• Title/Summary/Keyword: protocol model

Search Result 1,388, Processing Time 0.024 seconds

Design and Implementation of Ethernet Bandwidth Manager for Supporting Controlled-Load Service (부하제어형 서비스 지원을 위한 이더넷 대역폭 관리기의 설계 및 구현)

  • Kim, Byeong-Sik;Lee, Jae-Kuk;Chun, Woo-Jik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.4
    • /
    • pp.430-440
    • /
    • 2000
  • To support Integrated Services in the Internet, the Internet Engineering Task Force(IETF) has developed new mechanisms. These new mechanisms include Resource Reservation Protocol(RSVP) and Integrated Services model. RSVP and Integrated Services are independent of the underlying link layer technologies and it is necessary to define the mapping of RSVP and Integrated Services specifications onto specific link layer technologies. IETF proposed a Subnet Bandwidth Manager(SBM) providing a method for mapping RSVP onto IEEE802 style networks. However, the SBM has several constraints and problems. For solving these constraints and problems, we design and implement a new Ethernet Bandwidth Manager(EBM). This paper discusses (1) new bandwidth management mechanism independent of RSVP, (2) simulation of Ethernet bandwidth to analyze the characteristics of Ethernet and accomplish Ethernet bandwidth management, (3) design and implemetation of EBM that allows Controlled-Load Service, and (4) results of our experiments on EBM.

  • PDF

Enhancement of Transgene Expression by HDAC Inhibitors in Mouse Embryonic Stem Cells

  • Kim, Young-Eun;Park, Jeong-A;Park, Sang-Kyu;Kang, Ho-Bum;Kwon, Hyung-Joo;Lee, Younghee
    • Development and Reproduction
    • /
    • v.17 no.4
    • /
    • pp.379-387
    • /
    • 2013
  • Embryonic stem (ES) cells can self-renew and differentiate to various cells depending on the culture condition. Although ES cells are a good model for cell type specification and can be useful for application in clinics in the future, studies on ES cells have many experimental restraints including low transfection efficiency and transgene expression. Here, we observed that transgene expression after transfection was enhanced by treatment with histone deacetylse (HDAC) inhibitors such as trichostatin A, sodium butyrate, and valproic acid. Transfection was performed using conventional transfection reagents with a retroviral vector encoding GFP under the control of CMV promoter as a reporter. Treatment of ES cells with HDAC inhibitors after transfection increased population of GFP positive cells up to 180% compared with untreated control. ES cells showed normal expression of stem cell markers after treatment with HDAC inhibitors. Transgene expression was further enhanced by modifying transfection procedure. GFP positive cells selected after transfection were proved to have the stem cell properties. Our improved protocol for enhanced gene delivery and expression in mouse ES cells without hampering ES cell properties will be useful for study and application of ES cells.

Development of Indicators for Information Security Level Assessment of VoIP Service Providers

  • Yoon, Seokung;Park, Haeryong;Yoo, Hyeong Seon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.634-645
    • /
    • 2014
  • VoIP (Voice over Internet Protocol) is a technology of transmitting and receiving voice and data over the Internet network. As the telecommunication industry is moving toward All-IP environment with growth of broadband Internet, the technology is becoming more important. Although the early VoIP services failed to gain popularity because of problems such as low QoS (Quality of Service) and inability to receive calls as the phone number could not be assigned, they are currently established as the alternative service to the conventional wired telephone due to low costs and active marketing by carriers. However, VoIP is vulnerable to eavesdropping and DDoS (Distributed Denial of Service) attack due to its nature of using the Internet. To counter the VoIP security threats efficiently, it is necessary to develop the criterion or the model for estimating the information security level of VoIP service providers. In this study, we developed reasonable security indicators through questionnaire study and statistical approach. To achieve this, we made use of 50 items from VoIP security checklists and verified the suitability and validity of the assessed items through Multiple Regression Analysis (MRA) using SPSS 18.0. As a result, we drew 23 indicators and calculate the weight of each indicators using Analytic Hierarchy Process (AHP). The proposed indicators in this study will provide feasible and reliable data to the individual and enterprise VoIP users as well as the reference data for VoIP service providers to establish the information security policy.

Effects of Fit Factor and Visual Acuity of Eyeglasses Wearers when Wearing Particulate Filtering Facepiece Respirators (안경착용자 방진마스크 착용 시 밀착계수와 착용시력에 미치는 영향)

  • Eoh, Won Souk;Shin, Chang Sup
    • Journal of the Korean Society of Safety
    • /
    • v.35 no.3
    • /
    • pp.105-115
    • /
    • 2020
  • This study compares the difference of fit factors (FF) and visual acuity according to masks and eyeglasses preferences for 54 participants. We the precautions and behaviors of discomfort when wearing masks of eyewear wearers. Contact lens discomfort and priority action of complaints was investigated Glasses fitting factors is Optical Center Height(OH), Vertex Distance(VD) and Pantoscopic Angle(PA). We measured those factors and expressed by the ratio of standard point and change point. Quantitative fit factor was measured by Portacount Pro+ 8038. Also, we selected to 6 exercises among 8 exercises OSHA QNFT (Quantitative Fit testing) protocol to measure the fit factors. The pass/ fail criterion of FF was set at 100. Visual acuity(VA) test chart is developed by Chunsuk Han was used, Descriptive statistics was performed. Descriptive statistics(SAS ver 9.2), it is used geometric means, Wilcoxon analysis(P=0.05) When wearing the mask preferentially, fit factor(FF) was high according to the step of glasses fitting parameter. on the other hand, when the glasses first choice, the visual acuity(VA) was high. there was no significant difference. In the case of fit factor (FF), mask first choice/ glasses first choice is OH (p=0.671/ p=0.332), VD (p=0.602/ p=0.571) and PA (p=0.549/ p=0.607). Visual acuity (VA), mask first choice/ glasses first choice is OH (p=0.753/ p=0.386), VD (p=0.815/ p=0.557) and PA (p=0.856/ p=0.562). The workers of workplace and office chose glasses but occupational health workers and students chose mask. In case of discomforts, it was suggested to remove the mask and tolerate discomforts. The main discomforts and usual action of lens were dryness, hyperemia, foreign body sensation, ophthalmodynia, decreased vision and glasses wearing. Therefore, it is necessary to develop a mask wearing method education program considering glasses fitting and develop a hybrid model that minimizes inconvenience when wearing glasses and a mask at the same time.

The Design of an Infrared Transcutaneous Control Unit for Totally Implantable Middle Ear System (완전 이식형 인공중이를 위한 체외 및 체내 제어시스템 구현)

  • 정의성;강호경;박일용;윤영호;김민규;송병섭;원철호;조진호
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.41 no.5
    • /
    • pp.71-78
    • /
    • 2004
  • An infrared remote control-type transcutaneous control device using a $\mu$-processor is design for the totally implantable middle ear system. An infrared light transmission model for the tissue of skin was introduced and then a radiant intensity and the required current of the infrared light emitting diode(IR LED) driving circuit at transmission part were calculated for the external control device. And the transmission part generates IR signal by the system's own data protocol which prevents interferences from other infrared remote controls of the household appliances. The control part of the implanted device was designed to analyze functions of the received infrared(IR) signal that indicate the power ON/OFF and volume UP/DOWN. After the system is implemented, a data transmission experiments using 4 mm thickness of porcine skin were carried out. From the experiment, it was verified that the infrared control signal was transmitted to receiving module of the implemented system without any error.

Public Key based LR-WPAN Security Algorithm (공개키 방식의 LR-WPAN 보안 알고리즘)

  • Kim, Jin-Cheol;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.54-67
    • /
    • 2006
  • Low Rate WPAN (Wireless Personal Area Network) designed for low power and low cost wireless communication is an important technology to realize ubiquitous environment. IEEE 802.15.4 and ZigBee Alliance recommend the SKKE (Symmetric-Key Key Establishment) protocol for key establishment and management. The SKKE algorithm has security weakness such as the absence of authentication process or electric signature in key generation and exchange when devices join the role of coordinators. In this paper, we propose new key establishment and security algorithm based on public key encryption to solve low rate WPAN security problems. Also, to improve PLC AMR system's weaknesses in communication reliability and security, we propose a new AMR system model based on IEEE 802.15.4 and we apply our security algorithm to AMR profile for security enhancement.

Link-wirelength-aware Topology Generation for High Performance Asynchronous NoC Design (링크 도선 길이를 고려한 고성능 비동기식 NoC 토폴로지 생성 기법)

  • Kim, Sang Heon;Lee, Jae Sung;Lee, Jae Hoon;Han, Tae Hee
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.8
    • /
    • pp.49-58
    • /
    • 2016
  • In designing heterogeneous architecture based application-specific network-on-chips (NoCs), the opportunities of performance improvement would be expanded when applying asynchronous on-chip communication protocol. This is because the wire latency can be configured independently considering the wirelength of each link. In this paper, we develop the delay model of link-wire-length in asynchronous NoC and propose simulated annealing (SA) based floorplan-aware topology generation algorithm to optimize link-wirelengths. Incorporating the generated topology and the associated latency values across all links, we evaluate the performance using the floorplan-annotated sdf (standard delay format) file and RTL-synthesized gate-level netlist. Compared to TopGen, one of general topology generation algorithms, the experimental results show the reduction in latency by 13.7% and in execution time by 11.8% in average with regards to four applications.

Application of Buoyant Density Centrifugation Method for the Rapid Detection of Feline Calicivirus in Oyster and Lettuce as Norovirus Surrogate

  • Cho, Yun-Sik;Lee, Kang-Whie;Jang, Keum-Il;Ahn, Jun-Bae;Kim, Kwang-Yup
    • Food Science and Biotechnology
    • /
    • v.17 no.5
    • /
    • pp.925-930
    • /
    • 2008
  • Norovirus has become the most common cause of human gastroenteritis in developed countries. Detection procedures of foodborne viruses from foods require several steps. The concentration step using polyethylene glycol (PEG) is time-consuming and the detection efficiency of reverse transcription-polymerase chain reaction (RT-PCR) is affected by inhibitors from food components. In this study, a rapid detection method based on buoyant density centrifugation was developed to replace the time-consuming chloroform-polyethylene glycol-Tris Tween method. Feline calicivirus that belongs to the family Caliciviridae was used as a surrogate model for norovirus. After artificial inoculation of feline calcivirus (FCV) to oyster and lettuce, 830 ${\mu}L$ of homogenized sample suspension was layered on the top of 670 ${\mu}L$ 20% percoll and centrifuged. Then RNA extraction step was proceeded with the supernatant. By varying several physical conditions, the detection limits were lowered to $2.4{\times}10^2$ PFU per 1 g in oyster and $2.4{\times}10^0$ PFU per 1 g in lettuce. The protocol obtained in this study could be used to develop new detection method for norovirus in foods.

Evaluation of Factors that Can Affect Protective Immune Responses Following Oral Immunization of Recombinant Helicobacter pylori Urease Apoenzyme

  • Kim, Jang-Seoung;Chang, Ji-Hoon;Park, Eun-Jeong;Chung, Soo-Il;Yum, Jung-Sun
    • Journal of Microbiology and Biotechnology
    • /
    • v.10 no.6
    • /
    • pp.865-872
    • /
    • 2000
  • Helocobacter phylori is the major cause of gastritis, peptic ulcer, and a principal risk factor for gastric cancer. As the firs step towards a vaccine against H. pylori infection, Hy.pylori urease was expressed and purified as a recombinant apoenzyme (rUrease) in E. coli. In order to develop an effective immunization protocol using rUrease, the host immune responses were evaluated after the oral immunization of mice with rUrease preparations plus cholera toxin relative to various conditions, such as the physical nature of the antigen, the frequency of the booster immunization, the dose of the antigen, and the route of administration. The protective efficacy was assessed using a quantitative culture following an H. pylori SS1 challenge. It was demonstrated that rUrease, due to its particulated nature, was more superior than the UreB subunit as a vaccine antigen. The oral immunization of rUrease elicited significant systemic and secretory antibody responses, and activated predominantly Th2-type cellular responses. The bacterial colonization was significantly reduced (~100-fold) in those mice immunized with three or four weekly oran doses of rUrease plus cholera toxin (p<0.05), when compared to the non-immunized/challenged controls. The protection correlated well with the elicited secretory IgA level against rUrease, and these secretory antibody responses were highly dependent on the frequency of the booster immunization, yet unaffected by the dose of the antigen (25-200$\mu\textrm{g}$). These results demonstrate the remarkable potential of rUrease as a vaccine antigen, thereby strengthening the possibility of developing an H. pylori vaccine for humans.

  • PDF

Using ranked auxiliary covariate as a more efficient sampling design for ANCOVA model: analysis of a psychological intervention to buttress resilience

  • Jabrah, Rajai;Samawi, Hani M.;Vogel, Robert;Rochani, Haresh D.;Linder, Daniel F.;Klibert, Jeff
    • Communications for Statistical Applications and Methods
    • /
    • v.24 no.3
    • /
    • pp.241-254
    • /
    • 2017
  • Drawing a sample can be costly or time consuming in some studies. However, it may be possible to rank the sampling units according to some baseline auxiliary covariates, which are easily obtainable, and/or cost efficient. Ranked set sampling (RSS) is a method to achieve this goal. In this paper, we propose a modified approach of the RSS method to allocate units into an experimental study that compares L groups. Computer simulation estimates the empirical nominal values and the empirical power values for the test procedure of comparing L different groups using modified RSS based on the regression approach in analysis of covariance (ANCOVA) models. A comparison to simple random sampling (SRS) is made to demonstrate efficiency. The results indicate that the required sample sizes for a given precision are smaller under RSS than under SRS. The modified RSS protocol was applied to an experimental study. The experimental study was designed to obtain a better understanding of the pathways by which positive experiences (i.e., goal completion) contribute to higher levels of happiness, well-being, and life satisfaction. The use of the RSS method resulted in a cost reduction associated with smaller sample size without losing the precision of the analysis.