• Title/Summary/Keyword: complemented

Search Result 632, Processing Time 0.029 seconds

Characterization of Complemented Mutants in Pseudomonas fluorescens and Cloning of the DNA Region Related in Antibiotic Biosynthesis (길항세균 Pseudomonas fluorescens의 Complemented Mutant에 대한 특성조사에 및 길항물질 유전자 Cloning)

  • Kim, Young;Cho, Yong-Sup
    • Korean Journal Plant Pathology
    • /
    • v.10 no.3
    • /
    • pp.151-156
    • /
    • 1994
  • Pseudomonas fluorescens produces the antibiotic, 2,4-diacetylphloroglucinol (Phl), which promotes plant growth by inhibiting bacteria and fungi. Cosmids (genomic library) were mobilized into Phl-nonproducing mutants through the triparental matings with pRK2013 as the helper plasmid at the frequency of 8.37$\times$10-4. Complemented mutants that showed antibiotic activity were selected among about 2,000 transconjugants. The complemented mutants were confirmed by acquired drug resistances (kanamycin and tetracycline). The antibiotic substances of wild type and complemented mutants showed the most excellent anti-bacterial activity. Inhibitory effects of complemented P. fluorescens against phytopathogenic fungi were equal to the parental strain. Complemented mutant and wild type of P. fluorescens were causal microbes of fungal morphological abnormalities. Complemented mutants in potato dextrose agar supplemented with bromothymol blue also showed restoration of glucose utilization as wild type. Plasmids of complemented mutants were isolated from transconjugant sand transformed into competent cells of E. coli DH5$\alpha$. The plamid DNA was reisolated from transformed E. coli DH5$\alpha$.

  • PDF

RINGS WHOSE ASSOCIATED EXTENDED ZERO-DIVISOR GRAPHS ARE COMPLEMENTED

  • Driss Bennis;Brahim El Alaoui;Raja L'hamri
    • Bulletin of the Korean Mathematical Society
    • /
    • v.61 no.3
    • /
    • pp.763-777
    • /
    • 2024
  • Let R be a commutative ring with identity 1≠ 0. In this paper, we continue the study started in [10] to further investigate when the extended zero-divisor graph of R, denoted as $\bar{\Gamma}$(R), is complemented. We also study when $\bar{\Gamma}$(R) is uniquely complemented. We give a complete characterization of when $\bar{\Gamma}$(R) of a finite ring R is complemented. Various examples are given using the direct product of rings and idealizations of modules.

COMPLEMENTED SUBLATTICES OF $\omega L_i$ ISONMORPHIC TO CLASSICAL BANACH LATTICES

  • Kang, Jeong-Heung
    • Communications of the Korean Mathematical Society
    • /
    • v.11 no.4
    • /
    • pp.1015-1030
    • /
    • 1996
  • We investigate complemented Banach subspaces of the Banach envelope of $eak L_1$. In particular, the Banach envelope of $weak L_1$ contains complemented Banach sublattices that are isometrically isomorphic to $l_p, (1 \leq p < \infty)$ or $c_0$. Finally, we also prove that the Banach envelope of $weak L_1$ contains an isomorphic copy of $l^{p, \infty}, (1 < p < \infty)$.

  • PDF

NONSEPARABLE COMPLEMENTED SUBLATTICES IN THE BANACH ENVELOPE OF $WeakL_l$

  • Kang, Jeong-Heung
    • Journal of applied mathematics & informatics
    • /
    • v.23 no.1_2
    • /
    • pp.537-545
    • /
    • 2007
  • We investigate complemented Banach sublattices of the Banach envelope of $Weak_L1$. In particular, the Banach envelope of $Weak_L1$ contains a complemented Banach sublattice that is isometrically isomorphic to a nonseparable Banach lattice $l_p(S),\;1{\leq}p<{\infty}\;and\;|S|{\leq}2^{{\aleph}0}$.

ANALYSIS OF COMPLEMENTED GROUP CA DERIVED FROM 90/150 GROUP CA

  • KWON, MIN-JEONG;CHO, SUNG-JIN;KIM, HAN-DOO;CHOI, UN-SOOK;KONG, GIL-TAK
    • Journal of applied mathematics & informatics
    • /
    • v.34 no.3_4
    • /
    • pp.239-247
    • /
    • 2016
  • In recent years, CA has been applied to image security due to its simple and regular structure, local interaction and random-like behavior. Since the initial state is regenerated after some iterations in the group CA, the receiver is able to decrypt by the same CA. Pries et al. showed that the all lengths of the cycles in the complemented group CA C with rules 195, 153, and 51 are equal to the order of C. Nandi et al. reported the encryption technique using C. These results can be made efficient use in cryptosystem by expanding the Nandi's key space. In this paper, we analyze the order of the complemented group CA derived from 90=150 group CA and show that all the lengths of the cycles in the complemented CA are equal to the order of the complemented CA.

Probability subtraction method for accurate quantification of seismic multi-unit probabilistic safety assessment

  • Park, Seong Kyu;Jung, Woo Sik
    • Nuclear Engineering and Technology
    • /
    • v.53 no.4
    • /
    • pp.1146-1156
    • /
    • 2021
  • Single-unit probabilistic safety assessment (SUPSA) has complex Boolean logic equations for accident sequences. Multi-unit probabilistic safety assessment (MUPSA) model is developed by revising and combining SUPSA models in order to reflect plant state combinations (PSCs). These PSCs represent combinations of core damage and non-core damage states of nuclear power plants (NPPs). Since all these Boolean logic equations have complemented gates (not gates), it is not easy to generate exact Boolean solutions. Delete-term approximation method (DTAM) has been widely applied for generating approximate minimal cut sets (MCSs) from the complex Boolean logic equations with complemented gates. By applying DTAM, approximate conditional core damage probability (CCDP) has been calculated in SUPSA and MUPSA. It was found that CCDP calculated by DTAM was overestimated when complemented gates have non-rare events. Especially, the CCDP overestimation drastically increases if seismic SUPSA or MUPSA has complemented gates with many non-rare events. The objective of this study is to suggest a new quantification method named probability subtraction method (PSM) that replaces DTAM. The PSM calculates accurate CCDP even when SUPSA or MUPSA has complemented gates with many non-rare events. In this paper, the PSM is explained, and the accuracy of the PSM is validated by its applications to a few MUPSAs.

COMPLEMENTED SUBLATTICE OF THE BANACH ENVELOPE OF WeakL1 ISOMORPHIC TO ℓp

  • Kang, Jeong-Heung
    • Communications of the Korean Mathematical Society
    • /
    • v.22 no.2
    • /
    • pp.209-218
    • /
    • 2007
  • In this paper we investigate the ${\ell}^p$ space structure of the Banach envelope of $WeakL_1$. In particular, the Banach envelope of $WeakL_1$ contains a complemented Banach sublattice that is isometrically isomorphic to the nonseparable Banach lattice ${\ell}^p$, ($1{\leq}p<\infty$) as well as the separable case.

𝛿;-FUZZY IDEALS IN PSEUDO-COMPLEMENTED DISTRIBUTIVE LATTICES

  • ALABA, BERHANU ASSAYE;NORAHUN, WONDWOSEN ZEMENE
    • Journal of applied mathematics & informatics
    • /
    • v.37 no.5_6
    • /
    • pp.383-397
    • /
    • 2019
  • In this paper, we introduce ${\delta}$-fuzzy ideals in a pseudo complemented distributive lattice in terms of fuzzy filters. It is proved that the set of all ${\delta}$-fuzzy ideals forms a complete distributive lattice. The set of equivalent conditions are given for the class of all ${\delta}$-fuzzy ideals to be a sub-lattice of the fuzzy ideals of L. Moreover, ${\delta}$-fuzzy ideals are characterized in terms of fuzzy congruences.

Watermarking Based on Complemented MLCA and 2D CAT

  • Li, Xiao-Wei;Yun, Jae-Sik;Cho, Sung-Jin;Kim, Seok-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.2
    • /
    • pp.212-216
    • /
    • 2011
  • Digital watermarking has gained importance in recent years in copyright protection and multimedia. This paper proposes a secure and novel watermarking system based on complemented Maximum Length Cellular Automata (MLCA) and Two-Dimension Cellular Automata Transform (2D CAT). In this watermarking scheme, the original watermark is first encrypted by complemented MLCA with the private keys, and then the encrypted watermark is embedded into the CAT domain of the cover image, at last use the inverse CAT for the transformed image, the watermarked image is obtained. Experiment results show that this new method is more secure and provides robust performance against watermarking attacks.