• Title/Summary/Keyword: cross-information potential

Search Result 167, Processing Time 0.028 seconds

Antibiofilm and Anti-β-Lactamase Activities of Burdock Root Extract and Chlorogenic Acid against Klebsiella pneumoniae

  • Rajasekharan, Satish Kumar;Ramesh, Samiraj;Satish, Ann Susan;Lee, Jintae
    • Journal of Microbiology and Biotechnology
    • /
    • v.27 no.3
    • /
    • pp.542-551
    • /
    • 2017
  • Small phytochemicals have been successfully adopted as antibacterial chemotherapies and are being increasingly viewed as potential antibiofilm agents. Some of these molecules are known to repress biofilm and toxin production by certain bacterial and yeast pathogens, but information is lacking with regard to the genes allied with biofilm formation. The present study was performed to investigate the inhibitory effect of burdock root extract (BRE) and of chlorogenic acid (CGA; a component of BRE) on clinical isolates of Klebsiella pneumoniae. BRE and CGA exhibited significant antibiofilm activity against K. pneumoniae without inflicting any harm to its planktonic counterparts. In vitro assays supported the ${\beta}$-lactamase inhibitory effect of CGA and BRE while in silico docking showed that CGA bound strongly with the active sites of sulfhydryl-variable-1 ${\beta}$-lactamase. Furthermore, the mRNA transcript levels of two biofilm-associated genes (type 3 fimbriae mrkD and trehalose-6-phosphate hydrolase treC) were significantly downregulated in CGA- and BRE-treated samples. In addition, CGA inhibited biofilm formation by Escherichia coli and Candida albicans without affecting their planktonic cell growth. These findings show that BRE and its component CGA have potential use in antibiofilm strategies against persistent K. pneumoniae infections.

Structure of Ti and Al Films Prepared by Cylindrical Sputtering System (원통형 스퍼터링 장치로 제작한 Ti 및 Al 박막구조)

  • Oh, Chang-Sup;Han, Chang-Suk
    • Korean Journal of Materials Research
    • /
    • v.24 no.7
    • /
    • pp.344-350
    • /
    • 2014
  • Metal films (i.e., Ti, Al and SUH310S) were prepared in a magnetron sputtering apparatus, and their cross-sectional structures were investigated using scanning electron microscopy. The apparatus used consisted of a cylindrical metal target which was electrically grounded, and two anode rings attached to the top and to the bottom of the target. A wire was placed along the center-line of the cylindrical target to provide a substrate. When the electrical potential of the substrate was varied, the metal-film formation rate depended on both the discharge voltage and the electrical potential of the substrate. As we made the magnetic field stronger, the plasma which appeared near the target collected on the plasma wall surface and thereby decreased the bias current. The bias current on the conducting wire was different from that for cation collection. The bias current decreased because the collection of cations decreased when we increased the magnetic-coil current. When the substrate was electrically isolated, the films deposited showed a slightly coarse columnar structure with thin voids between adjacent columns. In contrast, in the case of the grounded substrate, the deposited film did not show any clear columns but instead, showed a densely-packed granular structure. No peeling region was observed between the film and substrate, indicating good adhesion.

Implementation of EPS Motion Signal Detection and Classification system Based on LabVIEW (LabVIEW 기반 EPS 동작신호 검출 및 분석 시스템 구현)

  • Cheon, Woo Young;Lee, Suk Hyun;Kim, Young Chul
    • Smart Media Journal
    • /
    • v.5 no.3
    • /
    • pp.25-29
    • /
    • 2016
  • This paper presents research for non-contact gesture recognition system using EPS(Electronic Potential Sensor) for measuring the human body of electromagnetic fields. It implemented a signal acquisition and signal processing system for designing a system suitable for motion recognition using the data coming from the sensors. we transform AC-type data into DC-type data by applying a 10Hz LPF considering H/W sampling rate. in addition, we extract 2-dimensional movement information by taking difference value between two cross-diagonal deployed sensor.

Perceived Causes of Work-Related Sick Leave Among Hospital Nurses in Norway: A Prepandemic Study

  • Ose, Solveig Osborg;Ferevik, Hilde;Hapnes, Tove;Oyum, Lisbeth
    • Safety and Health at Work
    • /
    • v.13 no.3
    • /
    • pp.350-356
    • /
    • 2022
  • Background: Although sick leave is a complex phenomenon, it is believed that there is potential for prevention at the workplace. However, little is known about this potential and what specific measures should be implemented. The purpose of the study was to identify perceived reasons to take work-related sick leave and to suggest preventive measures. The study was completed before the COVID-19 pandemic emerged, and the risk factors identified may have been amplified during the pandemic. Methods: An in-depth cross-sectional survey was conducted across a randomly selected sample of hospital nurses in Norway. The national sample comprised 1,297 nurses who participated in a survey about their sick leave during the previous 6 months. An open-ended question about perceived reasons for work-related sick leave was included to gather qualitative information. Results: Among hospital nurses, 27% of the last occurring sick leave incidents were perceived to be work-related. The most common reasons were high physical workload, high work pace, sleep problems, catching a viral or bacterial infection from patients or colleagues, and low staffing. Conclusions: Over a quarter of the last occurring sick leave incidents among Norwegian hospital nurses are potentially preventable. To retain and optimize scarce hospital nursing resources, strategies to reduce work-related sick leave may provide human and financial benefits. Preventive measures may include careful monitoring of nurses' workload and pace, optimizing work schedules to reduce the risk of sleep problems, and increasing staffing to prevent stress and work overload.

Development of a String Injection Vulnerability Analyzer for Web Application Programs (웹 응용 프로그램의 문자열 삽입 보안 취약성 분석기 개발)

  • Ahn, Joon-Seon;Kim, Yeong-Min;Jo, Jang-Wu
    • The KIPS Transactions:PartA
    • /
    • v.15A no.3
    • /
    • pp.181-188
    • /
    • 2008
  • Nowadays, most web sites are developed using dynamic web pages where web pages are generated and transmitted by web application programs. Therefore, the ratio of attacks injecting malevolent strings to vulnerable web applications is increasing. In this paper, we present a static program analyzer which analyzes whether a web application program has vulnerabilities to the SQL injection attack and the cross site scripting(XSS) attack. To analyze programs using abstract interpretation framework, we designed an abstract domain which models potential string set along with excluded strings and developed an abstract interpreter for the PHP language. Also, based on them, we implemented a static analyzer. According to our experiments, our analyzer has competitive analysis speed and accuracy compared with related research results.

Comparative Study of US-China Discourse on Cross-border Data Regulation and Cybersecurity: Focusing on ASEAN Development Assistance Cases (미·중 초국경 데이터 규제와 사이버안보 담론 비교: 아세안 개발원조 사례를 중심으로)

  • Kayeon Lee
    • Informatization Policy
    • /
    • v.30 no.1
    • /
    • pp.89-108
    • /
    • 2023
  • Science, technology and innovation (STI) has expanded the activity of actors from the traditional physical territory to the cyberspace. Data-driven platform services and markets advance new discussions on cross-border cooperation and cyber security, as well as discourse on sovereignty in cyberspace. These changes are also affecting the hegemony competition between the US and China. In particular, competition for aid to developing countries that are located along major resource transportation routes, such as natural gas and deep sea resources, is fierce. ASEAN is not only a geopolitical military and security point where the US and China powers collide, but its population of 600 million has great potential for the development of the digital economy due to its data resources. In this regard, this article aims to connect the discourse of liberalism and authoritarianism with data regulation and cybersecurity in international development cooperation, and derive implications for ASEAN integration through this. This study has significance as a convergence study that links international political issues related to big data in terms of global governance.

Janus - Multi Source Event Detection and Collection System for Effective Surveillance of Criminal Activity

  • Shahabi, Cyrus;Kim, Seon Ho;Nocera, Luciano;Constantinou, Giorgos;Lu, Ying;Cai, Yinghao;Medioni, Gerard;Nevatia, Ramakant;Banaei-Kashani, Farnoush
    • Journal of Information Processing Systems
    • /
    • v.10 no.1
    • /
    • pp.1-22
    • /
    • 2014
  • Recent technological advances provide the opportunity to use large amounts of multimedia data from a multitude of sensors with different modalities (e.g., video, text) for the detection and characterization of criminal activity. Their integration can compensate for sensor and modality deficiencies by using data from other available sensors and modalities. However, building such an integrated system at the scale of neighborhood and cities is challenging due to the large amount of data to be considered and the need to ensure a short response time to potential criminal activity. In this paper, we present a system that enables multi-modal data collection at scale and automates the detection of events of interest for the surveillance and reconnaissance of criminal activity. The proposed system showcases novel analytical tools that fuse multimedia data streams to automatically detect and identify specific criminal events and activities. More specifically, the system detects and analyzes series of incidents (an incident is an occurrence or artifact relevant to a criminal activity extracted from a single media stream) in the spatiotemporal domain to extract events (actual instances of criminal events) while cross-referencing multimodal media streams and incidents in time and space to provide a comprehensive view to a human operator while avoiding information overload. We present several case studies that demonstrate how the proposed system can provide law enforcement personnel with forensic and real time tools to identify and track potential criminal activity.

User Perception of Personal Information Security: An Analytic Hierarch Process (AHP) Approach and Cross-Industry Analysis (기업의 개인정보 보호에 대한 사용자 인식 연구: 다차원 접근법(Analytic Hierarch Process)을 활용한 정보보안 속성 평가 및 업종별 비교)

  • Jonghwa Park;Seoungmin Han;Yoonhyuk Jung
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.233-248
    • /
    • 2023
  • The increasing integration of intelligent information technologies within organizational systems has amplified the risk to personal information security. This escalation, in turn, has fueled growing apprehension about an organization's capabilities in safeguarding user data. While Internet users adopt a multifaceted approach in assessing a company's information security, existing research on the multiple dimensions of information security is decidedly sparse. Moreover, there is a conspicuous gap in investigations exploring whether users' evaluations of organizational information security differ across industry types. With an aim to bridge these gaps, our study strives to identify which information security attributes users perceive as most critical and to delve deeper into potential variations in these attributes across different industry sectors. To this end, we conducted a structured survey involving 498 users and utilized the analytic hierarchy process (AHP) to determine the relative significance of various information security attributes. Our results indicate that users place the greatest importance on the technological dimension of information security, followed closely by transparency. In the technological arena, banks and domestic portal providers earned high ratings, while for transparency, banks and governmental agencies stood out. Contrarily, social media providers received the lowest evaluations in both domains. By introducing a multidimensional model of information security attributes and highlighting the relative importance of each in the realm of information security research, this study provides a significant theoretical contribution. Moreover, the practical implications are noteworthy: our findings serve as a foundational resource for Internet service companies to discern the security attributes that demand their attention, thereby facilitating an enhancement of their information security measures.

Psychological contract-based Consumer Repurchase behavior On Social commerce platform: An Empirical study

  • Shahbaz, Hussain;Li, Ying;Li, Wenli
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2061-2083
    • /
    • 2020
  • Social commerce, integration of social media and e-commerce, provides potential opportunities for consumers to talk about their ideas and exchange product-related information on online shopping platforms. Given the substantial prospects related to business opportunities and consumers' perceptions, this study explores the factors driving fulfillment of the psychological contract in social commerce platforms. This research proposes, examines, and proves a theoretical model for the post-purchase behavior of the consumers, through an empirical investigation of online questionnaire-based data, gathered from 367 consumers in a cross-sectional setting. Results show that the fulfillment of psychological contract, consumer loyalty, and affective commitment fully mediate the impact of consumer trust on platform and repurchase intention. The level of commitment toward the consumer by the platform is strongly related to the degree of consumer trust, which is reciprocated through re-purchase intentions. This study offers essential theoretical implications with regards to the social exchange theory, attribution theory, and an moderating effect of the platform empathy on consumers' trust-psychological contract fulfillment relationship. Likewise, this research has significant implications for practitioners and managers.

Relations Between Paprika Consumption and Unstructured Big Data, and Paprika Consumption Prediction

  • Cho, Yongbeen;Oh, Eunhwa;Cho, Wan-Sup;Nasridinov, Aziz;Yoo, Kwan-Hee;Rah, HyungChul
    • International Journal of Contents
    • /
    • v.15 no.4
    • /
    • pp.113-119
    • /
    • 2019
  • It has been reported that large amounts of information on agri-foods were delivered to consumers through television and social networks, and the information may influence consumers' behavior. The purpose of this paper was first to analyze relations of social network service and broadcasting program on paprika consumption in the aspect of amounts to purchase and identify potential factors that can promote paprika consumption; second, to develop prediction models of paprika consumption by using structured and unstructured big data. By using data 2010-2017, cross-correlation and time-series prediction algorithms (autoregressive exogenous model and vector error correction model), statistically significant correlations between paprika consumption and television programs/shows and blogs mentioning paprika and diet were identified with lagged times. When paprika and diet related data were added for prediction, these data improved the model predictability. This is the first report to predict paprika consumption by using structured and unstructured data.