• Title/Summary/Keyword: Key String

Search Result 50, Processing Time 0.035 seconds

Analysis of Molecular Pathways in Pancreatic Ductal Adenocarcinomas with a Bioinformatics Approach

  • Wang, Yan;Li, Yan
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.6
    • /
    • pp.2561-2567
    • /
    • 2015
  • Pancreatic ductal adenocarcinoma (PDAC) is a leading cause of cancer death worldwide. Our study aimed to reveal molecular mechanisms. Microarray data of GSE15471 (including 39 matching pairs of pancreatic tumor tissues and patient-matched normal tissues) was downloaded from Gene Expression Omnibus (GEO) database. We identified differentially expressed genes (DEGs) in PDAC tissues compared with normal tissues by limma package in R language. Then GO and KEGG pathway enrichment analyses were conducted with online DAVID. In addition, principal component analysis was performed and a protein-protein interaction network was constructed to study relationships between the DEGs through database STRING. A total of 532 DEGs were identified in the 38 PDAC tissues compared with 33 normal tissues. The results of principal component analysis of the top 20 DEGs could differentiate the PDAC tissues from normal tissues directly. In the PPI network, 8 of the 20 DEGs were all key genes of the collagen family. Additionally, FN1 (fibronectin 1) was also a hub node in the network. The genes of the collagen family as well as FN1 were significantly enriched in complement and coagulation cascades, ECM-receptor interaction and focal adhesion pathways. Our results suggest that genes of collagen family and FN1 may play an important role in PDAC progression. Meanwhile, these DEGs and enriched pathways, such as complement and coagulation cascades, ECM-receptor interaction and focal adhesion may be important molecular mechanisms involved in the development and progression of PDAC.

NON-INTERACTIVE IDENTITY-BASED DNF SIGNATURE SCHEME AND ITS EXTENSIONS

  • Lee, Kwang-Su;Hwang, Jung-Yeon;Lee, Dong-Hoon
    • Bulletin of the Korean Mathematical Society
    • /
    • v.46 no.4
    • /
    • pp.743-769
    • /
    • 2009
  • An ID-based DNF signature scheme is an ID-based signature scheme with an access structure which is expressed as a disjunctive normal form (DNF) with literals of signer identities. ID-based DNF signature schemes are useful to achieve not only signer-privacy but also a multi-user access control. In this paper, we formally define a notion of a (non-interactive) ID-based DNF signature and propose the first noninteractive ID-based DNF signature schemes that are secure under the computational Diffie-Hellman and subgroup decision assumptions. Our first scheme uses random oracles, and our second one is designed without random oracles. To construct the second one, we use a novel technique that converts a non-interactive witness indistinguishable proof system of encryption of one bit into a corresponding proof system of encryption of a bit-string. This technique may be of independent interest. The second scheme straightforwardly yields the first ID-based ring signature that achieves anonymity against full key exposure without random oracles. We finally present two extensions of the proposed ID-based DNF signature schemes to support multiple KGCs and different messages.

Identification of boundary migration during the wound healing through the visualization of cell migrations (세포 운동 가시화를 통한 상처 치유 과정 내 경계 이동의 규명)

  • Jeong, Hyuntae;Lee, Jaesung;Shin, Jennifer Hyunjong
    • Journal of the Korean Society of Visualization
    • /
    • v.18 no.2
    • /
    • pp.10-17
    • /
    • 2020
  • The curvature of wound boundaries has been identified as a key modulator that determines a type of force responsible for cell migration. While several studies report how certain curvatures of the boundary correlate with the rate at which the wound closes, it remains unclear how these curvatures are spatiotemporally formed to regulate the healing process. We investigated the dynamic changes in the boundary curvatures by visualizing cell migration patterns. Locally, cells at the convex boundary continuously move forward with transmitting kinetic responses behind to the cells away from the boundary, and cells at the concave boundary exhibit dramatic contracting motion, like a purse-string, when they accumulate enough negative curvatures to gain the thrust toward the void. Globally, the dynamics of boundary geometries are controlled by the diffusive flow of cells driven by the density gradient between the wound area and the cell layer.

A Study on the Prediction of Drug Efficacy by Using Molecular Structure (분자구조 유사도를 활용한 약물 효능 예측 알고리즘 연구)

  • Jeong, Hwayoung;Song, Changhyeon;Cho, Hyeyoun;Key, Jaehong
    • Journal of Biomedical Engineering Research
    • /
    • v.43 no.4
    • /
    • pp.230-240
    • /
    • 2022
  • Drug regeneration technology is an efficient strategy than the existing new drug development process, which requires large costs and time by using drugs that have already been proven safe. In this study, we recognize the importance of the new drug regeneration aspect of new drug development and research in predicting functional similarities through the basic molecular structure that forms drugs. We test four string-based algorithms by using SMILES data and searching for their similarities. And by using the ATC codes, pair them with functional similarities, which we compare and validate to select the optimal model. We confirmed that the higher the molecular structure similarity, the higher the ATC code matching rate. We suggest the possibility of additional potency of random drugs, which can be predicted through data that give information on drugs with high molecular similarities. This model has the advantage of being a great combination with additional data, so we look forward to using this model in future research.

온라인 목록 검색 행태에 관한 연구-LINNET 시스템의 Transaction log 분석을 중심으로-

  • 윤구호;심병규
    • Journal of Korean Library and Information Science Society
    • /
    • v.21
    • /
    • pp.253-289
    • /
    • 1994
  • The purpose of this study is about the search pattern of LINNET (Library Information Network System) OPAC users by transaction log, maintained by POSTECH(Pohang University of Science and Technology) Central Library, to provide feedback information of OPAC system design. The results of this study are as follows. First, for the period of this analysis, there were totally 11, 218 log-ins, 40, 627 transaction logs and 3.62 retrievals per a log-in. Title keyword was the most frequently used, but accession number, bibliographic control number or call number was very infrequently used. Second, 47.02% of OPAC, searches resulted in zero retrievals. Bibliographic control number was the least successful search. User displayed 2.01% full information and 64.27% local information per full information. Third, special or advanced retrieval features are very infrequently used. Only 22.67% of the searches used right truncation and 0.71% used the qualifier. Only 1 boolean operator was used in every 22 retrievals. The most frequently used operator is 'and (&)' with title keywords. But 'bibliographical control number (N) and accessionnumber (R) are not used at all with any operators. The causes of search failure are as follows. 1. The item was not used in the database. (15, 764 times : 79.42%). 2. The wrong search key was used. (3, 761 times : 18.95%) 3. The senseless string (garbage) was entered. (324 times : 1.63%) On the basis of these results, some recommendations are suggested to improve the search success rate as follows. First, a n.0, ppropriate user education and online help function let users retrieve LINNET OPAC more efficiently. Second, several corrections of retrieval software will decrease the search failure rate. Third, system offers right truncation by default to every search term. This methods will increase success rate but should considered carefully. By a n.0, pplying this method, the number of hit can be overnumbered, and system overhead can be occurred. Fourth, system offers special boolean operator by default to every keyword retrieval when user enters more than two words at a time. Fifth, system assists searchers to overcome the wrong typing of selecting key by automatic korean/english mode change.

  • PDF

Numerical study on the mitigation of rain-wind induced vibrations of stay cables with dampers

  • Li, Shouying;Wu, Teng;Li, Shouke;Gu, Ming
    • Wind and Structures
    • /
    • v.23 no.6
    • /
    • pp.615-639
    • /
    • 2016
  • Although the underlying mechanism of rain-wind induced vibrations (RWIVs) of stay cables has not been fully understood, some countermeasures have been successfully applied to mitigating this kind of vibration. Among these, installing dampers near the bridge deck was widely adopted, and several field observations have shown its effectiveness. In this study, the effectiveness of dampers to RWIVs of stay cables is numerically investigated comprehensively by means of finite difference method (FDM). Based on the free vibration analysis of a taut string, it is found that the 3-points triangle scheme, which can be easily implemented in FDM, can offer an excellent approximation of the concentrated damping coefficient (expressed as a Dirac delta function) at the location where the damper is installed. Then, free vibration analysis of a 3-D continuous stay cable attached with two dampers is carried out to study the relationship of modal damping ratio and damping coefficient of the dampers. The effects of orientation of the dampers and cable sag on the modal damping ratio are investigated in detail. Finally, the RWIV response of a 3-D continuous stay cable attached with two dampers is examined. The results indicate that 0.5% of damping ratio is sufficient to reduce the RWIV vibration of the Cable A20 on the No.2 Nanjing Bridge over Yangtze River.

A Study on the Fingerprint Authentication Module for Web Services (웹서비스를 위한 지문인증 모듈에 관한 연구)

  • Oh, Yoon-Tak
    • Journal of the Korea Computer Industry Society
    • /
    • v.8 no.4
    • /
    • pp.253-262
    • /
    • 2007
  • As the internet environment is applied in the various service field, the recognition on security is increasing. Because the authentication methods for web service user do not confirm person oneself, the serious problems of reliability, safety and security can be caused. In order to solve this problems, the authentication methods of user id and password or authentication key is used. Because the password and authentication key using the existent authentication methods for security is composed of a string, authentication information can easily hacked or leaked by hackers, and the serious problems of security can be caused. In this paper, in order to improve the web security, an authentication module using the fingerprint that have the unique properties of person is proposed. As the proposed module makes use of fingerprint authentication, the security of the web service user from hackers can be maintained. The proposed method is more excellent than the existent method in the web security.

  • PDF

Well Trajectory Modelling Considering Torque and Drag (토크와 드래그를 고려한 시추궤도 모델링 연구)

  • Jihoon Kim;Junhyung Choi;Doyoung Kim;Taeil Park;Daesung Lee
    • Journal of the Korean GEO-environmental Society
    • /
    • v.24 no.1
    • /
    • pp.51-60
    • /
    • 2023
  • Unlike the vertical drilling in the directional drilling should be minimized torque and drag in the well trajectory that avoided problems such as drillstring transformation, casing wear and key-seating. These torque and drag magnitude is determined by variations such as the well trajectory geometry, drilling mud, drillstring type and kick-off point. Therefore, it is essential to consider these variations for designing directional well trajectory. In this study, it was selected well trajectory by the most common build-hold type well and calculated torque and drag on each section by Analytical friction model. Analysis indicates that torque and drag could be minimized by using high lubricity drilling mud, kick-off point appropriate according to the well geometry and possible minimize dogleg severity. The results of this study is useful to minimize torque and drag from directional well trajectory design.

Efficient Linear Path Query Processing using Information Retrieval Techniques for Large-Scale Heterogeneous XML Documents (정보 검색 기술을 이용한 대규모 이질적인 XML 문서에 대한 효율적인 선형 경로 질의 처리)

  • 박영호;한욱신;황규영
    • Journal of KIISE:Databases
    • /
    • v.31 no.5
    • /
    • pp.540-552
    • /
    • 2004
  • We propose XIR-Linear, a novel method for processing partial match queries on large-scale heterogeneous XML documents using information retrieval (IR) techniques. XPath queries are written in path expressions on a tree structure representing an XML document. An XPath query in its major form is a partial match query. The objective of XIR-Linear is to efficiently support this type of queries for large-scale documents of heterogeneous schemas. XIR-Linear has its basis on the schema-level methods using relational tables and drastically improves their efficiency and scalability using an inverted index technique. The method indexes the labels in label paths as key words in texts, and allows for finding the label paths that match the queries far more efficiently than string match used in conventional methods. We demonstrate the efficiency and scalability of XIR-Linear by comparing it with XRel and XParent using XML documents crawled from the Internet. The results show that XIR-Linear is more efficient than both XRel and XParent by several orders of magnitude for linear path expressions as the number of XML documents increases.

Metadata extraction using AI and advanced metadata research for web services (AI를 활용한 메타데이터 추출 및 웹서비스용 메타데이터 고도화 연구)

  • Sung Hwan Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.499-503
    • /
    • 2024
  • Broadcasting programs are provided to various media such as Internet replay, OTT, and IPTV services as well as self-broadcasting. In this case, it is very important to provide keywords for search that represent the characteristics of the content well. Broadcasters mainly use the method of manually entering key keywords in the production process and the archive process. This method is insufficient in terms of quantity to secure core metadata, and also reveals limitations in recommending and using content in other media services. This study supports securing a large number of metadata by utilizing closed caption data pre-archived through the DTV closed captioning server developed in EBS. First, core metadata was automatically extracted by applying Google's natural language AI technology. The next step is to propose a method of finding core metadata by reflecting priorities and content characteristics as core research contents. As a technology to obtain differentiated metadata weights, the importance was classified by applying the TF-IDF calculation method. Successful weight data were obtained as a result of the experiment. The string metadata obtained by this study, when combined with future string similarity measurement studies, becomes the basis for securing sophisticated content recommendation metadata from content services provided to other media.