• Title/Summary/Keyword: i-vectors

Search Result 318, Processing Time 0.024 seconds

Stable Secretion Vector Derived from the RCR (rolling-circle replication) Plasmid of Bacillus mesentericus

  • Suh, Joo-Won;Lee, Seung-Soo;Han, Jeong-Wun;Yang, Young-Yell;Hong, Soon-Kwang;Lee, In-Hyung
    • Journal of Microbiology
    • /
    • v.40 no.2
    • /
    • pp.140-145
    • /
    • 2002
  • The 5.8 kb pMMH1, rolling-circle replication (RCR) plasmid of the wild type soil Bacillus mesentericus was developed into a novel secretion vector system in Bacillus subtilis. The pMMHl turned out to have a replication origin and two open reading frames (ORFs) of the putative γ-GTP and type I signal peptidase (sipP). To characterize the regions necessary for plasmid stability and high copy number, five vectors (pPS, pPP, pEN, pMN, pME) were constructed by disruption or deletion of each region in pMMH1. Like pMMHl all constructed vectors were stable over 100 generations In a non-selective medium. Since pPS was the smallest (2.3 kb)of all, it was selected for the construction of a navel secretion vector, Using the $\alpha$-amylase promoter/signal sequence of B. subtilils the novel plasmid pJSN was constructed. When $\beta$-glucosidase was expressed using pJSN, we found $\beta$-glucosidase activity in the medium. This result strongly suggested that plasmid pJSN can be used for the production of bioactive peptides in B. subtilis.

Gifted Students and Advanced Mathematics

  • Barbeau, Edward J.
    • Research in Mathematical Education
    • /
    • v.12 no.4
    • /
    • pp.283-291
    • /
    • 2008
  • The extension to a wide population of secondary education in many advanced countries seems to have led to a weakening of the mathematics curriculum. In response, many students have been classified as "gifted" so that they can access a stronger program. Apart from the difficulties that might arise in actually determining which students are gifted (Is it always clear what the term means?), there are dangers inherent in programs that might be devised even for those that are truly talented. Sometimes students are moved ahead to more advanced mathematics. Elementary students might be taught algebra or even subjects like trigonometry and vectors, and secondary students might be taught calculus, differential equations and linear algebra. It is my experience over thirty-five years of contact with bright students that acceleration to higher level mathematics is often not a good idea. In this paper, I will articulate some of the factors that have led me to this opinion and suggest alternatives. First, I would like to emphasize that in matters of education, almost every statement that can be made to admit counterexamples; my opinion on acceleration is no exception. Occasionally, a young Gauss or Euler walks in the door, and one has no choice but to offer the maximum encouragement and allow the student to go to the limit of his capabilities. A young genius can demonstrate an incredible amount of mathematical insight, maturity and mastery of technique. A classical example is probably the teen-age Euler, who in the 1720s was allowed regular audiences with Jean Bernoulli, the foremost mathematician of his day.

  • PDF

On Computation of the Stress Intensity Factors in the V-Notched Plates using a contour integral method (경로적분법 을 이용한 V-노치 평판 의 응력확대계수 계산)

  • 김진우;김선덕;홍창선
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.8 no.3
    • /
    • pp.232-240
    • /
    • 1984
  • The plane elastostatic boundary value problem with the sharp V-notched singularity is formulated by a contour integral method for determining numerically the stress intensity factors. The integral formula is based on Somigliana type of reciprocal work in terms of displacement and traction vectors on the plate boundary. The characteristic singular solutions can be identified on the basis of traction free boundary conditions of two radial notch edges. Two numerical example examples are treated in detail; a symmetric mode-I type of notched plate with various interior angles and a mixed mode type of cantilever subjected to end shear.

Software Implementation of WAVE Security Algorithms (WAVE 보안 알고리즘의 소프트웨어 구현)

  • Kang, Jung-Ha;Ok, Sung-Jin;Kim, Jae Young;Kim, Eun-Gi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.3
    • /
    • pp.1691-1699
    • /
    • 2014
  • IEEE developing WAVE specifications are able to support V2V and V2I wireless communications, and these functionalities can be used to enhance vehicle operational safety. To overcome any security weaknesses that are inherent in wireless communications, WAVE specification should support message encryption and authentication functions. In this study, we have implemented WAVE security algorithms in IEEE P1609.2 with openssl library and C language. We have verified the normal operation of implemented software, using the test vectors of related specifications, and measured their performance. Our software is platform independent, and can be used for the full implementation of WAVE specification.

The Study of Mutation Spectrum in Iac / Gene of Transgenic Big Blue$\textregistered$ Cell Line Following Short-Term Exposure to 4-Nitroquinoline N-oxide

  • Youn, Ji-Youn;Kim, Kyung-Ran;Cho, Kyung-Hea;Ryu, Jae-Chun
    • Proceedings of the Korea Society of Environmental Toocicology Conference
    • /
    • 1996.12a
    • /
    • pp.64-64
    • /
    • 1996
  • Transgenic animal and cell line models which are recently developed in toxicology field combined with molecular biological technique, are powerful tools for studying of mutation in vivo and in vitro, respectively. The Big Blue mutagenesis assay system is one of the most widely used transgenic systems. Especially, for the study of direct acting mutagens, Big Blue cell line is very useful and powerful to evaluate mutagenicity because the mutation frequency and mutationspectrlun showed no distinct differences between cell line and animal. The Big Blue cell lines carry stably integrated copies of lambda shuttle vector containing lac I gene as a mutational target. These lambda shuttle vectors are useful for various mutagenesis related studies in eukaryotic system due to their ability to be exposed mutagen and then transfer a suitable target DNA sequence to it convenient organism for analysis. We tried to assess the mutagenic effect of 4-NQO with Big Blue cell line. After the treatment of 4-NQO, genomic DNA was isolated and lambda shuttle vector was packaged by in Vitro packaging and then these were plated on bacterial host in the presence of X-gal to screen mutation in the lac I. We determined MF as a ratio of blue plaques versus colorless plaques and now undergoing the mutation spectrum of 4-NQO in lac J gene sequence.

  • PDF

A Study on the Graph and Linear Transformation in the Mathematics Amended Curriculum (수학과 개정교육과정의 그래프와 일차변환 단원에 대한 고찰)

  • Hwang, Suk-Geun;Yoon, Jeong-Ho
    • Journal for History of Mathematics
    • /
    • v.23 no.4
    • /
    • pp.83-100
    • /
    • 2010
  • This paper is to raise several questions in teaching the Graph and Linear Transformation complied with the Mathematics Amended Curriculum announced in 2006 Aug. and then to formulate a plan accordingly. For this, we'll take a good look at the prior studies on the Graph and Linear Transformation after the announcement of the 7th School Curriculum along with the changes in their contents through the process of curriculum. Then we'll check over learning factors of the Graph and Linear Transformation in all 27 kinds of the authorized textbooks - 'Mathematics I', 'Applications of Mathematics', and 'Geometry and Vectors' - and 27 kinds of exercise books issued on 2009. By this, we put measures which improve understanding and apply correctly to the Graph and Linear Transformation in the Mathematics Amended Curriculum to high school teachers.

A Study on Encryption Techniques for Digital Rights Management of MPEG-4 Video Streams (MPEG-4 비디오 스트림의 디지털 저작권 관리를 위한 암호화 기법 연구)

  • Kim Gunhee;Shin Dongkyoo;Shin Dongil
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.175-182
    • /
    • 2005
  • This paper presents encryption techniques for digital right management solutions of MPEG-4 streams. MPEG-4 is a format for multimedia streaming and stored in the MPEG-4 file format. We designed three kinds of encryption methods, which encrypt macro blocks (MBs) or motion vectors (MVs) of I-, P-VOPs (Video Object Planes), extracted from the MPEG-4 file format. We used DES to encrypt MPEG-4 data Based on theses three methods, we designed and implemented a DRM solution for an Internet broadcasting service, which enabled a MPEG-4 data streaming, and then compared the results of decryption speed and quality of rendered video sequences to get an optimal encryption method.

Transport Paths of Surface Sediment on the Tidal Flat of Garolim Bay, West Coast of Korea (황해 가로림만 조간대 표층퇴적물의 이동경로)

  • Shin, Dong-Hyeok;Yi, Hi-Il;Han, Sang-Joon;Oh, Jae-Kyung;Kwon, Su-Jae
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.3 no.2
    • /
    • pp.59-70
    • /
    • 1998
  • Two-dimensional trend-vector model of sediment transport is first tested in the tidal flat of Garolim Bay, mid-western coast of the Korean Peninsula. Three major parameters of surface sediment, i.e., mean grain size, sorting and skewness, are used for defining the best-fitting transport trend-vector on the sand ridge and muddy sand flat. These trend vectors are compared with the real transport directions determined from morphology, field observation and bedforms. The 15 possible cases of trend vectors are calculated from total sediments. In order to find the role of coarse sediments, trend vectors from sediments coarser than < 4.5 ${\phi}$, (sand size) are separately calculated from those of total sediments. As compared with the real directions, the best-fitting transport-vector model is the "case M" of coarse sediments which is the combined trend vectors of two cases: (1) finer, better sorted and more negatively skewed and (2) coarser, better sorted and more positively skewed. This indicates sand-size grains are formed by simpler hydrodynamic processes than total sediments. Transported sediment grains are better sorted than the source sediment grains. This indicates that consistent hydrodynamic energy can make sediment grains better sorted, regardless of complicated mechanisms of sediment transport. Consequently, both transported vector model and real transported direction show that the source of sediments are located outside of bay (offshore Yellow Sea) and in the baymouth. These source sediments are transported through the East Main Tidal Channel adjacent the baymouth. Some are transported from the subtidal zone to the upper tidal flat, but others are transported farther to the south, reaching the south tidal channel in the study area. Also, coarse sediment grains on the sand ridge are originally from the baymouth, and transported through the subtidal zone to the south tidal channel. These coarse sediments are moved to the northeast, but could not pass the small north tidal channel. It is interpreted that the great amount of coarse sediments is returned back to the outside of the bay (Yellow Sea) again through the baymouth during the ebb tide. The distribution of muddy sand in the northeastern part of study area may result from the mixing of two sediment transport mechanisms, i.e., suspension and bedload processes. The landward movement of sand ridge and the formation of the north tidal channel are formed either by the supply of coarse sediments originating from the baymouth and outside of the bay (subaqueous sand ridges including Jang-An-Tae) or by the recent relative sea-level rise.

  • PDF

Isolated Word Recognition Using k-clustering Subspace Method and Discriminant Common Vector (k-clustering 부공간 기법과 판별 공통벡터를 이용한 고립단어 인식)

  • Nam, Myung-Woo
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.42 no.1
    • /
    • pp.13-20
    • /
    • 2005
  • In this paper, I recognized Korean isolated words using CVEM which is suggested by M. Bilginer et al. CVEM is an algorithm which is easy to extract the common properties from training voice signals and also doesn't need complex calculation. In addition CVEM shows high accuracy in recognition results. But, CVEM has couple of problems which are impossible to use for many training voices and no discriminant information among extracted common vectors. To get the optimal common vectors from certain voice classes, various voices should be used for training. But CVEM is impossible to get continuous high accuracy in recognition because CVEM has a limitation to use many training voices and the absence of discriminant information among common vectors can be the source of critical errors. To solve above problems and improve recognition rate, k-clustering subspace method and DCVEM suggested. And did various experiments using voice signal database made by ETRI to prove the validity of suggested methods. The result of experiments shows improvements in performance. And with proposed methods, all the CVEM problems can be solved with out calculation problem.

Ritz Mode Superposition Method in Frequency Domain (주파수 영역에서의 Ritz 모드 중첩법)

  • 주관정
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 1989.04a
    • /
    • pp.33-37
    • /
    • 1989
  • According to the Rayleigh-Ritz approximation method, a solution can be represented as a finite series consisting of space-dependent functions, which satisfy all the geometric boundary conditions of the problem and appropriate smoothness requirement in the interior of the domain. In this paper, an efficient formulation for solving structural dynamics systems in frequency domain is presented. A general procedure called Ritz modes (or vectors) generation algorithm is used to generate the admissible functions, i.e. Ritz modes, Then, the use of direct superposition of the Ritz modes is utilized to reduce the size of the problem in spatial dimension via geometric coordinates projection. For the reduced system, the frequency domain approach is applied. Finally, a numerical example is presented to illustrate the effectiveness of the proposed method.

  • PDF