• Title/Summary/Keyword: system identification

Search Result 5,891, Processing Time 0.038 seconds

Characteristics of Pichia anomala K15 Producing Killer Toxin Isolated from Traditional Nuruk (전통 누룩으로부터 분리된 Killer Toxin 생산 균주 Pichia anomala K15의 특성)

  • Jung, Hee-Kyoung;Park, Chi-Duck;Lee, Gee-Dong;Park, Seung-Chun;Park, Hwan-Hee;Hong, Joo-Heon
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.36 no.8
    • /
    • pp.1077-1082
    • /
    • 2007
  • In this study, killer yeasts were isolated from traditional Nuruk to improve storage and suppress contaminant in food industry. Among killer yeasts, yeast K15 showed strong killer toxin activity and inhibited growth of Salmonella Typhimurium and Vibrio parahaemolyticus. Killer yeast K15 was identified with Pichia anomala by the Microlog TM 4.0 identification system and homology of the ITS sequence. Killer toxin generated from P. anomala K15 was inactivated by pronase E and suggested to be a protein. Therefore killer toxin of P. anomala K15 was thought to be safe in human such as bacteriocin. P. anomala K15 was sufficient for growth in 50% glucose and could be used to prevent contaminant in initial stages of alcohol beverage fermentation.

Cancer Diagnosis System using Genetic Algorithm and Multi-boosting Classifier (Genetic Algorithm과 다중부스팅 Classifier를 이용한 암진단 시스템)

  • Ohn, Syng-Yup;Chi, Seung-Do
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.2
    • /
    • pp.77-85
    • /
    • 2011
  • It is believed that the anomalies or diseases of human organs are identified by the analysis of the patterns. This paper proposes a new classification technique for the identification of cancer disease using the proteome patterns obtained from two-dimensional polyacrylamide gel electrophoresis(2-D PAGE). In the new classification method, three different classification methods such as support vector machine(SVM), multi-layer perceptron(MLP) and k-nearest neighbor(k-NN) are extended by multi-boosting method in an array of subclassifiers and the results of each subclassifier are merged by ensemble method. Genetic algorithm was applied to obtain optimal feature set in each subclassifier. We applied our method to empirical data set from cancer research and the method showed the better accuracy and more stable performance than single classifier.

Evaluation Criteria for Suitable Authentication Method for IoT Service Provider in Industry 4.0 Environment (4차 산업혁명 시대의 IoT 서비스 참여 주체에 대한 적합한 인증수단 선택을 위한 평가기준)

  • Jeong, Kwang Seob;Bae, Sukjoo;Kim, Hyoungtae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.3
    • /
    • pp.116-122
    • /
    • 2017
  • Advances in information technology, communication and network technology are radically facilitating digital convergences as the integration of human, equipment, and space in the current industry 4.0 era. In industry 4.0 environment, the vast amount of information with networked computing technology can be simultaneously accessible even in limited physical space. Two main benefit points out of these information are the convenience and efficiency in their online transactions either buying things online or selling online. Even though there exist so many benefits that information technology can create for the people doing business over the internet there is a critical problem to be answered. In spite of many such advantages, however, online transactions have many dysfunctions such as personal information leakage, account hacking, and cybercrime. Without preparing the appropriate protection methods or schema people reluctantly use the transaction or would find some other partners with enhanced information security environment. In this paper we suggested a novel selection criteria that can be used to evaluate the reliable means of authentication against the expected risks under on-going IoT based environment. Our selection criteria consists of 4 steps. The first step is services and risk identification step. The second step is evaluation of risk occurrence step. The third step includes the evaluation of the extent of damage. And the final step is the assessment of the level of risk. With the help of the above 4 step-approach people can systematically identify potential risks hiding in the online transactions and effectively avoid by taking appropriate counter actions.

The ACC deaminase from rhizobateria promoted resistance of salininty stress in seedling and growth of plant

  • Soh, Byoung-Yul;Lee, Gun-Woong;Ju, Jae-Eun;Kim, Hae-Min;Chae, Jong-Chan;Lee, Yong-Hoon;Oh, Byung-Taek;Lee, Kui-Jae
    • Proceedings of the Plant Resources Society of Korea Conference
    • /
    • 2010.10a
    • /
    • pp.17-17
    • /
    • 2010
  • Rhizobacteria are a diverse group of free-living soil bacteria that live in plant rhizosphere and colonized the root system. Plant growth-promoting rhizobacteria (PGPR) possessing ACC deaminase (ACCD) can reduce ACC and ethylene in plant tissue and mediated the growth of plants under various stresses including salt stress. ACCD decrease ethylene levels in plant tissue that produce high levels of ethylene in tissue via elevated levels of ACC under salt stress. We selected strains of Pseudomonas sp. possessing ACCD activity for their ability to promote plant growth under salt stress from soil sample collected at Byeonsan, Jeonbuk, South Korea. The Pseudomonas strains possessing ACCD increased the rate of the seedling and growth of chinese cabbage seeds under salt stress. We cloned ACCD gene from P.fluorescens and expressed recombinant protein in Escherichia coli. The active form of recombinant ACCD converted ACC to a-ketobutyrate. The in vivo treatment of recombinant ACCD itself increase the rate of the seedling and growth of Chinese cabbage seeds under salt stress. The polyclonal P.fluorescens anti-ACCD antibody specifically reacted with ACCD originated from Pseudomonas. This indicates that the antibody might act as an important indicator for ACCD driven from Pseudomonas exhibiting plant growth-promoting activity. This study will be useful for identification of newly isolated PGPR containing ACCD and exploioting the ACCD activity from PGPR against various biotic and abiotic stresses.

  • PDF

A Study on the Development of a Test for the Identification Gifted Children, based on the Characters of the Creativity and the Information Science (창의성 및 정보과학적 특성을 기반으로 한 정보영재 판별도구 개발연구)

  • Shin, Seung-Yong;Shin, Soo-Bum;Bae, Young-Kwon;Lee, Tae-Wuk
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.4
    • /
    • pp.7-14
    • /
    • 2004
  • Since the science of information is appearing no less important than mathematics and natural science as our society is rapidly becoming information-oriented, the necessity to distinguish prodigies of this field and to educate them as early as possible is also being emphasized. Unfortunately, however, the pertinent study is still in its beginning stage. In this study, I have reviewed the character, definition and method to distinguish prodigies and the procedure of developing a test, as well as researching and analyzing the proper process of distinguishing prodigies, through theoretical contemplation on the method of distinguishing the gifted children. Also, I have characterized and defined the information prodigies after clarifying the character of 'Discrete Mathematics' which becomes the basis of the science of information, paving the way to make a test method that can distinguish those information prodigies. As a result of our applying the system by using the distinction test, it turned out that the distinction test was pretty reliable. Accordingly, it can be utilized as a significant distinction test for information prodigies in the forthcoming future.

  • PDF

Identification of CCL1 as a Gene Differentially Expressed in $CD4^+$ T cells Expressing TIM-3

  • Jun, Ka-Jung;Lee, Mi-Jin;Shin, Dong-Chul;Woo, Min-Yeong;Kim, Kyong-Min;Park, Sun
    • IMMUNE NETWORK
    • /
    • v.11 no.4
    • /
    • pp.203-209
    • /
    • 2011
  • Background: T cell immunoglobulin mucin containing molecule (TIM)-3 is expressed in differentiated Th1 cells and is involved in the suppression of the cytokine production by these cells. However, the regulation of the expression of other T cell genes by TIM-3 is unclear. Herein, we attempted to identify differentially expressed genes in cells abundantly expressing TIM-3 compared to cells with low expression of TIM-3. Methods: TIM-3 overexpressing cell clones were established by transfection of Jurkat T cells with TIM-3 expression vector. For screening of differentially expressed genes, gene fishing technology based on reverse transcription-polymerase chain reaction (RT-PCR) using an annealing control primer system was used. The selected candidate genes were validated by semi quantitative and real-time RT-PCR. Results: The transcription of TIMP-1, IFITM1, PAR3 and CCL1 was different between TIM-3 overexpressing cells and control cells. However, only CCL1 transcription was significantly different in cells transiently transfected with TIM3 expression vector compared with control cells. CCL1 transcription was increased in primary human $CD4^+$ T cells abundantly expressing TIM-3 but not in cells with low expression of TIM-3. Conclusion: CCL1 was identified as a differentially transcribed gene in TIM-3-expressing $CD4^+$ T cells.

Genetic Programming with Weighted Linear Associative Memories and its Application to Engineering Problems (가중 선형 연상기억을 채용한 유전적 프로그래밍과 그 공학적 응용)

  • 연윤석
    • Korean Journal of Computational Design and Engineering
    • /
    • v.3 no.1
    • /
    • pp.57-67
    • /
    • 1998
  • Genetic programming (GP) is an extension of a genetic algoriths paradigm, deals with tree structures representing computer programs as individuals. In recent, there have been many research activities on applications of GP to various engineering problems including system identification, data mining, function approximation, and so forth. However, standard GP suffers from the lack of the estimation techniques for numerical parameters of the GP tree that is an essential element in treating various engineering applications involving real-valued function approximations. Unlike the other research activities, where nonlinear optimization methods are employed, I adopt the use of a weighted linear associative memory for estimation of these parameters under GP algorithm. This approach can significantly reduce computational cost while the reasonable accurate value for parameters can be obtained. Due to the fact that the GP algorithm is likely to fall into a local minimum, the GP algorithm often fails to generate the tree with the desired accuracy. This motivates to devise a group of additive genetic programming trees (GAGPT) which consists of a primary tree and a set of auxiliary trees. The output of the GAGPT is the summation of outputs of the primary tree and all auxiliary trees. The addition of auxiliary trees makes it possible to improve both the teaming and generalization capability of the GAGPT, since the auxiliary tree evolves toward refining the quality of the GAGPT by optimizing its fitness function. The effectiveness of this approach is verified by applying the GAGPT to the estimation of the principal dimensions of bulk cargo ships and engine torque of the passenger car.

  • PDF

Local Environmental Effects on AGN Activities

  • Kim, Jaemin;Yi, Sukyoung K.
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.38 no.1
    • /
    • pp.43.2-43.2
    • /
    • 2013
  • The local environmental effects on the triggering of active galactic nucleus(AGN) activity has been studied with many authors, but there still be controversy. We perform statistical analysis for nearby(0.01 < z < 0.05) volume limited(Mr < -19) samples with visual inspection based on Sloan Digital Sky Survey Data Release7. We inspect ~60,000 galaxy images visually to find peculiar objects which show not only ongoing merging features and tidal features, but also post merging features like ring or shell structures. We found that these peculiar features were shown at least 2 times more frequently among AGN host galaxies than non AGN galaxies, and this trend was still visible when galaxy properties such as color or stellar mass are fixed. Furthermore, L[OIII] and L(Ha) of peculiar galaxies are found to be more increased than those of normal galaxies. In order to ensure this results, we also checked it for a smaller subsample with ~2mag deeper monochromatic images provided from SDSS Stripe82 database, and found consistent results. At last, we perform the same work for pair(r_p<80kpc/h, delta_v<200km/s) systems. Because of some pair systems which do not interact gravitationally in actuality but fulfill the criteria for identification of pair system, the trends are found to be slightly weaker. We also found that line luminosities are increased consistently as projected distance between central and companion galaxy decreased, and as companion color gets bluer. Overall, the results of this study tell us that the local environment of galaxies affect the frequency as well as the strength of AGN activity. Local environmental effects, however, may not be the dominant triggering mechanism for AGN activity since the majority of peculiar galaxies are non AGN galaxies.

  • PDF

Method to Reduce the Time when Identifying RFID Tag by using Computational Grid (계산 그리드를 이용한 대량의 RFID 태그 판별 시간 단축 방법)

  • Shin, Myeong-Sook;Lee, Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.5
    • /
    • pp.547-554
    • /
    • 2010
  • RFID is core technology to lead ubiquitous computing, and attract the notice of the world. It also improves social transparency, creates employment, and invigorates the allied industries. However, The technical characteristic with RFID has some problems with security and privacy. The commercialization of RFID is delayed due to these problems. This paper introduces the technical method to find solutions about an invasion of privacy to be due to introduce RFID system. First, this method applies Hash-Chain proposed by M. Ohkubo and some other researchers. The more tags increase, the more it demands lots of computation time. We divide SPs equally to solve these problems. And then, We'll suggest solutions to shorten the identification time of tag by implementing SPs with multi nodes of Grid environment at the same time. This makes it possible to keep the privacy protection of RFID tag, and process RFID tag in real time at the same time.

A simulation technique to create dataset of RFID business events (RFID 비즈니스 이벤트 데이터셋의 생성을 위한 시뮬레이션 기법)

  • Ryu, Wooseok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.289-291
    • /
    • 2013
  • As an wireless identification technology, RFID is now extending its application area including logistics, medicine, and healthcare. Adoption of RFID demands high cost such as h/w, s/w, and so on. To adopt RFID, we need to evaluate validity of application area and feasibility of RFID S/W such as EPC Information Service (EPCIS), which demands a variety of RFID test datasets. In this paper, I propose a novel method for generating RFID business events dataset by means of the simulation of RFID application environment. Proposed method can generate near-real RFID event dataset by means of representing various RFID application environment into abstract network model based on petri-net. In addition, it can also be useful when determining adoption of RFID as well as when evaluating RFID system.

  • PDF