• 제목/요약/키워드: key for identification

검색결과 936건 처리시간 0.027초

Improved Methodology for Identification of Cryptomonads: Combining Light Microscopy and PCR Amplification

  • Xia, Shuang;Cheng, Yingyin;Zhu, Huan;Liu, Guoxiang;Hu, Zhengyu
    • Journal of Microbiology and Biotechnology
    • /
    • 제23권3호
    • /
    • pp.289-296
    • /
    • 2013
  • Cryptomonads are unicellular, biflagellate algae. Generally, cryptomonad cells cannot be preserved well because of their fragile nature, and an improved methodology should be developed to identify cryptomonads from natural habitats. In this study, we tried using several cytological fixatives, including glutaraldehyde, formaldehyde, and their combinations to preserve field samples collected from various waters, and the currently used fixative, Lugol's solution was tested for comparison. Results showed that among the fixatives tested, glutaraldehyde preserved the samples best, and the optimal concentration of glutaraldehyde was 2%. The cell morphology was well preserved by glutaraldehyde. Cells kept their original color, volume, and shape, and important taxonomic features such as furrow/gullet complex, ejectosomes, as well as flagella could be observed clearly, whereas these organelles frequently disappeared in Lugol's solution preserved samples. The osmotic adjustments and buffers tested could not preserve cell density significantly higher. Statistical calculation showed the cell density in the samples preserved by 2% glutaraldehyde remained stable after 43 days of the fixation procedure. In addition, DNA was extracted from glutaraldehyde preserved samples by grinding with liquid nitrogen and the 18S rDNA sequence was amplified by PCR. The sequence was virtually identical to the reference sequence, and phylogenetic analyses showed very close relationship between it and sequences from the same organism. To sum up, the present study demonstrated that 2% unbuffered glutaraldehyde, without osmotic adjustments, can preserve cryptomonads cells for identification, in terms of both light microscopy and phylogenetic analyses based on DNA sequences.

Identification of Amino Acid Residues Involved in the Interaction between Measles Virus Haemagglutin (MVH) and Its Human Cell Receptor(Signaling Lymphocyte Activation Molecule, SLAM)

  • Xu, Qin;Zhang, Peng;Hu, Chunling;Liu, Xin;Qi, Yipeng;Liu, Yingle
    • BMB Reports
    • /
    • 제39권4호
    • /
    • pp.406-411
    • /
    • 2006
  • Signaling lymphocyte activation molecule (SLAM; also known as CD150) is a newly identified cellular receptor for measles virus (MV). The interaction between MV Haemagglutin (MVH) and SLAM is an initial step for MV entry. We have identified several novel SLAM binding sites at residues S429, T436 and H437 of MVH protein and MVH mutants in these residues dramatically decrease the ability to interaction with the cell surface SLAM and fail to co-precipitation with SLAM in vivo as well as malfunction in syncytium formation. At the same time, K58, S59 and H61 of SLAM was also identified to be critical for MVH and SLAM binding. Further, these residues may be useful targets for the development of measles therapy.

Multi-stage approach for structural damage identification using particle swarm optimization

  • Tang, H.;Zhang, W.;Xie, L.;Xue, S.
    • Smart Structures and Systems
    • /
    • 제11권1호
    • /
    • pp.69-86
    • /
    • 2013
  • An efficient methodology using static test data and changes in natural frequencies is proposed to identify the damages in structural systems. The methodology consists of two main stages. In the first stage, the Damage Signal Match (DSM) technique is employed to quickly identify the most potentially damaged elements so as to reduce the number of the solution space (solution parameters). In the second stage, a particle swarm optimization (PSO) approach is presented to accurately determine the actual damage extents using the first stage results. One numerical case study by using a planar truss and one experimental case study by using a full-scale steel truss structure are used to verify the proposed hybrid method. The identification results show that the proposed methodology can identify the location and severity of damage with a reasonable level of accuracy, even when practical considerations limit the number of measurements to only a few for a complex structure.

RFID 군 적용방안 연구 (A Study on the Implementation of RFID for Korean Defense)

  • 이재열;김성원;최상영
    • 한국국방경영분석학회지
    • /
    • 제31권1호
    • /
    • pp.58-72
    • /
    • 2005
  • RFID(Radio Frequency Identification) is one of key technologies in ubiquitous computing. RFID system comprises tag, reader, and computer application. The tag is a small electronic chip, which is attached to a thing such as item, pallet, container. The reader has an tiny antenna obtaining the identification information of the things by radio frequency, and provides the information to the computer application for a business. In this paper we have proposed the military application of RFID and its implementation policy for the Korean armed forces. We believe that The principle application area would be logistics TAV(total asset visibility) and resource management, and the implementation should be achieved step by step considering the advancement of RFID technology and government policy.

CGH와 위상 마스크를 이용한 영상 보안 및 개인 인증 (Image Security and Personal Identification using CGH and Phase Mask)

  • 김종윤;박세준;김종찬;김철수;조웅호;김수중
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 1999년도 하계종합학술대회 논문집
    • /
    • pp.958-961
    • /
    • 1999
  • A new image encoding and identification scheme is proposed for security verification by using CGH(computer generated hologram), random phase mask, and correlation technique. The encrypted image, which is attached to the security product, is made by multiplying QPH(quadratic phase hologram) using SA(simulated annealing) algorithm with a random phase function. The random phase function plays a role of key when the encrypted image is decrypted. The encrypted image could be optically recovered by 2-f system and automatically verified for personal identification. Simulation results show the proposed method cand be used for the reconstruction and the recognition of the encrypted. Image.

  • PDF

PROBLEMS AND SOLUTION OF IDENTIFICATION AND APPROVAL OF PRIVATELY FINANCED INFRASTRUCTURE PROJECTS IN CHINA

  • Xiangrong Du;Tsunemi Watanabe
    • 국제학술발표논문집
    • /
    • The 1th International Conference on Construction Engineering and Project Management
    • /
    • pp.731-736
    • /
    • 2005
  • The governmental attitude toward private investment and financing for infrastructure projects has changed from the initial prohibition to the current encouragement in China, which has been embodied in the legal documents and administrative process. However, the problem of identification, bidding, and approval procedure for privately financed infrastructure projects has been observed in policies and administrative measures promulgated by different or even the same government branches, which is prohibitive factors for smooth project implementation. After analysis of the identification, bidding, and approval process of infrastructure projects, the authors proposed a simplified and alternative procedure and clarified the key points of relevant project documents.

  • PDF

해양사고의 새로운 위기요소 식별에 관한 기초 연구 (Research on the Unidentified Risk Factors of Maritime Accidents)

  • 양시일;정재용;임정빈
    • 한국항해항만학회:학술대회논문집
    • /
    • 한국항해항만학회 2015년도 춘계학술대회
    • /
    • pp.236-238
    • /
    • 2015
  • 해상환경 변화와 과학기술 발전 등에 따라 기존에 알지 못하던 미식별 위기가 새롭게 창출되고 있다. 새로운 위기는 새로운 해양사고를 야기하기 때문에 이를 조기에 인지하지 못하면 해양사고는 지속 발생할 수밖에 없다. 따라서 미 식별된 또는 새로운 위기요소의 식별은 해양사고 예방에 중요하다. 그리고 많은 나라에서 다양한 해양사고 분석 기법과 모델들을 사용하여 해양사고를 줄이기 위해 노력하고 있는데, 해양사고 모델 개발을 위해서는 앞으로 발생할 수 있는 위기요소들에 대한 식별 및 분류도 필요하다. 이 연구에서는 기존의 식별된 위기요소와 새로운 위기요소 식별에 관하여 기초 조사하였다.

  • PDF

영상데이터의 개인정보 영역에 대한 인공지능 기반 비식별화 기법 연구 (Research on Artificial Intelligence Based De-identification Technique of Personal Information Area at Video Data)

  • 송인준;김차종
    • 대한임베디드공학회논문지
    • /
    • 제19권1호
    • /
    • pp.19-25
    • /
    • 2024
  • This paper proposes an artificial intelligence-based personal information area object detection optimization method in an embedded system to de-identify personal information in video data. As an object detection optimization method, first, in order to increase the detection rate for personal information areas when detecting objects, a gyro sensor is used to collect the shooting angle of the image data when acquiring the image, and the image data is converted into a horizontal image through the collected shooting angle. Based on this, each learning model was created according to changes in the size of the image resolution of the learning data and changes in the learning method of the learning engine, and the effectiveness of the optimal learning model was selected and evaluated through an experimental method. As a de-identification method, a shuffling-based masking method was used, and double-key-based encryption of the masking information was used to prevent restoration by others. In order to reuse the original image, the original image could be restored through a security key. Through this, we were able to secure security for high personal information areas and improve usability through original image restoration. The research results of this paper are expected to contribute to industrial use of data without personal information leakage and to reducing the cost of personal information protection in industrial fields using video through de-identification of personal information areas included in video data.

A hybrid-separate strategy for force identification of the nonlinear structure under impact excitation

  • Jinsong Yang;Jie Liu;Jingsong Xie
    • Structural Engineering and Mechanics
    • /
    • 제85권1호
    • /
    • pp.119-133
    • /
    • 2023
  • Impact event is the key factor influencing the operational state of the mechanical equipment. Additionally, nonlinear factors existing in the complex mechanical equipment which are currently attracting more and more attention. Therefore, this paper proposes a novel hybrid-separate identification strategy to solve the force identification problem of the nonlinear structure under impact excitation. The 'hybrid' means that the identification strategy contains both l1-norm (sparse) and l2-norm regularization methods. The 'separate' means that the nonlinear response part only generated by nonlinear force needs to be separated from measured response. First, the state-of-the-art two-step iterative shrinkage/thresholding (TwIST) algorithm and sparse representation with the cubic B-spline function are developed to solve established normalized sparse regularization model to identify the accurate impact force and accurate peak value of the nonlinear force. Then, the identified impact force is substituted into the nonlinear response separation equation to obtain the nonlinear response part. Finally, a reduced transfer equation is established and solved by the classical Tikhonove regularization method to obtain the wave profile (variation trend) of the nonlinear force. Numerical and experimental identification results demonstrate that the novel hybrid-separate strategy can accurately and efficiently obtain the nonlinear force and impact force for the nonlinear structure.

비만(肥滿) 변증 연구에 대한 고찰(국내 연구 중심으로) (The Review on the Study of Oriental Obesity Pattern Identification: Focused on Korean Research Papers)

  • 박원형;차윤엽;송윤경;박태용;김호준;정원석;황의형;신승우;장보형;고성규
    • 한방재활의학과학회지
    • /
    • 제24권2호
    • /
    • pp.83-93
    • /
    • 2014
  • Objectives The aim of this study is to analyse research trends about oriental obesity pattern identification in Korea. Methods We searched the papers with key words of 'obesity' and 'Pattern identification', 'Syndrom differentiation' in Korean database (Korean traditional knowledge portal, KISS, NDSL, DBPIA, KMBASE, Journal of Korean Medicine Rehabilitation, Journal of Korean Medicine for Obesity Research). We classified the papers by year and content. Results We reviewed 28 searched papers. Papers were published between 1992 and 2012. More than half of the total papers were published since 2008. There are 5 studies that focus on development and improvement of oriental obesity pattern identification questionnaire. 9 studies are research about using oriental obesity pattern identification questionnaire. 7 studies are research about Type of oriental obesity pattern identification. 4 studies are literature review of oriental obesity pattern identification. Other studies related to oriental obesity pattern identification are three. Conclusions To improve application and objectification about oriental obesity pattern identification, more clinical and oriental obesity pattern identification questionnaire studies are needed.