• Title/Summary/Keyword: Obstacle detection

Search Result 317, Processing Time 0.026 seconds

Analysis of the Gene Expression by Laser Captured Microdissection (I): Minimum Conditions Required for the RNA Extraction from Oocytes and Amplification for RT-PCR (Laser Captured Microdissection을 이용한 유전자 발현에 대한 연구 (I): RT-PCR을 위한 난자의 RNA 추출 및 증폭을 위한 최소한도의 확립)

  • Park, Chang-Eun;Ko, Jung-Jae;Cha, Kwang-Yul;Lee, Kyung-Ah
    • Clinical and Experimental Reproductive Medicine
    • /
    • v.28 no.3
    • /
    • pp.183-190
    • /
    • 2001
  • Objective: Recently, microdissection of tissue sections has been used increasingly for the isolation of morphologically identified homogeneous cell populations, thus overcoming the obstacle of tissue complexity for the analysis cell-specific expression of macromolecules. The aim of the present study was to establish the minimal conditions required for the RNA extraction and amplification from the cells captured by the laser captured microdissection. Methods : Mouse ovaries were fixed and cut into serial sections (7 im thickness). Oocytes were captured by laser captured microdissection (LCM) method by using PixCell $II^{TM}$ system. The frozen sections were fixed in 70% ethanol and stained with hematoxylin and eosin, while the paraffin sections were stained with Multiple stain. Sections were dehydrated in graded alcohols followed by xylene and air-dried for 20 min prior to LCM. All reactions were performed in ribonuclease free solutions to prevent RNA degradation. After LCM, total RNA extraction from the captured oocytes was performed using the guanidinium isothiocyanate (GITC) solution, and subsequently evaluated by reverse transcriptase-polymerase chain reaction (RT-PCR) for glyceraldehyde-3-phosphate-dehydrogenase (GAPDH). Results: With the frozen sections, detection of the GAPDH mRNA expression in the number of captured 25 oocytes were not repeatable, but the expression was always detectable from 50 oocytes. With 25 oocytes, at least 27 PCR cycles were required, whereas with 50 oocytes, 21 cycles were enough to detect GA PDH expression. Amount of the primary cDNA required for RT-PCR was reduced down to at least 0.25 $\grave{i}$ l with 50 oocytes, thus the resting 19.75 il cDNA can be used for the testing other interested gene expression. Tissue-to-slide, tissue-to-tissue forces were very high in the paraffin sections, thus the greater number of cell procurement was required than the frozen sections. Conclusion: We have described a method for analyzing gene expression at the RNA level with the homogeneously microdissected cells from the small amount of tissues with complexity. We found that LCM coupled with RT-PCR could detect housekeeping gene expression in 50 oocytes captured. This technique can be easily applied for the study of gene expression with the small amount of tissues.

  • PDF

Biodegradation of Polynuclear Aromatic Hydrocarbons in soil using microorganisms under anaerobic conditions (혐기성 미생물에 의한 토양내 다핵성방향족화합물의 생물학적 분해)

  • An, Ik-Seong
    • 한국생물공학회:학술대회논문집
    • /
    • 2000.04a
    • /
    • pp.89-91
    • /
    • 2000
  • Polynuclear aromatic hydrocarbon (PAH) compounds are highly carcinogenic chemicals and common groundwater contaminants that are observed to persist in soils. The adherence and slow release of PAHs in soil is an obstacle to remediation and complicates the assessment of cleanup standards and risks. Biological degradation of PAHs in soil has been an area of active research because biological treatment may be less costly than conventional pumping technologies or excavation and thermal treatment. Biological degradation also offers the advantage to transform PAHs into non-toxic products such as biomass and carbon dioxide. Ample evidence exists for aerobic biodegradation of PAHs and many bacteria capable of degrading PAHs have been isolated and characterized. However, the microbial degradation of PAHs in sediments is impaired due to the anaerobic conditions that result from the typically high oxygen demand of the organic material present in the soil, the low solubility of oxygen in water, and the slow mass transfer of oxygen from overlying water to the soil environment. For these reasons, anaerobic microbial degradation technologies could help alleviate sediment PAH contamination and offer significant advantages for cost-efficient in-situ treatment. But very little is known about the potential for anaerobic degradation of PAHs in field soils. The objectives of this research were to assess: (1) the potential for biodegradation of PAH in field aged soils under denitrification conditions, (2) to assess the potential for biodegradation of naphthalene in soil microcosms under denitrifying conditions, and (3) to assess for the existence of microorganisms in field sediments capable of degrading naphthalene via denitrification. Two kinds of soils were used in this research: Harbor Point sediment (HPS-2) and Milwaukee Harbor sediment (MHS). Results presented in this seminar indicate possible degradation of PAHs in soil under denitrifying conditions. During the two months of anaerobic degradation, total PAH removal was modest probably due to both the low availability of the PAHs and competition with other more easily degradable sources of carbon in the sediments. For both Harbor Point sediment (HPS-2) and Milwaukee Harbor sediment (MHS), PAH reduction was confined to 3- and 4-ring PAHs. Comparing PAH reductions during two months of aerobic and anaerobic biotreatment of MHS, it was found that extent of PAHreduction for anaerobic treatment was compatible with that for aerobic treatment. Interestingly, removal of PAHs from sediment particle classes (by size and density) followed similar trends for aerobic and anaerobic treatment of MHS. The majority of the PAHs removed during biotreatment came from the clay/silt fraction. In an earlier study it was shown that PAHs associated with the clay/silt fraction in MHS were more available than PAHs associated with coal-derived fraction. Therefore, although total PAH reductions were small, the removal of PAHs from the more easily available sediment fraction (clay/silt) may result in a significant environmental benefit owing to a reduction in total PAH bioavailability. By using naphthalene as a model PAH compound, biodegradation of naphthalene under denitrifying condition was assessed in microcosms containing MHS. Naphthalene spiked into MHS was degraded below detection limit within 20 days with the accompanying reduction of nitrate. With repeated addition of naphthalene and nitrate, naphthalene degradation under nitrate reducing conditions was stable over one month. Nitrite, one of the intermediates of denitrification was detected during the incubation. Also the denitrification activity of the enrichment culture from MHS slurries was verified by monitoring the production of nitrogen gas in solid fluorescence denitrification medium. Microorganisms capable of degrading naphthalene via denitrification were isolated from this enrichment culture.

  • PDF

A Qualitative Study on Intervening Work Experiences of Hospital-Based Child Protection Team on Child Abuse Death Cases (병원 학대피해아동보호팀의 아동학대 사망사건 개입경험 연구)

  • Kim, Kyunghee;Lee, Heeyoun;Chung, Ickjoong;Kim, Jihae;Kim, Sewon
    • Korean Journal of Social Welfare
    • /
    • v.65 no.4
    • /
    • pp.61-88
    • /
    • 2013
  • The aim of this study was to explore the work experiences of hospital-based child protection team staffs who had intervened the child abuse cases resulting in death. In order to gather the relevant data, all 62 child protection teams registered nationwide were contacted and 5 teams which had actually experienced at least one child abuse deaths were found. The staffs (hospital social workers and doctors) who belonged to these teams were intensively interviewed, and the interviewed materials were thoroughly analyzed by qualitative research methodology. The result showed that treatment delay was the most important obstacle to prevent unnecessary deaths of the victims. Some abused victims were sent to the hospital only after their physical condition had so gravely deteriorated. In other cases, custodians' bland denial or refusal to treatment made impossible the timely intervention to save the child lives. Nevertheless, child protection team staffs' reasonable suspicion and active intervention could sometimes uncover the hidden truth that child abuse was the actual cause of death. These incidents were regarded as a team's meaningful accomplishments by team members. Meanwhile, lack of awareness and excessive burden about the role and responsibility of mandated reporter precluded medical staffs' active involvement. Also, substantiating the abuse suspicion by securing positive evidences was found to be a facilitatory factor for the rapid public intervention. On the basis of these results, several practice and policy implications were discussed to improve the early detection process, securing evidence and uncovering the actual cause of death in child abuse deaths.

  • PDF

Robust Obstacle Detection and Avoidance Algorithm for Infrastructure-Based Vehicle Communication Under Signal Interference (중계기를 통한 다중 차량 간 통신 상황에서 신호 간섭에 강한 장애물 감지 및 회피 알고리즘)

  • Choi, Byung Chan;Kwon, Hyuk Chan;Son, Jin Hee;Nam, Haewoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.5
    • /
    • pp.574-580
    • /
    • 2016
  • In this paper, we will introduce the system that can control multiple vehicles on the road through Single Board Computers and V2I (Vehicle-To-Infrastructure). Also, we will propose the group evasive maneuver decision algorithm, which plays a critical role in deciding whether the vehicles in the system have to conduct evasive maneuvers to avoid obstacles on the road. In order to test this system, we have utilized Wi-Fi and TCP/IP for establishing the communication between multiple vehicles and the relay server, and observed their driving states on the road with obstacles. During the experiments, we have discovered that our original decision algorithm possesses high failure rate when there is frequency interference in ISM (Industrial Scientific Medical) band. In order to reduce this failure rate, we have implemented the data transition detector. This paper will focus on how the use of data transition detector can affect the reliability of the system under the frequency interference of ISM band. If this technology is improved and applied in the field, we will effectively deal with such dangerous situations as multiple collision accidents through vehicle-to-vehicle communication or vehicle-to-infrastructure communication. Furthermore, this can be applied to the autonomous driving technologies. This can be used as the reference data for the development of the similar system.

A Comparative Study on Similarity Measure Techniques for Cross-Project Defect Prediction (교차 프로젝트 결함 예측을 위한 유사도 측정 기법 비교 연구)

  • Ryu, Duksan;Baik, Jongmoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.6
    • /
    • pp.205-220
    • /
    • 2018
  • Software defect prediction is helpful for allocating valuable project resources effectively for software quality assurance activities thanks to focusing on the identified fault-prone modules. If historical data collected within a company is sufficient, a Within-Project Defect Prediction (WPDP) can be utilized for accurate fault-prone module prediction. In case a company does not maintain historical data, it may be helpful to build a classifier towards predicting comprehensible fault prediction based on Cross-Project Defect Prediction (CPDP). Since CPDP employs different project data collected from other organization to build a classifier, the main obstacle to build an accurate classifier is that distributions between source and target projects are not similar. To address the problem, because it is crucial to identify effective similarity measure techniques to obtain high performance for CPDP, In this paper, we aim to identify them. We compare various similarity measure techniques. The effectiveness of similarity weights calculated by those similarity measure techniques are evaluated. The results are verified using the statistical significance test and the effect size test. The results show k-Nearest Neighbor (k-NN), LOcal Correlation Integral (LOCI), and Range methods are the top three performers. The experimental results show that predictive performances using the three methods are comparable to those of WPDP.

Design of Communication Protocol for Developing WISDOM(Wireless Interface Signal Control System for Dynamic and Optimal Management) (WISDOM(차세대 신호제어시스템) 개발을 위한 통신 프로토콜 설계)

  • Jung, Sung-Dae;Lee, Sang-Sun;Yoon, Young-Bum;Kim, Jong-Bok;Moon, Young-Jun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.1
    • /
    • pp.92-100
    • /
    • 2008
  • The existing transportation systems is emerged as a major obstacle to solve the problems such as a traffic jam and the increasing cost for a distribution and a traffic safety. In hun, ITS targeting intellectual vehicles and transportation infrastructure like road and signals is getting more important and the standards of ITS wireless communication is also getting attention. New traffic control strategies are being developed to utilize real-time traffic information collected by detection method using ITS wireless technology. Especially, DSRC system is being expanded wit ETCS and the use of OBU is spreading. These infrastructures will have much influence on ITS industry and a profound study on the method of utilizing a present infrastructure is going on in various fields. The optimum traffic signal control system using quality real-time information through these infrastructure is under development and so is WISDOM. Accordingly, this paper proposes communication protocol utilizing DSRC to collect real-time traffic information in WISDOM.

  • PDF

Comparison of Sampling Techniques for Passive Internet Measurement: An Inspection using An Empirical Study (수동적 인터넷 측정을 위한 샘플링 기법 비교: 사례 연구를 통한 검증)

  • Kim, Jung-Hyun;Won, You-Jip;Ahn, Soo-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.6
    • /
    • pp.34-51
    • /
    • 2008
  • Today, the Internet is a part of our life. For that reason, we regard revealing characteristics of Internet traffic as an important research theme. However, Internet traffic cannot be easily manipulated because it usually occupy huge capacity. This problem is a serious obstacle to analyze Internet traffic. Many researchers use various sampling techniques to reduce capacity of Internet traffic. In this paper, we compare several famous sampling techniques, and propose efficient sampling scheme. We chose some sampling techniques such as Systematic Sampling, Simple Random Sampling and Stratified Sampling with some sampling intensities such as 1/10, 1/100 and 1/1000. Our observation focused on Traffic Volume, Entropy Analysis and Packet Size Analysis. Both the simple random sampling and the count-based systematic sampling is proper to general case. On the other hand, time-based systematic sampling exhibits relatively bad results. The stratified sampling on Transport Layer Protocols, e.g.. TCP, UDP and so on, shows superior results. Our analysis results suggest that efficient sampling techniques satisfactorily maintain variation of traffic stream according to time change. The entropy analysis endures various sampling techniques well and fits detecting anomalous traffic. We found that a traffic volume diminishment caused by bottleneck could induce wrong results on the entropy analysis. We discovered that Packet Size Distribution perfectly tolerate any packet sampling techniques and intensities.

Simulating Group Movement on a Roadmap-based Path (로드맵 기반 경로에서의 그룹 이동 시뮬레이션)

  • Yu, Kyeon-Ah;Cho, Su-Jin;Kim, Kyung-Hye
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.4
    • /
    • pp.105-114
    • /
    • 2011
  • The roadmap-based planning is a path planning method which is used widely for a goal-directed movement in Robotics and has been applied to the world of computer animation such as computer games. However it is unnatural for computer characters to follow the path planned by the roadmap method as it is performed in Robotics. Flocking which is used for realistic and natural movements in computer animation enables character's movement by using a few simple rules without planning unlike the roadmap method. However it is impossible to achieve a goal-directed movement with flocking only because it does not keep states. In this paper we propose a simulation method which combines planning based on the road map with reactive actions for natural movements along the path planned. We define and implement steering behaviors for a leader which are needed to follow the trajectory naturally by analysing characteristics of roadmap-based paths and for the rest of members which follow the leader in various manners by detecting obstacles. The simulations are performed and demonstrated by using the implemented steering behaviors on every possible combination of roadmap-based path planning methods and models of configuration spaces. We also show that the detection of obstacle-collisions can be done effectively because paths are planned in the configuration space in which a moving object is reduced to a point.

Detection Model of Malicious Nodes of Tactical Network for Korean-NCW Environment (한국형 NCW를 위한 전술네트워크에서의 악의적인 노드 검출 모델)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.71-77
    • /
    • 2011
  • NCW(Network Centric- Warfare) encompasses the concept to use computer data processing and network linkage communications techniques, share information and furthermore, enhance the effectiveness of computer-operating systems. As IT(Information & Technology) have become developed in the recent years, the existing warfare system-centered conventional protocol is not use any longer. Instead, network-based NCW is being widely-available, today. Under this changing computer environment, it becomes important to establish algorithm and build the stable communication systems. Tools to identify malign node factors through Wireless Ad-hoc network cause a tremendous error to analyze and use paths of even benign node factors misreported to prove false without testing or indentifying such factors to an adequate level. These things can become an obstacle in the process of creating the optimum network distribution environment. In this regard, this thesis is designed to test and identify paths of benign node factors and then, present techniques to transmit data through the most significant open short path, with the tool of MP-SAR Protocol, security path search provider, in Ad-hoc NCW environment. Such techniques functions to identify and test unnecessary paths of node factors, and thus, such technique users can give an easy access to benign paths of node factors.

Detecting and Avoiding Dangerous Area for UAVs Using Public Big Data (공공 빅데이터를 이용한 UAV 위험구역검출 및 회피방법)

  • Park, Kyung Seok;Kim, Min Jun;Kim, Sung Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.6
    • /
    • pp.243-250
    • /
    • 2019
  • Because of a moving UAV has a lot of potential/kinetic energy, if the UAV falls to the ground, it may have a lot of impact. Because this can lead to human casualities, in this paper, the population density area on the UAV flight path is defined as a dangerous area. The conventional UAV path flight was a passive form in which a UAV moved in accordance with a path preset by a user before the flight. Some UAVs include safety features such as a obstacle avoidance system during flight. Still, it is difficult to respond to changes in the real-time flight environment. Using public Big Data for UAV path flight can improve response to real-time flight environment changes by enabling detection of dangerous areas and avoidance of the areas. Therefore, in this paper, we propose a method to detect and avoid dangerous areas for UAVs by utilizing the Big Data collected in real-time. If the routh is designated according to the destination by the proposed method, the dangerous area is determined in real-time and the flight is made to the optimal bypass path. In further research, we will study ways to increase the quality satisfaction of the images acquired by flying under the avoidance flight plan.