• Title/Summary/Keyword: i-vectors

Search Result 318, Processing Time 0.026 seconds

Near-IR Polarization of the Northeastern Region of the Large Magellanic Cloud

  • Kim, Jaeyeong
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.42 no.2
    • /
    • pp.42.2-42.2
    • /
    • 2017
  • The Large Magellanic Cloud (LMC) is a unique target to study the detail structures of molecular clouds and star-forming regions, due to its proximity and face-on orientation from us. Most part of the astrophysical subjects for the LMC have been investigated, but the magnetic field is still veiling despite its role in the evolution of the interstellar medium (ISM) and in the main force to influence the star formation process. Measuring polarization of the background stars behind interstellar medium allows us to describe the existence of magnetic fields through the polarization vector map. In this presentation, I introduce the near-infrared polarimetric results for the $39^{\prime}{\times}69^{\prime}$ field of the northeastern region of the LMC and the N159/N160 star-forming complex therein. The polarimetric observations were conducted at IRSF/SIRPOL 1.4 m telescope. These results allow us to examine both the global geometry of the large-scale magnetic field in the northeastern region and the close structure of the magnetic field in the complex. Prominent patterns of polarization vectors mainly follow dust emission features in the mid-infrared bands, which imply that the large-scale magnetic fields are highly involved in the structure of the dust cloud in the LMC. In addition, local magnetic field structures in the N159/N160 star-forming complex are investigated with the comparison between polarization vectors and molecular cloud emissions, suggesting that the magnetic fields are resulted from the sequential formation history of this complex. I propose that ionizing radiation from massive stellar clusters and the expanding bubble of the ionized gas and dust in this complex probably affect the nascent magnetic field structure.

  • PDF

Human ${\beta}$-Globin Second Intron Highly Enhances Expression of Foreign Genes from Murine Cytomegalovirus Immediate-Early Promoter

  • KANG MOONKYUNG;KIM SEON-YOUNG;LEE SUKYUNG;LEE YOUNG-KWAN;LEE JAEHO;SHIN HYUN-SEOCK;KIM YEON-SOO
    • Journal of Microbiology and Biotechnology
    • /
    • v.15 no.3
    • /
    • pp.544-550
    • /
    • 2005
  • To develop a highly efficient mammalian expression vector, a series of vectors were constructed based on the murine cytomegalovirus (MCMV) immediate-early (IE) promoter and human ${\beta}$-globin second intron. The resulting MCMV promoter was several-fold stronger than the HCMV promoter in various mammalian cell lines, such as the NIH3T3, Neuro-2a, 293T, and HT1080 cell lines, and was only slightly weaker than the HCMV promoter in HeLa and CHO cells. The inclusion of the human ${\beta}$-globin second intron behind the MCMV promoter or HCMV promoter markedly enhanced the promoter activity in various mammalian cell lines, and the resultant MCMV/Glo-I expression system was stronger than the HCMV promoter from 4.7- to 11.2-fold in every cell line tested. Also, the MCMV/Glo-I promoter induced a higher level of the VSV-G protein in a transiently transfected 293T cell line, which is useful for the production of recombinant retrovirus and lentivirus vectors.

Scene Change Detection Techniques Using DC components and Moving Vector in DCT-domain of MPEG systems (MPEG system의 DCT변환영역에서 DC성분과 움직임 벡터를 이용한 영상 장면전환 검출기법)

  • 박재두;이광형
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.3
    • /
    • pp.28-34
    • /
    • 1999
  • In this paper. we propose the method of Scene Change Detection for video sequence using the DC components and the moving vectors in the Macro Blocks in the DCT blocks. The proposed method detects the Scene Change which would not be related with the specific sequences in the compressed MPEG domain. To do this. we define new metrics for Scene Change Detection using the features of picture component and detect the exact Scene Change point of B-pictures using the characteristics of B-picture's sharp response for the moving vectors. In brief, we will detect the cut point using I-picture and the gradual scene changes such as dissolve, fade, wipe, etc. As a results, our proposed method shows good test results for the various MPEG sequences.

2-D Conditional Moment for Recognition of Deformed Letters

  • Yoon, Myoong-Young
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.6 no.2
    • /
    • pp.16-22
    • /
    • 2001
  • In this paper we mose a new scheme for recognition of deformed letters by extracting feature vectors based on Gibbs distributions which are well suited for representing the spatial continuity. The extracted feature vectors are comprised of 2-D conditional moments which are invariant under translation, rotation, and scale of an image. The Algorithm for pattern recognition of deformed letters contains two parts: the extraction of feature vector and the recognition process. (i) We extract feature vector which consists of an improved 2-D conditional moments on the basis of estimated conditional Gibbs distribution for an image. (ii) In the recognition phase, the minimization of the discrimination cost function for a deformed letters determines the corresponding template pattern. In order to evaluate the performance of the proposed scheme, recognition experiments with a generated document was conducted. on Workstation. Experiment results reveal that the proposed scheme has high recognition rate over 96%.

  • PDF

Construction of Heat-Inducible Expression Vector of Corynebacterium glutamicum and C. ammoniagenes: Fusion of ${\lambda}$ Operator with Promoters Isolated from C. ammoniagenes

  • Park, Jong-Uk;Jo, Jae-Hyung;Kim, Young-Ji;Chung, So-Sun;Lee, Jin-Ho;Lee, Hyune-Hwan
    • Journal of Microbiology and Biotechnology
    • /
    • v.18 no.4
    • /
    • pp.639-647
    • /
    • 2008
  • The heat-inducible expression vectors for Corynebacterium glutamicum and C. ammoniagenes were constructed by using the ${\lambda}O_L1$ and the cryptic promoters, CJ1 and CJ4 that express genes constitutively in C. ammoniagenes. Although the promoters were isolated from C. ammoniagenes, CJ1 and CJ4 were also active in C. glutamicum. To construct vectors, the $O_L1$ from the ${\lambda}P_L$ promoter was isolated and fused to the CJ1 and CJ4 promoters by recombinant PCR. The resulting artificial promoters, CJ1O and CJ4O, which have one ${\lambda}O_L1$, and CJ1OX2, which has two successive ${\lambda}O_L1$, were fused to the green fluorescent protein (GFP) gene followed by subcloning into pCES208. The expression of GFP in the corynebacteria harboring the vectors was regulated successfully by the temperature-sensitive cI857 repressor. Among them, C. ammoniagenes harboring plasmid pCJ1OX2G containing GFP fused to CJ1OX2 showed more GFP than the other ones and the expression was tightly regulated by the repressor. To construct the generally applicable expression vector using the plasmid pCJ1OX2G, the His-tag, enterokinase (EK) moiety, and the MCS were inserted in front of the GFP gene. Using the vector, the expression of pyrR from C. glutamicum was tried by temperature shift-up. The results indicated that the constructed vectors (pCeHEMG) can be successfully used in the expression and regulation of foreign genes in corynebacteria.

AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS

  • Song, Jae-Gu;Lee, Jung-Woon;Park, Gee-Yong;Kwon, Kee-Choon;Lee, Dong-Young;Lee, Cheol-Kwon
    • Nuclear Engineering and Technology
    • /
    • v.45 no.5
    • /
    • pp.637-652
    • /
    • 2013
  • Instrumentation and control systems in nuclear power plants have been digitalized for the purpose of maintenance and precise operation. This digitalization, however, brings out issues related to cyber security. In the most recent past, international standard organizations, regulatory institutes, and research institutes have performed a number of studies addressing these systems cyber security.. In order to provide information helpful to the system designers in their application of cyber security for the systems, this paper presents methods and considerations to define attack vectors in a target system, to review and select the requirements in the Regulatory Guide 5.71, and to integrate the results to identify applicable technical security control requirements. In this study, attack vectors are analyzed through the vulnerability analyses and penetration tests with a simplified safety system, and the elements of critical digital assets acting as attack vectors are identified. Among the security control requirements listed in Appendices B and C to Regulatory Guide 5.71, those that should be implemented into the systems are selected and classified in groups of technical security control requirements using the results of the attack vector analysis. For the attack vector elements of critical digital assets, all the technical security control requirements are evaluated to determine whether they are applicable and effective, and considerations in this evaluation are also discussed. The technical security control requirements in three important categories of access control, monitoring and logging, and encryption are derived and grouped according to the elements of attack vectors as results for the sample safety system.

Performance Comparison of Discrete Particle Swarm Optimizations in Sequencing Problems (순서화 문제에서 01산적 Particle Swarm Optimization들의 성능 비교)

  • Yim, D.S.
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.33 no.4
    • /
    • pp.58-68
    • /
    • 2010
  • Particle Swarm Optimization (PSO) which has been well known to solve continuous problems can be applied to discrete combinatorial problems. Several DPSO (Discrete Particle Swarm Optimization) algorithms have been proposed to solve discrete problems such as traveling salesman, vehicle routing, and flow shop scheduling problems. They are different in representation of position and velocity vectors, operation mechanisms for updating vectors. In this paper, the performance of 5 DPSOs is analyzed by applying to traditional Traveling Salesman Problems. The experiment shows that DPSOs are comparable or superior to a genetic algorithm (GA). Also, hybrid PSO combined with local optimization (i.e., 2-OPT) provides much improved solutions. Since DPSO requires more computation time compared with GA, however, the performance of hybrid DPSO is not better than hybrid GA.

High Speed Machining Considering Efficient Manual Finishing Part I: Phase Shift and Runout Affecting Surface Integrity (고속 가공을 이용한 금형의 효율적 생산 제 1 부: 이송 위상차와 런아웃이 가공면에 미치는 영향)

  • Kim, Min-Tae;Je, Sung-Uk;Lee, Hae-Sung;Chu, Chong-Nam
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.23 no.12 s.189
    • /
    • pp.30-37
    • /
    • 2006
  • In this work, the surface integrity smoothened with a ball end mill was investigated. Because surface integrity mainly affects the manual finishing process, $RV_{AM}$(Remaining Volume After Machining) was introduced, and it gives the relation between machining process and finishing process. Runout and phase shift which adversely affect surface integrity were considered in the generation of surface topography. Cutting points in ball end milling were identified with positional vectors and a set of vectors which have the minimum height in unit area was selected for the generation of surface and $RV_{AM}$. $RV_{AM}$ variation according to runout and phase shift was calculated and experimentally verified in proposed HSM conditions for mold machining. From the simulations and the experiments, a desirable High Speed Machining condition was suggested.

A learning algorithm of fuzzy neural networks with extended fuzzy weights (확장된 퍼지 가중치를 갖는 퍼지 신경망 학습알고리즘)

  • 손영수;나영남;배상현
    • Journal of Intelligence and Information Systems
    • /
    • v.3 no.1
    • /
    • pp.69-81
    • /
    • 1997
  • In this paper, first we propose an architecture of fuzzy neural networks with triangular fuzzy weights. The proposed fuzzy neural network can handle fuzzy input vectors. In both cases, outputs from the fuzzy network are fuzzy vectors. The input-output relation of each unit of the fuzzy neural network is defined by the extention principle of Zadeh. Also we define a cost function for the level sets(i. e., $\alpha$-cuts)of fuzzy outputs and fuzzy targets. Then we derive a learning algorithm from the cost function for adjusting three parameters of each triangular fuzzy weight. Finally, we illustrate our a, pp.oach by computer simulation examples.

  • PDF

Gene Disruption Using In Vivo and In Vitro Methylation in Streptomyces griseus

  • Maeng Jin-Soo;Bae Kyung-Sook;Kwak Jang-Yul
    • Journal of Microbiology and Biotechnology
    • /
    • v.16 no.9
    • /
    • pp.1472-1476
    • /
    • 2006
  • Previous study demonstrated that the restriction barrier of Streptomyces griseus is almost completely bypassed by the Streptomyces-E. coli shuttle vectors passed through the E. coli GM161 strain and methylated with AluI and HpaII methyltransferases. The same DNA methylation of the genomic DNA fragments cloned the nonreplicative vectors generated integrative transformation and gene disruption of their chromosomal counterparts at high efficiencies in S. griseus. This result indicated that the efficiency of gene disruption depends on the efficient transfer of the incoming DNA into bacterial hosts.