• 제목/요약/키워드: block of spread

검색결과 165건 처리시간 0.024초

Vp28 of Shrimp White Spot Syndrome Virus Is Involved in the Attachment and Penetration into Shrimp Cells

  • Yi, Guohua;Wang, Zhimin;Qi, Yipeng;Yao, Lunguang;Qian, Juan;Hu, Longbo
    • BMB Reports
    • /
    • 제37권6호
    • /
    • pp.726-734
    • /
    • 2004
  • White spot disease (WSD) is caused by the white spot syndrome virus (WSSV), which results in devastating losses to the shrimp farming industry around the world. However, the mechanism of virus entry and spread into the shrimp cells is unknown. A binding assay in vitro demonstrated VP28-EGFP (envelope protein VP28 fused with enhanced green fluorescence protein) binding to shrimp cells. This provides direct evidence that VP28-EGFP can bind to shrimp cells at pH 6.0 within 0.5 h. However, the protein was observed to enter the cytoplasm 3 h post-adsorption. Meanwhile, the plaque inhibition test showed that the polyclonal antibody against VP28 (a major envelope protein of WSSV) could neutralize the WSSV and block an infection with the virus. The result of competition ELISA further confirmed that the envelope protein VP28 could compete with WSSV to bind to shrimp cells. Overall, VP28 of the WSSV can bind to shrimp cells as an attachment protein, and can help the virus enter the cytoplasm.

Controlling Mikania micrantha HBK: How effective manual cutting is?

  • Rai, Rajesh Kumar;Sandilya, Madan;Subedi, Rajan
    • Journal of Ecology and Environment
    • /
    • 제35권3호
    • /
    • pp.235-242
    • /
    • 2012
  • Mikania micrantha, a neo-tropical vine, is spreading rapidly in the tropical part of Nepal and is now threatening the rural ecosystem including biodiversity and rural livelihoods. However, no attempt has been made to control the spread of M. micrantha. As a result, the vines are spreading freely and rapidly. After a thorough literature review and assessment of forest management practices, we proposed a manual cutting method, as it suits the Nepalese situation for several reasons: required labor is readily available, as local communities are managing forest patches, and the method does not have any potential adverse effects on non-target native species. Experimental plots were laid out in August 2011 to examine the effectiveness of manual cutting. Two different site types based on canopy coverage were selected and divided into three blocks based on cutting strategy. Four treatments were assigned across the experimental plots following a complete block design. We harvested above-ground biomass according to the assigned treatment. The results suggested that there should be at least two consecutive cuttings within a 3-week interval before flowering, and that three consecutive cuttings resulted in 91% mortality of the vines. In addition, cutting promoted regeneration of native plant species. Employing regular cutting operations can modify understory shade enhancing regeneration of native species, which is a desirable condition to constrain proliferation of M. micrantha. Periodic cuttings reduced the competitiveness of M. micrantha regardless of canopy openness, but native ground cover should be retained.

지역기후기능을 고려한 주거단지계획기법에 관한 연구 - 바람길을 중심으로 - (A Study on Method of Planning for a Residential Unit under Consideration of Local Climate - Focused on Wind Corridor -)

  • 김태욱;정응호;류지원;박지혜
    • 한국주거학회논문집
    • /
    • 제18권2호
    • /
    • pp.105-112
    • /
    • 2007
  • This research has been implemented based on the area of #369 Dowon-dong, Dalseo-gu, Dae-gu which is considered as a place with satisfactory characteristics for the flow of fresh air into the city. Simulations of the target area both prior to the development plan and after apartment complex blocking were analyzed in regard to blocking planning and pilotis based on the main direction of wind, $90^{\circ}$ (east wind) and $180^{\circ}$ (south wind). In addition, congested wind corridor flow in the target place was identified through a pollution spread simulation according to the wind corridor. Therefore, the flow of wind in the one area is affected by the blocking of the complex and the main direction of the wind. Also blocking, in regard of pilotis, provides a better flow of wind. This study was implemented based on wind formation by apartment complex planning, so further study on the other factors affecting the flow of a wind corridor along with block planning and pilotis need to be carried out. Sustainable environmental factors through analysis of the environmental factors have to be analyzed. Moreover, building and complementing fundamental resources and systematic devices should be supported.

컬러와 동적 특징을 이용한 화재의 시각적 감지 (Visual Sensing of Fires Using Color and Dynamic Features)

  • 도용태
    • 센서학회지
    • /
    • 제21권3호
    • /
    • pp.211-216
    • /
    • 2012
  • Fires are the most common disaster and early fire detection is of great importance to minimize the consequent damage. Simple sensors including smoke detectors are widely used for the purpose but they are able to sense fires only at close proximity. Recently, due to the rapid advances of relevant technologies, vision-based fire sensing has attracted growing attention. In this paper, a novel visual sensing technique to automatically detect fire is presented. The proposed technique consists of multiple steps of image processing: pixel-level, block-level, and frame level. At the first step, fire flame pixel candidates are selected based on their color values in YIQ space from the image of a camera which is installed as a vision sensor at a fire scene. At the second step, the dynamic parts of flames are extracted by comparing two consecutive images. These parts are then represented in regularly divided image blocks to reduce pixel-level detection error and simplify following processing. Finally, the temporal change of the detected blocks is analyzed to confirm the spread of fire. The proposed technique was tested using real fire images and it worked quite reliably.

개인식별화된 SMS 발송을 통한 스팸식별 및 스미싱 예방(금융권중심) (Discrimination of SPAM and prevention of smishing by sending personally identified SMS(For financial sector))

  • 주춘경;윤지원
    • 정보보호학회논문지
    • /
    • 제24권4호
    • /
    • pp.645-653
    • /
    • 2014
  • 본 논문은 최근 휴대전화 사용 급증에 따라 계속 이슈가 되고 있는 스팸 문자 및 스미싱(Smishing)과 관련해서 금융기관에서 고객들에게 발송되는 SMS(Short Message Service)문자의 진위여부를 저비용, 고효율 측면에서 효율적으로 식별할 수 있는 방안을 제시하고자 한다. 먼저 본 논문에서는 스팸문자를 차단하기 위한 기존의 노력 및 대책에 대한 문제점 및 한계를 언급하고 그 한계를 효과적으로 극복할 수 있는 방안을 제시한다. 또한 제시된 개선방법에 대해 다양한 계층의 고객들에 대한 설문조사와 직접 구현 및 적용을 통해 그 효과성을 증명하려고 한다.

CUDA GPGPU 상에서 경량 블록 암호 PIPO의 최적 구현 (Optimal Implementation of Lightweight Block Cipher PIPO on CUDA GPGPU)

  • 김현준;엄시우;서화정
    • 정보보호학회논문지
    • /
    • 제32권6호
    • /
    • pp.1035-1043
    • /
    • 2022
  • 사물인터넷(IoT), 클라우드 컴퓨팅, 빅데이터 등의 확산으로 애플리케이션에 대한 고속 암호화의 필요성이 대두되고 있다. GPU 최적화는 GPU가 이론적으로 얻은 암호 분석 결과 또는 축소된 버전을 합리적인 시간에 검증하는데 사용될 수 있다. 본 논문에서는 다양한 환경에서 구현되고 있는 PIPO 경량암호를 대상으로 GPU 상에서 구현하였다. PIPO에 대한 무차별 대입 공격을 고려하여 최적 구현하였다. 특히 비트 슬라이싱 기법을 적용한 최적화 구현과 GPU 요소를 최대한 사용하였다. 결과적으로 제안 기법의 구현은 RTX 3060 환경에서 초당 약 195억의 처리량을 보여 이전 연구 보다 약 122배 높은 처리량을 달성하였다.

3차원 인체형상 스캔데이터를 이용한 남자 바지패턴 설계 (Development of Men Slacks Pattern Using 3D Scan Data)

  • 손부현
    • 대한가정학회지
    • /
    • 제46권9호
    • /
    • pp.137-146
    • /
    • 2008
  • This study was conducted in order to spread out lower body 3D scan data of men in their twenties. The aim was to achieve slacks pattern with ease allowance through comparison with existing flat patterns. For conversion of 3D scan data into 20 pattern, reference lines were established by using Rapid Foam in 3D shape analysis software. 2C-AN program and Yuka CAD were used to convert 20 pattern earned with straight posture of 3D scan data into slacks pattern by using Triangle Simplification & Runge-Kutta Method. In order to achieve this we needed to set a line 9cm below the hip line, to array vertex of each block to crease line while maintaining the horizontal line. And then we needed to set ease allowance in back crotch and to set waist circumference or hip circumference ease allowance in side seam of slacks. Results showed that long front crotch length can be achieved if 3D scan data is compared with 20 existing flat pattern. Slacks pattern that raise front crotch by about 1.5cm compared to back crotch and also possess ease allowance in back crotch area are great in appearance evaluation.

통증치료를 위한 신경차단 중 발생한 드문 합병증 3예 (Unusual Complications from nerve Blocks used for Pain Control)

  • 김갑동;최현규;윤영무;최훈
    • The Korean Journal of Pain
    • /
    • 제2권2호
    • /
    • pp.203-207
    • /
    • 1989
  • 통증치료의 분야에서 뿐 만 아니라 환자를 진단하고 치료하는 의학의 전반에 걸쳐 예기치 못한 합병증의 발생은 어쩌면 피할 수 없는 것인지도 모른다. 따라서 환자를 진료하는 의사는 합병증의 발생에 대한 잠재적 가능성을 언제고 염두에 두어야하고, 일단 합병증이 발생하였더라도 임기응변으로 적절히 대처할 수 있는 지식과 기술을 폭넓게 갖추고 있어야 한다고 생각된다. 저자들은 통증치료목적으로 지주막하 alcohol차단, 경천추차단, 경막외 catheter 거치중 폐기종, 약물의 이상확산, catheter 절단을 각각 경험하였으므로 이에 관하여 고찰하였다.

  • PDF

다경로 페이딩 채널에서 DS/SSMA 시스템의 오율특성 (Error rate performance of DS / SSMA system in multipath fading channel)

  • 박성경;송왕철;강창언
    • 한국전자파학회지:전자파기술
    • /
    • 제6권1호
    • /
    • pp.66-76
    • /
    • 1995
  • 본 논문에서는 다경로 페이딩 채널에서 DA/SSMA 시스템의 오율특성을 컴퓨터시뮬레이션을 통하여 성능분석을 하였다. 먼저 다경로 페이딩 채널을 모델링 하였으며, 채널의 특성을 알아보기 위하여 도플러 주파수와 신호의 대역폭, 시간지연 등을 변화시키면서 그때의 주파수 응답특성과 여러 형태에 대하여 살펴보았다. 그리고 모델링한 태널을 블럭코드와 콤볼루션코드로 성능을 비교하였으며 DS/SSMA 시스템에 적용하여 성능을 비교 분석하였다. 그 결과를 보면 상관기를 사용하지 않은 코딩 시스템의 수신기[5]보다 1~3[dB] 향상됨을 나타내었다.

  • PDF

CDMA Digital Mobile Communications and Message Security

  • 이만영
    • 정보보호학회논문지
    • /
    • 제6권4호
    • /
    • pp.3-38
    • /
    • 1996
  • The mobile station shall convolutionally encode the data transmitted on the reverse traffic channel and the access channel prior to interleaving. Code symbols output from the convolutional encoder are repeated before being interleaved except the 9600 bps data rate. All the symbols are then interleaved, 64-ary orthogonal modulation, direct-sequence spreading, quadrature spreading, baseband filtering and QPSK transmission. The sync, paging, and forward traffic channel except the pilot channel in the forward CDMA channel are convolutionally encoded, block interleaved, spread with Walsh function at a fixed chip rate of 1.2288 Mcps to provide orthogonal channelization among all code channels. Following the spreading operation, the I and Q impulses are applied to respective baseband filters. After that, these impulses shall be transmitted by QPSK. Authentication in the CDMA system is the process for confirming the identity of the mobile station by exchanging information between a mobile station and the base station. The authentication scheme is to generate a 18-bit hash code from the 152-bit message length appended with 24-bit or 40-bit padding. Several techniques are proposed for the authentication data computation in this paper. To protect sensitive subscriber information, it shall be required enciphering ceratin fields of selected traffic channel signaling messages. The message encryption can be accomplished in two ways, i.e., external encryption and internal encryption.