http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Mun Myong Choe,Hun Chol Kang,In Chul Kim,Hai Su Li,Ming Gen Wu,Im Shik Lee 한국잔디학회 2017 Weed & Turfgrass Science Vol.6 No.1
The mutation rate of proline in the position 197 (Pro197) in acetohydroxy acid synthase (AHAS) is highest among sulfonylurea (SU) herbicide-resistance mutants. Therefore, it is significant to investigate the resistance mechanism for the mutation and to develop the herbicides specific to the mutants. SU herbicide resistance mechanism of the mutants, 197Ser, 197Thr and 197Ala, in AHAS were targeted for designing new SU-herbicide. We did molecular dynamics (MD) simulation for understanding SU herbicide-resistance mechanisms of AHAS mutants and designed new herbicides with docking and MD evaluations. We have found that mutation to 197Ala and 197Ser enlarged the entrance of the active site, while 197Thr contracted. Map of the root mean square derivation (RMSD) and radius gyrations (Rg) revealed the domain indicating the conformations for herbicide resistant. Based on the enlarging-contracting mechanism of active site entrance, we designed new herbicides with substitution at the heterocyclic moiety of a SU herbicide for the complementary binding to the changed active site entrances of mutants, and designed new herbicides. We confirmed that our screened new herbicides bonded to both AHAS wild type and mutants with higher affinity, showing more stable binding conformation than the existing herbicides.
Choe, Mun Myong,Kang, Hun Chol,Kim, In Chul,Li, Hai Su,Wu, Ming Gen,Lee, Im Shik The Korean Society of Weed ScienceThe Turfgrass So 2017 Weed & Turfgrass Science Vol.6 No.1
The mutation rate of proline in the position 197 (Pro197) in acetohydroxy acid synthase (AHAS) is highest among sulfonylurea (SU) herbicide-resistance mutants. Therefore, it is significant to investigate the resistance mechanism for the mutation and to develop the herbicides specific to the mutants. SU herbicide resistance mechanism of the mutants, 197Ser, 197Thr and 197Ala, in AHAS were targeted for designing new SU-herbicide. We did molecular dynamics (MD) simulation for understanding SU herbicide-resistance mechanisms of AHAS mutants and designed new herbicides with docking and MD evaluations. We have found that mutation to 197Ala and 197Ser enlarged the entrance of the active site, while 197Thr contracted. Map of the root mean square derivation (RMSD) and radius gyrations (Rg) revealed the domain indicating the conformations for herbicide resistant. Based on the enlarging-contracting mechanism of active site entrance, we designed new herbicides with substitution at the heterocyclic moiety of a SU herbicide for the complementary binding to the changed active site entrances of mutants, and designed new herbicides. We confirmed that our screened new herbicides bonded to both AHAS wild type and mutants with higher affinity, showing more stable binding conformation than the existing herbicides.
( Su Jim-hong ),( Ying Jia-ming ) 한국과학사학회 2016 한국과학사학회지 Vol.38 No.2
This article discusses the influence that two versions of the Elements had in Ming and Qing China as well as Chinese scholars` efforts to “integrate” (huitong 會通) Western and Chinese mathematics into a unified system in terms of argumentative styles in mathematics. Although much high praise was given to the axiomatic-de-ductive system of Euclid`s Elements, numerical arguments and problem-solving re-main important traits in the works of Chinese scholars. The compilation of the Shuli jingyun 數理精蘊 and the inclusion of another version of the Elements in it again prompted East Asian mathematicians to reflect more upon their methods of argu-mentation, and later scholars began to write texts whose arguments are more abstract than numerical. This paper presents examples taken from the works of several rep-resentative scholars from the late Ming to the mid-Qing periods to argue that their efforts of huitong produced argumentative styles that are a combination of both Chi-nese and Western approaches, and that there was a trend of moving from concrete calculations to general arguments in mathematical texts throughout the course of history. Finally, the authors conclude that what 17<sup>th</sup> and 18<sup>th</sup> century Chinese math-ematicians meant by “calculation principles” (suanli 算理) was never the kind of pure deduction in the Euclidean manner, but a combination of induction and deduc-tion, with the help of intuition, for the purpose of problem-solving.
AN ALLOCATION ALGORITHM FOR DATA PATH SYNTHESIS
Su,Ming,Xue,Hongxi 대한전자공학회 1995 ICVC : International Conference on VLSI and CAD Vol.4 No.1
A novel approach, called clustering allocation algorithm for data path synthesis of digital system, is presented The algorithm introduce equivalent set to allocate the mutually exclusive operations or variables, and globally considers the minimum cost of data path under the minimum number of functional units and registers. The algorithm has been implemented and tested by the benchmarks for data path synthesis. The experimental results show that the algorithm gets the better results than other published algorithms in less CPU time.
An Online Response System for Anomaly Traffic by Incremental Mining with Genetic Optimization
Su, Ming-Yang,Yeh, Sheng-Cheng The Korea Institute of Information and Commucation 2010 Journal of communications and networks Vol.12 No.4
A flooding attack, such as DoS or Worm, can be easily created or even downloaded from the Internet, thus, it is one of the main threats to servers on the Internet. This paper presents an online real-time network response system, which can determine whether a LAN is suffering from a flooding attack within a very short time unit. The detection engine of the system is based on the incremental mining of fuzzy association rules from network packets, in which membership functions of fuzzy variables are optimized by a genetic algorithm. The incremental mining approach makes the system suitable for detecting, and thus, responding to an attack in real-time. This system is evaluated by 47 flooding attacks, only one of which is missed, with no false positives occurring. The proposed online system belongs to anomaly detection, not misuse detection. Moreover, a mechanism for dynamic firewall updating is embedded in the proposed system for the function of eliminating suspicious connections when necessary.
An Online Response System for Anomaly Traffic by Incremental Mining with Genetic Optimization
Ming-Yang Su,Sheng-Cheng Yeh 한국통신학회 2010 Journal of communications and networks Vol.12 No.4
A flooding attack, such as DoS or Worm, can be easily created or even downloaded from the Internet, thus, it is one of the main threats to servers on the Internet. This paper presents an online real-time network response system, which can determine whether a LAN is suffering from a flooding attack within a very short time unit. The detection engine of the system is based on the incremental mining of fuzzy association rules from network packets,in which membership functions of fuzzy variables are optimized by a genetic algorithm. The incremental mining approach makes the system suitable for detecting, and thus, responding to an attack in real-time. This system is evaluated by 47 flooding attacks,only one of which is missed, with no false positives occurring. The proposed online system belongs to anomaly detection, not misuse detection. Moreover, a mechanism for dynamic firewall updating is embedded in the proposed system for the function of eliminating suspicious connections when necessary.
MRI Features of Spinal Epidural Angiolipomas
Su Hu,Chun-hong Hu,Xiao-yun Hu,Xi-ming Wang,Hui Dai,Xiang-ming Fang,Lei Cui 대한영상의학회 2013 Korean Journal of Radiology Vol.14 No.5
Objective: To describe the MRI findings in ten patients of spinal epidural angiolipoma for differentiated diagnosis presurgery. Materials and Methods: Ten surgically proved cases of spinal epidural angiolipomas were retrospectively reviewed, and the lesion was classified according to the MR findings. Results: Ten tumors were located in the superior (n = 4), middle (n = 2), or inferior (n = 4) thoracic level. The mass, with the spindle shape, was located in the posterior epidural space and extended parallel to the long axis of the spine. All lesions contained a fat and vascular element. The vascular content, correlating with the presence of hypointense regions on T1-weighted imaging (T1WI) and hyperintense signals on T2-weighted imaging, had marked enhancement. However, there were no flow void signs on MR images. All tumors were divided into two types based on the MR features. In type 1 (n = 3), the mass was predominantly composed of lipomatous tissue (> 50%) and contained only a few small angiomatous regions, which had a trabeculated or mottled appear. In type 2 (n = 7), the mass, however, was predominantly composed of vascular components (> 50%), which presented as large foci in the center of the mass. Conclusion: Most spinal epidural angiolipomas exhibit hyperintensity on T1WI while the hypointense region on the noncontrast T1WI indicates to be vascular, which manifests an obvious enhancement with gadolinium administration.