• Title/Summary/Keyword: Obstacle Map

Search Result 153, Processing Time 0.029 seconds

Proteomic Evaluation of Cellular Responses of Saccharomyces cerevisiae to Formic Acid Stress

  • Lee, Sung-Eun;Park, Byeoung-Soo;Yoon, Jeong-Jun
    • Mycobiology
    • /
    • v.38 no.4
    • /
    • pp.302-309
    • /
    • 2010
  • Formic acid is a representative carboxylic acid that inhibits bacterial cell growth, and thus it is generally considered to constitute an obstacle to the reuse of renewable biomass. In this study, Saccharomyces cerevisiae was used to elucidate changes in protein levels in response to formic acid. Fifty-seven differentially expressed proteins in response to formic acid toxicity in S. cerevisiae were identified by 1D-PAGE and nano-liquid chromatography-tandem mass spectrometry (nano-LC-MS/MS) analyses. Among the 28 proteins increased in expression, four were involved in the MAP kinase signal transduction pathway and one in the oxidative stress-induced pathway. A dramatic increase was observed in the number of ion transporters related to maintenance of acid-base balance. Regarding the 29 proteins decreased in expression, they were found to participate in transcription during cell division. Heat shock protein 70, glutathione reductase, and cytochrome c oxidase were measured by LC-MS/MS analysis. Taken together, the inhibitory action of formic acid on S. cerevisiae cells might disrupt the acidbase balance across the cell membrane and generate oxidative stress, leading to repressed cell division and death. S. cerevisiae also induced expression of ion transporters, which may be required to maintain the acid-base balance when yeast cells are exposed to high concentrations of formic acid in growth medium.

A methodology for discovering business processes in different semantic levels (의미 수준이 다른 비즈니스 프로세스의 검색 방법)

  • Choe Yeong Hwan;Chae Hui Gwon;Kim Gwang Su
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2003.05a
    • /
    • pp.1128-1135
    • /
    • 2003
  • e-Transformation of an enterprise requires the collaboration of business processes to be suited to the business participants' purpose. To realize this collaboration, business processes should be implemented as components and the system developers could be able to reuse the components for their specific purpose. The first step of this collaboration is the discovery of exact components for business processes. A dilemma, however, is the fact that there are thousands or even millions of business processes which vary from one enterprise to another. Moreover, business processes could be decomposed into multiple levels of semantics and classified into several process areas. In general, discovery of exact business processes requires understanding of widely adopted classification schemes such as CBPC, OAGIS, or SCOR. To cope with this obstacle, business process metadata should be defined and managed regardless of specific classification schemes to support effective discovery and reuse of business processes components. In this paper, a methodology to discover business process components published in different semantic levels is proposed. The proposed methodology represents the metadata of business process components as topic maps stored in a registry and utilizes the powerful features of topic maps for process discovery. TM4J, an open-source topic map engine, is modified to support concept matching and navigation. With the implemented tool, application system developers can discover and publish the business process components effectively.

  • PDF

The Object Recognition Using Multi-Sonar Sensor and Neural Networks (복수 초음파센서와 신경망을 이용한 형상인식)

  • Kim, Dong-Gi;O, Tae-Gyun;Gang, Lee-Seok
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.24 no.11
    • /
    • pp.2875-2882
    • /
    • 2000
  • Typically, the ultrasonic sensors can be used in navigation systems for modeling of the enviornment, obstacle avoidance, and map building. In this paper, we tried to approach an object classification method using the range data of the ultrasonic sensors. A characterization of the sonar scan is described that allows the differentiation of planes, corners, edges, cylindrical and rectangular pillars by processing the scanned data from three sonars. To use the data from the ultrasonic sensors as input to the neural networks, we have introduced a clustering, threshold, and bit operation algorithm for the obtained raw data, After repeated training of the neural network, the performance of the proposed method was obtained through experiments. Also, the recognition ranges of the proposed method were investigated. As a result of experiments, we found that the proposed method successfully recognized the objects within the accuracy of 78%.

Decomposing Twitter Network in Tourism Marketing

  • Kim, Wonsik;Kim, Daegeun
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.80-85
    • /
    • 2021
  • This study is to analyze the structure of the networks of tourism marketing on Twitter, identifying the most prominent users, the flow of information about tourism marketing, and the interaction between the users posting tweets. This study employs NodeXL pro as a visualization software package for social network analysis. The number of vertices or nodes is 171, and the number of the unique edges or links is 128, but there are 101 edges with duplicates, so the total links are 229, which means that there are fewer Twitter accounts in the social network on tourism marketing, but they have a few close relationships by sharing information. The research can map the social network of communicators of tourism marketing using Twitter data. The network has a complicated pattern, including one independent network and some connected networks. Some mediators connect each network and can control the information flow of tourism marketing. More communicators are getting the information than the ones providing it, which means that there is likely to be the dependence of information among communicators that can cause an obstacle and distortion of the information flow system, especially in the independent network.

Vehicle Detection and Tracking using Billboard Sweep Stereo Matching Algorithm (빌보드 스윕 스테레오 시차정합 알고리즘을 이용한 차량 검출 및 추적)

  • Park, Min Woo;Won, Kwang Hee;Jung, Soon Ki
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.6
    • /
    • pp.764-781
    • /
    • 2013
  • In this paper, we propose a highly precise vehicle detection method with low false alarm using billboard sweep stereo matching and multi-stage hypothesis generation. First, we capture stereo images from cameras established in front of the vehicle and obtain the disparity map in which the regions of ground plane or background are removed using billboard sweep stereo matching algorithm. And then, we perform the vehicle detection and tracking on the labeled disparity map. The vehicle detection and tracking consists of three steps. In the learning step, the SVM(support vector machine) classifier is obtained using the features extracted from the gabor filter. The second step is the vehicle detection which performs the sobel edge detection in the image of the left camera and extracts candidates of the vehicle using edge image and billboard sweep stereo disparity map. The final step is the vehicle tracking using template matching in the next frame. Removal process of the tracking regions improves the system performance in the candidate region of the vehicle on the succeeding frames.

User Interface for the 'Smombie Safe Go' App for Walking Safety (보행안전을 위한 앱서비스 'Smombie Safe Go' UI 연구)

  • Qiao, Xian Yue;Kim, Se-Hwa
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.10
    • /
    • pp.190-198
    • /
    • 2020
  • The development in smartphone technology has brought convenience to the life of the mankind, but an excessive use of smartphones sometimes causes various accidents. This research tried to propose an application service 'Smombie Safe Go' UI(User Interface) that allows the prevention of such accident while using smartphones when walking. For this, after research and user observations, produced walker journey maps and derived necessary main functions needed for safety, and the result showed that transparent interface, obstacle location alert, warning of dangers functions were necessary. To make the contents of the service more detailed, hazardous situations faced during smartphone use when walking were classified into 3 situations : 1. Obstacle appearing in front, 2. traffic lights on crosswalks 3. No traffic lights on crosswalks. Scenarios by hazardous situation were written, and the flow and UI of the app service that warns its users in each situation of hazards were designed. it is predicted that 'Smombie Safe Go' may be possible to be utilized as an app service that provides a safe walking experience for not only regular pedestrians but also the blind population.

An Autonomous Mobile System based on Detection of the Road Surface Condition (노면 상태 검출에 기반한 자율 주행 시스템)

  • Jeong, Hye-C.;Seo, Suk-T.;Lee, Sang-H.;Lee, In-K.;Kwon, Soon-H.
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.5
    • /
    • pp.599-604
    • /
    • 2008
  • Recently, many researches for autonomous mobile system have been proposed, which can recognize surrounded environment and navigate to destination without outside intervention. The basic sufficient condition for the autonomous mobile system is to navigate to destination safely without accident. In this paper, we propose a path planning method in local region for safe navigation of autonomous system through evaluation of the road surface distortion(damaged/deformed road, unpaved road, obstacle and etc.). We use laser distance sensor to get the information on the road surface distortion and apply image binalization method to evaluate safe region in the detected local region. We show the validity of the proposed method through the computer simulation based on the artificial local road map.

A Study of Path-Finding Method of Small Unmanned Aerial Vehicles for Collision Avoidance (소형 무인비행체에서의 충돌회피를 위한 비행경로 생성에 관한 연구)

  • Shin, Saebyuk;Kim, Jinbae;Kim, Shin-Dug;Kim, Cheong Ghil
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.1
    • /
    • pp.76-80
    • /
    • 2017
  • With the fast growing popularity of small UAVs (Unmanned Aerial Vehicles), recent UAV systems have been designed and utilized for the various field with their own specific purposes. UAVs are opening up many new opportunities in the fields of electronics, sensors, camera, and software for pilots. Increase in awareness and mission capabilities of UAVs are driving innovations and new applications driven with the help of low cost and its capability in undertaking high threat task. In particular, small unmanned aerial vehicles should fly in environments with high probability of unexpected sudden change or obstacle appearance in low altitude situations. In this paper, current researches regarding techniques of autonomous flight of smal UAV systems are introduced and we propose a draft idea for planning paths for small unmanned aerial vehicles in adversarial environments to arrive at the given target safely with low cost sensors.

Study on the Physical vulnerability factors of network and the Countermeasure technology (네트워크의 물리적 취약요인과 대응기술에 관한 연구)

  • Jeon, Jeong Hoon;Ahn, Chang Hoon;Kim, Sang Choon
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.139-145
    • /
    • 2016
  • Recently, The attack on the USB and network are increasing in many domestic infrastructure. These attacks are the most independent of insider intention, caused by the Anthropogenic Manipulation. These attacks are Anthropogenic Response Measures for Physical Security. and Representative Technology has CCTV, Access Control System, Sensor Technology. However, Physical Security, it is represented by several Product family according to the Market, has become an obstacle but rather a variety of Physical Security Technology Development and Application. As the Anthropogenic Attacks have occur continually in the network, it need to the proper Physical Response Techniques in this situation. Therefore, In this paper, we will find out about the awareness and demand trends of Physical Security. And The Physical Vulnerable Factors of Network. Thereby this is expected to be utilized as a basis for the domestic Physical Security Technology development and deployment Road-map in a future.

Programming Toolkit for Localization and Simulation of a Mobile Robot (이동 로봇 위치 추정 및 시뮬레이션 프로그래밍 툴킷)

  • Jeong, Seok Ki;Kim, Tae Gyun;Ko, Nak Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.4
    • /
    • pp.332-340
    • /
    • 2013
  • This paper reports a programming toolkit for implementing localization and navigation of a mobile robot both in real world and simulation. Many of the previous function libraries are difficult to use because of their complexity or lack of usability. The proposed toolkit consist of functions for dead reckoning, motion model, measurement model, and operations on directions or heading angles. The dead reckoning and motion model deals with differential drive robot and bicycle type robot driven by front wheel or rear wheel. The functions can be used for navigation in both real environment and simulation. To prove the feasibility of the toolkit, simulation results are shown along with the results in real environment. It is expected the proposed toolkit is used for test of algorithms for mobile robot navigation such as localization, map building, and obstacle avoidance.