期刊文献+
共找到79篇文章
< 1 2 4 >
每页显示 20 50 100
Superconducting joints using reacted multifilament MgB_(2)wires:A technology toward cryogen-free MRI magnets
1
作者 Dipak Patel Akiyoshi Matsumoto +8 位作者 Hiroaki Kumakura Yuka Hara Toru Hara Minoru Maeda Hao Liang Yusuke Yamauchi Seyong Choi Jung Ho Kim Md Shahriar A.Hossain 《Journal of Magnesium and Alloys》 SCIE EI CAS CSCD 2024年第1期159-170,共12页
The development of superconducting joining technology for reacted magnesium diboride(MgB_(2))conductors remains a critical challenge for the advancement of cryogen-free MgB_(2)-based magnets for magnetic resonance ima... The development of superconducting joining technology for reacted magnesium diboride(MgB_(2))conductors remains a critical challenge for the advancement of cryogen-free MgB_(2)-based magnets for magnetic resonance imaging(MRI).Herein,the fabrication of superconducting joints using reacted carbon-doped multifilament MgB_(2)wires for MRI magnets is reported.To achieve successful superconducting joints,the powder-in-mold method was employed,which involved tuning the filament protection mechanism,the powder compaction pressure,and the heat treatment condition.The fabricated joints demonstrated clear superconducting-to-normal transitions in self-field,with effective magnetic field screening up to 0.5 T at 20 K.To evaluate the interface between one of the MgB_(2)filaments and the MgB_(2)bulk within the joint,serial sectioning was conducted for the first time in this type of superconducting joint.The serial sectioning revealed space formation at the interface,potentially caused by the volume shrinkage associated with the MgB_(2)formation or the combined effect of the volume shrinkage and the different thermal expansion coefficients of the MgB_(2)bulk,the filament,the mold,and the sealing material.These findings are expected to be pivotal in developing MgB_(2)superconducting joining technology for MRI magnet applications through interface engineering. 展开更多
关键词 Mg B2 superconducting joint MgB_(2)conductor MRI applications Cryogen-free magnet Persistent-mode operation
下载PDF
Suboptimal Feature Selection Techniques for Effective Malicious Traffic Detection on Lightweight Devices
2
作者 So-Eun Jeon Ye-Sol Oh +1 位作者 Yeon-Ji Lee Il-Gu Lee 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第8期1669-1687,共19页
With the advancement of wireless network technology,vast amounts of traffic have been generated,and malicious traffic attacks that threaten the network environment are becoming increasingly sophisticated.While signatu... With the advancement of wireless network technology,vast amounts of traffic have been generated,and malicious traffic attacks that threaten the network environment are becoming increasingly sophisticated.While signature-based detection methods,static analysis,and dynamic analysis techniques have been previously explored for malicious traffic detection,they have limitations in identifying diversified malware traffic patterns.Recent research has been focused on the application of machine learning to detect these patterns.However,applying machine learning to lightweight devices like IoT devices is challenging because of the high computational demands and complexity involved in the learning process.In this study,we examined methods for effectively utilizing machine learning-based malicious traffic detection approaches for lightweight devices.We introduced the suboptimal feature selection model(SFSM),a feature selection technique designed to reduce complexity while maintaining the effectiveness of malicious traffic detection.Detection performance was evaluated on various malicious traffic,benign,exploits,and generic,using the UNSW-NB15 dataset and SFSM sub-optimized hyperparameters for feature selection and narrowed the search scope to encompass all features.SFSM improved learning performance while minimizing complexity by considering feature selection and exhaustive search as two steps,a problem not considered in conventional models.Our experimental results showed that the detection accuracy was improved by approximately 20%compared to the random model,and the reduction in accuracy compared to the greedy model,which performs an exhaustive search on all features,was kept within 6%.Additionally,latency and complexity were reduced by approximately 96%and 99.78%,respectively,compared to the greedy model.This study demonstrates that malicious traffic can be effectively detected even in lightweight device environments.SFSM verified the possibility of detecting various attack traffic on lightweight devices. 展开更多
关键词 Feature selection lightweight device machine learning Internet of Things malicious traffic
下载PDF
Improving Thyroid Disorder Diagnosis via Ensemble Stacking and Bidirectional Feature Selection
3
作者 Muhammad Armghan Latif Zohaib Mushtaq +6 位作者 Saad Arif Sara Rehman Muhammad Farrukh Qureshi Nagwan Abdel Samee Maali Alabdulhafith Yeong Hyeon Gu Mohammed A.Al-masni 《Computers, Materials & Continua》 SCIE EI 2024年第3期4225-4241,共17页
Thyroid disorders represent a significant global health challenge with hypothyroidism and hyperthyroidism as two common conditions arising from dysfunction in the thyroid gland.Accurate and timely diagnosis of these d... Thyroid disorders represent a significant global health challenge with hypothyroidism and hyperthyroidism as two common conditions arising from dysfunction in the thyroid gland.Accurate and timely diagnosis of these disorders is crucial for effective treatment and patient care.This research introduces a comprehensive approach to improve the accuracy of thyroid disorder diagnosis through the integration of ensemble stacking and advanced feature selection techniques.Sequential forward feature selection,sequential backward feature elimination,and bidirectional feature elimination are investigated in this study.In ensemble learning,random forest,adaptive boosting,and bagging classifiers are employed.The effectiveness of these techniques is evaluated using two different datasets obtained from the University of California Irvine-Machine Learning Repository,both of which undergo preprocessing steps,including outlier removal,addressing missing data,data cleansing,and feature reduction.Extensive experimentation demonstrates the remarkable success of proposed ensemble stacking and bidirectional feature elimination achieving 100%and 99.86%accuracy in identifying hyperthyroidism and hypothyroidism,respectively.Beyond enhancing detection accuracy,the ensemble stacking model also demonstrated a streamlined computational complexity which is pivotal for practical medical applications.It significantly outperformed existing studies with similar objectives underscoring the viability and effectiveness of the proposed scheme.This research offers an innovative perspective and sets the platform for improved thyroid disorder diagnosis with broader implications for healthcare and patient well-being. 展开更多
关键词 Ensemble learning random forests BOOSTING dimensionality reduction machine learning smart healthcare computer aided diagnosis
下载PDF
Two-Terminal Lithium-Mediated Artificial Synapses with Enhanced Weight Modulation for Feasible Hardware Neural Networks 被引量:1
4
作者 Ji Hyun Baek Kyung Ju Kwak +6 位作者 Seung Ju Kim Jaehyun Kim Jae Young Kim In Hyuk Im Sunyoung Lee Kisuk Kang Ho Won Jang 《Nano-Micro Letters》 SCIE EI CAS CSCD 2023年第5期236-253,共18页
Recently,artificial synapses involving an electrochemical reaction of Li-ion have been attributed to have remarkable synaptic properties.Three-terminal synaptic transistors utilizing Li-ion intercalation exhibits reli... Recently,artificial synapses involving an electrochemical reaction of Li-ion have been attributed to have remarkable synaptic properties.Three-terminal synaptic transistors utilizing Li-ion intercalation exhibits reliable synaptic characteristics by exploiting the advantage of nondistributed weight updates owing to stable ion migrations.However,the three-terminal configurations with large and complex structures impede the crossbar array implementation required for hardware neuromorphic systems.Meanwhile,achieving adequate synaptic performances through effective Li-ion intercalation in vertical two-terminal synaptic devices for array integration remains challenging.Here,two-terminal Au/LixCoO_(2)/Pt artificial synapses are proposed with the potential for practical implementation of hardware neural networks.The Au/LixCoO_(2)/Pt devices demonstrated extraordinary neuromorphic behaviors based on a progressive dearth of Li in LixCoO_(2)films.The intercalation and deintercalation of Li-ion inside the films are precisely controlled over the weight control spike,resulting in improved weight control functionality.Various types of synaptic plasticity were imitated and assessed in terms of key factors such as nonlinearity,symmetricity,and dynamic range.Notably,the LixCoO_(2)-based neuromorphic system outperformed three-terminal synaptic transistors in simulations of convolutional neural networks and multilayer perceptrons due to the high linearity and low programming error.These impressive performances suggest the vertical two-terminal Au/LixCoO_(2)/Pt artificial synapses as promising candidates for hardware neural networks. 展开更多
关键词 Artificial synapse Neuromorphic Li-based Two-terminal Synaptic plasticity
下载PDF
Malicious Traffic Compression and Classification Technique for Secure Internet of Things 被引量:1
5
作者 Yu-Rim Lee Na-Eun Park +1 位作者 Seo-Yi Kim Il-Gu Lee 《Computers, Materials & Continua》 SCIE EI 2023年第9期3465-3482,共18页
With the introduction of 5G technology,the application of Internet of Things(IoT)devices is expanding to various industrial fields.However,introducing a robust,lightweight,low-cost,and low-power security solution to t... With the introduction of 5G technology,the application of Internet of Things(IoT)devices is expanding to various industrial fields.However,introducing a robust,lightweight,low-cost,and low-power security solution to the IoT environment is challenging.Therefore,this study proposes two methods using a data compression technique to detect malicious traffic efficiently and accurately for a secure IoT environment.The first method,compressed sensing and learning(CSL),compresses an event log in a bitmap format to quickly detect attacks.Then,the attack log is detected using a machine-learning classification model.The second method,precise re-learning after CSL(Ra-CSL),comprises a two-step training.It uses CSL as the 1st step analyzer,and the 2nd step analyzer is applied using the original dataset for a log that is detected as an attack in the 1st step analyzer.In the experiment,the bitmap rule was set based on the boundary value,which was 99.6%true positive on average for the attack and benign data found by analyzing the training data.Experimental results showed that the CSL was effective in reducing the training and detection time,and Ra-CSL was effective in increasing the detection rate.According to the experimental results,the data compression technique reduced the memory size by up to 20%and the training and detection times by 67%when compared with the conventional technique.In addition,the proposed technique improves the detection accuracy;the Naive Bayes model with the highest performance showed a detection rate of approximately 99%. 展开更多
关键词 IoT security intrusion detection machine learning traffic classification
下载PDF
An Effective Threat Detection Framework for Advanced Persistent Cyberattacks
6
作者 So-Eun Jeon Sun-Jin Lee +5 位作者 Eun-Young Lee Yeon-Ji Lee Jung-Hwa Ryu Jung-Hyun Moon Sun-Min Yi Il-Gu Lee 《Computers, Materials & Continua》 SCIE EI 2023年第5期4231-4253,共23页
Recently,with the normalization of non-face-to-face online environments in response to the COVID-19 pandemic,the possibility of cyberattacks through endpoints has increased.Numerous endpoint devices are managed meticu... Recently,with the normalization of non-face-to-face online environments in response to the COVID-19 pandemic,the possibility of cyberattacks through endpoints has increased.Numerous endpoint devices are managed meticulously to prevent cyberattacks and ensure timely responses to potential security threats.In particular,because telecommuting,telemedicine,and teleeducation are implemented in uncontrolled environments,attackers typically target vulnerable endpoints to acquire administrator rights or steal authentication information,and reports of endpoint attacks have been increasing considerably.Advanced persistent threats(APTs)using various novel variant malicious codes are a form of a sophisticated attack.However,conventional commercial antivirus and anti-malware systems that use signature-based attack detectionmethods cannot satisfactorily respond to such attacks.In this paper,we propose a method that expands the detection coverage inAPT attack environments.In this model,an open-source threat detector and log collector are used synergistically to improve threat detection performance.Extending the scope of attack log collection through interworking between highly accessible open-source tools can efficiently increase the detection coverage of tactics and techniques used to deal with APT attacks,as defined by MITRE Adversarial Tactics,Techniques,and Common Knowledge(ATT&CK).We implemented an attack environment using an APT attack scenario emulator called Carbanak and analyzed the detection coverage of Google Rapid Response(GRR),an open-source threat detection tool,and Graylog,an open-source log collector.The proposed method expanded the detection coverage against MITRE ATT&CK by approximately 11%compared with that conventional methods. 展开更多
关键词 Advanced persistent threat CYBERSECURITY endpoint security MITRE ATT&CK open-source threat detector threat log collector
下载PDF
Machine Learning-Based Efficient Discovery of Software Vulnerability for Internet of Things
7
作者 So-Eun Jeon Sun-Jin Lee Il-Gu Lee 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期2407-2419,共13页
With the development of the 5th generation of mobile communi-cation(5G)networks and artificial intelligence(AI)technologies,the use of the Internet of Things(IoT)has expanded throughout industry.Although IoT networks ... With the development of the 5th generation of mobile communi-cation(5G)networks and artificial intelligence(AI)technologies,the use of the Internet of Things(IoT)has expanded throughout industry.Although IoT networks have improved industrial productivity and convenience,they are highly dependent on nonstandard protocol stacks and open-source-based,poorly validated software,resulting in several security vulnerabilities.How-ever,conventional AI-based software vulnerability discovery technologies cannot be applied to IoT because they require excessive memory and com-puting power.This study developed a technique for optimizing training data size to detect software vulnerabilities rapidly while maintaining learning accuracy.Experimental results using a software vulnerability classification dataset showed that different optimal data sizes did not affect the learning performance of the learning models.Moreover,the minimal data size required to train a model without performance degradation could be determined in advance.For example,the random forest model saved 85.18%of memory and improved latency by 97.82%while maintaining a learning accuracy similar to that achieved when using 100%of data,despite using only 1%. 展开更多
关键词 Lightweight devices machine learning deep learning software vulnerability detection common weakness enumeration
下载PDF
Wake-Up Security:Effective Security ImprovementMechanism for Low Power Internet of Things
8
作者 Sun-Woo Yun Na-Eun Park Il-Gu Lee 《Intelligent Automation & Soft Computing》 SCIE 2023年第9期2897-2917,共21页
As time and space constraints decrease due to the development of wireless communication network technology,the scale and scope of cyber-attacks targeting the Internet of Things(IoT)are increasing.However,it is difficu... As time and space constraints decrease due to the development of wireless communication network technology,the scale and scope of cyber-attacks targeting the Internet of Things(IoT)are increasing.However,it is difficult to apply high-performance security modules to the IoT owing to the limited battery,memory capacity,and data transmission performance depend-ing on the size of the device.Conventional research has mainly reduced power consumption by lightening encryption algorithms.However,it is difficult to defend large-scale information systems and networks against advanced and intelligent attacks because of the problem of deteriorating security perfor-mance.In this study,we propose wake-up security(WuS),a low-power security architecture that can utilize high-performance security algorithms in an IoT environment.By introducing a small logic that performs anomaly detection on the IoT platform and executes the security module only when necessary according to the anomaly detection result,WuS improves security and power efficiency while using a relatively high-complexity security module in a low-power environment compared to the conventional method of periodically exe-cuting a high-performance security module.In this study,a Python simulator based on the UNSW-NB15 dataset is used to evaluate the power consumption,latency,and security of the proposed method.The evaluation results reveal that the power consumption of the proposed WuS mechanism is approxi-mately 51.8%and 27.2%lower than those of conventional high-performance security and lightweight security modules,respectively.Additionally,the laten-cies are approximately 74.8%and 65.9%lower,respectively.Furthermore,the WuS mechanism achieved a high detection accuracy of approximately 96.5%or greater,proving that the detection efficiency performance improved by approximately 33.5%compared to the conventional model.The performance evaluation results for the proposed model varied depending on the applied anomaly-detection model.Therefore,they can be used in various ways by selecting suitable models based on the performance levels required in each industry. 展开更多
关键词 Internet of Things SECURITY anomaly detection low-power architecture energy efficiency wake-up security
下载PDF
Tailored BiVO_(4)/In_(2)O_(3)nanostructures with boosted charge separation ability toward unassisted water splitting
9
作者 Mi Gyoung Lee Jin Wook Yang +10 位作者 Ik Jae Park Tae Hyung Lee Hoonkee Park Woo Seok Cheon Sol ALee Hyungsoo Lee Su Geun Ji Jun Min Suh Jooho Moon Jin Young Kim Ho Won Jang 《Carbon Energy》 SCIE CSCD 2023年第6期45-59,共15页
The development of new heterostructures with high photoactivity is a breakthrough for the limitation of solar-driven water splitting.Here,we first introduce indium oxide(In_(2)O_(3))nanorods(NRs)as a novel electron tr... The development of new heterostructures with high photoactivity is a breakthrough for the limitation of solar-driven water splitting.Here,we first introduce indium oxide(In_(2)O_(3))nanorods(NRs)as a novel electron transport layer for bismuth vanadate(BiVO_(4))with a short charge diffusion length.In_(2)O_(3)NRs reinforce the electron transport and hole blocking of BiVO_(4),surpassing the state-of-the-art photoelectrochemical performances of BiVO_(4)-based photoanodes.Also,a tannin-nickel-iron complex(TANF)is used as an oxygen evolution catalyst to speed up the reaction kinetics.The final TANF/BiVO_(4)/In_(2)O_(3)NR photoanode generates photocurrent densities of 7.1 mAcm^(−2) in sulfite oxidation and 4.2 mA cm^(−2) in water oxidation at 1.23 V versus the reversible hydrogen electrode.Furthermore,the“artificial leaf,”which is a tandem cell with a perovskite/silicon solar cell,shows a solar-to-hydrogen conversion efficiency of 6.2%for unbiased solar water splitting.We reveal significant advances in the photoactivity of TANF/BiVO_(4)/In_(2)O_(3)NRs from the tailored nanostructure and band structure for charge dynamics. 展开更多
关键词 bismuth vanadate HETEROJUNCTION indium oxide NANOSTRUCTURE photoelectrochemical water splitting
下载PDF
Wearable and stretchable conductive polymer composites for strain sensors:How to design a superior one?
10
作者 Liwei Lin Sumin Park +6 位作者 Yuri Kim Minjun Bae Jeongyeon Lee Wang Zhang Jiefeng Gao Sun Ha Paek Yuanzhe Piao 《Nano Materials Science》 EI CAS CSCD 2023年第4期392-403,共12页
Wearable and stretchable strain sensors have potential values in the fields of human motion and health monitoring,flexible electronics,and soft robotic skin.The wearable and stretchable strain sensors can be directly ... Wearable and stretchable strain sensors have potential values in the fields of human motion and health monitoring,flexible electronics,and soft robotic skin.The wearable and stretchable strain sensors can be directly attached to human skin,providing visualized detection for human motions and personal healthcare.Conductive polymer composites(CPC)composed of conductive fillers and flexible polymers have the advantages of high stretchability,good flexibility,superior durability,which can be used to prepare flexible strain sensors with large working strain and outstanding sensitivity.This review has put forward a comprehensive summary on the fabrication methods,advanced mechanisms and strain sensing abilities of CPC strain sensors reported in recent years,especially the sensors with superior performance.Finally,the structural design,bionic function,integration technology and further application of CPC strain sensors are prospected. 展开更多
关键词 Wearable strain sensors Conductive polymer composites MECHANISM Sensing performance
下载PDF
碳纳米管/氯化镁负载钛基Ziegler-Natta催化剂在异戊二烯聚合中的应用(英文) 被引量:1
11
作者 曹兰 蒲诚勇 宗成中 《合成橡胶工业》 CAS 北大核心 2019年第3期233-233,共1页
以大内径碳纳米管、羟基化碳纳米管及氯化镁作载体,采用高能球磨技术制备了纳米级钛系ZieglerNatta催化剂,研究了该催化剂对反式聚异戊二烯聚合过程的影响。结果表明,反式聚异戊二烯/碳纳米管复合材料具有管状结构,碳纳米管颗粒分散良好... 以大内径碳纳米管、羟基化碳纳米管及氯化镁作载体,采用高能球磨技术制备了纳米级钛系ZieglerNatta催化剂,研究了该催化剂对反式聚异戊二烯聚合过程的影响。结果表明,反式聚异戊二烯/碳纳米管复合材料具有管状结构,碳纳米管颗粒分散良好,并且明显提高了反式聚异戊二烯的热稳定性。 展开更多
关键词 ZIEGLER-NATTA催化剂 反式聚异戊二烯 碳纳米管 热稳定性
下载PDF
共价键合二氧化硅/氧化石墨烯对天然橡胶的多尺度和界面增强及在环保高性能轮胎胎面中的应用(英文)
12
作者 曹兰 王庆富 +4 位作者 翟晓康 辛欣 王海瑞 张萌萌 宗成中 《合成橡胶工业》 CAS CSCD 北大核心 2018年第6期475-475,共1页
将零维(0 D) Si 69改性的二氧化硅纳米颗粒(MS)和KH 550官能化的二维(2 D)多层氧化石墨烯(KGO)组成的纳米复合物通过胶乳法制备了天然橡胶(NR)纳米材料,研究了纳米材料的多尺度增强和界面强化。结果表明,通过MS和KGO表面活性极性官能团... 将零维(0 D) Si 69改性的二氧化硅纳米颗粒(MS)和KH 550官能化的二维(2 D)多层氧化石墨烯(KGO)组成的纳米复合物通过胶乳法制备了天然橡胶(NR)纳米材料,研究了纳米材料的多尺度增强和界面强化。结果表明,通过MS和KGO表面活性极性官能团之间良好的H键相互作用形成了0 D/2 D杂化复合物(即MSKGO),后者与异戊二烯单元通过Si 69的硫化物相互作用和非极性相互作用与氧化石墨烯(GO)形成NRMSKGO的三维网络结构;在干燥和固化过程中,H键网络结构转化为共价键网络结构,同时GO部分转变为还原氧化石墨烯(RGO)。含有质量分数为3%GO的复合材料的200%定伸应力和拉伸强度分别提高9. 47倍和1. 36倍;仅使用10份含质量分数1%GO的复合材料替代10份NR制备的轮胎胎面,不仅使炭黑降低5份,且耐磨性和抗湿滑性分别提高了44. 5%和14. 6%,滚动阻力下降了5. 1% 展开更多
关键词 天然胶乳 氧化石墨烯二氧化硅 轮胎胎面 硅烷偶联剂
下载PDF
Molecular mechanisms of chemopreventive phytochemicals against gastroenterological cancer development 被引量:7
13
作者 Min-Yu Chung Tae Gyu Lim Ki Won Lee 《World Journal of Gastroenterology》 SCIE CAS 2013年第7期984-993,共10页
Cancer is one of the leading causes of death worldwide.Commonly used cancer treatments,including chemotherapy and radiation therapy,often have side effects and a complete cure is sometimes impossible.Therefore,prevent... Cancer is one of the leading causes of death worldwide.Commonly used cancer treatments,including chemotherapy and radiation therapy,often have side effects and a complete cure is sometimes impossible.Therefore,prevention,suppression,and/or delaying the onset of the disease are important.The onset of gastroenterological cancers is closely associated with an individual's lifestyle.Thus,changing lifestyle,specifically the consumption of fruits and vegetables,can help to protect against the development of gastroenterological cancers.In particular,naturally occurring bioactive compounds,including curcumin,resveratrol,isothiocyanates,(-)-epigallocatechin gallate and sulforaphane,are regarded as promising chemopreventive agents.Hence,regular consumption of these natural bioactive compounds found in foods can contribute to prevention,suppression,and/or delay of gastroenterological cancer development.In this review,we will summarize natural phytochemicals possessing potential antioxidant and/or anti-inflammatory and anti-carcinogenic activities,which are exerted by regulating or targeting specific molecules against gastroenterological cancers,including esophageal,gastric and colon cancers. 展开更多
关键词 Curcumin Resveratrol (-)-Epigallocatechin GALLATE ISOTHIOCYANATES SULFORAPHANE Gastroenterological cancers Molecular target
下载PDF
Similarity measure on intuitionistic fuzzy sets 被引量:5
14
作者 PARK Jean-Ho HWANG Jai-Hyuk +2 位作者 PARK Wook-Je 魏荷 LEE Sang-Hyuk 《Journal of Central South University》 SCIE EI CAS 2013年第8期2233-2238,共6页
Study of fuzzy entropy and similarity measure on intuitionistic fuzzy sets (IFSs) was proposed and analyzed. Unlike fuzzy set, IFSs contain uncertainty named hesitance, which is contained in fuzzy membership function ... Study of fuzzy entropy and similarity measure on intuitionistic fuzzy sets (IFSs) was proposed and analyzed. Unlike fuzzy set, IFSs contain uncertainty named hesitance, which is contained in fuzzy membership function itself. Hence, designing fuzzy entropy is not easy because of many entropy definitions. By considering different fuzzy entropy definitions, fuzzy entropy on IFSs is designed and discussed. Similarity measure was also presented and its usefulness was verified to evaluate degree of similarity. 展开更多
关键词 直觉模糊集 相似度量 相似性度量 模糊隶属函数 模糊熵 不确定性 相似程度 有用性
下载PDF
Development of genome engineering technologies in cattle: from random to specific 被引量:6
15
作者 Soo-Young Yum Ki-Young Youn +1 位作者 Woo-Jae Choi Goo Jang 《Journal of Animal Science and Biotechnology》 SCIE CAS CSCD 2018年第2期285-293,共9页
The production of transgenic farm animals(e.g., cattle) via genome engineering for the gain or loss of gene functions is an important undertaking. In the initial stages of genome engineering, DNA micro-injection into ... The production of transgenic farm animals(e.g., cattle) via genome engineering for the gain or loss of gene functions is an important undertaking. In the initial stages of genome engineering, DNA micro-injection into one-cell stage embryos(zygotes) followed by embryo transfer into a recipient was performed because of the ease of the procedure.However, as this approach resulted in severe mosaicism and has a low efficiency, it is not typically employed in the cattle as priority, unlike in mice. To overcome the above issue with micro-injection in cattle, somatic cell nuclear transfer(SCNT) was introduced and successfully used to produce cloned livestock. The application of SCNT for the production of transgenic livestock represents a significant advancement, but its development speed is relatively slow because of abnormal reprogramming and low gene targeting efficiency. Recent genome editing technologies(e.g.,ZFN, TALEN, and CRISPR-Cas9) have been rapidly adapted for applications in cattle and great results have been achieved in several fields such as disease models and bioreactors. In the future, genome engineering technologies wil accelerate our understanding of genetic traits in bovine and wil be readily adapted for bio-medical applications in cattle. 展开更多
关键词 CATTLE CRISPR-Cas9 GENOME engineering TECHNOLOGIES TRANSGENESIS TRANSPOSON
下载PDF
Effects of feeding a diet containing Gymnema sylvestre extract: attenuating progression of obesity in C57BL/6J mice 被引量:4
16
作者 Hyeon-Jeong Kim Seong-Ho Hong +7 位作者 Seung-Hee Chang Sanghwa Kim Ah Young Lee Yoonjeong Jang Orkhonselenge Davaadamdin Kyeong-Nam Yu Ji-Eun Kim Myung-Haing Cho 《Asian Pacific Journal of Tropical Medicine》 SCIE CAS 2016年第5期425-431,共7页
Objective: To investigate the effect of Gymnema sylvestre extract(GS) on initial anti-obesity, liver injury, and glucose homeostasis induced by a high-fat diet(HFD). Methods: The dry powder of GS was extracted with me... Objective: To investigate the effect of Gymnema sylvestre extract(GS) on initial anti-obesity, liver injury, and glucose homeostasis induced by a high-fat diet(HFD). Methods: The dry powder of GS was extracted with methanol, and gymnemic acid was identified by high performance liquid chromatography as deacyl gymnemic acid. Male C57BL/6J mice that fed on either a normal diet, normal diet containing 1 g/kg GS(CON+GS) HFD, or HFD containing 1.0 g/kg GS(HFD+GS) for 4 weeks were used to test the initial anti-obesity effect of GS. Body weight gain and food intake, and serum levels about lipid and liver injury markers were measured. Histopathology of adipose tissue and liver stained with hematoxylin and eosin(H&E) and oil-red O were analyzed. After 4 weeks of GS extract feeding, intraperitoneal glucose tolerance test(IPGTT) was performed. Results: The methanol extracts of GS exerted significant anti-obesity effects in HFD+GS group. They decreased body weight gain, a lower food and energy efficiency ratio, and showed lower serum levels of total cholesterol(TC), triglyceride(TG), low-density lipoprotein(LDL)-cholesterol, very-low density lipoprotein(VLDL)-cholesterol and leptin compared with the HFD group. The decreases of abdominal as well as epididymal fat weight and adipocyte hypertrophy, lipid droplets in liver, and serum levels of aspartate aminotransferase(AST) and alanine transaminase(ALT) were also observed. The CON+GS group showed an effect of glucose homeostasis compared to the CON group. Conclusions: This study shows that GS provide the possibility as a key role in an initial anti-obesity effects feeding with a HFD. 展开更多
关键词 Gymnema sylvestre EXTRACT OBESITY ADIPOCYTE Body weight gain HIGH-FAT diet Liver injury
下载PDF
A new type of blockchain for secure message exchange in VANET 被引量:9
17
作者 Rakesh Shrestha Rojeena Bajracharya +1 位作者 Anish P.Shrestha Seung Yeob Nam 《Digital Communications and Networks》 SCIE 2020年第2期177-186,共10页
In the Vehicular Ad-hoc NETworks(VANET),the collection and dissemination of life-threatening traffic event information by vehicles are of utmost importance.However,traditional VANETs face several security issues.We pr... In the Vehicular Ad-hoc NETworks(VANET),the collection and dissemination of life-threatening traffic event information by vehicles are of utmost importance.However,traditional VANETs face several security issues.We propose a new type of blockchain to resolve critical message dissemination issues in the VANET.We create a local blockchain for real-world event message exchange among vehicles within the boundary of a country,which is a new type of blockchain suitable for the VANET.We present a public blockchain that stores the node trustworthiness and message trustworthiness in a distributed ledger that is appropriate for secure message dissemination. 展开更多
关键词 VANET Blockchain Message trustworthiness Node trustworthiness Edge computing
下载PDF
Memristive Devices Based on Two-Dimensional Transition Metal Chalcogenides for Neuromorphic Computing 被引量:6
18
作者 Ki Chang Kwon Ji Hyun Baek +2 位作者 Kootak Hong Soo Young Kim Ho Won Jang 《Nano-Micro Letters》 SCIE EI CAS CSCD 2022年第4期29-58,共30页
Two-dimensional(2D)transition metal chalcogenides(TMC)and their heterostructures are appealing as building blocks in a wide range of electronic and optoelectronic devices,particularly futuristic memristive and synapti... Two-dimensional(2D)transition metal chalcogenides(TMC)and their heterostructures are appealing as building blocks in a wide range of electronic and optoelectronic devices,particularly futuristic memristive and synaptic devices for brain-inspired neuromorphic computing systems.The distinct properties such as high durability,electrical and optical tunability,clean surface,flexibility,and LEGO-staking capability enable simple fabrication with high integration density,energy-efficient operation,and high scalability.This review provides a thorough examination of high-performance memristors based on 2D TMCs for neuromorphic computing applications,including the promise of 2D TMC materials and heterostructures,as well as the state-of-the-art demonstration of memristive devices.The challenges and future prospects for the development of these emerging materials and devices are also discussed.The purpose of this review is to provide an outlook on the fabrication and characterization of neuromorphic memristors based on 2D TMCs. 展开更多
关键词 Two-dimensional materials MEMRISTORS Neuromorphic computing Artificial synapses Transition metal chalcogenides
下载PDF
CNT/High Mass Loading MnO2/Graphene-Grafted Carbon Cloth Electrodes for High-Energy Asymmetric Supercapacitors 被引量:4
19
作者 Lulu Lyu Kwang-dong Seong +6 位作者 Jong Min Kim Wang Zhang Xuanzhen Jin Dae Kyom Kim Youngmoo Jeon Jeongmin Kang Yuanzhe Piao 《Nano-Micro Letters》 SCIE EI CAS CSCD 2019年第4期549-560,共12页
Flexible supercapacitor electrodes with high mass loading are crucial for obtaining favorable electrochemical performance but still challenging due to sluggish electron and ion transport.Herein,rationally designed CNT... Flexible supercapacitor electrodes with high mass loading are crucial for obtaining favorable electrochemical performance but still challenging due to sluggish electron and ion transport.Herein,rationally designed CNT/MnO2/graphene-grafted carbon cloth electrodes are prepared by a“graft-deposit-coat”strategy.Due to the large surface area and good conductivity,graphene grafted on carbon cloth offers additional surface areas for the uniform deposition of MnO2(9.1 mg cm?2)and facilitates charge transfer.Meanwhile,the nanostructured MnO2 provides abundant electroactive sites and short ion transport distance,and CNT coated on MnO2 acts as interconnected conductive“highways”to accelerate the electron transport,significantly improving redox reaction kinetics.Benefiting from high mass loading of electroactive materials,favorable conductivity,and a porous structure,the electrode achieves large areal capacitances without compromising rate capability.The assembled asymmetric supercapacitor demonstrates a wide working voltage(2.2 V)and high energy density of 10.18 mWh cm?3. 展开更多
关键词 HIGH mass loading Flexible PSEUDOCAPACITOR Voltage WINDOW Energy density
下载PDF
Occurrence and distribution of hydroxylated isoprenoid glycerol dialkyl glycerol tetraethers(OH-GDGTs) in the Han River system, South Korea 被引量:3
20
作者 Sujin Kang Kyoung-Hoon Shin Jung-Hyun Kim 《Acta Geochimica》 EI CAS CSCD 2017年第3期367-369,共3页
We investigated the occurrence and distribution of terrestrial-derived hydroxylated isoprenoid glycerol dialkyl glycerol tetraethers(OH-GDGTs) in the Han River system and their potential impact on the application of t... We investigated the occurrence and distribution of terrestrial-derived hydroxylated isoprenoid glycerol dialkyl glycerol tetraethers(OH-GDGTs) in the Han River system and their potential impact on the application of the ring index of OH-GDGTs(RI-OH) as a sea surface temperature(SST) proxy in the eastern Yellow Sea. Thereby, we analyzed various samples collected along the Han River and from its surrounding areas(South Korea, n = 34). The OHGDGTs were found in all samples investigated. OH-GDGT-0 was the dominant OH-GDGT component in the estuary and marine samples while OH-GDGT-2 was generally dominant in the soils, the lake sediments and the river suspended particulate matter(SPM). Our results thus suggests a possible warm bias of the RI-OH-derived summer SSTs in the coastal zone to which a large amount of terrestrial organic matter is being supplied. Further studies are necessary to better assess the applicability of the RI-OH proxy in the eastern Yellow Sea. 展开更多
关键词 类异戊二烯 二烷基 甘油 汉江 羟基 系统 韩国 和分布
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部