• Title/Summary/Keyword: normal vector

Search Result 682, Processing Time 0.029 seconds

Method of Detecting and Isolating an Attacker Node that Falsified AODV Routing Information in Ad-hoc Sensor Network (애드혹 센서 네트워크에서 AODV 라우팅 정보변조 공격노드 탐지 및 추출기법)

  • Lee, Jae-Hyun;Kim, Jin-Hee;Kwon, Kyung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2293-2300
    • /
    • 2008
  • In ad-hoc sensor network, AODV routing information is disclosed to other nodes because AODV protocol doesn't have any security mechanisms. The problem of AODV is that an attacker can falsify the routing information in RREQ packet. If an attacker broadcasts the falsified packet, other nodes will update routing table based on the falsified one so that the path passing through the attacker itself can be considered as a shortest path. In this paper, we design the routing-information-spoofing attack such as falsifying source sequence number and hop count fields in RREQ packet. And we suggest an efficient scheme for detecting the attackers and isolating those nodes from the network without extra security modules. The proposed scheme doesn't employ cryptographic algorithm and authentication to reduce network overhead. We used NS-2 simulation to evaluate the network performance. And we analyzed the simulation results on three cases such as an existing normal AODV, AODV under the attack and proposed AODV. Simulation results using NS2 show that the AODV using proposed scheme can protect the routing-information-spoofing attack and the total n umber of received packets for destination node is almost same as the existing norm at AODV.

White striping degree assessment using computer vision system and consumer acceptance test

  • Kato, Talita;Mastelini, Saulo Martiello;Campos, Gabriel Fillipe Centini;Barbon, Ana Paula Ayub da Costa;Prudencio, Sandra Helena;Shimokomaki, Massami;Soares, Adriana Lourenco;Barbon, Sylvio Jr.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.32 no.7
    • /
    • pp.1015-1026
    • /
    • 2019
  • Objective: The objective of this study was to evaluate three different degrees of white striping (WS) addressing their automatic assessment and customer acceptance. The WS classification was performed based on a computer vision system (CVS), exploring different machine learning (ML) algorithms and the most important image features. Moreover, it was verified by consumer acceptance and purchase intent. Methods: The samples for image analysis were classified by trained specialists, according to severity degrees regarding visual and firmness aspects. Samples were obtained with a digital camera, and 25 features were extracted from these images. ML algorithms were applied aiming to induce a model capable of classifying the samples into three severity degrees. In addition, two sensory analyses were performed: 75 samples properly grilled were used for the first sensory test, and 9 photos for the second. All tests were performed using a 10-cm hybrid hedonic scale (acceptance test) and a 5-point scale (purchase intention). Results: The information gain metric ranked 13 attributes. However, just one type of image feature was not enough to describe the phenomenon. The classification models support vector machine, fuzzy-W, and random forest showed the best results with similar general accuracy (86.4%). The worst performance was obtained by multilayer perceptron (70.9%) with the high error rate in normal (NORM) sample predictions. The sensory analysis of acceptance verified that WS myopathy negatively affects the texture of the broiler breast fillets when grilled and the appearance attribute of the raw samples, which influenced the purchase intention scores of raw samples. Conclusion: The proposed system has proved to be adequate (fast and accurate) for the classification of WS samples. The sensory analysis of acceptance showed that WS myopathy negatively affects the tenderness of the broiler breast fillets when grilled, while the appearance attribute of the raw samples eventually influenced purchase intentions.

TLS (Total Least-Squares) within Gauss-Helmert Model: 3D Planar Fitting and Helmert Transformation of Geodetic Reference Frames (가우스-헬머트 모델 전최소제곱: 평면방정식과 측지좌표계 변환)

  • Bae, Tae-Suk;Hong, Chang-Ki;Lim, Soo-Hyeon
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.40 no.4
    • /
    • pp.315-324
    • /
    • 2022
  • The conventional LESS (LEast-Squares Solution) is calculated under the assumption that there is no errors in independent variables. However, the coordinates of a point, either from traditional ground surveying such as slant distances, horizontal and/or vertical angles, or GNSS (Global Navigation Satellite System) positioning, cannot be determined independently (and the components are correlated each other). Therefore, the TLS (Total Least Squares) adjustment should be applied for all applications related to the coordinates. Many approaches were suggested in order to solve this problem, resulting in equivalent solutions except some restrictions. In this study, we calculated the normal vector of the 3D plane determined by the trace of the VLBI targets based on TLS within GHM (Gauss-Helmert Model). Another numerical test was conducted for the estimation of the Helmert transformation parameters. Since the errors in the horizontal components are very small compared to the radius of the circle, the final estimates are almost identical. However, the estimated variance components are significantly reduced as well as show a different characteristic depending on the target location. The Helmert transformation parameters are estimated more precisely compared to the conventional LESS case. Furthermore, the residuals can be predicted on both reference frames with much smaller magnitude (in absolute sense).

Relationships of Cocaine and Amphetamine Regulated Transcript with Serotonin in the Brain

  • Park, S. H.;B. S. Kwon;J. R. Chun;J. W. Jahng;Lee, H. T.;K. S. Chung
    • Proceedings of the KSAR Conference
    • /
    • 2001.03a
    • /
    • pp.51-51
    • /
    • 2001
  • Cocaine and amphetamine-regulated transcript (CART) is a satiety factor that is regulated by leptin. It was reported that the mice intracerebroventricularly injected with CART showed behavioral changes resembled with the typical behavioral alterations found in the mice carrying disorders in the brain serotonergic (5-HT) system. Hence, this study was conducted to find out the relationships between CART and 5-HT. We first examined the mRNA levels of CART after the injections of para-chlorophenylalanine (pCPA, 300 mg/kg i.p., single injection or daily for three consecutive days) in the rat brains by in situ hybridization using the mouse CART cDNA probe cloned in our laboratory. Systemic administrations of pCPA, a potent inhibitor of tryptophan hydroxylase, the rate limiting enzyme of 5-HT biosynthesis, acutely depletes the brain 5-HT transporter (5-HTT) in the dorsal raphe nucleus (DRN), which reuptakes terminal 5-HT. Results indicated that the mRNA level of CART significantly decreased in the arcuate nucleus, paraventricular nucleus, and lateral hypothalamic nucleus by three days of daily injection with pCPA with no noticeable change detected 24 hrs after the single injection. The message levels of 5-HTT in DRN decreased in both single and three days of injections. Secondly, to investigate whether CART affect to 5-HT, mouse genomic CART gene, which is consist of 3 exons and 2 introns and mouse neurofilament light (NF-L) chain promoter were cloned. Then, we constructed neuron specific expression vector, which was transfected into HeLa cell using lipid-mediated transfection system. Expression of GFP and CART linked to NF-L-chain promoter in the transfected HeLa cell were detected by using fluorescent microscope and RT-PCR. These results confirmed normal expression of DNA constructs in vitro. Then, to increase brain specific expression of CART in vivo transgenic mice carrying CART gene controlled the deleted NF-L-chain promoter were generated by the DNA microinjection into pronuclei of fertilized embryos. Transgenic mice were detected by Southern blot. Further study is necessary to examine CART expression and 5-HTT in these transgenic mice. Therefore, these results suggest that there maybe a positive molecular correlation between CART and 5-HT in responding to the stimuli.

  • PDF

Development of an Anomaly Detection Algorithm for Verification of Radionuclide Analysis Based on Artificial Intelligence in Radioactive Wastes (방사성폐기물 핵종분석 검증용 이상 탐지를 위한 인공지능 기반 알고리즘 개발)

  • Seungsoo Jang;Jang Hee Lee;Young-su Kim;Jiseok Kim;Jeen-hyeng Kwon;Song Hyun Kim
    • Journal of Radiation Industry
    • /
    • v.17 no.1
    • /
    • pp.19-32
    • /
    • 2023
  • The amount of radioactive waste is expected to dramatically increase with decommissioning of nuclear power plants such as Kori-1, the first nuclear power plant in South Korea. Accurate nuclide analysis is necessary to manage the radioactive wastes safely, but research on verification of radionuclide analysis has yet to be well established. This study aimed to develop the technology that can verify the results of radionuclide analysis based on artificial intelligence. In this study, we propose an anomaly detection algorithm for inspecting the analysis error of radionuclide. We used the data from 'Updated Scaling Factors in Low-Level Radwaste' (NP-5077) published by EPRI (Electric Power Research Institute), and resampling was performed using SMOTE (Synthetic Minority Oversampling Technique) algorithm to augment data. 149,676 augmented data with SMOTE algorithm was used to train the artificial neural networks (classification and anomaly detection networks). 324 NP-5077 report data verified the performance of networks. The anomaly detection algorithm of radionuclide analysis was divided into two modules that detect a case where radioactive waste was incorrectly classified or discriminate an abnormal data such as loss of data or incorrectly written data. The classification network was constructed using the fully connected layer, and the anomaly detection network was composed of the encoder and decoder. The latter was operated by loading the latent vector from the end layer of the classification network. This study conducted exploratory data analysis (i.e., statistics, histogram, correlation, covariance, PCA, k-mean clustering, DBSCAN). As a result of analyzing the data, it is complicated to distinguish the type of radioactive waste because data distribution overlapped each other. In spite of these complexities, our algorithm based on deep learning can distinguish abnormal data from normal data. Radionuclide analysis was verified using our anomaly detection algorithm, and meaningful results were obtained.

Amino Acid Biosynthesis and Gene Regulation in Seed (종자내 아미노산 합성 조절 유전자에 관한 연구)

  • ;;;;;Fumio Takaiwa
    • Proceedings of the Botanical Society of Korea Conference
    • /
    • 1996.07a
    • /
    • pp.61-74
    • /
    • 1996
  • Human and monogastric animals can not synthesize 10 out of the 20 amino asids and therefor need to obtain these from their diet. The plant seed is a major source of dietary protein. It is particular important in their study to increase nutritional quality of the seed storage proteins. The low contents of lysine, asparagine and threonenein various cereal seeds and of cystein and methionine. In legume seeds is due to the low proportions of these amino acids in the major storage proteins, we have tried to apply the three strategies; (1) mutagenesis and selection of specific amino acid analogue resistance, (2) cloning and expression study of lysine biosynthesis related gene, (3) transfomation of lysine rich soybean glycinin gene. The 5-methyltryptophan (5MT) resistant cell lines, SAR1, SAR2 and SAR3 were selected from anther derived callus of rice (Oryza sativa L. "Sasanishiki"). Among these selected cell lines, two (SAR1 and SAR3) were able to grow stably at 200 mg/L of 5MT. Analysis of the freed amino acids in callus shows that 5MT resistant cells (SAR3) accumulated free tryptophan at least up to 50 times higher than those that of the higher than of SAS. These results indicated that the 5MT resistant cell lines are useful in studies of amino acid biosynthesis. Tr75, a rice (Oryza sativa L., var. Sasanishiki) mutant resistant to 5MT was segregated from the progenies of its initial mutant line, TR1. The 5MT resistant of TR75 was inherited in the M8 generations as a single dominant nuclear gene. The content of free amino acids in the TR75 homozygous seeds increased approximately 1.5 to 2.0 fold compared to wild-type seeds. Especially, the contents of tryptophan, phenylalanine and aspartic acid were 5.0, 5.3 and 2.7 times higher than those of wild-type seeds, respectively. The content of lysine is significantly low in rice. The lysine is synthesized by a complex pathway that is predominantly regulated by feedback inhibition of several enzymes including asparginase, aspatate kinase, dihydrodipicolinat synthase, etc. For understanding the regulation mechanism of lysine synthesis in rice, we try to clone the lysine biosynthetic metabolism related gene, DHPS and asparaginase, from rice. We have isolated a rice DHPS genomic clone which contains an ORF of 1044 nucleotides (347 amino acids, Mr. 38, 381 daltons), an intron of 587 nucleotides and 5'and 3'-flanking regions by screening of rice genomic DNA library. Deduced amino acid sequence of mature peptide domain of GDHPS clone is highly conserved in monocot and dicot plants whereas that of transit peptide domain is extremely different depending on plant specie. Southern blot analysis indicated that GDHPS is located two copy gene in rice genome. The transcripts of a rice GDHPS were expressed in leaves and roots but not detected in callus tissues. The transcription level of GDHPS is much higher in leaves indicating enormous chloroplast development than roots. Genomic DNA clones for asparaginase genes were screened from the rice genomic library by using plaque hybridization technique. Twelve different genomic clones were isolated from first and second screening, and 8 of 12 clones were analyzed by restriction patterns and identified by Southern Blotting, Restriction enzyme digestion patterns and Southern blot analysis of 8 clones show the different pattern for asparaginase gene. Genomic Southern blot analysis from rice were done. It is estimated that rice has at least 2-3 copy of asparaginase gene. One of 8 positive clones was subcloned into the pBluescript SK(+) vector, and was constructed the physical map. For transformation of lysine rich storage protein into tobacco, soybean glycinin genes are transformed into tobacco. To examine whether glycinin could be stably accumulated in endosperm tissue, the glycinin cDNA was transcriptionally fused to an endosperm-specific promotor of the rice storage protein glutelin gene and then introduced into tobacco genomic via Agrobacterium-mediated transformation. Consequently the glycinin gene was expressed in a seed-and developmentally-specific manner in transgenic tobacco seeds. Glycinin were targeted to vacuole-derived protein bodies in the endosperm tissue and highly accumulated in the matrix region of many transgenic plant (1-4% of total seed proteins). Synthesized glycinin was processed into mature form, and assembled into a hexamer in a similar manner as the glycinin in soybean seed. Modified glycinin, in which 4 contiguous methionine residues were inserted at the variable regions corresponding to the C - teminal regions of the acidic and basic polypeptides, were also found to be accumulated similarly as in the normal glycinin. There was no apparent difference in the expression level, processing and targeting to protein bodies, or accumulation level between normal and modified glycinin. glycinin.

  • PDF

Protoplast Fusion of Nicotiana glauca and Solanum tuberosum Using Selectable Marker Genes (표식유전자를 이용한 담배와 감자의 원형질체 융합)

  • Park, Tae-Eun;Chung, Hae-Joun
    • The Journal of Natural Sciences
    • /
    • v.4
    • /
    • pp.103-142
    • /
    • 1991
  • These studies were carried out to select somatic hybrid using selectable marker genes of Nicotiana glauca transformed by NPTII gene and Solanum tuberosum transformed by T- DNA, and to study characteristics of transformant. The results are summarized as follows. 1. Crown gall tumors and hairy roots were formed on potato tuber disc infected by A. tumefaciens Ach5 and A. rhizogenes ATCC15834. These tumors and roots could be grown on the phytohormone free media. 2. Callus formation from hairy root was prompted on the medium containing 2, 4 D 2mg/I with casein hydrolysate lg/l. 3. The survival ratio of crown gall tumor callus derived from potato increased on the medium containing the activated charcoal 0. 5-2. 0mg/I because of the preventions on the other hand, hairy roots were necrosis on the same medium. 4. Callus derived from hairy root were excellently grown for a short time by suspension culture on liquid medium containing 2, 4-D 2mg/I and casein hydrolysate lg/l. 5. The binary vector pGA643 was mobilized from E. coli MC1000 into wild type Agrobacteriurn tumefaciens Ach5, A. tumefaciens $A_4T$ and disarmed A. tuniefaciens LBA4404 using a triparental mating method with E. ccli HB1O1/pRK2013. Transconjugants were obtained on the minimal media containing tetracycline and kanamycin. pGA643 vectors were confirmed by electrophoresis on 0.7% agarose gel. 6. Kanamycin resistant calli were selected on the media supplemented with 2, 4-D 0.5mg/1 and kanamycin $100\mug$/ml after co- cultivating with tobacco stem explants and A. tumefaciens LBA4404/pGA643, and selected calli propagated on the same medium. 7. The multiple shoots were regenerated from kanamycin resistant calli on the MS medium containing BA 2mg/l. 8. Leaf segments of transformed shoot were able to grow vigorusly on the medium supplemented with high concentration of kanamycin $1000\mug$/ml. 9. Kanamycin resistant shoots were rooting and elongated on medium containing kanamycin $100\mug$/ml, but normal shoot were not. 10. For the production of protoplast from potato calli transformed by T-DNA and mesophyll tissue transformed by NPTII gene, the former was isolated in the enzyme mixture of 2.0% celluase Onozuka R-10, 1.0% dricelase, 1.0% macerozyme. and 0.5M mannitol, the latter was isolated in the enzyme mixture 1.0% Celluase Onozuka R-10, 0.3% macerozyme, and 0.7M mannitol. 11. The optimal concentrationn of mannitol in the enzyme mixture for high protoplast yield was 0.8M at both transformed tobacco mesophyll and potato callus. The viabilities of protoplast were shown above 90%, respectively. 12. Both tobacco mesophyll and potato callus protoplasts were fused by using PEG solution. Cell walls were regenerated on hormone free media supplemented with kanamycin after 5 days, and colonies were observed after 4 weeks culture.

  • PDF

PERIPHERAL NERVE REGENERATION USING POLYGLYCOLIC ACID CONDUIT AND BRAIN-DERIVED NEUROTROPHIC FACTOR GENE TRANSFECTED SCHWANN CELLS IN RAT SCIATIC NERVE (BDNF 유전자 이입 슈반세포와 PGA 도관을 이용한 백서 좌골신경 재생에 관한 연구)

  • Choi, Won-Jae;Ahn, Kang-Min;Gao, En-Feng;Shin, Young-Min;Kim, Yoon-Tae;Hwang, Soon-Jeong;Kim, Nam-Yeol;Kim, Myung-Jin;Jo, Seung-Woo;Kim, Byung-Soo;Kim, Yun-Hee;Kim, Soung-Min;Lee, Jong-Ho
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.30 no.6
    • /
    • pp.465-473
    • /
    • 2004
  • Purpose : The essential triad for nerve regeneration is nerve conduit, supporting cell and neurotrophic factor. In order to improve the peripheral nerve regeneration, we used polyglycolic acid(PGA) tube and brain-derived neurotrophic factor(BDNF) gene transfected Schwann cells in sciatic nerve defects of SD rat. Materials and methods : Nerve conduits were made with PGA sheet and outer surface was coated with poly(lactic-co-glycolic acid) for mechanical strength and control the resorption rate. The diameter of conduit was 1.8mm and the length was 17mm Schwann cells were harvested from dorsal root ganglion(DRG) of SD rat aged 1 day. Schwann cells were cultured on the PGA sheet to test the biocompatibility adhesion of Schwann cell. Human BDNF gene was obtained from cDNA library and amplified using PCR. BDNF gene was inserted into E1 deleted region of adenovirus shuttle vector, pAACCMVpARS. BDNF-adenovirus was multiplied in 293 cells and purified. The BDNF-Adenovirus was then infected to the cultured Schwann cells. Left sciatic nerve of SD rat (250g weighing) was exposed and 14mm defects were made. After bridging the defect with PGA conduit, culture medium(MEM), Schwann cells or BDNF-Adenovirus infected Schwann cells were injected into the lumen of conduit, respectively. 12 weeks after operation, gait analysis for sciatic function index, electrophysiology and histomorphometry was performed. Results : Cultured Schwann cells were well adhered to PGA sheet. Sciatic index of BDNF transfected group was $-53.66{\pm}13.43$ which was the best among three groups. The threshold of compound action potential was between 800 to $1000{\mu}A$ in experimental groups which is about 10 times higher than normal sciatic nerve. Conduction velocity and peak voltage of action potential of BDNF group was the highest among experimental groups. The myelin thickness and axonal density of BDNF group was significantly greater than the other groups. Conclusion : BDNF gene transfected Schwann cells could regenerate the sciatic nerve gap(14mm) of rat successfully.

Rietveld Structure Refinement of Biotite Using Neutron Powder Diffraction (중성자분말회절법을 이용한 흑운모의 Rietveld Structure Refinement)

  • 전철민;김신애;문희수
    • Economic and Environmental Geology
    • /
    • v.34 no.1
    • /
    • pp.1-12
    • /
    • 2001
  • The crystal structure of biotite-1M from Bancroft, Ontario, was determined by Rietveld refinement method using high-resolution neutron powder diffraction data at -26.3$^{\circ}C$, 2$0^{\circ}C$, 30$0^{\circ}C$, $600^{\circ}C$, 90$0^{\circ}C$. The crystal structure has been refined to a R sub(B) of 5.06%-11.9% and S (Goodness of fitness) of 2.97-3.94. The expansion rate of a, b, c unit cell dimensions with elevated temperature linearly increase to $600^{\circ}C$. The expansivity of the c dimension is $1.61{\times}10^{40}C^{-1}$, while $2.73{\times}10^{50}C^{-1}$ and $5.71{\times}10^{-50}C^{-1}$ for the a and b dimensions, respectively. Thus, the volume increase of the unit cell is dominated by expansion of the c axis as increasing temperature. In contrast to the trend, the expansivity of the dimensions is decreased at 90$0^{\circ}C$. It may be attributed to a change in cation size caused by dehydroxylation-oxidation of $Fe^{2+}$ to $Fe^{3+}$ in vacuum condition at such high temperature. The position of H-proton was determined by the refinement of diffraction pattern at low temperature (-2.63$^{\circ}C$). The position is 0.9103${\AA}$ from the O sub(4) location and located at atomic coordinates (x/a=0.138, y/b=0.5, z/c=0.305) with the OH vector almost normal to plane (001). According to the increase of the temperature, $\alpha$* (tetrahedral rotation angle), $t_{oct}$ (octahedral sheet thickness), mean distance increase except 90$0^{\circ}C$ data. But the trend is less clearly relative to unit cell dimension expansion because the expansion is dominant to the interlayer. Also, ${\Psi}$ (octahedral flattening angle) shows no trends as increasing temperature and it may be because the octahedron (M1, M2) is substituted by Mg and Fe.

  • PDF

Host-Based Intrusion Detection Model Using Few-Shot Learning (Few-Shot Learning을 사용한 호스트 기반 침입 탐지 모델)

  • Park, DaeKyeong;Shin, DongIl;Shin, DongKyoo;Kim, Sangsoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.7
    • /
    • pp.271-278
    • /
    • 2021
  • As the current cyber attacks become more intelligent, the existing Intrusion Detection System is difficult for detecting intelligent attacks that deviate from the existing stored patterns. In an attempt to solve this, a model of a deep learning-based intrusion detection system that analyzes the pattern of intelligent attacks through data learning has emerged. Intrusion detection systems are divided into host-based and network-based depending on the installation location. Unlike network-based intrusion detection systems, host-based intrusion detection systems have the disadvantage of having to observe the inside and outside of the system as a whole. However, it has the advantage of being able to detect intrusions that cannot be detected by a network-based intrusion detection system. Therefore, in this study, we conducted a study on a host-based intrusion detection system. In order to evaluate and improve the performance of the host-based intrusion detection system model, we used the host-based Leipzig Intrusion Detection-Data Set (LID-DS) published in 2018. In the performance evaluation of the model using that data set, in order to confirm the similarity of each data and reconstructed to identify whether it is normal data or abnormal data, 1D vector data is converted to 3D image data. Also, the deep learning model has the drawback of having to re-learn every time a new cyber attack method is seen. In other words, it is not efficient because it takes a long time to learn a large amount of data. To solve this problem, this paper proposes the Siamese Convolutional Neural Network (Siamese-CNN) to use the Few-Shot Learning method that shows excellent performance by learning the little amount of data. Siamese-CNN determines whether the attacks are of the same type by the similarity score of each sample of cyber attacks converted into images. The accuracy was calculated using Few-Shot Learning technique, and the performance of Vanilla Convolutional Neural Network (Vanilla-CNN) and Siamese-CNN was compared to confirm the performance of Siamese-CNN. As a result of measuring Accuracy, Precision, Recall and F1-Score index, it was confirmed that the recall of the Siamese-CNN model proposed in this study was increased by about 6% from the Vanilla-CNN model.