• 제목/요약/키워드: csp

검색결과 405건 처리시간 0.027초

C-Ring Cleavage of Isoflavones Daidzein and Genistein by a Newly-Isolated Human Intestinal Bacterium Eubacterium ramulus Julong 601

  • Wang, Xiu-Ling;Kim, Ki-Tae;Lee, Je-Hyeon;Hur, Hor-Gil;Kim, Su-Il
    • Journal of Microbiology and Biotechnology
    • /
    • 제14권4호
    • /
    • pp.766-771
    • /
    • 2004
  • Julong 601, a Gram-positive anaerobic bacterium strain capable of cleaving the C-ring of isoflavones daidzein and genistein, was isolated from human feces. BLAST search revealed that its complete 16S rDNA gene sequence has 99% similarity to Eubacterium ramulus. Metabolites of daidzein and genistein were determined as O-desmethylangolensin (O-Dma) and 2-(4-hydroxyphenyl) propionic acid (2-HPPA), respectively, based on UV, EI-MS, and $^1H$ and ^{13}C$ NMR spectral analyses. Enantiomers of O-Dma and 2-HPPA were isolated by chiral stationary-phase HPLC (CSP HPLC). Cleavage of the C-ring of daidzein and genistein by strain Julong 601 was highly enantioselective. Specific rotation ([$\alpha]_D$) and circular dichroism (CD) spectra of the enantiomers are reported here for the first time. Biotransformation kinetics of daidzein and genistein indicated that the C-ring of genistein has a higher susceptibility to bacterial degradation than that of daidzein.

대학주도형 기술창업보육센터의 발전방향 - 해외사례연구를 중심으로 - (Development Strateges for University Initiated Technology Business Ineubator)

  • 강병수;오덕성
    • 지역연구
    • /
    • 제11권2호
    • /
    • pp.63-86
    • /
    • 1995
  • One of the innovative and most promising approaches to new high-tech business formation from university is technology business incubators, which attempts to enhance small high-tech start-up firms' chances of survival. To date, there is few comprehensive effort to do a comparative study of technology business incubatiors between European Countries and U.S. to evaluate the impacts of them on regional development. With these consideration in mind this research anlayzed key findings of 6 case studies of university related Technology Business Incubators in the U.K., Germany, and U.S. to explore relationship of university to regional development. These included Cambridge Science Park(CSP) '||'&'||' West of Scotland Science Park in the U.K., Dortmund Technologiezentrum '||'&'||' Berlin Technologiezentrum, and Rensselaer Technology Development Center of the Georgia Institute of Technology in the U.S. The primary objective of this study was to advance our understanding of the impact and utility of technology business incubators and to get some policy implications for the future development in this area in Korea. Among the major question examined hear was "how do they contribute the overall economy of the communities in which they are located\ulcorner". The results of the case study about this question were very positive. The technology business incubators contributed to foster new high-tech small business formation from university, to facilitate the cooperation between university and industry and Incubator tenants created jobs and income, pay taxes, and in doing so, had a multiplier effects on the local economy. The same was true of incubator graduates. With this consideration in mind the university related business regioned development policy in korean local communities.

  • PDF

뉴로피드백 효과에 따른 EEG 기반 BCI 동작 상상 성능 평가 요소별 정확도 비교 (Accuracy Comparison of Motor Imagery Performance Evaluation Factors Using EEG Based Brain Computer Interface by Neurofeedback Effectiveness)

  • 최동학;류연수;이영범;민세동;이명호
    • 대한의용생체공학회:의공학회지
    • /
    • 제32권4호
    • /
    • pp.295-304
    • /
    • 2011
  • In this study, we evaluated the EEG based BCI algorithm using common spatial pattern to find realistic applicability using neurofeedback EEG based BCI algorithm - EEG mode, feature vector calculation, the number of selected channels, 3 types of classifier, window size is evaluated for 10 subjects. The experimental results have been evaluated depending on conditioned experiment whether neurofeedback is used or not In case of using neurofeedback, a few subjects presented exceptional but general tendency presented the performance improvement Through this study, we found a motivation of development for the specific classifier based BCI system and the assessment evaluation system. We proposed a need for an optimized algorithm applicable to the robust motor imagery evaluation system with more useful functionalities.

$\mu$BGA 장기신뢰성에 미치는 언더필영향 (Effect of Underfill on $\mu$BGA Reliability)

  • 고영욱;신영의;김종민
    • 한국마이크로전자및패키징학회:학술대회논문집
    • /
    • 한국마이크로전자및패키징학회 2002년도 춘계 기술심포지움 논문집
    • /
    • pp.138-141
    • /
    • 2002
  • There are continuous efforts in the electronics industry to a reduced electronic package size. Reducing the size of electronic packages can be achieved by a variety of means, and for ball grid array(BGA) packages an effective method is to decrease the pitch between the individual balls. Chip scale package(CSP) and BGA are now one of the major package types. However, a reduced package size has the negative effect of reducing board-level reliability. The reliability concern is for the different thermal expansion rates of the two-substrate materials and how that coefficient CTE mismatch creates added stress to the BGA solder joint when thermal cycled. The point of thermal fatigue in a solder joint is an important factor of BGA packages and knowing at how many thermal cycles can be ran before failure in the solder BGA joint is a must for designing a reliable BGA package. Reliability of the package was one of main issues and underfill was required to improve board-level reliability. By filling between die and substrate, the underfill could enhance the reliability of the device. The effect of underfill on various thermomechanical reliability issues in $\mu$BGA packages is studied in this paper.

  • PDF

Numerical study of performance of soil-steel bridge during soil backfilling

  • Beben, Damian
    • Structural Engineering and Mechanics
    • /
    • 제42권4호
    • /
    • pp.571-587
    • /
    • 2012
  • This paper presents results of a numerical analysis performed on a corrugated steel plate (CSP) bridge during a backfilling process. The analysed bridge structure was a box culvert having a span of 12315 mm as well as a clear height of 3550 mm. Obtained calculation results were compared with the experimental ones. The paper is presented with the application of the Fast Lagrangian Analysis of Continua (FLAC) program based on the finite differences method (FDM) to determine behaviour of the soil-steel bridge structure during backfilling. The assumptions of a computational 2D model of soil-steel structure with a non-linear interface layer are described. Parametric analysis of the interface element is also given in order to receive the most realistic calculation results. The method based on this computational model may be used with large success to design calculations of this specific type of structure instead of the conventional and fairly inaccurate analytical methods. The conclusions drawn from such analysis can be helpful mostly for the assessment of the behaviour of steel-soil bridge structures under loads of backfilling. In consideration of an even more frequent application of this type of structure, conclusions from the conducted analysis can be generalized to a whole class of similar structural bridge solutions.

원전 케이블용 절연재료의 열분석과 등가수명 (Thermal Analysis and Equivalent Lifetime Prediction of Insulation Material for Nuclear Power Cable)

  • 김지연;양종석;박경흠;성백용;방정환;박대희
    • 한국전기전자재료학회논문지
    • /
    • 제29권1호
    • /
    • pp.17-22
    • /
    • 2016
  • The activation energy of a material is an important factor that significantly affects the lifetime and can be used to develop a degradation model. In this study, a thermal analysis was carried out to evaluate and collect quantitative data on the degradation of insulation materials like EPR and CSP used for nuclear power plant cables. The activation energy was determined from the relationship between log ${\beta}$ and 1/T based on the Flynn.Wall.Ozawa method, by a TGA test. The activation energy was also derived from the relationship between ln(t) and 1/T based on isothermal analysis, by an OIT test. The activation energy of EPR derived from thermal analysis was used to calculate the accelerated aging time corresponding to the number of years of use, employing the Arrhenius equation, and determine the elongation corresponding to the accelerated aging time.

한국군 군수품 무응찰 문제 분석 및 정책에 관한 연구 (Korea Militaries's none-bid Products Analysis and future Policy Research)

  • 백원철;신승중
    • 한국인터넷방송통신학회논문지
    • /
    • 제19권2호
    • /
    • pp.193-201
    • /
    • 2019
  • 본 연구는 우리 군의 무기체계 도입 후 체계 업체가 CSP( Concurrent Spare Parts)지원 이후 우리 군이 운용유지 기간 해외에서 도입된 장비의 정비 지원 장비 품목의 해외 상업 구매 시 부품 무응찰 품목 조달 문제에 대한 내부적 요인과 외부적 요인의 각 기관별 수행 과정 및 수행된 사업들을 통해 파악된 노후화된 장비의 해외 부품 조달에 있어 입찰 참여자가 없는 부품의 무응찰 발생의 근본 원인을 보다 정밀하게 파악 및 진단함으로써, 향후 해외 도입 장비의 수리 부속 부품 조달시 부품 소요량 판단을 각 군이 보다 정확하게 소요량, 획득 기점을 예측 함으로 부품의 무응찰 발생률을 줄이고 이로 인한 장비 가동률 저하 문제와 미래의 부품가격 상승을 사전에 예방하고 효율적인 업무를 하기 위한 발전 방향을 제시하는데 그 목적을 둔다.

Two-Pathway Model for Enhancement of Protocol Reverse Engineering

  • Goo, Young-Hoon;Shim, Kyu-Seok;Baek, Ui-Jun;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권11호
    • /
    • pp.4310-4330
    • /
    • 2020
  • With the continuous emergence of new applications and cyberattacks and their frequent updates, the need for automatic protocol reverse engineering is gaining recognition. Although several methods for automatic protocol reverse engineering have been proposed, each method still faces major limitations in extracting clear specifications and in its universal application. In order to overcome such limitations, we propose an automatic protocol reverse engineering method using a two-pathway model based on a contiguous sequential pattern (CSP) algorithm. By using this model, the method can infer both command-oriented protocols and non-command-oriented protocols clearly and in detail. The proposed method infers all the key elements of the protocol, which are syntax, semantics, and finite state machine (FSM), and extracts clear syntax by defining fine-grained field types and three types of format: field format, message format, and flow format. We evaluated the efficacy of the proposed method over two non-command-oriented protocols and three command-oriented protocols: the former are HTTP and DNS, and the latter are FTP, SMTP, and POP3. The experimental results show that this method can reverse engineer with high coverage and correctness rates, more than 98.5% and 99.1% respectively, and be general for both command-oriented and non-command-oriented protocols.

Enhanced Privacy Preservation of Cloud Data by using ElGamal Elliptic Curve (EGEC) Homomorphic Encryption Scheme

  • vedaraj, M.;Ezhumalai, P.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권11호
    • /
    • pp.4522-4536
    • /
    • 2020
  • Nowadays, cloud is the fastest emerging technology in the IT industry. We can store and retrieve data from the cloud. The most frequently occurring problems in the cloud are security and privacy preservation of data. For improving its security, secret information must be protected from various illegal accesses. Numerous traditional cryptography algorithms have been used to increase the privacy in preserving cloud data. Still, there are some problems in privacy protection because of its reduced security. Thus, this article proposes an ElGamal Elliptic Curve (EGEC) Homomorphic encryption scheme for safeguarding the confidentiality of data stored in a cloud. The Users who hold a data can encipher the input data using the proposed EGEC encryption scheme. The homomorphic operations are computed on encrypted data. Whenever user sends data access permission requests to the cloud data storage. The Cloud Service Provider (CSP) validates the user access policy and provides the encrypted data to the user. ElGamal Elliptic Curve (EGEC) decryption was used to generate an original input data. The proposed EGEC homomorphic encryption scheme can be tested using different performance metrics such as execution time, encryption time, decryption time, memory usage, encryption throughput, and decryption throughput. However, efficacy of the ElGamal Elliptic Curve (EGEC) Homomorphic Encryption approach is explained by the comparison study of conventional approaches.

Long-Term Container Allocation via Optimized Task Scheduling Through Deep Learning (OTS-DL) And High-Level Security

  • Muthakshi S;Mahesh K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권4호
    • /
    • pp.1258-1275
    • /
    • 2023
  • Cloud computing is a new technology that has adapted to the traditional way of service providing. Service providers are responsible for managing the allocation of resources. Selecting suitable containers and bandwidth for job scheduling has been a challenging task for the service providers. There are several existing systems that have introduced many algorithms for resource allocation. To overcome these challenges, the proposed system introduces an Optimized Task Scheduling Algorithm with Deep Learning (OTS-DL). When a job is assigned to a Cloud Service Provider (CSP), the containers are allocated automatically. The article segregates the containers as' Long-Term Container (LTC)' and 'Short-Term Container (STC)' for resource allocation. The system leverages an 'Optimized Task Scheduling Algorithm' to maximize the resource utilisation that initially inquires for micro-task and macro-task dependencies. The bottleneck task is chosen and acted upon accordingly. Further, the system initializes a 'Deep Learning' (DL) for implementing all the progressive steps of job scheduling in the cloud. Further, to overcome container attacks and errors, the system formulates a Container Convergence (Fault Tolerance) theory with high-level security. The results demonstrate that the used optimization algorithm is more effective for implementing a complete resource allocation and solving the large-scale optimization problem of resource allocation and security issues.