• Title/Summary/Keyword: Variant Characters

Search Result 23, Processing Time 0.022 seconds

The Characteristics and Correlation Coefficients of Characters in Panax ginseng, Violet-stem Variant and Yellow. berry Variant, and Panax quinquefolium. (고려인삼과 미국삼의 형질특성 및 형질간 상관관계)

  • 최광태;안상득;박규진;양덕조
    • Journal of Ginseng Research
    • /
    • v.7 no.2
    • /
    • pp.133-147
    • /
    • 1983
  • This study was carried out to obtain the basic information for the development of new ginseng varieties. The two variants (violet-stem variant and yellow-berry variant) of Korean ginseng (Panax ginseng C.A. Meyer) and American ginseng (Panax quinquefolium L.) of one to four-year were used for this study. All of the characteristics, such as leaf length, leaf width, petiol length, number of leaves per plant, number of leaflets per plants, stem diameter, stem length, number of stems per plant, root length, primary root length, root diameter, root weight were determined and correlations among them were estimated. The results obtained were summarized as follows. 1. Leaf length, petiol length, number of leaves per plant, and number of leaflets per plant of Panax ginseng, violet-stem variant and yellow-berry variant, were larger than those of Panax quinquefolium at all of the plant ages, while leaf width was wider in Panax quinquefolium. 2. The length of stem of Panax quinquefolium was shorter than that of Panax ginseng, and the frequency of multi-stem plants at 4-year-old ginseng was larger in violet-stem variant than in Panax quinquefolium and yellow-berry variant. 3. In the characteristics of ginseng root, the primary root length of Panax ginseng, violet-stem variant and yellow-berry variant, were less than that of Panax quinquefolium, while root weight, root diameter, and umber of secondary root related to yield were larger in Panax ginseng. 4. The root weight per plant related to the yield had positive and highly significant correlations with stem diameter, leaf length, leaf length, leaf width, number of compound leaves and leaflets in Panax ginseng and Panax quinguefolium. 5. The root weight related to the wield of ginseng had been influenced to stem diameter, leaf length, and leaf width directly, and number of compound leaves and leaflets indirectly. 6. The number, total area and activity of stomate per mm2 of Panax quinquefolium were more, larger and stronger than those of Panax ginseng.

  • PDF

한중한자자형비교연구(韓中漢字字形比較硏究)2 - 한문(漢文) 교육용(敎育用) 기초한자(基礎漢字) 고등학교용(高等學校用) 900자(字)를 중심(中心)으로

  • Gang, Hye-Geun
    • 중국학논총
    • /
    • no.62
    • /
    • pp.1-25
    • /
    • 2019
  • 作者对韩国教育部指定的"漢文敎育用基礎漢字高等學校用900字"跟中国规范汉字字形, 进行比较分析的结果如下: (1)字形完全一样的(在附录"高中学校用900字"汉字旁边标注为"="), 一共有424个汉字(约占47%); (2)字形相似的(在附录"高中学校用900字"汉字旁边标注为"Δ"), 一共有86个汉字(约占10%); (3)字形不同的(在附录"高中学校用900字"汉字旁边标注为"×"), 一共有389个汉字(约占43%). 字形相似, 不等于字形相同, 所以也应该看作字形不同的字, 属于这两种情况的字合起来, 一共有475个(约占53%). 韩中汉字字形不同的主要来源, 不止"简化字"和"传承字里的新字形", 还有"从一些异体字里选出来的正体字"也和韩国常用汉字字形不同.

Studies on the Characters of Green-stem Varient Ginseng Plant (청경종의 제형질 특성에 관하여)

  • 천성룡;김경태
    • Journal of Ginseng Research
    • /
    • v.13 no.2
    • /
    • pp.153-157
    • /
    • 1989
  • The characteristics of the areal parts, photosynthetic and respiration rates and stem color were examined in 1- to 5-year-old Green-stem, Violet-stem and Yellow-berry variant ginseng (Panax ginseng C.A. Meyer). The top characteristics, photosynthetic and respiration rates were not significantly different among the three variants. Selfed progency of the Green-stems variant plant produced only green stems, while the others produced green and violet stem in the seedling stage. These results showed that most of the top characteristics of the Green-stem variant were similar those of the Violet-stem and Yellow-berry variants with age.

  • PDF

A Study on a Method of Selecting Variant Groups to be Reviewed for LGR (Label Generation Rule) of Internet Top-Level Hanja Domain (인터넷 최상위 한자 도메인의 국제 생성 규칙(LGR)을 위한 검토 대상 이체자 묶음 선정 방안 연구)

  • Kim, Kyongsok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.1
    • /
    • pp.7-16
    • /
    • 2016
  • This paper discusses a method of selecting variant groups to be reviewed for LGR (Label Generation Rule) of Internet Top-Level Hanja Domain. The most difficult problem in setting up LGR of Internet Top-Level Hanja Domain is how to treat Hanja variants. If domains containing variants (e.g.: 東海國) are directed to different addresses, confusion will arise. Therefore, it is desirable that such domains are directed to the same address. Since variant groups of Korea and China are not same, we need to unify variant groups of Korea and China. In the process of reviewing 3093 Chinese variant groups, the author found that Korea does not need to review Chinese variant groups which include no or just one Korean Hanja character. Korea only need to review Chinese variant groups which include two or more Korean Hanja characters. By doing so, the author could reduce the number of Chinese variant groups to be reviewed by Korea from 3093 to 303, which is only one-tenth of the original number of Chinese variant groups. After Korea finishes reviewing 303 Chinese variant groups selected according to the method suggested in this paper, the job of setting up LGR of Internet Top-Level Hanja domain will be accelerated by negotiating with China.

A Study of Story Visualization Based on Variation of Characters Relationship by Time (등장인물들의 시간적 관계 변화에 기초한 스토리 가시화에 관한 연구)

  • Park, Seung-Bo;Baek, Yeong Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.3
    • /
    • pp.119-126
    • /
    • 2013
  • In this paper, we propose and describe the system to visualize the story of contents such as movies and novels. Character-net is applied as story model in order to visualize story. However, it is the form to be accumulated for total movie story, though it can depict the relationship between characters. We have developed the system that analyzes and shows the variation of Character-net and characters' tendency in order to represent story variation depending on movie progression. This system is composed by two windows that can play and analyze sequential Character-nets by time, and can analyze time variant graph of characters' degree centrality. First window has a function that supports to find important story points like the scenes that main characters appear or meet firstly. Second window supports a function that track each character's tendency or a variation of his tendency through analyzing in-degree graph and out-degree. This paper describes the proposed system and discusses additional requirements.

Adaptive Learning Recommendation System based on ITS (ITS 기반의 적응형 학습 추천 시스템)

  • Moon, Seok-jae;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.662-665
    • /
    • 2013
  • ITS(Intelligent Tutoring System) is a system that provides active and flexible tutoring conditions to learners, having adopted artificial intelligence to overcome the limitations of CAI(Computer Assisted Instruction). However, the existing ITS has a few problems; the system provides the same contents to every learner, not considering main variants of their learning and achievement, characters and levels, and therefore, it does not generate satisfactory results; the system does not offer a properly designed course schedule. Therefore, this thesis proposes ARS(Adaptive Recommendation System), founded on ITS, that provides contents designed based on the characters and levels of learners. To catch the characters of learners, the important variant for successful learning, ARS applies and embodies a module of self-assessment test. Also, it puts weighs according to the areas of learning which is different from the simplified assessment that asks for short and mechanical answers for the purpose of knowing the levels of the learners.

  • PDF

Function partitioning methods for malware variant similarity comparison (변종 악성코드 유사도 비교를 위한 코드영역의 함수 분할 방법)

  • Park, Chan-Kyu;Kim, Hyong-Shik;Lee, Tae Jin;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.321-330
    • /
    • 2015
  • There have been found many modified malwares which could avoid detection simply by replacing a sequence of characters or a part of code. Since the existing anti-virus program performs signature-based analysis, it is difficult to detect a malware which is slightly different from the well-known malware. This paper suggests a method of detecting modified malwares by extending a hash-value based code comparison. We generated hash values for individual functions and individual code blocks as well as the whole code, and thus use those values to find whether a pair of codes are similar in a certain degree. We also eliminated some numeric data such as constant and address before generating hash values to avoid incorrectness incurred from them. We found that the suggested method could effectively find inherent similarity between original malware and its derived ones.

Selection and Agronomics Characterization of Radiation-Induced Variants in Rice (방사선 처리에 의해 유도된 돌연변이 벼의 주요 특징)

  • Lee, In-Sok;Kim, Dong-Sup;Choi, Su-Ryun;Song, Hi-Sup;Lee, Sang-Jae;Lim, Yong-Pyo;Lee, Young-Il
    • Journal of Plant Biotechnology
    • /
    • v.30 no.3
    • /
    • pp.227-232
    • /
    • 2003
  • Radiation technique has been used to develope mutant rice. Suwon 345 rice seeds were irradiated with 250 Gy gamma ray. Morphological characteristics of the variants in M$_{8}$ generation were observed and random amplified polymorphic DNA(RAPD) analysis was carried out. Plant height, panicle length, 1,000 grain weight and lodging were very different in mutants compared with donor cultivar. RAPD analysis showed that polymorphic bands were presented in several primers of the mutants. In comparison with original variety, variants were classified into four group through UPGMA analysis. A group has mutation trait in panicle length, B group in plant height and C group in 1,000 grain weight. Among mutants, no. 46 and 147 was ranked as salt tolerance and the malonaldehyde content of these mutants was more increased than that of original variety. Valuable mutants obtained will be useful for developing new cultivars and for studing gene function in molecular level.l.

Study on the Somatic Chromosome Numbers of Korean Aster L. and Its Allied Taxa (한국산 개미취속 및 근연 분류군의 체세포염색체수에 관한 연구)

  • 정규영
    • Korean Journal of Plant Resources
    • /
    • v.10 no.4
    • /
    • pp.292-299
    • /
    • 1997
  • The somatic chromosome numbers among the various taxonomic characters about 17 taxa in Korean Aster and its allied taxa were investigated to review accurate scientific name and taxonomic rank. The somatic chromosome numbers of the treated taxa were invariable in same taxa, but variable among different taxa. The treated taxa were divided into two types by basic chromosome numbers, one type was x=9, the other x=8 and x=9 type was subdivided by polyploidy. The somatic chromosome numbers of Aster altaicus var. uchiymae, A. hyatae, Kalimeris chejuensis were reported firstly in this study, and based upon somatic chromosome numbers and leaf morphology, the plants, idenified as Aster pinnatifidus in Korea was considered variant of Kalimeris incisa.

  • PDF

An Efficient PSI-CA Protocol Under the Malicious Model

  • Jingjie Liu;Suzhen Cao;Caifen Wang;Chenxu Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.720-737
    • /
    • 2024
  • Private set intersection cardinality (PSI-CA) is a typical problem in the field of secure multi-party computation, which enables two parties calculate the cardinality of intersection securely without revealing any information about their sets. And it is suitable for private data protection scenarios where only the cardinality of the set intersection needs to be calculated. However, most of the currently available PSI-CA protocols only meet the security under the semi-honest model and can't resist the malicious behaviors of participants. To solve the problems above, by the application of the variant of Elgamal cryptography and Bloom filter, we propose an efficient PSI-CA protocol with high security. We also present two new operations on Bloom filter called IBF and BIBF, which could further enhance the safety of private data. Using zero-knowledge proof to ensure the safety under malicious adversary model. Moreover, in order to minimize the error in the results caused by the false positive problem, we use Garbled Bloom Filter and key-value pair packing creatively and present an improved PSI-CA protocol. Through experimental comparison with several existing representative protocols, our protocol runs with linear time complexity and more excellent characters, which is more suitable for practical application scenarios.