• Title/Summary/Keyword: Functionalities

Search Result 1,006, Processing Time 0.027 seconds

Physicochemical characteristics and physiological activities of mixture extracts from Liriope platyphylla, Schizandra chinensis, and Panax ginseng C.A. Meyer (맥문동, 오미자 및 인삼 혼합추출물의 이화학적 특성 및 생리활성)

  • Gu, Yul-Ri;Hong, Joo-Heon
    • Food Science and Preservation
    • /
    • v.24 no.3
    • /
    • pp.431-439
    • /
    • 2017
  • This study was conducted to examine the antioxidant activities and physiological activities of mixture extracts (Liriope platyphylla, Schizandra chinensis and Panax ginseng C.A. Meyer) with different extraction mixing ratios (MEC, 2:1:1; ME1, 1:2:1; ME2, 1:1:2; ME3, 1.34:1.33:1.33). The yield of extracts ranged from 25.33 to 33.87%. The total polyphenol and total flavonoid contents of ME1 extracts were 1.01 g/100 g, 0.07 g/100 g, respectively. The total sugar contents of MEC extract was 22.83 g/100 g, respectively. The DPPH and ABTS radical scavenging activities of ME1 extracts at $1,000{\mu}g/mL$ were 26.79% and 21.08%. The superoxide radical scavenging and ferric-reducing antioxidant power of ME1 extracts at $1,000{\mu}g/mL$ were 67.83% and $295.47{\mu}M$, respectively. The functionalities of extracts were investigated with L-132 and RAW264.7 cell lines. The extracts on different mixing ratios did not show the toxicity on L-132 and RAW264.7 cell line in $100-2,500{\mu}g/mL$. The ME1 extract of $1,000{\mu}g/mL$ performed better than other extracts protective effects against oxidative stess in L-132 cells (81.22%) and the ME2 extract at $1,000{\mu}g/mL$ decreased nitric oxide production by $7.48{\mu}M$ which was more potent than other extracts. There results suggest that the ME1 extracts may be a useful functional food material in the food industry.

Isolation of Wild Yeasts and Characterization of Physiological Functionalities of Unrecorded Wild Yeasts Obtained from Flowers and Soils of the Wolpyung Park, Daejeon City and Gykpo Beach, Buan, Jeollabuk-do in Korea (대전광역시 월평공원과 전북 격포해수욕장 주변 야생화와 토양들로부터 야생효모의 분리 및 국내 미기록 효모들의 특성과 생리 활성)

  • Jang, Ji-Eun;Park, Seon-Jeong;Lee, Jong-Soo
    • The Korean Journal of Mycology
    • /
    • v.49 no.1
    • /
    • pp.87-100
    • /
    • 2021
  • This study aimed to isolate wild yeasts obtained from flowers and soil of the Wolpyung park, Daejeon city and Gykpo beach, Buan, Jeollabuk-do in Korea, and to further characterize previously unrecorded wild yeast strains. In total, 88 strains of 62 different species of wild yeasts were isolated from 75 samples obtained from the Wolpyung park. Among these, six strains of Trichosporon moniliiforme and four strains each of Papiliotrema flavescens and Candida melibiosica were isolated. Additionally, 39 strains of 30 different species of wild yeasts were isolated from 35 samples collected from the Gykpo beach. Among the 127 isolated wild yeast strains, 10 strains, including Apiotrichum porosum ASCM32-1, were previously unrecorded. All the 10 previously unrecorded yeasts were oval or global in shape, and three strains, including Candida athensensis WP4-90-3, formed spores. Three strains, including Vishniacozyma taibaiensis WP13-2, were halophilic yeasts which grew in 15% NaCl-containing YPD(yeast extract-peptone-dextrose) medium. Five strains, including C. athensensis WP4-90-3, showed 15% ethanol resistance. Cell-free extracts from Candida oleophila WP5-19-1 and Wickerhamomyces anomalus HO9-2 showed the highest β-glucuronidase inhibitory activity (49.0%) and neutrophil elastase inhibitory activity (38.4%), respectively.

The in vitro antioxidant, α-amylase and α-glucosidase inhibitory ability of different parts of passion fruit (Passiflora edulis) extract (패션프루트 부위별 추출물의 in vitro 항산화와 α-amylase 및 α-glucosidase 저해 활성)

  • Joo Young Jeon;Myung Hyun Kim;Young Sil Han
    • Journal of Applied Biological Chemistry
    • /
    • v.65 no.4
    • /
    • pp.261-267
    • /
    • 2022
  • The purpose of this study is to investigate the various functionalities of the peels, pulps, and seeds of passion fruit. Proximate composition, mineral contents, phenolic acid contents, total polyphenols, total flavonoids, 2,2-diphenyl-1-picrylhydrazyl (DPPH) radical scavenging activities, 2,2'-azinobis(3-ethylbenzothiazoline-6-sulfonic acid) (ABTS) radical scavenging activities, reducing power, α-glucosidase, and α-amylase inhibitory activities were measured for each part of passion fruit. Proximate composition analysis of the passion fruit indicated that moisture content contained (4.78-8.20%), carbohydrate (68.33-73.23%), protein (8.78-13.63%), fat (1.19-11.60%), and ash (1.51-8.80%). K, Ca, Na and Fe were the predominant mineral in the peels. P and Mg were the predominant mineral in the pulps. All the antioxidant activities (total polyphenols, total flavonoids, DPPH radical scavenging, ABTS radical scavenging, and reducing power) showed high results in the seeds. α-Glucosidase and α-amylase inhibitory activities IC50 were in the peels (5.59 and 63.16 mg/mL), in the pulps (3.80 and 31.90 mg/mL), and in the seeds (0.06 and 1.02 mg/mL). These results indicated that the pulps, peels, and seeds of passion fruit have value as natural antioxidants with the high quality functional components.

A Study on the Medical Application and Personal Information Protection of Generative AI (생성형 AI의 의료적 활용과 개인정보보호)

  • Lee, Sookyoung
    • The Korean Society of Law and Medicine
    • /
    • v.24 no.4
    • /
    • pp.67-101
    • /
    • 2023
  • The utilization of generative AI in the medical field is also being rapidly researched. Access to vast data sets reduces the time and energy spent in selecting information. However, as the effort put into content creation decreases, there is a greater likelihood of associated issues arising. For example, with generative AI, users must discern the accuracy of results themselves, as these AIs learn from data within a set period and generate outcomes. While the answers may appear plausible, their sources are often unclear, making it challenging to determine their veracity. Additionally, the possibility of presenting results from a biased or distorted perspective cannot be discounted at present on ethical grounds. Despite these concerns, the field of generative AI is continually advancing, with an increasing number of users leveraging it in various sectors, including biomedical and life sciences. This raises important legal considerations regarding who bears responsibility and to what extent for any damages caused by these high-performance AI algorithms. A general overview of issues with generative AI includes those discussed above, but another perspective arises from its fundamental nature as a large-scale language model ('LLM') AI. There is a civil law concern regarding "the memorization of training data within artificial neural networks and its subsequent reproduction". Medical data, by nature, often reflects personal characteristics of patients, potentially leading to issues such as the regeneration of personal information. The extensive application of generative AI in scenarios beyond traditional AI brings forth the possibility of legal challenges that cannot be ignored. Upon examining the technical characteristics of generative AI and focusing on legal issues, especially concerning the protection of personal information, it's evident that current laws regarding personal information protection, particularly in the context of health and medical data utilization, are inadequate. These laws provide processes for anonymizing and de-identification, specific personal information but fall short when generative AI is applied as software in medical devices. To address the functionalities of generative AI in clinical software, a reevaluation and adjustment of existing laws for the protection of personal information are imperative.

A Study on the Application of Outlier Analysis for Fraud Detection: Focused on Transactions of Auction Exception Agricultural Products (부정 탐지를 위한 이상치 분석 활용방안 연구 : 농수산 상장예외품목 거래를 대상으로)

  • Kim, Dongsung;Kim, Kitae;Kim, Jongwoo;Park, Steve
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.3
    • /
    • pp.93-108
    • /
    • 2014
  • To support business decision making, interests and efforts to analyze and use transaction data in different perspectives are increasing. Such efforts are not only limited to customer management or marketing, but also used for monitoring and detecting fraud transactions. Fraud transactions are evolving into various patterns by taking advantage of information technology. To reflect the evolution of fraud transactions, there are many efforts on fraud detection methods and advanced application systems in order to improve the accuracy and ease of fraud detection. As a case of fraud detection, this study aims to provide effective fraud detection methods for auction exception agricultural products in the largest Korean agricultural wholesale market. Auction exception products policy exists to complement auction-based trades in agricultural wholesale market. That is, most trades on agricultural products are performed by auction; however, specific products are assigned as auction exception products when total volumes of products are relatively small, the number of wholesalers is small, or there are difficulties for wholesalers to purchase the products. However, auction exception products policy makes several problems on fairness and transparency of transaction, which requires help of fraud detection. In this study, to generate fraud detection rules, real huge agricultural products trade transaction data from 2008 to 2010 in the market are analyzed, which increase more than 1 million transactions and 1 billion US dollar in transaction volume. Agricultural transaction data has unique characteristics such as frequent changes in supply volumes and turbulent time-dependent changes in price. Since this was the first trial to identify fraud transactions in this domain, there was no training data set for supervised learning. So, fraud detection rules are generated using outlier detection approach. We assume that outlier transactions have more possibility of fraud transactions than normal transactions. The outlier transactions are identified to compare daily average unit price, weekly average unit price, and quarterly average unit price of product items. Also quarterly averages unit price of product items of the specific wholesalers are used to identify outlier transactions. The reliability of generated fraud detection rules are confirmed by domain experts. To determine whether a transaction is fraudulent or not, normal distribution and normalized Z-value concept are applied. That is, a unit price of a transaction is transformed to Z-value to calculate the occurrence probability when we approximate the distribution of unit prices to normal distribution. The modified Z-value of the unit price in the transaction is used rather than using the original Z-value of it. The reason is that in the case of auction exception agricultural products, Z-values are influenced by outlier fraud transactions themselves because the number of wholesalers is small. The modified Z-values are called Self-Eliminated Z-scores because they are calculated excluding the unit price of the specific transaction which is subject to check whether it is fraud transaction or not. To show the usefulness of the proposed approach, a prototype of fraud transaction detection system is developed using Delphi. The system consists of five main menus and related submenus. First functionalities of the system is to import transaction databases. Next important functions are to set up fraud detection parameters. By changing fraud detection parameters, system users can control the number of potential fraud transactions. Execution functions provide fraud detection results which are found based on fraud detection parameters. The potential fraud transactions can be viewed on screen or exported as files. The study is an initial trial to identify fraud transactions in Auction Exception Agricultural Products. There are still many remained research topics of the issue. First, the scope of analysis data was limited due to the availability of data. It is necessary to include more data on transactions, wholesalers, and producers to detect fraud transactions more accurately. Next, we need to extend the scope of fraud transaction detection to fishery products. Also there are many possibilities to apply different data mining techniques for fraud detection. For example, time series approach is a potential technique to apply the problem. Even though outlier transactions are detected based on unit prices of transactions, however it is possible to derive fraud detection rules based on transaction volumes.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.