• Title/Summary/Keyword: Tags

Search Result 1,307, Processing Time 0.031 seconds

Prediction of Rice Embryo Proteins using EST-Databases

  • Woo, Sun-Hee;Cho, Seung-Woo;Kim, Tae-Seon;Chung, Keun-Yook;Cho, Yong-Gu;Kim, Hong-Sig;Song, Beom-Heon;Lee, Chul-Won;Jong, Seung-Keun
    • Korean Journal of Breeding Science
    • /
    • v.40 no.1
    • /
    • pp.1-7
    • /
    • 2008
  • An attempt was made to link rice embryo proteins to DNA sequences and to understand their functions. One hundred of the 700 spots detected on the embryo 2-DE gels were microsequenced. Of these, 28% of the embryo proteins were matched to DNA sequences with known functions, but 72% of the proteins were unknown in functions as previously reported (Woo et al. 2002). In addition, twenty-four protein spots with 100% of homology and nine with over 80% were matched to ESTs (expressed sequence tags) after expanding the amino acid sequences of the protein spots by Database searches using the available rice EST databases at the NCBI (http://www/ncbi.nlm.nih.gov/) and DDBJ (http://www.ddbj.nig.ac.jp/). The chromosomal location of some proteins were also obtained from the rice genetic map provided by Japanese Rice Genome Research Program (http://rgp.dna.affrc.go.jp). The DNA sequence databases including EST have been reported for rice (Oryza sativa L.) now provides whole or partial gene sequence, and recent advances in protein characterization allow the linking proteins to DNA sequences in the functional analysis. This work shows that proteome analysis could be a useful tool strategy to link sequence information and to functional genomics.

Construction of a full-length cDNA library from Typha laxmanni Lepech. and T. angustifolia L. from an EST dataset

  • Im, Subin;Kim, Ho-Il;Kim, Dasom;Oh, Sang Heon;Kim, Yoon-Young;Ku, Ja Hyeong;Lim, Yong Pyo
    • Korean Journal of Agricultural Science
    • /
    • v.45 no.4
    • /
    • pp.583-590
    • /
    • 2018
  • Genus Typha L. (Typhaceae; Cattail in common) is one of the hydrophytic plants found in semi-aquatic regions. About nine to 18 species of the genus exist all over the world. In Korea, the most commonly found cattail species are T. laxmanni and T. angustifolia. The aim of this study was to prepare a cDNA library and sequences and analyze expressed sequence tags (ESTs) from these species, T. laxmanni and T. angustifolia. In the case of T. laxmanni, we observed that 715 out of 742 ESTs had high quality sequences, whereas the remaining 27 ESTs were low quality sequences. In this study, we identified 77 contigs, 393 unassembled clones and 65.7% singletons. Furthermore, in the case of T. angustifolia, we recorded 992 high quality EST sequences, and by excluding 28 low quality sequences from among them, we retrieved 120 contigs, 348 unassembled clones and 48.9% singletons. The basic local alignment search tool (BLAST) and Kyoto encyclopedia of genes and genomes (KEGG) database results enabled us to identify the functional categories, i.e., molecular function (16.5%), biological process (22.2%) and cellular components (61.3%). In addition, between these two species, the no hits and anonymous genes were 4.2% and 11.7% and 6.2% and 11.2% in T. laxmanni and T. angustifolia, respectively, based on the BLAST results. The study concluded that they have certain species-specific genes. Hence, the results of this study on these two species could be a valuable resource for further studies.

Automatic recognition of the old and the infirm using Arduino technology implementation (아두이노를 사용하여 노약자 자동 인식 기술 구현)

  • Choi, Chul-kil;Lee, Sung-jin;Choi, Byeong-yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.454-457
    • /
    • 2014
  • Arduino is for design based on open source prototyping platform, artist, designer, hobby activists, etc, i has been designed for all those who are interested in the environment construct. Arduino adventage you can easily create applications hardware, without deep knowledge about the hardware. Configuration of arduino using AVR microcontroller ATmage 168, software to action arduino using arduino program, MATLAB, Processing. Arduino is open source base, you can hardware production directly and using shield additionally, the arduino can be combined. Android is open source. Continue to expand through a combination of hardware, Arduino. It name is shield. Be given to the Arduino Uno board to the main board, the shield extends to the various aspects and help can be equipped with more features. The shield on top of the shield can be combined as a kind of shield and Ethernet shield, motor shield, the shield RFID hardware beyond a simple extension can be configured. In this paper, RFID technology Sealed for automatic recognition of the elderly by the elderly to identify and tag them SM130 13.56Mhz compatible hardware was constructed by combining tags.

  • PDF

Proteomic studies of putative molecular signatures for biological effects by Korean Red Ginseng

  • Lee, Yong Yook;Seo, Hwi Won;Kyung, Jong-Su;Hyun, Sun Hee;Han, Byung Cheol;Park, Songhee;So, Seung Ho;Lee, Seung Ho;Yi, Eugene C.
    • Journal of Ginseng Research
    • /
    • v.43 no.4
    • /
    • pp.666-675
    • /
    • 2019
  • Background: Korean Red Ginseng (KRG) has been widely used as an herbal medicine to normalize and strengthen body functions. Although many researchers have focused on the biological effects of KRG, more studies on the action mechanism of red ginseng are still needed. Previously, we investigated the proteomic changes of the rat spleen while searching for molecular signatures and the action mechanism of KRG. The proteomic analysis revealed that differentially expressed proteins (DEPs) were involved in the increased immune response and phagocytosis. The aim of this study was to evaluate the biological activities of KRG, especially the immune-enhancing response of KRG. Methods: Rats were divided into 4 groups: 0 (control group), 500, 1000, and 2000 mg/kg administration of KRG powder for 6 weeks, respectively. Isobaric tags for relative and absolute quantitation was performed with Q-Exactive LC-MS/MS to compare associated proteins between the groups. The putative DEPs were identified by a current UniProt rat protein database search and by the Gene Ontology annotations. Results: The DEPs appear to increase the innate and acquired immunity as well as immune cell movement. These results suggest that KRG can stimulate immune responses. This analysis refined our targets of interest to include the potential functions of KRG. Furthermore, we validated the potential molecular targets of the functions, representatively LCN2, CRAMP, and HLA-DQB1, by Western blotting. Conclusion: These results may provide molecular signature candidates to elucidate the mechanisms of the immune response by KRG. Here, we demonstrate a strategy of tissue proteomics for the discovery of the molecular function of KRG.

Lost and Found Registration and Inquiry Management System for User-dependent Interface using Automatic Image Classification and Ranking System based on Deep Learning (딥 러닝 기반 이미지 자동 분류 및 랭킹 시스템을 이용한 사용자 편의 중심의 유실물 등록 및 조회 관리 시스템)

  • Jeong, Hamin;Yoo, Hyunsoo;You, Taewoo;Kim, Yunuk;Ahn, Yonghak
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.19-25
    • /
    • 2018
  • In this paper, we propose an user-centered integrated lost-goods management system through a ranking system based on weight and a hierarchical image classification system based on Deep Learning. The proposed system consists of a hierarchical image classification system that automatically classifies images through deep learning, and a ranking system modules that listing the registered lost property information on the system in order of weight for the convenience of the query process.In the process of registration, various information such as category classification, brand, and related tags are automatically recognized by only one photograph, thereby minimizing the hassle of users in the registration process. And through the ranking systems, it has increased the efficiency of searching for lost items by exposing users frequently visited lost items on top. As a result of the experiment, the proposed system allows users to use the system easily and conveniently.

  • PDF

A Recommendation Model based on Character-level Deep Convolution Neural Network (문자 수준 딥 컨볼루션 신경망 기반 추천 모델)

  • Ji, JiaQi;Chung, Yeongjee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.3
    • /
    • pp.237-246
    • /
    • 2019
  • In order to improve the accuracy of the rating prediction of the recommendation model, not only user-item rating data are used but also consider auxiliary information of item such as comments, tags, or descriptions. The traditional approaches use a word-level model of the bag-of-words for the auxiliary information. This model, however, cannot utilize the auxiliary information effectively, which leads to shallow understanding of auxiliary information. Convolution neural network (CNN) can capture and extract feature vector from auxiliary information effectively. Thus, this paper proposes character-level deep-Convolution Neural Network based matrix factorization (Char-DCNN-MF) that integrates deep CNN into matrix factorization for a novel recommendation model. Char-DCNN-MF can deeper understand auxiliary information and further enhance recommendation performance. Experiments are performed on three different real data sets, and the results show that Char-DCNN-MF performs significantly better than other comparative models.

Mobile-IoT System for Payment Efficiency and Convenience of Offline Shopping (오프라인 쇼핑의 결제효율과 편의성 제공을 위한 모바일-IoT 시스템)

  • Lee, Jeong-Hoon;Jeong, Seung-Hun;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.289-294
    • /
    • 2019
  • It easily collects information on purchased goods using IoT(Internet of Things). The collected data is updated directly to the smartphone for verification. The payment information is generated by QR-Code. As a way to implement a system, System was configured with two assumptions: IoT technology using Raspberry-Pi and mobile QR technology. First, RFID tags are attached to the goods instead of barcodes. Second, it has an IoT computer(Raspberry-Pi) built into its shopping cart. This system keeps traditional shopping method of face-to-face payment, but replace time-consuming tarditional barcode tagging method to QR-tagging system for time-efficiency. By debeloping the system of this paper, we maintain pleasures in offline store shopping and it provide convenience due to reduced waiting time for customers and providing prior information about the products.

Tracking of Yellowtail Seriola quinqueradiata Migration Using Pop-up Satellite Archival Tag (PSAT) and Oceanic Environments Data (위성전자표지와 해양환경자료를 이용한 방어(Seriola quinqueradiata) 이동경로 추적 연구)

  • Kim, Changsin;Yang, Jigwan;Kang, Sujin;Lee, Seung-Jong;Kang, Sukyung
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.54 no.5
    • /
    • pp.787-797
    • /
    • 2021
  • Yellowtail Seriola quinqueradiata tagged with a Pop-up Satellite Archival Tag (PSAT) was released off the coast of near the Moseulpo, Jeju Island and the ecological data during about 40 days was obtained. However, it is difficult to determine the spatial location of underwater ecological data. To improve the accuracy of estimating the Yellowtail migration route using temperature, suitable background field of the oceanic environment data was evaluated and used for input data. After developing of the tracking algorithm for migration route estimation, three experiment cases were estimated with ecological data among the surface layer, the mixed layer, and the whole water column. All tracking experiments move from western to eastern Jeju Island. Additionally, tracking experiment using 3D ocean numerical model reveal that it is possible to estimate the migration route using the fish ecological data of the entire water column. Therefore, using a large number of ecological data and a high-accuracy ocean numerical model to estimate the migration route seems to be a way to increase the accuracy of the tracking experiment. Moreover, the tracking algorithm of this study can be applied to small pelagic fishery using small archival electronic tags to track the migration route.

The Monitoring System for Location of Workers Inside a Thermal Power Plant Boiler (화력 발전기 보일러 내부 작업자 위치 모니터링 시스템 개발)

  • Song K.;Yun, C.N.;Shin, Y.H.;Shin, J.H.;Han, S.H.;Jang, D.Y.
    • Journal of the Korean Society of Safety
    • /
    • v.36 no.5
    • /
    • pp.71-78
    • /
    • 2021
  • There are regularly planned overhaul periods in thermal power plants, which involve the maintenance of the boiler of the power plants. However, thermal power plants workers are always exposed to risk during overhaul periods owing to the narrow space and significant dust inside the boiler. Therefore, it is essential to develop a safety monitoring system that is suitable for operating in this type of environment. In this study, we developed not only a worker three-dimensional (3D)-location monitoring system that can monitor and record the entry/exit of workers, their 3D-location, and fall accidents but also a method to secure the working environment and operation efficiency. This system comprises of a worker tag, which was equipped with an inertial measurement unit, a barometric pressure sensor, and a Bluetooth low energy (BLE), and the tags were given to each worker. In addition, the location of workers inside the boiler was measured using a pedestrian dead reckoning (PDR) method and BLE beacons. The location data of the workers tag were transmitted to the integrated database (DB) server through a gateway, and to the administrator monitoring system. The performance of the system was demonstrated inside an actual thermal power plant boiler, and the accuracy and reliability of the system were verified through a number of repeated tests. These results provide insights on designing a new system for monitoring enclosed spaces.

A Strong RFID Authentication Protocol Based on Synchronized Secret Information (비밀정보 동기화에 기반한 Strong RFID 인증)

  • Ha, Jae-Cheol;Ha, Jung-Hoon;Park, Jea-Hoon;Moon, Sang-Jae;Kim, Hwan-Koo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.99-109
    • /
    • 2007
  • Lee et al. recently proposed an RFID mutual authentication scheme based on synchronized secret information. However, we found that their protocol is vulnerable to a spoofing attack in which an adversary can impersonate a legal tag to the reader by sending a malicious random number. To remedy this vulnerability, we propose two RFID authentication protocols which are secure against all possible threats including backward and forward traceability. Furthermore, one of the two proposed protocols requires only three hash operations(but, $[m/2]{\cdot}2+3$ operations in resynchronization state, m is the number of tags) in the database to authenticate a tag, hence it is well suitable fur large scale RFID systems.