• Title/Summary/Keyword: national protocols

Search Result 820, Processing Time 0.029 seconds

Neural Transcription Factors: from Embryos to Neural Stem Cells

  • Lee, Hyun-Kyung;Lee, Hyun-Shik;Moody, Sally A.
    • Molecules and Cells
    • /
    • v.37 no.10
    • /
    • pp.705-712
    • /
    • 2014
  • The early steps of neural development in the vertebrate embryo are regulated by sets of transcription factors that control the induction of proliferative, pluripotent neural precursors, the expansion of neural plate stem cells, and their transition to differentiating neural progenitors. These early events are critical for producing a pool of multipotent cells capable of giving rise to the multitude of neurons and glia that form the central nervous system. In this review we summarize findings from gain- and loss-of-function studies in embryos that detail the gene regulatory network responsible for these early events. We discuss whether this information is likely to be similar in mammalian embryonic and induced pluripotent stem cells that are cultured according to protocols designed to produce neurons. The similarities and differences between the embryo and stem cells may provide important guidance to stem cell protocols designed to create immature neural cells for therapeutic uses.

IPv6 Networking with Subnet ID Deprecated

  • Kim, Young Hee;Kim, Dae Young;Park, Jong Won
    • Journal of Computing Science and Engineering
    • /
    • v.11 no.2
    • /
    • pp.49-57
    • /
    • 2017
  • This paper proposes a new IPv6 networking paradigm as a counter answer to the rationale for locator/identifier separation. Instead of involving separate number spaces each for node identifiers and locators, the context of the IP address as a node identifier alone is utilized and no additional locators are incorporated. That is, there are only node addresses and no locators, and location information is indirectly derived from neighbor relations between nodes. In order to accomplish this, no subnet IDs are utilized; the ID value is set to zero for all subnets. The paper details how to construct this paradigm through novel choice of operational policies in various IPv6 protocols and some trivial modifications. Especially, inherent provision of intra-domain node- as well as subnet-mobility by use of standard link-state intra-domain routing protocols is discussed. A number of important advantages of this paradigm over the canonical IPv6 networking and various known solutions of locator/identifier separation are discussed. Tailoring for multi-area domains and IPv4 is left for further study.

Design and Implementation of a CAN Data Analysis Test Bench based on Raspberry Pi

  • Pant, Sudarshan;Lee, Sangdon
    • Journal of Multimedia Information System
    • /
    • v.6 no.4
    • /
    • pp.239-244
    • /
    • 2019
  • With the development of Cyber-Physical Systems(CPS), several technologies such as automation control, automotive and intelligent house systems have been developed. To enable communication among various components of such systems, several wired and wireless communication protocols are used. The Controller Area Network(CAN) is one of such wired communication protocols that is popularly used for communication in automobiles and other machinery in the industry. In this paper, we designed and implemented a response time analysis system for CAN communication. The reliable data transfer among various electronic components in a significant time is crucial for the smooth operation of an electric vehicle. Therefore, this system is designed to conveniently analyze the response time of various electronic components of a CAN enabled system. The priority for transmission of the messages in the CAN bus is determined by the message identifier. As the number of nodes increases the transmission of low priority messages is delayed due to the existence of higher priority messages on the bus. We used Raspberry Pi3 and PiCAN2 board to simulate the data transfer for studying the comparative delay in low priority nodes.

In Vivo Non Invasive Molecular Imaging for Immune Cell Tracking in Small Animals

  • Youn, Hyewon;Hong, Kee-Jong
    • IMMUNE NETWORK
    • /
    • v.12 no.6
    • /
    • pp.223-229
    • /
    • 2012
  • Clinical and preclinical in vivo immune cell imaging approaches have been used to study immune cell proliferation, apoptosis and interaction at the microscopic (intra-vital imaging) and macroscopic (whole-body imaging) level by use of ex vivo or in vivo labeling method. A series of imaging techniques ranging from non-radiation based techniques such as optical imaging, MRI, and ultrasound to radiation based CT/nuclear imaging can be used for in vivo immune cell tracking. These imaging modalities highlight the intrinsic behavior of different immune cell populations in physiological context. Fluorescent, radioactive or paramagnetic probes can be used in direct labeling protocols to monitor the specific cell population. Reporter genes can also be used for genetic, indirect labeling protocols to track the fate of a given cell subpopulation in vivo. In this review, we summarized several methods dealing with dendritic cell, macrophage, and T lymphocyte specifically labeled for different macroscopic whole-body imaging techniques both for the study of their physiological function and in the context of immunotherapy to exploit imaging-derived information and immune-based treatments.

Extended 3-Party Mutual Authentication Protocols for the Virtual Home Environment in Next Generation Mobile Networks (차세대 이동통신 네트워크의 Virtual Home Environment 구조에 적용 가능한 3자간 상호 인증 프로토콜)

  • Jeong, Jong-Min;Lee, Goo-Yeon;Lee, Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.4
    • /
    • pp.22-29
    • /
    • 2003
  • In the virtual home environment (VHE), which was proposed to offer global roaming and personal service environment portability, user's profiles and service logics are conveyed from home network to visited network to provide services at the visited network. Because user's profiles and service logics may contain confidential information, some procedures for mutual authentication among entities for offering confidence are needed. For these issues, we propose and analyze three 3-Party mutual authentication Protocols adaptable to the VHE in 3G ; password based mutual authentication protocol, mutual authentication protocol with CHAP and key exchange and mutual authentication protocol with trusted third party.

Towards Choosing Authentication and Encryption: Communication Security in Sensor Networks

  • Youn, Seongwook;Cho, Hyun-chong
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.3
    • /
    • pp.1307-1313
    • /
    • 2017
  • Sensor networks are composed of provide low powered, inexpensive distributed devices which can be deployed over enormous physical spaces. Coordination between sensor devices is required to achieve a common communication. In low cost, low power and short-range wireless environment, sensor networks cope with significant resource constraints. Security is one of main issues in wireless sensor networks because of potential adversaries. Several security protocols and models have been implemented for communication on computing devices but deployment these models and protocols into the sensor networks is not easy because of the resource constraints mentioned. Memory intensive encryption algorithms as well as high volume of packet transmission cannot be applied to sensor devices due to its low computational speed and memory. Deployment of sensor networks without security mechanism makes sensor nodes vulnerable to potential attacks. Therefore, attackers compromise the network to accept malicious sensor nodes as legitimate nodes. This paper provides the different security models as a metric, which can then be used to make pertinent security decisions for securing wireless sensor network communication.

Topology Aggregation for Hierarchical Wireless Tactical Networks

  • Pak, Woo-Guil;Choi, Young-June
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.2
    • /
    • pp.344-358
    • /
    • 2011
  • Wireless tactical network (WTN) is the most important present-day technology enabling modern network centric warfare. It inherits many features from WMNs, since the WTN is based on existing wireless mesh networks (WMNs). However, it also has distinctive characteristics, such as hierarchical structures and tight QoS (Quality-of-Service) requirements. Little research has been conducted on hierarchical protocols to support various QoS in WMN. We require new protocols specifically optimized for WTNs. Control packets are generally required to find paths and reserve resources for QoS requirements, so data throughput is not degraded due to overhead. The fundamental solution is to adopt topology aggregation, in which a low tier node aggregates and simplifies the topology information and delivers it to a high tier node. The overhead from control packet exchange can be reduced greatly due to decreased information size. Although topology aggregation is effective for low overhead, it also causes the inaccuracy of topology information; thus, incurring low QoS support capability. Therefore, we need a new topology aggregation algorithm to achieve high accuracy. In this paper, we propose a new aggregation algorithm based on star topology. Noting the hierarchical characteristics in military and hierarchical networks, star topology aggregation can be used effectively. Our algorithm uses a limited number of bypasses to increase the exactness of the star topology aggregation. It adjusts topology parameters whenever it adds a bypass. Consequently, the result is highly accurate and has low computational complexity.

Lightweight RFID Authentication Protocols Based on Hash Function (해쉬함수에 기반한 경량화된 RFID 인증 프로토콜)

  • Ha, Jae-Cheol;Baek, Yi-Roo;Kim, Hwan-Koo;Park, Jea-Hoon;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.61-72
    • /
    • 2009
  • To guarantee security between the tag and back-end server and implementation efficiency in low power tag, we propose two typed mutual authentication protocols in RFID system. One is static-ID authentication scheme which is well suitable in distributed server environments. The other is dynamic-ID scheme which is additively satisfied forward security. In proposed scheme, it does not need any random number generator in tag and requires only one(maximally three) hash operation(s) in tag or server to authenticate each other. Furthermore, we implement the proposed schemes in RFID smart card system and verify its normal operations.

Shear Performance Evaluation of Cast-in Specialty Inserts in Cracked Concrete according to Cyclic Loading Patterns (반복하중 패턴에 따른 균열 콘크리트에 매입된 선설치 인서트 앵커의 전단성능 평가)

  • Jeong, Sang-Deock;Oh, Chang-Soo;Lee, Chang-Hwan
    • Journal of Korean Association for Spatial Structures
    • /
    • v.23 no.2
    • /
    • pp.53-60
    • /
    • 2023
  • Recently, a novel cast-in specialty insert was developed in Korea as an anchor for lightweight pipe supports, including fire-protection pipes. As these pipe supports and anchors play a critical role in transferring loads of fire-protection pipes to structural members, it is crucial to evaluate their seismic performance before applying the newly developed insert. In this study, the seismic shear performance of the insert anchors was evaluated through cyclic loading tests based on the loading protocols of ACI 355.2 and FEMA 461. Initially, five monotonic loading tests were conducted on the insert anchors in cracked concrete, followed by cyclic loading tests based on the monotonic test results. The findings revealed that the insert anchors exhibited negligible decrease in shear strength even after cyclic loading. Furthermore, a comparison of the maximum load and displacement of the insert anchors obtained under the loading protocols of ACI 355.2 and FEMA 461 was performed to investigate the applicability of the FEMA 461 loading protocol for anchor performance evaluation.

CD8+ T Cell-mediated Immunity Induced by Heterologous Prime-boost Vaccination Based on DNA Vaccine and Recombinant Vaccinia Virus Expressing Epitope (Epitope발현 DNA Vaccine과 Recombinant Vaccinia Virus를 이용한 Heterologous Prime-boost Vaccination에 의하여 유도되는 CD8+ T 세포 매개성 면역)

  • Park, Seong-Ok;Yoon, Hyun-A;Aleyas, Abi George;Lee, John-Hwa;Chae, Joon-Seok;Eo, Seong-Kug
    • IMMUNE NETWORK
    • /
    • v.5 no.2
    • /
    • pp.89-98
    • /
    • 2005
  • Background: DNA vaccination represents an anticipated approach for the control of numerous infectious diseases. Used alone, however, DNA vaccine is weak immunogen inferior to viral vectors. In recent, heterologous prime-boost vaccination leads DNA vaccines to practical reality. Methods: We assessed prime-boost immunization strategies with a DNA vaccine (minigene, $gB_{498-505}$ DNA) and recombinant vaccinia virus $(vvgB_{498-505})$ expressing epitope $gB_{498-505}$ (SSIEF ARL) of CD8+ T cells specific for glycoprotein B (gB) of herpes simplex virus (HSV). Animals were immunized primarily with $gB_{498-505}$ epitope-expressing DNA vaccine/recombinant vaccinia virus and boosted with alternative vaccine type expressing entire Ag. Results: In prime-boost protocols using vvgBw (recombinant vaccinia virus expressing entire Ag) and $vvgB_{498-505}$, CD8+ T cell-mediated immunity was induced maximally at both acute and memory stages if primed with vvgBw and boosted with $vvgB_{498-505}$ as evaluated by CTL activity, intracellular IFN-staining, and MHC class I tetramer staining. Similarly $gB_{498-505}$ DNA prime-gBw DNA (DNA vaccine expressing entire Ag) boost immunization elicited the strongest CD8+ T cell responses in protocols based on DNA vaccine. However, the level of CD8+ T cell-mediated immunity induced with prime-boost vaccination using DNA vaccine expressing epitope or entire Ag was inferior to those based on vvgBw and $vvgB_{498-505}$. Of particular interest CD8+ T cell-mediated immunity was optimally induced when $vvgB_{498-505}$ was used to prime and gB DNA was used as alternative boost. Especially CD7+ T cell responses induced by such protocol was longer lasted than other protocols. Conclusion: These facts direct to search for the effective strategy to induce optimal CD8+ T cell-mediated immunity against cancer and viral infection.