• Title/Summary/Keyword: Domain name

Search Result 163, Processing Time 0.024 seconds

Cloning and Characterization of a new tobamovirus infecting Hibiscus rosa-sinensis

  • Srinivasan, L.K.G.;Wong, S.M.
    • Proceedings of the Korean Society of Plant Pathology Conference
    • /
    • 2003.10a
    • /
    • pp.125.3-126
    • /
    • 2003
  • A near full-length sequence of a new tobamovirus infecting Hibiscus rosa-sinensis L. was determined. The genome consists of 58 nucleotides (nt) 5' UTR, followed by a 4.9 kb ORF which methyl transferase helicase domain (128 kDa), readthrough protein RNA dependent RNA polymerase (RdRp) 185 kDa and a 52 kDa protein. The 128 kDa protein had a maximum homology of 51.4 % to TMGMV and amino acids (an) were 54.3 % identical to TMV- vulgare strain. The 185 kDa RdRp had a maximum homology of 53.5% to TMV-Ob and KGMMV-Y and a 59.6% homology at the an level to CGMMV-SH. The MP gene encodes 282 aa and its theoretical molecular weight is 30.4 kDa. The nt and an sequence identities of MP ranged from 38.8% to 43.9% and 30.9% to 37.9%, respectively. The CP gene encodes 163 residues and with a theoretical molecular weight of 18.2 kDa The (nt) and aa sequences of the CP were 46.9 % to 51.6% and 45.3% to 57.1% identical to other tobamoviruses, respectively. The predicted virion origin of assembly (OAS) was located in the CP gene. Phylogenetic trees generated based on the nt and as sequences of RdRp, MP and CP genes indicated that this new virus clustered with subgroup II tobamoviruses. Although the CP ORF of this virus shared a high nt and aa sequence identity with Sunn-hemp mosaic virus (SHMV), Western analysis showed that it is serologically unrelated to SHMV. We propose the name Hibiscus virus S (HVS) for this Singapore isolate. This is the first report on a near full-length sequence of a Tobamovirus that infects hibiscus.

  • PDF

SnSA Design and Embodiment for ESM of Small Scale Network (소규모 네트워크의 통합보안관제를 위한 SnSA 설계 및 구현)

  • 이동휘;신영준;김귀남
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.85-97
    • /
    • 2003
  • At the end of last January, 2003, a domestic top-level domain name server (DNS) shut down the server and it caused the wired and wireless internet services to be completely paralyzed in the aftermath of a virus attack incurring a various range of losses nationwide. The main reason of this event is the lack of our awareness of cyber security. In particular, in the small-scale network, there are few security administrators and no operating devices to protect information as well. Under this circumstance, using ESM center to service real-time security supervision and correspondence for network, it can be one option. However, due to the economic efficiency, most of security systems have been being developed focusing on the large-scale network first. Therefore, ESM centers which inspect security state of network concentrate on IDC or large-scale network services. This dissertation studies economical ESM service by designing exclusive SnSA for small-scale network for widespread use. Firstly, network invasion feeler function N_SnSA and host invasion feeler function H_SnSA are embodied to collect more informations in the small-scale network. Secondarily, the existing vulnerability is studied to find the solutions linked with a low cost to a Public center such as Kyonggi Univ ESM center.

  • PDF

The Ontological Conservativeness of Logic and Mereology (논리학의 존재론적 보수성과 부분전체론)

  • Kang, Soo-Whee
    • Korean Journal of Logic
    • /
    • v.13 no.2
    • /
    • pp.167-201
    • /
    • 2010
  • This paper aims to scrutinize the possibility of mereology as philosophically satisfiable metalogic. Motivation for this is straightforward. As I see, a traditional approach to metalogic presented in the name of mathematical logic posits the existence of mathematical entities such as sets, functions, models, etc. to give definitions of logical concepts like logical consequence. As a result, whenever logic is used in any individual sciences, this set-theoretical metalogic cannot but add these mathematical entities to the domain of them. This fact makes this approach contradict to the ontological conservativeness of logic. Mereology, however, has been alleged to be ontologically innocent, while it is a formal system very similar to set theory. So it may well be that some people thought of mereology as a good substitute for set theoretic metalanguage and concepts for ontologically neutral metalogic. Unfortunately, when we look into argument for the ontological innocence of mereology, we can find that mereological entities such as mereological sums or fusions are not ontologically neutral. Thus we can conclude that mereological approach to metalogic is not promising at all.

  • PDF

Face Morphing Using Generative Adversarial Networks (Generative Adversarial Networks를 이용한 Face Morphing 기법 연구)

  • Han, Yoon;Kim, Hyoung Joong
    • Journal of Digital Contents Society
    • /
    • v.19 no.3
    • /
    • pp.435-443
    • /
    • 2018
  • Recently, with the explosive development of computing power, various methods such as RNN and CNN have been proposed under the name of Deep Learning, which solve many problems of Computer Vision have. The Generative Adversarial Network, released in 2014, showed that the problem of computer vision can be sufficiently solved in unsupervised learning, and the generation domain can also be studied using learned generators. GAN is being developed in various forms in combination with various models. Machine learning has difficulty in collecting data. If it is too large, it is difficult to refine the effective data set by removing the noise. If it is too small, the small difference becomes too big noise, and learning is not easy. In this paper, we apply a deep CNN model for extracting facial region in image frame to GAN model as a preprocessing filter, and propose a method to produce composite images of various facial expressions by stably learning with limited collection data of two persons.

A Novel Resource Scheduling Scheme for CoMP Systems

  • Zhou, Wen'an;Liu, Jianlong;Zhang, Yiyu;Yang, Chengyi;Yang, Xuhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.650-669
    • /
    • 2017
  • Coordinated multiple points transmission and reception (CoMP) technology is used to mitigate the inter-cell interference, and increase cell average user normalized throughput and cell edge user normalized throughput. There are two kinds of radio resource schedule strategies in LTE-A/5G CoMP system, and they are called centralized scheduling strategy and distributed scheduling strategy. The regional centralized scheduling cannot solve interference of inter-region, and the distributed scheduling leads to worse efficiency in the utilize of resources. In this paper, a novel distributed scheduling scheme named 9-Cell alternate authorization (9-CAA) is proposed. In our scheme, time-domain resources are divided orthogonally by coloring theory for inter-region cooperation in 9-Cell scenario [6]. Then, we provide a formula based on 0-1 integer programming to get chromatic number in 9-CAA. Moreover, a feasible optimal chromatic number search algorithm named CNS-9CAA is proposed. In addition, this scheme is expanded to 3-Cell scenario, and name it 3-Cell alternate authorization (3-CAA). At last, simulation results indicate that 9/3-CAA scheme exceed All CU CoMP, 9/3C CU CoMP and DLC resource scheduling scheme in cell average user normalized throughput. Especially, compared with the non-CoMP scheme as a benchmark, the 9-CAA and 3-CAA have improved the edge user normalized throughput by 17.2% and 13.0% respectively.

The Analysis of Seminal Plasma Proteins by Two-Dimensional Polyacrylamide Gel Electrophoresis (2-DE) in Hanwoo (Korean Native Cattle)

  • Lee, Yong-Seung;Song, Eun-Ji;Yoo, Han-Jun;Park, Joung-Jun;Cheong, Hee-Tae;Yang, Boo-Keun;Park, Choon-Keun
    • Journal of Embryo Transfer
    • /
    • v.25 no.4
    • /
    • pp.281-286
    • /
    • 2010
  • This study was to evaluate the protein profile of seminal plasma using 2-DE in Hanwoo. Seminal plasma was harvested from five mature Hanwoo, and seminal plasma protein was extracted by M-PER Mammalian Protein Extraction Reagent. Proteins were refined by clean-up kit and quantified by Bradford method until total protein was $300\;{\mu}l$. Immobilized pH gradient (IPG) strip was used 18 cm and 3~11 NL. SDS-PAGE was used 12% acrylamide gel. Each gels were visualized by comassie brilliant blue and silver staining. These spots were analyzed by MALDI-TOF MS and searched on NCBInr. The result, 20 proteins of 36 protein spots were searched through peptide sequencing on the NCBInr. 8 proteins profiled by 2-DE were proved through previous bovine studies and the name of each protein was albumin, nucleobindin, clusterin, TIMP-2, spermadhesin Z13, spermadhesin-1 and BSP proteins (BSP 30 kDa and BSP A1/A2). 12 new proteins were ATP synthase, protein MAK16 homolog, Transmembrane protein 214, E3 ubiquitin-protein ligase BRE1A, dual serine/threonine and tyrosine protein kinase, tissue factor pathway inhibitor 2, alpha-actinin-4, RUN domain-containing protein 3B, catenin alpha-1, protein-glutamine gamma-glutamyltransferase 2, plakophilin-1 and inter-alpha-trypsin inhibitor heavy chain H1 has not been previously described in the bovine seminal plasma study. These proteins may be contribute to define the type of proteins affecting fertility of male and improve the fertilizing ability of semen in Hanwoo.

A study on the Learning Polyhedra using 'Polyhedron' ('Polyhedron'을 활용한 다면체 학습에 관한 연구)

  • Kwon Sung-Yong
    • The Mathematical Education
    • /
    • v.45 no.2 s.113
    • /
    • pp.191-204
    • /
    • 2006
  • Computer technology has a potential to change the contents of school mathematics and the way of teaching mathematics. But in our country, the problem whether computer technology should be introduced into mathematics classroom or not was not resolved yet. As a tool, computer technology can be used by teachers who are confident of the effectiveness and who can use it skillfully and can help students to understand mathematics. The purpose of this study was to investigate the effective way to introduce and utilize computer technology based on the status quo of mathematics classroom setting. One possible way to utilize computer technology in mathematics classroom in spite of the lack of computer and the inaccessibility of useful software is using domain specific simulation software like 'Polyhedron'. 'Polyhedron', as we can guess from the name, can be used to explore regular and semi regular polyhedra and the relationship between them. Its functions are limited but it can visualize regular polyhedra, transform regular polyhedra into other polyhedra. So it is easier to operate than other dynamic geometry software like GSP. To investigate the effect of using this software in mathematics class, three classes(one in 6th grade from science education institute for the gifted, two in 7th grade) were chosen. Activities focused on the relationship between regular and semi regular polyhedra. After the class, several conclusions were drawn from the observation. First, 'Polyhedron' can be used effectively to explore the relationship between regular and semi regular polyhedra. Second, 'Polyhedron' can motivate students. Third, Students can understand the duality of polyhedra. Fourth, Students can visualize various polyhedra by reasoning. To help teachers in using technology, web sites like NCTM's illuminations and NLVM of Utah university need to be developed.

  • PDF

Design and Implementation of Efficient Dynamic Update and Zone Transfer in the Secure DNS (안전한 DNS에서의 효율적인 동적 갱신과 존 전송 기능의 설계와 구현)

  • Shim, Hee-Won;Shim, Young-Chul;Im, Chan-Soon;Lee, Man-Hee;Byeon, Ok-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.99-114
    • /
    • 2000
  • In the secure DNS the amount of information that should be managed greatly increased and the interdependency in the information became very complex. Therefore, it became necessary to develop a mechanism which can manage zone information efficiently. Moreover, a consistent interface became also necessary so that a secure DNS may be efficiently interconnected with other Internet application services. In this paper we explain the design and implementation of a secure DNS extended with two functions : (1) a dynamic update function which enables to add and remove zone information dynamically and (2) a zone transfer function that efficiently transfers update zone information among DNS servers. We developed a method which integrates two zone transfer mechanisms, full zone transfer and incremental zone transfer, and also proposed a method to compress data in the zone transfer message. We also introduced a data structure called a delta file to integrate the zone transfer function and the dynamic update function.

  • PDF

The Implementation of Policy Management Tool Based on Network Security Policy Information Model (네트워크 보안 정책 정보 모델에 기반한 정책 관리 도구의 구현)

  • Kim, Geon-Lyang;Jang, Jong-Soo;Sohn, Sung-Won
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.775-782
    • /
    • 2002
  • This paper introduces Policy Management Tool which was implemented based on Policy Information Model in network suity system. Network security system consists of policy terror managing and sending policies to keep a specific domain from attackers and policy clients detecting and responding intrusion by using policies that policy server sends. Policies exchanged between policy server and policy client are saved in database in the form of directory through LDAP by using Policy Management Tool based on network security policy information model. NSPIM is an extended policy information model of IETF's PCIM and PCIMe, which enables network administrator to describe network security policies. Policy Management Tool based on NSPIM provides not only policy management function but also editing function using reusable object, automatic generation function of object name and blocking policy, and other convenient functions to user.

Curriculum Mining Analysis Using Clustering-Based Process Mining (군집화 기반 프로세스 마이닝을 이용한 커리큘럼 마이닝 분석)

  • Joo, Woo-Min;Choi, Jin Young
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.45-55
    • /
    • 2015
  • In this paper, we consider curriculum mining as an application of process mining in the domain of education. The basic objective of the curriculum mining is to construct a registration pattern model by using logs of registration data. However, subject registration patterns of students are very unstructured and complicated, called a spaghetti model, because it has a lot of different cases and high diversity of behaviors. In general, it is typically difficult to develop and analyze registration patterns. In the literature, there was an effort to handle this issue by using clustering based on the features of students and behaviors. However, it is not easy to obtain them in general since they are private and qualitative. Therefore, in this paper, we propose a new framework of curriculum mining applying K-means clustering based on subject attributes to solve the problems caused by unstructured process model obtained. Specifically, we divide subject's attribute data into two parts : categorical and numerical data. Categorical attribute has subject name, class classification, and research field, while numerical attribute has ABEEK goal and semester information. In case of categorical attribute, we suggest a method to quantify them by using binarization. The number of clusters used for K-means clustering, we applied Elbow method using R-squared value representing the variance ratio that can be explained by the number of clusters. The performance of the suggested method was verified by using a log of student registration data from an 'A university' in terms of the simplicity and fitness, which are the typical performance measure of obtained process model in process mining.