• Title/Summary/Keyword: CTR

Search Result 172, Processing Time 0.027 seconds

Human Papillomavirus Infections and p53 Expression in Prostatic Carcinoma (전립선 암조직에서의 사람파필로마바이러스의 감염과 p53단백질의 발현에 대한 연구)

  • Kwon, Dur-Han;Jin, Seung-Won;Kang, Byung-Tae;Yoon, Hee-Sik;Yoo, Wang-Don;Kim, Hyeun-Soo;Lee, Sang-Sook;Lee, Ho-Sa;Park, Sue-Nie
    • The Journal of Korean Society of Virology
    • /
    • v.26 no.2
    • /
    • pp.227-234
    • /
    • 1996
  • Prostatic carcinoma is the leading second cause of cancer in men. Previous epidermiological studies implicated human papillomavirus as an infectious agent. Since there are only limited studies on the association of HPV to prosate cancer, we examined the prevalence of HPV infections in korean prostate cancer patients. We observed that out of 26 cases, 4 cases and 5 cases were infected by HPV 16(27%) and HPV 18 (31%), respectively and 3 cases by both (46%) and at least 18 were positive for HPV (69%). For these samples, immunohistochemical detection of the p53 and proliferative cell nuclear antigen (PCNA) were also studied, using monoclonal antibodies. Sixteen of 26 (61%) showed immunostaining for p53 protein. While 8 samples with no HPV infection (100%) showed all positive for p53 protein staining, less than half of the 18 patients with any HPV infection (44%) showed p53 protein staining. These findings indicate that altered expression of p53 protein occurs in the more than half of prostate cancers, however, p53 expression is less frequent in HPV infected tissues. This implies that there might be an inverse correlation in general between HPV infection and p53 amplification. However, while 50% (4 of 8) of HPV negative prostate cancer was positive for PCNA staining, 13 out of 18 HPV infected patients (72%) were positive. Therefore HPV infection is more strongly associated with increase proliferation. In addition HPV infected cancer patients are generally in more advanced status implying that HPV infection plays a role in the development of highly malignant prostatic carcinomas, eventhough the statistical significance of this interpretation might be waited for the analysis of more cases.

  • PDF

Urban Accessibility Index for Evaluation of Sustainability in Urban Transport System (도시 교통체계의 지속가능성 평가를 위한 도시 접근성 지표)

  • Shin, Seong-Il;Jang, Yun-Mee;Kim, Soon-Gwan;Kim, Chan-Sung
    • Journal of Korean Society of Transportation
    • /
    • v.23 no.8 s.86
    • /
    • pp.31-42
    • /
    • 2005
  • Accessibility is the generalized definition on how ease of access. Accessibility is used to appraise transportation project such as capturing the quality of the existing state of the transportation system at diverse spatial levels, It also reflects on the effect of improvements to the existing travel modes and the intoduction of new modes. The overall goal of this study is to propose a measure of urban accessibility in Seoul which can analyze various behavior of travelers in the city and to present applications. In this study, we apply measures of accessibility which are developed by CTR(The Center for Transportation Research, the University of Texas at Austin) to construct the urban accessibility index applicable for explaining trip behavior in Seoul. We evaluate sustainability of urban transport system in Seoul in 2002 by using the MAG(Modal Accessibility GaP) index which is developed to measure the accessibility gap between the more energy-efficient mode and less energy-efficient mode of transport. By analyzing the change of MAG index between 2002 and 2004 based on network data, we show how the public transportation system reform affect the sustainability in transport system.

A Study on the Estimation of Click Through Rates from Internet Search Results and their Value in the Evaluation of the Attractiveness of a Business Idea (사업 아이디어 매력도 평가를 위한 인터넷 검색엔진 광고 클릭률 추정에 관한 연구)

  • Shim, Jae-Hu;Choi, Myeong-Gil
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.4
    • /
    • pp.1468-1474
    • /
    • 2010
  • The establishment of a successful business must be preceded by comprehensive entrepreneurial preparation and research, as well as the development of a truly attractive business idea. Research to-date has tended to be based solely on factors relating to entrepreneurial activity or business performance. Research into the development and evaluation of a business idea has been insufficient. The purpose of this research is to propose a methodology for evaluating the attractiveness of a business idea objectively. This research measures the attractiveness of a business idea by the click through rate (CTR) to a website generated by specific keyword entry into internet search engines. The attractiveness of a business idea can be presented by the formula: number of relevant keyword searches x CTR on search results. As the number of searches for individual keywords is published by the search engines and it is possible to estimate CTRs for specific search results, we can objectively evaluate the attractiveness of a business idea. By analyzing keyword search data and CTRs obtained from search engines over a one month period, 1124 keywords that relate to foreign language education have been identified. A regression formula has also been derived, predicting the click through rate for search results. This research and its findings can be used to raise the success rates of new businesses; proposing objective guidelines for business idea development and evaluation. It is particularly meaningful because it introduces a new methodology to the arena.

Perceptual Segregation of Distractor Reduces Within-hemisphere Interference (방해자극과 표적의 지각적 분리가 반구내와 반구간의 간섭에 미치는 영향)

  • Sohn, Young-Sook;Kim, Min-Shik
    • Proceedings of the Korean Society for Cognitive Science Conference
    • /
    • 2006.06a
    • /
    • pp.29-32
    • /
    • 2006
  • 이 연구에서는 표적과 방해자극을 분리시킬 때 관찰되는 간섭 감소가 반구내 및 반구간 조건에서 달리 나타난다는 것을 보여주기 위해 세 개의 실험을 실시하였다. 세 실험의 과제는 모두 색깔이 있는 원과 사각형이 주어지고 항상 검은색으로 제시되는 색 이름 단어가 주어진 상황에서 원의 색은 무시하고 사각형의 색과 단어가 의미하는 색이 같은지, 다른지를 판단하는 것이었다. 사각형의 색이 단어가 의미하는 색과 일치할 때 방해자극인 원의 색도 단어가 의미하는 색과 일치하는지 여부에 따라 방해자극의 세 조건(일치, 불일치, 중립)이 만들어졌다. 또한, 방해자극인 원이 표적 가운데 하나인 단어와 같은 시각장에 제시되는지, 혹은 반대편 시각장에 따로 제시되는지에 따라 반구 간섭조건(반구내 간섭, 반구간 간섭)이 만들어졌다 간섭효과는 불일치 조건과 중립 조건간의 차이로 측정하였다. 실험 1의 결과는 정확률과 반응시간 모두에서 반구내 간섭이 반구간 간섭보다 유의미하게 더 큰 것으로 나타났다. 실험 2에서는 방해자극인 원을 선제시하였는데 그 결과 반구내 간섭이 특히 크게 감소하여 반구내 간섭과 반구간 간섭이 차이를 보이지 않게 되었다. 그러나 표적자극인 사각형을 선제시한 실험 3에서는 반구내 간섭이 여전히 반구간 간섭보다 유의미하게 큰 것으로 나타났다. 세 실험의 결과를 종합하면 방해자극의 간섭 효과는 방해자극을 표적과 다른 반구로 분리 제시하거나, 선제시 같은 방법으로 방해자극을 표적과 분리시킬 때 유의미하게 감소하였다. 그러나 애초부터 방해자극을 표적과 다른 반구로 분리 제시하였던 반구간 간섭조건에서는 방해자극의 선제시가 간섭 감소를 가져오지 않았다. 지질의 산패를 가속화시킨 결과라고 생각된다. 따라서 호박 라면 제조시 이러한 공기와의 접촉을 차단시킬 수 있는 포장재료를 선택해야 될 것으로 사료된다.0.05), 맛, 연도, 다즙성 및 전체적인 기호성은 유의한 차이가 없었다.자체를 악하다고 볼 수 없고 더구나 구원을 이 세상에서의 이탈로 볼 수 없다. 진정한 구원이란 원래 하나님이 보시기에 아름다웠던 그 세상으로의 회복을 포함한다. 이런 면에서 하나님 주권 신앙 하에서 구원이란 전 인격적인 구원, 전 우주적인 구원이 된다. 그렇기 때문에 성도는 세상의 삶과 학문, 예술, 정치, 경제, 사회를 포함한 모든 분야를 하나님의 뜻 가운데서 그 원래의 목적에 부합할 수 있도록 회복시키는 일에 적극 참여해야 한다.자체가 이를 주도하기는 사실 어려움이 있다. 그리고 대형유통점이 영업행위를 영업시간제한에서부터 출점제한에 이르기까지 규제하는 건은 심사숙고하여야 한다. 대형유통점이 국가경제 및 지역사회에 미치는 영향이 부정적인가 긍정적인가에 대해 국내외 학계와 업계에서 여전히 많은 논란이 있기 때문이다. 정부와 지자체에 의한 시장개입은 반드시 필요한 경우에 한해 합당한 방법에 의해 이루어져야 한다. 대형유통점에 대한 규제는 지역사회에 미치는 영향을 다면적으로 평가한 결과에 근거하여 이루어져야 할 것이다. 대부분의 지자체는 체계적인 평가시스템과 객관적인 통계 자료를 갖고 있지 못한 실정이다. 향후 가장 시급한 과제는 시장개방 이후 지난 10년간 대형유통점이 지역사회에 미친 영향에 관한 광범위한 통계자료를 수집하고 이를 체계적으로 분석하여 정책방향을 올바르게 설정하는 것이라 할 수 있다.i와 K. pneumonia

  • PDF

Effects of Paf1 complex components on H3K4 methylation in budding yeast (출아효모에서 Paf1 복합체의 구성원들이 H3의 네번째 라이신의 메틸화에 미치는 영향)

  • Oh, Jun-Soo;Lee, Jung-Shin
    • Korean Journal of Microbiology
    • /
    • v.52 no.4
    • /
    • pp.487-494
    • /
    • 2016
  • In Saccharomyces cerevisiae, Paf1 complex consists of five proteins, and they are structurally and functionally well conserved in yeast, fruit fly, plants, and human. With binding to RNA polymerase II from transcription start site to termination site, Paf1 complex functions as a platform for recruiting many types of transcription factors to RNA polymerase II. Paf1 complex contributes to H2B ubiquitination and indirectly influences on H3K4 di- and tri-methylation by histone crosstalk. But the individual effects of five components in Paf1 complex on these two histone modifications including H2B ubiquitination and H3K4 methylation largely remained to be identified. In this study, we constructed the single-gene knockout mutants of each Paf1 complex component and observed H3K4 mono-, di-, and trimethylation as well as H2B ubiquitination in these mutants. Interestingly, in each ${\Delta}paf1$, ${\Delta}rtf1$, and ${\Delta}ctr9$ strain, we observed the dramatic defect in H3K4 monomethylation, which is independent of H2B ubiquitination, as well as H3K4 di- and trimethylation. However, the protein level of Set1, which is methyltransferase for H3K4, was not changed in these mutants. This suggests that Paf1 complex may directly influence on H3K4 methylation by directly regulating the activity of Set1 or the stability of Set1 complex in an H2B ubiquitination independent manner.

A Unified ARIA-AES Cryptographic Processor Supporting Four Modes of Operation and 128/256-bit Key Lengths (4가지 운영모드와 128/256-비트 키 길이를 지원하는 ARIA-AES 통합 암호 프로세서)

  • Kim, Ki-Bbeum;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.795-803
    • /
    • 2017
  • This paper describes a dual-standard cryptographic processor that efficiently integrates two block ciphers ARIA and AES into a unified hardware. The ARIA-AES crypto-processor was designed to support 128-b and 256-b key sizes, as well as four modes of operation including ECB, CBC, OFB, and CTR. Based on the common characteristics of ARIA and AES algorithms, our design was optimized by sharing hardware resources in substitution layer and in diffusion layer. It has on-the-fly key scheduler to process consecutive blocks of plaintext/ciphertext without reloading key. The ARIA-AES crypto-processor that was implemented with a $0.18{\mu}m$ CMOS cell library occupies 54,658 gate equivalents (GEs), and it can operate up to 95 MHz clock frequency. The estimated throughputs at 80 MHz clock frequency are 787 Mbps, 602 Mbps for ARIA with key size of 128-b, 256-b, respectively. In AES mode, it has throughputs of 930 Mbps, 682 Mbps for key size of 128-b, 256-b, respectively. The dual-standard crypto-processor was verified by FPGA implementation using Virtex5 device.

Design of Multimode Block Cryptosystem for Network Security (네트워크 보안을 위한 다중모드 블록암호시스템의 설계)

  • 서영호;박성호;최성수;정용진;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.11C
    • /
    • pp.1077-1087
    • /
    • 2003
  • In this paper, we proposed an architecture of a cryptosystem with various operating modes for the network security and implemented in hardware using the ASIC library. For configuring a cryptosystem, the standard block ciphers such as AES, SEED and 3DES were included. And the implemented cryptosystem can encrypt and decrypt the data in real time through the wired/wireless network with the minimum latency time (minimum 64 clocks, maximum 256 clocks). It can support CTR mode which is widely used recently as well as the conventional block cipher modes such as ECB, CBC and OFB, and operates in the multi-bit mode (64, 128, 192, and 256 bits). The implemented hardware has the expansion possibility for the other algorithms according to the network security protocol such as IPsec and the included ciphering blocks can be operated simultaneously. The self-ciphering mode and various ciphering mode can be supported by the hardware sharing and the programmable data-path. The global operation is programmed by the serial communication port and the operation is decided by the control signals decoded from the instruction by the host. The designed hardware using VHDL was synthesized with Hynix 0.25$\mu\textrm{m}$ CMOS technology and it used the about 100,000 gates. Also we could assure the stable operation in the timing simulation over 100㎒ using NC-verilog.

A Study on the Efficiency of Internet Keyword Advertisement According to CPM and CPC Methods by Analyzing Transactional Data (키워드 검색 광고 운영 DB 데이터 분석을 통한 CPM와 CPC방식의 광고효과 연구)

  • Kim, Do-Yeon;Lim, Gyoo-Gun;Lee, Dae-Chul
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.139-154
    • /
    • 2011
  • Recently Internet keyword search service providers tends to use CPC advertizement method rather than CPM method. However researches how much the CPC method is beneficial to advertisers than CPM method in certain perspectives are insufficient and not performed systematically. So this paper tries to do comparative analysis about the two methods by analyzing the real transactional DB data from an advertizement agency. Due to the difficulties of direct comparison between the two methods because of their different expose positions on the Web and different types of attributes in DB, we did some preprocessing step for the transactional data. From the result of analysis, the click rate of CPC is higher than CPM by 1.3% and the unit cost for the CPC per one click is lower than CPM method by 51 Won. It shows the CPC method is more effective than CPM method for advertizement from the point of advertizement effectiveness (CTR) and advertizement cost (CPC). We hope this research would give useful information to advertisers and marketing managers in making advertizement strategy, marketing decision and budgeting.

A Design of AES-based WiBro Security Processor (AES 기반 와이브로 보안 프로세서 설계)

  • Kim, Jong-Hwan;Shin, Kyung-Wook
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.7 s.361
    • /
    • pp.71-80
    • /
    • 2007
  • This paper describes an efficient hardware design of WiBro security processor (WBSec) supporting for the security sub-layer of WiBro wireless internet system. The WBSec processor, which is based on AES (Advanced Encryption Standard) block cipher algorithm, performs data oncryption/decryption, authentication/integrity, and key encryption/decryption for packet data protection of wireless network. It carries out the modes of ECB, CTR, CBC, CCM and key wrap/unwrap with two AES cores working in parallel. In order to achieve an area-efficient implementation, two design techniques are considered; First, round transformation block within AES core is designed using a shared structure for encryption/decryption. Secondly, SubByte/InvSubByte blocks that require the largest hardware in AES core are implemented using field transformation technique. It results that the gate count of WBSec is reduced by about 25% compared with conventional LUT (Look-Up Table)-based design. The WBSec processor designed in Verilog-HDL has about 22,350 gates, and the estimated throughput is about 16-Mbps at key wrap mode and maximum 213-Mbps at CCM mode, thus it can be used for hardware design of WiBro security system.

A Crypto-processor Supporting Multiple Block Cipher Algorithms (다중 블록 암호 알고리듬을 지원하는 암호 프로세서)

  • Cho, Wook-Lae;Kim, Ki-Bbeum;Bae, Gi-Chur;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2093-2099
    • /
    • 2016
  • This paper describes a design of crypto-processor that supports multiple block cipher algorithms of PRESENT, ARIA, and AES. The crypto-processor integrates three cores that are PRmo (PRESENT with mode of operation), AR_AS (ARIA_AES), and AES-16b. The PRmo core implementing 64-bit block cipher PRESENT supports key length 80-bit and 128-bit, and four modes of operation including ECB, CBC, OFB, and CTR. The AR_AS core supporting key length 128-bit and 256-bit integrates two 128-bit block ciphers ARIA and AES into a single data-path by utilizing resource sharing technique. The AES-16b core supporting key length 128-bit implements AES with a reduced data-path of 16-bit for minimizing hardware. Each crypto-core contains its own on-the-fly key scheduler, and consecutive blocks of plaintext/ciphertext can be processed without reloading key. The crypto-processor was verified by FPGA implementation. The crypto-processor implemented with a $0.18{\mu}m$ CMOS cell library occupies 54,500 gate equivalents (GEs), and it can operate with 55 MHz clock frequency.