• Title/Summary/Keyword: scrambling

Search Result 146, Processing Time 0.027 seconds

CoMFA Analyses on the Fungicidal Activity with N-phenylbenzensulfonamide Analogues against Gray Mold (Botrytis cinerea) (잿빛곰팡이균(Botrytis cinerea)에 대한 N-phenylbenzenesulfonamide 유도체들의 살균활성에 관한 CoMFA 분석)

  • Hwang, Tae-Yeon;Kang, Kyu-Young;Sung, Nack-Do
    • The Korean Journal of Pesticide Science
    • /
    • v.12 no.2
    • /
    • pp.111-117
    • /
    • 2008
  • The comparative molecular field analysis (CoMFA) for the fungicidal activity with N-phenylbenzenesulfonamide analogues (1-45) against gray mold (Botriyts cinerea) were studied quantitatively. The statistical values of CoMFA models had much better predictability and fitness than those of comparative molecular similarity indices analysis (CoMSIA) models. The statistical values of the optimized CoMFA I model were predictablity, $r^2_{cv.}(or\;q^2)=0.457$ and correlation coefficient, $r^2_{ncv.}=0.959$, and their fungicidal activity was dependent on the steric field (52%) and electrostatic field (35.6%) of the substrate molecules. And also, it was found that the optimized CoMFA I model with the sensitivity to perturbation ($d_q^{2'}/dr^2_{yy'}=0.898$) and prediction ($q^2=0.346$ & SDEP=0.614) produced by a progressive scrambling analysis was not dependent on chance correlation. From the results of graphical analyses on the contour maps with the optimized CoMFA I model, it is expected that the $R_3$ and $R_4$-substituents on the N-phenyl ring as steric favor group and para-substituents ($R_1$) on the S-phenyl ring as steric disfavor group will contribute to the fungicidal activity. Therefore, the optimized CoMFA I model should be applicable to the prediction of the fungicidal activities against gray mold.

Consideration of Roman Character in KS × 1001 Code System for Information Interchange considered AMI/HDB-3 and HDLC FLAG (AMI/HDB-3 회선부호화 및 HDLC FLAG를 고려한 KS × 1001 정보 교환용 로마문자 부호체계고찰)

  • Hong, Wan-Pyo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.7
    • /
    • pp.1017-1023
    • /
    • 2013
  • Datacommunications transmit the source codes that are coded in information devices, such as computer to the transmission line by means of the line coded signal. AMI method is applied to the line coding method to transmit the signal for long distance. The disadvantage of the AMI method is to loss the bit synchronization when consecutive binary bit '0' over 4ea is coming into line coder. The scrambling technique is used to overcome the problem. The HDB-3 scrambling method is used in Korea standard which standard in ITU-T. When the HDB-3 technology is used. the method should convert the consecutive bit '0' over 4ea to certain bits format. As a result, when there are many such kind of '0' bit stream in source codes, data transmission efficiency will be decreased to treat in line coder, etc. This paper is directed to study the Roman character code system in $KS{\times}1001$, Korea standard for information exchange code in datacommunication systems. Based on the study result, this paper proposed the maximum optimized Roman character code system. In the study, Character coding rule for $4{\times}4$bits and the statistical data for roman character using frequency were considered to simulate. The paper shows the result that when the proposed new roman character coding system is applied to use, the data transmission efficiency could be increased to about 134% compared to existing code system.

Prediction of golf scores on the PGA tour using statistical models (PGA 투어의 골프 스코어 예측 및 분석)

  • Lim, Jungeun;Lim, Youngin;Song, Jongwoo
    • The Korean Journal of Applied Statistics
    • /
    • v.30 no.1
    • /
    • pp.41-55
    • /
    • 2017
  • This study predicts the average scores of top 150 PGA golf players on 132 PGA Tour tournaments (2013-2015) using data mining techniques and statistical analysis. This study also aims to predict the Top 10 and Top 25 best players in 4 different playoffs. Linear and nonlinear regression methods were used to predict average scores. Stepwise regression, all best subset, LASSO, ridge regression and principal component regression were used for the linear regression method. Tree, bagging, gradient boosting, neural network, random forests and KNN were used for nonlinear regression method. We found that the average score increases as fairway firmness or green height or average maximum wind speed increases. We also found that the average score decreases as the number of one-putts or scrambling variable or longest driving distance increases. All 11 different models have low prediction error when predicting the average scores of PGA Tournaments in 2015 which is not included in the training set. However, the performances of Bagging and Random Forest models are the best among all models and these two models have the highest prediction accuracy when predicting the Top 10 and Top 25 best players in 4 different playoffs.

Enhanced Image Encryption Scheme using Context Adaptive Variable Length Coding (적응 산술 부호화를 이용한 고화질 영상 암호화 전략)

  • Shim, Gab-Yong;Lee, Malrey
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.119-126
    • /
    • 2013
  • Achieve real-time encryption and video data transcoding, current video encryption methods usually integrate encryption algorithm with video compression course. This paper is devoted to discussing the video encryption technology, by encrypting to avoid unauthorized person getting video data. This paper studied the H.264 entropy coding and proposed of CAVLC video encryption scheme which is combined with the process of entropy coding of H.264 CAVLC encryption scheme. Three encryption levels are proposed. In addition, a scrambling method is also proposed which makes the encrypted frames more robust in anti crack. This method showed more robust video data encryption function and compressive rate.

A CoMFA Study of Glycogen Synthase Kinase 3 Inhibitors

  • Balupuri, Anand;Balasubramanian, Pavithra K.;Cho, Seung Joo
    • Journal of Integrative Natural Science
    • /
    • v.8 no.1
    • /
    • pp.40-47
    • /
    • 2015
  • Glycogen synthase kinase 3 (GSK-3) is a serine/threonine protein kinase that has recently emerged as a promising target in drug discovery. It is involved in multiple cellular processes and associated with the pathogenesis of several diseases. A three-dimensional quantitative structure-activity relationship (3D-QSAR) analysis was performed on a series of GSK-3 inhibitors to understand the structural basis for inhibitory activity. Comparative molecular field analysis (CoMFA) method was used to derive 3D-QSAR models. A reliable CoMFA model was developed using ligand-based alignment scheme. The model produced statistically acceptable results with a cross-validated correlation coefficient ($q^2$) of 0.594 and a non-cross-validated correlation coefficient ($r^2$) of 0.943. Robustness of the model was checked by bootstrapping and progressive scrambling analysis. This study could assist in the design of novel compounds with enhanced GSK-3 inhibitory activity.

Study on the coding rule of Characters by 1 byte of 3×4 bits with consideration for the transmission efficiency of data communications (데이터 전송 효율을 고려한 3×4비트 1 바이트 문자 부호화 규칙에 관한 연구)

  • Hong, Wan-Pyo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.4
    • /
    • pp.499-504
    • /
    • 2011
  • This paper propose the rule of coding for the characters and symbol, etc which are used in computer, information devices, etc. When they use the rule of coding, they may improve the efficiency of transmission in data communications by reducing the number of scrambling during the line coding in the coder in the transmitter. The paper considered the codes of one byte of 3bits column ${\times}$ 4bits rows. ASCII code is one of the representative code for the codes of one byte of 3bits column ${\times}$ 4bits rows. Therefore, this paper applied ASCII code to study the coding rule of the characters and symbols, etc.

Development of a Diagnostic Module Based Maintenance Support Device for Fiber Optic Telecommunication Cable in Overhead Region (고소지역 작업현장에서 공중선 상태 진단 모듈 기반 정비 지원 장치 개발)

  • Kim, Hee-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.4
    • /
    • pp.469-474
    • /
    • 2014
  • Installed on telephone poles laid scrambling to monitor the status of the communication lines, and cost information can provid eadditional information tools to develop systems to support on-site monitoring. Aerial support for a maintenance monitoring module to apply an embedded system, and information processing applications manufactured. In this study, a comprehensive plan in accordance with the government's aerial maintenance work to prevent accidents spread support for the device to immediately take advantage of big cities and aerial maintenance business, Construction worker accused of bias and aims to improve efficiency of maintenance puts.

Coding Rule of Characters by 2 bytes with 4×4 bits to Improve the Transmission Efficiency in Data Communications (데이터 전송 효율을 고려한 4비트행×4비트열 2 바이트 문자 부호화 규칙에 관한 연구)

  • Hong, Wan-Pyo
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.5
    • /
    • pp.749-756
    • /
    • 2011
  • This paper propose the rule of coding for the characters and symbol, etc which are used in computer, information devices, etc. When they use the rule of coding, they may improve the efficiency of transmission in data communications by reducing the number of scrambling during the line coding in the coder in the transmitter. The paper considered the codes of two bytes(16 bits) of 4bits column ${\times}$ 4bits rows. In the paper, we applied the code system of Roman characters in KS X 1001.

Image Encryption Based on Quadruple Encryption using Henon and Circle Chaotic Maps

  • Hanchinamani, Gururaj;Kulkarni, Linganagouda
    • Journal of Multimedia Information System
    • /
    • v.2 no.2
    • /
    • pp.193-206
    • /
    • 2015
  • In this paper a new approach for image encryption based on quadruple encryption with dual chaotic maps is proposed. The encryption process is performed with quadruple encryption by invoking the encrypt and decrypt routines with different keys in the sequence EDEE. The decryption process is performed in the reverse direction DDED. The key generation for the quadruple encryption is achieved with a 1D Circle map. The chaotic values for the encrypt and decrypt routines are generated by using a 2D Henon map. The Encrypt routine E is composed of three stages i.e. permutation, pixel value rotation and diffusion. The permutation is achieved by: row and column scrambling with chaotic values, exchanging the lower and the upper principal and secondary diagonal elements based on the chaotic values. The second stage circularly rotates all the pixel values based on the chaotic values. The last stage performs the diffusion in two directions (forward and backward) with two previously diffused pixels and two chaotic values. The security and performance of the proposed scheme are assessed thoroughly by using the key space, statistical, differential, entropy and performance analysis. The proposed scheme is computationally fast with security intact.

Access Control of Pay TV Program in Digital Satellite Broadcasting System (디지털 위성방송 시스템에서 유료 TV방송 프로그램 접근제어)

  • Park, Jeong-Hyun;Lee, Sang-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.3123-3132
    • /
    • 1997
  • In this paper, we describe access control system for protection of pay TV program in digital DBS(Direct Broadcast satellite) system. We also propose a possible access control system and operation scenario for scrambling and descrambling which are important in access control system. Transport stream structure and option, entitlement checking message and entitlement management message for access control on digital broadcasting system are described in this paper. Especially, the authentication based on Flat-Shamir and Gulllou-Quisquater schemes required for verification of proper subscriber as access control is oriented to smart card number and subscriber ID(Identity). It has less restriction than scheme oriented to descrambler number.

  • PDF