• Title/Summary/Keyword: Deletion method

Search Result 260, Processing Time 0.029 seconds

Design and Implementation of Object Reusing Methods for Mobile Vector Map Services (모바일 벡터 지도 서비스를 위한 객체 재사용 기법의 설계 및 구현)

  • Kim, Jin-Deog;Choi, Jin-Oh
    • The KIPS Transactions:PartD
    • /
    • v.10D no.3
    • /
    • pp.359-366
    • /
    • 2003
  • Although the reuse of the cached data for scrolling the map reduces the amount of passed data between client and server, it needs the conversions of data coordinates, selective deletion of objects, cache compaction and object structuring step in the clients. The conversion is a time- intensive operation due to limited resources of mobile phones such as low computing power, small memory. Therefore, in order to control the map efficiently in the vector map service based mobile phones, it is necessary to study the methods which reuse cached objects for reducing wireless network bandwidth and overwhelming the limited resources of mobile phones as well. This paper proposes the methods of reusing pre-received spatial objects for map control in the mobile vector map service system based on client-server architecture. The experiments conducted on the Web GIS systems with real data show that the proposed method is appropriate to map services for mobile phone. We also analyze the advantages and drawbacks between the reuse of cached data and transmission of raw data respectively.

Comparative Analysis of Large Genome in Human-Chimpanzee (인간-침팬지간 대량의 지놈서열 비교분석)

  • Kim, Tae-Hyung;Kim, Dae-Soo;Jeon, Yeo-Jin;Cho, Hwan-Gue;Kim, Heui-Soo
    • Proceedings of the Korean Society for Bioinformatics Conference
    • /
    • 2003.10a
    • /
    • pp.183-192
    • /
    • 2003
  • With the availability of complete whole-genomes such as the human, mouse, fugu and chimpanzee chromosome 22, comparative analysis of large genomes from cross-species at varying evolutionary distances is considered one of a powerful approach for identifying coding and functional non-coding sequences. Here we describe a fast and efficient global alignment method especially for large genomic regions over mega bases pair. We used an approach for identifying all similarity regions by HSP (Highest Segment Pair) regions using local alignments and then large syntenic genome based on the both extension of anchors at HSP regions in two species and global conservation map. Using this alignment approach, we examined rearrangement loci in human chromosome 21 and chimpanzee chromosome 22. Finally, we extracted syntenic genome 30 Mb of human chromosome 21 with chimpanzee chromosome 22, and then identified genomic rearrangements (deletions and insertions ranging h size from 0.3 to 200 kb). Our experiment shows that all jnsertion/deletion (indel) events in excess of 300 bp within chimpanzee chromosome 22 and human chromosome 21 alignments in order to identify new insertions that had occurred over the last 7 million years of evolution. Finally we also discussed evolutionary features throughout comparative analyses of Ka/ks (non-synonymous / synonymous substitutions) rate in orthologous 119 genes of chromosome 21 and 53 genes of MHC-I class in human and chimpanzee genome.

  • PDF

Cloning of Bacillus amyloliquefaciens amylase gene using YEp13 as a vector I. Expression of cloned amylase gene in Escherichia coli (YEp 13 vector를 이용한 Bacillus amyloliquefaciens amylase gene의 cloning I. Escherichia coli에서의 발현)

  • 이창후;서정훈
    • Microbiology and Biotechnology Letters
    • /
    • v.14 no.2
    • /
    • pp.155-160
    • /
    • 1986
  • $\alpha$-Amylase gene of B. amyloliquefaciens was cloned to E. coli-yeast shuttle vector YEp-13 and expressed in E. coli. Chromosomal DNA of B. amyloliquefaciens was partially digested with Sau3Al and YEp13 plasmid was cleaved with BamH1. The hybrid plasmid, pHA28, was constructed by shotgun method and transformed to E. coli C600 and HB101. The amount of $\alpha$-amylase produced by transformants of E. coli was about 20% to 30% of that produced by B. amyloli-quefaciens. About 65% of $\alpha$-amylase produced by transformant was secreted into periplasm and the others were located in cytoplasm. $\alpha$-Amylase production was maximal when transformants were cultivated for 15hr to 20hr. As the result of agarose gel electrophoresis, pHA28 plasmid was found to be various in its size. This result suggested that pHA28 plasmid was segregated.

  • PDF

Modulating the Properties of Metal-Sensing Whole-Cell Bioreporters by Interfering with Escherichia coli Metal Homeostasis

  • Yoon, Youngdae;Kang, Yerin;Lee, Woonwoo;Oh, Ki-Cheol;Jang, Geupil;Kim, Bong-Gyu
    • Journal of Microbiology and Biotechnology
    • /
    • v.28 no.2
    • /
    • pp.323-329
    • /
    • 2018
  • In Escherichia coli, the transcription of genes related to metal homeostasis is activated by the presence of target metals. The promoter regions of those genes can be fused with reporter genes to generate whole-cell bioreporters (WCBs); these organisms sense the presence of target metals through reporter gene expression. However, the limited number of available promoters for sensing domains restricts the number of WCB targets. In this study, we have demonstrated an alternative method to generate novel WCBs, based on the notion that since the sensing mechanisms of WCBs are related to metal transportation systems, their properties can be modulated by disrupting metal homeostasis. Mutant E. coli strains were generated by deleting the znt-operon genes zntA, which encodes a zinc-export protein, and zntR, which encodes a znt-operon regulatory protein, to investigate the effects on the metal-sensing properties of WCBs. Deletion of zntA increased the sensitivity but abolished the selectivity of cadmium-sensing WCBs, whereas arsenic-sensing WCBs gained sensitivity toward cadmium. When zntR was deleted, cadmium-sensing WCBs lost the ability to detect cadmium, and this was recovered by introducing exogenous zntR. In addition, the metal-binding site of ZntR was genetically engineered to modulate metal selectivity. This study provides a valuable platform for the development of novel E. coli-based WCBs.

A Study on Designing of Metadata for Constructing the Library Map Information System (도서관지도정보시스템 구축을 위한 메타데이터 개발 연구)

  • Noh, Young-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.3
    • /
    • pp.241-264
    • /
    • 2010
  • This study aimed to construct the Library Map Information System(LMIS) based on the Wiki theory of Web 2.0. We built this system because there was no collective source of information about every library in the world. Also, this system was developed to provide a library location information service by mashing-up with the Google Map. Through this study, the metadata applied to the newly constructed system was developed by using the Delphi method. A total of 13 experts including librarians of schools, public, academic, special, and national libraries as well as LIS faculty members and researchers, were commissioned as Delphi experts. Through three rounds of a Delphi survey analysis, the addition, modification, and deletion of the initial metadata elements was accomplished, and then the library contact/location information, library information, collection information, and event information was proposed. The metadata for LMIS was organized into four sectors and then 49 elements, each assigned to a sector.

A Study on Improving the Legal System for the Expedited Preservation of Digital Evidence (디지털 증거의 긴급한 보전을 위한 법제 개선 연구)

  • Ro, Sohyong;Ji, Sungwoo
    • Journal of Information Technology Services
    • /
    • v.19 no.3
    • /
    • pp.57-73
    • /
    • 2020
  • The proportion of digital evidence in criminal cases has increased, while at the same time, the spread of the Internet has made it easy to delete information that is stored in another place and thus, the Internet is being used to delete online criminal evidence. To respond quickly and effectively to cybercrime, 29 countries signed the Convention on Cybercrime in 2001 through the Council of Europe. Article 16 of the Convention relates to the expedited preservation of stored computer data and requires signatories to adopt legislative measures to enable its competent authorities to order expeditious preservation of specified computer data where there are grounds to believe that the data is particularly vulnerable to loss or modification. More than 60 countries have joined the Convention since 2001 and have made efforts to improve their legal system in line with it. The United States legislated 18 U.S.C. § 2703(f) to preserve electronic evidence pending the issuance of a court order. The German Code of Criminal Procedure §§ 94~95 allows prosecution authorities to seize evidence or issue production orders without court control in urgent circumstances. A custodian shall be obliged to surrender evidence upon a request that evidence be preserved, and non-compliance results in punishment. Japan legislated the Criminal Procedure Act § 197(3) and (4) to establish a legal base for requesting that electronic records that are stored by an ISP not be deleted. The Korean Criminal Procedure Act § 184 outlines procedures for the preservation of evidence but does not adequately address the expeditious preservation of digital evidence that may be vulnerable to deletion. This paper analyzes nine considerations, including request subjects, requirements, and cost reimbursement to establish directions to improve the legal system for the expedited preservation of digital evidence. A new method to preserve online digital evidence in urgent cases is necessary.

Extraction and Comprehension of Objects for Class Components Reuse (클래스 부품의 재사용을 위한 객체의 추출과 이해)

  • Han, Jeong-Su;Song, Yeong-Jae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.4
    • /
    • pp.941-951
    • /
    • 1999
  • Class components in a repository require exact information representation by reason of insufficiency of various visual information through search and extraction. In this paper, we have described syntax-analysis method and viewer facilities about class components. In the components analysis, we extracted class information which consists of class_names, methods, attributes, class inheritance relationship, and graphic information. viewer represents extracted class information and creates a new class. Also, it provides facilities of reuse, insertion, and deletion. Not only Viewer represents class hierarchy diagram, and shows detail information about each class, but also it creates new classes. In this paper, we implemented a Viewer using the components, inheritance, diagram information and process. And we enhanced understanding of programs through viewer, and supported prototype for class creation.

  • PDF

Adaptive Upstream Backup Scheme based on Throughput Rate in Distributed Spatial Data Stream System (분산 공간 데이터 스트림 시스템에서 연산 처리율 기반의 적응적 업스트림 백업 기법)

  • Jeong, Weonil
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.10
    • /
    • pp.5156-5161
    • /
    • 2013
  • In distributed spatial data stream processing, processed tuples of downstream nodes are replicated to the upstream node in order to increase the utilization of distributed nodes and to recover the whole system for the case of system failure. However, while the data input rate increases and multiple downstream nodes share the operation result of the upstream node, the data which stores to output queues as a backup can be lost since the deletion operation delay may be occurred by the delay of the tuple processing of upstream node. In this paper, the adaptive upstream backup scheme based on operation throughput in distributed spatial data stream system is proposed. This method can cut down the average load rate of nodes by efficient spatial operation migration as it processes spatial temporal data stream, and it can minimize the data loss by fluid change of backup mode. The experiments show the proposed approach can prevent data loss and can decrease, on average, 20% of CPU utilization by node monitoring.

Applicability of K-path Algorithm for the Transit Transfer of the Mobility Handicapped (교통약자의 대중교통환승을 위한 K경로 알고리즘 적용성 연구)

  • Kim, Eung-Cheol;Kim, Tea-Ho;Choi, Eun-Jin
    • International Journal of Highway Engineering
    • /
    • v.13 no.1
    • /
    • pp.197-206
    • /
    • 2011
  • The Korean government concentrates on supplying public transit facilities for the mobility handicapped. In other hands, increasing needs of transfer information when the mobility handicapped use transit facilities are substantial but not satisfactory as a whole. This study focuses on evaluating the applicability of developed K-path algorithm to provide user-customized route information that could make an active using of public transit while considering the mobility handicapped preferences. Developed algorithm reflects on requirements considering transfer attributes of the mobility handicapped. Trip attributes of the handicapped are addressed distinguished from handicapped types such as transfer walking time, transfer ratio, facility preferences and etc. This study examines the verification and application of the proposed algorithm that searches the least time K-paths by testing on actual subway networks in Seoul metropolitan areas. It is shown that the K-path algorithm is good enough to provide paths that meet the needs of the mobility handicapped and to be adoptable for the future expansion.

Intronic Sequences for the Discrimination of Silkworm Strains in Silkworm Powder

  • Kim, Kee-Young;Lee, Eun-Mee;Hong, Mee-Yeon;Kang, Pil-Don;Ryu, Kang-Sun;Kim, Ik-Soo
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • v.15 no.2
    • /
    • pp.93-100
    • /
    • 2007
  • After a serial study on the therapeutic efficacy of the powdery silkworm for diabetics was positively resulted in, many powdery silkworm products were on the market in Korea. Up to now, however, no causal method is available to discriminate the strain of silkworms that is a major ingredient for manufacturing powdery silkworm, even though the quality of the powdery silkworm differs greatly by source and origin of strains. We previously were successful in identifying 25 silkworm strains kept in Korea using nine intronic sequences. In this study, we tested the utility of the nine intronic sequences to distinguish the most widely reared silkworm strains originated from Korea and China. Two intron regions, PTTH Intron3 and PTTH Intron3, showed a substantial sequence divergence (mean sequence divergence of 3.13% in PTTH Intron3 and 4.99% in PTTH Intron3). These two intronic sequences provided no identical sequences among the seven strains tested. Thus, these sequences each along can be used to discriminate the seven strains tested in this study. Furthermore, other intron regions, except for VDP Intron4 allowed us to discriminate $2{\sim}4$ strains by strain-specific unique insertion/deletion or substitution.