• Title/Summary/Keyword: multiple-access system

Search Result 1,220, Processing Time 0.029 seconds

Suppressive Effects of JTT on Collagen-Induced Arthritis in Mice (정통탕(定痛湯)이 콜라젠으로 유도한 관절염 동물 병태 모델에 미치는 효과)

  • Cho, Jong-Cheol;Koo, Young-Sun;Kim, Dong-Hee
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.21 no.1
    • /
    • pp.39-49
    • /
    • 2007
  • Rheumatoid arthritis is an autoimmune disease involving multiple joint. In order to access the suppressive effects of JTT on rheumatoid arthritis and it's effects on immune system we investigated whether JTT could suppress the disease progression of collagen-induced arthritis. DBA/1 mice were immunized with bovine type II collagen. After a second collagen immunization, mice were treated with DW, JTT (200 or 400 mg/kg) or methotrexate (MTX, 30 mg/kg) as a positive control. Oral administration of JTT significantly suppressed the progression of CIA, which extend is comparable to that of MTX. Histological examination reveled that JTT inhibited infiltration of inflammatory cells into affected paw joint and bone erosion and cartilage destruction were greatly reduced compared with control. Total cell number of spleen, lymph node and peripheral blood were significantly reduced. The absolute number of CD19$^+$, CD3$^+$/CD69$^+$, CD4$^+$/CD25$^+$ cell in spleen from JTT treated mice were significantly decreased. The absolute number of CD19$^+$, CD3$^+$, CD3$^+$/CD69$^+$, CD4$^+$, CD4$^+$/CD25$^+$ CD8$^+$, CD49b, CD3/CD49b cells in draining lymph node were significantly increased compared with control. In peripheral blood mononuclear cells of JTT treated mice, the absolute number of CD4$^+$, CD4$^+$/CD25$^+$, CD3$^+$/CD69$^+$ cells were significantly decreased compared with control, while that of CD49b$^+$ was slightly increased. Infiltration of CD3$^+$ cells and CD11b$^+$/Gr-1$^+$ cells into paw joint was significantly reduced in JTT treated mice. The levels of pathologic cytokines including TNF-a and IL-6 in serum were significantly decreased by oral treatment with JTT The levels of IFN-g in the culture supernatant of splenocyte stimulated with CD3$^+$/CD28$^+$ or collagen were dramatically decreased, while the levels of IL-4 was increased under CD3$^+$/CD28$^+$ or collagen stimulation. Rheumatoid factors including IgG, IgM and collagen specific antibody were present much lower in the serum of JTT treated mice than control. Taken together, JTT has suppressive effects on rheumatoid arthritis by modulating immune system, and has potential to use anti-rheumatic arthritic agent in human.

Enhanced WMAN System based on Region and Time Partitioning D-TDD OFDM Architecture (영역/시간 세분화 D-TDD OFDM 구조에 기반한 새로운 WMAN 시스템 구조 설계)

  • Kim, Mee-Ran;Cheong, Hee-Jeong;Kim, Nak-Myeong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.68-77
    • /
    • 2006
  • In accommodating the asymmetric traffic for future wireless multimedia services, the dynamic time division duplexing (D-TDD) scheme is considered as one of the key solutions. With the D-TDD mode, however, the inter-BS and inter-MS interference is inevitable during the cross time slot (CTS) period, and this interference seriously degrades the system performance. To mitigate such interference, we propose a region and time partitioning D-TDD architecture for OFDM systems. Each time slot in the CTS period is split into several minislots, and then each cell is divided into as many regions as the number of minislots per time slot. We then assign the minislots only to the users in its predefined corresponding region. On top of such architecture which inherently separates the interfering entities farther from each other, we design a robust time slot allocation scheme so that the inter-cell interference can be minimized. By the computer simulation, it has been verified that the proposed scheme outperforms the conventional time slot allocation methods in both the outage probability and the bandwidth efficiency.

Pilot Assignment Method for the PAPR Reduction and Effective Channel Estimation in the SC-FDMA Communication System (PAPR 감소와 효과적 채널 추정을 위한 SC-FDMA 통신 시스템의 파이럿 배치 방법)

  • An, Dong-Geon;Ryu, Heung-Gyoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.1
    • /
    • pp.1-7
    • /
    • 2010
  • PAPR of the pilot symbols can be reduced down by the CAZAC sequence in the SC-FDMA communication system. However, it is very complicated and takes quite a long time to compute the interpolation between the OFDM information symbols for the channel estimation because the pilot data are trasmitted in the block type. Furthermore, situation will be much more serious in the severe fading channel. Actually the pilot insertion of the comb type is much efficient and convenient for the channel estimation since the calculation of the interpolation can be made in the frequency domain symbol by symbol. But, the PAPR will be regrown when the pilot data are inserted with the information data in the comb type. So, in this paper, we like to study the PAPR reduction and comb type pilot assignment for the efficient channel estimation. Unlike the conventional SLM(selected mapping) method requiring the side information, our improved SLM method is to use the phase rotation sequence into information data without rotating phase of pilot. We use different pilot data according to the different phase rotation sequence. From the simulation result, it can be confirmed that when SLM method of 4 phase rotation sequence is used, PAPR is almost same to the block type method without pilot.

A study of Vertical Handover between LTE and Wireless LAN Systems using Adaptive Fuzzy Logic Control and Policy based Multiple Criteria Decision Making Method (LTE/WLAN 이종망 환경에서 퍼지제어와 정책적 다기준 의사결정법을 이용한 적응적 VHO 방안 연구)

  • Lee, In-Hwan;Kim, Tae-Sub;Cho, Sung-Ho
    • The KIPS Transactions:PartC
    • /
    • v.17C no.3
    • /
    • pp.271-280
    • /
    • 2010
  • For the next generation mobile communication system, diverse wireless network techniques such as beyond 3G LTE, WiMAX/WiBro, and next generation WLAN etc. are proceeding to the form integrated into the All-IP core network. According to this development, Beyond 3G integrated into heterogeneous wireless access technologies must support the vertical handover and network to be used of several radio networks. However, unified management of each network is demanded since it is individually serviced. Therefore, in order to solve this problem this study is introducing the theory of Common Radio Resource Management (CRRM) based on Generic Link Layer (GLL). This study designs the structure and functions to support the vertical handover and propose the vertical handover algorithm of which policy-based and MCDM are composed between LTE and WLAN systems using GLL. Finally, simulation results are presented to show the improved performance over the data throughput, handover success rate, the system service cost and handover attempt number.

A Demodulation Method for DS/CDMA Systems (DS/CDMA 시스템을 위한 새로운 복조 방식)

  • Jung, Bum-Jin;Jin, Ming-Lu;Kwak, Kyung-Sup
    • Journal of IKEEE
    • /
    • v.2 no.2 s.3
    • /
    • pp.212-224
    • /
    • 1998
  • There are two major factors of degrading the performance in the forward link of DS/CDMA systems. One is the multiple access interference (MAI) caused by using the same frequency bands simultaneously and the other is the multipath lading due to multipath propagation. PN codes which have minimum cross correlation properties among spread spectrum codes are necessary to reduce the MAI. In the conventional IS-95A system, the PN sequence has the period of $2^{15}$ and is of the length of 64 chips for spreading each data. In this case, since the length of PN code per bit is very short compared to the period of the PN code, the performance of the conventional system is not satisfied in view of suppressing the multipath interference. However, the correlation property of the PN codes at the demodulation can be improved by increasing the interval of Integration at the demodulation. This paper proposes a demodulation method to reduce the cross correlation among PN codes. The performance of the proposed demodulation method is investigated through computer simulations. We used multipath Ray lading channel and AWGN channel in the simulation. Our simulation results show the improved performance of $0.25{\sim}0.5dB$ SNR in a given BER compared to the conventional demodulation scheme.

  • PDF

The Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Korea (금융회사의 고객정보보호에 대한 내부직원의 태도 연구)

  • Jung, Woo-Jin;Shin, Yu-Hyung;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.53-77
    • /
    • 2012
  • Financial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers' personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.

  • PDF

IBN-based: AI-driven Multi-Domain e2e Network Orchestration Approach (IBN 기반: AI 기반 멀티 도메인 네트워크 슬라이싱 접근법)

  • Khan, Talha Ahmed;Muhammad, Afaq;Abbas, Khizar;Song, Wang-Cheol
    • KNOM Review
    • /
    • v.23 no.2
    • /
    • pp.29-41
    • /
    • 2020
  • Networks are growing faster than ever before causing a multi-domain complexity. The diversity, variety and dynamic nature of network traffic and services require enhanced orchestration and management approaches. While many standard orchestrators and network operators are resulting in an increase of complexity for handling E2E slice orchestration. Besides, there are multiple domains involved in E2E slice orchestration including access, edge, transport and core network each having their specific challenges. Hence, handling of multi-domain, multi-platform and multi-operator based networking environments manually requires specified experts and using this approach it is impossible to handle the dynamic changes in the network at runtime. Also, the manual approaches towards handling such complexity is always error-prone and tedious. Hence, this work proposes an automated and abstracted solution for handling E2E slice orchestration using an intent-based approach. It abstracts the domains from the operators and enable them to provide their orchestration intention in the form of high-level intents. Besides, it actively monitors the orchestrated resources and based on current monitoring stats using the machine learning it predicts future utilization of resources for updating the system states. Resulting in a closed-loop automated E2E network orchestration and management system.

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.

International Monetary System Reform and the G20 (국제통화제도의 개혁과 G20)

  • Cho, Yoon Je
    • KDI Journal of Economic Policy
    • /
    • v.32 no.4
    • /
    • pp.153-195
    • /
    • 2010
  • The recent global financial crisis has been the outcome of, among other things, the mismatch between institutions and the reality of the market in the current global financial system. The International financial institutions (IFIs) that were designed more than 60 years ago can no longer effectively meet the challenges posed by the current global economy. While the global financial market has become integrated like a single market, there is no international lender of last resort or global regulatory body. There also has been a rapid shift in the weight of economic power. The share of the Group of 7 (G7) countries in global gross domestic product (GDP) fell and the share of emerging market economies increased rapidly. Therefore, the tasks facing us today are: (i) to reform the IFIs -mandate, resources, management, and governance structure; (ii) to reform the system such as the international monetary system (IMS), and regulatory framework of the global financial system; and (iii) to reform global economic governance. The main focus of this paper will be the IMS reform and the role of the Group of Twenty (G20) summit meetings. The current IMS problems can be summarized as follows. First, the demand for foreign reserve accumulation has been increasing despite the movement from fixed exchange rate regimes to floating rate regimes some 40 years ago. Second, this increasing demand for foreign reserves has been concentrated in US dollar assets, especially public securities. Third, as the IMS relies too heavily on the supply of currency issued by a center country (the US), it gives an exorbitant privilege to this country, which can issue Treasury bills at the lowest possible interest rate in the international capital market. Fourth, as a related problem, the global financial system depends too heavily on the center country's ability to maintain the stability of the value of its currency and strength of its own financial system. Fifth, international capital flows have been distorted in the current IMS, from EMEs and developing countries where the productivity of capital investment is higher, to advanced economies, especially the US, where the return to capital investment is lower. Given these problems, there have been various proposals to reform the current IMS. They can be grouped into two: demand-side and supply-side reform. The key in the former is how to reduce the widespread strong demand for foreign reserve holdings among EMEs. There have been several proposals to reduce the self-insurance motivation. They include third-party insurance and the expansion of the opportunity to borrow from a global and regional reserve pool, or access to global lender of last resort (or something similar). However, the first option would be too costly. That leads us to the second option - building a stronger globalfinancial safety net. Discussions on supply-side reform of the IMS focus on how to diversify the supply of international reserve currency. The proposals include moving to a multiple currency system; increased allocation and wider use of special drawing rights (SDR); and creating a new global reserve currency. A key question is whether diversification should be encouraged among suitable existing currencies, or if it should be sought more with global reserve assets, acting as a complement or even substitute to existing ones. Each proposal has its pros and cons; they also face trade-offs between desirability and political feasibility. The transition would require close collaboration among the major players. This should include efforts at the least to strengthen policy coordination and collaboration among the major economies, and to reform the IMF to make it a more effective institution for bilateral and multilateral surveillance and as an international lender of last resort. The success on both fronts depends heavily on global economic governance reform and the role of the G20. The challenge is how to make the G20 effective. Without institutional innovations within the G20, there is a high risk that its summits will follow the path of previous summit meetings, such as G7/G8.

  • PDF

Radiation Oncology Digital Image Chart 8nd Digital Radiotherapv Record System at Samsung Medical Center (디지털 화상 병력 시스템과 디지털 방사선치료 기록 시스템의 개발과 사용 경험)

  • Huh Seung Jae;Ahn Yong Chan;Lim Do Hoon;Cho Chung Keun;Kim Dae Yong;Yeo Inhwan;Kim Moon Kyung;Chang Seung Hee;Park Suk Won
    • Radiation Oncology Journal
    • /
    • v.18 no.1
    • /
    • pp.67-72
    • /
    • 2000
  • Background :The authors have developed a Digital image chart(DIC) and digital Radiotherapy Record System (DRRS). We have evaluated the DIC and DRRS for reliability, usefulness, ease of use, and efficiency. Materials and Methods :The basic design of the DIC and DRRS was to build an digital image database of radiation therapy Patient records for a more efficient and timely flow of critical image information throughout the department. This system is a submit of comprehensive radiation oncology management system (C-ROMS) and composed of a picture archiving and communication system (PACS), a radiotherapy information database, and a radiotherapy imaging database. The DIC and DRRS were programmed using Delphi under a Windows 95 environment and is capable of displaying the digital images of patients identification photos, simulation films, radiotherapy setup, diagnostic radiology images, gross lesion Photos, and radiotherapy Planning isodose charts with beam arrangements. Twenty-three clients in the department are connected by Ethernet (10 Mbps) to the central image server (Sun Ultra-sparc 1 workstation). Results :From the introduction of this system in February 1998 through December 1999, we have accumulated a total of 15,732 individual images for 2,556 patients. We can organize radiation therapy in a 'paperless' environment in 120 patients with breast cancer. Using this system, we have succeeded in the prompt, accurate, and simultaneous access to patient care information from multiple locations throughout the department. This coordination has resulted in improved operational efficiency within the department. Conclusion :The authors believe that the DIC and DRRS has contributed to the improvement of radiation oncology department efficacy as well as to time and resource savings by providing necessary visual information throughout the department conveniently and simultaneously. As a result, we can also achieve the 'paperless' and 'filmless' practice of radiation oncology with this system.

  • PDF