• 제목/요약/키워드: evasion

검색결과 241건 처리시간 0.025초

Pursuit-evasion as a dynamic game

  • Imado, Fumiaki;Ichikawa, Akira;Kanai, Kimio
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1993년도 한국자동제어학술회의논문집(국제학술편); Seoul National University, Seoul; 20-22 Oct. 1993
    • /
    • pp.474-479
    • /
    • 1993
  • A study about two-dimensional pursuit-evasion dynamic games is presented and discussed. A pursuer tries to intercept an evader by a strategy based on proportional navigation guidance, while the evader tries to maximize a miss distance by the optimal control. The study is applied to a ball game and an air-combat game. The results show the same features exist in both games, therefore the study will be able to apply for general two dimensional dynamic games. In the ball game, the study is extended to cases where a goal exists, while in the air-combat game, some three-dimensional problems are solved and the results are also shown.

  • PDF

Beyond Viral Interferon Regulatory Factors: Immune Evasion Strategies

  • Myoung, Jinjong;Lee, Shin-Ae;Lee, Hye-Ra
    • Journal of Microbiology and Biotechnology
    • /
    • 제29권12호
    • /
    • pp.1873-1881
    • /
    • 2019
  • The innate immune response serves as a first-line-of-defense mechanism for a host against viral infection. Viruses must therefore subvert this anti-viral response in order to establish an efficient life cycle. In line with this fact, Kaposi's sarcoma-associated herpesvirus (KSHV) encodes numerous genes that function as immunomodulatory proteins to antagonize the host immune system. One such mechanism through which KSHV evades the host immunity is by encoding a viral homolog of cellular interferon (IFN) regulatory factors (IRFs), known as vIRFs. Herein, we summarize recent advances in the study of the immunomodulatory strategies of KSHV vIRFs and their effects on KSHV-associated pathogenesis.

우리나라 전자부품기술개발에 대한 발전과 전망 (A Consideration and Perspective for the Development of Nation's Electronic Components Techniques)

  • 조규심
    • 기술사
    • /
    • 제24권5호
    • /
    • pp.9-14
    • /
    • 1991
  • To date Korean electronic industry has held a position of the first rank both in productions and exports among the nation's industries. However, it is gradually losing its competitive foundation in the world market owing both to the weakening in price competition by least developed among developing countries(LDDC) and to the lack in technological competition with industrially advanced countries. Specifically it is worried about an industrial subordination to industrially advanced countries owing to an evasion of components supply, control of amount of materials, and the evasion of kernel technology transfer etc. As the condition has developed, both the government and the electronic industry in July of this year came to jointly establish a research and development center for electronic components for the purpose of rehabilitating the electronic industry and accordingly strengthen the export industry which has been and continuance to be vital to our nation.

  • PDF

한 관성 회피자와 두 비관성 추적자 간의 접근 미분 게임 (Differential Game of Approach with an Inertial Evader and Two Noninertial Pursuers)

  • 남동경;서진헌
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1995년도 추계학술대회 논문집 학회본부
    • /
    • pp.213-215
    • /
    • 1995
  • This paper is concerned with a coplanar pursuit-evasion game of one inertial evader and two identical noninertial pursuers. The terminal time is fired and the payoff is the distance between the evader and the nearest pursuer when tile game is terminated. The value functions and the strategies is constructed for all the game surface. To get a value function, we use the generalization of the Bellman-Isaacs fundamental equation.

  • PDF

21' RF BAND ASS'Y BOX 이송용 적재 시스템 개발 (A Development of 21' RF BAND ASS'Y BOX Transfer Loading System)

  • 이도명;주철완;이성희
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 2006년도 춘계학술대회 논문집
    • /
    • pp.317-318
    • /
    • 2006
  • A transfer loading system for 21' RF band assembly box was developed in the present study. The weight of a box is approximately 60kgf End total weight of one day job per person is about $4,000kg_f$. For an efficient design and manufacturing process, three dimensional design and engineering technique were applied to the presented system. Motion analysis for a popup unit and structural analysis for belt part subjected to the load of box weight were performed, respectively. It was found that the evasion of duty and labor intensity is reduced after appling the developed system to manufacturing field of small and midium business.

  • PDF

Cancer Metabolism: Fueling More than Just Growth

  • Lee, Namgyu;Kim, Dohoon
    • Molecules and Cells
    • /
    • 제39권12호
    • /
    • pp.847-854
    • /
    • 2016
  • The early landmark discoveries in cancer metabolism research have uncovered metabolic processes that support rapid proliferation, such as aerobic glycolysis (Warburg effect), glutaminolysis, and increased nucleotide biosynthesis. However, there are limitations to the effectiveness of specifically targeting the metabolic processes which support rapid proliferation. First, as other normal proliferative tissues also share similar metabolic features, they may also be affected by such treatments. Secondly, targeting proliferative metabolism may only target the highly proliferating "bulk tumor" cells and not the slowergrowing, clinically relevant cancer stem cell subpopulations which may be required for an effective cure. An emerging body of research indicates that altered metabolism plays key roles in supporting proliferation-independent functions of cancer such as cell survival within the ischemic and acidic tumor microenvironment, immune system evasion, and maintenance of the cancer stem cell state. As these aspects of cancer cell metabolism are critical for tumor maintenance yet are less likely to be relevant in normal cells, they represent attractive targets for cancer therapy.

삽입 및 배제 공격을 고려한 네트워크 침입 탐지 시스템 모델 (A Network Intrusion Detection System Model for Detecting of Insertion and Evasion Attacks)

  • 차현철
    • 한국컴퓨터정보학회논문지
    • /
    • 제5권4호
    • /
    • pp.69-75
    • /
    • 2000
  • 본 논문에서는 삽입 공격과 배제 공격을 탐지할 수 있는 네트워크 침입 탐지 시스템의 모델을 제시하였다. 이를 위해, 먼저 네트워크 침입 탐지 시스템에 대한 공격들을 살펴보았으며, 이들 공격의 탐지에 필요한 정보들을 세 가지 관점에서 분류하였다. 분류된 정보는 탐지를 위한 초기 설정 단계와 실행 단계에서 각각 사용하였다. 제시한 모델은 네트워크 침입 탐지 시스템이 각종 운영체제들의 동작 특성에 대한 정보를 데이터베이스에 유지 및 관리하고 있으며 데이터베이스로부터 테이블을 생성하고, 탐지 시에 이를 참조함으로써 목적지 시스템의 동작을 정확히 예측할 수 있게 된다. 또한, 제시된 모델에서 필요로 하는 데이터베이스와 테이블에 관련된 오버헤더는 별로 크지 않을 것이라 추정할 수 있다.

  • PDF

Host-Pathogen Dialogues in Autophagy, Apoptosis, and Necrosis during Mycobacterial Infection

  • Jin Kyung Kim;Prashanta Silwal;Eun-Kyeong Jo
    • IMMUNE NETWORK
    • /
    • 제20권5호
    • /
    • pp.37.1-37.15
    • /
    • 2020
  • Mycobacterium tuberculosis (Mtb) is an etiologic pathogen of human tuberculosis (TB), a serious infectious disease with high morbidity and mortality. In addition, the threat of drug resistance in anti-TB therapy is of global concern. Despite this, it remains urgent to research for understanding the molecular nature of dynamic interactions between host and pathogens during TB infection. While Mtb evasion from phagolysosomal acidification is a well-known virulence mechanism, the molecular events to promote intracellular parasitism remains elusive. To combat intracellular Mtb infection, several defensive processes, including autophagy and apoptosis, are activated. In addition, Mtb-ingested phagocytes trigger inflammation, and undergo necrotic cell death, potentially harmful responses in case of uncontrolled pathological condition. In this review, we focus on Mtb evasion from phagosomal acidification, and Mtb interaction with host autophagy, apoptosis, and necrosis. Elucidation of the molecular dialogue will shed light on Mtb pathogenesis, host defense, and development of new paradigms of therapeutics.

모바일 코드를 이용한 최적적응 침입탐지시스템 (An Optimum-adaptive Intrusion Detection System Using a Mobile Code)

  • 방세중;김양우;김윤희;이필우
    • 정보처리학회논문지C
    • /
    • 제12C권1호
    • /
    • pp.45-52
    • /
    • 2005
  • 지식사회의 역기능인 정보시스템에 대한 각종 침해행위들로 정보자산의 피해규모는 나날이 증가하고 있다. 이러한 침해행위 중에서 네트워크 보안과 관련된 범죄수사 요구의 강화는 침해행위탐지와 이에 대한 대응 및 보고를 포함하는 다양한 형태의 침입탐지시스템들에 대한 연구개발을 촉진시켜왔다. 그러나 초기 침입탐지시스템은 설계상의 한계로 다양한 네트워크 환경에서 오탐지(false-positive)와 미탐지(false-negative)뿐만 아니라 침입탐지시스템을 우회하는 방법에 대처하기 힘들었다. 본 논문에서는 이런 문제점을 모바일 코트를 통한 최적적응 능력을 갖춘 가상프로토콜스택(Virtual Protocol Stack)을 통해 보완함으로서 침입탐지시스템이 다양한 환경에서 능동적으로 감시중인 네트워크의 상황을 자동학습 하도록 하였다. 또한 본 논문에서는 이를 적용하여 삽입/회피(Insertion/Evasion) 유형의 공격이 적극적으로 탐지될 수 있음을 보였고, 이러한 방법은 보다 다양한 혼성의 네트워크 환경에서도 적응능력을 갖춘 침입탐지 기법으로 확대 적용될 수 있음을 논의하였다.