Using a modified Posner's cue-target paradigm, we investigated whether negative cues attract more attention than neutral cues in anxious people. Previous studies used commonly an unbalanced proportion of valid and invalid trials(75% vs. 25% respectively). But in the present study, an equivalent proportion of valid and invalids trials was used for measuring detection speed of cues without participant's expectancy caused by the unbalanced proportion. Emotional words(Experiment 1) and facial expressions(Experiment 2) were used as cues for target locations. The result of Experiment 1 and 2 showed that threatening cues facilitated target detection in valid trials and interfered with it in invalid trials in anxious participants and a, reverse response patterns were found in non-anxious participants. This indicates that threatening cues attract more attention to the cued location in anxious people and in contrast, non-anxious people avoid threatening stimuli. In Experiment 3, we investigated the difference of validity effect across anxiety levels. The results showed that anxious participants gave less attention to cued location when the cues were non-informative whereas non-anxious participants gave more attention to cued locations in the same condition. We discussed two kinds of cognitive bias caused by anxiety levels: attentional bias and proportion related bias.
Journal of the Institute of Electronics and Information Engineers
/
v.51
no.10
/
pp.34-40
/
2014
With the economical data service delivery, the packet transport network (PTN) technologies have emerged as an important player in the next-generation transport networks. As the PTN continues to make such considerable progress, it is being challenged by network providers who need rapid and reliable recovery capabilities to guarantee the availability of their services. This paper introduces several fault detection mechanisms for a client signal failure in packet transport networks and proposes a reliable transmission method of IP flows from routers using the combination of Ethernet services. Based on the first fault detection methods, client signal fault is detected within tens or hundreds of milliseconds. It enables the client network devices to perform their own recovery processes within one second. The second mechanism enables failed Ethernet services to be bypassed via other Ethernet services over disjoint paths, so as to contribute on reducing packet loss of IP traffic.
Journal of the korean academy of Pediatric Dentistry
/
v.36
no.4
/
pp.522-530
/
2009
The purpose of this study was to evaluate the clinical effectiveness of new streptococcus detection system which used monoclonal antibody against Streptococcus mutans. 92 children aged between 2 and 8 were involved in this experiment and their saliva samples were collected for testing. Streptococcus mutans were measured by both monoclonal antibody-based detecting system (Saliva-$check^{TM}$ Mutans) and dip slide detecting system($Dentocult^{TM}$-SM). The results showed that Saliva-$check^{TM}$ Mutans levels had a significant correlation with dfs rate of subjects and the two test kits, Saliva-$check^{TM}$ Mutans and $Dentocult^{TM}$-SM were shown to have a good correlation although they were based on different mechanism.
Atomic force microscopy/friction force microscopy (AFM/FFM) techniques are increasingly used for tribological studies of engineering surfaces at scales, ranging from atomic and molecular to microscales. These techniques have been used to study surface roughness, adhesion, friction, scratching/wear, indentation, detection of material transfer, and boundary lubrication and for nanofabrication/nanomachining purposes. Micro/nanotribological studies of single-crystal silicon, natural diamond, magnetic media (magnetic tapes and disks) and magnetic heads have been conducted. Commonly measured roughness parameters are found to be scale dependent, requiring the need of scale-independent fractal parameters to characterize surface roughness. Measurements of atomic-scale friction of a freshly-cleaved highly-oriented pyrolytic graphite exhibited the same periodicity as that of corresponding topography. However, the peaks in friction and those in corresponding topography were displaced relative to each other. Variations in atomic-scale friction and the observed displacement has been explained by the variations in interatomic forces in the normal and lateral directions. Local variation in microscale friction is found to correspond to the local slope suggesting that a ratchet mechanism is responsible for this variation. Directionality in the friction is observed on both micro- and macro scales which results from the surface preparation and anisotropy in surface roughness. Microscale friction is generally found to be smaller than the macrofriction as there is less ploughing contribution in microscale measurements. Microscale friction is load dependent and friction values increase with an increase in the normal load approaching to the macrofriction at contact stresses higher than the hardness of the softer material. Wear rate for single-crystal silicon is approximately constant for various loads and test durations. However, for magnetic disks with a multilayered thin-film structure, the wear of the diamond like carbon overcoat is catastrophic. Breakdown of thin films can be detected with AFM. Evolution of the wear has also been studied using AFM. Wear is found to be initiated at nono scratches. AFM has been modified to obtain load-displacement curves and for nanoindentation hardness measurements with depth of indentation as low as 1 mm. Scratching and indentation on nanoscales are the powerful ways to screen for adhesion and resistance to deformation of ultrathin fdms. Detection of material transfer on a nanoscale is possible with AFM. Boundary lubrication studies and measurement of lubricant-film thichness with a lateral resolution on a nanoscale have been conducted using AFM. Self-assembled monolyers and chemically-bonded lubricant films with a mobile fraction are superior in wear resistance. Finally, AFM has also shown to be useful for nanofabrication/nanomachining. Friction and wear on micro-and nanoscales have been found to be generally smaller compared to that at macroscales. Therefore, micro/nanotribological studies may help def'me the regimes for ultra-low friction and near zero wear.
The effects of the oriental herbal medicine Saenghyetang(SHT, 生慧湯), which consists of Rehmanniae Radix (熟地黃 九蒸: was made by 9th steam) 40g, Corni Fructus(山茱黃) 16g, Polygalae Radix(遠志) 8g, Zizyphi Spinosae Semen(酸棗仁) 2g, Biotae Semen(柏子仁 去油: oil ingredient was removed) 20g, Poria Cocos(茯笭) 12g, Ginseng Radix(人蔘) 12g, Acori Graminei Rhizoma(石菖蒲) 2g, Sinapis Semen(白芥子) 8g, on learning ability and memory were investigated. Hot water extract(HWE) and ethanol extract(EE) from SHT were used for the studies. Learning ability and memory are related to modifications of synaptic strength among neurons that interactive. Enhanced synaptic coincidence detection leads to improved learning ability and memory. If the NMDA receptor, a synaptic coincidence detector, acts as a graded switch for memory formations, enhanced signal detection by NMDA receptors should enhance learning ability and memory. It was shown that NR2B was increased in the forebrains of oriental medicine-administrated mice, leading to enhanced activation of NMDA receptors and facilitating synaptic potentiation in response to stimulation at 10-100 Hz. These HWE-SHT treated mice exhibited that superior ability in learning and memory when performing various behavioral tasks, showing that NR2B is enhanced by HWE-SHT treatment and also is critical in gating the age-dependent threshold for plasticity and memory formation. NMDA receptor-dependent modifications, which were mediated in part by HWE administration, of synaptic efficacy, therefore, represent a mechanism for associative learning ability and memory. Results suggest that oriental medical enhancement of NR2B contributes to increase intelligence and memory in mammals On the other hand, to examine the effects of EE-SHT on the learning ability and memory in experimental mice, EE-SHT was tested on passive and active avoidance responses. The EE-SHT ameliorated the memory retrieval deficit induced by ethanol in mice, but not other memory impairments. EE-SHT(10, 20mg/100 g, p.o.) did not affect the passive avoidance responses of normal mice in the step through and step down tests, the conditioned and unconditioned avoidance responses of normal mice in the shuttle box, lever press performance tests and the ambulatory activity of normal mice in a normal condition. However, EE-SHT at 20 mg/kg significantly decrease the spontaneous motor activity during the shuttle box test, and also to extend the sleeping time induced by pentobarbital in mice. These results suggest that SHT has an ameliorating effect on memory retrieval impairments and a weak tranquilizing action.
Among 46 Acinetobacter baumannii isolates collected in 2004, two imipenem-resistant isolates were obtained from clinical specimens taken from patients hospitalized in Busan, Republic of Korea. Two carbapenemase-producing isolates were further investigated to determine the mechanism of resistance. These isolates were analyzed by antibiotic susceptibility testing, microbiological tests of carbapenemase activity, determination of pI, transconjugation test, enterobacterial repetitive consensus (ERIC)-PCR, and DNA sequencing. Two cases of infection by A. baumannii producing the IMP-1 ${\beta}$-lactamase were detected. The isolates were characterized by a modified cloverleaf synergy test and EDTA-disk synergy test. Isoelectric focusing of crude bacterial extracts revealed nitrocefin-positive bands with a pI value of 9.0. PCR amplification and characterization of the amplicons by direct sequencing indicated that the isolates carried a $bla_{IMP-l}$ determinant. The isolates were characterized by a multidrug resistance phenotype, including penicillins, extended-spectrum cephalosporins, carbapenems, and aminoglycosides. These results indicate that the observed imipenem resistance of two Korean A. baumannii isolates was due to the spread of an IMP-1-producing clone. Our microbiological test of carbapenemase activity is simple to screen class B metallo-${\beta}$-lactamase-producing clinical isolates to determine their clinical impact and to prevent further spread. This study shows that the $bla_{IMP-l}$ resistance determinant, which is emerging in Korea, may become an emerging therapeutic problem, since clinicians are advised not to use extended-spectrum cephalosporins, imipenem, and aminoglycosides. This observation emphasizes the importance of having effective control measures in Asian hospitals, such as early detection of colonized patients, isolation procedures, and a judicious use of antibiotics.
Sun Haing Lee;Tae Sub Oh;Hong Yeup An;Kyung Sug Park;Sang Oh OH
Journal of the Korean Chemical Society
/
v.36
no.6
/
pp.879-888
/
1992
Separation of the optical isomers of free amino acids by a reversed phase high performance liquid chromatography has been studied by adding a copper(II) complex of L-proline or L-proline derivatives (hydroxy-L-proline, N-benzyl-L-proline, p-xylenyl-L-proline, p-xylenyl-hydroxy-L-proline) in the mobile phase. An OPA postcolumn detection system was used for the detection of amino acids. The chromatographic properties for the free amino acids were discussed in terms of the pH, the kinds and concentration of chelate or organic modifier. The retention behaviors of the free amino acids were considerably different from, those of DNS-amino acids or DABS-amino acids. The enantioselectivity of the free amino acids was better than that of derivatized amino acids. The enantioselectivity between the optical isomers observed by use of the Cu(II)-p-xylenyl-L-proline chiral cheleate was the best among the several copper(II) chelate. A separation mechanism could be illustrated not only by the hydrophobic interaction of the diastereomer with stationary phase but also by the steric effect of the ligand exchange reaction between the free-amino acids and copper chelate.
Park, Se-Hyun;Kwon, Kyung-Su;Kim, Eun-Yi;Kim, Hang-Joon
Journal of Korea Society of Industrial Information Systems
/
v.12
no.5
/
pp.39-46
/
2007
Research on human identification in ubiquitous environment has recently attracted a lot of attention. As one of those research, gait recognition is an efficient method of human identification using physical features of a walking person at a distance. In this paper, we present a human shape extraction and tracking for gait recognition using geodesic active contour models(GACMs) combined with mean shift algorithm The active contour models (ACMs) are very effective to deal with the non-rigid object because of its elastic property. However, they have the limitation that their performance is mainly dependent on the initial curve. To overcome this problem, we combine the mean shift algorithm with the traditional GACMs. The main idea is very simple. Before evolving using level set method, the initial curve in each frame is re-localized near the human region and is resized enough to include the targe region. This mechanism allows for reducing the number of iterations and for handling the large object motion. The proposed system is composed of human region detection and human shape tracking modules. In the human region detection module, the silhouette of a walking person is extracted by background subtraction and morphologic operation. Then human shape are correctly obtained by the GACMs with mean shift algorithm. In experimental results, the proposed method show that it is extracted and tracked efficiently accurate shape for gait recognition.
In recent competitive business environment each enterprise has to be agile and flexible. For these purposes run-time monitoring ofservices provided by an enterprise and early decision making through this becomes core competition of the enterprise. In addition, in order to process various innumerable events which are generated on enterprise systems techniques which make filtering of meaningful data are needed. However, the existing study related with this is nothing but discovering of service faults by monitoring depending upon API of BPEL engine or middleware, or is nothing but processing of simple events based on low-level events. Accordingly, there would be limitations to provide useful business information. In this paper, through situation detection an extended complex event model is presented, which is possible to provide more valuable and useful business information. Concretely, first of all an event processing architecture in an enterprise system is proposed, and event meta-model which is suitable to the proposed architecture is going to be defined. Based on the defined meta-model, It is presented that syntax and semantics of constructs in our event processing language including various and progressive event operators, complex event pattern, key, etc. In addition, an event context mechanism is proposed to analyze more delicate events. Finally, through application studies application possibility of this study would be shown and merits of this event model would be present through comparison with other event model.
Hackers' cyber attack techniques are becoming more sophisticated and diversified, with a form of attack that has never been seen before. In terms of information security vulnerability standard code (CVE), about 90,000 new codes were registered from 2015 to 2020. This indicates that security threats are increasing rapidly. When new security vulnerabilities occur, damage should be minimized by preparing countermeasures for them, but in many cases, companies are insufficient to cover the security management level and response system with a limited security IT budget. The reason is that it takes about a month for analysts to discover vulnerabilities through manual analysis, prepare countermeasures through security equipment, and patch security vulnerabilities. In the case of the public sector, the National Cyber Safety Center distributes and manages security operation policies in a batch. However, it is not easy to accept the security policy according to the characteristics of the manufacturer, and it takes about 3 weeks or more to verify the traffic for each section. In addition, when abnormal traffic inflow occurs, countermeasures such as detection and detection of infringement attacks through vulnerability analysis must be prepared, but there are limitations in response due to the absence of specialized security experts. In this paper, we proposed a method of using the security policy information sharing site "snort.org" to prepare effective countermeasures against new security vulnerability attacks.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.