• Title/Summary/Keyword: Line Coding

Search Result 206, Processing Time 0.032 seconds

Relationship between Formants and Constriction Areas of Vocal Tract in 9 Korean Standard Vowels (우리말 모음의 발음시 음형대와 조음위치의 관계에 대한 연구)

  • 서경식;김재영;김영기
    • Journal of the Korean Society of Laryngology, Phoniatrics and Logopedics
    • /
    • v.5 no.1
    • /
    • pp.44-58
    • /
    • 1994
  • The formants of the 9 Korean standard vowels(which used by the average people of Seoul, central-area of the Korean peninsula) were measured by analysis with the linear predictive coding(LPC) and fast Fourier transform(FFT). The author already had reported the constriction area for the Korean standard vowels, and with the existing data, the distance from glottis to the constriction area in the vocal tract of each vowel was newly measured with videovelopharyngograms and lateral Rontgenograms of the vocal tract. We correlated the formant frequencies with the distance from glottis to the constriction area of the vocal tract. Also we tried to correlate the formant frequencies with the position of tongue in the vocal tract which is divided into 2 categories : The position of tongue in oral cavity by the distance from imaginary palatal line to the highest point of tongue and the position in pharyngeal cavity by the distance from back of tongue to posterior pharyngeal wall. This study was performed with 10 adults(male : 5, female : 5) who spoke primary 9 Korean standard vowels. We had already reported that the Korean vowel [i], [e], $[{\varepsilon}]$ were articulated at hard palate level, [$\dot{+}$], [u] were at soft palate level, [$\wedge$] was at upper pharynx level and the [$\wedge$], [$\partial$], [a] in a previous article. Also we had noted that the significance of pharyngeal cavity in vowel articulation. From this study we have concluded that ; 1) The F$_1$ is related with the oral cavity articulated vowel [i, e, $\varepsilon$, $\dot{+}$, u]. 2) Within the oral cavity articulated vowel [i, e, $\varepsilon$, $\dot{+}$, u] and the upper pharynx articulated vowel [o], the F$_2$ is elevated when the diatance from glottis to the constriction area is longer. But within the lower pharynx articulated vowel [$\partial$, $\wedge$, a], the F$_2$ is elevated when the distance from glottis to the constriction area is shorter. 3) With the stronger tendency of back-vowel, the higher the elevation of the F$_1$ and F$_2$ frequencies. 4) The F$_3$ and F$_4$ showed no correaltion with the constriction area nor the position of tongue in the vocal tract 5) The parameter F$_2$- F$_1$, which is the difference between F$_2$ frequency and F$_1$ frequency showed an excellent indicator of differenciating the oral cavity articulated vowels from pharyngeal cavity articulated vowels. If the F$_2$-F$_1$ is less than about 600Hz which indicates the vowel is articulated in the pharyngeal cavity, and more than about 600Hz, which indicates that the vowel is articulated in the oral cavity.

  • PDF

Construction of fat1 Gene Expression Vector and Its Catalysis Efficiency in Bovine Fetal Fibroblast Cells

  • Liu, Boyang;Yang, Runjun;Li, Junya;Zhang, Lupei;Liu, Jing;Lu, Chunyan;Lian, Chuanjiang;Li, Zezhong;Zhang, Yong-Hong;Zhang, Liying;Zhao, Zhihui
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.25 no.5
    • /
    • pp.621-628
    • /
    • 2012
  • The FAT-1 protein is an n-3 fatty acid desaturase, which can recognize a range of 18- and 20-carbon n-6 substrates and transform n-6 polyunsaturated fatty acids (PUFAs) into n-3 PUFAs while n-3 PUFAs have beneficial effect on human health. Fat1 gene is the coding sequence from Caenorhabditis elegans which might play an important role on lipometabolism. To reveal the function of fat1 gene in bovine fetal fibroblast cells and gain the best cell nuclear donor for transgenic bovines, the codon of fat1 sequence was optimized based on the codon usage frequency preference of bovine muscle protein, and directionally cloned into the eukaryotic expression vector pEF-GFP. After identifying by restrictive enzyme digests with AatII/XbaI and sequencing, the fusion plasmid pEF-GFP-fat1 was identified successfully. The pEF-GFP-fat1 vector was transfected into bovine fetal fibroblast cells mediated by Lipofectamine2000$^{TM}$. The positive bovine fetal fibroblast cells were selected by G418 and detected by RT-PCR. The results showed that a 1,234 bp transcription was amplified by reverse transcription PCR and the positive transgenic fat1 cell line was successfully established. Then the expression level of fat1 gene in positive cells was detected using quantitative PCR, and the catalysis efficiency was detected by gas chromatography. The results demonstrated that the catalysis efficiency of fat1 was significantly high, which can improve the total PUFAs rich in EPA, DHA and DPA. Construction and expression of pEF-GFP-fat1 vector should be helpful for further understanding the mechanism of regulation of fat1 in vitro. It could also be the first step in the production of fat1 transgenic cattle.

Identification of a New 5'-Noncoding Exon Region and Promoter Activity in Human N-Acetylglucosaminyltransferase III Gene

  • Kang, Bong-Seok;Kim, Yeon-Jeong;Shim, Jae-Kyoung;Song, Eun-Young;Park, Young-Guk;Lee, Young-Choon;Nam, Kyung-Soo;Kim, June-Ki;Lee, Tae-Kyun;Chung, Tae-Wha;Kim, Cheorl-Ho
    • BMB Reports
    • /
    • v.31 no.6
    • /
    • pp.578-584
    • /
    • 1998
  • In a previous paper (Kim et al., 1996a), the immediate 5' -flanking region and coding region of the human UDP-N -acetylglucosamine:-D-mannoside-1,4-Nacetylglucosaminyltransferase III (N-acetylglucosaminyitransferase- III; GnT-III) gene was reported, isolated and analyzed. Herein, we report on amplification of a new 5' -noncoding region of the GnT-III mRNA by single-strand ligation to single-stranded cDNA-PCR (5' -RACE PCR) using poly(A)+ RNA isolated from human fetal liver cells. A cDNA clone was obtained with 5' sequences (96 bp) that diverged seven nucleotides upstream from the ATG (+1) start codon. A concensus splice junction sequence, TCTCCCGCAG, was found immediately 5' to the position where the sequences of the cDNA diverged. The result suggested the presence of an intron in the 5' -noncoding region and that the cDNA was an incompletely reversetranscribed cDNA product derived from an mRNA containing a new noncoding exon. When mRNA expression of GnT-III in various human tissues and cancer cell lines was examined, Northern blot analysis indicated high expression levels of GnT-III in human fetal kidney and brain tissues, as well as for a number of leukemia and lymphoma cancer cell lines. Promoter activities of the 5' -flanking regions of exon 1 and the new noncoding region were measured in a human hepatoma cell line, HepG2, by luciferase assays. The 5'-flanking region of exon 1 was the most active, whilst that of exon 2 was inactive.

  • PDF

A Study on the Relationship between Donation Intention and Cognitive Age in an Aging Society (고령화사회의 인지연령과 기부의도에 관한 연구)

  • Oh, Min-Jung;Hwang, Yoon-Yong
    • Journal of Distribution Science
    • /
    • v.13 no.5
    • /
    • pp.83-90
    • /
    • 2015
  • Purpose - This research aims to understand the different behaviors of consumers according to cognitive age. Specifically, this research is focused on pro-social behavior. Pro-social behavior is defined as behavior benefiting others, rather than behavior benefiting one's self. It often entails individual risk or cost, such as when giving resources to others, waiting in line, asking for or paying a fair price, or risking one's life in battle. Therefore, we sought to understand consumer psychology and cognitive age as a reflection of inner psychology. People frequently perceive themselves as younger or older than their chronological ages. This self-perceived or cognitive age is a subjective age perception independent of actual chronological age. The discrepancy degree between chronological and cognitive age represents how much individuals perceive themselves as younger than they are. This study examines the gap in donation intention based on cognitive age. In order to investigate cognitive age, composed of four sub-categories (feel-age, look-age, do-age, and interest-age), this study explores the differential donation intention based on cognitive age, which determines the relationship between the young age and old age. Research design, data, and methodology - Data research was conducted by gathering 216 survey samples, excluding those with unreliable answers. Data coding and cleaning were used and SPSS 19.0 software for the data analysis. The respondents were categorized into two types, younger cognitive ages and older cognitive ages. Additionally, we analyzed the moderating variables. In particular, we used cognitive age degree and congruency level (cognitive age low vs. cognitive age high) × (congruency close vs. congruency distant) between - subjects design. First, regression was done to verify the difference between chronological age and cognitive age. Second, a t-test was done to verify the difference of cognitive age level in donations. Third, ANOVA (analysis of variance) was done to verify the difference between cognitive age and congruency in donations. Last, ANOVA was done to verify the difference between cognitive age and moral judgments in donations. Result - The results show most respondents perceive themselves as younger than their chronological ages. In particular, older respondents feel they are younger than their actual age. Moreover, the result of the comparison between low degree and high degree groups of cognitive age, show high donations at the higher degree of cognitive age groups. In addition, the closer the distance to the beneficiaries, the higher the donation in high degree cognitive age groups. The higher moral judgment groups also show relatively high contributions in lower degree cognitive age groups. Conclusions - Donations belong to the category of pro-social behavior reflecting an individual's psychological state. Therefore, it is important in understanding cognitive age. This study implies that it is necessary to take into account both cognitive age and chronological age when segmenting donors. Moreover, this study confirmed that there are different factors affecting the motives behind donations. Thus, it may be utilized to create differential donation strategies.

An Analysis of the Children's Scaffolding Processes in Mathematical Problem Solving (초등수학 문제해결 활동에서 나타나는 아동 간 스캐폴딩 과정 분석)

  • Yoo, Yeun-Jin;Park, Man-Goo
    • Journal of Elementary Mathematics Education in Korea
    • /
    • v.13 no.1
    • /
    • pp.75-95
    • /
    • 2009
  • The purpose of the study was to investigate the scaffolding processes of children in mathematical problem solving. 3 groups of 4th grade students participated in the study and the researchers proceeded the study for 4 months. The procedures of this research were as followings. First, when the learners solved the problems, the categories of scaffolding processes(by way of unit line coding belong in open codings, the categories were made 25 concepts and integrated 20 subcategories) were produced the 7 results: invite to the learning, set the problems, affective aids, attempt self learning, re-ordering between learners and affirmation self learning. Second, the processes of scaffolding in mathematic problem solving resulted in condition, the present condition, action/interaction and the outcomes. Third, the cognitive and affective aids that discovered in the scaffolding processes were considered the main categories of learner's scaffolding processes in solving the mathematic problems. In conclusion, first, the learners' scaffolding processes, based on Vygotsky's "the zone of proximal development" in selection and presentation of mathematic problems, are very diverse. Peers' affective aids are very important in solving the problems. Second, learners in the scaffolding processes exchange the cognitive and affective aids with each other with joy and earnestness, and the aids can give assistance to all the participants. Third, in the results of observation and analysis in learners' scaffolding processes, it is meaningful to know how they think. Finally, the learners' scaffolding processes are a little unsystematic and illogical compared to those of adults, but those of scaffolders are so similar to those of learners' cognitive and affective systems that they can provide teachers with many merits in understanding and teaching learners.

  • PDF

An Internet-based Self-Learning Educational System for Efficient Learning of Java Language (효율적인 자바언어 학습을 위한 인터넷기반 자율학습시스템의 구현)

  • Kim Dong-Sik;Lee Dong-Yeop
    • Journal of Engineering Education Research
    • /
    • v.8 no.1
    • /
    • pp.71-83
    • /
    • 2005
  • This paper presents an internet-based self-learning educational system which can be enhancing efficiency in the learning process of Java language. The proposed self-learning educational system is called Java Web Player(JWP), which is a Java application program and is executable through Java Web Start technologies. Also, three important sequential learning processes : concept learning process, programming practice process and assessment process are integrated in the proposed JWP using Java Web Start technologies. This JWP enables the learners to achieve efficient and interesting self-learning since the learning process is designed to enhance the multimedia capabilities on the basis of various educational technologies. Furthermore, internet-based on-line voice presentation and its related texts together with moving images are synchronized for efficient language learning process. Also, a simple and useful Java compiler is included in the JWP for providing language practice environment such as coding, editing, executing and debugging Java source files. Finally, repeated practice can make the learners to understand easily the key concepts of Java language. Simple multiple choices are given suddenly to the learners while they are studying through the JWP and the test results are displayed on the message box. This assessment process is very essential to increase the learner's academic capability.

Molecular Aspects of Japanese Encephalitis Virus Persistent Infection in Mammalian Cells

  • Park Sun-Hee;Won Sung Yong;Park Soo-Young;Yoon Sung Wook;Han Jin Hyun;Jeong Yong Seok
    • Proceedings of the Microbiological Society of Korea Conference
    • /
    • 2000.05a
    • /
    • pp.23-36
    • /
    • 2000
  • Japanese encephalitis virus (JEV) is the causative agent of a mosquito-borne encephalitis and is transmitted to human via persistently infected mosquito vectors. Although the virus is known to cause only acute infection, there were reports that showed neurological sequelae, latent infection in peripheral mononuclear cells, and recurrence of the disease after acute encephalitis. Innate resistance of certain cell lines, abnormal SN1 expression of the virus, and anti-apoptotic effect of cullular bcl-2 have been suggested as probable causes of JEV persistence even in the absence of defective interfering (DI) particles. Although possible involvement of DI particles in JEV persistence was suggested, neither has a direct evidence for DI presence nor its molecular characterization been made. Two questions asked in this study are whether the DI virus plays any role in JEV persistent infection if it is associated with and what type of change(s) can be made in persistently infected cells to avoid apoptosis even with the continuous virus replication, DI-free standard stock of JEV was infected in BHK-21, Vero, and SW13 cells and serial high multiplicity passages were performed in order to generate DI particles. There different-sized DI RNA species which were defective in both structural and nonstructural protein coding genes. Rescued ORFs of the DI genome maintained in-frame and the presence of replicative intermediate or replicative form RNA of the DI particles confirmed their replication competence. On the other hand, several clones with JEV persistent infection were established from the cells survived acute infections during the passages. Timing of the DI virus generation during the passages seemed coincide to the appearance of persistently infected cells. The DI RNAs were identified in most of persistently infected cells and were observed throughout the cell maintenance. One of the cloned cell line maintained the viral persistence without DI RNA coreplication. The cells with viral persistence released the reduced but continuous infectious JEV particle for up to 9 months and were refractory to homologous virus superinfection but not to heterologous challenges. Unlike the cells with acute infection these cells were devoid of characteristic DNA fragmentation and JEV-induced apoptosis with or without homologous superinfection. Therefore, the DI RNA generated during JEV undiluted serial passage on mammalian cells was shown to be biologically active and it seemed to be responsible, at least in part, for the establishment and maintenance of the JEV persistence in mammalian cells. Viral persistence without DI RNA coreplication, as in one of the cell clones, supports that JEV persistent infection could be maintained with or without the presence of DI particles. In addition, the fact that the cells with JEV persistence were resistant against homologous virus superinfection, but not against heterologous one, suggests that different viruses have their own and independent pathway for cytopathogenesis even if viral cytopathic effect could be converged to an apoptosis after all.

  • PDF

High Bit-Rates Quantization of the First-Order Markov Process Based on a Codebook-Constrained Sample-Adaptive Product Quantizers (부호책 제한을 가지는 표본 적응 프로덕트 양자기를 이용한 1차 마르코프 과정의 고 전송률 양자화)

  • Kim, Dong-Sik
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.49 no.1
    • /
    • pp.19-30
    • /
    • 2012
  • For digital data compression, the quantization is the main part of the lossy source coding. In order to improve the performance of quantization, the vector quantizer(VQ) can be employed. The encoding complexity, however, exponentially increases as the vector dimension or bit rate gets large. Much research has been conducted to alleviate such problems of VQ. Especially for high bit rates, a constrained VQ, which is called the sample-adaptive product quantizer(SAPQ), has been proposed for reducing the hugh encoding complexity of regular VQs. SAPQ has very similar structure as to the product VQ(PQ). However, the quantizer performance can be better than the PQ case. Further, the encoding complexity and the memory requirement for the codebooks are lower than the regular full-search VQ case. Among SAPQs, 1-SAPQ has a simple quantizer structure, where each product codebook is symmetric with respect to the diagonal line in the underlying vector space. It is known that 1-SAPQ shows a good performance for i.i.d. sources. In this paper, a study on designing 1-SAPQ for the first-order Markov process. For an efficient design of 1-SAPQ, an algorithm for the initial codebook is proposed, and through the numerical analysis it is shown that 1-SAPQ shows better quantizer distortion than the VQ case, of which encoding complexity is similar to that of 1-SAPQ, and shows distortions, which are close to that of the DPCM(differential pulse coded modulation) scheme with the Lloyd-Max quantizer.

Method for Extracting Features of Conscious Eye Moving for Exploring Space Information (공간정보 탐색을 위한 의식적 시선 이동특성 추출 방법)

  • Kim, Jong-Ha;Jung, Jae-Young
    • Korean Institute of Interior Design Journal
    • /
    • v.25 no.2
    • /
    • pp.21-29
    • /
    • 2016
  • This study has estimated the traits of conscious eye moving with the objects of the halls of subway stations. For that estimation, the observation data from eye-tracking were matched with the experiment images, while an independent program was produced and utilized for the analysis of the eye moving in the selected sections, which could provide the ground for clarifying the traits of space-users' eye moving. The outcomes can be defines as the followings. First, The application of the independently produced program provides the method for coding the great amount of observation data, which cut down a lot of analysis time for finding out the traits of conscious eye moving. Accordingly, the inclusion of eye's intentionality in the method for extracting the characteristics of eye moving enabled the features of entrance and exit of particular objects with the course of observing time to be organized. Second, The examination of eye moving at each area surrounding the object factors showed that [out]${\rightarrow}$[in], which the line of sight is from the surround area to the objects, characteristically moved from the left-top (Area I) of the selected object to the object while [in]${\rightarrow}$[out], which is from the inside of the object to the outside, also moved to the left-top (Area I). Overall, there were much eye moving from the tops of right and left (Area I, II) to the object, but the eye moving to the outside was found to move to the left-top (Area I), the right-middle (Area IV) and the right-top (Area II). Third, In order to find if there was any intense eye-moving toward a particular factor, the dominant standards were presented for analysis, which showed that there was much eye-moving from the tops (Area I, II) to the sections of 1 and 2. While the eye-moving of [in] was [I $I{\rightarrow}A$](23.0%), [$I{\rightarrow}B$](16.1%) and [$II{\rightarrow}B$](13.8%), that of [out] was [$A{\rightarrow}I$](14.8%), [$B{\rightarrow}I$](13.6%), [$A{\rightarrow}II$](11.4%), [$B{\rightarrow}IV$](11.4%) and [$B{\rightarrow}II$](10.2%). Though the eye-moving toward objects took place in specific directions (areas), that (out) from the objects to the outside was found to be dispersed widely to different areas.

A Study on the Improvement of Source Code Static Analysis Using Machine Learning (기계학습을 이용한 소스코드 정적 분석 개선에 관한 연구)

  • Park, Yang-Hwan;Choi, Jin-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1131-1139
    • /
    • 2020
  • The static analysis of the source code is to find the remaining security weaknesses for a wide range of source codes. The static analysis tool is used to check the result, and the static analysis expert performs spying and false detection analysis on the result. In this process, the amount of analysis is large and the rate of false positives is high, so a lot of time and effort is required, and a method of efficient analysis is required. In addition, it is rare for experts to analyze only the source code of the line where the defect occurred when performing positive/false detection analysis. Depending on the type of defect, the surrounding source code is analyzed together and the final analysis result is delivered. In order to solve the difficulty of experts discriminating positive and false positives using these static analysis tools, this paper proposes a method of determining whether or not the security weakness found by the static analysis tools is a spy detection through artificial intelligence rather than an expert. In addition, the optimal size was confirmed through an experiment to see how the size of the training data (source code around the defects) used for such machine learning affects the performance. This result is expected to help the static analysis expert's job of classifying positive and false positives after static analysis.