• Title/Summary/Keyword: Matrix Table

Search Result 170, Processing Time 0.019 seconds

Phylogeny of Ganoderma Based on the Restriction Enzyme Analysis of Mitochondrial DNA (미토콘드리아 DNA의 제한효소 분석법에 의한 영지의 계통분류)

  • Hong, Soon-Gyu;Jung, Hack-Sung
    • Korean Journal of Microbiology
    • /
    • v.32 no.4
    • /
    • pp.245-251
    • /
    • 1994
  • Ten strains of 7 species from the genus Ganoderma, G. lucidum ATCC 64251, FP-103561-T, and ES70701, G. applanatum ATCC 44053 and FP-57035-T. G. lobatum ATCC 42985, G. resinaceum ATCC 52416, G. subamboinense var. laevisporum ATCC 52420, G. meredithae ATCC 64492, and G. microsporum ATCC 76024, were studied to discuss their phylogenetic relationships by utilizing restriction fragment length polymorphisms (RFLPs) of mitochondrial DNAs (mtDNAs). Six restriction enzymes, BamHI, BglII, EcoRI, HindIII, PvuII, and XbaI which digested mtDNAs into adequate numbers of restriction fragments for cluster analysis, were used in this study. Restriction profiles of strains for each restriction enzyme were treated as analysis characters to calculate similarity coefficients, which were converted into nucleotide sequence divergence values whose mean values were then arranged in a matrix table. This table was utilized for a phylogenetic analysis using the Neighborjoining method of the PHYLIP package to construct phylogenetic tree. Three strains of G. lucidum and two strains of G. applanatum exhibited different lineages each but one of G. applanatum strains showed a close relationship with G. lobatum, which reflected the species complexity of these species whose strains were phenotypically indistinguishable but genetically distinct. The present results suggest that the natural classification of Ganoderma needs to be considered from the viewpoints of molecular biology-based systematics as well as morphological classifications and cultural identifications for better phylogenetic conclusions.

  • PDF

Development and application of GLS OD matrix estimation with genetic algorithm for Seoul inner-ringroad (유전알고리즘을 이용한 OD 추정모형의 개발과 적용에 관한 연구 (서울시 내부순환도로를 대상으로))

  • 임용택;김현명;백승걸
    • Journal of Korean Society of Transportation
    • /
    • v.18 no.4
    • /
    • pp.117-126
    • /
    • 2000
  • Conventional methods for collecting origin-destination trips have been mainly relied on the surveys of home or roadside interview. However, the methods tend to be costly, labor intensive and time disruptive to the trip makers, thus the methods are not considered suitable for Planning applications such as routing guidance, arterial management and information Provision, as the parts of deployments in Intelligent Transport Systems Motivated by the problems, more economic ways to estimate origin-destination trip tables have been studied since the late 1970s. Some of them, which have been estimating O-D table from link traffic counts are generally Entropy maximizing, Maximum likelihood, Generalized least squares(GLS), and Bayesian inference estimation etc. In the Paper, with user equilibrium constraint we formulate GLS problem for estimating O-D trips and develop a solution a1gorithm by using Genetic Algorithm, which has been known as a g1oba1 searching technique. For the purpose of evaluating the method, we apply it to Seoul inner ringroad and compare it with gradient method proposed by Spiess(1990). From the resu1ts we fond that the method developed in the Paper is superior to other.

  • PDF

Evaluation of International BIM Standard Contracts to establish BIM Copyrights and Operational Protocols in Korea (국제 BIM 표준계약서 분석을 통한 국내 BIM 저작권 보호 및 운용 체계 수립에 관한 연구)

  • Koo, Bonsang;Shin, Byungjin
    • Korean Journal of Construction Engineering and Management
    • /
    • v.17 no.6
    • /
    • pp.24-30
    • /
    • 2016
  • Building Information Modeling, and its associated work practices, requires project participants to share not only 3D geometric data, but also information in the model that may be considered proprietary and even trade secrets. Thus protection of intellectual property, or BIM copyrights, must be in place for participants to share proprietary information among project stakeholders. Currently Korea does not have adequate copyright laws or mechanisms to provide such protection. This research examined three BIM copyright legal documents, namely U.S.' ConsensusDOCS 301, AIA Document E203/G202, and U.K.'s CIC BIM Protocol to determine how copyright protection is realized, and to formulate appropriate stipulations within the Korean construction context. The resultant requirements include stipulating ownership at to the BIM originator, adopting a license-sublicense scheme, employing a federated model, and use of a formal model delivey table to allocate responsibilities. Given Korea's adoption stage, liability should be minimal, and license revocation should be allowed if payments are not met. The three BIM legal documents focus on practical measures that allow participants to customize requirements for individual projects, and such conventions should be emulated in Korea.

A Study on Interindustry Analysis between Forestry Sector and Other Industrial Sector (임업부문(林業部門)과 타산업부문간(他産業部門間)의 산업관련분석(産業關聯分析)에 관(關)한 연구(研究))

  • Kim, Jong Ho;Park, Tae Sik
    • Journal of Korean Society of Forest Science
    • /
    • v.68 no.1
    • /
    • pp.1-10
    • /
    • 1985
  • This study was carried to analyze the structural change of interrelationships between the forestry including forest product processing and the other industrial sectors. The interindustry tables (19 setors) were drawn with the aid of the interindustry table published in 1970, 1975 and 1980 in connection with the forestry and forest product processing. In addition, the input coefficient and inverse matrix coefficient were calculated in the light of the 19 sector of interindustry tables. Owing to the change of economic structure during the period of 1970-1980, the importance of forest in Gross National Product has been decreasing. But it has shown that forestry is a kind of original industry having a great deal of intermediate demand which is constantly increasing. Therefore, forestry could be regarded as a supply industry to other industries. In addition, the import coefficient of forestry products in larger than that of other industries and it keeps increasing.

  • PDF

A Study on NOx Emission Control Methods in the Cement Firing Process Using Data Mining Techniques (데이터 마이닝을 이용한 시멘트 소성공정 질소산화물(NOx)배출 관리 방법에 관한 연구)

  • Park, Chul Hong;Kim, Yong Soo
    • Journal of Korean Society for Quality Management
    • /
    • v.46 no.3
    • /
    • pp.739-752
    • /
    • 2018
  • Purpose: The purpose of this study was to investigate the relationship between kiln processing parameters and NOx emissions that occur in the sintering and calcination steps of the cement manufacturing process and to derive the main factors responsible for producing emissions outside emission limit criteria, as determined by category models and classification rules, using data mining techniques. The results from this study are expected to be useful as guidelines for NOx emission control standards. Methods: Data were collected from Precalciner Kiln No.3 used in one of the domestic cement plants in Korea. Thirty-four independent variables affecting NOx generation and dependent variables that exceeded or were below the NOx emiision limit (>1 and <0, respectively) were examined during kiln processing. These data were used to construct a detection model of NOx emission, in which emissions exceeded or were below the set limits. The model was validated using SPSS MODELER 18.0, artificial neural network, decision treee (C5.0), and logistic regression analysis data mining techniques. Results: The decision tree (C5.0) algorithm best represented NOx emission behavior and was used to identify 10 processing variables that resulted in NOx emissions outside limit criteria. Conclusion: The results of this study indicate that the decision tree (C5.0) can be applied for real-time monitoring and management of NOx emissions during the cement firing process to satisfy NOx emission control standards and to provide for a more eco-friendly cement product.

Fast Search with Data-Oriented Multi-Index Hashing for Multimedia Data

  • Ma, Yanping;Zou, Hailin;Xie, Hongtao;Su, Qingtang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2599-2613
    • /
    • 2015
  • Multi-index hashing (MIH) is the state-of-the-art method for indexing binary codes, as it di-vides long codes into substrings and builds multiple hash tables. However, MIH is based on the dataset codes uniform distribution assumption, and will lose efficiency in dealing with non-uniformly distributed codes. Besides, there are lots of results sharing the same Hamming distance to a query, which makes the distance measure ambiguous. In this paper, we propose a data-oriented multi-index hashing method (DOMIH). We first compute the covariance ma-trix of bits and learn adaptive projection vector for each binary substring. Instead of using substrings as direct indices into hash tables, we project them with corresponding projection vectors to generate new indices. With adaptive projection, the indices in each hash table are near uniformly distributed. Then with covariance matrix, we propose a ranking method for the binary codes. By assigning different bit-level weights to different bits, the returned bina-ry codes are ranked at a finer-grained binary code level. Experiments conducted on reference large scale datasets show that compared to MIH the time performance of DOMIH can be improved by 36.9%-87.4%, and the search accuracy can be improved by 22.2%. To pinpoint the potential of DOMIH, we further use near-duplicate image retrieval as examples to show the applications and the good performance of our method.

Efficient All-to-All Personalized Communication Algorithms in Wormhole Networks (웜홀 방식 망에서의 효율적인 완전교환 통신 알고리즘)

  • Kim, Si-Gwan;Maeng, Seung-Ryoul;Cho, Jung-Wan
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.5
    • /
    • pp.464-474
    • /
    • 2000
  • All-to-all personalized communication, or complete exchange, is at the heart of numerous applications, such as matrix transposition, fast Fourier Transform(FFT), and distributed table lookup.We present an efficient all-to-all personalized communication algorithm for a 2D torus inwormhole-routed networks. Our complete exchange algorithm adopts divide-and-conquer approach toreduce the number of start-up latency significantly, which is a good metric for network performancein wormhole networks. First, we divide the whole network into 2x2 basic cells, After speciallydesignated nodes called master nodes have collected messages to transmit to the rest of the basic cell,only master nodes perform complete exchange with reduced network size, N/2 x N/2. When finishedwith this complete exchange in master nodes, these nodes distribute messages to the rest of the masternode, which results in the desired complete exchange communication. After we present our algorithms,we analyze time complexities and compare our algorithms with several previous algorithms. And weshow that our algorithm is efficient by a factor of 2 in the required start-up time which means thatour algorithm is suitable for wormhole-routed networks.

  • PDF

A Study of the Modulus Multiplier Design for Speed up Throughput in the Public-key Cryptosystem (공개키 암호시스템의 처리속도향상을 위한 모듈러 승산기 설계에 관한 연구)

  • 이선근;김환용
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.4
    • /
    • pp.51-57
    • /
    • 2003
  • The development of the communication network and the other network method can generate serious social problems. So, it is highly required to control security of network. These problems related security will be developed and keep up to confront with anti-security field such as hacking, cracking. The way to preserve security from hacker or cracker without developing new cryptographic algorithm is keeping the state of anti-cryptanalysis in a prescribed time by means of extending key-length. In this paper, we proposed M3 algorithm for the reduced processing time in the montgomery multiplication part. Proposed M3 algorithm using the matrix function M(.) and lookup table perform optionally montgomery multiplication with repeated operation. In this result, modified repeated operation part produce 30% processing rate than existed montgomery multiplicator. The proposed montgomery multiplication structured unit array method in carry generated part and variable length multiplication for eliminating bottle neck effect with the RSA cryptosystem. Therefore, this proposed montgomery multiplier enforce the real time processing and prevent outer cracking.

A Study for DHRMIS S/W Quantitive Quality Evaluation (국방 인사정보 S/W체계의 정량적 품질평가 연구)

  • Rho, Seung-Dam;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.273-280
    • /
    • 2008
  • This paper is thing for a quantitive quality evaluation in national Defense Human Resource Management Information S/W system development. Apply a quantitive quality evaluation way to be based on an international standard to admonish at ISO/IEC 9126. Proposed 6 basis of count, and set up sub 27 items detailed functionality, reliability, use anger, efficiency, maintenance anger, a transplant result, and inspection of quality table wrote the Matrix measured S/W quality to a chart. Studied a quantitive evaluation plan of a Defense Human Resource Management Information S/W system to see weight by the priority order that reflected a characteristic of a national defense business to a Purpose of a subject user, and Presented. It is 80% in quantitive quality evaluation application satisfied under 8, Very Satisfied 7(87.5%) Satisfied 1(12.5%) of Defense Human Resource Managers and judgment worked as marked so that satisfaction of reliability and a user regarding functionality was high and there will be contribute to an elevation of defense capabilities as analyze efficient national defense S/W use and effect.

  • PDF

The Analysis of Successional Trends by Community Types in the Natural Deciduous Forest of Mt. Jumbong (점봉산 일대 천연활엽수림의 군집 유형별 천이 경향 분석)

  • Jin, Guang Ze;Kim, Ji Hong
    • Journal of Korean Society of Forest Science
    • /
    • v.94 no.6
    • /
    • pp.387-396
    • /
    • 2005
  • Having employed the transitional probability model based on Markov chain, the study was carried out to examine successional trends for community types in the natural deciduous forest of Mt. Jumbong. The species composition of oncoming generation in overstory was estimated from that of mid-story, and the species composition in mid-story was based upon that of understory. Successional trend for each community was predicted from the reorganized probability matrix of tree replacement by the square of climax index, which was evaluated by the factors of light absorption, reproduction, and wood quality. As the result of analysis, following table shows the oncoming generation of steady state and dominant species in overstory and mid-story by community types. Even though Acer pseudo-sieboldianum and Carpinus cordata could hardly reach the canopy layer due to the intrinsic growth form, these species were predicted to maintain high compositional ratio so as to play an important ecological role in the study forest ecosystem.