189 research outputs found

    Mapping of the Genome Sequence Using Two-stage Self Organizing Maps

    Get PDF
    In this paper, we introduce an algorithm of Self-Organizing Maps(SOM) which can map the genome sequence continuously on the map. The DNA sequences are considered to have the special features depending on the regions where the sequences are taken from or the gene functions of the proteins which are translated from the sequences. If the hidden features of the DNA sequences are extracted from the DNA sequences, they can be used for predicting the regions or the functions of the sequences. In this paper, we propose the algorithms using two stage SOM which organizes the sequences of the specific length at the first stage and organizes the set of sequences at the 2nd stage This algorithm can map the genome sequences on the map at each stage depending on the features of the sequences. We made some analyses of the genome sequences concerning the functions, species and secondary structure of the sequences

    Disaster Mitigation Education at Special Needs Schools for Children with Intellectual Disabilities

    Get PDF
    突然、起きる災害に対して、知的障害のある児童は弱者となりやすいことが考えられる。知的障害特別支援学校における防災教育は必要不可欠である。そこで、著者は、今年度から年間指導計画に防災教育を設定し、小学部から高等部までの系統性を考えながら、小学部6年生に対して実践を行い、その結果を分析することにより、知的障害のある児童に有効な防災教育の内容や特別支援学校に求められる防災教育の在り方について検討を行った。その結果、知的障害特別支援学校における防災教育には、「災害・防災に関する情報の理解」「危険回避行動の表出」「災害発生を想定した非日常への適応」の3つの柱により、知的障害の特性を踏まえつつ、継続的かつ体験的に実施すると効果的であることが明らかとなった。It is necessary to provide disaster mitigation education at special needs schools, specifically for students with intellectual disabilities, because they are most likely to be vulnerable to sudden disasters. Therefore, in this school year, disaster mitigation education was introduced to sixth-grade students as a part of the annual curriculum plan in one special needs school by considering the characteristics of intellectual disabilities and the continuity from elementary to high school divisions. Based on the results of implementing the disaster mitigation education, the author analyzed its ideal methods and concrete contents for children with intellectual disabilities in special needs schools. As a result, it was effective to continuously and experientially implement disaster mitigation education based on the following three perspectives: “understanding information on disasters themselves and disaster mitigation,” “expression of danger avoidance behaviors,” and “adaptation to extraordinary situations assuming the occurrence of a disaster.

    Mapping of the Genome Sequence Using Two-stage Self Organizing Maps

    Get PDF
    In this paper, we introduce an algorithm of Self-Organizing Maps(SOM) which can map the genome sequence continuously on the map. The DNA sequences are considered to have the special features depending on the regions where the sequences are taken from or the gene functions of the proteins which are translated from the sequences. If the hidden features of the DNA sequences are extracted from the DNA sequences, they can be used for predicting the regions or the functions of the sequences. In this paper, we propose the algorithms using two stage SOM which organizes the sequences of the specific length at the first stage and organizes the set of sequences at the 2nd stage This algorithm can map the genome sequences on the map at each stage depending on the features of the sequences. We made some analyses of the genome sequences concerning the functions, species and secondary structure of the sequences

    Construction and Use Examples of Private Electronic Notary Service in Educational Institutions

    Get PDF
    People have many documents. For example, a variety of documents are prepared and used in public institutions. As the internet becomes widely available in recent years, paper documents are being replaced with electronic data, which are often distributed in the form of electronic data without being printed out. Similarly, in educational institutions, increasing number of documents are distributed in the form of electronic data. Such data are distributed through various routes and means, and prone to the risk of alteration in the process. Data may be protected against alteration, but it is difficult to completely prevent data alteration in the distribution process. Data can be generated with electronic signature that allows for the identification of data creator and possible alterations by third parties. This method is, however, not valid if the data becomes separated from the electronic signature, making the validation of data creator or data alterations difficult or impossible. In this paper, we describe the invention of a system that, even in cases where data is separated form the electronic signature, enables easy identification of possible data alterations by the electronic signature management. And we describe here an exploratory construction of private electronic notary service in university. We also add a review on the utilization method of private electronic notary service in universities

    Construction and Use Examples of Private Electronic Notary Service in Educational Institutions

    Get PDF
    People have many documents. For example, a variety of documents are prepared and used in public institutions. As the internet becomes widely available in recent years, paper documents are being replaced with electronic data, which are often distributed in the form of electronic data without being printed out. Similarly, in educational institutions, increasing number of documents are distributed in the form of electronic data. Such data are distributed through various routes and means, and prone to the risk of alteration in the process. Data may be protected against alteration, but it is difficult to completely prevent data alteration in the distribution process. Data can be generated with electronic signature that allows for the identification of data creator and possible alterations by third parties. This method is, however, not valid if the data becomes separated from the electronic signature, making the validation of data creator or data alterations difficult or impossible. In this paper, we describe the invention of a system that, even in cases where data is separated form the electronic signature, enables easy identification of possible data alterations by the electronic signature management. And we describe here an exploratory construction of private electronic notary service in university. We also add a review on the utilization method of private electronic notary service in universities

    Study of nuclear correlation effects via 12C(p,n)12N(g.s.,1+) at 296 MeV

    Get PDF
    We report measurements of the cross section and a complete set of polarization observables for the Gamow--Teller 12C(p,n)12N(g.s.,1+){}^{12}{\rm C}(\vec{p},\vec{n}){}^{12}{\rm N}({\rm g.s.},1^+) reaction at a bombarding energy of 296 MeV. The data are compared with distorted wave impulse approximation calculations employing transition form factors normalized to reproduce the observed beta-decay ftft value. The cross section is significantly under-predicted by the calculations at momentum transfers qq \gtrsim 0.5 fm1{\rm fm^{-1}}. The discrepancy is partly resolved by considering the non-locality of the nuclear mean field. However, the calculations still under-predict the cross section at large momentum transfers of qq \simeq 1.6 fm1{\rm fm^{-1}}. We also performed calculations employing random phase approximation response functions and found that the observed enhancement can be attributed in part to pionic correlations in nuclei.Comment: 5 figures, submitted to Phys. Lett.
    corecore