• Title/Summary/Keyword: Protocol-Based Approach

Search Result 429, Processing Time 0.028 seconds

A Simple and Accurate Genotype Analysis of the motor neuron degeneration 2 (mnd2) Mice: an Easy-to-Follow Guideline and Standard Protocol Applicable to Mutant Mouse Model

  • Shin, Hyun-Ah;Kim, Goo-Young;Nam, Min-Kyung;Goo, Hui-Gwan;Kang, Seongman;Rhim, Hyangshuk
    • Interdisciplinary Bio Central
    • /
    • v.4 no.3
    • /
    • pp.8.1-8.7
    • /
    • 2012
  • The motor neuron degeneration 2 (mnd2) mice carry a point mutation of A to T nucleotide transversion at the serine 276 residue of high temperature requirement A2 (HtrA2), resulting in losses of an AluI restriction enzyme site (5'AGCT3') and the HtrA2 serine protease activity. Moreover, dysfunctions of HtrA2 are known to be intimately associated with the pathogenesis of neurodegenerative diseases, including Parkinson's disease. Thus, this mnd2 mouse is an invaluable model for understanding the physiological role of HtrA2 and its pathological role in neurodegenerative diseases. Nevertheless, many molecular and cellular biologists in this field have limited experience in working with mutant mouse models due to the necessity of acquired years of the special techniques and knowledges. Herein, using the mnd2 mouse model as an example, we describe easy-to-use standard protocols for web-based analyses of target genes, such as HtrA2, and a novel approach for simple and accurate PCR-AluI-RFLP-based genotype analysis of mnd2 mice. In addition, band resolution of AluI-RFLP fragments was improved in 12% polyacrylamide gel running in 1X Tris-Glycine SDS buffer. Our study indicates that this PCR-AluI-RFLP genotype analysis method can be easily applied by the molecular and cellular biologist to conduct biomedical science studies using the other mutant mouse models.

Event based Rule Processing in Ubiquitous Web Services Environments (유비쿼터스 웹서비스 환경에서 이벤트 기반의 룰 처리 기법)

  • Lee Kang-Chan;Lee Won-Suk;Jeon Jong-Hong;Lee Seung-Yun;Park Jong-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1101-1105
    • /
    • 2006
  • Ubiquitous computing network comprises a variety of distributed service devices. Today Web services technology enables the heterogeneous devices to provide their own services and interact with each other via well-defined Internet protocol. Nevertheless, service devices in ubiquitous environments require more event-driven, autonomous interaction beyond rather passive service-oriented architecture of the present time. This paper presents an ECA (Event-Condition-Action) rule description language in an attempt to support capability for autonomous interactions among service-oriented devices in ubiquitous computing network. Specifically, the proposed WS-ECA is an XML-based ECA rule description language for web service-enabled devices. The rules are embedded in distributed devices which invoke appropriate services in the network if the rules are triggered by some internal or external events. The presented ECA-based device coordination approach is expected to facilitate seamless inter-operation among the web service-enabled devices in the emerging ubiquitous computing environment.

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

LISP based IP Address Virtualization Technique for Resource Utilization on Virtualized SDN (가상화된 SDN에서 효과적인 자원 활용을 위한 LISP 기반 IP 주소 가상화 기법)

  • Go, Youngkeun;Yang, Gyeongsik;Yu, Bong-yeol;Yoo, Chuck
    • Journal of KIISE
    • /
    • v.43 no.12
    • /
    • pp.1404-1411
    • /
    • 2016
  • Network virtualization is a technique that abstracts the physical network to provide multiple virtual networks to users. Virtualized network has the advantage to offer flexible services and improve resource utilization. In SDN architecture, network hypervisor serves to virtualize the network through address virtualization, topology virtualization and policy virtualization. Among them, address virtualization refers to the technique that provides an independent address space for each virtual network. Previous work divided the physical address space, and assigned an individual division to each virtual network. Each virtual address is then mapped one-to-one to a physical address. However, this approach requires a lot of flow entries, thus making it disadvantageous. Since SDN switches use TCAM (Ternary Contents Addressable Memory) for the flow table, it is very important to reduce the number of flow entries in the aspect of cost and scalability. In this paper, we propose a LISP based address virtualization, which separates address spaces for the physical and virtual addresses and transmits packet through tunneling, in order to resolve the limitation of the previous studies. By implementing a prototype, we show that the proposed scheme provides better scalability.

Interconnection Scheme for Multiple Path Source Routing Protocol for Wireless Mobile Ad-hoc Network and Mobile-IP (무선 이동 애드-혹 네트워크를 위한 다중 경로 소스 라우팅 프로토콜과 Mobile-IP의 연동 기법)

  • Kim, Moon-Jeong;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.1031-1038
    • /
    • 2005
  • As the research on home network technologies, sensor network technologies, and ubiquitous network technologies makes rapid progresses, wireless ad-hoc network have attracted a lot of attention. A wireless ad-hoc network is a temporary network formed by a collection of wireless mobile nodes without the aid of my existing network infrastructure or centralized administration, and it is suitable for ubiquitous computing environments. In this paper, we suggest an interconnection scheme between the wireless ad-hoc network environment based on multiple path source routing protocol and a Mobile-IP based network environment. This scheme reduces the overhead of route re-establishment and re-registration by maintaining multiple paths between the mobile host in wireless ad-hoc network and the base station in mobile-IP network. Also it puts the base station in charge of function that performs translation between wireless ad-hoc network packets and Mobile-IP packets, reducing the load of mobile hosts. In this paper, our simulations show that our scheme outperforms existing interconnecting schemes with regards to throughput and end-to-end delay Also we show that our scheme outperforms multi-paths approach using disjoint routes with regards to routing overhead.

Current Trends in the Treatment of Acute Achilles Tendon Rupture: Analysis of the Korean Foot and Ankle Society (KFAS) Member Survey (급성 아킬레스건 파열의 치료 동향: 대한족부족관절학회 회원 설문조사 분석)

  • Cho, Jaeho;Cho, Byung-Ki;Chung, Hyung-Jin;Bae, Su-Young;The Academic Committee of Korean Foot and Ankle Society,
    • Journal of Korean Foot and Ankle Society
    • /
    • v.26 no.2
    • /
    • pp.88-94
    • /
    • 2022
  • Purpose: This study was based on the Korean Foot and Ankle Society (KFAS) member survey and aimed to report the current trends in the epidemiology, diagnosis, and management of acute Achilles tendon rupture (AATR) over the past few decades. Materials and Methods: A web-based questionnaire containing 34 questions was sent to all KFAS members in October 2021. The questions were mainly related to the clinical experience and preferred management of patients with AATR. Answers with a prevalence ≥50% of the respondents were considered a tendency. Results: Seventy-one (12.9%) of the 550 members responded to the survey. The male sex ratio in AATR was answered mean 78%, and the most common age groups were 30~40 years (n=49; 69.0%), and 40~50 years (n=37; 52.1%), in that order. The most common seasons for the occurrence of AATR were spring (37 cases; 52.1%) and autumn (27 cases; 38.0%). Also, sports-related rupture had an average occurrence of 76.2%. The most important clinical factor to determine the type of treatment was the history of previous injuries, and 75.9% of respondents started conservative treatment in the 2010s. The most preferred protocol of conservative treatment was an orthosis capable of ankle range of motion after casting (68.5%), and 53.7% 'satisfied' and 1.9% 'very satisfied' with conservative treatment. The most preferred surgical method was open repair (80.3%), and the Krackow method (60.6%), and 49.3% of treated patients responded 'satisfied' and 45.1% 'very satisfied' with this treatment. Conclusion: This study gives updated information concerning the current trend of epidemiology, diagnosis, and treatment of AATR in Korea. Both consensus and variation in the approach to AATR were identified using this survey study. This study may raise the awareness of various possible approaches toward AATR and should be used to further establish a standard protocol for the management of this injury.

An Improved CBRP using Secondary Header in Ad-Hoc network (Ad-Hoc 네트워크에서 보조헤더를 이용한 개선된 클러스터 기반의 라우팅 프로토콜)

  • Hur, Tai-Sung
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.9 no.1
    • /
    • pp.31-38
    • /
    • 2008
  • Ad-Hoc network is a network architecture which has no backbone network and is deployed temporarily and rapidly in emergency or war without fixed mobile infrastructures. All communications between network entities are carried in ad-hoc networks over the wireless medium. Due to the radio communications being extremely vulnerable to propagation impairments, connectivity between network nodes is not guaranteed. Therefore, many new algorithms have been studied recently. This study proposes the secondary header approach to the cluster based routing protocol (CBRP). The primary header becomes abnormal status so that the primary header can not participate in the communications between network entities, the secondary header immediately replaces the primary header without selecting process of the new primary header. This improves the routing interruption problem that occurs when a header is moving out from a cluster or in the abnormal status. The performances of proposed algorithm ACBRP(Advanced Cluster Based Routing Protocol) are compared with CBRP. The cost of the primary header reelection of ACBRP is simulated. And results are presented in order to show the effectiveness of the algorithm.

  • PDF

A Proof of Safety and Liveness Property in Modal mu-Calculus and CTL for Model Checking (모형검사를 위한 Modal mu-Calculus 와 CTL의 안전성 및 필연성 및 논리식 증명)

  • Lee, Bu-Ho;Kim, Tae-Gyun;Lee, Jun-Won;Kim, Seong-Un
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.12
    • /
    • pp.1485-1492
    • /
    • 1999
  • 대규모 시스템 명세의 올바름을 검증하기 위한 유한 상태 LTS에 기반을 둔 CTL논리 적용에 있어 가장 큰 문제점은, 시스템 내부의 병렬 프로세스간의 상호작용으로 인한 상태폭발이다. 그러나 Modal mu-calculus 논리를 시스템 안전성 및 필연성 특성 명세에 사용하면, 행위에 의한 순환적 정의가 가능하므로 상태폭발 문제가 해결 가능하다. 본 논문에서는 LTS로 명세화된 통신 프로토콜 시스템 모델의 안전성 및 필연성 특성을 모형 검사 기법에 의해 검증함에 있어, 시제 논리로 사용된 Modal mu-calculus 안전성 및 필연성 논리식과 CTL 의 안전성 및 필연성 논리식의 극한값이 동일함을 두 논리식을 만족하는 상태 집합이 같다는 것을 보임으로써 증명한다. 증명된 결과는 I/O FSM 모델로 표현된 통신 프로토콜의 안전성 및 필연성 검사를 위해 이론적인 기반으로서, 컴퓨터를 이용한 모형검사 기법에 효과적인 방법으로 응용이 가능하다.Abstract In applying CTL-based model checking approach to correctness verification of large state transition system specifications, the major obstacle is the combinational explosion of the state space arising due to interaction of many loosely coupled parallel processes. If, however, the modal mu-calculus viewed as a CTL-based logic with recursion, is used to specify the safety and liveness property of a given system, it is possible to resolve this problem. In this paper, we discuss the problem of verifying communication protocol system specified in LTS, and prove that a logic expression specifying safety and liveness in modal mu-calculus is semantically identical to the maximum value of the expression in CTL. This relation is verified by the proof that the sets of states satisfying the two logic expressions are equivalent. The proof can be used as a theoretical basis for verifying safety and liveness of communication protocols represented as I/O FSM model.

LAPG-2: A Cost-Efficient Design Verification Platform with Virtual Logic Analyzer and Pattern Generator (LAPG-2: 가상 논리 분석기 및 패턴 생성기를 갖는 저비용 설계 검증 플랫폼)

  • Hwang, Soo-Yun;Kang, Dong-Soo;Jhang, Kyoung-Son;Yi, Kang
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.5
    • /
    • pp.231-236
    • /
    • 2008
  • This paper proposes a cost-efficient and flexible FPGA-based logic circuit emulation platform. By improving the performance and adding more features, this new platform is an enhanced version of our LAPG. It consists of an FPGA-based hardware engine and software element to drive the emulation and monitor the results. It also provides an interactive verification environment which uses an efficient communication protocol through a bi-directional serial link between the host and the FPGA board. The experimental results show that this new approach saves $55%{\sim}99%$ of communication overhead compared with other methods. According to the test results, the new LAPG is more area efficient in complex circuits with many I/O ports.

A New Approach to the Science Education Assessment Using Partial Credits to Different Science Inquiry Problem Solving Process Types

  • Lee, Hang-Ro;Lim, Cheong-Hwan
    • Journal of the Korean earth science society
    • /
    • v.23 no.2
    • /
    • pp.147-153
    • /
    • 2002
  • Reasonable and reliable assessment method is one of the most important issues in science education, Partial credits method is an effective tool for assessing students' science inquiry problem solving. The purposes of this study were to classify the Problem solving types based on the analysis of the thinking Process, and how much the related science concept and the science process skills were used in solving science inquiry problems, and to describe the possibility and rationality of the assessment method that gives partial credit 128 high school seniors were selected and their answers were analyzed to identify science concepts they used to solve each problem, and the result was used as the criterion in the scientific concept test development. Also, to study the science inquiry problem solving type, 152 high school seniors were selected, and protocols were made from audio-taped data of their problem solving process through a think-aloud method and retrospective interviews. In order to get a raw data needed in statistical comparison of reliability, discrimination and the difficulty of the test and the production of the regression equation that determines the ratio of partial credit, 640 students were selected and they were given a science inquiry problem test, a science process skills test, and a scientific concept test. Research result suggested it is more reasonable and reliable to switch to the assessment method that applies partial credit to different problem solving types based on the analysis of the thinking process in problem solving process, instead of the dichotomous credit method.