• Title/Summary/Keyword: Data Copy

Search Result 346, Processing Time 0.025 seconds

A GIS, GPS, Database, Internet GIS $software{\copyright}$ The First Arabian GIS $Software\copyright}$

  • El-Shayal, Mohamed El-Sayed
    • Proceedings of the KSRS Conference
    • /
    • v.2
    • /
    • pp.695-697
    • /
    • 2006
  • Elshayal $Smart{\copyright}$ software is an almost First Arabian GIS $software{\copyright}$ which completely developed by Arabian developers team and independent of any commercial software package. The software current Features are View and Edit shape files, build new layers, add existing layers, remove layers, swap layers, save layers, set layer data sources, layer properties, zoom in & zoom out, pan, identify, selecting features, invert selection, show data table, data query builder, location query builder, build network, find shortest path, print map, save map image, copy map image to clipboard, save project map, edit move vertex, edit move features, snap vertexes, set vertex XY, move settings, converting coordinate system, applying VB script, copy selected features to another layer, move selected features to another layer, delete selected features, edit data table, modify table structure, edit map features, drawing new features, GPS tracking, 3D view, etc... The software expected Features are: Viewing raster image and image geo-referencing, read other map formats such as DXF Format and Tiger Line Format.

  • PDF

Implementation of Registry Virtualization on Windows (윈도우 운영체제에서 레지스트리 가상화 구현)

  • Shin, Dong-Ha
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.19-26
    • /
    • 2010
  • The Windows registry is a hierarchical database where the configuration data of a system or application programs is stored. In this paper, we presented and implemented a registry virtualization algorithm and measured its performance. The registry virtualization algorithm presented in the paper is called Copy-One-level On Write-Open(COOWO) that is a modified version of general Copy On Whte(COW) method to make it suitable for registry virtualization. In this paper, we implemented the proposed algorithm as a dynamically loadable library in Windows and applied it to many Windows application programs. This paper is meaningful since we described a registry virtualization algorithm in detail in situation where we can not find papers that describe the registry virtualization in detail, and we could find the performance of the algorithm can be used in the real applications.

The Secure Chip for Software Illegal Copy Protection (소프트웨어 불법복제방지를 위한 보안칩)

  • 오명신;한승조
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.4
    • /
    • pp.87-98
    • /
    • 2002
  • Software has been developed very fast as information has become important value. Illegal software copy has been the main problem of developing software business. Recently used protecting lock system for software copy has not guaranteed perfectly from easily cracked-defense system. This paper, therefore, proposes 96-bit block cipher with 112-bit length to replace a DES(Data Encryption Standard) algorithm. Security chip by ASIC(Application Specific Integrated Circuit) security module is presented for software copy protection. Then, an auto block protecting algorithm is designed for the security chip. Finally, controlling driver and library are built for the security chip.

Comparison of the copy-neutral loss of heterozygosity identified from whole-exome sequencing data using three different tools

  • Lee, Gang-Taik;Chung, Yeun-Jun
    • Genomics & Informatics
    • /
    • v.20 no.1
    • /
    • pp.4.1-4.8
    • /
    • 2022
  • Loss of heterozygosity (LOH) is a genomic aberration. In some cases, LOH can be generated without changing the copy number, which is called copy-neutral LOH (CN-LOH). CN-LOH frequently occurs in various human diseases, including cancer. However, the biological and clinical implications of CN-LOH for human diseases have not been well studied. In this study, we compared the performance of CN-LOH determination using three commonly used tools. For an objective comparison, we analyzed CN-LOH profiles from single-nucleotide polymorphism array data from 10 colon adenocarcinoma patients, which were used as the reference for comparison with the CN-LOHs obtained through whole-exome sequencing (WES) data of the same patients using three different analysis tools (FACETS, Nexus, and Sequenza). The majority of the CN-LOHs identified from the WES data were consistent with the reference data. However, some of the CN-LOHs identified from the WES data were not consistent between the three tools, and the consistency with the reference CN-LOH profile was also different. The Jaccard index of the CN-LOHs using FACETS (0.84 ± 0.29; mean value, 0.73) was significantly higher than that of Nexus (0.55 ± 0.29; mean value, 0.50; p = 0.02) or Sequenza (0 ± 0.41; mean value, 0.34; p = 0.04). FACETS showed the highest area under the curve value. Taken together, of the three CN-LOH analysis tools, FACETS showed the best performance in identifying CN-LOHs from The Cancer Genome Atlas colon adenocarcinoma WES data. Our results will be helpful in exploring the biological or clinical implications of CN-LOH for human diseases.

A Study of Eye Blinking : I (눈의 깜박임에 대한 연구 : I)

  • Gong, Myeong-Ok;Kim, Yeon-Min
    • Journal of the Ergonomics Society of Korea
    • /
    • v.4 no.1
    • /
    • pp.7-10
    • /
    • 1985
  • Eye blinking in case of three visual tasks is studied; wall hard-copy and color monitor. The eye blinking is checked by eye-status detector. The data observed are (1) the average number of eye blinking (2) the average time of eye blinking for three minutes in case of all three visual tasks. The results are as follows: (1) The average times (or numbers) of eye blinking are different among three tasks. (2) The average time (or number) of eye blinking of wall is different from hard-copy and color monitor tasks. (3) But the average time (or number) of eye blinking of hard-copy is not different from that of color monitor.

  • PDF

An Exploratory Study on the Antecedent Factors to the Piracy of the Digital Copyrights (디지털 저작물의 불법복제 행동에 영향을 미치는 요인에 관한 탐색적 연구)

  • Kwak, Won-Il;Choi, Won-Il
    • International Commerce and Information Review
    • /
    • v.10 no.4
    • /
    • pp.47-62
    • /
    • 2008
  • The purpose of this study is to explore the antecedent factors to the piracy of the digital copyrights in order to provide basic data for piracy prevention policy. The findings of study revealed that most respondents had experiences to copy MP3 files illegally. And many respondents answered they didn't copy pirated material by themselves but others did piracy a lot. The feeling of quilt and anxiety against piracy is shown very low level. Low copy cost and regulation level significantly impact upon the cognitive level of other's piracy. Updated contents, the higher price of authenticated materal, piracy regulation are the significant antecedent factors to the level of piracy. The level of piracy activity and anxiety against piracy are significantly different by age. The cognitive level of other's piracy, piracy activity and anxiety are significantly different by gender.

  • PDF

Multilevel Security Management for Global Transactions

  • Jeong, Hyun-Cheol
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.735-738
    • /
    • 2000
  • The most important issue in database security is correct concurrency control under the restrictive security policy. The goal of secure transaction management is to keep security and provide many concurrent users with the high availability of database. In this paper, we consider the security environment of multidatabase system with replicated data. The read-from relationship in the existed serializability is improper in security environment. So, we define new read-from relationship and propose new secure 1-copy quasi-seriailzability by utilizing this relationship and display some examples. This security environment requires both the existed local autonomy and the security autonomy as newly defined restriction. To solve covert channel problem is the most difficult issue in developing secure scheduling scheme. The proposed secure 1-copy quasi-serializability is very proper for global transactions in that this serializability not violates security autonomy and prevents covert channel between global transactions.

  • PDF

Exonic copy number variations in rare genetic disorders

  • Man Jin Kim
    • Journal of Genetic Medicine
    • /
    • v.20 no.2
    • /
    • pp.46-51
    • /
    • 2023
  • Exonic copy number variation (CNV), involving deletions and duplications at the gene's exon level, presents challenges in detection due to their variable impact on gene function. The study delves into the complexities of identifying large CNVs and investigates less familiar but recurrent exonic CNVs, notably enriched in East Asian populations. Examining specific cases like DRC1, STX16, LAMA2, and CFTR highlights the clinical implications and prevalence of exonic CNVs in diverse populations. The review addresses diagnostic challenges, particularly for single exon alterations, advocating for a strategic, multi-method approach. Diagnostic methods, including multiplex ligation-dependent probe amplification, droplet digital PCR, and CNV screening using next-generation sequencing data, are discussed, with whole genome sequencing emerging as a powerful tool. The study underscores the crucial role of ethnic considerations in understanding specific CNV prevalence and ongoing efforts to unravel subtle variations. The ultimate goal is to advance rare disease diagnosis and treatment through ethnically-specific therapeutic interventions.

Validity of patient-derived xenograft mouse models for lung cancer based on exome sequencing data

  • Kim, Jaewon;Rhee, Hwanseok;Kim, Jhingook;Lee, Sanghyuk
    • Genomics & Informatics
    • /
    • v.18 no.1
    • /
    • pp.3.1-3.8
    • /
    • 2020
  • Patient-derived xenograft (PDX) mouse models are frequently used to test the drug efficacy in diverse types of cancer. They are known to recapitulate the patient characteristics faithfully, but a systematic survey with a large number of cases is yet missing in lung cancer. Here we report the comparison of genomic characters between mouse and patient tumor tissues in lung cancer based on exome sequencing data. We established PDX mouse models for 132 lung cancer patients and performed whole exome sequencing for trio samples of tumor-normal-xenograft tissues. Then we computed the somatic mutations and copy number variations, which were used to compare the PDX and patient tumor tissues. Genomic and histological conclusions for validity of PDX models agreed in most cases, but we observed eight (~7%) discordant cases. We further examined the changes in mutations and copy number alterations in PDX model production and passage processes, which highlighted the clonal evolution in PDX mouse models. Our study shows that the genomic characterization plays complementary roles to the histological examination in cancer studies utilizing PDX mouse models.

Two-Stage Logistic Regression for Cancer Classi cation and Prediction from Copy-Numbe Changes in cDNA Microarray-Based Comparative Genomic Hybridization

  • Kim, Mi-Jung
    • The Korean Journal of Applied Statistics
    • /
    • v.24 no.5
    • /
    • pp.847-859
    • /
    • 2011
  • cDNA microarray-based comparative genomic hybridization(CGH) data includes low-intensity spots and thus a statistical strategy is needed to detect subtle differences between different cancer classes. In this study, genes displaying a high frequency of alteration in one of the different classes were selected among the pre-selected genes that show relatively large variations between genes compared to total variations. Utilizing copy-number changes of the selected genes, this study suggests a statistical approach to predict patients' classes with increased performance by pre-classifying patients with similar genetic alteration scores. Two-stage logistic regression model(TLRM) was suggested to pre-classify homogeneous patients and predict patients' classes for cancer prediction; a decision tree(DT) was combined with logistic regression on the set of informative genes. TLRM was constructed in cDNA microarray-based CGH data from the Cancer Metastasis Research Center(CMRC) at Yonsei University; it predicted the patients' clinical diagnoses with perfect matches (except for one patient among the high-risk and low-risk classified patients where the performance of predictions is critical due to the high sensitivity and specificity requirements for clinical treatments. Accuracy validated by leave-one-out cross-validation(LOOCV) was 83.3% while other classification methods of CART and DT performed as comparisons showed worse performances than TLRM.