• 제목/요약/키워드: Agent instance

검색결과 36건 처리시간 0.026초

관류자기공명영상의 이해 (Understanding of Perfusion MR Imaging)

  • 구은회
    • 대한디지털의료영상학회논문지
    • /
    • 제15권1호
    • /
    • pp.27-31
    • /
    • 2013
  • Perfusion MR imaging is how to use exogenous and endogenous contrast agent. Exogenous perfusion MRI methods which are dynamic susceptibility contrast using $T2^*$ effect and dynamic contrast-enhanced using T1 weighted image after injection contrast media. An endogenous perfusion MRI method which is arterial spin labeling using arterial blood flow in body. In order to exam perfusion MRI in human, technical access are very important according to disease conditions. For instance, dynamic susceptibility contrast is used in patients with acute stroke because of short exam time, while dynamic susceptibility contrast or dynamic contrast enhancement provides the various perfusion information for patients with tumor, vascular stenosis. Arterial spin labeling is useful for children, women who are expected to be pregnant. In this regard, perfusion MR imaging is required to understanding, and the author would like to share information with clinical users

  • PDF

SNMP 기반 NMS에서 네트웍 관리를 위한 NE MIB의 자동 Import System 설계 (Automatic import system of NE MIB for network management at NMS based on SNMP)

  • 강광석;김영진;박상대;정성현;조종신
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 하계종합학술대회 논문집(1)
    • /
    • pp.109-112
    • /
    • 2002
  • SNMP is generally used protocol for network management. SNMP need MIB for exchanging management information But, method for sharing MIB is not automatic. General MIB sharing architecture is done by network management operator by manually. In this paper we describe exchanging MIB automatically using meta-MIB. We will formalize SMI as MIB structure. This meta MIB represent information about MIB of NE Agent. Meta MIB has Information of object in the MIB, Structure and index information fur columnar object, meaning of subtype at INTEGER syntax. Also, trap related information is represented too. In this paper, MIB information is represented as instance of meta MIB. This architecture will provide a method for automatic MIB exchanging

  • PDF

살충제제(殺蟲製劑)의 안정성(安定性)에 관(關)한 연구(硏究) (Studies on the Stabilities of Insectcides Combined with some Stabilizers)

  • 우종학;김재완
    • Journal of Pharmaceutical Investigation
    • /
    • 제1권1호
    • /
    • pp.101-108
    • /
    • 1971
  • The stability and toxicity test for p.p'-DDT, DDVP and dipterex that put to used sample in this study effects is follows A. about p.p'-DDT (1) In elevating the stability of p.p'-DDT, best stabilizing solvent was benzene. (2) The stability-agent has no difficulty as long as it not contain metal ion for instance $Z_n^{2+}$,$C_r^{3+}$,$Al^{3+}$,and $Fe^{2+or3+}$ but in case of contain $F_e^{3+}$, the combination of salicylaminoguanidine is best effective. (3) Using this product for water-suspension, We must use span 40 for stability agent and adding it at the same time. (4) We must use container which does not week alkali and metal ion but it is to preserved in tight light-resistant container. (5) The stopper of container is adapted with above-mentioned condition of container, but it is better not to use metal material. (6) This product needs opening ventilation more than 30 minutes after diffusion or spray and in the room we remove cause of remained poison by cleaning the bottom. B. about DDVP and Dipterex (1) Benzene or toluene in best solvent to preserve stability of DDVP and Dipterex. (2) Span 40 is superior for stability agent of this product and second is span 80. (3) The pH of solution is very stable in pH 5-6 and comparative stable in alkali more than p,p'-DDT. (4) Container is to preserved in tight, lightresistant container and especially be careful of outflow and inflow of water. (5) Because this product is centeral stimulant poison, we must pay attention to prevent cause of contact diadermic toxicity after use.

  • PDF

디지털영상의 환상성에 관한 연구 (A Study on Illusion of Digital Image)

  • 최원호;김치용
    • 한국멀티미디어학회논문지
    • /
    • 제16권5호
    • /
    • pp.647-656
    • /
    • 2013
  • 시각 재현을 욕망했던 인류 염원은 선형적 역사의 발전 속에서 진보한다. 이때 지향점은 '눈'이었다. 목표지점이 설정된 후, 시각 이미지는 재현을 넘어 주체의 반영을 시도하고, 나아가 주체의 심급 속에 잠재되어 있던 욕망을 시각화하고자 했다. 물론 회화, 사진, 영화에서도 욕망의 무대로서 환상은 경험할 수 있었으나, 디지털은 환상 세계의 창조에 새로운 국면을 제시하고 있다. 본 연구는 주체성과 무의식이 반영되어 환상이미지가 창조되는 디지털영상에서의 환상성에 대해 밝혀보고자 하였다. 연구결과, 디지털 이미지는 이드 속에 저장되었던 이미지와 상상적 욕망이 시각화되는 통로로서 핍진적 이미지를 기반으로 완벽한 환상의 무대로 창조함을 알 수 있었고, 자아와 초자아에 의해 억제되었던 이드를 부상시키면서 욕망실현에 대한 경험을 주체에게 부여하고 있었다.

Is Koi Herpesvirus (KHV) Related to the Mass Mortality Occurring among Cultured Carp, Cyprinus carpio, in Korea?

  • Kim, Wi-Sik;Jung, Sung-Ju;Kim, Du-Woon;Kim, Seok-Ryel;Kim, Jeong-Ho;Oh, Myung-Joo
    • Fisheries and Aquatic Sciences
    • /
    • 제13권1호
    • /
    • pp.79-83
    • /
    • 2010
  • Since 1998, a new viral disease with high mortality has been consistently recorded in Korea in cultured carp, Cyprinus carpio. In this study, we investigated an epizootic of the disease that caused high mortality rates in carp obtained from 11 farms in Korea between 1999 and 2007. Assessment of koi herpesvirus (KHV) levels in diseased carp was carried out to determine if this virus was the etiologic agent of disease in this instance. High mortality rates in carp were recorded mainly in the spring and autumn at water temperatures between $19^{\circ}C$ and $24^{\circ}C$. Diseased fish typically showed surface discoloration, with a thick opaque mucus covering the body and gills. Protozoan parasites and bacteria were recovered from 7/29 (24%) and 2/26 (8%) of fish, respectively. Evidence of viral infection was marked; cytopathic effects (CPEs), characterized by cell rounding and an extended cytoplasm in fathead minnow (FHM) cells, were detected in 40/41 fish (98%). A high mortality rate (80%) resulted when supernatants of cell cultures showing CPEs were applied to previously healthy fish. KHV was detected by polymerase chain reaction in 6/41 fish (15%), but was not detected in supernatants obtained from cell cultures showing CPEs. These results suggest that KHV may not be the etiologic agent of the high mortality occurring among cultured carp in Korea; therefore, some other-as yet unidentified-infective agent must be responsible.

해상교통분석 시뮬레이션을 위한 항해사의 충돌회피 행동분석에 관한 연구 (A Study on the Analysis of Ship Officers' Collision-Avoidance Behavior During Maritime Traffic Simulation)

  • 김홍태;안영중;양영훈
    • 한국항해항만학회지
    • /
    • 제44권6호
    • /
    • pp.469-476
    • /
    • 2020
  • 해상교통 분야와 같이 선박, 항해사, 관제센터, 해운선사, 기상시스템, 지리정보시스템 등의 복잡하고 넓은 범위의 요구사항을 갖는 시스템의 모델링 및 시뮬레이션(Modeling and Simulation, M&S)을 위해서는 인간을 포함한 체계가 필요하다. 해상교통을 모의하기 위해서는 주요 요소인 항해사의 인적요인에 대한 모델링이 필요하다. 즉, 현실감 있는 해상교통 상황의 재현 및 예측을 위해 항해사의 행동양식, 항해전문성, 항해오류 등을 모델링하여 반영하는 것이 필요하다. 본 논문에서는 에이전트 기반의 해상교통 시뮬레이션을 위해서 항해사의 충돌회피를 위한 행동 분석을 수행하였으며, 기초 데이터의 확보를 위해 설문조사를 실시하였다. 설문조사를 통해 분석된 정보를 이용하여 선박 충돌상황에서 항해사의 행동과 유사한 에이전트 기반의 항해행동 모델을 개발하였으며, 해상교통분석 시뮬레이션 플랫폼의 개발을 위해 활용될 것이다.

Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks

  • N. Nithiyanandam;C. Mahesh;S.P. Raja;S. Jeyapriyanga;T. Selva Banu Priya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권6호
    • /
    • pp.1706-1727
    • /
    • 2023
  • Under Water Sensor Networks (UWSN) has gained attraction among various communities for its potential applications like acoustic monitoring, 3D mapping, tsunami detection, oil spill monitoring, and target tracking. Unlike terrestrial sensor networks, it performs an acoustic mode of communication to carry out collaborative tasks. Typically, surface sink nodes are deployed for aggregating acoustic phenomena collected from the underwater sensors through the multi-hop path. In this context, UWSN is constrained by factors such as lower bandwidth, high propagation delay, and limited battery power. Also, the vulnerabilities to compromise the aquatic environment are in growing numbers. The paper proposes an Energy-Efficient standalone Intrusion Detection System (EEIDS) to entail the acoustic environment against malicious attacks and improve the network lifetime. In EEIDS, attributes such as node ID, residual energy, and depth value are verified for forwarding the data packets in a secured path and stabilizing the nodes' energy levels. Initially, for each node, three agents are modeled to perform the assigned responsibilities. For instance, ID agent verifies the node's authentication of the node, EN agent checks for the residual energy of the node, and D agent substantiates the depth value of each node. Next, the classification of normal and malevolent nodes is performed by determining the score for each node. Furthermore, the proposed system utilizes the sheep-flock heredity algorithm to validate the input attributes using the optimized probability values stored in the training dataset. This assists in finding out the best-fit motes in the UWSN. Significantly, the proposed system detects and isolates the malicious nodes with tampered credentials and nodes with lower residual energy in minimal time. The parameters such as the time taken for malicious node detection, network lifetime, energy consumption, and delivery ratio are investigated using simulation tools. Comparison results show that the proposed EEIDS outperforms the existing acoustic security systems.

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권6호
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

웹 상에서 지능형 에이전트 기반 사용자 행위 모니터링 기법 (An User Behavior Monitoring Techniques Based Intelligent Agent on the Web)

  • 강동원;이경미
    • 한국컴퓨터산업학회논문지
    • /
    • 제2권8호
    • /
    • pp.1109-1116
    • /
    • 2001
  • 본 논문에서는 사용자의 행동과 웹상에서 지능형 에이전트를 활용하여 계층적 아키텍처 아래 수행되는 행동을 모니터링 하는데 관점을 두며, 개인화 된 정보 서비스를 쉽게 개발할 수 있는 메커니즘을 제시하고자 한다. 지능형 에이전트는 모니터링 기법을 포함하여, 사용자의 행동을 기록, 프로파일에 기반 한 행동 분석, 사용자의 브라우저나 혹은 메일에 지능적 에이전트에 의해 전달되는 맞춤화 된 컨텐츠의 선택 및 구성 등과 같은 일련의 과정을 포함한 개인화 된 서비스를 제공하는 자동화된 프로세스 기법 중의 하나이다. 모니터링 기술은 개인화 된 지능적 서비스를 제공하는 프로세스를 구성하는데 활용될 수 있다. 결국, 효과적인 개인화 된 서비스의 수행은 다양한 고객의 관심 및 니즈를 정의하고 정확하게 알아내며 고객이 수행한 행동들을 기록하는 것에 달려있다.

  • PDF

BcN 특성 관점의 평가체계 개발에 관한 연구 (A Study on Evaluation System based on Characteristics of BcN)

  • 나윤지;고일석;조영석
    • 융합보안논문지
    • /
    • 제6권3호
    • /
    • pp.49-58
    • /
    • 2006
  • 각종 정보기술과 사회문화의 발전은 기술 및 서비스의 융합을 가속화시키고 있으며 이에 따라 BcN의 중요성이 부각되고 있다. BcN 사업을 위한 평가체계를 구축하기 위해서는 먼저, 기존의 R&D 사업 평가체계들의 분석을 통하여 BcN 사업 평가에 적합한 평가방안을 제시하여야 한다. 하지만 본 연구에서 살펴본 바와 같이 기존의 정보통신서비스평가체계들은 기술 중심의 세부영역별 평가들로 이루어져 있어서 실제적인 사업성과를 측정하기에는 미흡한 점들이 있으며, 또한 BcN 사업이 가진 고유한 특성을 반영하기에 평가체계의 접근 방향이 다른 면이 있다. 본 연구에서는 BcN 사업의 내 외적인 특성을 반영한 BcN 성과 평가 체계를 구축하였다. 이를 위해 BcN의 특성을 세 가지 측면에서 도출하고, 이 특성을 반영한 성과중심의 평가체계를 제시함으로써 사업의 관리 및 기획을 위한 평가 자료의 활용과 시너지 효과 창출과 평가결과의 공용화 및 활용을 통한 사업의 효율성과 활용성 향상을 가져올 수 있도록 하였다.

  • PDF