• Title/Summary/Keyword: Information release

Search Result 771, Processing Time 0.027 seconds

Identification and Characterization of Polymorphic Microsatellite DNA Markers Using Next-generation Sequencing in Parapristipoma trilineatum (차세대 염기서열 분석법을 사용한 벤자리(Parapristipoma trilineatum)의 microsatellite 마커의 개발 및 유전학적 특성 분석)

  • Chun Mae Dong;Mi-Nan Lee;Jae Koo Noh;Jin Woo Park;Young-Ok Kim;Eun-Mi Kim
    • Journal of Life Science
    • /
    • v.33 no.8
    • /
    • pp.623-631
    • /
    • 2023
  • This study was conducted to develop microsatellite markers in Parapristipoma trilineatum using next-generation sequencing. A total of 402,244,934 reads were generated on the Illumina Hiseq X Ten System, yielding 60,738,985,034 bp of sequences. The de novo assembly resulted in 1,320,995 contigs. A total of 952,326 contigs (0.016%) including 151 microsatellite loci were derived from the 1,320,995 contigs longer than 640 bp. A total of 34 primer sets were designed from the 151 microsatellite loci. As a result, 15 microsatellite loci were chosen and used for assuming population genetic parameters in the wild and farmed populations. The mean number of effective alleles was 12, ranging from 6 to 25. The observed heterozygosity (HO) and the expected heterozygosity (HE) ranged between 0.530 and 0.873, with an average of 0.750, and from 0.647 to 0.895, with an average of 0.793, respectively. According to these results, the developed set of 15 microsatellite markers is expected to be useful for the analysis of genetic characteristics in the population of P. trilineatum in Korea. There are requirements now for further genetic information, fishery resource management, breeding guidelines, support with the selection of breeds and studies on the effects of release, all of which will improve species conservation, and through future research, we aim to offer genetic foundational data with that goal.

Development of simultaneous detection method for living modified cotton varieties MON757, MON88702, COT67B, and GHB811 (유전자변형 면화 MON757, MON88702, COT67B, GHB811의 동시검출법 개발)

  • Il Ryong Kim;Min-A Seol;A-Mi Yoon;Jung Ro Lee;Wonkyun Choi
    • Korean Journal of Environmental Biology
    • /
    • v.39 no.4
    • /
    • pp.415-422
    • /
    • 2021
  • Cotton is an important fiber crop, and its seeds are used as feed for dairy cattle. Crop biotechnology has been used to improve agronomic traits and quality in the agricultural industry. The frequent unintentional release of LM cotton into the environment in South Korea is attributed to the increased application of living modified (LM) cotton in food, feed, and processing industries. To identify and monitor the LM cotton, a method for detecting the approved LM cotton in South Korea is required. In this study, we developed a method for the simultaneous detection of four LM cotton varieties, MON757, MON88702, COT67B, and GHB811. The genetic information of each LM event was obtained from the European Commission-Joint Research Centre and Animal and Plant Quarantine Agency. We designed event-specific primers to develop a multiplex PCR method for LM cotton and confirmed the specific amplification. Using specificity assay, random reference material(RM) mixture analysis and limit of detection(LOD), we verified the accuracy and specificity of the multiplex PCR method. Our results demonstrate that the method enabled the detection of each event and validation of the specificity using other LM RMs. The efficiency of multiplex PCR was further verified using a random RM mixture. Based on the LOD, the method identified 25 ng of template DNA in a single reaction. In summary, we developed a multiplex PCR method for simultaneous detection of four LM cotton varieties, for possible application in LM volunteer analysis.

An Analysis of Market Trend and Profitability Model for Mobile Social Game : A Case Study of Japanese Mobile Social Game (모바일 소셜게임의 시장동향 및 수익모델 분석 - 일본 모바일 소셜게임을 중심으로 -)

  • Kim, Han-Gook
    • Journal of Korea Entertainment Industry Association
    • /
    • v.6 no.4
    • /
    • pp.82-92
    • /
    • 2012
  • Recently people who enjoy social game via mobile devices significantly are increasing depending on the rapid adoption of smart phones and the development of the network such as LTE. Most of them are enjoying the casual gaming mobile social games that you are able to play easily, but social issues like health problems due to long play time are emerging. The users, however, do not last long because of the simplicity of the game, and there are few people who actually buy game items even though they play it long time. This study has been conducted aiming to overcome such difficulties. This study suggests ways to generate constantly revenue avoiding short-term box-office after the release of mobile social games based on the analysis for market trend and profitability of the mobile social game. In addition, by applying profitability model analyzed to Japan's most successful game practices, this paper suggests the concrete methods about the commitment of the users. For summarizing the main achievements of this paper, providing the latest market information about mobile social games, analysis of profitability, practical implications for the commitment of the users are presented.

Three Stage Performances and Herding of Domestic and Foreign Films in the Korean Market (한국 시장에서 상영한 한국영화와 외국영화의 3단계 성과와 군집행동(Herding behavior)현상의 분석)

  • Hahn, Minhi;Kang, Hyunmo;Kim, Dae-Seung
    • Asia Marketing Journal
    • /
    • v.11 no.4
    • /
    • pp.21-48
    • /
    • 2010
  • This article analyzes film performances in the Korean movie market utilizing three-stage models that incorporate available information in three different stages of the movie life cycle, i.e., at the time of its release, at the end of the first week, and at the end of its life cycle. Based on the premise that the performance of a movie is affected principally by factors of scale, evaluation, and competition, we attempted to ascertain the effects on these factors on performances, and how they differ in different stages. Also, by analyzing domestic and foreign movies released in Korea separately, we were able to compare the different effects of the three factors on the performances of the two categories of movies. Additionally, our movie performance models incorporated herding behavior among the customers. Our results demonstrate that herding is prominently observed after the first week only for domestic movies. In general, the scale factor has been shown to be most important for movie performances in all stages. For foreign films, it is particularly critical for the first week and total performances. Whereas the evaluation factor influences domestic film performance more strongly at the screen choice stage, it affects the performance of foreign films more strongly in the later stages of the life cycle. As compared to foreign films, domestic film performance appears to be more sensitive to the competition factor. We also discuss the effects of covariates such as genre and symbolicity on movie performance.

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Breeding Status and Management System Improvement of Pseudemys concinna and Mauremys sinensis Designated as Invasive Alien Turtles in South Korea (법적지정 생태계교란생물의 사육 현황과 관리 개선 방안 - 리버쿠터와 중국줄무늬목거북을 중심으로)

  • Kim, Philjae;Yeun, Sujung;An, Hyeonju;Kim, Su Hwan;Lee, Hyohyemi
    • Ecology and Resilient Infrastructure
    • /
    • v.7 no.4
    • /
    • pp.388-395
    • /
    • 2020
  • Exotic species have been imported for economic purposes, but more recently, an increasing number of animals are imported as pets. With the increasing popularity of two species of turtles, Mauremys sinensis and Pseudemys concinna, the number of pet turtle owners has gradually increased since 2014. The number of turtles increased by 180 in 2017 and 281 in 2019. However, these turtle species have been abandoned to nature, owing to their long lifespans and the changes in conditions of pet owners. The two turtle species have been designated as invasive alien species (AIS) in Korea considering their ecological risks, and the Biological Diversity Act prohibits their release. The owners of Mauremys sinensis and Pseudemys concinna are required to submit the "Application for Approval of Breeding and Grace for AIS" document. In this study, the breeding conditions for the two turtle species were investigated by analyzing the information in the submitted applications for six months (e.g., the suitability of breeding facilities, number of turtles, breeding period, type of pet adoption, and local district of pet owner). A total of 614 cases were analyzed. Because only 58% of breeders provided suitable breeding conditions, breeding information and responsible pet ownership training should be offered to prevent abandonment in natural ecosystems. In addition, continuous monitoring is necessary to prepare for potential problems caused by the lack of information in many applications and the one-off licensing policy.

Dietary total sugar intake of Koreans: Based on the Korea National Health and Nutrition Examination Survey (KNHANES), 2008-2011 (한국인의 총 당류 섭취실태 평가: 2008~2011년 국민건강영양조사 자료를 이용하여)

  • Lee, Haeng-Shin;Kwon, Sung-Ok;Yon, Miyong;Kim, Dohee;Lee, Jee-Yeon;Nam, Jiwoon;Park, Seung-Joo;Yeon, Jee-Young;Lee, Soon-Kyu;Lee, Hye-Young;Kwon, Oh-Sang;Kim, Cho-Il
    • Journal of Nutrition and Health
    • /
    • v.47 no.4
    • /
    • pp.268-276
    • /
    • 2014
  • Purpose: The aim of this study is to estimate total sugar intake and identify major food sources of total sugar intake in the diet of the Korean population. Methods: Dietary intake data of 33,745 subjects aged one year and over from the KNHANES 2008-2011 were used in the analysis. Information on dietary intake was obtained by one day 24-hour recall method in KNHANES. A database for total sugar content of foods reported in the KNHANES was established using Release 25 of the U.S. Department of Agriculture National Nutrient Database for Standard Reference, a total sugar database from the Ministry of Food and Drug Safety, and information from nutrition labeling of processed foods. With this database, total sugar intake of each subject was estimated from dietary intake data using SAS. Results: Mean total sugar intake of Koreans was 61.4 g/person/day, corresponding to 12.8% of total daily energy intake. More than half of this amount (35.0 g/day, 7.1% of daily energy intake) was from processed foods. The top five processed food sources of total sugar intake for Koreans were granulated sugar, carbonated beverages, coffee, breads, and fruit and vegetable drinks. Compared to other age groups, total sugar intake of adolescents and young adults was much higher (12 to 18 yrs, 69.6 g/day and 19 to 29 yrs, 68.4 g/day) with higher beverage intake that beverage-driven sugar amounted up to 25% of total sugar intake. Conclusion: This study revealed that more elaborated and customized measures are needed for control of sugar intake of different subpopulation groups, even though current total sugar intake of Koreans was within the range (10-20% of daily energy intake) recommended by Dietary Reference Intakes for Koreans. In addition, development of a more reliable database on total sugar and added sugar content of foods commonly consumed by Koreans is warranted.

Study on the Consequence Effect Analysis & Process Hazard Review at Gas Release from Hydrogen Fluoride Storage Tank (최근 불산 저장탱크에서의 가스 누출시 공정위험 및 결과영향 분석)

  • Ko, JaeSun
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.4
    • /
    • pp.449-461
    • /
    • 2013
  • As the hydrofluoric acid leak in Gumi-si, Gyeongsangbuk-do or hydrochloric acid leak in Ulsan, Gyeongsangnam-do demonstrated, chemical related accidents are mostly caused by large amounts of volatile toxic substances leaking due to the damages of storage tank or pipe lines of transporter. Safety assessment is the most important concern because such toxic material accidents cause human and material damages to the environment and atmosphere of the surrounding area. Therefore, in this study, a hydrofluoric acid leaked from a storage tank was selected as the study example to simulate the leaked substance diffusing into the atmosphere and result analysis was performed through the numerical Analysis and diffusion simulation of ALOHA(Areal Location of Hazardous Atmospheres). the results of a qualitative evaluation of HAZOP (Hazard Operability)was looked at to find that the flange leak, operation delay due to leakage of the valve and the hose, and toxic gas leak were danger factors. Possibility of fire from temperature, pressure and corrosion, nitrogen supply overpressure and toxic leak from internal corrosion of tank or pipe joints were also found to be high. ALOHA resulting effects were a little different depending on the input data of Dense Gas Model, however, the wind direction and speed, rather than atmospheric stability, played bigger role. Higher wind speed affected the diffusion of contaminant. In term of the diffusion concentration, both liquid and gas leaks resulted in almost the same $LC_{50}$ and ALOHA AEGL-3(Acute Exposure Guidline Level) values. Each scenarios showed almost identical results in ALOHA model. Therefore, a buffer distance of toxic gas can be determined by comparing the numerical analysis and the diffusion concentration to the IDLH(Immediately Dangerous to Life and Health). Such study will help perform the risk assessment of toxic leak more efficiently and be utilized in establishing community emergency response system properly.

Review of the Reasons in Cases Requiring Varus/Valgus Constrained Prosthesis in Primary Total Knee Arthroplasty (일차 슬관절 전치환술 시내·외반 구속형 치환물이 필요했던 사례들의 원인 분석)

  • Kong, Dong Yi;Park, Sang Hoon;Choi, Choong Hyeok
    • Journal of the Korean Orthopaedic Association
    • /
    • v.56 no.3
    • /
    • pp.253-260
    • /
    • 2021
  • Purpose: The least constrained prosthesis is generally recommended in primary total knee arthroplasty (TKA). Nevertheless, a varus/valgus constrained (VVC) prosthesis should be implanted when a semi-constrained prosthesis is not good for adequate stability, especially in the coronal plane. In domestic situations, however, the VVC prosthesis could not always be prepared for every primary TKA case. Therefore, it is sometimes impractical to use a VVC prosthesis for unsual unstable situations. This study provides information for preparing VVC prostheses in the preoperative planning of primary TKA through an analysis of primary VVC TKA cases. Materials and Methods: This study reviewed 1,797 primary TKAs, performed between May 2003 and February 2016. The reasons for requiring VVC prosthesis and the preoperative conditions in 29 TKAs that underwent primary TKA with a VVC prosthesis were analyzed retrospectively. Results: In primary TKA, 29 cases (1.6%) in 27 patients (6 male and 21 female) used VVC prosthesis. Two patients underwent a VVC prosthesis on both knees. The mean age of the patients was 63.4 years old (34-79 years). The mean flexion contracture was 16.2° (-20°-90°), and the mean angle of great flexion was 111.7° (35°-145°). The situations requiring a VVC prosthesis were severe valgus deformity in 10 knees, knee stiffness requiring extensive soft tissue release in 10 knees, previously injured collateral ligaments in five knees, and distal femoral bone defect due to avascular necrosis in four knees. The mean tibiofemoral angle was 25.7° (21°-43°) in 10 cases with a valgus deformity. The mean flexion contracture was 37.5° (20°-90°), and the mean range of motion was 48.5° (10°-70°) in 10 cases with knee stiffness. Conclusion: The preparation of VVC prosthesis is recommended, even for primary TKA in cases of severe valgus deformity (tibiofemoral angle>20°), stiff knee (the range of motion: less than 70° with more than 20° flexion contracture), and the cases with a previous collateral ligament injury. This information will help in the preparation of adequate TKA prostheses for unusual unstable situations.

Study on Horizontal and Vertical Temperature Analysis of Cable Fire in Common Duct using Room Corner Experiment (룸코너 실험을 이용한 공동구 케이블 화재 시 수평·수직 방향 온도 분석에 관한 연구)

  • JaeYeop Kim;SeHong Min
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.3
    • /
    • pp.634-643
    • /
    • 2023
  • Purpose: Underground common duct fires are steadily occurring, and the proportion of property damage is particularly large among property and human casualties caused by fires. Especially, cable fires that occur in common areas can spread vertically quickly and pose a great risk. This paper aims to scientifically analyze the nature of the fire by reproducing the fire through experiments. Method: To analyze the characteristics of cable fires in underground common duct, heat release rate and temperature changes were measured through Room-corner (ISO 9705) test, and the vertical and horizontal propagation of cable fires was quantitatively compared and analyzed. Result: The Room Corner Test (ISO 9705) was used to compare the temperature changes at each data logger point. The results showed that the time it took for the fire to reach the ignition temperature in the horizontal and vertical directions from the center point of the first-tier cable was 589 seconds and 536 seconds, respectively, which means that the vertical fire propagation is 53 seconds faster than the horizontal propagation. This proves that the vertical propagation of fire is relatively faster than the horizontal propagation. The horizontal propagation speed of the fire was also compared for each floor cable tray. The results showed that the third-tier cable propagated at 3.4 times the speed of the second-tier cable, and the second-tier cable propagated at 1.5 times the speed of the first-tier cable. This means that the higher the cable is located, the faster the fire spreads and the larger the fire becomes. Conclusion: This study identified the risks of cable fires and analyzed the risks of vertical fire propagation during cable fires based on the results of the Room Corner Test. Studies to prevent the spread of fire and fire response policies to prevent vertical fire propagation are required. The results of this study are expected to be used to assess the fire risk of common areas and other fires.