• Title/Summary/Keyword: Campus Network

Search Result 293, Processing Time 0.022 seconds

Position of Hungarian Merino among other Merinos, within-breed genetic similarity network and markers associated with daily weight gain

  • Attila, Zsolnai;Istvan, Egerszegi;Laszlo, Rozsa;David, Mezoszentgyorgyi;Istvan, Anton
    • Animal Bioscience
    • /
    • v.36 no.1
    • /
    • pp.10-18
    • /
    • 2023
  • Objective: In this study, we aimed to position the Hungarian Merino among other Merinoderived sheep breeds, explore the characteristics of our sampled animals' genetic similarity network within the breed, and highlight single nucleotide polymorphisms (SNPs) associated with daily weight-gain. Methods: Hungarian Merino (n = 138) was genotyped on Ovine SNP50 Bead Chip (Illumina, San Diego, CA, USA) and positioned among 30 Merino and Merino-derived breeds (n = 555). Population characteristics were obtained via PLINK, SVS, Admixture, and Treemix software, within-breed network was analysed with python networkx 2.3 library. Daily weight gain of Hungarian Merino was standardised to 60 days and was collected from the database of the Association of Hungarian Sheep and Goat Breeders. For the identification of loci associated with daily weight gain, a multi-locus mixed-model was used. Results: Supporting the breed's written history, the closest breeds to Hungarian Merino were Estremadura and Rambouillet (pairwise FST values are 0.035 and 0.036, respectively). Among Hungarian Merino, a highly centralised connectedness has been revealed by network analysis of pairwise values of identity-by-state, where the animal in the central node had a betweenness centrality value equal to 0.936. Probing of daily weight gain against the SNP data of Hungarian Merinos revealed five associated loci. Two of them, OAR8_17854216.1 and s42441.1 on chromosome 8 and 9 (-log10P>22, false discovery rate<5.5e-20) and one locus on chromosome 20, s28948.1 (-log10P = 13.46, false discovery rate = 4.1e-11), were close to the markers reported in other breeds concerning daily weight gain, six-month weight, and post-weaning gain. Conclusion: The position of Hungarian Merino among other Merino breeds has been determined. We have described the similarity network of the individuals to be applied in breeding practices and highlighted several markers useful for elevating the daily weight gain of Hungarian Merino.

IMPROVING RELIABILITY OF BRIDGE DETERIORATION MODEL USING GENERATED MISSING CONDITION RATINGS

  • Jung Baeg Son;Jaeho Lee;Michael Blumenstein;Yew-Chaye Loo;Hong Guan;Kriengsak Panuwatwanich
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.700-706
    • /
    • 2009
  • Bridges are vital components of any road network which demand crucial and timely decision-making for Maintenance, Repair and Rehabilitation (MR&R) activities. Bridge Management Systems (BMSs) as a decision support system (DSS), have been developed since the early 1990's to assist in the management of a large bridge network. Historical condition ratings obtained from biennial bridge inspections are major resources for predicting future bridge deteriorations via BMSs. Available historical condition ratings in most bridge agencies, however, are very limited, and thus posing a major barrier for obtaining reliable future structural performances. To alleviate this problem, the verified Backward Prediction Model (BPM) technique has been developed to help generate missing historical condition ratings. This is achieved through establishing the correlation between known condition ratings and such non-bridge factors as climate and environmental conditions, traffic volumes and population growth. Such correlations can then be used to obtain the bridge condition ratings of the missing years. With the help of these generated datasets, the currently available bridge deterioration model can be utilized to more reliably forecast future bridge conditions. In this paper, the prediction accuracy based on 4 and 9 BPM-generated historical condition ratings as input data are compared, using deterministic and stochastic bridge deterioration models. The comparison outcomes indicate that the prediction error decreases as more historical condition ratings obtained. This implies that the BPM can be utilised to generate unavailable historical data, which is crucial for bridge deterioration models to achieve more accurate prediction results. Nevertheless, there are considerable limitations in the existing bridge deterioration models. Thus, further research is essential to improve the prediction accuracy of bridge deterioration models.

  • PDF

Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services

  • Sija, Baraka D;Shim, Kyu-Seok;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1572-1593
    • /
    • 2018
  • The diversity and fast growth of Internet traffic volume are highly influenced by mobile and computer applications being developed. Moreover, the developed applications are too dynamic to be identified and monitored by network administrators. Several approaches have been proposed to identify network applications, however, are still not robust enough to identify modern applications. This paper proposes both, TSA (Traffic collection, Signature generation and Applications identification) system and a derived algorithm so called CSP (Contiguous Sequential Patterns) to identify applications for management and security in IP networks. The major focus of this paper is the CSP algorithm which is automated in two modules (Signature generation and Applications identification) of the proposed system. The proposed CSP algorithm generates DNA-like unique signatures capable of identifying applications and their individual services. In this paper, we show that the algorithm is suitable for generating efficient signatures to identify applications and application services in high accuracy.

Optimal Network Defense Strategy Selection Based on Markov Bayesian Game

  • Wang, Zengguang;Lu, Yu;Li, Xi;Nie, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5631-5652
    • /
    • 2019
  • The existing defense strategy selection methods based on game theory basically select the optimal defense strategy in the form of mixed strategy. However, it is hard for network managers to understand and implement the defense strategy in this way. To address this problem, we constructed the incomplete information stochastic game model for the dynamic analysis to predict multi-stage attack-defense process by combining Bayesian game theory and the Markov decision-making method. In addition, the payoffs are quantified from the impact value of attack-defense actions. Based on previous statements, we designed an optimal defense strategy selection method. The optimal defense strategy is selected, which regards defense effectiveness as the criterion. The proposed method is feasibly verified via a representative experiment. Compared to the classical strategy selection methods based on the game theory, the proposed method can select the optimal strategy of the multi-stage attack-defense process in the form of pure strategy, which has been proved more operable than the compared ones.

The Relationship between the Pedestrian Movement Pattern and the Pedestrian Network at a University Campus (대학 캠퍼스 보행자 이동패턴과 보행네트워크간의 상호관련성)

  • Lee, Yu-Mi;Shin, Haeng-Woo
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.21 no.2
    • /
    • pp.25-32
    • /
    • 2014
  • Many Korean university campuses are located on hilly terrain where the hierarchy of the path system is unclear. Therefore, it is difficult to analyze the pedestrian network through space syntax, in which only horizontal direction changes are considered as depths of space. The purpose of this study is to compare pedestrian movement patterns and space syntax analysis in order to find their relevance to each other and the relationship between them. We conducted a survey regarding the most-visited buildings and pathways at S-University, which is located on a hilly area in Seoul. The survey results were compared with the Space Syntax integration map by regression analysis. For the segments where the relationship between pedestrian volume and integration was weak, field observations were conducted. As a result, topographical aspects, functional aspects, and location aspects were observed as the main influential factors. In addition, the research proposes that adding an extra axial line per vertical directional change can potentially compensate for the low relevance of stairs. This study suggests the possibility and the necessity of three-dimensional space syntax programs and emphasizes the importance of campus planning for the pedestrian environment.

An Integrated Method for Application-level Internet Traffic Classification

  • Choi, Mi-Jung;Park, Jun-Sang;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.838-856
    • /
    • 2014
  • Enhanced network speed and the appearance of various applications have recently resulted in the rapid increase of Internet users and the explosive growth of network traffic. Under this circumstance, Internet users are eager to receive reliable and Quality of Service (QoS)-guaranteed services. To provide reliable network services, network managers need to perform control measures involving dropping or blocking each traffic type. To manage a traffic type, it is necessary to rapidly measure and correctly analyze Internet traffic as well as classify network traffic according to applications. Such traffic classification result provides basic information for ensuring service-specific QoS. Several traffic classification methodologies have been introduced; however, there has been no favorable method in achieving optimal performance in terms of accuracy, completeness, and applicability in a real network environment. In this paper, we propose a method to classify Internet traffic as the first step to provide stable network services. We integrate the existing methodologies to compensate their weaknesses and to improve the overall accuracy and completeness of the classification. We prioritize the existing methodologies, which complement each other, in our integrated classification system.

A study on the Algorithm for Mesh Network Topology Optimization and Routing (망토폴로지 최적화와 라우팅을 위한 알고리즘에 대한 연구)

  • Kim, Dong-Choon;Na, Seung-Kwon;Pyeon, Yong-Kug
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.1
    • /
    • pp.53-59
    • /
    • 2015
  • We consider the problems that consist of designing time, establishment cost, delay time and reliability in designing a mesh network when given link costs and traffic requirements between nodes. Designing time, establishment cost and delay time are less, reliability is higher in designing a mesh network. One of the problems designing time is solved by mesh network topology optimization and routing (MENTOR) algorithm that Aaron Kershenbaum propose, but the others remain. In this paper we propose a new mesh network design algorithm with small computational complexity that the others are solved. The result of the proposed algorithm is better than MENTOR's in total establishment cost, delay time and reliability.

A Study on Development of Artificial Neural Network (ANN) for Deep Excavation Design (깊은굴착 설계를 위한 인공신경망 개발에 관한 연구)

  • Yoo, Chungsik;Yang, Jaewon;Abbas, Qaisar;Aizaz, Haider Syed
    • Journal of the Korean Geosynthetics Society
    • /
    • v.17 no.4
    • /
    • pp.199-212
    • /
    • 2018
  • This research concerns the prediction method for ground movement and wall member force due to determination structural stability check and failure check during deep excavation construction. First, research related with excavation influence parameters is conducted. Then, numerical analysis for various excavation conditions were conducted using Finite Element Method and Beam-column elasto-plasticity method. Excavation analysis database was then constructed. Using this database, development of ANN (artificial neural network) was performed for each ground movements and using structural member forces. By comparing the numerical analysis results with ANN's prediction, it is validated that development of ANN can be used efficient for prediction of ground movement and structural member forces in deep excavation site.

A Deep Learning Model for Predicting User Personality Using Social Media Profile Images

  • Kanchana, T.S.;Zoraida, B.S.E.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.265-271
    • /
    • 2022
  • Social media is a form of communication based on the internet to share information through content and images. Their choice of profile images and type of image they post can be closely connected to their personality. The user posted images are designated as personality traits. The objective of this study is to predict five factor model personality dimensions from profile images by using deep learning and neural networks. Developed a deep learning framework-based neural network for personality prediction. The personality types of the Big Five Factor model can be quantified from user profile images. To measure the effectiveness, proposed two models using convolution Neural Networks to classify each personality of the user. Done performance analysis among two different models for efficiently predict personality traits from profile image. It was found that VGG-69 CNN models are best performing models for producing the classification accuracy of 91% to predict user personality traits.

A Review on IoT: Layered Architecture, Security Issues and Protocols

  • Tooba Rashid;Sumbal Mustafa
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.100-110
    • /
    • 2023
  • The Internet of Things (IoT) is the most creative and focused technology to be employed today. It increases the living conditions of both individuals and society. IoT offers the ability to recognize and incorporate physical devices across the globe through a single network by connecting different devices by using various technologies. As part of IoTs, significant questions are posed about access to computer and user privacy-related personal details. This article demonstrates the three-layer architecture composed of the sensor, routing, and implementation layer, respectively, by highlighting the security risks that can occur in various layers of an IoT architecture. The article also involves countermeasures and a convenient comparative analysis by discussing major attacks spanning from detectors to application. Furthermore, it deals with the basic protocols needed for IoT to establish a reliable connection between objects and items.