• Title/Summary/Keyword: Linking model

Search Result 477, Processing Time 0.025 seconds

The Method Development for Biomarker Diagnosis Based on the Aptamer-protein Crosslink (앱타머와 단백질간 가교를 이용한 바이오마커 진단 방법 개발)

  • Lee, Bo-Rahm;Kim, Ji-Nu;Kim, Byung-Gee
    • KSBB Journal
    • /
    • v.26 no.4
    • /
    • pp.352-356
    • /
    • 2011
  • The detection of biomarkers is an important issue for disease diagnosis. However, many systems are not suitable to detect the biomarker itself directly. For direct detection of biomarker proteins in human serum, a new affinity-capture method using aptamers combined with the mass spectrometry was suggested. Since signals from protein samples cannot be amplified, modified chromatin immunoprecipitation (ChIP) and subsequent cross-linking with formaldehyde between aptamers and target proteins were used not to lose the captured target proteins, which allowed us to perform a harsh washing step to remove the non-specifically bound proteins. As a model system, a thrombin aptamer was used as a bait and thrombin as a target protein. Using our modified ChIP and affinity-capture method, non-specific binding proteins on the beads decreased significantly, suggesting that our new method is efficient and can be applied to developing diagnosis systems for various biomarkers.

EMICS: E-mail based Malware Infected IP Collection System

  • Lee, Taejin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2881-2894
    • /
    • 2018
  • Cyber attacks are increasing continuously. On average about one million malicious codes appear every day, and attacks are expanding gradually to IT convergence services (e.g. vehicles and television) and social infrastructure (nuclear energy, power, water, etc.), as well as cyberspace. Analysis of large-scale cyber incidents has revealed that most attacks are started by PCs infected with malicious code. This paper proposes a method of detecting an attack IP automatically by analyzing the characteristics of the e-mail transfer path, which cannot be manipulated by the attacker. In particular, we developed a system based on the proposed model, and operated it for more than four months, and then detected 1,750,000 attack IPs by analyzing 22,570,000 spam e-mails in a commercial environment. A detected attack IP can be used to remove spam e-mails by linking it with the cyber removal system, or to block spam e-mails by linking it with the RBL(Real-time Blocking List) system. In addition, the developed system is expected to play a positive role in preventing cyber attacks, as it can detect a large number of attack IPs when linked with the portal site.

Effective α-Helix Stabilization via Hexenyl Propionate Cross-Link

  • Yoo, Jiyeon;Kim, Young-Woo
    • Bulletin of the Korean Chemical Society
    • /
    • v.35 no.12
    • /
    • pp.3627-3631
    • /
    • 2014
  • In this study we examined two ester-containing cross-links, hex-2-enyl acetate and hex-2-enyl propionate, as new cross-linking systems for helix stabilization of short peptides. We demonstrated that these hexenyl ester cross-links can be readily installed via a ruthenium-mediated ring-closing metathesis reaction of L-aspartic acid 4-allyl ester or L-glutamic acid 5-allyl ester at position i and (S)-2-(4'-pentenyl)alanine at position i+4 using second generation Hoveyda-Grubbs catalyst at $60^{\circ}C$. Between these two cross-links, we found that the hex-2-enyl propionate significantly stabilizes the ${\alpha}$-helical conformations of short model peptides. The helix-stabilizing effects of the hex-2-enyl propionate tether appear to be as powerful as Verdine's i,i+4 all-hydrocarbon stapling system, which is one of the most widely used and the most potent helix-stabilizing cross-linking systems. Furthermore, the hex-2-enyl propionate bridge is reasonably robust against non-enzymatic hydrolytic cleavage at a physiological pH. While extended studies for probing its chemical scopes and biological applications are needed, we believe that this new helix-stabilizing system could serve as a useful chemical tool for understanding protein folding and designing conformationally-constrained peptide drugs.

A Feasibility Study on the Outsourcing of Cataloging in the Libraries (목록 아웃소싱의 타당성 분석에 관한 연구)

  • Chung Hye-Kyung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.39 no.2
    • /
    • pp.35-55
    • /
    • 2005
  • This study attempts feasibility analysis of cataloging outsourcing. The economic analysis model based on information economics categorizes the benefit into direct benefit and value linking. We measure direct benefit by cost savings and cost avoidance, value linking by the degree of improvement in cataloging quality The results show that there is no feasibility overall, because librarians spent more time to control the quality due to vendor's lack of professionalism, resulting little effect on cost savings. When cataloging outsourcing is forcibly used under the economically infeasible condition, it is impossible to achieve the basic purpose of operating cost savings and improvement of service function.

A Study on the Construction Technique of DEM Using a Commercial Map (상용지도를 이용한 DEM 구성기법에 관한 연구)

  • 박성욱;최관순;강치우;이쾌희
    • Korean Journal of Remote Sensing
    • /
    • v.6 no.1
    • /
    • pp.1-9
    • /
    • 1990
  • This paper presents a method of the constructing DEM(Digital Elevation Model) from the image data acquired from a commercial map using the scanner. Data acquistion, mark elimination, linking the broken line, elevation interpolation and 3D display processing are performed and the results are satisfatory.

ROLE OF ERK1/2 IN 6-HYDROXYDOPAMINE-INDUCED APOPTOSIS IN SK-N-SH HUMAN NEUROBLASTOMA CELLS

  • Jin, Da-Qing;Kim, Jung-Ae
    • Proceedings of the PSK Conference
    • /
    • 2003.04a
    • /
    • pp.196.2-197
    • /
    • 2003
  • Parkinson's disease (PO) is a widespread neurodegenerative disorder. Even though PD has been studied in many aspects, it is still unknown the molecular signaling mechanisms linking reactive oxygen species (ROS) and neuronal apoptosis in PD. A better understanding of cellular mechanisms that occur in Parkinson's disease is essential for development of new therapies. In this study we investigated the signaling molecules involved in neuronal apoptosis induced by 6-hydroxydopamine (6-OHDA) in human SK-N-SH neuroblastoma cells as a model cellular system. (omitted)

  • PDF

AUTOMATED CONSTRUCTION PLANNING AND VISUALIZATION

  • M. Kataoka
    • International conference on construction engineering and project management
    • /
    • 2007.03a
    • /
    • pp.61-68
    • /
    • 2007
  • There has been a lot of research on and release of commercial systems that enable evaluation and visualization of construction methods. These have enabled the selection of good construction plans. However, the process in which engineers build 3D geometry, formulate a schedule and eventually synchronize them is still a time-consuming process. Changing any aspect of the geometry or the schedule and re-linking them is also time-consuming. Therefore, the engineers may compromise on getting the best solution. This paper describes a technique to automate the generation of multiple sets of schedules, quantity takeoffs and 4D visualization from a single 3D model.

  • PDF

A study of actual planning how to increase IT productivity by COCOMO II Model (IT산업 생산성 향상을 위한 프로젝트 실행계획 수립 방안 연구 - COCOMO II 적용사례)

  • Park, Cheol-Gu;Kim, Chang-Eun
    • Journal of the Korea Safety Management & Science
    • /
    • v.12 no.2
    • /
    • pp.147-152
    • /
    • 2010
  • Project implementation plan is a blueprint that confirms project performance activities and specifies required man-hour, period and resource imput ratio. Various figures, the results of implementation plan, are predicted through estimation, and because of superiority of objectivity and repeatability, numerical formula-based estimation model is often used overseas. COCOMO model is the representative estimation model whose theories and formulas are publicized and it predicts the total man-hour required for software system development. This model is publicized in "Software Engineering Economics" written by Professor Barry Boehm of the U.S., and is the most widely applied numerical formula-based estimation model. This study is conducted to provide a series of methods that are optimal for KTDS environment by choosing COCOMO II model among various types of COCOMO models. In establishing implementation plan, COCOMO II model alone is not sufficient, it is necessary to link with and apply standard WBS system and standard man-hour. In establishing specific implementation plan, phased standard WBS system in order of the first phase of all the activities implemented in the project, Activity, Task, and Role, and the man-hour put into this should be distributed according to standard ratio from COCOMO II model's total man-hour. This study provides explainations by establishing standard WBS system and linking with COCOMO II model.

City Restoration Applying Social Enterprise Model -Focused on Busan Gyeongnam Region- (사회적기업 모형의 도시재생사업 -부산 경남을 중심으로-)

  • Lee, Chan-Ho;Kim, Hye-Youn
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.197-202
    • /
    • 2012
  • This study has been carried out to confirm public opinion on city restoration project, to suggest basic direction of future city restoration, and to suggest improvement polices, and finally, to grow as self-supporting social enterprises rehabilitating local economy to stabilize themselves as a model for job creation. In this study, we reviewed city restoration projects and suggested successive model by collecting various policy data for regional social service linking them with social enterprises, and for social job creation, based on city restoration projects.

Logic-based Fuzzy Neural Networks based on Fuzzy Granulation

  • Kwak, Keun-Chang;Kim, Dong-Hwa
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1510-1515
    • /
    • 2005
  • This paper is concerned with a Logic-based Fuzzy Neural Networks (LFNN) with the aid of fuzzy granulation. As the underlying design tool guiding the development of the proposed LFNN, we concentrate on the context-based fuzzy clustering which builds information granules in the form of linguistic contexts as well as OR fuzzy neuron which is logic-driven processing unit realizing the composition operations of T-norm and S-norm. The design process comprises several main phases such as (a) defining context fuzzy sets in the output space, (b) completing context-based fuzzy clustering in each context, (c) aggregating OR fuzzy neuron into linguistic models, and (c) optimizing connections linking information granules and fuzzy neurons in the input and output spaces. The experimental examples are tested through two-dimensional nonlinear function. The obtained results reveal that the proposed model yields better performance in comparison with conventional linguistic model and other approaches.

  • PDF