• Title/Summary/Keyword: real-time response

Search Result 1,654, Processing Time 0.028 seconds

Identification of Plant Response to the Human Behavior of Crushing Plants

  • Kim, Kwang Jin;Kim, Hyeon Ju;Son, Deokjoo;Jeong, Na Ra;Yun, Hyung Gewon;Han, Seung Won;You, Soojin;Kim, Chan-joong;Lee, Seon Hwa
    • Journal of People, Plants, and Environment
    • /
    • v.22 no.6
    • /
    • pp.593-600
    • /
    • 2019
  • We identified how plants affected by the human behavior of crushing plants respond and what kind of plants responded sensitively. We investigated Lactuca sativa "Gaesebadak", Syneilesis palmata and Peucedanum japonicum as plants that humans use for edible purposes, and Achyranthes japonica and Bidens bipinnata as wild plants that stick to people's clothes and disperse seed. Plants exposed to human breathing air were compared with those exposed to human breathing air after being crushed. Methyl jasmonate (MeJA), a chemical word, was measured using Syft/MS, which detects real-time VOC, and related genes were analyzed. The amount of MeJA of Syneilesis palmata and Peucedanum japonicum as edible plants was greater than that of non-edible plants that disperse seeds using humans. The amount of MeJA ranged from 0.20 ppb to 0.35 ppb when the control group were not exposed to human breathing air. On the other hand, MeJA decreased after increasing for the first hour in human breathing air. Also, MeJA affected by human breathing after crushing plants was higher than that affected by just human breathing air. Peucedanum japonicum showed the most distinctive difference between the treatment with human breathing after crushing plants and the treatment with just human breathing. In addition, the gene activity of JAR1 and JMT increased 3 hours after the treatment with human breathing after crushing plants. Therefore, in the treatment with human breathing after crushing plants, the concentration of MeJA and the activity of related genes showed the same tendency to increase. As a result, the plant that responded sensitively to human behavior was Peucedanum japonicum. Plants released MeJA as a chemical word in the treatment with human breathing air after crushing plants.

Genome-wide identification, organization, and expression profiles of the chicken fibroblast growth factor genes in public databases and Vietnamese indigenous Ri chickens against highly pathogenic avian influenza H5N1 virus infection

  • Anh Duc Truong;Ha Thi Thanh Tran;Nhu Thi Chu;Huyen Thi Nguyen;Thi Hao Vu;Yeojin Hong;Ki-Duk Song;Hoang Vu Dang;Yeong Ho Hong
    • Animal Bioscience
    • /
    • v.36 no.4
    • /
    • pp.570-583
    • /
    • 2023
  • Objective: Fibroblast growth factors (FGFs) play critical roles in embryo development, and immune responses to infectious diseases. In this study, to investigate the roles of FGFs, we performed genome-wide identification, expression, and functional analyses of FGF family members in chickens. Methods: Chicken FGFs genes were identified and analyzed by using bioinformatics approach. Expression profiles and Hierarchical cluster analysis of the FGFs genes in different chicken tissues were obtained from the genome-wide RNA-seq. Results: A total of 20 FGF genes were identified in the chicken genome, which were classified into seven distinct groups (A-F) in the phylogenetic tree. Gene structure analysis revealed that members of the same clade had the same or similar exon-intron structure. Chromosome mapping suggested that FGF genes were widely dispersed across the chicken genome and were located on chromosomes 1, 4-6, 9-10, 13, 15, 28, and Z. In addition, the interactions among FGF proteins and between FGFs and mitogen-activated protein kinase (MAPK) proteins are limited, indicating that the remaining functions of FGF proteins should be further investigated in chickens. Kyoto encyclopedia of genes and genomes pathway analysis showed that FGF gene interacts with MAPK genes and are involved in stimulating signaling pathway and regulating immune responses. Furthermore, this study identified 15 differentially expressed genes (DEG) in 21 different growth stages during early chicken embryo development. RNA-sequencing data identified the DEG of FGFs on 1- and 3-days post infection in two indigenous Ri chicken lines infected with the highly pathogenic avian influenza virus H5N1 (HPAIV). Finally, all the genes examined through quantitative real-time polymerase chain reaction and RNA-Seq analyses showed similar responses to HPAIV infection in indigenous Ri chicken lines (R2 = 0.92-0.95, p<0.01). Conclusion: This study provides significant insights into the potential functions of FGFs in chickens, including the regulation of MAPK signaling pathways and the immune response of chickens to HPAIV infections.

A Research on the Development of Service Nature Measurement Items in the Sevice Economic Era (서비스 경제로의 전환에 따른 서비스본질 측정항목 개발 연구)

  • An Sehong;Kim Hyunsoo
    • Journal of Service Research and Studies
    • /
    • v.11 no.1
    • /
    • pp.59-79
    • /
    • 2021
  • Service-related research in accordance with the transition to the service economy era has been conducted in a wide variety of ways, but the development of a service-related scale suitable for the present time is still insignificant. The purpose of this study is to define the nature of services and to develop measurement items for them. First, four categories of service nature were adopted in the previous study. The four categories are 'relationship', 'interactivity', 'horizontality', and 'harmony'. In this study, sub-factors and specific items of each of these four service essences were extracted and developed as measurable items. As a qualitative study, the four categories of sub-factors were extracted, and a mixed study was adopted to prove the reliability and validity of the extracted factors through quantitative studies. The scale items were identified through literature study, free response method, and Delphi technique, and the measurement items were refined through a second questionnaire of 30 Delphi panels composed of experts. As a result of the study, 15 out of 52 questions for relationship, 11 out of 45 questions for bilateral direction, 9 out of 33 questions for horizontality, and 17 out of 61 questions for harmonization were derived after secondary refining. Through this study, it was possible to uncover new essential items suitable for the service economy era. SNS, network, synergy, platform, system, real name, and breakthrough are concepts that have not been obtained in previous studies, and can be seen as contributions of this study. However, due to various limitations, this study did not cover all aspects of the service, but mainly dealt with people-centered services, which are part of the service. In the future, it is necessary to study the development of service essence measurement items for the overall aspect of services developed according to the evolution of the service economy era.

Urban Runoff Network Flow Velocity Monitoring System Using Ubiquitous Technique and GIS (Ubiquitous 기술과 GIS를 이용한 도시배수관망 유속측정 시스템 개발)

  • Choi, Changwon;Yi, Jaeeung
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.30 no.5B
    • /
    • pp.479-486
    • /
    • 2010
  • Reliable hydrologic data acquisition is the basic and essential requirement for efficient water management. Especially the acquisition of various stream data in a certain location is very important to construct on alarm system to response an urban flood which occurs frequently due to the effect of climate change. Although the frequency of stream inundation flood occurrence becomes low owing to the consistent stream improvement, the urban flood due to the drainage system problems such as deterioration and bad management occurs continuously. The consistent management and current status understanding of the urban drainage system is essential to reduce the urban flood. The purpose of this study is to develop the urban runoff network flow velocity monitoring system which has the capability of collecting stream data whenever, wherever and to whomever without expert knowledge using Code Division Multiple Access technique and Bluetooth near-distance wireless communication technique. The urban runoff network flow velocity monitoring system consists of three stages. In the first stage, the stream information obtained by using ubiquitous floater is transferred to the server computer. In the second stage, the current state of the urban drainage system is assessed through the server computer. In the last stage, the information is provided to the user through a GUI. As a result of applying, the developed urban runoff network flow velocity monitoring system to Woncheon-Stream in Suwon, the information necessary for urban drainage management can be managed in real time.

Implementation of reliable dynamic honeypot file creation system for ransomware attack detection (랜섬웨어 공격탐지를 위한 신뢰성 있는 동적 허니팟 파일 생성 시스템 구현)

  • Kyoung Wan Kug;Yeon Seung Ryu;Sam Beom Shin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.27-36
    • /
    • 2023
  • In recent years, ransomware attacks have become more organized and specialized, with the sophistication of attacks targeting specific individuals or organizations using tactics such as social engineering, spear phishing, and even machine learning, some operating as business models. In order to effectively respond to this, various researches and solutions are being developed and operated to detect and prevent attacks before they cause serious damage. In particular, honeypots can be used to minimize the risk of attack on IT systems and networks, as well as act as an early warning and advanced security monitoring tool, but in cases where ransomware does not have priority access to the decoy file, or bypasses it completely. has a disadvantage that effective ransomware response is limited. In this paper, this honeypot is optimized for the user environment to create a reliable real-time dynamic honeypot file, minimizing the possibility of an attacker bypassing the honeypot, and increasing the detection rate by preventing the attacker from recognizing that it is a honeypot file. To this end, four models, including a basic data collection model for dynamic honeypot generation, were designed (basic data collection model / user-defined model / sample statistical model / experience accumulation model), and their validity was verified.

Application of Near-Infrared Spectroscopy in Neurological Disorders: Especially in Orthostatic Intolerance (신경계 질환에서 근적외선분광분석법의 적용: 기립불내증을 중심으로)

  • Kim, Yoo Hwan;Paik, Seung-ho;Phillips V, Zephaniah;Seok, Hung Youl;Jeon, Nam-Joon;Kim, Beop-Min;Kim, Byung-Jo
    • Journal of the Korean neurological association
    • /
    • v.35 no.1
    • /
    • pp.8-15
    • /
    • 2017
  • Near-infrared spectroscopy (NIRS), a noninvasive optical method, utilizes the characteristic absorption spectra of hemoglobin in the near-infrared range to provide information on cerebral hemodynamic changes in various clinical situations. NIRS monitoring have been used mainly to detect reduced perfusion of the brain during orthostatic stress for three common forms of orthostatic intolerance (OI); orthostatic hypotension, neurally mediated syncope, and postural orthostatic tachycardia syndrome. Autonomic function testing is an important diagnostic test to assess their autonomic nervous systems for patients with symptom of OI. However, these techniques cannot measure dynamic changes in cerebral blood flow. There are many experimentations about study of NIRS to reveal the pathophysiology of patients with OI. Research using NIRS in other neurologic diseases (stroke, epilepsy and migraine) are ongoing. NIRS have been experimentally used in all stages of stroke and may complement the established diagnostic and monitoring tools. NIRS also provide pathophysiological approach during rehabilitation and secondary prevention of stroke. The hemodynamic response to seizure has long been a topic for discussion in association with the neuronal damage resulting from convulsion. One critical issue when unpredictable events are to be detected is how continuous NIRS data are analyzed. Besides, NIRS studies targeting pathophysiological aspects of migraine may contribute to a deeper understanding of mechanisms relating to aura of migraine. NIRS monitoring may play an important role to trend regional hemodynamic distribution of flow in real time and also highlights the pathophysiology and management of not only patients with OI symptoms but also those with various neurologic diseases.

Identification and functional prediction of long non-coding RNAs related to oxidative stress in the jejunum of piglets

  • Jinbao Li;Jianmin Zhang;Xinlin Jin;Shiyin Li;Yingbin Du;Yongqing Zeng;Jin Wang;Wei Chen
    • Animal Bioscience
    • /
    • v.37 no.2
    • /
    • pp.193-202
    • /
    • 2024
  • Objective: Oxidative stress (OS) is a pathological process arising from the excessive production of free radicals in the body. It has the potential to alter animal gene expression and cause damage to the jejunum. However, there have been few reports of changes in the expression of long noncoding RNAs (lncRNAs) in the jejunum in piglets under OS. The purpose of this research was to examine how lncRNAs in piglet jejunum change under OS. Methods: The abdominal cavities of piglets were injected with diquat (DQ) to produce OS. Raw reads were downloaded from the SRA database. RNA-seq was utilized to study the expression of lncRNAs in piglets under OS. Additionally, six randomly selected lncRNAs were verified using quantitative real-time polymerase chain reaction (qRT-PCR) to examine the mechanism of oxidative damage. Results: A total of 79 lncRNAs were differentially expressed (DE) in the treatment group compared to the negative control group. The target genes of DE lncRNAs were enriched in gene ontology (GO) terms and Kyoto encyclopedia of genes and genomes (KEGG) signaling pathways. Chemical carcinogenesis-reactive oxygen species, the Foxo signaling pathway, colorectal cancer, and the AMPK signaling pathway were all linked to OS. Conclusion: Our results demonstrated that DQ-induced OS causes differential expression of lncRNAs, laying the groundwork for future research into the processes involved in the jejunum's response to OS.

Analysis of Water Temperature Variations in Coastal Waters of the Korean Peninsula during Typhoon Movement (태풍 이동시 한반도 해역별 수온 변동 분석)

  • Juyeon Kim;Seokhyun Youn;Myunghee Park
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.30 no.1
    • /
    • pp.1-12
    • /
    • 2024
  • In this study, we analyzed the water temperature variability in the sea area of the Korean Peninsula in August, before and after the typhoon inflow through Typhoon Soulik, the 19th in 2018 that turned right around the Korean Peninsula and passed through the East Sea, and Typhoon Bavi, the eighth in 2020 that advanced north and passed through the Yellow Sea. The data used in this study included the water temperature data recorded in the real-time information system for aquaculture environment provided by the National Institute of Fisheries Science, wind data near the water as recorded by the automatic weather system, and water temperature data provided by the NOAA/AVHRR satellite. According to the analysis, when typhoons with different movement paths passed through the Korean Peninsula, the water temperature in the East Sea repeatedly upwelled (northern winds) and downwelled (southern winds) depending on the wind speed and direction. In particular, when Typhoon Soulik passed through the East sea, the water temperature dropped sharply by around 10 ℃. When Typhoon Bavi passed through the center of the Yellow Sea, the water temperature rose in certain observed areas of the Yellow Sea and even in certain areas of the South Sea. Warmer water flowed into cold water regions owing to the movement of Typhoon Bavi, causing water temperature to rise. The water temperature appeared to have recovered to normal. By understanding the water temperature variability in the sea area of the Korean Peninsula caused by typhoons, this research is expected to minimize the negative effects of abnormal climate on aquaculture organisms and contribute to the formulation of damage response strategies for fisheries disasters in sea areas.

Visualizing the Results of Opinion Mining from Social Media Contents: Case Study of a Noodle Company (소셜미디어 콘텐츠의 오피니언 마이닝결과 시각화: N라면 사례 분석 연구)

  • Kim, Yoosin;Kwon, Do Young;Jeong, Seung Ryul
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.89-105
    • /
    • 2014
  • After emergence of Internet, social media with highly interactive Web 2.0 applications has provided very user friendly means for consumers and companies to communicate with each other. Users have routinely published contents involving their opinions and interests in social media such as blogs, forums, chatting rooms, and discussion boards, and the contents are released real-time in the Internet. For that reason, many researchers and marketers regard social media contents as the source of information for business analytics to develop business insights, and many studies have reported results on mining business intelligence from Social media content. In particular, opinion mining and sentiment analysis, as a technique to extract, classify, understand, and assess the opinions implicit in text contents, are frequently applied into social media content analysis because it emphasizes determining sentiment polarity and extracting authors' opinions. A number of frameworks, methods, techniques and tools have been presented by these researchers. However, we have found some weaknesses from their methods which are often technically complicated and are not sufficiently user-friendly for helping business decisions and planning. In this study, we attempted to formulate a more comprehensive and practical approach to conduct opinion mining with visual deliverables. First, we described the entire cycle of practical opinion mining using Social media content from the initial data gathering stage to the final presentation session. Our proposed approach to opinion mining consists of four phases: collecting, qualifying, analyzing, and visualizing. In the first phase, analysts have to choose target social media. Each target media requires different ways for analysts to gain access. There are open-API, searching tools, DB2DB interface, purchasing contents, and so son. Second phase is pre-processing to generate useful materials for meaningful analysis. If we do not remove garbage data, results of social media analysis will not provide meaningful and useful business insights. To clean social media data, natural language processing techniques should be applied. The next step is the opinion mining phase where the cleansed social media content set is to be analyzed. The qualified data set includes not only user-generated contents but also content identification information such as creation date, author name, user id, content id, hit counts, review or reply, favorite, etc. Depending on the purpose of the analysis, researchers or data analysts can select a suitable mining tool. Topic extraction and buzz analysis are usually related to market trends analysis, while sentiment analysis is utilized to conduct reputation analysis. There are also various applications, such as stock prediction, product recommendation, sales forecasting, and so on. The last phase is visualization and presentation of analysis results. The major focus and purpose of this phase are to explain results of analysis and help users to comprehend its meaning. Therefore, to the extent possible, deliverables from this phase should be made simple, clear and easy to understand, rather than complex and flashy. To illustrate our approach, we conducted a case study on a leading Korean instant noodle company. We targeted the leading company, NS Food, with 66.5% of market share; the firm has kept No. 1 position in the Korean "Ramen" business for several decades. We collected a total of 11,869 pieces of contents including blogs, forum contents and news articles. After collecting social media content data, we generated instant noodle business specific language resources for data manipulation and analysis using natural language processing. In addition, we tried to classify contents in more detail categories such as marketing features, environment, reputation, etc. In those phase, we used free ware software programs such as TM, KoNLP, ggplot2 and plyr packages in R project. As the result, we presented several useful visualization outputs like domain specific lexicons, volume and sentiment graphs, topic word cloud, heat maps, valence tree map, and other visualized images to provide vivid, full-colored examples using open library software packages of the R project. Business actors can quickly detect areas by a swift glance that are weak, strong, positive, negative, quiet or loud. Heat map is able to explain movement of sentiment or volume in categories and time matrix which shows density of color on time periods. Valence tree map, one of the most comprehensive and holistic visualization models, should be very helpful for analysts and decision makers to quickly understand the "big picture" business situation with a hierarchical structure since tree-map can present buzz volume and sentiment with a visualized result in a certain period. This case study offers real-world business insights from market sensing which would demonstrate to practical-minded business users how they can use these types of results for timely decision making in response to on-going changes in the market. We believe our approach can provide practical and reliable guide to opinion mining with visualized results that are immediately useful, not just in food industry but in other industries as well.

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.