• Title/Summary/Keyword: Ad Creation

Search Result 27, Processing Time 0.029 seconds

Supplements an Initial Creation and User Addition in VANET Cloud Architecture (초기 생성과 사용자 추가를 고려한 VANET 클라우드 아키텍처)

  • Kim, Taehyeong;Song, JooSeok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.12
    • /
    • pp.449-454
    • /
    • 2014
  • While the era of driverless car has come, Vehicular Ad hoc NETwork(VANET) is getting important. Original VANET has a limit that cannot use computation power, storage space of On Board Unit(OBU) installed in a vehicle efficiently. VANET cloud computing(VCC) solves the limit to focus on using abilities of each vehicle. This article proposes VCC architecture for supplementing user addition and initial cloud creation that have been researched insufficiently.

A Study on Efficient Routing and Authentication Scheme in Ad-Hoc Environment (Ad-Hoc환경에서 효율적인 라우팅 및 인증 기술에 관한 연구)

  • Kang, Seo-Il;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.8
    • /
    • pp.1121-1128
    • /
    • 2008
  • Ad-Hoc network is consisted with the device of wireless communication. Therefore, the organization of network is dynamic and the changing communication channel is essential. According this, the study of secure routing route and certification technique has to be needed. In we research, we suggest not only the secure routing scheme in Ad-Hoc circumstance but also the method that user can be serviced the type of network which is connected Ad-Hoc network and wireless lam. In case of the routing form of Ad-Hoc Network, although in preexist study, when the device of organization withdraws, routing is needed, in we research, we suggest the detour route that is used hop frequency. We can offer the service of ubiquitous that the certification of secure user and the creation of routing route in Ad-Hoc network.

  • PDF

Biotechnological Approaches in Sericultural Science and Technology of Uzbekistan

  • Madyarov Shukhrat R.
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • v.11 no.1
    • /
    • pp.13-19
    • /
    • 2005
  • Biotechnological researches in Central Asian Research Institute of Sericulture were developed since 1981 when laboratory of artificial diets for mulberry silk­worm was created. The researches were directed not only to creation of accessible artificial diets (AD) for off-season mass rearing of economical beneficial insect and for industrialization of sericulture but also to obtaining of easy reproducible source of animal proteins, carbohydrates, lipids, enzymes, enzymes inhibitors and other metabolites - bioresource for manufacture of oriental medicine preparations. Space experiments with silkworms became possible with use of AD. These experiments used mulberry silkworm as high effective board test organism with outstanding developmental, reproductive and transgenic properties having impor­tant significance in future of cosmonautics. Introduction to practice of bioprotective and ecologically pure method of drying and sterilizing of green cocoons and by-products of silk manufacture allows to increase efficiency of cocoons reeling technology as well as to preserve nativity of biological active substances in mulberry silkworm pupae that is unachievable by traditional methods of raw material processing. New spheres of application of two important silk proteins - fibroin and sericin in medicine, cosmetics, for bio- and nanotechnology are opening with use of biotechnological approaches. At present the achievements and experience of R & D in these fields are used in creation of modern pests biocontrol agents. Schemes of efficient processing of cocoon raw material, by-products and wastes of sericulture and cocoon processing are devel- Institute of Physiology and Biophysics, Uzbek Academy of Sciences, I, Niyazov street, 700095, Tashkent, Uzbekistan. oped for obtaining of traditional and new consumer products.

An Effective Multi-hop Relay Algorithm in Wireless Mesh Network (무선 메쉬 네트워크 환경에서 효율적인 다중 홉 전달 기법)

  • Kim, Young-An;Park, Chul-Hyun;Hong, Choong-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.10B
    • /
    • pp.872-882
    • /
    • 2006
  • The Wireless Mesh Network uses a wireless communication technology with transmission rates similar to that of a cable, which is used as a backbone network. The topology structure is in a Mesh form which resembles an Ad-hoc network, however a metric is needed in order to set the channel and channel methods since the operation intentions and interior motions are different. This thesis proposes a metric(ETR : Expected Transmission Rate) that sets the channel with physical link performance and multi hop transmission capabilities. This metric will also be based on multi channel creation methods and Hop-by-hop routing techniques for an effective multi hop transmission with no loops.

The Necessity for Introduction of ICSID Appellate System (ICSID 상소제도의 도입 필요성)

  • Kim, Yong Il
    • Journal of Arbitration Studies
    • /
    • v.29 no.4
    • /
    • pp.187-210
    • /
    • 2019
  • This article examines the necessity for the introduction of an ICSID Appellate System. In comparison with the WTO appellate system, the ICSID ad hoc Committee has a very limited mandate. An annulment inquiry under the ICSID arbitration system barely focuses on whether the arbitral decision resulted from a justifiable process. As long as there is procedural legitimacy, the resulting awards remain unaffected under the annulment procedure, irrespective of mistakes of fact or law. In contrast, in the WTO DSS the AB substantively reviews panel rulings and suggestions that are founded on any deficiency of objectivity or error in the interpretation of a particular WTO provision. This defect intrinsic in the annulment procedure could cause injustice to a party earnestly interested in correcting recognized misapplication of law by ICSID tribunals. Accordingly, the establishment of an appellate system would result in a more substantive and procedural review of awards. The creation of such an ICSID appellate system would ensure thorough scrutiny of the decisions of the tribunal of first instance, leading to better reasoned outcomes. This could lead to a crystallization of predictability in investment relations. The end result would be that fairness, clarity, reliability, and legality in the ICSID adjudicative process would be unassailable, to the advantage of all the contracting parties.

Review on Software-Defined Vehicular Networks (SDVN)

  • Mohammed, Badiea Abdulkarem
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.376-388
    • /
    • 2022
  • The expansion of new applications and business models is being significantly fueled by the development of Fifth Generation (5G) networks, which are becoming more widely accessible. The creation of the newest intelligent vehicular networks and applications is made possible by the use of Vehicular Ad hoc Networks (VANETs) and Software Defined Networking (SDN). Researchers have been concentrating on the integration of SDN and VANET in recent years, and they have examined a variety of issues connected to the architecture, the advantages of software-defined VANET services, and the new features that can be added to them. However, the overall architecture's security and robustness are still in doubt and have received little attention. Furthermore, new security threats and vulnerabilities are brought about by the deployment and integration of novel entities and a number of architectural components. In this study, we comprehensively examine the good and negative effects of the most recent SDN-enabled vehicular network topologies, focusing on security and privacy. We examine various security flaws and attacks based on the existing SDVN architecture. Finally, a thorough discussion of the unresolved concerns and potential future study directions is provided.

Software-Defined Vehicular Networks (SDVN)

  • Al-Mekhlafi, Zeyad Ghaleb
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.231-243
    • /
    • 2022
  • The expansion of new applications and business models is being significantly fueled by the development of Fifth Generation (5G) networks, which are becoming more widely accessible. The creation of the newest intelligent vehicular net- works and applications is made possible by the use of Vehicular Ad hoc Networks (VANETs) and Software Defined Networking (SDN). Researchers have been concentrating on the integration of SDN and VANET in recent years, and they have examined a variety of issues connected to the architecture, the advantages of software defined VANET services, and the new features that can be added to them. However, the overall architecture's security and robustness are still in doubt and have received little attention. Furthermore, new security threats and vulnerabilities are brought about by the deployment and integration of novel entities and several architectural components. In this study, we comprehensively examine the good and negative effects of the most recent SDN-enabled vehicular network topologies, focusing on security and privacy. We examine various security flaws and attacks based on the existing SDVN architecture. Finally, a thorough discussion of the unresolved concerns and potential future study directions is provided.

Perceptional Change of a New Product, DMB Phone

  • Kim, Ju-Young;Ko, Deok-Im
    • Journal of Global Scholars of Marketing Science
    • /
    • v.18 no.3
    • /
    • pp.59-88
    • /
    • 2008
  • Digital Convergence means integration between industry, technology, and contents, and in marketing, it usually comes with creation of new types of product and service under the base of digital technology as digitalization progress in electro-communication industries including telecommunication, home appliance, and computer industries. One can see digital convergence not only in instruments such as PC, AV appliances, cellular phone, but also in contents, network, service that are required in production, modification, distribution, re-production of information. Convergence in contents started around 1990. Convergence in network and service begins as broadcasting and telecommunication integrates and DMB(digital multimedia broadcasting), born in May, 2005 is the symbolic icon in this trend. There are some positive and negative expectations about DMB. The reason why two opposite expectations exist is that DMB does not come out from customer's need but from technology development. Therefore, customers might have hard time to interpret the real meaning of DMB. Time is quite critical to a high tech product, like DMB because another product with same function from different technology can replace the existing product within short period of time. If DMB does not positioning well to customer's mind quickly, another products like Wibro, IPTV, or HSPDA could replace it before it even spreads out. Therefore, positioning strategy is critical for success of DMB product. To make correct positioning strategy, one needs to understand how consumer interprets DMB and how consumer's interpretation can be changed via communication strategy. In this study, we try to investigate how consumer perceives a new product, like DMB and how AD strategy change consumer's perception. More specifically, the paper segment consumers into sub-groups based on their DMB perceptions and compare their characteristics in order to understand how they perceive DMB. And, expose them different printed ADs that have messages guiding consumer think DMB in specific ways, either cellular phone or personal TV. Research Question 1: Segment consumers according to perceptions about DMB and compare characteristics of segmentations. Research Question 2: Compare perceptions about DMB after AD that induces categorization of DMB in direction for each segment. If one understand and predict a direction in which consumer perceive a new product, firm can select target customers easily. We segment consumers according to their perception and analyze characteristics in order to find some variables that can influence perceptions, like prior experience, usage, or habit. And then, marketing people can use this variables to identify target customers and predict their perceptions. If one knows how customer's perception is changed via AD message, communication strategy could be constructed properly. Specially, information from segmented customers helps to develop efficient AD strategy for segment who has prior perception. Research framework consists of two measurements and one treatment, O1 X O2. First observation is for collecting information about consumer's perception and their characteristics. Based on first observation, the paper segment consumers into two groups, one group perceives DMB similar to Cellular phone and the other group perceives DMB similar to TV. And compare characteristics of two segments in order to find reason why they perceive DMB differently. Next, we expose two kinds of AD to subjects. One AD describes DMB as Cellular phone and the other Ad describes DMB as personal TV. When two ADs are exposed to subjects, consumers don't know their prior perception of DMB, in other words, which subject belongs 'similar-to-Cellular phone' segment or 'similar-to-TV' segment? However, we analyze the AD's effect differently for each segment. In research design, final observation is for investigating AD effect. Perception before AD is compared with perception after AD. Comparisons are made for each segment and for each AD. For the segment who perceives DMB similar to TV, AD that describes DMB as cellular phone could change the prior perception. And AD that describes DMB as personal TV, could enforce the prior perception. For data collection, subjects are selected from undergraduate students because they have basic knowledge about most digital equipments and have open attitude about a new product and media. Total number of subjects is 240. In order to measure perception about DMB, we use indirect measurement, comparison with other similar digital products. To select similar digital products, we pre-survey students and then finally select PDA, Car-TV, Cellular Phone, MP3 player, TV, and PSP. Quasi experiment is done at several classes under instructor's allowance. After brief introduction, prior knowledge, awareness, and usage about DMB as well as other digital instruments is asked and their similarities and perceived characteristics are measured. And then, two kinds of manipulated color-printed AD are distributed and similarities and perceived characteristics for DMB are re-measured. Finally purchase intension, AD attitude, manipulation check, and demographic variables are asked. Subjects are given small gift for participation. Stimuli are color-printed advertising. Their actual size is A4 and made after several pre-test from AD professionals and students. As results, consumers are segmented into two subgroups based on their perceptions of DMB. Similarity measure between DMB and cellular phone and similarity measure between DMB and TV are used to classify consumers. If subject whose first measure is less than the second measure, she is classified into segment A and segment A is characterized as they perceive DMB like TV. Otherwise, they are classified as segment B, who perceives DMB like cellular phone. Discriminant analysis on these groups with their characteristics of usage and attitude shows that Segment A knows much about DMB and uses a lot of digital instrument. Segment B, who thinks DMB as cellular phone doesn't know well about DMB and not familiar with other digital instruments. So, consumers with higher knowledge perceive DMB similar to TV because launching DMB advertising lead consumer think DMB as TV. Consumers with less interest on digital products don't know well about DMB AD and then think DMB as cellular phone. In order to investigate perceptions of DMB as well as other digital instruments, we apply Proxscal analysis, Multidimensional Scaling technique at SPSS statistical package. At first step, subjects are presented 21 pairs of 7 digital instruments and evaluate similarity judgments on 7 point scale. And for each segment, their similarity judgments are averaged and similarity matrix is made. Secondly, Proxscal analysis of segment A and B are done. At third stage, get similarity judgment between DMB and other digital instruments after AD exposure. Lastly, similarity judgments of group A-1, A-2, B-1, and B-2 are named as 'after DMB' and put them into matrix made at the first stage. Then apply Proxscal analysis on these matrixes and check the positional difference of DMB and after DMB. The results show that map of segment A, who perceives DMB similar as TV, shows that DMB position closer to TV than to Cellular phone as expected. Map of segment B, who perceive DMB similar as cellular phone shows that DMB position closer to Cellular phone than to TV as expected. Stress value and R-square is acceptable. And, change results after stimuli, manipulated Advertising show that AD makes DMB perception bent toward Cellular phone when Cellular phone-like AD is exposed, and that DMB positioning move towards Car-TV which is more personalized one when TV-like AD is exposed. It is true for both segment, A and B, consistently. Furthermore, the paper apply correspondence analysis to the same data and find almost the same results. The paper answers two main research questions. The first one is that perception about a new product is made mainly from prior experience. And the second one is that AD is effective in changing and enforcing perception. In addition to above, we extend perception change to purchase intention. Purchase intention is high when AD enforces original perception. AD that shows DMB like TV makes worst intention. This paper has limitations and issues to be pursed in near future. Methodologically, current methodology can't provide statistical test on the perceptual change, since classical MDS models, like Proxscal and correspondence analysis are not probability models. So, a new probability MDS model for testing hypothesis about configuration needs to be developed. Next, advertising message needs to be developed more rigorously from theoretical and managerial perspective. Also experimental procedure could be improved for more realistic data collection. For example, web-based experiment and real product stimuli and multimedia presentation could be employed. Or, one can display products together in simulated shop. In addition, demand and social desirability threats of internal validity could influence on the results. In order to handle the threats, results of the model-intended advertising and other "pseudo" advertising could be compared. Furthermore, one can try various level of innovativeness in order to check whether it make any different results (cf. Moon 2006). In addition, if one can create hypothetical product that is really innovative and new for research, it helps to make a vacant impression status and then to study how to form impression in more rigorous way.

  • PDF

Apoptotic Pathway Induced by Dominant Negative ATM Gene in CT-26 Colon Cancer Cells (CT-26 대장암 세포에서 Dominant Negative ATM 유전자에 의하여 유도되는 세포자멸사의 경로)

  • Lee, Jung Chang;Yi, Ho Keun;Kim, Sun Young;Lee, Dae Yeol;Hwang, Pyoung Han;Park, Jin Woo
    • Clinical and Experimental Pediatrics
    • /
    • v.46 no.7
    • /
    • pp.679-686
    • /
    • 2003
  • Purpose : Ataxia telangiectasia mutated(ATM) is involved in DNA damage responses at different cell cycle checkpoints, and signalling pathways associated with regulation of apoptosis in response to ionizing radiation(IR). However, the signaling pathway that underlies IR-induced apoptosis in ATM cells has remained unknown. The purpose of this study was, therefore, to investigate the apoptotic pathway that underlies IR-induced apoptosis in a CT-26 cells expressing dominant negative ATM (DN-ATM). Methods : We generated a replication-deficient recombinant adenovirus encoding the DN-ATM(Ad/DN-ATM) or control adenovirus encoding no transgene(Ad/GFP) and infected adenovirus to CT-26 cells. After infection, we examined apoptosis and apoptotic pathway by [$^3H$]-thymidine assay, DNA fragmentation, and Western immunoblot analysis. Results : DN-ATM gene served as the creation of AT phenotype in a CT-26 cells as revealed by decreased cell proliferations following IR. In addition, IR-induced apoptosis was regulated through the reduced levels of the anti-apoptotic protein Bcl-2, the increased levels of the apoptotic protein Bax, and the activation of caspase-9, caspase-3, and PARP. Conclusion : These results indicate that the pathway of IR-induced apoptosis in CT-26 cells expressing DN-ATM is mediated by mitochondrial signaling pathway involving the activation of caspase 9, caspase 3, and PARP.

Authority Delegation Scheme for Secure Social Community Creation in Community-Based Ubiquitous Networks (커뮤니티 기반의 유비쿼터스 네트워크 환경에서 안전한 커뮤니티 생성 권한 위임 방안)

  • Roh, Hyo-Sun;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.91-98
    • /
    • 2010
  • This paper proposes authority delegation for secure social community creation and mutual authentication scheme between the community members using proxy signature in community-based ubiquitous networks. In community-based ubiquitous network, User's context-awareness information is collected and used to provide context-awareness network service and application service for someone who need it. For the many reason, i.e. study, game, information sharing, business and conference, social community could be created by members of a social group. However, in community-based ubiquitous network, this kind of the context-awareness information could be abused and created by a malicious nodes for attack the community. Also, forgery community could be built up to attack the community members. The proposed scheme using the proxy signature provides a mutual authentication and secure secret key exchange between community members, and supports secure authority delegation that can creates social community. Also, when delegation of signing authority and mutual authentication, this scheme reduces total computation time compared to the RSA signature scheme.