• Title/Summary/Keyword: Detection Mechanism

Search Result 850, Processing Time 0.025 seconds

Development of Sound Quality Index with Characterization of BSR Noise in a Vehicle (자동차 BSR 소음특성과 음질 인덱스 개발)

  • Shin, Su-Hyun;Kim, Duck-Whan;Cheong, Cheol-Ung
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2012.04a
    • /
    • pp.447-452
    • /
    • 2012
  • Among the various elements affecting a customer's evaluation of automobile quality, buzz, squeak and rattle (BSR) are considered to be major factors. In most vehicle manufacturers, the BSR problems are solved by find-fix method with the vehicle road test, mainly due to various excitation sources, complex generation mechanism and subjective response. The aim of this paper is to develop the integrated experimental method to systematically tackle the BSR problems in early stage of the vehicle development cycle by resolving these difficulties. To achieve this aim, the developed experimental method ought to include the following requirements: to find and fix the BSR problem for modules instead of a full vehicle in order to tackle the problem in the early stage of the vehicle development cycle; to develop the exciter system including the zig and road-input-signal reproducing algorithm; to automatically localize the source region of BSR; to develop sound quality index that can be used to assess the subjective responses to BSR. Also, the BSR sound quality indexes based on the Zwicker's sound quality parameters using a multiple regression analysis. The four sound metrics from Zwicker's sound quality parameter are computed for the signals recorded for eight BSR noise source regions localized by using the acoustic-field visualized results. Then, the jury test of BSR noise are performed for participants. On a basis of the computed sound metrics and jury test result, sound quality index is developed to represent the harsh of BSR noise. It is expected that the developed BSR detection system and sound quality indexes can be used to reduce the automotive interior BSR noise in terms of subjective levels as well as objective levels.

  • PDF

A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration (디바이스 센싱 단계의 IoT 네트워크 보안 기술 프레임워크 구성)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.35-41
    • /
    • 2015
  • Internet of Things has a wide range of vulnerabilities are exposed to information security threats. However, this does not deal with the basic solution, the vaccine does not secure encryption for the data transmission. The encryption and authentication message transmitted from one node to the construction of the secure wireless sensor networks is required. In order to satisfy the constraint, and security requirements of the sensor network, lightweight encryption and authentication technologies, the light key management technology for the sensor environment it is required. Mandatory sensor network security technology, privacy protection technology subchannel attack prevention, and technology. In order to establish a secure wireless sensor networks encrypt messages sent between the nodes and it is important to authenticate. Lightweight it shall apply the intrusion detection mechanism functions to securely detect the presence of the node on the network. From the sensor node is not involved will determine the authenticity of the terminal authentication technologies, there is a need for a system. Network security technology in an Internet environment objects is a technique for enhancing the security of communication channel between the devices and the sensor to be the center.

The Assessing Comparative Study for Statistical Process Control of Software Reliability Model Based on polynomial hazard function (다항 위험함수에 근거한 NHPP 소프트웨어 신뢰모형에 관한 통계적 공정관리 접근방법 비교연구)

  • Kim, Hee-Cheul;Shin, Hyun-Cheul
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.5
    • /
    • pp.345-353
    • /
    • 2015
  • There are many software reliability models that are based on the times of occurrences of errors in the debugging of software. It is shown that it is possible to do parameter inference for software reliability models based on finite failure model and non-homogeneous Poisson Processes (NHPP). For someone making a decision to market software, the conditional failure rate is an important variables. In this case, finite failure model are used in a wide variety of practical situations. Their use in characterization problems, detection of outlier, linear estimation, study of system reliability, life-testing, survival analysis, data compression and many other fields can be seen from the many study. Statistical process control (SPC) can monitor the forecasting of software failure and thereby contribute significantly to the improvement of software reliability. Control charts are widely used for software process control in the software industry. In this paper, proposed a control mechanism based on NHPP using mean value function of polynomial hazard function.

Role of Extracellular Signal-Regulated Kinase 1/2 and Reactive Oxygen Species in Toll-Like Receptor 2-Mediated Dual-Specificity Phosphatase 4 Expression (Toll-Like Receptor 2 매개 Dual-Specificity Phosphatase 4 발현에서 Extracellular Signal-Regulated Kinase 1/2와 활성산소의 역할)

  • Kim, So-Yeon;Baek, Suk-Hwan
    • Journal of Yeungnam Medical Science
    • /
    • v.30 no.1
    • /
    • pp.10-16
    • /
    • 2013
  • Background: Toll-like receptors (TLRs) are well-known pattern recognition receptors. Among the 13 TLRs, TLR2 is the most known receptor for immune response. It activates mitogen-activated protein kinases (MAPKs), which are counterbalanced by MAPK phosphatases [MKPs or dual-specificity phosphatases (DUSPs)]. However, the regulatory mechanism of DUSPs is still unclear. In this study, the effect of a TLR2 ligand (TLR2L, Pam3CSK4) on DUSP4 expression in Raw264.7 cells was demonstrated. Methods: A Raw264.7 mouse macrophage cell line was cultured in Dulbecco's modified Eagle's medium supplemented with 10% fetal bovine serum and 1% antibiotics (100 U/mL penicillin and 100 g/mL streptomycin) at $37^{\circ}C$ in 5% $CO_2$. TLR2L (Pam3CSK4)-mediated DUSP4 expressions were confirmed with RT-PCR and western blot analysis. In addition, the detection of reactive oxygen species (ROS) was measured with lucigenin assay. Results: Pam3CSK4 induced the expression of DUSP1, 2, 4, 5 and 16. The DUSP4 expression was also increased by TLR4 and 9 agonists (lipopolysaccharide and CpG ODN, respectively). Pam3CSK4 also induced ERK1/2 phosphorylation and ROS production, and the Pam3CSK4-induced DUSP4 expression was decreased by ERK1/2 (U0126) and ROS (DPI) inhibitors. U0126 suppressed the ROS production by Pam3CSK4. Conclusion: Pam3CSK4-mediated DUSP4 expression is regulated by ERK1/2 and ROS. This finding suggests the physiological importance of DUSP4 in TLR2-mediated immune response.

A genome-wide association study of reproduction traits in four pig populations with different genetic backgrounds

  • Jiang, Yao;Tang, Shaoqing;Xiao, Wei;Yun, Peng;Ding, Xiangdong
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.33 no.9
    • /
    • pp.1400-1410
    • /
    • 2020
  • Objective: Genome-wide association study and two meta-analysis based on GWAS performed to explore the genetic mechanism underlying variation in pig number born alive (NBA) and total number born (TNB). Methods: Single trait GWAS and two meta-analysis (single-trait meta analysis and multi-trait meta analysis) were used in our study for NBA and TNB on 3,121 Yorkshires from 4 populations, including three different American Yorkshire populations (n = 2,247) and one British Yorkshire populations (n = 874). Results: The result of single trait GWAS showed that no significant associated single nucleotide polymorphisms (SNPs) were identified. Using single-trait meta analysis and multi-trait meta analysis within populations, 11 significant loci were identified associated with target traits. Spindlin 1, vascular endothelial growth factor A, forkhead box Q1, msh homeobox 1, and LHFPL tetraspan submily member 3 are five functionally plausible candidate genes for NBA and TNB. Compared to the single population GWAS, single-trait Meta analysis can improve the detection power to identify SNPs by integrating information of multiple populations. The multiple-trait analysis reduced the power to detect trait-specific loci but enhanced the power to identify the common loci across traits. Conclusion: In total, our findings identified novel genes to be validated as candidates for NBA and TNB in pigs. Also, it enabled us to enlarge population size by including multiple populations with different genetic backgrounds and increase the power of GWAS by using meta analysis.

Induction of Human Hepatocellular Carcinoma HepG2 Cell Apoptosis by Naringin

  • Banjerdpongchai, Ratana;Wudtiwai, Benjawan;Khaw-on, Patompong
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.7
    • /
    • pp.3289-3294
    • /
    • 2016
  • Naringin, a bioflavonoid found in Citrus seeds, inhibits proliferation of cancer cells. The objectives of this study were to investigate the mode and mechanism(s) of hepatocellular carcinoma HepG2 cell death induced by naringin. The cytotoxicity of naringin towards HepG2 cells proved dose-dependent, measured by MTT assay. Naringin-treated HepG2 cells underwent apoptosis also in a concentration related manner, determined by annexin V-fluorescein isothiocyanate (FITC) and propidium iodide (PI) employing flow cytometry. Mitochondrial transmembrane potential (MTP) measured using 3,3'-dihexyloxacarbocyanine iodide ($DiOC_6$) and flow cytometer was reduced concentration-dependently, which indicated influence on the mitochondrial signaling pathway. Caspase-3, -8 and -9 activities were enhanced as evidenced by colorimetric detection of para-nitroaniline tagged with a substrate for each caspase. Thus, the extrinsic and intrinsic pathways were linked in human naringin-treated HepG2 cell apoptosis. The expression levels of pro-apoptotic Bax and Bak proteins were increased whereas that of the anti-apoptotic Bcl-xL protein was decreased, confirming the involvement of the mitochondrial pathway by immunoblotting. There was an increased expression of truncated Bid (tBid), which indicated caspase-8 proteolysis activity in Bid cleavage as its substrate in the extrinsic pathway. In conclusion, naringin induces human hepatocellular carcinoma HepG2 cell apoptosis via mitochondria-mediated activation of caspase-9 and caspase-8-mediated proteolysis of Bid. Naringin anticancer activity warrants further investigation for application in medical treatment.

Web contents deformation detection method by BHO (BHO 이용한 웹 컨텐츠 변조 탐지 방법)

  • Mo, Jeong-Hoon;Chung, Man-Hyun;Cho, Jae-Ik;Moon, Jong-Sub
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.655-663
    • /
    • 2011
  • Recently, with improvement of internet service technology, web service has been affecting the environment for computing user. Not only current events, economics, game, entertainment, but also personal financial system is processed by web pages through internet. When data transmission is implemented on the internet, webpage acquire text form code and transform them to DOM information, and then shows processed display to user by web browser. However, those information are not only easily accessed by diversified route, but also easily deformed by intentional purpose. Furthermore, it is also possible to acquire logon information of users and certification information by detouring security mechanism. Therefore, this dissertation propose the method to verify integrity of web contents by using BHO which is one of the Add-On program based on MS Internet Explorer platform which is one of major web browser program designed by MicroSoft to detect any action of webpage deformation.

The Effect on the Contents of Self-Disclosure Activities using Ubiquitous Home Robots (자기노출 심리를 이용한 유비쿼터스 로봇 콘텐츠의 효과)

  • Kim, Su-Jung;Han, Jeong-Hye
    • Journal of The Korean Association of Information Education
    • /
    • v.12 no.1
    • /
    • pp.57-63
    • /
    • 2008
  • This study uses the identification which is one of the critical components of psychological mechanism and enables replacing one's own self because of the needs of self-expression(disclosure) and creation. The study aims to improve educational effects using the realistic by increasing sense of the virtual reality and the attention. After the computer-based contents were developed and converted to be applied into robot, and then the contents were combined the student's photo and the avatar using automatic loading. Finally each one of the contents was applied to the students. The results of the investigation indicated that there were significant effects of the contents based on identification. In other words, the contents effect on student's attention, but not their academic achievement. The study could find the effect of the identification's application using the educational robot. We suggested that improving technical ability of the augmented virtuality as a face-detection and sensitive interaction may lead to the specific suggestions for educational effects for further research.

  • PDF

Automatic Node Configuration Protocol for Small Sized Mobile Ad-Hoc Networks (소규모 이동 애드혹 네트워크에서의 자동 노드 설정 프로토콜)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.100-109
    • /
    • 2005
  • A Mobile Ad-Hoc Network (MANET) supports a multi-hop wireless network without any prepared base station (BS). The MANET is capable of building a mobile network automatically without any help from DHCP servers for address allocation or routers to forward or route messages. Many routing protocols have been proposed for the MANET, but these specify the most optimized or shortest path from a source to a destination, and they assume that nodes are pre-configured before communication. To make up for this, address allocation algorithms, such as MANETConf [1] and prophet address allocation algorithm [2], have been proposed. Especially, MANETConf proposes address allocation algorithm with duplication address check. In this paper, we present a dynamic node configuration protocol based on 2-tierd hierarchical network architecture for mobile ad-hoc network, modified from [1]. Especially, it reduces the number of broadcast message exchange between nodes when a new node somes into a network, which lessens network overhead, remarkably. This protocol is based on two-tired structure, and it ensures address allocation with simple duplication address defection mechanism.

A Cluster-based Efficient Key Management Protocol for Wireless Sensor Networks (무선 센서 네트워크를 위한 클러스터 기반의 효율적 키 관리 프로토콜)

  • Jeong, Yoon-Su;Hwang, Yoon-Cheol;Lee, Keon-Myung;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.131-138
    • /
    • 2006
  • To achieve security in wireless sensor networks(WSN), it is important to be able to encrypt and authenticate messages sent among sensor nodes. Due to resource constraints, many key agreement schemes used in general networks such as Diffie-Hellman and public-key based schemes are not suitable for wireless sensor networks. The current pre-distribution of secret keys uses q-composite random key and it randomly allocates keys. But there exists high probability not to be public-key among sensor nodes and it is not efficient to find public-key because of the problem for time and energy consumption. To remove problems in pre-distribution of secret keys, we propose a new cryptographic key management protocol, which is based on the clustering scheme but does not depend on probabilistic key. The protocol can increase efficiency to manage keys because, before distributing keys in bootstrap, using public-key shared among nodes can remove processes to send or to receive key among sensors. Also, to find outcompromised nodes safely on network, it selves safety problem by applying a function of lightweight attack-detection mechanism.