• Title/Summary/Keyword: Duplication Detection

Search Result 52, Processing Time 0.019 seconds

a Design of Duplication Module in Linux (리눅스의 이중화 모듈 설계)

  • 정상진;한상숙;은성배
    • Proceedings of the IEEK Conference
    • /
    • 2003.07c
    • /
    • pp.2855-2858
    • /
    • 2003
  • In this paper, we have studied a design method to make Linux system enriched with a duplication facility. We have designed a duplication module which would be inserted into Linux. The design have to keep track of three foundations, such as fault detection, reconfiguration, a handling duplication data. To conclude, Linux duplication module is free put on a Linux kernel. so in the future, It can cope with a change in Linux duplication system flexiblely.

  • PDF

Deletion or Duplication Syndromes of Chromosome 22: Review

  • Kyung Ran Jun
    • Journal of Interdisciplinary Genomics
    • /
    • v.6 no.1
    • /
    • pp.1-5
    • /
    • 2024
  • Chromosome 22 is an acrocentric chromosome containing 500-600 genes, representing 1.5%-2% of the total DNA in cells. It was the first human chromosome to be fully sequenced by the Human Genome Project. Several syndromes involving the partial deletion or duplication of chromosome 22 are well descibed, including 22q11.2 deletion syndrome, 22q11.2 duplication syndrome, 22q11.2 distal deletion syndrome, Phelan-McDermid syndrome caused by a 22q13 deletion or pathogenic variant in SHANK3, and cat-eye syndrome caused by a 22 pter-q11 duplication. This review aims to provide concise information on the clinical characteristics of these syndromes. In particular, the similarities in features among these syndromes, genetic basis, and standard detection techniques are described, providing guidance for diagnosis and genetic counselling.

Detection of a Large White-Specific Duplication in D-loop Region of the Porcine MtDNA (돼지 mtDNA D-loop 지역의 Large White 특이 중복현상 탐지)

  • Kim, Jae-Hwan;Han, Sang-Hyun;Lee, Sung-Soo;Ko, Moon-Suk;Lee, Jung-Gyu;Jeon, Jin-Tae;Cho, In-Cheol
    • Journal of Life Science
    • /
    • v.19 no.4
    • /
    • pp.467-471
    • /
    • 2009
  • The entire D-loop region of the porcine mitochondrial DNA (mtDNA) was amplified from six pig breeds (Landrace, Duroc, Large White, Korean native pig, Berkshire, and Hampshire) using a primer set designed on the basis of reported porcine mtDNA sequences. From analyses through cloning, DNA sequencing and multiple sequence alignment, an 11-bp (TAAAACACTTA) duplication was observed after known tandem repetition in the D-loop region, which promoted hetroplasmy in mtDNA. Although the existence of the 11-bp duplication has been previously reported in Duroc and Japanese native pigs, there have not been any attempts to know the characteristics of this duplication in other breeds so far. A 150 bp fragment containing the 11-duplication was amplified and typed by polyacrylamide gel electrophoresis (PAGE). All Large Whites had two duplication units and Duroc showed heteromorphic patterns, 11.2% (9/80) of the animals had the 11-bp duplication in total. On the other hand, Landrace, Berkshire, Hampshire and Korean native pigs were non-duplicated. This result showed that the 11-bp duplication could be used as a breed-specific DNA marker for distinguishing pure Landrace and Large White breeds.

Alimentary Tract Duplication in Pediatric Patients: Its Distinct Clinical Features and Managements

  • Kim, Soo-Hong;Cho, Yong-Hoon;Kim, Hae-Young
    • Pediatric Gastroenterology, Hepatology & Nutrition
    • /
    • v.23 no.5
    • /
    • pp.423-429
    • /
    • 2020
  • Purpose: Alimentary tract duplication (ATD) is a rare congenital condition that may occur throughout the intestinal tract. Clinical symptoms are generally related to the involved site, size of duplication, or associated ectopic mucosa. This study aimed to identify clinical implications by anatomical locations and age group and then suggest a relevant management according to its distinct features. Methods: We retrospectively reviewed the clinical data of pediatric patients who received a surgical management due to ATD. Furthermore, data including patients' demographics, anatomical distribution of the duplication, clinical features according to anatomical variants, and outcomes were compared. Results: A total of 25 patients were included in this study. ATD developed most commonly in the midgut, especially at the ileocecal region. The most common clinical presentation was abdominal pain, a sign resulting from intestinal obstruction, gastrointestinal bleeding, and intussusception. The non-communicating cystic type was the most common pathological feature in all age groups. Clinically, prenatal detection was relatively low; however, it usually manifested before the infantile period. A laparoscopic procedure was performed in most cases (18/25, 72.0%), significantly in the midgut lesion (p=0.012). Conclusion: ATD occurs most commonly at the ileocecal region, and a symptomatic one may usually be detected before the early childhood period. Surgical management should be considered whether symptom or not regarding its symptomatic progression, and a minimal invasive procedure is the preferred method, especially for the midgut lesion.

Optimal Sensor Placement in Multistatic Sonar (다중 상태 소나의 최적 수신망 배치)

  • Lee, Kwang-Hee;Han, Dong-Seog
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.5
    • /
    • pp.630-634
    • /
    • 2012
  • It is very important to place receiver in multistatic sonar. Inefficient placement of the receiver reduce detection probability and to increase the probability of detection should be used more receivers. Therefore, detection of targets in searching area, detection performance of limited receiver depends on how to place. Through the optimized receiver placement, detection area between each sonar as much as possible avoid duplication, as optimization, the minimum receiver can be maintained detection performance. In this paper we prove mathematical verification of maximum signal excess value based on sonar placement and we calculate a signal excess value by using computer simulations and suggest optimal sonar placement.

Paper Duplication Method Supported by Task (태스크 기반 이중화 방안)

  • Lee, Jong-Chan;Park, Sang-Joon;Kang, Kwon-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1C
    • /
    • pp.103-111
    • /
    • 2002
  • In RNC of IMT-2000, main control processors such as ASP, ACP and OMP are responsible for call control function, and the high reliability and real-time property should be provided for it. So, the study of real-time fault-tolerant for it is needed. In this paper, we proposes an Task based duplication method, in which Tasks in active side operated on message unit and send the updated data to standby side after operation, log in the message to standby side for recovery during take-over. This scheme decreases the dual down and the complexity of synchronization procedure, and performs the synchronization more exactly because Tasks control the synchronization of system. This paper also proposes the fault detection and the fault handing method for effective implementation of Task based duplication. This scheme focus on increasing the fault detection rate and intercepting originally that fault data is send to standby side.

Detection of hydin Gene Duplication in Personal Genome Sequence Data

  • Kim, Jong-Il;Ju, Young-Seok;Kim, Shee-Hyun;Hong, Dong-Wan;Seo, Jeong-Sun
    • Genomics & Informatics
    • /
    • v.7 no.3
    • /
    • pp.159-162
    • /
    • 2009
  • Human personal genome sequencing can be done with high efficiency by aligning a huge number of short reads derived from various next generation sequencing (NGS) technologies to the reference genome sequence. One of the major obstacles is the incompleteness of human reference genome. We tried to analyze the effect of hidden gene duplication on the NGS data using the known example of hydin gene. Hydin2, a duplicated copy of hydin on chromosome 16q22, has been recently found to be localized to chromosome 1q21, and is not included in the current version of standard human genome reference. We found that all of eight personal genome data published so far do not contain hydin2, and there is large number of nsSNPs in hydin. The heterozygosity of those nsSNPs was significantly higher than expected. The sequence coverage depth in hydin gene was about two fold of average depth. We believe that these unique finding of hydin can be used as useful indicators to discover new hidden multiplication in human genome.

A Restoration Method Using Duplication Paths in MPLS Networks (MPLS 망에서 이중화 경로를 이용한 복구 방법)

  • Kim, Eung-Ha;Cho, Young-Jong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.11
    • /
    • pp.1-11
    • /
    • 2002
  • To increase network survivability and to guarantee reliable services in MPLS networks, when failures occur either at any link or node of a working path, traffics on the failed path should be switched to other restoration paths. In this paper, we propose a path restoration method using duplication of working paths for link failure and its associated failure detection method, which utilizes OAM cells when all the duplicated links or nodes of the path failed. We analyze the performance of the proposed restoration method and show that especially the method is very efficient to restore high priority traffics. Also, through simulation we prove that the proposed restoration method is superior in performance to several existing methods suggested so far.

Attack Detection on Images Based on DCT-Based Features

  • Nirin Thanirat;Sudsanguan Ngamsuriyaroj
    • Asia pacific journal of information systems
    • /
    • v.31 no.3
    • /
    • pp.335-357
    • /
    • 2021
  • As reproduction of images can be done with ease, copy detection has increasingly become important. In the duplication process, image modifications are likely to occur and some alterations are deliberate and can be viewed as attacks. A wide range of copy detection techniques has been proposed. In our study, content-based copy detection, which basically applies DCT-based features for images, namely, pixel values, edges, texture information and frequency-domain component distribution, is employed. Experiments are carried out to evaluate robustness and sensitivity of DCT-based features from attacks. As different types of DCT-based features hold different pieces of information, how features and attacks are related can be shown in their robustness and sensitivity. Rather than searching for proper features, use of robustness and sensitivity is proposed here to realize how the attacked features have changed when an image attack occurs. The experiments show that, out of ten attacks, the neural networks are able to detect seven attacks namely, Gaussian noise, S&P noise, Gamma correction (high), blurring, resizing (big), compression and rotation with mostly related to their sensitive features.

Discriminator of Similar Documents Using the Syntactic-Semantic Tree Comparator (구문의미트리 비교기를 이용한 유사문서 판별기)

  • Kang, Won-Seog
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.10
    • /
    • pp.636-646
    • /
    • 2015
  • In information society, the need to detect document duplication and plagiarism is increasing. Many studies have progressed to meet such need, but there are limitations in increasing document duplication detection quality due to technological problem of natural language processing. Recently, some studies tried to increase the quality by applying syntatic-semantic analysis technique. But, the studies have the problem comparing syntactic-semantic trees. This paper develops a syntactic-semantic tree comparator, designs and implements a discriminator of similar documents using the comparator. To evaluate the system, we analyze the correlation between human discrimination and system discrimination with the comparator. This analysis shows that the proposed discrimination has good performance. We need to define the document type and improve the processing technique appropriate for each type.