• Title/Summary/Keyword: 라이

Search Result 6,622, Processing Time 0.039 seconds

Comparison of peptide guanidination efficiency using various reaction conditions (다양한 조건에서 펩타이드의 Guanidination 변형 효율 비교 연구)

  • Park, Su-Jin;Koo, Kun-Mo;Kim, Jin-Hee;Kim, Jeong-Kwon
    • Analytical Science and Technology
    • /
    • v.25 no.2
    • /
    • pp.114-120
    • /
    • 2012
  • For the qualitative analysis of peptides in matrix-assisted laser desorption/ionization-mass spectrometry (MALDI-MS), O-methylisourea, which is chemically bound to a specific site of an amino acid (e.g. lysine) of peptides and improves the intensities of the modified peptides, is frequently used prior to the MALDI-MS analysis of peptides, where the process is called guanidination. The reaction efficiency of guanidination varies depending on the reaction conditions. We investigated the efficiencies of guanidination of tryptically digested myoglobin using three different reagents (O-methylisourea, S-methylisothiourea, and 2-methyl-2-imidazoline) at $65^{\circ}C$ for 1 h with various pH conditions (pH 4.0, 7.0, and 10.5), where O-methylisourea and pH 10.5 were found to be most effective. The guanidination with O-methylisourea at pH 10.5 were then applied with different reaction conditions such as heating, microwave and ultrasound at various times, where heating for 60 min was found to be most effective. Conclusively, guanidination with O-methylisourea at $65^{\circ}C$ for 1 h at pH 10.5 was found to be the optimized condition.

Investigation of Fungicide Response of Streptomyces spp. Isolated from Rhizosphere in Zoysiagrass (한국 잔디 근권에서 분리된 Streptomyces spp.의 살균제에 대한 반응조사)

  • Lee, Jung Han;Min, Gyu Young;Jeon, Chang Wook;Choi, Su Min;Shim, Gyu Yul;Kwak, Youn-Sig
    • The Korean Journal of Pesticide Science
    • /
    • v.19 no.1
    • /
    • pp.54-63
    • /
    • 2015
  • Streptomyces spp. isolated from turfgrass rhizosphere and tested for their response to large-patch control fungicides. The tested fungicides were actually used in golf course or turfgrass cultivation to prevent large-patch disease. Tolerance to 3 triazole group of the strains was the highest to the PR fungicide, and following the SR fungicide, whereas the isolated strains were no tolerance to HR fungicide. Tolerances to three kind of Strobilurin group were similar for the all of the tested Streptomyces spp.. Growth and sporulation of the all strain was normal in CB and AP fungicide treatments. However no spore formulated in double concentration. Strains, tolerance to acetanilide fungicides, appeared that KT fungicide tolerance was higher than MK fungicide. The selected strains showed strong tolerance against AT fungicide but have no tolerance to ATR fungicides. In conclusion, the bacterial strains showed tolerance against 1 carbamate, 1 organophosphate and 1 cyanopyrrole group, while have no tolerance against two mixture formulations (1 Quinone + Strobilurin and 1 Imidazole + Triazole).

Design of a Policy-based Security Mechanism for the Secure Grid Applications (안전한 그리드 응용을 위한 정책기반의 보안 기능 설계)

  • Cho, Young-Bok;You, Mi-Kyung;Lee, Sang-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.2
    • /
    • pp.901-908
    • /
    • 2011
  • For the available grid environmental realization, the resource supply PC must have to provide an appropriate security function of their operation environments. SKY@HOME is a kind of the grid computing environments. If this has not supervised by administrator handling smoothly, it is inherently vulnerable state to the security level of the grid environments, because the resource supply PC is not update a security function without delay. It is also have the troublesome problems which have to install of an additional security program for support the appropriate security. This paper proposes an integration security model on the policy-based that provides an update each level according to the situation of the resource supply PC for improving its problems as a security aspect of the SKY@HOME. This model analyzes the security state of the resource supply PC respectively, and then the result is available to provide an appropriate security of the resource supply PC using an integration security model. The proposed model is not need additionally to buy and install the software, because it is provided the security management server oriented service. It is also able to set up the suit security function of a characteristic of the each resource supply PC. As a result, this paper clearly show the participation of resource supply PC improved about 20%.

A Search Method for Components Based-on XML Component Specification (XML 컴포넌트 명세서 기반의 컴포넌트 검색 기법)

  • Park, Seo-Young;Shin, Yoeng-Gil;Wu, Chi-Su
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.2
    • /
    • pp.180-192
    • /
    • 2000
  • Recently, the component technology has played a main role in software reuse. It has changed the code-based reuse into the binary code-based reuse, because components can be easily combined into the developing software only through component interfaces. Since components and component users have increased rapidly, it is necessary that the users of components search for the most proper components for HTML among the enormous number of components on the Internet. It is desirable to use web-document-typed specifications for component specifications on the Internet. This paper proposes to use XML component specifications instead of HTML specifications, because it is impossible to represent the semantics of contexts using HTML. We also propose the XML context-search method based on XML component specifications. Component users use the contexts for the component properties and the terms for the values of component properties in their queries for searching components. The index structure for the context-based search method is the inverted file indexing structure of term-context-component specification. Not only an XML context-based search method but also a variety of search methods based on context-based search, such as keyword, search, faceted search, and browsing search method, are provided for the convenience of users. We use the 3-layer architecture, with an interface layer, a query expansion layer, and an XML search engine layer, of the search engine for the efficient index scheme. In this paper, an XML DTD(Document Type Definition) for component specification is defined and the experimental results of comparing search performance of XML with HTML are discussed.

  • PDF

The Asian mode of production of Japanese Manga Higajima -The protests of the Political Structure and Asian mode of production (일본 만화 <피안도(彼岸島(Higajima))>와 아시아적 생산 양식 아시아적 생산양식의 정치구조와 투쟁)

  • Lee, Ho-Young
    • Cartoon and Animation Studies
    • /
    • s.25
    • /
    • pp.109-132
    • /
    • 2011
  • The Vampire has relatively universal images in through the cultural and verbal usages. The comic Higajima and movie display the latest image of Japanese Vampire of asian mode of production. After the Meiji political reformation of 18th Century, Japanese had rapidly changed into European style in every places. However, the Higajima is denied the structural changes, it is insisted that the changing is only the skin deep and colour of hair but the structure of the society is same as feudal Japan. Asian mode of production is claimed by Karl Marx, according to him, it is before the historical developing model in Europe and it was controversial. The major character of modern Japanese history would be the change of hierarchy of king-shogun-samurai-peasant based on the regional ground. The feudal structure is changed by the Meiji reformation and Japan was rushed for the westernized country rather than the asian mode of production. However, Higajima argued that the changing is just the clothes of ruler but the democracy and individual citizenship was lost in that reformation. Vampire is cursed creature that cannot see the sun and it has not the functioned as a human organ. For human it is dead but this creature actively moves and stronger than human and much superior than human in every aspects. It is managed the feeding through the suck the human blood and power to seduction. Even it is not exist, it is quite symbolic phenomenon of cultural usage of superior entity of chain of feeding. The aim of this paper is display the symbolic code Vampire of Asian mode of production in Higajima and political struggling of Japan in actual. To search of the cultural meaning and possibility of the Korean solution of modernity.

Design and Implementation of File Cloud Server by Using JAVA SDK (Java SDK를 이용한 파일 클라우드 시스템의 설계 및 구현)

  • Lee, Samuel Sangkon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.2
    • /
    • pp.86-100
    • /
    • 2015
  • Cloud computing is a computing term that evolved in the late 2000s, based on utility and consumption of computer resources. Google say that "Cloud computing involves deploying groups of remote servers and software networks that allow different kinds of data sources be uploaded for real time processing to generate computing results without the need to store processed data on the cloud. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Cloud computing, or in simpler shorthand just "the cloud", also focuses on maximizing the effectiveness of the shared resources." The cloud service is a smart and/or intelligent service to save private files in any device, anytime, anywhere. Dropbox, OAuth, PAClous are required that the accumulated user's data are archives with cloud service. Currently we suggest an implementation technique to process many tasks to the cloud server with a thread pooling. Thread pooling is one of efficient implementating technique for client and service environment. In this paper, to present the implementation technique we suggest three diagrams in the consideration of software engineering.

Location Estimation System based on Majority Sampling Data (머저리티 샘플링 데이터 기반 위치 추정시스템)

  • Park, Geon-Yeong;Jeon, Min-Ho;Oh, Chang-Heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2523-2529
    • /
    • 2014
  • Location estimation service can be provided outdoors using various location estimation system based on GPS. However, location estimation system is based on existing indoor resources as GPS cannot be used because of insufficient visible satellites and weak signals. The fingerprinting technique that uses WLAN signal, in particular, is good to use indoors because it uses RSSI provided by AP to estimate location. However, its accuracy may vary depending on how accurate data the offline stage used where the fingerprinting map is built. The study sampled various data at the stage that builds the fingerprinting map and suggested a location estimation system that enhances its precision by saving the data of high frequency among them to improve this problem. The suggested location estimation system based on majority sampling data estimates location by filtering RSSI data of the highest frequency at the client and server to be saved at a map, building the map and measuring a similar distance. As a result of the test, the location estimation precision stood at minimum 87.5 % and maximum 90.4% with the margin of error at minimum 0.25 to 2.72m.

An Intra Prediction Hardware Architecture Design for Computational Complexity Reduction of HEVC Decoder (HEVC 복호기의 연산 복잡도 감소를 위한 화면내 예측 하드웨어 구조 설계)

  • Jung, Hongkyun;Ryoo, Kwangki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1203-1212
    • /
    • 2013
  • In this paper, an intra prediction hardware architecture is proposed to reduce computational complexity of intra prediction in HEVC decoder. The architecture uses shared operation units and common operation units and adopts a fast smoothing decision algorithm and a fast algorithm to generate coefficients of a filter. The shared operation unit shares adders processing common equations to remove the computational redundancy. The unit computes an average value in DC mode for reducing the number of execution cycles in DC mode. In order to reduce operation units, the common operation unit uses one operation unit generating predicted pixels and filtered pixels in all prediction modes. In order to reduce processing time and operators, the decision algorithm uses only bit-comparators and the fast algorithm uses LUT instead of multiplication operators. The proposed architecture using four shared operation units and eight common operation units which can reduce execution cycles of intra prediction. The architecture is synthesized using TSMC 0.13um CMOS technology. The gate count and the maximum operating frequency are 40.5k and 164MHz, respectively. As the result of measuring the performance of the proposed architecture using the extracted data from HM 7.1, the execution cycle of the architecture is about 93.7% less than the previous design.

A Crypto-processor Supporting Multiple Block Cipher Algorithms (다중 블록 암호 알고리듬을 지원하는 암호 프로세서)

  • Cho, Wook-Lae;Kim, Ki-Bbeum;Bae, Gi-Chur;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2093-2099
    • /
    • 2016
  • This paper describes a design of crypto-processor that supports multiple block cipher algorithms of PRESENT, ARIA, and AES. The crypto-processor integrates three cores that are PRmo (PRESENT with mode of operation), AR_AS (ARIA_AES), and AES-16b. The PRmo core implementing 64-bit block cipher PRESENT supports key length 80-bit and 128-bit, and four modes of operation including ECB, CBC, OFB, and CTR. The AR_AS core supporting key length 128-bit and 256-bit integrates two 128-bit block ciphers ARIA and AES into a single data-path by utilizing resource sharing technique. The AES-16b core supporting key length 128-bit implements AES with a reduced data-path of 16-bit for minimizing hardware. Each crypto-core contains its own on-the-fly key scheduler, and consecutive blocks of plaintext/ciphertext can be processed without reloading key. The crypto-processor was verified by FPGA implementation. The crypto-processor implemented with a $0.18{\mu}m$ CMOS cell library occupies 54,500 gate equivalents (GEs), and it can operate with 55 MHz clock frequency.

(Design and Implementation of Integrated Binding Service of Considering Loads in Wide-Area Object Computing Environments) (광역 객체 컴퓨팅 환경에서 부하를 고려한 통합 바인딩 서비스의 설계 및 구현)

  • 정창원;오성권;주수종
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.293-306
    • /
    • 2003
  • In recent years, distributed computing environments have been radically changing to a structure of global, heterogeneous, federative and wide-area systems. This structure's environments consist of a let of objects which are implemented on telecommunication network to provide a wide range of services. Furthermore, all of objects existing on the earth have the duplicated characteristics according to how to categorize their own names or properties. But, the existing naming or trading mechanism has not supported the binding services of duplicated objects, because of deficiency of independent location service. Also, if the duplicated objects which is existing on different nodes provide the same service, it is possible to distribute the client requests considering each system's load. For this reason, we designed and implemented a new model that can not only support the location management of replication objects, but also provide the dynamic binding service of objects located in a system with minimum overload for maintaining load balancing among nodes in wide-area object computing environments. Our model is functionally divided into two parts; one part is to obtain an unique object handle of replicated objects with same property as a naming and trading service, and the other is to search one or more contact addresses by a location service using a given object handle. From a given model mentioned above, we present the procedures for the integrated binding mechanism in design phase, that is, Naming/Trading Service and Location Service. And then, we described in details the architecture of components for Integrated Binding Service implemented. Finally, we showed our implement environment and executing result of our model.