• Title/Summary/Keyword: Card Detection

Search Result 81, Processing Time 0.028 seconds

Pattern-Recognition Receptor Signaling Initiated From Extracellular, Membrane, and Cytoplasmic Space

  • Lee, Myeong Sup;Kim, Young-Joon
    • Molecules and Cells
    • /
    • v.23 no.1
    • /
    • pp.1-10
    • /
    • 2007
  • Invading pathogens are recognized by diverse germline-encoded pattern-recognition receptors (PRRs) which are distributed in three different cellular compartments: extracellular, membrane, and cytoplasmic. In mammals, the major extracellular PRRs such as complements may first encounter the invading pathogens and opsonize them for clearance by phagocytosis which is mediated by membrane-associated phagocytic receptors including complement receptors. The major membrane-associated PRRs, Toll-like receptors, recognize diverse pathogens and generate inflammatory signals to coordinate innate immune responses and shape adaptive immune responses. Furthemore, certain membrane-associated PRRs such as Dectin-1 can mediate phagocytosis and also induce inflammatory response. When these more forefront detection systems are avoided by the pathogens, cytoplasmic PRRs may play major roles. Cytoplasmic caspase-recruiting domain (CARD) helicases such as retinoic acid-inducible protein I (RIG-I)/melanoma differentiation-associated gene 5 (MDA5), mediate antiviral immunity by inducing the production of type I interferons. Certain members of nucleotide-binding oligomerization domain (NOD)-like receptors such as NALP3 present in the cytosol form inflammasomes to induce inflammatory responses upon ligand recognition. Thus, diverse families of PRRs coordinately mediate immune responses against diverse types of pathogens.

Reliability of Stool Antigen Tests: Investigation of the Diagnostic Value of a New Immunochromatographic Helicobacter pylori Approach in Dyspeptic Patients

  • Korkmaz, Huseyin;Findik, Duygu;Ugurluoglu, Ceyha;Terzi, Yuksel
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.2
    • /
    • pp.657-660
    • /
    • 2015
  • Background: A diagnosis of H. pylori infection can be made by invasive or non-invasive methods. Several noninvasive diagnostic tests based on the detection of H. pylori stool antigen (HpSA) have been developed. The Genx H. pylori stool antigen card test is a new rapid, non-invasive test that is based on monoclonal immunochromatographic assay. The aim of this study was to determine its sensitivity, specificity, and diagnostic accuracy for diagnosing H. pylori infection in adult patients. Materials and Methods: A total of 162 patients were included in the study. A gastric biopsy was collected for histopathology and rapid urease testing. Stool specimens for HpSA testing were also collected. Patients were considered H. pylori positive if two invasive tests (histological and rapid urease tests) were positive. Results: Using the reference test, 50.6% of the samples were positive for H. pylori infection. The Genx H. pylori antigen test was positive in 19.7% of patients. The sensitivity, specificity, positive predictive value, negative predictive value, and diagnostic accuracy of the Genx H. pylori antigen test were 51.6%, 96.0%, 88.8%, 76.1%, and 79.0%, respectively. Conclusions: The Genx H. pylori stool antigen card test is a new non-invasive method that is fast and simple to perform but provides less reliable results.

The Research of Mini-Game by Using Online Image Automatic Detection Technology (온라인 이미지 자동 검색 기술을 이용한 미니게임에 관한 연구)

  • Huang, Chun-Hua;Cho, Kwang-Hyeon;Kim, Gye-Young;Choi, Hyung-Il
    • Journal of Korea Game Society
    • /
    • v.11 no.2
    • /
    • pp.115-129
    • /
    • 2011
  • In this paper, we will introduce some method about retrieving suitable images to game or adjusting game difficulty in enjoying some contents like mini-game. It will use the technology about extracting color and texture features in content-based image retrieval in image processing. So in card game, it select card image automatically. And by controlling seed image number, we can adjusting game difficulty. Through the experiment, it shows that our image retrieval method can retrieve more useful images that can be used in game than others.

Design of a Holter Monitoring System with Flash Memory Card (플레쉬 메모리 카드를 이용한 홀터 심전계의 설계)

  • 송근국;이경중
    • Journal of Biomedical Engineering Research
    • /
    • v.19 no.3
    • /
    • pp.251-260
    • /
    • 1998
  • The Holter monitoring system is a widely used noninvasive diagnostic tool for ambulatory patient who may be at risk from latent life-threatening cardiac abnormalities. In this paper, we design a high performance intelligent holter monitoring system which is characterized by the small-sized and the low-power consumption. The system hardware consists of one-chip microcontroller(68HC11E9), ECG preprocessing circuit, and flash memory card. ECG preprocessing circuit is made of ECG preamplifier with gain of 250, 500 and 1000, the bandpass filter with bandwidth of 0.05-100Hz, the auto-balancing circuit and the saturation-calibrating circuit to eliminate baseline wandering, ECG signal sampled at 240 samples/sec is converted to the digital signal. We use a linear recursive filter and preprocessing algorithm to detect the ECG parameters which are QRS complex, and Q-R-T points, ST-level, HR, QT interval. The long-term acquired ECG signals and diagnostic parameters are compressed by the MFan(Modified Fan) and the delta modulation method. To easily interface with the PC based analyzer program which is operated in DOS and Windows, the compressed data, that are compatible to FFS(flash file system) format, are stored at the flash memory card with SBF(symmetric block format).

  • PDF

On the Performance of Cuckoo Search and Bat Algorithms Based Instance Selection Techniques for SVM Speed Optimization with Application to e-Fraud Detection

  • AKINYELU, Andronicus Ayobami;ADEWUMI, Aderemi Oluyinka
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1348-1375
    • /
    • 2018
  • Support Vector Machine (SVM) is a well-known machine learning classification algorithm, which has been widely applied to many data mining problems, with good accuracy. However, SVM classification speed decreases with increase in dataset size. Some applications, like video surveillance and intrusion detection, requires a classifier to be trained very quickly, and on large datasets. Hence, this paper introduces two filter-based instance selection techniques for optimizing SVM training speed. Fast classification is often achieved at the expense of classification accuracy, and some applications, such as phishing and spam email classifiers, are very sensitive to slight drop in classification accuracy. Hence, this paper also introduces two wrapper-based instance selection techniques for improving SVM predictive accuracy and training speed. The wrapper and filter based techniques are inspired by Cuckoo Search Algorithm and Bat Algorithm. The proposed techniques are validated on three popular e-fraud types: credit card fraud, spam email and phishing email. In addition, the proposed techniques are validated on 20 other datasets provided by UCI data repository. Moreover, statistical analysis is performed and experimental results reveals that the filter-based and wrapper-based techniques significantly improved SVM classification speed. Also, results reveal that the wrapper-based techniques improved SVM predictive accuracy in most cases.

Development of Elementary learning materials for Data error detection and correction (데이터 에러 검출과 수정에 대한 초등교육자료 개발)

  • Ko, Hyeongcheol;Kim, Chongwoo
    • Journal of The Korean Association of Information Education
    • /
    • v.22 no.1
    • /
    • pp.169-176
    • /
    • 2018
  • CS Unplugged education at the base of computer science is emphasized as an instrument for teaching the basic principles of elementary SW education, but these materials for elementary education are very lacking. So We'll present the data error detection and correction materials for elementary school classes. Based on previous studies related to this topic, we developed learning materials for elementary higher grade students using Hamming code. We introduces the card magic in the introduction part. 'error detection and correction' learning materials based on the principle of Hamming code, were composed as activity-based education. The results of the questionnaire survey showed that it had a positive effect on improving learners' understanding of computer science.

Terrain Shadow Detection in Satellite Images of the Korean Peninsula Using a Hill-Shade Algorithm (음영기복 알고리즘을 활용한 한반도 촬영 위성영상에서의 지형그림자 탐지)

  • Hyeong-Gyu Kim;Joongbin Lim;Kyoung-Min Kim;Myoungsoo Won;Taejung Kim
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.5_1
    • /
    • pp.637-654
    • /
    • 2023
  • In recent years, the number of users has been increasing with the rapid development of earth observation satellites. In response, the Committee on Earth Observation Satellites (CEOS) has been striving to provide user-friendly satellite images by introducing the concept of Analysis Ready Data (ARD) and defining its requirements as CEOS ARD for Land (CARD4L). In ARD, a mask called an Unusable Data Mask (UDM), identifying unnecessary pixels for land analysis, should be provided with a satellite image. UDMs include clouds, cloud shadows, terrain shadows, etc. Terrain shadows are generated in mountainous terrain with large terrain relief, and these areas cause errors in analysis due to their low radiation intensity. previous research on terrain shadow detection focused on detecting terrain shadow pixels to correct terrain shadows. However, this should be replaced by the terrain correction method. Therefore, there is a need to expand the purpose of terrain shadow detection. In this study, to utilize CAS500-4 for forest and agriculture analysis, we extended the scope of the terrain shadow detection to shaded areas. This paper aims to analyze the potential for terrain shadow detection to make a terrain shadow mask for South and North Korea. To detect terrain shadows, we used a Hill-shade algorithm that utilizes the position of the sun and a surface's derivatives, such as slope and aspect. Using RapidEye images with a spatial resolution of 5 meters and Sentinel-2 images with a spatial resolution of 10 meters over the Korean Peninsula, the optimal threshold for shadow determination was confirmed by comparing them with the ground truth. The optimal threshold was used to perform terrain shadow detection, and the results were analyzed. As a qualitative result, it was confirmed that the shape was similar to the ground truth as a whole. In addition, it was confirmed that most of the F1 scores were between 0.8 and 0.94 for all images tested. Based on the results of this study, it was confirmed that automatic terrain shadow detection was well performed throughout the Korean Peninsula.

Analyses of Detection and Protection for Phishing on Web page (웹페이지의 피싱 차단 탐지 기술에 대한 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.607-610
    • /
    • 2008
  • Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have been receiving extensive press coverage because such attacks have been escalating in number and sophistication. According to a study by Gartner, Many Internet users have identified the receipt of e-mail linked to phishing scams and about 2 million of them are estimated to have been tricked into giving away sensitive information. This paper presents a novel browser extension, AntiPhish, that aims to protect users against spoofed web site-based phishing attack.

  • PDF

A Study on Temperature Process Control of Electric Furnace (전기로 온도공정제어에 관한 연구)

  • 오진석;김윤식;오세준;최순만;신명철
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.21 no.3
    • /
    • pp.311-318
    • /
    • 1997
  • In this paper, a controller with monitoring functions is proposed for controlling temperature of an electric furnace system. The controller includes holding and ramp control functions, and the control program for the temperature process monitor of the electric furnace. For this purpose, the implementation and performance of auto tuning algorithms in a computer¬based controller is studied in relation to control of a nonlinear electric furnace system which is characterized with large time delay. The communicator of a control and detection signals, between the controller and the electric furnace is implemented by an I/O data card. Experiments for the practical electric furnace are performed to illustrate the performance of the proposed controller.

  • PDF

RFID Tag Protection using Face Feature

  • Park, Sung-Hyun;Rhee, Sang-Burm
    • Journal of the Semiconductor & Display Technology
    • /
    • v.6 no.2 s.19
    • /
    • pp.59-63
    • /
    • 2007
  • Radio Frequency Identification (RFID) is a common term for technologies using micro chips that are able to communicate over short-range radio and that can be used for identifying physical objects. RFID technology already has several application areas and more are being envisioned all the time. While it has the potential of becoming a really ubiquitous part of the information society over time, there are many security and privacy concerns related to RFID that need to be solved. This paper proposes a method which could protect private information and ensure RFID's identification effectively storing face feature information on RFID tag. This method improved linear discriminant analysis has reduced the dimension of feature information which has large size of data. Therefore, face feature information can be stored in small memory field of RFID tag. The proposed algorithm in comparison with other previous methods shows better stability and elevated detection rate and also can be applied to the entrance control management system, digital identification card and others.

  • PDF