• Title/Summary/Keyword: Mode-hop

Search Result 49, Processing Time 0.029 seconds

Involvement of Pro-Phenoloxidase 3 in Lamellocyte-Meidated Spontaneous Melanization in Drosophila

  • Nam, Hyuck-Jin;Jang, In-Hwan;Asano, Tsunaki;Lee, Won-Jae
    • Molecules and Cells
    • /
    • v.26 no.6
    • /
    • pp.606-610
    • /
    • 2008
  • Phenoloxidase (PO), a melanin-forming enzyme around the foreign bodies, is an important component of the host defense system in invertebrates. Pro-PO is the enzymatically inactive zymogen form of PO. In the Drosophila genome, three Pro-PO isoforms have been identified to date. These include Pro-PO1 and 2, which are primarily expressed in crystal cells, and Pro-PO3, which is predominantly found in the lamellocytes. In this study, we demonstrated that Drosophila Pro-PO3, but not Pro-PO1 or 2, is enzymatically active in its zymogen form. These findings were evidenced by spectacular melanin forming capacities of various cells and tissues that overexpressed these pro-enzymes. Furthermore, the melanization phenotype observed in the lamellocyte-enriched $hop^{Tum-l}$ mutant was drastically reduced in the absence of PPO3, indicating that PPO3 plays a major role in the lamellocyte-mediated spontaneous melanization process. Taken together, these findings indicate that the biochemical properties, activation mode and in vivo role of Pro-PO3 are likely distinct from those of the other two Pro-PO enzymes involved in Drosophila physiology.

Improvement of self-mixing semiconductor laser range finder and its application to range-image recognition of slowly moving object

  • Suzuki, Takashi;Shinohara, Shigenobu;Yoshida, Hirofumi;Ikeda, Hiroaki;Saitoh, Yasuhiro;Nishide, Ken-Ichi;Sumi, Masao
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1992.10b
    • /
    • pp.388-393
    • /
    • 1992
  • An infrared range finder using a self-mixing laser diode (SM-LD), which has been proposed and developed by the Authors, can measure not only a range of a moving target but its velocity simultaneously. In this paper, described is that the precise mode-hop pulse train can be obtained by employing a new signal processing circuit even when the backscattered light returning into the SM-LD is much more weaker. As a result, the distance to a tilted square sheet made from aluminium or white paper, which is placed 10 cm through 60 cm from the SM-LD, is measured with accuracy of a few percent even when the tilting angle is less than 75 degrees or 85 degrees, respectively. And in this paper, described is the range-image recognition of a plane object under the condition of standstill. The output laser beam is scanned by scanning two plane mirrors-equipped with each stepping motor. And we succeeded in the acquisition of the range-image of a plane object in a few tens of seconds. Furthermore, described is a feasibility study about the range-image recognition of a slowly moving plane object.

  • PDF

The Improved Full Mesh Topology Aggregation Scheme in PNNI (PNNI에서 향상된 Full Mesh Topology Aggregation 기법)

  • Kim Nam-Hee
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.11
    • /
    • pp.1556-1563
    • /
    • 2004
  • In this paper, we propose an efficient full mesh topology aggregation method in PNNI networks. The proposed scheme can search multi-links efficiently using the depth priority method based on hop count instead of searching the all links. To do this, we propose a modified line segment algorithm using two line segment method that represents two points which consist of delay-bandwidth pair to reduce topology information and provide a flexibility to the multiple-links aggregation. And we apply it to current full mesh topology aggregation. To evaluate performance of the proposed scheme, we compare/analyze the current method with the proposed scheme with respect to call success rate, access time and crank back rate. The result is that the proposed scheme is better than the current scheme in performance.

  • PDF

Energy-Saving Distributed Algorithm For Dynamic Event Region Detection (역동적 이벤트 영역 탐색을 위한 에너지 절약형 분산 알고리즘)

  • Nhu, T.Anh;Na, Hyeon-Suk
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06d
    • /
    • pp.360-365
    • /
    • 2010
  • In this paper, we present a distributed algorithm for detecting dynamic event regions in wireless sensor network with the consideration on energy saving. Our model is that the sensing field is monitored by a large number of randomly distributed sensors with low-power battery and limited functionality, and that the event region is dynamic with motion or changing the shape. At any time that the event happens, we need some sensors awake to detect it and to wake up its k-hop neighbors to detect further events. Scheduling for the network to save the total power-cost or to maximize the monitoring time has been studied extensively. Our scheme is that some predetermined sensors, called critical sensors are awake all the time and when the event is detected by a critical sensor the sensor broadcasts to the neighbors to check their sensing area. Then the neighbors check their area and decide whether they wake up or remain in sleeping mode with certain criteria. Our algorithm uses only 2 bit of information in communication between sensors, thus the total communication cost is low, and the speed of detecting all event region is high. We adapt two kinds of measure for the wake-up decision. With suitable threshold values, our algorithm can be applied for many applications and for the trade-off between energy saving and the efficiency of event detection.

  • PDF

Trust-aware secure routing protocol for wireless sensor networks

  • Hu, Huangshui;Han, Youjia;Wang, Hongzhi;Yao, Meiqin;Wang, Chuhang
    • ETRI Journal
    • /
    • v.43 no.4
    • /
    • pp.674-683
    • /
    • 2021
  • A trust-aware secure routing protocol (TSRP) for wireless sensor networks is proposed in this paper to defend against varieties of attacks. First, each node calculates the comprehensive trust values of its neighbors based on direct trust value, indirect trust value, volatilization factor, and residual energy to defend against black hole, selective forwarding, wormhole, hello flood, and sinkhole attacks. Second, any source node that needs to send data forwards a routing request packet to its neighbors in multi-path mode, and this continues until the sink at the end is reached. Finally, the sink finds the optimal path based on the path's comprehensive trust values, transmission distance, and hop count by analyzing the received packets. Simulation results show that TSRP has lower network latency, smaller packet loss rate, and lower average network energy consumption than ad hoc on-demand distance vector routing and trust based secure routing protocol.

Two-step Scheduling With Reduced Feedback Overhead in Multiuser Relay Systems (다중 사용자 릴레이 시스템에서 감소된 피드백 정보를 이용한 두 단계 스케줄링 기법)

  • Jang, Yong-Up;Shin, Won-Yong;Kim, A-Jung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5A
    • /
    • pp.511-520
    • /
    • 2011
  • In this paper, we introduce a multiuser (MU) scheduling method for multiuser amplify-and-forward relay systems, which selects both the transmission mode, i.e., either one- or two-hop transmission, and the desired user via two steps. A closed-form expression for the average achievable rate of the proposed scheduling is derived under two transmission modes with MU scheduling, and its asymptotic solution is also analyzed in the limit of large number of mobile stations. Based on the analysis, we perform our two-step scheduling algorithm: the transmission mode selection followed by the user selection that needs partial feedback for instantaneous signal-to-noise ratios (SNRs) to the base station. We also analyze the average SNR condition such that the MU diversity gain is fully exploited. In addition, it is examined how to further reduce a quantity of feedback under certain conditions. The proposed algorithm shows the comparable achievable rate to that of the optimal one using full feedback information, while its required feedback overhead is reduced below half of the optimal one.

An Efficient Data Dissemination Protocol for Cluster-based Wireless Sensor Networks (클러스터 기반의 무선 센서네트워크에서 통신량을 줄인 데이터 보급방법)

  • Cho, Ji-Eun;Choe, Jong-Won
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.222-230
    • /
    • 2009
  • A sensor network is an important element of the ubiquitous and it consists of sensor fields that contain sensor nodes and sink nodes that collect data from sensor nodes. Since each sensor node has limited resources, one of the important issues covered in the past sensor network studies has been maximizing the usage of limited energy to extend network lifetime. However, most studies have only considered fixed sink nodes, which created various problems for cases with multiple mobile sink nodes. Accordingly, while maintaining routes to mobile sink nodes, this study aims to deploy the hybrid communication mode that combines single and multi-hop modes for intra-cluster and inter-cluster transmission to resolve the problem of failed data transmission to mobile sink nodes caused by disconnected routes. Furthermore, a 2-level hierarchical routing protocol was used to reduce the number of sensor nodes participating in data transmission, and cross-shape trajectory forwarding was employed in packet transmission to provide an efficient data dissemination method.

Improved Star Topology Aggregation using Line Segment (라인 세그먼트를 이용한 향상된 Star Topology Aggregation)

  • Kim, Nam-Hee
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.645-652
    • /
    • 2004
  • In this paper, we aggregate multi-links information between boundary nodes using the line segment scheme that aggregates topology in-formation within PG referring bandwidth and delay parameter. The proposed scheme can search multi-links efficiently using the depth priority method based on hop count instead of searching all links. To do this, we propose a modified line segment algorithm using two line segment method that represents two points which consist of delay-bandwidth pair to reduce topology information and provide a flexibility to the multi pie-links aggregation. And we apply it to current star topology aggregation. To evaluate performance of the proposed scheme, we compare/analyze the current method with the proposed scheme with respect to call success rate, access time and crankback rate. Through the simulation result analysis, the proposed star topology aggregation scheme presents the better performance than existing scheme.

Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks

  • N. Nithiyanandam;C. Mahesh;S.P. Raja;S. Jeyapriyanga;T. Selva Banu Priya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1706-1727
    • /
    • 2023
  • Under Water Sensor Networks (UWSN) has gained attraction among various communities for its potential applications like acoustic monitoring, 3D mapping, tsunami detection, oil spill monitoring, and target tracking. Unlike terrestrial sensor networks, it performs an acoustic mode of communication to carry out collaborative tasks. Typically, surface sink nodes are deployed for aggregating acoustic phenomena collected from the underwater sensors through the multi-hop path. In this context, UWSN is constrained by factors such as lower bandwidth, high propagation delay, and limited battery power. Also, the vulnerabilities to compromise the aquatic environment are in growing numbers. The paper proposes an Energy-Efficient standalone Intrusion Detection System (EEIDS) to entail the acoustic environment against malicious attacks and improve the network lifetime. In EEIDS, attributes such as node ID, residual energy, and depth value are verified for forwarding the data packets in a secured path and stabilizing the nodes' energy levels. Initially, for each node, three agents are modeled to perform the assigned responsibilities. For instance, ID agent verifies the node's authentication of the node, EN agent checks for the residual energy of the node, and D agent substantiates the depth value of each node. Next, the classification of normal and malevolent nodes is performed by determining the score for each node. Furthermore, the proposed system utilizes the sheep-flock heredity algorithm to validate the input attributes using the optimized probability values stored in the training dataset. This assists in finding out the best-fit motes in the UWSN. Significantly, the proposed system detects and isolates the malicious nodes with tampered credentials and nodes with lower residual energy in minimal time. The parameters such as the time taken for malicious node detection, network lifetime, energy consumption, and delivery ratio are investigated using simulation tools. Comparison results show that the proposed EEIDS outperforms the existing acoustic security systems.