• Title/Summary/Keyword: information architecture

Search Result 9,348, Processing Time 0.042 seconds

PreSPI: Protein-Protein Interaction Prediction Service System (PreSPI: 단백질 상호작용 예측 서비스 시스템)

  • Han Dong-Soo;Kim Hong-Soog;Jang Woo-Hyuk;Lee Sung-Doke
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.6
    • /
    • pp.503-513
    • /
    • 2005
  • With the recognition of the importance of computational approach for protein-protein interaction prediction, many techniques have been developed to computationally predict protein-protein interactions. However, few techniques are actually implemented and announced in service form for general users to readily access and use the techniques. In this paper, we design and implement a protein interaction prediction service system based on the domain combination based protein-protein interaction prediction technique, which is known to show superior accuracy to other conventional computational protein-protein interaction prediction methods. In the prediction accuracy test of the method, high sensitivity($77\%$) and specificity($95\%$) are achieved for test protein pairs containing common domains with teaming sets of proteins in a Yeast. The stability of the method is also manifested through the testing over DIP CORE, HMS-PCI, and TAP data. Performance, openness and flexibility are the major design goals and they are achieved by adopting parallel execution techniques, web Services standards, and layered architecture respectively. In this paper, several representative user interfaces of the system are also introduced with comprehensive usage guides.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

Topology of High Speed System Emulator and Its Software (초고속 시스템 에뮬레이터의 구조와 이를 위한 소프트웨어)

  • Kim, Nam-Do;Yang, Se-Yang
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.479-488
    • /
    • 2001
  • As the SoC designs complexity constantly increases, the simulation that uses their software models simply takes too much time. To solve this problem, FPGA-based logic emulators have been developed and commonly used in the industry. However, FPGA-based logic emulators are facing with the problems of which not only very low FPGA resource usage rate due to the very limited number of pins in FPGAs, but also the emulation speed getting slow drastically as the complexity of designs increases. In this paper, we proposed a new innovative emulation architecture and its software that has high FPGA resource usage rate and makes the emulation extremely fast. The proposed emulation system has merits to overcome the FPGA pin limitation by pipelined ring which transfers multiple logic signal through a single physical pin, and it also makes possible to use a high speed system clock through the intelligent ring topology. In this topology, not only all signal transfer channels among EPGAs are totally separated from user logic so that a high speed system clock can be used, but also the depth of combinational paths is kept swallow as much as possible. Both of these are contributed to achieve high speed emulation. For pipelined singnals transfer among FPGAs we adopt a few heuristic scheduling having low computation complexity. Experimental result with a 12 bit microcontroller has shown that high speed emulation possible even with these simple heuristic scheduling algorithms.

  • PDF

Temporal Data Mining Framework (시간 데이타마이닝 프레임워크)

  • Lee, Jun-Uk;Lee, Yong-Jun;Ryu, Geun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.9D no.3
    • /
    • pp.365-380
    • /
    • 2002
  • Temporal data mining, the incorporation of temporal semantics to existing data mining techniques, refers to a set of techniques for discovering implicit and useful temporal knowledge from large quantities of temporal data. Temporal knowledge, expressible in the form of rules, is knowledge with temporal semantics and relationships, such as cyclic pattern, calendric pattern, trends, etc. There are many examples of temporal data, including patient histories, purchaser histories, and web log that it can discover useful temporal knowledge from. Many studies on data mining have been pursued and some of them have involved issues of temporal data mining for discovering temporal knowledge from temporal data, such as sequential pattern, similar time sequence, cyclic and temporal association rules, etc. However, all of the works treated data in database at best as data series in chronological order and did not consider temporal semantics and temporal relationships containing data. In order to solve this problem, we propose a theoretical framework for temporal data mining. This paper surveys the work to date and explores the issues involved in temporal data mining. We then define a model for temporal data mining and suggest SQL-like mining language with ability to express the task of temporal mining and show architecture of temporal mining system.

Analysis of Village Safety Index using Accessibility to Public Facilities (공공시설 접근성을 통한 마을단위 안전지수 분석)

  • Jeon, Jeongbae;Kim, Solhee;Suh, Kyo;Yoon, Seongsoo
    • Journal of Korean Society of Rural Planning
    • /
    • v.22 no.2
    • /
    • pp.121-129
    • /
    • 2016
  • A disaster can be defined in many ways based on perspectives, in addition, its types are able to classify differently by various standards. Considering the different perspectives, the disaster can be occurred by natural phenomenon that is like typhoon, earthquake, flood, and drought, and by the accident that is like collapse of facilities, traffic accidents, and environmental pollution, etc. Into the modern society, moreover, the disaster includes the damages by diffusion of epidemic and infectious disease in domestic animals. The disaster was defined by natural and man-made hazards in the past. As societies grew with changes of paradigm, social factors have been included in the concept of the disaster according to new types unexpected by new disease and scientific technology. Change the concept of social disasters, Ministry of Public Safety and Security (MPSS) has provided the regional safety index, which measures the safety level of a local government. However, this regional safety index has some limitation to use because this index provides the information for city unit which is a unit of administrative districts of urban. Since these administrative districts units are on a different level with urban and rural areas, the regional safety index provided by MPSS is not be able to direct apply to the rural areas. The purpose of this study is to determine the regional safety index targeting rural areas. To estimate the safety index, we was used for 3 indicators of the MPSS, a fire, a crime, and an infectious disease which are evaluable the regional safety index using an accessibility analysis. For determining the regional safety index using accessibility from community centers to public facilities, the safety index of fire, crime, and infectious disease used access time to fire station, police office, and medical facility, respectively. An integrated Cheongju, targeting areas in this study, is mixed region with urban and rural areas. The results of regional safety index about urban and rural areas, the safety index in rural area is relatively higher than in the urban. Neverthless the investment would be needed to improve the safety in the rural areas.

Biological Inspiration toward Artificial Photostystem

  • Park, Jimin;Lee, Jung-Ho;Park, Yong-Sun;Jin, Kyoungsuk;Nam, Ki Tae
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2013.08a
    • /
    • pp.91-91
    • /
    • 2013
  • Imagine a world where we could biomanufacture hybrid nanomaterials having atomic-scale resolution over functionality and architecture. Toward this vision, a fundamental challenge in materials science is how to design and synthesize protein-like material that can be fully self-assembled and exhibit information-specific process. In an ongoing effort to extend the fundamental understanding of protein structure to non-natural systems, we have designed a class of short peptides to fold like proteins and assemble into defined nanostructures. In this talk, I will talk about new strategies to drive the self-assembled structures designing sequence of peptide. I will also discuss about the specific interaction between proteins and inorganics that can be used for the development of new hybrid solar energy devices. Splitting water into hydrogen and oxygen is one of the promising pathways for solar to energy convertsion and storage system. The oxygen evolution reaction (OER) has been regarded as a major bottleneck in the overall water splitting process due to the slow transfer rate of four electrons and the high activation energy barrier for O-O bond formation. In nature, there is a water oxidation complex (WOC) in photosystem II (PSII) comprised of the earthabundant elements Mn and Ca. The WOC in photosystem II, in the form of a cubical CaMn4O5 cluster, efficiently catalyzes water oxidation under neutral conditions with extremely low overpotential (~160 mV) and a high TOF number. The cluster is stabilized by a surrounding redox-active peptide ligand, and undergo successive changes in oxidation state by PCET (proton-coupled electron transfer) reaction with the peptide ligand. It is fundamental challenge to achieve a level of structural complexity and functionality that rivals that seen in the cubane Mn4CaO5 cluster and surrounding peptide in nature. In this presentation, I will present a new strategy to mimic the natural photosystem. The approach is based on the atomically defined assembly based on the short redox-active peptide sequences. Additionally, I will show a newly identified manganese based compound that is very close to manganese clusters in photosystem II.

  • PDF

Message Interoperability in e-Logistics System (e-Logistics시스템의 메시지 상호운용성)

  • Seo Sungbo;Lee Young Joon;Hwang Jaegak;Ryu Keun Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.5
    • /
    • pp.436-450
    • /
    • 2005
  • Existing B2B, B2C computer systems and applications that executed business trans-actions were the client- server based architecture which consists of heterogeneous hardware and software including personal computers and mainframes. Due to the active boom of electronic business, integration and compatibility of exchanged data, applications and hardwares have emerged as hot issue. This paper designs and implements a message transport system and a document transformation system in order to solve the interoperability problem of integrated logistics system in e-Business when doing electronic business. Message transport system integrated ebMS 2.0 which is standard business message exchange format of ebXML, the international standard electronic commerce framework, and JMS of J2EE enable to ensure reliable messaging. The document transformation system could convert non-standard XML documents into standard XML documents and provide the web services after integrating message system. Using suggested business scenario and various test data, our message oriented system preyed to be interoperable and stable. We participated ebXML messaging interoperability test organized by ebXML Asia Committee ITG in oder to evaluate and certify the suitability for message system.

A Classification and Extraction Method of Object Structure Patterns for Framework Hotspot Testing (프레임워크 가변부위 시험을 위한 객체 구조 패턴의 분류 및 추출 방법)

  • Kim, Jang-Rae;Jeon, Tae-Woong
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.7
    • /
    • pp.465-475
    • /
    • 2002
  • An object-oriented framework supports efficient component-based software development by providing a flexible architecture that can be decomposed into easily modifiable and composable classes. Object-oriented frameworks require thorough testing as they are intended to be reused repeatedly In developing numerous applications. Furthermore, additional testing is needed each time the framework is modified and extended for reuse. To test a framework, it must be instantiated into a complete, executable system. It is, however, practically impossible to test a framework exhaustively against all kinds of framework instantiations, as possible systems into which a framework can be configured are infinitely diverse. If we can classify possible configurations of a framework into a finite number of groups so that all configurations of a group have the same structural or behavioral characteristics, we can effectively cover all significant test cases for the framework testing by choosing a representative configuration from each group. This paper proposes a systematic method of classifying object structures of a framework hotspot and extracting structural test patterns from them. This paper also presents how we can select an instance of object structure from each extracted test pattern for use in the frameworks hotspot testing. This method is useful for selection of optimal test cases and systematic construction of executable test target.

A 2-Dimensional Approach for Analyzing Variability of Domain Core Assets (도메인 핵심자산의 가변성 분석을 위한 2차원적 접근방법)

  • Moon Mi-Kyeong;Chae Heung-Seok;Yeom Keun-Hyuk
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.6
    • /
    • pp.550-563
    • /
    • 2006
  • Software product line engineering is a method that prepares for the future reuse and supports to seamless reuse in application development process. Commonality and variability play central roles in all product line development processes. Reusable assets will become core assets by explicitly representing C&V. Indeed, the variabilities that art identified at each phase of core assets development have different levels of abstraction. In the past, these variabilities have been handled in an implicit manner and without distinguishing the characteristics of each core assets. In addition, previous approaches have depended on the experience and intuition of a domain expert to recognize commonality and variability. In this paper, we suggest a 2-dimensional analyzing method that analyzes the variabilities of core assets in software product line. In horizontal analysis process, the variation types are analyzed in requirements, architecture, and component that are produced at each phase of development process. In vertical analysis process, variations are analyzed in different abstract levels, in which the region of commonality is identified and the variation points are refined. By this method, the traceability of variations between core assets will be possible and core assets can be reused seamlessly.

Efficient Cluster Server Construction and Management for Service Orientation (서비스 지향적인 효율적인 클러스터 서버 구축 및 관리)

  • Chae, Hee-Seong;Song, Ha-Yoon;Kim, Han-Gyoo;Lee, Kee-Cheol
    • The KIPS Transactions:PartA
    • /
    • v.14A no.6
    • /
    • pp.371-382
    • /
    • 2007
  • Modern server systems are usually composed in the form of cluster systems in order to serve not only as many users but also as many kinds of applications as possible. The progression of the cluster system architecture leads in a middleware approach based on the Java framework. The middleware approach alleviates the efforts for the construction and the management of a server system but still preserves its performance and applications on the server. In this research, we introduce a new clustering scheme for the easy construction and maintenance of a cluster server system with the Java Management Extensions. We first demonstrate the construction and configuration process. Our experiment sets can verify that it is easy to construct, expand and manage a middleware based cluster system as well as the applications which reside on it. In addition, we can achieve reasonable performance on our service oriented clustered system with the help of state-of-the-art middleware. The experimental results of performance demonstration contain the availability of a server, and the effectiveness of load balancing and scheduling mechanisms. Especially, our service oriented scheduling mechanism was shown to successfully manage load imbalance under the normal load and cope with the overloaded situations, compared with other known scheduling mechanisms.