• Title/Summary/Keyword: Key Tree

Search Result 416, Processing Time 0.031 seconds

Somatic Embryogenesis and Plant Regeneration from Embryogenic cell Suspension Cultures of Schisandra chinensis Baill

  • Li, Cheng Hao;Niu, YudA;Zhao, Bo;Ghimire, Bimal Kumar;Kil, Hyun-Young;Heo, Kwon;Kim, Myong-Jo;Eom, Seok-Hyun;Cho, Dong-Ha;Yu, Chang-Yeon
    • Korean Journal of Medicinal Crop Science
    • /
    • v.15 no.5
    • /
    • pp.346-351
    • /
    • 2007
  • An efficient somatic embryogenesis and plant regeneration protocol was developed for Schisandra chinensis Baill, using embryogenic cell suspensions and optimized media conditions. Friable embryogenic callus was induced from cotyledonary leaf and hypocotyl explants of 7 days old seedlings on MS agar medium supplemented with 1.0 to $4.0\;mg\;l^{-1}$ of 2,4-dichlorophenoxyacetic acid (2,4-D). Fast growing and well dispersed embryogenic cell suspensions were developed within two months when embryogenic calli were transferred to MS liquid medium containing $1.0\;mg\;l^{-1}\;2,4-D$. One third strength of MS medium was the best for both overall growth and development of somatic embryos in liquid culture. Over 3400 viable somatic embryos were produced from each 150 ml flask with an initial cell density of 30 mg in 30 ml medium. Germinated somatic embryos developed in liquid medium converted into plantlets after transferred to half-strength MS semi-solid medium. Approximately 90% of the converted plantlets were successfully transplanted to soil and grew into fertile plants.

A Tree Regularized Classifier-Exploiting Hierarchical Structure Information in Feature Vector for Human Action Recognition

  • Luo, Huiwu;Zhao, Fei;Chen, Shangfeng;Lu, Huanzhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1614-1632
    • /
    • 2017
  • Bag of visual words is a popular model in human action recognition, but usually suffers from loss of spatial and temporal configuration information of local features, and large quantization error in its feature coding procedure. In this paper, to overcome the two deficiencies, we combine sparse coding with spatio-temporal pyramid for human action recognition, and regard this method as the baseline. More importantly, which is also the focus of this paper, we find that there is a hierarchical structure in feature vector constructed by the baseline method. To exploit the hierarchical structure information for better recognition accuracy, we propose a tree regularized classifier to convey the hierarchical structure information. The main contributions of this paper can be summarized as: first, we introduce a tree regularized classifier to encode the hierarchical structure information in feature vector for human action recognition. Second, we present an optimization algorithm to learn the parameters of the proposed classifier. Third, the performance of the proposed classifier is evaluated on YouTube, Hollywood2, and UCF50 datasets, the experimental results show that the proposed tree regularized classifier obtains better performance than SVM and other popular classifiers, and achieves promising results on the three datasets.

Transcriptome profiling of rubber tree (Hevea brasiliensis) discovers candidate regulators of the cold stress response

  • Gong, Xiao-Xiao;Yan, Bing-Yu;Hu, Jin;Yang, Cui-Ping;Li, Yi-Jian;Liu, Jin-Ping;Liao, Wen-Bin
    • Genes and Genomics
    • /
    • v.40 no.11
    • /
    • pp.1181-1197
    • /
    • 2018
  • Tropical plant rubber tree (Hevea brasiliensis) is the sole source of commercial natural rubber and low-temperature stress is the most important limiting factor for its cultivation. To characterize the gene expression profiles of H. brasiliensis under the cold stress and discover the key cold stress-induced genes. Three cDNA libraries, CT (control), LT2 (cold treatment at $4^{\circ}C$ for 2 h) and LT24 (cold treatment at $4^{\circ}C$ for 24 h) were constructed for RNA sequencing (RNA-Seq) and gene expression profiling. Quantitative real time PCR (qRT-PCR) was conducted to validate the RNA-Seq and gene differentially expression results. A total of 1457 and 2328 differentially expressed genes (DEGs) in LT2 and LT24 compared with CT were respectively detected. Most significantly enriched KEGG pathways included flavonoid biosynthesis, phenylpropanoid biosynthesis, plant hormone signal transduction, cutin, suberine and wax biosynthesis, Pentose and glucuronate interconversions, phenylalanine metabolism and starch and sucrose metabolism. A total of 239 transcription factors (TFs) were differentially expressed following 2 h or/and 24 h of cold treatment. Cold-response transcription factor families included ARR-B, B3, BES1, bHLH, C2H, CO-like, Dof, ERF, FAR1, G2-like, GRAS, GRF, HD-ZIP, HSF, LBD, MIKC-MADS, M-type MADS, MYB, MYB-related, NAC, RAV, SRS, TALE, TCP, Trihelix, WOX, WRKY, YABBY and ZF-HD. The genome-wide transcriptional response of rubber tree to the cold treatments were determined and a large number of DEGs were characterized including 239 transcription factors, providing important clues for further elucidation of the mechanisms of cold stress responses in rubber tree.

Public Key Authentication using(t, n) Threshold Scheme for WSN ((t, n) 임계치 기법을 이용한 센서네트워크에서의 공개키 인증)

  • Kim, Jun-Yop;Kim, Wan-Ju;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.5
    • /
    • pp.58-70
    • /
    • 2008
  • Earlier researches on Sensor Networks preferred symmetric key-based authentication schemes in consideration of limitations in network resources. However, recent advancements in cryptographic algorithms and sensor-node manufacturing techniques have opened suggestion to public key-based solutions such as Merkle tree-based schemes. These previous schemes, however, must perform the authentication process one-by-one in hierarchical manner and thus are not fit to be used as primary authentication methods in sensor networks which require mass of multiple authentications at any given time. This paper proposes a new concept of public key-based authentication that can be effectively applied to sensor networks. This scheme is based on exponential distributed data concept, a derivative from Shamir's (t, n) threshold scheme, in which the authentication of neighbouring nodes are done simultaneously while minimising resources of sensor nodes and providing network scalability. The performance advantages of this scheme on memory usage, communication overload and scalability compared to Merkle tree-based authentication are clearly demonstrated using performance analysis.

An Efficient Flash Memory B-Tree Supporting Very Cheap Node Updates (플래시 메모리 B-트리를 위한 저비용 노드 갱신 기법)

  • Lim, Seong-Chae
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.706-716
    • /
    • 2016
  • Because of efficient space utilization and fast key search times, B-trees have been widely accepted for the use of indexes in HDD-based DBMSs. However, when the B-ree is stored in flash memory, its costly operations of node updates may impair the performance of a DBMS. This is because the random updates in B-tree's leaf nodes could tremendously enlarge I/O costs for the garbage collecting actions of flash storage. To solve the problem, we make all the parents of leaf nodes the virtual nodes, which are not stored physically. Rather than, those nodes are dynamically generated and buffered by referring to their child nodes, at their access times during key searching. By performing node updates and tree reconstruction within a single flash block, our proposed B-tree can reduce the I/O costs for garbage collection and update operations in flash. Moreover, our scheme provides the better performance of key searches, compared with earlier flash-based B-trees. Through a mathematical performance model, we verify the performance advantages of the proposed flash B-tree.

On Finding the Multicast Protection Tree Considering SRLG in WDM Optical Networks

  • Li, Yonggang;Jin, Yaohui;Li, Lemin;Li, Longjiang
    • ETRI Journal
    • /
    • v.28 no.4
    • /
    • pp.517-520
    • /
    • 2006
  • In this letter, a new sharing mechanism, SRLG sharing, is proposed, which allows the links of the same shared risk link group (SRLG) in a primary light tree to share protections in WDM optical networks. In previous studies, how to share spare resources with SRLG constraints has not been studied in multicast optical networks. In this letter, considering SRLG sharing, we propose a novel algorithm -multicast with SRLG sharing (MSS)- to establish a protection light tree. Finally, the algorithm MSS and the algorithm multicast with no SRLG sharing (MNSS) are compared through a simulation to show that our new sharing scheme of SRLG sharing is more efficient than that of no SRLG sharing in terms of spare resource utilization and blocking probability.

  • PDF

The Design of Multicase Key distribution Protocol based CBT(Core Based Tree) (CBT(Core Based Tree)를 기반으로 한 멀티캐스트 키 분배 프로토콜 설계)

  • Kim, Bong-Han;Lee, Jae-Gwang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.4
    • /
    • pp.1184-1192
    • /
    • 2000
  • Multicast has communication mechanism that is able to transfer voice, video for only the specific user group. As compared to unicast, multicast is more susceptive to attack such as masquerading, malicious replay, denial of service, repudiation and traffic observation, because of the multicast has much more communication links than unicast communication. Multicast-specific security threats can affect not only a group's receivers, but a potentially large proportion of the internet. In this paper, we proposed the multicast security model that is able to secure multi-group communication in CBT(Core Based Tree), which is multicast routing. And designed the multicast key distribution protocol that can offer authentication, user privacy using core (be does as Authentication Server) in the proposed model.

  • PDF

Sensitivity Analysis Related to Redundancy of Regular and Irregular Framed Structures after Member Disappearance

  • Ito, Takumi;Takemura, Toshinobu
    • International Journal of High-Rise Buildings
    • /
    • v.3 no.4
    • /
    • pp.297-304
    • /
    • 2014
  • Recently, there have been some reported examples of structural collapse due to gravity, subsequent to damage from accident or an excitation that was not prepared for in the design process. A close view of new concepts, such as a redundancy and key elements, has been taken with the aim of ensuring the robustness of a structure, even in the event of an unexpected disturbance. The author previously proposed a sensitivity index of the vertical load carrying capacity to member disappearance for framed structures. The index is defined as the ratio of the load carrying capacity after a member or a set of an adjacent member disappears, to the original load carrying capacity. The member with the highest index may be regarded as a key element. The concept of bio-mimicry is being applied to various fields of engineering, and tree-shaped structures are sometimes used for the design of building structures. In this study a sensitivity analysis is applied to the irregular-framed structures such as tree-shaped structures.

Verification of a tree canopy model and an example of its application in wind environment optimization

  • Yang, Yi;Xie, Zhuangning;Tse, Tim K.T.;Jin, Xinyang;Gu, Ming
    • Wind and Structures
    • /
    • v.15 no.5
    • /
    • pp.409-421
    • /
    • 2012
  • In this paper, the method of introducing additional source/sink terms in the turbulence and momentum transport equations was applied to appropriately model the effect of the tree canopy. At first, the new additional source term for the turbulence frequency ${\omega}$ equation in the SST k-${\omega}$ model was proposed through theoretical analogy. Then the new source/sink term model for the SST k-${\omega}$ model was numerically verified. At last, the proposed source term model was adopted in the wind environment optimal design of the twin high-rise buildings of CABR (China Academy of Building Research). Based on the numerical simulations, the technical measure to ameliorate the wind environment was proposed. Using the new inflow boundary conditions developed in the previous studies, it was concluded that the theoretically reasonable source term model of the SST k-${\omega}$ model was applicable for modeling the tree canopy flow and accurate numerical results are obtained.

Balanced Tree Topology in Gnutella (Gnutella 기반의 균형 잡힌 트리형태 토폴로지)

  • Kim, Cheal-Min;Park, Jae-Hyun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.379-384
    • /
    • 2006
  • 이 논문에서 제안하는 Gnutella기반의 Balanced tree topology는 Unstructured P2P이므로 탐색 질의가 hash key에 제한되지 않고 동적인 네트워크 환경에도 적합하다. 또한 topology형태가 tree이므로 Gnutella의 큰 문제점인 질의 탐색 시 중복된 패킷을 제거하고, tree형태가 balanced tree이므로 일정 홉수 안에 모든 노드를 방문 할 수 있다. Balanced tree topology는 일정 홉 수 안에 모든 노드를 방문하기 때문에 Gnutella기반의 P2P가 가지는 희귀 자료에 대한 검색의 문제점 또한 해결하였다. Gnutella기반의 확장 ping과 확장 local cache를 사용하여 balanced tree topology유지 및 문제 해결에 필요한 추가 비용을 줄였다.

  • PDF