• Title/Summary/Keyword: Spotlight

Search Result 576, Processing Time 0.027 seconds

Resurrection of antibody as a therapeutic drug (항체 : 치료제로서의 부활)

  • Chung, Hong Keun;Chung, Junho
    • IMMUNE NETWORK
    • /
    • v.1 no.1
    • /
    • pp.7-13
    • /
    • 2001
  • Currently 18 monoclonal antibodies were approved by FDA for inj ection into humans for therapeutic or diagnostic purpose. And 146 clinical trials are under way to evaluate the efficacy of monoclonal antibodies as anti-cancer agents, which comprise 9 % of clinical trials in cancer therapy field. When considering a lot of disappointment and worries existed in this field during the past 15 years, this boom could be called as resurrection. Antibodies have several merits over small molecule drug. First of all it is easier and faster in development, as proper immunization of the target proteins usually raises good antibody response. The side effects of antibodies are more likely to be checked out in immunohistomchemical staining of whole human tissues. Antibody has better pharmacokinetics, which means a longer half-life. And it is non-toxic as it is purely a "natural drug. Vast array of methods was developed to get the recombinant antibodies to be used as drug. The mice with human immunoglobulin genes were generated. Fully human antibodies can be developed in fast and easy way from these mice through immunization. These mice could make even human monoclonal antibodies against any human antigen like albumin. The concept of combinatorial library was also actively adopted for this purpose. Specific antibodies can be screened out from phage, mRNA, ribosomal library displaying recombinant antibodies like single chain Fvs or Fabs. Then the coding genes of these specific antibodies are obtained from the selected protein-gene units, and used for industrial scale production. Both $na\ddot{i}ve$ and immunized libraries are proved to be effective for this purpose. In post-map arena, antibodies are receiving another spotlight as molecular probes against numerous targets screened out from functional genomics or proteomics. Actually many of these antibodies used for this purpose are already human ones. Through alliance of these two actively growing research areas, antibody would play a central role in target discovery and drug development.

  • PDF

A Theoretical Study on the Toyota Production System and Practical Example (도요타 생산방식(TPS)의 이론과 실제)

  • Lim, Jae-Hwa;Mok, Jin-Hwan
    • 한국산학경영학회:학술대회논문집
    • /
    • 2006.06a
    • /
    • pp.171-190
    • /
    • 2006
  • Toyota 2005 annual report said Toyota has six consecutive fiscal year positive revenues and record breaking revenues during recent four consecutive years. Net profit is 11% grower than last year. (\11,000,000,000,000). In the spotlight they have record breaking net profit every year, their strongest point is their unique production system which come up with MUDA(waste) free and ongoing improvement activity. Their basic production philosophy is value added through improve production efficiency which can be possible by eliminating MUDA(waste). This basic philosophy's key points are "Just in Time" and "Automation with human". Recently, Korean manufacturing companies and service companies have a growing interest in Toyota Production System. They try to find ways for appling Toyota system to their companies. Through observing Toyota production theory, understand Toyota Production System, Through studying practical application in industrial fields, examine application possibility for Korean industry and more detailed researches are required.

  • PDF

LBS 응용 모바일 서비스의 사용 요인에 관한 실증적 연구

  • Im, Gi-Heung
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.107-143
    • /
    • 2005
  • Mobile service that geography, position by development of space Information Technology and technology of communications, space are various to us now becoming limelight as point contents and infra information that customers do demand based on radio superhigh speed authentication net on highly information society by offer infringement problem about individual's privacy or information by political and scientific interest be injured. Purpose of this study grasps use factor of LBS application Mobile service, and it is that analyze actual proof through questionnaire to grasp whether some relation is with value and action determination that is felt of LBS application Mobile service. Distributed all question of 190 copies but disk floret inclination did valid data 171 that clear question and omission remove a lot of questions by type of study among questionnaire of collected 182 wealths. Analyzed factor analysis and authoritativeness to search validity and confidence of questionnaire and used single regression analysis and multiple regression analysis for hypothetical verification. According to verification result, Mobile service that apply position base service usefulness and system quality, adaptedness of Mobile service that apply position base service by leading person affecting in use, acted for connection healthy and felt value is important factor immediately. Usability and social effect, felt expense, privacy did not appear by leading person that keep in mind in this study. Is been related with step that Mobile service that apply position base service is placed. That is, as present childhood, a person who have experience that use service to look for friend is few and usability fairly in last in wide application boundary and this very important person was removed finally in model. This study has sense in terms of study systematically about LBS application service use leading person that is getting into the spotlight worldwide among Mobile service that is injured newly.

  • PDF

u-Healthcare Service Authentication Protocol based on RFID Technology (RFID 기술을 이용한 u-헬스케어 서비스 인증 프로토콜)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.153-159
    • /
    • 2012
  • Now a days, U-healthcare comes into the spotlight as a new business model which combines RFID technology with medical service in the well-being era and IT popularization. U-healthcare service needs a method that can deals with hand-writing, overlap data, forgery and falsification of data, difference between information version that happen in medical process because of graft between RFID technology and u-healthcare. This paper proposes RFID based user certification protocol to protect user's privacy who gets medical service through U-healthcare. In the protocol, secret information of patient does the XOR with the secret key that is created in the hospital to reconsider the stability of security system of U-healthcare and user's data forgery and falsification and privacy and then saves it in the secret key field of patient in DB table. Also, it informs the case of illegal access to certification server and make it approved the access of u-healthcare service by differentiating whether u-healthcare is illegal or not.

Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things (해시를 활용한 사이버킬체인 기반의 사물인터넷 보안 정책)

  • Jeong, So-Won;Choi, Yu-Rim;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.179-185
    • /
    • 2018
  • Technology of Internet of Things (IoT) which is receiving the spotlight recently as a new growth engine of Information Communications Technology (ICT) industry in the $4^{th}$ Industrial Revolution needs trustworthiness beyond simple technology of security. IoT devices should consider trustworthiness from planning and design of IoTs so that everyone who develop, evaluate and use the device can measure and trust its security. Increased number of IoTs and long lifetime result in the increased securituy vulnerability due to the difficulty of software patch and update. In this paper, we investigated security and scalability issues of current IoT devices through research of the technical, political and industrial trend of IoT. In order to overcome the limitations, we propose an automatic verification of software integrity utilizing and a political solution to apply cyber killchain based security mechanism using hash which is an element technology of blockchain to solve these problems.

Semantic Segmentation using Convolutional Neural Network with Conditional Random Field (조건부 랜덤 필드와 컨볼루션 신경망을 이용한 의미론적인 객체 분할 방법)

  • Lim, Su-Chang;Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.3
    • /
    • pp.451-456
    • /
    • 2017
  • Semantic segmentation, which is the most basic and complicated problem in computer vision, classifies each pixel of an image into a specific object and performs a task of specifying a label. MRF and CRF, which have been studied in the past, have been studied as effective methods for improving the accuracy of pixel level labeling. In this paper, we propose a semantic partitioning method that combines CNN, a kind of deep running, which is in the spotlight recently, and CRF, a probabilistic model. For learning and performance verification, Pascal VOC 2012 image database was used and the test was performed using arbitrary images not used for learning. As a result of the study, we showed better partitioning performance than existing semantic partitioning algorithm.

Behavior Characteristics of U-Shape Wide Composite Beam (U자형 와이드 합성보의 거동특성)

  • Choi, Yun-Cheul;Lee, Sang-Sup;Choi, Hyun-Ki;Park, Keum-Sung
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.21 no.5
    • /
    • pp.125-133
    • /
    • 2017
  • A parking structure has been on the spotlight to solve the parking problem in downtown area. However, the overall height of parking structure is stipulated less than 8m. Therefore, in this research, the flexural and shear capacity of 'wide composite beam' which can reduce story height and have long span, is evaluated. Based on test result, the rebar in truss did not affect its flexural strength. However, in the case of the specimen without the rebar, the mechanical bond strength decreased due to slip occurrence at 70% of the flexural yield strength. Based on the test of shear-bond behavior, all specimen without shear connector should be reinforced with 2 or more flat bar, because it did not have enough shear bond strength resisted by the mechanical bond mechanism.

A Study about Control of real working through the synchronized 3D Game Character and Motion Capture System (3D게임 캐릭터와 모션 캡쳐 시스템의 연동을 통한 실사 움직임(Real Working) 제어 연구)

  • Kim, Tae-Yul;Ryu, Seuc-Ho;Kyung, Byung-Pyo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.278-281
    • /
    • 2006
  • In the Contents industry, especially in the field of game contents the area receiving the most spotlight is 3D. With qualitative and quantitative developments in games continue, interest in 3D is becoming more significant. As a result studies and actual application in the area of 3D in the game industry are being most actively conducted. It is true that 3D game characters do not have the same level of natural movement compared to the previous 2D characters. In order to overcome the limitations of movement control of the Key frame method, the method that is currently being rapidly developed is a movement control method using motion capture system. In this study, the focus is placed in production of natural character animation through movement control through linkage of 3D game characters and motion capture system. Hence, production of natural 3D game character animation through a single central action was established as the purpose of this study.

  • PDF

Sketch Map System using Clustering Method of XML Documents (XML 문서의 클러스터링 기법을 이용한 스케치맵 시스템)

  • Kim, Jung-Sook;Lee, Ya-Ri;Hong, Kyung-Pyo
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.19-30
    • /
    • 2009
  • The service that has recently come into the spotlight utilizes the map to first approach the map and then provide various mash-up formed results through the interface. This service can provide precise information to the users but the map is barely reusable. The sketch-map system of this paper, unlike the existing large map system, uses the method of presenting the specific spot and route in XML document and then clustering among sketch-maps. The map service system is designed to show the optimum route to the destination in a simple outline map. It is done by renovating the spot presented by the map into optimum contents. This service system, through the process of analyzing, splitting and clustering of the sketch-map's XML document input, creates a valid form of a sketch-map. It uses the LCS(Longest Common Subsequence) algorithm for splitting and merging sketch-map in the process of query. In addition, the simulation of this system's expected effects is provided. It shows how the maps that share information and knowledge assemble to form a large map and thus presents the system's ability and role as a new research portal.

Design and Implementation of Realtime Things Control System Using MQTT and WebSocket in IoT Environment (IoT환경에서 MQTT와 WebSocket을 활용한 실시간 사물제어 시스템 설계 및 구현)

  • Seo, Jun-Oh;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.3
    • /
    • pp.517-524
    • /
    • 2018
  • This Paper presents the real time things control method through Web browser that has no limited by time and place. To design and realize the system that not only makes it possible to communicate with other protocols but also reinforces the advantages of each protocol, the real time communication environment, based on the WebSocket technology of HTML5 whose international standardization has recently been completed, is realized. Also, the message communication environment in the low electricity and limited communication environment is realized using MQTT(Message Queue Telemetry Transport) protocol which is in the spotlight as the optimum protocol in the IoT environment. And by designing intuitive and simple hardware and realizing the responsive web interface which is not limited by the user's contact devices, the interactive system in which the user receives real time data from the hardware and reversely the user controls the things is designed and realized.