• Title/Summary/Keyword: AP method

Search Result 665, Processing Time 0.025 seconds

Spectrum Requirements Prediction for WLAN Considering Frequency Interference (간섭을 고려한 무선 LAN 주파수 소요량 예측)

  • Jang, Byung-Jun;Park, Duk-Kyu;Yoon, Hyun-Goo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.8
    • /
    • pp.900-908
    • /
    • 2012
  • Owing to the proliferation of smart phone users, a proactive spectrum policy is needed in order to deal with increasing data traffic. Therefore, the prediction of frequency requirements for future wireless local area network (WLAN) as well as a licensed cellular communication is necessary. In this paper, we proposed a new prediction method for WLAN spectrum requirements. This method includes both a traditional prediction method and an offloading percentage from cellular network, Also, it can consider a frequency interference between access points using a statistical approach. Based on these approaches, we can predict the spectrum requirements of future domestic WLAN services considering the frequency interference. Finally, we suggest the spectrum policy for WLAN which can prevent spectrum shortage of future WLAN services.

Intrusion Artifact Acquisition Method based on IoT Botnet Malware (IoT 봇넷 악성코드 기반 침해사고 흔적 수집 방법)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.3
    • /
    • pp.1-8
    • /
    • 2021
  • With the rapid increase in the use of IoT and mobile devices, cyber criminals targeting IoT devices are also on the rise. Among IoT devices, when using a wireless access point (AP), problems such as packets being exposed to the outside due to their own security vulnerabilities or easily infected with malicious codes such as bots, causing DDoS attack traffic, are being discovered. Therefore, in this study, in order to actively respond to cyber attacks targeting IoT devices that are rapidly increasing in recent years, we proposed a method to collect traces of intrusion incidents artifacts from IoT devices, and to improve the validity of intrusion analysis data. Specifically, we presented a method to acquire and analyze digital forensics artifacts in the compromised system after identifying the causes of vulnerabilities by reproducing the behavior of the sample IoT malware. Accordingly, it is expected that it will be possible to establish a system that can efficiently detect intrusion incidents on targeting large-scale IoT devices.

Fabrication and Characterization of Dissolving Microneedles Containing Lecithin for Transdermal Drug Delivery (레시틴이 함유된 경피 약물전달용 용해성 마이크로니들의 제작과 특성)

  • Choi, Won-Ho;Kim, Bumsang
    • Korean Chemical Engineering Research
    • /
    • v.59 no.3
    • /
    • pp.429-434
    • /
    • 2021
  • The feasibility of lecithin as a material for dissolving microneedles to improve skin permeability of drugs and the effect of the composition of lecithin on the mechanical strength, solubility, and skin permeability of rhodamine B (RhB) of the dissolving microneedles were investigated. Dissolving microneedles with needles of uniform shape and size were fabricated with the mold made using the laser-writing technique, simpler and more efficient method compared to the photolithography method, the conventional method to fabricate the microneedle mold. The composition of lecithin in the microneedle affected the mechanical strength and solubility of the needle thus, the mechanical strength of the needle increased as the composition of lecithin in the needle increased, resulting in improving the skin permeability of RhB contained in the microneedles. When comparing the microneedles containing same composition of amylopectin (AP), the skin permeability of RhB of the microneedles containing lecithin was higher. These results indicate that lecithin can be used as a material for dissolving microneedles and the skin permeability of the microneedle could be controlled by changing the composition of lecithin.

Long-term outcomes after core extirpation of fibrous dysplasia of the zygomaticomaxillary region

  • Joseph Kyu-hyung Park;Se Yeon Lee;Jong-Ho Kim;Baek-kyu Kim
    • Archives of Craniofacial Surgery
    • /
    • v.24 no.2
    • /
    • pp.59-65
    • /
    • 2023
  • Background: Fibrous dysplasia (FD) is a localized bone disorder in which fibro-osseous tissue replaces the normal bone structure. Patients with craniofacial FD often present with gradual swelling, deformity, and compromised vision or hearing. We previously introduced "the core extirpation method," a novel surgical technique that is minimally invasive like traditional bone shaving but has longer-lasting effects. This study presents the long-term outcomes of our core extirpation method. Methods: We conducted a retrospective analysis of patients who underwent core extirpation for FD of the zygomaticomaxillary region from 2012 through 2021. Computed tomography (CT) scans were performed 6 to 12 months before the operation, immediately before and after the operation, and during follow-up visits. We performed all operations using the upper gingivobuccal approach, and we extirpated the core of the lesion while preserving the cortical structures of the zygoma and the maxilla to maintain symmetrical facial contour. Results: In 12 patients with lesions in the growth phase, anteroposterior/mediolateral (AP/ML) length discrepancies and the volume increased between preoperative and immediate postoperative CT scans. All patients' immediate postoperative AP/ML discrepancies were stable up to 12-17 months postoperatively. Postoperative volume showed continuous lesion growth; the median volume growth rate was 0.61 cc per month. Conclusion: In this article, we present our experiences managing FD using the minimally invasive core extirpation technique, which entails small expected blood loss and can be performed as day surgery. It provides similar cosmetic outcomes as traditional bone shaving but with longer-lasting results. Although there are some limitations with the study's retrospective nature and small sample size, our 4-year follow-up results show promising results of the core extirpation method in well-indicated patients.

The Proposed UMA Mode in DMB CAS Authentication Process (비인가 무선접속 모드를 이용한 디지털 멀티미디어 방송의 제한 수신시스템의 인증 제안)

  • Oh, Se-Kab;Kang, Heau-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.3
    • /
    • pp.239-244
    • /
    • 2008
  • In this paper refer to the digital multimedia mobile phone with the combination of broadcasting and the communication the unity of wire and wireless solution that can provide the UMA(Unlicensed Mobile Access) function is added. In UNC(Universal Naming Convention) in the case of CAS(Conditional Access System) is supported, the device(mobile phone) is authenticated through AP and then following the method of broadcasting signal the user can view the wanted contents as long as they want and for this matter the service charge system are proposed.

  • PDF

Retrieval Model Based on Word Translation Probabilities and the Degree of Association of Query Concept (어휘 번역확률과 질의개념연관도를 반영한 검색 모델)

  • Kim, Jun-Gil;Lee, Kyung-Soon
    • The KIPS Transactions:PartB
    • /
    • v.19B no.3
    • /
    • pp.183-188
    • /
    • 2012
  • One of the major challenge for retrieval performance is the word mismatch between user's queries and documents in information retrieval. To solve the word mismatch problem, we propose a retrieval model based on the degree of association of query concept and word translation probabilities in translation-based model. The word translation probabilities are calculated based on the set of a sentence and its succeeding sentence pair. To validate the proposed method, we experimented on TREC AP test collection. The experimental results show that the proposed model achieved significant improvement over the language model and outperformed translation-based language model.

Distribution Method of BLE Fingerprinting for Large Scale Indoor Envirement (광범위 분산처리 기반 BLE 핑거프린팅 실내 측위 기법)

  • Lee, Dohee;Son, Bong-Ki;Lee, Jaeho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.373-378
    • /
    • 2016
  • Recently, IPS(Indoor Positioning System) Technology has been progressing study and research, It has been studied in the fingerprinting and trilateration continuously. however because Fingerprinting and Trilateration Technology use AP(Access Point) for Positioning Calculation, Fingerprinting and Trilateration are not never had a credit positioning accuracy by using unstable RSSI in large scale. in this paper, to improve the problem about precise positioning in wide area, we introduced a concept of Sector including Cell. Sectors are not involved in each other and only fingerprinting calculation is proceed in a sector. we suggest this fingerprinting system considering efficiency and accuracy and compared to conventional fingerprinting, we demonstrated our system efficiency by mathematical techniques.

Integrating Granger Causality and Vector Auto-Regression for Traffic Prediction of Large-Scale WLANs

  • Lu, Zheng;Zhou, Chen;Wu, Jing;Jiang, Hao;Cui, Songyue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.136-151
    • /
    • 2016
  • Flexible large-scale WLANs are now widely deployed in crowded and highly mobile places such as campus, airport, shopping mall and company etc. But network management is hard for large-scale WLANs due to highly uneven interference and throughput among links. So the traffic is difficult to predict accurately. In the paper, through analysis of traffic in two real large-scale WLANs, Granger Causality is found in both scenarios. In combination with information entropy, it shows that the traffic prediction of target AP considering Granger Causality can be more predictable than that utilizing target AP alone, or that of considering irrelevant APs. So We develops new method -Granger Causality and Vector Auto-Regression (GCVAR), which takes APs series sharing Granger Causality based on Vector Auto-regression (VAR) into account, to predict the traffic flow in two real scenarios, thus redundant and noise introduced by multivariate time series could be removed. Experiments show that GCVAR is much more effective compared to that of traditional univariate time series (e.g. ARIMA, WARIMA). In particular, GCVAR consumes two orders of magnitude less than that caused by ARIMA/WARIMA.

In Vitro Determination of Intracellular Phosphorylated Metabolites of Antiviral Pyrimidine Analogs (Zidovudine의 In Vitro 세포내 대사물의 측정을 통한 약효 검색법 개발)

  • Han, Kyu-Won;Kim, Kil-Soo
    • Journal of Pharmaceutical Investigation
    • /
    • v.32 no.4
    • /
    • pp.285-290
    • /
    • 2002
  • In order to assay the efficacy of newly synthesized antiviral compounds, in vitro studies of their active intracellular phosphorylated metabolites were established as compared with Zidovudine (ZDV). Antiviral base analogs require intracellular phosphorylation prior to the inhibition of HIV replication. Therefore, antiviral drugs concentrations in plasma have not reflected any direct relationship with activity or toxicity. A method has been developed to measure the concentration of total phosphorylated metabolites inside peripheral blood mononuclear cells using modified commercial radioimmunoassay (RIA). ZDV 5'-monophosphate was synthesized and used as a procedural control for RIA modification. PBMCs were isolated from whole blood and incubated with ZDV for 20 h to allow metabolic phosphorylation. Viable cells were extracted overnight with 60% methanol. After evaporation, the extract was reconstituted in Tris buffer. Samples were split into two fractions, one of which was treated with alkaline phosphatase (AP) to liberate phosphate groups. Concentrations of phosphorylated metabolites were determined by subtracting thε concentration of non-AP-treated fraction from that of the treated fraction. Recovery of phosphorylated ZDV from cell extracts was approximately 90%, and reproducibility was acceptable (coefficients of variation <15% for concentrations${\geq}$0.25 ng/mL). Intracellular concentrations $(0.135{\sim}5.019\;nmole/10^6\;cells)$ followed a nonlinear dose-response relationship over the range $0.015{\sim}2.996mM$ extracellular ZDV, with concentration-dependant saturation.

A Study on the Development of Arc Length Estimation Method in FCAW (FCAW에서의 아크 길이 추정 방법 개발에 관한 연구)

  • Bae, Kwang-Moo;Cho, Sang-Myung
    • Journal of Welding and Joining
    • /
    • v.27 no.3
    • /
    • pp.67-72
    • /
    • 2009
  • The flux cored arc welding (FCAW) process is one of the most frequently employed and important welding process due to high productivity and excellent workability. The process is performed either as an automated process or as a semi-automatic process. In FCAW process, welding voltage has been considered as a qualitative indication of arc length. But it is necessary to let welding operators know, maintain and manage the arc length directly by estimating and displaying it. In this study, to develop arc length estimation technique, we measured a welding circuit resistance($R_sc$) and then we calculated welding circuit voltage drop($V_sc$). Also, we measured arc peak voltage($V_ap$). By subtracting $V_sc$ from $V_arc$, we can easily calculate net arc voltage drop($V_arc$). Consequently, we suggested arc length estimating equation and basic algorithm by regressive analyzing the relationship between net arc voltage drop($V_arc$) and real arc length(Larc) measured by high speed camera. Therefore, arc length can be predicted by just monitoring welding current and voltage.