• Title/Summary/Keyword: name of tree

Search Result 109, Processing Time 0.027 seconds

The Derivation of the "Bizooki" tree in the literature, the Uses and Propagation of Cleyera japonica Thunberg (비쭈기나무의 이름 유래와 문헌상 기재 그리고 이용 및 번식)

  • Seo, Byung-Key;Byun, Kwang-Ok;Son, Seog-Gu
    • The Journal of Natural Sciences
    • /
    • v.18 no.1
    • /
    • pp.91-97
    • /
    • 2007
  • The Korean name "Bizooki" tree was named by the shape of winter bud which is like a slim bow. There are four scientific names in the tree which are Cleyera japonica Thunberg, Cleyera ochnacea DC, Sakakia ochnacea Nakai, and Ternstroemia gymnanthera. And the English name are Japanese Ternstroemia and Japanese Cleyera. "Bizooki" tree has planted at Buddhist temples in Japan for the ritual. The best result of stem cutting in "Bizooki" tree, 100 percent of rooting, could be accomplished in July when cuttings were done on the mixture-soil containing the same rates by volume of vermiculite, peatmoss and perlite with cuts processed with IBA 1,000 mg/l under the circumstances that 70% of shade, plastic mulching, and mist were conditioned.

  • PDF

A Study on the Method of Identifying for Landscape Architecture (조경용 수목의 형태적 식별방법에 관한 연구)

  • 김민수
    • Journal of Environmental Science International
    • /
    • v.7 no.3
    • /
    • pp.251-262
    • /
    • 1998
  • A number of illustrated floras are generally used when we want to idenufy a name of a certain tree. This method, however, has not been efficient because it has taken a great deal of time and effort for persons who do not have much knowledge on the group of the plant. In contrast to this method, the use of taxonomical keys is very efficient for finding out the group of a certain plant. But this method Is very dirtficult for non-specialists to understand the taxonomical ternunology and thus has not been of general use. In thins context, this study was conducted to present the efficient way of the group of a certain tree through the computer database by using the brief forms of plant organs. The database consists of effect fields such as form of trunk and evergreen or deciduous, types of leaf and leaf arrangement, existence of price and hair on twig, form of leaf margin, leaf form and venation, existence of hair on leaf surface and petiole, length of leaf and petiole. The 222 species of tree used for landscape architecture were sorted by items of the eight fields. As a result, the 222 species were divided into 185 groups and the one group contains 7species, 2 groups contain 3 species, 27 groups contain 2 species and 155 groups contain only one species. Therefore it is suggested that the use of computer database and illustrated floras is very easy and efficient in identifying a tree.

  • PDF

Verification on Cold-Tolerance of Some Fruit Trees as Species for Urban Greening Plants

  • Lee, Jin-Hee;Oh, Hee-Young;Kwon, O-Man
    • Journal of Environmental Science International
    • /
    • v.26 no.10
    • /
    • pp.1155-1166
    • /
    • 2017
  • This study selected commonly known species of fruit trees, and re-selected the species that endure the stress of extreme cold weather and physiologically restore themselves to the previous state until the following year. Then we could go ahead to propose the species that were appropriate as urban greening plants in weather condition of any part of the country. To do this, we conducted an experiments for six species of fruit trees based on the preference of the general public and recommendation of the experts; Morus alba (English name: mulberries), Diospyros kaki (English name: Persimmon), Prunus persia (English name: Peach), Elaeagnus umbellata var. coreana (English name: Korean Autumn Olive), Malus domestica 'Alps Otome' (English name: Alps Otome), and Prunus mume (English name: Blue Plum). The experiment verifies whether the trees survive without any stress from the cold weather under the national climate conditions (one in the suburbs of Seoul: Yongin city, one in the central Chungcheong region: Daejeon city, and in the southern Gyeongsang region: Jinju city in Korea). The experiment lasted for a year from August 2016 to August 2017. The levels of electrolytic efflux, chlorophyll content, plant height, fresh weight, and dry weight were measured four times (on August of 2016, January, February, and August of 2017) for each tree planted bare ground outdoors. Results showed that Diospyros kaki, Prunus persia, and Malus domestica 'Alps Otome' were proven durable and resistant to winters of all three areas (one in the suburbs of Seoul: Yongin city, one in the central Chungcheong region: Daejeon city, and in the southern Gyeongsang region: Jinju city in Korea). Especially, the increase of chlorophyll content and the reduction of electrolytic efflux were noticeable in Prunus persia than in the other two species, proving itself as the most cold-tolerant among the six species used in the experiment. In addition, interpreting from the physiological restoration data of one-year span before and after getting through winterer, Prunus persia was proven to be the most cold-tolerant species.

Efficient Management of DNS Failure (DNS장애 발생 시 효율적인 대처방안)

  • Lim, Yang-Won;Lim, Han-Kyu
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.12
    • /
    • pp.273-282
    • /
    • 2007
  • The Domain Name System (DNS) is the core system for managing Internet address resources, providing the most fundamental naming service. Currently, the DNS is classified into a tree structure. In this structure, it is difficult to normally access to the lower DNS, when there is an error in the upper DNS. Such a risk still remains even when a supplementary DNS is operated. However, due to the merit of the DNS enabling fast searches, it is impracticable to abandon the current tree structure. To efficiently correspond to DNS errors, this study suggests a method where the merit of the current tree structure is kept, while a temporary operation of the local DNS is available when errors occur by adding a horizontal and independent DNS structure.

What is the Mantidis Oothea? (상표소(桑螵蛸)는 무엇인가? (약명(藥名), 이명(異名), 채집(採集), 수치(修治)에 관하여))

  • Park, myung jae;Seo, Young Bae
    • Journal of Haehwa Medicine
    • /
    • v.25 no.1
    • /
    • pp.155-163
    • /
    • 2016
  • Objectives : Since the Korean pronunciation of the Mantidis Oothea is not unified, it is necessary to unify pronunciation of this particular herb. According to ancient herbal literature, genuine Mantidis Oothea has been regarded as the product which is attached to mulberry tree. However, all forms of Mantidis Oothea need to be used as a medicinal ingredient. Methods : The current study explores pronunciations of the herbal medicinal names, Collection, and the herbal processes of the Mantidis Oothea. There are approximately about 30 herbal manuals dealing with the Mantidis Oothea after Shen Nong's herbal manual(神農本草經) was published. Results & Conclusions : 1. Sangbicho, Sangpyeojo, Sangpyeocho, and other names have been used as a name of medicinal ingredient for the Mantidis Oothea. 2. The Other names of medicinal ingredient for the Mantidis Oothea were Sik woo, Danglangja(螳螂子), Danglanglan(螳螂卵), Danglangso(螳螂巢), Danglangwa(螳螂窩), Danglanggag(螳螂殼), etc.. 3. The name of medicinal ingredient for the Mantidis Oothea should not be pronounced as Sangpyoso but Sangpyocho. 4. The name of medicinal ingredient for the Mantidis Oothea was originated from a type of the egg case, eating habit, therapy of the Mantidis Oothea and so on. 5. Collecting real thing of The Mantidis Oothea does not really matter whether it is attached to the mulberry tree or not. 6. The herbal processes of the Mantidis Oothea is to kill the eggs, so typical methods were to steam, roast, boil with vinegar and so on. In addition, the main effect seemed to be protection from the diarrhea.

Computerization for Management of Street Tree Using CAD (CAD를 이용한 가로수 관리 전산화에 관한 연구)

  • 허상현;심경구
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.29 no.2
    • /
    • pp.68-76
    • /
    • 2001
  • The purpose of this study is to computerize street tree management using a CAD program in order to manage the drawing record of street trees systematically and concurrently. The configuration of this program is composed of Reference Data, Data Inquiry, and Cost Assessment. The Reference Data includes characteristics of trees, monthly managements records, damage by blight and insects and usage of pesticides. The Data Inquiry includes an individual search of the tree index, simple searches and multiple searches. The Cost Assessment includes two main components, the data input with labor cost, manure ocst and pesticide cost and the assesment of management cost for prevention of blight and insects, pruning and fertilization. The results of this study are as follows: 1) When there are practices such as transplanting and removing of street trees it is immediately updated with the various situation. By creating an in progress a tree management system, up to the date information can be given to the manager for decision making. 2) To identify individual tree at the site or in drawing, the street name and numbers were used instead of coordinates. Tree tags are attached to the street trees individually. It can make DB management simple and easy. 3) By doing simple or multiple search with constructed DB, data can be provided quickly. 4) The result of this type of search are useful in the assessment of management cost very useful in regards to items such as the pruning, pesticides scattering and fertilization. 5) By using the AutoCAD software and existing PC without purchasing new equipment, the cost of system implementation can be minimized.

  • PDF

Extraction and 3D Visualization of Trees in Urban Environment

  • Yamagishi, Yosuke;Guo, Tao;Yasuoka, Yoshifumi
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.1174-1176
    • /
    • 2003
  • Recently 3D city models are required for many applications such as urban microclimate, transportation navigation, landscape planning and visualization to name a few. The existing 3D city models mostly target on modeling buildings, but vegetation also plays an important role in the urban environment. To represent a more realistic urban environment through the 3D city model, in this research, an investigation is conducted to extract the position of trees from high resolution IKONOS imagery along with Airborne Laser Scanner data. Later, a tree growth model is introduced to simulate the growth of trees in the identified tree-positions.

  • PDF

Bacterial Branch Blight of Peach Tree Caused by Xanthomonas arboricora pv. pruni (Xanthomonas arboricora pv. pruni에 의한 복숭아 세균성가지마름병의 발생)

  • 김종완
    • Plant Disease and Agriculture
    • /
    • v.5 no.2
    • /
    • pp.115-118
    • /
    • 1999
  • A new bacterial disease was found on trees of peach(Prunus persica var. vulgaris Max) at Kumho Kyungbuk in April 1999. The disease usually occured on over wintered buds branchs and stems of the Cheon-Hong cultivar. The buds died without sprouting and the branches showed entire wilting Droplets of bacterial ooze was occasionally running down the surface of diseased plants under moist condition. Artificial needle prick inoculation with isolates obtained from branchs of naturally infected plants produced symptoms similar to those occuring under natural condition. On the basis of bacteriological characteristics and pathogenicity on the host plant of the organism the causal bacterium was identified as Xanthomonas arboricora pv. pruni and this disease was proposed to name "Bacterial branch blight of the peach tree"

  • PDF

A Comparative Study of Phishing Websites Classification Based on Classifier Ensemble

  • Tama, Bayu Adhi;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.5
    • /
    • pp.617-625
    • /
    • 2018
  • Phishing website has become a crucial concern in cyber security applications. It is performed by fraudulently deceiving users with the aim of obtaining their sensitive information such as bank account information, credit card, username, and password. The threat has led to huge losses to online retailers, e-business platform, financial institutions, and to name but a few. One way to build anti-phishing detection mechanism is to construct classification algorithm based on machine learning techniques. The objective of this paper is to compare different classifier ensemble approaches, i.e. random forest, rotation forest, gradient boosted machine, and extreme gradient boosting against single classifiers, i.e. decision tree, classification and regression tree, and credal decision tree in the case of website phishing. Area under ROC curve (AUC) is employed as a performance metric, whilst statistical tests are used as baseline indicator of significance evaluation among classifiers. The paper contributes the existing literature on making a benchmark of classifier ensembles for web phishing detection.

A Comparative Study of Phishing Websites Classification Based on Classifier Ensembles

  • Tama, Bayu Adhi;Rhee, Kyung-Hyune
    • Journal of Multimedia Information System
    • /
    • v.5 no.2
    • /
    • pp.99-104
    • /
    • 2018
  • Phishing website has become a crucial concern in cyber security applications. It is performed by fraudulently deceiving users with the aim of obtaining their sensitive information such as bank account information, credit card, username, and password. The threat has led to huge losses to online retailers, e-business platform, financial institutions, and to name but a few. One way to build anti-phishing detection mechanism is to construct classification algorithm based on machine learning techniques. The objective of this paper is to compare different classifier ensemble approaches, i.e. random forest, rotation forest, gradient boosted machine, and extreme gradient boosting against single classifiers, i.e. decision tree, classification and regression tree, and credal decision tree in the case of website phishing. Area under ROC curve (AUC) is employed as a performance metric, whilst statistical tests are used as baseline indicator of significance evaluation among classifiers. The paper contributes the existing literature on making a benchmark of classifier ensembles for web phishing detection.