• Title/Summary/Keyword: Combination ID

Search Result 39, Processing Time 0.024 seconds

Influence of Growth Regulators and Potassium Humate on in Vitro Multiplication of Apple Rootstock M.26 (생장조절제 및 Potassium Humate가 사과대목 M.26 기내 증식에 미치는 영향)

  • 임학태;용영록;송융남;한교필;김종화
    • Korean Journal of Plant Tissue Culture
    • /
    • v.21 no.3
    • /
    • pp.131-135
    • /
    • 1994
  • This experiment was designed to improve the in vitro production system of apple rootstock M.26 as being influenced by the growth regulators, TDZ, BA, IAA, IBA, zeatin, and GA$_3$. Different levels of potassium humate (KH), known as cytokinin and auxin-like substance, were also supplemented to the MS basal medium along with IBA 0.6 mg/L to find out it effect on root formation in apple rootstock M.26. ID initiate and establish the in vitro multiplication of shoots byway of meristem culture, MS medium added with zeatin 1.0 mg/L was found to be the most suitable, showing the 100% of survival rate of shoot tips. A combination of thidiazuron (TDZ) 0.2 mg/L and NAA 0.5 mg/L promoted the shoot proliferation when shoot tips were used as explants. MS basal medium plus IBA 0.6 mg/L was very effective for root induction, but an addition of potassium humate (250 mg/L) to the medium containing IBA 0.6 mg/L stimulated the induction and proliferation of the rook by far the better.

  • PDF

Congenital Cystic Adenomatoid Malformation Associated with Extralobar Pulmonary Sequestration -1 case report- (외엽형 폐격리증을 동반한 선천성 낭종성 선종양 기형 -1례 보고-)

  • Jeon, Sang-Hyeop;Kim, Byeong-Jun;Lee, Hyeong-Ryeol
    • Journal of Chest Surgery
    • /
    • v.29 no.2
    • /
    • pp.223-226
    • /
    • 1996
  • Pulmonary sequestration and congenital cystic adenomatoid malformation are two infrequent congenital pulmonary diseases and the combination of these two entities is rare. We had experienced a 3 week old male patient with a pulmonary mass, who had been sufyerring from tachypnea and chest wall retraction after birth. The pulmonary mass was suspected as a congenital cystic adenomat id malformation by chest CT. And therefore, we performed urgent operation via standard thoracotomy incision. Upon a thoracotomy, there was an extrapleural mass with anomalous blood supply near the posterior diaphragm and multiple cystic lesions in right lower lobe. The two anomalous arteries arising from the thoracic aorta and one vein draining into the azygos vein were ligated. and then the extrapleural mass was removed and a right lower lobectomy was performed. Final histologic diagnosis was congenital cystic adenomatoid malformation associated with extralobar pulmonary sequestration. The patient was discharged without any problem.

  • PDF

Morphology of Carbon Nanotubes Prepared by Methane Plasma CVD (메탄 플라즈마 CVD법으로 합성한 탄소나노튜브의 구조적 특성)

  • Kim, Myung-Chan;Moon, Seung-Hwan;Lim, Jae-Seok;Hahm, Hyun-Sik;Park, Hong-Soo;Kim, Myung-Soo
    • Journal of the Korean Applied Science and Technology
    • /
    • v.21 no.4
    • /
    • pp.289-299
    • /
    • 2004
  • Multi-walled carbon nanotubes (CNTs) were prepared by microwave plasma chemical vapor deposition (MPCVD) using various combination of binary catalysts and methane precursor. The maximum yield (10.3 %) of CNTs was obtained using a methane-hydrogen-nitrogen mixture with volume ratio of 1:1:2 at 1000 W of microwave power. As the microwave power increased up to 1000 W, the deposition yield of CNTs raised from 4.1 % to 10. 3 %. However, the prepared CNTs at 800 W showed the more crystalline structure than those prepared at 1000 W. The prepared CNTs over different binary catalysts had various structural conformations such as aligned cylinder, bamboo, and nanofibers. The Id/Ig value of CNTs over$Fe-Fe/Al_2O_3, $Co-Co/Al_2O_3, and $Co-Cu/Al_2O_3 were in the range of 0.89${\sim}$0.93. Among the various binary catalysts used, $Fe-Co./Al_2O_3 showed the highest yield.

Performance Modeling of an EPC Information Service System

  • Kim, So-Jung;Kang, Yong-Shin;Son, Kyung-Won;Lee, Yong-Han;Rhee, Jong-Tae;Hong, Sung-Jo
    • Industrial Engineering and Management Systems
    • /
    • v.9 no.3
    • /
    • pp.285-293
    • /
    • 2010
  • To obtain visible and traceable information from the supply chain, HW/SW standards for the EPC global network, which process electronic product code (EPC) data read from Radio frequency identification (RFID) tags, are regarded as the de facto industry standard. Supply chain participants install information service systems and provide logistics information to partners by following the EPCglobal architecture framework. Although quality of service (QoS) is essential for providing dependable and scalable services as pointed out by Auto-ID Lab, only a few models for the performance analysis of QoS-related work have been developed in the context of EPC information service systems. Specifically, doing so allows alternative design choices to be tested in an easy and cost-effective manner and can highlight potential performance problems in designs long before any construction costs are incurred. Thus, in this study we construct a model of an EPC information service system for the purposes of performance analysis and designing a dependable system. We also develop a set of building blocks for analytical performance models. To illustrate how the model works, we determine the characteristics of an EPC information service system and then select a combination of these proven modeling concepts. We construct a performance model that considers the response time and shows how to derive meaningful performance values. Finally, we compare the analytical results to measurements of the EPC information service system.

Transformation Methodology from Specification of ESTELLE to VHDL (ESTELLE 명세에서 VHDL 명세로의 변환 방법론)

  • 이미경;이익섭;김선규;조준모;김성운
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.2
    • /
    • pp.174-183
    • /
    • 2000
  • Formal methods for protocol description of a system is based on the implementation id S/W. However, the importance of H/W implementation for a parts of protocol design is increasing. The combination between H/W and IP technology is needed since the implementation environment is changing from S/W to H/W for implementation of specific application protocol. H/W implementation method starting with formal description procedure is essential to guarantree correctness and reliability of the implemented H/W by characteristic of formal description language. Inthis paper, for an automated H/W implementations, ESTELLE, a formal description method, is adopted. A transformation method from specification of ESTELLE to VHDL is suggested. This is an conceptual method that comparing and analyzing similarities between basic units of protocol description such as computation and communication unit and inter processors in H/W. Then we describe transformation model, and suggest example of transformation from ESTELLE to VHDL with Inres protocol.

  • PDF

A Study on Secure Key Management Technology between Heterogeneous Networks in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 이기종 네트워크간 안전한 키 관리 기술에 관한 연구)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.4
    • /
    • pp.504-515
    • /
    • 2008
  • Fast transmission speeds and various wired network services have been combined with the convenience and mobility of wireless services. The combination of wired/wireless technologies is spreading rapidly since it enables the creation of new services and provides new features to both users and service providers. In such wired/wireless integrated services, network integration is very important because such systems are integrated by a linkage between heterogeneous networks and they involve an integration of transmission technologies across networks. In this situation, existing security and communication technologies are unsuitable since the network are integrated with heterogeneous networks. The network may also have several security flaws. In existing homogeneous networks, user authentication and key management between heterogeneous networks are required for these new technologies. The establishment of security technologies for heterogeneous devices is a very important task between homogeneous networks. In this paper, we propose a secure and efficient key management system for a heterogeneous network environment. Our system provides secure communications between heterogeneous network devices.

  • PDF

Genetic Variance and Combining Ability of Shattering and Growth Characters by Diallel Crosses of Sesame (이면교잡에 의한 참깨의 탈립성 및 생육형질의 유전변이와 조합능력)

  • Kim, Dong-Hwi;Kang, Chul-Whan;Shim, Kang-Bo;Park, Chang-Hwan;Lee, Sung-Woo;Seong, Nak-Sul
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.51 no.7
    • /
    • pp.652-657
    • /
    • 2006
  • Combining ability and heterosis for $F_{1}$ population obtained $5{\times}5$ half diallel cross in sesame were estimated for six quantitative characters. The parental varieties used for diallel cross were Yangbaek and Ansan of normal type, Suwon 177 and 195 of placenta adhesion type (PA) and SIG960320-5-1-1 of indehiscent type (ID). PA and ID type are shattering-resistant sesames and Yangbaek and Ansan are shattering sesames. The high heterosis of $F_{1}$ hybrids was expressed in the number of capsules per plant (NC), grain yield per plant (GY) and number of branches per plant (NB). Shattering.ate (SR) showed high positive heterosis toward increase of seeds shattering in all the combination of $F_{1}$ generation which was presumed because the characters connected with shattering resistance of seeds were governed by recessive gene. At the analysis of combining ability, highly significant general combining ability (GCA) effects were observed on all the characters in $F_{1}$ generation, significant specific combining ability (SCA) effects were observed on the NC, GY and SR. GCA variances were greater than SCA variance, which suggested that additive gene effects were greater than other nonadditive gene effects. Considering the estimated GCA effects, Suwon 195 (PA type) was found to be good parent for SR and GY, SIG960320-5-1-1 (ID type) was poor for GY and plant height. SCA effect for NC was great in Yangbaek/Suwon 195, SCA for GY was great in Ansan/SIG960320-5-1-1, and SCA for decrease of SR was great in Ansan/Suwon177.

Experimental Investigations of Combination Effects of Installation Damage and Creep Deformation on Long-Term Design Strength of Geogrids (지오그리드의 장기설계인장강도에 미치는 시공시 손상 및 크리프 변형 복합효과에 대한 실험적 평가)

  • Cho, Sam-Deok;Lee, Kwang-Wu;Oh, Se-Yong;Lee, Do-Hee
    • Journal of the Korean Geosynthetics Society
    • /
    • v.4 no.4
    • /
    • pp.23-37
    • /
    • 2005
  • The factors affecting the long-term design strength of geogrid can be classified into factors on creep deformation, installation damage, temperature, chemical degradation and biological degradation. Especially, creep deformation and installation damage are considered as main factors to determine the long-term design strength of geogrid. Current practice in the design of a reinforced soil structures is to calculate the long-term design strength of a geosynthetic reinforcement damaged during installation by multiplying the two partial safety factors, $RF_{ID}$ and $RF_{CR}$. This method assumes that there is no evaluation of synergy effect between installation damage and creep deformation of geogrids. This paper describes the results of a series of experimental study, which are carried out to assess the combined effect of the installation damage and the creep deformation for the long-term design strength of geogrid reinforcements. A series of field tests was carried out to assess installation damage of various geogrids with respect to different fill materials, and then creep tests are conducted to evaluate the creep deformation of both undamaged and damaged geogrids. The results indicated that the tensile strength reduction factors, RF, considering the combined effect between the installation damage and the creep deformation is less than that calculated by the current design method.

  • PDF

Performance analysis of Frequent Itemset Mining Technique based on Transaction Weight Constraints (트랜잭션 가중치 기반의 빈발 아이템셋 마이닝 기법의 성능분석)

  • Yun, Unil;Pyun, Gwangbum
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.67-74
    • /
    • 2015
  • In recent years, frequent itemset mining for considering the importance of each item has been intensively studied as one of important issues in the data mining field. According to strategies utilizing the item importance, itemset mining approaches for discovering itemsets based on the item importance are classified as follows: weighted frequent itemset mining, frequent itemset mining using transactional weights, and utility itemset mining. In this paper, we perform empirical analysis with respect to frequent itemset mining algorithms based on transactional weights. The mining algorithms compute transactional weights by utilizing the weight for each item in large databases. In addition, these algorithms discover weighted frequent itemsets on the basis of the item frequency and weight of each transaction. Consequently, we can see the importance of a certain transaction through the database analysis because the weight for the transaction has higher value if it contains many items with high values. We not only analyze the advantages and disadvantages but also compare the performance of the most famous algorithms in the frequent itemset mining field based on the transactional weights. As a representative of the frequent itemset mining using transactional weights, WIS introduces the concept and strategies of transactional weights. In addition, there are various other state-of-the-art algorithms, WIT-FWIs, WIT-FWIs-MODIFY, and WIT-FWIs-DIFF, for extracting itemsets with the weight information. To efficiently conduct processes for mining weighted frequent itemsets, three algorithms use the special Lattice-like data structure, called WIT-tree. The algorithms do not need to an additional database scanning operation after the construction of WIT-tree is finished since each node of WIT-tree has item information such as item and transaction IDs. In particular, the traditional algorithms conduct a number of database scanning operations to mine weighted itemsets, whereas the algorithms based on WIT-tree solve the overhead problem that can occur in the mining processes by reading databases only one time. Additionally, the algorithms use the technique for generating each new itemset of length N+1 on the basis of two different itemsets of length N. To discover new weighted itemsets, WIT-FWIs performs the itemset combination processes by using the information of transactions that contain all the itemsets. WIT-FWIs-MODIFY has a unique feature decreasing operations for calculating the frequency of the new itemset. WIT-FWIs-DIFF utilizes a technique using the difference of two itemsets. To compare and analyze the performance of the algorithms in various environments, we use real datasets of two types (i.e., dense and sparse) in terms of the runtime and maximum memory usage. Moreover, a scalability test is conducted to evaluate the stability for each algorithm when the size of a database is changed. As a result, WIT-FWIs and WIT-FWIs-MODIFY show the best performance in the dense dataset, and in sparse dataset, WIT-FWI-DIFF has mining efficiency better than the other algorithms. Compared to the algorithms using WIT-tree, WIS based on the Apriori technique has the worst efficiency because it requires a large number of computations more than the others on average.