• Title/Summary/Keyword: Key Tree

Search Result 417, Processing Time 0.031 seconds

Isolation and Sequence Analysis of Two Ornithine Decarboxylase Antizyme Genes from Flounder (Paralichthys olivaceus)

  • LEE JAE HYUNG;SEO YONG BAE;YOON MOON YOUNG;CHOI JUNG DO;KIM YOUNG TAE
    • Journal of Microbiology and Biotechnology
    • /
    • v.15 no.2
    • /
    • pp.321-329
    • /
    • 2005
  • Ornithine decarboxylase (ODC) antizyme is a key regulatory protein in the control of cellular polyamines. We have isolated two distinct ODC antizyme cDNA clones (AZS and AZL) from a flounder (Paralichthys olivaceus) brain cDNA library. Their sequences revealed that both clones required translational frameshifting for expression. Taking + 1 frameshifting into account, AZS and AZL products were 221 and 218 amino acid residues long, respectively, and shared $83.3\%$ amino acid sequence identity. Comparison of the structure and nucleotide sequence of the antizyme genes showed that the genes were highly conserved in flounder, zebrafish, mouse, and human. A phylogenetic tree was constructed, based on the antizyme amino acid sequences from various species. The presence of the two types of antizyme mRNA species in brain, kidney, liver, and embryo was confirmed by using the reverse transcription­polymerase chain reaction (RT-PCR) and Northern blot analysis. Recombinant proteins of flounder ODC antizymes, containing His-Nus-S tag at the amino-terminus, were overexpressed as His-AZL and His-AZS fusion proteins in Escherichia coli BL21 (DE3) pLys by using the pET­44a(+) expression vector.

Analysis of Urban Green Areas using NDVI and Development of a Model to Analyze Bird Diversity in Urban Parks (NDVI를 활용한 도시 녹지 분석 및 도시공원 조류 종다양성 분석 모형 개발)

  • Song, Won-Kyong
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.21 no.1
    • /
    • pp.73-82
    • /
    • 2018
  • Urban parks are important bird habitat in cities. Various studies have evaluated the habitat function of urban parks focused on field surveys. In this study, we performed applicability of NDVI obtained from Landsat 8 OLI image as a factor for spatial planning considered bird diversity. This study was classified with green boundary into three groups using NDVI's value. Environmental variables were calculated by the green area ratio of the surrounding area from 100m to 500m at each groups. The 20 environmental variables such as park area, park shape index, canopy of tree, etc. were derived, the regression analysis was performed as a dependent variable for the bird diversity of urban parks. As a result, the park area and the green area ratio of Group 3, classified high NDVI, within the 100m buffer were adopted as the variables in the regression model. In other words, it was confirmed that as the park becomes larger, the distribution of key green areas within a radius of 100m of the parks becomes higher, the diversity of bird species has increased. It was appropriate to use satellite image, NDVI to analyze species diversity in urban area.

Position-Based Multicast Routing in Mobile Ad hoc Networks: An Analytical Study

  • Qabajeh, Mohammad M.;Adballa, Aisha H.;Khalifa, Othman O.;Qabajeh, Liana K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1586-1605
    • /
    • 2012
  • With the prevalence of multimedia applications and the potential commercial usage of Mobile Ad hoc Networks (MANETs) in group communications, Quality of Service (QoS) support became a key requirement. Recently, some researchers studied QoS multicast issues in MANETs. Most of the existing QoS multicast routing protocols are designed with flat topology and small networks in mind. In this paper, we investigate the scalability problem of these routing protocols. In particular, a Position-Based QoS Multicast Routing Protocol (PBQMRP) has been developed. PBQMRP builds a source multicast tree guided by the geographic information of the mobile nodes, which helps in achieving more efficient multicast delivery. This protocol depends on the location information of the multicast members which is obtained using a location service algorithm. A virtual backbone structure has been proposed to perform this location service with minimum overhead and this structure is utilized to provide efficient packet transmissions in a dynamic mobile Ad hoc network environment. The performance of PBQMRP is evaluated by performing both quantitative analysis and extensive simulations. The results show that the used virtual clustering is very useful in improving scalability and outperforms other clustering schemes. Compared to On-Demand Multicast Routing Protocol (ODMRP), PBQMRP achieves competing packet delivery ratio and significantly lower control overhead.

Fuzzy identity-based signature scheme from lattice and its application in biometric authentication

  • Zhang, Xiaojun;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2762-2777
    • /
    • 2017
  • A fuzzy identity based signature (FIBS) scheme allows a signer with identity ${\omega}$ to generate a signature which could be verified under identity ${\omega}^{\prime}$ if and only if ${\omega}$ and ${\omega}^{\prime}$ are within a certain distance of each other as judged by some metric. In this paper, we propose an efficient FIBS scheme from lattice assumption, which can resist quantum-computer attacks. Without using the Bonsai Tree technique, we utilize the lattice basis delegation technique to generate the private key, which has the advantage of keeping the lattice dimension invariant. We also prove that our proposed scheme is existentially unforgeable under an adaptive chosen message and identity attack in the random oracle model. Compared with existing scheme, our proposed scheme is much more efficient, especially in terms of communication overhead. Since our FIBS scheme possesses similar error-tolerance property, it can be well applied in post-quantum communication biometric authentication environments, where biometric identifiers such as fingerprints, voice, iris and gait are used in human identification.

A Study on Generation Method of Intonation using Peak Parameter and Pitch Lookup-Table (Peak 파라미터와 피치 검색테이블을 이용한 억양 생성방식 연구)

  • Jang, Seok-Bok;Kim, Hyung-Soon
    • Annual Conference on Human and Language Technology
    • /
    • 1999.10e
    • /
    • pp.184-190
    • /
    • 1999
  • 본 논문에서는 Text-to-Speech 시스템에서 사용할 억양 모델을 위해 음성 DB에서 모델 파라미터와 피치 검색테이블(lookup-table)을 추출하여 미리 구성하고, 합성시에는 이를 추정하여 최종 F0 값을 생성하는 자료기반 접근방식(data-driven approach)을 사용한다. 어절 경계강도(break-index)는 경계강도의 특성에 따라 고정적 경계강도와 가변적 경계강도로 세분화하여 사용하였고, 예측된 경계강도를 기준으로 억양구(Intonation Phrase)와 액센트구(Accentual Phrase)를 설정하였다. 특히, 액센트구 모델은 인지적, 음향적으로 중요한 정점(peak)을 정확하게 모델링하는 것에 주안점을 두어 정점(peak)의 시간축, 주파수축 값과 이를 기준으로 한 앞뒤 기울기를 추정하여 4개의 파라미터로 설정하였고, 이 파라미터들은 CART(Classification and Regression Tree)를 이용하여 예측규칙을 만들었다. 경계음조가 나타나는 조사, 어미는 정규화된(normalized) 피치값과 key-index로 구성되는 검색테이블을 만들어 보다 정교하게 피치값을 예측하였다. 본 논문에서 제안한 억양 모델을 본 연구실에서 제작한 음성합성기를 통해 합성하여 청취실험을 거친 결과, 기존의 상용 Text-to-Speech 시스템에 비해 자연스러운 합성음을 얻을 수 있었다.

  • PDF

Security Elevation of XML Document Using DTD Digital Signature (DTD 전자서명을 이용한 XML문서의 보안성 향상)

  • 김형균;오무송
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.592-596
    • /
    • 2002
  • Can speak that DTD is meta data that define meaning of expressed data on XML document. Therefore, In case DTD information is damaged this information to base security of XML document dangerous. Not that attach digital signature on XML document at send-receive process of XML document in this research, proposed method to attach digital signature to DTD. As reading DTD file to end first, do parsing, and store abstracted element or attribute entitys in hash table. Read hash table and achieve message digest if parsing is ended. Compose and create digital signature with individual key after achievement. When sign digital, problem that create entirely other digest cost because do not examine about order that change at message digest process is happened. This solved by method to create DTD's digital signature using DOM that can embody tree structure for standard structure and document.

  • PDF

HTSC and FH HTSC: XOR-based Codes to Reduce Access Latency in Distributed Storage Systems

  • Shuai, Qiqi;Li, Victor O.K.
    • Journal of Communications and Networks
    • /
    • v.17 no.6
    • /
    • pp.582-591
    • /
    • 2015
  • A massive distributed storage system is the foundation for big data operations. Access latency performance is a key metric in distributed storage systems since it greatly impacts user experience while existing codes mainly focus on improving performance such as storage overhead and repair cost. By generating parity nodes from parity nodes, in this paper we design new XOR-based erasure codes hierarchical tree structure code (HTSC) and high failure tolerant HTSC (FH HTSC) to reduce access latency in distributed storage systems. By comparing with other popular and representative codes, we show that, under the same repair cost, HTSC and FH HTSC codes can reduce access latency while maintaining favorable performance in other metrics. In particular, under the same repair cost, FH HTSC can achieve lower access latency, higher or equal failure tolerance and lower computation cost compared with the representative codes while enjoying similar storage overhead. Accordingly, FH HTSC is a superior choice for applications requiring low access latency and outstanding failure tolerance capability at the same time.

Analysis of Object-Oriented Metrics to Predict Software Reliability (소프트웨어 신뢰성 예측을 위한 객체지향 척도 분석)

  • Lee, Yangkyu
    • Journal of Applied Reliability
    • /
    • v.16 no.1
    • /
    • pp.48-55
    • /
    • 2016
  • Purpose: The purpose of this study is to identify the object-oriented metrics which have strong impact on the reliability and fault-proneness of software products. The reliability and fault-proneness of software product is closely related to the design properties of class diagrams such as coupling between objects and depth of inheritance tree. Methods: This study has empirically validated the object-oriented metrics to determine which metrics are the best to predict fault-proneness. We have tested the metrics using logistic regressions and artificial neural networks. The results are then compared and validated by ROC curves. Results: The artificial neural network models show better results in sensitivity, specificity and correctness than logistic regression models. Among object-oriented metrics, several metrics can estimate the fault-proneness better. The metrics are CBO (coupling between objects), DIT (depth of inheritance), LCOM (lack of cohesive methods), RFC (response for class). In addition to the object-oriented metrics, LOC (lines of code) metric has also proven to be a good factor for determining fault-proneness of software products. Conclusion: In order to develop fault-free and reliable software products on time and within budget, assuring quality of initial phases of software development processes is crucial. Since object-oriented metrics can be measured in the early phases, it is important to make sure the key metrics of software design as good as possible.

Searching for Fly-by Encounters of Galaxies in Cosmological Simulations

  • Ahn, Sung-Ho;Kim, Jeong Hwan;Yun, Kiyun;Kim, Juhan;Yoon, Suk-Jin
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.37 no.2
    • /
    • pp.71.2-71.2
    • /
    • 2012
  • Fly-by interactions of galaxies are hidden drivers of galaxy evolution: The impulsive encounters are by far more frequent than and thus as important as direct mergers, yet hard to identify observationally. Here we present the key characteristics of fly-bys that are examined theoretically via cosmological N-body simulations. In particular, we use the simulations generated by a particle-mesh tree code, GOTPM, and investigate the statistics of galactic fly-by interactions, which are defined by the total energy of two halos of interest being positive and their minimum distances escaping mergers. We discuss (1) the rate of fly-by interactions (the Fly-by Rate, $R_f$) as functions of(a) redshifts, (b) halo masses and mass ratios, and (c) environments, and (2) their impact on galaxy evolution in terms of morphology and star-formation rate, in comparison to that of direct mergers.

  • PDF

Taxonomy and phylogeny of the genus Cryptomonas (Cryptophyceae, Cryptophyta) from Korea

  • Choi, Bomi;Son, Misun;Kim, Jong Im;Shin, Woongghi
    • ALGAE
    • /
    • v.28 no.4
    • /
    • pp.307-330
    • /
    • 2013
  • The genus Cryptomonas is easily recognized by having two flagella, green brownish color, and a swaying behavior. They have relatively simple morphology, and limited diagnostic characters, which present a major difficulty in differentiating between species of the genus. To understand species delineation and phylogenetic relationships among Cryptomonas species, the nuclear-encoded internal transcribed spacer 2 (ITS2), partial large subunit (LSU) and small subunit ribosomal DNA (rDNA), and chloroplast-encoded psbA and LSU rDNA sequences were determined and used for phylogenetic analyses, using Bayesian and maximum likelihood methods. In addition, nuclear-encoded ITS2 sequences were predicted to secondary structures, and were used to determine nine species and four unidentified species from 47 strains. Sequences of helix I, II, and IIIb in ITS2 secondary structure were very useful for the identification of Cryptomonas species. However, the helix IV was the most variable region across species in alignment. The phylogenetic tree showed that fourteen species were monophyletic. However, some strains of C. obovata had chloroplasts with pyrenoid while others were without pyrenoid, which used as a key character in few species. Therefore, classification systems depending solely on morphological characters are inadequate, and require the use of molecular data.