invalids trials was used for measuring detection speed of cues without participant's expectancy caused by the unbalanced proportion. Emotional words(Experiment 1) and facial expressions(Experiment 2) were used as cues for target locations. The result of Experiment 1 and 2 showed that threatening cues facilitated target detection in valid trials and interfered with it in invalid trials in anxious participants and a, reverse response patterns were found in non-anxious participants. This indicates that threatening cues attract more attention to the cued location in anxious people and in contrast, non-anxious people avoid threatening stimuli. In Experiment 3, we investigated the difference of validity effect across anxiety levels. The results showed that anxious participants gave less attention to cued location when the cues were non-informative whereas non-anxious participants gave more attention to cued locations in the same condition. We discussed two kinds of cognitive bias caused by anxiety levels: attentional bias and proportion related bias.

  • PDF

Reliable Methods of Interoperability between Packet Transport Networks and IP Networks (고신뢰성을 보장하는 패킷전달망-IP망 상호연동 방법)

  • Lee, Kwang-Koog;Lee, Hosong;Lee, Youngwuk;Jeong, Kitae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.10
    • /
    • pp.34-40
    • /
    • 2014
  • With the economical data service delivery, the packet transport network (PTN) technologies have emerged as an important player in the next-generation transport networks. As the PTN continues to make such considerable progress, it is being challenged by network providers who need rapid and reliable recovery capabilities to guarantee the availability of their services. This paper introduces several fault detection mechanisms for a client signal failure in packet transport networks and proposes a reliable transmission method of IP flows from routers using the combination of Ethernet services. Based on the first fault detection methods, client signal fault is detected within tens or hundreds of milliseconds. It enables the client network devices to perform their own recovery processes within one second. The second mechanism enables failed Ethernet services to be bypassed via other Ethernet services over disjoint paths, so as to contribute on reducing packet loss of IP traffic.

DETECTION SYSTEM OF STREPTOCOCCUS MUTANS IN SALIVA USING MONOCLONAL ANTIBODY (Monoclonal Antibody를 이용한 Streptococcus mutans 검출 방법의 임상적 적용에 관한 연구)

  • Hong, Hi-Jung;Kim, Jong-Soo;Kim, Yong-Kee
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.36 no.4
    • /
    • pp.522-530
    • /
    • 2009
  • The purpose of this study was to evaluate the clinical effectiveness of new streptococcus detection system which used monoclonal antibody against Streptococcus mutans. 92 children aged between 2 and 8 were involved in this experiment and their saliva samples were collected for testing. Streptococcus mutans were measured by both monoclonal antibody-based detecting system (Saliva-$check^{TM}$ Mutans) and dip slide detecting system($Dentocult^{TM}$-SM). The results showed that Saliva-$check^{TM}$ Mutans levels had a significant correlation with dfs rate of subjects and the two test kits, Saliva-$check^{TM}$ Mutans and $Dentocult^{TM}$-SM were shown to have a good correlation although they were based on different mechanism.

  • PDF

Micro/Nanotribology and Its Applications

  • Bhushan, Bharat
    • Tribology and Lubricants
    • /
    • v.11 no.5
    • /
    • pp.128-135
    • /
    • 1995
  • Atomic force microscopy/friction force microscopy (AFM/FFM) techniques are increasingly used for tribological studies of engineering surfaces at scales, ranging from atomic and molecular to microscales. These techniques have been used to study surface roughness, adhesion, friction, scratching/wear, indentation, detection of material transfer, and boundary lubrication and for nanofabrication/nanomachining purposes. Micro/nanotribological studies of single-crystal silicon, natural diamond, magnetic media (magnetic tapes and disks) and magnetic heads have been conducted. Commonly measured roughness parameters are found to be scale dependent, requiring the need of scale-independent fractal parameters to characterize surface roughness. Measurements of atomic-scale friction of a freshly-cleaved highly-oriented pyrolytic graphite exhibited the same periodicity as that of corresponding topography. However, the peaks in friction and those in corresponding topography were displaced relative to each other. Variations in atomic-scale friction and the observed displacement has been explained by the variations in interatomic forces in the normal and lateral directions. Local variation in microscale friction is found to correspond to the local slope suggesting that a ratchet mechanism is responsible for this variation. Directionality in the friction is observed on both micro- and macro scales which results from the surface preparation and anisotropy in surface roughness. Microscale friction is generally found to be smaller than the macrofriction as there is less ploughing contribution in microscale measurements. Microscale friction is load dependent and friction values increase with an increase in the normal load approaching to the macrofriction at contact stresses higher than the hardness of the softer material. Wear rate for single-crystal silicon is approximately constant for various loads and test durations. However, for magnetic disks with a multilayered thin-film structure, the wear of the diamond like carbon overcoat is catastrophic. Breakdown of thin films can be detected with AFM. Evolution of the wear has also been studied using AFM. Wear is found to be initiated at nono scratches. AFM has been modified to obtain load-displacement curves and for nanoindentation hardness measurements with depth of indentation as low as 1 mm. Scratching and indentation on nanoscales are the powerful ways to screen for adhesion and resistance to deformation of ultrathin fdms. Detection of material transfer on a nanoscale is possible with AFM. Boundary lubrication studies and measurement of lubricant-film thichness with a lateral resolution on a nanoscale have been conducted using AFM. Self-assembled monolyers and chemically-bonded lubricant films with a mobile fraction are superior in wear resistance. Finally, AFM has also shown to be useful for nanofabrication/nanomachining. Friction and wear on micro-and nanoscales have been found to be generally smaller compared to that at macroscales. Therefore, micro/nanotribological studies may help def'me the regimes for ultra-low friction and near zero wear.

Effects of Saenghyetang on Learning and Memory Performances in Mice (생혜탕(生慧湯)이 흰쥐의 학습(學習)과 기억(記憶)에 미치는 영향(影響))

  • Yu Geum-Ryoung;Chang Gyu-Tae;Kim Jang-Hyeon
    • The Journal of Pediatrics of Korean Medicine
    • /
    • v.15 no.1
    • /
    • pp.77-104
    • /
    • 2001
  • The effects of the oriental herbal medicine Saenghyetang(SHT, 生慧湯), which consists of Rehmanniae Radix (熟地黃 九蒸: was made by 9th steam) 40g, Corni Fructus(山茱黃) 16g, Polygalae Radix(遠志) 8g, Zizyphi Spinosae Semen(酸棗仁) 2g, Biotae Semen(柏子仁 去油: oil ingredient was removed) 20g, Poria Cocos(茯笭) 12g, Ginseng Radix(人蔘) 12g, Acori Graminei Rhizoma(石菖蒲) 2g, Sinapis Semen(白芥子) 8g, on learning ability and memory were investigated. Hot water extract(HWE) and ethanol extract(EE) from SHT were used for the studies. Learning ability and memory are related to modifications of synaptic strength among neurons that interactive. Enhanced synaptic coincidence detection leads to improved learning ability and memory. If the NMDA receptor, a synaptic coincidence detector, acts as a graded switch for memory formations, enhanced signal detection by NMDA receptors should enhance learning ability and memory. It was shown that NR2B was increased in the forebrains of oriental medicine-administrated mice, leading to enhanced activation of NMDA receptors and facilitating synaptic potentiation in response to stimulation at 10-100 Hz. These HWE-SHT treated mice exhibited that superior ability in learning and memory when performing various behavioral tasks, showing that NR2B is enhanced by HWE-SHT treatment and also is critical in gating the age-dependent threshold for plasticity and memory formation. NMDA receptor-dependent modifications, which were mediated in part by HWE administration, of synaptic efficacy, therefore, represent a mechanism for associative learning ability and memory. Results suggest that oriental medical enhancement of NR2B contributes to increase intelligence and memory in mammals On the other hand, to examine the effects of EE-SHT on the learning ability and memory in experimental mice, EE-SHT was tested on passive and active avoidance responses. The EE-SHT ameliorated the memory retrieval deficit induced by ethanol in mice, but not other memory impairments. EE-SHT(10, 20mg/100 g, p.o.) did not affect the passive avoidance responses of normal mice in the step through and step down tests, the conditioned and unconditioned avoidance responses of normal mice in the shuttle box, lever press performance tests and the ambulatory activity of normal mice in a normal condition. However, EE-SHT at 20 mg/kg significantly decrease the spontaneous motor activity during the shuttle box test, and also to extend the sleeping time induced by pentobarbital in mice. These results suggest that SHT has an ameliorating effect on memory retrieval impairments and a weak tranquilizing action.

  • PDF

First Detection of $bla_{IMP-1}$ in Clinical Isolate Multiresistant Acinetobacter baumannii from Korea

  • Jeong Seok-Hoon;Bae Il-Kwon;Sohn Seung-Ghyu;Park Kwang-Ok;An Young-Jun;Sung Kwang-Hoon;Jang Seon-Ju;Heo Myong-Jin;Yang Ki-Suk;Lee Sang-Hee
    • Journal of Microbiology and Biotechnology
    • /
    • v.16 no.9
    • /
    • pp.1377-1383
    • /
    • 2006
  • Among 46 Acinetobacter baumannii isolates collected in 2004, two imipenem-resistant isolates were obtained from clinical specimens taken from patients hospitalized in Busan, Republic of Korea. Two carbapenemase-producing isolates were further investigated to determine the mechanism of resistance. These isolates were analyzed by antibiotic susceptibility testing, microbiological tests of carbapenemase activity, determination of pI, transconjugation test, enterobacterial repetitive consensus (ERIC)-PCR, and DNA sequencing. Two cases of infection by A. baumannii producing the IMP-1 ${\beta}$-lactamase were detected. The isolates were characterized by a modified cloverleaf synergy test and EDTA-disk synergy test. Isoelectric focusing of crude bacterial extracts revealed nitrocefin-positive bands with a pI value of 9.0. PCR amplification and characterization of the amplicons by direct sequencing indicated that the isolates carried a $bla_{IMP-l}$ determinant. The isolates were characterized by a multidrug resistance phenotype, including penicillins, extended-spectrum cephalosporins, carbapenems, and aminoglycosides. These results indicate that the observed imipenem resistance of two Korean A. baumannii isolates was due to the spread of an IMP-1-producing clone. Our microbiological test of carbapenemase activity is simple to screen class B metallo-${\beta}$-lactamase-producing clinical isolates to determine their clinical impact and to prevent further spread. This study shows that the $bla_{IMP-l}$ resistance determinant, which is emerging in Korea, may become an emerging therapeutic problem, since clinicians are advised not to use extended-spectrum cephalosporins, imipenem, and aminoglycosides. This observation emphasizes the importance of having effective control measures in Asian hospitals, such as early detection of colonized patients, isolation procedures, and a judicious use of antibiotics.

Optical Resolution of Free Amino Acids with Addition of Copper(II) Chelates in a Reversed-Phase Liquid Chromatography (구리(II) 킬레이트의 첨가에 의한 자유아미노산 광학이성질체의 역상 액체크로마토그래피적 분리)

  • Sun Haing Lee;Tae Sub Oh;Hong Yeup An;Kyung Sug Park;Sang Oh OH
    • Journal of the Korean Chemical Society
    • /
    • v.36 no.6
    • /
    • pp.879-888
    • /
    • 1992
  • Separation of the optical isomers of free amino acids by a reversed phase high performance liquid chromatography has been studied by adding a copper(II) complex of L-proline or L-proline derivatives (hydroxy-L-proline, N-benzyl-L-proline, p-xylenyl-L-proline, p-xylenyl-hydroxy-L-proline) in the mobile phase. An OPA postcolumn detection system was used for the detection of amino acids. The chromatographic properties for the free amino acids were discussed in terms of the pH, the kinds and concentration of chelate or organic modifier. The retention behaviors of the free amino acids were considerably different from, those of DNS-amino acids or DABS-amino acids. The enantioselectivity of the free amino acids was better than that of derivatized amino acids. The enantioselectivity between the optical isomers observed by use of the Cu(II)-p-xylenyl-L-proline chiral cheleate was the best among the several copper(II) chelate. A separation mechanism could be illustrated not only by the hydrophobic interaction of the diastereomer with stationary phase but also by the steric effect of the ligand exchange reaction between the free-amino acids and copper chelate.

  • PDF

ACMs-based Human Shape Extraction and Tracking System for Human Identification (개인 인증을 위한 활성 윤곽선 모델 기반의 사람 외형 추출 및 추적 시스템)

  • Park, Se-Hyun;Kwon, Kyung-Su;Kim, Eun-Yi;Kim, Hang-Joon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.5
    • /
    • pp.39-46
    • /
    • 2007
  • Research on human identification in ubiquitous environment has recently attracted a lot of attention. As one of those research, gait recognition is an efficient method of human identification using physical features of a walking person at a distance. In this paper, we present a human shape extraction and tracking for gait recognition using geodesic active contour models(GACMs) combined with mean shift algorithm The active contour models (ACMs) are very effective to deal with the non-rigid object because of its elastic property. However, they have the limitation that their performance is mainly dependent on the initial curve. To overcome this problem, we combine the mean shift algorithm with the traditional GACMs. The main idea is very simple. Before evolving using level set method, the initial curve in each frame is re-localized near the human region and is resized enough to include the targe region. This mechanism allows for reducing the number of iterations and for handling the large object motion. The proposed system is composed of human region detection and human shape tracking modules. In the human region detection module, the silhouette of a walking person is extracted by background subtraction and morphologic operation. Then human shape are correctly obtained by the GACMs with mean shift algorithm. In experimental results, the proposed method show that it is extracted and tracked efficiently accurate shape for gait recognition.

  • PDF

The Design of a Complex Event Model for Effective Service Monitoring in Enterprise Systems (엔터프라이즈 시스템에서 효과적인 서비스 모니터링을 위한 복합 이벤트 모델의 설계)

  • Kum, Deuk-Kyu;Lee, Nam-Yong
    • The KIPS Transactions:PartD
    • /
    • v.18D no.4
    • /
    • pp.261-274
    • /
    • 2011
  • In recent competitive business environment each enterprise has to be agile and flexible. For these purposes run-time monitoring ofservices provided by an enterprise and early decision making through this becomes core competition of the enterprise. In addition, in order to process various innumerable events which are generated on enterprise systems techniques which make filtering of meaningful data are needed. However, the existing study related with this is nothing but discovering of service faults by monitoring depending upon API of BPEL engine or middleware, or is nothing but processing of simple events based on low-level events. Accordingly, there would be limitations to provide useful business information. In this paper, through situation detection an extended complex event model is presented, which is possible to provide more valuable and useful business information. Concretely, first of all an event processing architecture in an enterprise system is proposed, and event meta-model which is suitable to the proposed architecture is going to be defined. Based on the defined meta-model, It is presented that syntax and semantics of constructs in our event processing language including various and progressive event operators, complex event pattern, key, etc. In addition, an event context mechanism is proposed to analyze more delicate events. Finally, through application studies application possibility of this study would be shown and merits of this event model would be present through comparison with other event model.

Effective Defense Mechanism Against New Vulnerability Attacks (신규 취약점 공격에 대한 효율적인 방어 메커니즘)

  • Kwak, Young-Ok;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.499-506
    • /
    • 2021
  • Hackers' cyber attack techniques are becoming more sophisticated and diversified, with a form of attack that has never been seen before. In terms of information security vulnerability standard code (CVE), about 90,000 new codes were registered from 2015 to 2020. This indicates that security threats are increasing rapidly. When new security vulnerabilities occur, damage should be minimized by preparing countermeasures for them, but in many cases, companies are insufficient to cover the security management level and response system with a limited security IT budget. The reason is that it takes about a month for analysts to discover vulnerabilities through manual analysis, prepare countermeasures through security equipment, and patch security vulnerabilities. In the case of the public sector, the National Cyber Safety Center distributes and manages security operation policies in a batch. However, it is not easy to accept the security policy according to the characteristics of the manufacturer, and it takes about 3 weeks or more to verify the traffic for each section. In addition, when abnormal traffic inflow occurs, countermeasures such as detection and detection of infringement attacks through vulnerability analysis must be prepared, but there are limitations in response due to the absence of specialized security experts. In this paper, we proposed a method of using the security policy information sharing site "snort.org" to prepare effective countermeasures against new security vulnerability attacks.