• Title/Summary/Keyword: Partial Key

Search Result 406, Processing Time 0.045 seconds

Purification and Partial Characterization of an Acidic Polysaccharide with Complement Fixing Ability from the Stems of Avicennia Marina

  • Fang, Xubo;Jiang, Bo;Wang, Xiaolan
    • BMB Reports
    • /
    • v.39 no.5
    • /
    • pp.546-555
    • /
    • 2006
  • An acidic polysaccharide fraction that had high anti-complementary activity was isolated from the stems of Grey Mangrove in 0.15% yield. The final fractions was designated HAM-3-IIb-II. The polysaccharide fraction appeared to be homogenous by high performance size exclusion chromatography with an estimated molecular weight of 105 kDa. The isolated polysaccharide is more effective than polysaccharide K (PSK) in its anti-complementary activity at 58 ${\mu}g/ml$ of PSK and 23 ${\mu}g/ml$ of HAM-3-IIb-II that inhibit 50% of complement activity in the complement fixation assay. Structural studies indicated that HAM-3-IIb-II was rich in galacturonic acid along with arabinose, galactose and rhamnose, characterizing a pectin-type polysaccharide, which was also confirmed by FT-IR spectrum. The presence of rich neutral sugar side chains of arabinogalactans may have contributed to the expression of high activity. Traditionally, this mangrove plant is used for medicinal purposes and it appears to have some scientific applications.

The Moderating Effects of Internet Shopping Involvement on the Relationship between Usability, Trust of Internet Shopping Sites and Customer Loyalty (인터넷 쇼핑 사이트의 사용성 및 신뢰성과 고객 충성도간의 관계에서 인터넷 쇼핑 관여도의 조절효과)

  • Suh, Kun-Soo
    • Journal of Information Technology Services
    • /
    • v.7 no.3
    • /
    • pp.1-30
    • /
    • 2008
  • This paper proposes an integrated model of customer loyalty in the context of Internet shopping based on a review of two competing perspectives - transactional and relational views. The research model suggests that the usability and trust associated with an Internet shopping site are key determinants of customer loyalty. In this paper, factors such as promotion, ease of use/navigation, and purchase facilitation are posited as major determinants of usability. Trust, on the other hand, is assumed to be influenced by the quality of communication, social shopping service, and safety level associated with an Internet shopping site. This paper also asserts that the lack of consideration for individual differences is one of the key reasons for the inconsistent and mixed research findings in user acceptance literature. In this regard, the elaboration likelihood model (ELM) is considered to be appropriate referent theory as it may theoretically explain why a particular information technology (IT) related message has varying influences on different adopters. The research model comprising 11 hypotheses was derived from and validated through a survey involving 271 university students. The partial least square(PLS) method was used to test the suitability of the research model and its hypotheses. Overall, the results suggest that the usability and trust associated with an Internet shopping site play an important role in acquiring loyal customers. In particular, the user's Internet shopping involvement is found to moderate the relationship between trust and customer loyalty.

Enhancing the Customer Service Process through Information Technologies and Customer Knowledge in Call Centers : The Moderating Role of Computer Self-Efficacy (콜센터에서 정보기술과 고객지식을 이용한 고객서비스 프로세스 향상 : 컴퓨터 자기효능감의 조절역할)

  • Choi, Sujeong
    • Journal of Information Technology Services
    • /
    • v.16 no.3
    • /
    • pp.185-203
    • /
    • 2017
  • Call center service is enabled by the use of a firm's various information technologies (IT) and accumulated knowledge. IT and knowledge resources have been considered a fundamental infrastructure for developing a firm's business capabilities. Recognizing this, this study examines whether a firm's IT and customer knowledge resources enhance its customer service process capability and thereby contribute to creating superior customer service, at the level of customer service representatives (CSRs). That is, constructs in this study were measured on a basis of CSRs' perception. Moreover, this study verifies the moderating role of CSRs' computer self-efficacy on the relationships between IT and customer knowledge resources and customer service process capability. To test the proposed hypotheses, this study conducted partial least squares (PLS) analysis with a total of 234 data which were collected on CSRs working at four call centers. The key findings are as follows: first, IT infrastructure integration and customer knowledge integration are positively associated with customer service process capability. Second, customer service process capability is a key determinant of customer service performance. Finally, CSRs' computer self-efficacy has a moderating effect on the relationship between IT infrastructure integration and customer service process capability. The details of the findings and implications are presented.

3X Serial GF(2m) Multiplier on Polynomial Basis Finite Field (Polynomial basis 방식의 3배속 직렬 유한체 곱셈기)

  • 문상국
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.255-258
    • /
    • 2004
  • Efficient finite field operation in the elliptic curve (EC) public key cryptography algorithm, which attracts much of latest issues in the applications in information security, is very important. Traditional serial finite multipliers root from Mastrovito's serial multiplication architecture. In this paper, we adopt the polynomial basis and propose a new finite field multiplier, inducing numerical expressions which can be applied to exhibit 3 times as much performance as the Mastrovito's. We described the proposed multiplier with HDL to verify and evaluate as a proper hardware IP. HDL-implemented serial GF (Galois field) multiplier showed 3 times as fast speed as the traditional serial multiplier's adding only Partial-sum block in the hardware.

  • PDF

On the security of SFLASH (SFLASH 안전성에 대한 분석)

  • 정배은;류희수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.147-152
    • /
    • 2002
  • SFLASH, one of the asymmetric signature schemes in NESSIE project, was suggested and accepted in the fat phase. In the latest, results about attacking the affine parts of SFLASH was published. In this paper, we have that an attacker knowing one linear part and two affine parts can easily forge signatures for arbitrary messages without information of the other linear part and the secret suing. It follows that the security of SFLASH depends only on the linear par, which is used in the last step when a signature is being generated. Also, we show that an attacker can obtain partial information of the linear part by the forging method using hem public key and secret elements and we discuss the length of secret key.

An Enhanced Forward Security on JK-RFID Authentication Protocol (JK-RFID 인증 프로토콜에 대한 개선된 전방향 안전성)

  • Jeon, Dong-Ho;Choi, Seoung-Un;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.161-168
    • /
    • 2011
  • In 2009, Jeon et al proposed the lightweight strong authentication and strong privacy protocol, where the tag requrires only simple bitwise operations and random number generator. JK-RFID authentication protocol provides strong security: eavesdropping, replay, spoofing, Location tracking, DoS attack and forward security. Nevertheless, this paper points out the vulnerability of the forward security and improve the process of key updating. As a result, proposes an enhanced JK-RFID authentication protocol providing forward security and verify its satisfaction. In addition, a security and an efficiency of the proposed scheme analyze. Since partial adjustments of the key updating operation in JK-RFID authentication protocol, our protocol improve the forward security.

cDNA Cloning and Polymorphism of the Porcine Carbonic Anhydrase III (CA3) Gene

  • Wu, J.;Deng, Changyan;Xiong, Y.Z.;Zhou, D.H.;Lei, M.G.;Zuo, B.;Li, F.E.;Wang, J.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.19 no.3
    • /
    • pp.324-328
    • /
    • 2006
  • Carbonic anhydrase III (CA3) is a member of a multigene family that encode carbonic anhydrase isozymes. In this study, a complete coding sequence of the pig CA3 gene which encodes a 260 amino-acid protein was determined. The amino acid comparison showed high sequence similarities with previously identified human (86.5%) CA3 gene and mouse (91.5%) Car3 gene. The partial genomic DNA sequences were also investigated. The length of intron 1 was 727 bp. Comparative sequencing of three pig breeds revealed that there was a T${\rightarrow}$C substitution at position 363 within intron 1. The substitution was situated within a NcoI recognition site and was developed as a PCR-restriction fragment length polymorphism (RFLP) marker for further use in population variation investigations and association analysis. Two alleles (A and B) were identified, and 617 bp fragments were observed for the AA genotype and 236 bp and 381 bp fragments for the BB genotype. The polymorphism of CA3 was detected in 8 pig breeds. Allele B was predominant in the Western pig breeds. In addition, association studies of the CA3 polymorphism with carcass traits in 140 $Yorkshire{\times}Meishan$ $F_2$ offspring showed that the NcoI PCR- RFLP genotype may be associated with variation in several carcass traits of interest for pig breeding. Allele B was associated with increases in lean meat percentage, loin eye height and loin eye area. Statistically significant association with backfat thickness was also found; pigs with the AB genotype had much less backfat thickness than AA or BB genotypes.

A Study on the Reliability of Failure Diagnosis Methods of Oil Filled Transformer using Actual Dissolved Gas Concentration (유중가스농도를 이용한 유입식 변압기 고장진단 기법의 신뢰성에 관한 연구)

  • Park, Jin-Yeub;Chin, Soo-Hwan;Park, In-Kyoo
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.60 no.3
    • /
    • pp.114-119
    • /
    • 2011
  • Large Power transformer is a complex and critical component of power plant and consists of cellulosic paper, insulation oil, core, coil etc. Insulation materials of transformer and related equipment break down to liberate dissolved gas due to corona, partial discharge, pyrolysis or thermal decomposition. The dissolved gas kinds can be related to the type of electrical faults, and the rate of gas generation can indicate the severity of the fault. The identities of gases being generated are using very useful to decide the condition of transformation status. Therefore dissolved gas analysis is one of the best condition monitoring methods for power transformer. Also, on-line multi-gas analyzer has been developed and installed to monitor the condition of critical transformers. Rogers method, IEC method, key gas method and Duval Triangle method are used to failure diagnosis typically, and those methods are using the ratio or kinds of dissolved gas to evaluate the condition of transformer. This paper analyzes the reliability of transformer diagnostic methods considering actual dissolved gas concentration. Fault diagnosis is performed based on the dissolved gas of five transformers which experienced various fault respectively in the field, and the diagnosis result is compared with the actual off-line fault analysis. In this comparison result, Diagnostic methods using dissolved gas ratio like Rogers method, IEC method are sometimes fall outside the ratio code and no diagnosis but Duval triangle method and Key gas method is correct comparatively.

Toward a Key-frame Automatic Extraction Method for Video Storyboard Surrogates Based on Users' EEG Signals and Discriminant Analysis (뇌파측정기술(EEG)과 판별분석을 이용한 영상물의 키프레임 자동 분류 방안 연구)

  • Kim, Hyun-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.32 no.3
    • /
    • pp.377-396
    • /
    • 2015
  • This study proposed a key-frame automatic extraction method for video storyboard surrogates based on users' cognitive responses, EEG signals and discriminant analysis. Using twenty participants, we examined which ERP pattern is suitable for each step, assuming that there are five image recognition and process steps (stimuli attention, stimuli perception, memory retrieval, stimuli/memory comparison, relevance judgement). As a result, we found that each step has a suitable ERP pattern, such as N100, P200, N400, P3b, and P600. Moreover, we also found that the peak amplitude of left parietal lobe (P7) and the latency of FP2 are important variables in distinguishing among relevant, partial, and non-relevant frames. Using these variables, we conducted a discriminant analysis to classify between relevant and non-relevant frames.

Analysis of the failure mechanism and support technology for the Dongtan deep coal roadway

  • Chen, Miao;Yang, Sheng-Qi;Zhang, Yuan-Chao;Zang, Chuan-Wei
    • Geomechanics and Engineering
    • /
    • v.11 no.3
    • /
    • pp.401-420
    • /
    • 2016
  • The stability of deep coal roadways with large sections and thick top coal is a typical challenge in many coal mines in China. The innovative Universal Discrete Element Code (UDEC) trigon block is adopted to create a numerical model based on a case study at the Dongtan coal mine in China to better understand the failure mechanism and stability control mechanism of this kind of roadway. The failure process of an unsupported roadway is simulated, and the results suggest that the deformation of the roof is more serious than that of the sides and floor, especially in the center of the roof. The radial stress that is released is more intense than the tangential stress, while a large zone of relaxation appears around the roadway. The failure process begins from partial failure at roadway corners, and then propagates deeper into the roof and sides, finally resulting in large deformation in the roadway. A combined support system is proposed to support roadways based on an analysis of the simulation results. The numerical simulation and field monitoring suggest that the availability of this support method is feasible both in theory and practice, which can provide helpful references for research on the failure mechanisms and scientific support designing of engineering in deep coal mines.