• Title/Summary/Keyword: 침입자

Search Result 543, Processing Time 0.024 seconds

Realtime Attention System of Autonomous Virtual Character using Image Feature Map (시각적 특징 맵을 이용한 자율 가상 캐릭터의 실시간 주목 시스템)

  • Cha, Myaung-Hee;Kim, Ky-Hyub;Cho, Kyung-Eun;Um, Ky-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.5
    • /
    • pp.745-756
    • /
    • 2009
  • An autonomous virtual character can conduct itself like a human after recognizing and interpreting the virtual environment. Artificial vision is mainly used in the recognition of the environment for a virtual character. The present artificial vision that has been developed takes all the information at once from everything that comes into view. However, this can reduce the efficiency and reality of the system by saving too much information at once, and it also causes problems because the speed slows down in the dynamic environment of the game. Therefore, to construct a vision system similar to that of humans, a visual observation system which saves only the required information is needed. For that reason, this research focuses on the descriptive artificial intelligence engine which detects the most important information visually recognized by the character in the virtual world and saves it into the memory by degrees. In addition, a visual system is constructed in accordance with an image transaction theory to make it sense and recognize human feelings. This system finds the attention area of moving objects quickly and effectively through the experiment of the virtual environment with three dynamic dimensions. Also the experiment enhanced processing speed more than 1.6 times.

  • PDF

Effects of Exposure to Vitrification Solution on Maturation, Fertilization and Development of Immature Porcine Oocytes In Vitro (유리화 동결액 노출이 돼지 미성숙 난포란의 성숙율, 수정율 및 배발달율에 미치는 영향)

  • Choi I. K.;Seok S. H.;Kim K. S.;Song H. B.
    • Reproductive and Developmental Biology
    • /
    • v.28 no.3
    • /
    • pp.173-179
    • /
    • 2004
  • This study was conducted to investigate the toxi-cological effects of different vitrification solution on development of immature porcine oocytes in vitro. Oocytes were exposed to EFS solution [40% ethylene glycol (EG) + 18% Ficoll + 0.3M sucrose], ES solution (5.5M EG + 1.0M sucrose) or GE solution [10% glycol (G) + 20% EG], and these oocytes were transferred to sucrose solution directly. Maturation rates were significantly (P<0.05) higher in the ES solution (44.5%) and control (57.6%) than in the EFS solution (38.8%) and GE solution (22.4%). No differences among three solution were found in fertilization rates. Cleavage rates was significantly (P<0.05) higher in the ES solution (47.1%) and control (65.9%) than in the EFS solution (21.9%) and GE solution (19.0%), but no difference among three solutions was found in the blastocyst formation rates. These results indicate that combination of EG and sucrose solutions had effects on development of immature porcine oocytes.

Nitric Oxide: The Pathophysiological Roles and Clinical Implications in Circulatory System (순환계에서 Nitric Oxide의 생리-병리학적 역할과 그 임상적 의의)

  • Lee, K.Y.
    • Journal of Yeungnam Medical Science
    • /
    • v.13 no.2
    • /
    • pp.159-172
    • /
    • 1996
  • 대기오염물질이면서 동시에 생체내 화학반응의 산물이기도 한 nitric oxide(NO)는 그 생체내 분포가 광범위하고 생리적 역할이 다양하여, 최근의 생명과학 분야에서 가장 크게 주목받는 몇가지 연구대상 중 하나이다. 세포에서의 NO 산생은 nitric oxide synthase (NOS)에 의해 촉매되는데, 이들은 brain form (bNOS, neuronal; nNOS, NOS I), inducible form (iNOS), 및 endothelial form(eNOS)로 구분되는데, 이중 bNOS(nNOS)와 eNOS는 inducible form에 대비되는 constitutive form(cNOS)에 해당하므로 각각 ncNOS 와 ecNOS로도 불리운다. NOS는 아미노산인 L-arginine을 산소와 결합시켜 L-citrulline으로 변환시키면서 NO를 유리하고, 이 NO는 세포내의 guanylate cyclase를 활성화하여 cyclic GMP를 생산하거나, superoxide(O2-) 및 수소이온과 차례로 결합하여 반응성이 매우 높은 수산화기(-OH)를 발생시켜 세포독작용을 유발하기도 한다. 정상상태에서 뇌혈관내피세포의 ecNOS로 부터 유리된 NO는 혈관을 확장시켜 신경세포에 대한 산소공급을 원활히 유지해 주지만, 순환장애를 일으켰을 때는 뇌조직내의 iNOS로부터 대량의 NO가 유출되어 신경세포의 손상을 가져온다. 호흡기에서는 NO가 기도평활근을 이완시키고 폐혈류를 개선하므로, 미숙아나 성인의 호흡장애시에 소량의 NO를 흡입시키면 oxygenation을 호전시킬 수 있다. 그러나 대기오염이나 흡연 등으로 대량의 NO를 흡입할 경우 치명적인 폐부종이나 methemoglobin혈종을 일으킬 수 있다. 순환계에서는 cNOS가 혈관을 확장시켜 조직의 혈류를 유지하는데 일익을 담당한다. 세균내 독소(lipopolysaccharide; LPS)나 각종 명역조절물질들이 혈관내피세포와 혈관평활근세포로 부터 과다한 NO를 유리시키면 혈압이 급격히 떨어져 순환허탈상태에 빠지게 된다. 심장에서는 관상혈관 내피세포의 eNOS가 심근의 혈류를 유지해 주지만 허혈이나 세균내독소 또는 면역조절물질 등에 의하여 심근세포나 침윤된 대식세포의 iNOS로 부터 과량의 NO가 유리되면 심근세포의 손상이 초래된다. 신장에서는 내피세포의 cNOS에 의하여 사구체여과가 조절되고 있는데, 세균내독소나 면역 조절물질 등에 의하여 사구체관막세포(mesangial cell)등의 iNOS로 부터 과량의 NO가 유리되면 신조직과 사구체의 손상을 초래한다. 위와 같이 대부분의 장기에서 ecNOS는 조직의 혈류를 유지하는 역할을 하며, iNOS는 애초 세균 등 침입자에 대한 세포독작용이 그 존재 목적이라고 풀이할 수 있겠으나 일종의 부작용으로 자체조직의 손상을 초래하게 되는 것으로 본다. 따라서 NO와 관련된 각종 병변의 치료를 위해서는 NOS의 비선택성 억제제인 arginine 유도체 보다는 iNOS에 대한 선택적 억제제인 S-methylisothiourea(SMT), aminoethylisothiourea(AETU), aminoguanidine (AMG), agmatine, L-canavanine, transforming growth factor b1(TGF-b1) 등의 사용을 검토해 보는 것이 타당할 것으로 사료된다.

  • PDF

Overview of Preventive Measures against Invasive Alien Species in Korea and Suggestions for their Improvement (침입외래생물의 사전예방 제도 및 개선방향)

  • Kil, Jihyon;Kim, Chang-Gi
    • Korean Journal of Ecology and Environment
    • /
    • v.47 no.4
    • /
    • pp.239-246
    • /
    • 2014
  • To cope with the potential risks associated with invasive alien species, the Korean Government implemented the Biodiversity Act in 2014. Among the alien species not yet introduced into that country, 24 have been designated as alert species. These include mammals, birds, fish, mollusks, insects, and plants that may invade and cause serious harm to the ecosystem. Approval from the Ministry of Environment is required to import or carry any of them. Although these measures are more advanced than those from the previous legal framework, several terms still need to be improved. First, the category of alert species should cover not only those not yet introduced but also those that are being raised or cultivated at aquariums, botanical gardens, and zoos. Second, for applicants who intend to import or carry alert species, the government must provide them with detailed standards for the ecological risk assessment of alert species as well as guidelines for their safe use in Korea to prevent their unregulated release from confinement facilities into natural environments. Third, tools and protocols should be developed for early detection and rapid responses to those escapes.

Energy Efficient Clustering Algorithm for Surveillance and Reconnaissance Applications in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 감시·정찰 응용의 클러스터링 알고리즘 연구)

  • Kong, Joon-Ik;Lee, Jae-Ho;Kang, Jiheon;Eom, Doo-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1170-1181
    • /
    • 2012
  • Wireless Sensor Networks(WSNs) are used in diverse applications. In general, sensor nodes that are easily deployed on specific areas have many resource constrains such as battery power, memory sizes, MCUs, RFs and so on. Hence, first of all, the efficient energy consumption is strongly required in WSNs. In terms of event states, event-driven deliverly model (i.e. surveillance and reconnaissance applications) has several characteristics. On the basis of such a model, clustering algorithms can be mostly used to manage sensor nodes' energy efficiently owing to the advantages of data aggregations. Since a specific node collects packets from its child nodes in a network topology and aggregates them into one packet to relay them once, amount of transmitted packets to a sink node can be reduced. However, most clustering algorithms have been designed without considering can be reduced. However, most clustering algorithms have been designed without considering characteristics of event-driven deliverly model, which results in some problems. In this paper, we propose enhanced clustering algorithms regarding with both targets' movement and energy efficiency in order for applications of surveillance and reconnaissance. These algorithms form some clusters to contend locally between nodes, which have already detected certain targets, by using a method which called CHEW (Cluster Head Election Window). Therefore, our proposed algorithms enable to reduce not only the cost of cluster maintenance, but also energy consumption. In conclusion, we analyze traces of the clusters' movements according to targets' locations, evaluate the traces' results and we compare our algorithms with others through simulations. Finally, we verify our algorithms use power energy efficiently.

Reinforcement Mining Method for Anomaly Detection and Misuse Detection using Post-processing and Training Method (이상탐지(Anomaly Detection) 및 오용탐지(Misuse Detection) 분석의 정확도 향상을 위한 개선된 데이터마이닝 방법 연구)

  • Choi Yun-Jeong;Park Seung-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06b
    • /
    • pp.238-240
    • /
    • 2006
  • 네트워크상에서 발생하는 다양한 형태의 대량의 데이터를 정확하고 효율적으로 분석하기 위해 설계되고 있는 마이닝 시스템들은 목표지향적으로 훈련데이터들을 어떻게 구축하여 다룰 것인지에 대한 문제보다는 대부분 얼마나 많은 데이터 마이닝 기법을 지원하고 이를 적용할 수 있는지 등의 기법에 초점을 두고 있다. 따라서, 점점 더 에이전트화, 분산화, 자동화 및 은닉화 되는 최근의 보안공격기법을 정확하게 탐지하기 위한 방법은 미흡한 실정이다. 본 연구에서는 유비쿼터스 환경 내에서 발생 가능한 문제 중 복잡하고 지능화된 침입패턴의 탐지를 위해 데이터 마이닝 기법과 결함허용방법을 이용하는 개선된 학습알고리즘과 후처리 방법에 의한 RTPID(Refinement Training and Post-processing for Intrusion Detection)시스템을 제안한다. 본 논문에서의 RTPID 시스템은 active learning과 post-processing을 이용하여, 네트워크 내에서 발생 가능한 침입형태들을 정확하고 효율적으로 다루어 분석하고 있다. 이는 기법에만 초점을 맞춘 기존의 데이터마이닝 분석을 개선하고 있으며, 특히 제안된 분석 프로세스를 진행하는 동안 능동학습방법의 장점을 수용하여 학습효과는 높이며 비용을 감소시킬 수 있는 자가학습방법(self learning)방법의 효과를 기대할 수 있다. 이는 관리자의 개입을 최소화하는 학습방법이면서 동시에 False Positive와 False Negative 의 오류를 매우 효율적으로 개선하는 방법으로 기대된다. 본 논문의 제안방법은 분석도구나 시스템에 의존하지 않기 때문에, 유사한 문제를 안고 있는 여러 분야의 네트웍 환경에 적용될 수 있다.더욱 높은성능을 가짐을 알 수 있다.의 각 노드의 전력이 위험할 때 에러 패킷을 발생하는 기법을 추가하였다. NS-2 시뮬레이터를 이용하여 실험을 한 결과, 제안한 기법이 AOMDV에 비해 경로 탐색 횟수가 최대 36.57% 까지 감소되었음을 알 수 있었다.의 작용보다 더 강력함을 시사하고 있다.TEX>로 최고값을 나타내었으며 그 후 감소하여 담금 10일에는 $1.61{\sim}2.34%$였다. 시험구간에는 KKR, SKR이 비교적 높은 값을 나타내었다. 무기질 함량은 발효기간이 경과할수록 증하였고 Ca는 $2.95{\sim}36.76$, Cu는 $0.01{\sim}0.14$, Fe는 $0.71{\sim}3.23$, K는 $110.89{\sim}517.33$, Mg는 $34.78{\sim}122.40$, Mn은 $0.56{\sim}5.98$, Na는 $0.19{\sim}14.36$, Zn은 $0.90{\sim}5.71ppm$을 나타내었으며, 시험구별로 보면 WNR, BNR구가 Na만 제외한 다른 무기성분 함량이 가장 높았다.O to reduce I/O cost by reusing data already present in the memory of other nodes. Finally, chunking and on-line compression mechanisms are included in both models. We demonstrate that we can obtain significantly high-performanc

  • PDF

An Efficient Method of Forensics Evidence Collection at the Time of Infringement Occurrence (호스트 침해 발생 시점에서의 효율적 Forensics 증거 자료 수집 방안)

  • Choi Yoon-Ho;Park Jong-Ho;Kim Sang-Kon;Kang Yu;Choe Jin-Gi;Moon Ho-Gun;Rhee Myung-Su;Seo Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.69-81
    • /
    • 2006
  • The Computer Forensics is a research area that finds the malicious users by collecting and analyzing the intrusion or infringement evidence of computer crimes such as hacking. Many researches about Computer Forensics have been done so far. But those researches have focussed on how to collect the forensic evidence for both analysis and poofs after receiving the intrusion or infringement reports of hosts from computer users or network administrators. In this paper, we describe how to collect the forensic evidence of good quality from observable and protective hosts at the time of infringement occurrence by malicious users. By correlating the event logs of Intrusion Detection Systems(IDSes) and hosts with the configuration information of hosts periodically, we calculate the value of infringement severity that implies the real infringement possibility of the hosts. Based on this severity value, we selectively collect the evidence for proofs at the time of infringement occurrence. As a result, we show that we can minimize the information damage of the evidence for both analysis and proofs, and reduce the amount of data which are used to analyze the degree of infringement severity.

Floristic study of Mt. Jaamsan in the Gyeongsang supergroup, Korea (경상누층군 자암산의 관속식물상)

  • Kim, Jung-Hyun;Park, Hwan-Joon;Nam, Gi-Heum;Lee, Kyeong-Ui;Kim, Jin-Seok
    • Korean Journal of Environmental Biology
    • /
    • v.37 no.3
    • /
    • pp.229-248
    • /
    • 2019
  • This study was carried out to investigate the flora of Mt. Jaamsan on the Gyeongsang supergroup, Korea. From the results of eight field surveys from March to October 2017, we have identified 530 total taxa, representing 483 species, eight subspecies, 35 varieties, two forms, and two hybrids, which were placed in 325 genera and 110 families. The plant formation of Mt. Jaamsan is the deciduous broad-leaved and conifer mixed forests, which are the common ones in the middle part of the Korean Peninsula. Most of the mountain is covered with young secondary forest, which is mainly composed of Quercus spp., and Pinus. Out of these 530 taxa, 12 are endemic to Korea, 17 taxa are listed on the Korean Red List of threatened species, 65 are floristic target species, and 55 are invasive alien species. The percentage of naturalized index(NI) and urbanization index (UI) were 10.4% and 17.2%, respectively. Mt. Jaamsan has a high plant diversity, including endemic and rare species, which consist of geomorphological landscapes. We considered that the composition and distribution of species are affected by the different environmental factors according to the sedimentary rocks, drying ridges, valleys, and streams. Together with the rocks and soils were the substrate type that play a major role in providing the unique habitats for sun plants in the area.

Method of Detecting and Isolating an Attacker Node that Falsified AODV Routing Information in Ad-hoc Sensor Network (애드혹 센서 네트워크에서 AODV 라우팅 정보변조 공격노드 탐지 및 추출기법)

  • Lee, Jae-Hyun;Kim, Jin-Hee;Kwon, Kyung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2293-2300
    • /
    • 2008
  • In ad-hoc sensor network, AODV routing information is disclosed to other nodes because AODV protocol doesn't have any security mechanisms. The problem of AODV is that an attacker can falsify the routing information in RREQ packet. If an attacker broadcasts the falsified packet, other nodes will update routing table based on the falsified one so that the path passing through the attacker itself can be considered as a shortest path. In this paper, we design the routing-information-spoofing attack such as falsifying source sequence number and hop count fields in RREQ packet. And we suggest an efficient scheme for detecting the attackers and isolating those nodes from the network without extra security modules. The proposed scheme doesn't employ cryptographic algorithm and authentication to reduce network overhead. We used NS-2 simulation to evaluate the network performance. And we analyzed the simulation results on three cases such as an existing normal AODV, AODV under the attack and proposed AODV. Simulation results using NS2 show that the AODV using proposed scheme can protect the routing-information-spoofing attack and the total n umber of received packets for destination node is almost same as the existing norm at AODV.

Ecological Studies on the Penaeus orientalis Kishinoue Cultured in a Pond Filled with Sea Water 1. Growth Rata as Related to the Substrate Materials, Survival Rate, Predator of P. orientalis, and Water Conditions of Culturing Pond (해수지에서 사육되는 대하의 생태학적 연구 1. 저질에 따른 성장률, 천적 및 수질조건에 관한 연구)

  • CHOI Ki-Chul;SONG Yong-Kyoo
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.4 no.2
    • /
    • pp.47-54
    • /
    • 1971
  • The difference in growth rate of p. orientalis cultured on muddy bottom region and sandy bottom region in a pond filled with sea water were studied. For the investigation of the growth rate, the body length and the body weight were determined. Five individuals from each experimental region were sampled in random. The samples were collected at ten-day intervals. The survival rate, the qredator of p. orientalis, and the water conditions during the experimental period were also determined. The results in this study are summerized as follows: 1. The growth rate of p. orientalis which was cultured in the muddy bottom region was greater than that in the sandy bottom region. This is attributable in either case regardless of whether they were cultured with or without food, 2. The relationship between the culturing period (X) and the body length (Y) is : Muddy bottom, Food Y=0.58497X+25.05210 Sandy bottom, Food Y=0.51030X+26.57900 Muddy bottom, No food Y=0.22352X+32.79360 Sandy bottom, No food Y=0.l1418X+31.20740 3. The relationship between the culturing period (X) and the body weight (Y) is : Muddy bottom, Food Y=0.09062X-2.11140 Sandy bottom, Food Y=0.06992X-1.19640 Muddy bottom, No food Y=0.01615X+0.51150 Sandy bottom, No food Y=0.00495X+0.56150 4. When the predator is not present, $84\%$ of P. orientalis may survive. 5. Acanthogobius flavimanus is one of the predator of P. orientalis. 6. It is considered that the variation of water conditions of the pond, in which water had been exchanged 12 times per month, did not affect to the survival rate of P. orientalis.

  • PDF