• Title/Summary/Keyword: 바이러스 이동

Search Result 165, Processing Time 0.023 seconds

First Report of Cucumber mosaic virus Isolated from Sambungai (Gynura procumbens) (명월초에서 분리한 오이모자이크바이러스의 감염 첫 보고)

  • Kwon, June;Hong, Jin-Sung
    • Research in Plant Disease
    • /
    • v.23 no.4
    • /
    • pp.379-382
    • /
    • 2017
  • In March 2016, an isolate of Cucumber mosaic virus (named Gyp-CMV) was isolated from the Sambungai (Gynura procumbens) showing the symptoms of mosaic and chlorosis. The isolate Gyp-CMV was characterized by disease reactions in several indicator plants, reverse transcription-polymerase chain reaction (RT-PCR), PCR-restriction fragment length polymorphism, and sequence analysis of movement protein (3a) and coat protein (CP) genes. Tobacco, tomato, pepper, ground cherry, and lambsquarters (Chenopodium quinoa and C. amaranticolor) appeared typical CMV symptoms, but zucchini and cucumber were not infected. Phylogenetic analysis of the 3a and CP gene indicated that Gyp-CMV belongs to the CMV subgroup II. Sequence identities of the Gyp-CMV 3a and CP genes showed 99.3% and 100% to that of Hnt-CMV at amino acid level. To our knowledge, this is the first report of CMV infection in Gynura procumbens.

Standardization Model and Implementation of Event Type in Real Time Cyber Threat (실시간 위협에서 Event 유형의 정형화 설계 및 구현)

  • Lee, Dong-Hwi;Lee, Dong-Chun;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.67-73
    • /
    • 2006
  • The method which research a standardization from real time cyber threat is finding the suspicious indication above the attack against cyber space include internet worm, virus and hacking using analysis the event of each security system through correlation with the critical point, and draft a general standardization plan through statistical analysis of this evaluation result. It means that becomes the basis which constructs the effective cyber attack response system. Especially at the time of security accident occurrence, It overcomes the problem of existing security system through a definition of the event of security system and traffic volume and a concretize of database input method, and propose the standardization plan which is the cornerstone real time response and early warning system. a general standardization plan of this paper summarizes that put out of threat index, threat rating through adding this index and the package of early warning process, output a basis of cyber threat index calculation.

  • PDF

Prediction of Highy Pathogenic Avian Influenza(HPAI) Diffusion Path Using LSTM (LSTM을 활용한 고위험성 조류인플루엔자(HPAI) 확산 경로 예측)

  • Choi, Dae-Woo;Lee, Won-Been;Song, Yu-Han;Kang, Tae-Hun;Han, Ye-Ji
    • The Journal of Bigdata
    • /
    • v.5 no.1
    • /
    • pp.1-9
    • /
    • 2020
  • The study was conducted with funding from the government (Ministry of Agriculture, Food and Rural Affairs) in 2018 with support from the Agricultural, Food, and Rural Affairs Agency, 318069-03-HD040, and in based on artificial intelligence-based HPAI spread analysis and patterning. The model that is actively used in time series and text mining recently is LSTM (Long Short-Term Memory Models) model utilizing deep learning model structure. The LSTM model is a model that emerged to resolve the Long-Term Dependency Problem that occurs during the Backpropagation Through Time (BPTT) process of RNN. LSTM models have resolved the problem of forecasting very well using variable sequence data, and are still widely used.In this paper study, we used the data of the Call Detailed Record (CDR) provided by KT to identify the migration path of people who are expected to be closely related to the virus. Introduce the results of predicting the path of movement by learning the LSTM model using the path of the person concerned. The results of this study could be used to predict the route of HPAI propagation and to select routes or areas to focus on quarantine and to reduce HPAI spread.

Estimation of Trapping Efficiency Using VFSMOD: Application to Cheongmi Basin (VFSMOD를 이용한 토사저감효율 산정: 청미천 유역에서의 적용)

  • Son, Minwoo;Byun, Jisun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.338-338
    • /
    • 2015
  • 하천으로 유입되어 수질 오염을 야기하는 오염원은 오염 배출원이 명확하여 하나의 점으로 나타낼 수 있는 점오염원(Point Source)과 오염원이 명확치 않은 비점오염원(Non-point)으로 구분된다. 생활하수, 축산폐수와 같이 오염원이 명확한 점오염원은 하천 유입 이전에 처리장을 거쳐 정화작업이 가능한 반면, 비점오염원은 오염원이 명확치 않아 처리에 어려움이 따른다. 또, 오염물의 양과 이동 경로가 예측이 불가능하고 강우시에는 특별한 처리 없이 하천으로 바로 유입된다. 비점 오염원의 종류는 토사, 영양물질, 유기물질, 농약, 바이러스 등 다양하다. 이 중에서 토양에 흡착되어 이동하는 질소와 인은 하천으로 유입되어 부영양화를 야기하는 특성이 있어 더욱 처리가 필수적이다. 이러한 비점오염원으로 인한 수질 오염을 줄이기 위해 여러 최적관리기법(Best Management Practices, BMPs)이 제시되어 있으며 오염 물질의 하천 유입을 차단하는 것에 중점을 둔다. 가장 널리 이용되는 방법으로는 비점오염원 저감시설 중 하천변에 식물체를 설치하여 토양의 유실을 막는 식생대(Vegetative Filter Strip, VFS)가 있다. 식생 밀집 지역의 설치를 통해 표면 유출을 차단하고 토양 유실 감소와 수체로의 오염물질 확산을 막을 수 있다. 이에 VFSMOD-w를 이용하여 강우시 식생대를 통한 토양 유실 감소 효율에 대한 연구를 수행하였다. 연구 대상 지역으로 비교적 수문 및 토양 자료가 풍부한 청미천 유역을 선정하였다. 그 결과, 식생대의 길이와 식생대 내 식물체의 파종간격이 가장 지배적인 영향을 미치는 것이 확인된다. 이때, 식물체의 종류는 식물체 파종으로 인해 변화되는 토양의 수정된 Manning의 조도계수로 구분한다. 모든 강우 및 식물체 조건이 동일할 때, 식생대 내 식물의 파종 간격이 좁고 식생대의 길이가 길수록 토사 저감 효율이 증가하는 결과가 도출되었다. 식물체의 높이, 식물체의 종류 및 식물의 파종간격이 입력 자료로 요구되나 이 중 식물체의 높이는 토사 저감 효율에 영향을 미치지 않는 것으로 나타났다. 또, 동일한 강우 조건에서 식생대의 길이가 0.5 m에서 1.0 m로 2배 증가하였을 때 토사 저감 효율이 두 경우 모두 95% 이상의 효율을 보이는 것이 나타났다. 이는 식생대의 길이가 증가할수록 토사 저감 효율이 증가하나 일정 길이 이상이 되면 대부분의 토사가 저감되는 것을 의미한다. 결론적으로 식생의 파종 간격이 좁을수록 토사 저감 효율이 증가하더라도 식물체의 성장을 고려한 적절한 파종 간격을 선정하여야 한다. 즉, 식생대의 설치는 적절한 파종 간격 및 식생대 길이를 식생대 설치지역의 강우 특성에 따라 결정지어야 한다고 판단된다.

  • PDF

A intelligent network weather map framework using mobile agent (이동 에이전트 기반 지능형 네트워크 weather map 프레임워크)

  • Kang, Hyun-Joong;Nam, Heung-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.3
    • /
    • pp.203-211
    • /
    • 2006
  • Today, Internet covers a world wide range and most appliances of our life are linked to network from enterprise server to household electric appliance. Therefore, the importances of administrable framework that can grasp network state by real-time is increasing day by day. Our objective in this paper is to describe a network weather report framework that monitors network traffic and performance state to report a network situation including traffic status in real-time. We also describe a mobile agent architecture that collects state information in each network segment. The framework could inform a network manager of the network situation. Through the framework. network manager accumulates network data and increases network operating efficiency.

  • PDF

Effect of Planting Date on the Infection of Necrotic Soybean SMV (파종시기에 따른 콩 양저바이러스(SMV-IV)의 발생경향)

  • 신두철;김순권;황영현;박근용;김호일
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.24 no.3
    • /
    • pp.59-65
    • /
    • 1979
  • Severe outbreak of necrotic. soybean mosaic virus. (SMV -N) strain has been observed on soybean (Glycine max) in the central northern pans of Korea. Thirty soybean cultivars developed from Korea. Japan, and USA were tested for the estimation of infection percentages and ratings at 4 different planting dates. SMV-N infection was decreased by delaying the planting dates, but no differences were observed in conmon mosaic virus. Most of the soybean cultivars developed in Korea, and Japan were more susceptible to SMV- N than the US developed cultivars. Infection ratings of SMV-N showed highly significant negative correlations with common SMV regardless of planting dates.

  • PDF

Change Detection Algorithm based on Positive and Negative Selection of Developing T-cell (T세포 발생과정의 긍정 및 부정 선택에 기반한 변경 검사 알고리즘)

  • Sim, Kwee-Bo;Lee, Dong-Wook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.1
    • /
    • pp.119-124
    • /
    • 2003
  • In this paper, we modeled positive selection and negative selection that is developing process of cytotoxic T-cell that plays important role in biological immune system. Also, we developed change detection algorithm, which is very Important part in detecting data change by intrusion and data infection by computer virus. Proposed method is the algorithm that produces MHC receptor lot recognizing self and antigen detector for recognizing non-self. Therefore, proposed method detects self and intruder by two type of detectors like real immune system. We show the effectiveness and characteristics of proposed change detection algorithm by simulation about point and block change of self file.

RNA Binding Specificities of Double-Stranded RNA Binding Protein (RBF) as an Inhibitor of PRK Kinase (PKR인산화효소 억제인자인 이중선RNA결합단백질 (RBF)의 RNA결합특이성)

  • 박희성;최장원
    • Journal of Life Science
    • /
    • v.6 no.4
    • /
    • pp.234-240
    • /
    • 1996
  • A double-stranded RNA binding factor (RBF), characterized as an inhibitor of PKR kinase in our previous study, was evaluated for its RNA binding specificities by RNA gel electrophoretic mobility shift analysis and membrane filter binding assay, RBF displayed affinities for a broad range of RNAs including viral RNAs and synthetic RNAs consiting of stem and loop structures. GC-rich RNA stem helices as short as 11 bp are suggested to represent the minimal binding motif for RBF. RBF binding to all the natural RNAs tested was reversible by poly(I): poly(C) addition, but E. coli 5S RNA was inefficient.

  • PDF

Designing and Realization of the System for the Improvement of Processing Capability of Intrusion Detection by Using O/S Information (O/S 정보를 이용한 침입탐지 처리성능 향상에 관한 시스템 설계 및 구현)

  • Son, Man-Kyung;Lee, Dong-Hwi;J Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.2
    • /
    • pp.91-99
    • /
    • 2006
  • As the speed of network has fastened and the Internet has became common, an ill-intentioned aggression, such as worm and E-mail virus rapidly increased. So that there too many defenses created the recent Intrusion detection system as well as the Intrusion Prevention Systems to defense the malicious aggression to the network. Also as the form of malicious aggression has changed, at the same time the method of defense has changed. There is "snort" the most representive method of defense and its Rules file increases due to the change of aggression form. This causes decline of capability for detection. This paper suggest, design, and realize the structure for the improvement of processing capability by separating the files of Snort Rule according to o/s. This system show more improvement of the processing capability than the existing composion.

  • PDF

AHP 기법을 이용한 안티바이러스 소프트웨어 평가 요인 분석

  • Kim, Jong-Ki;Hwang, Suk-Yeon;Lee, Dong-Ho
    • The Journal of Information Systems
    • /
    • v.14 no.1
    • /
    • pp.19-40
    • /
    • 2005
  • The history of computer virus comes along with that of computer. Computer virus han surfaced as a serious problem in information age. The advent of open network and widespread use of Internet made the problem even more urgent. As a method of defense for computer virus most companies use anti-virus software. Selecting appropriate anti-virus software involves various criteria and thus it is a multiple-attribute decision making problem. The purpose of this study is to prioritize anti-virus software evaluation factors. To do that, first of all, important evaluation factors are selected based on previous research on anti-virus software as well as general software evaluation models. Then, a questionnaire survey was conducted on end-users, system administrators and anti-virus software developers. The survey result was analyzed with ExpertChoice 2000 which is based on Analytic hierarchy Process technique. This study found that there are clear differences among three survey groups regarding the relative importance of overall evaluation factors. End-user group ranked "cost" first, but it was the least important factor to developer group. Developers pointed out "operational support" ad the most important factor. There were also obvious differences in the relative importance of detail evaluation items. Both end-users and system administrators shared 7 common items among top 10 most important items. Moreover, neither of the two groups ranked any of the items in the "operational support" factor in top 10, whereas all 4 items in the factor were included in top 10 by developer group.

  • PDF