• Title/Summary/Keyword: library 4.0

Search Result 643, Processing Time 0.022 seconds

Discovery of Chitin Deacetylase Inhibitors through Structure-Based Virtual Screening and Biological Assays

  • Liu, Yaodong;Ahmed, Sibtain;Fang, Yaowei;Chen, Meng;An, Jia;Yang, Guang;Hou, Xiaoyue;Lu, Jing;Ye, Qinwen;Zhu, Rongjun;Liu, Qitong;Liu, Shu
    • Journal of Microbiology and Biotechnology
    • /
    • v.32 no.4
    • /
    • pp.504-513
    • /
    • 2022
  • Chitin deacetylase (CDA) inhibitors were developed as novel antifungal agents because CDA participates in critical fungal physiological and metabolic processes and increases virulence in soil-borne fungal pathogens. However, few CDA inhibitors have been reported. In this study, 150 candidate CDA inhibitors were selected from the commercial Chemdiv compound library through structure-based virtual screening. The top-ranked 25 compounds were further evaluated for biological activity. The compound J075-4187 had an IC50 of 4.24 ± 0.16 µM for AnCDA. Molecular docking calculations predicted that compound J075-4187 binds to the amino acid residues, including active sites (H101, D48). Furthermore, compound J075-4187 inhibited food spoilage fungi and plant pathogenic fungi, with minimum inhibitory concentration (MIC) at 260 ㎍/ml and minimum fungicidal concentration (MFC) at 520 ㎍/ml. Therefore, compound J075-4187 is a good candidate for use in developing antifungal agents for fungi control.

Prediction of East Asian Brain Age using Machine Learning Algorithms Trained With Community-based Healthy Brain MRI

  • Chanda Simfukwe;Young Chul Youn
    • Dementia and Neurocognitive Disorders
    • /
    • v.21 no.4
    • /
    • pp.138-146
    • /
    • 2022
  • Background and Purpose: Magnetic resonance imaging (MRI) helps with brain development analysis and disease diagnosis. Brain volumes measured from different ages using MRI provides useful information in clinical evaluation and research. Therefore, we trained machine learning models that predict the brain age gap of healthy subjects in the East Asian population using T1 brain MRI volume images. Methods: In total, 154 T1-weighted MRIs of healthy subjects (55-83 years of age) were collected from an East Asian community. The information of age, gender, and education level was collected for each participant. The MRIs of the participants were preprocessed using FreeSurfer(https://surfer.nmr.mgh.harvard.edu/) to collect the brain volume data. We trained the models using different supervised machine learning regression algorithms from the scikit-learn (https://scikit-learn.org/) library. Results: The trained models comprised 19 features that had been reduced from 55 brain volume labels. The algorithm BayesianRidge (BR) achieved a mean absolute error (MAE) and r squared (R2) of 3 and 0.3 years, respectively, in predicting the age of the new subjects compared to other regression methods. The results of feature importance analysis showed that the right pallidum, white matter hypointensities on T1-MRI scans, and left hippocampus comprise some of the essential features in predicting brain age. Conclusions: The MAE and R2 accuracies of the BR model predicting brain age gap in the East Asian population showed that the model could reduce the dimensionality of neuroimaging data to provide a meaningful biomarker for individual brain aging.

A Unified ARIA-AES Cryptographic Processor Supporting Four Modes of Operation and 128/256-bit Key Lengths (4가지 운영모드와 128/256-비트 키 길이를 지원하는 ARIA-AES 통합 암호 프로세서)

  • Kim, Ki-Bbeum;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.795-803
    • /
    • 2017
  • This paper describes a dual-standard cryptographic processor that efficiently integrates two block ciphers ARIA and AES into a unified hardware. The ARIA-AES crypto-processor was designed to support 128-b and 256-b key sizes, as well as four modes of operation including ECB, CBC, OFB, and CTR. Based on the common characteristics of ARIA and AES algorithms, our design was optimized by sharing hardware resources in substitution layer and in diffusion layer. It has on-the-fly key scheduler to process consecutive blocks of plaintext/ciphertext without reloading key. The ARIA-AES crypto-processor that was implemented with a $0.18{\mu}m$ CMOS cell library occupies 54,658 gate equivalents (GEs), and it can operate up to 95 MHz clock frequency. The estimated throughputs at 80 MHz clock frequency are 787 Mbps, 602 Mbps for ARIA with key size of 128-b, 256-b, respectively. In AES mode, it has throughputs of 930 Mbps, 682 Mbps for key size of 128-b, 256-b, respectively. The dual-standard crypto-processor was verified by FPGA implementation using Virtex5 device.

Systematic Analysis of Microbial Contamination in Leaf and Stem Products in Korea (Systematic analysis 방법을 이용한 국내 엽경채류 농산물의 미생물학적 오염도 분석)

  • Sung, Seung-Mi;Min, Ji-Hyeon;Kim, Hyun Jung;Yoon, Ki-Sun;Lee, Jong-Kyung
    • Journal of Food Hygiene and Safety
    • /
    • v.32 no.4
    • /
    • pp.306-313
    • /
    • 2017
  • This study systemically analyzed the data on the microbial levels in fresh vegetables in Korea to identify the points to control. We scanned the studies published between 2001 and 2015 in peer-reviewed research papers on the microbial levels in fresh vegetables produced in Korea. Plant products were categorized by using the US IFSAC (Interagency Food Safety Analytics Collaboration) category. The most consumed, the non-heat treated, the epidemiological foodborne diseases sources of fresh vegetable in foodservice (KCDC data) were identified by literature review. Articles were screened using National Digital Science Library (NDSL) search engine regarding to microbial hazards in plant products. Based on the total plate count number and coliforms on the 89 data cases from 26 published articles, the total plate count number was high in the order of sprouts, leaf and stem, bulbs and roots, vine-grown, solanaceous, melons, and pome. Escherichia coli was frequently detected in leaf and stem and sprouts products. Focused on the microbial data of leek, lettuce and cabbage, the levels of total plate count, coliforms and Bacillus cereus showed the levels of 4.15~7.69 log CFU/g, 1~6.99 log CFU/g, and 0.51~3.9 log CFU/g, respectively, by 33 published papers. The levels of environmental factors affecting the microbial safety of lettuce and leek before harvest were investigated. Manure, soil, hands, scale, gloves were the major potential microbial contamination points to control. In addition, GAP (good agricultural practice), microbial testing, and improvement of irrigation methods are required to provide the safer fresh produce.

Fast RSA Montgomery Multiplier and Its Hardware Architecture (고속 RSA 하드웨어 곱셈 연산과 하드웨어 구조)

  • Chang, Nam-Su;Lim, Dae-Sung;Ji, Sung-Yeon;Yoon, Suk-Bong;Kim, Chang-Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.11-20
    • /
    • 2007
  • A fast Montgomery multiplication occupies important to the design of RSA cryptosystem. Montgomery multiplication consists of two addition, which calculates using CSA or RBA. In terms of CSA, the multiplier is implemented using 4-2 CSA o. 5-2 CSA. In terms of RBA, the multiplier is designed based on redundant binary system. In [1], A new redundant binary adder that performs the addition between two binary signed-digit numbers and apply to Montgomery multiplier was proposed. In this paper, we reconstruct the logic structure of the RBA in [1] for reducing time and space complexity. Especially, the proposed RB multiplier has no coupler like the RBA in [1]. And the proposed RB multiplier is suited to binary exponentiation as modified input and output forms. We simulate to the proposed NRBA using gates provided from SAMSUNG STD130 $0.18{\mu}m$ 1.8V CMOS Standard Cell Library. The result is smaller by 18.5%, 6.3% and faster by 25.24%, 14% than 4-2 CSA, existing RBA, respectively. And Especially, the result is smaller by 44.3% and faster by 2.8% than the RBA in [1].

Implementation of RSA modular exponentiator using Division Chain (나눗셈 체인을 이용한 RSA 모듈로 멱승기의 구현)

  • 김성두;정용진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.21-34
    • /
    • 2002
  • In this paper we propos a new hardware architecture of modular exponentiation using a division chain method which has been proposed in (2). Modular exponentiation using the division chain is performed by receding an exponent E as a mixed form of multiplication and addition with divisors d=2 or $d=2^I +1$ and respective remainders r. This calculates the modular exponentiation in about $1.4log_2$E multiplications on average which is much less iterations than $2log_2$E of conventional Binary Method. We designed a linear systolic array multiplier with pipelining and used a horizontal projection on its data dependence graph. So, for k-bit key, two k-bit data frames can be inputted simultaneously and two modular multipliers, each consisting of k/2+3 PE(Processing Element)s, can operate in parallel to accomplish 100% throughput. We propose a new encoding scheme to represent divisors and remainders of the division chain to keep regularity of the data path. When it is synthesized to ASIC using Samsung 0.5 um CMOS standard cell library, the critical path delay is 4.24ns, and resulting performance is estimated to be abort 140 Kbps for a 1024-bit data frame at 200Mhz clock In decryption process, the speed can be enhanced to 560kbps by using CRT(Chinese Remainder Theorem). Futhermore, to satisfy real time requirements we can choose small public exponent E, such as 3,17 or $2^{16} +1$, in encryption and verification process. in which case the performance can reach 7.3Mbps.

Q Analyses of the Structure of Internet Bookstore Users' Subjectivity (인터넷 서점 이용자의 주관성에 관한 Q분석)

  • Jung Huyn-Wook;Kang Hye-Young;Kim Sun-nam
    • Journal of Korean Library and Information Science Society
    • /
    • v.36 no.2
    • /
    • pp.197-220
    • /
    • 2005
  • This paper examined the structure of internet bookstore users' subjectivity by focusing on their beliefs, values and attitudes.0 methodology was utilized for the study. After constituting 36 Q sample and 28 P sample, data were collect from April 15, 2005 to April 22 2005. The analyses showed 3 types of subjectivity structures. The first one was 'the economic benefit-seeking type.' Those in this type were motivated to use internet bookstores to achieve economic benefits. They paid more attention to the Prices discounted than the web site contents provided by internet bookstores. This type was conspicuously found among college students. The second one was the 'information-seeking type.' People in this category made visits to internet bookstores in order to obtain new information or professional materials. This type was dominantly found among women. The third one was the 'convenience-seeking type.' Those in this type were concerned not only with the accessibility and convenience, but also with such practical issues as delivery, price, applicability, payment, and bonus. This type was conspicuously observed among white collar workers. These findings suggests that in order to make internet bookstores more attractive to users, it is demanded to understand various needs held by users and map out sophisticated marketing strategies on the basis of such a knowledge.

  • PDF

An An.0, pproach to the Reorganization of University Libraries in the 21st Century

  • 홍현진;이병목
    • Journal of Korean Library and Information Science Society
    • /
    • v.29
    • /
    • pp.443-464
    • /
    • 1998
  • 21세기를 맞이하여 대학도서관은 정보기술의 도입, 업무내용의 변화, 이용자의 요구변화등 급격하게 변화하는 새로운 환경에 직면해 있다. 본 연구는 한국의 대학도서관 조직구조의 현황에 대한 분석과 함께 다양한 조직이론들과 정보환경의 변화에 기초해서 도서관조직을 활성화시키기위한 개념적인 조직모델을 제시하고자 한다. 한국의 대학도서관은 거의 10년동안 법적인 제약과 조직내외의 환경적인 한계 등으로 인해 전산화시스템의 도입, 도서관부관장의 임명, 그리고 도서관과 컴퓨터 센터와의 통합시도와 같은 약간의 변화외에는 거의 변화가 없었다. 전형적인 한국의 대학도서관은 수서, 기술서비스, 열람과 참고봉사 부문으로 조직되었다. 여기서 수서 기능을 기술서비스의 부문으로 간주한다면, 본 연구의 대상인 대학도서관 114개관 중 95개관(82.5%)이 전통적인 도서관조직의 형태인 기술서비스와 공공서비스 부문으로 조직된 것으로 나타났다. 본 연구에서는 전통적인 도서관조직의 문제점들을 급복할 수 있는 21세기의 개념적인 대학도서관 조직모델로서, 네가지 부문 - 서비스 부문, 서비스지원 부문, 기술지원 부문, 그리고 통합·조정부문-을 대학도서관의 개념적인 기본 구성요소로써 제안하였다. 그러나 모든 도서관의 서비스나 업무과정에 대해 적합한 잉상적인 조직구조는 없으며, 조직의 재조직과정은 도서관의 형태와 목적, 업무과정에 따라 매우 다양하다. 따라서 도서관의 재조직화는 환경의 변화에 따라 끊임없는 과정이 될 것이며, 도서관조직의 성공은 이러한 변화에 적응할 수 있는 개인과 조직의 역량에 달려있다고 하겠다.대한 순서에 있어서 차이가 있다. 4) 도서관에 대한 태도에 있어서 두 집단은 상이한 입장을 보이고 있다. 학자들의 과반수는 중요 정보원으로서 자신의 개인장서를 활용하며, 도서관의 장서 및 그 조직방법에 대해서도 별로 만족하지를 못하고 있다. 반면에, 실무가들은 도서관에 대하여 비교적 만족하며 따라서 도서관에 대한 이용도도 높다. 5) 두 집단 모두 보조인을 적극적으로 활용하지 않으며 사서의 도움을 받는 경우도 극소수에 불과하다. 이러한 조사결과를 기초로 하여 볼 때 법률전문직을 둘러싼 정보환경을 개선하기 위하여는, 인쇄된 일차적 정보자료의 검색방법등을 개선하고, 나아가서는 법령과 판례정보를 위한 효율적인 시스템을 구축하며, 뿐만 아니라 이용자의 요구에 충분히 대처할 수 잇는 도서관으로 변화되는 것이다. 이와 함께 가장 중요한 것은 법과대학과 사법연수원에서 법학 연구방법에 관한 강좌를 개설하여 각종 법률정보원의 활용 내지 도서관 이용방법에 관하여 교육하는 것이다.글을 연구하고, 그 결과에 의존하여서 우리의 실제의 생활에 사용하는 $\boxDr$한국어사전$\boxUl$등을 만드는 과정에서, 어떤 의미에서 실험되었다고 말할 수가 있는 언어과학의 연구의 결과에 의존하여서 수행되는 철학적인 작업이다. 여기에서는 하나의 철학적인 연구의 시작으로 받아들여지는 이 의미분석의 문제를 반성하여 본다. 것이 필요하다고 사료된다.크기에 의존하며, 또한 이러한 영향은 $(Ti_{1-x}AI_{x})N$ 피막에 존재하는 AI의 함량이 높고, 초기에

  • PDF

Selection of Vaccinia Virus-Neutralizing Antibody from a Phage-Display Human-Antibody Library

  • Shin, Yong Won;Chang, Ki-Hwan;Hong, Gwang-Won;Yeo, Sang-Gu;Jee, Youngmee;Kim, Jong-Hyun;Oh, Myoung-don;Cho, Dong-Hyung;Kim, Se-Ho
    • Journal of Microbiology and Biotechnology
    • /
    • v.29 no.4
    • /
    • pp.651-657
    • /
    • 2019
  • Although smallpox was eradicated in 1980, it is still considered a potential agent of biowarfare and bioterrorism. Smallpox has the potential for high mortality rates along with a major public health impact, eventually causing public panic and social disruption. Passive administration of neutralizing monoclonal antibodies (mAbs) is an effective intervention for various adverse reactions caused by vaccination and the unpredictable nature of emerging and bioterrorist-related infections. Currently, vaccinia immune globulin (VIG) is manufactured from vaccinia vaccine-boosted plasma; however, this production method is not ideal because of its limited availability, low specific activity, and risk of contamination with blood-borne infectious agents. To overcome the limitations of VIG production from human plasma, we isolated two human single-chain variable fragments (scFvs), (SC34 and SC212), bound to vaccinia virus (VACV), from a scFv phage library constructed from the B cells of VACV vaccine-boosted volunteers. The scFvs were converted to human IgG1 (VC34 and VC212). These two anti-VACV mAbs were produced in Chinese Hamster Ovary (CHO) DG44 cells. The binding affinities of VC34 and VC212 were estimated by competition ELISA to $IC_{50}$ values of $2{\mu}g/ml$ (13.33 nM) and $22{\mu}g/ml$ (146.67 nM), respectively. Only the VC212 mAb was proven to neutralize the VACV, as evidenced by the plaque reduction neutralization test (PRNT) result with a $PRNT_{50}$ of ~0.16 mg/ml (${\sim}1.07{\mu}M$). This VC212 could serve as a valuable starting material for further development of VACV-neutralizing human immunoglobulin for a prophylactic measure against post-vaccination complications and for post-exposure treatment against smallpox.

Microbial Diversity of the Trichloroethylene Contaminated Groundwater Treatment System and Characterization of Pseudomonas sp. DHC8 (Trichloroethylene으로 오염된 지하수 제거공정의 미생물 다양성 및 분리균주 Pseudomonas sp. DHC8의 특성)

  • Nam, Ji-Hyun;Shin, Ji-Hye;Kwon, Kiwook;Bae, Wookeun;Lee, Dong-Hun
    • Korean Journal of Microbiology
    • /
    • v.49 no.4
    • /
    • pp.336-342
    • /
    • 2013
  • Trichloroethylene (TCE) is a widely used substance in commercial and industrial applications, yet it must be removed from the contaminated soil and groundwater environment due to its toxic and carcinogenic nature. We investigated bacterial community structure, dominant bacterial strain, and removal efficiency in a TCE contaminated groundwater treatment system using immobilized carrier. The microbial diversity was determined by the nucleotide sequences of 16S rRNA gene library. The major bacterial population of the contaminated groundwater treatment system was belonging to BTEX degradation bacteria. The bacterial community consisted mainly of one genus of Pseudomonas (Pseudomonas putida group). The domination of Pseudomonas putida group may be caused by high concentration of toluene and TCE. Furthermore, we isolated a toluene and TCE degrading bacterium, named Pseudomonas sp. DHC8, from the immobilized carrier in bioreactor which was designed to remove TCE from the contaminated ground water. Based on the results of morphological and physiological characteristics, and 16S rRNA gene sequence analysis, strain DHC8 was identified as a member of Pseudomonas putida group. When TCE (0.83 mg/L) and toluene (60.61 mg/L) were degraded by this strain, removal efficiencies were 72.3% and 100% for 12.5 h, respectively. Toluene removal rate was 2.89 ${\mu}mol/g$-DCW/h and TCE removal rate was 0.02 ${\mu}mol/g$-DCW/h. These findings will be helpful for maintaining maximum TCE removal efficiency of a reactor for bioremediation of TCE.