• 제목/요약/키워드: Key Target System

Search Result 348, Processing Time 0.027 seconds

Stem-leaf saponins from Panax notoginseng counteract aberrant autophagy and apoptosis in hippocampal neurons of mice with cognitive impairment induced by sleep deprivation

  • Cao, Yin;Yang, Yingbo;Wu, Hui;Lu, Yi;Wu, Shuang;Liu, Lulu;Wang, Changhong;Huang, Fei;Shi, Hailian;Zhang, Beibei;Wu, Xiaojun;Wang, Zhengtao
    • Journal of Ginseng Research
    • /
    • v.44 no.3
    • /
    • pp.442-452
    • /
    • 2020
  • Backgroud: Sleep deprivation (SD) impairs learning and memory by inhibiting hippocampal functioning at molecular and cellular levels. Abnormal autophagy and apoptosis are closely associated with neurodegeneration in the central nervous system. This study is aimed to explore the alleviative effect and the underlying molecular mechanism of stem-leaf saponins of Panax notoginseng (SLSP) on the abnormal neuronal autophagy and apoptosis in hippocampus of mice with impaired learning and memory induced by SD. Methods: Mouse spatial learning and memory were assessed by Morris water maze test. Neuronal morphological changes were observed by Nissl staining. Autophagosome formation was examined by transmission electron microscopy, immunofluorescent staining, acridine orange staining, and transient transfection of the tf-LC3 plasmid. Apoptotic event was analyzed by flow cytometry after PI/annexin V staining. The expression or activation of autophagy and apoptosis-related proteins were detected by Western blotting assay. Results: SLSP was shown to improve the spatial learning and memory of mice after SD for 48 h, accomanied with restrained excessive autophage and apoptosis, whereas enhanced activation of phosphoinositide 3-kinase/protein kinase B/mammalian target of rapamycin signaling pathway in hippocampal neurons. Meanwhile, it improved the aberrant autophagy and apoptosis induced by rapamycin and re-activated phosphoinositide 3-kinase/Akt/mammalian target of rapamycin signaling transduction in HT-22 cells, a hippocampal neuronal cell line. Conclusion: SLSP could alleviate cognitive impairment induced by SD, which was achieved probably through suppressing the abnormal autophagy and apoptosis of hippocampal neurons. The findings may contribute to the clinical application of SLSP in the prevention or therapy of neurological disorders associated with SD.

Feasibility Analysis on the Attack Graph Applicability in Selected Domains

  • Junho Jang;Saehee Jun;Huiju Lee;Jaegwan Yu;SungJin Park;Su-Youn Hong;Huy Kang Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.5
    • /
    • pp.57-66
    • /
    • 2023
  • In this paper, a research trend of attack graph studies for Cyber-Physical System (CPS) environments is surveyed, and we analyse the limitations of previous works and prospect the future directions. 35 among around 150 attack graph studies conducted within 5 years target CPS, and we inspect key features of CPS environment in the security aspect. Also, we categorize and analyze target studies in the aspect of modelling physical systems and considering air gaps, which are derived as key features of the security aspects of CPS. Half of 20 research that we surveyed do not reflect those two features, and other studies only consider one of the two features. In this circumstance, we examine challenges that attack graph studies on CPS environment face. Finally, we expect state-led studies or studies targeting open-spec commercial CPS will dominate.

Tele-operating System of Field Robot for Cultivation Management - Vision based Tele-operating System of Robotic Smart Farming for Fruit Harvesting and Cultivation Management

  • Ryuh, Youngsun;Noh, Kwang Mo;Park, Joon Gul
    • Journal of Biosystems Engineering
    • /
    • v.39 no.2
    • /
    • pp.134-141
    • /
    • 2014
  • Purposes: This study was to validate the Robotic Smart Work System that can provides better working conditions and high productivity in unstructured environments like bio-industry, based on a tele-operation system for fruit harvesting with low cost 3-D positioning system on the laboratory level. Methods: For the Robotic Smart Work System for fruit harvesting and cultivation management in agriculture, a vision based tele-operating system and 3-D position information are key elements. This study proposed Robotic Smart Farming, an agricultural version of Robotic Smart Work System, and validated a 3-D position information system with a low cost omni camera and a laser marker system in the lab environment in order to get a vision based tele-operating system and 3-D position information. Results: The tasks like harvesting of the fixed target and cultivation management were accomplished even if there was a short time delay (30 ms ~ 100 ms). Although automatic conveyor works requiring accurate timing and positioning yield high productivity, the tele-operation with user's intuition will be more efficient in unstructured environments which require target selection and judgment. Conclusions: This system increased work efficiency and stability by considering ancillary intelligence as well as user's experience and knowhow. In addition, senior and female workers will operate the system easily because it can reduce labor and minimized user fatigue.

Configuration Management System for Rotorcraft Multi-Component Developement (회전익기 다품종부품 개발을 위한 형상관리 체계)

  • Kim, Hyun-Gi;Kim, Hwakbum;Kim, Sungchan
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.20 no.3
    • /
    • pp.35-43
    • /
    • 2012
  • Medium size rotorcraft consist of approximately 5,000 key components. The components must satisfy the target weight and performance requirement through optimization. Therefore a rotorcraft component has approximately 100 times higher unit cost for mass production than the equivalent of an automobile's, along with huge development cost. Configuration management consists of four main parts : configuration identification, configuration control, configuration audit, and data management. In development programme, configuration management is one of the methods to save development cost, and setting a well-structured configuration management system according to the Military Standard is an important factor in success of the programme. The paper proposes a configuration management system suitable for development of various multi-use components development and presents that the configuration management was performed successfully during dual-use component development programme using the established system.

Development of SAR Image Quality Performance Analysis Tool for High Resolution Spaceborne Synthetic Aperture Radar (고해상도 위성 SAR 영상품질 성능 분석 툴 개발)

  • Oh, Tae-Bong;Jung, Chul-Ho;Song, Sun-Ho;Shin, Jae-Min;Kwag, Young-Kil
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.38 no.2
    • /
    • pp.188-194
    • /
    • 2010
  • In this paper, the typical Synthetic Aperture Radar (SAR) image quality parameters and analysis method are defined, and the SAR image analysis tool is presented for SAR image evaluation. The structure of the developed SAR image analysis tool consists of four key modules; point target analysis (PTA) module, distributed target analysis (DTA) module, ambiguity analysis (AMA) module, and NESZ analysis (NESZA) module. The developed tool is able to extract the various SAR system parameters from standard SAR product format files. Based on these extracted system parameters, typical SAR image quality parameters are derived from SAR image data.

A Network-Based Model for Estimating the Market Share of a High-Speed Rail System in the Korean NW-SE Corridor (네트워크 기반모델을 이용한 서울-부산간 고속철도 개통 후의 교통수단별 시장점유율 예측)

  • Gang-Len Chang
    • Proceedings of the KOR-KST Conference
    • /
    • 2003.02a
    • /
    • pp.127-150
    • /
    • 2003
  • This research presents a novel application of static traffic assignment methods, but with a variable time value, for estimating the market share of a high-speed rail (HSR) in the NW-SE corridor of Korea which is currently served by the airline (AR), conventional rail (CR), and highway (HWY) modes. The proposed model employs the time-space network structure to capture the interrelations among all competing transportation modes, and to reflect their supply- and demand-sides constraints as well as interactions through properly formulated link-node structures. The embedded cost function for each network link offers the flexibility for incorporating all associated factors, such as travel time and fare, in the model computation, and enables the use of a distribution rather than a constant to represent the time-value variation among all transportation mode users. To realistically capture the tripmakers' value-of-time (VOT) along the target area, a novel method for VOT calibration has been developed with aggregate demand information and key system performance data from the target area. Under the assumption that intercity tripmakers often have nearly "perfect" travel information, one can solve the market share of each mode after operations of HSR for each O-D pair under the time-dependent demand with state-of-the-art traffic assignment. Aside from estimating new market share, this paper also investigated the impacts of HSR on other existing transportation modes.

  • PDF

A Study of a Video-based Simulation Input Modeling Procedure in a Construction Equipment Assembly Line (건설기계 조립라인의 동영상 기반 시뮬레이션 입력 모델링 절차 연구)

  • Hoyoung Kim;Taehoon Lee;Bonggwon Kang;Juho Lee;Soondo Hong
    • The Journal of Bigdata
    • /
    • v.7 no.1
    • /
    • pp.99-111
    • /
    • 2022
  • A simulation technique can be used to analyze performance measures and support decision makings in manufacturing systems considering operational uncertainty and complexity. The simulation requires an input modeling procedure to reflect the target system's characteristics. However, data collection to build a simulation is quite limited when a target system includes manual productions with a lot of operational time such as construction equipment assembly lines. This study proposes a procedure for simulation input modeling using video data when it is difficult to collect enough input data to fit a probability distribution. We conducted a video-data analysis and specify input distributions for the simulation. Based on the proposed procedure, simulation experiments were conducted to evaluate key performance measures of the target system. We also expect that the proposed procedure may help simulation-based decision makings when obtaining input data for a simulation modeling is quite challenging.

Efficient and Precise Construction of Markerless Manipulations in the Bacillus subtilis Genome

  • Yu, Haojie;Yan, Xin;Shen, Weiliang;Shen, Yujia;Zhang, Ji;Li, Shunpeng
    • Journal of Microbiology and Biotechnology
    • /
    • v.20 no.1
    • /
    • pp.45-53
    • /
    • 2010
  • We have developed an efficient and precise method for genome manipulations in Bacillus subtilis that allows rapid alteration of a gene sequence or multiple gene sequences without altering the chromosome in any other way. In our approach, the Escherichia coli toxin gene mazF, which was used as a counter-selectable marker, was placed under the control of a xylose-inducible expression system and associated with an antibiotic resistance gene to create a "mazF-cassette". A polymerase chain reaction (PCR)-generated fragment, consisting of two homology regions joined to the mazF-cassette, was integrated into the chromosome at the target locus by homologous recombination, using positive selection for antibiotic resistance. Then, the excision of the mazF-cassette from the chromosome by a single-crossover event between two short directly repeated (DR) sequences, included in the design of the PCR products, was achieved by counter-selection of mazF. We used this method efficiently and precisely to deliver a point mutation, to inactivate a specific gene, to delete a large genomic region, and to generate the in-frame deletion with minimal polar effects in the same background.

A Study on Digital Watermarking of MPEG Coded Video Using Wavelet Transform (웨이블릿 변환를 이용한 MPEG 디지털동영상 워터마킹에 관한 연구)

  • Lee, Hak-Chan;Jo, Cheol-Hun;Song, Jung-Won
    • The KIPS Transactions:PartB
    • /
    • v.8B no.5
    • /
    • pp.579-586
    • /
    • 2001
  • Digital watermarking is to embed imperceptible mark into image, video, audio, and text data to prevent the illegal copy of multimedia data. arbitrary modification, and also illegal sales of the copies without agreement of copyright ownership. In this paper, we study for the embedding and extraction of watermark key using wavelet in the luminance signal in order to implement the system to protect the copyright for image MPEG. First, the original image is analyzed into frequency domain by discrete wavelet transform. The RSA(Rivest, Shamir, Aldeman) public key of the coded target is RUN parameter of VLD(variable length coding). Because the high relationship among the adjacent RUN parameters effect the whole image, it prevents non-authorizer not to possess private key from behaving illegally. The Results show that the proposed method provides better moving picture and the distortion more key of insert than direct coded method on low-frequency domain based DCT.

  • PDF

A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model

  • Lu, Yang;Li, Jiguo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1502-1522
    • /
    • 2019
  • Leakage of secret keys may be the most devastating problem in public key cryptosystems because it means that all security guarantees are missing. The forward security mechanism allows users to update secret keys frequently without updating public keys. Meanwhile, it ensures that an attacker is unable to derive a user's secret keys for any past time, even if it compromises the user's current secret key. Therefore, it offers an effective cryptographic approach to address the private key leakage problem. As an extension of the forward security mechanism in certificate-based public key cryptography, forward-secure certificate-based signature (FS-CBS) has many appealing merits, such as no key escrow, no secure channel and implicit authentication. Until now, there is only one FS-CBS scheme that does not employ the random oracles. Unfortunately, our cryptanalysis indicates that the scheme is subject to the security vulnerability due to the existential forgery attack from the malicious CA. Our attack demonstrates that a CA can destroy its existential unforgeability by implanting trapdoors in system parameters without knowing the target user's secret key. Therefore, it is fair to say that to design a FS-CBS scheme secure against malicious CAs without lying random oracles is still an unsolved issue. To address this problem, we put forward an enhanced FS-CBS scheme without random oracles. Our FS-CBS scheme not only fixes the security weakness in the original scheme, but also significantly optimizes the scheme efficiency. In the standard model, we formally prove its security under the complexity assumption of the square computational Diffie-Hellman problem. In addition, the comparison with the original FS-CBS scheme shows that our scheme offers stronger security guarantee and enjoys better performance.