• Title/Summary/Keyword: Id3

Search Result 975, Processing Time 0.037 seconds

Cloning and Identification of Essential Residues for Thermostable β-glucosidase (BgIB) from Thermotoga maritima (Thermotoga maritima로부터 고온성 β-glucosidase (BgIB)의 클로닝과 필수아미노산 잔기의 확인)

  • Hong, Su-Young;Cho, Kye-Man;Kim, Yong-Hee;Hong, Sun-Joo;Cho, Soo-Jeong;Cho, Yong-Un;Kim, Hoon;Yun, Han-Dae
    • Journal of Life Science
    • /
    • v.16 no.7 s.80
    • /
    • pp.1148-1157
    • /
    • 2006
  • A hyperthermophilic bacterium Thernotoga maritima produced thermostable ${\beta}-glucosidase$. The gene encoding ${\beta}-glucosidase$ from T. maritima MSB8 was cloned and expressed in Escherichia coli. The en-zyme (BgIB) hydrolyzed ${\beta}-glucosidase$ linkages between glucose and alkyl, aryl of saccharide groups such as salicin, arbutin, and $_pNPG$. The insert DNA contained ORF with 2,166 bp encodes a 721 amino acids (calculated molecular mass of 80,964 and pl of 4.93). The amino a.id sequence of BglB showed the similarity to family 3 glycosyl hydrolases. The molecular weight of the enzyme was estimated to be approximately 81kDa by MUG-nondenaturing PAGE (4-methylumbelliferyl 13-D-glucoside-nondenaturing polyacrylamide gel electophoresis) and SDS-PACE. The ${\beta}-glucosidase$ exhibited maximal activity at pH 7.0 and $80^{\circ}C$. By exchanging two possible residues (Glu-232 and Asp-242) to Ala by site-directed mutagenesis method, it was found that these were essential for enzymatic activity.

A Study on a Secure Internet Service Provider Model Using Smart Secure-Pad (스마트 보안패드를 이용한 안전한 인터넷 서비스 제공 모델에 관한 연구)

  • Lee, Jae-Sik;Kim, Hyung-Joo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1428-1438
    • /
    • 2013
  • Services take place in Internet environment, a formation of the trust relationship between user and service provider for services. Different authentication schemes such as using Certificate of Public Key Infrastructure authentication and using ID/PW for a simple user authentication have been proposed for trust relationship. In addition, in the case of electronic financial transactions, transaction integrity and non-repudiation features are provided. These services are provided in Internet environment, use various measures to ensure service safety. However, it was difficult to prevent attacks using existing security technology because of emergence of MITB attack that manipulate the memory area of the Web browser and social engineering attacks such as phishing/pharming, requires application of new security technologies became. In this paper, we propose a concept of smart secure-pad, and utilize it safely formed a trust relationship between user and service provider, a model has been proposed to ensure safety of data transmission. Proposed model's security evaluation results show security against to MITB attack and phishing/pharming that can't be prevent attack using existing security technology. In addition, service provider can easily apply the model in safe environment can provide Internet service using provided representative services applying the proposed model.

The Effect of Adding Kami-guibi-tang to Acetylcholinesterase Inhibitor Treatment on the Cognitive Function of Mild Alzheimer's Disease Patients: Study Protocol of a Randomized, Placebo-Controlled, Double-Blind Pilot Trial

  • Yang, Seung-bo;Kim, Ha-ri;Shin, Hee-yeon;Kim, Jeong-hwa;Lee, Chang-woo;Jahng, Geon-ho;Park, Seong-uk;Ko, Chang-nam;Park, Jung-mi
    • The Journal of Internal Korean Medicine
    • /
    • v.41 no.3
    • /
    • pp.326-338
    • /
    • 2020
  • Background: Alzheimer's disease (AD) is a chronic neurodegenerative disease that causes disorientation, mood swings, problems with language, and difficulty remembering recent events. Acetylcholinesterase inhibitors (AchEIs) and memantine have been used to slow the course of the disease, but they can neither modify its progression nor prevent disease onset. Previous studies have suggested that Kami-guibi-tang (KGT) could be beneficial for supporting cognitive function in AD patients, but few clinical trials have been published. This pilot study aimed to evaluate the effect of KGT in improving cognitive function in AD patients. Methods: The study will be a randomized, placebo-controlled, double-blind, single-center trial conducted using subjects diagnosed with mild AD by neurologists. Study subjects will be randomly assigned to either a treatment or control group. The treatment group will receive KGT granules for 24 weeks, while the control group will receive placebo granules. AchEI administration will be maintained in both groups during the entirety of the study. Subjects will be assessed using the following exams: the Seoul Neuropsychologic Screening Battery (SNSB) for cognitive function; brain magnetic resonance imaging (MRI) for brain metabolite, neurotransmitter, and cerebral blood flow (CBF) measurements; the Korean version of Quality of Life-Alzheimer's Disease (KQol-AD) for quality of life; the Caregiver-Administered Neuropsychiatric Inventory (CGA-NPI) for neurobehavioral symptoms; blood tests for amyloid and tau proteins and general blood parameters; and electrocardiography (ECG) before and after taking the medication. Discussion: Our findings will provide insight into the feasibility of large-scale trials to consolidate evidence for the efficacy of KGT for dementia treatment. Registration ID in CRIS: KCT0002904 (Clinical Research Information Service of the Republic of Korea).

Accuracy Analysis of GNSS-based Public Surveying and Proposal for Work Processes (GNSS관측 공공측량 정확도 분석 및 업무프로세스 제안)

  • Bae, Tae-Suk
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.36 no.6
    • /
    • pp.457-467
    • /
    • 2018
  • Currently, the regulation and rules for public surveying and the UCPs (Unified Control Points) adapts those of the triangulated traverse surveying. In addition, such regulations do not take account of the unique characteristics of GNSS (Global Navigation Satellite System) surveying, thus there are difficulties in field work and data processing afterwards. A detailed procesure of GNSS processing has not yet been described either, and the verification of accuracy does not follow the generic standards. In order to propose an appropriate procedure for field surveys, we processed a short session (30 minutes) based on the scenarios similar to actual situations. The reference network in Seoul was used to process the same data span for 3 days. The temporal variation during the day was evaluated as well. We analyzed the accuracy of the estimated coordinates depending on the parameterization of tropospheric delay, which was compared with the 24-hr static processing results. Estimating the tropospheric delay is advantageous for the accuracy and stability of the coordinates, resulting in about 5 mm and 10 mm of RMSE (Root Mean Squared Error) for horizontal and vertical components, respectively. Based on the test results, we propose a procedure to estimate the daily solution and then combine them to estimate the final solution by applying the minimum constraints (no-net-translation condition). It is necessary to develop a web-based processing system using a high-end softwares. Additionally, it is also required to standardize the ID of the public control points and the UCPs for the automatic GNSS processing.

A study on user authentication method using speaker authentication mechanism in login process (로그인 과정에서의 화자인증 메커니즘을 이용한 사용자인증 방안 연구)

  • Kim, Nam-Ho;Choi, Ji-Young
    • Smart Media Journal
    • /
    • v.8 no.3
    • /
    • pp.23-30
    • /
    • 2019
  • With the popularization of the Internet and smartphone uses, people in the modern era are living in a multi-channel environment in which they access the information system freely through various methods and media. In the process of utilizing such services, users must authenticate themselves, the typical of which is ID & password authentication. It is considered the most convenient method as it can be authenticated only through the keyboard after remembering its own credentials. On the other hand, modern web services only allow passwords to be set with high complexity by different combinations. Passwords consisting of these complex strings also increase proportionally, since the more services users want to use, the more user authentication information they need to remember is recommended periodically to prevent personal information leakage. It is difficult for the blind, the disabled, or the elderly to remember the authentication information of users with such high entropy values and to use it through keyboard input. Therefore, this paper proposes a user authentication method using Google Assistant, MFCC and DTW algorithms and speaker authentication to provide the handicapped users with an easy user authentication method in the login process.

A Study on Non-Fungible Token Platform for Usability and Privacy Improvement (사용성 및 프라이버시 개선을 위한 NFT 플랫폼 연구)

  • Kang, Myung Joe;Kim, Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.11
    • /
    • pp.403-410
    • /
    • 2022
  • Non-Fungible Tokens (NFTs) created on the basis of blockchain have their own unique value, so they cannot be forged or exchanged with other tokens or coins. Using these characteristics, NFTs can be issued to digital assets such as images, videos, artworks, game characters, and items to claim ownership of digital assets among many users and objects in cyberspace, as well as proving the original. However, interest in NFTs exploded from the beginning of 2020, causing a lot of load on the blockchain network, and as a result, users are experiencing problems such as delays in computational processing or very large fees in the mining process. Additionally, all actions of users are stored in the blockchain, and digital assets are stored in a blockchain-based distributed file storage system, which may unnecessarily expose the personal information of users who do not want to identify themselves on the Internet. In this paper, we propose an NFT platform using cloud computing, access gate, conversion table, and cloud ID to improve usability and privacy problems that occur in existing system. For performance comparison between local and cloud systems, we measured the gas used for smart contract deployment and NFT-issued transaction. As a result, even though the cloud system used the same experimental environment and parameters, it saved about 3.75% of gas for smart contract deployment and about 4.6% for NFT-generated transaction, confirming that the cloud system can handle computations more efficiently than the local system.

La signification du dépassement de soi dans le Thomisme (토미즘의 인간적 행위에서 '자기초월'의 의미)

  • Lee, Myung-Gon
    • Journal of Korean Philosophical Society
    • /
    • v.105
    • /
    • pp.49-74
    • /
    • 2008
  • Le but de notre recherche est $d^{\prime}{\acute{e}}clairer$ la nature du $d{\acute{e}}passement$ de soi aux actes humaines dnas le Thomisme. Dans le Thomisme la nature humaine qui a la raison et la $volont{\acute{e}}$ a une $intentionnalit{\acute{e}}$ ver la fin ultime. De sorte que les actes humaines qui $corr{\grave{e}}spondent$ cette nature humaine a un $caract{\grave{e}}re$ du $d{\acute{e}}passement$ de soi visant toujours plus que le $pr{\acute{e}}sent$. Le fondement de cet acte du $d{\acute{e}}passement$ de soi est $l^{\prime}{\hat{a}}me$ rationelle qui est la forme substantielle de l'homme et de soi subsistante. Chez st. Thomas ce $caract{\grave{e}}re$ du $d{\acute{e}}passement$ a trois ${\acute{e}}taps$ distinctes : (1)le $d{\acute{e}}passement$ dans l'ordre du $progr{\grave{e}}s$ naturel (2)le $d{\acute{e}}passement$ de soi dans l'ordre morale (3)le $d{\acute{e}}passement$ de soi dans l'ordre de la religion. Le $d{\acute{e}}passement$ dans l'ordre du $progr{\grave{e}}s$ naturel apparaît d'abord au $caract{\grave{e}}re$ de $l^{\prime}{\hat{a}}me$ rationelle. St. Thomas $d{\acute{e}}finit$ les vertus rationelles comme $^{\prime}pl{\acute{e}}nitude$ dans le $f{\acute{e}}blesse$, parce qu'il $consid{\grave{e}}re$ la vertu rationelle comme $finalit{\acute{e}}$ des $facult{\acute{e}}s$ du sens $ext{\acute{e}}rieur$. L'homme par le sens $ext{\acute{e}}rieur$ reçoit des $esp{\grave{e}}ces$ sensibles(especies sensibilis), et $poss{\grave{e}}de$ les images. Puis cette images sensible devenant la $r{\acute{e}}alit{\acute{e}}$ spirituelle sous forme du $m{\acute{e}}moire$ et du souvenir, devient aussi la partie de son existence. Donc chez st. Thomas la vertue rationnelle n'est pas simplement un $facult{\acute{e}}$ $sp{\acute{e}}culative$, mais elle est dans l'ordre du devenir et du $pl{\acute{e}}nitude$. A cette raison st. Thomas compare la raison(ratio) comme $g{\acute{e}}n{\acute{e}}ration$(generatio) et l'intelleigence(intellectus) comme ${\hat{e}}tre$(esse). C'est-${\grave{a}}$-dire la raison $d{\acute{e}}passe$ le sensible et l'intelligence $d{\acute{e}}passe$ la raison. Le $d{\acute{e}}passement$ de soi dans l'ordre morale $li{\acute{e}}$ au $progr{\grave{e}}s$ de la conscience. Chez st. Thomas la perception de l'objet $ext{\acute{e}}rieur$ ayant pour but d'avoir conscience de soi, se perfectionne ${\grave{a}}$ ceci. D'avoir conscience de soi signifie d'avoir $l^{\prime}identit{\acute{e}}$ de soi, et de-$l{\grave{a}}$ apparaît l'acte moral en tnat qu'acte $sp{\acute{e}}cifique$ humain. La raison pour laquelle la vie morale elle-$m{\hat{e}}me$ a un $caract{\grave{e}}$ du $d{\acute{e}}passement$, c'est que l'acte humaine qui corresfonde ${\grave{a}}$ $l^{\prime}identit{\acute{e}}$ du soi est une vie qui vise toujours plus que le $pr{\acute{e}}sent$ ou $l^{\prime}id{\acute{e}}al$. Quant au problem du $d{\acute{e}}passement$ dans l'ordre de la religion, chez st. Thomas en raison de $l^{\prime}affinit{\acute{e}}$ entre Dieu et l'homme, $o{\grave{u}}$ il y a des vertues infuses(virtutes infusas), il y a une sorte du $d{\acute{e}}passement$ religieux. Car ces vertues infuses signifie la communication entre Dieu(${\hat{E}}tre$ absolu) et l'homme(${\hat{e}}tre$ fine) et cela signifie le $d{\acute{e}}passement$ de l'humain vers le divin. Cette $id{\acute{e}}e$ thomiste permet de penser que $o{\grave{u}}$ il y a un $d{\acute{e}}passement$ de soi dans la vie religuse d'une personne, il y a une intervention $r{\acute{e}}elle$ de la providence divine. Cette $pens{\acute{e}}e$ thomiste sera alors un $caract{\grave{e}}$ $r{\acute{e}}aliste$ face ${\grave{a}}$ la $pens{\acute{e}}e$ $id{\acute{e}}aliste$ qui n'admette que le $d{\acute{e}}passement$ absolu comme $d{\acute{e}}passement$ religieux.

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.

Study of 188Re(V)-DMSA for Treatment of Cancer: Radiolabeling and Biodistribution (암 치료를 위한 188Re(V)-DMSA에 관한 연구: 방사성동위원소 표지와 생체내 분포)

  • Kim, Young Ju;Jeong, Jae Min;Chang, Young Soo;Lee, Dong Soo;Chung, June-Key;Lee, Myung Chul;Koh, Chang-Soon
    • The Korean Journal of Nuclear Medicine
    • /
    • v.32 no.1
    • /
    • pp.81-88
    • /
    • 1998
  • The purpose of this study was to examine the radiolabeling and biodistribution of $^{188}Re(V)$-DMSA as a therapeutic cancer radiopharmaceutical. We made a DMSA kit($NaHCO_3$ 1.5 mg, meso-2,3-dimercaptosuccinic acid 1.0 mg, L(+)-ascorbic acid 0.7 mg, $SnCl_2{\cdot}2H_2O$ 0.34 mg, pH 2.9) for labeling with $^{188}Re$. In this kit, $^{188}ReO_4{^-}$ 5 mCi/2 ml added and boiled at $100^{\circ}C$ for 3 hr in water bath. The final pH adjusted to 7.5 with 7% $NaHCO_3$ solution. We checked the labelling efficacy with TLC-SG(n-butanol : acetic acid : $H_2O$ = 3 : 2 : 3) and examined the stability both in room temperature and in serum at $37^{\circ}C$. Biodistribution(1, 3, 13, 24, 48 hr) of $^{188}Re(V)$-DMSA compound was evaluated in Sarcoma 180 tumor-bearing mice. Each labeling efficiency and stability at room temperature for 48 hours was over 98% and 95%, respectively. The stability in serum were 82%(6 hr) and 85%(48 hr). Tumor uptake of $^{188}Re(V)$-DMSA in Sarcoma 180-bearing mice were $0.66{\pm}0.15%$(1 hr), $0.51{\pm}0.10%$(3 hr), $0.19{\pm}0.05%$(24 hr) and $0.13{\pm}0.02%$(48 hr). These result are consistent with those of $^{99m}Tc(V)$-DMSA which were reported previously. In conclusion, $^{188}Re(V)$-DMSA may be a useful therapeutic radiopharmaceutical for treating some cancers and metastatic bone lesion.

  • PDF

Clinical and Histopathological Studies on Carcinoma of the Uterine Cervix in Taegu (대구지방으 자궁경부암에 재한 임상 및 병리조직학적 연구)

  • Choi, Joon-Hyuk;Choi, Won-Hee;Hong, Suk-Jae;Lee, Tae-Sook
    • Journal of Yeungnam Medical Science
    • /
    • v.5 no.2
    • /
    • pp.121-128
    • /
    • 1988
  • Clinical and histopathological studies were made on 202 cases of malignancy of cervix, that were visited to the Department of Obstertrics and Gynecology, Yeungnam University Hospital, during 5 years from 1983 to 1987. The results were summarised as follows. 1. Malignancies of the uterine cervix were 10% of total female malignancies. 2. Among 202 cases, 195 cases(96.5%) were squamous cell carcinoma, in which 60 cases(30.0%) of carcinoma in situ, 9 cases(4%) of microinvasive, and 126 cases(62.5%) of invasive carcinoma were included. 3. The average age of the patients with squamous cell carcinoma was 49.4 years old. ; In cases of carcinoma in situ, it was 43.8, microinvasive, 40.0, invasive 52.1 years old. 4. Clinical symptoms of the patient with squamous cell carcinoma in order of frequency were as follows. ; vaginal bleeding(47.5%), abnormal cytology(15.4%), and abnormal vaginal discharge(9.4%). 5. Duration of the chief complaints was most commanly less than 6 months(73.2%), and the average duration was 3.8 months. 6. The most common age of marriage was between 19 to 22 years 0Id(46.5%). The average was 21.5 years old. 7. The gravity was 51.5% in 5~8 times, and average 6.2 times. The parity was 61.9% in 1~4 times, and average 3.9 times. 8. The subdivision of 126 cases of invasive carcinoma was made according to FIGO stage classification, stage I, 40 cases(31.8%), stage II, 54 cases(42.9%), stage III, 11 cases(8.7%), and stage IV, 8 cases(6.3%). 9. The histologic subtypes of invasive squamous cell carcinoma were distributed as follows. ; large cell keratinizing type, 25 cases(19.8%), large cell nonkeratinizing type, 101 cases(80.2%). 10. In the cytologic diagnosis, class I was 2 cases(l.9%), class II was 16 cases(15.1%), class III was 33 cases(31.1%), class IV was 31 cases(29.3%), class V was 24 cases(24.6%). 11. The frequency of lymph node metastasis was 7.5% in stage I, and 11.1% in stage II.

  • PDF