• Title/Summary/Keyword: Distributed memory

Search Result 397, Processing Time 0.029 seconds

Current Status of Taeniasis and Cysticercosis in Vietnam

  • De, Nguyen Van;Le, Thanh Hoa;Lien, Phan Thi Huong;Eom, Keeseon S.
    • Parasites, Hosts and Diseases
    • /
    • v.52 no.2
    • /
    • pp.125-129
    • /
    • 2014
  • Several reports on taeniasis and cysticercosis in Vietnam show that they are distributed in over 50 of 63 provinces. In some endemic areas, the prevalence of taeniasis was 0.2-12.0% and that of cysticercosis was 1.0-7.2%. The major symptoms of taeniasis included fidgeted anus, proglottids moving out of the anus, and proglottids in the feces. Clinical manifestations of cysticercosis in humans included subcutaneous nodules, epileptic seizures, severe headach, impaired vision, and memory loss. The species identification of Taenia in Vietnam included Taenia asiatica, Taenia saginata, and Taenia solium based on combined morphology and molecular methods. Only T. solium caused cysticercosis in humans. Praziquantel was chosen for treatment of taeniasis and albendazole for treatment of cysticercosis. The infection rate of cysticercus cellulosae in pigs was 0.04% at Hanoi slaughterhouses, 0.03-0.31% at provincial slaughterhouses in the north, and 0.9% in provincial slaughterhouses in the southern region of Vietnam. The infection rate of cysticercus bovis in cattle was 0.03-2.17% at Hanoi slaughterhouses. Risk factors investigated with regard to transmission of Taenia suggested that consumption of raw meat (eating raw meat 4.5-74.3%), inadequate or absent meat inspection and control, poor sanitation in some endemic areas, and use of untreated human waste as a fertilizer for crops may play important roles in Vietnam, although this remains to be validated.

Profiler Design for Evaluating Performance of WebCL Applications (WebCL 기반 애플리케이션의 성능 평가를 위한 프로파일러 설계 및 구현)

  • Kim, Cheolwon;Cho, Hyeonjoong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.8
    • /
    • pp.239-244
    • /
    • 2015
  • WebCL was proposed for high complex computing in Javascript. Since WebCL-based applications are distributed and executed on an unspecified number of general clients, it is important to profile their performances on different clients. Several profilers have been introduced to support various programming languages but WebCL profiler has not been developed yet. In this paper, we present a WebCL profiler to evaluate WebCL-based applications and monitor the status of GPU on which they run. This profiler helps developers know the execution time of applications, memory read/write time, GPU statues such as its power consumption, temperature, and clock speed.

A Design of Sybil Attack detection technique using ID-based certificate on Sensor network (센서 네트워크에서 ID기반 인증서를 이용한 Sybil 공격 탐지 기법 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.467-470
    • /
    • 2012
  • This paper proposes a technique of sybil attack detection using an ID-based certificate on sensor network. First, it can solve the broadcast storm problem happening when keys are distributed to sensor nodes. Second, it prevents the replay attack by periodically generating and changing the keys of sensor nodes with Key-chain technique. Third, it authenticates sensor node's ID using hash function. So, it maximizes sensor node's memory usage, reduces communication overhead. Finally it detects Sybil attack through ID-based certificate. Therefore, the proposed technique of Sybil attack detection using ID-based certificate consider simultaneously energy efficiency and stability on sensor network environment, and can trust the provided information through sensor network.

  • PDF

Exploitation of IP-based Intelligent Networked Measuring and Control Device and System

  • Liu, Gui-Xiong;Luo, Yi;Fang, Xiao-Dong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1235-1239
    • /
    • 2003
  • On the base of network frame and protocol system of Ethernet the networked sensing technology based on Ethernet is studied and the design principles of industrial Ethernet measurement of control system is put forward, and the general structure model is built in the paper. An eight-bit economical MCU scheme is proposed, and a general scheme of distributed intelligent networked measuring and control equipment based on TCP/IP is designed too. A compact TCP/IP protocol stack are successfully implemented in eight-bit MCU. With C51 program language, method of modularized programming is applied in soft design. The problem of in-system modifying measuring and control strategy of its system is solved successfully by assigning memory dynamically and saving parameter with EEPROM, and it makes the intelligent networked measurement and control system can explain and analyses control strategy from PC. Experiment result shows that, the research of intelligent networked measurement and control equipment and system base on TCP/IP is successful, with flexible network, convenient usage, and good commonality.

  • PDF

A Review on Brain Study Methods in Elementary Science Education - A Focus on the fMRl Method - (초등 과학 교육에서 두뇌 연구 방법의 고찰 - fMRI 활용법을 중심으로 -)

  • Shin, Dong-Hoon;Kwon, Yong-Ju
    • Journal of Korean Elementary Science Education
    • /
    • v.26 no.1
    • /
    • pp.49-62
    • /
    • 2007
  • The higher cognitive functions of the human brain including teaming are hypothesized to be selectively distributed across large-scale neural networks interconnected to the cortical and subcortical areas. Recently, advances in functional imaging have made it possible to visualize the brain areas activated by certain cognitive activities in vivo. Neural substrates for teaming and motivation have also begun to be revealed. Functional magnetic resonance imaging (fMRI) provides a non-invasive indirect mapping of cerebral activity, based on the blood- oxygen level dependent (BOLD) contrast which is based on the localized hemodynamic changes following neural activities in certain areas of the brain. The fMRI method is now becoming an essential tool used to define the neuro-functional mechanisms of higher brain functions such as memory, language, attention, learning, plasticity and emotion. Further research in the field of education will accelerate the verification of the effects on loaming or help in the selection of model teaching strategies. Thus, the purpose of this study was to review brain study methods using fMRI in science education. In conclusion, a number of possible strategies using fMRI for the study of elementary science education were suggested.

  • PDF

Spatio-Temporal Query Processing Over Sensor Networks: Challenges, State Of The Art And Future Directions

  • Jabeen, Farhana;Nawaz, Sarfraz;Tanveer, Sadaf;Iqbal, Majid
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.7
    • /
    • pp.1756-1776
    • /
    • 2012
  • Wireless sensor networks (WSNs) are likely to be more prevalent as their cost-effectiveness improves. The spectrum of applications for WSNs spans multiple domains. In environmental sciences, in particular, they are on the way to become an essential technology for monitoring the natural environment and the dynamic behavior of transient physical phenomena over space. Existing sensor network query processors (SNQPs) have also demonstrated that in-network processing is an effective and efficient means of interaction with WSNs for performing queries over live data. Inspired by these findings, this paper investigates the question as to whether spatio-temporal and historical analysis can be carried over WSNs using distributed query-processing techniques. The emphasis of this work is on the spatial, temporal and historical aspects of sensed data, which are not adequately addressed in existing SNQPs. This paper surveys the novel approaches of storing the data and execution of spatio-temporal and historical queries. We introduce the challenges and opportunities of research in the field of in-network storage and in-network spatio-temporal query processing as well as illustrate the current status of research in this field. We also present new areas where the spatio-temporal and historical query processing can be of significant importance.

Implementation of commercial digital Forensic Marking systems (디지털 추적표시(For ensic Marking) 시스템 개발)

  • Kim, Jong-An;Kim, Jin-Han;Kim, Jong-Heum
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.142-146
    • /
    • 2007
  • Digital Rights Management (DRM) technology has been widely used for protecting the digital contents over the recent years. But the digital contents protected by DRM are vulnerable to various video memory capture programs when DRM packaged contents are decrypted on the consumers' multimedia devices. To make up for this kind of DRM security holes the Forensic Marking (FM) technology is being deployed into the content protection area. Most leading DRM companies as well as big electronics companies like Thomson and Philips already have commercial FM solutions. Forensic Marking technology uses the digital watermarking to insert the user information such as user id, content playing time and etc. into the decrypted and decoded content at the playback time on the consumer devices. When the content containing watermarked user information (Forensic Mark) is illegally captured and distributed over the Internet, the FM detection system takes out the inserted FM from the illegal contents and informs contents service providers of the illegal hacker's information. In this paper the requirements and test conditions are discussed for the commercial Forensic Marking systems.

  • PDF

Study on Cryptographic Analysis of Erebus Ransomware (Erebus 랜섬웨어에 대한 암호학적 분석 연구)

  • Kim, Soram;Kim, Jihun;Park, Myungseo;Kim, Daeun;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.339-346
    • /
    • 2018
  • Ransomware is a malicious program that requires money by encrypting data. The damage to ransomware is increasing worldwide, and targeted attacks for corporations, public institutions and hospitals are increasing. As a ransomware is serviced and distributed, its various usually emerge. Therefore, the accurate analysis of ransomware can be a decryption solution not only for that ransomware but also for its variants. In this paper, we analyze a cryptographic elements and encryption process for Erebus found in June, 2017, and investigate its cryptographic vulnerability and memory analysis.

Research Directions for Efficient Query Processing over Sensor Data Streams (센서 데이터 스트림 환경에서 효율적인 질의처리 연구방향)

  • An, Dong-Chan
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.199-204
    • /
    • 2006
  • The sensor network is a wireless network of the sensor nodes which sensing, computation and communication ability. Each sensor nodes create the data items by sensor nodes above one. Like this feature, the sensor network is similar to distributed data base system. The sensor node of the sensor network is restricted from the power and the memory resources is the biggest weak point and is becoming the important research object. In this paper, We try to see efficient sensor data stream management method and efficient query processing method under the restricted sensor network environment.

  • PDF

Public Key Authentication using(t, n) Threshold Scheme for WSN ((t, n) 임계치 기법을 이용한 센서네트워크에서의 공개키 인증)

  • Kim, Jun-Yop;Kim, Wan-Ju;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.5
    • /
    • pp.58-70
    • /
    • 2008
  • Earlier researches on Sensor Networks preferred symmetric key-based authentication schemes in consideration of limitations in network resources. However, recent advancements in cryptographic algorithms and sensor-node manufacturing techniques have opened suggestion to public key-based solutions such as Merkle tree-based schemes. These previous schemes, however, must perform the authentication process one-by-one in hierarchical manner and thus are not fit to be used as primary authentication methods in sensor networks which require mass of multiple authentications at any given time. This paper proposes a new concept of public key-based authentication that can be effectively applied to sensor networks. This scheme is based on exponential distributed data concept, a derivative from Shamir's (t, n) threshold scheme, in which the authentication of neighbouring nodes are done simultaneously while minimising resources of sensor nodes and providing network scalability. The performance advantages of this scheme on memory usage, communication overload and scalability compared to Merkle tree-based authentication are clearly demonstrated using performance analysis.