• Title/Summary/Keyword: Spread system

Search Result 2,360, Processing Time 0.028 seconds

I2DM : An Improved Identity Management Protocol for Internet Applications in Mobile Networks (모바일 네트워크에서 인터넷 응용을 위한 향상된 ID관리 프로토콜)

  • Park, In-Shin;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Due to rapid spread of smart phones and SNS(Social Network Service), using of Internet applications has increased and taking up bandwidth more than 3G network's capacity recently. This caused reduction of speed and service quality, and occurred strong needs that backbone network company to increasing investment costs. Also a great rise of mobile network users causing identity management problems on mobile service provider through mobile network. This paper proposes advanced IDM3G[1] - to solve user ID management and security problems on mobile internet application services over 3G network and more - authentication management protocol. $I^2DM$ protocol breakup loads which made by existing IDM3G protocol's mutual authentication via mobile operator, via sending some parts to internet application service provider, enhancing mobile and ID management of service provider and network load and process load from information handling and numbers of transmitting packets, to suggest more optimized protocol against further demanding of 3G mobile network.

Computer Education System using Simulation (가상체험을 이용한 컴퓨터 학습 시스템)

  • Syung-Og An;Soon-Young Lee
    • The Journal of Engineering Research
    • /
    • v.6 no.2
    • /
    • pp.75-83
    • /
    • 2004
  • We live in the information technology era and experience the rapid global information environment change through Internet. Therefore, as distribution channels and service qualities in our daily lives are provided through Internet, these changes have been the foundation of constructing a new society. Naturally, the use of computer is widely spread out and it is hard to find any company that doesn't use computer in its work. However, the computer skills of those who are in their fifties cannot reach to what the companies need for them even though they are main working groups in our society. In addition, the Internet access rate of homemakers in their late forties and over fifties are low due to their lack of computer knowledge even though they are the target customers of the Internet service. Under these circumstances, we offer a lecture using simulation techniqe through which anybody can easily follow the instructions via the "Help" menu not a boring lecture that just show the text and reads it. Besides, each class will show you how to start Internet/ how to finish it, how to register a website, how to use e-mail, etc. So, it will let you know every detailed aspect that average people may disregard but a beginner may be afraid of starting the Internet.

  • PDF

Induced Systemic Resistance by Bacillus vallismortis EXTN-1 Suppressed Bacterial Wilt in Tomato Caused by Ralstonia solanacearum

  • Park, Kyung-Seok;Paul, Diby;Kim, Yong-Ki;Nam, Ki-Woong;Lee, Young-Kee;Choi, Hyo-Won;Lee, Sang-Yeob
    • The Plant Pathology Journal
    • /
    • v.23 no.1
    • /
    • pp.22-25
    • /
    • 2007
  • Biocontrol activity of five strains of selected rhizo-bacteria were tested in tomato against bacterial wilt caused by Ralstonia solanacearum. After root bacterization the plants were grown in a perlite-hydroponic system. Upon challenge inoculation with the pathogen, all of the rhizobacterial strains efficiently suppressed the bacterial wilt in tomato in various rates, at maximum by the strain, Bacillus vallismortis strain EXTN-1. While the percent of infected plants in the non-bacterized control plants were 95%, it was only 65% in plants pre-treated with EXTN-1. It was also demonstrated that the movement of R. solanacearum within the stem was significantly hampered when the plants were root bacterized. As EXTN-1 has no antagonistic properties against R. solanacearum, the bacterial wilt was probably suppressed by a mechanism other than antibiosis. Previously, the strain had been proven to produce an efficient elicitor for inducing systemic resistance in many crops. As the present study confirmed that EXTN-1 has the ability for reducing the pathogen spread in tomato, the strain could be effectively used as a potential biocontrol agent against bacterial wilt.

Comparative Genome Analysis of Rathayibacter tritici NCPPB 1953 with Rathayibacter toxicus Strains Can Facilitate Studies on Mechanisms of Nematode Association and Host Infection

  • Park, Jungwook;Lee, Pyeong An;Lee, Hyun-Hee;Choi, Kihyuck;Lee, Seon-Woo;Seo, Young-Su
    • The Plant Pathology Journal
    • /
    • v.33 no.4
    • /
    • pp.370-381
    • /
    • 2017
  • Rathayibacter tritici, which is a Gram positive, plant pathogenic, non-motile, and rod-shaped bacterium, causes spike blight in wheat and barley. For successful pathogenesis, R. tritici is associated with Anguina tritici, a nematode, which produces seed galls (ear cockles) in certain plant varieties and facilitates spread of infection. Despite significant efforts, little research is available on the mechanism of disease or bacteria-nematode association of this bacterium due to lack of genomic information. Here, we report the first complete genome sequence of R. tritici NCPPB 1953 with diverse features of this strain. The whole genome consists of one circular chromosome of 3,354,681 bp with a GC content of 69.48%. A total of 2,979 genes were predicted, comprising 2,866 protein coding genes and 49 RNA genes. The comparative genomic analyses between R. tritici NCPPB 1953 and R. toxicus strains identified 1,052 specific genes in R. tritici NCPPB 1953. Using the BlastKOALA database, we revealed that the flexible genome of R. tritici NCPPB 1953 is highly enriched in 'Environmental Information Processing' system and metabolic processes for diverse substrates. Furthermore, many specific genes of R. tritici NCPPB 1953 are distributed in substrate-binding proteins for extracellular signals including saccharides, lipids, phosphates, amino acids and metallic cations. These data provides clues on rapid and stable colonization of R. tritici for disease mechanism and nematode association.

LIDMOD3 Development for Design and Evaluation of Low Impact Development (저영향개발기법 설계 및 평가를 위한 LIDMOD3 개발)

  • Jeon, Ji-Hong;Seo, Seong-Cheol
    • Journal of Korean Society on Water Environment
    • /
    • v.34 no.4
    • /
    • pp.382-390
    • /
    • 2018
  • In this study, the LIDMOD3 was developed to design and evaluate low impact development (LIDMOD). In the same fashion, the LIDMOD3 employs a curve number (NRCS-CN) method to estimate the surface runoff, infiltration and event mean concentration as applicable to pollutant loads which are based on a daily time step. In these terms, the LIDMOD3 can consider a hydrologic soil group for each land use type LID-BMP, and the applied removal efficiency of the surface runoff and pollutant loads by virtue of the stored capacity, which was calculated by analyzing the recorded water balance. As a result of Model development, the LIDMOD3 is based on an Excel spread sheet and consists of 8 sheets of information data, including: General information, Annual precipitation, Land use, Drainage area, LID-BMPs, Cals-cap, Parameters, and the Results. In addition, the LIDMOD3 can estimate the annual hydrology and annual pollutant loads including surface runoff and infiltration, the LID efficiency of the estimated surface runoff for a design rainfall event, and an analysis of the peak flow and time to peak using a unit hydrolograph for pre-development, post-development without LID, and as calculated with LID. As a result of the model application as applied to an apartment, the LIDMOD3 can estimate LID-BMPs considering a well spatical distributed hydroloic soil group as realized on land use and with the LID-BMPs. Essentially, the LIDMOD3 is a screen level and simple model which is easy to use because it is an Excel based model, as are most parameters in the database. This system can be expected to be widely used at the LID site to collect data within various programmable model parameters for the processing of a detail LID model simulation.

A Discourse Analysis to Public Library Ecosystem in Korea (국내 공공도서관 생태계의 담론적 분석)

  • Yoon, Hee-Yoon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.51 no.1
    • /
    • pp.5-27
    • /
    • 2017
  • The goal of this study is to suggest various improvements and expanding strategies of the public library ecosystem. For this goal, researcher reviewed and analyzed the realistic landscapes and social recognitions about the public library ecosystem as local public goods, and discoursed the basic principles and structural terrain of public library ecosystem based on natural ecosystem. As a result, researcher proposed multifaceted alternatives (ensure library's identity and publicity applying Law of Karma, strengthen librarian's professionalism on the premise of overcoming the Minerva's syndrome, optimize the library service and collection management based on the Pareto principle, reduce reading room and differentiated program through resolution of Halo effect, eliminate usage bias by life cycle based on the Gauss distribution, acceptance of the digital paradigm and use-friendly spatialization that ruminates the Icarus paradox, incorporate small library into public library system through a clear understanding of the Gresham's law, and enforce communication and spread social and cultural value through the practice of the Pompeii paradox).

Crisis Management Analysis of Foot-and-Mouth Disease Using Multi-dimensional Data Cube (다차원 데이터 큐브 모델을 이용한 구제역의 위기 대응 방안 분석)

  • Noh, Byeongjoon;Lee, Jonguk;Park, Daihee;Chung, Yongwha
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.5
    • /
    • pp.565-573
    • /
    • 2017
  • The ex-post evaluation of governmental crisis management is an important issues since it is necessary to prepare for the future disasters and becomes the cornerstone of our success as well. In this paper, we propose a data cube model with data mining techniques for the analysis of governmental crisis management strategies and ripple effects of foot-and-mouth(FMD) disease using the online news articles. Based on the construction of the data cube model, a multidimensional FMD analysis is performed using on line analytical processing operations (OLAP) to assess the temporal perspectives of the spread of the disease with varying levels of abstraction. Furthermore, the proposed analysis model provides useful information that generates the causal relationship between crisis response actions and its social ripple effects of FMD outbreaks by applying association rule mining. We confirmed the feasibility and applicability of the proposed FMD analysis model by implementing and applying an analysis system to FMD outbreaks from July 2010 to December 2011 in South Korea.

A Group Update Technique based on a Buffer Node to Store a Vehicle Location Information (차량 위치 정보 저장을 위한 버퍼 노드 기반 그룹 갱신 기법)

  • Jung, Young-Jin;Ryu, Keun-Ho
    • Journal of KIISE:Databases
    • /
    • v.33 no.1
    • /
    • pp.1-11
    • /
    • 2006
  • It is possible to track the moving vehicle as well as to develop the location based services actively according to the progress of wireless telecommunication and GPS, to the spread of network, and to the miniaturization of cellular phone. To provide these location based services, it is necessary for an index technique to store and search too much moving object data rapidly. However the existing indices require a lot of costs to insert the data because they store every position data into the index directly. To solve this problem in this paper, we propose a buffer node operation and design a GU-tree(Group Update tree). The proposed buffer node method reduces the input cost effectively since the operation stores the moving object location data in a group, the buffer node as the unit of a non-leaf node. hnd then we confirm the effect of the buffer node operation which reduces the insert cost and increase the search performance in a time slice query from the experiment to compare the operation with some existing indices. The proposed tufter node operation would be useful in the environment to update locations frequently such as a transportation vehicle management and a tour-guide system.

Improved Feature Extraction Method for the Contents Polluter Detection in Social Networking Service (SNS에서 콘텐츠 오염자 탐지를 위한 개선된 특징 추출 방법)

  • Han, Jin Seop;Park, Byung Joon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.47-54
    • /
    • 2015
  • The number of users of SNS such as Twitter and Facebook increases due to the development of internet and the spread of supply of mobile devices such as smart phone. Moreover, there are also an increasing number of content pollution problems that pollute SNS by posting a product advertisement, defamatory comment and adult contents, and so on. This paper proposes an improved method of extracting the feature of content polluter for detecting a content polluter in SNS. In particular, this paper presents a method of extracting the feature of content polluter on the basis of incremental approach that considers only increment in data, not batch processing system of entire data in order to efficiently extract the feature value of new user data at the stage of predicting and classifying a content polluter. And it comparatively assesses whether the proposed method maintains classification accuracy and improves time efficiency in comparison with batch processing method through experiment.

Failure estimation of the composite laminates using machine learning techniques

  • Serban, Alexandru
    • Steel and Composite Structures
    • /
    • v.25 no.6
    • /
    • pp.663-670
    • /
    • 2017
  • The problem of layup optimization of the composite laminates involves a very complex multidimensional solution space which is usually non-exhaustively explored using different heuristic computational methods such as genetic algorithms (GA). To ensure the convergence to the global optimum of the applied heuristic during the optimization process it is necessary to evaluate a lot of layup configurations. As a consequence the analysis of an individual layup configuration should be fast enough to maintain the convergence time range to an acceptable level. On the other hand the mechanical behavior analysis of composite laminates for any geometry and boundary condition is very convoluted and is performed by computational expensive numerical tools such as finite element analysis (FEA). In this respect some studies propose very fast FEA models used in layup optimization. However, the lower bound of the execution time of FEA models is determined by the global linear system solving which in some complex applications can be unacceptable. Moreover, in some situation it may be highly preferred to decrease the optimization time with the cost of a small reduction in the analysis accuracy. In this paper we explore some machine learning techniques in order to estimate the failure of a layup configuration. The estimated response can be qualitative (the configuration fails or not) or quantitative (the value of the failure factor). The procedure consists of generating a population of random observations (configurations) spread across solution space and evaluating using a FEA model. The machine learning method is then trained using this population and the trained model is then used to estimate failure in the optimization process. The results obtained are very promising as illustrated with an example where the misclassification rate of the qualitative response is smaller than 2%.