• Title/Summary/Keyword: 38-key model

Search Result 122, Processing Time 0.018 seconds

A Three-Set Type Korean Keyboard Model, 38K, with High Compatibility to the KS Computer Keyboard

  • Kim, Kuk
    • Journal of the Ergonomics Society of Korea
    • /
    • v.33 no.5
    • /
    • pp.355-363
    • /
    • 2014
  • Objective:The purpose of this study is to design a three-set type (Sebulsik) keyboard that is to input Korean text with no shifted keys and also compatible with the standard Korean computer keyboard or ANSI keyboard. Background: The KS computer keyboard is two-set type (Dubulsik). Existing and proposed designs of three-set type of past studies are not compatible with KS or ANSI keyboard and are complex with many redundant letters. Method: The number of Korean letters for 3-set type is analyzed. Then Korean letters are arranged with normality and with spatial compatibility to the KS Korean keyboard, and symbols were arranged to same positions with ANSI keyboard. Results: Initial consonants of 14 numbers and 6 vowels are arranged as exactly same positions of KS keyboard, and other vowels are arranged with spatial compatibility. Symbols are arranged to the same positions with ANSI keyboard, and 10 digits are confirmed and has compatibility to International standard. Conclusion: A 38-key model, 38K, is designed to require minimal keys to input Korean text with no shifted keys, increased the compatibility to the KS Korean computer keyboard. Application: Using the proposed 38-key model, 38K, it can be taken into account for keyboards in industrial production. It is applicable to user group of 3-set type Korean keyboard with more easy than past keyboards.

Interactions among Measles Virus Hemagglutinin, Fusion Protein and Cell Receptor Signaling Lymphocyte Activation Molecule (SLAM) Indicating a New Fusion-trimer Model

  • Zhang, Peng;Li, Lingyun;Hu, Chunlin;Xu, Qin;Liu, Xin;Qi, Yipeng
    • BMB Reports
    • /
    • v.38 no.4
    • /
    • pp.373-380
    • /
    • 2005
  • For measles viruses, fusion on the cell membrane is an important initial step in the entry into the infected cells. The recent research indicated that hemagglutinin firstly leads the conformational changes in the fusion protein then co-mediates the membrane fusion. In the work, we use the co-immunoprecipitation and pull-down techniques to identify the interactions among fusion protein, hemagglutinin and signaling lymphocyte activation molecule (SLAM), which reveal that the three proteins can form a functional complex to mediate the SLAM-dependent fusion. Moreover, under the confocal microscope, fusion protein and hemagglutinin protein can show the cocapping mediated by the SLAM. So fusion protein not only is involved in the fusion but also might directly interact with the SLAM to be a new fusion-trimer model, which might account for the infection mechanism of measles virus.

Opposing Effects of ERK and p38 MAP Kinases on HeLa Cell Apoptosis Induced by Dipyrithione

  • Fan, Yumei;Chen, Hui;Qiao, Bo;Luo, Lan;Ma, Hsiaoyen;Li, Heng;Jiang, Jihong;Niu, Dezhong;Yin, Zhimin
    • Molecules and Cells
    • /
    • v.23 no.1
    • /
    • pp.30-38
    • /
    • 2007
  • Dipyrithione (2, 2'-dithiobispyridine-1, 1'-dioxide, PTS2), a pyrithione derivate, is highly bactericidal and fungicidal. In this study we examined its apoptotic effect on HeLa cells. PTS2 induced HeLa cell death in a dose and time dependent manner. ERK1/2 and p38 were markedly activated, but little JNK1/2 activation was detected. Suppression of p38 activation by SB203580 reduced the extent of apoptosis of the HeLa cells and also prevented induction of p21, release of cytochrome c, and cleavage of caspase-3 and PARP. Inhibition of ERK1/2 with PD98059 increased apoptosis, indicating that ERK1/2 activation has an anti-apoptotic effect on PTS2-induced HeLa cell apoptosis. PTS2 also inhibited murine sarcoma 180 and hepatoma 22 tumor growth in an animal tumor model. Our findings indicate that PTS2 possesses anti-tumor activity, that caspase-3 and poly (ADP-ribose) polymerase (PARP) are involved in PTS2-induced HeLa cell apoptosis and that ERK1/2 and p38 have opposing effects on this apoptosis.

Barbigerone Inhibits Tumor Angiogenesis, Growth and Metastasis in Melanoma

  • Yang, Jian-Hong;Hu, Jia;Wan, Li;Chen, Li-Juan
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.1
    • /
    • pp.167-174
    • /
    • 2014
  • Tumor angiogenesis, growth and metastasis are three closely related processes. We therefore investigated the effects of barbigerone on all three in the B16F10 tumor model established in both zebrafish and mouse models, and explored underlying molecular mechanisms. In vitro, barbigerone inhibited B16F10 cell proliferation, survival, migration and invasion and suppressed human umbilical vascular endothelial cell migration, invasion and tube formation in concentration-dependent manners. In the transgenic zebrafish model, treatment with $10{\mu}M$ barbigerone remarkably inhibited angiogenesis and tumor-associated angiogenesis by reducing blood vessel development more than 90%. In vivo, barbigerone significantly suppressed angiogenesis as measured by H and E staining of matrigel plugs and CD31 staining of B16F10 melanoma tumors in C57BL/6 mice. Furthermore, it exhibited highly potent activity at inhibiting tumor growth and metastasis to the lung of B16F10 melanoma cells injected into C57BL/6 mice. Western blotting revealed that barbigerone inhibited phosphorylation of AKT, FAK and MAPK family members, including ERK, JNK, and p38 MAPKs, in B16F10 cells mainly through the MEK3/6/p38 MAPK signaling pathway. These findings suggested for the first time that barbigerone could inhibit tumor-angiogenesis, tumor growth and lung metastasis via downregulation of the MEK3/6/p38 MAPK signaling pathway. The findings support further investigation of barbigerone as a potential anti-cancer drug.

Identification of Key Nodes in Microblog Networks

  • Lu, Jing;Wan, Wanggen
    • ETRI Journal
    • /
    • v.38 no.1
    • /
    • pp.52-61
    • /
    • 2016
  • A microblog is a service typically offered by online social networks, such as Twitter and Facebook. From the perspective of information dissemination, we define the concept behind a spreading matrix. A new WeiboRank algorithm for identification of key nodes in microblog networks is proposed, taking into account parameters such as a user's direct appeal, a user's influence region, and a user's global influence power. To investigate how measures for ranking influential users in a network correlate, we compare the relative influence ranks of the top 20 microblog users of a university network. The proposed algorithm is compared with other algorithms - PageRank, Betweeness Centrality, Closeness Centrality, Out-degree - using a new tweets propagation model - the Ignorants-Spreaders-Rejecters model. Comparison results show that key nodes obtained from the WeiboRank algorithm have a wider transmission range and better influence.

Active mass damper control for cable stayed bridge under construction: an experimental study

  • Chen, Hao;Sun, Zhi;Sun, Limin
    • Structural Engineering and Mechanics
    • /
    • v.38 no.2
    • /
    • pp.141-156
    • /
    • 2011
  • A cable stayed bridge under construction has low structural damping and is not as stable as the completed bridge. Control countermeasures, such as the installation of energy dissipating devices, are thus required. In this study, the general procedure and key issues on adopting an active control device, the active mass damper (AMD), for vibration control of cable stayed bridges under construction were studied. Taking a typical cable stayed bridge as the prototype structure; a lab-scale test structure was designed and fabricated firstly. A baseline FEM model was then setup and updated according to the modal parameters measured from vibration test on the structure. A numerical study to simulate the bridge-AMD control system was conducted and an efficient LQG-based controller was designed. Based on that, an experimental implementation of AMD control of the transverse vibration of the bridge model was performed. The results from numerical simulation and experimental study verified that the AMD-based active control was feasible and efficient for reducing dynamic responses of a complex structural system. Moreover, the discussion made in this study clarified some critical problems which should be addressed for the practical implementation of AMD control on real cable-stayed bridges.

Infection and Immune Response in the Nematode Caenorhabditis elegans Elicited by the Phytopathogen Xanthomonas

  • Bai, Yanli;Zhi, Dejuan;Li, Chanhe;Liu, Dongling;Zhang, Juan;Tian, Jing;Wang, Xin;Ren, Hui;Li, Hongyu
    • Journal of Microbiology and Biotechnology
    • /
    • v.24 no.9
    • /
    • pp.1269-1279
    • /
    • 2014
  • Xanthomonas oryzae pv. oryzae (Xoo) strains are plant pathogenic bacteria that can cause serious blight of rice, and their virulence towards plant host is complex, making it difficult to be elucidated. Caenorhabditis elegans has been used as a powerful model organism to simplify the host and pathogen system. However, whether the C. elegans is feasible for studying plant pathogens such as Xoo has not been explored. In the present work, we report that Xoo strains PXO99 and JXOIII reduce the lifespan of worms not through acute toxicity, but in an infectious manner; pathogens proliferate and persist in the intestinal lumen to cause marked anterior intestine distension. In addition, Xoo triggers (i) the p38 MAPK signal pathway to upregulate its downstream C17H12.8 expression, and (ii) the DAF-2/DAF-16 pathway to upregulate its downstream gene expressions of mtl-1 and sod-3 under the condition of daf-2 mutation. Our findings suggest that C. elegans can be used as a model to evaluate the virulence of Xoo phytopathogens to host.

Certificate-Based Signcryption Scheme without Pairing: Directly Verifying Signcrypted Messages Using a Public Key

  • Le, Minh-Ha;Hwang, Seong Oun
    • ETRI Journal
    • /
    • v.38 no.4
    • /
    • pp.724-734
    • /
    • 2016
  • To achieve confidentiality, integrity, authentication, and non-repudiation simultaneously, the concept of signcryption was introduced by combining encryption and a signature in a single scheme. Certificate-based encryption schemes are designed to resolve the key escrow problem of identity-based encryption, as well as to simplify the certificate management problem in traditional public key cryptosystems. In this paper, we propose a new certificate-based signcryption scheme that has been proved to be secure against adaptive chosen ciphertext attacks and existentially unforgeable against chosen-message attacks in the random oracle model. Our scheme is not based on pairing and thus is efficient and practical. Furthermore, it allows a signcrypted message to be immediately verified by the public key of the sender. This means that verification and decryption of the signcrypted message are decoupled. To the best of our knowledge, this is the first signcryption scheme without pairing to have this feature.

Simultaneous Information and Power Transfer for Multi-antenna Primary-Secondary Cooperation in Cognitive Radio Networks

  • Liu, Zhi Hui;Xu, Wen Jun;Li, Sheng Yu;Long, Cheng Zhi;Lin, Jia Ru
    • ETRI Journal
    • /
    • v.38 no.5
    • /
    • pp.941-951
    • /
    • 2016
  • In this paper, cognitive radio and simultaneous wireless information and power transfer (SWIPT) are effectively combined to design a spectrum-efficient and energy-efficient transmission paradigm. Specifically, a novel SWIPT-based primary-secondary cooperation model is proposed to increase the transmission rate of energy/spectrum constrained users. In the proposed model, a multi-antenna secondary user conducts simultaneous energy harvesting and information forwarding by means of power splitting (PS), and tries to maximize its own transmission rate under the premise of successfully assisting the data delivery of the primary user. After the problem formulation, joint power splitting and beamforming optimization algorithms for decode-and-forward and amplify-and-forward modes are presented, in which we obtain the optimal PS factor and beamforming vectors using a golden search method and dual methods. Simulation results show that the proposed SWIPTbased primary-secondary cooperation schemes can obtain a much higher level of performance than that of non-SWIPT cooperation and non-cooperation schemes.

Novel Rate Control Scheme for Low Delay Video Coding of HEVC

  • Wu, Wei;Liu, Jiong;Feng, Lei
    • ETRI Journal
    • /
    • v.38 no.1
    • /
    • pp.185-194
    • /
    • 2016
  • In this paper, a novel rate control scheme for low delay video coding of High Efficiency Video Coding (HEVC) is proposed. The proposed scheme is developed by considering a new temporal prediction structure of HEVC. In the proposed scheme, the relationship between bit rate and quantization step is exploited firstly to formulate an accurate quadratic rate-quantization (R-Q) model. Secondly, a method of determining the quantization parameters (QPs) for the first frames within a group of pictures is proposed. Thirdly, an accurate frame-level bit allocation method is proposed for HEVC. Finally, based on the proposed R-Q model and the target bit allocated for the frame, the QPs are predicted for coding tree units by using rate-distortion (R-D) optimization. We compare our scheme against that of three other state-of-the-art rate control schemes. Experimental results show that the proposed rate control scheme can increase the Bjøntegaard delta peak signal-to-noise ratio by 0.65 dB and 0.09 dB on average compared with the JCTVC-I0094 and JCTVC-M0036 schemes, respectively, both of which have been implemented in an HEVC test model encoder; furthermore, the proposed scheme achieves a similar R-D performance to Wang's scheme, as well as obtaining the smallest bit rate mismatch error of all the schemes.