• Title/Summary/Keyword: knowledge protection

Search Result 494, Processing Time 0.026 seconds

The Analysis of Study Trends of Wild ginseng, Bovis Calculus, Ursi Fel, Moschus and The Study on Applied Possibility as Obesity medications (산삼, 우황, 웅담, 사향의 연구 동향 분석 및 비만 치료제로써의 응용 가능성 탐색 연구)

  • Kim, Min-Woo;Song, Yun-Kyung;Lim, Hyung-Ho
    • Journal of Korean Medicine for Obesity Research
    • /
    • v.11 no.2
    • /
    • pp.41-68
    • /
    • 2011
  • Objectives: After organizing segmentations related to obesity from classics and each studies, we would like to examine the value of wild ginseng, bovis calculus, ursi fel and moschus as a obesity medicine. Methods: We found out 4 drugs which are wild ginseng, bovis calculus, ursi fel and moschus from the classics, such as "Shin-Nong-Bon-Cho-Kyung", "Myoung-Eui-Byul-Lok", "Bon-Cho-Gang-Mok", "Bon-Cho-Jong-Shin", "Bon-Cho-Bi-Yo", "Bon-Cho-Gu-Jin" and "Deuk-Bae-Bon-Cho", we searched websites such as RISS, Korean traditional knowledge portal, the society of Korean medicine for obesity research, Korean pharmacopuncture institute, the Korean academy of oriental rehabilitation medicine and Korean acupuncture & moxibustion society as well. Results: 1. We couldn't find the contents related to the efficacy of improving obesity through wild ginseng, bovis calculus, ursi fel and moschus from the classics. 2. Wild ginseng had a study dealing with the efficacy of anticancer, obesity, toxicity, immunity, sulfation, diabetes, plasma proteins, depression, hypertension, endometriosis and hair loss. Especially among 6 studies related to obesity, apart from the study that treated extract of wild ginseng directly to the cell or oral administration to the animals, also have studies that had an efficacy of improving obesity through injecting pharmacopuncture to acupuncture point and vein, etc. 3. Bovis calculus had a study about efficacy related to arthritis, liver, inflammation of cornea, obesity, anticancer, immunity, antacid, heart, lumbar pain, hypertension, toxicity, a digestive organ and sasang constitution, especially in case of obesity, had each studies about oral administration of complex prescription and about cell unit experiment of pharmacopuncture. 4. Ursi fel had a study about efficacy related to liver, arthritis, inflammation of cornea, immunity, obesity, anticancer, antacid, lumbar pain, digestive organ, toxicity, cell protection, skin ailment, etc. Especially in case of obesity, had each studies about oral administration of animal experiment and about cell unit experiment of pharmacopuncture. 5. Moschus had a study about efficacy related to liver, the central nervous system, arthritis, inflammation of cornea, immunity, obesity, anticancer, hypertension, heart, lumbar pain, etc. Especially in case of obesity, had one study about oral administration of complex prescription. Conclusion: Through the result of probability as a obesity medicine of wild ginseng, bovis calculus, ursi fel and moschus, we could identify the possibility of each drug as a obesity medicine. Also in the future, it is considered that studies about one or complex prescription and pharmacopuncture as a obesity medicine will be needed.

Developing Local Biodiversity Strategies and Action Plans (지자체 생물다양성 관리전략 구축)

  • Kim, Geunhan;Kong, Seok-Jun;Kim, Min-Kyeong;Lee, Moung-Jin;Song, Jiyoon;Jeon, Seong-Woo
    • Journal of Environmental Policy
    • /
    • v.13 no.2
    • /
    • pp.3-20
    • /
    • 2014
  • Due to habitat damage associated with climate change and human activities, biodiversity has decreased all over the world. In order to prevent further reduction in biodiversity, the international community has endeavored to establish a cooperative system, such as the Convention on Biological Diversity (CBD). Until now, most biodiversity strategic planning has been led by the national government. However, the National Biodiversity Strategy and Action Plan is conservative and its strategic plan is vague. Therefore, we propose a method for managing local biological resources called the Local Biodiversity Strategy and Action Plan. In order to provide the strategic plans and detailed plans for the Local Biodiversity Strategy and Action Plan, the report has examined several cases including Convention on Biological Diversity, Strategic Plan for Biodiversity 2011-2020, and the biodiversity strategies and action plans of the Republic of Korea and several other countries. As a result, the report demonstrates the survey and protection of bio-species, the designation and monitoring of conservation region, the management of the integrated eco-network, the establishment of biodiversity organizations and capacity building, the methods to promote networking and traditional knowledge, and the strategy for development in bioindustry. Consequently, the implementation of biodiversity management strategies by local governments will play a significant role in preserving and increasing biodiversity by realizing the goals of Strategic Plan for Biodiversity 2011-2020.

  • PDF

A Query Result Integrity Assurance Scheme Using an Order-preserving Encryption Scheme in the Database Outsourcing Environment (데이터베이스 아웃소싱 환경에서 순서 보존 암호화 기법을 이용한 질의 결과 무결성 검증 기법)

  • Jang, Miyoung;Chang, Jae Woo
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.97-106
    • /
    • 2015
  • Recently, research on database encryption for data protection and query result authentication methods has been performed more actively in the database outsourcing environment. Existing database encryption schemes are vulnerable to order matching and counting attack of intruders who have background knowledge of the original database domain. Existing query result integrity auditing methods suffer from the transmission overhead of verification object. To resolve these problems, we propose a group-order preserving encryption index and a query result authentication method based on the encryption index. Our group-order preserving encryption index groups the original data for data encryption and support query processing without data decryption. We generate group ids by using the Hilbert-curve so that we can protect the group information while processing a query. Finally, our periodic function based data grouping and query result authentication scheme can reduce the data size of the query result verification. Through performance evaluation, we show that our method achieves better performance than an existing bucket-based verification scheme, it is 1.6 times faster in terms of query processing time and produces verification data that is 20 times smaller.

Bacterial Toxin-antitoxin Systems and Their Biotechnological Applications (박테리아의 toxin-antitoxin system과 생명공학기술 응용)

  • Kim, Yoonji;Hwang, Jihwan
    • Journal of Life Science
    • /
    • v.26 no.2
    • /
    • pp.265-274
    • /
    • 2016
  • Toxin-antitoxin (TA) systems are ubiquitous genetic modules that are evolutionally conserved in bacteria and archaea. TA systems composed of an intracellular toxin and its antidote (antitoxin) are currently classified into five types. Commonly, activation of toxins under stress conditions inhibits diverse cellular processes and consequently induces cell death or reversible growth inhibition. These effects of toxins play various physiological roles in such as regulation of gene expression, growth control (stress response), programmed cell arrest, persister cells, programmed cell death, phage protection, stabilization of mobile genetic elements or postsegregational killing of plasmid-free cells. Accordingly, bacterial TA systems are commonly considered as stress-responsive genetic modules. However, molecule screening for activation of toxin in TA system is available as development of antimicrobial agents. In addition, cytotoxic effect induced by toxin is used as effective cloning method with antitoxic effect of antitoxin; consequently cells containing cloning vector inserted a target gene can survive and false-positive transformants are removed. Also, TA system is applicable to efficient single protein production in biotechnology industry because toxins that are site-specific ribonuclease inhibit protein synthesis except for target protein. Furthermore, some TA systems that induce apoptosis in eukaryotic cells such as cancer cells or virus-infected cells would have a wide range of applications in eukaryotes, and it will lead to new ways of treating human disease. In this review, we summarize the current knowledge on bacterial TA systems and their applications.

Analysis and Service Quality Evaluation on NDSL Website (NDSL 웹사이트 분석 및 서비스 품질평가)

  • Lee, Ju-Hyun;Lee, Eung-Bong;Kim, Hwan-Min
    • Journal of Information Management
    • /
    • v.37 no.4
    • /
    • pp.69-91
    • /
    • 2006
  • The purpose of this study is to improve the effectiveness and quality of web service by analyzing the web service problems and suggesting the solutions through the expert service quality evaluation from the point of view of users and website quality evaluation by measurement tools for a whole NDSL website. In case of website analysis, this study analyzed the website completeness of NDSL site and looked into the problem that users can judge by intuition during their use of the site, and evaluated the searchability and usability for web-based service quality evaluation by centering on the service quality of database quality items. After the results of this analysis, it appeared that there was not a big problem on the use. But after searching, several problems were found on loading rates, website completeness, user sensitiveness, the protection of private information, metadata completeness, website accessability, etc. And as a result of the evaluation of website service quality, it does not show the all satisfactory results in the function of search methods and search result printing, mark list and the items related to full-text in the part of searchability and usability. However, comparing with the results of other information organizations, it shows the similar level of quality.

A Comparative Study on Marine Transport Contract and Marine Insurance Contract with Reference to Unseaworthiness

  • Pak, Jee-Moon
    • Journal of Korea Trade
    • /
    • v.25 no.2
    • /
    • pp.152-177
    • /
    • 2021
  • Purpose - This study analyses the excepted requirement and burden of proof of the carrier due to unseaworthiness through comparison between the marine transport contract and marine insurance contract. Design/methodology - This study uses the legal analytical normative approach. The juridical approach involves reviewing and examining theories, concepts, legal doctrines and legislation that are related to the problems. In this study a literature analysis using academic literature and internet data is conducted. Findings - The burden of proof in case of seaworthiness should be based on presumed fault, not proved fault. The burden of proving unseaworthiness/seaworthiness should shift to the carrier, and should be exercised before seeking the protections of the law or carriage contract. In other words, the insurer cannot escape coverage for unfitness of a vessel which arises while the vessel is at sea, which the assured could not have prevented in the exercise of due diligence. The insurer bears the burden of proving unseaworthiness. The warranty of seaworthiness is implied in hull, but not protection and indemnity policies. The 2015 Act repeals ss. 33(3) and 34 of MIA 1906. Otherwise the provisions of the MIA 1906 remain in force, including the definition of a promissory warranty and the recognition of implied warranties. There is less clarity about the position when the source of the loss occurs before the breach of warranty but the actual loss is suffered after the breach. Nonetheless, by s.10(2) of the 2015 Act the insurer appears not to be liable for any loss occurring after the breach of warranty and before there has been a remedy. Originality/value - When unseaworthiness is identified after the sailing of the vessel, mere acceptance of the ship does not mean the party waives any claims for damages or the right to terminate the contract, provided that failure to comply with the contractual obligations is of critical importance. The burden of proof with regards to loss of damage to a cargo caused by unseaworthiness is regulated by the applicable law. For instance, under the common law, if the cargo claimant alleges that the loss or damage has been caused by unseaworthiness, then he has the burden of proof to establish the followings: (i) that the vessel was unseaworthy at the beginning of the voyage; and that, (ii) that the loss or damage has been caused by such unseaworthiness. In other words, if the warranty of seaworthiness at the inception of the voyage is breached, the breach voids the policy if the ship owner had prior knowledge of the unseaworthy condition. By contrast, knowingly permitting the vessel to break ground in an unseaworthy condition denies liability only for loss or damage proximately caused by the unseaworthiness. Such a breach does not, therefore, void the entire policy, but only serves to exonerate the insurer for loss or damage proximately caused by the unseaworthy condition.

A Study on Comparison of Life Safety Assessment Results according to Three Coupling Methods of Fire and Evacuation Simulation (화재·피난시뮬레이션의 커플링방식별 인명안전성평가 결과 비교에 관한 연구)

  • Koo, Hyun-Mo;Oh, Ryun-Seok;An, Sung-Ho;Hwang, Chul-Hong;Choi, Jun-Ho
    • Fire Science and Engineering
    • /
    • v.33 no.1
    • /
    • pp.121-129
    • /
    • 2019
  • In Korea, life safety assessment through simulation are mandatory in performance-based design. Generally, there are three types of methods for simulation-based life safety assessments: the non-coupling method that compares available safe egress time (ASET) and required safe egress time (RSET) at a specific point through conducting fire and assessment simulations independently; the semi-coupling method that compares fire and evacuation simulation results by overlaying the result screens; and the coupling method that compares the results of fire effect simulation to an evacuation simulation. Of these methods, all designers in South Korea have used the only non-coupling method. In the non-coupling method, it is important to determine the location of a specific point to compare ASET and RSET. However, without any defined regulation, setting the location is determined based on the designer's experience and knowledge. The number of specific locations and the locations themselves differ with each designer, which can produce contrasting results in a life safety assessment. Therefore, this study conducted a life safety assessment based on the three methods (non-coupling, semi-coupling and coupling) and compared each of the results. Furthermore this study suggests a improvement way in particular for the computer simulation.

A Measurement of Exposure Dose for Patient Transporter (환자 이송원의 피폭선량 측정)

  • Song, Chaerim;Lee, Wanghui;Ahn, Sungmin
    • Journal of the Korean Society of Radiology
    • /
    • v.13 no.3
    • /
    • pp.433-438
    • /
    • 2019
  • The medical institutions use radiation generating devices and radioactive isotopes to diagnose and treat patients. The patient transporter performs work in an environment that is more likely to be exposed to radiation when compared with the general public, such as inevitably entering the radiation management area for patient transfer, or transferring the isotope-administered patient at a short distance. For this reason, we conducted a study to determine the degree of exposure of the patient transporter. The 12 patient transporters working at Incheon A General Hospital are eligible. From April 1, 2019 to April 30, 2019, the dosimeter was used in the chest for one month and the accumulated dose was measured. The dosimeter used was a Optically Stimulated Luminescence Dosimetry (OSLD) and the dose reading was OSLD Microstar Reading System. As a result of cumulative dose measurement for one month, the average of the deep dose was 0.13 mSv and the surface dose was 0.13 mSv, and the cumulative dose for one month was multiplied by 12 to estimate the cumulative dose expectation As a result, the average of the deep dose and the surface dose were 1.52 mSv and 1.51 mSv, respectively. It is necessary to classify the patient transporter as a frequent visitor in order to measure and manage the exposure dose, increase the knowledge of protection against radiation through education and training, and prevent radiation trouble through medical examination.

Requirement for Amendment of the Law on the Phrase 'Instruction of Physicians or Dentists' in Medical Service Technologist, etc Act (의료기사 등에 관한 법률에서 '의사 또는 치과의사의 지도' 문구에 대한 법률 개정 요구도)

  • Lim, Woo-Taek;Lim, Cheong-Hwan;Joo, Young-Cheol;Hong, Dong-Hee;Jung, Hong-Ryang;Kim, Eun-Hye;Yoon, Yong-Su;Jung, Young-Jin;Choi, Ji-Won
    • Journal of radiological science and technology
    • /
    • v.44 no.5
    • /
    • pp.503-512
    • /
    • 2021
  • The purpose of this study is to check the extent to which "instruction of physician or dentist" defined in the Medical Service Technologists, etc. Act is applied in relation to radiography examination procedures for radiological technologists. In addition, it is intended to present basic data on the requirement to revise the Medical Service Technologists, etc. Act in the radiological technologist's duty area and scope of work, The subjects of this study were radiological technologists with license, and the response data were collected after sending the questionnaire link written on the online questionnaire form. The final number of respondents were 1,018, and the response rate was 6.8%. Most of the negative responses were "I have never received 'instruction' for radiologic examination by a physician or dentist, including a radiologist in a medical environment." There were a high perception that "the professionalism in radiation examination on radiological technologists are higher than that of a physician or dentist." They answered that the current continuing education has a great impact on maintaining and continuing professionalism and learning new knowledge in the radiology field. In addition, the radiological technologists provide a very high level of education in areas related to radiography procedure ethics such as patient care, patient safety, and patient privacy protection, as well as specialized fields such as radiation-related examination methods, radiography examination dose, and patient exposure dose. Radiological technologists replied that they were receiving it consistently. In conclusion, in the current medical environment, the 'instruction' of a physician or dentist cannot be seen as being realistically performed. The phrase 'instruction' of a physician or dentist as defined in the Medical Service Technologists, etc. Act is considered inappropriate in respect of the fact that the state recognizes the qualifications of the medical service technologist through a license. It is thought that revision to a new term suitable for the current medical environment is necessary.

A Study on Analysis and Development of Education Program in Information Security Major (대학의 정보보호 관련학과 교육과정분석과 모델개발에 관한 연구)

  • 양정모;이옥연;이형우;하재철;유승재;이민섭
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.17-26
    • /
    • 2003
  • Recently, as the internet is widespread rapidly among the public, people can use a variety of useful information services through the internet. Accordingly, the protection of information supplied by computer networks 5 has become a matter of primary concern on the whole world. To accede to the realistic demands, it has been worked out some countermeasures to cultivate the experts in information security by the government and many educational facilities. Already the government authority has carried out the each kinds of concerning projects under the framed a policy, Five-Year Development Plan for Information Security Technology. Also, many domestic universities perceives such an international trend, and so they frame their plans to train for the experts in this field, including to found a department with respect to the information security. They are ready to execute their tangible works, such as establishment of educational goal, development of teaching materials, planning curriculum, construction of laboratories and ensuring instructors. Moreover, such universities lead to their students who want to be information security experts to get the fundamental knowledge to lay the foundation for acquiring the information security technology in their bachelor course. In this note, we survey and analyze the curricula of newly-established or member-extended departments with respect to information security fields of some leading universities in the inside and outside of the country, and in conclusion, we propose the effective model of curriculum and educational goal to train the students for the information security experts.