• Title/Summary/Keyword: New Address Information

Search Result 703, Processing Time 0.034 seconds

Reverting Gene Expression Pattern of Cancer into Normal-Like Using Cycle-Consistent Adversarial Network

  • Lee, Chan-hee;Ahn, TaeJin
    • International Journal of Advanced Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.275-283
    • /
    • 2018
  • Cancer show distinct pattern of gene expression when it is compared to normal. This difference results malignant characteristic of cancer. Many cancer drugs are targeting this difference so that it can selectively kill cancer cells. One of the recent demand for personalized treating cancer is retrieving normal tissue from a patient so that the gene expression difference between cancer and normal be assessed. However, in most clinical situation it is hard to retrieve normal tissue from a patient. This is because biopsy of normal tissues may cause damage to the organ function or a risk of infection or side effect what a patient to take. Thus, there is a challenge to estimate normal cell's gene expression where cancers are originated from without taking additional biopsy. In this paper, we propose in-silico based prediction of normal cell's gene expression from gene expression data of a tumor sample. We call this challenge as reverting the cancer into normal. We divided this challenge into two parts. The first part is making a generator that is able to fool a pretrained discriminator. Pretrained discriminator is from the training of public data (9,601 cancers, 7,240 normals) which shows 0.997 of accuracy to discriminate if a given gene expression pattern is cancer or normal. Deceiving this pretrained discriminator means our method is capable of generating very normal-like gene expression data. The second part of the challenge is to address whether generated normal is similar to true reverse form of the input cancer data. We used, cycle-consistent adversarial networks to approach our challenges, since this network is capable of translating one domain to the other while maintaining original domain's feature and at the same time adding the new domain's feature. We evaluated that, if we put cancer data into a cycle-consistent adversarial network, it could retain most of the information from the input (cancer) and at the same time change the data into normal. We also evaluated if this generated gene expression of normal tissue would be the biological reverse form of the gene expression of cancer used as an input.

Boosting the Performance of the Predictive Model on the Imbalanced Dataset Using SVM Based Bagging and Out-of-Distribution Detection (SVM 기반 Bagging과 OoD 탐색을 활용한 제조공정의 불균형 Dataset에 대한 예측모델의 성능향상)

  • Kim, Jong Hoon;Oh, Hayoung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.11
    • /
    • pp.455-464
    • /
    • 2022
  • There are two unique characteristics of the datasets from a manufacturing process. They are the severe class imbalance and lots of Out-of-Distribution samples. Some good strategies such as the oversampling over the minority class, and the down-sampling over the majority class, are well known to handle the class imbalance. In addition, SMOTE has been chosen to address the issue recently. But, Out-of-Distribution samples have been studied just with neural networks. It seems to be hardly shown that Out-of-Distribution detection is applied to the predictive model using conventional machine learning algorithms such as SVM, Random Forest and KNN. It is known that conventional machine learning algorithms are much better than neural networks in prediction performance, because neural networks are vulnerable to over-fitting and requires much bigger dataset than conventional machine learning algorithms does. So, we suggests a new approach to utilize Out-of-Distribution detection based on SVM algorithm. In addition to that, bagging technique will be adopted to improve the precision of the model.

Review of potential spermatogenic and aphrodisiac effects of the Ferula genus

  • Seyyed Majid Bagheri;Amir Shieh;Jalil Alizadeh Ghalenoei;Maryam Yadegari;Nasrin Alborzi
    • Clinical and Experimental Reproductive Medicine
    • /
    • v.50 no.3
    • /
    • pp.143-153
    • /
    • 2023
  • Objective: Men's sexual health plays an important role in male fertility and childbearing, as it is associated with factors such as sexual desire, healthy spermatogenesis, and erectile function. In various cultures, medicinal plants have been utilized to address male sexual issues, including infertility and erectile dysfunction. Despite recent advancements in medical science for treating male impotence, some men opt for herbal supplements as an alternative, given that numerous herbs have the potential to enhance male sexual performance. The Apiaceae family is one of the oldest plant families used for medicinal purposes. Ferula, a genus within this family, comprises approximately 170 different species worldwide. Members of this genus possess numerous therapeutic properties due to the presence of various compounds. This article aims to explore the potential impacts of Ferula plants on the male reproductive system. Methods: This review article was prepared by searching for terms including Ferula and "aphrodisiac," Ferula and "spermatogenesis," and Ferula and "male reproductive system." Relevant information was gathered through electronic databases, including ISI Web of Knowledge, PubMed, and Google Scholar. Results: The findings indicated that relatively comprehensive studies have been conducted in this area, revealing that certain Ferula species have been employed in folk medicine to boost fertility and libido. Recent research has corroborated these effects. Conclusion: It is hoped that new aphrodisiac compounds with fewer side effects can be isolated from Ferula plants in the future.

Design of an Enhanced Group Keypad to Prevent Shoulder-Surfing Attacks and Enable User Convenience (어깨 너머 공격을 차단하고 사용 편의성이 가능한 개선된 그룹 키패드 설계)

  • Hyung-Jin Mun
    • Journal of Practical Engineering Education
    • /
    • v.15 no.3
    • /
    • pp.641-647
    • /
    • 2023
  • In the fintech environment, ensuring secure financial transactions with smartphones requires authenticating the device owner. Smartphone authentication techniques encompass a variety of approaches, such as passwords, biometrics, SMS authentication, and more. Among these, password-based authentication is commonly used and highly convenient for user authentication. Although it is a simple authentication mechanism, it is susceptible to eavesdropping and keylogging attacks, alongside other threats. Security keypads have been proposed to address vulnerabilities in password input on smartphones. One such innovation is a group keypad, resistant to attacks that guess characters based on touch location. However, improvements are needed for user convenience. In this study, we aim to propose a method that enhances convenience while being resistant to eavesdropping and recording attacks on the existing group keypad. The proposed method uses new signs to allow users to verify instead of the last character confirmation easily and employs dragging-to-touch for blocking recording attacks. We suggest diverse positioning methods tailored for domestic users, improving efficiency and security in password input compared to existing methods.

A Study on the Choice Factors of Online Freight Marketplace (화물운송 마켓플레이스 선택요인에 관한 연구)

  • Hyun-Min Oh;Hyang-Sook Lee
    • Korea Trade Review
    • /
    • v.46 no.4
    • /
    • pp.189-204
    • /
    • 2021
  • The fourth industrial revolution is affecting the industry as a whole, and the current logistics industry is coexisting with crises and opportunities. As part of overcoming this situation, the online platformization of the logistics market has recently been rapidly taking place, and the growth of e-commerce around developed countries has emerged as a demand for flexible freight services that can send and receive cargo anywhere and anytime at appropriate cost. However, the logistics industry has not been able to change rapidly in line with the demands of the market as it is immersed in traditional transportation transactions. Thus, the digital transformation of the freight market has become urgent to address problems such as uncertainty over traditionally closed and conservative freight market transaction processes and the lack of reliability caused by information asymmetry. Therefore, innovative domestic and foreign companies are attempting to establish a new way of transporting cargo, especially a marketplace way of connecting suppliers and consumers. Current status analysis and case studies were conducted through existing literature surveys, and prior research on freight market place selection factors was previewed, and the selection factors were stratified into five upper and 19 lower factors. Through this study, it is expected that improvements for sustainable growth of freight marketplace companies will be derived and that it will be a basic study of establishing management strategies through marketplace operation and quality control. In addition, it is deemed that the priority of customer requirements can be actively accepted, providing an opportunity to actively respond and strengthen corporate competitiveness.

A Study on the Crime Investigation of Anonymity-Driven Blockchain Forensics (익명 네트워크 기반 블록체인 범죄 수사방안 연구)

  • Han, Chae-Rim;Kim, Hak-Kyong
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.45-55
    • /
    • 2023
  • With the widespread use of digital devices, anonymous communication technologies such as the dark web and deep web are becoming increasingly popular for criminal activity. Because these technologies leave little local data on the device, they are difficult to track using conventional crime investigation techniques. The United States and the United Kingdom have enacted laws and developed systems to address this issue, but South Korea has not yet taken any significant steps. This paper proposes a new blockchain-based crime investigation method that uses physical memory data analysis to track the behavior of anonymous network users. The proposed method minimizes infringement of basic rights by only collecting physical memory data from the device of the suspected user and storing the tracking information on a blockchain, which is tamper-proof and transparent. The paper evaluates the effectiveness of the proposed method using a simulation environment and finds that it can track the behavior of dark website users with a residual rate of 77.2%.

Multi-objective Generative Design Based on Outdoor Environmental Factors: An Educational Complex Design Case Study

  • Kamyar FATEMIFAR;Qinghao ZENG;Ali TAYEFEH-YARAGHBAFHA;Pardis PISHDAD
    • International conference on construction engineering and project management
    • /
    • 2024.07a
    • /
    • pp.585-594
    • /
    • 2024
  • In recent years, the construction industry has rapidly adopted offsite-manufacturing and distributed construction methods. This change brings a variety of challenges requiring innovative solutions, such as the utilization of AI-driven and generative design. Numerous studies have explored the concept of multi-objective generative design with genetic algorithms in construction. However, this paper highlights the challenges and proposes a solution for combining generative design with distributed construction to address the need for agility in design. To achieve this goal, the research delves into the development of a multi-objective generative design optimization using a weighted genetic algorithm based on simulated annealing. The specific design case adopted is an educational complex. The proposed process strives for scalable economic viability, environmental comfort, and operational efficiency by optimizing modular configurations of architectural spaces, facilitating affordable, scalable, and optimized construction. Rhino-Grasshopper and Galapagos design tools are used to create a virtual environment capable of generating architectural configurations within defined boundaries. Optimization factors include adherence to urban regulations, acoustic comfort, and sunlight exposure. A normalized scoring approach is also presented to prioritize design preferences, enabling systematic and data-driven design decision-making. Building Information Modeling (BIM) tools are also used to transform the optimization results into tangible architectural elements and visualize the outcome. The resulting process contributes both to practice and academia. Practitioners in AEC industry could gain benefit through adopting and adapting its features with the unique characteristics of various construction projects while educators and future researchers can modify and enhance this process based on new requirements.

Energy-Efficient Division Protocol for Mobile Sink Groups in Wireless Sensor Network (무선 센서 네트워크에서 이동 싱크 그룹의 분리를 지원하기 위한 라우팅 프로토콜)

  • Jang, Jaeyoung;Lee, Euisin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.1
    • /
    • pp.1-8
    • /
    • 2017
  • Communications for mobile sink groups such as rescue teams or platoons bring about a new challenging issue for handling mobility in wireless sensor networks. To do this, many studies have been proposed to support mobile sink groups. When closely looking at mobile sink groups, they can be divided into (multiple) small groups according to the property of applications. For example, a platoon can be divided into multiple squads to carry out its mission in the battle field. However, the previous studies cannot efficiently support the division of mobile sink groups because they do not address three challenging issues engendered by the mobile sink group division. The first issue is to select a leader sink for a new small mobile sink group. The efficient data delivery from a source to small mobile sink groups is the second issue. Last, the third issue is to share data between leader sinks of small mobile sink groups. Thus, this paper proposes a routing protocol to efficiently support the division of mobile sink groups by solving the three challenging issues. For the first issue, the proposed protocol selects a leader sink of a new small mobile sink group which provide a minimum summation of the distance between the new leader sink and the previous leader sink and the distance from the new leader sink to all of its member sinks. For the efficient data delivery from a source to small mobile sink groups in the second issue, the proposed protocol determines the path to minimize the data dissemination distance from source to small mobile sink group by calculating with the location information of both the source and the leader sinks. With regard to the third issue, the proposed protocol exploits member sinks located among leader sinks to provide efficient data sharing among leaders sinks by considering the location information of member sinks. Simulation results verified that the proposed protocol is superior to the previous protocol in terms of the energy consumption.

Development Strategy for New Climate Change Scenarios based on RCP (온실가스 시나리오 RCP에 대한 새로운 기후변화 시나리오 개발 전략)

  • Baek, Hee-Jeong;Cho, ChunHo;Kwon, Won-Tae;Kim, Seong-Kyoun;Cho, Joo-Young;Kim, Yeongsin
    • Journal of Climate Change Research
    • /
    • v.2 no.1
    • /
    • pp.55-68
    • /
    • 2011
  • The Intergovernmental Panel on Climate Change(IPCC) has identified the causes of climate change and come up with measures to address it at the global level. Its key component of the work involves developing and assessing future climate change scenarios. The IPCC Expert Meeting in September 2007 identified a new greenhouse gas concentration scenario "Representative Concentration Pathway(RCP)" and established the framework and development schedules for Climate Modeling (CM), Integrated Assessment Modeling(IAM), Impact Adaptation Vulnerability(IAV) community for the fifth IPCC Assessment Reports while 130 researchers and users took part in. The CM community at the IPCC Expert Meeting in September 2008, agreed on a new set of coordinated climate model experiments, the phase five of the Coupled Model Intercomparison Project(CMIP5), which consists of more than 30 standardized experiment protocols for the shortterm and long-term time scales, in order to enhance understanding on climate change for the IPCC AR5 and to develop climate change scenarios and to address major issues raised at the IPCC AR4. Since early 2009, fourteen countries including the Korea have been carrying out CMIP5-related projects. Withe increasing interest on climate change, in 2009 the COdinated Regional Downscaling EXperiment(CORDEX) has been launched to generate regional and local level information on climate change. The National Institute of Meteorological Research(NIMR) under the Korea Meteorological Administration (KMA) has contributed to the IPCC AR4 by developing climate change scenarios based on IPCC SRES using ECHO-G and embarked on crafting national scenarios for climate change as well as RCP-based global ones by engaging in international projects such as CMIP5 and CORDEX. NIMR/KMA will make a contribution to drawing the IPCC AR5 and will develop national climate change scenarios reflecting geographical factors, local climate characteristics and user needs and provide them to national IAV and IAM communites to assess future regional climate impacts and take action.

e-Business Security Framework and applied to Architecture (e-Business Security 프레임웍과 적용 방안)

  • 홍승필;김명철;김재현;김민형
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.87-97
    • /
    • 2002
  • Many firms are utilizing the Internet and various information technologies to effectively manage their business operations with a goal of gaining a competitive advantage in the rapidly changing business environments. Today, the business is characterized as digital economy where information freely flows and business processes are improved with the use of information technologies. Internet technology is playing a key role in transforming the organization and creating new business models. It has become the infrastructure of choice for electronic commerce because it provides process efficiency, cost reduction, and open standards that can easily be adopted by different organizations. Here, the vast amount of data and information slow among the related parties and security issues are very critical matter of research interests by academicians and practitioners. In this research, we address the importance of security framework in managing the data shared among the related parties in the e-business and suggest the security architecture for effectively supporting the needs of e-business in an organization. This research provides valuable contributions both in academics and industry in terms of how security framework and architecture should be set in order to provide the necessary e-business.

  • PDF